Boolean NP-Partitions and Projective Closure
When studying complexity classes of partitions we often face the situation that different partition classes have the same component classes. The projective closures are the largest classes among these with respect to set inclusion. In this paper we investigate projective closures of classes of boolean NP-partitions, i.e., partitions with components that have complexity upper-bounds in the boolean hierarchy over NP. We prove that the projective closures of these classes are represented by finite labeled posets. We give algorithms for calculating these posets and related problems. As a consequence we obtain representations of the set classes NP(m) ∩ coNP(m) by means of finite labeled posets.
Unable to display preview. Download preview PDF.
- 2.J.-Y. Cai and L. A. Hemachandra. The Boolean hierarchy: Hardware over NP. In Proceedings 1st Structure in Complexity Theory Conference, volume 223 of Lecture Notes in Computer Science, pages 105–124. Springer-Verlag, Berlin, 1986.Google Scholar
- 3.G. Grätzer. General Lattice Theory. Akademie-Verlag, Berlin, 1978.Google Scholar
- 6.S. Kosub. On NP-partitions over posets with an application of reducing the set of solutions of NP problems. In Proceedings 25th Symposium on Mathematical Foundations of Computer Science, volume 1893 of Lecture Notes in Computer Science, pages 467–476. Springer-Verlag, Berlin, 2000.Google Scholar
- 7.S. Kosub and K.W. Wagner. The boolean hierarchy of NP-partitions. In Proceedings 17th Symposium on Theoretical Aspects of Computer Science, volume 1770 of Lecture Notes in Computer Science, pages 157–168. Springer-Verlag, Berlin, 2000. Expanded version available as Technical Report TUM-I0209, Technische Universität München, Institut für Informatik, September 2002.Google Scholar
- 8.K.W. Wagner and G. Wechsung. On the boolean closure of NP. Extended abstract as: G. Wechsung. On the boolean closure of NP. Proceedings 5th International Conference on Fundamentals in Computation Theory, volume 199 of Lecture Notes in Computer Science, pages 485–493, Berlin, 1985.Google Scholar