The basic feasible functionals in computable analysis

Similar documents
A note on the monotone functional interpretation

Reducibility in polynomialtime computable analysis. Akitoshi Kawamura (U Tokyo) Wadern, Germany, September 24, 2015

A NOTE ON ARITHMETIC IN FINITE TYPES. 1. Introduction

On the expressive power of existential quantification in polynomial-time computability (Extended abstract)

Some Applications of Logic to Feasibility in Higher Types

Computability in Europe 2006 Clocking Type-2 Computation in the Unit Cost Model

A Note on Bootstrapping Intuitionistic Bounded Arithmetic

Basic Research in Computer Science BRICS RS U. Kohlenbach: A Note on Spector s Quantifier-Free Rule of Extensionality

SEPARATING NOTIONS OF HIGHER-TYPE POLYNOMIAL-TIME. Robert Irwin Syracuse University Bruce Kapron University of Victoria Jim Royer Syracuse University

Interpretation of stream programs:

Essential facts about NP-completeness:

We are going to discuss what it means for a sequence to converge in three stages: First, we define what it means for a sequence to converge to zero

Lecture 11: Measuring the Complexity of Proofs

Some logical metatheorems with applications in functional analysis

1.1.1 Algebraic Operations

CONSTRUCTION OF THE REAL NUMBERS.

Stephen F Austin. Exponents and Logarithms. chapter 3

Measures of relative complexity

A note on parallel and alternating time

Limits and Continuity

Definitions & Theorems

Provably Total Functions of Arithmetic with Basic Terms

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Proofs. Chapter 2 P P Q Q

About the relationship between formal logic and complexity classes

Lecture 3 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Real Numbers and Computational Complexity

AN INTRODUCTION TO COMPUTABILITY THEORY

Notes on Complexity Theory Last updated: October, Lecture 6

Realizable Extensions of Intuitionistic Analysis: Brouwer, Kleene, Kripke and the End of Time

8. INTRACTABILITY I. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley. Last updated on 2/6/18 2:16 AM

CHAPTER 8: EXPLORING R

Polynomial-time hierarchy of computable reals. Author. Published. Journal Title. Copyright Statement. Downloaded from. Link to published version

TRUTH TELLERS. Volker Halbach. Scandinavian Logic Symposium. Tampere

Model theory of bounded arithmetic with applications to independence results. Morteza Moniri

A Subrecursive Refinement of FTA. of the Fundamental Theorem of Algebra

Introduction to Real Analysis

Team Semantics and Recursive Enumerability

Complexity Theory. Knowledge Representation and Reasoning. November 2, 2005

THE REAL NUMBERS Chapter #4

Fourier Sampling & Simon s Algorithm

On the Hierarchy of 0 2-Real Numbers

Fuzzy Limits of Functions

Handbook of Logic and Proof Techniques for Computer Science

Corrigendum to On the undecidability of implications between embedded multivalued database dependencies [Inform. and Comput. 122 (1995) ]

Introductory Analysis I Fall 2014 Homework #9 Due: Wednesday, November 19

The max flow problem. Ford-Fulkerson method. A cut. Lemma Corollary Max Flow Min Cut Theorem. Max Flow Min Cut Theorem

On Subrecursive Representability of Irrational Numbers, Part II

Weak Analysis: Mathematics

Hyperreal Calculus MAT2000 Project in Mathematics. Arne Tobias Malkenes Ødegaard Supervisor: Nikolai Bjørnestøl Hansen

Herbrand Theorem, Equality, and Compactness

Sequences. Chapter 3. n + 1 3n + 2 sin n n. 3. lim (ln(n + 1) ln n) 1. lim. 2. lim. 4. lim (1 + n)1/n. Answers: 1. 1/3; 2. 0; 3. 0; 4. 1.

Part II Logic and Set Theory

Proofs. Chapter 2 P P Q Q

258 Handbook of Discrete and Combinatorial Mathematics

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd

1 What is numerical analysis and scientific computing?

3.3 Accumulation Sequences

Existence and Consistency in Bounded Arithmetic

6.2 Their Derivatives

Proof Theory and Subsystems of Second-Order Arithmetic

FP//LINSPACE computability of Riemann zeta function ζ(s) in Ko Friedman model

Lecture 2 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

A statistical mechanical interpretation of algorithmic information theory

FastTrack - MA109. Exponents and Review of Polynomials

1 AC 0 and Håstad Switching Lemma

Unprovability of circuit upper bounds in Cook s theory PV

6-1 Computational Complexity

Cone Avoidance of Some Turing Degrees

Standard forms for writing numbers

Unifying Functional Interpretations

Turing machines Finite automaton no storage Pushdown automaton storage is a stack What if we give the automaton a more flexible storage?

Chapter 0 Preliminaries

Game Theory and Algorithms Lecture 7: PPAD and Fixed-Point Theorems

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan

On Modal Logics of Partial Recursive Functions

2 Arithmetic. 2.1 Greatest common divisors. This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}.

Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr.

A lower bound for scheduling of unit jobs with immediate decision on parallel machines

Part IA Numbers and Sets

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Reverse mathematics and uniformity in proofs without excluded middle

Lecture 26. Daniel Apon

MATH 117 LECTURE NOTES

First In-Class Exam Solutions Math 410, Professor David Levermore Monday, 1 October 2018

Online Courses for High School Students

Theory of Two-sided Experiments A new insight on measurable numbers (Extended Abstract)

Supplementary Notes for W. Rudin: Principles of Mathematical Analysis

Jim Lambers MAT 460 Fall Semester Lecture 2 Notes

Krivine s Intuitionistic Proof of Classical Completeness (for countable languages)

1.1 P, NP, and NP-complete

1 Basic Combinatorics

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

An algorithm to increase the node-connectivity of a digraph by one

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

How to Pop a Deep PDA Matters

TRUTH-THEORIES FOR FRAGMENTS OF PA

Counter Automata and Classical Logics for Data Words

Transcription:

Journal of Complexity 22 (2006) 909 917 www.elsevier.com/locate/jco The basic feasible functionals in computable analysis Branimir Lambov a,b, a BRICS, University of Aarhus, IT Parken, 8200 Aarhus N, Denmark b FB Mathematik, AG 1, Technical University Darmstadt, Schlossgartenstrasse 7, 64289 Darmstadt, Germany Received 12 December 2005; accepted 9 June 2006 Available online 9 August 2006 Abstract We give a correspondence between two notions of complexity for real functions: poly-time computability according to Ko and a notion that arises naturally when one considers the application of Mehlhorn s class of the basic feasible functionals to computable analysis. We show that both notions define the same set of polynomial-time computable real functions. 2006 Elsevier Inc. All rights reserved. Keywords: Basic feasible functionals; Complexity in analysis 1. Introduction Below we will give two notions of polynomial-time computability for functions on real numbers. They arise from very different backgrounds, one directly examines the running time of a machine model for type-2 computability, while the other algebraically defines a set of higher-type functionals which appears to be suitable as a specification of those functionals that are feasible. Since there is still no universal agreement on the concept of Type-2 feasibility, it is important to understand the relation between the two notions. The main result of this paper shows that, applied to suitable formulations of real number computability, the two approaches coincide. The result is interesting as it gives additional robustness to both complexity notions and shows that, in the context of real numbers, the choice of one or the other is immaterial, giving us more reason to believe that the concepts of feasible real functions we use today are the proper ones. Basic Research in Computer Science (www.brics.dk), funded by the Danish National Research Foundation. Corresponding author at current address: FB Mathematik, AG 1, Technical University Darmstadt, Schlossgartenstrasse 7, 64289 Darmstadt, Germany. Fax: +49 615 1163317. E-mail address: barnie@brics.dk. 0885-064X/$ - see front matter 2006 Elsevier Inc. All rights reserved. doi:10.1016/j.jco.2006.06.005

910 B. Lambov / Journal of Complexity 22 (2006) 909 917 2. Prerequisites 2.1. Sharp CF-representations A computable real number α can be defined as a function A : N Q that generates a rapidly converging Cauchy sequence with limit α, i.e. Definition 1. A Cauchy function representation (CF-representation) of a real number α is a function A : N Q, such that n( A(n) α < 2 n ). When restricted to low complexity classes such as poly-time functions this definition does not give a nice notion of complexity, because the class of the poly-time functions cannot compute the function 2 n, and therefore lacks the strength to generate improving approximations to an irrational real number. Instead, one can use the following definition, which is equivalent to passing the argument n in unary notation 1 : Definition 2. A sharp CF-representation of a real number α is a function A : N Q, such that n( A(n) α < 2 n ). Modulo the difference in the representation of rational or dyadic numbers, the class of computable real numbers that have a poly-time sharp CF-representation directly coincides with the poly-time numbers in the sense of Ko as given by [4]. The natural extension of the approach to real functions leads to the following definition: Definition 3. A sharp CF-representation of a real function is a functional F : (N Q) N Q, such that whenever A is a sharp CF-representation of a number α dom, F (A) is a sharp CF-representation of (α). To define poly-time computability for sharp CF-representations of real functions one now needs a higher-type complexity notion. 2.2. Basic feasible functionals The basic feasible functionals (BFFs) are a class of functionals introduced by Mehlhorn [6] to study the feasibility of reducibility problems. The class is also studied by Cook, Kapron, Urquhart [1,3] and others and is shown to be quite robust and equivalent to a rather appealing formulation of Type-2 feasibility via Oracle Turing Machines (OTMs). Definition 4. The class of the BFFs of finite type is the class of all closed terms composed from: infinitely many variables for every finite type; a constant for every polynomial-time computable function; 1 As usual in complexity theory, n denotes the bit-length of n, i.e. n = log 2 (n + 1). This implies 2 n 1 = n and 2n + 1 = n + 1.

B. Lambov / Journal of Complexity 22 (2006) 909 917 911 the combinator constant Σ ρ,σ,τ for every combination of finite types ρ, σ and τ, defined as Σ ρ,σ,τ xyz = xz(yz), where x : ρ τ σ, y : ρ τ, z : ρ; the projector constant Π σ,τ for every pair of finite types σ, τ, defined as Π σ,τ xy = x, where x : σ and y : τ; constant R bn for bounded recursion on notation: R bn xyz0 = x, R bn xyzv = min(y(r bn xyz v/2 )v, zv), where x,v : N, y : N N N, z : N N. Another way to read this definition is as the class of all functionals obtained using typed λ- calculus from the poly-time functions and bounded recursion on notation. In this paper we will only work with BFFs of Type 2 or lower, but this more general definition makes it easier to prove a majorizability property which we will use later. One of the basic properties of the BFF is the fact that all functions of Type 1 in BFF are polynomial-time computable. Another important one, also shown by the original paper [6], is its Ritchie Cobham property for Type 2. Definition 5. A class X of Type-2 functionals has the Ritchie Cobham property, if for any F X there exists an OTM M and G X, such that M computes F and for all inputs x,f, the running time of M is bounded by G(x,f). Theorem 6 (Mehlhorn [6]). The class of the BFFs of Type 2 has the Ritchie Cobham property. In [3], Kapron and Cook give an OTM characterization of the BFFs as the machines that compute in time which is a second-order polynomial (SOP) in the length of their inputs. Definition 7. A SOP P(x,f) is defined inductively by the following rules: every constant is a SOP, every variable in x is a SOP, if P is a SOP, then f(p)is a SOP for any f f, if P and Q are SOP, so are P Q and P + Q. Crucial element of the characterization is the definition of length of a Type-1 argument. The simple definition f (x) = f(x) is not sufficient, but the definition f (x) = max i <x f(i) makes the characterization possible. The latter encompasses the most of the function argument that the BFF can make use of. Theorem 8 (Kapron and Cook [3]). A Type-2 functional F is basic feasible if and only if there exists an OTM M which computes F and a SOP P, such that for all inputs x,f, M runs in time which is bounded by P( x, f ).

912 B. Lambov / Journal of Complexity 22 (2006) 909 917 2.3. Majorizability The proof of the main lemma in the next section makes heavy use of a proof-theoretic tool that is closely linked with complexity, the notion of majorizability. Definition 9 (Howard [2]). We define x maj ρ x for a finite type ρ by induction on the type: x maj 0 x := x x, x maj τ ρ x := y,y ( ) y maj τ y x (y ) maj ρ x(y). We will say that a class of functionals C is hereditarily majorized by another class C if for every functional F C there exists F C such that F maj F. We will also use the term hereditarily self-majorized for the classes that are majorized by themselves. Next, we will give a short proof that the class of the BFFs is hereditarily self-majorized, following the proof in [2] of the self-majorizability of the levels of Gödel s primitive recursive hierarchy. Theorem 10. For every functional F BFF there exists F BFF, such that F maj F. Proof. All variables, as well as the constants Σ δ,ρ,τ and Π ρ,τ are majorized by themselves, and for every poly-time function f there exists a polynomial p with coefficients among the natural numbers, such that f(x) 2 p( x ) ( = f (x). The right-hand ) side of this inequality is a poly-time function for which x y x f (x) f (y) f(y), i.e. f maj 1 f. Define Rbn (x,y,z,v):= max(z(v), x). If v v, x x, y maj 0 0 0 y and z maj 1 z R bn (x,y,z,v ) = max(z (v ), x ) max(z(v), x) R bn (x,y,z,v), which proves R bn maj 0 (0 0 0) 1 0 0 R bn. Now the theorem follows from the fact that t maj ρ τ t s maj ρ s implies t s maj τ ts. 2.4. Poly-time computability in the sense of Ko To be poly-time computable in the sense of Ko [4], a real function must have a realization in the form of an OTM computing a function F : (N D) N D (where D stands for the dyadic numbers), which converts representations of numbers α to representations of (α), and runs in time polynomial in the given precision for all arguments in the domain of. To allow that time polynomial in the given precision relates to polynomial-time computability, all precision arguments in Ko s model are given in unary notation. We will use the equivalent formulation where the precision is taken to be the length of the precision argument. An important feature of Ko s model for computable analysis is the additional requirement in place for the precision of the representations of real numbers, stating that a representation A of α

B. Lambov / Journal of Complexity 22 (2006) 909 917 913 must satisfy n(prec(a(n)) = n A(n) α 2 n ), where prec(d) is defined as the number of digits after the decimal point of d. Since any dyadic number m.2 e is naturally represented as the pair m, e of integer mantissa and exponent, and the function prec can be directly defined as prec(m 2 e ) = e, we will fix the representation of dyadic numbers as the pair m, e. Moreover, since the functions representing real numbers explicitly specify the exponent, we will use this equivalent definition of Ko-computable real numbers: Definition 11. A function A : N Z is a Ko-representation of α R,if n.( A(n) 2 n α 1). And we will use the induced definition for functions: Definition 12. A functional F is a Ko-representation of a real function : R R, if for every α dom and every Ko-representation A of α, F (A) is a Ko-representation of (α). Now that we have a definition of Ko-representations, we can give a formal definition of polynomial-time computability of real functions according to Ko. Definition 13. A real function f :[a,b] R is poly-time computable in the sense of Ko, if it has a Ko-representation F, anotmm implementing F, and a polynomial p, such that for all Ko-representations A of real numbers in [a,b] and precisions n, the running time of M on inputs A, n is bounded by p( n ). The definition of poly-time computability on the whole real line requires an additional argument to the time bounding polynomial, to allow the machine to read arguments of unbounded size. Definition 14. A real function f : R R is poly-time computable in the sense of Ko, if it has a Ko-representation F, anotmm implementing F, and a polynomial p, such that for all natural numbers m, Ko-representations A of real numbers in [ m, m] and precisions n, the running time of M on inputs A, n is bounded by p( n, m ). The definitions of poly-time computability given by Weihrauch in [7] using the signed digit representation are equivalent with the two definitions above. Since dyadic numbers of precision n are represented by numbers of size n plus the number of digits of the integer part of the number, for every closed interval [a,b] with rational endpoints the growth of the representations is polynomially bounded, i.e. there exists a polynomial qa b(n) = n + max( a,b), such that A(n) qa b ( n ) for all n and for any representation of any real number in [a,b]. Note also that 2 qb a (n) is poly-time in all three parameters (n, a and b). 3. Result The following two lemmas prove that BFF can replace the OTM running in polynomial time in the definitions of poly-time computability according to Ko. We will start with functions defined on a compact interval, which is the more difficult case:

914 B. Lambov / Journal of Complexity 22 (2006) 909 917 Lemma 15. Let a,b Q, a<b, and :[a,b] R. The function is poly-time computable in the sense of Ko with a Ko-representation F, if and only if there exists a Ko-representation G : (N Z) N Z of in BFF. Proof ( ). Let B : (N Z) N Z be defined as { A(2 B(A,n) := n 1) ifp(a,n) = 0, 2 n C(A, n, M(A, n)) otherwise, where 0 if p n ( 2 p a 1 A(2 p 1) 2 p b + 1 P(A,n):= m<p( A(2 m 1) 2 m p A(2 p 1) 1 + 2 m p )), 1 otherwise, M(A,n):= μq n [P(A,2 q 1) = 1], ( ) m 1 C(A, n, m) := max {a} {2 i (A(2 i 1) 1)}, i=0 where B is a BFF (because the quantifiers, minimization, maximum and exponentiations are bounded by n and n is a parameter to all functions used in the definition of B). Suppose n(p (A, n) = 0). Then n m >n ( 2 n A(2 n 1) 2 m A(2 m 1) 2 n + 2 m < 2 2 n), i.e. the sequence λn.2 n A(2 n 1) is a Cauchy sequence converging to some number α. Also n, m ( 2 n A(2 n 1) α 2 n + 2 m), therefore (since in this case B(A,n) = A(2 n 1) for all n) n ( B(A,n) 2 n α 1 ), i.e. λn.b(a, n) is a Ko-representation of α. Additionally, since ( n a 2 n 2 n B(A,n) b + 2 n ), we have a α b. If this is not the case, i.e. n(p (A, n) = 1), let m 0 be the smallest number such that P(A,m 0 ) = 1 and c 0 = C(A,m 0, m 0 ). For all n m 0, M(A,n) = m 0, C(A, n, M(A, n)) = C(A,m 0, m 0 ), and thus B(A,n) = 2 n c 0 [2 n c 0 1, 2 n c 0 + 1]. We also know that either c 0 = a or c 0 = 2 n0 (A(2 n0 1) 1) for some n 0 <m 0. In the former case, for all n<m 0, since P(A,n) = 0, we know that B(A,n) = A(2 n 1) 2 n a 1 2 n a = 2 n c 0 and (since c 0 is defined as a maximum) 2 n c 0 B(A,n) 1, therefore B(A,n) 2 n c 0 1. In the latter case m 0 > 0 and since P(A,m 0 1) = 0, for any n<m 0,2 n c 0 B(A,n) = 2 n n0 (A(2 n0 1) 1) A(2 n 1) 1 + 2 n n0 2 n n0 = 1, i.e. 2 n c 0 B(A,n) + 1. On the other hand, since c 0 is defined as a maximum, 2 n c 0 B(A,n) 1. In either case and for arbitrary n we have B(A,n) 2 n c 0 1, therefore B(A) isakorepresentation of the real number c 0. Since n <m 0 (A(n) 1 2 n b 2 n b, and a<bthe definition of c 0 ensures a c 0 b. We have proved that B(A) is a Ko-representation of a number within [a,b] for any A : N N. If, in particular, A is in itself a Ko-representation of a real number α [a,b], then P(A,n) = 0is implied by m n ( A(m) 2 m α 1 ), which is true for all n. Therefore B(A,n) = A(2 n 1) and thus n B(A,n) 2 n α 1, i.e. B(A) is a Ko-representation of the same real number α.

B. Lambov / Journal of Complexity 22 (2006) 909 917 915 Let M be an OTM which implements F in polynomial time. For any A : N Z, B(A) is a Ko-representation of a real number within [a,b], therefore the OTM M taking B(A) as input runs in time polynomial to the precision n. We can now use Theorem 8: combining this machine with an OTM implementation of B which will be queried only polynomially many times, we get a machine which runs in time polynomial to the precision n and the size of the argument A, i.e. a BFF G := F B. Since for any Ko-representation A of α [a,b], B(A) is also one of its Korepresentations, F (B(A)) is a Ko-representation of (α), and therefore G is a Ko-representation of the function. Proof. By Theorem 6 any BFF can be realized by an OTM running in time bounded by H(A,n) for some BFF H. Let H be this bound for G. The BFF are also a hereditarily self-majorized class, which by Theorem 10 means that there exists a BFF H such that H maj H. From our discussion of the properties of the dyadic numbers we know that there is a common bound qa b for the growth of any Ko-representation of any real number in a closed interval [a,b]. Let A := λn.2 qb a ( n ). Since A is monotone and everywhere greater than A, A maj A. Note also that A is a poly-time function. From the properties of the majorization relation we know that H (A ) maj H (A), and in particular that H (A,m) H(A,m) for all Ko-representations of numbers in the interval and for all precision requests m, thus H (A,m) is also an upper bound for the running time of the OTM realizing F. But since A is a fixed poly-time function, λm.h (A,m) is a BFF of Type 1, i.e. a poly-time function. Its growth is therefore bounded by some polynomial q( m ), which proves that F := G can be realized by an OTM running in time polynomial in the precision for any Ko-representation of any number in [a,b]. Lemma 16. Let : R R. The function is computable in polynomial time in the sense of Ko with a Ko-representation F, if and only if there exists a Ko-representation G : (N Z) N Z of in BFF. Proof ( ). We can use the argument from the previous proof, using a simpler definition of the functional B, since we no longer need to contain the argument within [a,b]: { A(2 B(A,n) := n 1) ifp(a,n) = 0, 2 n C(A, n, M(A, n)) otherwise, where 0 if p n m <p P(A,n):= ( A(2 m 1) 2 m p A(2 p 1) 1 + 2 m p ), 1 otherwise, M(A,n):= μq n [P(A,2 q 1) = 1], C(A, n, m) := max m 1 i=0 2 i (A(2 i 1) 1). The differences are that the functional P no longer needs to check if the argument falls within a certain interval. As a result P(A,0) is 0 for any A, which ensures that M(A, n) > 0 for any A and n, and that C(A, n, M(A, n)) is well defined, although the set whose maximum we take no longer contains the lower bound of the interval. Additionally, since the value of C is defined only from the values of A at points with the same or lower precision, 2 n C(A, n, M(A, n)) is always an integer.

916 B. Lambov / Journal of Complexity 22 (2006) 909 917 Using the same argument as above we can show that for any Ko-representation A of α R, B(A) is a Ko-representation of some number, thus the OTM M with B(A) as argument will run in time bounded by p( n, max(a(0), A(0)) + 1 ), where A(0) +1 is the bound on the absolute value of α. Again a combination of M and a machine realizing B will query B only polynomially many times, and the running time of B is bounded by a SOP of n and A. Thus, the running time of the combined machine is bounded by a SOP of n and A. By Theorem 8 the combined machine is a BFF. Proof ( ). The only observation we need to make in addition to the previous lemma is to see that A remains poly-time if the values of a and b in its definition are given as parameters. Let H(A,n) be a basic feasible bound for the running time of an OTM realizing F, H be its majorizer, and A := λm, n.2 qm m (n). For every Ko-representation A of a number within [ m, m], we have that the poly-time function λn.a (m, n) majorizes A, and thus the running time of the machine for precision n is bounded by H (λp.a (m, p), n). Since λm, n.h (λp.a (m, p), n) is basic feasible of Type 1, it is a poly-time function, and thus there exists a polynomial of the bound m and the precision n which bounds the running time of the machine that realizes F. Let us make sure that we can convert rational to dyadic approximations and vice versa: Lemma 17. There exists a pair of poly-time functions DtoQ : Z N Q and QtoD : Q N Z, such that DtoQ(m, e) = m 2 e, QtoD(q, e) 2 e q 2 1. Proof. Let DtoQ(m, e) := m 2 e, QtoD(q, e) := 2 e q + 2 1. The two conversions are poly-time as a composition of poly-time functions. We are now ready to prove the main theorem in this paper. Theorem 18. Let D be either R or [a,b] for some a,b Q, a<b. A real function : D R, is poly-time computable in the sense of Ko if and only if it has a sharp CF-representation among the BFF. Proof ( ). Let F : (N Z) N Z be the BFF obtained by Lemma 15 or 16. Let G : (N Q) N Q be the following functional: G(A) := λn.dtoq(f (λm.qtod(a(2m + 1), m), 2n + 1), 2n + 1), where DtoQ and QtoD are two conversion functions defined above.

B. Lambov / Journal of Complexity 22 (2006) 909 917 917 Since every function(al) in this definition is basic feasible, and the class of the BFFs is closed under composition and functional substitution, G is a BFF. Now let us prove that it is a sharp CF-representation of : let A be a sharp CF-representation of a number α D. We have that for any m, A(2m + 1) α < 2 m 1 and therefore QtoD(A(2m + 1), m) 2 m α < 1, which means that B := λm.qtod(a(2m + 1), m) is a Ko-representation of α. From the definition of F we have that F(B)is a Ko-representation of (α). Since DtoQ(F (B, 2n + 1), 2n + 1) α 2 n 1 < 2 n, the final application of DtoQ converts it to the sharp CF-representation G(A). Proof ( ). Let G : (N Q) N Q be a sharp CF-representation of a real function :[a,b] R. Let F : (N Z) N Z be defined as F(B) := λn.qtod(g(λm.dtoq(b(2m + 1), 2m + 1), 2n + 1), n). Let B be a Ko-representation of a real number α D. Reasoning as above, A := λm.dtoq(b(2m+ 1), 2m + 1) defines a sharp CF-representation of α D, we can also see that G(A) is a sharp CF-representation of (α) and therefore λn.qtod(g(a, 2m + 1), m) is a Ko-representation of it. F is a BFF that maps Ko-representations of the input to Ko-representation of the result. By Lemma 15 or 16 there exists an OTM implementing F and running in time polynomial to the precision. Intuitively, the forward direction of the proof works because, using the Cook/Kapron characterization, a BFF has sufficient time to: read its input and convert it to a dyadic number with precision n (given by the length of the real argument), process the input via a black-box copy of the Ko-representation (given by the precision argument), and enough time to translate the output to a rational number (given again by the precision argument). The inverse argument relies on the fact that the BFF sharp CF-representation of the function never generates big numbers in itself, and since the arguments it is given have a polynomially bounded growth, all computations stay polynomially bounded in all three steps of the conversion. The result was originally observed as part of [5], which discusses complexity and intensionality in an interval framework for analysis. References [1] S. Cook, A. Urquhart, Functional interpretations of feasibly constructive arithmetic, Ann. Pure Appl. Logic 63 (1993) 103 200. [2] W.A. Howard, Hereditarily majorizable functionals of finite type, in: A.S. Troelstra (Ed.), Metamathematical Investigation of Intuitionistic Arithmetic and Analysis, Lecture Notes in Mathematics, vol. 344, Springer, Berlin, 1973, pp. 454 461. [3] B.M. Kapron, S.A. Cook, A new characterization of type-2 feasibility, SIAM J. Comput. 25 (1) (1996) 117 132. [4] K.-I. Ko, Complexity Theory of Real Functions, Birkhäuser, Boston, Basel, Berlin, 1991, x+309pp. [5] B. Lambov, Complexity and intensionality in a Type-1 framework for computable analysis, in: L. Ong (Ed.), Computer Science Logic: 19th International Workshop, CSL 2005, 14th Annual Conference of the EACSL, Oxford, UK, August 22 25, 2005 Proceedings, Lecture Notes in Computer Science, vol. 3634, 2005, pp. 442 461. [6] K. Mehlhorn, Polynomial and abstract subrecursive classes, J. Comput. System Sci. 12 (1976) 147 178. [7] K. Weihrauch, Computable Analysis, Springer, Berlin, 2000, x+285pp.