<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A semantic view of the switching lemma</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Dimitris</forename><forename type="middle">J</forename><surname>Kavvadias</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematics</orgName>
								<orgName type="institution">University of Patras</orgName>
								<address>
									<postCode>GR-265 00</postCode>
									<settlement>Patras</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lina</forename><surname>Panagopoulou</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematics</orgName>
								<orgName type="institution">University of Patras</orgName>
								<address>
									<postCode>GR-265 00</postCode>
									<settlement>Patras</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A semantic view of the switching lemma</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D43380B9DEF0AAA4CF5396BB322C9D51</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:45+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The Switching Lemma is a key result in proving lower bounds in circuit complexity. In this paper we approach the Switching Lemma from the standpoint of the semantics of the boolean function, i.e., its set of satisfying assignments. This novel approach, gives the exact bound probability when the boolean function is of a special form and may also lead to a simpler proof of the general case.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Circuit complexity is the field of computational complexity which studies the limitations of a simple computational model, the logical circuit. Logical circuits provide a different approach in the study of lower bounds for computational problems than the more widely used Turing machine, partly because of their simplicity, and have given interesting results in the past.</p><p>A key tool in proving such bounds is the so-called Switching Lemma which was proven by J. Håstad in <ref type="bibr" target="#b2">[Has86]</ref> by improving on earlier results found in <ref type="bibr" target="#b0">[Ajt83,</ref><ref type="bibr" target="#b1">FSS81,</ref><ref type="bibr" target="#b6">Yao85]</ref>. In the literature it is now commonly referred to as Håstad's Switching Lemma.</p><p>The Switching Lemma deals with Boolean expressions that are in conjunctive normal form and more specifically have at most k literals in every clause (k-CNF expressions). In effect it says that if we randomly give values (0 or 1) to a large proportion of the variables which are also randomly selected (this procedure is called a random restriction), then the resulting formula is, with very high probability, s-DNF that is, it is equivalent to a Boolean expression in disjunctive normal form with at most s literals in every term. By employing De Morgan's law, a symmetric form of this lemma is easily derived, where the original expression is k-DNF and after the application of the random restriction, the resulting expression is s-CNF.</p><p>Using this lemma, lower bounds for small depth circuits can be shown. For example Håstad showed in [Has86] that parity is not in AC 0 , meaning that it cannot be computed by constant depth, unbounded fan-in circuits with polynomial number of gates.</p><p>Håstad's original proof used quite involved arguments on conditional probabilities. Since Håstad's original proof, simpler proofs appeared by Razborov <ref type="bibr" target="#b5">[Raz92]</ref> and Beame <ref type="bibr" target="#b4">[Bea94]</ref>. Razborov's proof uses an informationtheoretic argument to count bad assignments, while Beame's proof deals with the decision tree of the resulting formula.</p><p>In this paper we approach the Switching Lemma focusing on the semantics of the given k-CNF, that is, its set of satisfying assignments. The application of a random restriction is now equivalent to selecting an appropriate subset of the assignments and projecting out the fixed variables. Using a result from <ref type="bibr" target="#b3">[KS99]</ref> we are able to rephrase the Switching Lemma as a property of binary vectors and calculate the bound probability in a special case. The approach may also prove usefull for the general case</p><p>The rest of the paper is organized as follows. In the next section we give the necessary definitions and notation. In Section 3 we give a novel formulation of the Switching Lemma in terms of binary vectors. In Section 4 we give the exact bound for a specific case and outline a simplified proof of the general bound from the bibliography. We conclude with a list of references.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Definitions</head><p>Let X = {x 1 , . . . , x n } be a set of Boolean variables. A literal is either a variable (called positive literal) or its negation (called negative literal). A clause is a disjunction of one or more literals such that each variable appears at most once, while a term is, analogously, a conjunction of literals. A Boolean expression may come in a variety of syntactic forms with more populars being the conjunctive normal form (CNF) and the disjunctive normal form (DNF). A CNF is a conjunction of clauses</p><formula xml:id="formula_0">ϕ = C 1 ∧ C 2 ∧ • • • ∧ C m , while a DNF is a disjunction of terms ϕ = T 1 ∨ T 2 ∨ • • • ∨ T t . In the first relation each C i , i = 1, ..., m is a clause, that is, C i = 1 ∨ 2 ∨ • • • ∨ k ,</formula><p>where each j , j = 1, . . . , k is a literal. If every clause in ϕ is the conjunction of at most k literals then we say that ϕ is in k-CNF. Similarly, each term T i , i = 1, . . . , t is of the form</p><formula xml:id="formula_1">T i = 1 ∧ • • • ∧ s .</formula><p>If every term includes at most s literals then we say that ϕ is in s-DNF.</p><p>A truth assignment v is a function v : X −→ {0, 1}. We often view a binary vector in {0, 1} n as a truth assignment that assigns the i-th bit of v to the i-th variable in X, taken in lexicographic order.</p><p>The semantics of a Boolean expression ϕ are captured by its set of satisfying assignments M (ϕ), the assignments which make the expression true. It is well known that for every Boolean expression there exist equivalent (i.e., with the same set of satisfying assignments) expressions in CNF and DNF. In this case the expression ϕ is called CNF (respectively, DNF) expressible and similarly, k-CNF (k-DNF) expressible when the number of literals in each clause (term) is bounded by k. We also call a set M ⊆ {0, 1} n of binary vectors, a kCNF set, if M is exactly the set of satisfying assignments of some k-CNF expression. Similarly for a kDNF set. We also use the notation M to denote the set {0, 1} n \ M i.e., the set of all n-dimensional vectors not in M .</p><p>Given a Boolean expression ϕ defined on a set of Boolean variables X, a random restriction ρ of ϕ, denoted ϕ | ρ is the Boolean expression obtained by randomly selecting with probability p every variable and assigning each selected variable the value 0 or 1 each with probability 1/2. Therefore, a random restriction ρ maps each variable x to the set {0, 1, * } with the following probability distribution.</p><formula xml:id="formula_2">Pr(ρ(x) = 0) = Pr(ρ(x) = 1) = p/2, Pr(ρ(x) = * ) = 1 − p</formula><p>By ρ(x) = * we denote the event that x was not selected by ρ.</p><p>The following is a definition from [KS99] that we shall need later.</p><p>Let n be a positive integer and let M ⊆ {0, 1} n be a set of Boolean vectors. For k &gt; 1, we say that a Boolean vector v ∈ {0, 1} n is k-compatible with M if for any sequence of k positions 0 ≤ i 1 &lt; . . . &lt; i k ≤ n, there exists a vector in M that agrees with v in these k positions.</p><p>The above definition implies that a vector m ∈ {0, 1} n is not k-compatible with a set of Boolean vectors M if there exists a sequence of k positions in m that does not agree with any vector of M .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">A binary vectors formulation</head><p>The object of this paper is to show the following proposition.</p><p>Lemma 3.1 (Håstad's Switching Lemma). Let ϕ be a k-CNF expressible Boolean expression. Let ρ be a random restriction that selects a variable of ϕ with probability p. Then for every s ≥ 2.</p><formula xml:id="formula_3">Pr(ϕ | ρ is not s-DNF) ≤ (5k(1 − p)) s</formula><p>Instead of studying the effects of the restriction on the expression ϕ itself, we shall study the set M (ϕ) of satisfying assignments of ϕ. To this end, the following result from [KS99] will prove useful. Let M be the set of models of the expression ϕ (we shall henceforth use the simpler notation M instead of M (ϕ) when no confusion arises) and let us fix the variable x of ϕ to a certain value, say 0. Obviously any model in M with value x = 0, with this value in the position of x projected out, is a model of ϕ | x=0 . Conversely, any model of ϕ | x=0 augmented by the value 0 in the position of x (taken lexicographically), belongs in M . This observation is easily extended to any number of variables and hence the following fact holds.</p><p>Fact. The set of models of ϕ | ρ follows from M by selecting every model in M that agrees with ρ in every variable selected by ρ and projecting out all positions corresponding to these variables. By also dropping out any multiple appearence of a truncated vector, we get the set of models of ϕ | ρ . Let us denote for simplicity by N this set of models of ϕ | ρ . We call the above procedure on a set of binary vectors M a random restriction on M and denote it by M | ρ , extending the notion to binary vectors. Therefore N = M | ρ .</p><p>Using the above notation and Lemmas 2 and 3 we may reformulate Lemma 1 as follows.</p><p>Lemma 3.4 (Håstad's Switching Lemma, semantic form). Let M ⊆ {0, 1} n be a set of binary vectors with the property that every vector m ∈ M is not k-compatible with M . Let M | ρ be a random restriction on M that selects a position with probability p and let N = M | ρ . Then for every s ≥ 2.</p><p>Pr(N includes an s-compatible vector with N ) ≤ (5k(1 − p)) s</p><p>Let M be a kCNF set. By Lemma 3.2 every vector in M is not k-compatible with M and therefore it has a tuple of k positions in which it disagrees with all models in M . Let T be such a k-tuple with the corresponding values. There exist 2 n−k vectors that have the same values in T and all belong in M . It follows that every vector in M belongs in at least one family F T of vectors that all are produced by fixing k positions to certain "disagreeing" values and assuming all possible values for the rest of the variables.</p><p>In order to understand the structure of N , it is useful to view ϕ as being empty initially, and consider its clauses as being added one by one. Initially, M consists of models that agree with ρ in all positions that are selected by ρ and have all possible values in every other position. Therefore |M | = 2 t , where t is the number of non-selected variables.</p><p>Let us now add a clause C in ϕ. First consider the case where C contains only selected variables. Now if there exists one variable of C that is assigned a satisfying value by ρ then C is, in effect, discarded as it does not alter M . If however C is not assigned a satisfying value, then this results in M becoming empty. We call this case as C being matched by ρ and obviously this results in N also being empty and ρ being a good restriction as this corresponds to a contradiction.</p><p>Let us now add a clause C whose variables are not all selected by ρ. Let V 1 be the set of variables of C selected by ρ and V 2 the rest. As before if ρ assigns a satisfying value to a variable of V 1 , C again has no effect in M as it is satisfied. But if ρ gives falsifying values to all variables of V 1 , then the unset variables of V 2 now form a new constraint. Therefore any vector that falsifies all these variables is excluded from N and it is included in N . It follows that every vector in N belongs in at least one family F Ci of vectors that are produced by fixing the positions of the unset variables of the clause C i to certain disagreeing values. The structure of N is therefore similar to that of M but with the constraints in the role of the clauses.</p><p>In summary therefore, a random restriction ρ assigns values from {0, 1, * } to the variables of ϕ and it may have the following results on a clause C of ϕ.</p><p>i. It hits all of the variables of C by a falsifying value. In this case C ≡ 0 and therefore ρ is good.</p><p>ii. It hits C assigning a satisfying value to at least one of its variables. In this case C ≡ 1 and plays no role in ϕ | ρ .</p><p>iii. It partially hits some (or none) of the variables of C by falsifying values. The rest of the variables are not hit (they are assigned *) and now form a clause of ϕ | ρ with falsifying values those of the same variables of C. We say that in this case C survives from ρ.</p><p>Of the above three listed cases only the first allows us to immediately decide whether ρ is good or bad. Case (ii), completely removes C and therefore reduces the size of the instance by one clause.</p><p>It is therefore the third case that is the most interesting. Let us denote by the number of surviving clauses. It is clear from the above that ϕ | ρ has reduced to a CNF expression with clauses, those who have survived from ρ and in general each is a sub-clause of a clause of ϕ. If ϕ | ρ is unsatisfiable then ρ is obviously a good restriction. If now ϕ | ρ is satisfiable, consider applying the distributive law of conjunction. We get a DNF expression and since we assumed that clauses have survived, each term of this expression may have up to literals, i.e. it is an DNF expression. We have thus shown the following. Notice that in some cases, as for example the case where all clauses of ϕ are disjoint, the above relation holds as equality and we are able to calculate the exact probability of a bad restriction.</p><p>In the next section we calculate the above probability of the case where all clauses of ϕ are disjoint and outline how to bound the probability of &gt; s for the general case.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">The bound</head><p>In the previous section we have summarized the effects of ρ on a clause C. Let us calculate now the corresponding probabilities i. A clause C, containing k literals is falsified when ρ has selected all its variables with a falsifying value to every one. The probability that a variable is selected and assigned a falsifying value is obviously p 2 and hence Pr(C ≡ 0) = ( p 2 ) k . ii. By the above, it follows that the probability that at least one of the variables is assigned a satisfying value is</p><formula xml:id="formula_4">1 − (1 − p 2 ) k and therefore Pr(C ≡ 1) = 1 − (1 − p 2 ) k .</formula><p>iii. Let us denote this probability by P s . By the above and since the three events partition the sample space, we get that Pr(C survives from ρ)</p><formula xml:id="formula_5">= P s = (1 − p 2 ) k − ( p 2 ) k</formula><p>. When all clauses of ϕ are disjoint, then selecting a variable by ρ in a clause C, is independent from selecting a variable in any other clause. In this case, ρ is good iff up to s clauses survive and this probability is calculated as follows.</p><p>Let m be the number of clauses of ϕ. If at least one of them is matched (falsified) by ρ then ρ is good. By case (i) above, this probability is ( p 2 ) k for a specific clause C and hence, the probability that at least one clause C (among the m clauses of ϕ) is falsified is Pr(at least one C is matched by ρ) = P m = 1 − (1 − ( p 2 ) k ) m . The other possibility (which is disjoint from the above) for ρ being good, is to have at most s clauses survive in ϕ | ρ and the rest of them not survive (by assigning to at least one variable of each clause a satisfying value). This probability for a specific selection of j clauses is P j s • (1 − (1 − p 2 ) k ) m−j . Since the variable sets of any two clauses are disjoint, we simply need to sum over all possible selections of j clauses for 0 ≤ j ≤ s. We thus have</p><formula xml:id="formula_6">Pr(ϕ | ρ is sDNF)) = P m + s j=0 m j • P j s • (1 − (1 − p 2 ) k ) m−j</formula><p>and therefore,</p><formula xml:id="formula_7">Pr(ϕ | ρ is not sDNF)) = (1 − ( p 2 ) k ) m − s j=0 m j • P j s • (1 − (1 − p 2 ) k ) m−j .</formula><p>It is easy to verify that indeed the previous probabiblity is strictly less than (5k(1 − p)) s . The general case is more involved as the independence in selecting a variable between two clauses does no longer hold.</p><p>Let be the number of surviving clauses of ϕ after the application of ρ. Let m be the number of clauses of ϕ and let us denote by e(ϕ, s) the event that exactly = s clauses survive in ϕ | ρ and all the rest m − s are satisfied. Let us also denote by E(ϕ, s) the event that &gt; s clauses survive in ϕ | ρ and all the rest m − are satisfied. We would like to show that</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Lemma 3. 2</head><label>2</label><figDesc>Let M ⊆ {0, 1} n be a set of binary vectors. Then the following are equivalent:(a) M is a kCNF set. (b) If m ∈ {0, 1} n is k-compatible with M , then m ∈ M .By De Morgan's rule the negation of a k-DNF expression ϕ is k-CNF and since M (¬ϕ) = {0, 1} n \ M (ϕ), we immediately get the symmetric lemma to the above. Lemma 3.3 Let M ⊆ {0, 1} n be a set of binary vectors. Then the following are equivalent: (a) M is a kDNF set. (b) If m ∈ {0, 1} n is k-compatible with M , then m ∈ M .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Lemma 3. 5</head><label>5</label><figDesc>If ≤ s clauses survive in ϕ | ρ then ρ is a good restriction. If &gt; s then in general ϕ | ρ will not be DNF expressible unless the same literal appears in several clauses. It is clear therefore that Pr(ϕ | ρ is not sDNF)) ≤ Pr( &gt; s clauses survive in ϕ | ρ )</figDesc></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Lemma 4.1</p><p>Pr(E(ϕ, s)) ≤ (5k(1 − p)) s</p><p>We apply induction on the number m of clauses of ϕ. Base. For m = 1, Pr( ≥ s + 1) = 0 for every s ≥ 1.</p><p>Step. For m &gt; 1 let us assume that for every kCNF expression with up to m − 1 clauses (on any number of variables), Lemma 4.1 holds. Consider a kCNF expression ϕ with m clauses. Let C be one of its clauses. For ease of reference, we denote by ϕ = ϕ \ C (that is, the expression that results from ϕ when we remove C) and by H s = (5k(1 − p)) s .</p><p>We now have</p><p>Pr(E(ϕ, s)) = Pr(e(ϕ , s) ∧ (C survives)) + Pr(E(ϕ , s) ∧ (C ≡ 0))</p><p>Note that when more than s clauses have survived in ϕ , C must not be false in order to have a bad restriction.</p><p>The event C ≡ 0 includes both the event C ≡ 1 and the event C survives. The first term is simplified as follows.</p><p>Let A be the set of assignments to the variables of C from the set {0, 1, * } that make C survive. Let α be an assignment from {0, 1, * } to the variables of C. We denote by e(α) the event that ρ assigns the values of α to the variables of C.</p><p>Pr The last inequality holds since the second event contains the first. Observe now that if we substitute to the variables of C any values from {0, 1, * }, some clauses of ϕ may be satisfied and thus removed from ϕ , and some variables may be removed from the remaining clauses either because they are unsatisfied, or they are assigned *. In any case the resulting CNF has at most m − 1 clauses with at most k literals each and thus by induction Lemma 4.1 holds. There is a problem however that stems from the conditional probability: by setting specific values to some variables of ϕ, we no longer have a restriction with the same distribution for the remaining variables. There are ways to overcome this complication by splitting the assignment of values to specific sets of variables and summing over all possible such sets. The reader is referred to the original proof of Hastad or in <ref type="bibr" target="#b7">[BS90]</ref>. Using these techinques we have Pr(e(α)) = H s−1 P s , since the sum of the probabilities is over all assignments that make C survive. Similarly, the second term gives</p><p>The proof now rests on showing that</p><p>or after substituting and simplifying</p><p>This last inequality is easily shown by first proving that the left-hand side is an increasing function of k for all p ∈ [0.8, 1] and thus by substituting the smallest permissible value of k = 2, it suffices to show that the produced function of p is increasing and positive for p = 0.8. This is indeed the case and it can be shown by taking the derivative over p.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Σ 1 1 − formulae on finite structures</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ajtai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Pure and Applied Logic</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="1" to="48" />
			<date type="published" when="1983">1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Parity, circuits and the polynomial time hierarchy</title>
		<author>
			<persName><forename type="first">M</forename><surname>Furst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Saxe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sipser</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Systems Theory</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="13" to="27" />
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
	<note>Prelim version FOCS &apos;81</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Almost optimal lower bounds for small depth circuits</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hastad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">STOC</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">20</biblScope>
			<date type="published" when="1986-05">May 1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Inverse Satisfiability Problem</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kavvadias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sideri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="152" to="163" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">A switching lemma primer</title>
		<author>
			<persName><forename type="first">P</forename><surname>Beame</surname></persName>
		</author>
		<idno>UW-CSE-95-07-01</idno>
		<imprint>
			<date type="published" when="1994-11">November 1994</date>
		</imprint>
		<respStmt>
			<orgName>Department of Computer Science and Engineering, University of Washington</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">An Equivalence between Second Order Bounded Domain Bounded Arithmetic and First Order Bounded Arithmetic</title>
		<author>
			<persName><forename type="first">A</forename><surname>Razborov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the volume Arithmetic, Proof Theory and Computational Complexity</title>
				<imprint>
			<date type="published" when="1992">1992</date>
			<biblScope unit="page" from="247" to="277" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Separating the polynomial-time hierarchy by oracles</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C C</forename><surname>Yao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">FOCS</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">10</biblScope>
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The complexity of finite functions</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>Boppana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sipser</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">A)</title>
		<imprint>
			<biblScope unit="page" from="757" to="804" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
