<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Nondeterministically Selecting Positive Instances of Context-Free Languages?</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Complexity of Selecting Positive Instances</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Faculty of Engineering, University of Fukui</institution>
          ,
          <addr-line>3-9-1 Bunkyo, Fukui 910-8507</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The notion of e ectively selective languages was introduced into computational complexity theory in late 1970s and it has been discussed extensively in connection to the P=?NP question. Its scope has been extended to nite automata and formal languages in the past literature. By further extending the scope, this paper discusses the computational complexity of selective languages whose underlying selectors are computed in various ways by nondeterministic one-way pushdown automata equipped with write-once output tapes. We explore basic properties of those languages and demonstrate their relationships to the existing language families. We also seek a generalization of such selective languages by taking selectors from a higher functional hierarchy over multi-valued CFL functions.</p>
      </abstract>
      <kwd-group>
        <kwd>pushdown automaton</kwd>
        <kwd>selective set</kwd>
        <kwd>advice</kwd>
        <kwd>multi-valued function</kwd>
        <kwd>CFL hierarchy</kwd>
        <kwd>CFLMV hierarchy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>likely to be a \positive" instance of the language (namely, to belong to the
language). We are particularly concerned with the e ciency of such a sector. The
computational complexity of languages whose selectors are e ciently computable
has been discussed in connection to the P =?NP question. The importance of
selectivity also comes from the fact that each selector can induce a certain type
of partial pre-order on equivalence classes over strings (see [7, 9]).</p>
      <p>The notion of P-selective languages, which was rst introduced into
computational complexity theory in 1979 by Selman [9] as a polynomial-time analogue
of Jockusch's semi-recursive sets in recursion theory. The selective languages
have been since then used as an important tool in studying various structural
properties, such as completeness, self-reducibility, search-to-decision reductions,
re nements, and promise problems (see [2] for references therein). Later, this
notion was extended to NPSV- and NPMV-selective languages [2] and beyond to
kPSV- and kPMV-selective languages [6], where two su xes \SV" and \MV"
indicate \single-valued function" and \multi-valued function", and kP is the kth
level of the polynomial-time hierarchy [8]. More generally, given any function
class F , F -selective languages are de ned simply by the choice of appropriate
selectors from F . Since the selectivity notion is heavily linked to languages and
multi-valued partial functions, it is ideal to study the computational complexity
of languages and functions together.</p>
      <p>Taking the opposite research direction, we look into more restrictive
computational models in order to witness how dramatically the complexity of
selecting positive instances changes. A precursor to our investigation is the study of
\DFA-selectivity" (which was originally called fa-selectivity) of Tantau [13]. Our
main interest, on the contrary, lies on the behaviors of selectors when they are
computed on 1npda's equipped with write-once? output tapes. Those machines
are quite di erent in nature from powerful Turing machines and their
behaviors are quite restrictive because of the limited usage of their memory device.
Multi-valued partial functions computed by such machines are generally called
CFL-functions and they have been recently discussed in a series of works [17, 20,
18, 21]. More speci cally, we intend to study selective languages whose selectors
are particularly chosen from function classes, such as CFLSV and CFLMV [20]
(see Section 2.2 for their de nitions), which are natural analogues of the
aforementioned function classes NPSV and NPMV, respectively. In a later section,
we then turn our attention to higher complexity classes kCFLSV and kCFLMV,
which constitute a functional version of the CFL hierarchy [19] de ned in parallel
to the polynomial(-time) hierarchy.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Basic Notions and Notations</title>
      <p>We will brie y explain existing notions and notations necessary to read through
the subsequent sections.
? A tape is write-once if its tape head never moves to the left and, whenever it writes
a nonempty symbol, it must move to the next blank cell.
2.1</p>
      <sec id="sec-2-1">
        <title>Alphabets, Strings, and Languages</title>
        <p>Given a nite set A, the notation kAk denotes the number of elements in A.
Let N indicate the set of all natural numbers (i.e., nonnegative integers) and set
N+ = N f0g. For two integers m and n with m n, the notation [m; n]Z denotes
the integer interval fm; m + 1; m + 2; : : : ; ng. In particular, we abbreviate [1; n]Z
as [n] for any n 2 N+. We use the term \polynomials" to mean polynomials
with nonnegative integer coe cients. The notation A B for two sets A and B
indicates the di erence fx j x 2 A; x 62 Bg. Given a set A, P(A) denotes the
power set of A.</p>
        <p>An alphabet is a nonempty nite set of \symbols" or \letters". A string x
over is a nite series of symbols chosen from and its length, denoted by jxj,
is the total occurrences of symbols in x. The empty string is a unique string of
length 0. To express a pair of strings simultaneously, we use the track notation
[ xy] and follow its convention, as discussed in [12]. For two symbols and , [ ]
expresses a new symbol. For two strings x = x1x2 xn and y = y1y2 yn of
length n, [ xy] denotes the concatenated string [ xy11]y[ xy,22][ xy] expresses [ x#ym], where
[ xynn]. We further expand
this notation as follows. In the case of jxj &lt; j j
m = jyj jxj and # is a designated new symbol. Similarly, when jxj &gt; jyj, the
same succinct notation [ xy] expresses [ y#xm] with m = jxj jyj.</p>
        <p>A language over alphabet is a collection of strings over . Given an index
k 2 N, k is composed of all strings of length k; in particular, 0 equals f g.
Let = Sk2N k. For any language A over , its complement is A, which
is also denoted by A as long as is clear from the context.</p>
        <p>A function h : N ! is called length preserving if jh(n)j = n holds for all
n 2 N. Recall from [19, 20] the notion of \-extension. For any string x 2 ,
a \-extension of x is a string x~ over [ f\g such that x is obtained from x~
by deleting all occurrences of \. Given a language A, the characteristic function</p>
        <p>A for A is a unique function de ned as A(x) = 1 if x 2 A, and A(x) = 0
otherwise.</p>
        <sec id="sec-2-1-1">
          <title>Our basic computation models are 1-way (one-tape, one-head) nondeter</title>
          <p>
            ministic nite automata (or 1nfa's, for short) with -moves and 1-way
(onetape, one-head) nondeterministic pushdown automata (or 1npda's) with -moves,
Where a -move is a step at which an input-tape head stays still reading nothing.
We also use their deterministic variants: 1dfa's and 1dpda's. Formally, a 1npda
N with a write-once output tape computing f : ! P( ) has the following
form: N = (Q; ; fcj; $g; ; ; ; q0; ?; Qacc; Qrej ), where Q is a nite set of inner
states, is a stack alphabet, is an output alphabet, q0 (2 Q) is the initial state,
? (
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) is the bottom marker, : (Q Qhalt) ! P(Q ),
where Qhalt = Qacc [ Qrej , = [ f ; cj; $g, cj and $ are respectively the
left and the right endmarkers, and = [ f g. Following [17, 19, 20, 18, 21],
our 1npda's are assumed to reach halting states along all computation paths in
O(n) steps, where n refers to input size (see [19, 20] for reasoning). When M
is in inner state q, scanning on the input tape, and a in the topmost stack
cell, a transition (p; z; ) 2 (q; ; a) changes q to p, replaces a by z, and writes
on the output tape. When 6= , the input-tape head must move to the
right. In contrast, when M makes a -move, its input-tape head reads and
does not move. As for a 1nfa N , we use another transition function of the form
: (Q Qhalt) ! P(Q ). It is important to remark that N is allowed
to make -moves like 1npda's.
          </p>
          <p>Along each computation path, a machine may produce a string on the
output tape. We call such a string a valid output (or a legitimate output ) if it is
produced along an appropriate accepting computation path. Only valid outputs
are considered as the machine's true \outputs" and we automatically disregard
any string produced along any rejecting computation path. This convention is
particularly important for one-way machines because this makes it possible for
such a one-way machine to start producing all possible strings
nondeterministically while reading an input string and then to invalidate any unwanted strings
by simply entering rejecting states in the time of halting.</p>
          <p>We say that a machine with two heads on input and output tapes is
synchronous if, whenever the input-tape head moves to the right, the output-tape
head also moves to the right, and vice visa.</p>
          <p>To treat input instances of a given \2-ary" partial function f on a model of
\1-way" machine M , we use the aforementioned track notation. For technical
reason, unlike the case of Turing machines, we do not use two-tape 1nfa's and
1npda's to access two independent input strings x and y; instead, we split a
single input tape into two tracks and write x and y on these tracks separately.
More precisely, when a pair (x; y) of strings is given as an input instance to the
machine M , we place x in the upper track and y in the lower track as [ xy] so that
the tape head can read x and y simultaneously from left to right. More formally,
if we wish to compute f on input (x; y), we start its underlying machine M
x
whose input tape contains the string of the form [ y]. From this formalism, we
write f ([ xy]), instead of f (x; y), to describe the function f that takes an input of
x
the form [ y].</p>
          <p>
            The notations REG and CFL stand for the family of all regular languages and
that of all context-free languages, respectively. For each number k 2 N+, the
kconjunctive closure of CFL, denoted CFL(k), is de ned recursively as CFL(
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) =
CFL and CFL(k + 1) = fA \ B j A 2 CFL(k); B 2 CFLg (cf. [22]). The advised
language family REG=n consists of all languages L for which there exist an
advice alphabet , a length-preserving total function (called an advice function)
h : N ! , and a language A 2 REG satisfying L = fx j [ h(jxxj)] 2 Ag
[12]. Similarly, by replacing REG in REG=n with CFL, we obtain CFL=n [15,
16]. Moreover, P (resp., NP) is composed of all languages recognized by
onetape deterministic Turing machines or DTMs (resp., one-tape nondeterministic
Turing machines or NTMs) in polynomial time.
2.2
          </p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Multi-Valued Partial Functions and Re nement</title>
        <p>Throughout this paper, similarly to [20], the generic term \function" refers to
\multi-valued partial function," provided that single-valued functions are viewed
as a special case of multi-valued functions and partial functions include total
functions. We are mostly interested in multi-valued partial functions mapping??
to for certain alphabets and , not necessarily limited to f0; 1g.
Whenever f is single-valued, we often write f (x) = y instead of y 2 f (x). The domain
dom(f ) of f is de ned to be the set fx 2 j f (x) 6= ?g. When x 62 dom(x),
f (x) is said to be unde ned.</p>
        <p>A multi-valued partial function f : ! P( ) is called polynomially
bounded if there exists a polynomial p such that, for any two strings x 2
and y 2 , if y 2 f (x) then jyj p(jxj) holds. We understand that all function
classes dealt with in this paper are assumed to be polynomially bounded. Given
two alphabets and , a multi-valued partial function f : ! P( ) is called
length preserving if, for any two strings x 2 and y 2 , y 2 f (x) implies
jxj = jyj. Similarly, f is length decreasing if y 2 f (x) implies jyj &lt; jxj for any
x; y 2 .</p>
        <p>
          Given two multi-valued functions f and g, we say that g is a re nement
of f , denoted by f vref g, if (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) dom(g) = dom(f ) and (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) for every input
x 2 dom(f ), g(x) f (x) (as a set inclusion) holds (see [11]). When Condition
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) is replaced by (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) dom(f ) dom(g), we say that g is a pseudo re nement
of f , denoted by f v(r+ef) g. For two sets F and G of functions, F vref G (resp.,
(+)
F vref G) if, for every function f 2 F , there exists a function g 2 G for which
f vref g (resp., f v(r+ef) g). Clearly, F vref G implies F v(r+ef) G. When g is
further single-valued, we often call f a single-valued (pseudo) re nement of f .
        </p>
        <p>
          The following four basic function classes were introduced in [17]. The function
class CFLMV is composed of all multi-valued functions f , each of which maps
to P( ) for a certain alphabet and there exists a 1npda N with a 1-way
read-once input tape together with a write-once output tape such that, for every
input x 2 , f (x) is the set of all valid outcomes of N on the input x. CFLMVt
is a natural restriction of CFLMV onto total functions. Two classes CFLSV
and CFLSVt are subclasses of CFLMV and CFLMVt consisting only of
singlevalued functions. Another function class CFLMV(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) contains all multi-valued
functions f such that there are two functions g1 and g2 in CFLMV satisfying
f (x) = g1(x) \ g2(x) (set intersection) for any string x [21]. In a similar way,
CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) and CFL2Vt(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) are de ned.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>E ciently Selective Languages and Their Basic</title>
    </sec>
    <sec id="sec-4">
      <title>Properties</title>
      <p>In the polynomial-time setting, multi-valued functions have been used to
dene the notions of NPMV- and kPMV-selectivity. Here, we introduce
CFLMVselectivity and its variants.
?? To describe a multi-valued function f , the expression \f : ! " is customarily
used in the literature. This is equivalent to saying that f is a total mapping from
to P( ).
3.1</p>
      <sec id="sec-4-1">
        <title>De nition of Selectors and Selective Languages</title>
        <p>We begin with a general notion of selectors.</p>
        <p>De nition 1. Given a multi-valued function f : ! P( ) (called a
selector), a language A is f -selective if, for any pair x; y 2 , (a) f ([ xy])
fx; yg, and (b) fx; yg \ A 6= ? implies both f ([ xy]) 6= ? and f ([ xy]) A.</p>
        <p>
          As an essential di erence from two-way Turing machines, when a 1npda on
x
input [ y] produces a string, say, s on its output tape along each computation
path, the 1npda cannot scan the passed tape cells again and thus there seems
no general way of knowing that the produced string s is x or y unless the 1npda
is synchronous. To circumvent the lack of such a post-production checkup of the
output strings, we require the following extra technical setup. When a selector
x
handles a string of the form [ y], we want to provide an underlying machine with
[xy$$21], where $1 and $2 are designated endmarkers used for the rst and the second
tracks. To do so, we introduce the notion of \endmarked extensions." Given a
selector f , another function g is called the endmarked extension of f if, for any
distinct x; y 2 , (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) f ([xy]) = ? i g([xy$$21]) = ?, (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) x 2 f ([xy]) i x$1 2 g([xy$$21]),
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) y 2 f ([ xy]) i y$2 2 g([ xy$$21]), and (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) x 2 f ([ xx]) i g([ xx$$12]) 2 fx$1; x$2g. For
brevity, we call x$1 and y$2 endmarked strings.
        </p>
        <p>De nition 2. Given a class F of multi-valued partial functions, a language A is
F -selective if there exists a multi-valued function f and its endmarked extension
f~ such that (i) A is f -selective and (ii) both f and f~ belong to F . We write
F -SEL for the collection of all F -selective languages.</p>
        <p>We stress that De nition 2 does not change the well-known selective
language families, such as P-SEL and NPSV-SEL. For a further discussion on our
introduction of endmarked extension, see Section 6.</p>
        <p>Unlike P-SEL, however, we do not intend to discuss DFA-SEL and
DCFL-SEL throughout this paper because they are too restrictive in practice
to contain even their associated underlying language families REG and DCFL,
respectively.</p>
        <p>Let us make simple observations. Obviously, for any two function classes F
and G, if F G, then F -SEL G-SEL. Next, we remark that a 1nfa can decide
which of two given strings x and y in the form of [ xy] is lexicographically smaller
than the other. This fact will be used in later arguments.</p>
        <p>Let denote the lexicographic order (i.e., sort rstly by length and sort
secondly by a xed alphabetical order).</p>
        <p>Lemma 3. The function f de ned as f ([ xy]) = minfx; yg, where min is taken
according to the lexicographic order, can be computed by a certain 1nfa.
Proof. Given the function f , let us consider the following 1nfa M . On input
x
[ y], rst \guess" either x or y (i.e., nondeterministically choose either x or y),
write down the guessed string, say, s. Assuming jxj = jyj, determine whether or
not s = minfx; yg and then check whether jxj = jyj by reading the entire input.
In the case of jxj 6= jyj, we immediately invalidate this computation path by
entering a rejecting state. More precisely, we compare x and y symbol by symbol
from left to right to check whether x precedes y or y precedes x according to the
lexicographic order . If we discover that x precedes y, then we check whether
s = x and jxj = jyj. If so, we accept; otherwise, we reject. When y precedes x,
we do the same by exchanging x and y. 2</p>
        <p>A quick application of the above lemma is the existence of special selectors.
We say that a selector f is symmetric if f ([ xy]) = f ([ xy]) for any pair x; y 2 .
It is possible to make certain selectors symmetric.</p>
        <sec id="sec-4-1-1">
          <title>Lemma 4. For every language A in CFLSVt-SEL, there always exists a symmetric CFLSVt-selector f for A. This statement also holds for CFLSV-SEL,</title>
          <p>CFL2V-SEL, and CFL2Vt-SEL.</p>
          <p>Lemma 5. CFLSVt-SEL
CFL2V-SEL.</p>
          <p>=</p>
          <p>co-(CFLSVt-SEL) and co-(CFLSV-SEL)</p>
          <p>
            The F -selectivity is associated with a certain partial pre-ordering, which
satis es re exivity and transitivity. We give a simple example of CFLSVt-selective
language using the standard lexicographic ordering. Given a machine M and an
input x, M (x) = 1 (resp., M (x) = 0) means that M accepts (resp., rejects) x.
Example 6 (
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) All regular languages are NFASVt-selective; namely, REG
NFASVt-SEL. To see this fact, for each regular language A, we take an arbitrary
1dfa M and construct its associated function f as follows. De ne f ([ xy]) = x if (i)
M (x) = M (y) = 1 and x y, (ii) M (x) = 1 6= M (y), or (iii) M (x) = M (y) = 0.
It is not di cult to see that f is indeed a selector and in NFASVt-SEL.
          </p>
          <p>
            (
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) Given a \single-valued" symmetric selector f for a language A over , we
write x f y if f ([ xy]) = x. This binary relation f becomes a partial pre-order
on and it satis es that, for every y 2 , y 2 A implies fx j x f yg A,
and y 2= A implies A fx j x f yg. This property will be used later.
3.2
          </p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>Closure Properties</title>
        <p>It is known that CFL is closed under union and inverse homomorphism but
not intersection. Most F -SEL's are naturally closed under union. By sharp
contrast, intersections of even NFASVt-selective languages possess arbitrarily high
complexities.</p>
        <sec id="sec-4-2-1">
          <title>Lemma 7. Let us consider an arbitrary language A over the binary alphabet</title>
          <p>= f0; 1g and assume that kA \ nk 1 holds for all n 2 N+. There exist two
languages L1; L2 2 NFASVt-SEL satisfying A = L1 \ L2.</p>
          <p>Proof. Using the standard lexicographic ordering on , we de ne L1 = fx 2
j 9y 2 A \ jxj[x y]g. By Lemma 3, the function f ([ xy]) = minfx; yg, where
\min" is according to , belongs to NFASVt. Thus, f is an NFASVt-selector for
L1. In a similar way, we de ne L2 = fx 2
follows that A = L1 \ L2.
jxj[y
x]g. It then
2</p>
          <p>Since we can freely choose A in Lemma 7, we instantly obtain the following
consequence. This is similar to the non-closure property of the class P-SEL of all
P-selective sets under intersection [5]. Let TALLY be the set of all tally languages
over arbitrary alphabets (i.e., languages consisting only of strings of the form
ai for a certain xed symbol a 2 ).</p>
        </sec>
        <sec id="sec-4-2-2">
          <title>Proposition 8. NFASVt-SEL is not closed under intersection. The same holds</title>
          <p>for CFLSVt-SEL and CFLSV-SEL.</p>
          <p>Proof. Take a tally language A not in NFASVt-SEL. By Lemma 7, there are
two languages L1; L2 2 NFASVt-SEL for which A = L1 \ L2. If NFASVt-SEL is
closed under intersection, then A must be in NFASVt-SEL, a contradiction. 2</p>
          <p>Note that CFL \ TALLY NFASVt-SEL because all \unary"
contextfree languages are regular. However, it is not known whether or not CFL
CFLSVt-SEL.</p>
          <p>Next, we argue various closure properties of CFLSVt-SEL. The rst property
is under a certain weak form of many-one reduction. Given two languages A
and B, we say that A is NFASVt-translatable, denoted by A tNrFaAnSsVt B, if
there exists a synchronous 1nfa N (called a translator) such that, on input x,
N produces a single valid string, say, w on its output tape such that x 2 A i
w 2 B. If we further require N to satisfy the length decreasing property (i.e., the
length of any string produced on the output tape must be strictly shorter than
the input length), then we instead use the term of length-decreasing
NFASVttranslatability. We claim the following lemma. In comparison, P-SEL is known
to be closed downward under polynomial-time truth-table reductions [10].</p>
        </sec>
        <sec id="sec-4-2-3">
          <title>Lemma 9. CFLSVt-SEL is closed downward under NFASVt-translations; that</title>
          <p>is, for any two languages A and B, if A tNrFaAnSsVt B and B 2 CFLSVt-SEL,
then A 2 CFLSVt-SEL.</p>
          <p>Proof. For any two languages A and B, assume that A tNrFaAnSsVt B via a
translator N with synchronized tape heads and that B 2 CFLSVt-SEL via a
selector f . Let Nf denote a 1npda computing f . For simplicity, we assume that
A and B are languages over the same alphabet, say, . We want to show that
A 2 CFLSVt-SEL. Given two strings x; y 2 , assume that N (x) produces
a single valid string, say, z and similarly N (y) produces w. Next, we de ne
g([ xy]) = x if f ([ wz]) = z, and g([ xy]) = y if f ([ wz]) = w. We claim that g is a
selector for A. Let us consider the case where fx; yg\A 6= ?. If x 2 A and y 2= A,
then z 2 A and w 2= A; thus, we obtain g([ xy]) = x 2 A. Assume that x; y 2 A.
Since z; w 2 A by the de nition of N , we conclude that fx; yg \ g([ xy]) 6= ?.</p>
          <p>Next, we show that g is in CFLSVt by constructing an appropriate 1npda
M computing g. On input [ xy], M simulates both N (x) and N (y) simultaneously
by reading [ xy] symbol by symbol since N 's tape heads are synchronized, and
it produces [ wz] on an \imaginary" output tape. During this process, as each
symbol of the string [ wz] is produced on the imaginary tape, M simulates one
step (together with a series of -moves) of Nf on . It is not di cult to see that
M computes g correctly. 2</p>
          <p>As for P-selectivity, Buhrman and Torenvliet [1] demonstrated that a
language A is in P i A is polynomial-time self-reducible and P-selective. In a similar
spirit, we show the following theorem concerning NFASVt-translatability.</p>
        </sec>
        <sec id="sec-4-2-4">
          <title>Theorem 10. Given any language A, if A is CFLSVt-selective and A is length</title>
          <p>decreasing NFASVt-translatable to A, then A belongs to CFL \ co-CFL.
Proof. Given any language A, let M denote a 1nfa that translates A to A. Let
f be a CFLSVt-selector for A and take an appropriate 1npda Mf computing f .
To show that A 2 CFL, we de ne N as follows. On input x, N runs M on x.
While M produces z along a certain computation path, N produces [ xz] on an
imaginary tape of N . Note that x 6= z since x 2 A i z 2 A. Whenever a single
symbol is produced on the imaginary tape, N simulates one step (together with
a series of -moves, if necessary) of Mf on using a stack and the imaginary
tape. Since jzj &lt; jxj, by simulating Mf , N easily notices which of x and z is a
valid outcome of Mf . If f ([ xz]) = x, then N accepts; otherwise, N rejects.</p>
          <p>Next, we show that N correctly recognizes A. Assume that x 2 A. If f ([ xz]) =
z, then we conclude that z 2 A because fx; zg \ A 6= ?. However, this implies
x 2= A, a contradiction. Thus, we obtain f ([ xz]) = x; in other words, N accepts.
Next, assume that x 2= A. If f ([ xz]) = x, then z 2= A holds because, otherwise,
f ([ xz]) = z must hold. Since z 2= A, we obtain x 2 A, a contradiction. This
implies f ([ xz]) = z, and thus N rejects. Therefore, N correctly recognizes A.</p>
          <p>By Lemma 5, A is also CFLSVt-SEL. Moreover, A is also length-preserving
NFASVt-translatable to A. Since the above argument for A also works for A, we
thus conclude that A is in CFL. Therefore, A belongs to CFL \ co-CFL. 2</p>
        </sec>
        <sec id="sec-4-2-5">
          <title>Lemma 11. CFLSVt-SEL is closed under inverse homomorphism.</title>
          <p>Proof. Let A denote any language over alphabet in CFLSVt-SEL and let h
be any homomorphism from another alphabet to . Our goal is to show that
the language Ah 1 = fx 2 j h(x) 2 Ag belongs to CFLSVt-SEL. Take a
selector f in CFLSVt for A and consider a 1npda M computing its endmarked
extension f~. Consider the following algorithm. On input [ y], we guess z 2 fx; yg
x
and produce it on an output tape. At the same time, we apply h to each symbol
of [ xy]. By adjusting the size of obtained strings by h symbol by symbol, we
run M using an \imaginary" output tape. When M ends its computation, M
produces either $1 or $2, which indicates which of x and y is actually produced.
We accept the input if the string produced by M matches the guessed string;
otherwise, we reject the input.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Power and Limitation of Selective Languages</title>
      <p>
        We will continue exploring basic properties of F -selective languages. In Example
6(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), we have already shown that REG NFASVt-SEL. Hereafter, we intend to
establish a further connection between CFL variants and their selectivity.
      </p>
      <sec id="sec-5-1">
        <title>Proposition 12. (1) CFL</title>
        <p>
          (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-SEL.
        </p>
        <p>
          CFL2V-SEL. (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) CFL \ co-CFL
        </p>
        <p>CFLSVt-SEL.</p>
        <p>
          Proof. (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) For each language A 2 CFL, take a 1npda M that recognizes A. To
show that A 2 CFL2V-SEL, it su ces to construct an appropriate selector for A.
In what follows, we will describe a 1npda N equipped with a write-once output
tape computing this selector. Let (x; y) be any input pair. Assume that [xy] is given
x
to an input tape of N . On this input [ y], N guesses (i.e., nondeterministically
chooses) either x or y and runs M on this guessed string. Assume that N has
guessed a string s 2 fx; yg. While reading s, N copies it onto the output tape
symbol by symbol. Along each computation path, when M halts in an accepting
state or a rejecting state, N enters the same inner state. Remember that, if N
enters a rejecting state along a computation path, the string s produced on the
output tape is automatically invalidated. Let f ([ xy]) be the valid outcome of N
on the input [ xy]. It is obvious that f is a two-valued partial function. Since
f ([ xy]) fx; yg for any pair (x; y), f belongs to CFL2V. It is easy to show that
f ([ xy]) A when fx; yg \ A 6= ?. Thus, A is in CFL2V-SEL.
        </p>
        <p>
          (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) Assume that A 2 CFL \ co-CFL. Recall from [21, Lemma 2.1] that A 2
CFL \ co-CFL i A 2 CFLSVt. By this equivalence, we obtain A 2 CFLSVt.
Take a 1npda M computing A. We then de ne another 1npda N as follows. On
x
input [ y], guess two strings s; t 2 fx; yg (nondeterministically). In the case of
s = x, we run M on s, and simultaneously writes t on the output tape. Along a
computation path, assuming t = x, if M outputs 1, then N rejects; otherwise, N
accepts. In contrast, assuming t = y, if M outputs 1, then N rejects; otherwise,
N accepts. In the case of s = y, N runs M on s and writes y. If M outputs 1,
then N accepts; otherwise, N rejects. Let g be a multi-valued partial function
computed by N . It is easy to show that f is total and single-valued. Moreover,
it is not di cult to show that g is a selector for A and in CFLSVt.
        </p>
        <p>
          (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) Let L be any language in CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) and take two languages A1; A2 2 CFL
satisfying L = A1 \ A2. By (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), there are CFL2V-selectors f1 and f2 for A1 and
A2, respectively. We de ne g(z) = f1(z) \ f2(z) for any z. Clearly, g belongs to
CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ). Since g is a selector for L, L belongs to CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-SEL. 2
        </p>
        <p>
          The family NFASVt-SEL contains REG by Example 6(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ). However, it is not
powerful enough to include DCFL.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>Proposition 13. DCFL * NFASVt-SEL.</title>
        <p>
          Proof. Consider the non-regular language Lab = fanbn j n 2 Ng over the binary
alphabet = fa; bg. Assume that Lab 2 NFASVt-SEL and take a selector f for
Lab in NFASVt. This f induces a partial pre-order f on as in Example
6(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ). Note that fx 2 n j x f anbng Lab and Lab fx 2 n j i; j 2 N; x f
aibj; i + j = n; i 6= jg. Thus, Lab equals fx 2 j n 2 N; x f anbng. It then
follows that anbn f aibj for any i; j with i + j = n. We de ne co-1nfa N as
follows. On input aibj (with i + j = n), guess akbl (with k + l = n), run N on
[ aakibbjl] to see f ([ aakibbjl]) = aibj (that is, aibj f akbl). If so, we accept, or else
we reject. We then conclude that x 2 Lab i all computation paths of N are
accepting. Since N is a co-1nfa, this characterization of Lab implies that Lab is
in REG, a contradiction. 2
        </p>
        <p>
          In Proposition 12(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), we have already seen that CFL CFL2V-SEL. We
further relate CFL CFLSV-SEL to a pseudo re nement of CFL2Vt by CFLSVt.
        </p>
      </sec>
      <sec id="sec-5-3">
        <title>Lemma 14. If CFL</title>
        <p>CFLSV-SEL, then CFL2Vt v(r+ef) CFLSVt.</p>
        <p>Proof. Assume that CFL CFLSV-SEL. Take any function f 2 CFL2Vt
having its range D of size exactly 2. Let D = fy1; y2g and let d = maxfjyj :
y 2 Dg. Let M denote a 1npda computing f . De ne L = f[ xy] j jxj d; y 2
f (x)g, which belongs to CFL since D is nite. Since L 2 CFLSV-SEL by our
assumption, take a CFLSV-selector g for L and let N be its underlying 1npda
that computes g with a write-once output tape. We then de ne g~ as g^(x) = g([uv])
for u = [ yx1] and v = [ yx2]. Note that g^ is a single-valued function.</p>
        <p>Consider the following 1npda, say, N . On input x, compute g^ on x and
produce its outcome on an imaginary tape. Instead of producing an outcome
of the form [ xy] with y 2 D, write down y on the output tape. Let h be a
function computed by this machine N . Note that h is in CFLSVt since f is a
total function.</p>
        <p>Finally, we want to show that f v(r+ef) h. Assume that f (x) 6= ?. Consider
the case where f (x) = fy1; y2g. Since [ yx1]; [ yx2] 2 L, g^(x) must output a single
string of the form [ wx] in L, where w 2 fy1; y2g. By the de nition of h, we obtain
h(x) = w. The case of f (x) = fyg D is similarly treated. 2</p>
        <p>Lemma 14 helps us prove the following assertion.</p>
        <p>Proposition 15. CFL2V-SEL = CFLSV-SEL ) CFL
CFL2Vt-SEL = CFLSVt-SEL.</p>
        <p>
          CFLSV-SEL )
Proof. Assume that CFLSV-SEL = CFL2V-SEL. Since CFL CFL2V-SEL
by Proposition 12(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), it follows that CFL CFLSV-SEL. Assuming CFL
CFLSV-SEL, we show that CFL2Vt-SEL = CFLSVt-SEL. For any language
L 2 CFL2Vt-SEL, take a CFL2Vt-selector f for L. By Lemma 14, there exists
a g 2 CFLSVt satisfying f v(r+ef) g. Since dom(f ) dom(g) and g([ xy])
f ([ xy]) fx; yg, we conclude that g is a selector for L as well. Hence, L belongs
to CFLSVt-SEL. 2
        </p>
        <p>
          We further discuss the limitations of CFLSVt-SEL and CFLMV(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-SEL.
It is known that DCFL * REG=n [12] and CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) * CFL=n [21, Corollary
3.10]. These separation results together with Proposition 12 yields the following
immediate consequence.
Proposition 16. (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) CFLSVt-SEL * REG=n. (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-SEL * CFL=n.
Proof. (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) Assume that CFLSVt-SEL REG=n. By Proposition 12(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), we
conclude that CFL \ co-CFL REG=n. Since DCFL CFL \ co-CFL, we
obtain DCFL REG=n. This contradicts the separation DCFL * REG=n [12].
        </p>
        <p>
          (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) Similarly to (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), assume that CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-SEL CFL=n. Since CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
CFL2V(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-SEL by Proposition 12(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), we conclude that CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) CFL=n, a
contradiction against CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) * CFL=n [21]. 2
5
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Extensions to Higher Complexity Classes over CFL</title>
      <p>Analogously to the polynomial(-time) hierarchy over P and NP, the CFL
hierarchy was introduced in [19] over DCFL and CFL by way of respectively viewing
DCFL and CFL as P and NP. We quickly review the de nition of this intriguing
hierarchy. An oracle 1npda is a 1npda equipped with a write-once query tape by
which the 1npda makes queries (adaptively) to a given oracle. Such a query tape
is marked by two endmarkers fcj; $g, where $ is placed on a tape cell whose index
is bounded by O(n) [19]. Every time when a query is made, the query tape is
automatically initialized with the endmarkers. The role of the oracle is to reset the
oracle 1npda's inner state to a \yes" state (qyes) or a \no" state (qno) according
to the case where a query word belongs to the oracle or it does not, respectively.
Given a language A, the notation CFLTA (or CFLT (A)) expresses the collection
of all languages recognized by those oracle 1npda's with an access to the oracle
A. For a language family C, we use the notation CFLCT (or CFLT (C)) for the
union S CFLTA. The CFL hierarchy is f kCFL; kCFL; kCFL j k 2 N+g [19],
where A1C2FLC = DCFL, 1CFL = CFL, kCFL = co- kCFL, kC+F1L = CFLT ( kCFL),
and kC+F1L = DCFLT ( kCFL) for each k 1.</p>
      <p>We have seen a lower bound of the complexity of CFLSVt-SEL in Proposition
12. In what follows, we show an upper bound of the complexity of CFLSVt-SEL.
In comparison, we note that P-SEL NP=lin \ co-NP=lin [4]. It is important to
note that our advice can use an arbitrary alphabet, not necessarily limited to
f0; 1g in the case of NP=lin.</p>
      <sec id="sec-6-1">
        <title>Proposition 17. CFLSVt-SEL</title>
        <p>
          CFLT (CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))=n \ co-CFLT (CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))=n.
        </p>
        <p>
          Proof. Since co-(CFLSVt-SEL) = CFLSVt-SEL by Lemma 5, it su ces to
prove that CFLSVt-SEL CFLT (CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))=n. Let L be any language with a
symmetric CFLSVt-selector f . Let f~ denote the endmarked extension of f . We
consider a tournament (graph) G = (V; E) induced by f as V = L \ n and
E = f(a; b) j a 6= b; f ([ ab]) = bg. We use the following result by Hohn, Landau,
and Vaughan (cited in [14] and also in [3]): given a k-tournament G = (V; E),
there is a special node from which all nodes can be reached via paths of length
at most 2.
        </p>
        <p>
          We use the advice alphabet f0; 1; ag and de ne h(n) = an if L \ n = ?, and
wn otherwise, where wn (2 L) is the special player (i.e., node) of the tournament
from which all the other players (nodes) can be reached along paths of length at
most 2. We de ne A = f[ wu] j u = [ xz]; (w; x) 2 E _ [(w; z) 2 E ^ (z; x) 2 E]g. We
claim that A is in CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ). We de ne B1 as follows: on input [ wu] with u = [ xz],
nondeterministically check one of the following two conditions: (i) f~([wx$$11]) = x$2
and (ii) w 6= z and f~([ wz$$21]) = z$2. Let B2 be de ned similarly by replacing (ii)
with the following condition: (ii0) z 6= x and f~([ xz$$12]) = x$2. It follows that
B1; B2 2 CFL. Since A = B1 \ B2, we obtain A 2 CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ). Next, we de ne an
oracle 1npda N as follows: on input [ wu], guess z and query [ wu] with u = [ xz]
to A. If A answers a rmatively, then N accepts; otherwise, N rejects. Since
L = fx j [ h(jxxj)] 2 Ag, L belongs to CFLT (A)=n CFLT (CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))=n. The
second part CFLSVt-SEL co-CFLT (CFL(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))=n follows from the fact that
CFLSVt-SEL is closed under complementation. 2
        </p>
        <p>Multi-valued functional versions of CFLTA and CFLCT are denoted
respectively by CFLMVTA (or CFLMVT (A)) and CFLMVCT (or CFLMVT (C)) [18].
The CFLMV hierarchy then consists of language families: 1CFLMV = CFLMV,
and kC+F1LMV = CFLMVT ( kCFL), and kCFLMV = co- kCFLMV for every level
k 1 [20]. Similarly, kCFLSV is de ned for every k 1.</p>
        <p>
          Here, we only remark that Lemmas 4{5, Theorem 10, and Proposition 12(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
are easily extended to an arbitrary level k 1. For instance, a generalization of
Proposition 12(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) is stated as follows.
        </p>
      </sec>
      <sec id="sec-6-2">
        <title>Proposition 18. Let k</title>
        <p>kC+F1L2V-SEL.</p>
      </sec>
      <sec id="sec-6-3">
        <title>Corollary 19. For any level k</title>
        <p>kCFL2V-SEL 6= kC+F1L2V-SEL.</p>
        <p>
          Since kCFL kC+F1L2V-SEL holds by Proposition 18, the assumption
kCFL2V-SEL implies kCFL2V-SEL 6= kC+F1L2V-SEL. 2
Proposition 12(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) can be also extended into a higher level; however, its proof
is more involved than that of the proposition.
        </p>
        <sec id="sec-6-3-1">
          <title>Theorem 20. For any level k</title>
          <p>1, kCFL</p>
          <p>CFL
\ k
CFLSVt-SEL.
k</p>
        </sec>
      </sec>
      <sec id="sec-6-4">
        <title>Corollary 21. Let k</title>
        <p>2. If kCFL =
kCFL, then</p>
        <p>CFL
k</p>
        <p>CFLSVt-SEL.
k
Proof of Theorem 20. We rst note the following claim.</p>
        <p>Claim 22 For any index k 1. Given a language A, A 2 kCFL \ kCFL i
A 2 kCFLSVt.</p>
        <p>The case of k = 1 of Claim 22 was already shown as [21, Lemma 2.1] and its
generalization for k 2 can be similarly proven.</p>
        <p>Let A 2 kCFL \ kCFL. Claim 22 implies that A is in kCFLSVt. De ne
f ([ xy]) = [ uv], where u = A(x) and v = A(y).</p>
        <p>Next, we claim the following.
Claim 23 Let k
as g([ xy]) = [ pp((xy))] for all x; y 2</p>
        <sec id="sec-6-4-1">
          <title>2 and let p be a function in belongs to</title>
          <p>CFLSVt. The function g de ned
k
CFLSVt.
k</p>
          <p>The proof of this claim is quite technical. One may prove it by rst
establishing that underlying oracle 1npda's can be replaced by oracle 1nfa's having
access to Dyck languages, as shown for kCFL in [19, arXiv version].
Proof of Claim 23. This proof relies on a result of [19, arXiv version]. Let
k 2 and let p 2 CFLSVt \ Ffin. Recall that, in [19], for any language A,
two language families k mNF;kA;A and mNF;kA;A were introduced. In a similar way, we
can de ne mNF;kASVtA and mNF;kASVtA as follows. Let
mNF;1ASVtA = (NFASVt)Am,</p>
          <p>NFA;A
mNF;kASVtA = co- mNF;kASVtA, and mNF;kA+1SVtA = (NFASVt)mm;k 1 for any k
1. Following an argument given in [19, arXiv version], we obtain the following
claim.</p>
        </sec>
        <sec id="sec-6-4-2">
          <title>Claim 24 For any k</title>
          <p>the Dyck language.</p>
          <p>1,</p>
          <p>CFLSVt =
k</p>
          <p>mNF;kASVtDY CK , where DY CK denotes</p>
          <p>Since f 2 CFLSVt, take an oracle 1nfa M that computes f with accexss
to oracle B in kmNF;kA;D1Y CK . Consider the following machine N . On input [ y],
N simulates in parallel both M (x) and M (y) without using any stack. If M (x)
produces u and M (y) produces w on their query tapes, then N produces [ wu~~]
on its query tape, where u~ and w~ are \-extensions of u and w. Moreover, N
outputs [ ab], where a and b are outcomes of M on x and y, respectively. Finally,
de ne C = f[ wu~~] j u; w 2 Bg. It was shown in [19] that kCF1L = mNF;kA;D1Y CK .
Since C 2 kCF1L, we obtain C 2 mNF;kA;D1Y CK . By the de nition of N and C,
the function de ned by g([ xy]) = [ ff((xy))] is computed by N with the oracle C.
Therefore, g belongs to kCFLSVt. 2</p>
          <p>By Claim 24, it follows that the function f belongs to kCFLSVt. Next,
consider the following oracle 1npda, say, N . On input [ xy], guess b 2 f0; 1g and write
x (resp., y) on an output tape if b = 0 (resp., b = 1). At the same time, calculate
f ([ xy]) and let z be its valid outcome (along a certain accepting computation
path). If b = 0 and z is either [ 00] or [ 11], then N accepts. In the case where z is [ 01]
(resp., [ 10]), N accepts if b = 1 (resp., b = 0). In all other cases, N rejects. Notice
that N runs with synchronized tape heads. Let h denote the function computed
by N . It is not di cult to show that h is indeed a selector for A. 2</p>
          <p>Let us consider a basic relationship between \re nement" and \selectivity."
Proposition 25. For each level k 2, kCFL2V v(r+ef) kCFLSV implies kCFL
kCFLSV-SEL. The same statement holds when kCFLSV is replaced by kCFLSVt.</p>
        </sec>
      </sec>
      <sec id="sec-6-5">
        <title>Proposition 26. Let k</title>
        <p>2. If kCFL =
Proof. It is shown in [19, arXiv version] that
kC+F1L. From kCFL = kCFL, it follows that
ally, we can improve this to (*)
kCFL = kCFL implies kCFL =
kC+F1LMV vref kC+F1LSV [20];
actukCFLMV vref kCFLSV.</p>
        <sec id="sec-6-5-1">
          <title>Claim 27 For every k</title>
          <p>2,</p>
          <p>(+)
CFLSV vref
k
kC+F1LSVt.</p>
          <p>Proof of Claim 27. Let f 2 kCFLSV. Assume that k 2. Since kCFLSV =
CFLSVT ( kCF1L) by the de nition, take an oracle 1npda M and an oracle B in
kCF1L computing f . Let C = f1y j y 2 Bg [ f0x j f (x) 6= ?g. Since f1y j y 2 Bg
is in kCF1L and f0x j f (x) 6= ?g is in kCFL, it follows that C belongs to kCFL.
Consider the following machine. On input x, guess b 2 f0; 1g. If b = 1, then
simulate M with C as an oracle. If b = 0, then query 0x to C. If C's answer
is \yes," then reject; if the answer is \no," then accept. Moreover, whenever M
queries y, N queries 1y.</p>
          <p>Let g denote the function computed by N with C. Note that g belongs to
CFLSVtC CFLSVt kCFL kC+F1LSVt. Moreover, it is not di cult to show
that g is a total function and that, if x 2 dom(f ), f (x) = g(x). Therefore, g is
a pseudo re nement of f . 2</p>
          <p>By Claim 27 together with (*), we obtain kCFL2V v(r+ef) kC+F1LSVt. Since
kCFL = kC+F1L, we obtain kCFLSVt = kC+F1LSVt. Therefore, we can conclude
that kCFL2V v(r+ef) kCFLSVt.</p>
          <p>Notice that combining Propositions 25 and 26 also leads to Corollary 21.
6</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>A Closing Discussion</title>
      <p>The study of e cient selectivity was initiated in 1979 by Selman [9] using
polynomial-time computable selectors and it has been since then expanded to
other types of selectors. An introduction of selectivity to formal languages and
automata theory was found in [13]. To further broaden the scope of study on the
selectivity issues in formal languages and automata theory, we have considered
in this paper one-way nondeterministic pushdown automata as an underlying
machine model to compute selectors.</p>
      <p>It is unfortunate that we have left numerous selectivity issues unsettled
throughout this paper. For example, it is unclear at this moment that the
introduction of the notion of \endmarked extension" of selectors in De nition 2 is
truly necessary. We hope to prove that the use of this endmarked extension is
actually redundant and we can simplify De nition 2 without endmarked
extension.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Buhrman</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torenvliet</surname>
          </string-name>
          , L.:
          <article-title>P-selective self-reducible sets: a new characterization of P</article-title>
          .
          <source>J. Comput. System Sci</source>
          .
          <volume>53</volume>
          ,
          <issue>210</issue>
          {
          <fpage>217</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Hemachandra</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoene</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naik</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ogiwara</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Selman</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thierauf</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Nondeterministically selective sets</article-title>
          .
          <source>Int. J. Found. Comput. Sci. 6</source>
          ,
          <issue>403</issue>
          {
          <fpage>416</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nasipak</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parkins</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>A note on linear-nondeterminism, linear-sized, Karp-Lipton advice for the P-selective sets</article-title>
          .
          <source>J. Universal Computer Science</source>
          <volume>4</volume>
          ,
          <issue>670</issue>
          {
          <fpage>674</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torenvliet</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Optimal advice</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>154</volume>
          ,
          <issue>367</issue>
          {
          <fpage>377</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>P-selectivity: intersection and indices</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>145</volume>
          ,
          <issue>371</issue>
          {
          <fpage>380</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naik</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ogihara</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Selman</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          :
          <article-title>Computing solutions uniquely collaspses the polynomial hierarchy</article-title>
          .
          <source>SIAM J. Comput</source>
          .
          <volume>25</volume>
          ,
          <issue>697</issue>
          {
          <fpage>708</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Ko</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>On self-reducibility and weak P-selectivity</article-title>
          .
          <source>J. Comput. System Sci</source>
          .
          <volume>26</volume>
          ,
          <issue>209</issue>
          {
          <fpage>221</fpage>
          (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Meyer,
          <string-name>
            <given-names>A.R.</given-names>
            ,
            <surname>Stockmeyer</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.J.:</surname>
          </string-name>
          <article-title>The equivalence problem for regular expressions with squaring requires exponential space</article-title>
          .
          <source>In: Proc. of the 13th Annual IEEE Symposium on Switching and Automata Theory</source>
          . pp.
          <volume>125</volume>
          {
          <issue>129</issue>
          (
          <year>1972</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Selman</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          :
          <article-title>P-selective sets, tally languages, and the behavior of polynomial time reducibilities on NP</article-title>
          .
          <source>Math. Systems Theory</source>
          <volume>13</volume>
          ,
          <volume>55</volume>
          {
          <fpage>65</fpage>
          (
          <year>1979</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Selman</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          :
          <article-title>Analogues of semirecursive sets and e ective reducibilities to the study of NP complexity</article-title>
          .
          <source>Inform. Control</source>
          <volume>52</volume>
          ,
          <issue>36</issue>
          {
          <fpage>51</fpage>
          (
          <year>1982</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Selman</surname>
            ,
            <given-names>A.L.:</given-names>
          </string-name>
          <article-title>A taxonomy of complexity classes of functions</article-title>
          .
          <source>J. Comput. System Sci</source>
          .
          <volume>48</volume>
          ,
          <issue>357</issue>
          {
          <fpage>381</fpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Tadaki</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>J.C.H.</given-names>
          </string-name>
          :
          <article-title>Theory of one-tape linear-time Turing machines</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>411</volume>
          ,
          <issue>22</issue>
          {
          <fpage>43</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Tantau</surname>
          </string-name>
          , T.:
          <article-title>On the structural similarities of nite automata and Turing machine enumerability classes</article-title>
          .
          <source>Doctoral Dissertation</source>
          , Elektrotechnik und Informatik der Technischen Universitat Berlin (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>West</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Introduction to Graph Theory. Prentice
          <string-name>
            <surname>Hall</surname>
          </string-name>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Swapping lemmas for regular and context-free languages (2008), manuscript</article-title>
          . Available at arXiv:
          <volume>0808</volume>
          .4122,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The roles of advice to one-tape linear-time Turing machines and nite automata</article-title>
          .
          <source>Int. J. Found. Comput. Sci</source>
          .
          <volume>21</volume>
          ,
          <issue>941</issue>
          {
          <fpage>962</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Immunity and pseudorandomness of context-free languages</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>412</volume>
          ,
          <issue>6432</issue>
          {
          <fpage>6450</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Not all multi-valued partial CFL functions are re ned by singlevalued functions (extended abstract)</article-title>
          .
          <source>In: Proc. of IFIP TCS 2014. Lecture Notes in Computer Science</source>
          , vol.
          <volume>8705</volume>
          , pp.
          <volume>136</volume>
          {
          <fpage>150</fpage>
          . Springer (
          <year>2014</year>
          ),
          <article-title>There is an error in the main proof</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Oracle pushdown automata, nondeterministic reducibilities, and the hierarchy over the family of context-free languages</article-title>
          .
          <source>In: Proc. of SOFSEM 2014. CEUR Workshop Proceedings</source>
          , vol.
          <volume>8327</volume>
          , pp.
          <volume>514</volume>
          {
          <fpage>525</fpage>
          . Springer (
          <year>2014</year>
          ),
          <article-title>A complete and corrected version appears</article-title>
          at arXiv:
          <volume>1303</volume>
          .
          <fpage>1717</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Structural complexity of multi-valued partial functions computed by nondeterminsitic pushdown automata (extended abstract)</article-title>
          .
          <source>In: Proc. of the 15th Italian Conference of Theoretical Computer Science. CEUR Workshop Proceedings</source>
          , vol.
          <volume>1231</volume>
          , pp.
          <volume>225</volume>
          {
          <issue>236</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Pseudorandom generators against advised context-free languages</article-title>
          .
          <source>Theor. Comput. Sci. 613</source>
          ,
          <issue>1</issue>
          {
          <fpage>27</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Intersection and union hierarchies of deterministic context-free languages and pumping lemmas</article-title>
          .
          <source>In: Proc. of LATA 2020. Lecture Notes in Computer Science</source>
          , vol.
          <volume>12038</volume>
          , pp.
          <volume>341</volume>
          {
          <fpage>353</fpage>
          . Springer (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Yamakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kato</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>The dissecting power of regular languages</article-title>
          .
          <source>Inf. Process. Lett</source>
          .
          <volume>113</volume>
          ,
          <issue>116</issue>
          {
          <fpage>122</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>