A Generalization of Shostak's Method for Combining Decision Procedures

Total Page:16

File Type:pdf, Size:1020Kb

A Generalization of Shostak's Method for Combining Decision Procedures A Generalization of Shostaks Metho d for Combining Decision Pro cedures Clark W Barrett David L Dill and Aaron Stump Stanford University Stanford CA USA httpverifystanfordedu c SpringerVerlag Abstract Consider the problem of determining whether a quantier free formula is satisable in some rstorder theory T Shostaks al gorithm decides this problem for a certain class of theories with b oth interpreted and uninterpreted function symbols We present two new algorithms based on Shostaks metho d The rst is a simple subset of Shostaks algorithm for the same class of theories but without uninter preted function symbols This simplied algorithm is easy to understand and prove correct providing insight into how and why Shostaks algo rithm works The simplied algorithm is then used as the foundation for a generalization of Shostaks metho d based on a variation of the Nelson Opp en metho d for combining theories Introduction In Shostak introduced a clever and subtle algorithm which decides the satisability of quantierfree formulas in a combined theory which includes a rstorder theory or combination of rstorder theories with certain prop erties and the theory of equality with uninterpreted function symbols But despite the fact that Shostaks metho d is less general than its predecessor the Nelson Opp en metho d it has generated considerable interest and is the basis for decision pro cedures found in several to ols including PVS STeP and SVC There are several go o d reasons for this First of all it is easier to implement the NelsonOpp en metho d provides a framework for combining decision pro ce dures but gives no help on how to construct the individual decision pro cedures But as we show in the next section at the core of Shostaks pro cedure is a simple metho d for generating decision pro cedures for a large class of theories A second reason for the success of Shostaks metho d is that despite requiring more restrictive conditions in order to accommo date a theory a wide variety of useful theories have b een shown to satisfy these conditions Finally empirical studies have shown that Shostaks metho d is an order of magnitude more ecient than the NelsonOpp en metho d Unfortunately the original pap er is dicult to follow due in part to the fact that it contains several errors and despite an ongoing eort to understand and clarify the metho d it remains dicult to understand In this pap er we take a new approach to explaining Shostaks algorithm We rst present a subset of the original algorithm in particular the subset which decides formulas without uninterpreted function symbols This algorithm is surprisingly simple and straightforward and gives considerable insight into how Shostaks algorithm works This algorithm then forms the basis for a more general algorithm that lies at an abstraction level somewhere b etween the general NelsonOpp en framework and the highlysp ecialized Shostak pro cedure The purp ose is to describ e an algorithm which is abstract enough that it can b e understo o d and proved correct but sp ecic enough that it is not hard to see how to sp ecialize it further to recover Shostaks original algorithm The correctness pro of of this algorithm relies on a new variation of the NelsonOpp en pro cedure and new theorem which relates convexity a requirement for Shostak and stableinniteness a requirement for NelsonOpp en It is our hop e that this exercise will not only shed light on how Shostaks metho d can b e seen as an ecient renement of the NelsonOpp en metho d but also provide a generalization which can b e used to achieve other ecient renements Indeed one such p ossible renement is describ ed in the rst authors dissertation In Section b elow some preliminary denitions and notation are given The simple algorithm without uninterpreted function symbols is presented in Section Section reviews the NelsonOpp en metho d in preparation for the generalized algorithm which is presented in Section Finally Section compares our approach to other work on Shostaks algorithm and describ es the renements necessary to recover Shostaks original algorithm Preliminary Concepts Some Notions from Logic A theory is a set of closed formulas For the purp oses of this pap er all theories are assumed to b e rstorder and to include the axioms of equality The sig nature of a theory is the set of function predicate other than equality and constant symbols app earing in those sentences A literal is an atomic formula or its negation To avoid confusion with the logical equality symbol we use the symbol to indicate that two logical expressions are syntactically identical For a given mo del M a variable assignment is a function which assigns to each variable an element of the domain of M We write M j if is true in the mo del M with variable assignment If is a set of formulas then M j indicates that M j for each In general whenever sets of formulas are used as logical formulas the intended meaning is the conjunction of the formulas in the set A formula is satisable if there exists some mo del M and variable assignment such that M j If is a set of formulas and is a formula then j means that whenever a mo del and variable assignment satisfy they also satisfy A set S of literals is convex in a theory T if T S do es not entail any disjunction of equalities b etween variables without entailing one of the equalities itself A theory T is convex if every set of literals in the language of the theory is convex in T Equations in Solved Form Denition A set S of equations is said to be in solved form i the lefthand side of each equation in S is a variable which appears only once in S We refer to the variables which appear only on the lefthand sides as solitary variables A set S of equations in solved form denes an idemp otent substitution the one which replaces each solitary variable with its corresp onding righthand side If S is an expression or set of expressions we denote the result of applying this substitution to S by S S Another interesting prop erty of equations in solved form is that the question of whether such a set S entails some formula in a theory T can b e answered simply by determining the validity of S in T Prop osition If T is a theory with signature and S is a set of equations in solved form then T S j i T j S Proof Clearly T S j i T S j S Thus we need only show that T S j S i T j S The if direction is trivial To show the other direction assume that T S j S Any mo del of T can b e made to satisfy T S by assigning any value to the nonsolitary variables of S and then choosing the value of each solitary variable to match the value of its corresp onding right hand side Since none of the solitary variables o ccur anywhere else in S this assignment is welldened and satises S By assumption then this mo del and assignment also satisfy S but none of the solitary variables app ear in S so the initial arbitrary assignment to nonsolitary variables must b e sucient to satisfy S Thus it must b e the case that every mo del of T satises S with every variable assignment ut Corollary If T is a satisable theory with signature and S is a set of equations in solved form then T S is satisable Algorithm S In this section we present an algorithm based on a subset of Shostaks algorithm for deciding satisability of quantierfree formulas in a theory T which meets certain conditions We call such a theory a Shostak theory Denition A satisable theory T with signature is a Shostak theory if the fol lowing conditions hold does not contain any predicate symbols T is convex There exists a canonizer canon a computable function from terms to terms with the property that T j a b i canona canonb There exists a solver solve a computable function from equations to sets of formulas dened as fol lows a If T j a b then solve a b ffalse g b Otherwise solve a b returns a set S of equations in solved form such that T j a b x S where x is the set of variables which appear in S but not in a or b Each of these variables must be fresh These requirements are slightly dierent from those given by Shostak and others These dierences are discussed in Section b elow In the rest of this section T is assumed to b e a Shostak theory with signature canonizer canon and solver solve As we will show the solver can b e used to convert an arbitrary set of equations into a set of equations in solved form The canonizer is used to determine whether a sp ecic equality is entailed by a set of equations in solved form as shown by the following prop osition Prop osition If S is a set of equations in solved form then T S j a b i canonS a canonS b Proof By Prop osition T S j a b i T j S a S b But T j S a S b i canonS a canonS b by the denition of canon ut S canon solve S WHILE DO BEGIN Remove some equality a b from a S a b S b S solve a b IF S ffalse g THEN RETURN FALSE S S S S END IF canon S a canon S b for some a b THEN RETURN FALSE RETURN TRUE Fig Algorithm S based on a simple subset of Shostaks algorithm Algorithm S shown in Fig makes use of the prop erties of a Shostak theory to check the joint satisability of an arbitrary set of equalities and an arbitrary set of disequalities in a Shostak theory with canonizer canon and solver solve Since the satisability of any quantierfree formula can b e determined by rst converting it to disjunctive normal form it suces to have a satisability pro cedure for a conjunction of literals Since contains no
Recommended publications
  • UNIT-I Mathematical Logic Statements and Notations
    UNIT-I Mathematical Logic Statements and notations: A proposition or statement is a declarative sentence that is either true or false (but not both). For instance, the following are propositions: “Paris is in France” (true), “London is in Denmark” (false), “2 < 4” (true), “4 = 7 (false)”. However the following are not propositions: “what is your name?” (this is a question), “do your homework” (this is a command), “this sentence is false” (neither true nor false), “x is an even number” (it depends on what x represents), “Socrates” (it is not even a sentence). The truth or falsehood of a proposition is called its truth value. Connectives: Connectives are used for making compound propositions. The main ones are the following (p and q represent given propositions): Name Represented Meaning Negation ¬p “not p” Conjunction p q “p and q” Disjunction p q “p or q (or both)” Exclusive Or p q “either p or q, but not both” Implication p ⊕ q “if p then q” Biconditional p q “p if and only if q” Truth Tables: Logical identity Logical identity is an operation on one logical value, typically the value of a proposition that produces a value of true if its operand is true and a value of false if its operand is false. The truth table for the logical identity operator is as follows: Logical Identity p p T T F F Logical negation Logical negation is an operation on one logical value, typically the value of a proposition that produces a value of true if its operand is false and a value of false if its operand is true.
    [Show full text]
  • Proof-Assistants Using Dependent Type Systems
    CHAPTER 18 Proof-Assistants Using Dependent Type Systems Henk Barendregt Herman Geuvers Contents I Proof checking 1151 2 Type-theoretic notions for proof checking 1153 2.1 Proof checking mathematical statements 1153 2.2 Propositions as types 1156 2.3 Examples of proofs as terms 1157 2.4 Intermezzo: Logical frameworks. 1160 2.5 Functions: algorithms versus graphs 1164 2.6 Subject Reduction . 1166 2.7 Conversion and Computation 1166 2.8 Equality . 1168 2.9 Connection between logic and type theory 1175 3 Type systems for proof checking 1180 3. l Higher order predicate logic . 1181 3.2 Higher order typed A-calculus . 1185 3.3 Pure Type Systems 1196 3.4 Properties of P ure Type Systems . 1199 3.5 Extensions of Pure Type Systems 1202 3.6 Products and Sums 1202 3.7 E-typcs 1204 3.8 Inductive Types 1206 4 Proof-development in type systems 1211 4.1 Tactics 1212 4.2 Examples of Proof Development 1214 4.3 Autarkic Computations 1220 5 P roof assistants 1223 5.1 Comparing proof-assistants . 1224 5.2 Applications of proof-assistants 1228 Bibliography 1230 Index 1235 Name index 1238 HANDBOOK OF AUTOMAT8D REASONING Edited by Alan Robinson and Andrei Voronkov © 2001 Elsevier Science Publishers 8.V. All rights reserved PROOF-ASSISTANTS USING DEPENDENT TYPE SYSTEMS 1151 I. Proof checking Proof checking consists of the automated verification of mathematical theories by first fully formalizing the underlying primitive notions, the definitions, the axioms and the proofs. Then the definitions are checked for their well-formedness and the proofs for their correctness, all this within a given logic.
    [Show full text]
  • Verilog Gate Types
    Tutorial Questions A and Discussion This appendix contains questions, answers, and discussion to accompany Chapter 1, the tutorial introduction. The goal of this appendix is to provide far more help and guidance than we could in Chapter 1. This appendix contains tutorial help for the beginning student and questions appropriate for use with an introductory course in digital systems design or computer architecture. The sections here are referenced from the sections of Chapter 1. Some of the questions assume that the reader has access to a Verilog simulator­ the one included on the book's CD will suffice. A few of the questions assume access to a synthesis tool; limited access to one is available through the CD. Finally, the book's CD includes copies of the books examples; retrieve them from there to avoid retyping. A.l Structural Descriptions The questions in this section accompany Section 1.1.2. The first two include a detailed presentation of how to develop a simple Verilog description, including a dis­ cussion of common mistakes. The questions following assume more familiarity with a hardware description language and simulator. 284 The Verilog Hardware Description Language A.1 Write a Verilog description of the logic AB diagram shown in Figure A.l. This 00 01 II 10 logic circuit im_plements the Boolean c function F=(AB)+C which you can 0 0 0 0 I probably see by inspection of the K­ map. Since this is the first from-scratch I I I I I description, the discussion section has far more help. Do This - Write a module specification for this logic circuit.
    [Show full text]
  • BOUNDARY LOGIC from the BEGINNING William Bricken September 2001, Updated October 2002
    BOUNDARY LOGIC FROM THE BEGINNING William Bricken September 2001, updated October 2002 1 Discovering Iconic Logic 1.1 Origins 1.2 Beginning 1.3 Marks SIDEBAR: Mathematical Symbols and Icons 1.4 Delimiters SIDEBAR: Typographical Conventions of Parens Notation 1.5 Unary Logic 1.6 Enclosure as Object, Enclosure as Process 1.7 Replication as Diversity 2 Concepts of Boundary Logic 2.1 The Freedom of Void-Space SIDEBAR: Symbolic Representation 2.2 Enclosure as Perspective SIDEBAR: Containment, Connection and Contact 2.3 Pervasion and Transparency 2.4 Reducing Diversity 3 Boundary Logic SIDEBAR: Logic, Algebra and Geometry 3.1 Enclosure as Logic SIDEBAR: Table of Correspondence 3.2 Logical Operators SIDEBAR: Equations and Inference SIDEBAR: Logical Equality 3.3 Deduction SIDEBAR: Examples of Boundary Deduction 4 Boundary Computation 4.1 Logic and Circuitry SIDEBAR: A Small Digital Circuit 4.2 Enclosure as Computation 4.3 Software Design Tools SIDEBAR: Iconic Logic Hardware Design Tools 5 Conclusion SIDEBAR: New Ideas SIDEBAR: Glossary 1 Boundary Logic from the Beginning What is the simplest mathematics? In finding a simpler foundation for mathematics we also find a variety of simpler and stronger computational tools, algorithms, and architectures. Guide to Reading The contents are structured for different levels of reading detail. Sections delineate origins, concepts, and applications to logic and computation. Small subsections describe the new concepts and tools. NEW IDEAS summarize the important conceptual content in one-liners. SIDEBARS add historical context, depth commentary, and examples. SECTION 1. DISCOVERING ICONIC LOGIC Symbolic logic uses symbols to express the concepts of logic. Symbols are chosen arbitrarily, their structure bears no resemblance to their meaning.
    [Show full text]
  • The Metaphysics of Time OA
    Roskilde University Arthur Prior and Special Theory of Relativity: Two Standpoints from the Nachlass Kofod, Julie Lundbak Published in: The Metaphysics of Time Publication date: 2020 Document Version Publisher's PDF, also known as Version of record Citation for published version (APA): Kofod, J. L. (2020). Arthur Prior and Special Theory of Relativity: Two Standpoints from the Nachlass. In P. Hasle, D. Jakobsen, & P. Øhrstrøm (Eds.), The Metaphysics of Time: Themes from Prior (pp. 227-247). Aalborg Universitetsforlag. Logic and Philosophy of Time Vol. 4 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain. • You may freely distribute the URL identifying the publication in the public portal. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 24. Sep. 2021 The Metaphysics of Time Logic and Philosophy of Time, Vol. 4 Per Hasle, David Jakobsen, and Peter Øhrstrøm (Eds.) The Metaphysics of Time: Themes from Prior Edited
    [Show full text]
  • LABORATORY MANUAL Digital Systems
    LABORATORY MANUAL DEPARTMENT OF ELECTRICAL & COMPUTER ENGINEERING UNIVERSITY OF CENTRAL FLORIDA EEE 3342 Digital Systems Revised August 2018 CONTENTS Safety Rules and Operating Procedures Introduction Experiment #1 XILINX’s VIVADO FPGA Tools Experiment #2 Simple Combinational Logic Experiment #3 Multi-Function Gate Experiment #4 Three-Bit Binary Added Experiment #5 Multiplexers in Combinational logic design Experiment #6 Decoder and Demultiplexer Experiment #7 Random Access Memory Experiment #8 Flip-Flop Fundamentals Experiment #9 Designing with D-Flip flops: Shift Register and Sequence Counter Experiment #10 Sequential Circuit Design: Counter with Inputs Experiment #11 Sequential Design Appendix A Data Sheets for IC’s Appendix B NAND/NOR Transitions Appendix C Sample Schematic Diagram Appendix D Device / Pin # Reference Appendix E Introduction to Verilog Appendix F Reference Manuals for Boards Safety Rules and Operating Procedures 1. Note the location of the Emergency Disconnect (red button near the door) to shut off power in an emergency. Note the location of the nearest telephone (map on bulletin board). 2. Students are allowed in the laboratory only when the instructor is present. 3. Open drinks and food are not allowed near the lab benches. 4. Report any broken equipment or defective parts to the lab instructor. Do not open, remove the cover, or attempt to repair any equipment. 5. When the lab exercise is over, all instruments, except computers, must be turned off. Return substitution boxes to the designated location. Your lab grade will be affected if your laboratory station is not tidy when you leave. 6. University property must not be taken from the laboratory.
    [Show full text]
  • 0{%(T): V < Y}, ^(T) = U^It): Y G ON}
    transactions of the american mathematical society Volume 242, August 1978 THE INVARIANTn° SEPARATIONPRINCIPLE BY DOUGLAS E. MILLER Abstract. We "invariantize" the classical theory of alternated unions to obtain new separation results in both invariant descriptive set theory and in infinitary logic Application is made to the theory of definitions of countable models. 0. Introduction. In this paper we will be concerned with some results related to the theorem: Disjoint Gs sets in a complete metric space can be separated by an alternated union of closed sets. Before summarizing the contents of the paper it will be helpful to recall some classical definitions and results. Let X be an arbitrary set or class. Suppose r„ T2 are two subclasses of <3'(X) such that T2 C Tx and T2 is closed under complementation. T, has the strong separation property with respect to T2 provided that ïorA0,Ax G T„ if A0 n Ax = 0, then there exists B G T2 such thaM0 Q B Q~ Ax (i.e. B separates A0 fromyl,). An equivalent condition is that Tx has the first separation property and T, n T, = T2 (cf. Addison [1] for a discussion of this phenomenon), f, = {~ A: A &TX). ON is the class of all ordinals. Let y G ON and suppose C =(Cß: ß < y) is a sequence of subclasses of X. C is decreasing if Cß Q Cß- whenever /?' < ß < y. C is continuous if CA = Dß<\ Cß whenever X < y is a limit ordinal. e(y) = [ß G y: ß is even}. D(C) = U [Cß ~ Cß+X: ß G e(y)} is the alternated union of C Let T Ç 9(X).
    [Show full text]
  • Logical-Probabilistic Diagnosis of Human Cardiovascular Diseases Based on Boolean Algebra
    THE CARDIOLOGIST Vol.3, No.1, 2019, pp.34-62 LOGICAL-PROBABILISTIC DIAGNOSIS OF HUMAN CARDIOVASCULAR DISEASES BASED ON BOOLEAN ALGEBRA Sharif E. Guseynov1,2,3*, Daniel Chetrari2, Jekaterina V. Aleksejeva1,4 Alexander V. Berezhnoy5, Abel P. Laiju2 1Institute of Fundamental Science and Innovative Technologies, Liepaja University, Liepaja, Latvia 2Faculty of Science and Engineering, Liepaja University, Liepaja, Latvia 3"Entelgine" Research & Advisory Co., Ltd., Riga, Latvia 4Riga Secondary School 34, Riga, Latvia 5Faculty of Information Technologies, Ventspils University of Applied Sciences, Ventspils, Latvia Abstract. In the present paper, the possibility of applying the logic algebra methods for diagnosing human cardiovascular diseases is studied for an incomplete set of symptoms identified at a given time moment. In the work, the concept of the probability of having a disease is introduced for each particular patient, a formula for calculating probability of disease is proposed, and finally a probabilistic table of the patient's diseases is constructed based on calculated probabilities. Keywords: cardiovascular disease, Boolean algebra, medical diagnosis, cause-effect relation. Corresponding Author: Dr. Sc. Math., Professor Sharif E. Guseynov, Liepaja University, Faculty of Science and Engineering, Institute of Fundamental Science and Innovative Technologies, 4 Kr.Valdemar Street, Liepaja LV-3401, Latvia, Tel.: (+371)22341717, e-mail: [email protected] Manuscript received: 17 November 2018 1. Introduction and specification of investigated problem Before turning to the essence of the problem investigated in this paper, let us note that the term "symptom" in medicine refers to a frequently occurring sign of a disease, being detected using clinical research methods and used to diagnose and / or predict a disease.
    [Show full text]
  • DERRIDA´S MACHINE
    Summer-Edition 2017 — vordenker-archive — Rudolf Kaehr (1942-2016) Title DERRIDAs Machines: Cloning Natural and other Fragments Archive-Number / Categories 2_13 / K02 Publication Date 2004 Keywords Web, Polycontextural Strategies, Logic, Dissemination of Formal Systems, Proemial Relation, Heterarchy, Chiasm, Diamond Strategies, Kenogrammatic, Algebras and Co-Algebras, Identity vs diversity, equality vs sameness vs non-equality – see also 3_12 Disciplines Artificial Intelligence and Robotics, Epistemology, Logic and Foundations, Cybernetics, Computer Sciences, Theory of Scinces Abstract This is a collection of different scientific essays such as “Cloning the Natural – and other Fragments”, “Exploiting Parallelism in Polycontextural Systems”, “Cybernetic Ontology and Web Semantics”, “Minsky´s new Machine”, “The new scene of AI-Cognitive Systems?”, “Dynamic Semantic Web” Citation Information / How to cite Rudolf Kaehr: "DERRIDAs Machines: Cloning Natural and other Fragments", www.vordenker.de (Sommer Edition, 2017) J. Paul (Ed.), URL: http://www.vordenker.de/rk/rk_DERRIDAs_Machines_2004.pdf Categories of the RK-Archive K01 Gotthard Günther Studies K08 Formal Systems in Polycontextural Constellations K02 Scientific Essays K09 Morphogrammatics K03 Polycontexturality – Second-Order-Cybernetics K10 The Chinese Challenge or A Challenge for China K04 Diamond Theory K11 Memristics Memristors Computation K05 Interactivity K12 Cellular Automata K06 Diamond Strategies K13 RK and friends K07 Contextural Programming Paradigm DERRIDA‘S MACHINES by Rudolf
    [Show full text]
  • Digital Design Through Verilog Lecture Notes B.Tech (Iii Year – I Sem)
    DIGITAL DESIGN THROUGH VERILOG LECTURE NOTES B.TECH (III YEAR – I SEM) (2019-2020) Prepared by: Mrs. P. ANITHA, Associate Professor Mr. K. SURESH, Assistant Professor Department of Electronics and Communication Engineering MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Kompally), Secunderabad – 500100, Telangana State, India MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY III Year B.Tech. ECE-I Sem L T/P/D C 4 1/ - /- 3 (R15A0410) DIGITAL DESIGN THROUGH VERILOG OBJECTIVE: This course teaches designing digital circuits, behavior and RTL modeling of digital circuits using Verilog HDL, verifying these Models and synthesizing RTL models to standard cell libraries and FPGAs. Students aim practical experience by designing, modeling, implementing and verifying several digital circuits. This course aims to provide students with the understanding of the different technologies related to HDLs, construct, compile and execute Verilog HDL programs using provided Software Tools: Design digital components and circuits that is testable, reusable, and synthesizable. UNIT - I: Introduction to Verilog HDL: Verilog as HDL, Levels of Design Description, Concurrency, Simulation and Synthesis, Programming Language Interface, Module. Language Constructs and Conventions: Introduction, Keywords, Identifiers, White Space, Characters, Comments, Numbers, Strings, Logic Values, Data Types, Scalars and Vectors, Operators. UNIT - II: Gate Level Modeling: Introduction, AND Gate Primitive, Module Structure, Other Gate Primitives, Illustrative Examples, Tristate Gates, Array of Instances of Primitives, Design of Flip-Flops with Gate Primitives, Gate Delay, Strengths and Contention Resolution, Net Types.
    [Show full text]
  • Logic in Programming
    Logic in Programming Logic is extremely important in both the hardware and software of computing. Here we will begin with the software aspects of logic which are involved in programming. Later we will briefly show some hardware aspects of gates involved in computing architecture. Logic involves conditions in virtually all Choice and Loop constructs (If, and While forms). Logic also occurs in assertions, preconditions, post conditions, invariants and even comments. The boolean (or logical) type is binary; it has only two values, true and false in angular boxes: true false Logical boxes (variables) include such examples as: male, female, tall, old, done, isIsosceles which often must be clarified, perhaps by comments. For example, "old" could be defined as as any age over 21 (or 12, 30, 100, whatever). Declarations of logical types specify boxes having only the two truth values. They have a form which begins with "boolean" followed by any number of variables separated by commas and end with a semicolon. Examples are: boolean male, female; boolean old; // age over 21 boolean tall; // height over or equal to 72 inches Assignment of truth values to boolean boxes (variables) can be done simply as: male = true; old = false; 1 tall = old ; Arithmetic Relations Arithmetic relations often occur in logical conditions; the relations compare two quantities of the same type (such as ints here). (a < b) which reads "a is less than b" (c > d) which reads "c is greater than d" or "c is more than d" (e <= f) which reads "e is less than or equal to f" (g >= h) which reads "g is greater than or equal to h" (i == j) which reads "i is equal to j" (j != k) which reads "j is not equal to k" Alternate or equivalent ways are possible to express conditions: (p < q) is equivalent to (q > p) for example (age < 12) is equivalent to (12 > age) since they both are true for values 11, 10, 9, 8, .
    [Show full text]
  • Logic in Context
    Logic in Context Arnold Neumaier and Flaviu Adrian M˘arginean Fakult¨at f¨ur Mathematik, Universit¨at Wien Oskar–Morgenstern–Platz , A-1090 Wien, Austria email: [email protected] WWW: http://www.mat.univie.ac.at/∼neum/ Version 1.90, February 10, 2020 This is a working copy that will be revised from time to time as feedback is incorporated. Please quote the version and date when referring to the paper. Abstract. Context logic formalizes the way mathematicians apply logic in their reasoning, shifting context as they find it useful. Context logic is defined by only three axioms – simple reflection laws for falsity, conjunction and equality. From these, both classical and intuitionistic reasoning elements arise in a natural way; classical reasoning being about consistency (nonrefutability), intuitionistic reasoning about verifiability as the criterion for truth. In the class of categorical contexts, these criteria coincide, and classical reasoning is valid when verifying statements. We discuss tautologies in context logic, and give a semantic analysis of the relative expressiveness of classical logic and the or-free fragment of intuitionistic logic. Contents 1 Changing contexts 2 2 Context logic 5 3 Semantics 10 4 Tautologies in context logic 13 5 Classical and intuitionistic logic 18 6 Predicate calculus as a context logic 20 7 Natural deduction and context logic 22 1 1 Changing contexts Ye have heard that it hath been said, .... But I say unto you, .... Jesus, according to Matthew 5:38-39 This paper lies at the confluence of two major traditions in logic. The first is represented by the formalisation of context most evident in the logical approaches to Artificial Intelligence pioneered by McCarthy [25, 26, 27] and developed by numerous authors since.
    [Show full text]