games and analytic proof systems part 2
play

Games and Analytic Proof Systems Part 2 Chris Ferm uller Vienna - PowerPoint PPT Presentation

PhDs in Logic X Prague, Czech Republic, May 1, 2018 Games and Analytic Proof Systems Part 2 Chris Ferm uller Vienna University of Technology Theory and Logic Group www.logic.at/people/chrisf/ 1 Overview Part 1 the most basic logic


  1. PhDs in Logic X Prague, Czech Republic, May 1, 2018 Games and Analytic Proof Systems Part 2 Chris Ferm¨ uller Vienna University of Technology Theory and Logic Group www.logic.at/people/chrisf/ 1

  2. Overview Part 1 the most basic logic game: Hintikka’s game for classical logic from Hintikka’s game to sequent calculus via disjunctive states Hintikka’s game and many truth values: ◮ many-valued truth tables, Nmatrices ◮ Giles’s game for � Lukasiewicz logic analyzing a hypersequent calculus using games Part 2 modelling resource conciousness calls for games (briefly:) alternative forms of game semantics Lorenzen: dialogues as foundations Information extraction interpreting ILL and other substructural logics many(!) topics for future research 2

  3. Background/Motivation substructural logics are often motivated by resource consciousness this motivation usually remains metaphorical think of Girard’s cigarette example: “For ✩ 1 you get a pack of Camels, but also a pack of Marlboro” “but also”: multiplicative in contrast to additive conjunction Gentzen’s sequent calculus ( LK / LI ) is a (the?) natural starting point for connecting inference and resource consciousness – this leads to (fragments of) linear logic, possibly even Lambek calculus, etc to breathe life into the resource metaphor, we need dynamics = ⇒ game semantics for substructural sequent calculi 3

  4. Alternative forms of game semantics Blass (APAL 1992): game semantics for affine linear logic – new paradigm: ‘logical connectives as game operators’ – only additive connectives, otherwise ‘counter examples’ – negation as role switch Abramsky/Jagadeesan (JSL 1994): full completeness – paradigm: formulas = games, strategies = proofs – multiplicative connectives are covered – high level of abstraction: games are not assertions/statements Girard’s Locus Solum (‘ludics’) (2001): ‘loci’: pointers to subformulas, ‘designs’: corresponding proofs attempts to provide a logic of inference rules as interactions Japaridze’s computability logic CL (since 2003) – games as a general model of interactive computation – computational constructions induce (many) connectives – certain principles of linear logic get invalidated . . . many more related to the above — none about assertions/statements/rational dialogue 4

  5. The oldest form of ‘provability games’: Lorenzen’s dialogues “According to Lorenzen, valid arguments are those patterns from premises to conclusions in which the proponent of the conclusion has a winning strategy against any opponent granting the premises. Thus, there is a third independent pragmatic intuition of logical validity, based on viewing argumentation as a game. I have been converted to that view ever since, even though most of my professional life has been under camouflage as a model theorist, or occasionally a proof theorist.” Johan van Benthem in: Game Theory – Five Questions V.F. Hendricks, P.G. Hansen (eds.) 5

  6. Dialogues as foundations Imagine a dialogue, where a Proponent P tries to defend a logi- cally complex statement against attacks by an Opponent O . The dialogue stepwise reduces complex assertions to their components. Lorenzen’s central idea ( ‘Logik und Agon’ , late 1950s): G logically follows from F 1 , . . . , F n means: P can always win an antagonistic, rational dialogue starting with her assertion of G, if O has granted F 1 , . . . , F n Some basic features of Lorenzen style dialogues: attack moves and corresponding defense moves refer to outermost connectives and quantifiers of assertions both, P and O , may launch attacks and defend against attacks during the course of a dialogue moves alternate strictly between P and O 6

  7. Logical dialogue rules: X / Y stands for P / O or O / P statement by X attack by Y defense by X l? or r? ( Y chooses) A ∧ B A or B , accordingly A ∨ B ? A or B ( X chooses) A ⊃ B A B ∀ xA ( x ) ? c ( Y chooses) A ( c ) ∃ xA ( x ) ? A(c) ( Y chooses c ) Note: ¬ A abbreviates A ⊃ ⊥ , and ⊥ cannot be defended Winning conditions for P : W: O has already granted P ’s active formula W ⊥ : O has granted ⊥ NB: Lorenzen attempted to justify constructive logic, the dialogue game allegedly ‘showed’ why even classical logic is wrong! = ⇒ A different idea is needed for substructural reasoning 7

  8. Information Extraction Guiding Idea: Information is closer to Lorenzen’s ‘assertions’, than ‘formulas as games’ resource conciousness: information can be stored/accessed/consumed Different ways of accessing information: A S erver may provide information to a C lient e.g. as follows: You can have all of those (once): { a , b , c , . . . } (multiset) You can have any one of those: ( a , b , c , . . . ) ( C ’s choice) I ( S erver) give you (just) one of those: [ a , b , c , . . . ] ( S ’s choice) You can have the first of those: � a , b , c , . . . | (stack) You can have the first or last of those: � a , b , . . . e , f � (deque) You can have these as often as you want: � a , b , c , . . . � (‘protected’) In principle, arbitrary nestings are conceivable: for example: {� a � , ( � b , c | , [ d , e , f ]) } 8

  9. Accessing/extracting information as a game Information extraction game(s) (formerly C / S game – [F/Lang, 2017]): P roponent claims that S provides the information that C wants, while O pponent seeks to refute P ’s claim Remark: In [F/Lang 2017] we identified C with P and S with O (‘ C / S game’) We now prefer to keep S passive and let P act in C ’s behalf, opposed by O States of the game: Γ ⊲ F Γ . . . bundle of information provided by S F . . . information wanted by C (possibly structured, as explained below) Two possible interpretations: Strict reading: F is equivalent to Γ Affine reading: F is (modulo equivalence) contained in Γ NB: ‘equivalence’ is (implicitly) defined by the rules of the game 9

  10. Where are the logical connectives? (Some) logical connectives directly correspond to access structures. Following tradition, we formulate rules for binary connectives. { a , b } multiset offered by S = ⇒ a ⊗ b (multiplicative conjunction) ( a , b ) any – P ’s choice (for C ) = ⇒ a ∨ b (additive disjunction) [ a , b ] any – O ’s choice (against C ) = ⇒ a ∧ b (additive conjunction) � a , b | first a , then b = ⇒ a ; b (a new connective) � a � ‘protected’ a = ⇒ ! a (‘bang’, ‘of course’) To emphasize our ‘information extraction’ perspective, we will speak of Information Packages (IPs), rather than formulas. In order to make these corespondences precise and make them work in full generality we need to provide precise specifications of game rules! 10

  11. Rules of the (standard) Information Extraction Game The rules stepwise reduce states to simpler states in round: Step 1 P , as scheduler, chooses an IP F of the state Γ ⊲ H Step 2 two cases: – F in Γ = ⇒ Unpack the IP provided by S – F = H = ⇒ Check the IP wanted by C corresponding choices by P or by O determine the next state We focus on the case, where the IPs of S form a multiset Γ = [ G 1 , . . . , G n ] (More general ‘deep inference’ style rules could be obtained analogously) Unpack -rules ( F among S ’s IPs) ( U ∨ ) F = F 1 ∨ F 2 : P chooses i , F i replaces F in Γ ( U ∧ ) F = F 1 ∧ F 2 : O chooses i , F i replaces F in Γ ( U ⊗ ) F = F 1 ⊗ F 2 : F 1 and F 2 replace F in Γ Check -rules ( F is C ’s current IP — rules are dual) ( C ∨ ) F = F 1 ∨ F 2 : O chooses i , F i replaces F as C ’s wanted IP ( C ∧ ) F = F 1 ∧ F 2 : P chooses i , F i replaces F as C ’s wanted IP ( C ⊗ ) F = F 1 ⊗ F 2 : P has declares which part of Γ will be used for extracting F 1 and F 2 , respectively; O chooses correspondingly 11

  12. Did we loose implication? F 1 → F 2 is interpreted as conditional information: F 2 given F 1 The corresponding Check -rules (state Γ ⊲ F 1 → F 2 ) is obvious : ( C → ) F 2 becomes C ’s current IP, F 1 is added to Γ For F 1 → F 2 provided by S , the following is obvious too: ( U → ) If F 1 as well as F 1 → F 2 are in Γ, the P may choose to replace these two IP-occurrences by F 2 More generally, F 1 only needs to be contained in information in Γ: ( U → ) P has declares which part (Γ 1 ) of Γ is to be used for extracting F 1 and which part (Γ 2 ), augmented by F 2 , allows to extract C ’s wanted IP; O chooses correspondingly Written in sequent style: F 1 , Γ ⊲ F 2 Γ 1 ⊲ F 1 F 2 , Γ 2 ⊲ H Γ ⊲ F 1 → F 2 ( C → ) ( U → ) F 1 → F 2 , Γ 1 , Γ 2 ⊲ H 12

  13. Rules for Protected IP’s Simple form of interpreting ‘protection’: only relevant for information provided by S � F 1 , . . . , F n � : F i remain in Γ for each reduction, no splitting necessary Reflective form of interpreting ‘protection’: (linear logic style) we also allow �� F �� and [ F , � F � ], etc, also for C ’s wanted IP the corresponding connective is ! (‘bang’ of linear logic) ( U ! ) if P picks ! F , then P may either replace if by F , delete it or add another copy of F in Γ, as wished ( C ! ) If C ’s wanted ! F is picked, P may replace it by F if all formulas in Γ are protected Final States (Winning Conditions) recall the two possible interpretations of Γ ⊲ F : equivalent / contained in corresponding winning states for P : F , Γ ⊲ F or F ⊲ F Adding the clearly contradictory IP ⊥ renders ⊥ , Γ ⊲ F winning for P , too 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend