<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Syllogistic Reasoning under the Weak Completion Semantics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ana Costa</string-name>
          <email>ana.oli.costa@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emmanuelle-Anna Dietz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ste en Holldobler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Ragni</string-name>
          <email>ragni@cognition.uni-freiburg.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International Center for Computational Logic</institution>
          ,
          <addr-line>TU Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Marco Ragni, Center for Cognitive Science</institution>
          ,
          <addr-line>Freiburg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In a recent meta-analysis, Khemlani &amp; Johnson-Laird (2012) showed that the conclusions drawn by human reasoners in psychological experiments about syllogistic reasoning are not the conclusions predicted by classical rst-order logic. Moreover, current cognitive theories deviate signi cantly from the empirical data. In this paper we show how human syllogistic reasoning can be modelled under the weak completion semantics, a new cognitive theory.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The way of how humans ought to reason correctly about syllogisms has already
been investigated by Aristotle. A syllogism consists of two quanti ed statements
using some of the four quanti ers all (A), no (E), some (I), and some are not (O)1
about sets of entities which we denote in the following by a, b, c. An example is:
Some a are b</p>
      <p>No b are c
(IE1)
and the task is to draw a conclusion. Implicitly, most experiments expect to draw
a logical consequence from these so-called premises, e.g., `some a are not c' in
classical rst-order logic (FOL). The four quanti ers and their formalization in
FOL are given in Table 1. The entities can appear in four di erent orders called
gures as shown in Table 2. Hence, a problem can be completely speci ed by
the quanti ers of the rst and second premise and the gure. E.g., the example
discussed above is denoted by IE1.</p>
      <p>
        Altogether, there are 64 syllogisms and, if formalized in FOL, we can compute
their logical consequence in classical logic. However, a meta-analysis [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] based
on six experiments has shown that humans do not only systematically deviate
from the predictions of FOL but from any other of at least 12 cognitive theories.
In the case of IE1, besides the above mentioned logical consequence, a signi cant
number of humans answered `no a are c' which does not follow from IE1 in FOL.
? The authors are mentioned in alphabetical order.
1 We are using the classical abbreviations.
a rmative universal (A)
a rmative existential (I)
negative universal (E)
negative existential (O)
      </p>
      <p>Natural Language
all a are b
some a are b
no a are b
some a are not b
8X(a(X) ! b(X))
9X(a(X) ^ b(X))
8X(a(X) ! :b(X))
9X(a(X) ^ :b(X))</p>
      <p>Short
Aab
Iab
Eab
Oab</p>
      <p>
        In recent years, a new cognitive theory based on the weak completion
semantics (WCS) has been developed. It has its roots in the ideas rst expressed
by Stenning and van Lambalgen [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], but is mathematically sound [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and has
been successfully applied { among others { to the suppression task [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the
selection task [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the belief bias e ect [
        <xref ref-type="bibr" rid="ref18 ref19 ref2">18,19,2</xref>
        ], to reasoning about conditionals
[
        <xref ref-type="bibr" rid="ref3 ref5">3,5</xref>
        ] and to spatial reasoning [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Hence, it was natural to ask whether WCS
is competitive in syllogistic reasoning and how it performs with respect to the
cognitive theories considered in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        In the following, three important cognitive approaches are presented and
compared to predictions made by WCS. Firstly, we show how to adequately
represent the syllogisms in logic programs and, secondly, we demonstrate how
to reason with respect to them. Afterwards we compare the results under the
WCS with the results of FOL, the syntactic rule based theory PSYCOP [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ],
the Verbal Model Theory [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] and the Mental Model Theory [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].2 These two
model-based theories performed the best in the meta-analysis.
      </p>
      <p>
        The predictions of the theories FOL, PSYCOP, Verbal, and Mental Models
for the syllogisms OA3, EA3, and AA4 and those of the participants, taken
from [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], are depicted in Table 3, where the participants were 156 high school
to university students. The signi cant percentage of participants means that the
number of participants who chose for the particular conclusion, was too high for
2 http://mentalmodels.princeton.edu/models/mreasoner/
OA4
EA3
      </p>
      <p>Oca</p>
      <p>Eac
AA4</p>
      <p>Aac, NVC</p>
      <p>Oca
Eac, Eca
Oac, Oca
Iac, Ica</p>
      <p>Oca, Ica, Iac</p>
      <p>Eac, Eca
Oac, Oca</p>
      <p>Iac, Ica</p>
      <p>Ocs, NVC
NVC, Eca</p>
      <p>NVC, Aca
Oca, Oac, NVC</p>
      <p>Eac, Eca
Aca, Aac,</p>
      <p>
        Iac, Ica
the conclusion to be chosen randomly.3 The interested reader is referred to [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
for more details.
      </p>
      <p>FOL and the other three cognitive theories make di erent predictions. In
particular, each theory provides at least one prediction which is correct with
respect to classical FOL and provides an additional prediction which is false with
respect to classical FOL. Currently, the best overall results are achieved by the
Verbal Models Theory which predicts 84% of the participants responses, closely
followed by the Mental Model Theory with 83%, whereas PSYCOP predicts 77%
of the participants responses.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Weak Completion Semantics</title>
      <p>
        The general notation, which we will use in the paper, is based on [
        <xref ref-type="bibr" rid="ref10 ref16">16,10</xref>
        ].
2.1
      </p>
      <sec id="sec-2-1">
        <title>Logic Programs</title>
        <p>
          We assume the reader to be familiar with logic and logic programming, but
recall basic notions and notations. A (logic) program is a nite set of (program)
clauses of the form A &gt;; A ? or A B1 ^ : : : ^ Bn; n &gt; 0, where A is
an atom, Bi, 1 i n, are literals and &gt; and ? denote truth and falsehood,
respectively. A is called head and &gt;, ? as well as B1 ^ : : : ^ Bn are called body
of the corresponding clause. Clauses of the form A &gt; and A ?4 are called
3 The threshold for the percentage to be signi cant is determined as follows: Given
that there are nine di erent conclusion possibilities, the chance that a conclusion has
been chosen randomly is 1=9 = 11:1%. A binomial test shows that if a conclusion is
drawn in more than 16% of the cases by the participants it is unlikely that is has
been chosen by just random guesses. The statistical analysis is elaborately explained
in [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
4 We consider weak completion semantics and, hence, a clause of the form A ? is
turned into A $ ? provided that this is the only clause where A is the head of.
positive and negative facts, respectively. We restrict terms to be constants and
variables only, i.e., we consider data logic programs. Throughout this paper, P
denotes a program. We assume for each P that the alphabet consists precisely
of the symbols occurring in P and that non-propositional programs contain at
least one constant.
        </p>
        <p>
          gP denotes the set of all ground instances of clauses occurring in P, where
a ground instance of clause C is obtained from C by replacing each variable
occurring in C by a term not containing any variables. A ground atom A is
de ned in gP i gP contains a clause whose head is A; otherwise A is said to be
unde ned. def (S; P) = fA Body 2 gP j A 2 S _ :A 2 Sg is called de nition
of S in P, where S is a set of ground literals. S is said to be consistent i it does
not contain a pair of complementary literals. The set of atoms occurring in gP
is denoted as atoms(P).
We consider the three-valued Lukasiewicz logic (L-logic, [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]), for which the
corresponding truth values are &gt;, ? and U, which mean true, false and unknown,
respectively. A three-valued interpretation I is a mapping from formulas to a set
of truth values f&gt;; ?; Ug. The truth value of a given formula under I is
determined according to the truth tables in Table 4. We represent an interpretation
as a pair I = hI&gt;; I?i of disjoint sets of atoms, where I&gt; is the set of all atoms
that are mapped to &gt; by I, and I? is the set of all atoms that are mapped to ?
by I. Atoms which do not occur in I&gt; [ I? are mapped to U. Let I = hI&gt;; I?i
and J = hJ &gt;; J ?i be two interpretations: I J i I&gt; J &gt; and I? J ?:
I(F ) = &gt; means that a formula F is mapped to true under I. M is a model
of P if it is an interpretation, which maps each clause occurring in gP to &gt;. I
is the least model of P i for any other model J of P it holds that I J .
1. For each ground atom A which is de ned in P, replace all clauses of the form
        </p>
        <p>A Body1; : : : ; A Bodym occurring in gP by A Body1 _ : : : _ Bodym.
2. Replace all occurrences of by $.</p>
        <p>The obtained ground program is called weak completion of P or wcP.5</p>
        <p>
          It has been shown in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] that logic programs as well as their weak completions
admit a least model under L-logic. Moreover, the least L-model of wcP can be
obtained as the least xed point of the following semantic operator, which is
due to Stenning and van Lambalgen [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]: Let I = hI&gt;; I?i be an interpretation.
        </p>
        <p>P (I) = hJ &gt;; J ?i, where</p>
        <p>J &gt; = fA j A Body 2 def (A; P) and Body is true under hI&gt;; I?ig
J ? = fA j def (A; P) 6= ; and</p>
        <p>Body is false under hI&gt;; I?i for all A
Body 2 def (A; P)g
Weak completion semantics (WCS) is the approach to consider weakly
completed logic programs and to reason with respect to the least L-models of these
programs. We write P j=wcs F i formula F holds in the least L-model of wcP.
In the remainder of this paper, MP denotes the least L-model of wcP.</p>
        <p>
          The correspondence between weak completion semantics and well-founded
semantics [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] for tight programs, i.e. those without positive cycles, is shown
in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
2.4
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Integrity Constraints</title>
        <p>
          A set of integrity constraints IC consists of clauses of the form U Body,
where Body is a conjunction of literals and U denotes the unknown.6 Hence, an
interpretation maps an integrity constraint to &gt; i Body is either mapped to U
or ?. This understanding is similar to the de nition of the integrity constraints
for the well-founded semantics in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. Given an interpretation I and a set of
integrity constraints IC, I satis es IC i all clauses in IC are true under I.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Reasoning Towards an Appropriate Logical Form</title>
      <p>We will apply four principles in developing a logical form for the representation
of syllogisms.
3.1</p>
      <sec id="sec-3-1">
        <title>Licenses for Inferences</title>
        <p>
          Stenning and van Lambalgen [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] propose to formalize conditionals in human
reasoning not by inferences straight away, but rather by licenses for inferences.
For example, the conditional if p(X) then q(X) is represented by the program
fq(X)
p(X) ^ :ab(X); ab(X)
?g;
which states that q(X) holds if p(X) and :ab(X) hold and :ab(X) holds, where
:ab(X) means that nothing is abnormal for X with respect to this clause.
5 Note that unde ned atoms are not identi ed with ? as in the completion of P [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
6 Formally, we need to extend the alphabet by this symbol.
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Existential Import and Gricean Implicature</title>
        <p>
          Humans do understand quanti ers di erently due to a pragmatic
understanding of language. For instance, in natural language we normally do not quantify
over things that do not exist. Consequently, for all implies there exists. This
appears to be in line with human reasoning and has been called the Gricean
Implicature [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Several theories like the theory of mental models [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] or
mental logic [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] assume that the sets we quantify about are not empty. Likewise,
Stenning and van Lambalgen [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] have shown that humans require existential
import for a conditional to be true. Furthermore, as mentioned in [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], the
quanti er `some a are b' often implies that `some a are not b', which again can be
explained by assuming the Gricean Implicature: Someone would not state `some
a are b' if that person knew that `all a are b'. As the person does not say `all a
are b' but instead `some a are b', we have to assume that `not all a are b', which
in turn implies `some a are not b'.
3.3
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Negation by Transformation</title>
        <p>Logic programs do not allow negative literals as heads of clauses. In order to
represent a negative conclusion :p(X) an auxiliary formula p0(X) is used together
with a clause p(X) :p0(X) and the integrity constraint U p(X) ^ p0(X).
This is a widely used technique in logic programming. Together with the
principle discussed in Section 3.1, the additional clause becomes p(X) :p0(X) ^
:abnpp(X), and its weak completion is p(X) $ :p0(X) ^ :abnpp(X), stating
that p0 is the negation of p i nothing abnormal is known with respect to that
clause. The integrity constraint states that an object cannot belong to both, p
and p0. We call this principle negation by transformation.
3.4</p>
      </sec>
      <sec id="sec-3-4">
        <title>Unknown Generalization</title>
        <p>
          Humans seem to distinguish between `some y are z ' and `some z are y ', as the
results reported in [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] show. However, if we would represent `some y are z ' by
9X(y(X) ^ z(X)) then this is semantically equivalent to 9X(z(X) ^ y(X)) in
FOL because conjunction is commutative. Likewise, humans seem to distinguish
between `some y are z ' and `all y are z ', as we have already explained in
Section 3.2. Accordingly, if we only observe that an object o belongs to y and z then
we do not want to conclude both, `some y are z ' and `all y are z '.
        </p>
        <p>In order to prevent such unwanted conclusions we introduce the following
principle: if we know that `some y are z ' then there must not only be an object o1
which belongs to y and z (by Gricean implicature) but there must be another
object o2 which belongs to y and for which it is unknown whether it belongs
to z. We call this principle unknown generalization.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Representing the Syllogisms</title>
      <p>Based on the principles presented in the previous section, we can now
represent the syllogisms by logic programs. The programs will be speci ed using the
predicates y and z and depending on the gures shown in Table 2: yz must be
replaced by ab, ba, cb or bc.
4.1
`All y are z ' is represented by the program PAyz which consists of the following
clauses:
z(X)
abyz(X)
y(o)
y(X) ^ :abyz(X)</p>
      <p>?
&gt;
The rst two clauses are obtained by applying the principle of using licenses for
inferences. The last clause follows by the principle of Gricean implicature, where
o is the object which is assumed to exist for y. The least L-model for wcPAyz is
hfy(o); z(o)g; fabyz(o)gi:
4.2
`No y are z ' is represented by the program PEyz which consists of the following
clauses:
z0(X)
abynz(X)
z(X)
y(o) &gt;
abnzz(o)
y(X) ^ :abynz(X)
The rst two clauses are obtained by applying the principle of using licenses for
inferences, where z0 is an auxiliary predicate symbol used to denote the negation
of z. This auxiliary predicate is formally related to z by the third clause applying
the principle of negation by transformation. In addition, this principle enforces
the integrity constraint. The fourth clause of PEyz follows by the principle of
Gricean implicature.</p>
      <p>The last clause cannot be generalized to all X, because otherwise we
allow conclusions by double negation. For example, consider the case where there
is some o0 for which y(o0) is false due to some clause being part of another
premise. In this case, the rst clause will enforce the falsehood of z0(o0). Now,
if abnzz(X) ? would hold, then abnzz(o0) would be false and, consequently,
by the third clause, z(o0) would be true. In other words, z(o0) follows by the
negation of y(o0), which in turn is responsible for the negation of z0(o0). Even
though this might be logically reasonable, the empirical results indicate that
participants do not infer conclusions based on double negation. Therefore, we
decided to restrict abnzz(o) ? to the objects occurring in PEyz.</p>
      <p>The least L-model for wcPEyz is</p>
      <p>hfy(o); z0(o)g; fabynx(o); abnzz(o); z(o)gi:
`Some y are z ' is represented by the program PIyz which consists of the following
clauses:
z(X)
abyz(o1)
y(o1)
y(o2)
y(X) ^ :abyz(X)</p>
      <p>?
&gt;
&gt;
The rst two clauses are again obtained by the principle of using licenses for
inferences. However, the abnormality predicate is restricted to the object o1,
which is assumed to exist by the principle of Gricean implicature (see third
clause). The fourth clause is obtained by the principle of unknown generalization.
The least L-model of wcPIyz is</p>
      <p>hfy(o1); y(o2); z(o1)g; fabyz(o1)g:
Note that nothing is stated in PIyz about abyz(o2). Accordingly, z(o2) stays
unknown in the least L-model.
4.4</p>
      <sec id="sec-4-1">
        <title>Some Are Not (O)</title>
        <p>`Some y are not z ' is represented by the program POyz which consists of the
following clauses:
In addition, we need the integrity constraint
z0(X)
abynz(o1)
z(X)
y(o1) &gt;
y(o2) &gt;
abnzz(o1)
abnzz(o2)
?
?
The rst four clauses as well as the integrity constraints are derived as in the
program PEyz except that object o1 is used instead of o and abynz is restricted to
o1 like in PIyz. The fth clause of POyz is obtained by the principle of unknown
generalization. The last two clauses are again not generalized to all objects for
the same reason as previously discussed in Section 5.2 for the representation of
E. The least L-model for wcPOyz is</p>
        <p>hfy(o1); y(o2); z0(o1)g; fabynz(o1); abnzz(o1); abnzz(o2); z(o1)gi:</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Entailment of Syllogisms</title>
      <p>We can now combine the proposed representations with respect to the gures in
Table 2. In doing so, we replace yz by ab, ba, cb or bc. In addition, we may need to
rename objects such that di erent objects are referred to in the representations
of di erent syllogisms. Thereafter, we compute the least L-model of the obtained
programs and check which syllogisms hold in this model.</p>
      <p>However, we have not yet de ned when a syllogism holds given a program P.
These de nitions will be developed in this section.</p>
      <p>
        One should observe that [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] does not contain a formal de nition for the
entailment of syllogisms. They use rst-order theory as a normative theory, i.e.,
they test if the conclusions drawn by the participants are correct with respect to a
rst-order representation of a syllogism. In the following an entailment regarding
the weak completion semantics is presented, where yz is to be replaced by ab,
ba, cb, bc, ac, or ca.
5.1
P j= Ayz i there exists an object o such that P j=wcs y(o) and for all objects o
we nd that if P j=wcs y(o) then P j=wcs z(o) ^ :abyz(o).
      </p>
      <p>The existence of an object o belonging to y is due to the principle of Gricean
implicature. Moreover, all objects belonging to y must belong to z. The
requirement that :abyz(o) is also entailed is a technical one which is based on the
principle of licences for inferences. We may omit these abnormalities to obtain
the following alternative de nition.</p>
      <p>P j=0 Ayz i there exists an object o such that P j=wcs y(o) and for all
objects o we nd that if P j=wcs y(o) then P j=wcs z(o).
P j= Eyz i there exists an object o such that P j=wcs y(o) and for all objects o
we nd that if P j=wcs y(o) then P j=wcs z0(o) ^ :z(o) ^ :abynz(o) ^ :abnzz(o).</p>
      <p>The existence of an object o belonging to y is again due to the principle of
Gricean implicature. Moreover, all objects o belonging to y must not belong to
z and, hence, :z(o) must be entailed. The remaining entailed formulas are due
to the principles of negation by transformation and of licenses for inferences. We
may omit these formulas to obtain the following alternative de nition.</p>
      <p>P j=0 Eyz i there exists an object o such that P j=wcs y(o) and for all
objects o we nd that if P j=wcs y(o) then P j=wcs :z(o).
P j= Iyz i there exists an object o1 such that P j=wcs y(o1) ^ z(o1) ^ :abyz(o1)
and there exists an object o2 such that P j=wcs y(o2) and P 6j=wcs z(o2) ^
:abyz(o2).</p>
      <p>The existence of an object o1 belonging to y is again due to the principle
of Gricean implicature. This object o1 must also belong to z. In addition, there
must be another object o2 belonging to y for which it is unknown whether it
belongs to z due to the principle of unknown generalization. The abnormality
predicates :abyz(o1) and :abyz(o2) are again due to the principle of licenses for
inferences. We may omit these abnormalities to obtain the following alternative
de nition.</p>
      <p>P j=0 Iyz i there exists an object o1 such that P j=wcs y(o1) ^ z(o1) and
there exists an object o2 such that P j=wcs y(o2) and P 6j=wcs z(o2).
5.4</p>
      <sec id="sec-5-1">
        <title>Some Are Not (O)</title>
        <p>P j= Oyz i there exists an object o1 such that P j=wcs y(o1) ^ z0(o1) ^ :z(o1) ^
:abynz(o1) ^ :abnzz(o1) and there exists an object o2 such that P j=wcs y(o2)
and P 6j=wcs z0(o2) ^ :z(o2) ^ :abynz(o2) ^ :abnzz(o2).</p>
        <p>This case combines E and I. First of all, there must be an object o1 which
belongs to y and does not belong to z. Moreover, there must be another object
o2 which belongs to y and for which it is unknown whether it belongs to z. If we
omit the abnormalities and the auxiliary predicate z0 the following alternative
de nition is obtained.</p>
        <p>P j=0 Oyz i there exists an object o1 such that P j=wcs y(o1) ^ :z(o1) and
there exists an object o2 such that P j=wcs y(o2) and P 6j=wcs :z(o2).
5.5</p>
      </sec>
      <sec id="sec-5-2">
        <title>No Valid Conclusion (NVC)</title>
        <p>When we can not conclude any of the previous moods, then we derive from P
that no valid conclusion holds.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Predictions by the Weak Completion Semantics</title>
      <p>Combining the syllogisms representation and entailment rules explained before
we accomplished an average of 85% accuracy in our predictions. In 9 cases we
have a perfect match with the answers given by the participants. In 29 cases the
match is 89% and in 21 cases the match is 78%. The ve cases left, have a match
of 67%.</p>
      <p>
        First, we will explain how the accuracy of the predictions is computed in
general. After that we will show the logic program representation of three
syllogisms with di erent predictions accuracy, and compare their results with the
data from human experiments taken from [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. In those experiments people were
asked to infer conclusions about the predicates a and c from a syllogism built
according to the gures in Table 2. Therefore, in our predictions we only consider
entailment of syllogisms between those two predicates, a and c.
      </p>
      <p>Aac, Eac, Iac, Oac, Aca, Eca, Ica, Oca and NVC.</p>
      <p>For every syllogism, we de ne a list of length 9 for the predictions of the weak
completion semantics, where the rst element represents Aac, the second element
represents Eac, and so forth. When Aac is predicted under the weak completion
semantics for a given syllogism, then the value of the rst element of this list
is a 1, otherwise it is a 0, and the same holds for the other eight elements in
the list (representing the other eight answer possibilities). Analogously, for every
syllogism we de ne a list of the participants' conclusions of length 9 containing
either 1 or 0 for all nine answer possibilities, depending on whether the majority
concluded Aac, Eac, and so forth. For each syllogism we then simply compare
each element of both lists as follows, where i is the ith element of both lists:
comp(i) =
if both lists have the same value for the ith element
otherwise
The matching percentage of this syllogism is then computed by P9
i=1 comp(i)=9.</p>
      <p>Note that the percentage of the match does not only take in account when the
weak completion semantics correctly predicts a conclusion, but also whenever
it correctly rejected a conclusion. The average percentage of accuracy is then
simply the average of the matching percentage of all 64 syllogisms.
6.2</p>
      <sec id="sec-6-1">
        <title>OA4 - Perfect Match (1.00)</title>
        <p>The syllogism OA4 is obtained by combining the last and the rst mood in
Table 1 according to the gure 4 in Table 2. It can be read as:</p>
        <sec id="sec-6-1-1">
          <title>First Premise Oba `Some b are not a'</title>
          <p>Second Premise Abc `All b are c'</p>
          <p>The program POA4 representing the two premises is obtained as the union
of the programs POba (obtained from POyz by replacing y and z by b and a,
respectively) and PAbc (obtained from PAyz by replacing y and z by b and c,
respectively). In addition, the constant o occurring in PAbc has been replaced
by o3. POA4 consists of the following clauses:</p>
          <p>?
:a0(X) ^ :abnaa(X)
b(X) ^ :abbna(X)
a0(X)
abbna(o1)
a(X)
b(o1) &gt;
b(o2) &gt;
abnaa(o1) ?
abnaa(o2) ?
c(X) b(X) ^ :abbc(X)
abbc(X) ?
b(o3)
The least L-model of POA4 is
h fb(o1); b(o2); b(o3); abca(o1); a0(o1); c(o1); c(o2); c(o3)g;</p>
          <p>fabbna(o1); abnaa(o1); abbc(o1); abbc(o2); abbc(o3); a(o1)g i:
This model entails only the conclusion `some c are not a'. We have an object
that is in c and not in a (POA4 j=wcs c(o1) and POA4 j=wcs :a(o1)) and an
object that is in c and it is not known if it is not in a (POA4 j=wcs c(o2) and
POA4 6j=wcs :a(o2)). This prediction matches perfectly with the answers from
the participants.
We will discuss now the syllogism EA3, one of the syllogisms with the lowest
match (67%). EA3 can be read as:</p>
        </sec>
        <sec id="sec-6-1-2">
          <title>First Premise Eab `No a are b' Second Premise Acb `All c are b'</title>
          <p>The program PEA3 representing the two premises is obtained as the union of the
programs PEab (obtained from PEyz by replacing y and z by a and b, respectively)
and PAcb (obtained from PEyz by replacing y and z by c and b, respectively).
In addition the constant o occurring in PEab and PAcb have been replaced by o1
and o2, respectively. PEA3 consists of the following clauses:
b0(X)
abanb(X)
b(X)
abnbb(o1)
a(o1)
b(X)
abcb(X)
c(o2)
&gt;
a(X) ^ :abanb(X)</p>
          <p>?
:b0(X) ^ :abnbb(X)
&gt;
c(X) ^ :abcb(X)</p>
          <p>?
?
The least L-model of PEA3 is
h fa(o1); c(o2); b0(o1); b(o2)g;</p>
          <p>fabanb(o1); abnbb(o1); abanb(o2); abnbb(o2); abcb(o1); abcb(o2)g i:
This model does not entail any conclusion between a and c, so our prediction is
NVC. Participants concluded both Eac and Eca.</p>
          <p>Even though none of the entailed conclusions predicted by the weak completion
semantics match to the participants' answers, a match of 67 % is computed. The
reason is that we also take into account the correct rejections, i.e. the conclusions
that are not entailed, as we have explained in Section 6.1
For AA4 we got an accuracy of 78% in our prediction. This syllogism combines
two premises in the rst mood according to the gure 4. It can be read as:</p>
        </sec>
        <sec id="sec-6-1-3">
          <title>First Premise Aba `All b are a' Second Premise Abc `All b are c'</title>
          <p>The program PAA4 representing the two premises is obtained as the union of
programs PAba (obtained from PAyz by replacing y and z by b and a, respectively)
and PAbc (obtained from PAyz by replacing y and z by b and c, respectively).
In addition the constant o occurring in PAba and PAbc have been replaced by o1
and o2, respectively. PAA4 consists of the following clauses:
a(X)
b(o1)
abba(X)
c(X)
abbc(X)
b(o2)
&gt;
&gt;
b(X) ^ :abba(X)</p>
          <p>?
b(X) ^ :abbc(X)</p>
          <p>?
The least L-model of PAA4 is
h fb(o1); b(o2); a(o1); a(o2); c(o1); c(o2)g;</p>
          <p>fabba(o1); abba(o2); abbc(o1); abbc(o2)g i:
This model entails both `all a are c' and `all c are a'. We have an object that is
in a, and for all objects that are in a (P j=wcs a(o1) and P j=wcs a(o2)) it holds
that they are also in c (P j=wcs c(o1) and P j=wcs c(o2)). Analogously this also
holds for `all c are a'. This prediction matches partially with the answers from
participants who concluded Aac and NVC.
7</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Results</title>
      <p>We discussed three examples, which we formalized under WCS. The results are
summarized and compared to FOL, PSYCOP, the Verbal, and the Mental Model
Theory in Table 5. The selected examples are typical in the sense that for some
syllogisms the conclusions drawn by the participants and WCS are identical, for
some syllogisms the conclusions drawn by the participants and WCS overlap,
and for some syllogisms the conclusions drawn by the participants and WCS are
disjoint. Moreover, WCS di ers from the other cognitive theories.
The overall result with respect to the 64 syllogisms under WCS shows that we
can predict 85% of the participants responses. Compared to the other cognitive
theories, we achieve the best performance, which closely followed by the Verbal
Models Theory (84%) and the Mental Model Theory (83%). It seems natural to
compare these theories in more detail and see where their similarities are and
where they di er.</p>
      <p>OA4
EA3
AA4</p>
      <p>Oca
Eac,
Eca
Aac,
NVC</p>
      <p>Oca
Eac, Eca
Oac, Oca
Iac, Ica
Oca, Ica, Iac</p>
      <p>Eac, Eca
Oac, Oca</p>
      <p>Iac, Ica</p>
      <p>Ocs, NVC
NVC, Eca
NVC, Aca</p>
      <p>Oca, Oac, NVC Oca</p>
      <p>Eac, Eca
Aca, Aac,</p>
      <p>Iac, Ica</p>
      <p>NVC
Aac,
Aca
Another aspect that might be interesting to investigate is whether the
combinations of the moods in uence how the participants perceive the syllogisms. For
instance, it seems that participants give di erent answers when they consider
syllogistic premises of the same mood, especially in the cases for AA and EE,
than when they consider syllogistic premises of two di erent moods. However,
this observation needs to be further examined, and can possibly give us more
insight about the human reasoning process.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>K. L.</given-names>
            <surname>Clark</surname>
          </string-name>
          .
          <article-title>Negation as failure</article-title>
          . In H. Gallaire and J. Minker, editors,
          <source>Logic and Data Bases</source>
          , volume
          <volume>1</volume>
          , pages
          <fpage>293</fpage>
          {
          <fpage>322</fpage>
          . Plenum Press, New York, NY,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          .
          <article-title>A computational logic approach to syllogisms in human reasoning</article-title>
          . In Claudia Schon Ulrich Furbach, editor,
          <source>Proceedings of the Workshop on Bridging the Gap between Human and Automated Reasoning on the 25th International Conference on Automated Deduction (CADE-25)</source>
          , pages
          <fpage>17</fpage>
          {
          <fpage>31</fpage>
          . CEUR-WS.org,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          and
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Holldobler. A new computational logic approach to reason with conditionals</article-title>
          . In F. Calimeri, G. Ianni, and M. Truszczynski, editors,
          <source>Logic Programming and Nonmonotonic Reasoning</source>
          , 13th International Conference, LPNMR, volume
          <volume>9345</volume>
          <source>of Lecture Notes in Arti cial Intelligence</source>
          , pages
          <fpage>265</fpage>
          {
          <fpage>278</fpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Holldobler, and</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>ps. A computational logic approach to human spatial reasoning</article-title>
          .
          <source>In IEEE Symposium on Human-Like Intelligence (CIHLI)</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Holldobler, and
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Pereira</surname>
          </string-name>
          .
          <article-title>On conditionals</article-title>
          . In G. Gottlob,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Sutcli e, and</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . Voronkov, editors,
          <source>Global Conference on Arti cial Intelligence</source>
          , Epic Series in Computing.
          <source>EasyChair</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Holldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the suppression task</article-title>
          . In N. Miyake,
          <string-name>
            <given-names>D.</given-names>
            <surname>Peebles</surname>
          </string-name>
          , and
          <string-name>
            <surname>R. P</surname>
          </string-name>
          . Cooper, editors,
          <source>Proceedings of the 34th Annual Conference of the Cognitive Science Society</source>
          , pages
          <fpage>1500</fpage>
          {
          <fpage>1505</fpage>
          , Austin, TX,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Holldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the abstract and the social case of the selection task</article-title>
          .
          <source>In 11th International Symposium on Logical Formalizations of Commonsense Reasoning</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Holldobler, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wernhard</surname>
          </string-name>
          .
          <article-title>Modeling the suppression task under weak completion and well-founded semantics</article-title>
          .
          <source>Journal of Applied Non-Classsical Logics</source>
          ,
          <volume>24</volume>
          (
          <issue>1</issue>
          {2):
          <volume>61</volume>
          {
          <fpage>85</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>H</given-names>
            <surname>Paul</surname>
          </string-name>
          <article-title>Grice</article-title>
          .
          <article-title>Logic and conversation. reprinted in studies in the way of words</article-title>
          , ed.
          <source>hp grice</source>
          .(
          <year>1989</year>
          ),
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. S. Holldober.
          <source>Logik und Logikprogrammierung</source>
          , volume
          <volume>1</volume>
          : Grundlagen. Synchron Publishers GmbH, Heidelberg,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. S. Holldobler and
          <string-name>
            <surname>C. D. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logic programs under three-valued Lukasiewicz semantics</article-title>
          . In P. M. Hill and D. S. Warren, editors,
          <source>Logic Programming, 25th International Conference, ICLP</source>
          <year>2009</year>
          , volume
          <volume>5649</volume>
          of Lecture Notes in Computer Science, pages
          <volume>464</volume>
          {
          <fpage>478</fpage>
          , Heidelberg,
          <year>2009</year>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. S. Holldobler and
          <string-name>
            <surname>C. D. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logics and networks for human reasoning</article-title>
          .
          <source>In International Conference on Arti cial Neural Networks, ICANN</source>
          <year>2009</year>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>II</given-names>
          </string-name>
          , pages
          <volume>85</volume>
          {
          <fpage>94</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Johnson-Laird</surname>
          </string-name>
          .
          <article-title>Mental models: towards a cognitive science of language, inference, and consciousness</article-title>
          . Harvard University Press, Cambridge, MA,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>P. N Johnson-Laird</surname>
          </string-name>
          .
          <article-title>Mental models: Towards a cognitive science of language, inference, and consciousness</article-title>
          . Harvard University Press,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>S.</given-names>
            <surname>Khemlani</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Johnson-Laird</surname>
          </string-name>
          .
          <article-title>Theories of the syllogism: A meta-analysis</article-title>
          .
          <source>Psychological Bulletin</source>
          , pages
          <volume>427</volume>
          {
          <fpage>457</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Lloyd</surname>
          </string-name>
          .
          <source>Foundations of Logic Programming</source>
          . Springer-Verlag New York, Inc., New York, NY, USA,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>Jan</given-names>
            <surname>Lukasiewicz</surname>
          </string-name>
          .
          <article-title>O logice trojwartosciowej</article-title>
          .
          <source>Ruch Filozo czny</source>
          ,
          <volume>5</volume>
          :
          <fpage>169</fpage>
          {
          <fpage>171</fpage>
          ,
          <year>1920</year>
          .
          <article-title>English translation: On three-valued logic</article-title>
          . In: Lukasiewicz J. and Borkowski L. (ed.). (
          <year>1990</year>
          ).
          <source>Selected Works</source>
          , Amsterdam: North Holland, pp.
          <volume>87</volume>
          {
          <fpage>88</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>L. M. Pereira</surname>
            ,
            <given-names>E.-A.</given-names>
          </string-name>
          <string-name>
            <surname>Dietz</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <article-title>Holldobler. An abductive reasoning approach to the belief-bias e ect</article-title>
          . In C. Baral, G. De Giacomo, and T. Eiter, editors,
          <source>Principles of Knowledge Representation and Reasoning: Proceedings of the 14th International Conference</source>
          , pages
          <volume>653</volume>
          {
          <fpage>656</fpage>
          . AAAI Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>L. M. Pereira</surname>
            ,
            <given-names>E.-A.</given-names>
          </string-name>
          <string-name>
            <surname>Dietz</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <article-title>Holldobler. Contextual abductive reasoning with side-e ects</article-title>
          . In I. Niemela, editor,
          <source>Theory and Practice of Logic Programming (TPLP)</source>
          , volume
          <volume>14</volume>
          , pages
          <fpage>633</fpage>
          {
          <fpage>648</fpage>
          . Cambridge University Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lu s M. Pereira</surname>
          </string-name>
          , Joaquim Nunes Apar cio, and Jose Julio Alferes.
          <article-title>Hypothetical reasoning with well founded semantics</article-title>
          . In B. Mayoh, editor,
          <source>Scandinavian Conference on Arti cial Intelligence: Proc. of the SCAI'91</source>
          , pages
          <fpage>289</fpage>
          {
          <fpage>300</fpage>
          . IOS Press, Amsterdam,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Thad</surname>
          </string-name>
          <article-title>A Polk and Allen Newell. Deduction as verbal reasoning</article-title>
          .
          <source>Psychological Review</source>
          ,
          <volume>102</volume>
          (
          <issue>3</issue>
          ):
          <fpage>533</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Rips</surname>
          </string-name>
          .
          <article-title>The psychology of proof: Deductive reasoning in human thinking</article-title>
          . The MIT Press, Cambridge, MA,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>K.</given-names>
            <surname>Stenning and M. van Lambalgen</surname>
          </string-name>
          .
          <article-title>Human Reasoning and Cognitive Science. A Bradford Book</article-title>
          . MIT Press, Cambridge, MA,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. Allen Van Gelder,
          <string-name>
            <given-names>Kenneth A.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <surname>and John S. Schlipf.</surname>
          </string-name>
          <article-title>The well-founded semantics for general logic programs</article-title>
          .
          <source>Journal of the ACM</source>
          ,
          <volume>38</volume>
          (
          <issue>3</issue>
          ):
          <volume>619</volume>
          {
          <fpage>649</fpage>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>