In theoretical computer science a pointer machine is an "atomistic" abstract computational machine model akin to the random-access machine. Depending on the type, a pointer machine may be called a linking automaton, a KU-machine, an SMM, an atomistic LISP machine, a tree-pointer machine, etc.. At least three major varieties exist in the literature—the Kolmogorov-Uspenskii model, the Knuth linking automaton, and the Schönhage Storage Modification Machine model. The SMM seems to be the most common. From its "read-only tape" a pointer machine receives input—bounded symbol-sequences made of at least two symbols e.g. -- and it writes output symbol-sequences on an output "write-only" tape. To transform a symbol-sequence to an output symbol-sequence the machine is equipped with a "program"—a finite-state machine. Via its state machinethe programreads the input symbols, operates on its storage structure—a collection of "nodes" interconnected by "edges", and writes symbols on the output tape. Pointer machines cannot do arithmetic. Computation proceeds only by reading input symbols, modifying and doing various tests on its storage structure—the pattern of nodes and pointers, and outputting symbols based on the tests. "Information" is in the storage structure.
Types of "pointer machines"
Both Gurevich and Ben-Amram list a number of very similar "atomistic" models of "abstract machines"; Ben-Amram believes that the 6 "atomistic models" must be distinguished from "High-level" models. This article will discuss the following 3 atomistic models in particular:
Use of the model in complexity theory: van Emde Boas expresses concern that this form of abstract model is: Gurevich 1988 also expresses concern: The fact that, in §3 and §4, Schönhage himself demonstrates the real-time equivalences of his two random-access machine models "RAM0" and "RAM1" leads one to question the necessity of the SMM for complexity studies. Potential uses for the model: However, Schönhage demonstrates in his §6, Integer-multiplication in linear time. And Gurevich wonders whether or not the "parallel KU machine" "resembles somewhat the human brain"
Schönhage's storage modification machine (SMM) model
Schönhage's SMM model seems to be the most common and most accepted. It is quite unlike the register machine model and other common computational models e.g. the tape-based Turing machine or the labeled holes and indistinguishable pebbles of the counter machine. The computer consists of a fixed alphabet of input symbols, and a mutable directed graph with its arrows labelled by alphabet symbols. Each node of the graph has exactly one outgoing arrow labelled with each symbol, although some of these may loop back into the original node. One fixed node of the graph is identified as the start or "active" node. Each word of symbols in the alphabet can then be translated to a pathway through the machine; for example, 10011 would translate to taking path 1 from the start node, then path 0 from the resulting node, then path 0, then path 1, then path 1. The path can, in turn, be identified with the resulting node, but this identification will change as the graph changes during the computation. The machine can receive instructions which change the layout of the graph. The basic instructions are the new w instruction, which creates a new node which is the "result" of following the string w, and the set w to v instruction which directs an edge to a different node. Here w and v represent words. v is a former word—i.e. a previously-created string of symbols—so that the redirected edge will point "backwards" to an old node that is the "result" of that string. neww: creates a new node. w represents the new word that creates the new node. The machine reads the wordw, following the path represented by the symbols of w until the machine comes to the last, "additional" symbol in the word. The additional symbol instead forces the last state to create a new node, and "flip" its corresponding arrow from its old position to point to the new node. The new node in turn points all its edges back to the old last-state, where they just "rest" until redirected by another new or set. In a sense the new nodes are "sleeping", waiting for an assignment. In the case of the starting or center node we likewise would begin with both of its edges pointing back to itself.
Example: Let "w" be 10110, where the final character is in brackets to denote its special status. We take the 1 edge of the node reached by 10110, and point it to a new 7th node. The two edges of this new node then point "backward" to the 6th node of the path.
Setwtov: redirects an edge from the path represented by wordw to a former node that represents word v. Again it is the last arrow in the path that is redirected.
Example: Set 1011011 to 1011, after the above instruction, would change the 1 arrow of the new node at 101101 to point to the fifth node in the pathway, reached at 1011. Thus the path 1011011 would now have the same result as 1011.
Ifv = wthen instruction z : Conditional instruction that compares two paths represented by words w and v to see if they end at the same node; if so jump to instruction z else continue. This instruction serves the same purpose as its counterpart in a register machine or Wang b-machine, corresponding to a Turing machine's ability to jump to a new state.
Knuth's "linking automaton" model
According to Schoenhage, Knuth noted that the SMM model coincides with a special type of "linking automata" briefly explained in volume one of The Art of Computer Programming
Kolmogorov–Uspenskii machine (KU-machine) model
KUM differs from SMM in allowing only invertible pointers: for every pointer from a node x to a node y, an inverse pointer from y to x must be present. Since outgoing pointers must be labeled by distinct symbols of the alphabet, both KUM and SMM graphs have O outdegree. However, KUM pointers' invertibility restricts the in-degree to O, as well. This addresses some concerns for physical realism, like those in the above van Emde Boas quote. An additional difference is that the KUM was intended as a generalization of the Turing machine, and so it allows the currently "active" node to be moved around the graph. Accordingly, nodes can be specified by individual characters instead of words, and the action to be taken can be determined by a state table instead of a fixed list of instructions.