On extracting computations from propositional proofs (a survey)

P Pudlák - IARCS Annual Conference on Foundations of …, 2010 - drops.dagstuhl.de
This paper describes a project that aims at showing that propositional proofs of certain
tautologies in weak proof system give upper bounds on the computational complexity of …

Proof complexity of non-classical logics

O Beyersdorff, O Kutz - European Summer School in Logic, Language and …, 2010 - Springer
Proof complexity is an interdisciplinary area of research utilising techniques from logic,
complexity, and combinatorics towards the main aim of understanding the complexity of …

A tight Karp-Lipton collapse result in bounded arithmetic

O Beyersdorff, S Müller - ACM Transactions on Computational Logic …, 2010 - dl.acm.org
Cook and Krajíček have recently obtained the following Karp-Lipton collapse result in
bounded arithmetic: if the theory PV proves NP⊆ P/poly, then the polynomial hierarchy …

A form of feasible interpolation for constant depth Frege systems

J Krajíček - The Journal of Symbolic Logic, 2010 - cambridge.org
Let L be a first-order language and Φ and Ψ two L-sentences that cannot be satisfied
simultaneously in any finite L-structure. Then obviously the following principle ChainL, Φ, Ψ …

[PDF][PDF] Complexidade computacional eo problema p vs np

IC Oliveira - 2010 - dcs.warwick.ac.uk
A teoria de complexidade computacional procura estabelecer limites para a eficiência dos
algoritmos, investigando a dificuldade inerente dos problemas computacionais. O problema …

From feasible proofs to feasible computations

J Krajíček - International Workshop on Computer Science Logic, 2010 - Springer
We shall discuss several situations in which it is possible to extract from a proof, be it a proof
in a first-order theory or a propositional proof, some feasible computational information …

[PDF][PDF] Interpreting LAp into V⊕ L and V# L

L Fontes - Draft available at www. cs. toronto. edu/~ fontes, 2010 - Citeseer
This document's goal is to interpret Soltys' theory LAp [SK01, SC04] two times. Once over the
field F2 into the theory V⊕ L, and once over the integral domain Z into the theory V# L …

Efficient characteristic set algorithms for equation solving in finite fields and applications in cryptanalysis

XS Gao, Z Huang - arXiv preprint arXiv:1011.6505, 2010 - arxiv.org
Efficient characteristic set methods for computing solutions of polynomial equation systems
in a finite field are proposed. The concept of proper triangular sets is introduced and an …

[PDF][PDF] Simulation of Gi with prenex cuts

E Jerábek, P Nguyen - 2010 - cs.toronto.edu
Simulation of Gi with prenex cuts Page 1 Simulation of Gi with prenex cuts Emil Jerábek∗
Phuong Nguyen† November 25, 2010 Abstract We show that the quantified propositional proof …