To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Personal computers and computer networks began to take over offices and increasingly the public in the 1980s, but the extensive adoption of the Internet did not come about until the introduction of the first browsers and the overwhelming acceptance of Microsoft Windows and Apple systems – equipped with advanced graphics – both in the mid-1990s. The world changed in many ways for numerous people from that point, as both social institutions and individuals have witnessed and participated in another social revolution: the availability and accessibility of information of all kinds and the dramatic innovation in interpersonal communication. With the assistance and encouragement of governments and many organizations (acting out of a variety of reasons), computers, linked to ever-growing networks, penetrated the general public rather quickly and relatively easily. It did not take long before numerous technological firms around the world, acknowledging significant improvements in a broad array of personal, work-related, social, business-related, and government-related activities, joined a competitive race for this line of business, marked by its creativity and high potential. Accordingly, they advanced and reinforced more intensive use of computers and numerous computer-related activities. This race, in turn, brought about fantastic technological developments that have changed people's world order and lives in many ways, from seeking and using information on any topic to shopping and trading, from communication with acquaintances and with strangers to virtual dating and a love life, from learning and teaching to doing research, from helping others and being helped to improved use of medicine and other facets of health care, from entertainment and leisure to self-expression.
For those who regularly surf through cyberspace and experience it as a parallel and not unusual social environment – whether this takes the form of online forums, chat rooms, or personal communication through instant messaging (IM) – it is customary to encounter various types and exhibitions of human behavior. Many Internet surfers, in the beginning, are convinced that most other surfers impersonate, lie, cheat, or at the very least attempt to pull your leg; later, however, it occurs to them that this basic premise is generally wrong. After spending much time in virtual communities, publicly and privately interacting with numerous anonymous individuals, many people start to realize that their behavior in cyberspace reflects their actual personalities or mood states. To their astonishment, as they observe over time other people's gestures, behavioral patterns, writing styles, frequency and intensity of involvement in group situations, personal associations, vocabulary, choice of verbal expressions, netiquette, and other features of their online behavior – all based on textual communication – laypeople realize that they can learn a great amount about themselves and about others. Moreover, it occurs to them that under these circumstances, they could learn even more about many people's personality dispositions, attitudes, moral values, sensitivities, habits, needs, and preferences than in an offline, face-to-face (F2F) environment. This intuitive recognition by many Internet users is consistent with what behavioral theorists and researchers of cyberspace have argued in regard to the emergence of self in cyberspace.
So saying she donned her beautiful, glittering golden–Ambrosial sandals, which carry her flying like the wind over the vast land and sea; she grasped the redoubtable bronze-shod spear, so stout and sturdy and strong, wherewith she quells the ranks of heroes who have displeased her, the [bright-eyed] daughter of her mighty father.
Homer, Odyssey, 1:96–101
The existence of natural computational problems that are (or seem to be) infeasible to solve is usually perceived as bad news, because it means that we cannot do things we wish to do. But this bad news has a positive side, because hard problems can be “put to work” to our benefit, most notably in cryptography.
It seems that utilizing hard problems requires the ability to efficiently generate hard instances, which is not guaranteed by the notion of worst-case hardness. In other words, we refer to the gap between “occasional” hardness (e.g., worst-case hardness or mild averagecase hardness) and “typical” hardness (with respect to some tractable distribution). Much of the current chapter is devoted to bridging this gap, which is known by the term hardness amplification. The actual applications of typical hardness are presented in Chapter 8 and Appendix C.
Summary: We consider two conjectures that are related to P ≠ NP. The first conjecture is that there are problems that are solvable in exponential time (i.e., in ε) but are not solvable by (non-uniform) families of small (say, polynomial-size) circuits. […]
Open are the double doors of the horizon; unlocked are its bolts.
Philip Glass, Akhnaten, Prelude
Whereas the number of steps taken during a computation is the primary measure of its efficiency, the amount of temporary storage used by the computation is also a major concern. Furthermore, in some settings, space is even more scarce than time.
In addition to the intrinsic interest in space complexity, its study provides an interesting perspective on the study of time complexity. For example, in contrast to the common conjecture by which NP ≠ coNP, we shall see that analogous space-complexity classes (e.g., Nℒ) are closed under complementation (e.g., Nℒ = coNℒ).
Summary: This chapter is devoted to the study of the space complexity of computations, while focusing on two rather extreme cases. The first case is that of algorithms having logarithmic space complexity. We view such algorithms as utilizing the naturally minimal amount of temporary storage, where the term “minimal” is used here in an intuitive (but somewhat inaccurate) sense, and note that logarithmic space complexity seems a more stringent requirement than polynomial time. The second case is that of algorithms having polynomial space complexity, which seems a strictly more liberal restriction than polynomial time complexity. Indeed, algorithms utilizing polynomial space can perform almost all the computational tasks considered in this book (e.g., the class PSP ACε contains almost all complexity classes considered in this book). […]
There has been much alarm about Internet abuse in the past decade. Claims of Internet-related crimes such as homicides, suicides, and child neglect have received widespread media attention across the globe (“Chinese Gamer Sentenced to Life,” 2005; Spain & Vega, 2005). Many claim that they are or know someone who is addicted to the Internet. Fifteen percent of university students in the United States and Europe and 26 percent of Australian students claim they know someone is addicted to the Internet (Anderson, 1999; Wang, 2001). Almost 10 percent of adult Internet users in a large online study self-identified as Internet addicts (Cooper, Morahan-Martin, Mathy, & Maheu, 2002), while 31 percent of MySpace users (Vanden Boogart, 2006) and 42 percent of online gamers (Yee, 2002) say they are addicted to those Internet applications. In Germany, a camp was established to help children who were addicted to the Internet (Moore, 2003). It is tempting to dismiss these claims as media hype, but clinicians also have reported Internet-related problems and have set up clinics specifically to treat these problems in many countries. In recent years, governments in Asia have established clinics and intervened to reduce Internet use. The first Chinese clinic for Internet addiction in Beijing has expanded from 40 to 300 inpatient beds, and new clinics are being established in other Chinese cities (Griffiths, 2005; Lin-Liu, 2006).
The philosophers have only interpreted the world, in various ways; the point is to change it.
Karl Marx, “Theses on Feuerbach”
In light of the apparent infeasibility of solving numerous useful computational problems, it is natural to ask whether these problems can be relaxed such that the relaxation is both useful and allows for feasible solving procedures. We stress two aspects about the foregoing question: On the one hand, the relaxation should be sufficiently good for the intended applications; but, on the other hand, it should be significantly different from the original formulation of the problem so as to escape the infeasibility of the latter. We note that whether a relaxation is adequate for an intended application depends on the application, and thus much of the material in this chapter is less robust (or generic) than the treatment of the non-relaxed computational problems.
Summary: We consider two types of relaxations. The first type of relaxation refers to the computational problems themselves; that is, for each problem instance we extend the set of admissible solutions. In the context of search problems this means settling for solutions that have a value that is “sufficiently close” to the value of the optimal solution (with respect to some value function). Needless to say, the specific meaning of “sufficiently close” is part of the definition of the relaxed problem. […]
Summary: This glossary includes self-contained definitions of most complexity classes mentioned in the book. Needless to say, the glossary offers a very minimal discussion of these classes, and the reader is referred to the main text for further discussion. The items are organized by topics rather than by alphabetic order. Specifically, the glossary is partitioned into two parts, dealing separately with complexity classes that are defined in terms of algorithms and their resources (i.e., time and space complexity of Turing machines) and complexity classes defined in terms of non-uniform circuits (and referring to their size and depth). The algorithmic classes include time complexity classes (such as P, NP, coNP, BPP, RP, coRP, PH, ε, εχP, and NεχP) and the space complexity classes, ℒ, Nℒ, Rℒ, and PSP ACε. The non-uniform classes include the circuit classes P/poly as well as NCk and ACk.
Definitions (and basic results) regarding many other complexity classes are available at the constantly evolving Complexity Zoo.
Preliminaries
Complexity classes are sets of computational problems, where each class contains problems that can be solved with specific computational resources. To define a complexity class one specifies a model of computation, a complexity measure (like time or space), which is always measured as a function of the input length, and a bound on the complexity (of problems in the class).
A new and rather surprising door in the history of the mental health field has opened. Professionals have begun to explore methods for using online environments to help people. How do these methods compare to in-person interventions? Although face-to-face approaches may be advantageous in many cases, there are some advantages to computer-mediated and online interventions. One obvious and frequently cited benefit that applies to all forms of online work is the opportunity to reach people who are unable to visit the professional for geographical, physical, or lifestyle reasons. Computer-mediated work also may be an important initial step in the establishment of what could become an ongoing, in-person treatment. Other advantages, as I'll discuss later, are specific to particular types of online interventions.
In writing this chapter, I decided not to organize it around the concept of psychotherapy. After all, what do we mean by that term? If we assembled a group of psychotherapists to discuss this question, we would be lucky if they came to any agreement other than a very general definition about psychotherapy as a service in which a professional helps a person with a problem. That controversy exists even before we toss cyberspace into the debate. Whether we call it psychotherapy or not, there have been many approaches over the past 100 years for applying psychological principles to the delivery of mental health services. Now cyberspace offers even more possibilities – many never dreamed of in the past.
Farewell, Hans – whether you live or end where you are! Your chances are not good. The wicked dance in which you are caught up will last a few more sinful years, and we would not wager much that you will come out whole. To be honest, we are not really bothered about leaving the question open. Adventures in the flesh and spirit, which enhanced and heightened your ordinariness, allowed you to survive in the spirit what you probably will not survive in the flesh. There were majestic moments when you saw the intimation of a dream of love rising up out of death and the carnal body. Will love someday rise up out of this worldwide festival of death, this ugly rutting fever that inflames the rainy evening sky all round?
Thomas Mann, The Magic Mountain, “The Thunderbolt.”
We hope that this work has succeeded in conveying the fascinating flavor of the concepts, results, and open problems that dominate the field of Computational Complexity. We believe that the new century will witness even more exciting developments in this field, and urge the reader to try to contribute to them. But before bidding good-bye, we wish to express a few more thoughts.
As noted in Section 1.1.1, so far Complexity Theory has been far more successful in relating fundamental computational phenomena than in providing definite answers regarding fundamental questions. Consider, for example, the theory of NP-completeness versus the P-vs-NP Question, or the theory of pseudorandomness versus establishing the existence of one-way functions (even under P ≠ NP).
It is easier for a camel to go through the eye of a needle, than for a rich man to enter into the kingdom of God.
Matthew, 19:24.
Complexity Theory provides a clear definition of the intuitive notion of an explicit construction. Furthermore, it also suggests a hierarchy of different levels of explicitness, referring to the ease of constructing the said object.
The basic levels of explicitness are provided by considering the complexity of fully constructing the object (e.g., the time it takes to print the truth table of a finite function). In this context, explicitness often means outputting a full description of the object in time that is polynomial in the length of that description. Stronger levels of explicitness emerge when considering the complexity of answering natural queries regarding the object (e.g., the time it takes to evaluate a fixed function at a given input). In this context, (strong) explicitness often means answering such queries in polynomial time.
The aforementioned themes are demonstrated in our brief review of explicit constructions of error-correcting codes and expander graphs. These constructions are, in turn, used in various parts of the main text.
Summary: This appendix provides a brief overview of aspects of coding theory and expander graphs that are most relevant to Complexity Theory. Starting with coding theory, we review several popular constructions of error-correcting codes, culminating in the construction of a “good” binary code (i.e., a code that achieves constant relative distance and constant rate). […]
The use of new technology, and particularly the Internet, increasingly requires people to disclose personal information online for various reasons. In computer-mediated communication (CMC), disclosure may serve to reduce uncertainty in an interaction (Tidwell & Walther, 2002) or to establish legitimacy when joining an online group (Galegher, Sproull, & Kiesler, 1998). Disclosure is often a prerequisite to access services (for instance, with the ubiquitous registration form), to make online purchases (Metzger, 2006) or is requested for those same services to be personalized. The increasingly social nature of much web-based software (e.g., social network sites) also places a privacy cost on users due to a heightened requirement for disclosure of personal information as part of the functionality of the system (see BBC News). In addition to this increased need for disclosure, the development of ambient and ubiquitous technologies has raised the possibility that devices will communicate, or even broadcast, personal information without recourse to the user. Moreover, the ability to store information easily and cross-reference databases raises the possibility of unwitting disclosure through information accrual. Perhaps not surprisingly, this has raised a number of privacy concerns, among consumers and privacy advocates (e.g., Jupiter Research, 2002; U.K. Information Commissioner, 2006).
We start this chapter by introducing the existing research literature surrounding privacy and trust online. We then go on to consider how privacy and trust interact in determining online behavior.
I owe this almost atrocious variety to an institution which other republics do not know or which operates in them in an imperfect and secret manner: the lottery.
Jorge Luis Borges, “The Lottery in Babylon”
So far, our approach to computing devices was somewhat conservative: We thought of them as executing a deterministic rule. A more liberal and quite realistic approach, which is pursued in this chapter, considers computing devices that use a probabilistic rule. This relaxation has an immediate impact on the notion of efficient computation, which is consequently associated with probabilistic polynomial-time computations rather than with deterministic (polynomial-time) ones. We stress that the association of efficient computation with probabilistic polynomial-time computation makes sense provided that the failure probability of the latter is negligible (which means that it may be safely ignored).
The quantitative nature of the failure probability of probabilistic algorithms provides one connection between probabilistic algorithms and counting problems. The latter are indeed a new type of computational problems, and our focus is on counting efficiently recognizable objects (e.g., NP-witnesses for a given instance of set in NP). Randomized procedures turn out to play an important role in the study of such counting problems.
Summary: Focusing on probabilistic polynomial-time algorithms, we consider various types of probabilistic failure of such algorithms (e.g., actual error versus failure to produce output). This leads to the formulation of complexity classes such as BPP, RP, and ƵPP. […]
Cyberspace has introduced new and intriguing means for knowledge sharing as well as new structures of mediated knowledge-building communities. Considering the various forms of online communities, it should be difficult to overstate the significance of Wikipedia as a landmark in building communal knowledge repositories.
Wikipedia is an online collaboratively written encyclopedia. It has unique aspects of users' involvement in the production of content and its function as a community. In less than five years of existence, Wikipedia has acquired both avid advocates and ardent adversaries. Although there have been some public and academic debates about the quality of its content, as the rapid growth of its articles and numbers of active users (Wikipedians) continues, most people agree that at least the English version of Wikipedia is approaching critical mass where substantial content disasters should become rare. Wikipedia's existence and success rely on users' inputs. Our chapter focuses on Wikipedians' incentives for contributing to Wikipedia. The popular observation is that Wikipedia only works in practice. In theory, it can never work. How does Wikipedia mobilize the levels of participation that make it “work in practice”?
Wikipedia's growth, from the time of its foundation in 2001, has been impressive in all conceivable dimensions. Expansion metrics have accelerated in terms of volume, numbers of articles, visitors, and percentage of contributors. There are, by the time of this writing, 250 language editions of Wikipedia. The English-language version is the largest. It contains more than two million articles.
It is possible to build a cabin with no foundations, but not a lasting building.
Eng. Isidor Goldreich (1906–95)
Summary: Cryptography is concerned with the construction of computing systems that withstand any abuse: Such a system is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from this functionality.
This appendix is aimed at presenting the foundations of cryptography, which are the paradigms, approaches, and techniques used to conceptualize, define, and provide solutions to natural security concerns. It presents some of these conceptual tools as well as some of the fundamental results obtained using them. The emphasis is on the clarification of fundamental concepts, and on demonstrating the feasibility of solving several central cryptographic problems. The presentation assumes basic knowledge of algorithms, probability theory, and complexity theory, but nothing beyond this.
The appendix augments the treatment of one-way functions, pseudorandom generators, and zero-knowledge proofs, given in Sections 7.1, 8.2, and 9.2, respectively. Using these basic primitives, the appendix provides a treatment of basic cryptographic applications such as encryption, signatures, and general cryptographic protocols.
Introduction and Preliminaries
The rigorous treatment and vast expansion of cryptography is one of the major achievements of theoretical computer science. In particular, classical notions such as secure encryption and unforgeable signatures were placed on sound grounds, and new (unexpected) directions and connections were uncovered.
When Lewis Carroll's Alice falls down the hole into Wonderland, she encounters a variety of situations in various places: a garden, a forest, a pool, a kitchen, a castle, and a courtroom, among others. The characters she meets who become her acquaintances, friends, and enemies differ depending on her location in her travels, and, of course, her size. She follows the White Rabbit who is terrified of her larger-than-human height in the hallway. She learns to adjust her size to match the places, objects, animals, and people who cross her pathways. People have likened “cyberspace” to the world found through the mirror, the virtual reality on the other side contrasted to the everyday physical world.
As the experience of people online accumulated, researchers differentiated modes of relating within cyberspace such as the use of the asynchronous and the synchronous or real-time media. They have begun to illuminate differences in the types of spaces, places, or settings online (see Baker, 2002, 2005; Baker & Whitty, 2008; McKenna, 2007; Whitty & Carr, 2006). A current line of inquiry attempts to explicate interactions that originate but do not remain in cyberspace, or relationships that span online and offline places. Researchers of online relationships recognize that people online often “felt as though they have gotten to know each other quite well” (Walther & Parks, 2002, p. 549) before meeting offline (Baker, 1998), entering “mixed mode relationships” (Walther & Parks, 2002, p. 542).