SIGACT News Complexity Theory Column 14 Lane A. H e m a s p a a n d r a Dept. of C o m p u t e r Science, University of Rochester Rochester, NY 14627, USA [email protected] I n t r o d u c t i o n to C o m p l e x i t y T h e o r y C o l u m n 14 As you probably already know, there is an active discussion going o n - - i n forums ranging from lunch-table conversations to workshops on "strategic directions" to formal r e p o r t s l - - r e g a r d i n g the future of theoretical c o m p u t e r science. Since your complexity columnist does not know T h e Answer, I've asked a n u m b e r of people to contribute their comments on the narrower issue of the future of complexity theory. The only ground rule was a loose 1-page limit; each c o n t r i b u t o r could choose w h a t aspect(s) of the future to address, and the way in which to address th em. T h e first installment of contributions appears in this issue, and one or two more installments will a p p e a r a m o n g t h e next few issues. Also coming during the next few issues: the search for the perfect theory journal, a n d (for the sharp-eyed) Lance Fortnow dons a clown suit. Finally, let me men tio n t h a t work of Russell Impagliazzo resolves one of the open questions from Complexity T h e o r y C o l u m n 11.2 G u e s t Column: T h e F u t u r e of C o m p u t a t i o n a l C o m p l e x i t y T h e o r y : Part I C o m m e n t s by C. P a p a d i m i t r i o u , O. G o l d r e i c h / A . W i g d e r s o n , A. R a z b o r o v , and M. Sipser 1 On Extroverted Complexity Theory, by Christos H. Papadimitriou 3 Complexity theory has come a long way in the thirty years since its inception. It has identified some of the most f u n d a m e n t a l and deep problems related to c o m p u t a t i o n , it has developed a powerful me t h odol ogy for attacking them, an d it is broadly considered as one of the most challenging m a t h e m a t i c a l frontiers. Considered as a pure m a t h e m a t i c a l discipline in th e p u rs u i t of m a t h e m a t i c a l insight and depth, complexity is successful and well-established. In this no,e, however, I would like to concentrate on complexity as an applied m a t h e m a t i c a l discipline whose function is to gain insights into the problems of the natural, social, and applied an d engineering 1For a quick and bracingly v~ied path into the discussion, I ' d point to two d o c u m e n t s : and h t t p : / / t h e o r y . l c s . m i t . e d u / - o d e d / t o c - s p . h t m l . 2In more detail: Impagliazzo [Imp96] resolves Problem 3 of the "Worlds to Die For" Complexity T h e o r y C o l u m n [HRZ95]. In fact, his result is even stronger t h a n what we conjectured, as he shows t h a t with probability 1 -- 2 -n(~) over the set of oracles there is a relativized pseudora~dom generator t h a t is secure against oracle circuits of size 2 c~ for some constant c ~ 0. He first shows t h a t a r a n d o m function behaves for almost all oracles like a one-way~ function and, thus, the general m e t h o d of H~stad, Impagliazzo, Levin, and L u b y [HILL91] for converting a one-way function into a p s e u d o r a u d o m generator can be used to obtain the above result. As we noted in the column, this m e t h o d provides a provably secure way of privatizing r a n d o m bits (for more details, see [Zim96]).--L. H e m a ~ p a a u d r a and M. Z i m a n d SComputer Science Division, University of California Berkeley; christosacs.berkeley.edu. A d a p t e d from the introduction of [Pap96]. ftp://ftp.cs.washington.edu/tr/1996/O3/UW-CSE-96-O3-O3.PS.Z 6 sciences. This aspect has been somewhat peripheral to what we usually m e a n by "complexity theory," but I believe it is important for its future. Understanding the position of complexity theory within the realm of scientific inquiry is an important project which is, of course, well beyond the scope of this note; here I shall only refer anecdotally to six distinct ways in which complexity theory has reached out and touch other fields: Comple~ty as NP-completeness. O n e of the major achievements of complexity theory is the living connection it has forged between application problems and modes of resource-bounded computation. This is typically done through the key notion of completeness, of which NP-colnpleteness is of course the most popular kind. Completeness comes so natural to a complexity theorist, that it is easy to forget what an important and influential concept it has been. In fact, outside theoretical computer science, "complexity theory" is often understood--unjustly, to be sure---as synonymous to "NPcompleteness." 4 Comple~ty as mathematical poverty. One of the fundamental theses that seems to be almost universally accepted and practiced in computer science is that a l g o r i t h m s - - a n d efficient algorithms in particular--are the natural outflow of mathematical structure discovered in applications. 5 If we accept this implication, then we must also espouse the contrapositive one, namely, that complexity is the manifestation of mathematical nastiness. Complexity has been often and brilliantly used within computer science and mathematics in this allegorical way; a computational problem is formulated and proved hard for the sole purpose of pointing out the mathematical difficulties involved in an area or approach (see [HLYS0] for an early example from database theory). Complezit# as metaphor. Often the implication discussed in the previous paragraph is composed with the metaphors of an application domain or other scientific discipline with sometimes exquisite results. "Complexity" may mean "chaos" in the domain of dynamical systems [BPT91], '~unbounded rationality" in gaxne theory [PY94]--and perhaps "genetic indeterminism" in genetics, "cognitive implausibility" in artificial intelligence, and so on. CompIezity as blessing in disguise. Cryptography is of course the best-known example here, but not the only one. For example, [BTT92] point out that complexity can be desirable in political science, as evidence that an electoral protocol is resistant to manipulation. Complezity as herculean sword. The mythical monster Hydra grows three heads for each one cut off by Hercules. s W h e n complexity theorists point out obstacles to an approach, several novel alternative approaches typically develop: "It's NP-complete? Then we'll concentrate on planar graphs, or on random graphs, or else we'll approximate." A n d so on. Complexity as bea~tzl contest judge. W h e n m a n y alternative approaches have been proposed for a problem (computational or conceptual), rigorous criteria for evaluating them are needed. Complexity can come in handy in such a situation. For example, in [DP94] we proposed complexity as a criterion for comparing the feasibility and desirability of "solution concepts" (approaches to w h e n a proposed protocol for splitting goods is fair) in mathematical economics, and in [GKPS95] complexity was used in sorting out alternative proposals in knowledge representation--an important subfield of artificial intelligence. 4 A m o n g treatments of complexity theory by scientistsoutside our fieldthis one is not the most unfair or ignorant; compare with [CPM94], for example. 5The only challenge of this principle within computer science comes, I think, ~ o m neural networks and other metaphor-based algorithmic paradigms. SIncidentally, this is not complexity's firstbrush with Hercules: K n u t h [Knu74] had proposed i~herculean" as one of the possible terms for the concept that is now, thankfully, k n o w n as "NP-complete." According to Knuth, K e n Steiglitz counterproposed ~'augean," a term which Greek mythology buffs will find both hilarious and appropriate. 7 2 On The Usefulness of Hard Problems, by Oded Goldreich 7 and Avi Wigderson s We w e r e a s k e d t o w r i t e o n t h e f u t u r e of C o m p l e x i t y T h e o r y . G i v e n t h e p a s t ( a n d p r e s e n t ) of o u r field, w h i c h c e l e b r a t e d so m a n y a c h i e v e m e n t s , m a n y in s u r p r i s i n g , u n a n t i c i p a t e d d i r e c t i o n s , we feel it u n w i s e to p r e d i c t t h e p r e v a i l i n g d i r e c t i o n s in say 10 or 20 years. N e v e r t h e l e s s , we axe c o n f i d e n t t h a t if o u r field c o n t i n u e s to a t t r a c t t h e s a m e c a l i b r e of c r e a t i v e m i n d s , a n d is given t h e f r e e d o m ( a n d m i n u t e r e s o u r c e s ) to p u r s u e its i n t e r n a l a g e n d a , it will c o n t i n u e to t h r i v e . M o r e o v e r , t h e i m p o r t a n c e of its f i n d i n g s to o t h e r areas of c o m p u t e r science a n d e n g i n e e r i n g , as well as to o t h e r sciences a n d (yes!) h u m a n i t i e s will c o n t i n u e to grow. To j u s t i f y t h i s s t r o n g p r e d i c t i o n , we c o n s i d e r w h a t c o m p l e x i t y t h e o r y h a s d o n e w i t h t h e classical p r o b l e m o f i n t e g e r f a c t o r i z a t i o n : given an integer N, find its prime/actors. M a t h e m a t i c i a n s h a v e s t u d i e d t h i s p r o b l e m for c e n t u r i e s , s e a r c h i n g for a n efficient f a c t o r i n g a l g o r i t h m e v e n b e f o r e t h e n o t i o n of a n efficient algorit.hm was defined. T h i s t a s k h a s failed so far, w h i c h m a y v e r y well m e a n t h a t f a c t o r i n g is infeasible. S o WHAT? C o m p l e x i t y T h e o r y h a s m a n a g e d to u s e t h i s i n f e a s i b i l i t y as a p i v o t for a v a r i e t y of f u n d a m e n t a l discoveries a n d t h e o r i e s of v e r y g e n e r a l n a t u r e . T h i s is t r u e to s u c h a n e x t e n t t h a t a list of t o p i c s as b e l o w c a n b e u s e d for a g r a d u a t e c o u r s e w h i c h will b e offered n o t o n l y to all c o m p u t e r science s t u d e n t s , b u t also to s t u d e n t s of o t h e r d i s c i p l i n e s . I n fact, it is h i g h t i m e t h a t o u r c o m m u n i t y s t a r t s to d i s s e m i n a t e t h e i n t e l l e c t u a l c o n t e n t s o f t h e t h e o r y o f c o m p u t a t i o n , a n d c o u r s e s of t h e a b o v e f o r m m a y b e a g o o d s t a r t . T h e i t e m s b e l o w all follow f r o m t h e a s s u m e d in/easibility o/factoring. T h i s , as well as t h e c o n s e q u e n c e s , are s t a t e d o n l y i n f o r m a l l y for o b v i o u s r e a s o n s , w i t h t h e u n d e r s t a n d i n g t h a t t h e y all have precise statements which make them mathematical theorems. D a t a Representation is Important. This point, which is the main focus of our courses on Data Structures and Efficient Algorithms, is driven h o m e forcefully here. If Y~j aj2 j = N = H i Piei , then each side of this equation represents the integer N, and the two representations (binary expansion and prime factorization) axe equivalent from the information theoretic viewpoint. However, they are drastically different computationally: the L H S can be easily computed from the RI-IS, but the reverse direction in general is infeasible. Moreover, some computational problems, like solving certain polynomial equations modulo N , axe feasible given the RI-IS but infeasible given the LHS. P s e u d o r a n d o m n e s s Exists. There are efficient deterministic procedures that take a few r a n d o m bits and stretch them to a m u c h longer (pseudorandom) string, which looks r a n d o m to every efficient algorithm. Thus deterministic procedures can greatly expand computational entropy. This is in stark contrast to the information theoretic analog (deterministic procedures can never increase entropy), and physical intuition (cf.,the preservation of mass and energy). Randomness can be Eliminated when Computing Functions. A straightforward c o n s e q u e n c e o f t h e p r e v i o u s i t e m is t h a t a n y p r o b a b i l i s t i c a l g o r i t h m (for c o m p u t i n g a f u n c t i o n ) c a n b e r e p l a c e d by a d e t e r m i n i s t i c o n e w h i c h is a l m o s t as efficient. T h e l a t t e r will s i m p l y e n u m e r a t e all t h e p o s s i b l e p s e u d o r a n d o m s t r i n g s , a r i s i n g f r o m all p o s s i b l e s h o r t seeds, a n d d e c i d e by a m a j o r i t y vote. 7 D e p a r t m e n t of C o m p u t e r Science a n d Applied M a t h e m a t i c s , W e i z m a n n I n s t i t u t e of Science, R e h o v o t , ISRAEL. E-mail: oded~,~isdom, vei~m~nn, ac. i l SInstituLe for C o m p u t e r Science, H e b r e w University, Givat B~m, Jerusalem, ISaAEL. E - m a i h a v i © c s . h u j £. ac. i1_ 8 Cryptography is P o s s i b l e . Secure public-key encryption, unforgeable digital signatures, d i s t r i b u t e d coin-flipping, electronic voting schemes a n d electronic cash transfer can all be p e r f o r m e d digitally, by c o m m u n i c a t i n g computers. In fact, e v e r y d i s t r i b u t e d protocol w i t h a r b i t r a r y privacy constraints 9 can be i m p l e m e n t e d in a way t h a t is resilient to a r b i t r a r y faults by any n u m b e r of the players. In other words, players may e m u l a t e the existence of a t r u s t e d p a r t y in a setting in which no such t r u s t e d p a r t y exists (and f u r t h e r m o r e in which m a n y parties c a n n o t be t r u s t e d at all). T h e effect of these techniques on t h e real world is already i m m e n s e a n d is further growing rapidly. Z e r o - K n o w l e d g e P r o o f s . A p a r t y having a proof of an a r b i t r a r y m a t h e m a t i c a l t h e o r e m T can convince anyone that T is true, w i t h o u t giving away a n y t h i n g besides the validity of T. I n particular, after getting such a proof, one will be convinced t h a t T is t r u e a n d still be u n a b l e to prove this to others. This paradoxical notion contradicts p o p u l a r beliefs t h a t o b t a i n i n g a proof of an u n k n o w n t r u t h necessitates learning s o m e t h i n g new. Is L e a r n i n g F e a s i b l e ? W i t h i n several s t a n d a r d models of learning it is infeasible to learn even simple concepts described by short formulae. This sheds new light on the f u n d a m e n t a l scientific task of u n d e r s t a n d i n g the learning process. P ¢ N P . In particular, a variety of i m p o r t a n t c o m p u t a t i o n a l problems a d m i t no feasible (exact a n d even approximate) solutions. T h o u s a n d s of such problems are known, a n d h u n d r e d s are discovered each year, in a variety of scientific and engineering disciplines. T h e s e problems include famous examples like Satisfiability of Boolean Formulas, T h e Traveling S a l e s m a n P r o b l e m , and Integer Programming_ n o " N a t u r a l P r o o f s " o f P ~ / V P . This recent research (partly) explains our failure so far to prove t h a t the problems above are indeed infeasible. First, it abstracts all proof techniques which were used in d e m o n s t r a t i n g the k n o w n lower bounds, b o t h s t r u c t u r a l l y (as N a t u r a l Proofs) and logically (as a certain fragment of P e a n o Arithmetic). T h e n it shows t h a t any proof falling into either of these categories cannot be used to establish a s u p e r p o l y n o m i a l lower b o u n d for general circuits. There are W h e n considering the contrapositive of the above implications, one is a m a z e d to discover t h a t any efficient learning a l g o r i t h m for short formulae, any t h e o r e m w i t h no zero-knowledge proof, any function w h i c h requires r a n d o m n e s s for efficient c o m p u t a t i o n , and any nontrivial circuit lower b o u n d using k n o w n m e t h o d s c a n a l l be converted into an efficient factoring algorithm! A n d w h a t if factoring has an efficient algorithm? Well, first of all, due to the nearly-universal use of the RSA C r y p t o s y s t e m , the consequences on information privacy a n d world e c o n o m y can be devastating. B u t scientifically speaking, this alone would leave all items above intact, since o t h e r "one-way" functions would serve j u s t as well as factoring. Moreover, while some of these items are essentially equivalent to the existence of one-way functions, others hold even u n d e r seemingly m u c h weaker conditions. Meanwhile, the search for efficient factoring algorithms continues. Active c o l l a b o r a t i o n of M a t h e m a t i c i a n s and C o m p u t e r Scientists has led to impressive progress in t h e last decade, using k n o w n results in N u m b e r T h e o r y as well as establishing new ones. On an o r t h o g o n a l direction, the recent Q u a n t u m p o l y n o m i a l - t i m e a l g o r i t h m for factoring has greatly e n h a n c e d efforts of Physicists towards the s t u d y of the feasibility of the Q u a n t u m C o m p u t e r model. W h a t will be next? gFor example, suppose some parties wish to play a standard g a m e of Poker over the telephone. 3 Proofs, Computations Razborov l° and Practical Applications, by Alexander A. T h e g e n e r a l i d e a t h a t c o m p u t a t i o n s a n d proofs have m u c h m o r e in c o m m o n t h a n it m a y a p p e a r f r o m t h e first sight is b e i n g d e v e l o p e d in at least t h r e e sister c o m m u n i t i e s d e s c e n d i n g f r o m t h e classical m a t h e m a t i c a l logic. C o m p l e x i t y T h e o r y c o n t r i b u t e d to t h a t p u r p o s e n o t i o n s like interactive proofs, probabilistically checkable proofs and transparent proofs c h a l l e n g i n g such f u n d a m e n t a l issues as r i g o r o u s n e s s a n d verifiability. Feasible P r o o f T h e o r y s u g g e s t e d t h a t even classical proofs have their own intrinsic complexity, a n d it is e x t r e m e l y closely, r e l a t e d to t h e o r d i n a r y c o m p l e x i t y of a l g o r i t h m s . Finally, t h e "LICS c o m m u n i t y " analyses proofs in f o r m a l s y s t e m s w h o s e semantics is i n t e n d e d to c a p t u r e t h e process of c o m p u t a t i o n h a p p e n i n g in the real software. I n several last years we s t a r t e d to see some r e n e w e d c o m m u n i c a t i o n on this t o p i c b e t w e e n t h e fields once u n i t e d in t h e f r a m e w o r k of m a t h e m a t i c a l logic. M y p r e d i c t i o n is t h a t in u p c o m i n g years t h e s e r e l a t i o n s b e t w e e n c o m p u t a t i o n s a n d proofs will receive even closer a t t e n t i o n o n t h e side of C o m p l e x i t y T h e o r y ( o t h e r p a r t i e s involved a l r e a d y do it on t h e professional basis). O u r c o m m u n i t y c e r t a i n l y has s o m e t h i n g h e r e b o t h to say (e.g., how to prove a n y t h i n g a b o u t t h e c o m p l e x i t y of proofs? O r h o w to prove efficiently t h e correctness of p r o g r a m s , r i g o r o u s l y defining first w h a t it m e a n s ? ) a n d to ask (e.g., w h a t makes o u r o w n f u n d a m e n t a l p r o b l e m s so difficult to solve?) C o m i n g to a n o t h e r p a r t of t h e question, " W h e r e should C o m p l e x i t y T h e o r y go?", t h e r e ' s a lot of effort n o w to t r y to increase t h e i m p a c t of our field on key a p p l i c a t i o n areas. B u t in m y o p i n i o n it is n o t q u i t e clear w h e t h e r C o m p l e x i t y T h e o r y s h o u l d go a n y w h e r e at all or it w o u l d b e m o r e useful s t a y i n g w h e r e it is. T h e m i s s i o n of this discipline is to p r o v i d e a b r i d g e for t h e traffic of ideas a n d c o n c e p t s ( w i t h a h a n d f u l of exceptions, not the results themselves!) b e t w e e n p u r e m a t h e m a t i c s a n d C o m p u t e r Science. T r y to p u l l it to one side (say, for t h e p u r p o s e of m a k i n g a j u n c t i o n i n s t e a d ) , a n d firstly you will no longer have a n y t h i n g to cross t h e river u p o n , a n d s e c o n d l y y o u m a y discover t h a t t h e b r i d g e ' s r e m n a n t s axe less useful on t h e l a n d t h a n e x p e c t e d as t h e c o n s t r u c t i o n was d e s i g n e d for different p u r p o s e s . However, in m y o p i n i o n t h a t p a r t of s e m i - a p p l i e d r e s e a r c h in C o m p l e x i t y T h e o r y w h i c h develops according to the i n t e r n a l logic of our field has to b e s t r o n g l y e n c o u r a g e d ( c o n t i n u i n g t h e a n a l o g y w i t h t h e bridge, it is s i m p l y o u r d u t y to p r o v i d e as c o n v e n i e n t access to t h e traffic across it as we c a n m a n a g e ) . T h e w o r k on efficient p r o g r a m verification m e n t i o n e d a b o v e in q u i t e a different c o n t e x t is one g o o d e x a m p l e of this. 4 Is t h e H a n d w r i t i n g on the Wall ? Reflections on the future of theoretical computer science by Michael Sipser al D u r i n g d i n n e r one t i m e w i t h several M I T c o m p u t e r science t h e o r i s t s at Joyce C h e n ' s C h i n e s e r e s t a u r a n t in C a m b r i d g e , discussion t u r n e d to t h e f u t u r e of theory. O n e of t h e g r o u p p a i n t e d a r a t h e r bleak p i c t u r e , b e c a u s e of a tight j o b m a r k e t a n d a c o n c e r n t h a t few t h e o r e t i c a l results b e a r u p o n p r a c t i c e . He said, " t h e h a n d w r i t i n g is on t h e wall" for theory. I recall it q u i t e d i s t i n c t l y b e c a u s e j o b i n t e r v i e w s are m e m o r a b l e events, a n d t h a t d i n n e r o c c u r r e d w h e n I was i n t e r v i e w e d for a p o s i t i o n at M I T . I was a fresh P h . D . t h e n fxom Berkeley. It was 1979. l°Steklov Mathematical Institute, Vavilova 42, 117966, GSP-1, Moscow, RUSSIA. Supported by grant ~96-0101222 of the Russian Foundation for Fundamental Research. 11Mathematics Department, MIT. Supported by NSF Grant 9503322 CCR. 10 The future, viewed from 1979, turned out to be much brighter. Indeed, our field has been rich with beautiful, big ideas. We can take credit for major applications of theory, invented by theorists, that soon will affect everyone's daily life. Our currency has become high among scientists and mathematicians in other fields. Talented students have been electing to study theory and nearly all have found positions as theorists in academia or industry. Theory lives! Today, I sometimes hear pessimistic views similar to those expressed at that 1979 dinner. Will our field remain intellectually alive? I believe the future of theory remains as bright now as it was then. The pace of discovery shows no sign of slowing. Students still find our questions challenging and wish to join us in solving them. The shortage of jobs and grants is an important problem. But any field that is interesting enough to continue to attract new people must eventually cope with such shortages, painful though they remain. As to where theoretical computer science, or complexity theory, should go, I would be happy to see them continue on their current paths. Good research aims at depth, elegance, and practicality. By its nature, theory focuses on the first two, but even in complexity theory, many papers do not ignore the third. Some even manage to attain all three simultaneously, though such results are rare in any field. Various people argue that we ought to tilt our field toward practice, but I disagree. Competing with industry on its tuff becomes increasingly harder as it grows richer_ We must continue to reserve some of our academic effort for highly speculative and pure research that industrial companies will never pursue. As to where theory will go, I'll make only one prediction. The next few years, say five to be conservative, will see another theoretical breakthrough as amazing and unexpected as were those previous. And to those still writing by hand on walls, I say an upgrade in technology--and ~.hinking--is overdue. References [BTT92] Bartholdi, J.J., III; Tovey, C.A.; Trick, M. "How hard is it to control an election?" Mathematical and Computer Modelling, Aug.-Sept. 1992, vol.16, (no.8-9):27-40. [BPT91] Buss, S.R.; Papadimitriou, C.H.; Tsitsiklis, J.N. "On the predictability of coupled automata: an allegory about chaos," Complex Systems, Oct. 1991, vol.5, (no.5):52539. Also, Proc. 1990 FOGS. [CPM94] Cowan, G.A.; Pines, D.; Meltzer, D. Complexity: Metaphors, models, and reality, Santa Fe, 1994. [DP94] Deng, X.; Papadimitriou, C.H. "The complexity of solution concepts," Mathematics of Operationa Research, lg, 2, pp. 257-266, 1994. [GKPS95] Gogic, G.; Kautz, H.; Papadimitriou, C. H.; Selman, B. "The comparative linguistics of knowledge representation," Proc. 1995 IJCAI. [HILL91] J. H~stad, it. Impagliazzo, L. Levin, and M. Luby. Construction of a pseudorandom generator from any one-way function. Technical Report 91-068, ICSI, Berkeley, 1991. [HLY80] Honeyman, P.; Ladner, R.E.; Yannakakis, M. "Testing the universal instance assumption," Information Processing Letters, 1~ Feb. 1980, vol.10, (no.1):14-19. [HRZ95] L. Hemaspaandra, A. Ramachandran, and M. Zimand. Worlds to die for. SIGA CT News, 26(4):5-15, 1995. 11 [Imp96] R. Impagliazzo. Very strong one-way functions and pseudo-random generators exist relative to a random oracle. Manuscript, January 1996. [Knu74] Knuth, D.E. "A terminological proposal," SIGACT News, 6, 1, 12-18, 1974. [Pap96] Pa.padimitriou, C. H. "The complexity of knowledge representation," invited paper in the Proc. 1996 Computational Complexity Conference. [PY94] Papadimitriou, C.H.; Yannakakis, M. "Complexity as bounded rationality," Proc. 1995 8TOC. [Zim96] M. Zimand. How to privatize random bits. Technical Report Tl:t-616, University of Rochester, Department of Computer Science, Rochester, NY, April 1996. Probability and Information An Integrated Approach David Applebaum Provides a dear and systematic foundation to the subject. The author pays particular attention to the concept of probability via a highly simplified discussion of measures on Boolean algebras. Many examples and exercises are included. 1996 55507-8 55528-0 c.300 pp. Hardback $69.95 Paperback $24.95 Noisy Information and Computational Complexity Leszek Plaskota Deals with the computational complexity of mathematical problems for which available information is partial, noisy and priced. The author supplies two hundred eaurcises. 1996 55368-7 319 pp. Hardback $59.95 Computability. Enumerability. Unsolvability Directions in Recursion Theory S.B. Cooper, T.A. Slaman, and $.S. Wainer, Editors The contributions in this book provide a picture of current ideas and methods in the ongoing invesriga6ons into the structure of the computable and noncompurable universe. London Mathematical Sorlety Lecm~ Note 224 1996 55736-4 355 pp. Paperback $39.95 Selected Papers on Computer Science D o n a l d E. K n u t h Includes articles on the history of computing, algorithms, numerical techniques, computational models, typesetting, and more. 1996 c.169 pp. 52692-5 52691-7 Hardback $49.95 Paperback $22.95 12 Protocols by Invariants A. Schoone Discusses assertational verification by system-wide invariants for verifying the behavior of distributed algorithms. The approach is entirely pragmatic and many different examples are considered in derail. Camhridgs Internatimml ~ on Paralls1 Compum~on & 1996 44175-7 c.200 pp. Hardback $44.95 Computing T o m o r r o w The Future of Research in Computer Science lan W a n d and Robin Milner, Editors This collection of original essays by distinguished computer scientists celebrates the achievements of research, and speculates about unsolved problems in computer science. 1996 46085-9 c.400 pp. Hardback $39.95
© Copyright 2026 Paperzz