skip to main content
10.1145/800116.803752acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

On non-linear lower bounds in computational complexity

Published:05 May 1975Publication History

ABSTRACT

The purpose of this paper is to explore the possibility that purely graph-theoretic reasons may account for the superlinear complexity of wide classes of computational problems. The results are therefore of two kinds: reductions to graph theoretic conjectures on the one hand, and graph theoretic results on the other.

We show that the graph of any algorithm for any one of a number of arithmetic problems (e.g. polynomial multiplication, discrete Fourier transforms, matrix multiplication) must have properties closely related to concentration networks.

References

  1. 1.Aho, A.V., Hirschberg, D.S. and Ullman, J.D. Bounds on the Complexity of the longest subsequence problem. Proc. 15th Symp. on SWAT 104-109, (1974).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Aho, A.V., Hopcroft, J.E. and Ullman, J.D. The Design and Analysis of Computer Algorithms. Addison-Wesley, Reading, Mass. (1974). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Borodin, A. and Munro, I. Computational Complexity of Algebraic and Numeric Problems. American Elsevier. (1975).Google ScholarGoogle Scholar
  4. 4.Cook, S.A. and Reckhow, R. A. Time bounded random access machines. JCSS 7, 354-375, (1973).Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Fischer, M.J. and Paterson, M.S. String-matching and other products. MAC Technical memorandum 41, MIT, (1974). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Fischer, M.J. and Pippinger, N. To appear.Google ScholarGoogle Scholar
  7. 7.Floyd, R.W. Permuting information in idealized two-level storage. In Complexity of Computer Computations, R. E. Miller and J. W. Thatcher (eds.), Plenum Press (1972).Google ScholarGoogle Scholar
  8. 8.Knuth, D.E. The Art of Computer Programming, Vol. 3, Addison Wesley, Reading, Mass. (1973). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Morris, J.H. and Pratt, V.R. A linear pattern-matching algorithm. TR-40, Computer Center, University of California at Berkeley (1970).Google ScholarGoogle Scholar
  10. 10.Pinsker, M.S. On the complexity of a concentrator. 7th International Teletraffic Congress, Stockholm. (1973).Google ScholarGoogle Scholar
  11. 11.Pippenger, N. The complexity theory of switching networks. Technical Report 487, Res. Lab. of Electronics, MIT, (1973).Google ScholarGoogle Scholar
  12. 12.Savage, J.E. The Complexity of Computing, Chapter 2, (manuscript). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Strassen, V. Die Berechnungkomplexitat von elementarsymmetrischen Funktionen und von Interpolationskoeffizienten. Numer. Math 20, (1973).Google ScholarGoogle Scholar
  14. 14.Valiant, L.G. Parallelism in comparison problems. SIAM J. on Computing, (to appear).Google ScholarGoogle Scholar
  15. 15.Wagner, R. A., and Fischer, M. J. The string to string correction problem. JACM 21:1, 168-173, (1974). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.Waksman, A. A permutation network. JACM 15, 159-163 (1968). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.Yao, F.F. personal communication.Google ScholarGoogle Scholar
  18. 18.Yao, A.C.-C., and Yao, F.F. Lower bounds on merging networks. Manuscript (1974).Google ScholarGoogle Scholar

Index Terms

  1. On non-linear lower bounds in computational complexity

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC '75: Proceedings of the seventh annual ACM symposium on Theory of computing
        May 1975
        265 pages
        ISBN:9781450374194
        DOI:10.1145/800116

        Copyright © 1975 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 May 1975

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        STOC '75 Paper Acceptance Rate31of87submissions,36%Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader