The Hardness of Decision Tree Complexity
Abstract
Let be a Boolean function given as either a truth table or a circuit. How difficult is it to find the decision tree complexity, also known as deterministic query complexity, of in both cases? We prove that this problem is -hard and PSPACE-hard, respectively. The second bound is tight, and the first bound is close to being tight.
Keywords and phrases:
Decision tree, Log-depth circuitsCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computationAcknowledgements:
The authors would like to thank Wei Zhan for his answer at StackOverflow.Funding:
This work was funded by the European Union (ERC, HOFGA, 101041696). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. Neither the European Union nor the granting authority can be held responsible for them. It was also supported by FCT through the LASIGE Research Unit, ref. UIDB/00408/2025 and ref. UIDP/00408/2025, and by CMAFcIO, FCT Project UIDB/04561/2020, https://doi.org/10.54499/UIDB/04561/2020.Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim ThắngSeries and Publisher:

1 Introduction
The decision tree is one of the most important computational models in theoretical computer science. Decision trees were invented in the 50s with the purpose of analyzing data. In this context, at each node in the tree we query some feature of the data, which partitions the data points depending on the value of this chosen feature. The resulting partition at the leaves should allow us to better understand the data. Starting in the 1980s, several learning algorithms were developed that would process data and produce a classifier. Meaning, we assume the existence of some function of which we know some sampled pairs (the data), and we wish to produce a decision tree that would be able to predict , even on a previously-unseen input (some famous algorithms are CHAID, CART, ID3, and C4.5, see ([9, 4, 14, 15])). The goal here is to produce the smallest possible decision tree, while making the fewest possible mistakes. This task, of decision-tree synthesis, is used in applications (e.g. [19]).
But one can also consider a more algorithmic problem, which is of theoretical interest. Here, the function is completely known (i.e., we know for all ), and we wish to produce a decision tree which computes (e.g., without any mistakes). As far as we are aware it was in the 1970s (e.g. [20]) when people first studied, for specific functions , and for specific ways of querying the input , how small can be the depth of a decision tree that computes when given as input. In the meantime, decision trees have become a ubiquitous computational model, useful in the study of various kinds of computation. To give a few examples, decision trees are relevant to the study of data structures (the cell-probe model [13, 11]), cryptographic reductions (in black-box reductions [17]), and communication complexity111In lifting theorems. Some examples of lifting theorems that use deterministic decision trees are: [16, 7, 6, 5, 12].. There is a meta-complexity problem underlying this algorithmic problem: how does one determine the decision-tree complexity of a given function ? This question has been studied before, usually for the learning problem [10], but also for the algorithmic problem [1, 18].
Let us restrict our attention to the simplest of all decision-tree models, where the known function is a Boolean function, and the computational model is deterministic decision tree that must compute by querying the bits of . Here, we can consider two scenarios, with respect to how is given:
- (tt-DT)
-
We are given as a truth table, meaning a binary string of length so that appears at the -th position.
- (circuit-DT)
-
We are given as a Boolean circuit, which potentially allows for a more succinct encoding of .
The meta-complexity problem is: we are given as input, either as a truth-table (tt-DT) or as a circuit (circuit-DT) and we wish to find the deterministic query complexity complexity of , namely, the smallest depth of a deterministic decision tree that computes by querying the bits of . How hard is this problem?
In this paper, we give a satisfactory answer for both scenarios, essentially via the same technique.
It is not difficult to see that circuit-DT belongs to PSPACE: see Proposition 7 below. One could immediately conjecture that the problem is PSPACE-hard, but one soon comes across various difficulties in proving such a statement. (After the required definitions are in place, in Section 3.2, we discuss precisely where the difficulty lies.)
Our first main result, Theorem 10, is showing that this problem is indeed PSPACE-hard.
It is also well-known, and appears as Proposition 6 below, that tt-DT belongs to P. Meaning, denoting the input length for tt-DT as , which is the length of the truth-table of a Boolean function , Proposition 6 states that tt-DT can be solved in time. In Proposition 9, we observe that tt-DT can also be computed in parallel, namely, by a Boolean circuit of depth and size . This result is simple enough that it should be considered folklore: easy to prove for anyone who would care to do so. However, despite being a natural and fundamental problem, no matching lower-bound was known. Our second main result, Theorem 11, shows that the above bound is close to tight: tt-DT is -hard (under uniform reductions).
2 Definitions and upper bounds
Definition 1.
We let denote the set of all binary strings of length , sometimes called the Boolean cube. We let denote the set of (-bit) partial assignments. The elements are in bijection with the Boolean subcubes:
We will denote this set also by , by abuse of notation.
We let assign to the -th coordinate. Two partial assignment and are called compatible if and implies .
If are compatible, then is the partial assignment such that equals to if , equals if , and equals if .
If and , we let be the binary string which equals where , and equals in the remaining coordinates (which are filled in order).
Given a Boolean function and a partial assignment with the number of , we let be given by
I.e. it is the restriction of to the Boolean subcube .
Definition 2.
A deterministic decision tree over is a rooted, labelled, ordered binary tree :
-
Each non-leaf node is labelled by an index .
-
Each non-leaf node has two children and .
Associated with each node of is a partial assignment
-
The root is associated with .
-
For a non-leaf node , and for both , .
Definition 3.
The computation of on input is a path in , which begins at the root, and proceeds at each node by going to the child , until it reaches a leaf.
It is easy to see that is the set of inputs whose computation goes through . We have if and only if the coordinate has not yet been queried in the computation between the root and node , i.e., at or before . If has been queried at or before , then for every whose computation goes through .
Definition 4.
We say that computes a function if, for every leaf of , is constant on . The deterministic query complexity of a function , which will be denoted , is the smallest depth of any decision tree that computes .
Definition 5.
We let tt-DT be the computational problem where we are given the truth-table of a function , and wish to compute . We let circuit-DT be the computational problem where we are given a Boolean circuit computing a function , and we wish to compute .
The simplest observation that one can make is that tt-DT has a polynomial-time algorithm.
Proposition 6 ([8, 1]).
tt-DT belongs to P. More precisely, there is an algorithm that computes the DT-complexity of an -ary Boolean function in time , where .
This algorithm should be considered folklore, but we include it here because it is simple and insightful.
Proof.
The main, crucial observation is that the best decision tree for must first choose a coordinate , query , and then run the best decision tree for . In general, for any partial assignment , if is constant on , and otherwise
This gives us a dynamic programming algorithm: knowing for all partial assignments with free variables, we can use the above formula to compute for all with free variables. Finally , so we learned . There are partial assignments in total, and each computation takes time in a random-access machine. Some more insight will come from the following game reformulation of the statement “”. Consider the following game between two players, Alice and Bob. The game lasts for steps. At every step, Alice chooses a variable , and Bob sets a Boolean value to the corresponding variable, either or . After steps, Alice wins is constant on the partial assignment corresponding to Alice and Bob’s moves; otherwise, Bob wins. It follows that Alice has a winning strategy in this game if and only if . Indeed, if , then Alice can make moves according to the corresponding tree, and if , then Bob wins because this inequality means that for every , the decision tree complexity of or is at least . Bob’s strategy is then to repeatedly choose the value that maximizes . One can algorithmically find the winner in this game by a simple recursive algorithm. It is easy to see that, if a Boolean function is given as a Boolean circuit , an algorithm can decide which of the two players has a winning strategy, using memory. So, we get the following:
Proposition 7.
circuit-DT belongs to PSPACE.
One may now ask whether Proposition 6 can be at all improved. Indeed, the algorithm can be parallelized. First, a definition:
Definition 8.
For , we let denote the class of functions computable by Boolean circuits with binary AND and OR gates, and unary NOT gates, in depth and size . We let denote the class of functions computable by such circuits in depth and size .
We now claim the following.
Proposition 9.
tt-DT can be computed by a Boolean circuit of size and depth ). Hence, tt-DT is in .
Proof.
The equation (2) directly gives us a circuit that uses min, max, increment, and all-equal gates: for each partial assignment we check if is constant using an all-equal gate, otherwise we compute the formula given by (2). This circuit has depth using such gates. Implementing such gates using Boolean gates will result in a circuit of depth .
3 Lower bounds
Our two main theorems are the following.
Theorem 10.
circuit-DT is PSPACE-hard under polynomial-time reductions.
Theorem 11.
tt-DT is -hard under -reduction.
The first theorem is well understood, but the second requires some clarification regarding reductions and uniformity. Recall the definition of DLOGTIME-uniform cicuits from [3].
Definition 12.
Let be a family of Boolean circuits, so that computes a function .
-
The “direct connection language” of is the set of tuples , where and are gate numbers in , is the type of gate (AND, OR, NOT, or input gate ), and gate is a child of gate (and equals if is a leaf).
-
The circuit family is DLOGTIME-uniform if its direct connection language can be recognized in time by a deterministic multi-tape Turing machine with an index tape for random access to the input.
We say that language is -reduced to language , which we write , if there is a DLOGTIME-uniform family of -circuits such that, for every , iff .
It is not difficult to see that this type of reduction satisfies the natural properties like transitivity and closure: If and then (this holds for both uniform and non-uniform variants of ).
3.1 TQBF
The proof of theorems 10 and 11 are similar: we prove that TQBF reduces to DT. Recall that TQBF (True Quantified Boolean Formula) is the problem of determining the truth of a formula
where is some Boolean function. As we did for decision-tree complexity, let us consider two variants of the TQBF problem:
- tt-TQBF
-
We are given as input a Boolean function as a truth table, and wish to know whether (3.1) holds.
- circuit-TQBF
-
We are given as a circuit, and wish to know whether (3.1) holds.
It is well-known that circuit-TQBF is PSPACE-complete. It turns out that tt-TQBF is -complete:
Theorem 13.
tt-TQBF is -complete under reductions.
To prove Theorem 13 we use the following result of Barrington.
Theorem 14 ([2, 3]).
The identity problem, , is the problem of deciding if the product of given permutations from is equal to the identity. Then is -complete under reductions.
This theorem was proved in [2], and in [3] the authors verified that the reasoning proves the desired statement with DLOGTIME-uniform reductions.
Proof of Theorem 13.
It is easy to see that tt-TQBF is in : the formula (3.1) is a Boolean formula of depth whose leaves are entries in the truth-table of . To prove that tt-TQBF is -hard, the idea is to consider as a game that can be interpreted as a TQBF formula.
Consider the input of : permutations , with . Imagine two players Alice and Bob; Alice wants to prove that the product is equal to the identity permutation and Bob does not trust her.
They play in the following game. Bob asks: what is the product of the first half of the permutations, i.e. . Alice states that this product is some permutation . Additionally, since Alice is trying to prove to Bob that all the product of all permutations is equal to the identity, she is also implicitly stating that the product is equal to . Bob does not trust Alice, and so he chooses to mean that he believes one of Alice’s statements to be false. I.e. he chooses if he believes that the first part is actually not , and he sets if he believes that the second part is not . After this, a similar procedure repeats: Alice states that the value of the product of the first half of Bob’s chosen part is (this is one quarter of all permutations), which implies that the second half of Bob’s chosen part is . Then Bob chooses one of these two quarters where he believes Alice’s statement is false, and so on.
This game produces a sequence . At the end of the game, the winner is identified by whether or not, where and are inferred from the sequence. This game can be interpreted as a TQBF: each statement of Alice can be encoded as bits (since ), and each choice of Bob can be encoded as bit. Every value of the truth table of for tt-TQBF can be constructed from Alice and Bob’s moves and the corresponding value of some .
Indeed, if and only if for the appropriate and . Hence, this reduction is in , since every value in the truth-table of (i.e. the winner in the corresponding game) depends only on one permutation of the input, which is encoded using a constant number of bits.
We further claim that the corresponding reduction can be made DLOGTIME uniform. By logarithmic time we mean . We first describe an algorithm which, when given (i.e. the moves in Alice-Bob game), outputs the index and the permutation required to compute the bit of ’s truth table.
The algorithm looks at every pair of moves one time and maintains in memory a permutation , an index , and two indexes . These values in memory have the following meaning: after round , Alice has stated that . Initially is the identity, , , and .
The move of Alice in the -th round is some permutation , and Alice states that , where . The move of Bob (some bit ) is a choice “left” or “right”. If Bob’s answer is “left”, then we set , and if Bob’s choice is “right” then we set , , and . Each such calculation can be done in constant time, so the entire computation can be done in linear time.
The above circuit is very simple, and the above algorithm shows how to compute the connections between the various gates. Since this algorithms runs in time, this circuit is DLOGTIME-uniform.
3.2 The crucial difficulty: TQBF vs DT
We have now laid out enough definitions that we can discuss the crucial difficulty in proving our main result (Theorems 10 and 11). We would like to prove that circuit-DT is PSPACE-hard, and we know that circuit-TQBF is PSPACE-hard. We would like to prove that tt-DT is -hard, and we know that tt-TQBF is -hard. The fundamental difference between the two problems can be understood by looking them as a game.
In TQBF, we have two disjoint sets of variables: Alice sets the variables and Bob sets the variables. In DT, we have a single set of variables: Alice chooses a variable, and Bob sets the variable. Now, what we would like to do, is to simulate the TQBF game using the DT game. The difficulty is that it is not at all obvious how such a simulation should proceed.
To simulate a TQBF game over variables , we use a DT game over variables , and some other auxiliary variables. The hope is that the DT instance works in such a way that Alice must play by choosing first and then , or first and then . Whichever order she chooses, Bob must play by setting the first chosen or variable to , and by setting the second chosen to . Then Alice must play by choosing one of the two or variables, and Bob can set it anyway he wants. This way we simulate the TQBF game using the DT game. The difficulty is now in ensuring that Alice and Bob are indeed forced to play by the above “standard” strategies. To enforce this, additional gadgets will be put in place, so that any deviation from the above standard strategies will cause the deviating player to loose the DT game.
So let us begin.
3.3 First auxiliary function
In the reduction we will need an example, due to Wei Zhan, of a Boolean function such that for some variable it holds that . This function will be a kind of product of the following function :
Lemma 15 ([21]).
The function is such that
-
(i)
,
-
(ii)
and
-
(iii)
.
Proof of Lemma 15.
-
(i)
To determine one can ask the values of and . If then it is enough to know to determine the value of the function. If then it is enough to know (if then , if then ). The proof of the lower bound follows from the second item.
-
(ii)
The upper-bound follows from (i). The lower-bound is proven by brute force. We have
If we choose to query and first, and they differ, we still need to query . If we choose to query and first, and , we still need to query .
-
(iii)
To determine we may ask then . It is easy to see that one question is not enough.
Denote by the Boolean function given by:
Lemma 16.
The function has the following properties:
-
1.
; Moreover, there is a strategy for the second player (who sets the values) such that if the first player (Alice) chooses variable then she looses.
-
2.
;
-
3.
.
Proof of Lemma 16.
It is easy to see that if functions and have disjoint variables then . By these reasons the second and the third items are direct corollaries of the same items in Lemma 15. To prove the first item just consider the following obvious inequalities:
3.4 Second auxiliary function
Another tool in the reduction is the following function:
-
every is defined as ;
-
every is defined as
We claim that . Moreover, we want to claim some properties of the corresponding DT-game between Alice (who chooses variables) and Bob (who sets values). We would like to say that Alice and Bob must follow certain standard strategies, or else they will loose the DT game. Standard strategies are as follows:
Standard strategies for Alice.
In a standard strategy for Alice, she spends questions to ask about the variables and for all . She can ask these questions in an arbitrary order.
She also spends questions to ask about exactly one of the two variables and , for each . Here the order is crucial. The correct variable to choose depends on the value of : she chooses if this is , and if this is , as in the definition of above. So, before asking about or , Alice must first ask about and about the appropriate variable in every couple for all . This defines , for all , and , for all .
Standard strategies for Bob.
A standard strategy for Bob is any strategy such that, the first time Alice asks about one of the two variables or , Bob answers .
We now formulate the following lemma about standard strategies.
Lemma 17.
It holds that and, furthermore,
-
1.
If Alice plays according to a standard strategy, she wins the DT game within rounds.
-
2.
If Alice does not play according to a standard strategy then Bob can play in such a way that Alice does not win within rounds.
-
3.
If, while Alice is playing according to a standard strategy, Bob does not answer according to one of his standard strategies, then Alice can win the DT game in strictly fewer than rounds.
This auxiliary function is one of the central pieces in the reduction. It will allow us to replace the TQBF game, where Alice and Bob choose values for some variables, by a DT game, where Alice chooses some variables and Bob sets their value. For the reduction to go through, however, we need to put the pieces together in just the right way.
Proof of Lemma 17.
The first observation follows from Items 1 and 2. Item 1 follows because, in a standard strategy, Alice has asked about all variables in the functions , and because she asked about the relevant variable among and , she also learned all the .
Now we prove Item 2. Assume that Alice does not play according to a standard strategy. It means that either (a) Alice does not ask about some or , or (b) she did not ask about one of the or , or (c.) she asks about or before seeing all the variables of , or (d) for some , she saw all the variables of , but asked about the wrong or .
In case (a), Alice did not ask about some or , so that the value of is not defined and independent of the remaining values, and hence the value of is also not defined, so if Bob plays according to any standard strategy, they end in a non-monochromatic subcube, and Alice looses. Likewise, in cases (b) and (d), is undefined and independent of the remaining values, and hence is also undefined, and Alice also looses.
Now suppose we are in case (c.), but not (a), (b), or (d), or (c.), for any . Then, Alice has asked about one of the variables or , but she did so before asking every variable of . We then claim that Bob can answer Alice’s questions in such a way that Alice will need to ask at least questions in total to know the value of . Indeed, Alice has asked about or before became defined. So after choosing some value for the variable or , Bob can still answer Alice’s questions by a standard strategy such that equals the variable or which Alice did not choose. The remaining questions Bob answers according to an arbitrary standard strategy. Since Alice wasted (at least) one question by asking an irrelevant variable, it follows that she needs other questions to fix the value of .
Finally, to prove Item 3, suppose that the first time Alice asks one of the two variables or , Bob answers . Then the function becomes fixed and equal to , so Alice can fix the value of without ever asking about the other variable. And so Alice wins within moves.
3.5 The reduction
Let us here sketch of proofs of theorems 10 and 11. We reduce the TQBF instance
(1) |
to computing the query complexity of the function:
is a Boolean function on variables. | ||||
is a (previously undefined) Boolean function on variables, given by: | ||||
In the next subsection we prove that this reduction is correct. But let us sketch here how the above pieces (, , , and ) fit together:
-
If Equation 1 holds, Alice can query the variables of using a standard strategy for : if she wants to set to , she asks about and then ; to set to , she asks first about and then . If Bob plays according to a standard strategy, he will be forced to set the variables as Alice wants, and ultimately will be , so will be , and then Alice and Bob must play the game for . So Alice wins with queries in total.
-
If Equation 1 does not hold, and Alice plays according to a standard strategy on the variables of , then Bob can force and hence to be . Now Alice is in trouble: if she doesn’t query , she won’t know whether or is relevant, so the function won’t be fixed. But as soon as she queries , Bob can answer , and now she must query further variables to learn . That’s queries in total.
-
If at any point one of the players does not use a standard strategy, then the other player will have a way of winning .
Completion of the proofs of Theorems 10 and 11.
First we note that this reduction can be computed in polynomial time if is given as a circuit and by a -circuit if is given a truth-table: every value of depends only on one value of . To see DLOGTIME-uniformity one can check that, given values for the input variables of , one can calculate the ouput, as a function of , in time . We simply calculate every value in the above expression for in time , and as a result, the output will be either , , or . So the truth table of can be computed from the truth table of by a DLOGTIME-uniform -reduction.
We now claim that (1) is true if and only if .
When (1) holds
First we prove if (1) is true, i.e., Alice has a winning strategy in the TQBF-game, then , i.e. Alice has a winning strategy in the DT-game, which allows her to win within steps.
In the TQBF-game Alice first chooses , then as a function of and (Bob’s choice for) then as a function from , and so on. We wish to translate such a strategy for the TQBF-game, into a strategy for the DT-game. The translation is the following.
Alice begins by fixing the value of to a constant. She will do so, by using the following standard DT-strategy (standard as in the proof of Lemma 17). If the TQBF-strategy of Alice sets , then the standard DT-strategy of Alice first asks about the variable , and then asks about the variable . If the TQBF-strategy of Alice sets , the standard DT-strategy of Alice swaps the order: first asking about and then about . The standard DT-strategy of Alice then asks about the appropriate relevant variable or (according to her standard strategy). She considers the value of the chosen variable ( or ) to be the value Bob has chosen for in TQBF-game. Then, the DT-strategy of Alice asks about and in some order, that again depends on the corresponding value for in the TQBF-strategy, and so on.
Now, either Bob follows a standard strategy (as in Lemma 17), or not. If he does, then (because the TQBF-strategy is a winning strategy for Alice) the value of is equal to and hence is also equal to and therefore is equal to . Note, that the value of is already defined. By Lemma 16 Alice can define the value of in remaining moves, so she wins.
If Bob does not use a standard strategy, Alice can define the value of in fewer than moves. She can do it by Lemma 17. Then Alice asks about . Then, either:
-
Bob answers . In this case, is equal to , is already defined and Alice can ask at least questions, which is enough to determine the value of .
-
Bob answers . In this case by Lemma 16 Alice can define the value of in questions, so she has at least questions left. She uses these questions to ask about all the variables and . Therefore, now Alice knows the values of , , , , and , so Alice knows the value of .
When (1) is false
Now we prove that if (1) is false then Alice cannot win in moves. First we prove the following
Lemma 18.
Assume that (1) is false. Then, Bob can answer the questions of Alice about the variables of in such a way that
-
will not be defined as long as Alice has asked fewer than questions.
-
If Alice has asked exactly questions, then either (i) the value of is not defined, or (ii) the value of is defined, but there exists an assignment of variables not asked by Alice such that .
Proof of Lemma 18.
From Lemma 17 we know that, if Alice does not play according to a standard strategy, she will need more than questions to define . So we can assume that Alice plays according to a standard strategy. Bob will also play according to a standard strategy, with the following additional constraint: for every pair Bob will answer to the second requested variable. (Recall that, a standard strategy for Bob is one where he answers for the first requested variable in the pair.)
We claim that if (1) is false, and Alice uses a standard strategy, then Bob can make for every , and , thus forcing . Indeed, in a standard strategy Alice asks variables in the right order, so that Bob can set and to the same value, according to his winning strategy in the TQBF-game. This makes the value of equal to .
Now we are ready to describe the strategy for Bob. To recall: we are assuming that (1) is false, and we will devise a strategy for Bob that will leave undefined unless Alice asks more than queries.
Bob’s strategy.
-
For the variables that define , Bob uses the strategy from Lemma 18.
-
If Alice asks about then Bob answers .
-
For the variables that define , Bob uses some best strategy for .
-
For the answer is arbitrary.
We argue that if Bob uses this strategy then Alice cannot define the value of in questions. Indeed, assume that Alice asks about . Then and the value of is equal to the value of . Now either Alice asked questions about or questions about . Either way, one of these functions is not defined and hence is also not defined.
Now assume that Alice does not ask about . Then by setting , we can always force the value of to be equal to , so this value must be defined. But to define and , Alice must spend all her questions, and so she cannot ask about . Moreover, to learn the value of , she must spend exactly questions about , but she cannot spend any more. From Lemma 18, there must then exist some setting of the variables Alice didn’t ask, such that . Then, by way of this assignment together with , becomes equal to , which Alice did not ask and hence is not defined.
4 Open questions
-
1.
What is the exact time-complexity of tt-DT? Is it possible to improve -algorithm of Proposition 6? Is it possible to prove any non-trivial bounds (for example, under the Exponential Time Hypothesis)?
-
2.
Is it possible to improve the -depth bound of Proposition 9?
-
3.
What is the exact time, space, and circuit complexity of the problem of finding the minimum size of a decision tree that computes a given Boolean function? It is known that this problem belongs to P[1], but the best depth upper-bound we know is . It seemed to us that our reduction cannot be adapted to this case without a significantly new idea.
-
4.
What can we say about the problem of approximating DT complexity? One can consider, in the reduction above, the function instead of for some , where all are the same functions as with fresh variables. It allows to prove that the problem of the approximation of DT with constant term has the same complexity as exact calculation of DT. Is it possible to improve on this result?
References
- [1] Scott Aaronson. Algorithms for boolean function query properties. SIAM Journal on Computing, 32(5):1140–1157, 2003. doi:10.1137/S0097539700379644.
- [2] David A Barrington. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1. In Proceedings STOC, 1986. doi:10.1145/12130.12131.
- [3] David A Mix Barrington, Neil Immerman, and Howard Straubing. On uniformity within NC1. Journal of Computer and System Sciences, 41(3):274–306, 1990. doi:10.1016/0022-0000(90)90022-D.
- [4] L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone. Classification and Regression Trees. Chapman and Hall/CRC, 1984.
- [5] Arkadev Chattopadhyay, Michal Kouckỳ, Bruno Loff, and Sagnik Mukhopadhyay. Simulation theorems via pseudo-random properties. Computational Complexity, 28:617–659, 2019. doi:10.1007/S00037-019-00190-7.
- [6] Mika Göös. Lower bounds for clique vs. independent set. In Proceedings of FOCS, 2015. doi:10.1109/FOCS.2015.69.
- [7] Mika Göös, Toniann Pitassi, and Thomas Watson. Deterministic communication vs. partition number. In Proceedings of the 56th FOCS, 2015. doi:10.1109/FOCS.2015.70.
- [8] David Guijarro, Vıctor Lavın, and Vijay Raghavan. Exact learning when irrelevant variables abound. Information Processing Letters, 70(5):233–239, 1999. doi:10.1016/S0020-0190(99)00063-0.
- [9] G. V. Kass. An exploratory technique for investigating large quantities of categorical data. Applied Statistics, 29(2):119–127, 1980.
- [10] C. Koch, C. Strassle, and L. Tan. Properly learning decision trees with queries is NP-hard. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 2383–2407, Los Alamitos, CA, USA, November 2023. IEEE Computer Society. doi:10.1109/FOCS57990.2023.00146.
- [11] Kasper Green Larsen. Models and techniques for proving data structure lower bounds. PhD thesis, Aarhus University, 2013.
- [12] Bruno Loff and Sagnik Mukhopadhyay. Lifting theorems for equality. In Proceedings of STACS, 2019. doi:10.4230/LIPIcs.STACS.2019.50.
- [13] Mihai Pǎtraşcu. Lower bound techniques for data structures. PhD thesis, Massachusetts Institute of Technology, 2008.
- [14] J. R. Quinlan. Induction of decision trees. Machine Learning, 1(1):81–106, 1986. doi:10.1023/A:1022643204877.
- [15] J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993.
- [16] Ran Raz and Pierre McKenzie. Separation of the monotone NC hierarchy. Combinatorica, 19(3):403–435, 1999. doi:10.1007/S004930050062.
- [17] Omer Reingold, Luca Trevisan, and Salil Vadhan. Notions of reducibility between cryptographic primitives. In Theory of Cryptography Conference, pages 1–20. Springer, 2004. doi:10.1007/978-3-540-24638-1_1.
- [18] Detlef Sieling. Minimization of decision trees is hard to approximate. J. Comput. Syst. Sci., 74(3):394–403, 2008. doi:10.1016/J.JCSS.2007.06.014.
- [19] Shihao Xuanyuan, Shiang Xuanyuan, and Ye Yue. Application of c4. 5 algorithm in insurance and financial services using data mining methods. Mobile Information Systems, 2022(1), 2022.
- [20] Andrew Chi-Chih Yao. On the complexity of comparison problems using linear functions. In 16th Annual Symposium on Foundations of Computer Science (sfcs 1975), pages 85–89. IEEE Computer Society, 1975.
- [21] Wei Zhan. URL: https://cstheory.stackexchange.com/questions/52546/a-question-about-decision-tree-complexity.