<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>When Input Integers are Given in the Unary Numeral Representation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tomoyuki Yamakami</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Engineering, University of Fukui</institution>
          ,
          <addr-line>3-9-1 Bunkyo, Fukui 910-8507</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Many NP-complete problems take integers as part of their input instances. These input integers are generally binarized, that is, provided in the form of the “binary” numeral representation, and the lengths of such binary forms are used as a basis unit to measure the computational complexity of the problems. In sharp contrast, the “unarization” (or the “unary” numeral representation) of numbers has been known to bring a remarkably diferent efect onto the computational complexity of the problems. When no computational-complexity diference is observed between binarization and unarization of instances, on the contrary, the problems are said to be strong NP-complete. This work attempts to spotlight an issue of how the unarization of instances afects the computational complexity of various combinatorial problems. We present numerous NP-complete (or even NP-hard) problems, which turn out to be easily solvable when input integers are represented in unary. We then discuss the computational complexities of such problems when taking unary-form integer inputs. We hope that a list of such problems signifies the structural diferences between strong NP-completeness and non-strong NP-completeness.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;unary numeral representation</kwd>
        <kwd>unarization of integers</kwd>
        <kwd>logarithmic-space computation</kwd>
        <kwd>pushdown automata</kwd>
        <kwd>log-space reduction</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1. Background and Quick Overview
1.1. Unary Representations of Integer Inputs
The theory of NP-completeness has made great success in providing a plausible evidence to the
hardness of target computational problems when one tries to solve them in feasible time. The
proof of NP-completeness of those problems therefore makes us turn away from solving them
in a practical way but it rather guides us to look into the development of approximation or
randomized algorithms.</p>
      <p>In computational complexity theory, we often attempt to determine the minimum amount
of computational resources necessary to solve target combinatorial problems. Such
computational resources are measured in terms of the sizes of input instances given to the problems.
Many NP-complete problems, such as tkhneapsack problem, thesubset sum problem, and the
integer linear programming problem, concern the values of integers and require various
integer manipulations. When instances contain integers, these integers are usually expressed in
the form of “binary” representation. Thus, the computational complexities, such as running
time or memory space, are measured with respect to the total number of bits used for this
representation.</p>
      <p>This fact naturally brings us a question of what consequences are drawn when input integers
are all provided in “unary” using the unary numeral system instead. How does the unary
representation afects the computational complexity of the problems? In comparison to the
binary numeral system, the unary numeral system is so distinctive, that we need to heed a
special attention in our study on the computational complexity of algorithms.</p>
      <p>When input integers given to combinatorial problems are expressed in unary, a simple
transformation of the unary expression of input integers to their binary representations makes the
original input lengths look exponentially larger than their binary lengths. Thus, any algorithm
working with the unarized integer inputs seem to consume exponentially less time than the
same algorithm with binarized integer inputs. This turns out to be a quite short-sighted
analysis.</p>
      <p>We often observe that the use of the unary representation significantly alters the
computational complexity of combinatorial problems. However, a number of problems are known
to remain NP-complete even after we switch binarized integer inputs to their corresponding
unarized ones (see1[, Section 4.2]). Those problems are said tostbreong NP-complete1 and
this notion has been used to support a certain aspect of the robustness of NP-completeness
notion. Non-strong NP-complete problems are, by definition, quite susceptible to the change
of numeral representations of their input integers between the binary representation and the
unary representation. It is therefore imperative to study a structural-complexity aspect of those
non-strong NP-complete problems when input integers are provided in the form of the unary
numeral representation. In this work, we wish to look into the features of such non-strong</p>
    </sec>
    <sec id="sec-2">
      <title>NP-complete problems.</title>
      <p>Earlier, Cook2[] discussed the computational complexity of a unary-representation
analogue of the knapsack problem, calleduntahrey 0-1 knapsack problem (UK), which asks whether
or not there is a subset of given positive integers, represented in unary, whose sum matches a
given target positive integer. This problem UK naturally falls in NL (nondeterministic
logarithmic space) but he conjectured that UK may not be NL-complete. This conjecture is supported
by the fact that even an appropriately designed one-way one-turn nondeterministic counter
automaton can recognize UK (e.g3.],).[ Jenner [4] introduced a variant of UK whose input
integers are given in a “shift-unary” representation, whsehrieft-uanary representation [1 , 1 ]
represents the numb e⋅r2  . She then demonstrated that this variant is actually NL-complete.
We further expand such a shift-unary representationmtuoltiaple shift-unary representation by
allowing a finite series of positive integers andgtenoearal unary (numeral) representation by
taking all possible integers, including zero and negative ones. See2S.1ecftoirontheir precise
definitions.</p>
      <p>Driven by our great interest in the efect of the unarization of inputs, throughout this work,
we wish to study the computational complexity of combinatorial problems whose input
integers are in part unarized by the unary representation.
1Originally, the strong NP-completeness has been studied in the case where all input inptoelygneormsiaarlley
bounded. This case is essentially equivalent to the case where all input integers are given in unary. See a discussion
in, e.g., [1, Section 4.2].</p>
      <p>LOGCFL = 2NPD3CA</p>
      <p>NL = 2N4CA 
EWPP, EPLP</p>
      <p>USVPmax, UCVPmax
1t22PDCA
1t2NPDCA
2N3CA
UKEXC</p>
      <p>1t2NCA
USVPmin
UCVPmin
1N6CA</p>
      <p>Shift‐UK
REG
1t12PDCA</p>
      <p>SUK
1t1NPDCA
1t1N2CA</p>
      <p>U2PART, UASubSum
UBCP</p>
      <p>For the succinctness of further descriptions, we hereafter refer to input integers expressed
in the unary numeral system uansary-form integers (or more succinctluy,narized integers) in
comparison tobinary-form integers (orbinarized integers).
1.2. New Challenges and Main Contributions
A simple pre-processing of converting a given unary-form input integer into its binary
representation provides obvious complexity upper bounds for target combinatorial problems but it
does not seem to be suficient to determine their precise computational complexity.</p>
      <p>Our goal is to explore this line of study in order to clarify the roles of the binary-to-unary
transformation in the theory of NP-completeness (and beyond it) and cultivate a vast research
area incurred by the use of unary-form integers. In particular, we plan to focus on several
non-strong NP-complete (or even NP-hard) problems and study how their computational
complexities can change when we replace the binary-form input integers to the unary-form ones.
Among various types of combinatorial problems taking integer inputs, we look into number
problems, graph-related problems, and lattice-related problems. It is desirable for us to
determine the precise complexity of each combinatorial problem whose instances are unarized.</p>
      <p>A brief summary of our results are illustrated in 1F.igTuhreedetailed explanation of the
combinatorial problems and complexity classes listed in this figure will be provided in Sections
2–5. We remark that the underlying machines used to define those complexity classes are all
limited to run in polynomial time.</p>
      <sec id="sec-2-1">
        <title>2. Basic Notions and Notation</title>
        <sec id="sec-2-1-1">
          <title>2.1. Numbers, Sets, Languages</title>
          <p>We assume that alplolynomials have nonnegative integer coeficients. Alolglarithms are
always taken to the ba2s.eThe notationℤs andℕ denote respectively the set of all integers and
that of all nonnegative integers. We furtherℕd+etfinoe beℕ − {0}. As a succinct notation, we
use [, ] ℤ to denote thineteger interval {,  + 1, … , } for two integersand with ≤  .
In particula[r1,, ] ℤ is abbreviated a[s] whenever ≥ 1 . Given  ∈ ℕ +, we define the linear
order&lt;[] on the set[] × []</p>
          <p>as: ( 1,  2) &lt;[] ( 2,  2) if either  1 &lt;  2 or 1 =  2 ∧  1 &lt;  2. Moreover,
ℝ denotes the set of all real numbers. Given a v e=ct(or1,  2, … ,   ) in ℝ , theEuclidean
norm ‖‖ 2 of is given by(∑∈[]  2)1/2 and themax norm ‖‖ ∞ is done by max{|  | ∶  ∈ []} ,
where| ⋅ | indicates the absolute value. Given a ,se()t
denotes thpeower set of .</p>
          <p>Conventionally, we freely identify decision problems with their associated languages. We
write1∗ (as a regular expression) for the set of strings of th1e ffoorrmany ∈ ℕ . For
convenience, we define10 to be thempty string  . Let1+ denote the se1t∗ − {} . Similarly, we
use the notatio0n∗ for{0 ∣  ∈ ℕ} with00 =  .</p>
          <p>Given a positive intege r, the unary representation of  is of the form1 (viewed as
a string) compared to its binary representation.</p>
          <p>Notice that the l1engisthexoafctly
 rather tha(n log( + 1)) , which is the length of the binary representatio.nAo
ffinite series( 1,  2, … ,   ) of positive integers is expressed by tmhueltiple unary
representation of the form(1 1, 1 2, … , 1  ).</p>
          <p>When such an instanc e =
(1  1, 1 2, … , 1  ) is given
to a machine, we explicitly assume thahtas the form o1f 1#1 2# ⋯ #1  with a
designated separator symbo#l. For a series of such instan ces= ( 1,  2, … ,   ) with  =
(1 1 , 1 2 , … , 1   ) for ∈ []</p>
          <p>and   ∈ ℕ+, we further assume thattakes the form of
1 11#1 12# ⋯ #1 1 1 ##1 21#1 22# ⋯ #1 2 2 ## ⋯ ##1 1 #1 2 # ⋯ #1   . Moreover, for any positive
integer of the fo rm=  ⋅ 2  for nonnegative integ erasnd , a shift-unary representation 2
of is a pair[1 , 1 ], which is diferent from the unary representat1ioonf . The length of
[1 , 1 ] is ( + )</p>
          <p>but no t . We also use amultiple shift-unary representation , which has the
form [[1 1, 1 1], [1 2, 1 2], … , [1  , 1  ]] with the condition th2 a+t1 &gt;   2  for all∈ [ − 1] .</p>
          <p>This form represents the numb∑e r=1   ⋅ 2  . We intend to call an input integer by the name
of its representation. For this purpose, we call the expr1esasniodn[1 , 1 ] theunary-form
(positive) integer (or more succinctly, thunearized (positive) integer) and theshift-unary-form
(positive) integer, respectively.</p>
          <p>To deal with “general” integers, including zero and negative integers, however, we intend to
express such an integeras a unary string by applying the following special encoding function
⟨⋅⟩. Let⟨⟩ = 1 if = 0 ; ⟨⟩ = 2 if &gt; 0 ; and⟨⟩ = 2|| + 1
if &lt; 0 . We define the general unary
(numeral) representation of as 1⟨⟩ . In a similar way, ageneral shift-unary representation
of−
for &gt; 0 is defined as a pair of the for[m1⟨−⟩ , 1⟨⟩ ], where and in ℕ must satisfy=  ⋅ 2 
.
2.2. Turing Machines and Log-Space Reductions
Our interest mostly lies on space-bounded computation. As a basic machine model, we thus use
deterministic/nondeterministic Turing machines (or DTMs/NTMs, for short), each of which is
equipped with a read-only input tape, a rewritable work tape, and (possibly) a w3rite-once
output tape.</p>
          <p>The notation L (resp., NL) denotes the collection of all decision problems solvable on DTMs
(resp., NTMs) in polynomial time using logarithmic space (or log space, for short). A function
resources of running machines.
must move to the next blank cell.
2Unlike the unary and binary representations, a positive integer in general has more than one shift-unary
representation. In most applications, the choice of such representations does not significantly afect the computational
3A tape is callewdrite-once if its tape head never moves to the left and, whenever it writes a non-blank symbol, it
 fromΣ∗ toΓ∗ for two alphabeΣtsandΓ is computable in log space if there is a DTM such that,
on input , it produce s()</p>
          <p>
            on a write-once output tape||in(
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) time and( log||) space.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>The notation FL refers to the class of all such functions.</title>
      <p>Let 1 and 2 denote two arbitrary languages. We sa y t1 hisaLt-m-reducible to  2 (denoted
 1 ≤L  2) if there exists a functio(ncalled a reduction function) in FL such that, f o,r any
 ∈ 
1 if  () ∈</p>
      <p>2. Given a language family, the notation LO( G) denotes the family of all
and (ii)( 2( 1),  2( 2), … ,  2(  )) = 1, where 2() = 1 if
with  ∈ Σ∗ for any index∈ []
 ∈  2 and 2() = 0 otherwise.</p>
      <p>produces a tupl(e1  1 , 1  2 , … , 1   ) such that ( 1)</p>
      <p>
        Before solving a given problem on an inp(1u t1, 1 2, … , 1  ) of unary-form numbers, it is
often useful to sort all entr(ie1s,  2, … ,   ) of this input. Let us define the functi o n
making the following behavior: on input of the(1fo1r,1m 2, … , 1  ) with 1,  2, … ,   ∈ ℕ+,
1 ≥   2 ≥ ⋯ ≥   and (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) if
      </p>
      <p>
        =  
 with
 ≠   , then  &lt;   holds. Condition (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is a useful property for one-way finite automata.
      </p>
      <p>There
is
an
occasion
where,
for
a
set
of
shift-unary-form
integers
[1 1, 1 1], [1 2, 1 2], … , [1  , 1  ], we wish to compute the sum =

∑=1  1 ⋅ 2  and output
the binary representation oinf the reverse order. The nota ti on denotes the function
that computes this va l u.eThe following lemma is useful.</p>
      <p>Lemma 2.1 The functions  
and</p>
      <p>are both in FL.</p>
      <p>Those functions will be implicitly used for free when solving combinatorial problems in the
subsequent sections.</p>
      <sec id="sec-3-1">
        <title>2.3. Multi-Counter Pushdown Automata</title>
        <p>A one-way determinsitic/nondeterminitic pushdown automaton (or a 1dpda/1npda, for short) is
another computational model with a read-once input tape and a standard (pushdown) stack
whose operations are restricted to the topmost cceoluln. teAr is a FILO (first in, last out)
memory device that behaves like a stack but its alphabet consists only of a “single” symbol,
say, 1 except for the bottom mark⊥e.rA one-way nondeterministic  -counter automaton (or a
counter 1ncta) is a one-way nondeterministic finite automaton (1nfa) equippedcowuintthers.
We write 1 NCA to denote the family of all languages recognized by appro-pcroiautneter
1ncta’s running in polynomial time. We further expa nCdA1Nto 1NPD CA by supplementing
 counters to 1npda’s. These specific machines are calolneed-way nondeterministic  -counter
pushdown automata (or 1npdcta’s). When tape heads of multi-counter automata and pushdown
automata are allowed to move in all directions, we call such polynomial-time machines by
2ncta’s and 2npdcta’s, respectively. With the use of these 2ncta’s and 2npdcta’s, we respectively
obtain 2 NCA and 2NPD CA.</p>
        <p>An alternating machine must use two groups of inner states: existential states and universal
states. We are concerned with the number of times that such a machine switches between
existential and universal inner states. When this number is upper-bou n(d e≥d0by) along
all computation path s ofon any inpu t , the machine is said to have at mo+s1t alternations.
For any ≥ 1 , the complexity clas1sΣ PDCA (resp., 2Σ PDCA) is composed of all languages
recognized byone-way (resp., two-way) alternating 1-counter pushdown automata running in
polynomial time with at mo stalternations starting with existential inner states. Note that
1Σ1PDCA coincides with 1NPDCA.</p>
        <p>The notion ofturns was studied initially by Ginsburg and Span5i]e.r T[urn-restricted
counter automata were calrelveedrsal bounded in the past literature. A 1ncta is samidakteo
a turn along a certain accepting computation path if the stack height (i.e., the size of stack’s
content) changes from nondecreasing to decreasing exactly o1n-tcuer.n A1ncta is a 1ncta
that makes at most one turn during each computation. We add the prefix “1t” to express the
restriction that every underlying machine makes at most one turn. For example, we write
1t1NCA when all underlying 1ncta’s in the definition of 1NCA are 1-turn 1ncta’s. Similarly,
we define, e.g., 1t2NPDCA and 1t2Σ PDCA by requiring all stacks and counters to make at
most one turn. It follows that⊆RE1Gt1NCA⊆ 1NCA ⊆ CFL, where REG (resp., CFL) denotes
the class of all regular (resp., context-free) languages. Notice=th1NatPDC.FILt also follows
that L⊆ LOG(1t1NCA) ⊆ LOG(1NCA) = NL. Conventionally, we write LOGCFL instead of
LOG(CFL).</p>
        <p>
          Lemma 2.2 For any  ≥ 1 , 2N CA ⊆ NL, 2NPD CA ⊆ LOGCFL, and 2Σ2PD CA ⊆ NP.
Proof Sketch. For any index ∈ ℕ +, we define 2Σ AuxPDATI,SP((), ()) to be the
collection of all decision problems solvabtlweob-yway alternating auxiliary pushdown automata
running within tim(e) using space at most() with at most alternations starting with
existential inner states. Wh=en1 , such machines are succinctly cal2laeudx-npda’s, which
will be used in the proof of Proposit2.i3o.nIt is known tha2tΣ1AuxPDATI,SP( (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) , ( log))
coincides with LOGCFL6[] and2Σ2AuxPDATI,SP( (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) , ( log)) coincides with NP7[].
Moreover, it is possible to simulate the polynomial time-bounded behav iocrosuonfters using an
( log) -space bounded auxiliary work tape. From these facts, the lemma follows immediately.
2
Proposition 2.3 NL = 2N4CA and LOGCFL = 2NPD3CA.
        </p>
        <p>
          Proof Sketch. Following an argument of Mins8k]y, g[iven a log-space NTM (or a log-space
2aux-npda), we first simulate the behavior of(anlog) -space auxiliary work tape by two
stacks whose alphabets are of the f{o0,r1m, ⊥}. Since the heights of such stacks are
upperbounded by( log) , the stacks can be further simulated by multiple counters whose heights
are all(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) -bounded. Let denote the obtained 2ncta (or 2npdcta) running in polynomial
time.
        </p>
        <p>
          We remark that Minsky’s method of reducing the number of counters down to two does not
work for machines with few computational resources. Thus, we need to seek other methods.
For this purpose, we review the result9]o, fw[hich makes it possible to simulate two counters
by one counter with the heavy use of an appropriately defined “pairing” function.
Claim 1 [9] There exists a fixed deterministic procedure by which any single move of push/pop
operations on two counters of  can be simulated by a series of  (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) push/pop operations on one
counter with the help of 3 extra counters. These 3 extra counters are emptied after each simulation
and thus they are reusable for any other purposes. If a stack is further available, then one extra
counter can be simulated by this stack.
        </p>
        <p>The recursive applications of this simulation procedure eventually reduce the number of
counters down to four. If we freely use a stack during the procedure, then we can further
reduce the number of counters down to three.</p>
        <p>The first part of the proposition then follows by combining the above claim with2.L2e.mma
If we use one counter as a stack, then we can further reduce 4 counters to 3 counters. This
proves the second part of the proposition. 2
3. Combinatorial Number Problems
We study the computational complexity of decision problems whose input instances are
composed of unarized positive integers.
3.1. Variations of the Unary 0-1 Knapsack Problem
The starting point of our study on the computational analyses of decision problems with
unarized integer inputs is tuhneary 0-1 knapsack problem, which was introduced in 1985 by Cook
[2] as a unary analogue of tkhneapsack problem.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Unary 0-1 Knapsack Problem (UK):</title>
      <p>∘ Instance: (1 , 1 1, 1 2, … , 1  ), where ∈ ℕ + and,  1,  2, … ,   are all positive integers.
∘ Question: is there a subse tof[] satisfying∑∈   =  ?</p>
      <p>It seems more natural to view UK as a unary analogue osufbtsehtesum problem, which is
closely related to t2-hpeartition problem. Let us consider a unary analogue of this 2-partition
problem.</p>
    </sec>
    <sec id="sec-5">
      <title>Unary 2 Partition Problem (U2PART):</title>
      <p>
        ∘ Instance: (1 1, 1 2, … , 1  ), where ∈ ℕ + and 1,  2, … ,   are all positive integers.
∘ Question: is there a subse tof[] such tha∑t∈   = ∑∈    , where = [] −  ?
The original knapsack problem and the subset sum problem are both proven in 1972 by Karp
[10] to be NP-complete. The problems UK and U2PART, in contrast, situated within NL.
Lemma 3.1 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) UK is in 1t1NCA. (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) U2PART is in both 1NCA and 1t1N2CA.
      </p>
      <p>We further introduce two variants of UK and U2PART, called AmbUK and UASubSum as
follows.</p>
      <p>Ambiguous UK Problem (AmbUK):
∘ Instance: ((1 1, 1 2, … , 1  ), (1 1, 1 2, … , 1  )),</p>
      <p>1,  2, … ,   ,  1,  2, … ,   are all positive integers.
∘ Question: are there an ind e∈x []
where , 
∈
ℕ</p>
      <p>+ and
and a subse t of[] satisfyin g = ∑∈   ?</p>
    </sec>
    <sec id="sec-6">
      <title>Unary Approximate Subset Sum Problem (UASubSum):</title>
      <p>∘ Instance: ((1 1, 1 2), (1 1, 1 2, … , 1  )), where ∈ ℕ + and 1,  2,  1,  2, … ,   are positive</p>
      <p>
        ∘ Question: is there a subse tof[] such that1 ≤ ∑∈   ≤  2?
Lemma 3.2 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) AmbUK is in 1t1NCA. (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) UASubSum is in 1t1N2CA.
      </p>
      <p>Under two diferent types of log-space reductions, the computational complexities of</p>
    </sec>
    <sec id="sec-7">
      <title>U2PART, AmbUK, and UASubSum are all equal to that of UK.</title>
      <p>is odd, then we se (t)
 () = (1  , 1 1, … , 1  ).</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) It is obvious that UK≤L
Proof Sketch.
and le t=
entry +1 =  − 2
Proposition 3.3 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) UK ≡L U2PART. (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) UK ≡L AmbUK . (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) UK ≡L UASubSum.
that UK≤L U2PART by constructing an L-m-reduction func t.ioLnet = (1  , 1 1, … , 1  )
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) We begin with showing that U≡KL U2PART. Our first goal is to prove
      </p>
      <p>∑∈[]   . (a) If = /2 , then we set() =</p>
      <p>. (b) If  &lt; /2 , then we add a new
and set () = (1  1, … , 1  , 1 +1 ). (c) If &gt; /2 , then we exchange between
 and −  and apply (b). Our second goal is to show that U2P≤ALRTUK. Lettin g=
to be any fixed rejected input. Otherwise, we s=e t/2
∑   , if
and define
stance of AmbUK. We define an L-tt-reduction functioans () = (
Next, we show that AmbUK≤L UK. Let = ((1  1, 1 2, … , 1  ), (1 1, 1 2, … , 1  )) be any
in1(), 
2(), … ,   ()) ,

where  () = (1   , 1 1, … , 1  ). Clearly, belongs to FL. We also define a truth ta blaes
( 1,  2, … ,   ) = ⋁=1   . It then follows t h∈at AmbUK if there exists an inde x∈ []
for
which  () ∈</p>
      <p>UK if (
1(),</p>
      <p>2(), … ,   ()) = 1 . Therefore, AmbUK≤L UK follows.</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) To show that UK≤L UASubSum, it sufices to set  1 =  2 =  and define the desired
reduction functi onto map(1 , 1 1, … , 1  ) to((1 1, 1 2), (1 1, … , 1  )). On the contrary, we wish
to verify that UASubSu≤m
      </p>
      <p>L UK. Let = ((1  1, 1 2), (1 1, … , 1  )) be any input to UASubSum.</p>
      <p>AmbUK by setting = 1
in the definition of AmbUK.
since  ∉
ifne 
us define  +
 () = (1 
 () ∈</p>
      <p>If 1 =  2, then the reduction is trivial. In the ca1se&gt;o f2, it sufices to define  () = (1, 1</p>
      <p>
        UASubSum. In what follows, we assume t h1at&lt;  2. For any ⊆ [] , we
de = ∑∈   . If  []
&lt;  1, then we construc(t) = (
        <xref ref-type="bibr" rid="ref1 ref12">1, 1
2</xref>
        ), which is obviously not in
UASubSum. If  1 ≤  [] ≤  2, then we define  = (
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ) . Next, we assume tha t2 &lt;  [] . Let
 , 1 1, 1 2, … , 1  , 1 +1 , 1 +2 , … , 1 + 2− 1+1). This concludes tha∈t UASubSum if
=  []
+  − 1 for any ∈ [ 2 −  1 + 1] and le t
=  2 +  [] . We then set
2
)
2
      </p>
      <p>Jenner [4] studied a variant of UK, which we intend to callsbhyift-tuhnaery 0-1 knapsack
problem (shift-UK) in order to signify the use of the shift-unary representation. She proved that
this problem is actually NL-complete.</p>
    </sec>
    <sec id="sec-8">
      <title>Shift-Unary 0-1 Knapsack Problem (shift-UK):</title>
      <p>∘ Instance: [1 , 1 ] and a series([1 1, 1 1], [1 2, 1 2], … , [1  , 1  ]) of nonnegative integers
represented in shift-unary, whe r, e 1,  2, … ,   are all positive integers a,n1d,  2, … ,  
are all nonnegative integers.
∘ Question: is there a subse tof[] such tha∑t∈   2  = 2  ?</p>
      <p>In a similar way, we can define the shift-unary representation versions of AmbUK,
UASubSum, and U2PART, denoted by shift-AmbUK, shift-UASubSum, and shift-U2PART,
respectively.</p>
      <p>Lemma 3.4 The problem shift-UK is in 1N6CA.</p>
      <p>Proposition 3.5 shift-UK ≡L shift-U2PART ≡L shift-AmbUK ≡L shift-UASubSum.
can be similarly handled.</p>
      <p>We abbreviate the se{sthift-U2PART,shift-AmbUK, shift-UASubSum} as  .</p>
      <p>It is easy to obtain, by modifying the proof of Propos3i.t3i,otnhat shift-UK≤L  for any
 ∈  . To show that≤ L shift-UK for an y∈  , it sufices to show tha t belongs to
NL because the L-m-completeness of shift-U4K] g[uarantees that≤ L shift-UK. In the
case of =</p>
      <p>shift-UASubSum, we consider the following algorithm. On input of the form
(([1 1, 1 1], [1 2, 1 2]), ([1 1, 1 1], … , [1  , 1  ])), we nondeterministically choose a num ∈be[r]
and indice s1,  2, … ,   ∈ [] and check th at12 1 ≤ ∑∈   2  ≤  22 2. Note that, by Lemma2.1,
the sum∑∈   2  can be computed using only log space. Hen cei,s in NL. The other cases
given as a set of pairs
2
2</p>
    </sec>
    <sec id="sec-9">
      <title>From Proposition3.5, since shift-UK is NL-complete under L-m-reductio4n],sw[e immediately obtain the following corollary.</title>
      <p>Corollary 3.6 The problems shift-U2PART, shift-AmbUK , and shift-UASubSum are all
NLcomplete.</p>
      <p>For later references, we introduce another variant of UK. This variant requires a prohibition
of certain successive choices of unarized integer inputs.</p>
      <p>UK with Exception (UKEXC):
∘ Instance: (1 , 1 1, 1 2, … , 1  ) and  ⊆ {(, ) ∣ ,  ∈ [],  &lt; }</p>
      <p>(1 , 1 ), where ∈ ℕ + and,  1,  2, … ,   are inℕ+.
∘ Question: is there a subse t= { 1,  2, … ,   } of[] with ∈ ℕ + and 1 &lt;  2 &lt; ⋯ &lt;  
such that (i∑) ∈   =  and (ii) no ∈ [ − 1] satisfies ( ,  +1 ) ∈  

?
Note that, wh e n= ∅</p>
      <p>, UKEXC is equivalent to UK.</p>
      <p>Lemma 3.7 UKEXC is in 2N3CA.
choice, say,1  satisfies (, )</p>
      <p>∉  
pop 1  for the chosen indic e.s</p>
      <p>We nondeterministically cho1o seby reading an input from left to right. We
use two counters to remember the in d(ienxthe form o1f ) for checking that the next possible
. The third counter is used to st1oraend then sequentially
We also introduce another variant of UK, which concerns simultaneous handling of input
Simultaneous Unary 0-1 Knapsack Problem (SUK):
∘ Instance: (1 1, 1 11, 1 12, … , 1 1 ), … , (1  , 1 1 , 1 2 , … , 1  ), where,  ∈ ℕ
+ and  and
  ( ∈ [],  ∈ []</p>
      <p>) are all positive integers.
∘ Question: is there a subse t⊆ [] such tha∑t∈ 
 =   for all indice∈s [] ?</p>
      <p>The complexity class 11Σt2PDCA is the one-way restriction ofΣ21PtD2CA.</p>
      <p>Lemma 3.8 The problem SUK is in 1t1Σ2PDCA.</p>
      <p>To recognize SUK, let us consideronae-way alternating counter
pushdown automaton (or a 1apdcta) that behaves as follows.</p>
      <p>Given an inpouftthe form
(1 1, 1 11, 1 12, … , 1 1 ), … , (1  , 1 1 , 1 2 , … , 1  ), we call each segmen(t1  , 1 1 , 1 2 , … , 1  ) of
 by the th block of .</p>
      <p>In existential inner states, we first choose a st∈ri{n0,g1} ∗ and push it into a stack, where
 =  1 2 ⋯   indicates that, for an∈y[] , we select th eth entry from every block exactly
when  = 1. Let</p>
      <p>= { ∈ [] ∣   = 1}. In universal inner states, we then check whether
  = ∑∈ 

 holds for al∈l [] . This last procedure is achieved by first stor1i nginto a
counter. As popping the valu esone by one from the stack, ∈if  , then we decrease the
block(1 1 , … , 1  ) of is finished, if the stack is empty and the counter beco0m, etshen we
counter b y  . Otherwise, we do nothing. When either the stack gets empty or the assigned
accept ; otherwise, we reje ct. Note that the stack and the counter make only 1-turns and
the input-tape head moves only in one direction.
2
and1 for ∈ ℕ +</p>
      <p>.
  
1 
2
⋯  
 =   
1 
2
⋯   ?</p>
      <p>3.2. Unary Bounded Correspondence Problem
We turn our attention tobtohuneded Post correspondence problem (BPCP), which is a
wellknown problem of determining whether, given a{(s

e, t
number ≥ 1 , a certain sequenc(e1,  2, … ,   ) of elements in[]
)}∈[]</p>
      <p>of binary string pairs and a
with ≤  satisfies 
 
1 
2
⋯    =
and  by unary strings, we obtain the following “unary” variant of PCP.
  
1 
2
⋯  

. This problem is known to be NP-complet1e1][. When we replace binary stri ngs</p>
    </sec>
    <sec id="sec-10">
      <title>Unary Bounded Correspondence Problem (UBCP):</title>
      <p>∘ Instance: (( 1,  1), ( 2,  2), … , (  ,   )) for unary strin gs1,  2, … ,   ,  1,  2, … ,   ∈ 1+
∘ Question: is there a sequenc(e 1,  2, … ,   ) of elements in[] with ∈ [] satisfying
∑∈
|  | = ∑∈</p>
      <p>|  |, where|  | and|  | mean the lengths of stringasnd  , respectively.</p>
      <p>Since  and  are unary strings, the above require men⋯t  
1
 =  
1
⋯    is equivalent to
Lemma 3.9 UBCP belongs to 1t1N2CA.</p>
      <p>Proposition 3.10 UK ≤L UBCP ≤L AmbUK .</p>
      <p>Proof Sketch.</p>
      <p>L</p>
      <p>Here, we only show the last reduction UB≤CP AmbUK. Let  =
(( 1,  1), … , (  ,   )) be any instance to UBCP. Assume that, for a∈n[y] ,   = 1  and  = 1 
for certain number s,   ∈ ℕ+. Let =
max{∑∈[]   , ∑∈[]
  }. Note tha|t|≤
∑∈   ≤  and
|| ≤</p>
      <p>∑∈   ≤  for any ⊆ [] . We then se t =  − (  −   ) for eac h∈ [] . We remark that
∑∈   = || − (
∑∈   − ∑∈   ) ≥ || − ( − ||) = (|| − 1) + || ≥ 0
for any nonempty
subset of[] . If  ∈</p>
      <p>UBCP, then there is a nonempty se⊆t [] such that∑∈   = ∑∈   ,
that is∑,∈ (  −   ) = 0. It then follows th∑a∈t 
 = || .</p>
      <p>We also check i∑f∈[]   = ∑∈[]   or if 
0
=   0 for a certain inde0x∈ [] . If this is true,
then we know tha=t []
or{ 0}. Otherwise, we se t =  ⋅ 
for eac h∈ [2,  − 1] ℤ and then
define  = ((1  2, 1 3, … , 1 −1 ), (1 1, 1 2, … , 1  )). It follows th a∈t UBCP if  ∈ AmbUK.
2
Corollary 3.11 UK ≡L UBCP.</p>
      <sec id="sec-10-1">
        <title>4. Graph Problems</title>
        <p>We look into decision problems that are related to graphs, in particular, weighted graphs in
which either vertices or edges are labeled with “weights”. Here, we study the computational
complexity of these specific problems.</p>
        <p>We begin with edge-weighted path problems, in which we search for a simple path whose
weight matches a target unarized number, which is given in unary. We consider, in particular,
directed acyclic graphs (or dags) whose edges are further labeled with weights, which are given
in unary.</p>
        <p>For the purpose of this work, a da=g
( , )
given as part of inputs to an
underlying machine is assumed to satisfy thaits a subset ofℕ+, e.g.,  = { 1,  2, … ,   } for
 1,  2, … ,   ∈ ℕ+. We also use the following specific encoding o.f Given a verte x, we
write[]
When []
for the set of all adjacent vertices enterin g, nfraommely, { ∈  ∣ (, ) ∈ }
.</p>
        <p>equals{ 1,  2, … ,   } with 1 &lt;  2 &lt; ⋯ &lt;   , we express it in the “multi-unary”
((1 1, 1  1,1, 1  1,2, … , 1  1, 1 ), … , (1  , 1   ,1, 1   ,2, … , 1</p>
        <p>form of(1 , 1 1, 1 2, … , 1  ). The unary adjacency list representation  
 1 &lt;  2 &lt; ⋯ &lt;   and[  ] = {   ,1,    ,2, … ,  
 ,  } with
  ,1 &lt;    ,2 &lt; ⋯ &lt;  
 ,</p>
        <p>for any ∈ [] .
 ,  )) with  ∈ ℕ if  = { 1,  2, … ,   } with
 of  is of the form
Edge-Weighted Path Problem (EWPP)
∘ Instance: a dag = ( , )</p>
        <p>with ⊆ ℕ + given in the form o f
given as1 , edge weights(, ) ∈ ℕ
+ given as1(,)</p>
        <p>for all edge(s,) ∈  , and1 with
 ∈ ℕ +, provided that edges are enumerated according to the linea&lt;r[]o.rder
∘ Question: is there a vert ex∈  such that the total edge weight of a pathtforom
 , a vertex ∈ 
In comparison, thgeraph connectivity problem for directed “unweighted” graphs (DSTCON)
When each edge weight 1is,the total weight of a path is the same as the length of the path.
This fact makes us introduce another decision problseimnk. Aof a directed graph is a vertex
is known to be NL-complete12[].</p>
        <p>Lemma 4.1 EWPP is in NL.
of outdegre0e in the graph.</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Exact Path Length Problem (EPLP)</title>
      <p>∘ Instance: a dag = ( , )
1 with ∈ ℕ +.</p>
      <p>with ⊆ ℕ + given as 
 , a verte x∈  given as1 , and
∘ Question: is there a sink of such that a path fromto has length exact l?y
Proposition 4.2 EWPP ≡L EPLP.</p>
      <p>Firstly, we show that EPL≤PL EWPP. Given an instance= (, , 1
 ) of
, we define another instance, sa y,of EWPP as follows. For every leaf
 of  , we add a new verte x̄ and a new edge(, )̄
to and obtain the new vertex  se′t
and the new edge s et′. Consider the resulting gr ap′h= ( ′,  ′). Let = | ′|. We define
(, ) = 1
for all pair(s,) ∈</p>
      <p>and additionally we s(e, t)̄ =  + 1
Let ′ =  +  + 1 . We define  = ( ′, {()} ∈ ′, 1 ′). We want to verify that (∈*) EPLP if
for any old lea∈f  .
 ∈ EWPP.</p>
      <p>To prove (*), let us assume tha∈t EPLP. We then take a lengthpa-th = ( 0,  1, … ,   ) of
 with 0 =  and  is a leaf. Conside rand (+) = ( 0,  1, … ,   ,   ̄ ). The total weight o(+f)
in  ′ is  + (</p>
      <p>,   ̄ ) =  +  + 1 =  ′. Hence, is in EWPP. Conversely, assume tha∈t EWPP
 = |
′|,  must include a leaf. Hence,must be  −̄1 . Moreover,− 1 = 

and consider a pat h= ( 0,  1, … ,   ) of ′ with 0 =  satisfying∑=0 (  ,  +1 ) =  ′. Since
follows. The path
 (−) = ( 0,  1, … ,  −1 ) is a path fro m to a leaf o f and its length is exact.lyThis implies
tha t∈</p>
    </sec>
    <sec id="sec-12">
      <title>EPLP.</title>
      <p>Secondly, we show that EWPP≤L</p>
      <p>EPLP. Let  = (, , {()}
stance of EWPP.</p>
      <p>We construct an instance of EPLP as follows.
with (, )
=
1
 , we introduc e + 1
extra vertice{s, ̄
∈ , 1 ) be any
in</p>
      <p>Fo(r, )ea∈ch
1′,  2′, … ,  ′} and extra edges
{(, 
1′), ( 1′,  2′), … , (</p>
      <p>′,  +′1 ), ( ′, ), ( ′, )̄ ∣  ∈ [ − 2]} . Those edges form two paths from
to and to ̄ of length exact l.yNotice tha t̄becomes a new leaf. L et′ and ′ denote the
extended sets of and , respectively, and s et′ = ( ′,  ′). For the instan ce= ( ′, , 1  ), it
is possible to prove tha∈t EWPP if  ∈ EPLP.</p>
    </sec>
    <sec id="sec-13">
      <title>We then obtain the following NL-completeness result.</title>
      <p>Proposition 4.3 EWPP and EPLP are both L-m-complete for NL.
2
if
2
(</p>
      <p>, 1 , 1||+2 ) ∈ EPLP.</p>
      <p>Proof Sketch.</p>
      <p>Here, we wish to prove (*≤) L EPLP for any langua gein 1NCA. If this is
true, then all languages in NL are L-m-reducible to EPLP sin(c1eNLCOAG) = NL. Moreover,
since EWPP belongs to NL by Lemma4.1, EPLP is also in NL. Therefore, EPLP is L-m-complete
for NL. Since EWPP≡L EPLP by Proposition4.2, we also obtain the NL-completeness of</p>
    </sec>
    <sec id="sec-14">
      <title>EWPP.</title>
      <p>To show the statement (*), let us take any 1ncatnad consider surface configurations of
on input . Note that, since surface configurations have(silzoeg||) , we can express them
as unary-form positive integers. Between two surface configurations, we define a single-step
transition relat⊢io n. We then define a computation grap h = (  ,   ) of
on the input
 . The vertex set is composed of all possible surface configuration s oofn  . We further
define   to be the set of all pa(ir1s, 2) of surface configurations satisfyin1g⊢  2. The
root of  is set to be the initial surface configuration. oItfthen follows th∈at()</p>
      <p>
        Let us argue how EWPP is related to UKEXC and UK. To see the desired relationships,
we introduce two restricted variants of EWPP. We say th at= a( , d)ag
with ⊆ ℕ + is
topologically ordered if, for any two vertic,e∈s 
, (, ) ∈ 
implies &lt;  . We define TO-EWPP
as the restriction of EWPP onto instances that are topologically orde r=ed(., )A dagis
edge-closed if, for any three vertic,e,s∈ 
, (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (, ) ∈ 
and(, ) ∈ 
imply (, ) ∈ 
and (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(, ) ∈ 
and(, ) ∈ 
imply either(, ) ∈ 
or(, ) ∈
      </p>
    </sec>
    <sec id="sec-15">
      <title>TO-EWPP whose instance graphs are all edge-closed.</title>
      <p>
        Proposition 4.4 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) TO-EWPP ≡L UKEXC. (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) EC-EWPP ≡L UK.
. We write EC-EWPP for
implies UKEXC ≤
      </p>
      <p>L TO-EWPP.
(, , {1
()</p>
      <p>}∈ , 1 ) with = ( , )
TO-EWPP. Given an instance = ((1  , 1 1, … , 1  ),  )
sociated instance, sa y,of TO-EWPP as follows. We then defin e= {,</p>
      <p>
        In what follows, we focus only on (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). We first show that UK≤ELXC
of UKEXC, we construct an
as1,  2, … ,   } and
 = {(  ,   ) ∣ ,  ∈ [],  &lt; , (, )
∉  } ∪ {(, 
 ) ∣  ∈ []} . It follows tha=t ( , )
is
directed, acyclic, and topologically ordered. Furthermore, we define edge we(igh ,t s )a=s  
and (, 
 = (, {1
 ) = 1 for any(  ,   ), (,   ) ∈  . Finally, we set =  + 1 . Let us consider
()
}∈ , 1 ). It is possible for us to verify t h∈atUKEXC if  ∈ TO-EWPP. This
L
Conversely, we intend to verify that TO-EW≤PP
      </p>
    </sec>
    <sec id="sec-16">
      <title>UKEXC.</title>
      <p>Assume that
=
is any instance of TO-EWPP. An associated inst ance
of UKEXC is constructed as follows. Firstly, we assume tishatcyclic because, otherwise,
we conver t to an acyclic grap h′ = ( ′,  ′) by setting ′ = {((, ) ∣  ∈ [| |],  ∈  }
and ′ = {((, ), ( + 1, )) ∣  ∈ [| | − 1], (, ) ∈ }
. For simplicity, we further assume that
 = [2, ]
ℤ and  is vertex2. We define an encoding ⟨, ⟩
of two distinct verti,c e∈s []
as ⟨, ⟩ = ( − 1) +</p>
      <p>. We consider only a unique connected component incl udbiencgause
any other connected component is irrelevant. Hereafter, we assume that this connected
component contains all vertice s .inWe expand to ′ = ( ′,  ′) by settin g ′ =  ∪ {1} and
 ′(1, ) =  ∗ + 1 for any ∈ [2, ] ℤ, where ∗ = ∑(,)∈
(, )
.
 ′ =  ∪ {(1, ) ∣  ∈ [2, ]</p>
      <p>ℤ}. As for new weights, we set′(, ) = (, )
We further s et⟨,⟩
= (, )</p>
      <p>if (, ) ∈  . Moreover, let⟨1,⟩ =  ∗ + 1 for any ∈ [2, ] ℤ.</p>
      <p>For any other pai(r,) , the value⟨,⟩ is not defined. Let denote the set of a⟨l,⟩l ’s that are
defined. Assume that has the form{  1
We write for the se{t1,  2, … ,   }. The set 
sets: {(⟨, ⟩, ⟨ ′,  ′⟩) ∣ , , 
′,  ′ ∈ [], (⟨, ⟩ ≮ ⟨
,   2, … ,   } with ≤  2, where 1 &lt;  2 &lt; ⋯ &lt;   .</p>
      <p>is defined to be the union of the following
′,  ′⟩ ∨  ≠  ′ ∨  =  ′), (, ) ∈ , (
′,  ′) ∈ } ,
{(⟨, ⟩, ⟨ ′,  ′⟩) ∣ ,  ′, ,  ′ ∈ [], ⟨, ⟩ &lt; ⟨
′,  ′⟩, ((, ) ∉  ∨ (
′,  ′) ∉ )} , and{(⟨, ⟩, ⟨1,  ′⟩) ∣ , ,  ′ ∈
for any(, ) ∈  and
[2, ] ℤ}. Let =  +</p>
      <p>We define the desired instanc e as  = ((1  , 1  1 , 1  2 , … , 1  
),  )
. For this instan ce,
we can prove th at∈ TO-EWPP if  ∈ UKEXC.
2</p>
      <sec id="sec-16-1">
        <title>5. Lattice Problems</title>
        <p>Let us discuss lattice problemsl.aAttice is a set of integer linear combinations of basis vectors.
Here, we deal only with the case where bases are takenℤfrfoomr a certa in∈ ℕ +
. The
decision version of thcleosest vector problem (CVP) is known to be NP-complete13[]. We
then consider a variant of CVP. To fit into our setting of unary-form integers, a simple norm
notion of thmeax norm ‖ ⋅ ‖∞ from Section2.1. In a syntactic similarity, we further introduce
the notatio‖n‖ min to express mi n{|  | ∶  ∈ []}</p>
        <p>for any real-valued vecto=r( 1,  2, … ,   ).</p>
        <p>Notice tha‖t‖ min does not serve as a true “distance”. For conveni(enc1,e ,2, … ,   ) denotes
the lattice spanned by a given{se1,t 2, … ,   } of basis vectors.</p>
        <p>Unary Max-Norm Closest Vector Problem (UCVPmax):
∘ Instance: 1 for a positive integ e r, a tuple(1⟨  [1]⟩, 1⟨  [2]⟩, … , 1⟨  []⟩ ) for a set
{ 1,  2, … ,   } of lattice bases with =</p>
        <p>(  [1],   [2], … ,   []) ∈
(1⟨ 0[1]⟩, 1⟨ 0[2]⟩, … , 1⟨ 0[]⟩ ) for a target vec to0r= ( 0[1],  0[2], … ,  0[]) ∈ ℤ  .
ℤ  , and a tuple
∘ Question: is there a lattice vec toinr ( 1,  2, … ,   ) such that the max nor‖m−  0‖∞
is at mos t ?
In the above definition of UCVmPax, we replace‖ ⋅ ‖∞ by ‖ ⋅ ‖
and then obtain UCVmiPn.</p>
        <p>For simplicity, in what follows, we intend to w̄ froitre(1⟨[1]⟩ , 1⟨[2]⟩ , … , 1⟨[]⟩ ) if  =</p>
      </sec>
    </sec>
    <sec id="sec-17">
      <title>In a similar way to obtaining SUK from UK, we can introduce a variant of</title>
      <p>U2PART, called thseimultaneous unary 2 partition problem (SU2PART). It is possible to prove</p>
      <p>Let  = ( 1,  2, … ,   ) with  = (1 1 , 1 2 , … , 1  ) for any ∈ []
that SUK≤L SU2PART. It therefore sufices to verify that SU2PA≤RLT UCVPmax.
SU2PART. Let   = ∑∈[]   for each ∈ []
and set 
and  ∈ [] , we further s e t′ =  
  and  ′
=  
= max∈[]</p>
      <p>
        {  }. Given any
 . Let us define  vectors

 1,  2, … ,   as  1 = ( 1′1,  2′1, … ,  1′ , 2, 0, 0, … , 0),  2 = ( 2′1,  2′2, … ,  2′ , 0, 2, 0, … , 0), …,   =
( 1′ ,  2′ , … ,  ′ , 0, 0, 0, … , 0, 2). Moreover, we set0 = (⌊ 1′
/2⌋, ⌊ 2′/2⌋, … , ⌊ ′ /2⌋, 1, 1, … , 1) and
 = 1 . We then define  to be(1 ,  1̄,  2̄, … ,   ̄ ,  0̄). Clearly , is an instance of UCSmPax. It then
be any instance of
follows tha∈t U2PART if  ∈ UCVCmax.
2
Lemma 5.2 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) UCVPmax ∈ 1t2Σ2PDCA. (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) UCVPmin ∈ 1t2NCA.
      </p>
      <p>It is not clear that UCmVaxPbelongs to 1t2NPDCA or even P.</p>
      <p>Next, we look into another relevant problem, known sahsorttheset vector problem. We
consider its variant.</p>
      <p>Unary Max-Norm Shortest Vector Problem (USVPmax):</p>
      <p>of lattice bases w i th= (  [1],   [2], … ,   []) ∈ ℤ  .
∘ Instance: 1 with ∈ ℕ + and a tuple(1⟨  [1]⟩, 1⟨  [2]⟩, … , 1⟨  []⟩ ) for a set{ 1,  2, … ,   }
∘ Question: is there a “non-zero” lattice vectoinr ( 1,  2, … ,   ) such that the max
norm ‖‖ ∞ is at mos t ?</p>
      <p>Similarly, we can define USVPmin by replacing‖ ⋅ ‖∞ with‖ ⋅ ‖min. In a way similar to prove
Lemma 5.2, we can prove that USVmPax ∈ 1t2Σ2PDCA. Moreover, the following relations hold.
Lemma 5.3 USVPmin ≤L UCVPmin and USVPmax ≤L UCVPmax.</p>
      <p>We do not know if USVmPin ≡L UCVPmin and USVPmax ≡L UCVPmax.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Garey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Johnson</surname>
          </string-name>
          ,
          <article-title>Computers and Interactability: A Guide to the Theory of NP-</article-title>
          <string-name>
            <surname>Completeness</surname>
            ,
            <given-names>W. H.</given-names>
          </string-name>
          <string-name>
            <surname>Freeman</surname>
          </string-name>
          and Company, New York, NY,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Cook</surname>
          </string-name>
          ,
          <article-title>A taxonomy of problems with fast parallel algorithms</article-title>
          ,
          <source>Information and Control</source>
          <volume>64</volume>
          (
          <year>1985</year>
          )
          <fpage>2</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Huynh</surname>
          </string-name>
          ,
          <article-title>On a complexity hierarchy between L and NL</article-title>
          ,
          <source>Information Processing Letters</source>
          <volume>29</volume>
          (
          <year>1988</year>
          )
          <fpage>177</fpage>
          -
          <lpage>182</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Jenner</surname>
          </string-name>
          , Knapsack problems for NL,
          <source>Information Processing Letters</source>
          <volume>54</volume>
          (
          <year>1995</year>
          )
          <fpage>169</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ginsburg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. H.</given-names>
            <surname>Spanier</surname>
          </string-name>
          ,
          <article-title>Finite-turn pushdown automata</article-title>
          ,
          <source>SIAM Journal on Control</source>
          <volume>4</volume>
          (
          <year>1966</year>
          )
          <fpage>429</fpage>
          -
          <lpage>453</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I. H.</given-names>
            <surname>Sudborough</surname>
          </string-name>
          ,
          <article-title>On the tape complexity of determinsitic context-free languages</article-title>
          ,
          <source>Journal of ACM</source>
          <volume>25</volume>
          (
          <year>1978</year>
          )
          <fpage>405</fpage>
          -
          <lpage>414</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Jenner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kirsg</surname>
          </string-name>
          ,
          <article-title>Characterizing the polynomial hierarchy by alternating pushdown automata</article-title>
          ,
          <source>RAIRO-Theoretical Informatics and Applications</source>
          <volume>23</volume>
          (
          <year>1989</year>
          )
          <fpage>87</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Minsky</surname>
          </string-name>
          , Computation: Finite and
          <string-name>
            <given-names>Infinite</given-names>
            <surname>Machines</surname>
          </string-name>
          , Prentice-Hall, Englewood Clifs, NJ,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T.</given-names>
            <surname>Yamakami</surname>
          </string-name>
          ,
          <article-title>Strengths and weaknesses of nonuniform families of multi-counter pushdown automata of polynomial state-stack complexity</article-title>
          ,
          <source>Manuscript</source>
          ,
          <year>2023</year>
          .
          <article-title>Submitted to an international conference</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>R. M. Karp</surname>
          </string-name>
          ,
          <article-title>Reducibility among combinatorial problems</article-title>
          , in: R. E.
          <string-name>
            <surname>Miller</surname>
          </string-name>
          , J. W. T. (eds.) (Eds.), Complexity of Computer Computations, Plenum Press, New York, NY,
          <year>1972</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Constable</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. B. H.</given-names>
            <surname>III</surname>
          </string-name>
          , S. Sahni,
          <article-title>On the computational complexity of scheme equivalence</article-title>
          ,
          <source>Technical Report No. 74-201</source>
          , Depaerment of Computer Science, Cornell University,
          <year>1974</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N. D.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. E.</given-names>
            <surname>Lien</surname>
          </string-name>
          , W. T. Laaser,
          <article-title>New problems complete for nondeterministic log space</article-title>
          ,
          <source>Mathematical Systems Theory</source>
          <volume>10</volume>
          (
          <year>1976</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P. van Emde</given-names>
            <surname>Boas</surname>
          </string-name>
          ,
          <article-title>Another NP-complete partition problem and the complexity of computing short vectors in a lattice</article-title>
          ,
          <source>Technical Report No. 81-04</source>
          , Department of Mathematice, University of Amsterdam,
          <year>1981</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>