=Paper=
{{Paper
|id=Vol-192/paper-9
|storemode=property
|title=Towards Determining the Subset Relation between Propositional Modal Logics
|pdfUrl=https://ceur-ws.org/Vol-192/paper09.pdf
|volume=Vol-192
}}
==Towards Determining the Subset Relation between Propositional Modal Logics==
Towards Determining the Subset Relation between
Propositional Modal Logics
Florian Rabe1,∗
1
Carnegie Mellon University, International University Bremen
July 3, 2006
Abstract
We present design and implementation of a system that tries to automatically
determine the subset relation between two given axiomatizations of almost arbi-
trary propositional modal logics, which is an open challenge problem for automated
theorem proving. A test suite shows that relatively simple strategies can lead to sat-
isfactory results, but also that certain subproblems are hard for current automated
theorem provers.
1 Introduction
Plain propositional modal logic is standard knowledge (see, e.g., [HC96]). However,
there is a fundamental problem that has not been addressed in a focussed way, namely
the automated decision whether among two given axiomatizations one is weaker or
stronger than the other one. For example, the Modal Logic $ 100 Challenge ([Sut])
calls for a program that can answer this problem for the most common Hilbert-style
axiomatizations of K, T, S1, S10 , S3, S4 and S5 (see [Hal] for an overview and a list of
references to various modal logics and axiomatizations).
In general, this problem is undecidable (see [HV89] for an example). But decidabil-
ity can be established separately for lots of modal logics (e.g., [HM92]), e.g., using a
complete Kripke semantics ([Kri63]) and methods like filtration ([Lem66]). There is a
variety of implementations (see, e.g., [HS00], [GTG02]) of theorem provers for specific
modal logics.
However, such separate implementations are relative to a specific modal logic. Some-
times the set of axioms can be varied, in particular by imposing additional restrictions
on the used Kripke frames like reflexivity and transitivity. But we are not aware of a
modal theorem prover permitting an arbitrary set of inference rules. Furthermore, to
decide whether two distinct axiomatizations generate the same logic, a decision pro-
cedure for that logic is difficult to use since it is not always clear which derived rules
it uses implicitly. Also, checking the subset relation between modal logics requires to
derive rules whereas theorem provers focus on deriving axioms.
∗
The author was supported by a fellowship for Ph.D. research of the German Academic Exchange
Service.
126 Empirically Successful Computerized Reasoning
The presented work describes a general approach to the above-mentioned challenge
problem. We provide a modular framework into which different strategies can be plugged
in. Thus incomplete strategies covering different cases can be combined. Experimental
results show that in certain cases, this works surprisingly well and identify the subprob-
lems that still present the greatest challenges.
Sect. 2 gives the main definitions, Sect. 3 and 4 describe the currently implemented
strategies, Sect. 5 introduces the system, and Sect. 6 analyzes its current and potential
future strength.
2 Definitions
We encode modal logic in first-order logic, i.e., every modal formula is a first-order
.
term. We use the following symbols for the first-order meta logic: ∀, ∃, ¬, ∧, ⇒, =.
The theory T of first-order logic with equality is defined as follows:
• primitive function symbols or (disjunction, binary), not (negation) and box (ne-
cessity, both unary),
• further function symbols and (conjunction), imp (implication), eqv (equivalence),
simp (strict implication), seqv (strict equivalence, all binary) and dia (possibility,
unary) along with equality axioms that (classically) define these symbols in terms
of the primitive ones, in particular strict implication and strict equivalence as
.
– ∀x, y simp(x, y) = box(imp(x, y)),
.
– ∀x, y seqv(x, y) = and(box(imp(x, y)), box(imp(y, x))),
• a unary predicate symbol p (expressing provability).
A modal formula is a term of this first-order language, in particular propositional
variables of modal logic are identified with first-order variables, and henceforth, just
called variables. Provability of f (X) is encoded as ∀X p(f (X)) (see below for the
implicit use of uniform substitution). Here, and throughout the paper, X abbreviates
x1 , . . . , xm .
Axiom/rule Encoding
(A → B) → (A → B) ∀x, y p imp(box(imp(x, y)), imp(box(y), box(x)))
A A→B
∀x, y (p(y) ∧ p(imp(x, y))) ⇒ p(y)
B
A
∀x (p(x) ⇒ p(box(x)))
A
Figure 1: Encoding of K
Furthermore, we define:
Empirically Successful Computerized Reasoning 127
• A rule is an additional axiom for T that is in Horn form and does not contain
equality. In other words, the rule scheme
h1 (X) ... hn (X)
c(X)
is encoded as
∀X (p(h1 (X) ∧ . . . ∧ p(hn (X))) ⇒ p(c(X)) .
If n = 0, the rule is called an axiom.
• A modal logic is an extension of T with a finite set of rules.
• A theorem of the modal logic L is a formula f (X) such that ∀X p(f (X)) is a
consequence of L. We write this as f ∈ L.
• A modal logic M is a subset of the modal logic L, written M ⊆ L, iff all theorems
of M are theorems of L.
As an example, Fig. 1 gives the common and the encoded axiomatization of the modal
logic K.
Let U S be the rule of uniform substitution, i.e., substitution of all occurrences of
a variable with the same modal formula. Then the above encoding is sound in the
following sense: If L is a modal logic in our sense arising as the encoding of a Hilbert-
style set S of axioms and rules and if f is the encoding a modal formula φ, then f ∈ L
iff φ is a theorem of S ∪ {U S}.
We only consider modal logics with the following two properties.
Firstly, the set of theorems is closed under uniform substitution. This is fundamental
for the soundness of the above encoding. We do not know of any used modal logic that
does not have this property.
Secondly, the set of theorems contains all classical propositional tautologies. This
assumption is connected to a principal simplification of the challenge problem: We do
not assume specific, let alone minimal axiomatizations for the propositional part. This
greatly increases performance without dropping too much of the original challenge. In
fact, it can be argued that proving propositional theorems from specific axiom sets
should be another challenge independent from the modal logic challenge (see for exam-
ple the problems in the Logic Calculi domain of TPTP ([SS98])). Furthermore, there
is no discussion which propositional formulas are considered theorems (except for in-
tuitionistic logic, but all modal logics considered in the challenge are classical) so that
the choice of axioms becomes just a matter of implementation. For modal logic on
the contrary, there are different applications and interpretations that naturally lead to
different and not necessarily equivalent axiomatizations.
3 Positive Criteria
The most straightforward approach would be to let a first-order theorem prover prove
the inclusion directly, e.g., by renaming the predicate p to q in one of two modal logics,
say Lp and Lq and then trying to prove ∀x(p(x) ⇒ q(x)), which corresponds to Lp ⊆ Lq .
128 Empirically Successful Computerized Reasoning
This is far from possible. Instead we break the problem down into subproblems treating
every rule of Lq separately. The resulting problems can be attacked by existing tools.
In the sequel, we present simple criteria how to do that. These criteria are not
necessarily complete and cover different situations. For the remainder of this section,
let L and M be modal logics and let M ′ be as M but with an additional rule r.
Let n = 0, i.e., r is an axiom, say r = ∀Xp(c(X)). Clearly, we have
Lemma 1. M ′ ⊆ L iff M ⊆ L and c ∈ L
This criterion can be used quite well by theorem provers. It can fail if r is complex.
The following more sophisticated criterion using relational semantics and correspondence
results can be applied less often but is successful in some cases in which Lem. 1 fails in
practice.
Lemma 2. Let
1. L be normal, i.e., K ∈ L and L is closed under MP (modus ponens) and N (ne-
cessitation) (see Fig. 2 for the formulas; most of the time we use the same names
as [Hal]),
2. F be a set of axioms of L that are Sahlqvist formulas,
3. P be the first-order property of Kripke frames completely characterized by F ,
4. c′ be the standard first-order translation of the modal formula c by making worlds
explicit,
5. c′ be first-order provable from P .
Then c ∈ L.
By standard first-order translation, we mean the relational semantics of modal logics,
e.g., P is translatated to ∀w∀x(Acc(w, x) → P (x)) for an accessibility realtion Acc.
This result is due to Sahlqvist [Sah75]. Lots of practically relevant axioms are
Sahlqvist formulas, e.g., any formula of the form A → B where B is a positive formula
and A is constructed by applying conjunction, disjuncton and possiblity to boxed atoms
and negative formulas. P can be computed from F using the SCAN algorithm ([GO92])
for second-order quantifier elimination, for which an implementation is available. We
are currently working on implementing this strategy, so far only the special case where
P does not exclude any Kripke frames is used.
Note that we cannot use relational semantics in general since Kripke semantics may
be not sound (e.g., for S1) or not complete (see, e.g., [Tho74]) for a given modal logic. It
is necessary to find a set of Kripke frames that corresponds to the modal logic and show
that this set of frames is complete for it. The above criterion gives the most important
class of modal logics where this has been done.
If r is not an axiom, the situation is more complicated. The obvious naive approach
is given by
Lemma 3. M ′ ⊆ L if M ⊆ L and r is a first-order consequence of L.
Empirically Successful Computerized Reasoning 129
Axioms
K ∀X, Y p(imp(box(imp(X, Y )), imp(box(X), box(Y ))))
T ∀X p(imp(box(X), X))
4 ∀X p(imp(box(X), box(box(X))))
B ∀X p(imp(X, box(dia(X))))
5 ∀X p(imp(dia(X), box(dia(X))))
T2 1 ∀X, Y p(eqv(dia(or(X, Y )), or(dia(X), dia(Y ))))
T2 2 ∀X p(imp(X, dia(X)))
M1 ∀X, Y p(simp(and(X, Y ), and(Y, X)))
M2, H2 ∀X, Y p(simp(and(X, Y ), X))
M3 ∀X, Y, Z p(simp(and(and(X, Y ), Z), and(X, and(Y, Z))))
M4, H1 ∀X p(simp(X, and(X, X)))
M5 ∀X, Y, Z p(simp(and(simp(X, Y ), simp(Y, Z)), simp(X, Z)))
M6, H5 ∀X p(simp(X, dia(X)))
M8 ∀X, Y p(simp(simp(X, Y ), simp(dia(X), dia(Y ))))
M9, H7 ∀X p(simp(dia(dia(X)), dia(X)))
M10 ∀X p(simp(dia(X), box(dia(X))))
AS1 6 ∀X, Y p(simp(and(X, simp(X, Y )), Y ))
H3 ∀X, Y, Z p(simp(and(and(Z, X), not(and(Y, Z))), and(X, not(Y ))))
H4 ∀X p(imp(not(dia(X)), not(X)))
H6 ∀X, Y p(simp(simp(X, Y ), simp(not(dia(Y )), not(dia(X)))))
Other Rules
MP ∀X, Y ((p(X) ∧ p(imp(X, Y ))) ⇒ p(Y ))
N ∀X (p(X) ⇒ p(box(X)))
REM ∀X, Y (p(eqv(X, Y )) ⇒ p(eqv(dia(X), dia(Y ))))
SMP ∀X, Y ((p(X) ∧ p(simp(X, Y ))) ⇒ p(Y ))
AD ∀X, Y ((p(X) ∧ p(Y )) ⇒ p(and(X, Y )))
Figure 2: Rules
130 Empirically Successful Computerized Reasoning
The opposite direction does not hold making this criterion incomplete. Essentially,
two things can go wrong.
Firstly, deriving r from L means to show that whenever L contains instances of
the hypotheses of r, it also contains the appropriate instance of the conclusion. The
necessary and sufficient condition, however, is that whenever M ′ contains instances
of the hypotheses, then L contains the appropriate instance of the conclusion. For a
trivial example, let M be empty, r be the rule ∀x(p(x) ⇒ p(not(x))), and L be any
consistent non-empty modal logic. Clearly r is not derivable from L, but M ′ is empty
(An axiomatization without axioms has no theorems.) and therefore, a subset of L.
Secondly, even if the opposite direction holds, Lem. 3 may be ineffective in practice,
namely if r is only admissible in M but not derivable. For a simple special case of that,
the following lemma gives an inductive admissibility criterion.
Lemma 4. Let r be of the form ∀x(p(x) ⇒ p(f (x))) for some formula f in one variable.
Then M ′ ⊆ L if
• M ⊆ L and
• for every rule of L with hypotheses h1 , . . . , hn and conclusion c,
n
^
∀X p(hi (X)) ∧ p(f (hi (X))) ⇒ p(f (c(X)))
i=1
is a first-order consequence of L.
This can be proven by a straightforward induction over the theorems of L (The
second assumption is just what is needed to make the induction step.). The most
important application is the case where f (x) = box(x), i.e., where r is the necessitation
rule.
Not all rules of modal logics can be easily encoded in the above way since some rules
have complicated side conditions. The most important examples are (We refer to rules
by abbreviations of their names, see Fig. 2 for the definitions.)
• substitution of strict equivalents (EQS): if f and seqv(a, b) are theorems then f ′
which is as f but with a subformula a replaced with b is a theorem,
• propositional necessitation (Ga): if a is a theorem with no occurrences of box or
dia, then box(a) is a theorem.
It is reasonable to assume that any meta-language allowing for a natural encoding
of these rules will be so strong that efficient automated solutions are unlikely. Instead
we use
Lemma 5. If M contains the rules SMP, AD, M1, M2, M4 and M5, then M enriched
with EQS has the same theorems as M enriched with the following rules:
• ∀x, y, z(p(seqv(x, y)) ⇒ p(seqv(or(z, x), or(z, y)))),
• ∀x, y, z(p(seqv(x, y)) ⇒ p(seqv(or(x, z), or(y, z)))),
Empirically Successful Computerized Reasoning 131
• ∀x, y(p(seqv(x, y)) ⇒ p(seqv(not(x), not(y)))),
• ∀x, y(p(seqv(x, y)) ⇒ p(seqv(box(x), box(y)))),
• ∀x, y((p(x) ∧ p(seqv(x, y))) ⇒ p(y)).
This can be proven by using the assumptions made about M (without EQS) to show
that strict equivalence is a congruence relation in M . That is equivalent to M being
closed under EQS (see [Por80], [Tho68]). This lemma covers the most important case,
in which EQS occurs, namely Lewis’s family S1 to S5 ([Lew18]). In other cases, we are
not able to express EQS.
A similar criterion for Ga is more complicated. While the necessary axiomatization of
a further predicate prop that expresses the side condition is trivial, this predicate would
not be preserved under uniform substitution and therefore, cannot be used. Instead a
second sort, say s2 , with function symbols for propositional logic must be used along with
with a predicate symbol t and an axiomatization such that ∀X : s2 . t(f (X)) expresses
that f is a propositional tautology. Furthermore, a function symbol i : s2 → s1 and
axioms of the form
∀x1 , x2 : s1 , y1 , y2 : s2 . (i(y1 ) = x1 ∧ i(y2 ) = x2 ) ⇒ i(and2 (y1 , y2 )) = and(x1 , x2 )
are necessary.
If all previous definitions are appropriately extended to this more general setting,
we have
Lemma 6. If L has all propositional tautologies as theorems, then L enriched with Ga
has the same theorems as L enriched with the rule ∀y : s2 .(t(y) ⇒ p(box(i(y))).
Currently, this is not supported by the implementation.
4 Negative Criteria
The simplest approach to disprove a subset relation M ⊆ L is to use a first-order model
finder to show that a theorem of M does not follow from L.
Lemma 7. If f is a theorem of M , and if there is a first-order model for L enriched
with ∃X¬p(f (X)), then M 6⊆ L.
This approach is essentially the same as using matrix models for modal logics (see,
e.g., [McK41]). It is not complete since only finite models can be checked, but this is
often sufficient in practice.
Kripke models provide another strong criterion. It is clearly not complete but suc-
cessful in many cases. The idea of this approach is to find a Kripke model m′ = (U, R, α)
such that the formulas satisfied by m′ include the theorems of L but not f for some
f ∈ M ; here U is the set of worlds, R the accessibility relation, and α an assignment of
truth values to the variables of f . Firstly, m′ must satisfy all rules of L, i.e., an instance
of the conclusion of a rule holds in all worlds whenever the appropriate instances of all
hypotheses of the rule hold in all worlds. And secondly m′ must satisfy not(f ) in one
world.
132 Empirically Successful Computerized Reasoning
Implementing that is less trivial than it sounds. If Kripke semantics is used to
translate modal logic to first-order logic, the possibility to quantify over all formulas is
lost, which is necessary to check whether a model satisfies a rule. And we are not aware
of a model finder for (monadic) second-order logic. To circumvent this problem, we fix
the number of worlds in U , say n, and proceed as follows.
We search for a first-order model m, from which m′ can be generated. The signature
for m contains constants 1, . . . , n (intended semantics: one constant per world of U ),
the constant t (intended semantics: truth value of truth; we use any of the worlds
as the truth value for falsity), and the binary predicate Acc (intended semantics: the
accessibility relation R). m must satisfy that all worlds are different from each other
and from t. Furthermore, the signature contains one constant xi for every variable x
occurring in f and for every i = 1, . . . , n (intended semantics: xi gives the value of the
assignment α to x in world i).
Let · be the following translation from the language over T to this new signature:
• ∀x F = ∀x1 , . . . , xn F ,
• the meta language connectives ∧ and ⇒ remain unchanged,
n
V
• p(f (X)) = f (X)(i) where f (X)(i) is given by the remaining cases,
i=1
• and(f1 (X), f2 (X))(i) = f1 (X)(i) ∧ f2 (X)(i) and accordingly for the other propo-
sitional connectives,
.
• x(i) = xi = t for a variable x,
n
V
• box(f1 (X))(i) = (Acc(i, j) ⇒ f1 (X)(j)),
j=1
n
W
• dia(f1 (X))(i) = (Acc(i, j) ∧ f1 (X)(j)).
j=1
Here, the intended semantics of ∀X p(f (X)) is that f holds in all worlds of m′ and that
of f (X)(i) is that f holds in the world i. Then the needed requirements for m are that
it satisfies r for all rules r of L and not(f (X))(1).
These requirements can be sent to a first-order model finder. From the generated
model m, m′ is constructed by
• U : the universe of m minus the interpretation of t,
• R: the restriction of the interpretation of Acc to U ,
• for a variable x of f and a world i of U , α(x)(i) is true if xi is equal to t in m,
and it is false otherwise.
Then we have
Lemma 8. If f is a theorem of M and there is an n such that a model for L and not(f )
as described above can be found, then M 6⊆ L.
The follows directly from the above construction.
Empirically Successful Computerized Reasoning 133
5 Implementation
The implementation of the presented criteria was done in SMLNJ ([SML]) and is avail-
able as [Rab]. It requires binary files for Vampire ([RV02]) and Paradox ([CS03]) to
be present in the current directory because these are invoked to solve the generated
subproblems.
The main function is invoked as Main.compare(f1,f2) where f1 and f2 are the
names of files containing the modal logics in TPTP syntax ([SS98]). The content of the
file definitions.tptp contains the propositional axiomatization and is added to each
logic.
compare calls both subsumes(f1,f2) and subsumes(f2,f1). Firstly,
subsumes(big,small) calls inclusion(big,small) to prove small ⊆ big. It tries all
strategies given in the list incl strategies trying to derive each rule of small as a
consequence of big. Proven rules are added to big. If all rules are proven, a proof
object is returned, otherwise the exception fail is raised.
In the latter case, the underived rules, say l, are passed to noninclusion(big,l),
which calls each disproving strategy given in the list nonincl strategies with each
element of l. If a counter-example is found a proof object is returned. compare collects
these results and outputs the final result.
Optionally, whenever an external call is carried out the user is prompted for con-
firmation. It is possible to skip a call and choose whether the program should assume
that the call has succeeded or failed.
Strategy Criterion Prover/Model finder Remarks
Direct Lem. 1, 3 Vampire
Inductive Lem. 4 Vampire
Sahlqvist Lem. 2 – not implemented yet
Containsk Lem. 2 Vampire special case of Sahlqvist, im-
plemented but not yet used in
performance test
Naivemodel Lem. 7 Paradox implemented but not yet used
in performance test
Kripke Lem. 8 Paradox
Figure 3: Strategies and provers
Strategies are functors that take a prover (or model finder) as an argument. Each
strategy implements a sufficient criterion and tries to establish it by calling the prover.
The provers are wrapper structures that invoke external first-order tools.
Strategies and provers are designed to be modular, which makes it easy to add
further strategies and provers in the future. Currently only a minimal set of strategies
is implemented, see Fig. 3. Testing showed that using the CASC competition ([PSS02])
winners Vampire and Paradox already gives quite satisfactory results.
134 Empirically Successful Computerized Reasoning
Log1 Axiomatization Log2 Axiomatization R R′ Pr. + Pr. −
K MP, N, K M MP, N, REM, ⊂ 6⊇ K
T2 1, T2 2
K MP, N, K S1 0 SMP, AD, EQS, 6= − inc.
M1-M5
S1 0 SMP, AD, EQS, S4 MP, N, K, T, 4 ⊂ 6⊇ M5
M1-M5
S1 SMP, AD, EQS, S4 MP, H1-H7 ⊂ 6⊇ M5
M1-M5, AS1.6
S3 SMP, AD, EQS, S5 MP, N, K, T, B, 4 ⊂ 6⊇ M5, M8
M1-M6, M8
S5 MP, N, K, T, 5 S5 SMP, AD, EQS, = ⊆ M5
M1-M5, M10
Figure 4: Example instances and results
6 Experimental Results
The 100 $ challenge mentions eight logics with a total of about 25 axiomatizations that
can be expressed in our encoding. This leads to about 600 combinations of logics. Fig. 4
shows the experimental results for a set of six examples. Running the program partially
for other cases showed that this set is fairly representative for difficult instances. Here,
the relationship between the logics (fifth column) is Log1 R Log2 where R ∈ {⊂, ⊃, =
, 6=}. The program’s answer R′ is given in the sixth column: For partial success of the
search, R′ can also be in {⊆, ⊇, 6⊆, 6⊇, −}. The symbol 6= denotes incomparability, and
− denotes complete failure. Note that the strategies Containsk and Naivemodelwere
not used for this test.
As can be seen, none of the cases could be solved completely. The seventh column
gives the problems with positive criteria, which consisted of rules that could not be
proven although they were provable. The eighth column gives the problems with nega-
tive criteria, which occurred only in one case where the used criterion was incomplete.
Comparing the run time shows that if a relation could be determined, this was
done relatively fast: less than 30 minutes on a 3 GHz Intel Xeon machine. And this
time was mainly spent waiting for the five-minute time limit of a failing Vampire call.
Successful Vampire calls returned results within seconds, only sometimes minutes. Even
more interesting, hardly any improvement could be observed by increasing Vampire’s
time limit: In the case of the third row, even 20 hours did not suffice to derive M5.
Since M5 is a base axiom occurring in several natural axiomatizations, this becomes an
interesting challenge problem for automated theorem proving. Calls to negative criteria
did not contribute significantly to the run time.
This shows that the run time is essentially determined by the time limit for failing
prover calls. Due to the nature of the problem, such calls occur frequently. This suggests
that a more sophisticated switching between trying to prove inclusion or non-inclusion
and varying the time limit for porver calls may lower the run time significantly.
Empirically Successful Computerized Reasoning 135
The most interesting conclusion to be drawn about proving inclusion is that the
complicated theoretical problems of rules that are only admissible but not derivable and
of the incompleteness of the criterion in Lem. 3 are less relevant than expected: Both
problems did not strike at all. All rules that could not be derived are axioms (K, M5 and
M8). For these, however, the strategy Direct is complete. Apparently even a relatively
small complexity of an axiom leads to de-facto unprovability.
As to proving non-inclusion, the incompleteness of the strategy Kripke hit twice:
Both K and M1 to M5 hold in all Kripke models and their negation can never be
satisfied. An obvious improvement of the current implementation is to apply rules that
could not be derived to axioms in order to obtain more potential counter-examples. It
is not clear if this will be successful in practice or if other approaches (like the recently
implemented strategy Naivemodel) have to be considered.
It is not clear whether the strategy Sahlqvist obeys the spirit of the 100 $ challenge:
Since it uses an external completeness result, it can be argued that the strategy uses
hidden knowledge about the problems and is not a pure theorem prover. However, the
performance of this strategy provides an enticing argument: Already the very special
case implemented in the strategy Containsk (which does not even use the Sahlqvist
results) can derive M5 in all four critical cases within seconds, and M8 can be derived
by Sahlqvist. Thus, although this strategy can never help to prove K itself or non-
normal axioms, it solves the problems in the last four rows of Fig. 4.
7 Conclusion and Future Work
We are bringing together different techniques to implement and integrate them into a
framework directed at a specific challenge problem of theorem proving. Clearly, the
current implementation is not much more than a proof of concept, but the current
version already brings promising results. Implementing the algorithm of Lem. 2 fully or
even partially will strengthen it significantly.
We also found that pure proof search without using semantical correspondence re-
sults seems to be practically incomplete for relevant problems. And the question how
to derive non-normal axioms or K is open. However, we expect that a larger set of
strategies (e.g., splitting as described in [Kra99]) will cover almost all interesting cases.
Less sophisticated possible future work includes
• utilizing different provers to exploit their respective strengths,
• tweaking, dynamically assigning or iteratively increasing the search depth, which
is now fixed (5 minutes for Vampire, 4 worlds for Kripke models),
• redesigning the main functions to minimize the time spent with failing calls, in par-
ticular dynamically switching between trying to prove inclusion or non-inclusion,
and keeping better track of positive and negative partial results,
• parallelizing external calls.
By publishing this work in progress, we hope to gain support and feedback for the
further attack of this problem.
136 Empirically Successful Computerized Reasoning
References
[CS03] K. Claessen and N. Sorensson. New techniques that improve MACE-style finite
model finding. In CADE-19 Workshop on Model Computation - Principles,
Algorithms, Applications, 2003.
[GO92] D. Gabbay and H. Ohlbach. Quantifier elimination in second-order predicate
logic. South African Computer Journal, 1992.
[GTG02] E. Giunchiglia, A. Tacchella, and F. Giunchiglia. SAT-based decision proce-
dures for classical modal logics. Journal of Automated Reasoning, 28(2):143–
171, 2002.
[Hal] J. Halleck. Logic systems. See http://www.cc.utah.edu/~nahaj/logic/
structures/systems/index.html.
[HC96] G. E. Hughes and M. J. Cresswell. A New Introduction to Modal Logic. Rout-
ledge, 1996.
[HM92] J. Y. Halpern and Y. Moses. A guide to completeness and complexity for
modal logics of knowledge and belief. Artificial Intelligence, 54:319–379, 1992.
[HS00] U. Hustadt and R. A. Schmidt. MSPASS: Modal reasoning by translation and
first-order resolution. In R. Dyckhoff, editor, Automated Reasoning with An-
alytic Tableaux and Related Methods, International Conference (TABLEAUX
2000), pages 67–71, 2000.
[HV89] J. Y. Halpern and M. Y. Vardi. The complexity of reasoning about knowledge
and time. Journal of Computer and System Sciences, 38(1):195–237, 1989.
[Kra99] M. Kracht. Tools and Techniques in Modal Logic. Elsevier, 1999.
[Kri63] S. A. Kripke. Semantical analysis of modal logic I. Normal modal propositional
calculi. Zeitschrift für Mathematische Logik und Grundlagen der Mathematik,
9:67–96, 1963.
[Lem66] E. J. Lemmon. Algebraic Semantics for Modal Logics II. The Journal of
Symbolic Logic, 31:191–218, 1966.
[Lew18] C. Lewis. A Survey of Symbolic Logic. University of California Press, 1918.
[McK41] J. C. McKinsey. A solution of the decision problem for the lewis systems
s2 and s4 with an application to topology. The Journal of Symbolic Logic,
6:117–134, 1941.
[Por80] J. Porte. Congruences in Lemmon’s S0.5. Notre Dame Journal of Formal
Logic, 21(4):672–678, 1980.
[PSS02] F. Pelletier, G. Sutcliffe, and C. Suttner. The Development of CASC. AI
Communications, 15(2-3):79–90, 2002.
Empirically Successful Computerized Reasoning 137
[Rab] F. Rabe. Determining the subset relation between propositional modal logics.
http://kwarc.eecs.iu-bremen.de/frabe/Research/moloss.
[RV02] A. Riazanov and A. Voronkov. The design and implementation of Vampire.
AI Communications, 15:91–110, 2002.
[Sah75] H. Sahlqvist. Completeness and correspondence in the first and second order
semantics for modal logic. In S. Kanger, editor, Proceedings of the Third
Scandinavian Logic Symposium, pages 110–143. North-Holland, 1975.
[SML] Standard ML of New Jersey. See http://www.smlnj.org.
[SS98] G. Sutcliffe and C. Suttner. The TPTP Problem Library: CNF Release v1.2.1.
Journal of Automated Reasoning, 21(2):177–203, 1998.
[Sut] G. Sutcliffe. The modal logic $100 challenge. See http://www.cs.miami.
edu/~tptp/HHDC/.
[Tho68] I. Thomas. Replacement in Some Modal Systems. The Journal of Symbolic
Logic, 33(4):569–570, 1968.
[Tho74] S. K. Thomason. An incompleteness theorem in modal logic. Theoria, 40:30–
34, 1974.
138 Empirically Successful Computerized Reasoning