skip to main content
article
Free Access

An overview of computational complexity

Published:01 June 1983Publication History
Skip Abstract Section

Abstract

An historical overview of computational complexity is presented. Emphasis is on the fundamental issues of defining the intrinsic computational complexity of a problem and proving upper and lower bounds on the complexity of problems. Probabilistic and parallel computation are discussed.

References

  1. 1 Adleman, L. Two theorems on random polynomial time. Proc. 19th IEEE Syrup. on Foundations of Computer Science. IEEE Computer Society, Los Angeles (1978), 75-83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Adleman, L., Pomerance, C., and Rumiey, R. S. On distinguishing prime numbers from composite numbers, Annals of Math 117, (January 1983), 173-206.Google ScholarGoogle ScholarCross RefCross Ref
  3. 3 Aho, A. V., Hopcroft, J. E. and Ullman, J. D. The Design and Analysis of Computer Algorithms. Addison-Wesley, Reading, Mass., 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Bennett, J. H. On Spectra. Doctoral dissertation, Department of Mathematics, Princeton University, 1962.Google ScholarGoogle Scholar
  5. 5 Berlekamp, E. R. Factoring polynomials over large finite fields. Math. Comp. 24 (1970), 713-735.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6 Blum, M. A machine independent theory of the complexity of recursive functions. JACM 14, 2 (April, 1967), 322-336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Blum, M., and Micali, S. How to generate cryptographically strong sequences of pseudo random bits. Proc. 23rd IEEE Syrup. on Foundations of Computer Science. IEEE Computer Society, Los Angeles. (1982), 112-117.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Borodin, A. On relating time and space to size and depth. SIAM J. Comp. 6 (1977), 733-744.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9 Borodin, A. Structured vs. general models in computational complexity. In Logic and Algorithmic Monographie no. 30 de L'Euseignement Mathematique Universite de Genuve, 1982.Google ScholarGoogle Scholar
  10. 10 Borodin, A. and Cook S. A time-space tradeoff for sorting on a general sequential model of computation. SLAM J. Comput. 11 (1982), 287-297.Google ScholarGoogle ScholarCross RefCross Ref
  11. 11 Borodin, A., van zur Gathen, I. and Hopcroft, J. Fast parallel matrix and GCD computations. 23rd IEEE Syrup. on Foundations of Computer Science. IEEE Computer Society, Los Angeles (1982), 65-71.Google ScholarGoogle Scholar
  12. 12 Borodin, A. and Munro, I. The Computational Complexity of Algebraic and Numeric Problems. Elsevier, New York, 1975.Google ScholarGoogle Scholar
  13. 13 Brockett, R. W. and Dobkin, D. On the optimal evaluation of a set of bilinear forms. Linear Algebra and its Applications 19 (1978), 207-235.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14a Chaitin, G. J. On the length of programs for computing finite binary sequences. JACM 13, 4 (October 1966), 547-569; JACM 16, 1 (January 1969), 145-159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 14b Chaitin, G. J. A theory of program size formally identical to informational theory. JACM 22, 3 0uly 1975), 329-340. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 15 Cobham, A. The intrinsic computational difficulty of functious. Proc. 1964 International Congress for Logic, Methodology, and Philosophy of Sciences. Y. Bar-Hellel, Ed,, North Holland, Amsterdam, 1965, 24-30.Google ScholarGoogle Scholar
  17. 16 Cobham, A. The recognition problem for the set of perfect squares. IEEE Conference Record Seventh SWAT. (1966), 78-87.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 17 Cohen, H. and Lenstra, H. W. Jr. Primarily testing and Jacobi sums. Report 82-18, University of Amsterdam, Dept. of Math., 1982.Google ScholarGoogle Scholar
  19. 18 Cook, S. A., The complexity of theorem proving procedures. Proc. 3rd ACM Syrup. on Theory of Computing. Shaker Heights, Ohio, (May 3-5, 1971), 151-158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 19 Cook, S. A. Linear time simulation of deterministic two-way pushdown automata. Proc. IFIP Congress 71, (Theoretical Foundations). North Holland, Amsterdam, 1972, 7540.Google ScholarGoogle Scholar
  21. 20 Cook, S. A. An observation on time-storage tradeoff. JCSS 9 (1974), 308-316. Originally in Proc. 5th ACM Syrup. on Theory of Computing, Austin TX. (April 39-May 2 1973) 29-33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 21 Cook, S. A. Towards a complexity, theory of synchronous parallel computation, L'Enseignement Mathdmatique XXVII (1981), 99-124.Google ScholarGoogle Scholar
  23. 22 Cook, S. A. and Aanderaa, S. O. On the minimum computation time of functions. Trans. AMS 142 (1969), 291-314.Google ScholarGoogle ScholarCross RefCross Ref
  24. 23 Cooley, J. M. and Tukey, J. W. An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19 (1965), 297-301.Google ScholarGoogle ScholarCross RefCross Ref
  25. 24 Coppersmith, D. and Winograd, S. On the asymptomatic complexity of matrix multiplication. SIAM J. Comp. 11 (1982), 472-492.Google ScholarGoogle ScholarCross RefCross Ref
  26. 25 Diffie, W. and Hellman, M. E. New directions in cryptography. IEEE Trans. on Inform. Theory IT-22 6 (1976), 644-54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 26 Dobkin, D., Lipton, R. I. and Reiss, S. Linear programming is log-space hard for P. Inf. Processing Letters B (1979), 96-97.Google ScholarGoogle Scholar
  28. 27 Edmonds, J. Paths, trees, flowers. Conad. 1. Moth. 17 (1965), 449-67.Google ScholarGoogle Scholar
  29. 28 Edmonds, J. Minimum partition of a matroid into independent subsets. J. Res. Nat. Bur. Standards Sect. B, 69 (1965), 67-72.Google ScholarGoogle ScholarCross RefCross Ref
  30. 29 Ferrante, J. and Rackoff, C. W. The Computational Complexity of Logical Theories. Lecture Notes in Mathematics. #718, Springer Verlag, New York, 1979.Google ScholarGoogle Scholar
  31. 30 Fischer, M. J. and Rabin, M. O. Super-exponential complexity of Presburger arithmetic, In Complexity of Computation. SLAM-AMS Proc. 7, R. Karp, Ed., 1974, 27-42.Google ScholarGoogle Scholar
  32. 31 Garey, M. R. and Johnson, D. S. Computers and Intractability. A Guide to the Theory ofNP-Completeness. W. H. Freeman, San Francisco, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 32 Gill, J. Computational complexity of probabilistic Turing machines. SLAM J. Comput. 6 (1977), 675-4595.Google ScholarGoogle ScholarCross RefCross Ref
  34. 33 Goldschlager, L. M. Synchronous Parallel Computation. Doctoral dissertation, Dept. of Computer Science, Univ. of Toronto, 1977. See also JACM 29 4, (October 1982), 1073-1086. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. 34 Goldschlager, L. M., Shaw, R. A. and Staples, J. The maximum flow problem is log space complete for P. Theoretical Computer Science 21 (1982), 105-111.Google ScholarGoogle ScholarCross RefCross Ref
  36. 35 Grzegorczyk, A. Some classes of recursive functions. Rozprawy Matematyczne, 1953.Google ScholarGoogle Scholar
  37. 36 Hartmanis, J. Observations about the development of theoretical computer science. Annals Hist. Comput. 3, 1 (Jan. 1981), 42-51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. 37 Hartmanis, J. and Stearns, R. E. On the computational complexity of algorithms. Trans. AMS 117 (1965), 285-306.Google ScholarGoogle ScholarCross RefCross Ref
  39. 38 Jones, N. D. and Laaser, W. T. Complete problems for deterministic polynomial time. Theoretical Computer Science 3 (1977), 105-117.Google ScholarGoogle ScholarCross RefCross Ref
  40. 39 Kaltofen, E. A polynomial reduction from multivariate to bivariate integer polynomial factorization. Pro(:. 14th ACM Symp. in Theory Comp. San Francisco, CA, (May 5-7 1982), 261-266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. 40 Kaltofen, E. A polynomial-time reduction from bivariate to univariate integral polynomial factorization. Preo. 23rd IEEE Symp. on Foundations of Computer Science. IEEE Computer Society, Los Angeles 1982, 57-64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. 41 Karatsuba, A. and Ofman, Yu. Multiplication of multidigit numbers on automata. Doklady Akad. Nauk 145, 2 (1962), 293-294. Translated in Soviet Phys. Doklady. 7 7 (1963), 595-596.Google ScholarGoogle Scholar
  43. 42 Karp, R. M. Reducibility among combinatorial problems. In: Complexity of Computer Computations. R. E. Miller and J. W. Thatcher, Eds., Plenum Press, New York, 1972, 85-104.Google ScholarGoogle Scholar
  44. 43 Khachian, L. G. A polynomial time algorithm for linear programming. Doklady Akad. Nauk SSSR. 244, 5 (1979), 1093-96. Translated in Soviet Math. Doklady. 20, 191-194.Google ScholarGoogle Scholar
  45. 44 Knuth, D. E. The Art of Computer Programming, vol. 3 Sorting and Searching, Addison-Wesley, Reading, MA. 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. 45 Kolmogorov, A. N. Three approaches to the concept of the amount of information. Probl. Pered. Inf. (Probl. of Inf Transm.) 1 (1965).Google ScholarGoogle Scholar
  47. 46 Kolmogorov, A. N. and Uspenski, V. A. On the definition of an algorithm, Uspehi Mat. Nauk. 13 (1958), 3-28; AMS Transl. 2nd sor. 29 (1963), 217- 245.Google ScholarGoogle Scholar
  48. 47 Ladner, R. E. The circuit value problem is log space complete for P. SIGACT News 71 (1975), 18-20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. 48 Lenstra, A. K., Lenstra, H. W. and Lovasz, L. Factoring polynomials with rational coefficients. Report 82-05, University of Amsterdam, Dept. of Math., 1982.Google ScholarGoogle ScholarCross RefCross Ref
  50. 49 Levin, L. A. Universal search problems. Problemy Peredaei Informacii 9 (1973), 115-116. Translated in Problems of Information Transmission 9, 265- 266.Google ScholarGoogle Scholar
  51. 50 Luks, E. M. Isomorphism of graphs of bounded valence can be tested in polynomial time. Prec. 21st IEEE Syrup. on Foundations of Computer Science. IEEE Computer Society, Los Angeles (1980), 42-49.Google ScholarGoogle Scholar
  52. 51 Meyer, A. R. Weak monadic second-order theory of successor is not elementary-recursive. Lecture Notes in Mathematics. #453, Springer Verlag, New York, 1975, 132-154.Google ScholarGoogle Scholar
  53. 52 Meyer, A. R. and Steokmeyer, L. J. The equivalence problem for regular expressions with squaring requires exponential space. Proc. 13th IEEE Symp. on Switching and Automata Theory. (1972), 125-129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. 53 Miller, G. L. Riemann's Hypothesis and tests for primality. J. Comput. System Sci. 13 (1976), 300-317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. 54 Oppen, D. C. A 222p" upper bound on the complexity of Presburger arithmetic. J. Comput. Syst. Sci. 16 (1978), 323-332.Google ScholarGoogle ScholarCross RefCross Ref
  56. 55 Papadimitriou, C. H. and Steiglitz, K. Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall, Englewood Cliffs, NJ, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. 56 Paterson, M. S., Fischer, M. J. and Meyer, A. R. An improved overlap argument for on-line multiplication. SLAM-AMS Proc. 7, Amer. Math. Soc., Providence, 1974. 97-111.Google ScholarGoogle Scholar
  58. 57a P(ppenger, N. On simultaneous resource bounds (preliminary version). Proc. 20th IEEE Syrup. on Foundations of Computer Science. IEEE Computer Society, Los Angeles (1979), 307-311.Google ScholarGoogle Scholar
  59. 57b Pippenger, N. J., and Fischer, M. J. Relations among complexity measures. JACM 26, 2 (April 1979), 361-381. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. 58 Pratt, V. R. and Stockmeyer, L. J. A characterization of the power of vector machines. I. Comput. System Sci. 12 (1976), 198-221. Originally in Proc. 6th ACM Syrup. on Theory of Computing, Seattle, WA, (April 39-May 2, 1974), 122-134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. 59 Rabin, M. O. Speed of computation and classification of recursive sets. Third Convention SCi. Sac., Israel, 1959, 1-2.Google ScholarGoogle Scholar
  62. 60 Rabin, M. O. Degree of difificulty of computing a function and a partial ordering of recursive sets. Tech. Rep. No. 1, O.N.R., Jerusalem, 1960.Google ScholarGoogle Scholar
  63. 61 Rabin, M. O. Probabilistic algorithms. In Algorithms and Complexity, New Directions and Recent Trends, J. F. Traub, Ed., Academic Press, New York, 1976, 21-39.Google ScholarGoogle Scholar
  64. 62 Rabin, M. O. Complexity of Computations. Comm. ACM 20, 9 (September 1977), 625-633, Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. 63 Reff, J. H. Symmetric Complementation. Proc. 14th ACM Symp. on Theory of Computing, San Francisco, CA, (May 5-7, 1982), 201-214 Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. 64 Reisch, S. and Schnitger, G. Three applications of Kolmorgorov complexity. Proc. 23rd IEEE Symp. on Foundations of Computer Science. IEEE Computer Society, Los Angeles. 1982, 45-52.Google ScholarGoogle Scholar
  67. 65 Ritchie, R. W. Classes of Recursive Functions of Predictable Complexity. Doctoral Dissertation, Princeton University, 1960. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. 66 Ritchie, R. W. Classes of predictably computable functions. Trans. AMS 106 (1963), 139-173.Google ScholarGoogle ScholarCross RefCross Ref
  69. 67a Rivest, R. L., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptesystems. Comm. ACM 21, 2 (February 1978), 120-126, Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. 67b Ruzzo, W.-L. On uniform circuit complexity. J. Comput. System SCi. 22 (1981), 365-383.Google ScholarGoogle ScholarCross RefCross Ref
  71. 68a Savage, J. E. The Complexity of Computing, Wiley', New York, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. 68b Schnorr, C. P. The network complexity and the Turing machine complexity of finite functions. Acta Informatica 7 (1976), 95-107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. 69 Sch6nhage, A. Storage modification machines. SIAM I. Comp. 9 (1980), 490- 508.Google ScholarGoogle ScholarCross RefCross Ref
  74. 70 Schenhage, A. and Strassen, V. Schnelle Multiplication grosser Zahlen. Computing 7 (1971), 281-292.Google ScholarGoogle ScholarCross RefCross Ref
  75. 71 Schwartz, J. T. Probabilistic algorithms for verification of polynomial identities. IACM 27, 4 (October 1980), 701-717. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. 72 Schwartz, J. T. Ultracomputers. ACM Trans. on Prog. Languages and Systems 2, 4 (October 1980), 484-521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. 73 Sliamir, A. On the generation of cryptographically strong pseudo random sequences. 8th Int. Colloquium on Automata, Languages, and Programming 0uly 1981), Lecture Notes in Computer Science No. 115, Springer Verlag, New York, 544-550. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. 74 Shannon, C. E. The synthesis of two terminal switching circuits. BSTJ 28 (1949), 59-98.Google ScholarGoogle ScholarCross RefCross Ref
  79. 75 Smale, S. On the average speed of the simplex method of linear programruing. Preprint, 1982.Google ScholarGoogle Scholar
  80. 76 Smale, S. The problem of the average speed of the simplex method. Preprint, 1982.Google ScholarGoogle Scholar
  81. 77 Solovay, R. and Strassen, V. A fast monte-carlo test for primality. SLAM J. Comput. 6 (1977), 84--85.Google ScholarGoogle ScholarCross RefCross Ref
  82. 78 Stearns, R. E., Hartmanis, J. and Lewis P. M. II. Hierarchies of memory limited computations. 6th IEEE Syrup. on Switching Circuit Theory and LogicalDesign. (1965), 179-190.Google ScholarGoogle Scholar
  83. 79 Stockmeyer, L. J. The complexity of decision problems in automata theory and logic. Doctoral Thesis, Dept. of Electrical Eng., M1T, Cambridge, MA., 1974; Report TR-133, MIT Laboratory for Computer Science.Google ScholarGoogle Scholar
  84. 80 Stockmeyer, L. J. Classifying the computational complexity of problems. Research Report RC 7606 (1979), Math. Sciences Dept., IBM T. J. Watson Research Center, Yorktown Heights, N.Y.Google ScholarGoogle Scholar
  85. 81 Strassen, V. Ganssian elimination is not optimal Num. Math. 13 (1969), 354- 356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. 82 Strassen, V. Die Berechnungskomplexitfit von elementarsymmetrischen Funktionen und von Interpolationskoeffizienten. Numer. Math. 20 (1973), 238-251.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. 83 Baur, W. and Strassen, V. The complexity of partial derivatives. Preprint, 1982.Google ScholarGoogle Scholar
  88. 84 Toom, A. L. The complexity of a scheme of functional elements realizing the multiplication of integers. Doldady Akad. Nauk. SSSR 150 3, (1963) 496- 498. Translated in Soviet Math. Daklady 3 (1963), 714-716.Google ScholarGoogle Scholar
  89. 85 Turing, A. M. On computable numbers with an application to the Entscheidnungsproblem. Proc. London Math. SOc. ser. 2, 42 (1936-7), 230-265. A correction, ibid. 43 (1937), 544-546.Google ScholarGoogle Scholar
  90. 86 Valiant, L. G. The complexity of enumeration and reliability problems. SLAM J. Compat. 8 (1979), 410-421.Google ScholarGoogle ScholarCross RefCross Ref
  91. 87 Valiant, L. G. The complexity of computing the permanent. Theoretical Computer Science 8 (1979), 189-202.Google ScholarGoogle ScholarCross RefCross Ref
  92. 88 Valiant, L G. Parallel Computation. Proc. 7th IBM Japan Symp. Academic 6 Scientific Programs, IBM Japan, Tokyo (1982).Google ScholarGoogle Scholar
  93. 89 Valiant, L. G., Skyum, S., Berkowitz, S. and Rackoff, C. Fast parallel computation on polynomials using few processors. Preprint (Preliminary version in Springer Lecture Notes in Computer Science. 118 (1981), 132-139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. 90 van Neumarm, J. A certain zero-sum two-person game equivalent to the optimal assignment problem. Contributions to the Theory of Games 1I. H. W. Kahn and A. W. Tucker, Eds. Princeton Univ. Press, Princeton, NJ, 1953.Google ScholarGoogle Scholar
  95. 91 Yamada, H. Real time computation and recursive functions not real-time computable.LBE Transactions on Electronic Computers. EC-11 (1962), 753- 760.Google ScholarGoogle ScholarCross RefCross Ref
  96. 92 Yao, A. C. Theory and applications of trapdoor functions (Extended abstract). Proc. 23rd IEEE Syrup. on Foundations of Computer Science. lEVEE Computer Society, Los Angeles (1982), 80-91.Google ScholarGoogle Scholar

Index Terms

  1. An overview of computational complexity

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 26, Issue 6
      June 1983
      54 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/358141
      Issue’s Table of Contents

      Copyright © 1983 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 June 1983

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader