Inference in first-order logic
|
|
|
- Emery Barrett
- 9 years ago
- Views:
Transcription
1 Inference in first-order logic Chapter 9 Chapter 9 1
2 Outline Reducing first-order inference to propositional inference Unification Generalized Modus Ponens Forward and backward chaining Logic programming Resolution Chapter 9 2
3 A brief history of reasoning 450b.c. Stoics propositional logic, inference (maybe) 322b.c. Aristotle syllogisms (inference rules), quantifiers 1565 Cardano probability theory (propositional logic + uncertainty) 1847 Boole propositional logic (again) 1879 Frege first-order logic 1922 Wittgenstein proof by truth tables 1930 Gödel complete algorithm for FOL 1930 Herbrand complete algorithm for FOL (reduce to propositional) 1931 Gödel complete algorithm for arithmetic 1960 Davis/Putnam practical algorithm for propositional logic 1965 Robinson practical algorithm for FOL resolution Chapter 9 3
4 Universal instantiation (UI) Every instantiation of a universally quantified sentence is entailed by it: v α Subst({v/g}, α) for any variable v and ground term g E.g., x King(x) Greedy(x) Evil(x) yields King(John) Greedy(John) Evil(John) King(Richard) Greedy(Richard) Evil(Richard) King(F ather(john)) Greedy(F ather(john)) Evil(F ather(john)). Chapter 9 4
5 Existential instantiation (EI) For any sentence α, variable v, and constant symbol k that does not appear elsewhere in the knowledge base: v α Subst({v/k}, α) E.g., x Crown(x) OnHead(x, John) yields Crown(C 1 ) OnHead(C 1, John) provided C 1 is a new constant symbol, called a Skolem constant Another example: from x d(x y )/dy = x y we obtain d(e y )/dy = e y provided e is a new constant symbol Chapter 9 5
6 Existential instantiation contd. UI can be applied several times to add new sentences; the new KB is logically equivalent to the old EI can be applied once to replace the existential sentence; the new KB is not equivalent to the old, but is satisfiable iff the old KB was satisfiable Chapter 9 6
7 Reduction to propositional inference Suppose the KB contains just the following: x King(x) Greedy(x) Evil(x) King(John) Greedy(John) Brother(Richard, John) Instantiating the universal sentence in all possible ways, we have King(John) Greedy(John) Evil(John) King(Richard) Greedy(Richard) Evil(Richard) King(John) Greedy(John) Brother(Richard, John) The new KB is propositionalized: proposition symbols are King(John), Greedy(John), Evil(John), King(Richard) etc. Chapter 9 7
8 Reduction contd. Claim: a ground sentence is entailed by new KB iff entailed by original KB Claim: every FOL KB can be propositionalized so as to preserve entailment Idea: propositionalize KB and query, apply resolution, return result Problem: with function symbols, there are infinitely many ground terms, e.g., F ather(f ather(f ather(john))) Theorem: Herbrand (1930). If a sentence α is entailed by an FOL KB, it is entailed by a finite subset of the propositional KB Idea: For n = 0 to do create a propositional KB by instantiating with depth-n terms see if α is entailed by this KB Problem: works if α is entailed, loops if α is not entailed Theorem: Turing (1936), Church (1936), entailment in FOL is semidecidable Chapter 9 8
9 Problems with propositionalization Propositionalization seems to generate lots of irrelevant sentences. E.g., from x King(x) Greedy(x) Evil(x) King(John) y Greedy(y) Brother(Richard, John) it seems obvious that Evil(John), but propositionalization produces lots of facts such as Greedy(Richard) that are irrelevant With p k-ary predicates and n constants, there are p n k instantiations With function symbols, it gets nuch much worse! Chapter 9 9
10 Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) Knows(John, x) Knows(y, OJ) Knows(John, x) Knows(y, M other(y)) Knows(John, x) Knows(x, OJ) Chapter 9 10
11 Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) Knows(John, x) Knows(y, M other(y)) Knows(John, x) Knows(x, OJ) Chapter 9 11
12 Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) {x/oj, y/john} Knows(John, x) Knows(y, M other(y)) Knows(John, x) Knows(x, OJ) Chapter 9 12
13 Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) {x/oj, y/john} Knows(John, x) Knows(y, M other(y)) {y/john, x/m other(john)} Knows(John, x) Knows(x, OJ) Chapter 9 13
14 Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) {x/oj, y/john} Knows(John, x) Knows(y, M other(y)) {y/john, x/m other(john)} Knows(John, x) Knows(x, OJ) f ail Standardizing apart eliminates overlap of variables, e.g., Knows(z 17, OJ) Chapter 9 14
15 Generalized Modus Ponens (GMP) p 1, p 2,..., p n, (p 1 p 2... p n q) qθ where p i θ = p i θ for all i p 1 is King(John) p 1 is King(x) p 2 is Greedy(y) p 2 is Greedy(x) θ is {x/john, y/john} q is Evil(x) qθ is Evil(John) GMP used with KB of definite clauses (exactly one positive literal) All variables assumed universally quantified Chapter 9 15
16 Soundness of GMP Need to show that p 1,..., p n, (p 1... p n q) = qθ provided that p i θ = p i θ for all i Lemma: For any definite clause p, we have p = pθ by UI 1. (p 1... p n q) = (p 1... p n q)θ = (p 1 θ... p n θ qθ) 2. p 1,..., p n = p 1... p n = p 1 θ... p n θ 3. From 1 and 2, qθ follows by ordinary Modus Ponens Chapter 9 16
17 Example knowledge base The law says that it is a crime for an American to sell weapons to hostile nations. The country Nono, an enemy of America, has some missiles, and all of its missiles were sold to it by Colonel West, who is American. Prove that Col. West is a criminal Chapter 9 17
18 Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: Chapter 9 18
19 Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles Chapter 9 19
20 Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West Chapter 9 20
21 Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West x Missile(x) Owns(Nono, x) Sells(W est, x, Nono) Missiles are weapons: Chapter 9 21
22 Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West x Missile(x) Owns(Nono, x) Sells(W est, x, Nono) Missiles are weapons: Missile(x) W eapon(x) An enemy of America counts as hostile : Chapter 9 22
23 Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West x Missile(x) Owns(Nono, x) Sells(W est, x, Nono) Missiles are weapons: Missile(x) W eapon(x) An enemy of America counts as hostile : Enemy(x, America) Hostile(x) West, who is American... American(W est) The country Nono, an enemy of America... Enemy(N ono, America) Chapter 9 23
24 Forward chaining algorithm function FOL-FC-Ask(KB, α) returns a substitution or false repeat until new is empty new { } for each sentence r in KB do ( p 1... p n q) Standardize-Apart(r) for each θ such that (p 1... p n )θ = (p 1... p n )θ for some p 1,..., p n in KB q Subst(θ, q) if q is not a renaming of a sentence already in KB or new then do add q to new φ Unify(q, α) if φ is not fail then return φ add new to KB return false Chapter 9 24
25 Forward chaining proof American(West) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Chapter 9 25
26 Forward chaining proof Weapon(M1) Sells(West,M1,Nono) Hostile(Nono) American(West) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Chapter 9 26
27 Forward chaining proof Criminal(West) Weapon(M1) Sells(West,M1,Nono) Hostile(Nono) American(West) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Chapter 9 27
28 Properties of forward chaining Sound and complete for first-order definite clauses (proof similar to propositional proof) Datalog = first-order definite clauses + no functions (e.g., crime KB) FC terminates for Datalog in poly iterations: at most p n k literals May not terminate in general if α is not entailed This is unavoidable: entailment with definite clauses is semidecidable Chapter 9 28
29 Efficiency of forward chaining Simple observation: no need to match a rule on iteration k if a premise wasn t added on iteration k 1 match each rule whose premise contains a newly added literal Matching itself can be expensive Database indexing allows O(1) retrieval of known facts e.g., query Missile(x) retrieves Missile(M 1 ) Matching conjunctive premises against known facts is NP-hard Forward chaining is widely used in deductive databases Chapter 9 29
30 Hard matching example WA NT SA V Q Victoria T NSW Diff(wa, nt) Diff(wa, sa) Diff(nt, q)diff(nt, sa) Diff(q, nsw) Diff(q, sa) Diff(nsw, v) Diff(nsw, sa) Diff(v, sa) Colorable() Diff(Red, Blue) Diff(Green, Red) Diff(Blue, Red) Diff(Red, Green) Diff(Green, Blue) Diff(Blue, Green) Colorable() is inferred iff the CSP has a solution CSPs include 3SAT as a special case, hence matching is NP-hard Chapter 9 30
31 Backward chaining algorithm function FOL-BC-Ask(KB, goals, θ) returns a set of substitutions inputs: KB, a knowledge base goals, a list of conjuncts forming a query (θ already applied) θ, the current substitution, initially the empty substitution { } local variables: answers, a set of substitutions, initially empty if goals is empty then return {θ} q Subst(θ, First(goals)) for each sentence r in KB where Standardize-Apart(r) = ( p 1... p n q) and θ Unify(q, q ) succeeds new goals [ p 1,..., p n Rest(goals)] answers FOL-BC-Ask(KB, new goals, Compose(θ, θ)) answers return answers Chapter 9 31
32 Backward chaining example Criminal(West) Chapter 9 32
33 Backward chaining example Criminal(West) {x/west} Weapon(y) American(x) Sells(x,y,z) Hostile(z) Chapter 9 33
34 Backward chaining example Criminal(West) {x/west} American(West) { } Weapon(y) Sells(x,y,z) Hostile(z) Chapter 9 34
35 Backward chaining example Criminal(West) {x/west} American(West) Weapon(y) Sells(West,M1,z) Sells(x,y,z) Hostile(Nono) Hostile(z) { } Missile(y) Chapter 9 35
36 Backward chaining example Criminal(West) {x/west, y/m1} American(West) Weapon(y) Sells(West,M1,z) Sells(x,y,z) Hostile(Nono) Hostile(z) { } Missile(y) { y/m1} Chapter 9 36
37 Backward chaining example Criminal(West) {x/west, y/m1, z/nono} American(West) Weapon(y) Sells(West,M1,z) Hostile(z) { } { z/nono } Missile(y) { y/m1} Missile(M1) Owns(Nono,M1) Chapter 9 37
38 Backward chaining example Criminal(West) {x/west, y/m1, z/nono} American(West) { } Weapon(y) Sells(West,M1,z) { z/nono } Hostile(Nono) Missile(y) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) { y/m1} { } { } { } Chapter 9 38
39 Properties of backward chaining Depth-first recursive proof search: space is linear in size of proof Incomplete due to infinite loops fix by checking current goal against every goal on stack Inefficient due to repeated subgoals (both success and failure) fix using caching of previous results (extra space!) Widely used (without improvements!) for logic programming Chapter 9 39
40 Logic programming Sound bite: computation as inference on logical KBs Logic programming Ordinary programming 1. Identify problem Identify problem 2. Assemble information Assemble information 3. Tea break Figure out solution 4. Encode information in KB Program solution 5. Encode problem instance as facts Encode problem instance as data 6. Ask queries Apply program to data 7. Find false facts Debug procedural errors Should be easier to debug Capital(NewY ork, US) than x := x + 2! Chapter 9 40
41 Prolog systems Basis: backward chaining with Horn clauses + bells & whistles Widely used in Europe, Japan (basis of 5th Generation project) Compilation techniques approaching a billion LIPS Program = set of clauses = head :- literal 1,... literal n. criminal(x) :- american(x), weapon(y), sells(x,y,z), hostile(z). Efficient unification by open coding Efficient retrieval of matching clauses by direct linking Depth-first, left-to-right backward chaining Built-in predicates for arithmetic etc., e.g., X is Y*Z+3 Closed-world assumption ( negation as failure ) e.g., given alive(x) :- not dead(x). alive(joe) succeeds if dead(joe) fails Chapter 9 41
42 Prolog examples Depth-first search from a start state X: dfs(x) :- goal(x). dfs(x) :- successor(x,s),dfs(s). No need to loop over S: successor succeeds for each Appending two lists to produce a third: append([],y,y). append([x L],Y,[X Z]) :- append(l,y,z). query: append(a,b,[1,2])? answers: A=[] B=[1,2] A=[1] B=[2] A=[1,2] B=[] Chapter 9 42
43 Full first-order version: Resolution: brief summary l 1 l k, m 1 m n (l 1 l i 1 l i+1 l k m 1 m j 1 m j+1 m n )θ where Unify(l i, m j ) = θ. For example, Rich(x) U nhappy(x) Rich(Ken) U nhappy(ken) with θ = {x/ken} Apply resolution steps to CNF (KB α); complete for FOL Chapter 9 43
44 Conversion to CNF Everyone who loves all animals is loved by someone: x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] 1. Eliminate biconditionals and implications x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] 2. Move inwards: x, p x p, x, p x p: x [ y ( Animal(y) Loves(x, y))] [ y Loves(y, x)] x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] Chapter 9 44
45 Conversion to CNF contd. 3. Standardize variables: each quantifier should use a different one x [ y Animal(y) Loves(x, y)] [ z Loves(z, x)] 4. Skolemize: a more general form of existential instantiation. Each existential variable is replaced by a Skolem function of the enclosing universally quantified variables: x [Animal(F (x)) Loves(x, F (x))] Loves(G(x), x) 5. Drop universal quantifiers: [Animal(F (x)) Loves(x, F (x))] Loves(G(x), x) 6. Distribute over : [Animal(F (x)) Loves(G(x), x)] [ Loves(x, F (x)) Loves(G(x), x)] Chapter 9 45
46 Resolution proof: definite clauses American(West) Missile(M1) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Enemy(Nono,America) Criminal(x) LHostile(z) LSells(x,y,z) LWeapon(y) LAmerican(x) > > > > Weapon(x) LMissile(x) > Sells(West,x,Nono) LMissile(x) LOwns(Nono,x) > > Hostile(x) LEnemy(x,America) > LSells(West,y,z) LWeapon(y) LAmerican(West) > > LHostile(z) > LSells(West,y,z) LWeapon(y) > LHostile(z) > LSells(West,y,z) > LHostile(z) > LMissile(y) LHostile(z) > LSells(West,M1,z) > > LHostile(Nono) LOwns(Nono,M1) LMissile(M1) > LHostile(Nono) LOwns(Nono,M1) LHostile(Nono) LCriminal(West) Chapter 9 46
Sound and Complete Inference Rules in FOL
Sound and Complete Inference Rules in FOL An inference rule i is called sound if KB = α whenever KB i α An inference rule i is called complete if KB i α whenever KB = α Generalised Modus-Ponens (equivalently,
Logic in general. Inference rules and theorem proving
Logical Agents Knowledge-based agents Logic in general Propositional logic Inference rules and theorem proving First order logic Knowledge-based agents Inference engine Knowledge base Domain-independent
Limitations of Propositional Logic => Predicate Calculus. Natural Language and Dialogue Systems Lab
Limitations of Propositional Logic => Predicate Calculus Natural Language and Dialogue Systems Lab Announcements New homeworks related to the projects posted Update your project proposals, due Friday Midterm
Example: Backward Chaining. Inference Strategy: Backward Chaining. First-Order Logic. Knowledge Engineering. Example: Proof
Inference Strategy: Backward Chaining Idea: Check whether a particular fact q is true. Backward Chaining: Given a fact q to be proven, 1. See if q is already in the KB. If so, return TRUE. 2. Find all
Lecture 8: Resolution theorem-proving
Comp24412 Symbolic AI Lecture 8: Resolution theorem-proving Ian Pratt-Hartmann Room KB2.38: email: [email protected] 2014 15 In the previous Lecture, we met SATCHMO, a first-order theorem-prover implemented
Handout #1: Mathematical Reasoning
Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or
Lecture 13 of 41. More Propositional and Predicate Logic
Lecture 13 of 41 More Propositional and Predicate Logic Monday, 20 September 2004 William H. Hsu, KSU http://www.kddresearch.org http://www.cis.ksu.edu/~bhsu Reading: Sections 8.1-8.3, Russell and Norvig
ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information
Logical Agents. Explorations in Artificial Intelligence. Knowledge-based Agents. Knowledge-base Agents. Outline. Knowledge bases
Logical Agents Explorations in Artificial Intelligence rof. Carla. Gomes [email protected] Agents that are able to: Form representations of the world Use a process to derive new representations of the
CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs
CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce
15-780: Graduate AI Lecture 3. FOL proofs. Geoff Gordon (this lecture) Tuomas Sandholm TAs Erik Zawadzki, Abe Othman
15-780: Graduate AI Lecture 3. FOL proofs Geoff Gordon (this lecture) Tuomas Sandholm TAs Erik Zawadzki, Abe Othman Admin 2 HW1 Out today Due Tue, Feb. 1 (two weeks) hand in hardcopy at beginning of class
2. The Language of First-order Logic
2. The Language of First-order Logic KR & R Brachman & Levesque 2005 17 Declarative language Before building system before there can be learning, reasoning, planning, explanation... need to be able to
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
Resolution. Informatics 1 School of Informatics, University of Edinburgh
Resolution In this lecture you will see how to convert the natural proof system of previous lectures into one with fewer operators and only one proof rule. You will see how this proof system can be used
Answers G53KRR 2009-10
s G53KRR 2009-10 1. (a) Express the following sentences in first-order logic, using unary predicates Fragile, Break, Fall, TennisBall. S1 Fragile things break if they fall S2 Tennis balls are not fragile
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
Predicate Logic. For example, consider the following argument:
Predicate Logic The analysis of compound statements covers key aspects of human reasoning but does not capture many important, and common, instances of reasoning that are also logically valid. For example,
Rules of Inference Friday, January 18, 2013 Chittu Tripathy Lecture 05
Rules of Inference Today s Menu Rules of Inference Quantifiers: Universal and Existential Nesting of Quantifiers Applications Old Example Re-Revisited Our Old Example: Suppose we have: All human beings
Likewise, we have contradictions: formulas that can only be false, e.g. (p p).
CHAPTER 4. STATEMENT LOGIC 59 The rightmost column of this truth table contains instances of T and instances of F. Notice that there are no degrees of contingency. If both values are possible, the formula
(LMCS, p. 317) V.1. First Order Logic. This is the most powerful, most expressive logic that we will examine.
(LMCS, p. 317) V.1 First Order Logic This is the most powerful, most expressive logic that we will examine. Our version of first-order logic will use the following symbols: variables connectives (,,,,
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
Computability Theory
CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
Logic and Reasoning Practice Final Exam Spring 2015. Section Number
Logic and Reasoning Practice Final Exam Spring 2015 Name Section Number The final examination is worth 100 points. 1. (5 points) What is an argument? Explain what is meant when one says that logic is the
First-Order Logics and Truth Degrees
First-Order Logics and Truth Degrees George Metcalfe Mathematics Institute University of Bern LATD 2014, Vienna Summer of Logic, 15-19 July 2014 George Metcalfe (University of Bern) First-Order Logics
Relations: their uses in programming and computational specifications
PEPS Relations, 15 December 2008 1/27 Relations: their uses in programming and computational specifications Dale Miller INRIA - Saclay & LIX, Ecole Polytechnique 1. Logic and computation Outline 2. Comparing
Mathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
DEDUCTIVE & INDUCTIVE REASONING
DEDUCTIVE & INDUCTIVE REASONING Expectations 1. Take notes on inductive and deductive reasoning. 2. This is an information based presentation -- I simply want you to be able to apply this information to
CS510 Software Engineering
CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se
Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us
def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system.
Section 1.5 Methods of Proof 1.5.1 1.5 METHODS OF PROOF Some forms of argument ( valid ) never lead from correct statements to an incorrect. Some other forms of argument ( fallacies ) can lead from true
Foundational Proof Certificates
An application of proof theory to computer science INRIA-Saclay & LIX, École Polytechnique CUSO Winter School, Proof and Computation 30 January 2013 Can we standardize, communicate, and trust formal proofs?
This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.
3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but
Computational Methods for Database Repair by Signed Formulae
Computational Methods for Database Repair by Signed Formulae Ofer Arieli ([email protected]) Department of Computer Science, The Academic College of Tel-Aviv, 4 Antokolski street, Tel-Aviv 61161, Israel.
Predicate logic Proofs Artificial intelligence. Predicate logic. SET07106 Mathematics for Software Engineering
Predicate logic SET07106 Mathematics for Software Engineering School of Computing Edinburgh Napier University Module Leader: Uta Priss 2010 Copyright Edinburgh Napier University Predicate logic Slide 1/24
DISCRETE MATH: LECTURE 3
DISCRETE MATH: LECTURE 3 DR. DANIEL FREEMAN 1. Chapter 2.2 Conditional Statements If p and q are statement variables, the conditional of q by p is If p then q or p implies q and is denoted p q. It is false
each college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
1.2 Forms and Validity
1.2 Forms and Validity Deductive Logic is the study of methods for determining whether or not an argument is valid. In this section we identify some famous valid argument forms. Argument Forms Consider
First-order logic. Chapter 8. Chapter 8 1
First-order logic Chapter 8 Chapter 8 1 Outline Why FOL? Syntax and semantics of FOL Fun with sentences Wumpus world in FOL Chapter 8 2 Pros and cons of propositional logic Propositional logic is declarative:
University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees
University of Ostrava Institute for Research and Applications of Fuzzy Modeling Reasoning in Description Logic with Semantic Tableau Binary Trees Alena Lukasová Research report No. 63 2005 Submitted/to
Cassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
How To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
Fixed-Point Logics and Computation
1 Fixed-Point Logics and Computation Symposium on the Unusual Effectiveness of Logic in Computer Science University of Cambridge 2 Mathematical Logic Mathematical logic seeks to formalise the process of
Automata and Formal Languages
Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,
Basic Proof Techniques
Basic Proof Techniques David Ferry [email protected] September 13, 010 1 Four Fundamental Proof Techniques When one wishes to prove the statement P Q there are four fundamental approaches. This document
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
Certamen 1 de Representación del Conocimiento
Certamen 1 de Representación del Conocimiento Segundo Semestre 2012 Question: 1 2 3 4 5 6 7 8 9 Total Points: 2 2 1 1 / 2 1 / 2 3 1 1 / 2 1 1 / 2 12 Here we show one way to solve each question, but there
CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r.
CHAPTER 2 Logic 1. Logic Definitions 1.1. Propositions. Definition 1.1.1. A proposition is a declarative sentence that is either true (denoted either T or 1) or false (denoted either F or 0). Notation:
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
WRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.
Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole
Invalidity in Predicate Logic
Invalidity in Predicate Logic So far we ve got a method for establishing that a predicate logic argument is valid: do a derivation. But we ve got no method for establishing invalidity. In propositional
Remarks on Non-Fregean Logic
STUDIES IN LOGIC, GRAMMAR AND RHETORIC 10 (23) 2007 Remarks on Non-Fregean Logic Mieczys law Omy la Institute of Philosophy University of Warsaw Poland [email protected] 1 Introduction In 1966 famous Polish
Introduction to Automata Theory. Reading: Chapter 1
Introduction to Automata Theory Reading: Chapter 1 1 What is Automata Theory? Study of abstract computing devices, or machines Automaton = an abstract computing device Note: A device need not even be a
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
The History of Logic. Aristotle (384 322 BC) invented logic.
The History of Logic Aristotle (384 322 BC) invented logic. Predecessors: Fred Flintstone, geometry, sophists, pre-socratic philosophers, Socrates & Plato. Syllogistic logic, laws of non-contradiction
Data Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
Bounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
Deterministic Finite Automata
1 Deterministic Finite Automata Definition: A deterministic finite automaton (DFA) consists of 1. a finite set of states (often denoted Q) 2. a finite set Σ of symbols (alphabet) 3. a transition function
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
MATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
Relational Databases
Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 18 Relational data model Domain domain: predefined set of atomic values: integers, strings,... every attribute
Solving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
Schedule. Logic (master program) Literature & Online Material. gic. Time and Place. Literature. Exercises & Exam. Online Material
OLC mputational gic Schedule Time and Place Thursday, 8:15 9:45, HS E Logic (master program) Georg Moser Institute of Computer Science @ UIBK week 1 October 2 week 8 November 20 week 2 October 9 week 9
Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm
MTHSC 412 Section 2.4 Prime Factors and Greatest Common Divisor Greatest Common Divisor Definition Suppose that a, b Z. Then we say that d Z is a greatest common divisor (gcd) of a and b if the following
Computational Logic and Cognitive Science: An Overview
Computational Logic and Cognitive Science: An Overview Session 1: Logical Foundations Technical University of Dresden 25th of August, 2008 University of Osnabrück Who we are Helmar Gust Interests: Analogical
Sudoku as a SAT Problem
Sudoku as a SAT Problem Inês Lynce IST/INESC-ID, Technical University of Lisbon, Portugal [email protected] Joël Ouaknine Oxford University Computing Laboratory, UK [email protected] Abstract Sudoku
Cartesian Products and Relations
Cartesian Products and Relations Definition (Cartesian product) If A and B are sets, the Cartesian product of A and B is the set A B = {(a, b) :(a A) and (b B)}. The following points are worth special
CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12
CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.
The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.
The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,
Sudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
Lecture 2. What is the Normative Role of Logic?
Lecture 2. What is the Normative Role of Logic? What is the connection between (deductive) logic and rationality? One extreme: Frege. A law of logic is a law of rational thought. Seems problematic, if
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
The last three chapters introduced three major proof techniques: direct,
CHAPTER 7 Proving Non-Conditional Statements The last three chapters introduced three major proof techniques: direct, contrapositive and contradiction. These three techniques are used to prove statements
Predicate Logic. Example: All men are mortal. Socrates is a man. Socrates is mortal.
Predicate Logic Example: All men are mortal. Socrates is a man. Socrates is mortal. Note: We need logic laws that work for statements involving quantities like some and all. In English, the predicate is
Applied Logic in Engineering
Applied Logic in Engineering Logic Programming Technische Universität München Institut für Informatik Software & Systems Engineering Dr. Maria Spichkova M. Spichkova WS 2012/13: Applied Logic in Engineering
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
Why Study NP- hardness. NP Hardness/Completeness Overview. P and NP. Scaling 9/3/13. Ron Parr CPS 570. NP hardness is not an AI topic
Why Study NP- hardness NP Hardness/Completeness Overview Ron Parr CPS 570 NP hardness is not an AI topic It s important for all computer scienhsts Understanding it will deepen your understanding of AI
Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
InvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
Math 3000 Section 003 Intro to Abstract Math Homework 2
Math 3000 Section 003 Intro to Abstract Math Homework 2 Department of Mathematical and Statistical Sciences University of Colorado Denver, Spring 2012 Solutions (February 13, 2012) Please note that these
Summary Last Lecture. Automated Reasoning. Outline of the Lecture. Definition sequent calculus. Theorem (Normalisation and Strong Normalisation)
Summary Summary Last Lecture sequent calculus Automated Reasoning Georg Moser Institute of Computer Science @ UIBK Winter 013 (Normalisation and Strong Normalisation) let Π be a proof in minimal logic
2110711 THEORY of COMPUTATION
2110711 THEORY of COMPUTATION ATHASIT SURARERKS ELITE Athasit Surarerks ELITE Engineering Laboratory in Theoretical Enumerable System Computer Engineering, Faculty of Engineering Chulalongkorn University
Pushdown Automata. place the input head on the leftmost input symbol. while symbol read = b and pile contains discs advance head remove disc from pile
Pushdown Automata In the last section we found that restricting the computational power of computing devices produced solvable decision problems for the class of sets accepted by finite automata. But along
How To Understand The Theory Of Hyperreals
Ultraproducts and Applications I Brent Cody Virginia Commonwealth University September 2, 2013 Outline Background of the Hyperreals Filters and Ultrafilters Construction of the Hyperreals The Transfer
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
AUTOMATED REASONING SLIDES 3: RESOLUTION The resolution rule Unification Refutation by resolution Factoring Clausal Form and Skolemisation
AUTOMATED REASONING SLIDES 3: RESOLUTION The resolution rule Unification Refutation by resolution Factoring Clausal Form and Skolemisation KB - AR - 09 Resolution Resolution is a clausal refutation system
Bounded-width QBF is PSPACE-complete
Bounded-width QBF is PSPACE-complete Albert Atserias 1 and Sergi Oliva 2 1 Universitat Politècnica de Catalunya Barcelona, Spain [email protected] 2 Universitat Politècnica de Catalunya Barcelona, Spain
On strong fairness in UNITY
On strong fairness in UNITY H.P.Gumm, D.Zhukov Fachbereich Mathematik und Informatik Philipps Universität Marburg {gumm,shukov}@mathematik.uni-marburg.de Abstract. In [6] Tsay and Bagrodia present a correct
CSE 135: Introduction to Theory of Computation Decidability and Recognizability
CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing
