PMON + : A Fluent Logic for Action and. Change. Patrick Doherty. Abstract

Size: px
Start display at page:

Download "PMON + : A Fluent Logic for Action and. Change. Patrick Doherty. Abstract"

Transcription

1 PMON + : A Fluent Logic for Action and Change Formal Specication, Version 1.0 Patrick Doherty Abstract This report describes the current state of work with PMON, a logic for reasoning about action and change, and its extensions. PMON has been assessed correct for the K;IA class using Sandewall's Features and Fluents framework which provides tools for assessing the correctness of logics of action and change. A syntactic characterization of PMON has previously been provided in terms of a circumscription axiom which is shown to be reducible to a rst-order formula. This report introduces a number of new extensions which arealso reducible and deal with ramication. The report is intended to provide a formal specication for the PMON family of logics and the surface language L(SD) used to represent action scenario descriptions. It should be considered a working draft. The title of the report has a version number because both the languages and logics used are continually evolving. Since this document isintended as a formal specication which isusedby our group as a reference for research and implementation, it is understandably brief as regards intuitions and applications of the languages and logics dened. We doprovide a set of benchmarks and comments concerning these which can serve as a means of comparing this formalism with others. The set of benchmarks is not complete and is only intended to provide representative examples of the expressivity and use of this particular family of logics. We describe its features and limitations in other publications by our group which can normally be found at Supported in part by the Swedish Research Council for the Engineering Sciences (TFR). IDA Technical Report 1996 LiTH-IDA-R ISSN Department of Computer and Information Science, Linkoping University, S Linkoping, Sweden

2 PMON + : A Fluent Logic for Action and Change Formal Specication, Version 1.0 Patrick Doherty Department of Computer and Information Science Linkoping University S Linkoping, Sweden patdo@ida.liu.se Abstract This report describes the current state of work with PMON, a logic for reasoning about action and change, and its extensions. PMON has been assessed correct for the K;IA class using Sandewall's Features and Fluents framework which provides tools for assessing the correctness of logics of action and change. A syntactic characterization of PMON has previously been provided in terms of a circumscription axiom which is shown to be reducible to a rst-order formula. This report introduces a number of new extensions which arealso reducible and deal with ramication. The report is intended to provide a formal specication for the PMON family of logics and the surface language L(SD) used to represent action scenario descriptions. It should be considered a working draft. The title of the report has a version number because both the languages and logics used are continually evolving. Since this document isintended as a formal specication which isusedby our group as a reference for research and implementation, it is understandably brief as regards intuitions and applications of the languages and logics dened. We doprovide a set of benchmarks and comments concerning these which can serve as a means of comparing this formalism with others. The set of benchmarks is not complete and is only intended to provide representative examples of the expressivity and use of this particular family of logics. We describe its features and limitations in other publications by our group which can normally be found at Supported in part by the Swedish Research Council for Engineering Sciences (TFR). 1

3 Contents 1 Introduction 3 2 The Base Logic FL Syntax The Object Sorts S o The Value Sorts S v The Fluent SortF The Action Sort A The Temporal Sort T Foundational Axioms in FL Axioms for the Value Sorts S v Axioms for the Objects Sorts S o Axioms for the Fluent Sort F Axioms for the Action Sort A Some Useful Notation Reducing Scenario Descriptions to L(FL) 9 A The Surface Language for Scenario Descriptions 9 A.1 Logical Formulas in L(SD) A.1.1 Reducing Logic Formulas in L(SD) tol(fl) A.2 Reassignment Formulas in L(SD) A.2.1 Reducing Reassignment Formulas in L(SD) tol(fl) A.3 Causal Constraint Statements in L(SD) A.3.1 Reducing Causal Constraint Statements in L(SD) tol(fl) A.4 Acausal Constraint Statements in L(SD) A.4.1 Reducing Acausal Constraint Statements in L(SD) tol(fl) A.5 Dynamic Fluent Statements in L(SD) A.5.1 Reducing Dynamic Fluent Statements in L(SD) tol(fl) A.6 Observation Statements in L(SD) A.6.1 Reducing Observation Statements in L(SD) tol(fl) A.7 Action Representation in L(SD) A.8 Action Scenario Descriptions in L(SD) A.8.1 Some Useful Notation

4 B The PMON Family of Logics 29 B.1 Circumscription B.2 The PMON Family of Logics and their Circumscription Policies B.2.1 The Nochange Axiom B.2.2 PMON B.2.3 PMON(RCs): Extending PMON with Causal Constraint Statements B.2.4 PMON + : Extending PMON with Dynamic Fluent Statements C Benchmark Examples 34 C.1 Examples within the K;IA class C.1.1 Yale Shooting Scenario C.1.2 Stanford Murder Mystery Scenario C.1.3 The Red and Yellow Bus Scenario C.1.4 Hiding Turkey Scenario C.1.5 Ferry boat Connection Scenario C.1.6 Furniture Assembly Scenario C.2 Examples outside the K;IA class C.2.1 Jump in a Lake Scenario C.2.2 Extended Electric Circuit Scenario C.2.3 Extended Electric Circuit Example with Device C.2.4 The Delayed Circuit Scenario C.2.5 The Trap Door Scenario C.2.6 Extended Baby Protection Scenario Introduction The following report is intended to provide a formal specication for the PMON family of logics and the surface language L(SD) used to represent action scenario descriptions. The title of the report has a version number because both the languages and logics used are continually evolving. Since this document is intended as a formal specication which is used by our group as a reference for research and implementation, it is understandably brief as regards intuitions and applications of the languages and logics dened. We do provide a set of benchmarks and comments concerning these which can serve as a means of comparing this formalism with others. The set of benchmarks is not complete and is only intended to provide representative examples of the expressivity and use of this particular family of logics. We describe its features and limitations in other publications by our group which can normally be found at The Features and Fluents project began in 1987 and was initially based on a number of technical reports by Sandewall (e.g. [22, 21, 24, 25]) and published articles (e.g. [23, 26,28]) that resulted in a book by Sandewall [27] which covers part of the research done during this period. Two concepts of fundamental importance, the use of ltering and occlusion, were introduced at an early stage in the project [21, 23], and in the current research with PMON are proving to be quite versatile 3

5 in dealing with many of the problems which arise when reasoning about action and change. For details about the relation between ltering and occlusion and other approaches, see Sandewall [27]. Doherty [4, 3, 5, 6], took an approach somewhat dierent from Sandewall and generated syntactic characterizations of many of the denitions of preferential entailment introduced in Features and Fluents by translating scenario descriptions into a standard sorted rst-order logic with circumscription axioms in an attempt to provide a basis for implementing some of these logics. It turns out that PMON is also well-behaved in this respect any scenario description in PMON is reducible to a rst-order theory. In the current report, we continue the development of PMON and show that it continues to have a number of nice mathematical properties even when extended for ramication [8]. In related work, Karlsson [10, 11, 13, 12] uses PMON as a basis for formal specication of plans. 2 The Base Logic FL There are a number of dierent possibilities for choosing a base logic in which to compile scenario descriptions which are described using the scenario description language L(SD). Sandewall uses a specialized logic called discrete feature logic with a number of interesting non-standard features which can potentially aid in developing ecient implementations for the various action classes. In this section, we introduce an alternative, which we call uent logic and denote FL. FL will be used as a basis for formalizing reasoning about action and change. The language for FL, denoted L(FL), is a many-sorted rst-order language. All scenario descriptions described in L(SD) have a modular translation into L(FL). 2.1 Syntax The language L(FL), is a many-sorted rst-order language with equality. We use the standard connectives : (negation), ^ (conjunction),! (implication), (equivalence), _ (disjunction), and the standard quantiers 8 and 9. In addition, scoping will be indicated by standard use of parentheses or dot notation. We associate a many-sorted signature in L(FL) for each vocabulary and action similarity type in L(SD) as follows. Let = h O V Di be a vocabulary in L(SD), where and In addition, let O = ho 1 ::: O l i V = hv 1 ::: V p i = ff i1 1 : D 1 f i2 2 : D 2 :::fn in : D n g D = hd 1 ::: D n i where D i 2Oor V: = fa i1 1 Ai2 2 :::Aim m g be an action similaritytype for L(SD). The many sorted-signature S =(S ), is a pair where S is a nite set of sort symbols S = ff A Tg[S o [ S v S o = fo 1 ::: O l g and S v = fv 1 ::: V p g and S d = S o [ S v : andisadenumerable set of sort strings describing the type for the function and relation symbols in L(FL) associated with the feature symbols in, the action symbols in, the function and 4

6 relation symbols associated with the temporal sort T, the domain independent relation symbols, and the constant symbols for each of the sorts. contains the following domain dependent strings : For each feature symbol f ik k in with a non-boolean value domain sort dom (f ik k )=D k, L(FL)contains a function symbol f j k of arity j = i k + 1 and contains the string f j k : s 1 ::: s j!f, where s i 2 S o,1 i j ; 1, and s j 2 S d. For each feature symbol f ik k in with a boolean value domain sort dom (f ik k )=D k, L(FL) contains a function symbol f j k of arity j = i k andcontains the string f j k : s 1:::s j!f, where s i 2 S o,1 i j. For each action symbol A ik k in, L(FL)contains a function symbol Aj k of arity j = i k and contains the string A j k : s 1 ::: s j!a, where s i 2 S d,1ij. For each constant c in L(FL)ofsortO i,contains a string c : O i.for each constant c in L(FL)ofsortV i, contains a string c : V i. In addition, contains the following domain independent strings: Holds : TF, Occlude : TF, Observe : TF, Occurs : TTA, <: TT, : TT, +:TT!T, ; : TT!T The Object Sorts S o For each sort O i in S o : We use the letter o i, possibly subscripted for variables of sort O i. For each object name n j in O i,we associate an object name constant n i j of sort O i of the same name in L(FL). We use the letter o i, possibly subscripted for object constants of sort O i. Only constants and variables of sorts O i are object terms. A unique names assumption will be applied to the object name constants, while the object constants will be allowed to vary among object names The Value Sorts S v For each sort V i in S v : We use the letter v i, possibly subscripted for variables of sort V i. For each value name j in V i,we associate an value name constant v i j of sort V i of the same name in L(FL). We use the letter u i, possibly subscripted for value constants of sort V i. 1 For convenience, we may sometimes violate naming conventions for the dierent sorts and use other letters when there is no danger of ambiguity. 5

7 Only constants and variables of sorts V i are value terms. A unique names assumption will be applied to the value name constants, while the value constants will be allowed to vary among value names The Fluent Sort F We use the letters f or z, possibly subscripted for variables of sort F. For each feature symbol fk ik in, we associate a function symbol f k in L(FL) of the same name and having the sort described in. Fluent terms are constructed in the usual manner, but note that embedded terms f(f(;)) are not legal terms in the language. A unique names assumption will be applied to the uents terms in sort F The Action Sort A We use the letter a, possibly subscripted for variables of sort A. For each action symbol A ik k in, we associate a function symbol A k in L(FL) of the same name and having the sort described in. Action terms are constructed in the usual manner, but note that embedded terms A(A(;)) are not legal terms in the language. A unique names assumption will be applied to the actions terms in sort A The Temporal Sort T We use the letter t, possibly subscripted for variables of sort T. We use the letter t, possibly subscripted, and the numerals (0, 1, 2,... ) constants of sort T. for temporal The intended interpretation of T is as a linear discrete time line where T is considered isomorphic to the natural numbers. Although we assume an interpreted theory, using the standard interpretation for the natural numbers, it turns out that when reasoning with K;IA or its current extensions, we use no more than Presburger arithmetic. In fact, we use a sub-theory of Presburger arithmetic, the rst-order theory of point constraints over integers [15]. The relation symbols < and are interpreted as the usual "less than" and "less than or equal to" relations on natural numbers. The function symbols +, and ; are interpreted as the usual "plus" and "minus" functions on natural numbers. In what follows, < 0 < 00, 0 < 00, < 0 00 and 0 00, stand for < 0 ^ 0 < 00, 0 ^ 0 < 00, < 0 ^ 0 00 and 0 ^ 0 00, respectively, where, 0 and 00 are terms of sort T. 3 Foundational Axioms in FL In this section we describe a number of domain independent axioms that are always assumed to be part of any translation of action scenarios into L(FL). In the following, we will use the meta variables 6

8 d 1 ::: possibly superscripted, to denote object or value variables of sorts ins o,ors v. d 1 ::: possibly superscripted, to denote object or value constants, or name constants of sorts S o or S v. 3.1 Axioms for the Value Sorts S v For each uent fk ik with value domain D k 2 S d, the following unique values axioms are assumed which state that at a specic time-point t, auent fk ik can only be assigned one value from its value domain for a particular set of object arguments o 1 ::: o ik ; 1: 8o t d k 1 d k 2:(d k 1 6= d k 2! (1) :(Holds(t f ik k (o 1 ::: o ik;1 d k ik 1 )) ^ Holds(t fk (o 1 ::: o ik;1 d k 2 )))) where o = o 1 ::: o ik;1.we will denote the set of unique values axioms by ; uva. For each uent f ik k with value domain D k 2 S d, the following value existence axioms are assumed which state that at a specic time-point t, a uent fk ik must be assigned at least one value from its value domain for a particular set of object arguments o 1 ::: o ik : 8o8t9d k 1:Holds(t f ik k (o 1 ::: o ik;1 d k 1)) (2) where o = o 1 ::: o ik;1.we will denote the set of value existence axioms by ; vea. For theories with nite value domains, the following unique name axioms are assumed for each of the value sorts V j 2 S v : ^ v j i 6= vj k : (3) 1i<kjVjj Note that this axiom applies to value name constants and not value constants, which may be bound to the interpretation of any value name constant. We will denote the set of unique names axioms for value domains by ; unav. For theories with nite value domains, the following domain closure axioms are assumed for each of the value sorts V j 2 S v : jvjj _ 8v j : v j = v j i : (4) i=1 Similar axioms for value domains D i of type S o will be dened in Section 3.2 We will denote the set of domain closure axioms for value domains by ; dcav. 3.2 Axioms for the Objects Sorts S o For theories with nite object domains, the following unique name axioms are assumed for each of the object sorts O j 2 S o : ^ n j i 6= nj k : (5) 1i<kjOjj We will denote the set of unique names axioms for object domains by ; unao. 7

9 For theories with nite object domains, the following domain closure axioms are assumed for each of the object sorts O j 2 S o : 8o j : jojj _ i=1 o j = n j i : (6) We will denote the set of domain closure axioms for object domains by ; dcao. 3.3 Axioms for the Fluent Sort F For theories with nite uent domains, the following unique names axioms are assumed: ^ 8o d ij d ik :f ij j (o 1 ::: o ij;1 d ij ) 6= f ik k (o0 1 ::: o0 i k;1 d 0 i k ) (7) 1j<kn where d ij d 0 i k are either object or value variables. i k;1 ^ 8o d ik d 0 i k :(fk ik (o 1 ::: o ik;1 d ik )=fk ik (o0 1 ::: o 0 i k;1 d 0 i k ))! ( o j = o 0 j) ^ d ik = d 0 i k : (8) We will assume that similar axioms exist for boolean value domains and will denote the set of unique names axioms for the uent domainby; unaf. 3.4 Axioms for the Action Sort A For theories with nite action domains, the following unique names axioms are assumed: ^ 8d:A ij j (d 1 ::: d ij ) 6= A ik k (d0 1 ::: d 0 i k ): (9) 1j<km 8d:(A i k^ ik k (d 1 ::: d ik )=A ik k (d0 1 ::: d 0 i k ))! ( d j = d 0 j) (10) where d = d 1 ::: d ik d 0 1 ::: d 0 i k are either object or value variables. We will denote the set of unique names axioms for the action domain by ; unaa. 3.5 Some Useful Notation The following notation will be useful when describing circumscription policies in a later section. ; UNA =; unav [ ; unao [ ; unaf [ ; unaa : (11) ; DCA =; dcav [ ; dcao : (12) The following collection of Foundational Axioms will be used in the circumscription policies. ; FA =; UNA [ ; DCA [ ; uva [ ; vea : (13) 8

10 4 Reducing Scenario Descriptions to L(FL) Given a scenario description, consisting of statements in the surface language L(SD), these statements can be translated into formulas in the language L(FL) via a two-step process. In the rst step: Action schemas in are instantiated with action occurrence statements, resulting in what are called schedule statements. The resulting schedule statements replace the action schemas. Observation statements are translated into xed observation statements. The result is an expanded (action) scenario description 0, consisting of schedule, xed observation, causal constraint, acausal constraint and dynamic uent statements. Each of these are statements in L(SD). In the second step, translation operators mapping statements from L(SD) into L(FL) are used to translate statements in 0 into well-formed formulas in L(FL). The details are provided in the appendices. A The Surface Language for Scenario Descriptions In this appendix, we will dene each of the dierent types of statements in L(SD) together with the translation operators which map statements from L(SD) into L(FL). In addition, we provide a number of Lemmas and Theorems related to the reduction of circumscriptive theories to the rst-order case. In Section 2, we dened the relationship between symbols in L(SD) and those in L(FL). In the following, we will additionally assume that there is a straightforward and unambiguous mapping from all logical connectives, quantiers, delimiters, and variable symbols used in L(SD) to their correlates in L(FL). The translation operators Tran EOE, Tran EV E, and Tran ETE dene part of this mapping, but we do not always explicitly apply these operators when the application is clear from the context. This will avoid a certain amount of notational overhead. The legal syntax for representing scenario descriptions is dened in terms of a surface language L(SD) consisting of: action occurrence statements, action law schemas, observation statements and xed observation statements, schedule statements, causal constraint statements, acausal constraint statements, and dynamic uent statements. All statements in L(SD), with the exception of occurrence statements, are constructed using logical and reassignment formulas in L(SD). Both logical and reassignment formulas, together with occurrence statements, can be translated to formulas in the base logic L(FL). Denition A.1 (Object Domain for L(SD)) An object domain O = ho 1 ::: O n i is a nite tuple of object sorts. Each object sort is dened as a non-empty nite set of object names. Denition A.2(Value Domain for L(SD)) A value domain D = hd 1 ::: D n i isanitetupleofvalue or object sorts from O V. Each object or value sort is dened as a non-empty nite set of object or value names. 9

11 Denition A.3 (Similarity Type for L(SD)) A similarity type for L(SD) is a mapping ff i1 1 : D 1 f i2 2 : D 2 :::fn in : D ng where i k 0foreach k and each fk ik is a feature symbol with i k arguments. An object domain sort O j from the object domain O is associated with each of the i k arguments of f ik k. Each D k is a non-empty nite set of feature values for f k of value domain sorts O i or V i. Dom (f k ) will be used to denote the value domain sort for the feature f k. Dom (f j k ) will be used to denote the object domain sort O i in O associated with the jth argument of the feature f k. A vocabulary = h O V Di is a tuple consisting of a similarity type, an object domain, value sorts, and a value domain. The value domain for, D = hd 1 ::: D n i, is the nite tuple of value sorts in O or V associated with the feature symbols in. Remark A.1 The surface language will be set up so that the denitions can be extended asneeded when modeling additional concepts associated with action and change. For example, currently, both the object and value domains are dened as being nite. At a later date, this restriction may be relaxed. A.1 Logical Formulas in L(SD) Let = h O V Di be a vocabulary. Denition A.4 (Elementary Object Expression (EOE)) An elementary object expression is any one of the following: 1. An object constant symbol. 2. An object name symbol. 3. An object variable symbol. Denition A.5 (Elementary Value Expression (EVE)) An elementary value expression is any one of the following: 1. A value constant symbol. 2. A value name symbol. 3. A value variable symbol. Denition A.6 (Elementary Feature Expression (EFE)) An elementary feature expression is any one of the following: 1. A feature symbol f 0 k from the vocabulary. 2. f ik k (! 1 :::! ik ) where f ik k is from the vocabulary and! 1 :::! ik are elementary object expressions. Denition A.7 (Elementary Fluent Formula (EFlF)) An elementary uent formula has the form f ^=X, where f is an elementary feature expression and XDom (f). Denition A.8 (Fluent Formula (FlF)) The set of uent formulas FlF is dened as follows : 1. If is an elementary uent formula then is in FlF. 10

12 2. If o is an object variable and is in FlF, then 8o: and 9o: are in FlF. 3. If and are in FlF then : is in FlF and any boolean combination of and are in FlF. 4. Nothing else is in FlF. Denition A.9 (Elementary Time-point Expression (ETE)) An elementary time-point expression is any one of the following: 1. A temporal constant in L(FL). 2. A temporal variable in L(FL). 3. Any temporal term constructed from temporal functions in L(FL). Remark A.2 Note that as regards ETE's, it is generally assumed that any term in L(FL) can be used in L(SD). We set up the correspondence in this manner because it should be relatively straightforward to change temporal structures when using Fluent Logic. Denition A.10 (Elementary Fixed Fluent Formula (EFFF)) Let denote an elementary time-point expression, and denote an elementary uent formula. An elementary xed uent formula has the following form: 1. []. Denition A.11 (Elementary Fixed Formula (EFF)) Let and 0 denote elementary time-point expressions,! and! 0 denote elementary object expressions. An elementary xed formula is any one of the following: 1. An elementary xed uent formula. 2. = 0. 3.! =! , where is any temporal relation dened in L(FL). Denition A.12 (Fixed Fluent Formula (FFF)) Let denote an elementary time-point expression, and denote a uent formula. A xed uent formula has the following form: 1. []. Denition A.13 (Logic Formula (LF)) The set of logic formulas LF is dened as follows : 1. If is an elementary xed formula then is in LF. 2. If t and o are temporal and object variables, respectively, and is in LF, then 8t: 9t: 8o: 9o: are in LF. 3. If and areinlfthen: is in LF and any boolean combination of and is in LF. 4. Nothing else is in LF. Denition A.14 (Restricted Logic Formula (RLF)) The set of restricted logic formulas RLF is dened as follows : 1. If is a xed uent formula then is in RLF. 2. If t and o are temporal and object variables, respectively, and is in RLF, then 8t: 9t: 8o: 9o: are in RLF. 3. If and are in RLF then : is in RLF and any boolean combination of and is in RLF. 11

13 4. Nothing else is in RLF. Denition A.15 (Time-Point Formula (TPF)) A time-point formula is a logic formula where the elementary xed formulas from which it is constructed only contain types 2 and 4 in Denition A.11. Denition A.16 (Object Formula (OF)) An object formula is a logic formula where the elementary xed formulas from which it is constructed only contain type 3 in Denition A.11. Any xed uent formula can be represented as a composition of elementary xed uent formulas (EFFF) using the logical connectives and quantication over objects in the usual fashion. Denition A.17 (Fixed Fluent Formula Abbreviations) Let be an ETE, o an object variable and, 0,uentformulas. The following reduction rules can be used to translate any FFF into a composition of elementary xed uent formulas: 2 []:( ^ 0 ) def =[]: _: 0. []:( _ 0 ) def =[]: ^: 0. [] ^ 0 def =[] ^ [] 0. [] _ 0 def =[] _ [] 0. []! 0 def =[]: _ 0. [] 0 def =[] [] 0. []:: def =[]. []: def = :[]. []8o: def = 8o:([]) []9o: def = 9o:([]) Denition A.18(Interval Fixed Fluent Formula (IFFF)) Let, 0 denote elementary time-point expressions, and denote a uent formula. An interval xed uent formula has any of the following forms: 1. [ 0 ], ( 0 ], [ 0 ), ( 0 ). 2. (;1 0 ], (;1 0 ), [ 1), ( 1), (;1 1). Denition A.19 (Abbreviations for IFFF's) Let, 0 be ETEs, and be a uent formula. The following reduction rules can be used to translate any IFFF into a logic formula [ 0 ] def = 8t: t 0! [t]. [ 0 ) def = 8t: t< 0! [t]. ( 0 ] def = 8t: < t 0! [t]. ( 0 ) def = 8t: < t < 0! [t]. 2 Note that the standard application of these rules is assumed, where all negations are rst driven inward before applying the double negation elimination and then any single negation left can be driven to the left outside the scope of the [t] notation. 12

14 (;1 0 ] def = 8t: t 0! [t]. (;1 0 ) def = 8t: t < 0! [t]. [ 1) def = 8t: t! [t]. ( 1) def = 8t: < t! [t]. (;1 1) def = 8t: [t]. A.1.1 Reducing Logic Formulas in L(SD) to L(FL) In this section, we will provide an algorithm which takes as input a formula in L(SD) and returns a w in L(FL). We will assume that the relation between vocabularies described in Section 2 holds. Denition A.20(Tran EOE ) Let! be an elementary object expression (EOE). 1. If! is an object constant symbol or object name symbol of sort O i then Tran EOE (!) =c i, where c i is a constant symbol in L(FL) of sort O i, which is the correlate to O i and assumed to exist in L(FL)'s similarity type. 2. If! is a variable symbol of sort O i then Tran EOE (!) =o i, where o i is a variable symbol in L(FL)ofsortO i. Denition A.21(Tran EV E ) Let! be an elementary value expression (EVE). 1. If! isavalue constant symbol or value name symbolofsortv i then Tran EOE (!) =c i, where c i is a constant symbol in L(FL) of sort V i,which is the correlate to V i and assumed to exist in L(FL)'s signature. 2. If! is a variable symbol of sort V i then Tran EV E (!) =v i, where v i is a variable symbol in L(FL)ofsortV i. Denition A.22(Tran E(OV )E ) Let! be an EOE or EVE. We will often use the translation operator Tran E(OV )E which is dened as TranEOE (!) if! is of sort O Tran E(OV )E (!) = Tran EV E (!) if! is of sort V Denition A.23(Tran ETE ) It is assumed that there is a straightforward mapping from temporal constants, variables, and expressions used in L(SD) into L(FL). Denition A.24(Tran EFFF ) Let be an elementary xed uent formula []f k (! 1 :::! ik )^=X, where X = f 1 ::: n g, Dom (f k ) is non-boolean, and f k has arity i k and sort Dom (f 1 k ) ::: Dom (f ik k )! Dom (f k ): Tran EFFF () = n_ Holds( f k ( 1 ::: ik d k j )) where = Tran ETE (), each d k j = Tran E(OV )E( j ) is a name constant ofsortd k associated with each name in Dom (f k ), each l = Tran EOE (! l ) is either a constant orvariable of the appropriate 13

15 sorts O l associated with sorts Dom (f l k ), and f k is the function symbol in L(FL)ofarity i k +1 associated with f k in L(SD). If Dom (f k ) is Boolean and X = ft Fg then Tran EFFF () = If Dom (f k ) is Boolean and X = ft g then If Dom (f k ) is Boolean and X = ff g then Holds( f k ( 1 ::: ik )) _:Holds( f k ( 1 ::: ik )): Tran EFFF () =Holds( f k ( 1 ::: ik )): Tran EFFF () =:Holds( f k ( 1 ::: ik )): Lemma A.1 Let be an arbitrary logic formula in the surface language for scenario descriptions. There is an algorithm that transforms intoawinl(fl). Proof Since a logic formula is composed of elementary xed formulas (EFF) using logical connectives and quantiers in the usual fashion, and we assume the vocabulary of L(FL) contains the necessary sorts, and logical and non-logical symbols, it suces to show that elementary xed formulas can be translated. Let be a logical formula in L(SD) and be an arbitrary elementary xed formula in.according to Denition A.11, there are four cases: 1. If [] is an elementary xed uent formula then replace in with Tran EFFF (). 2. If = 0 then replace in with Tran ETE () =Tran ETE ( 0 ). 3. If! =! 0 then replace in with Tran EOE (!) =Tran EOE (! 0 ). 4. If 0 then replace in with Tran ETE () Tran ETE ( 0 ). Under the assumption that there is a straightforward mapping of the logical connectives, quantiers, and delimiters, then after applying all possible substitutions, we are left with a w in L(FL). Remark A.3 We will assume that Tran LF ( ) denotes the corresponding w in L(FL). In addition, if Tran LF ( ), where might include sub-formulas where one of the dened transformation operators Tran is applied, then it is assumed that the outer Tran LF simply leaves the result of Tran unchanged. A.2 Reassignment Formulas in L(SD) Reassignment formulas play a very important role in PMON and represent the assignment of a new value to a uent. The reassignment operator is denoted by \:=". Denition A.25 (Elementary Reassignment Expression (ERE)) An elementary reassignment expression has the form f i := fg where f i is an EFE and v 2 Dom (f i ). The following abbreviations will be used. The rst two apply to any value domain for f i while the last two apply when Dom (f i ) is Boolean: 14

16 f i := def = f i := fg. :f i := def = f i := Dom (f i ) nfg. :f i := ft g def = f i := ff g. :f i := ff g def = f i := ft g. Denition A.26 (Reassignment Expression (RE)) A reassignment expression is an expression of the form f i := X, where f i is an EFE and X is a non-empty subset of Dom (f i ). A reassignment expression is an abbreviation for a disjunction of ERE's. Let be the RE f i := f 1 ::: n g, then n_ def = f i := j : The following abbreviation will be used. :f i := X def = f i := Dom (f i ) nx. Remark A.4 For the boolean value domain B, there are three cases: 1. f i := ft g. 2. f i := ff g. 3. f i := ft Fg def = f i := ft g_f i := ff g. Denition A.27 (Elementary Reassignment Formula (ERF)) An elementary reassignment formula is a formula of type [ 0 ]f i := X, where both 0 are elementary time-point expressions and f i := X is a RE. The following abbreviation will be used: n_ n_ [ 0 ]f i := f 1 ::: n g =[ 0 def ] f i := j = [ 0 ]f i := j : When X is a singleton set, [ 0 ]f i := X will be referred to as a simple ERF. It is easily observed that ERF's are simply abbreviations for a disjunction of simple ERF's. Denition A.28 (Restricted Reassignment Formula (RRF)) A restricted reassignment formula is a conjunction of ERF's n^ 1 [ 0 ]f j := X j A ^ ( t o) together with a logic formula (t o) representing duration constraints for the interval [ 0 ], where [ 0 ] is the same for each conjunct and no two EFE's,f j and f j 0, are the same. In addition, t and o, denoting the free temporal and object variables in, are restricted to be only those variables mentioned freely in any ofthef j,, or 0, and constraints in may only be placed on the elementary feature expressions f j between +1and 0, inclusively. The following abbreviation will be used: n^ [ 0 def ] f j := X j = n^ [ 0 ]f j := X j 15

17 Proposition A.1 Let be an arbitrary restricted reassignment formula in the surface language for scenario descriptions. There is an eective algorithm that transforms into a formula in conjunctive normal form, where each conjunct is a disjunction of simple elementary reassignment formulas. Proof Straightforward. Follows from the denitions. Denition A.29 (Reassignment Formula (RF)) A reassignment formula is a disjunction of restricted reassignment formulas (RRF's) k_ ni [ 0 ]f ij := X ij A ^ i (o t) A i=1 where the interval [ 0 ] is the same for each RRF. The following abbreviation will be used: k_ ^ [ 0 ni f ij := X ij A ^ i (o t) A def = i= k_ ni [ 0 ]f ij := X ij A ^ i (o t) A Remark A.5 An additional restriction will be placed on reassignment formulas for the class of action theories we deal with. If the elementary feature expression f mj is mentioned inthemth disjunct of a reassignment formula, then it must be mentioned inallthekdisjuncts. If this is not the case when using a reassignment formula in an action law specication then it is assumed that during the translation process the elementary reassignment formula [ 0 ]f mj := X,where X = D mj (the whole value domain for f mj ), is added toeach disjunct where f mj is not mentioned. Note that this does not inuence the semantics of the reassignment formula other than to ensure that the same feature expressions are occluded ineach disjunct of the reassignment expression. In other words, legally the occlusion specication can not be any other way. Alternatively, when translating a reassignment formula into a w in L(FL), one need onlymodify the occlusion assertions so that any feature expression mentioned inareassignment formula is occluded. One simply denes a set of inuenced features as the union of the sets of feature expressions mentioned ineach disjunct. When doing the translation, it is assumed thateach feature expression in the set is occluded. Denition A.30 (Conditional Reassignment Formula (CRF)) A conditional reassignment formula is a formula of the following type 8t8o:([](o)! [ 0 ](o)), where [](o) is a xed uent formula and [ 0 ](o) is a reassignment formula. The variables t o of sorts O i and T, respectively, are free in and. The variables t are restricted to those that are free in the elementary time-point expressions and 0. A restricted conditional reassignment formula is a CRF where [ 0 ] is a restricted reassignment formula. i=1 A.2.1 Reducing Reassignment Formulas in L(SD) to L(FL) 16

18 Denition A.31(Tran SERF, Tran ERF ) Let be a simple elementary reassignment formula [ 0 ]f k (! 1 :::! ik ):=X, where X = f j g, Dom (f k ) is non-boolean, and f k has arity i k and sort Dom (f 1 k ) ::: Dom (f ik k )! Dom (f k ): Tran SERF () =Holds( 0 f k ( 1 ::: n d k j ))^ 8t8d k (<t 0! Occlude(t f k ( 1 ::: n d k ))) where = Tran ETE () 0 = Tran ETE ( 0 ), d k j = Tran E(OV )E ( j )isavalue or object name constant of sort D k associated with each object of sort Dom (f k )=D k, d k is a variable of sort D k, each m = Tran EOE (! m ) is either a constantorvariable of the appropriate sorts O l associated with sorts Dom (f l k ), and f k is the function symbol of arity i k +1inL(FL) associated with f k in L(SD). If Dom (f k ) is Boolean and X = ft g then If Dom (f k ) is Boolean and X = ff g then Tran SERF () =Holds( 0 f k ( 1 ::: n ))^ 8t( <t 0! Occlude(t f k ( 1 ::: n ))) Tran SERF () =:Holds( 0 f k ( 1 ::: n ))^ 8t( <t 0! Occlude(t f k ( 1 ::: n ))) Let be an elementary reassignment formula [ 0 ]f k (! 1 :::! ik ):=X,asabove, but where X = f 1 ::: n g. Tran ERF () = _ j2x Holds( 0 f( 1 ::: n d k j ))^ 8t8d k (<t 0! Occlude(t f( 1 ::: n d k ))) Let be an elementary reassignment formula [ 0 ]:f k (! 1 :::! ik ):=X,asabove, but where X = f 1 ::: n g. Tran ERF () = ^ j2x :Holds( 0 f( 1 ::: n d k j ))^ 8t8d k (<t 0! Occlude(t f( 1 ::: n d k ))) Remark A.6 Note that both [ 0 ]f k (! 1 :::! ik ):=X and [ 0 ]:f k (! 1 :::! ik ):=X are de- ned as abbreviations for disjunctions of simple elementary reassignment formulas. We dene specic translations for the unabbreviated forms because they are equivalent to the translations for the abbreviated forms when the unique values and existence of values axioms are taken into account, and these translations will also be useful when we choose to use innite value domains. Proposition A.2 (Tran CRF ) Let = 8t8o:([](o)! [ 0 ](o)) be a conditional reassignment formula in L(SD). There is a transformation operator Tran CRF that transforms into a w = Tran CRF ( ) inl(fl). Proof Since [](o) is a logical formula, Lemma (A.1) shows that [](o) can be eectively transformed into a w in L(FL). Since [ 0 ](o) is a reassignment formula, Lemma (A.1) together with Denition A.31 shows that [ 0 ](o) can be eectively transformed into a w 0 in L(FL). Let = 8t8o:(! 0 ). isawinl(fl). 17

19 Proposition A.3 Vk Let= i=1 Tran ERF( i ) ^ Tran LF ( (o t)) be a formula in L(FL)whichistheresultof translating a restricted reassignment formula consisting of a conjunction V k i=1 i of elementary reassignment formulas together with a duration constraint (o t) inl(sd) into L(FL). can be transformed into the logically equivalent form, ; ^8t8z8 d:(t z d o t)! Occlude(t z): Proof Any Tran ERF ( i ) has the following form, ( _ Holds( 0 f i ( 1 ::: in d ij )))^ j2x i 8t8d i (<t 0! Occlude(t f( 1 ::: n d i ))) which can be transformed into the logically equivalent form, ( _ Holds( 0 f i ( 1 ::: n d ij )))^ j2x i 8t8z8d i (( <t 0 ^ z = f i ( 1 ::: n d i ))! Occlude(t z)): It is easily observed that V k i=1 Tran ERF( i ) has the following form 3, k^ _ ( Holds( 0 f i ( 1 ::: n d ij )))^ Let i=1 j2x i 8t8z( V k i=1 8d i)(( <t 0 ^ ( W k i=1 z = f i( 1 ::: n d i )))! Occlude(t z)): ;= k^ _ i=1 j2x i Holds( 0 f i ( 1 ::: n d ij ))) A ^ TranLF ( (o t)) where (o t) is the duration constraint for the restricted reassignment formula being transformed, and k_ (t z d o t) =((<t 0 ^ ( z = f i ( 1 ::: n d i ))): Remark A.7 Note that a restricted reassignment formula is used in the specication of an action law where the postconditions to an action in a particular context can be a disjunction of restricted reassignment formulas. The proposition above provides a very nice characterization of one alternative in a nondeterministic action. ; species the eects of the alternative, where we observe that even in a specic alternative there maybe new value ambiguity. (t z d o t) speci- es the sucient conditions for locally releasing the global inertia constraint built into the logic's minimization policy. Proposition A.4 Let = W m Vkl l=1 i=1 Tran ERF( i ) ^ Tran LF ( l (o t)) be a formula in L(FL) satisfying the restriction stated in Remark A.5, which is the result of translating a disjunction of restricted reassignment formulas (i.e. reassignment formula) in L(SD) into L(FL). can be transformed into the logically equivalent form, m_ ( ; l ) ^8t8z8d:(t z d o t)! Occlude(t z): l=1 V 3 Note that in the following, we will sometimes V abuse the notation and common meaning of the operator by k applying it to quantiers. For example, ( i=1 8d i) denotes 8d 1 ::: 8dk or equivalently 8d 1 ::: dk. 18 i=1 1

20 Proof By Proposition A.3, any two restricted reassignment formulas in have the following form: ; i ^8t8z8 d i : i (t z d i o i t)! Occlude(t z): ; j ^8t8z8 d j : j (t z d j o j t)! Occlude(t z): Based on Remark A.5, di = dj and i (t z di o i t) = j (t z dj o j t). It is easily observed that the reassignment formula has the following form, which is equivalent to m_ (; l ^8t8z8d:(t z d o t)! Occlude(t z)) l=1 m_ ( ; l ) ^8t8z8d:(t z d o t)! Occlude(t z): l=1 Remark A.8 Note that a reassignment formula is used in the specication of an action law where the postcondition to an action in a particular context is a reassignment formula. The proposition above provides a very nice characterization of the postcondition of a nondeterministic action. Each of the ; i species the eects of an alternative, while (t z d o t) species the sucient conditions for locally releasing the global inertia constraint built into the logic's minimization policy. In this case, (t z d o t) is the same for each alternative in an action with precondition. Proposition A.5 Let be a formula in L(FL) which is the result of transforming a conditional reassignment formula in L(SD) satisfying the restriction stated in Remark A.5 using the appropriate transformation operators. can be transformed into the logically equivalent form, ; ^8t8z8t8o:( 1 ^ (8 d:(t z d t o)))! Occlude(t z)): Proof A conditional reassignment formula has the following form, 8t8o:([](o)! [ 0 ](o)): After translating this into a formula in L(FL) and applying the transformation in Proposition A.4, it has the following form,! m_ 8t8o: 1! ( ; l ) ^8t8z8d:(t z d o t)! Occlude(t z) : l=1 where 1 = Tran LF ([](o)), and we assume that all variables, logical connectives, and delimiters have been translated appropriately. It is easily observed that this formula is equivalent to the following conjunction, 8t8o:[ 1! m_ ; l ]^ l=1 8t8z8t8o:[( 1 ^ (8 d:(t z d o t)))! Occlude(t z)]: Let m_ ;=8t8o:[ 1! ; l ]: l=1 19

21 Remark A.9 Proposition A.5 provides a nice characterization of one context in a context dependent action. 1 is the precondition, which if satised has the eect m_ ; l l=1 where W m l=1 ; l describes the eects of the action after it is executed, including the duration constraints. If m>1 then the action is nondeterministic in context 1 and has alternative eects. Lemma A.2 Let = V k i=1 Tran CR( i )beaformula in L(FL) satisfying the restriction stated in Remark A.5, which is the result of translating a conjunction V k i=1 i of conditional reassignment formulas in L(SD) into L(FL). can be transformed into the logically equivalent form, k^ k^ k_ ( ; j ) ^8t8z8t( 8o j 8d j ):[ ( j ^ j (t z d j t o j ))]! Occlude(t z)): Proof By Proposition A.5, any translation of a conditional reassignment formula can be transformed into the following form, ; j ^8t8z8t8o j :( j ^ (8 d j :(t z d j t o j )))! Occlude(t z)): A conjunction of such formulas has the form, k^ (; j ^8t8z8t8o j :( j ^ (8d j : j (t z d j t o j )))! Occlude(t z))): It is easily observed that this is equivalent to k^ k^ k_ ( ; j ) ^8t8z8t( 8o j 8d j ):[ ( j ^ j (t z d j t o j ))]! Occlude(t z)): Remark A.10 The result of instantiating an action law schema is a conjunction of conditional reassignment formulas, Proposition A.4 provides a nice modular characterization of an action law which separates the specication of the eects of the action for each context j, k^ ; j from the specication j (t z d j t o j ), of the sucient conditions for relaxing the inertia policy for the specied set of uents inuenced by the action in each context j, 8t8z8t( k^ k_ 8o j 8d j ):[ ( j ^ j (t z d j t o j ))]! Occlude(t z)): Any expanded action scenario description contains a nite set of instantiations of action law schemas. The set of instantiations is denoted by ; SCD. The next Lemma will show that a conjunction of schedule statements can be put into a form which will be useful when reducing the circumscription of ; SCD to the rst-order case. 20

22 Lemma A.3 Let = V m V kl l=1 i=1 Tran CR( i )beaformula in L(FL) satisfying the restriction stated in Remark A.5, which is the result of translating a conjunction V m V kl l=1 i=1 i of conjunctions of conditional reassignment formulas in L(SD) into L(FL). can be transformed into the logically equivalent form, ; ^8t8z:(! Occlude(t z)): Proof By Lemma A.2, a conjunction of conditional reassignment formulas (i.e. schedule statement) has the following form, k^ k^ k_ ( ; j ) ^8t8z8t( 8o j 8d j ):[ ( j ^ j (t z d j t o j ))]! Occlude(t z)): It is easily observed that a conjunction of such formulas has the following form, Let and m^ ( ^k l l=1 ; jl )^ (8t8z( V m l=1 8 t l ( V k l 8o j l 8 d jl )):[ W m l=1! Occlude(t z)): m^ ;=( ^k l l=1 W kl ( j l ^ jl (t z d jl t l o jl ))] ; jl ) m^ ^k l m_ =( 8t l ( 8o jl 8d _ k l jl )):[ ( jl ^ jl (t z d jl t l o jl ))]: l=1 l=1 Theorem A.1 Let = V m V kl l=1 i=1 Tran CR( i )beaformula in L(FL) satisfying the restriction stated in Remark A.5, which is the result of translating a conjunction V m V kl l=1 i=1 i of conjunctions of conditional reassignment formulas in L(SD) into L(FL). The circumscription of with Occlude minimized and all other predicates xed Circ SO ( Occlude), is equivalent to the following rst-order formula where and ; ^8t8z:( Occlude(t z)) m^ ;=( ^k l l=1 ; jl ) m^ ^k l m_ =( 8t l ( 8o jl 8d _ k l jl )):[ ( jl ^ jl (t z d jl t l o jl ))]: l=1 l=1 Proof By Lemma A.3, can be transformed into the form ; ^8t8z:(! Occlude(t z)). Theorem B.1 by Lifschitz allows us to factor out ;when circumscribing with Occlude minimized and all other predicates xed, since ;contains no occurrences of Occlude. Theorem B.2 by Lifschitz shows us that Circ SO (f8t z:(! Occlude(t z))g Occlude) ; ^8t z:( Occlude(t z)): The proof of Lemma A.3 can be used to show that;and have the values stated in the theorem. 21

23 A.3 Causal Constraint Statements in L(SD) Denition A.32 A causal constraint statement in L(SD) has the following form: 8t 1 8o:[Q o0 :(o 0 o)! ([t 1 ]Q o1 :(o 1 o) []Q o2 :(o 2 o))] where o 0 o 1 o 2 o are disjoint tuples of variables of sorts O, andq o1 Q o1 Q o2 are nite sequences of quantiers binding the variables o 0 o 1 o 2, respectively, and are quantier free uent formulas (FlF's), and is a quantier free logic formula where any elementary time-point expression 0 in is equal to a function g 0 of t 1, where g 0(t 1 ) t 1. In addition the temporal expression is a function g of t 1 where g (t 1 ) t 1. We will use the label cc to label causal constraint statements in action scenarios. Remark A.11 Observe that it is very dicult to provide a strict denition of a causal constraint statement. This denition allows for certain anomalies which certain temporal structures would rule as illegal. For example, in, one has to be careful that the interpretation of any temporal expression is greater than 0 if a linear discrete time structure with begin point is being used. In addition, it may be necessary to add additional constraints when dening the translation Tran CC (see below) which translates causal constraint statements to ws in L(FL). Currently, there are also a number of restrictions placed on the relation between the dierent time-points mentioned in a causal constraint statement which are most probably over restrictive. For example, it is sometimes useful to mention time-points greater than t 1 in the context. The restrictions placed onthecontext Q o0 :(o 0 o), can be relaxed without diculty so that a context is simply a logic formula in L(SD). A.3.1 Reducing Causal Constraint Statements in L(SD) to L(FL) Denition A.33(Tran EFE ) Let = f k (! 1 :::! ik )^=X be an elementary uent formula, where X = f 1 ::: n g, Dom (f k )is non-boolean, and f k has arity i k and sort Dom (fk 1):::Dom (f ik k )! Dom (f k ). Tran EFE () is dened as follows: Tran EFE () =ffk( 0 1 ::: ik d k )g where f 0 k ( 1 ::: ik d k ) is a parameterized term in L(FL), and d k is a variable of sort D k of L(FL), associated with the sort Dom (f k ). If Dom (f k ) is boolean, then Tran EFE () =ff 0 k( 1 ::: ik )g: If is a logic formula, we dene Tran EFE () asfollows: Tran EFE () = [ Tran EFE (f) f2 where is the set of elementary uent formula in. Denition A.34(Tran X ) Let =[]Q o2 :(o 2 o) be a logical formula (LF), where (o 2 o) isaquantier free uent formula. ^ Tran X () =Q X : Occlude( f i ( 1 ::: in d i )) where, f i(1 ::: in d i )2Tran EFE () 22

24 1. = Tran ETE () is the translation of the ETE into L(FL). 2. Q X is a sequence of universally quantied variables constructed from Q o2 by replacing each existential quantier in Q o2 with a universal quantier, renaming all variables o 2 and d, where d are the free variables of sorts D i in Tran EFE (), with new and unique variables not yet used in the formula of which is a part, and prexing 8 d to Q o2. Denition A.35(Tran CC ) Let = 8t 1 8o:[Q o0 :(o 0 o)! ([t 1 ]Q o1 :(o 1 o) []Q o2 :(o 2 o))]. Tran CC () = Tran LF (8t 1 8o:[Q o0 :(o 0 o)! ([t 1 ]Q o1 :(o 1 o)! []Q o2 :(o 2 o))]) ^ Tran LF (8t 1 8o:[(0 <t 1 ^ Q o0 :(o 0 o))! [([t 1 ; 1]:Q o1 :(o 1 o) ^ [t 1 ]Q o1 :(o 1 o))! Tran X ([]Q o2 :(o 2 o))]]) Remark A.12 Note the insertion of 0 <t 1 in the context of the Occlude formula. This is inserted to avoid anomalies at the initial point in the time-line. Another means of avoiding this problem would be to axiomatize change from t 1 to t 1 +1instead of t 1 ; 1 to t 1, but this would necessitate change in the temporal terms for the domain constraint. Semantically, there is no distinction between these two approaches. In the report, we will sometimes assume 0 <t 1 without actually stating it explicitly in the axioms. Lemma A.4 Let = 8t 1 8o:[(Q o0 :(o 0 o))! ([t 1 ]Q o1 :(o 1 o) []Q o2 :(o 2 o))], be a causal constraint statement inl(sd). There is an eective algorithm that transforms into a w in L(FL). Proof Since Tran X returns a formula in L(FL), it is easily observable that Tran CC ( ) is a boolean combination of logic formulas, possibly quantied, together with the reduced argument totran X. Application of Tran LF in Lemma A.1 completes the reduction. The following Lemmas and Propositions will prove to be useful when circumscribing theories containing causal constraints. They provide a basis for rst-order reductions of circumscriptive theories. Lemma A.5 Let ;= V k i=1 Tran CC( i )beaformula in L(FL)which is the result of translating a conjunction V k i=1 i of causal constraint statements in L(SD) into L(FL). The predicate Occlude only occurs positivelyin;. Proof Each Tran CC ( i ) has the form ; 1 ^ (8t 1 8o:(o)! Q X : ; 1 contains no occurrences of Occlude and ^ (8t 1 8o:(o)! Q X : can be rewritten equivalently as 8t 1 8oQ X :(o)! ^ f i(1 ::: in d i )2Tran EFE () f i(1 ::: in d i )2Tran EFE () ^ f i(1 ::: in d i )2Tran EFE () 23 Occlude( f i ( 1 ::: in d i )): Occlude( f i ( 1 ::: in d i )) Occlude( f i ( 1 ::: in d i )):

Embracing Occlusion in Specifying the Indirect Eects of Actions

Embracing Occlusion in Specifying the Indirect Eects of Actions Embracing Occlusion in Specifying the Indirect Eects of Actions Joakim Gustafsson Department of Computer and Information Science Linkoping University S-58183 Linkoping, Sweden joagu@ida.liu.se Patrick

More information

Reasoning by Regression: Pre- and Postdiction Procedures for Logics of Action and Change with Nondeterminism*

Reasoning by Regression: Pre- and Postdiction Procedures for Logics of Action and Change with Nondeterminism* Reasoning by Regression: Pre- and Postdiction Procedures for Logics of Action and Change with Nondeterminism* Marcus Bjareland and Lars Karlsson Department of Computer and Information Science Linkopings

More information

A Model based Reasoning Approach to Circumscription

A Model based Reasoning Approach to Circumscription A Model based Reasoning Approach to Circumscription Peter Fröhlich 1 and Wolfgang Nejdl 1 Abstract. In this paper we show how model based reasoning techniques can be used to solve circumscription entailment

More information

2 Transition Systems Denition 1 An action signature consists of three nonempty sets: a set V of value names, a set F of uent names, and a set A of act

2 Transition Systems Denition 1 An action signature consists of three nonempty sets: a set V of value names, a set F of uent names, and a set A of act Action Languages Michael Gelfond Department of Computer Science University of Texas at El Paso Austin, TX 78768, USA Vladimir Lifschitz Department of Computer Sciences University of Texas at Austin Austin,

More information

Logic Part I: Classical Logic and Its Semantics

Logic Part I: Classical Logic and Its Semantics Logic Part I: Classical Logic and Its Semantics Max Schäfer Formosan Summer School on Logic, Language, and Computation 2007 July 2, 2007 1 / 51 Principles of Classical Logic classical logic seeks to model

More information

Splitting a Default Theory. Hudson Turner. University of Texas at Austin.

Splitting a Default Theory. Hudson Turner. University of Texas at Austin. Splitting a Default Theory Hudson Turner Department of Computer Sciences University of Texas at Austin Austin, TX 7872-88, USA hudson@cs.utexas.edu Abstract This paper presents mathematical results that

More information

Behavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France

Behavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France Behavioural theories and the proof of behavioural properties Michel Bidoit a and Rolf Hennicker b b a LIENS, C.N.R.S. U.R.A. 1327 & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France

More information

Expressive Reasoning about Action in Nondeterministic Polynomial Time

Expressive Reasoning about Action in Nondeterministic Polynomial Time Expressive Reasoning about Action in Nondeterministic Polynomial Time Thomas Drakengren Laxgatan 4, 2tr S-133 43 Saltsjobaden, Sweden thodrqfjuk.org Marcus Bjareland* Dept of Comp and Info Science Linkoping

More information

Design of abstract domains using first-order logic

Design of abstract domains using first-order logic Centrum voor Wiskunde en Informatica REPORTRAPPORT Design of abstract domains using first-order logic E. Marchiori Computer Science/Department of Interactive Systems CS-R9633 1996 Report CS-R9633 ISSN

More information

logic, cf. [1]. Another area of application is descriptive complexity. It turns out that familiar logics capture complexity classes over classes of (o

logic, cf. [1]. Another area of application is descriptive complexity. It turns out that familiar logics capture complexity classes over classes of (o Notions of locality and their logical characterizations over nite models Lauri Hella Department of Mathematics P.O. Box 4 (Yliopistonkatu 5) 00014 University of Helsinki, Finland Email: lauri.hella@helsinki.fi

More information

Change, Change, Change: three approaches

Change, Change, Change: three approaches Change, Change, Change: three approaches Tom Costello Computer Science Department Stanford University Stanford, CA 94305 email: costelloqcs.stanford.edu Abstract We consider the frame problem, that is,

More information

1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l

1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l viii CONTENTS ABSTRACT IN ENGLISH ABSTRACT IN TAMIL LIST OF TABLES LIST OF FIGURES iii v ix x 1 INTRODUCTION 1 1.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 Preliminaries

More information

Dept. of Computer Science, University of Texas at El Paso, El Paso, Texas

Dept. of Computer Science, University of Texas at El Paso, El Paso, Texas Formalizing Narratives using Nested Circumscription Chitta Baral, Alfredo Gabaldon Dept. of Computer Science, University of Texas at El Paso, El Paso, Texas 79968 http://cs.utep.edu/csdept/krgroup.html

More information

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de

More information

signicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd

signicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd On the Relationship Between CWA, Minimal Model and Minimal Herbrand Model Semantics Michael Gelfond Halina Przymusinska Teodor Przymusinski March 3, 1995 Abstract The purpose of this paper is to compare

More information

Transformation Rules for Locally Stratied Constraint Logic Programs

Transformation Rules for Locally Stratied Constraint Logic Programs Transformation Rules for Locally Stratied Constraint Logic Programs Fabio Fioravanti 1, Alberto Pettorossi 2, Maurizio Proietti 3 (1) Dipartimento di Informatica, Universit dell'aquila, L'Aquila, Italy

More information

3.1 Universal quantification and implication again. Claim 1: If an employee is male, then he makes less than 55,000.

3.1 Universal quantification and implication again. Claim 1: If an employee is male, then he makes less than 55,000. Chapter 3 Logical Connectives 3.1 Universal quantification and implication again So far we have considered an implication to be universal quantication in disguise: Claim 1: If an employee is male, then

More information

In a second part, we concentrate on interval models similar to the traditional ITL models presented in [, 5]. By making various assumptions about time

In a second part, we concentrate on interval models similar to the traditional ITL models presented in [, 5]. By making various assumptions about time Complete Proof Systems for First Order Interval Temporal Logic Bruno Dutertre Department of Computer Science Royal Holloway, University of London Egham, Surrey TW0 0EX, United Kingdom Abstract Dierent

More information

On the Stable Model Semantics for Intensional Functions

On the Stable Model Semantics for Intensional Functions Under consideration for publication in Theory and Practice of Logic Programming 1 On the Stable Model Semantics for Intensional Functions Michael Bartholomew and Joohyung Lee School of Computing, Informatics,

More information

for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty

for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty An Automata-Theoretic Decision Procedure for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty Department of Electrical and Computer

More information

of acceptance conditions (nite, looping and repeating) for the automata. It turns out,

of acceptance conditions (nite, looping and repeating) for the automata. It turns out, Reasoning about Innite Computations Moshe Y. Vardi y IBM Almaden Research Center Pierre Wolper z Universite de Liege Abstract We investigate extensions of temporal logic by connectives dened by nite automata

More information

Introduction to Metalogic

Introduction to Metalogic Philosophy 135 Spring 2008 Tony Martin Introduction to Metalogic 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: Remarks: (i) sentence letters p 0, p 1, p 2,... (ii)

More information

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and An Alternative To The Iteration Operator Of Propositional Dynamic Logic Marcos Alexandre Castilho 1 IRIT - Universite Paul abatier and UFPR - Universidade Federal do Parana (Brazil) Andreas Herzig IRIT

More information

On Reducing Linearizability to State Reachability 1

On Reducing Linearizability to State Reachability 1 On Reducing Linearizability to State Reachability 1 Ahmed Bouajjani a, Michael Emmi b, Constantin Enea a, Jad Hamza a a LIAFA, Université Paris Diderot b IMDEA Software Institute, Spain Abstract Ecient

More information

On 3-valued paraconsistent Logic Programming

On 3-valued paraconsistent Logic Programming Marcelo E. Coniglio Kleidson E. Oliveira Institute of Philosophy and Human Sciences and Centre For Logic, Epistemology and the History of Science, UNICAMP, Brazil Support: FAPESP Syntax Meets Semantics

More information

Lloyd-Topor Completion and General Stable Models

Lloyd-Topor Completion and General Stable Models Lloyd-Topor Completion and General Stable Models Vladimir Lifschitz and Fangkai Yang Department of Computer Science The University of Texas at Austin {vl,fkyang}@cs.utexas.edu Abstract. We investigate

More information

Motivation. CS389L: Automated Logical Reasoning. Lecture 10: Overview of First-Order Theories. Signature and Axioms of First-Order Theory

Motivation. CS389L: Automated Logical Reasoning. Lecture 10: Overview of First-Order Theories. Signature and Axioms of First-Order Theory Motivation CS389L: Automated Logical Reasoning Lecture 10: Overview of First-Order Theories Işıl Dillig Last few lectures: Full first-order logic In FOL, functions/predicates are uninterpreted (i.e., structure

More information

Functional Database Query Languages as. Typed Lambda Calculi of Fixed Order. Gerd G. Hillebrand and Paris C. Kanellakis

Functional Database Query Languages as. Typed Lambda Calculi of Fixed Order. Gerd G. Hillebrand and Paris C. Kanellakis Functional Database Query Languages as Typed Lambda Calculi of Fixed Order Gerd G. Hillebrand and Paris C. Kanellakis Department of Computer Science Brown University Providence, Rhode Island 02912 CS-94-26

More information

Original version published on June 23, 1998 this revised version on May 7, 1999 by Linkoping University Electronic Press Linkoping, Sweden Link

Original version published on June 23, 1998 this revised version on May 7, 1999 by Linkoping University Electronic Press Linkoping, Sweden Link Linkoping Electronic Articles in Computer and Information Science Vol. 3(1998): nr 7 An Inductive Denition Approach to Ramications Marc Denecker Daniele Theseider Dupre Kristof Van Belleghem Linkoping

More information

FORMALIZATION AND VERIFICATION OF PROPERTY SPECIFICATION PATTERNS. Dmitriy Bryndin

FORMALIZATION AND VERIFICATION OF PROPERTY SPECIFICATION PATTERNS. Dmitriy Bryndin FORMALIZATION AND VERIFICATION OF PROPERTY SPECIFICATION PATTERNS by Dmitriy Bryndin A THESIS Submitted to Michigan State University in partial fulllment of the requirements for the degree of MASTER OF

More information

Electronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim

Electronic Notes in Theoretical Computer Science 18 (1998) URL:   8 pages Towards characterizing bisim Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free

More information

arxiv: v1 [cs.lo] 8 Jan 2013

arxiv: v1 [cs.lo] 8 Jan 2013 Lloyd-Topor Completion and General Stable Models Vladimir Lifschitz and Fangkai Yang Department of Computer Science The University of Texas at Austin {vl,fkyang}@cs.utexas.edu arxiv:1301.1394v1 [cs.lo]

More information

A BRIEF INTRODUCTION TO TYPED PREDICATE LOGIC

A BRIEF INTRODUCTION TO TYPED PREDICATE LOGIC A BRIEF INTRODUCTION TO TYPED PREDICATE LOGIC Raymond Turner December 6, 2010 Abstract Typed Predicate Logic 1 was developed to o er a unifying framework for many of the current logical systems, and especially

More information

PREDICATE LOGIC. Schaum's outline chapter 4 Rosen chapter 1. September 11, ioc.pdf

PREDICATE LOGIC. Schaum's outline chapter 4 Rosen chapter 1. September 11, ioc.pdf PREDICATE LOGIC Schaum's outline chapter 4 Rosen chapter 1 September 11, 2018 margarita.spitsakova@ttu.ee ICY0001: Lecture 2 September 11, 2018 1 / 25 Contents 1 Predicates and quantiers 2 Logical equivalences

More information

Chapter 2. Assertions. An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011

Chapter 2. Assertions. An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011 Chapter 2 An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011 Assertions In this chapter, we give a more detailed exposition of the assertions of separation logic: their meaning,

More information

How to Pop a Deep PDA Matters

How to Pop a Deep PDA Matters How to Pop a Deep PDA Matters Peter Leupold Department of Mathematics, Faculty of Science Kyoto Sangyo University Kyoto 603-8555, Japan email:leupold@cc.kyoto-su.ac.jp Abstract Deep PDA are push-down automata

More information

Non-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University

Non-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University Non-elementary Lower Bound for Propositional Duration Calculus A. Rabinovich Department of Computer Science Tel Aviv University Tel Aviv 69978, Israel 1 Introduction The Duration Calculus (DC) [5] is a

More information

Lecture 2: Syntax. January 24, 2018

Lecture 2: Syntax. January 24, 2018 Lecture 2: Syntax January 24, 2018 We now review the basic definitions of first-order logic in more detail. Recall that a language consists of a collection of symbols {P i }, each of which has some specified

More information

Representing Incomplete Knowledge in Abductive. Logic Programming. Celestijnenlaan 200A, B-3001 Heverlee, Belgium.

Representing Incomplete Knowledge in Abductive. Logic Programming. Celestijnenlaan 200A, B-3001 Heverlee, Belgium. Representing Incomplete Knowledge in Abductive Logic Programming Marc Denecker Danny De Schreye Department of Computer Science, K.U.Leuven, Celestijnenlaan 200A, B-3001 Heverlee, Belgium. e-mail : fmarcd,

More information

CS632 Notes on Relational Query Languages I

CS632 Notes on Relational Query Languages I CS632 Notes on Relational Query Languages I A. Demers 6 Feb 2003 1 Introduction Here we define relations, and introduce our notational conventions, which are taken almost directly from [AD93]. We begin

More information

Boolean Algebra and Propositional Logic

Boolean Algebra and Propositional Logic Boolean Algebra and Propositional Logic Takahiro Kato June 23, 2015 This article provides yet another characterization of Boolean algebras and, using this characterization, establishes a more direct connection

More information

Adding a temporal dimension to a logic. Abstract. We introduce a methodology whereby an arbitrary logic system L can be enriched

Adding a temporal dimension to a logic. Abstract. We introduce a methodology whereby an arbitrary logic system L can be enriched Adding a temporal dimension to a logic system MARCELO FINGER and DOV M. GABBAY Imperial College, Department of Computing January 11, 1993 Abstract. We introduce a methodology whereby an arbitrary logic

More information

Boolean Algebra and Propositional Logic

Boolean Algebra and Propositional Logic Boolean Algebra and Propositional Logic Takahiro Kato September 10, 2015 ABSTRACT. This article provides yet another characterization of Boolean algebras and, using this characterization, establishes a

More information

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas.

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas. 1 Chapter 1 Propositional Logic Mathematical logic studies correct thinking, correct deductions of statements from other statements. Let us make it more precise. A fundamental property of a statement is

More information

First-Order Logic. Chapter Overview Syntax

First-Order Logic. Chapter Overview Syntax Chapter 10 First-Order Logic 10.1 Overview First-Order Logic is the calculus one usually has in mind when using the word logic. It is expressive enough for all of mathematics, except for those concepts

More information

SMT BASICS WS 2017/2018 ( ) LOGIC SATISFIABILITY MODULO THEORIES. Institute for Formal Models and Verification Johannes Kepler Universität Linz

SMT BASICS WS 2017/2018 ( ) LOGIC SATISFIABILITY MODULO THEORIES. Institute for Formal Models and Verification Johannes Kepler Universität Linz LOGIC SATISFIABILITY MODULO THEORIES SMT BASICS WS 2017/2018 (342.208) Armin Biere Martina Seidl biere@jku.at martina.seidl@jku.at Institute for Formal Models and Verification Johannes Kepler Universität

More information

Lecture 2: Axiomatic semantics

Lecture 2: Axiomatic semantics Chair of Software Engineering Trusted Components Prof. Dr. Bertrand Meyer Lecture 2: Axiomatic semantics Reading assignment for next week Ariane paper and response (see course page) Axiomatic semantics

More information

Applications of the Situation Calculus To Formalizing. Control and Strategic Information: The Prolog Cut Operator. Fangzhen Lin

Applications of the Situation Calculus To Formalizing. Control and Strategic Information: The Prolog Cut Operator. Fangzhen Lin Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (in@csusthk) Department of Computer Science The Hong Kong University of Science

More information

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02)

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02) Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 206, v 202) Contents 2 Matrices and Systems of Linear Equations 2 Systems of Linear Equations 2 Elimination, Matrix Formulation

More information

1. Propositional Calculus

1. Propositional Calculus 1. Propositional Calculus Some notes for Math 601, Fall 2010 based on Elliott Mendelson, Introduction to Mathematical Logic, Fifth edition, 2010, Chapman & Hall. 2. Syntax ( grammar ). 1.1, p. 1. Given:

More information

In this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset

In this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset A Generalization of Shostak's Method for Combining Decision Procedures Clark W. Barrett, David L. Dill, and Aaron Stump Stanford University, Stanford, CA 94305, USA, http://verify.stanford.edu c Springer-Verlag

More information

TDDD08 Tutorial 1. Who? From? When? 6 september Victor Lagerkvist (& Wªodek Drabent)

TDDD08 Tutorial 1. Who? From? When? 6 september Victor Lagerkvist (& Wªodek Drabent) TDDD08 Tutorial 1 Who? From? Victor Lagerkvist (& Wªodek Drabent) Theoretical Computer Science Laboratory, Linköpings Universitet, Sweden When? 6 september 2015 1 / 18 Preparations Before you start with

More information

From Constructibility and Absoluteness to Computability and Domain Independence

From Constructibility and Absoluteness to Computability and Domain Independence From Constructibility and Absoluteness to Computability and Domain Independence Arnon Avron School of Computer Science Tel Aviv University, Tel Aviv 69978, Israel aa@math.tau.ac.il Abstract. Gödel s main

More information

Propositional Logic. Testing, Quality Assurance, and Maintenance Winter Prof. Arie Gurfinkel

Propositional Logic. Testing, Quality Assurance, and Maintenance Winter Prof. Arie Gurfinkel Propositional Logic Testing, Quality Assurance, and Maintenance Winter 2018 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/

More information

Subclasses of Quantied Boolean Formulas. Andreas Flogel. University of Duisburg Duisburg 1. Marek Karpinski. University of Bonn.

Subclasses of Quantied Boolean Formulas. Andreas Flogel. University of Duisburg Duisburg 1. Marek Karpinski. University of Bonn. Subclasses of Quantied Boolean Formulas Andreas Flogel Department of Computer Science University of Duisburg 4100 Duisburg 1 Mare Karpinsi Department of Computer Science University of Bonn 5300 Bonn 1

More information

INTRODUCTION TO PREDICATE LOGIC HUTH AND RYAN 2.1, 2.2, 2.4

INTRODUCTION TO PREDICATE LOGIC HUTH AND RYAN 2.1, 2.2, 2.4 INTRODUCTION TO PREDICATE LOGIC HUTH AND RYAN 2.1, 2.2, 2.4 Neil D. Jones DIKU 2005 Some slides today new, some based on logic 2004 (Nils Andersen), some based on kernebegreber (NJ 2005) PREDICATE LOGIC:

More information

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic Mathematics 114L Spring 2018 D.A. Martin Mathematical Logic 1 First-Order Languages. Symbols. All first-order languages we consider will have the following symbols: (i) variables v 1, v 2, v 3,... ; (ii)

More information

rules strictly includes the class of extended disjunctive programs. Interestingly, once not appears positively as above, the principle of minimality d

rules strictly includes the class of extended disjunctive programs. Interestingly, once not appears positively as above, the principle of minimality d On Positive Occurrences of Negation as Failure 3 Katsumi Inoue Department of Information and Computer Sciences Toyohashi University of Technology Tempaku-cho, Toyohashi 441, Japan inoue@tutics.tut.ac.jp

More information

WHAT REASONABLE FIRST-ORDER QUERIES ARE PERMITTED BY TRAKHTENBROT'S THEOREM? Arnon Avron and Joram Hirschfeld. Raymond and Beverly Sackler

WHAT REASONABLE FIRST-ORDER QUERIES ARE PERMITTED BY TRAKHTENBROT'S THEOREM? Arnon Avron and Joram Hirschfeld. Raymond and Beverly Sackler WHAT REASONABLE FIRST-ORDER QUERIES ARE PERMITTED BY TRAKHTENBROT'S THEOREM? Arnon Avron and Joram Hirschfeld Raymond and Beverly Sackler Faculty of Exact Sciences School of Mathematical Sciences Tel Aviv

More information

distinct models, still insists on a function always returning a particular value, given a particular list of arguments. In the case of nondeterministi

distinct models, still insists on a function always returning a particular value, given a particular list of arguments. In the case of nondeterministi On Specialization of Derivations in Axiomatic Equality Theories A. Pliuskevicien_e, R. Pliuskevicius Institute of Mathematics and Informatics Akademijos 4, Vilnius 2600, LITHUANIA email: logica@sedcs.mii2.lt

More information

Linear Temporal Logic (LTL)

Linear Temporal Logic (LTL) Chapter 9 Linear Temporal Logic (LTL) This chapter introduces the Linear Temporal Logic (LTL) to reason about state properties of Labelled Transition Systems defined in the previous chapter. We will first

More information

Infinite Truth-Functional Logic

Infinite Truth-Functional Logic 28 Notre Dame Journal of Formal Logic Volume 29, Number 1, Winter 1988 Infinite Truth-Functional Logic THEODORE HAILPERIN What we cannot speak about [in K o or fewer propositions] we must pass over in

More information

System f2lp Computing Answer Sets of First-Order Formulas

System f2lp Computing Answer Sets of First-Order Formulas System f2lp Computing Answer Sets of First-Order Formulas Joohyung Lee and Ravi Palla Computer Science and Engineering Arizona State University, Tempe, AZ, USA {joolee,ravi.palla}@asu.edu Abstract. We

More information

1 Matrices and Systems of Linear Equations

1 Matrices and Systems of Linear Equations Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 207, v 260) Contents Matrices and Systems of Linear Equations Systems of Linear Equations Elimination, Matrix Formulation

More information

Pushdown timed automata:a binary reachability characterization and safety verication

Pushdown timed automata:a binary reachability characterization and safety verication Theoretical Computer Science 302 (2003) 93 121 www.elsevier.com/locate/tcs Pushdown timed automata:a binary reachability characterization and safety verication Zhe Dang School of Electrical Engineering

More information

Integer Circuit Evaluation is PSPACE-complete. Ke Yang. Computer Science Department, Carnegie Mellon University, 5000 Forbes Ave.

Integer Circuit Evaluation is PSPACE-complete. Ke Yang. Computer Science Department, Carnegie Mellon University, 5000 Forbes Ave. Integer Circuit Evaluation is PSPACE-complete Ke Yang Computer Science Department, Carnegie Mellon University, 5000 Forbes Ave., Pittsburgh, PA 15213, USA E-mail: yangke@cmu.edu Key Words: PSPACE, Integer

More information

CHAPTER 1 INTRODUCTION TO BRT

CHAPTER 1 INTRODUCTION TO BRT CHAPTER 1 INTRODUCTION TO BRT 1.1. General Formulation. 1.2. Some BRT Settings. 1.3. Complementation Theorems. 1.4. Thin Set Theorems. 1.1. General Formulation. Before presenting the precise formulation

More information

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes These notes form a brief summary of what has been covered during the lectures. All the definitions must be memorized and understood. Statements

More information

Informal Statement Calculus

Informal Statement Calculus FOUNDATIONS OF MATHEMATICS Branches of Logic 1. Theory of Computations (i.e. Recursion Theory). 2. Proof Theory. 3. Model Theory. 4. Set Theory. Informal Statement Calculus STATEMENTS AND CONNECTIVES Example

More information

2 Z. Lonc and M. Truszczynski investigations, we use the framework of the xed-parameter complexity introduced by Downey and Fellows [Downey and Fellow

2 Z. Lonc and M. Truszczynski investigations, we use the framework of the xed-parameter complexity introduced by Downey and Fellows [Downey and Fellow Fixed-parameter complexity of semantics for logic programs ZBIGNIEW LONC Technical University of Warsaw and MIROS LAW TRUSZCZYNSKI University of Kentucky A decision problem is called parameterized if its

More information

Diagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E.

Diagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E. In CADE-1 Workshop on Visual Reasoning, New Brunswick, NJ, July 1996. Diagram-based Formalisms for the Verication of Reactive Systems Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas

More information

Syntax. Notation Throughout, and when not otherwise said, we assume a vocabulary V = C F P.

Syntax. Notation Throughout, and when not otherwise said, we assume a vocabulary V = C F P. First-Order Logic Syntax The alphabet of a first-order language is organised into the following categories. Logical connectives:,,,,, and. Auxiliary symbols:.,,, ( and ). Variables: we assume a countable

More information

Liveness in Timed and Untimed Systems. Abstract. and its timed version have been used successfully, but have focused on safety conditions and

Liveness in Timed and Untimed Systems. Abstract. and its timed version have been used successfully, but have focused on safety conditions and Liveness in Timed and Untimed Systems Roberto Segala y Rainer Gawlick z Jrgen Sgaard-Andersen x Nancy Lynch { Abstract When proving the correctness of algorithms in distributed systems, one generally considers

More information

First Order Logic (FOL) 1 znj/dm2017

First Order Logic (FOL) 1   znj/dm2017 First Order Logic (FOL) 1 http://lcs.ios.ac.cn/ znj/dm2017 Naijun Zhan March 19, 2017 1 Special thanks to Profs Hanpin Wang (PKU) and Lijun Zhang (ISCAS) for their courtesy of the slides on this course.

More information

Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer

Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer Science The Weizmann Institute of Science Prof. Moshe

More information

Yet Another Proof of the Strong Equivalence Between Propositional Theories and Logic Programs

Yet Another Proof of the Strong Equivalence Between Propositional Theories and Logic Programs Yet Another Proof of the Strong Equivalence Between Propositional Theories and Logic Programs Joohyung Lee and Ravi Palla School of Computing and Informatics Arizona State University, Tempe, AZ, USA {joolee,

More information

Fundamenta Informaticae 30 (1997) 23{41 1. Petri Nets, Commutative Context-Free Grammars,

Fundamenta Informaticae 30 (1997) 23{41 1. Petri Nets, Commutative Context-Free Grammars, Fundamenta Informaticae 30 (1997) 23{41 1 IOS Press Petri Nets, Commutative Context-Free Grammars, and Basic Parallel Processes Javier Esparza Institut fur Informatik Technische Universitat Munchen Munchen,

More information

Reconciling Situation Calculus and Fluent Calculus

Reconciling Situation Calculus and Fluent Calculus Reconciling Situation Calculus and Fluent Calculus Stephan Schiffel and Michael Thielscher Department of Computer Science Dresden University of Technology {stephan.schiffel,mit}@inf.tu-dresden.de Abstract

More information

A Closed-Form Solution to the Ramification Problem (Sometimes)

A Closed-Form Solution to the Ramification Problem (Sometimes) A losed-form Solution to the Ramification Problem (Sometimes) Sheila A McIlraith Department of omputer Science University of Toronto Toronto M5S 3G4 anada E-mail: mcilrait@csutorontoca October 19 1997

More information

Alfred Alice Bernard Bernice Carl Donald Denise Edward Elise Fred Felice Gerald Harold Figure 1: Alfred and Alice's family of performance of a bottom-

Alfred Alice Bernard Bernice Carl Donald Denise Edward Elise Fred Felice Gerald Harold Figure 1: Alfred and Alice's family of performance of a bottom- A CLOSED FORM EVALUATION FOR DATALOG QUERIES WITH INTEGER (GAP)-ORDER CONSTRAINTS Peter Z. Revesz y Abstract: We provide a generalization of Datalog based on generalizing databases by adding integer order

More information

7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing-

7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing- 7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing- Constrained Systems, Proc. 4th Workshop Computer-Aided Verication, Lecture Notes in Computer Science 663, Springer-Verlag,

More information

Undecidability of ground reducibility. for word rewriting systems with variables. Gregory KUCHEROV andmichael RUSINOWITCH

Undecidability of ground reducibility. for word rewriting systems with variables. Gregory KUCHEROV andmichael RUSINOWITCH Undecidability of ground reducibility for word rewriting systems with variables Gregory KUCHEROV andmichael RUSINOWITCH Key words: Theory of Computation Formal Languages Term Rewriting Systems Pattern

More information

Part IV Basic procs 131 Chapter 10 Possible delay, Delay, Prex In this chapter the procs pdly, dly and pref are introduced. Those procs make it possible to compare chronicles in several ways. Important

More information

7 RC Simulates RA. Lemma: For every RA expression E(A 1... A k ) there exists a DRC formula F with F V (F ) = {A 1,..., A k } and

7 RC Simulates RA. Lemma: For every RA expression E(A 1... A k ) there exists a DRC formula F with F V (F ) = {A 1,..., A k } and 7 RC Simulates RA. We now show that DRC (and hence TRC) is at least as expressive as RA. That is, given an RA expression E that mentions at most C, there is an equivalent DRC expression E that mentions

More information

Random Worlds and Maximum Entropy. Abstract. Given a knowledge base KB containing rst-order and statistical facts, we consider a

Random Worlds and Maximum Entropy. Abstract. Given a knowledge base KB containing rst-order and statistical facts, we consider a Journal of Articial Intelligence Research 2 (1994) 33{88 Submitted 4/94; published 8/94 Random Worlds and Maximum Entropy Adam J. Grove NEC Research Institute, 4 Independence Way Princeton, NJ 08540 Joseph

More information

initial state to some prespecied goal state, the task is to nd a sequence of actions that constitutes a legal execution of some prespecied non-determi

initial state to some prespecied goal state, the task is to nd a sequence of actions that constitutes a legal execution of some prespecied non-determi ConGolog, a concurrent programming language based on the situation calculus: foundations Giuseppe De Giacomo Dipartimento di Informatica e Sistemistica Universita di Roma \La Sapienza" Via Salaria 113,

More information

PRELIMINARY VERSION of a paper under copyright with Oxford University Press

PRELIMINARY VERSION of a paper under copyright with Oxford University Press Characterising Combinational Timing Analyses in Intuitionistic Modal Logic Abstract The paper presents a new logical specication language, called Propositional Stabilisation Theory (PST), to capture the

More information

Forward Human Reasoning Modeled by Logic Programming Modeled by Classical Logic with Circumscription and Projection

Forward Human Reasoning Modeled by Logic Programming Modeled by Classical Logic with Circumscription and Projection Faculty of Computer Science Institute of Artificial Intelligence Knowledge Representation and Reasoning Forward Human Reasoning Modeled by Logic Programming Modeled by Classical Logic with Circumscription

More information

is a model, supported model or stable model, respectively, of P. The check can be implemented to run in linear time in the size of the program. Since

is a model, supported model or stable model, respectively, of P. The check can be implemented to run in linear time in the size of the program. Since Fixed-parameter complexity of semantics for logic programs Zbigniew Lonc? and Miros law Truszczynski?? Department of Computer Science, University of Kentucky Lexington KY 40506-0046, USA flonc, mirekg@cs.engr.uky.edu

More information

Predicate Logic. x. x + 0 = x. Predicate logic over integer expressions: a language of logical assertions, for example. Why discuss predicate logic?

Predicate Logic. x. x + 0 = x. Predicate logic over integer expressions: a language of logical assertions, for example. Why discuss predicate logic? Predicate Logic Predicate logic over integer expressions: a language of logical assertions, for example x. x + 0 = x Why discuss predicate logic? It is an example of a simple language It has simple denotational

More information

Predicate Logic. Xinyu Feng 09/26/2011. University of Science and Technology of China (USTC)

Predicate Logic. Xinyu Feng 09/26/2011. University of Science and Technology of China (USTC) University of Science and Technology of China (USTC) 09/26/2011 Overview Predicate logic over integer expressions: a language of logical assertions, for example x. x + 0 = x Why discuss predicate logic?

More information

c Copyright by Clark Wayne Barrett 2003 All Rights Reserved ii

c Copyright by Clark Wayne Barrett 2003 All Rights Reserved ii CHECKING VALIDITY OF QUANTIFIER-FREE FORMULAS IN COMBINATIONS OF FIRST-ORDER THEORIES a dissertation submitted to the department of computer science and the committee on graduate studies of stanford university

More information

Syntax: form ::= A: lin j E: lin ::= 3 lin j lin ^ lin j :lin j bool lin lin is a temporal formula dened over a global sequence. bool is true in g if

Syntax: form ::= A: lin j E: lin ::= 3 lin j lin ^ lin j :lin j bool lin lin is a temporal formula dened over a global sequence. bool is true in g if Introduction 1 Goals of the lecture: Weak Conjunctive Predicates Logic for global predicates Weak conjunctive algorithm References: Garg and Waldecker 94 Syntax: form ::= A: lin j E: lin ::= 3 lin j lin

More information

Satisability Modulo Structures as Constraint Satisfaction: An Introduction

Satisability Modulo Structures as Constraint Satisfaction: An Introduction janvier 2007 Journées Francophones des Langages Applicatifs JFLA07 Satisability Modulo Structures as Constraint Satisfaction: An Introduction Hassan Aït-Kaci 1 & Bruno Berstel 2 & Ulrich Junker 2 & Michel

More information

Contents 1 Introduction A historical note : : : : : : : : : : : : : : : : : : : : : : : : : Modal logic : : : : : : : : : : : : : : : : :

Contents 1 Introduction A historical note : : : : : : : : : : : : : : : : : : : : : : : : : Modal logic : : : : : : : : : : : : : : : : : On Axiomatizations for Propositional Logics of Programs P.M.W. Knijnenburg RUU-CS-88-34 November 1988 Contents 1 Introduction 3 1.1 A historical note : : : : : : : : : : : : : : : : : : : : : : : : : 3

More information

TCS Technical Report. Hokkaido University. Master's Thesis: The Classication Problem in Relational Property Testing. Charles Harold Jordan

TCS Technical Report. Hokkaido University. Master's Thesis: The Classication Problem in Relational Property Testing. Charles Harold Jordan TCS -TR-B-09-6 TCS Technical Report Master's Thesis: The Classication Problem in Relational Property Testing by Charles Harold Jordan Division of Computer Science Report Series B April 27, 2009 Hokkaido

More information

Logics - Introduction

Logics - Introduction Logics 1 Logics - Introduction So far we have seen a variety of operational formalisms based on some some notion of state and event/transition model the evolution of the system Now instead we will analyze

More information

Reasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University

Reasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University General Patterns for Nonmonotonic Reasoning: From Basic Entailments to Plausible Relations Ofer Arieli Arnon Avron Department of Computer Science School of Mathematical Sciences Tel-Aviv University Tel-Aviv

More information

Rewriting Concepts Using Terminologies Revisited Franz Baader, Ralf Kusters, and Ralf Molitor LuFg Theoretical Computer Science, RWTH Aachen fb

Rewriting Concepts Using Terminologies Revisited Franz Baader, Ralf Kusters, and Ralf Molitor LuFg Theoretical Computer Science, RWTH Aachen   fb LTCS{Report Aachen University of Technology Research group for Theoretical Computer Science Revised Version of LTCS-Report 99-12: Rewriting Concepts Using Terminologies - Revisited Franz Baader, Ralf Kusters,

More information

1 Introduction The computational complexity of a problem is the amount of resources, such as time or space, required by a machine that solves the prob

1 Introduction The computational complexity of a problem is the amount of resources, such as time or space, required by a machine that solves the prob Easier Ways to Win Logical Games Ronald Fagin IBM Almaden Research Center 650 Harry Road San Jose, California 95120-6099 email: fagin@almaden.ibm.com URL: http://www.almaden.ibm.com/cs/people/fagin/ Abstract

More information