<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Weak Completion Semantics and its Applications in Human Reasoning</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ste↵ en H¨olldobler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International Center for Computational Logic,TU Dresden</institution>
          ,
          <addr-line>01062 Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>I present a logic programming approach based on the weak completions semantics to model human reasoning tasks, and apply the approach to model the suppression task, the selection task as well as the belief-bias e↵ ect, to compute preferred mental models of spatial reasoning tasks and to evaluate indicative as well as counterfactual conditionals.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Observing the performance of humans in cognitive tasks like the suppression [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
or the selection task [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] it is apparent that human reasoning cannot be
adequately modeled by classical two-valued logic. Whereas there have been many
approaches to develop a normative model for human reasoning which are not
based on logic like the mental model theory [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] or probabilistic approaches [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ],
Keith Stenning and Michiel von Lambalgen have developed a logic-based
approach [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] where, in a first step, they reason towards an appropriate
representation of some aspects of the world as logic program and, in a second step, reason
with respect to the least model of the program. Their approach is based on the
three-valued (strong) Kripke-Kleene logic [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], is non-monotonic, and utilizes
some form of completion as well as abduction. Most interestingly, the results
developed within the fields of logic programming and computational logic within
the last decades could not be immediately applied to adequately model human
reasoning tasks but rather some modifications were needed. As a consequence,
theorems, propositions and lemmas formally proven for a theory without these
modification cannot be readily applied but their proofs must be adapted as well.
      </p>
      <p>
        Unfortunately, some of the formal results stated in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] are not correct.
Somewhat surprisingly, we were able to show in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] that the results do hold if the
Kripke-Kleene logic is replaced by the three-valued Lukasiewicz logic [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. We
have called our approach weak completion semantics (WCS) because in the
completion of a program, undefined relations are not identified with falsehood but
rather are left unknown. Whereas our original emphasis was on obtaining
formally correct results, WCS has been applied to many di↵ erent human reasoning
tasks in the meantime: the suppression task, the abstract as well as the social
selection task, the belief-bias e↵ ect, the computation of preferred mental models
in spational reasoning tasks as well as the evaluation of conditionals.
      </p>
      <p>This paper gives an overview on WCS as well as its applications to human
reasoning tasks.</p>
      <p>Logic Programs</p>
    </sec>
    <sec id="sec-2">
      <title>Weak Completion Semantics</title>
      <p>We assume the reader to be familiar with logic programming, but we repeat basic
notions and notations. A (logic) program is a finite set of (program) clauses of
the form A &gt; , A ? or A B1 ^ . . . ^ Bn, n &gt; 0 where A is an atom, Bi,
1  i  n, are literals and &gt; and ? denote truth and falsehood, resp. A is called
head and &gt;, ? as well as B1 ^ . . .^ Bn are called body of the corresponding clause.
Clauses of the form A &gt; and A ? 1 are called positive and negative facts,
resp. In this paper, P denotes a program, A a ground atom and F a formula.
We assume that each non-propositional program contains at least one constant
symbol. We also assume for each program that the underlying alphabet consists
precisely of the symbols mentioned in the program, if not indicated di↵ erently.
When writing sets of literals we omit curly brackets if a set has only one element.</p>
      <p>gP denotes the set of all ground instances of clauses occurring in P. A ground
atom A is defined in gP i↵ gP contains a clause whose head is A; otherwise A is
said to be undefined. def (S, P) = {A body 2 gP | A 2 S _ ¬A 2 S} is called
definition of S in P, where S is a set of ground literals. Such a set S is said to
be consistent i↵ it does not contain a pair of complementary literals.</p>
      <p>A level mapping for P is a function ` which assigns to each atom occurring
in gP a natural number. Let `(¬A) = `(A). P is acyclic i↵ there exists a level
mapping ` such that for each A L1 ^ . . . ^ Ln 2 gP we find that `(A) &gt; `(Li),
1  i  n.
2.2</p>
      <p>Weak Completion
For a given P, consider the following transformation: (1) For each defined atom A,
replace all clauses of the form A body1, . . . , A bodym occurring in gP by
A body1 _ . . . _ bodym. (2) Replace all occurrences of by $ . The obtained
ground program is called weak completion of P or wcP.2
2.3</p>
      <p>
        Lukasiewicz Logic
An interpretation is a mapping from the set of formulas into the set of truth
values. A model for F is an interpretation which maps F to true. We consider
the three-valued Lukasiewicz (or L-) logic [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] (see Table 1) and represent each
interpretation I by hI&gt;, I? i, where I&gt; = {A | I(A) = &gt;}, I? = {A | I(A) = ? },
I&gt; \ I? = ; , and each ground atom A 62 I&gt; [ I? is mapped to U. Hence, under
the empty interpretation h; , ;i all ground atoms are unknown. Let hI&gt;, I? i and
hJ &gt;, J ? i be two interpretations. We define
hI&gt;, I? i ✓ h J &gt;, J ? i i↵ I&gt; ✓ J &gt; and I? ✓ J ? ,
hI&gt;, I? i [ h J &gt;, J ? i = hI&gt; [ J &gt;, I? [ J ? i.
1 Under WCS a clause of the form A
      </p>
      <p>
        the only clause in the definition of A.
2 Note that undefined atoms are not identified with ? as in the completion of P [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>? is turned into A $ ? provided that it is
F ¬F ^ &gt; U ? _ &gt; U ? &gt; U ? $ &gt; U ?
&gt; ? &gt; &gt; U ? &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; U ?
? &gt; U U U ? U &gt; U U U U &gt; &gt; U U &gt; U</p>
      <p>U U ? ? ? ? ? &gt; U ? ? ? U &gt; ? ? U &gt;
Table 1. Truth tables for the L-semantics, where we have used &gt;, ? and U instead of
true, false and unknown, resp., in order to shorten the presentation.</p>
      <sec id="sec-2-1">
        <title>Theorem 1. (Model Intersection Property) For each program P, the intersection of all L-models of P is an L-model of P.</title>
        <p>
          This result was formally proven in [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] for programs not containing negative
facts, but it holds also for programs with negative facts.
2.4
        </p>
        <p>
          A Semantic Operator
The following operator was introduced by Stenning and van Lambalgen [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ],
where they also showed that it admits a least fixed proint: P (hI&gt;, I? i) =
hJ &gt;, J ? i, where
        </p>
        <p>J &gt; = {A | A body 2 gP and body is true under hI&gt;, I? i},
J ? = {A | def (A, P) 6= ; and
body is false under hI&gt;, I? i for all A
body 2 def (A, P)}.</p>
        <p>
          The P operator di↵ ers from the semantic operator defined by Fitting in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]
in the additional condition def (A, P) 6= ; required in the definition of J ? . This
condition states that A must be defined in order to be mapped to false, whereas in
the (strong) Kripke-Kleene-semantics considered by Fitting an atom is mapped
to false if it is undefined. This reflects precisely the di↵ erence between the weak
completion and the completion semantics. The (strong) Kripke-Kleene-semantics
was also applied in [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]. However, as shown in [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] this semantics is not only the
cause for a technical bug in one theorem of [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ], but it does also lead to a
nonadequate model of some human reasoning tasks. Both, the technical bug as well
as the non-adequate modeling, can be avoided by using WCS.
        </p>
        <sec id="sec-2-1-1">
          <title>Theorem 2. The least fixed point of</title>
          <p>
            pletion of P. [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ]
          </p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>P is the least L-model of the weak com</title>
        <p>In the remainder of this paper, MP denotes the least L-model of wcP.
2.5</p>
        <p>
          Contraction
It was Fitting’s idea [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] to apply metric methods to compute least fixed points
of semantic operators and, in particular, he showed that for so-called acceptable3
3 Please see [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] for a definition of acceptable programs. The class of acyclic programs
is a proper subset of the class of acceptable programs.
programs the semantic operator defined in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] is a contraction.4 Consequently,
Banach’s contraction mapping theorem [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] can be applied to compute the least
fixed point of the semantic operator.
        </p>
        <p>
          As shown in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], P may not be a contraction if P is acceptable. But the
following weaker result holds for programs not containing any cycles.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Theorem 3. If P is an acyclic program, then</title>
      </sec>
      <sec id="sec-2-4">
        <title>P is a contraction. [18]</title>
        <p>As a consequence, the computation of the least fixed point of
initialized with an arbitrary interpretation.</p>
        <p>P can be
2.6</p>
        <p>
          A Connectionist Realization
Within the core-method [
          <xref ref-type="bibr" rid="ref1 ref17">1, 17</xref>
          ] semantic operators of logic programs are
computed by feed-forward connectionist networks, where the input and the output
layer represent interpretations. By connecting the output with the input layer,
the networks are turned into recurrent ones and can now be applied to compute
the least fixed points of the semantic operators.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>Theorem 4. For each datalog program P there exists a recurrent connectionist</title>
        <p>network which will converge to a stable state representing MP if initialized with
the empty interpretation.</p>
        <p>
          The theorem was proven in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] for propositional programs but extends to
datalog programs. From the discussion in the previous paragraph we conclude
that the network may be initialized by some interpretation if P is a contraction.
2.7
        </p>
        <p>Weak Completion Semantics
The weak completion semantics (WCS) is the approach to consider weakly
completed logic programs and to reason with respect to the least L-models
of these programs. We write P |=wcs F i↵ formula F holds in MP . WCS is
non-monotonic.
2.8</p>
        <p>Relation to Well-Founded Semantics
WCS is related to the well-founded semantics (WFS) as follows: Let P+ =
P \ {A ? | A ? 2 P} and u be a new nullary relation symbol not occurring
in P. Furthermore, let P⇤ = P+ [ {B u | def (B, P) = ; } [ {u ¬u}.</p>
      </sec>
      <sec id="sec-2-6">
        <title>Theorem 5. If P is a program which does not contain a positive loop, then MP and the well-founded model for P⇤ coincide. [11]</title>
        <p>4 A mapping f : M ! M on a metric space (M, d) is a contraction i↵ there exists a
k 2 (0, 1) such that for all x, y 2 M we find d(f (x), f (y))  k ⇥ d(x, y).</p>
        <p>Abduction
An abductive framework consists of a logic program P, a set of abducibles AP =
{A &gt; | def (A, P) = ; } [ {A ? | def (A, P) = ; }, a set of integrity
constraints IC, i.e., expressions of the form ? B1^ . . .^ Bn, and the entailment
relation |=wcs ; it is denoted by hP, AP , IC, |=wcs i.</p>
        <p>By Theorem 1, each program and, in particular, each finite set of positive and
negative ground facts has an L-model. For the latter, this can be obtained by
mapping all heads occurring in this set to true. Thus, in the following definition,
explanations as well as the union of a program and an explanation are satisfiable.</p>
        <p>An observation O is a set of ground literals; it is explainable in the framework
hP, AP , IC, |=wcs i i↵ there exists a minimal E ✓ AP called explanation such that
MP[ E satisfies IC and P [ E |=wcs L for each L 2 O. F follows creduluously
from P and O i↵ there exists an explanantion E such that P [ E |=wcs F . F
follows skeptically from P and O i↵ for all explanantions E we find P [ E |=wcs F .
2.10</p>
        <p>Revision
3
3.1
3. Mrev(P,S)(S) = &gt;.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Applications</title>
      <p>
        The Suppression Task
Let S be a finite and consistent set of ground literals in
rev (P, S) = (P \ def (S, P)) [ {A
&gt; | A 2 S} [ {A
? | ¬A 2 S},
where A denotes an atom. rev (P, S) is called the revision of P with respect to S.
The following result was formally proven in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>Proposition 6. 1. rev is non-monotonic,</title>
        <p>i.e., there exist P, S and F such that P |=wcs F and rev (P, S) 6|=wcs F .
2. If MP (L) = U for all L 2 S, then rev is monotonic.</p>
        <p>
          Ruth Byrne has shown in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] that graduate students with no previous exposure
to formal logic did suppress previously drawn conclusions when additional
information became available. Table 2 shows the abbreviations that will be used in
this subsection, whereas Table 3 gives an account of the findings of [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
Interestingly, in some instances the previously drawn conclusions were valid (cases AE
and ACE in Table 3) whereas in other instances the conclusions were invalid
(cases AL and ABL in Table 3) with respect to classical two-valued logic.
        </p>
        <p>
          Following [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] conditionals are encoded by licences for implications using
abnormality predicates. In the case AE no abnormalities concerning the library
are known. However, in the case ACE it becomes known that one can visit the
library only if it is open and, thus, not being open becomes an abnormality
for the first implication. Likewise, one may argue that there must be a reason
for studying in the library. In the case ACE the only reason for studying in
A If she has an essay to finish, then she will study late in the library.
B If she has a textbook to read, then she will study late in the library.
C If the library stays open, she will study late in the library.
        </p>
        <p>E She has an essay to finish.</p>
        <p>E She does not have an essay to finish.</p>
        <p>L She will study late in the library.</p>
        <p>L She will not study late in the library.
the library is to finish an essay and, consequently, not having to finish an essay
becomes an abnormality for the second implication. Alltogether, for the cases
AE and ACE we obtain the programs</p>
        <p>PAE
PACE = {`
= {`
e ^ ¬ab1, e
e ^ ¬ab1, e
&gt; , ab1 ? },
&gt; , ab1 ¬o, `
o ^ ¬ab2, ab2
¬e}
with MPAE = h{e, `}, {ab1}i and MPACE = h{e}, {ab2}i, where `, e, o and ab
denote that she will study late in the library, she has an essay to finish, the library
stays open and abnormality, resp. Hence, MPAE (`) = &gt; and MPACE (`) = U.
Thus, WCS can model the suppression of a previously drawn conclusion.</p>
        <p>For the examples in the second column of Table 3 abduction is needed. E.g.,
for the case ABL we obtain the program</p>
        <p>PAB = {`
e ^ ¬ab1, ab1 ? , `
t ^ ¬ab3, ab3 ? }
with MPAB = h; , {ab1, ab3}i, where t denotes that she has a textbook to read.
The observation O = ` can be explained by E1 = {e &gt; } and E2 = {t &gt; }.
In order to adequately model Byrne’s selection task, we have to be skeptical as
otherwise–being credoluous–we would conclude that she has an essay to finish.</p>
        <p>
          A complete account of Byrne’s selection task under WCS is given in [
          <xref ref-type="bibr" rid="ref10 ref21">10, 21</xref>
          ].
D F 3 7
89% 16% 62% 25%
beer coke 22yrs
95% 0.025% 0.025%
16yrs
80%
In the original (abstract) selection task [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] participants were given the
conditional if there is a D on one side of the card, then there is 3 on the other side and
four cards on a table showing the letters D and F as well as the numbers 3 and 7.
Furthermore, they know that each card has a letter on one side and a number on
the other side. Which cards must be turned to prove that the conditional holds?
        </p>
        <p>
          Griggs and Cox [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] adapted the abstract task to a social case. Consider the
conditional if a person is drinking beer, then the person must be over 19 years
of age and again consider four cards, where one side shows the person’s age and
on the other side shows the person’s drink: beer, coke, 22yrs and 16yrs. Which
drinks and persons must be checked to prove that the conditional holds?
        </p>
        <p>
          When confronted with both tasks, participants reacted quite di↵ erently as
shown in Table 4. Moreover, if the conditionals are modeled as implications in
classical two-valued logic, then some of the drawn conclusions are not valid.
The Abstract Case This case is artificial and there is no common sense
knowledge about the conditional. Let D, F , 3, and 7 be propositional variables
denoting that the corresponding symbol or number is on one side of a card.
Following [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], we assume that the given conditional is viewed as a belief and
represented as a clause in
        </p>
        <p>Pac = {3</p>
        <p>D ^ ¬ab1, ab1 ? },
where the negative fact was added as there are no known abnormalities. We
obtain MPac = h; , ab1i and find that this model does not explain any symbol
on the cards. Let Aac = {D &gt; , D ? , F &gt; , F ? , 7 &gt; , 7 ? }
in the abductive framework hPac, Aac, ; , |=wcs i. Table 5 shows the explanations
for the cards with respect to this framework.</p>
        <p>In case D was observed, the least model maps also 3 to &gt;. In order to be
sure that this corresponds to the real situation, we need to check if 3 is true.
case
beer
coke
22yrs
16yrs</p>
        <p>Psc
{ab2 ? , b &gt; }
{ab2 ? , b ? }
{ab2 ? , o &gt; }
{ab2 ? , o ? }</p>
        <p>MPsc
hb, ab2i
h; , {b, ab2}i</p>
        <p>ho, ab2i
h; , {o, ab2}i
|=wcs o</p>
        <p>b ^ ¬ab2
no
yes
yes
no
turn
yes
no
no
yes
Therefore, the card showing D is turned. Likewise, in case 3 is observed, D is
also mapped to &gt;, which can only be confirmed if the card is turned.
The Social Case In this case most humans are quite familiar with the
conditional as it is a standard law. They are also aware–it is common sense knowledge–
that there are no exceptions or abnormalities. Let o represent a person being
older than 19 years and b a person drinking beer. The conditional can be
represented by o b ^ ¬ab2 and is viewed as a social constraint which must follow
logically from the given facts. Table 6 shows the four di↵ erent cases.</p>
        <p>One should observe that in the case 16yrs the least model of the weak
completion of Psc, i.e. h; , {o, ab2}i, assigns U to b and, consequently, to both, b ^ ¬ab2
and o b ^ ¬ab2, as well. Overall, in the cases beer and 16yrs the social
constraint is not entailed by the least L-model of the weak completion of the
program. Hence, we need to check these cases out and, hopefully, find that the
beer drinker is older than 19 and that the 16 years old is not drinking beer.</p>
        <p>
          A complete account of the selection task under WCS is given in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
3.3
        </p>
        <p>
          The Belief-Bias E↵ ect
Evans et. al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] made a psychological study showing possibly conflicting
processes in human reasoning. Participants were confronted with syllogisms and had
to decide whether they are logically valid. Consider the following syllogism:
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>No addictive things are inexpensive.</title>
      </sec>
      <sec id="sec-3-3">
        <title>Some cigarettes are inexpensive.</title>
      </sec>
      <sec id="sec-3-4">
        <title>Therefore, some addictive things are not cigarettes.</title>
        <p>(Premise1)
(Premise2)
(Conclusion)
The conclusion does not follow from the premises in classical logic: If there are
inexpensive cigarettes but no addictive things, then the premises are true, but
the conclusion is false. Nevertheless, most participants considered the syllogism
to be valid. Evans et. al. explained the answers by an unduly influence of the
participants’ own beliefs.</p>
        <p>Before we can model this line of reasoning under WCS, we need to tackle
the problem that the head of a program clause must be an atom, whereas the
conclusion of the rule if something is inexpensive, then it is not addictive5 is a
5 (Premise1) can be formalized in many syntactically di↵ erent, but semantically
equivalent ways in classical logic. We have selected a form which allows WCS to
adequately model the belief-bias e↵ ect.
negated atom. If the relation symbol add is used to denote addiction, then this
technical problem can be overcome by introducing a new relation symbol add 0,
specifying by means of the clause
add (X)
¬add 0(X)
that add 0 is the negation of add under WCS and requiring by means of the
integrity constraint</p>
        <p>ICadd = {?</p>
        <p>add (X) ^ ¬add 0(X)}
that add and add 0 cannot be simultaneously true.</p>
        <p>
          We can now encode (Premise1) following Stenning and van Lambalgen’s
idea to represent conditionals by licences for implications [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]:
(1)
(2)
(3)
(4)
(5)
(Bias1)
(Bias2)
add 0(X)
inex (X) ^ ¬ab1(X),
ab1(X) ? .
        </p>
        <p>As for (Premise2), Evans et. al. have argued that it includes two pieces of
information. Firstly, there exists something, say a, which is a cigarette:
cig(a)</p>
        <p>&gt; .</p>
      </sec>
      <sec id="sec-3-5">
        <title>Cigarettes are addictive,</title>
        <p>Secondly, it contains the following belief that humans seem to have:</p>
      </sec>
      <sec id="sec-3-6">
        <title>Cigarettes are inexpensive.</title>
        <p>This belief implies (Premise2) and biases the process of reasoning towards a
representation such that we obtain:
inex (X)
cig(X) ^ ¬ab2(X),
ab2(X) ? .</p>
        <p>Additionally, it is assumed that there is a second piece of background knowledge,
viz. it is commonly known that
which in the context of (1) and (2) can be specified by stating that cigarettes
are abnormalities regarding add 0:
ab1(X)
cig(X).</p>
        <p>Alltogether, let Padd be the program consisting of the clauses (1)-(5). Because
(Conclusion) is about an object which is not necessarily a we need to add
another constant, say b, to the alphabet underlying Padd . We obtain</p>
        <p>MPadd = h{cig(a), inex (a), ab1(a), add (a)}, {ab2(a), ab2(b), add 0(a)}i.</p>
        <p>Turning to (Conclusion) we consider its first part as the observation O =
add (b) which needs to be explained with respect to the abductive framework
hPadd , {cig(b)</p>
        <p>&gt; , cig(b) ? }, ICadd , |=wcs i.
We find two minimal explanations E? = {cig(b)
leading to the minimal models
? } and E&gt; = {cig(b)
&gt; }
MPadd [ E?
= h {cig(a), inex (a), ab1(a), add (a), add (b)},</p>
        <p>{ab2(a), ab2(b), add 0(a), cig(b), inex (b), ab1(b), add 0(b)} i,
MPadd [ E&gt; = h {cig(a), inex (a), ab1(a), add (a), cig(b), inex (b), ab1(b), add (b)},
{ab2(a), ab2(b), add 0(a), add 0(b)} i,
respectively. Because under MPadd [ E&gt; all known addictive objects (a and b)
are cigarettes and under MPadd [ E? the addictive object b is not a cigarette,
(Conclusion) follows creduluously, but not skeptically.</p>
        <p>
          On the other hand, the two explanations E? and E&gt; do not seem to be equally
likely given (Premise1) and (Bias1). Rather, E? seems to be the main
explanation whereas E&gt; seems to be the exceptional case. Pereira and Pinto [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] have
introduced so-called inspection points which allow to distinguish between main and
exceptional explanations in an abductive framework. Formally, they introduce a
meta-predicate inspect and require that if inspect (A) &gt; or inspect (A) ?
are elements of an explanation E for some literal or observation L, then either
A &gt; or A ? must be in E as well and, moreover, A ? or A &gt; must
be elements of explanations for some literal or observation L0 6= L, where A is a
ground atom.
        </p>
        <p>With the help of inspection points, the program Padd can be rewritten to
Pa0dd = (Padd \ {ab1(X)
cig(X)}) [ {ab1(X)
inspect (cig(X))}
framework hPa0dd , A0add , ICadd , |=wcs i, where
and the explanation O = add (b) is to be explained with respect to the abductive
A0add = { cig(b) &gt; , cig(b) ? ,
inspect (cig(b)) &gt; , inspect (cig(b)) ? ,
inspect (cig(a)) &gt; , inspect (cig(a)) ? }.</p>
        <p>Now, E? is the only explanation for add (b) and, hence, (Conclusion) follows
skeptically in the revised approach.</p>
        <p>
          More details about our model of the belief-bias e↵ ect and abduction using
inspection points can be found in [
          <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
          ].
3.4
        </p>
        <p>Spatial Reasoning
Consider the following spatial reasoning problem. Suppose it is known that a
ferrari is left of a porsche, a beetle is right of the porsche, the porsche is left of
a hummer, and the hummer is left of a dodge. Is the beetle left of the hummer?</p>
        <p>
          The mental model theory [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] is based on the idea that humans construct
socalled mental models, which in case of a spatial reasoning problem is understood
as the presentation of the spatial arrangements between objects that correspond
to the premises. In the example, there are three mental models:
ferrari porsche beetle hummer dodge
ferrari porsche hummer beetle dodge
ferrari porsche hummer dodge beetle
Hence, the answer to the above mentioned question depends on the construction
of the mental models.
        </p>
        <p>
          In the preferred model theory [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] it is assumed that humans do not
construct all mental models, but rather a single, preferred one, and that reasoning
is performed with respect to the preferred mental model. The preferred mental
model is believed to be constructed by considering the premises one by one in
the order of their occurrence and to place objects directly next to each other
or, if this impossible, in the next available space. For the example, the preferred
mental model is constructed as follows:
ferrari porsche
ferrari porsche beetle
ferrari porsche beetle hummer
ferrari porsche beetle hummer dodge
Hence, according to the preferred model theory, the beetle is left of the hummer.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] we have specified a logic program P taking into account the premises of
a spatial reasoning problem such that MP corresponds to the preferred mental
model. Moreover, within the computation of MP as the least fixed point of P ,
the preferred mental model is constructed step by step as in [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
3.5
        </p>
        <p>Conditionals
Conditionals are statements of the form if condition then consequence. In this
paper we distinguish between indicative and subjunctive (or counterfactual)
conditionals. Indicative conditionals are conditionals whose condition is either true
or unknown; the consequence is asserted to be true if the condition is true. On
the contrary, the condition of a subjunctive or counterfactual conditional is
either false or unknown; in the counterfactual circumstance of the condition being
true, the consequence is asserted to be true.6 We assume that the condition and
the consequence of a conditional are finite and consistent sets of literals.</p>
        <p>Conditionals are evaluated with respect to some background information
specified as a program and a set of integrity constraints. More specifically, as
the weak completion of each program admits a least L-model, conditionals are
evaluated under the least L-model of a program. In the reminder of this section
let P be a program, IC be a finite set of integrity constraints, and MP be the
least L-model of wcP such that MP satisfies IC.
6 In the literature the case of a condition being unknown is usually not explicitely
considered; there also seems to be no standard definition for indicative and
counterfactual conditionals.</p>
        <p>In this setting we propose to evaluate a conditional cond (C, D) as follows,
where C and D are finite and consistent sets of literals:
1. If MP (C) = &gt; and MP (D) = &gt;, then cond (C, D) is true.
2. If MP (C) = &gt; and MP (D) = ? , then cond (C, D) is false.
3. If MP (C) = &gt; and MP (D) = U, then cond (C, D) is unknown.
4. If MP (C) = ? , then evaluate cond (C, D) with respect to Mrev(P,S),
where S = {L 2 C | MP (L) = ? }.
5. If MP (C) = U, then evaluate cond (C, D) with respect to MP0 , where
– P0 = rev (P, S) [ E,
– S is a smallest subset of C and E ✓ Arev(P,S) is a minimal explanation
for C \ S such that MP0 (C) = &gt;.</p>
        <p>In words, if the condition of a conditional is true, then the conditional is an
indicative one and is evaluated as implication in L-logic. If the condition is false,
then the conditional is a counterfactual conditional. In this case, i.e., in case 4,
non-monotonic revision is applied to the program in order to reverse the truth
value of those literals, which are mapped to false.</p>
        <p>The main novel contribution concerns the final case 5. If the condition C of
a conditional is unknown, then we propose to split C into two disjoint subsets S
and C \ S, where the former is treated by revision and the latter by abduction.
In case C contains some literals which are true and some which are unknown
under MP , then the former will be part of C \ S because the empty explanation
explains them. As we assume S to be minimal this approach is called minimal
revision followed by abduction (MRFA). Furthermore, because revision as well
as abduction are only applied to literals which are assigned to unknown, case 5
is monotonic.</p>
        <p>
          As an example consider the forest fire scenario taken from [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]: The
conditional cond (¬dl , ¬↵ ), if there had not been so many dry leaves on the forest floor,
then the forest fire would not have occurred, is to be evaluated with respect to
P↵ = {↵
l ^ ¬ab1, l
&gt; , ab1
¬dl , dl
&gt; },
which states that lightning (l ) causes a forest fire (↵ ) if nothing abnormal (ab1),
is taking place, lightning happened, the absence of dry leaves (dl ) is an
abnormality, and dry leaves are present. We obtain MP↵ = h{dl , l , ↵ }, {ab1}i and
find that the condition ¬dl is false. Hence, we are dealing with a counterfactual
conditional. Following Step 4 we obtain S = {¬dl },
rev (P↵ , ¬dl ) = {↵
l ^ ¬ab1, l
&gt; , ab1
¬dl , dl ? }
and Mrev(P↵ ,¬dl) = h{l , ab1}, {dl , ↵ }i. Because ↵ is mapped to false under this
model, the conditional is true.
        </p>
        <p>Let us extend the example by adding arson (a) causes a forest fire:
P↵ a = P↵ [ {↵</p>
        <p>a ^ ¬ab2, ab2 ? }.</p>
        <p>We find MP↵ a = h{dl , l , ↵ }, {ab1, ab2}i and Mrev(P↵ a ,¬dl) = h{l , ab1}, {dl , ab2}i.
Under this model ↵ is unknown and, consequently, cond (¬dl , ¬↵ ) is unknown
as well.</p>
        <p>As final example consider P↵ a and the conditional cond ({↵ , ¬dl }, a): if a
forest fire occurred and there had not been so many dry leaves on the forest
floor, then arson must have caused the fire. Because the condition {↵ , ¬dl } is
false under MP↵ a we follow Step 4 and obtain S = {¬dl },
rev (P↵ a , ¬dl ) = (P↵ a \ {dl
&gt; }) [ {dl ? }
and Mrev(P↵ a ,¬dl) = h{l , ab1}, {dl , ab2}i. One should observe that ↵ as well as
the condition {↵ , ¬dl } are unknown under this model. Hence, we follow Step 5,
consider the abductive framework
hrev (P↵ a , ¬dl ), {a
&gt; , a
? }, ; , |=wcs i
and learn that {↵ , ¬dl } can be explained by {a &gt; }. Hence, by MRFA we
obtain as final program rev (P↵ a , ¬dl ) [ {a &gt; } and find</p>
        <p>Mrev(P↵ a ,¬dl)[ {a &gt; } = h{l , ab1, ↵ , a}, {dl , ab2}i.</p>
        <p>Because a is mapped to true under this model, the conditional is true as well.</p>
        <p>
          More details about the evaluation of conditionals under WCS can be found
in [
          <xref ref-type="bibr" rid="ref7 ref9">7, 9</xref>
          ].
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>
        I have presented the weak completion semantics (WCS) and have demonstrated
how various human reasoning tasks can be adequately modeled under WCS. To
the best of my knowledge, WCS is the computational logic based approach which
can handle most human reasoning tasks within a single framework. For example,
[
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] discusses only the selection task in detail and mentions the selection task,
whereas [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] discusses the selection task in detail and mentions the suppression
task.
      </p>
      <p>But there are many open questions. I only claim that conditionals are
adequately evaluated as shown in Section 3.5; this claim must be thoroughly tested.
We may also consider scenarios, where abduction needs to be applied to satisfy
the consequent of a conditional. The connectionist model reported in 2.6 does
not yet include abduction and we are unaware of any connectionist realization
of sceptical abduction.</p>
      <sec id="sec-4-1">
        <title>Acknowledgements I like to thank Michiel van Lambalgen for the discussions</title>
        <p>at the ICCL summer school 2008 which initialized this research. Carroline Dewi
Puspa Kencana Ramli wrote an outstandings master’s thesis in which she
developed the formal framework of the WCS including the connectionist realization;
she has received the EMCL best master’s thesis award 2009. The relationship
between WCS and WFS was established jointly with Emmanuelle-Anna Dietz
and Christoph Wernhard. Abduction was added to the framework with the help
of Emma, Christoph and Tobias Philipp. The ideas underlying the revision
operator were developed jointly with Emma and Lu´ıs Moniz Pereira.</p>
        <p>The suppression task was the running example throughout the development
of WCS involving Carroline, Tobias, Christoph, Emma and Marco Ragni. The
solution for the selection task was developed with Emma and Marco. The
approach to model spatial reasoning problems is a revised version of the ideas
first developed by Raphael H¨ops in his bachelor thesis under the supervision of
Emma; many thanks to Marco who introduced us to this problem. Emma and
Lu´ıs proposed the solution for the belief bias e↵ ect. The procedure to evaluate
conditionals is the result of many discussions with Emma, Lu´ıs and Bob
Kowalski. Finally, I like to thank the referees of the paper for many helpful comments.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bader</surname>
          </string-name>
          and
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Ho¨lldobler. The Core method: Connectionist model generation</article-title>
          . In S. Kollias,
          <string-name>
            <given-names>A.</given-names>
            <surname>Stafylopatis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Duch</surname>
          </string-name>
          , and E. Ojaet, editors,
          <source>Proceedings of the 16th International Conference on Artificial Neural Networks (ICANN)</source>
          , volume
          <volume>4132</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . Springer-Verlag,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>S.</given-names>
            <surname>Banach</surname>
          </string-name>
          .
          <article-title>Sur les op´erations dans les ensembles abstraits et leur application aux ´equations int´egrales</article-title>
          . Fund. Math.,
          <volume>3</volume>
          :
          <fpage>133</fpage>
          -
          <lpage>181</lpage>
          ,
          <year>1922</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>R.</given-names>
            <surname>Byrne</surname>
          </string-name>
          .
          <article-title>Suppressing valid inferences with conditionals</article-title>
          .
          <source>Cognition</source>
          ,
          <volume>31</volume>
          :
          <fpage>61</fpage>
          -
          <lpage>83</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>R. M. J. Byrne</surname>
          </string-name>
          .
          <article-title>The Rational Imagination: How People Create Alternatives to Reality</article-title>
          . MIT Press, Cambridge, MA, USA,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>K.</given-names>
            <surname>Clark</surname>
          </string-name>
          .
          <article-title>Negation as failure</article-title>
          . In H. Gallaire and J. Minker, editors,
          <source>Logic and Databases</source>
          , pages
          <fpage>293</fpage>
          -
          <lpage>322</lpage>
          . Plenum, New York,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Ho¨lldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the abstract and the social case of the selection task</article-title>
          .
          <source>In Proceedings Eleventh International Symposium on Logical Formalizations of Commonsense Reasoning</source>
          ,
          <year>2013</year>
          . commonsensereasoning.org/2013/proceedings.html.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          and
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>H¨olldobler. A new computational logic approach to reason with conditionals</article-title>
          . In F. Calimeri, G. Ianni, and M. Truszczynski, editors,
          <source>Logic Programming and Nonmonotonic Reasoning</source>
          , 13th International Conference, LPNMR, volume
          <volume>9345</volume>
          <source>of Lecture Notes in Artificial Intelligence</source>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Ho¨lldobler, and</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨ps. A computational logic approach to human spatial reasoning</article-title>
          .
          <source>Technical Report KRR-2015-02</source>
          , TU Dresden,
          <source>International Center for Computational Logic</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Ho¨lldobler, and
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Pereira</surname>
          </string-name>
          .
          <article-title>On indicative conditionals</article-title>
          . In S. H¨olldobler and Y. Liang, editors,
          <source>Proceedings of the First International Workshop on Semantic Technologies</source>
          , volume
          <volume>1339</volume>
          <source>of CEUR Workshop Proceedings</source>
          , pages
          <fpage>19</fpage>
          -
          <lpage>30</lpage>
          . CEUR-WS.org,
          <year>2015</year>
          . http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1339</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. E.-A. Dietz, S. Ho¨lldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the suppression task</article-title>
          . In N. Miyake,
          <string-name>
            <given-names>D.</given-names>
            <surname>Peebles</surname>
          </string-name>
          , and
          <string-name>
            <surname>R. P</surname>
          </string-name>
          . Cooper, editors,
          <source>Proceedings of the 34th Annual Conference of the Cognitive Science Society</source>
          , pages
          <fpage>1500</fpage>
          -
          <lpage>1505</lpage>
          .
          <source>Cognitive Science Society</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. E.-A. Dietz, S. Ho¨lldobler, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wernhard</surname>
          </string-name>
          .
          <article-title>Modelling the suppression task under weak completion and well-founded semantics</article-title>
          .
          <source>Journal of Applied Non-Classical Logics</source>
          ,
          <volume>24</volume>
          :
          <fpage>61</fpage>
          -
          <lpage>85</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>J. Evans</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Barston</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Pollard</surname>
          </string-name>
          .
          <article-title>On the conflict between logic and belief in syllogistic reasoning</article-title>
          .
          <source>Memory &amp; Cognition</source>
          ,
          <volume>11</volume>
          :
          <fpage>295</fpage>
          -
          <lpage>306</lpage>
          ,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>M.</given-names>
            <surname>Fitting</surname>
          </string-name>
          .
          <article-title>A Kripke-Kleene semantics for logic programs</article-title>
          .
          <source>Journal of Logic Programming</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ):
          <fpage>295</fpage>
          -
          <lpage>312</lpage>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>M.</given-names>
            <surname>Fitting</surname>
          </string-name>
          .
          <article-title>Metric methods - three examples and a theorem</article-title>
          .
          <source>Journal of Logic Programming</source>
          ,
          <volume>21</volume>
          (
          <issue>3</issue>
          ):
          <fpage>113</fpage>
          -
          <lpage>127</lpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>G.</given-names>
            <surname>Gigerenzer</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Murray</surname>
          </string-name>
          . Cognition ad Intuitive Statistics. Hillsdale, NJ: Erlbaum,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>R.</given-names>
            <surname>Griggs</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Cox</surname>
          </string-name>
          .
          <article-title>The elusive thematic materials e↵ ect in the wason selection task</article-title>
          .
          <source>British Journal of Psychology</source>
          ,
          <volume>73</volume>
          :
          <fpage>407</fpage>
          -
          <lpage>420</lpage>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. S. Ho¨lldobler and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kalinke</surname>
          </string-name>
          .
          <article-title>Towards a new massively parallel computational model for logic programming</article-title>
          .
          <source>In Proceedings of the ECAI94 Workshop on Combining Symbolic and Connectionist Processing</source>
          , pages
          <fpage>68</fpage>
          -
          <lpage>77</lpage>
          . ECCAI,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. S. Ho¨lldobler and
          <string-name>
            <surname>C. D. P. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Contraction properties of a semantic operator for human reasoning</article-title>
          . In L.
          <article-title>Li and K. K</article-title>
          . Yen, editors,
          <source>Proceedings of the Fifth International Conference on Information</source>
          , pages
          <fpage>228</fpage>
          -
          <lpage>231</lpage>
          . International Information Institute,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. S. Ho¨lldobler and
          <string-name>
            <surname>C. D. P. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logic programs under three-valued Lukasiewicz's semantics</article-title>
          . In P. M. Hill and D. S. Warren, editors,
          <source>Logic Programming</source>
          , volume
          <volume>5649</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>464</fpage>
          -
          <lpage>478</lpage>
          . Springer-Verlag Berlin Heidelberg,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. S. H¨olldobler and
          <string-name>
            <surname>C. D. P. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logics and networks for human reasoning</article-title>
          . In C. Alippi,
          <string-name>
            <surname>M. M. Polycarpou</surname>
            ,
            <given-names>C. G.</given-names>
          </string-name>
          <string-name>
            <surname>Panayiotou</surname>
          </string-name>
          , and G. Ellinasetal, editors,
          <source>Artificial Neural Networks - ICANN</source>
          , volume
          <volume>5769</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>85</fpage>
          -
          <lpage>94</lpage>
          . Springer-Verlag Berlin Heidelberg,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. S. H¨olldobler, T. Philipp, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wernhard</surname>
          </string-name>
          .
          <article-title>An abductive model for human reasoning</article-title>
          .
          <source>In Proc. Tenth International Symposium on Logical Formalizations of Commonsense Reasoning</source>
          ,
          <year>2011</year>
          . commonsensereasoning.org/2011/proceedings.html.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. P. Johnson-Laird.
          <article-title>Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness</article-title>
          . Cambridge University Press, Cambridge,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>S.</given-names>
            <surname>Kleene</surname>
          </string-name>
          . Introduction to Metamathematics. North-Holland,
          <year>1952</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>R.</given-names>
            <surname>Kowalski</surname>
          </string-name>
          .
          <article-title>Computational Logic and Human Thinking: How to be Artificially Intelligent</article-title>
          . Cambridge University Press,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>J.</given-names>
            <surname>Lukasiewicz</surname>
          </string-name>
          .
          <article-title>O logice tro´jwarto´sciowej</article-title>
          .
          <source>Ruch Filozoficzny</source>
          ,
          <volume>5</volume>
          :
          <fpage>169</fpage>
          -
          <lpage>171</lpage>
          ,
          <year>1920</year>
          .
          <article-title>English translation: On Three-Valued Logic</article-title>
          . In: Jan Lukasiewicz Selected Works. (L. Borkowski, ed.), North Holland,
          <fpage>87</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>J.</given-names>
            <surname>Pereira</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Pinto</surname>
          </string-name>
          .
          <article-title>Inspecting side-e↵ ects of abduction in logic programming</article-title>
          . In M. Balduccini and T. Son, editors,
          <source>Logic Programming</source>
          ,
          <source>Knowledge Representation, and Nonmonotonic Reasoning: Essays in Honour of Michael Gelfond</source>
          , volume
          <volume>6565</volume>
          <source>of Lecture Notes in Artificial Intelligence</source>
          , pages
          <fpage>148</fpage>
          -
          <lpage>163</lpage>
          . Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>L. M. Pereira</surname>
            ,
            <given-names>E.-A.</given-names>
          </string-name>
          <string-name>
            <surname>Dietz</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <article-title>Ho¨lldobler. An abductive reasoning approach to the belief-bias e↵ ect</article-title>
          . In C. Baral,
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Giacomo</surname>
          </string-name>
          , and T. Eiter, editors,
          <source>Principles of Knowledge Representation and Reasoning: Proceedings of the 14th International Conference</source>
          , pages
          <fpage>653</fpage>
          -
          <lpage>656</lpage>
          , Cambridge, MA,
          <year>2014</year>
          . AAAI Press.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>L. M. Pereira</surname>
            ,
            <given-names>E.-A.</given-names>
          </string-name>
          <string-name>
            <surname>Dietz</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <article-title>Ho¨lldobler. Contextual abductive reasoning with side-e↵ ects</article-title>
          . In I. Niemela¨, editor,
          <source>Theory and Practice of Logic Programming (TPLP)</source>
          , volume
          <volume>14</volume>
          , pages
          <fpage>633</fpage>
          -
          <lpage>648</lpage>
          ,
          <year>2014</year>
          . Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Knau</surname>
          </string-name>
          <article-title>↵ . A theory and a computational model of spatial reasoning</article-title>
          .
          <source>Psychological Review</source>
          ,
          <volume>120</volume>
          :
          <fpage>561</fpage>
          -
          <lpage>588</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>K.</given-names>
            <surname>Stenning and M. van Lambalgen</surname>
          </string-name>
          .
          <source>Human Reasoning and Cognitive Science</source>
          . MIT Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>P.</given-names>
            <surname>Wason</surname>
          </string-name>
          .
          <article-title>Reasoning about a rule</article-title>
          .
          <source>The Quarterly Journal of Experimental Psychology</source>
          ,
          <volume>20</volume>
          :
          <fpage>273</fpage>
          -
          <lpage>281</lpage>
          ,
          <year>1968</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>