In computer science, the time complexity is the

^{1} matrix determinant calculation does), or alternatively have guaranteed assumptions on the input structure (as the logarithmic time

^{''c''}) time for all constants ''c'', where ''n'' is the input parameter, typically the number of bits in the input.
For example, an algorithm that runs for 2^{''n''} steps on an input of size ''n'' requires superpolynomial time (more specifically, exponential time).
An algorithm that uses exponential resources is clearly superpolynomial, but some algorithms are only very weakly superpolynomial. For example, the Adleman–Pomerance–Rumely primality test runs for time on ''n''-bit inputs; this grows faster than any polynomial for large enough ''n'', but the input size must become impractically large before it cannot be dominated by a polynomial with small degree.
An algorithm that requires superpolynomial time lies outside the complexity class P. Cobham's thesis posits that these algorithms are impractical, and in many cases they are. Since the P versus NP problem is unresolved, it is unknown whether NP-complete problems require superpolynomial time.

^{''n''''ε''}). The set of all such problems is the complexity class SUBEXP which can be defined in terms of

^{''o''(''n'')}. More precisely, the hypothesis is that there is some absolute constant such that 3SAT cannot be decided in time 2^{''cn''} by any deterministic Turing machine. With ''m'' denoting the number of clauses, ETH is equivalent to the hypothesis that ''k''SAT cannot be solved in time 2^{''o''(''m'')} for any integer . The exponential time hypothesis implies P ≠ NP.

^{poly(''n'')}, where poly(''n'') is some polynomial in ''n''. More formally, an algorithm is exponential time if ''T''(''n'') is bounded by ''O''(2^{''n''''k''}) for some constant ''k''. Problems which admit exponential time algorithms on a deterministic Turing machine form the complexity class known as ^{''O''(''n'')}, where the exponent is at most a linear function of ''n''. This gives rise to the complexity class E.
:$\backslash text\; =\; \backslash bigcup\_\; \backslash text\backslash left(2^\backslash right)$

^{2poly(''n'')}, where poly(''n'') is some polynomial in ''n''. Such algorithms belong to the complexity class

computational complexity
In computer science, the computational complexity or simply complexity of an algorithm is the amount of resources required to run it. Particular focus is given to computation time (generally measured by the number of needed elementary operations) ...

that describes the amount of computer time it takes to run an algorithm
In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...

. Time complexity is commonly estimated by counting the number of elementary operations performed by the algorithm, supposing that each elementary operation takes a fixed amount of time to perform. Thus, the amount of time taken and the number of elementary operations performed by the algorithm are taken to be related by a constant factor.
Since an algorithm's running time may vary among different inputs of the same size, one commonly considers the worst-case time complexity, which is the maximum amount of time required for inputs of a given size. Less common, and usually specified explicitly, is the average-case complexity, which is the average of the time taken on inputs of a given size (this makes sense because there are only a finite number of possible inputs of a given size). In both cases, the time complexity is generally expressed as a function of the size of the input. Since this function is generally difficult to compute exactly, and the running time for small inputs is usually not consequential, one commonly focuses on the behavior of the complexity when the input size increases—that is, the asymptotic behavior of the complexity. Therefore, the time complexity is commonly expressed using big O notation, typically etc., where is the size in units of bit
The bit is the most basic unit of information in computing and digital communications. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented ...

s needed to represent the input.
Algorithmic complexities are classified according to the type of function appearing in the big O notation. For example, an algorithm with time complexity $O(n)$ is a ''linear time algorithm'' and an algorithm with time complexity $O(n^\backslash alpha)$ for some constant $\backslash alpha\; >\; 1$ is a ''polynomial time algorithm''.
Table of common time complexities

The following table summarizes some classes of commonly encountered time complexities. In the table, , i.e., polynomial in ''x''.Constant time

An algorithm is said to be constant time (also written as $O(1)$ time) if the value of $T(n)$ (the complexity of the algorithm) is bounded by a value that does not depend on the size of the input. For example, accessing any single element in an array takes constant time as only oneoperation
Operation or Operations may refer to:
Arts, entertainment and media
* ''Operation'' (game), a battery-operated board game that challenges dexterity
* Operation (music), a term used in musical set theory
* ''Operations'' (magazine), Multi-Ma ...

has to be performed to locate it. In a similar manner, finding the minimal value in an array sorted in ascending order; it is the first element. However, finding the minimal value in an unordered array is not a constant time operation as scanning over each element
Element or elements may refer to:
Science
* Chemical element, a pure substance of one type of atom
* Heating element, a device that generates heat by electrical resistance
* Orbital elements, parameters required to identify a specific orbit of o ...

in the array is needed in order to determine the minimal value. Hence it is a linear time operation, taking $O(n)$ time. If the number of elements is known in advance and does not change, however, such an algorithm can still be said to run in constant time.
Despite the name "constant time", the running time does not have to be independent of the problem size, but an upper bound for the running time has to be independent of the problem size. For example, the task "exchange the values of and if necessary so that $a\; \backslash le\; b$" is called constant time even though the time may depend on whether or not it is already true that $a\; \backslash le\; b$. However, there is some constant such that the time required is always ''at most'' .
Here are some examples of code fragments that run in constant time:
int index = 5;
int item = list ndex
if (condition true) then
perform some operation that runs in constant time
else
perform some other operation that runs in constant time
for i = 1 to 100
for j = 1 to 200
perform some operation that runs in constant time
If $T(n)$ is $O(a)$, where is any constant value, this is equivalent to and stated in standard notation as $T(n)$ being $O(1)$.
Logarithmic time

An algorithm is said to take logarithmic time when $T(n)\; =\; O(\backslash log\; n)$. Since $\backslash log\_a\; n$ and $\backslash log\_b\; n$ are related by a constant multiplier, and such a multiplier is irrelevant to big O classification, the standard usage for logarithmic-time algorithms is $O(\backslash log\; n)$ regardless of the base of the logarithm appearing in the expression of . Algorithms taking logarithmic time are commonly found in operations onbinary tree
In computer science, a binary tree is a k-ary k = 2 tree data structure in which each node has at most two children, which are referred to as the ' and the '. A recursive definition using just set theory notions is that a (non-empty) binary t ...

s or when using binary search
In computer science, binary search, also known as half-interval search, logarithmic search, or binary chop, is a search algorithm that finds the position of a target value within a sorted array. Binary search compares the target value to the ...

.
An $O(\backslash log\; n)$ algorithm is considered highly efficient, as the ratio of the number of operations to the size of the input decreases and tends to zero when increases. An algorithm that must access all elements of its input cannot take logarithmic time, as the time taken for reading an input of size is of the order of .
An example of logarithmic time is given by dictionary search. Consider a dictionary
A dictionary is a listing of lexemes from the lexicon of one or more specific languages, often arranged alphabetically (or by radical and stroke for ideographic languages), which may include information on definitions, usage, etymologies, pr ...

which contains entries, sorted by alphabetical order. We suppose that, for $1\; \backslash le\; k\; \backslash le\; n$, one may access the th entry of the dictionary in a constant time. Let $D(k)$ denote this th entry. Under these hypotheses, the test to see if a word is in the dictionary may be done in logarithmic time: consider $D\backslash left(\backslash left\backslash lfloor\; \backslash frac\; \backslash right\backslash rfloor\backslash right)$, where $\backslash lfloor\backslash ;\backslash rfloor$ denotes the floor function. If $w\; =\; D\backslash left(\backslash left\backslash lfloor\; \backslash frac\; \backslash right\backslash rfloor\backslash right)$, then we are done. Else, if $w\; <\; D\backslash left(\backslash left\backslash lfloor\; \backslash frac\; \backslash right\backslash rfloor\backslash right)$, continue the search in the same way in the left half of the dictionary, otherwise continue similarly with the right half of the dictionary. This algorithm is similar to the method often used to find an entry in a paper dictionary.
Polylogarithmic time

An algorithm is said to run in polylogarithmic time if its time $T(n)$ is $O\backslash bigl((\backslash log\; n)^k\backslash bigr)$ for some constant . Another way to write this is $O(\backslash log^kn)$. For example, matrix chain ordering can be solved in polylogarithmic time on aparallel random-access machine
In computer science, a parallel random-access machine (parallel RAM or PRAM) is a shared-memory abstract machine. As its name indicates, the PRAM is intended as the parallel-computing analogy to the random-access machine (RAM) (not to be confus ...

, and a graph can be determined to be planar in a fully dynamic way in $O(\backslash log^3n)$ time per insert/delete operation.
Sub-linear time

An algorithm is said to run in sub-linear time (often spelled sublinear time) if $T(n)=o(n)$. In particular this includes algorithms with the time complexities defined above. Typical algorithms that are exact and yet run in sub-linear time use parallel processing (as the NCbinary search
In computer science, binary search, also known as half-interval search, logarithmic search, or binary chop, is a search algorithm that finds the position of a target value within a sorted array. Binary search compares the target value to the ...

and many tree maintenance algorithms do). However, formal language
In logic, mathematics, computer science, and linguistics, a formal language consists of words whose letters are taken from an alphabet and are well-formed according to a specific set of rules.
The alphabet of a formal language consists o ...

s such as the set of all strings that have a 1-bit in the position indicated by the first $\backslash log\; n$ bits of the string may depend on every bit of the input and yet be computable in sub-linear time.
The specific term ''sublinear time algorithm'' is usually reserved to algorithms that are unlike the above in that they are run over classical serial machine models and are not allowed prior assumptions on the input. They are however allowed to be randomized
In common usage, randomness is the apparent or actual lack of pattern or predictability in events. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. Individual rando ...

, and indeed must be randomized for all but the most trivial of tasks.
As such an algorithm must provide an answer without reading the entire input, its particulars heavily depend on the access allowed to the input. Usually for an input that is represented as a binary string $b\_1,\; ...,\; b\_k$ it is assumed that the algorithm can in time $O(1)$ request and obtain the value of $b\_i$ for any .
Sub-linear time algorithms are typically randomized, and provide only approximate
An approximation is anything that is intentionally similar but not exactly equal to something else.
Etymology and usage
The word ''approximation'' is derived from Latin ''approximatus'', from ''proximus'' meaning ''very near'' and the prefix ' ...

solutions. In fact, the property of a binary string having only zeros (and no ones) can be easily proved not to be decidable by a (non-approximate) sub-linear time algorithm. Sub-linear time algorithms arise naturally in the investigation of property testing.
Linear time

An algorithm is said to take linear time, or $O(n)$ time, if its time complexity is $O(n)$. Informally, this means that the running time increases at most linearly with the size of the input. More precisely, this means that there is a constant such that the running time is at most $cn$ for every input of size . For example, a procedure that adds up all elements of a list requires time proportional to the length of the list, if the adding time is constant, or, at least, bounded by a constant. Linear time is the best possible time complexity in situations where the algorithm has to sequentially read its entire input. Therefore, much research has been invested into discovering algorithms exhibiting linear time or, at least, nearly linear time. This research includes both software and hardware methods. There are several hardware technologies which exploit parallelism to provide this. An example iscontent-addressable memory
Content-addressable memory (CAM) is a special type of computer memory used in certain very-high-speed searching applications. It is also known as associative memory or associative storage and compares input search data against a table of stored ...

. This concept of linear time is used in string matching algorithms such as the Boyer–Moore algorithm and Ukkonen's algorithm.
Quasilinear time

An algorithm is said to run in quasilinear time (also referred to as log-linear time) if $T(n)=O(n\backslash log^kn)$ for some positive constant ; linearithmic time is the case $k=1$. Usingsoft O notation
Big ''O'' notation is a mathematical notation that describes the limiting behavior of a function when the argument tends towards a particular value or infinity. Big O is a member of a family of notations invented by Paul Bachmann, Edmund L ...

these algorithms are $\backslash tilde(n)$. Quasilinear time algorithms are also $O(n^)$ for every constant $\backslash epsilon\; >0$ and thus run faster than any polynomial time algorithm whose time bound includes a term $n^c$ for any $c>1$.
Algorithms which run in quasilinear time include:
* In-place merge sort, $O(n\backslash log^2n)$
* Quicksort, $O(n\backslash log\; n)$, in its randomized version, has a running time that is $O(n\backslash log\; n)$ in expectation on the worst-case input. Its non-randomized version has an $O(n\backslash log\; n)$ running time only when considering average case complexity.
* Heapsort
In computer science, heapsort is a comparison-based sorting algorithm. Heapsort can be thought of as an improved selection sort: like selection sort, heapsort divides its input into a sorted and an unsorted region, and it iteratively shrinks th ...

, $O(n\backslash log\; n)$, merge sort
In computer science, merge sort (also commonly spelled as mergesort) is an efficient, general-purpose, and comparison-based sorting algorithm. Most implementations produce a stable sort, which means that the order of equal elements is the same ...

, introsort
Introsort or introspective sort is a hybrid sorting algorithm that provides both fast average performance and (asymptotically) optimal worst-case performance. It begins with quicksort, it switches to heapsort when the recursion depth exceeds a le ...

, binary tree sort, smoothsort
In computer science, smoothsort is a comparison-based sorting algorithm. A variant of heapsort, it was invented and published by Edsger Dijkstra in 1981. Like heapsort, smoothsort is an in-place algorithm with an upper bound of , but it is not ...

, patience sorting
In computer science, patience sorting is a sorting algorithm inspired by, and named after, the card game patience. A variant of the algorithm efficiently computes the length of a longest increasing subsequence in a given array.
Overview
The alg ...

, etc. in the worst case
* Fast Fourier transform
A fast Fourier transform (FFT) is an algorithm that computes the discrete Fourier transform (DFT) of a sequence, or its inverse (IDFT). Fourier analysis converts a signal from its original domain (often time or space) to a representation in t ...

s, $O(n\backslash log\; n)$
* Monge array calculation, $O(n\backslash log\; n)$
In many cases, the $O(n\backslash log\; n)$ running time is simply the result of performing a $\backslash Theta\; (\backslash log\; n)$ operation times (for the notation, see ). For example, binary tree sort creates a binary tree
In computer science, a binary tree is a k-ary k = 2 tree data structure in which each node has at most two children, which are referred to as the ' and the '. A recursive definition using just set theory notions is that a (non-empty) binary t ...

by inserting each element of the -sized array one by one. Since the insert operation on a self-balancing binary search tree
In computer science, a self-balancing binary search tree (BST) is any node-based binary search tree that automatically keeps its height (maximal number of levels below the root) small in the face of arbitrary item insertions and deletions. Dona ...

takes $O(\backslash log\; n)$ time, the entire algorithm takes $O(n\backslash log\; n)$ time.
Comparison sort
A comparison sort is a type of sorting algorithm that only reads the list elements through a single abstract comparison operation (often a "less than or equal to" operator or a three-way comparison) that determines which of two elements should occ ...

s require at least $\backslash Omega\; (n\backslash log\; n)$ comparisons in the worst case because $\backslash log\; (n!)=\backslash Theta\; (n\backslash log\; n)$, by Stirling's approximation
In mathematics, Stirling's approximation (or Stirling's formula) is an approximation for factorials. It is a good approximation, leading to accurate results even for small values of n. It is named after James Stirling, though a related but less ...

. They also frequently arise from the recurrence relation $T(n)\; =\; 2T\backslash left(\backslash frac\backslash right)+O(n)$.
Sub-quadratic time

Analgorithm
In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...

is said to be subquadratic time if $T(n)=o(n^2)$.
For example, simple, comparison-based sorting algorithm
In computer science, a sorting algorithm is an algorithm that puts elements of a list into an order. The most frequently used orders are numerical order and lexicographical order, and either ascending or descending. Efficient sorting is impor ...

s are quadratic (e.g. insertion sort), but more advanced algorithms can be found that are subquadratic (e.g. shell sort
Shellsort, also known as Shell sort or Shell's method, is an in-place comparison sort. It can be seen as either a generalization of sorting by exchange (bubble sort) or sorting by insertion (insertion sort). The method starts by sorting pairs of ...

). No general-purpose sorts run in linear time, but the change from quadratic to sub-quadratic is of great practical importance.
Polynomial time

An algorithm is said to be of polynomial time if its running time isupper bound
In mathematics, particularly in order theory, an upper bound or majorant of a subset of some preordered set is an element of that is greater than or equal to every element of .
Dually, a lower bound or minorant of is defined to be an elem ...

ed by a polynomial expression in the size of the input for the algorithm, that is, for some positive constant ''k''. Problems
A problem is a difficulty which may be resolved by problem solving.
Problem(s) or The Problem may also refer to:
People
* Problem (rapper), (born 1985) American rapper Books
* ''Problems'' (Aristotle), an Aristotelian (or pseudo-Aristotelian) c ...

for which a deterministic polynomial-time algorithm exists belong to the complexity class P, which is central in the field of computational complexity theory
In theoretical computer science and mathematics, computational complexity theory focuses on classifying computational problems according to their resource usage, and relating these classes to each other. A computational problem is a task solved by ...

. Cobham's thesis states that polynomial time is a synonym for "tractable", "feasible", "efficient", or "fast".
Some examples of polynomial-time algorithms:
* The selection sort
In computer science, selection sort is an in-place comparison sorting algorithm. It has an O(''n''2) time complexity, which makes it inefficient on large lists, and generally performs worse than the similar insertion sort. Selection sort is no ...

sorting algorithm on ''n'' integers performs $An^2$ operations for some constant ''A''. Thus it runs in time $O(n^2)$ and is a polynomial-time algorithm.
* All the basic arithmetic operations (addition, subtraction, multiplication, division, and comparison) can be done in polynomial time.
* Maximum matchings in graphs
Graph may refer to:
Mathematics
*Graph (discrete mathematics), a structure made of vertices and edges
**Graph theory, the study of such graphs and their properties
* Graph (topology), a topological space resembling a graph in the sense of discr ...

can be found in polynomial time.
Strongly and weakly polynomial time

In some contexts, especially inoptimization
Mathematical optimization (alternatively spelled ''optimisation'') or mathematical programming is the selection of a best element, with regard to some criterion, from some set of available alternatives. It is generally divided into two subfi ...

, one differentiates between strongly polynomial time and weakly polynomial time algorithms. These two concepts are only relevant if the inputs to the algorithms consist of integers.
Strongly polynomial time is defined in the arithmetic model of computation. In this model of computation the basic arithmetic operations (addition, subtraction, multiplication, division, and comparison) take a unit time step to perform, regardless of the sizes of the operands. The algorithm runs in strongly polynomial time if:
# the number of operations in the arithmetic model of computation is bounded by a polynomial in the number of integers in the input instance; and
# the space used by the algorithm is bounded by a polynomial in the size of the input.
Any algorithm with these two properties can be converted to a polynomial time algorithm by replacing the arithmetic operations by suitable algorithms for performing the arithmetic operations on a Turing machine
A Turing machine is a mathematical model of computation describing an abstract machine that manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, it is capable of implementing any computer algo ...

. The second condition is strictly necessary: given the integer $2^n$ (which takes up space proportional to ''n'' in the Turing machine model), it is possible to compute $2^$ with ''n'' multiplications using repeated squaring. However, the space used to represent $2^$ is proportional to $2^n$, and thus exponential rather than polynomial in the space used to represent the input. Hence, it is not possible to carry out this computation in polynomial time on a Turing machine, but it is possible to compute it by polynomially many arithmetic operations.
However, for the first condition, there are algorithms that run in a number of Turing machine steps bounded by a polynomial in the length of binary-encoded input, but do not take a number of arithmetic operations bounded by a polynomial in the number of input numbers. The Euclidean algorithm for computing the greatest common divisor of two integers is one example. Given two integers $a$ and $b$, the algorithm performs $O(\backslash log\; a\; +\; \backslash log\; b)$ arithmetic operations on numbers with
at most $O(\backslash log\; a\; +\; \backslash log\; b)$ bits. At the same time, the number of arithmetic operations cannot be bounded by the number of integers in the input (which is constant in this case, there are always only two integers in the input). Due to the latter observation, the algorithm does not run in strongly polynomial time. Its real running time depends ''logarithmically'' on the magnitudes of $a$ and $b$ (that is, on their length in bits) and not only on the number of integers in the input.
An algorithm that runs in polynomial time but that is not strongly polynomial is said to run in weakly polynomial time.
A well-known example of a problem for which a weakly polynomial-time algorithm is known, but is not known to admit a strongly polynomial-time algorithm, is linear programming
Linear programming (LP), also called linear optimization, is a method to achieve the best outcome (such as maximum profit or lowest cost) in a mathematical model whose requirements are represented by linear relationships. Linear programming is ...

. Weakly polynomial time should not be confused with pseudo-polynomial time, which depends ''linearly'' on the magnitude of values in the problem and is not truly polynomial time.
Complexity classes

The concept of polynomial time leads to several complexity classes in computational complexity theory. Some important classes defined using polynomial time are the following. * P: The complexity class ofdecision problem
In computability theory and computational complexity theory, a decision problem is a computational problem that can be posed as a yes–no question of the input values. An example of a decision problem is deciding by means of an algorithm whethe ...

s that can be solved on a deterministic Turing machine in polynomial time
* NP: The complexity class of decision problems that can be solved on a non-deterministic Turing machine in polynomial time
* ZPP: The complexity class of decision problems that can be solved with zero error on a probabilistic Turing machine
In theoretical computer science, a probabilistic Turing machine is a non-deterministic Turing machine that chooses between the available transitions at each point according to some probability distribution. As a consequence, a probabilistic Turin ...

in polynomial time
* RP: The complexity class of decision problems that can be solved with 1-sided error on a probabilistic Turing machine in polynomial time.
* BPP: The complexity class of decision problems that can be solved with 2-sided error on a probabilistic Turing machine in polynomial time
* BQP
In computational complexity theory, bounded-error quantum polynomial time (BQP) is the class of decision problems solvable by a quantum computer in polynomial time, with an error probability of at most 1/3 for all instances.Michael Nielsen and Is ...

: The complexity class of decision problems that can be solved with 2-sided error on a quantum Turing machine in polynomial time
P is the smallest time-complexity class on a deterministic machine which is robust
Robustness is the property of being strong and healthy in constitution. When it is transposed into a system, it refers to the ability of tolerating perturbations that might affect the system’s functional body. In the same line ''robustness'' ca ...

in terms of machine model changes. (For example, a change from a single-tape Turing machine to a multi-tape machine can lead to a quadratic speedup, but any algorithm that runs in polynomial time under one model also does so on the other.) Any given abstract machine
An abstract machine is a computer science theoretical model that allows for a detailed and precise analysis of how a computer system functions. It is analogous to a mathematical function in that it receives inputs and produces outputs based on pr ...

will have a complexity class corresponding to the problems which can be solved in polynomial time on that machine.
Superpolynomial time

An algorithm is defined to take superpolynomial time if ''T''(''n'') is not bounded above by any polynomial. Using little omega notation, it is ''ω''(''n''Quasi-polynomial time

Quasi-polynomial time algorithms are algorithms that run longer than polynomial time, yet not so long as to be exponential time. The worst case running time of a quasi-polynomial time algorithm is $2^$ for some fixed For $c=1$ we get a polynomial time algorithm, for $c\; <\; 1$ we get a sub-linear time algorithm. Quasi-polynomial time algorithms typically arise inreductions
Reductions ( es, reducciones, also called ; , pl. ) were settlements created by Spanish rulers and Roman Catholic missionaries in Spanish America and the Spanish East Indies (the Philippines). In Portuguese-speaking Latin America, such re ...

from an NP-hard
In computational complexity theory, NP-hardness ( non-deterministic polynomial-time hardness) is the defining property of a class of problems that are informally "at least as hard as the hardest problems in NP". A simple example of an NP-hard pr ...

problem to another problem. For example, one can take an instance of an NP hard problem, say 3SAT
In logic and computer science, the Boolean satisfiability problem (sometimes called propositional satisfiability problem and abbreviated SATISFIABILITY, SAT or B-SAT) is the problem of determining if there exists an interpretation that satisfie ...

, and convert it to an instance of another problem B, but the size of the instance becomes $2^$. In that case, this reduction does not prove that problem B is NP-hard; this reduction only shows that there is no polynomial time algorithm for B unless there is a quasi-polynomial time algorithm for 3SAT (and thus all of NP). Similarly, there are some problems for which we know quasi-polynomial time algorithms, but no polynomial time algorithm is known. Such problems arise in approximation algorithms; a famous example is the directed Steiner tree problem, for which there is a quasi-polynomial time approximation algorithm achieving an approximation factor of $O(\backslash log^3\; n)$ (''n'' being the number of vertices), but showing the existence of such a polynomial time algorithm is an open problem.
Other computational problems with quasi-polynomial time solutions but no known polynomial time solution include the planted clique problem in which the goal is to find a large clique in the union of a clique and a random graph
In mathematics, random graph is the general term to refer to probability distributions over graphs. Random graphs may be described simply by a probability distribution, or by a random process which generates them. The theory of random graphs ...

. Although quasi-polynomially solvable, it has been conjectured that the planted clique problem has no polynomial time solution; this planted clique conjecture has been used as a computational hardness assumption to prove the difficulty of several other problems in computational game theory, property testing, and machine learning.
The complexity class QP consists of all problems that have quasi-polynomial time algorithms. It can be defined in terms of DTIME In computational complexity theory, DTIME (or TIME) is the computational resource of computation time for a deterministic Turing machine. It represents the amount of time (or number of computation steps) that a "normal" physical computer would ta ...

as follows.
:$\backslash mbox\; =\; \backslash bigcup\_\; \backslash mbox\; \backslash left(2^\backslash right)$
Relation to NP-complete problems

In complexity theory, the unsolvedP versus NP
The P versus NP problem is a major unsolved problem in theoretical computer science. In informal terms, it asks whether every problem whose solution can be quickly verified can also be quickly solved.
The informal term ''quickly'', used abov ...

problem asks if all problems in NP have polynomial-time algorithms. All the best-known algorithms for NP-complete problems like 3SAT etc. take exponential time. Indeed, it is conjectured for many natural NP-complete problems that they do not have sub-exponential time algorithms. Here "sub-exponential time" is taken to mean the second definition presented below. (On the other hand, many graph problems represented in the natural way by adjacency matrices are solvable in subexponential time simply because the size of the input is the square of the number of vertices.) This conjecture (for the k-SAT problem) is known as the exponential time hypothesis
In computational complexity theory, the exponential time hypothesis is an unproven computational hardness assumption that was formulated by . It states that satisfiability of 3-CNF Boolean formulas cannot be solved more quickly than exponential ...

. Since it is conjectured that NP-complete problems do not have quasi-polynomial time algorithms, some inapproximability results in the field of approximation algorithms make the assumption that NP-complete problems do not have quasi-polynomial time algorithms. For example, see the known inapproximability results for the set cover problem.
Sub-exponential time

The term sub-exponential time is used to express that the running time of some algorithm may grow faster than any polynomial but is still significantly smaller than an exponential. In this sense, problems that have sub-exponential time algorithms are somewhat more tractable than those that only have exponential algorithms. The precise definition of "sub-exponential" is not generally agreed upon, and we list the two most widely used ones below.First definition

A problem is said to be sub-exponential time solvable if it can be solved in running times whose logarithms grow smaller than any given polynomial. More precisely, a problem is in sub-exponential time if for every there exists an algorithm which solves the problem in time ''O''(2DTIME In computational complexity theory, DTIME (or TIME) is the computational resource of computation time for a deterministic Turing machine. It represents the amount of time (or number of computation steps) that a "normal" physical computer would ta ...

as follows.
:$\backslash text=\backslash bigcap\_\; \backslash text\backslash left(2^\backslash right)$
This notion of sub-exponential is non-uniform in terms of ''ε'' in the sense that ''ε'' is not part of the input and each ε may have its own algorithm for the problem.
Second definition

Some authors define sub-exponential time as running times in $2^$. This definition allows larger running times than the first definition of sub-exponential time. An example of such a sub-exponential time algorithm is the best-known classical algorithm for integer factorization, thegeneral number field sieve
In number theory, the general number field sieve (GNFS) is the most efficient classical algorithm known for factoring integers larger than . Heuristically, its complexity for factoring an integer (consisting of bits) is of the form
:\exp\left( ...

, which runs in time about where the length of the input is . Another example was the graph isomorphism problem, which the best known algorithm from 1982 to 2016 solved in However, at STOC 2016 a quasi-polynomial time algorithm was presented.
It makes a difference whether the algorithm is allowed to be sub-exponential in the size of the instance, the number of vertices, or the number of edges. In parameterized complexity
In computer science, parameterized complexity is a branch of computational complexity theory that focuses on classifying computational problems according to their inherent difficulty with respect to ''multiple'' parameters of the input or output. ...

, this difference is made explicit by considering pairs $(L,k)$ of decision problem
In computability theory and computational complexity theory, a decision problem is a computational problem that can be posed as a yes–no question of the input values. An example of a decision problem is deciding by means of an algorithm whethe ...

s and parameters ''k''. SUBEPT is the class of all parameterized problems that run in time sub-exponential in ''k'' and polynomial in the input size ''n'':
:$\backslash text=\backslash text\backslash left(2^\; \backslash cdot\; \backslash text(n)\backslash right).$
More precisely, SUBEPT is the class of all parameterized problems $(L,k)$ for which there is a computable function
Computable functions are the basic objects of study in computability theory. Computable functions are the formalized analogue of the intuitive notion of algorithms, in the sense that a function is computable if there exists an algorithm that can d ...

$f\; :\; \backslash N\; \backslash to\; \backslash N$ with $f\; \backslash in\; o(k)$ and an algorithm that decides ''L'' in time $2^\; \backslash cdot\; \backslash text(n)$.
Exponential time hypothesis

The exponential time hypothesis (ETH) is that3SAT
In logic and computer science, the Boolean satisfiability problem (sometimes called propositional satisfiability problem and abbreviated SATISFIABILITY, SAT or B-SAT) is the problem of determining if there exists an interpretation that satisfie ...

, the satisfiability problem of Boolean formulas in conjunctive normal form
In Boolean logic, a formula is in conjunctive normal form (CNF) or clausal normal form if it is a conjunction of one or more clauses, where a clause is a disjunction of literals; otherwise put, it is a product of sums or an AND of ORs. As a ...

with at most three literals per clause and with ''n'' variables, cannot be solved in time 2Exponential time

An algorithm is said to be exponential time, if ''T''(''n'') is upper bounded by 2EXP Exp may stand for:
* Exponential function, in mathematics
* Expiry date of organic compounds like food or medicines
* Experience points, in role-playing games
* EXPTIME
In computational complexity theory, the complexity class EXPTIME (sometimes ...

.
:$\backslash text\; =\; \backslash bigcup\_\; \backslash text\backslash left(2^\backslash right)$
Sometimes, exponential time is used to refer to algorithms that have ''T''(''n'') = 2Factorial time

An algorithm is said to be factorial time if ''T(n)'' is upper bounded by the factorial function ''n!''. Factorial time is a subset of exponential time (EXP) because $n!\; =\; O\; \backslash left(2^\; \backslash right)$ for all $\backslash epsilon\; >\; 0$. However, it is not a subset of E. An example of an algorithm that runs in factorial time isbogosort
In computer science, bogosort (also known as permutation sort, stupid sort, slowsort or bozosort) is a sorting algorithm based on the generate and test paradigm. The function successively generates permutations of its input until it finds one t ...

, a notoriously inefficient sorting algorithm based on trial and error. Bogosort sorts a list of ''n'' items by repeatedly shuffling
Shuffling is a procedure used to randomize a deck of playing cards to provide an element of chance in card games. Shuffling is often followed by a cut, to help ensure that the shuffler has not manipulated the outcome.
__TOC__
Techniques
Over ...

the list until it is found to be sorted. In the average case, each pass through the bogosort algorithm will examine one of the ''n''! orderings of the ''n'' items. If the items are distinct, only one such ordering is sorted. Bogosort shares patrimony with the infinite monkey theorem
The infinite monkey theorem states that a monkey hitting keys at random on a typewriter keyboard for an infinite amount of time will almost surely type any given text, such as the complete works of William Shakespeare. In fact, the monkey woul ...

.
Double exponential time

An algorithm is said to be double exponential time if ''T''(''n'') is upper bounded by 22-EXPTIME In computational complexity theory, the complexity class 2-EXPTIME (sometimes called 2-EXP) is the set of all decision problems solvable by a deterministic Turing machine in O(22''p''(''n'')) time, where ''p''(''n'') is a polynomial function of '' ...

.
:$\backslash mbox\; =\; \backslash bigcup\_\; \backslash mbox\backslash left(\; 2^\backslash right)$
Well-known double exponential time algorithms include:
* Decision procedures for Presburger arithmetic
Presburger arithmetic is the first-order theory of the natural numbers with addition, named in honor of Mojżesz Presburger, who introduced it in 1929. The signature of Presburger arithmetic contains only the addition operation and equality, omi ...

* Computing a Gröbner basis
In mathematics, and more specifically in computer algebra, computational algebraic geometry, and computational commutative algebra, a Gröbner basis is a particular kind of generating set of an ideal in a polynomial ring over a field . A Grö ...

(in the worst case)
* Quantifier elimination on real closed fields takes at least double exponential time, and can be done in this time.
See also

*L-notation
''L''-notation is an asymptotic notation analogous to big-O notation, denoted as L_n alpha,c/math> for a bound variable n tending to infinity. Like big-O notation, it is usually used to roughly convey the rate of growth of a function, such as th ...

* Space complexity
The space complexity of an algorithm or a computer program is the amount of memory space required to solve an instance of the computational problem as a function of characteristics of the input. It is the memory required by an algorithm until it e ...

References

{{Use dmy dates, date=September 2019 Analysis of algorithms Computational complexity theory Computational resources Time