T E C H N I C A L R E P O R T. Disjunctive Logic Programs with Inheritance INSTITUT FÜR INFORMATIONSSYSTEME DBAI-TR-99-30

Size: px
Start display at page:

Download "T E C H N I C A L R E P O R T. Disjunctive Logic Programs with Inheritance INSTITUT FÜR INFORMATIONSSYSTEME DBAI-TR-99-30"

Transcription

1 T E C H N I C A L R E P O R T INSTITUT FÜR INFORMATIONSSYSTEME ABTEILUNG DATENBANKEN UND ARTIFICIAL INTELLIGENCE Disjunctive Logic Programs with Inheritance DBAI-TR Francesco Buccafurri 1 Wolfgang Faber 2 Nicola Leone 3 Institut für Informationssysteme Abteilung Datenbanken und Artificial Intelligence Technische Universität Wien Paniglgasse 16 A-1040 Vienna, Austria Tel: Fax: sekret@dbai.tuwien.ac.at DBAI TECHNICAL REPORT MAY 1999

2 DBAI TECHNICAL REPORT DBAI TECHNICAL REPORT DBAI-TR-99-30, MAY 1999 Disjunctive Logic Programs with Inheritance Abstract. The paper proposes a new knowledge representation language, called ÄÈ, which extends disjunctive logic programming (with strong negation) by inheritance. The addition of inheritance enhances the knowledge modeling features of the language providing a natural representation of default reasoning with exceptions. A declarative model-theoretic semantics of ÄÈ is provided, which is shown to generalize the answer set semantics of disjunctive logic programs. The knowledge modeling features of the language are illustrated by encoding classical nonmonotonic problems in ÄÈ. The complexity of ÄÈ is analyzed, proving that inheritance does not cause any computational overhead, as reasoning in ÄÈ has exactly the same complexity as reasoning in disjunctive logic programming. This is confirmed by the existence of an efficient translation from ÄÈ to plain disjunctive logic programming. Using this translation, an advanced KR system supporting the ÄÈ language has been implemented on top of the dlv system. Keywords. Nonmonotonic Reasoning, Knowledge Representation, Disjunctive Logic Programming, Inheritance, Exceptions. 1 DIMET, Universitá di Reggio Calabria, 89100, Reggio Calabria, Italia. bucca@ns.ing.unirc.it 2 Institut für Informationssysteme, Technische Universität Wien, Paniglgasse 16, A-1040 Wien, Austria. faber@dbai.tuwien.ac.at 3 Institut für Informationssysteme, Technische Universität Wien, Paniglgasse 16, A-1040 Wien, Austria. leone@dbai.tuwien.ac.at Acknowledgements: Supported in part by FWF (Austrian Science Funds) under the projects P11580-MAT and Z29-INF. Copyright c 1999 by the authors

3 TECHNICAL REPORT DBAI-TR Introduction Disjunctive logic programs are logic programs where disjunction is allowed in the heads of the rules and (NAF) negation may occur in the bodies of the rules. Such programs are now widely recognized as a valuable tool for knowledge representation and commonsense reasoning [5, 23, 15]. One of the attractions of disjunctive logic programming is its ability to naturally model incomplete knowledge [5, 23]. The need to differentiate atoms, which are false because of the failure to prove them true (NAF, or CWA negation), from atoms the falsity of which is explicitly provable, led to extend disjunctive logic programs by strong negation [15]. Strong negation, permitted also in the rules heads, further enhances the knowledge modeling features of the language, and its usefulness is widely acknowledged in the literature [1, 5, 20, 2, 31, 3]. However, it does not allow to represent default reasoning with exceptions in a direct and natural way. Indeed, to render a default rule Ö defeasible, Ö must be equipped by an extra negative literal, which blocks inferences from Ö for abnormal instances [17]. For instance, to encode the famous NMR example stating that birds normally fly while penguins do not fly, one should write the rule ÐÝ µ Ö µ ÒÓØ ÐÝ µ along with the fact ÐÝ Ô Ò Ù Òµ. 1 This paper proposes an extension of disjunctive logic programming by inheritance, called ÄÈ. The addition of inheritance enhances the knowledge modeling features of the language. Possible conflicts are solved in favour of the rules which are more specific according to the inheritance hierarchy. This way, a direct and natural representation of default reasoning with exceptions is achieved (e.g., defeasible rules do not need to be equipped with extra literals as above see section 4). The main contribution of the paper are the following. We formally define the ÄÈ language, providing a declarative model theoretic semantics of ÄÈ, which is shown to generalize the answer set semantics of [15]. We illustrate the knowledge modeling features of the language by encoding classical nonmonotonic problems in ÄÈ. Interestingly, ÄÈ supplies a natural representation also of frame axioms. We analyze the computational complexity of reasoning over ÄÈ programs. Importantly, while inheritance enhances the knowledge modeling ability of disjunctive logic programming, it does not cause any computational overhead, as reasoning in ÄÈ has exactly the same complexity as reasoning in disjunctive logic programming. We compare ÄÈ to related works proposed in the literature. In particular, we evidentiate the differences between ÄÈ and Disjunctive Ordered Logic ( ÇÄ) [7]; we point out the relation to the answer set semantics of [15]; we compare ÄÈ with prioritized disjunctive logic programs [31], and analyze its relationships to inheritance networks [33] and to updates of logic programs. We implement a ÄÈ system. To this end, we first design an efficient translation from ÄÈ to plain disjunctive logic programming. Then, using this translation, we implement a ÄÈ evaluator on top of the dlv system [12]. The system prototype can be freely retrieved from [14]. To the best of our knowledge, this is the first fully operational system supporting a prioritized disjunctive logic programming language. 1 ÒÓØ and denote the weak negation symbol and the strong negation symbol, respectively.

4 TECHNICAL REPORT DBAI-TR Syntax of ÄÈ This section provides a formal description of syntactical constructs of the language. Let the following disjoint sets be given: a set Î of variables, a set of predicates, a set of constants, and a finite partially ordered set of symbols Ç µ, where Ç is a set of strings, called object identifiers, and is a strict partial order (i.e., the relation is: (i) irreflexive ¾ Ç, and (ii) transitive µ ¾ Ç). A Ø ÖÑ is either a constant in or a variable in Î (note that function symbols are not considered in this paper). An ØÓÑ is a construct of the form Ø ½ Ø Ò µ, where is a ÔÖ Ø of arity Ò in and Ø ½ Ø Ò are terms. A Ð Ø Ö Ð is either a ÔÓ Ø Ú Ð Ø Ö Ð Ô or a Ò Ø Ú Ð Ø Ö Ð Ô, where Ô is an atom ( is the ØÖÓÒ Ò Ø ÓÒ symbol). Two literals are ÓÑÔÐ Ñ ÒØ ÖÝ if they are of the form Ô and Ô, for some atom Ô. Given a literal Ä, Ä denotes its complementary literal. Accordingly, given a set of literals, denotes the set Ä Ä ¾. A rule Ö is an expression of the form: ½ Ò ½ ÒÓØ ½ ÒÓØ Ñ Ò ½ Ñ ¼ where ½ Ò ½ Ñ are literals, and ÒÓØ is the negation as failure symbol. The disjunction ½ Ò is the head of Ö, while the conjunction ½ ÒÓØ ½ ÒÓØ Ñ is the body of Ö. ½ is called the positive part of the body of Ö and ÒÓØ ½ ÒÓØ Ñ is called the NAF (negation as failure) part of the body of Ö. We often denote the sets of literals appearing in the head, in the positive part of the body, and in the NAF part of the body of a rule Ö by À Öµ, Ó Ý Öµ, and Ó Ý Öµ, respectively. An object Ó is a pair Ó Óµ Óµ, where Ó Óµ is an object identifier in Ç and Óµ is a (possibly empty) set of rules. A knowledge base on Ç is a set of objects, one for each element of Ç. Given a knowledge base à and an object identifier Ó ¾ Ç, the ÄÈ program for Ó (on Ã) is the set of objects È Ó ¼ Ó ¼ µµ ¾ Ã Ó Ó ¼ ÓÖ Ó Ó ¼. The relation induces a partial order on È in the obvious way, that is, given Ó Ó Ó µ Ó µµ and Ó Ó Ó µ Ó µµ, Ó Ó iff Ó Ó µ Ó Ó µ (read Ó is more specific than Ó ). A term, an atom, a literal, a rule, or program is ground if no variable appears in it. Informally, a knowledge base can be viewed as a set of objects embedding the definition of their properties specified through disjunctive logic rules, organized in a IS-A (inheritance) hierarchy (induced by the relation ). A program È for an object Ó on a knowledge base à consists of the portion of à seen from Ó looking up in the IS-A hierarchy. Thanks to the inheritance mechanism, È incorporates the knowledge explicitely defined for Ó plus the knowledge inherited from the higher objects. If a knowledge base admits a bottom element (i.e., an object less than all the other objects, by the relation ), we usually refer to the knowledge base as program, since it is equal to the program for the bottom element. Moreover, we represent the transitive-reduction of the relation on the objects. 2 In order to represent the membership of a pair of objects (resp., object identifiers) Ó ¾ Ó ½ µ to the transitive-reduction of we use the notation Ó ¾ Ó ½, and say that Ó ¾ is a sub-object of Ó ½. Example 1 Consider the following program È: 2 µ is in the transitive-reduction of iff and there is no such that and.

5 TECHNICAL REPORT DBAI-TR Ó ½ ÒÓØ Ó ¾ Ó ½ È consists of two objects Ó ½ and Ó ¾. Ó ¾ is a sub-object of Ó ½. According to the convention illustrated above, the knowledge base on which È is defined coincides with È, and the object for which È is defined is Ó ¾ (the bottom object). 3 Semantics of ÄÈ In this section we assume that a knowledge base à is given and an object Ó has been fixed. Let È be the ÄÈ program for Ó on Ã. The Universe Í È of È is the set of all constants appearing in the rules. The Base È of È is the set of all possible ground literals constructible from the predicates appearing in the rules of È and the constants occurring in Í È. Note that, unlike in traditional logic programming the Base of a ÄÈ program contains both positive and negative literals. Given a rule Ö occurring in È, a ground instance of Ö is a rule obtained from Ö by replacing every variable in Ö by Öµ, where is a mapping from the variables occurring in Ö to the constants in Í È. We denote by ÖÓÙÒ Èµ the (finite) multiset of all instances of the rules occurring in È. The reason why ÖÓÙÒ Èµ is a multiset is that a rule may appear in several different objects of È, and we require the respective ground instances be distinct. Hence, we can define a function Ó Ó from ground instance of rules in ÖÓÙÒ Èµ onto the set Ç of the object identifiers, associating with a ground instance Ö of Ö the (unique) object of Ö. A subset of ground literals in È is said to be consistent if no pair of complementary literals is in it. An interpretation Á is a consistent subset of È. Given an interpretation Á È, a ground literal (either positive or negative) Ä is true w.r.t. Á if Ä ¾ Á holds. Ä is false w.r.t. Á otherwise. Given a rule Ö ¾ ÖÓÙÒ Èµ, the head of Ö is true in Á if at least one literal of the head is true w.r.t Á. The body of Ö is true in Á if: (i) every literal in Ó Ý Öµ is true w.r.t. Á, and (ii) every literal in Ó Ý Öµ is false w.r.t. Á. Rule Ö is satisfied in Á if either the head of Ö is true in Á or the body of Ö is not true in Á. Two ground rules Ö ½ and Ö ¾ are conflicting on Ä if Ä ¾ À Ö ½ µ and Ä ¾ À Ö ¾ µ. Next we introduce the concept of a model for a ÄÈ -program. Unlike in traditional logic programming, the notion of satisfiability of rules is not sufficient for this goal, as it does not take into account the presence of explicit contradictions. Hence, we first present some preliminary definitions. Definition 1 For an interpretation Á, two conflicting ground rules Ö ½ Ö ¾ ¾ ÖÓÙÒ Èµ, such that Ä ¾ À Ö ¾ µ, we say that Ö ½ overrides Ö ¾ on Ä in Á if: 1) Ó Ó Ö ½ µ Ó Ó Ö ¾ µ, 2) Ä ¾ Á, and 3) the body of Ö ¾ is true in Á. A rule Ö ¾ ÖÓÙÒ Èµ is overridden in Á if for each Ä ¾ À Öµ there exists Ö ½ ¾ ÖÓÙÒ Èµ such that Ö ½ overrides Ö on Ä in Á. Intuitively, the notion of overriding allows us to solve conflicts arising between rules with complementary heads. For instance, suppose that both and are derivable in Á from rules Ö and Ö ¼, respectively. If Ö is more specific than Ö ¼ in the inheritance hierarchy, then Ö ¼ is overruled, meaning that should be preferred to because it is derivable from a more trustable rule. Example 2 Consider the program È of Example 1. Let Á be an interpretation. Rule in the object Ó ¾ overrides rule ÒÓØ in Ó ½ on the literal in Á. Moreover, rule in Ó ¾ overrides rule ÒÓØ in Ó ½ on the literal in Á. Thus, the rule ÒÓØ in Ó ½ is overridden in Á.

6 TECHNICAL REPORT DBAI-TR Definition 2 Let Á be an interpretation for È. Á is a model for È if every rule in ÖÓÙÒ Èµ is satisfied or overridden in Á. Á is a minimal model for È if no (proper) subset of Á is a model for È. Definition 3 Given an interpretation Á for È, the reduction of È w.r.t. Á, denoted by Á ȵ, is the set of rules obtained from ÖÓÙÒ Èµ by 1) removing every rule overridden in Á, 2) removing every rule Ö such that Ó Ý Öµ Á, 3) removing the NAF part from the bodies of the remaining rules. Example 3 Consider the program È of Example 1. Let Á be the interpretation. As shown in Example 2, rule ÒÓØ is overridden in Á. Thus, Á ȵ is the set of rules. Consider now the interpretation Å. It is easy to see that Šȵ. We observe that the reduction of a program is simply a set of ground rules. Given a set Ë of ground rules, we denote by ÔÓ Ëµ the positive disjunctive program (called the positive version of Ë), obtained from Ë by considering each negative literal Ô µ as a positive one with predicate symbol Ô. Definition 4 Let Å be a model for È. We say that Å is a ( ÄÈ -)answer set for È if Å is a minimal model of the positive version ÔÓ Å Èµµ of Šȵ. Example 4 Consider the program È of Example 1: It is easy to see that the interpretation Á of Example 3 is not an answer set for È. Indeed, although Á is a model for ÔÓ Á ȵµ it is not minimal, since the interpretation is a model for ÔÓ Á ȵµ, too. Note that the interpretation Á ¼ is not an answer set for È either, because Á ¼ ȵ, and Á ¼ is not a model for ÔÓ Á ¼ ȵµ, since the rule is not satisfied in Á ¼. On the other hand, the interpretation Å of Example 3 is an answer set for È, since Å is a minimal model for ÔÓ Å Èµµ. Moreover, it can be easily realized that Å is the only answer set for È. 4 Knowledge Representation with ÄÈ In this section, we present a number of examples which illustrate how knowledge can be represented using ÄÈ. To start, we show the ÄÈ encoding of a classical example of nonmonotonic reasoning. Example 5 Consider the following program È with Ç Èµ consisting of three objects Ö, Ô Ò Ù Ò and ØÛ ØÝ, such that Ô Ò Ù Ò is a sub-object of Ö and ØÛ ØÝ is a sub-object of Ô Ò Ù Ò: Ö Ð Ô Ò Ù Ò Ö Ð ØÛ ØÝ Ô Ò Ù Ò Unlike in traditional logic programming, our language supports two types of negation, that is strong negation and negation as failure. Strong negation is useful to express negative pieces of information under the complete information assumption. Hence, a negative fact (by strong negation) is true only if it is explicitely derived from the rules of the program. As a consequence, the head of rules may contain also such negative literals and rules can be conflicting on some literals. According to the inheritance principles, the ordering relationship between objects can help us to assign different levels of reliability to the rules, allowing us to

7 TECHNICAL REPORT DBAI-TR solve possible conflicts. For instance, in our example, the contradicting conclusion tweety both flies and does not fly seems to be entailed from the program (as ØÛ ØÝ is a Ô Ò Ù Ò and Ô Ò Ù Ò are Ö, both Ð and Ð can be derived from the rules of the program). However, this is not the case. Indeed, the lower rule Ð specified in the object Ô Ò Ù Ò is considered as a sort of refinement to the first general rule, and thus the meaning of the program is rather clear: tweety does not fly, as tweety is a penguin. That is, Ð is preferred to the default rule Ð as the hierarchy explicitely states the specificity of the former. Intuitively, there is no doubt that Å Ð is the only reasonable conclusion. The next example, from the field of database authorizations, combines the use of both weak and strong negation. Example 6 Consider the following knowledge base representing a set of security specification about a simple part-of hierarchy of objects. Ó ½ Ö ½ ÙØ ÓÖ Þ Ó µ ÒÓØ ÙØ ÓÖ Þ ÒÒµ Ö ¾ ÙØ ÓÖ Þ ÒÒµ ÙØ ÓÖ Þ ØÓѵ ÒÓØ ÙØ ÓÖ Þ Ð µ Ó ¾ Ó ½ Ö ÙØ ÓÖ Þ Ð µ Ó Ó ½ Ö ÙØ ÓÖ Þ Ó µ Objects Ó ¾ is part-of the object Ó ½ as well as Ó is part-of Ó ½. Access authorizations to objects are specified by rules with head predicate ÙØ ÓÖ Þ and subjects to which authorizations are granted appear as arguments. Strong negation is utilized to encode negative authorizations that represent explicit denials. Negation as failure is used to specify the absence of authorization (either positive or negative). Inheritance implements the automatic propagation of authorizations from an object to all its sub-objects. The overriding mechanism allows us to represent exceptions: for instance, if an object Ó inherits a positive authorization but a denial for the same subject is specified in Ó, then the negative authorization prevails on the positive one. Consider the program È Ó¾ Ó ½ Ö ½ Ö ¾ µ Ó ¾ Ö µ for the object Ó ¾ on the above knowledge base. This program defines the access control for the object Ó ¾. Thanks to the inheritance mechanism, authorizations specified for the object Ó ½, to which Ó ¾ belongs, are propagated also to Ó ¾. It consists of rules Ö ½, Ö ¾ (inherited from Ó ½ ) and Ö. Rule Ö ½ states that Ó is authorized to access object Ó ¾ provided that no authorization for ÒÒ to access Ó ¾ exists. Rule Ö ¾ authorizes either ÒÒ or ØÓÑ to access Ó ¾ provided that no denial for Ð to access Ó ¾ is derived. Finally, rule Ö defines a denial for Ð to access object Ó ¾. Due to the absence of the authorization for ÒÒ, the authorization to Ó of accessing the object Ó ¾ is derived (by rule Ö ½ ). Further, the explicit denial to access the object Ó ¾ for Ð (rule Ö ) allows to derive neither authorization for ÒÒ nor for ØÓÑ (by rule Ö ¾ ). Hence, the only answer set of this program is ÙØ ÓÖ Þ Ó µ ÙØ ÓÖ Þ Ð µ. Consider now the program È Ó Ó ½ Ö ½ Ö ¾ µ Ó Ö µ for the object Ó. Rule Ö defines a denial for Ó to access object Ó. The authorization for Ó (defined by rule Ö ½ ) is no longer derived. Indeed, even if rule Ö ½ allows to derive such an authorization due to the absence of authorizations for ÒÒ, it is overridden by the explicit denial (rule Ö ) defined in the object Ó (i.e., at a more specific level). The body of rule Ö ¾ inherited from Ó ½ is true for this program since no denial for alice can be derived, and it entails a mutual exclusive access to object Ó for ÒÒ and ØÓÑ (note that no other head contains ÙØ ÓÖ Þ ÒÒµ or ÙØ ÓÖ Þ Ó µ). The program È Ó has two answer sets, namely ÙØ ÓÖ Þ ÒÒµ ÙØ ÓÖ Þ Ó µ and ÙØ ÓÖ Þ ØÓѵ ÙØ ÓÖ Þ Ó µ representing two alternative authorization sets utilizable to grant the access to the object Ó.

8 TECHNICAL REPORT DBAI-TR Solving the Frame Problem The frame problem has first been addressed by McCarthy and Hayes [27], and in the meantime a lot of research has been conducted to overcome it (see e.g. [32] for a survey). In short, the frame problem arises in planning, when actions and fluents are specified: An action affects some of the fluents, but all unrelated fluents should remain as they are. In most formulations using classical logic, one must specify for every pair of actions and unrelated fluents that the fluent remains unchanged. Clearly this is an undesirable overhead, since with Ò actions and Ñ fluents, Ò Ñ clauses might have to be specified. Instead, it would be nice to be able to specify for each fluent that it normally remains valid and that only actions which explicitly entail the contrary can change them. Indeed, this goal can be achieved in a very elegant way using ÄÈ : One object contains the rules which specify inertia (the fact that fluents normally do not change). Another object inherits from it and specifies the actions and the effects of actions in this way a very natural, straightforward and effective representation is achieved, which avoids the frame problem. Example 7 As an example we show how the famous Yale Shooting Problem, which is due to Hanks and McDermott [19], can be represented and solved with ÄÈ : The scenario involves an individual (or in a less violent version a turkey), who can be shot with a gun. There are two fluents, Ð Ú and ÐÓ, which intuitively mean that the individual is alive and that the gun is loaded, respectively. There are three actions, ÐÓ, Û Ø and ÓÓØ. Loading has the effect that the gun is loaded afterwards, shooting with the loaded gun has the effect that the individual is no longer alive afterwards (and also that the gun is unloaded, but this not really important), and waiting has no effects. It is also known that initially the individual is alive, and that first the gun is loaded, and after waiting, the gun is shot with. The question is: Which fluents hold after these actions and between them? In our encoding, the Ò ÖØ object contains the defaults for the fluents, the ÓÑ Ò object additionally specifies the effects of actions, while the Ý Ð object encodes the problem instance including the time framework. 3 Ò ÖØ Ð Ú Ì ½µ Ð Ú Ì µ Ò ÜØ Ì Ì ½µ Ð Ú Ì ½µ Ð Ú Ì µ Ò ÜØ Ì Ì ½µ ÐÓ Ì ½µ ÐÓ Ì µ Ò ÜØ Ì Ì ½µ ÐÓ Ì ½µ ÐÓ Ì µ Ò ÜØ Ì Ì ½µ ÓÑ Ò Ò ÖØ ÐÓ Ì ½µ ÐÓ Ì µ Ò ÜØ Ì Ì ½µ ÐÓ Ì ½µ ÓÓØ Ì µ ÐÓ Ì µ Ò ÜØ Ì Ì ½µ Ð Ú Ì ½µ ÓÓØ Ì µ ÐÓ Ì µ Ò ÜØ Ì Ì ½µ Ý Ð ÓÑ Ò ÐÓ ¼µ Û Ø ½µ ÓÓØ ¾µ Ð Ú ¼µ Ò ÜØ ¼ ½µ Ò ÜØ ½ ¾µ Ò ÜØ ¾ µ The only answer set for this program contains, besides the facts of the Ý Ð object, ÐÓ ½µ, ÐÓ ¾µ, Ð Ú ¼µ, Ð Ú ½µ, Ð Ú ¾µ and ÐÓ µ, Ð Ú µ. That is, the individual is alive until the shoot action is taken, and no longer alive afterwards, and the gun is loaded between loading and shooting. We want to point out that this formalism is equally suited for solving problems which involve finding a plan (i.e. a sequence of actions), rather than determining the effects of a given plan as in the Yale Shooting 3 With our prototype the more convenient builtins of dlv can be used instead.

9 TECHNICAL REPORT DBAI-TR Problem: You have to add a rule Ø ÓÒ Ì µ Ø ÓÒ Ì µ Ò ÜØ Ì Ì ½µ for every action, and you have to specify the goal state by a query, e.g. Ð Ú µ ÐÓ µ 4. Below you find a classical example: The blocksworld domain and the Sussman anomaly as a concrete problem. Example 8 In [13], several planning problems, including the blocksworld problems, are encoded using disjunctive datalog. In general, planning problems can be effectively specified using action languages (e.g. [16, 8, 18, 22]). Then, a translation from these languages to another language (in our case ÄÈ ) is applied. We omit the step of describing an action language and the associated translation, and directly show the encoding of an example planning domain in disjunctive datalog. This encoding is rather different from the one presented in [13]. The objects in the blocksworld are one Ø Ð and an arbitrary number of labeled cubic ÐÓ s. Together, they are referred to as ÐÓ Ø ÓÒ. The state of the blocksworld at a particular time can be fully specified by the fluent ÓÒ Ä Ì µ, which specifies that block resides on location Ä at time Ì. So, first we state in the object Û Ò ÖØ that the fluent ÓÒ is inertial. Û Ò ÖØ ÓÒ Ä Ì ½µ ÓÒ Ä Ì µ Ò ÜØ Ì Ì ½µ We continue to define the blocksworld domain in the object Û ÓÑ Ò, which inherits from the inertia object: Û ÓÑ Ò Û Ò ÖØ ÑÓÚ Ä Ì µ ÑÓÚ Ä Ì µ ÐÓ µ ÐÓ Ø ÓÒ Äµ Ø ÓÒØ Ñ Ì µ ÓÒ Ä Ì ½µ ÑÓÚ Ä Ì µ Ò ÜØ Ì Ì ½µ ÓÒ Ä Ì ½µ ÑÓÚ Ä½ Ì µ ÓÒ Ä Ì µ Ò ÜØ Ì Ì ½µ ÑÓÚ Ä Ì µ ÓÒ ½ Ì µ ÑÓÚ ½ Ì µ ÓÒ ¾ ½ Ì µ ÐÓ ½µ ÑÓÚ Ì µ ÑÓÚ Ä Ì µ ÑÓÚ ½ Ľ Ì µ ½ ÑÓÚ Ä Ì µ ÑÓÚ ½ Ľ Ì µ Ä Ä½ Ø ÓÒØ Ñ Ì µ Ì Ñ Ü ÒØ ÒØ Ì µ Ò ÜØ Ì Ì ½µ Ù Ì Ì ½µ ÐÓ Ø ÓÒ Ø Ð µ ÐÓ Ø ÓÒ µ ÐÓ µ There is one action, which is moving a block from one location to another location. A move is started at one point in time, and it is completed before the next time. At any time Ì, the action of moving a block to location Ä may be initiated (ÑÓÚ Ä Ì µ) or not ( ÑÓÚ Ä Ì µ). The following two rules specify the results of the move action: The moved block is at the target location at the next time, and no longer on the source location. What follows are constraints, and their semantics is that in any answer set the conjunction of their literals must not be true. 5 Their respective meanings are: 4 This is a dlv language feature which (for this example) is equivalent to the rules Ð Ú µ ÐÓ µ and ÒÓØ ÒÓØ, meaning that only answer sets containing Ð Ú µ and ÐÓ µ should be considered. 5 We use constraints for clarity, but they can be eliminated by rewriting to Ô ÒÓØ Ô.

10 TECHNICAL REPORT DBAI-TR initial: b c a goal: c b a Figure 1: The Sussman Anomaly A moved block must be clear. The target of a move must be clear if it is a block (the table may hold an arbitrary number of blocks). A block may not be on itself. No two move actions may be performed at the same time (2 constraints). Finally, the time is described by dlv s integer built-in predicates and constants. The first time is always ¼, and the last time Ñ Ü ÒØ is specified when invoking dlv via the command-line option -N=k. ÒØ Ì µ represents all numbers in ¼ Ñ Ü ÒØ, and Ù Ì Ì ½µ defines the successor relation in the same interval. Ø ÓÒØ Ñ defines the times at which an action may be performed, that are all times except the last one. What is left is the concrete problem instance, in our case the so-called Sussman Anomaly (see Figure 1): Ù Ñ Ò Û ÓÑ Ò ÐÓ µ ÐÓ µ ÐÓ µ ÓÒ Ø Ð ¼µ ÓÒ ¼µ ÓÒ Ø Ð ¼µ ÓÒ Ñ Ü Òص ÓÒ Ñ Ü Òص ÓÒ Ø Ð Ñ Ü Òص Since different problem instances may involve different numbers of blocks, the blocks are defined here (note that usually the instance will be separated from the domain definition). We give the initial situation by facts, while the goal situation is specified by a query. This query enforces that only those answer sets are computed, in which the conjunction of the query literals is true. 5 Computational Complexity As for the classical nonmonotonic formalisms [25, 24, 30], two important decision problems, corresponding to two different reasoning tasks, arise in ÄÈ : (Brave Reasoning) Given a ÄÈ program È and a ground literal Ä, decide whether there exists an answer set Å for È such that Ä is true w.r.t. Å. (Cautious Reasoning) Given a ÄÈ program È and a ground literal Ä, decide whether Ä is true in all answer sets for È. We next prove that the complexity of reasoning in ÄÈ is exactly the same as in traditional disjunctive logic programming. That is, inheritance comes for free, as the addition of inheritance does not cause any computational overhead. We consider the propositional case, i.e., we consider ground ÄÈ programs.

11 TECHNICAL REPORT DBAI-TR Lemma 1 Given a ground ÄÈ program È and an interpretation Å for È, deciding whether Å is an answer set for È is in ÓÆÈ. Proof. We check in ÆÈ that Å is not an answer set of È as follows. Guess a subset Á of Å, and verify that: (1) Å is not a model for ÔÓ Å Èµµ, or (2) Á is a model for ÔÓ Å Èµµ and Á Å. The construction of ÔÓ Å Èµµ (see Definition 3) is feasible in polynomial time, and the tasks (1) and (2) are clearly tractable. Thus, deciding whether Å is not an answer set for È is in ÆÈ, and, consequently, deciding whether Å is an answer set for È is in ÓÆÈ. Theorem 1 Brave Reasoning on ÄÈ programs is È ¾ -complete. Proof. Given a ground ÄÈ program È and a ground literal Ä, we verify that Ä is a brave consequence of È as follows. Guess a set Å È of ground literals, check that (1) Å is an answer set for È, and (2) Ä is true w.r.t. Å. Task (2) is clearly polynomial; while (1) is in ÓÆÈ, by virtue of Lemma 1. The problem therefore lies in È. ¾ È ¾ -hardness follows from Theorem 3 and the results in [9, 10]. Theorem 2 Cautious Reasoning on ÄÈ programs is È ¾ -complete. Proof. Given a ground ÄÈ program È and a ground literal Ä, we verify that Ä is not a cautious consequence of È as follows. Guess a set Å È of ground literals, check that (1) Å is an answer set for È, and (2) Ä is not true w.r.t. Å. Task (2) is clearly polynomial; while (1) is in ÓÆÈ, by virtue of Lemma 1. Therefore, the complement of cautious reasoning is in È, and cautious reasoning is in ¾ È. ¾ È ¾ -hardness follows from Theorem 3 and the results in [9, 10]. 6 Related Work 6.1 Answer Set Semantics Answer set semantics, proposed by Gelfond and Lifschitz in [15], is the most widely acknowledged semantics for disjunctive logic programs with strong negation. For this reason, while defining the semantics of our language, we took care of ensuring full agreement with answer set semantics (on inheritance-free programs). Theorem 3 Let È be a ÄÈ program consisting of a single object Ó Ó Óµ Óµ. Then, Å is an answer set of È if and only if it is a consistent answer set of Óµ (according with [15]). Proof. First we show that Šȵ is equal to Óµ Å (as defined in [15]): Deletion rule 1) of Definition 3 never applies, since for every literal L and any two rules Ö ½, Ö ¾ ¾ ÖÓÙÒ Èµ, Ó Ó Ö ½ µ Ó Ó Ö ¾ µ holds, thus violating condition 1) in Definition 1 and therefore no rule can be overridden. It is evident that the deletion rules 2) and 3) of Definition 3 are equal to deletion rules (i) and (ii) of the definiton of Ë in Ü7 in [15], respectively. The first ones delete rules, where some NAF literal is contained in Å, while the second ones delete all NAF literals of the remaining rules. Next, we show that that the criteria for a consistent set Å of literals being an answer set of a positive (i.e. Æ free) program (as in [15]) is equal to the notion of satisfaction: Since the set is consistent, condition (ii) in Ü7 of [15] does not apply. Condition (i) says: Ä ½ ÄÑ ¾ Å (the body is true) implies that the head is true. This is logically equivalent to The body is not true or the head is true, which is the definition of rule satisfaction.

12 TECHNICAL REPORT DBAI-TR In total we have that the minimal models of ÔÓ Å Èµµ are equal to the consistent answer sets of Óµ Å, since answer sets are minimal by definition. Additionally, we require in Definition 4 that Å is also a model of È, while in [15] there is no such requirement. However, all minimal models of ÔÓ Å Èµµ are also models of È: All rules in Šȵ are satisfied, and only the deletion rules 2) and 3) of Definition 3 have been applied (as shown above). So for any rule Ö, which has been deleted by 2), some literal in Ó Ý Öµ is in Å, so Ö s body is not true, and thus Ö is satisfied in Å. If a rule Ö, which has been transformed by 3), is satisfied without Ó Ý Öµ, then either À Öµ is true or Ó Ý Öµ is not true, so adding any Æ part to it does not change its satisfaction status. 6.2 Disjunctive Ordered Logic Disjunctive Ordered Logic ( ÇÄ) is an extension of Disjunctive Logic Programming with strong negation and inheritance (without default negation) proposed in [7]. The ÄÈ language incorporates some ideas taken from ÇÄ. However, the two languages are very different in several respects. Most importantly, unlike with ÄÈ, even if a program belongs to the common fragment of ÇÄ and of the language of [15] (i.e., it contains neither inheritance nor default negation), ÇÄ semantics is completely different from answer set semantics, because of a different way of handling contradictions. 6 In short, we observe the following differences between ÇÄ and ÄÈ : ÇÄ does not include default negation ÒÓØ, while ÄÈ includes it. ÇÄ and ÄÈ have different semantics on the common fragment. Consider a program È consisting of a single object Ó Ó Óµ Óµ, where Óµ Ô Ô. Then, according with ÇÄ, the semantics of È is given by two models, namely, Ô and Ô. On the contrary, È has no answer set according with ÄÈ semantics. ÄÈ generalizes (consistent) answer set semantics to disjunctive logic programs with inheritance; while ÇÄ does not generalize it. 6.3 Prioritized Logic Programs ÄÈ can be also seen as an attempt to handle priorities in disjunctive logic programs (the lower the object in the inheritance hierarchy, the higher the priority of its rules). There are several works on preference handling in logic programming [6, 17, 28, 20, 29, 31]. However, we are aware of only one previous work on priorities in disjunctive programs, namely, the paper by Sakama and Inoue [31]. This interesting work can be seen as an extension of answer set semantics to deal with priorities. Comparing the two works, under the viewpoint of priority handling, we observe the following: On priority free programs, the two languages yield essentially the same semantics, as they generalize answer set semantics and consistent answer set semantics, respectively. In [31], priorities are defined among literals, while priorities concern program s rules in ÄÈ. The different kind of priorities (on rules vs. literals) and the way how they are dealt with in the two approaches, imply different complexity in the respective reasonings. Indeed, from the simulation of abductive reasoning in the language of [31], and the complexity results on abduction derived in [11], it follows that brave reasoning is È -complete for the language of [31]. On the contrary, brave reasoning is only È -complete in ¾ ÄÈ 7. 6 Actually, this was a main motivation for the authors to look for a different language. 7 We refer to the complexity in the propositional case here.

13 TECHNICAL REPORT DBAI-TR A comparative analysis of the various approaches to the treatment of preferences in ( -free) logic programming has been carried out in [6]. 6.4 Inheritance Networks From a different perspective, the objects of a ÄÈ program can also be seen as the nodes of an inheritance network. We next show that ÄÈ satisfies the basic semantic principles which are required for inheritance networks in [33]. [33] constitutes a fundamental attempt to present a formal mathematical theory of multiple inheritance with exceptions. The starting point of this work is the consideration that an intuitively acceptable semantics for inheritance must satisfy two basic requirements: 1. Being able to reason with redundant statements, and 2. not making unjustified choices in ambiguous situations. Touretzky illustrates this intuition by means of two basic examples. The former requirement is presented by means of the Royal Elephant example, in which we have the following knowledge: Elephants are gray., Royal elephants are elephants., Royal elephants are not gray., Clyde is a royal elephant., Clyde is an elephant. The last statement is clearly redundant; however, since it is consistent with the others there is no reason to rule it out. Touretzky shows that an intuitive semantics should be able to recognize that Clyde is not gray, while many systems fail in this task. Touretzky s second principle is shown by the Nixon diamond example, in which the following is known: Republicans are not pacifists., Quakers are pacifists., Nixon is both a Republican and a quaker. According to our approach, he claims that a good semantics should draw no conclusion about the question whether Nixon is a Ô Ø. The proposed solution for the problems above is based on a topological relation, called inferential distance ordering, stating that an individual is nearer to than to iff has an inference path Ø ÖÓÙ to. If is nearer to than to, then as far as is concerned, information coming from must be preferred w.r.t. information coming from. Therefore, since Clyde is nearer to royal elephant than to elephant, he states that Clyde is not gray. On the contrary no conclusion is taken on Nixon, as there is not any relationship between ÕÙ Ö and Ö ÔÙ Ð Ò. The semantics of ÄÈ fully agrees with the intuition underlying the inferential distance ordering. Example 9 Let us represent the Royal Elephant example in our framework: Ð Ô ÒØ ÖÓÝ Ð Ð Ô ÒØ Ð Ô ÒØ ÐÝ Ð Ô ÒØ ÖÓÝ Ð Ð Ô ÒØ Ö Ý Ö Ý The only answer set of the above ÄÈ program is Ö Ý. The Nixon Diamond example can be expressed in our language as follows: Ö ÔÙ Ð Ò ÕÙ Ö Ò ÜÓÒ Ö ÔÙ Ð Ò ÕÙ Ö Ô Ø Ô Ø This ÄÈ program has no answer set, and therefore no conclusion is drawn.

14 TECHNICAL REPORT DBAI-TR Updates in Logic Programs The definition of the semantics of updates in logic programs is another topic where ÄÈ could potentially be applied. Roughly, a simple formulation of the problem is: given a ( -free) logic program È and a sequence Í ½ Í Ò of successive updates (insertion/deletion of ground atoms), determine what is or is not true in the end. Expressing the insertion (deletion) of an atom by the rule ( ), we can represent this problem by a ÄÈ knowledge base Ø ¼ È Ø ½ Í ½ Ø Ò Í Ò (Ø intuitively represents the instant of time when the update Í has been executed), where Ø Ò Ø ¼. The answer sets of the program for Ø can be taken as the semantics of the execution of Í ½ Í on È. For instance, given the logic program È ÒÓØ and the updates Í ½, Í ¾, Í, we build the ÄÈ program Ø ¼ ÒÓØ Ø ½ Ø ¼ Ø ¾ Ø ½ Ø Ø ¾. The answer set of the program for Ø ¾ gives the semantics of the execution of Í ½ and Í ¾ on È ; while the answer set of the program for Ø expresses the semantics of the execution of Í ½, Í ¾ and Í on È in the given order. The semantics of updates obtained in this way is very similar to the approach adopted for the ULL language in [21]. Further investigations are needed on this topic to see whether ÄÈ can represent update problems in more general settings like those treated in [26] and in [4]. 7 Implementation Issues 7.1 From ÄÈ to Plain DLP In this section we show how a ÄÈ program can be translated into an equivalent plain disjunctive logic program (with strong negation, but without inheritance). The translation allows us to exploit existing disjunctive logic programming systems for the implementation of ÄÈ. Notation. 1. We denote a literal by µ, where is the tuple of literals arguments, and represents an adorned predicate, that is either a predicate symbol Ô or a strongly negated predicated symbol Ô. Two adorned predicates are complementary if one is the negation of the other (e.g., Õ and Õ are complementary). denotes the complementary adorned predicate of the adorned predicate. 2. An adorned predicate is conflicting if: (a) µ occurs in the head of some rule in È and, (b) µ occurs in the head of some rule in È. 3. Given an object Ó in È, and a head literal µ of a rule in Óµ, we say that is defeasible in o if a literal µ occurs in the head of a rule in Ó ¼ µ where Ó ¼ Ó. A rule Ö in Óµ is defeasible in o if all its head literals are defeasible in Ó. The rewriting algorithm translating ÄÈ programs in plain disjunctive logic programs with constraints 8 is shown in Figure 2. An informal description of how the algorithm proceeds is the following: 8 We use constraints for clarity, but they can be eliminated by rewriting to Ô ÒÓØ Ô.

15 TECHNICAL REPORT DBAI-TR ALGORITHM INPUT: a ÄÈ -program È OUTPUT: a plain disjunctive logic program with constraint ÄÈ Èµ 1: ÄÈ Èµ ÔÖ ¼ Ó Ó ½ µ Ó Ó ½ 2: for each object Ó ¾ Ç Èµ do 3: for each defeasible adorned predicate in Ó do 4: Add the following rule to ÄÈ Èµ: 5: ÓÚÖ ¼ Ó ½ Ò µ ¼ ½ Ò µ ÔÖ ¼ Óµ 6: where Ò is the arity of and ½ Ò are distinct variables. 7: end for 8: for each rule Ö in to Óµ, say ½ ½ µ Ò Ò µ Ç, do 9: if Ö is defeasible then 10: Add the following two rules to ÄÈ Èµ: 11: ¼ ½ Ó ½ µ ¼ Ò Ó Ò µ Ç ÒÓØ ÓÚÖ ¼ Ö Ó ½ Ò µ 12: ÓÚÖ ¼ Ö Ó ½ Ò µ ÓÚÖ ¼ ½ Ó ½ µ ÓÚÖ ¼ Ò Ó Ò µ 13: else 14: Add the following rule to ÄÈ Èµ: 15: ¼ ½ Ó ½ µ ¼ Ò Ó Ò µ Ç 16: end if 17: end for 18: end for 19: for each adorned predicate appearing in È do 20: Add the following rule to ÄÈ Èµ: 21: ½ Ò µ ¼ ¼ ½ Ò µ 22: where Ò is the arity of and ¼ Ò are distinct variables. 23: end for 24: for each conflicting adorned predicate appearing in È do 25: Add the following constraint to ÄÈ Èµ: 26: ½ Ò µ ½ Ò µ 27: where Ò is the arity of and ½ Ò are distinct variables. 28: end for Figure 2: A Rewriting Algorithm

16 TECHNICAL REPORT DBAI-TR ÄÈ Èµ is initialized to a set of facts with head predicate ÔÖ ¼ representing the partial ordering among objects (statement 1). Then, for each object Ó in Ç Èµ: For each defeasible literal µ appearing in Ó, rules defining when the literal is overridden are added (statements 3 5). For each rule Ö belonging to Ó: 1. If Ö is defeasible, then the rule is rewritten, such that the head literals include information about the object in which they have been derived, and the body includes a literal which makes the rule not applicable if it is overridden. In addition, a rule is added which encodes when the rule is overridden (statement 8). 2. Otherwise (i.e., Ö is not defeasible) just the rule head is rewritten as described above, since these rules cannot be overridden (statement 10). For all adorned predicates in the program, we add a rule which states that an atom with this predicate holds, no matter in which object it has been derived (statements 14 16). The information in which object an atom has been derived is only needed for determination of overriding. We now give two examples to show how the translation works: Example 10 The datalog version ÄÈ Èµ of the program È of Example 1 is: ½µ ÖÙÐ ÜÔÐ Ø Ò Ô ÖØ Ð ÓÖ Ö ÑÓÒ Ó Ø ÔÖ ¼ Ó ¾ Ó ½ µ ¾µ ÖÙÐ ÓÖ Ð ÓÖÒ ÔÖ Ø Ò Ó ½ ÓÚÖ ¼ Ó ½ µ ¼ µ ÔÖ ¼ Ó ½ µ ÓÚÖ ¼ Ó ½ µ ¼ µ ÔÖ ¼ Ó ½ µ µ Ö ÛÖ Ø Ò Ó ÖÙÐ Ò Ó ½ ¼ Ó ½ µ ¼ Ó ½ µ ÒÓØ ÒÓØ ÓÚÖ ¼ Ö ½ Ó ½ µ ÓÚÖ ¼ Ö ½ Ó ½ µ ÓÚÖ ¼ Ó ½ µ ÓÚÖ ¼ Ó ½ µ µ Ö ÛÖ Ø Ò Ó ÖÙÐ Ò Ó ¾ ¼ Ó ¾ µ ¼ Ó ¾ µ ¼ Ó ¾ µ ¼ Ó ¾ µ µ ÔÖÓ Ø ÓÒ ÖÙÐ ¼ µ ¼ µ ¼ µ ¼ µ ¼ µ ¼ µ Given a model Å for ÄÈ Èµ, Å µ is the set of literals obtained from Å by eliminating all the literals with a primed predicate symbol, i.e. a predicate symbol in the set ÔÖ ¼ ÓÚÖ ¼ ¼ Ò ÓÖÒ Ð Ø Ö Ð µ ÔÔ Ö Ò Ò È. Å µ is the set of literals without all atoms which were introduced by the translation algorithm. The DLP version of a ÄÈ -program È can be used in place of È in order to evaluate answer sets of È. The result supporting the above statement is the following:

17 TECHNICAL REPORT DBAI-TR Theorem 4 For each answer set Å for È there exists a stable model Å ¼ for ÄÈ Èµ such that Å ¼ µ Å. Moreover, for each stable model Å ¼ for ÄÈ Èµ there exists an answer set Å for È such that Å ¼ µ Å. Proof. First we show that given an answer set Å for È there exists a stable model Å ¼ for ÄÈ Èµ such that Å ¼ µ Å. According to Definition 4, Å is a minimal model for ÔÓ Å Èµµ. We proceed by constructing the model Å ¼. Let à ½ ÔÖ ¼ Ó Ó ½ µ Ó Ó ½. Let à ¾ be the set of ground literals ÓÚÖ ¼ Ö Ó µ such that there exists a rule Ö ¾ ÖÓÙÒ Èµ with Ó Ó Öµ Ó such that Ö is overridden in Å and is the tuple of arguments appearing in the head of Ö. Let à be the set of ground literals ÓÚÖ ¼ Ä Óµ such that there exist two rules Ö Ö ¼ ¾ ÖÓÙÒ Èµ such that Ä ¾ À Öµ and Ö ¼ overrides Ö in Ä. Let denote by à the collection of sets of ground literals such that each element à ¾ à satisfies the following properties: 1. for each literal µ ¾ Å there is a literal ¼ Ó µ in Ã, for some object identifier Ó, 2. for each Ö ¾ Šȵ such that the body of Ö is true in Å, for at least one literal µ of the head of Ö a correspondig literal ¼ Ó Ó Öµ µ occurs in Ã. Let Å Ã Ã ½ à ¾ à à Å. It is easy to show that Å Ã ÄÈ Èµµ is indipendent on wich à ¾ à is choosen. Indeed, no literals from à appear in the NAF part of the rules in ÖÓÙÒ ÄÈ Èµµ. Let see now which rules the program Å Ã ÄÈ Èµµ contain (for any set à ¾ Ã). Both the rules with head predicate ÔÖ ¼ and ÓÚÖ ¼ and the rules of the form µ ¼ µ (added by the statement 15 of the algorithm) and the costraints appear unchanged in Å Ã ÄÈ Èµµ. Indeed, these rules and constraints do not contain Æ part (recall that the GL tranformation can modify only rules where a NAF part occur). The other rules of Å Ã ÄÈ Èµµ are those originating from rules of ÖÓÙÒ ÄÈ Èµµ obtained by rewriting rules of ÖÓÙÒ Èµ (see statements 8 and 10 of the algorithm). Consider a rule Ö of ÖÓÙÒ Èµ. If Ö is overridden in Å then the corresponding rule in ÖÓÙÒ ÄÈ Èµµ contains a Æ part not satisfied in Å ¼, by construction of à ¾ and Ã. Hence, such a rule appears neither in Šȵ nor in Å Ã ÄÈ Èµµ. Suppose now Ö is not overridden in Å. In case Ó Ý Öµ Å, the corresponding rule of ÄÈ Èµ is eliminated in the GL transformation. Indeed, Å Å Ã, for each à ¾ Ã. Hence, Ö appears neither in Šȵ nor in Å Ã ÄÈ Èµµ. On the other hand, if Ö is not overridden in Å and Ó Ý Öµ Å, it appears in Å Ã ÄÈ Èµµ with the same body of the corresponding rule in Šȵ and the head modified by renaming predicates (from to ¼ ) and by adding the object Ó as first argument in each head literal. Thus, informally, every rule in Šȵ has a corresponding rule in Å Ã ÄÈ Èµµ with the same body and a rewritten head. Now we prove that, for any à ¾ Ã, Å Ã is a model for ÔÓ Å Ã ÄÈ Èµµµ. Indeed, rules with head predicate ÔÖ ¼ are clearly satisfied. Further, rules with head predicate ÓÚÖ ¼ are satisfied by construction of set à ¾, à and Ã. Moreover, rules of the form µ ¼ µ are satisfied since Å Å Ã and by construction of Ã. Consider now the remaining rules (those corresponding to rules of Šȵ). Let Ö be one of these rules. As shown earlier, it corresponds to a rule Ö ¼ of Šȵ such that Ó Ý Öµ Ó Ý Ö ¼ µ. Clearly the body of Ö is true in Å Ã if and only if the body of Ö ¼ is true in Å. Thus, the only case we have to consider is that of the body of Ö ¼ true in Å. In this case, it easy to see that also the head of Ö is satisfied in Å Ã, by construction of the set à (see point 2 above characterizing the collection Ã). Thus, Å Ã is a model for ÔÓ Å Ã ÄÈ Èµµµ. Moreover we prove that each model for ÔÓ Å Ã ÄÈ Èµµµ 1. contains Å, and

18 TECHNICAL REPORT DBAI-TR belongs to à To prove point 1, suppose by contradiction Å is a model for ÔÓ Å Ã ÄÈ Èµµµ such that Å Å Å. Since Å is a model for ÔÓ Å Ã ÄÈ Èµµµ also rules of the form µ ¼ µ must be satisfied in Å. Thus, for each literal µ of Å not belonging to Å, no corresponding literal ¼ µ can occur in Å. Since, as shown earlier, rules of Å Ã ÄÈ Èµµ correspond to rule of Šȵ, it is easy to see that this implies that Å µ is also a model for Šȵ. But, since Å µ Å, a contradiction arises. Now we have to prove the statement 2 above. By contradiction suppose Å ¾ Ã. Thus, Å does not satisfy one of two properties characterizing the family Ã. First suppose the property 1 is not satisfied by Å, that is, there is a literal µ in Å such that no corresponding literal ¼ Ó µ occur in Å, for some object identifier Ó. Let Å ¼ the set obtained by Å by eliminating all such literals µ. It is easy to see that Å ¼ is still a model for ÔÓ Å Ã ÄÈ Èµµµ. Indeed, rules of the form µ ¼ µ are satisfied since literals µ dropped from Å do not have corresponding ¼ literals by hypothesis. Further, no other rule in ÔÓ Å Ã ÄÈ Èµµµ contains literal from Å in the head. Thus, similarly to the previuos case, due to the correspondence between rules of Šȵ and rules of Å Ã ÄÈ Èµµ, Å ¼ µ is a model for Šȵ. But this is a contradiction, since Å ¼ µ Å. Suppose now the property 2 is not satisfied by Å, that is, there is a rule Ö ¾ Šȵ such that the body of Ö is true in Å and no ¼ literals corresponding to literals of the head occur in Å. Since, as we have previously proven, Å Å, the corresponding rule of Å Ã ÄÈ Èµµ is not satisfied. This implies that Å is not a model for ÔÓ Å Ã ÄÈ Èµµµ (contradiction). As a consequence, it is easy to realize that each model for ÔÓ Å Ã ÄÈ Èµµµ must contain both sets à ½, à ¾ and Ã. Thus, the model Å ¼ Å Ã ¼ for à ¼ ¾ à such that there not exits a set à ¾ à such that à à ¼ is a minimal model for ÔÓ Å Ã ÄÈ Èµµ, that is, a stable model for ÄÈ Èµ. Hence, the proof is concluded, since Å ¼ µ Å. Now, we prove that given a stable model Å ¼ for ÄÈ Èµ Å ¼ µ is an answer set for È. Let Ö ¼ be a rule of ÔÓ Å ¼ ÄÈ Èµµ containing literals ¼ µ such that is an (adorned) predicate appearing in È. It easy to see that Ö ¼ has a corresponding rule Ö in ÔÓ Å Èµµ such that both Ó Ý Öµ Ó Ý Ö ¼ µ and the head of Ö ¼ can be obtained by replacing each literal ¼ ¼ ½ Ò µ by the literal ½ Ò µ. Indeed, from the precence of rules added by statement 15 of the algorithm, ¼ ¼ ½ Ò µ ¾ Å ¼ if and only if ½ Ò µ ¾ Å. Further, a literal ÓÚÖ ¼ Ö Ó µ belongs to Å ¼ if and only if the rule Ö of È is overridden in Å. In a similar way it can be shown that each rule Ö of ÔÓ Å Èµµ corresponds to a rule Ö ¼ of ÔÓ Å ¼ ÄÈ Èµµ (i.e., bodies of rules coincide and the head of Ö can be obtained by the head of Ö ¼ by eliminating the first argument from each literal appearing in it and by renaming all predicates from ¼ in ). From this correspondence between ÔÓ Å Èµµ and ÔÓ Å ¼ ÄÈ Èµµ, it clearly follows that Å is a model for ÔÓ Å Èµµ and it is minimal (otherwise, Å ¼ would not be minimal for ÔÓ Å ¼ ÄÈ Èµµ). Thus, Å is an answer set for È. Example 11 Consider the program È of Example 1. It is easy to see that ÄÈ Èµ (see Example 10) admit one answer set Å ÔÖ ¼ Ó ¾ Ó ½ µ ¼ Ó ½ µ ¼ Ó ¾ µ ¼ Ó ¾ µ ÓÚÖ ¼ Ó ½ µ. Thus, Å µ. On the other hand, Å µ is the only answer set for È, as shown in Example Prototype Architecture We have used the dlv system [12] to implement a prototype system for ÄÈ. A schematic visualisation of its architecture is shown in Figure 3.

19 TECHNICAL REPORT DBAI-TR Input enhanced dlv parser Rewriter dlv core Filtering Output Figure 3: Flow diagram of the prototype. First of all, we have extended the dlv parser to incorporate the ÄÈ syntax. In this way, all the advanced features of dlv (e.g. bounded integer arithmetics, comparison builtins, etc.) are also available with ÄÈ. The Rewriter module implements the translation depicted in Figure 2. Once the rewritten version ȵ of È is generated, its answer sets are then computed using the dlv core. Before the output is shown to the user, is applied to each answer set in order to strip the internal predicates from the output. On the webpage [14] the prototype is described in detail, and binary versions are available for different platforms. Acknowledgements The idea of representing inertia in planning problems in a higher object is due to Axel Polleres. This work was partially supported by FWF (Austrian Science Funds) under the projects P11580-MAT and Z29-INF. References [1] Alferes, J., Pereira, L.M., On Logic Program Semantics with Two Kinds of Negation Proc. of JICSLP 1992, pp [2] Alferes, J., Pereira, L.M., Przymusinski, T.C., Strong and Explicit Negation in Non-Monotonic Reasoning and Logic Programming, Proc. of JELIA 1996, pp [3] Alferes, J., Pereira, L.M., Przymusinski, T.C., Classical Negation in Nonmonotonic Reasoning and Logic Programming, Journal of Automated Reasoning 20(1), 1998, pp [4] Alferes, J., Leite, J.A., Pereira, L.M., Przymusinska, H., Przymusinski, T.C., Dynamic Logic Programming, Proc. KR 98, Morgan Kaufmann, [5] Baral, C., Gelfond, M. Logic Programming and Knowledge Representation Journal of Logic Programming, Vol. 19/20, May/July 1994, pp [6] Brewka, G., Eiter, T., Preferred Answer Sets for Extended Logic Programs, Proc. KR 98, Morgan Kaufmann, [7] Buccafurri, F., Leone, N., Rullo, P., Disjunctive Ordered Logic: Semantics and Expressiveness, Proc. KR 98, Morgan Kaufmann, [8] P. M. Dung. Representing Actions in Logic Programming and its Applications in Database Updates. In Proc. 10 Ø ICLP, pp , 1993.

Disjunctive Logic Programs with Inheritance

Disjunctive Logic Programs with Inheritance Under consideration for publication in Theory and Practice of Logic Programming 1 Disjunctive Logic Programs with Inheritance FRANCESCO BUCCAFURRI DIMET Università di Reggio Calabria 89100, Reggio Calabria,

More information

Simplifying Logic Programs under Uniform and Strong Equivalence

Simplifying Logic Programs under Uniform and Strong Equivalence In: Proc. 7th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR-7), I. Niemelä and V. Lifschitz, (eds), LNCS, c 2004 Springer. Simplifying Logic Programs under Uniform and

More information

A Comparison of Structural CSP Decomposition Methods

A Comparison of Structural CSP Decomposition Methods A Comparison of Structural CSP Decomposition Methods Georg Gottlob Institut für Informationssysteme, Technische Universität Wien, A-1040 Vienna, Austria. E-mail: gottlob@dbai.tuwien.ac.at Nicola Leone

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

A Backjumping Technique for Disjunctive Logic Programming

A Backjumping Technique for Disjunctive Logic Programming A Backjumping Technique for Disjunctive Logic Programming Wolfgang Faber, Nicola Leone, and Francesco Ricca Department of Mathematics University of Calabria 87030 Rende (CS), Italy faber,leone,ricca @mat.unical.it

More information

A Model-Theoretic Counterpart of Loop Formulas

A Model-Theoretic Counterpart of Loop Formulas A Model-Theoretic Counterpart of Loop Formulas Joohyung Lee Department of Computer Sciences The University of Texas at Austin Austin, TX 78712, USA appsmurf@cs.utexas.edu Abstract In an important recent

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

Structure and Complexity in Planning with Unary Operators

Structure and Complexity in Planning with Unary Operators Structure and Complexity in Planning with Unary Operators Carmel Domshlak and Ronen I Brafman ½ Abstract In this paper we study the complexity of STRIPS planning when operators have a single effect In

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Repairing Preference-Based Argumentation Frameworks

Repairing Preference-Based Argumentation Frameworks Repairing Preference-Based Argumentation Frameworks Leila Amgoud IRIT CNRS 118, route de Narbonne 31062, Toulouse Cedex 09 amgoud@irit.fr Srdjan Vesic IRIT CNRS 118, route de Narbonne 31062, Toulouse Cedex

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

STABILITY AND PARADOX IN ALGORITHMIC LOGIC

STABILITY AND PARADOX IN ALGORITHMIC LOGIC STABILITY AND PARADOX IN ALGORITHMIC LOGIC WAYNE AITKEN, JEFFREY A. BARRETT Abstract. Algorithmic logic is the logic of basic statements concerning algorithms and the algorithmic rules of deduction between

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

An Experimental CLP Platform for Integrity Constraints and Abduction

An Experimental CLP Platform for Integrity Constraints and Abduction An Experimental CLP Platform for Integrity Constraints and Abduction Slim Abdennadher ½ and Henning Christiansen ¾ ½ ¾ Computer Science Department, University of Munich Oettingenstr. 67, 80538 München,

More information

I N F S Y S R E S E A R C H R E P O R T. Error-Tolerant Agents INSTITUT FÜR INFORMATIONSSYSTEME ABTEILUNG WISSENSBASIERTE SYSTEME

I N F S Y S R E S E A R C H R E P O R T. Error-Tolerant Agents INSTITUT FÜR INFORMATIONSSYSTEME ABTEILUNG WISSENSBASIERTE SYSTEME I N F S Y S R E S E A R C H R E P O R T INSTITUT FÜR INFORMATIONSSYSTEME ABTEILUNG WISSENSBASIERTE SYSTEME Error-Tolerant Agents Thomas Eiter Viviana Mascardi V.S. Subrahmanian INFSYS RESEARCH REPORT 1843-00-07

More information

On the Declarative Semantics of Inheritance Networks

On the Declarative Semantics of Inheritance Networks On the Declarative Semantics of Inheritance Networks T. Krishnaprasad, Michael Kifer, David S. Department of Computer Science SUNY at Stony Brook Stony Brook, NY 11794. Warren Abstract Usually, semantics

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

Extending Conceptual Logic Programs with Arbitrary Rules

Extending Conceptual Logic Programs with Arbitrary Rules Extending Conceptual Logic Programs with Arbitrary Rules Stijn Heymans, Davy Van Nieuwenborgh, and Dirk Vermeir Dept. of Computer Science Vrije Universiteit Brussel, VUB Pleinlaan 2, B1050 Brussels, Belgium

More information

Qualitative Decision Making and Answer Set Programming Extended Abstract

Qualitative Decision Making and Answer Set Programming Extended Abstract Qualitative Decision Making and Answer Set Programming Extended Abstract Gerhard Brewka Universität Leipzig, Institut für Informatik Augustusplatz 10-11, 04109 Leipzig, Germany brewka@informatik.uni-leipzig.de

More information

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM, Montpelier, France. Ö Ð ÖÑÑ Ö Cork

More information

Logic Programming and Reasoning about Actions

Logic Programming and Reasoning about Actions Chapter 4 Logic Programming and Reasoning about Actions [Chitta Baral & Michael Gelfond] In this chapter we discuss how recent advances in logic programming can be used to represent and reason about actions

More information

Declarative Semantics for Revision Programming and Connections to Active Integrity Constraints

Declarative Semantics for Revision Programming and Connections to Active Integrity Constraints Declarative Semantics for Revision Programming and Connections to Active Integrity Constraints Luciano Caroprese 1 and Mirosław Truszczyński 2 1 Università della Calabria, 87030 Rende, Italy, caroprese@deis.unical.it

More information

Unified Configuration Knowledge Representation Using Weight Constraint Rules

Unified Configuration Knowledge Representation Using Weight Constraint Rules Unified Configuration Knowledge Representation Using Weight Constraint Rules Timo Soininen ½ and Ilkka Niemelä ¾ and Juha Tiihonen ½ and Reijo Sulonen ½ Abstract. In this paper we present an approach to

More information

Semantic Forcing in Disjunctive Logic Programs

Semantic Forcing in Disjunctive Logic Programs Semantic Forcing in Disjunctive Logic Programs Marina De Vos and Dirk Vermeir Dept of Computer Science Free University of Brussels, VUB Pleinlaan 2, Brussels 1050, Belgium Abstract We propose a semantics

More information

Semantics for Dynamic Logic Programming: A Principle-Based Approach

Semantics for Dynamic Logic Programming: A Principle-Based Approach Semantics for Dynamic Logic Programming: A Principle-Based Approach José J. Alferes 1, Federico Banti 1, Antonio Brogi 2, and João A. Leite 1 1 CENTRIA, Universidade Nova de Lisboa, Portugal, {jja,banti,jleite}@di.fct.unl.pt

More information

Nonmonotonic Integrity Constraints

Nonmonotonic Integrity Constraints Nonmonotonic Integrity Constraints Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava, Slovakia, sefranek@fmph.uniba.sk Abstract.

More information

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic 3.4 Deduction and Evaluation: Tools 3.4.1 Conditional-Equational Logic The general definition of a formal specification from above was based on the existence of a precisely defined semantics for the syntax

More information

Intelligence Analysis Using Quantitative Preferences

Intelligence Analysis Using Quantitative Preferences Intelligence Analysis Using Quantitative Preferences Davy Van Nieuwenborgh, Stijn Heymans, and Dirk Vermeir Dept. of Computer Science Vrije Universiteit Brussel, VUB Pleinlaan 2, B1050 Brussels, Belgium

More information

Preferred well-founded semantics for logic programming by alternating fixpoints: Preliminary Report

Preferred well-founded semantics for logic programming by alternating fixpoints: Preliminary Report Preferred well-founded semantics for logic programming by alternating fixpoints: Preliminary Report Torsten Schaub and Kewen Wang Institut für Informatik, Universität Potsdam Postfach 900327, D 14439 Potsdam,

More information

Forcing in disjunctive logic programs

Forcing in disjunctive logic programs Forcing in disjunctive logic programs Marina De Vos Free University of Brussels, VUB marinadv@tinf1vubacbe Dirk Vermeir Free University of Brussels, VUB dvermeir@vubacbe Abstract We propose a semantics

More information

Propagating XML Constraints to Relations

Propagating XML Constraints to Relations Propagating XML Constraints to Relations Susan Davidson U. of Pennsylvania Wenfei Fan Ý Bell Labs Carmem Hara U. Federal do Parana, Brazil Jing Qin Temple U. Abstract We present a technique for refining

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

On the Performance of Greedy Algorithms in Packet Buffering

On the Performance of Greedy Algorithms in Packet Buffering On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,

More information

Answer Sets and the Language of Answer Set Programming. Vladimir Lifschitz

Answer Sets and the Language of Answer Set Programming. Vladimir Lifschitz Answer Sets and the Language of Answer Set Programming Vladimir Lifschitz Answer set programming is a declarative programming paradigm based on the answer set semantics of logic programs. This introductory

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

Towards a Logical Reconstruction of Relational Database Theory

Towards a Logical Reconstruction of Relational Database Theory Towards a Logical Reconstruction of Relational Database Theory On Conceptual Modelling, Lecture Notes in Computer Science. 1984 Raymond Reiter Summary by C. Rey November 27, 2008-1 / 63 Foreword DB: 2

More information

Uncertain Data Models

Uncertain Data Models Uncertain Data Models Christoph Koch EPFL Dan Olteanu University of Oxford SYNOMYMS data models for incomplete information, probabilistic data models, representation systems DEFINITION An uncertain data

More information

Propositional Logic. Part I

Propositional Logic. Part I Part I Propositional Logic 1 Classical Logic and the Material Conditional 1.1 Introduction 1.1.1 The first purpose of this chapter is to review classical propositional logic, including semantic tableaux.

More information

Consistency and Set Intersection

Consistency and Set Intersection Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study

More information

Principles of AI Planning. Principles of AI Planning. 7.1 How to obtain a heuristic. 7.2 Relaxed planning tasks. 7.1 How to obtain a heuristic

Principles of AI Planning. Principles of AI Planning. 7.1 How to obtain a heuristic. 7.2 Relaxed planning tasks. 7.1 How to obtain a heuristic Principles of AI Planning June 8th, 2010 7. Planning as search: relaxed planning tasks Principles of AI Planning 7. Planning as search: relaxed planning tasks Malte Helmert and Bernhard Nebel 7.1 How to

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

Qualitative constraint enforcement in advanced policy specification

Qualitative constraint enforcement in advanced policy specification Qualitative constraint enforcement in advanced policy specification Alessandra Mileo 1 and Torsten Schaub 2 1 Dipartimento di Informatica e Comunicazione, Universitá degli Studi di Milano-Bicocca Lab.

More information

More Notes on 'A Clash of Intuitions 9

More Notes on 'A Clash of Intuitions 9 More Notes on 'A Clash of Intuitions 9 R. Al-Asady A. Narayanan ras@uk.ac.exeter.dcs ajit@uk.ac.exeter.dcs Computer Science Department Exeter University Exeter EX4 4PT U.K. Abstract A path-based inheritance

More information

nfn2dlp: A Normal Form Nested Programs Compiler

nfn2dlp: A Normal Form Nested Programs Compiler nfn2dlp: A Normal Form Nested Programs Compiler Annamaria Bria, Wolfgang Faber, and Nicola Leone Department of Mathematics, University of Calabria, 87036 Rende (CS), Italy {a.bria,faber,leone}@mat.unical.it

More information

Choice Logic Programs and Nash Equilibria in Strategic Games

Choice Logic Programs and Nash Equilibria in Strategic Games Choice Logic Programs and Nash Equilibria in Strategic Games Marina De Vos and Dirk Vermeir Dept. of Computer Science Free University of Brussels, VUB Pleinlaan 2, Brussels 1050, Belgium Tel: +32 2 6293308

More information

Propositional Theories are Strongly Equivalent to Logic Programs

Propositional Theories are Strongly Equivalent to Logic Programs Under consideration for publication in Theory and Practice of Logic Programming 1 Propositional Theories are Strongly Equivalent to Logic Programs Pedro Cabalar Department of Computer Science, University

More information

Lecture 9: Datalog with Negation

Lecture 9: Datalog with Negation CS 784: Foundations of Data Management Spring 2017 Instructor: Paris Koutris Lecture 9: Datalog with Negation In this lecture we will study the addition of negation to Datalog. We start with an example.

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

From Tableaux to Automata for Description Logics

From Tableaux to Automata for Description Logics Fundamenta Informaticae XX (2003) 1 33 1 IOS Press From Tableaux to Automata for Description Logics Franz Baader, Jan Hladik, and Carsten Lutz Theoretical Computer Science, TU Dresden, D-01062 Dresden,

More information

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions.

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions. THREE LECTURES ON BASIC TOPOLOGY PHILIP FOTH 1. Basic notions. Let X be a set. To make a topological space out of X, one must specify a collection T of subsets of X, which are said to be open subsets of

More information

A Modality for Recursion

A Modality for Recursion A Modality for Recursion (Technical Report) March 31, 2001 Hiroshi Nakano Ryukoku University, Japan nakano@mathryukokuacjp Abstract We propose a modal logic that enables us to handle self-referential formulae,

More information

The Tractability of Global Constraints

The Tractability of Global Constraints The Tractability of Global Constraints Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM-CNRS, Montpelier, France. bessiere@lirmm.fr Cork Constraint Computation Center,

More information

FUZZY BOOLEAN ALGEBRAS AND LUKASIEWICZ LOGIC. Angel Garrido

FUZZY BOOLEAN ALGEBRAS AND LUKASIEWICZ LOGIC. Angel Garrido Acta Universitatis Apulensis ISSN: 1582-5329 No. 22/2010 pp. 101-111 FUZZY BOOLEAN ALGEBRAS AND LUKASIEWICZ LOGIC Angel Garrido Abstract. In this paper, we analyze the more adequate tools to solve many

More information

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:

More information

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

More information

Feature Integration from a Theory Change Perspective

Feature Integration from a Theory Change Perspective Feature Integration from a Theory Change Perspective Hannah Harris and Mark Ryan University of Birmingham, Birmingham, B15 2TT, UK. http://www.cs.bham.ac.uk/ heh,mdr Abstract. Our work is concerned with

More information

CSC 501 Semantics of Programming Languages

CSC 501 Semantics of Programming Languages CSC 501 Semantics of Programming Languages Subtitle: An Introduction to Formal Methods. Instructor: Dr. Lutz Hamel Email: hamel@cs.uri.edu Office: Tyler, Rm 251 Books There are no required books in this

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

RESULTS ON TRANSLATING DEFAULTS TO CIRCUMSCRIPTION. Tomasz Imielinski. Computer Science Department Rutgers University New Brunswick, N.

RESULTS ON TRANSLATING DEFAULTS TO CIRCUMSCRIPTION. Tomasz Imielinski. Computer Science Department Rutgers University New Brunswick, N. RESULTS ON TRANSLATING DEFAULTS TO CIRCUMSCRIPTION Tomasz Imielinski Computer Science Department Rutgers University New Brunswick, N.J 08905 ABSTRACT In this paper we define different concepts, of translating

More information

The Inverse of a Schema Mapping

The Inverse of a Schema Mapping The Inverse of a Schema Mapping Jorge Pérez Department of Computer Science, Universidad de Chile Blanco Encalada 2120, Santiago, Chile jperez@dcc.uchile.cl Abstract The inversion of schema mappings has

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

An Algorithm for Computing Semi-Stable Semantics

An Algorithm for Computing Semi-Stable Semantics An Algorithm for Computing Semi-Stable Semantics Martin Caminada Department of Information and Computing Sciences, Utrecht University Technical Report UU-CS-2007-010 www.cs.uu.nl ISSN: 0924-3275 An Algorithm

More information

Reasoning in Attempto Controlled English: Non-Monotonicity

Reasoning in Attempto Controlled English: Non-Monotonicity Reasoning in Attempto Controlled English: Non-Monotonicity Norbert E. Fuchs Department of Informatics & Institute of Computational Linguistics University of Zurich fuchs@ifi.uzh.ch http://attempto.ifi.uzh.ch/

More information

Five weaknesses of ASPIC +

Five weaknesses of ASPIC + Five weaknesses of ASPIC + Leila Amgoud IRIT CNRS amgoud@irit.fr Abstract. This paper analyzes the ASPIC+ argumentation system. It shows that it is grounded on two monotonic logics which are not Tarskian

More information

An Evidence-based Framework for a Theory of Inheritance

An Evidence-based Framework for a Theory of Inheritance An Evidence-based Framework for a Theory of Inheritance T. Krishnaprasad, Michael Kifer Department of Computer Science SUNY at Stony Brook Stony Brook, NY 11794. Abstract We present an approach to formalizing

More information

CSE 20 DISCRETE MATH. Fall

CSE 20 DISCRETE MATH. Fall CSE 20 DISCRETE MATH Fall 2017 http://cseweb.ucsd.edu/classes/fa17/cse20-ab/ Final exam The final exam is Saturday December 16 11:30am-2:30pm. Lecture A will take the exam in Lecture B will take the exam

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms

More information

Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

More information

An Abductive Framework for General Logic Programs and other Nonmonotonic Systems

An Abductive Framework for General Logic Programs and other Nonmonotonic Systems An Abductive Framework for General Logic Programs and other Nonmonotonic Systems Gerhard Brewka Kurt Konolige GMD, Postfach 12 40 SRI International 5205 Sankt Augustin, Germany 333 Ravenswood Ave Menlo

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Computing optimal linear layouts of trees in linear time

Computing optimal linear layouts of trees in linear time Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm

More information

NP-Completeness of 3SAT, 1-IN-3SAT and MAX 2SAT

NP-Completeness of 3SAT, 1-IN-3SAT and MAX 2SAT NP-Completeness of 3SAT, 1-IN-3SAT and MAX 2SAT 3SAT The 3SAT problem is the following. INSTANCE : Given a boolean expression E in conjunctive normal form (CNF) that is the conjunction of clauses, each

More information

To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):

To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions): CS 70 Discrete Mathematics for CS Fall 2003 Wagner Lecture 7 This lecture returns to the topic of propositional logic. Whereas in Lecture 1 we studied this topic as a way of understanding proper reasoning

More information

Term Algebras with Length Function and Bounded Quantifier Elimination

Term Algebras with Length Function and Bounded Quantifier Elimination with Length Function and Bounded Ting Zhang, Henny B Sipma, Zohar Manna Stanford University tingz,sipma,zm@csstanfordedu STeP Group, September 3, 2004 TPHOLs 2004 - p 1/37 Motivation: Program Verification

More information

A Game-Theoretic Approach to Constraint Satisfaction

A Game-Theoretic Approach to Constraint Satisfaction A Game-Theoretic Approach to Constraint Satisfaction Phokion G. Kolaitis Computer Science Department University of California, Santa Cruz Santa Cruz, CA 95064 kolaitis@cse.ucsc.edu www.cse.ucsc.edu/ kolaitis

More information

Computer Science Technical Report

Computer Science Technical Report Computer Science Technical Report Feasibility of Stepwise Addition of Multitolerance to High Atomicity Programs Ali Ebnenasir and Sandeep S. Kulkarni Michigan Technological University Computer Science

More information

A Note on Karr s Algorithm

A Note on Karr s Algorithm A Note on Karr s Algorithm Markus Müller-Olm ½ and Helmut Seidl ¾ ½ FernUniversität Hagen, FB Informatik, LG PI 5, Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de ¾ TU München,

More information

arxiv: v1 [cs.db] 23 May 2016

arxiv: v1 [cs.db] 23 May 2016 Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics (extended version) arxiv:1605.07159v1 [cs.db] 23 May 2016 Andrei Lopatenko Free University

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Recursive Aggregates in Disjunctive Logic Programs: Semantics and Complexity

Recursive Aggregates in Disjunctive Logic Programs: Semantics and Complexity Recursive Aggregates in Disjunctive Logic Programs: Semantics and Complexity Revised version as of September 5, 2005 Wolfgang Faber 1, Nicola Leone 2, and Gerald Pfeifer 1 1 Institut für Informationssysteme,

More information

2.8 Universal Turing Machines and the Halting Problem

2.8 Universal Turing Machines and the Halting Problem 2.8 Universal Turing Machines and the Halting Problem Through the hierarchy of Slide 74 we indirectly get a sense that Turing Machines are at least as computationally powerful as any other known model

More information

PART 1 GRAPHICAL STRUCTURE

PART 1 GRAPHICAL STRUCTURE PART 1 GRAPHICAL STRUCTURE in this web service in this web service 1 Treewidth and Hypertree Width Georg Gottlob, Gianluigi Greco, Francesco Scarcello This chapter covers methods for identifying islands

More information

3.7 Denotational Semantics

3.7 Denotational Semantics 3.7 Denotational Semantics Denotational semantics, also known as fixed-point semantics, associates to each programming language construct a well-defined and rigorously understood mathematical object. These

More information

Unifying and extending hybrid tractable classes of CSPs

Unifying and extending hybrid tractable classes of CSPs Journal of Experimental & Theoretical Artificial Intelligence Vol. 00, No. 00, Month-Month 200x, 1 16 Unifying and extending hybrid tractable classes of CSPs Wady Naanaa Faculty of sciences, University

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems J.M. López, M. García, J.L. Díaz, D.F. García University of Oviedo Department of Computer Science Campus de Viesques,

More information

Topic 1: What is HoTT and why?

Topic 1: What is HoTT and why? Topic 1: What is HoTT and why? May 5, 2014 Introduction Homotopy type theory (HoTT) is a newly emerging field of mathematics which is currently being developed as a foundation of mathematics which is in

More information

Solutions to Homework 10

Solutions to Homework 10 CS/Math 240: Intro to Discrete Math 5/3/20 Instructor: Dieter van Melkebeek Solutions to Homework 0 Problem There were five different languages in Problem 4 of Homework 9. The Language D 0 Recall that

More information

Preface Violine(stradivari1) 4string(stradivari1). x.violine(x) 4string(x)

Preface Violine(stradivari1) 4string(stradivari1). x.violine(x) 4string(x) circumscription Preface- FOL We have KB consist the sentence: Violine(stradivari1) We want to conclude it have 4 strings, there are exactly 2 possibilities. One is to add the explicit sentence: 4string(stradivari1).

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

A proof-producing CSP solver: A proof supplement

A proof-producing CSP solver: A proof supplement A proof-producing CSP solver: A proof supplement Report IE/IS-2010-02 Michael Veksler Ofer Strichman mveksler@tx.technion.ac.il ofers@ie.technion.ac.il Technion Institute of Technology April 12, 2010 Abstract

More information

Lecture 5: Duality Theory

Lecture 5: Duality Theory Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane

More information

Programming Languages Third Edition

Programming Languages Third Edition Programming Languages Third Edition Chapter 12 Formal Semantics Objectives Become familiar with a sample small language for the purpose of semantic specification Understand operational semantics Understand

More information