=Paper= {{Paper |id=Vol-2095/paper3 |storemode=property |title=Labelled Connection-based Proof Search for Multiplicative Intuitionistic |pdfUrl=https://ceur-ws.org/Vol-2095/paper3.pdf |volume=Vol-2095 |authors=Didier Galmiche,Daniel Mery |dblpUrl=https://dblp.org/rec/conf/cade/GalmicheM18 }} ==Labelled Connection-based Proof Search for Multiplicative Intuitionistic== https://ceur-ws.org/Vol-2095/paper3.pdf
           Labelled Connection-based Proof Search for

              Multiplicative Intuitionistic Linear Logic

                            Didier Galmiche and Daniel Méry
                                  LORIA - Université de Lorraine
                                   Campus Scientique, BP 239
                                   Vand÷uvre-lès-Nancy, France

                                             Abstract
         We propose a connection-based characterization for multiplicative intuitionistic linear
     logic (MILL) which is based on labels and constraints that capture Urquhart's possible
     world semantics of the logic. We rst briey recall the purely syntactic sequent calculus
     for MILL, which we call LMILL. Then, in the spirit of our previous results on the Logic
     of Bunched Implications (BI), we present a connection-based characterization of MILL
     provability. We show its soundness and completeness without the need for any notion of
     multiplicity. From the characterization, we nally propose a labelled sequent calculus for
     MILL.


1    Introduction
In previous works we have developed connection-based characterizations of validity in non-
classical logics like the Logic of Bunched Implications (BI) [2] and Bi-intuitionistic logic [3].
They are based on specic concepts like labels and constraints in order to capture the model
semantics and then the semantic interactions between connectives in such logics. It is an
alternative approach to the standard view of connection calculi for non-classical logics that are
based on the notion of prexes. This notion allows one to capture the non-permutabilities of
the sequent calculi rules and has been developed and improved in the context of intuitionistic
logic [9, 10] but also of modal logics [8]. There exist connection-based characterizations and
related connection methods for multiplicative (commutative) linear logic (MLL) [1, 6] but, as
far as we know, not for multiplicative intuitionistic linear logic (MILL). The connection-based
characterization proposed for fragments of Linear Logic [4] like MLL or MELL is based on
particular prexes and substitutions dedicated to these logics [6, 5]. In order to extend or adapt
it to MILL, it would be necessary to dene and consider what could be called intuitionistic and
linear prexes, which could be dicult to deal with.
    Our approach consists in specializing our above-mentioned results for BI to the Multiplica-
tive Intuitionistic Linear Logic (MILL) and then dene and illustrate a connection-based char-
acterization of provability for MILL that deals with specic labels and constraints. Then we
generate semantic structures from MILL's Urquhart's semantics [12] and develop a characteri-
zation of provability from labels and constraints that capture this semantics. It could be seen as
a generalization of the prexes more appropriate to connection-based proof search in resource
logics like BI logic or Linear Logic. Since BI is conservative over MILL [7], a connection-based
characterization for MILL can be obtained, by restriction of the previous characterization for
BI, to the multiplicative connectives. In this case, we have to take into account the notion of
multiplicity and also global conditions on the paths. The characterization for MILL proposed
here does not deal with multiplicity and only considers local conditions on the paths. In ad-
dition we dene a labelled sequent calculus for MILL, called GMILL and prove its soundness
and also its completeness by translation of MILL proofs to GMILL proofs.

ARQNL 2018                                       49                          CEUR-WS.org/Vol-2095
Labelled Connection-based Proof Search for MILL                               Didier Galmiche and Daniel Méry




                                                      Γ`C
                                  ax                            1L                       1R
                          A`A                        Γ, 1 ` C                       `1

                      Γ, A, B, ∆ ` C                            Γ`A     ∆`B
                                         ∗L                                      ∗R
                      Γ, A ∗ B, ∆ ` C                           Γ, ∆ ` A ∗ B

                    Γ ` A ∆, B ` C                               Γ, A ` B
                                         −∗L                                  −∗R
                    Γ, A −∗ B, ∆ ` C                            Γ ` A −∗ B

                                  Figure 1: Sequent Calculus for MILL


2     Multiplicative Intuitionistic Linear Logic
The propositional language of MILL consists of a denumerable set L = P, Q, . . . of proposi-
tional letters, the multiplicative unit 1 and the multiplicative connectives ∗ and −∗. P(L), the
collection of MILL propositions over L, is given by the following inductive denition:

                                        A ::= P | 1 | A ∗ A | A −∗ A.

Let us remark that since the forthcoming connection-based characterization of MILL-provability
is inspired by our previous work on BI [2], we do not use the more widespread symbols ⊗ and
−◦ to denote multiplicative conjunction and implication and rather stick with the star and
magic-wand notations of these connectives.
    Judgements of MILL are sequents of the form Γ ` A, where A is a proposition and Γ, called
the context, is a (possibly empty) multiset of formulas.
    The standard sequent calculus for MILL, which we call LMILL1 , is given in Figure 1. One
diculty with such a calculus lies in the fact that the rules for left-implication and right-
conjunction both require context splitting from conclusion to premises. Making relevant choices
when context-splitting is required is crucial for the eciency of backward proof-search.
    The semantics we use for MILL models is a possible worlds semantics à la Kripke, mainly
inspired from the operational semantics of Urquhart [12]. Let us recall it briey.
Denition 1 (MILL-frame). A MILL-frame is a partially ordered commutative monoid M =
h M, ·, e, v i, in which M is a set of worlds and v is compatible with ·, i.e.:

                       ∀m∀n ∈ M. if m v n and m0 v n0 then m · m0 v n · n0 .

Denition 2 (MILL-interpretation). A MILL-intepretation is a function J−K : L → P(M )
that satises Kripke monotonicity, i.e.:

                           ∀m, n ∈ M. if m v n and m ∈ JPK then n ∈ JPK.

Denition 3 (MILL-model). Let P(L) be the collection of MILL propositions over a language
L of propositional letters, a MILL-model is a structure R = h M, ·, e, v, J−K, |= i, in which
h M, ·, e, v i is a MILL-frame, J−K is a MILL-interpretation, and |= is a forcing relation on
M × P(L) satisfying the following conditions:
    • m |= P i m ∈ JPK
    1 In the spirit of LJ and LK for intuitionistic and classic logic, although LMILL has no labels.


2                                                      50
Labelled Connection-based Proof Search for MILL                           Didier Galmiche and Daniel Méry




    • m |= 1 i e v m
    • m |= A ∗ B i there exist n1 , n2 ∈ M such that n1 · n2 v m, n1 |= A and n2 |= B
    • m |= A −∗ B i, for all n1 , n2 ∈ M , if n1 |= A and m · n1 v n2 then n2 |= B.
Denition 4 (MILL-validity). Let R be MILL-model. A formula A is valid in R, written
R |= A, i e |= A. A is valid, written, |= A, i R |= A for all models R. A nite set of for-
mulas { A1 , . . . , An } entails a formula B, written A1 , . . . , An |= B, i |= (A1 ∗ . . . ∗ An ) −∗ B.
Theorem 1 (Soundness and Completeness). For all formulas A, |= A i ` A.

3     Labelled Connections for MILL
The connection-based characterization of MILL-provability we dene in this paper is based on
labels and constraints that capture the semantic properties of MILL-frames instead of capturing
the syntactic properties (such as permutabilities, context-splitting or linearity) of the purely
syntactic sequent calculus LMILL as the standard prex-based approach does for IL or MLL
[5, 6, 13]. We already successfully used a similar approach for BI [2], and since BI is conser-
vative w.r.t. MILL [7], the characterization in [2] also applies to MILL. However, although the
characterization for MILL presented in this paper can indeed be seen as a renement of the one
given for BI, its improvements are two-fold: rstly, it does not need any notion of multiplicity
and, secondly, it is local in that the conditions for characterizing provability are not stated
w.r.t. the global set of atomic paths but w.r.t. each atomic path individually. The locality of
the characterization is a key step towards implementing a memory-space ecient depth-rst
path-reduction strategy in a future connection-based prover for MILL. Indeed global conditions
would require us to keep the whole set of atomic paths in memory while checking provability
conditions. Since the number of atomic paths can grow exponentially large with the size of a
formula, local conditions are preferable if one wants to make a more ecient use of the memory
space (linear in the size of the initial formula).

3.1    Labels and Constraints

Given an alphabet C (for example a, b, c, · · · ), C0 , the set of atomic labels over C , is dened as
the set C extended with the unit symbol . We then dene LC , the set of labels over C , as the
smallest set containing C0 , and closed under composition (x, y ∈ LC implies xy ∈ LC ). Labels
are considered up to associativity, commutativity and identity w.r.t. . Therefore, aabcc, cbaca
and cbcaa are simply regarded as equivalent.
    A label constraint is an expression x ≤ y where x and y are labels. A constraint of the form
x ≤ x is called an axiom and we write x = y to express that x ≤ y and y ≤ x. We use the
following inference rules for reasoning on constraints:
                                    x≤z      z≤y                      x≤y     x0 ≤ y 0
                         R                         T                                     F
                  x≤x                   x≤y                              xx0 ≤ yy 0

    The R and T rules formalize the reexivity and transitivity of ≤ while the F rule corresponds
to the functoriality (also called compatibility) of label-composition w.r.t. ≤. In this formal
system, given a constraint k and a set of constraints H , we write H |≈ k if there is a deduction
of k from H . The notation H |≈ K , where K is a non-empty set of constraints, means that for
all k ∈ K , H |≈ k .

                                                    51                                                   3
Labelled Connection-based Proof Search for MILL                          Didier Galmiche and Daniel Méry




3.2    Labelled Indexed Formula Tree

Here we recall the standard notions coming from previous matrix-characterizations of provability
[6, 13]. A decomposition tree of a formula A is its representation as a syntactic tree with
nodes called positions. A position u exactly identies a subformula of A denoted f (u). An
atomic position is a position for an atomic formula. If u is a non-atomic position the principal
connective of f (u) is denoted c(u). Moreover such a position corresponds to an internal node
and we denote [u]i with i ∈ { 1, 2 } the position of the i-th child of the node corresponding to
u and then [u]? = { v | (∃i ∈ N)(v = [u]i ) }. If u is not a root position we say that u is of rank
r(u) = i if u is the i-th child of its father position denoted by [u]0 .
     The decomposition tree induces a partial order  on the positions such that the root is
the least element and if u  v then u dominates v in the tree or in the formula (from now on
we do not distinguish a formula A from its decomposition tree). Then we denote [u] ↑ the set
{ v | v ∈ A and v  u } of upward positions of u and [u] ↓ the set { v | v ∈ A and u  v } of its
downward positions. The notations [·] ↑ and [·] ↓ are easily generalized to a set s of positions by
[s] ↑ = { u | u ∈ [v] ↑ and v ∈ s } and [s] ↓ = { u | u ∈ [v] ↓ and v ∈ s }.
     For each position, we assign a polarity pol(u) but also a principal type ptyp(u) and a sec-
ondary type styp(u). Therefore, we have dierent principal types depending on the connective
and the associated polarity. We dene two principal types named πα , πβ . Given a set of
positions p, Pα (p) = { u | u ∈ p and ptyp(u) = πα } is the set of positions of type πα and
Pβ (p) = { u | u ∈ p and ptyp(u) = πβ } is the set of positions of type πβ .
Moreover we consider the following sets of secondary type positions: for i in { 1, 2 }, Sαi (p) =
{ u | u ∈ p and styp(u) = παi }, Sβ i (p) = { u | u ∈ p and styp(u) = πβ i } and Sα (p) =
Sα1 (p) ∪ Sα2 (p), Sβ (p) = Sβ 1 (p) ∪ Sβ 2 (p).
     Depending on the principal type, we associate a label slab(u) and sometimes a constraint
kon(u) to a position u . Such a label is either a position or a position with a tilde in order to
identify the formula that introduced the label. We dene constraints in order to capture context-
splitting. The labelled signed formula lsf (u) of a position u is a triple (slab(u), f (u), pol(u))
                       pol(u)
and is denoted f (u)          : slab(u). The construction of an indexed formula tree is obtained by
inductively applying the rules described in Figure 2.

                lsf (u)            ptyp(u)        kon(u)     lsf (u1 )      lsf (u2 )
                          0
                (A −∗ B) : x          πα          xu ≤ ũ    A1 : u         B0 : ũ
                       1
                (A ∗ B) : x           πα          u ũ ≤ x   A1 : u         B1 : ũ
                         1
                (A −∗ B) : x          πβ          xu ≤ ũ    A0 : u         B1 : ũ
                       0
                (A ∗ B) : x           πβ          u ũ ≤ x   A0 : u         B0 : ũ


                               Figure 2: Signed formulae for MILL

    For a given formula A the root position a0 has a polarity pol(a0 ) = 0, a label slab(a0 ) = 
                              0
and the signed formula (A) :  where  is the identity of label composition. u1 and u2 are
respectively the rst and second subpositions. The principal type of a position u depends on
its principal connective and polarity.
    The constraints associated to πα -positions are called assertions while those associated to
πβ -positions are called requirements. The atomic labels introduced by positions of principal
type πα (resp. πβ ) are called constants (resp. variables). Given a set of positions p, the
associated sets of assertions and requirements are Kα (p) = { kon(u) | u ∈ Pα (p) } and Kβ (p) =

4                                                  52
Labelled Connection-based Proof Search for MILL                                           Didier Galmiche and Daniel Méry




         Q0 : a4   R1 : ã4                 Q1 : a11 R0 : ã11         a5          a6                        a12          a13


             −∗1 : a3      S1 : ã3    P0 : a9   −∗0 : ã9                    a4          a7          a10           a11


         P1 : a1     ∗1 : ã1               ∗0 : a8    S0 : ã8        a2          a3                        a9           a14


              ∗1 : a0                            ∗0 : ã0                     a1                                    a8


                                  −∗0 :                                                        a0


     u      pol(u)      f (u)                                               ptyp(u)     styp(u)      slab(u)         kon(u)
     a0        0        (P ∗ ((Q −∗ R) ∗ S)) −∗ ((P ∗ (Q −∗ R)) ∗ S)          πα          −                         a0 ≤ ã0
     a1        1        P ∗ ((Q −∗ R) ∗ S)                                    πα         πα1           a0           a1 ã1 ≤ a0
     a2        1        P                                                     −          πα1           a1                 −
     a3        1        (Q −∗ R) ∗ S                                          πα         πα2           ã1          a3 ã3 ≤ ã1
     a4        1        Q −∗ R                                                πβ         πα1           a3           a3 a4 ≤ ã4
     a5        0        Q                                                     −          πβ 1          a4                 −
     a6        1        R                                                     −          πβ 2          ã4                −
     a7        1        S                                                     −          πα2           ã3                −
     a8        0        (P ∗ (Q −∗ R)) ∗ S                                    πβ         πα2           ã0          a8 ã8 ≤ ã0
     a9        0        P ∗ (Q −∗ R)                                          πβ         πβ 1          a8           a9 ã9 ≤ a8
     a10       0        P                                                     −          πβ 1          a9                 −
     a11       0        Q −∗ R                                                πα         πβ 2          ã9        ã9 a11 ≤ ã11
     a12       1        Q                                                     −          πα1          a11                 −
     a13       0        R                                                     −          πα2          ã11                −
     a14       0        S                                                     −          πβ 2          ã8                −


           Figure 3: Indexed formula tree of (P ∗ ((Q −∗ R) ∗ S)) −∗ ((P ∗ (Q −∗ R)) ∗ S)


{ kon(u) | u ∈ Pβ (p) } respectively. The associated sets of constants and variables are then
dened as Σα (p) = { x | x occurs in Kα (p) } and Σβ (p) = { x | x occurs in Kβ (p) }. We set
Σαβ (p) = Σα (p)∪Σβ (p) and dene Lα (p), Lβ (p) and Lαβ (p) as the sets of atomic and compound
labels generated by Σα (p), Σβ (p) and Σαβ (p) respectively. For readability, we omit the set of
positions p in notations whenever p is the set Pos of all positions.

3.2.1 An Example (part 1)
Let us consider the formula A ≡ (P ∗ ((Q −∗ R) ∗ S)) −∗ ((P ∗ (Q −∗ R)) ∗ S) that is represented as
a syntax tree each node of which being identied with a position (see the tree at the righthand
side of Figure 3). Moreover, we can associate an indexed formula tree (with labelled signed
                                                         0
formulae as nodes), inductively built from (A) :  and the rules of Figure 2. This tree is the
one at the lefthand side of Figure 3. In parallel, we have the generation of constraints for
the positions of principal type πα and πβ (see kon(u) in the table of Figure 3). Then, in this
case we can deduce that Pα = { a0 , a1 , a3 , a11 }, Pβ = { a4 , a8 , a9 }, Sα1 = { a1 , a2 , a4 , a12 },
Sβ 1 = { a5 , a9 , a10 }, Sα2 = { a3 , a7 , a8 , a13 }, Sβ 2 = { a6 , a11 , a14 }. In addition the assertions
and requirements are

                                Kα = { a0 ≤ ã0 , a1 ã1 ≤ a0 , a3 ã3 ≤ ã1 , ã9 a11 ≤ ã11 }
                                Kβ = { a8 ã8 ≤ ã0 , a9 ã9 ≤ a8 , a3 a4 ≤ ã4 }

                                                                  53                                                               5
Labelled Connection-based Proof Search for MILL                                                      Didier Galmiche and Daniel Méry




                                                                         { a0 }

                                                                       { a1 , a8 }

                                                                   { a2 , a3 , a8 }

                                                                 { a2 , a4 , a7 , a8 }

                                      { a2 , a5 , a7 , a8 }                                 { a2 , a6 , a7 , a8 }

                                 { s, a9 }                { s, a14 }                 { s0 , a 9 }          { s0 , a14 }

                    { s, a10 }               { s, a11 }                { s0 , a10 }             { s0 , a11 }

                                        { s, a12 , a13 }                                     { s0 , a12 , a13 }



                   Figure 4: Path reduction with s = a2 , a5 , a7 and s0 = a2 , a6 , a7


The constants and variables are

               Σα = { a0 , ã0 , a1 , ã1 , a3 , ã3 , a11 , ã11 }               Σβ = { a4 , ã4 , a8 , ã8 , a9 , ã9 }.

3.3     Paths and Connections

In this section, we adapt the standard notions of path, connection and spanning set of connec-
tions in the context of labels and constraints.
Denition 5 (Paths). Let A be an indexed formula. The set of paths in A is inductively
dened as follows:
    1. { a0 } is a path, where a0 is the root position.
    2. If s is a path such that u ∈ s then
          • if ptyp(u) ∈ { πα } then s\{ u } ∪ { [u]1 , [u]2 } is a path,
          • if ptyp(u) ∈ { πβ } then s\{ u } ∪ { [u]1 } and s\{ u } ∪ { [u]2 } are paths2 .
     We say that a path s0 in A is obtained from a path s by reduction on the indexed position u
if it results from s using the second clause of Denition 5. An atomic path is a path that only
contains atomic indexed positions. Consequently an atomic path is non-reducible and is always
a leaf of a path reduction tree. A conguration of A is a nite set of paths in A.
Denition 6 (Reduction). A reduction of an indexed formula A is a nite sequence (Si )1≤i≤n
of congurations in A such that Si+1 is obtained from Si by reduction of a position u in a path
s of Si following Denition 5. We say that Si+1 is obtained by reduction of Si of u in s. A
reduction (Si )1≤i≤n is said atomic if all the paths of Sn are atomic.
Denition 7 (Connection). Let A be an indexed formula, a connection c in A is:
    1. a pair h u, v i of atomic positions such that f (u) = f (v), pol(u) = 1 and pol(v) = 0, or
    2 Let us remark that the branching indicates non-determinism.


6                                                                   54
Labelled Connection-based Proof Search for MILL                                           Didier Galmiche and Daniel Méry




   2. a pair h a0 , v i such that f (v) = 1 and pol(v) = 0.
The rst case corresponds to an atomic axiom rule (ax) in LMILL, while the second one cor-
responds to the rule 1R . Let us also note that the rst position of a connection is the one with
the positive polarity.
    We denote Con the set of connections in A. The constraint kon(c) associated to a connection
c = h u, v i is dened as kon(c) = slab(u) ≤ slab(v). For a 1-connection c = h a0 , v i we have
kon(h a0 , v i) =  ≤ slab(v) since slab(a0 ) = . In order to distinguish these constraints from
the assertions and requirements they are called connection constraints. Moreover, the notions
of upward and downward positions are extended to connections as follows: c ↑ = { u, v } ↑ and
c ↓ = { u, v } ↓.
Denition 8 (MILL-cover). Let A be an indexed formula, a connection c = h u, v i in A covers
a path s in A, denoted c  s, if v ∈ s and (u 6= a0 ⇒ u ∈ s). Let S be a set of paths in A, a
cover of S is a set C = { (s, h u, v i) | s ∈ S and h u, v i ∈ Con and h u, v i  s } such that
                        (s, h u, v i) ∈ C and (s, h u0 , v 0 i) ∈ C ⇒ u = u0 and v = v 0 .
A cover of A is a cover of the set of atomic paths in A.

3.3.1 An Example (part 2)
The reduction of the initial path { a0 } results in six atomic paths as depicted in Figure 4. At
each step, we indicate the position which is reduced with an underscore. For conciseness, we
write s and s0 as shortcuts for a2 , a5 , a7 and a2 , a6 , a7 . The set C =

 { (s1 , h a2 , a10 i), (s2 , h a12 , a5 i), (s3 , h a7 , a14 i), (s4 , h a2 , a10 i), (s5 , h a6 , a13 i), (s6 , h a7 , a14 i) }

covers all atomics paths. Indeed, h a2 , a10 i covers paths s1 and s4 , h a12 , a5 i covers the path s2 ,
h a7 , a14 i covers the path s3 and s6 , h a6 , a13 i covers the path s5 . We observe that connections
h a2 , a10 i and h a7 , a14 i cover two atomic paths at the same time.

3.4     Characterizing MILL-Provability

In this section we dene a connection-based characterization of MILL-provability which relies
on the notions of substitution and certication.
Denition 9 (Substitution). Let A be an indexed formula. A substitution for A is an appli-
cation σ : Σβ → Lα , that can be extended to labels and constraints as follows:
   • xσ = x if x is a constant or if x = ,
   • (x ◦ y)σ = xσ ◦ yσ ,
   • (x ≤ y)σ = xσ ≤ yσ .
   Moreover a substitution σ for an indexed formula A induces an instantiation relation on
indexed positions, denoted ≺, such that
                          (∀u, v ∈ Pos)(u ≺ v i v ∈ Pβ and (u ⊆ vσ or ũ ⊆ vσ).
Denition 10 (Certication). Let A be an indexed formula. A certication for A is an appli-
cation γ : Pβ → ℘(Pα ) that associates a set of πα -positions with any πβ -position in A.

                                                               55                                                                   7
Labelled Connection-based Proof Search for MILL                                              Didier Galmiche and Daniel Méry




   A certication γ for an indexed formula A induces a deduction relation on indexed positions,
denoted @, such that

                                     (∀u, v ∈ Pos)(u @ v i v ∈ Pβ and u ∈ vγ).

    An expression u @ v means that v is deduced from u (in A). The relations of domination,
instantiation and deduction induce a reduction relation C= ( ∪ ≺ ∪ @)+ where (·)+ repre-
sents the transitive closure. An expression u C v means that u must be reduced before v (in
A). Now we can express the provability conditions in terms of connections.

Denition 11 (Complementarity). Let s be a path in an indexed formula A and σ be a sub-
stitution, a connection c in A is complementary in s under σ if c  s and Kα (s ↑)σ |≈ kon(c)σ .
A path s is complementary under σ if there exists a connection that is complementary in s
under σ . A cover C of a set of paths in A is complementary under σ if (∀(s, c) ∈ C) c is
complementary in s under σ .

Denition 12 (Provability). A formula A is provable if there exist a cover C of the set of
atomic paths of A, a substitution σ and a certication γ for A such that:

     1. the reduction relation C is irreexive,                                                                                (C1)

     2. ∀(s, h u, v i) ∈ C, ∀w ∈ Pβ (s ↑), wγ ⊆ Pα (s ↑),                                                                      (C2)

     3. ∀(s, h u, v i) ∈ C, ∀w ∈ Pβ (s ↑), k(wγ)σ |≈ k(w)σ ,                                                                   (C3)

     4. ∀(s, h u, v i) ∈ C, ∀x ∈ Σβ (s ↑), xσ ∈ Lα (s ↑),                                                                      (C4)

     5. ∀(s, h u, v i) ∈ C, h u, v i is complementary in s under σ .                                                           (C5)

    The rst condition induces the acyclicity of the graph associated to C and then the existence
of a reduction (decomposition) order of the formula A that respects the precedence constraints
between πα and πβ positions. The second and third conditions ensure that, in an atomic path s,
every requirement introduced by a position of principal type πβ must be introduced before the
two positions of the connection that makes the path s complementary and should be certied
by assertions corresponding to positions of principal type πα that can be reduced before this
requirement in a reduction from the initial path { a0 } to s. In a similar way the fourth condition
means that each variable, introduced before reaching the connection that makes an atomic path
complementary, is instantiated by a label composed from constants that can be reduced before
this variable in a reduction from the initial path { a0 } to s.

3.4.1 An Example (part 3)
The reduction path process from { a0 } provides the following atomic paths:
s1 = { a2 , a5 , a7 , a10 }, s2 = { a2 , a5 , a7 , a12 , a13 }, s3 = { a2 , a5 , a7 , a14 }, s4 = { a2 , a6 , a7 , a10 },
s5 = { a2 , a6 , a7 , a12 , a13 } and s6 = { a2 , a6 , a7 , a14 }.
From the following cover C =

    { (s1 , h a2 , a10 i), (s2 , h a12 , a5 i), (s3 , h a7 , a14 i), (s4 , h a2 , a10 i), (s5 , h a6 , a13 i), (s6 , h a7 , a14 i) }

we generate the set of constraints:

    KC = { (s1 , a1 ≤ a9 ), (s2 , a11 ≤ a4 ), (s3 , ã3 ≤ ã8 ), (s4 , ã1 ≤ ã9 ), (s5 , ã4 ≤ ã11 )(s6 , ã3 ≤ ã8 ) }.

8                                                                 56
Labelled Connection-based Proof Search for MILL                                               Didier Galmiche and Daniel Méry




Then we consider the substitution:

               a9 σ = a1 ,      a4 σ = a11 ,     ã8 σ = ã3 ,       ã4 σ = ã11 ,      a8 σ = X,         ã9 σ = Y

Then we solve the following requirements:
  1) a0 ≤ ã0 , a1 ã1 ≤ a0 , a3 ã3 ≤ ã1 , Y a11 ≤ ã11 |≈ a3 a11 ≤ ã11
  2) a0 ≤ ã0 , a1 ã1 ≤ a0 , a3 ã3 ≤ ã1 , Y a11 ≤ ã11 |≈ Xã3 ≤ ã0
  3) a0 ≤ ã0 , a1 ã1 ≤ a0 , a3 ã3 ≤ ã1 , Y a11 ≤ ã11 |≈ a1 Y ≤ X
From 1) we directly deduce Y = a3 and also a4 γ = { a11 }. The requirement in 1) is the one of
the position a4 and in order to verify it we use the assertion a3 a11 ≤ ã11 of position a11 . From
3) we deduce a trivial solution for X that is X = a1 a3 and also that a9 γ = ∅. Requirement 2)
is veried because we have:
                              a1 ≤ a1     a3 ã3 ≤ ã1
                                                         F
                                 a1 a3 ã3 ≤ a1 ã1              a1 ã1 ≤ a0
                                                                                T
                                               a1 a3 ã3 ≤ a0                          a0 ≤ ã0
                                                                                                     T
                                                                a1 a3 ã3 ≤ ã0

and then we deduce a8 γ = { a0 , a1 , a3 } since a0 ≤ ã0 , a1 ã1 ≤ a0 , a3 ã3 ≤ ã1 are the respective
assertions of a0 , a1 , a3 .
   In order to verify the conditions (C2) to (C5), let us consider the following table:

  (s, h u, v i)         Pβ ({ u, v } ↑) Pα (s ↑)                  Σβ ({ u, v } ↑)                  Σα (s ↑)
  (s1 , h a2 , a10 i)   a8 , a9            a0 , a1 , a3           a8 , ã8 , a9 , ã9              a0 , ã0 , a1 , ã1 , a3 , ã3
  (s2 , h a12 , a5 i)   a4 , a8 , a9       a0 , a1 , a3 , a11     a4 , ã4 , a8 , ã8 , a9 , ã9   ã0 , a1 , ã1 , a3 , ã3 , a11 , ã11
  (s3 , h a7 , a14 i)   a8 , a9            a0 , a1 , a3           a8 , ã8                         a0 , ã0 , a1 , ã1 , a3 , ã3
  (s4 , h a2 , a10 i)   a8 , a9            a0 , a1 , a3           a8 , ã8 , a9 , ã9              a0 , ã0 , a1 , ã1 , a3 , ã3
  (s5 , h a6 , a13 i)   a4 , a8 , a9       a0 , a1 , a3 , a11     a4 , ã4 , a8 , ã8 , a9 , ã9   ã0 , a1 , ã1 , a3 , ã3 , a11 , ã11
  (s6 , h a7 , a14 i)   a8 , a9            a0 , a1 , a3           a8 , ã8                         a0 , ã0 , a1 , ã1 , a3 , ã3

We have a9 γ = ∅ ⊆ Pα (s ↑) for all paths s ∈ { s1 , s2 , s4 , s5 , s6 } and a8 γ = { a0 , a1 , a3 } ⊆ Pα (s ↑)
for all paths s ∈ { s1 . . . s6 }. Moreover, for all paths s ∈ { s2 , s5 }, a4 γ = { a11 } ⊆ Pα (s ↑).
Then the condition (C2) is veried. In addition, for all paths s ∈ { s1 , s2 , s4 , s5 } we have
a9 σ = a1 ∈ Lα (s ↑) and ã9 σ = a3 ∈ Lα (s ↑) for all paths s ∈ { s1 , s2 , s3 , s4 , s5 , s6 } we have
a8 σ = a1 a3 ∈ Lα (s ↑) and ã8 σ = ã3 ∈ Lα (s ↑), and for all paths s ∈ { s2 , s5 } we have
a4 σ = a11 ∈ Lα (s ↑) and ã4 σ = ã11 ∈ Lα (s ↑).
    The last thing to do is to compute the reduction relation C that is obtained by the transitive
closure of the domination relation , the instantiation relation @ and the deduction relation @.
The instantiation relation induced by σ is

                                        a1 @ a9 , a3 @ a9 , a1 @ a8 , a11 @ a4

and the deduction relation induced by γ is

                                        a0 @ a8 , a1 @ a8 , a3 @ a8 , a11 @ a4 .

The reduction relation C is represented in Figure 5. As the graph is acyclic, A is valid in MILL.

                                                                57                                                                          9
Labelled Connection-based Proof Search for MILL                                    Didier Galmiche and Daniel Méry




                                  a5        a6                   a12         a13


                                       a4        a7        a10         a11


                                  a2        a3                   a9          a14


                                       a1                              a8


                                                      a0



              Figure 5: Reduction order for (P ∗ ((Q −∗ R) ∗ S) −∗ ((P ∗ (Q −∗ R)) ∗ S)


4      Properties of the Characterization
In this section we prove the soundness and completeness of characterization given in Deni-
tion 12. The completeness is proved by showing that any formula provable in the LMILL sequent
calculus is also provable according to the connection-based characterization (CMILL-provable).
Denition 13 (Complete reduction). Let A be an indexed formula and C be a cover of A, a
reduction (Si )1≤i≤n in A is complete for C if C is a cover of Sn .
Denition 14 (Proper reduction). Let A be an indexed formula and σ be a substitution for A,
a reduction (Si )1≤i≤n is σ -proper i
     1. ∀S ∈ (Si )1≤i≤n , ∀s ∈ S, Kα (s ↑)σ |≈ Kβ (s ↑)σ and
     2. ∀S ∈ (Si )0≤i≤n , ∀s ∈ S, ∀x ∈ Σβ (s ↑), xσ ∈ Lα (s ↑).
Denition 15 (Realization). Let A be an indexed formula and s be a path in A. An inter-
pretation of s in a resource model R = h (M, v, ·, e), |=, J  K i is a function k  k : Σα (s ↑) → M
that can be extended to labels Lα (s ↑) with kk = e and kxyk = kxk · kyk .
Given a substitution σ for A, we denote k  kσ the composed function k  k ◦ σ from the set
Lαβ (s ↑) of labels of s to the set of worlds M of R.
A realization of s is a couple (k  k, σ) such that:
     1. For all assertions x ≤ y ∈ Kα (s ↑), kxkσ v kykσ .
     2. For all positions u ∈ s such that lsf (u) = A1 : x, kxkσ |= A.
     3. For all positions u ∈ s such that lsf (u) = A0 : x, kxkσ 6|= A.
A path is realizable if there exists a realization of s in a model R. A conguration is realizable
if at least one of its paths is realizable.
Lemma 1. Let s be a path in an indexed formula A, (k  k, σ) be a realization of s in a model
R = (M, e, ·, v, |=) and K ⊆ Kα (s ↑) a subset of assertions associated to s. If Kσ |≈ (x ≤ y)σ
then kxkσ v kykσ .
Proof. By denition of a realization, for any assertion x0 ≤ y 0 of K we have kx0 kσ v ky 0 kσ .
By hypothesis, under σ , the constraint x ≤ y is deduced (in the K-deduction system) from

10                                                    58
Labelled Connection-based Proof Search for MILL                         Didier Galmiche and Daniel Méry




assertions of K by rules expressing reexivity and transitivity of ≤ and also compatibility of
label composition with ≤. Moreover, by denition of a preorder, v is reexive and transitive and
by denition of a MILL-model, world composition is compatible with v in R. Consequently, the
rules of the K-deduction system transfer the notion of realizability from premisses to conclusion.


Lemma 2. Let A be an indexed formula, σ be a substitution for A and (Si )1≤i≤n be a σ-proper
reduction for A, if Si is σ -realizable then Si+1 is σ -realizable.

Proof. As the conguration Si is realizable under σ , it contains a path s that is realizable under
σ in a model (M, e, ·, v, |=) for a interpretation k  k . Let us suppose that Si+1 is obtained by a
reduction of a position u in a path of S . If u 6∈ s then Si+1 remains realizable under σ because it
always contains the path s. Otherwise, we proceed by case analysis depending on the principal
connective of lsf (u) = Apol : x and show that Si+1 remains realizable under σ :
                    1
   • Case (B ∗ C) : x
     The path s is reduced into s0 by replacing the position u by its children positions [u]1 and
     [u]2 such that lsf ([u]1 ) = B1 : u and lsf ([u]2 ) = C1 : ũ . Then Σα (s0 ↑) = Σα (s ↑)∪{ u, ũ }
     and Kα (s0 ↑) = Kα (s ↑) ∪ { u ũ ≤ x }. By hypothesis, k  kσ is a realization of s and
     then kxkσ |= B ∗ C. Thus, by denition of |= , there exist two worlds m, n ∈ M such
     that m · n v kxkσ , m |= B and n |= C. We then extend k  k to u and ũ by dening
     kuk = m and kũk = n to obtain kukσ |= B, kũkσ |= C and ku ũkσ = kukσ · kũkσ v kxkσ .
     Consequently s0 is realizable under σ .
                    0
   • Case (B ∗ C) : x
     The path is reduced into two paths s0 and s00 such that Σβ (s0 ↑) = Σβ (s ↑) ∪ { u },
     Σβ (s00 ↑) = Σβ (s ↑) ∪ { ũ } and Kβ (s0 ↑) = Kβ (s00 ↑) = Kβ (s ↑) ∪ { u ũ ≤ x }. By hy-
     pothesis the reduction (Si )1≤i≤n is σ -proper and we have Kα (s0 ↑)σ |≈ Kβ (s0 ↑)σ and
     Kα (s00 ↑)σ |≈ Kβ (s00 ↑)σ . In particular Kα (s ↑) = Kα (s0 ↑) = Kα (s00 ↑), Kβ (s0 ↑) = Kβ (s00 ↑)
     and u ũ ≤ x ∈ Kβ (s0 ↑) entail Kα (s ↑)σ |≈ (u ũ ≤ x)σ . As k  kσ is a realization of s, we
     have kxkσ 6|= B ∗ C and from Lemma 1 we deduce kukσ ·kũkσ v kxkσ . Then, by denition
     of |= , for all worlds m, n ∈ M such that m · n v kxkσ , we have either m 6|= B or n 6|= C.
     In particular, we have either kukσ 6|= B or kũkσ 6|= C. Consequently, either s0 is realizable
     under σ or s00 is realizable under σ .

   • The other cases are similar.



Lemma 3. Let A be an indexed formula and σ be a substitution for A. If a path s is comple-
mentary under σ then it is not realizable under σ .

Proof. Let us suppose that s contains a connection h u, v i such that f (u) = f (v), pol(u) =
1, pol(v) = 0 and Kα (s ↑)σ |≈ slab(u)σ ≤ slab(v)σ . If s is realizable under σ for an inter-
pretation k  k in a model R then kslab(u)kσ |= f (u), kslab(v)kσ 6|= f (u) and kslab(u)kσ v
kslab(v)kσ , which is contradictory because by Kripke monotonicity kslab(u)kσ v kslab(v)kσ
and kslab(u)kσ |= f (u) entail kslab(v)kσ |= f (u). The case of a 1-connection is similar.

Theorem 2 (Soundness). If a formula A is CMILL-provable then it is valid.
                                                  59                                                  11
Labelled Connection-based Proof Search for MILL                                   Didier Galmiche and Daniel Méry




Proof. As A is provable, there is a cover C of the set of atomic paths of A, a substitution σ
and a certication γ for A satisfying the conditions of Denition 12.
Let us suppose that A is not valid. Then, there exists a model R = (M, e, ·, v, |=) such that
e 6|= A. The initial conguration S1 = { { a0 } } is then trivially realizable under σ by considering
the interpretation k  k the domain of which is empty. It is easy to show that conditions (C1)
to (C5) entail the existence of a reduction (Si )1≤i≤n from S1 that is complete for C , σ -proper
and such that all paths of Sn contain at least a connection of C . As S1 is realizable under σ ,
Lemma 2 entails that the conguration Sn is also realizable under σ . But then, by Lemma 3, we
deduce that Sn cannot be complementary, which is a contradiction. Therefore, A is valid.

     Let us now consider the question of completeness of this characterization.

Theorem 3 (Completeness). If a formula A is valid then A is CMILL-provable.
Proof. From the sound and completeness of MILL-models, it is sucient to prove that if A
is LMILL-provable then A is CMILL-provable (provable by the connection characterization).
The proof is by induction on a LMILL-proof of A, knowing that a sequent Γ ` A is provable
in LMILL if and only if the formula ΦΓ −∗ A is provable in LMILL, where ΦΓ is the formula
obtained by replacing each comma in the context Γ with multiplicative conjunction ∗.

     • Case ax: the axiom A ` A corresponds to the formula A −∗ A which is trivially CMILL-
       provable.

     • Case −∗R : By induction hypothesis we suppose that the sequent Γ , A ` B is provable and
       we show that the sequent Γ ` A −∗ B is also provable. If Γ, A ` B is CMILL-provable an
       atomic reduction R1 = (Si )1≤i≤n of ((ΦΓ ∗ A) −∗ B), a cover C of Sn , a substitution σ
       and a certication γ for A that satisfy the conditions of Denition 12.
       From the atomic reduction R1 for ((ΦΓ ∗A)−∗B) we can build an atomic reduction R2 for
       (ΦΓ −∗ (A −∗ B)). On the left-hand side of the next gure, we describe the rst steps of the
       reduction R1 and, on the right-hand side, we describe the rst steps of the corresponding
       reduction R2 . We represent here a path s as a set of signed formulae and not as a set of
       positions, namely we have lsf (s) = { lsf (u) | u ∈ s }.

                            { ((ΦΓ ∗ A) −∗ B)0 :  }             { (ΦΓ −∗ (A −∗ B))0 :  }

                           { (ΦΓ ∗ A)1 : a0 , B0 : ã0 }        { ΦΓ 1 : a0 , (A −∗ B)0 : ã0 }

                          { ΦΓ 1 : a1 , A1 : ã1 , B0 : ã0 }   { ΦΓ 1 : a0 , A1 : ai , B0 : ãi }

                                          ..                                    ..
                                           .                                     .
                                         R1                                    R2

       We observe that the rst reduction steps in R1 and R2 lead to paths containing the
       same signed formulae, modulo a renaming of a1 into a0 , of ã1 into ai and of ã0 into ãi .
       Consequently, modulo the renaming, we can reduce R2 by applying exactly the same
       reduction steps than for R1 . Then, after the two rst steps previously described, R1 and
       R2 introduce the same signed formulae and then the same constraints (assertions and
       requirements) between labels, modulo renaming.
       Moreover, the assertions { a0 ã0 ≤, a1 ã1 ≤ ã0 } introduced in the two rst steps of R1 entail
       relations between labels ã0 , a1 , ã1 of R1 weaker than the ones between labels a0 , ai , ãi in

12                                                        60
Labelled Connection-based Proof Search for MILL                                 Didier Galmiche and Daniel Méry




                                                                                  Γ,  ≤ x ` ∆
                                              id                           1R                     1L
             Γ, x ≤ y, A : x ` A : y, ∆              Γ,  ≤ x ` x : 1, ∆          Γ, 1 : x ` ∆

         Γ, ab ≤ x, A : a, B : b ` ∆               yz ≤ x, Γ ` A : y, ∆      yz ≤ x, Γ ` B : z, ∆
                                         ∗L                                                            ∗R
              Γ, A ∗ B : x ` ∆                                Γ, yz ≤ x ` A ∗ B : x, ∆

       Γ, xy ≤ z ` A : y, ∆        Γ, xy ≤ z, B : z ` ∆                Γ, A : a, xa ≤ b ` B : b, ∆
                                                               −∗L                                     −∗R
                  Γ, xy ≤ z, A −∗ B : x ` ∆                                 Γ ` A −∗ B : x, ∆


      Γ, x ≤ x ` ∆          Γ, x ≤ z, x ≤ y, y ≤ z ` ∆               Γ, xx0 ≤ yy 0 , x ≤ x0 , y ≤ y 0 ` ∆
                      R                                        T                                            F
         Γ`∆                    Γ, x ≤ y, y ≤ z ` ∆                        Γ, x ≤ y, x0 ≤ y 0 ` ∆


Side conditions:
 In ∗L and −∗R , the constants a and b do not occur in the conclusion.
 In R the label x must already occur in the conclusion.

                             Figure 6: Labelled Sequent Calculus GMILL


      R2 by assertions { a0 ã0 ≤, ã0 ai ≤ ãi } introduced in the two rst steps of R2 . In fact,
      R1 imposes slab(ΦΓ )slab(A) ≤ slab(B) while R2 imposes slab(ΦΓ )slab(A) = slab(B).
      Consequently, as R1 leads to a set of atomic paths satisfying the conditions of Denition
      12, it is the same for R2 by induction hypothesis.

    • Case ∗L : immediate by the translation Φ , because ΦΓ,A,B = ΦΓ,A∗B .
    • The other cases are similar.




5     A Labelled Sequent Calculus for MILL
From the previous characterization we can derive a sound and complete labelled sequent calculus
GMILL3 for MILL. Soundness and completeness are easy consequences of Theorem 2 and
Theorem 3.
    Labels and constraints for GMILL are dened similarly as in Section 3.1 except that GMILL
does not make use of variables. The sequent calculus GMILL deals with sequents of the form
Γ ` ∆ where Γ and ∆ are multisets containing labelled formulas, Γ being allowed to also contain
constraints. Labelled formulas are pairs (A, x), written A : x, where A is a formula and x is
a label. Label constraints occurring in Γ are called assertions. We denote Γr the restriction of
Γ to its constraints. GMILL does not have explicit requirements. Instead, the rules ∗R and
−∗L are required to have a specic constraint (which in the connection-based characterization

    3 The G in GMILL is reminiscent of the fact that labels and label-constraints can be viewed as a graphical
structure we usually call a resource-graph in related works.



                                                         61                                                     13
Labelled Connection-based Proof Search for MILL                                                        Didier Galmiche and Daniel Méry




                                           . . . , a1 ≤ a1 , . . . , P : a1 , . . . ` . . . , P : a1
                                                                    Π3


                                   . . . , a3 ≤ a3 , . . . , Q −∗ R : a3 , . . . ` . . . , Q −∗ R : a3
                                                                    Π4

                                                           Π3             Π4
                                                                                                                                ∗R
        a1 a3 ≤ a1 a3 , a3 ≤ a3 , . . . , a1 ≤ a1 , . . . , P : a1 , Q −∗ R : a3 , . . . ` . . . , P ∗ (Q −∗ R) : a1 a3
                                                                                                                                F
                 a3 ≤ a3 , . . . , a1 ≤ a1 , . . . , P : a1 , Q −∗ R : a3 , . . . ` . . . , P ∗ (Q −∗ R) : a1 a3
                                                                                                                       R
                       a1 a3 ã3 ≤ ã0 , . . . , P : a1 , Q −∗ R : a3 , . . . ` . . . , P ∗ (Q −∗ R) : a1 a3
                                                                   Π1


                                               ã3 ≤ ã3 , . . . , S : ã3 ` . . . , S : ã3
                                                                                                                                     R
      a1 a3 ã3 ≤ ã0 , a1 a3 ã3 ≤ a1 ã1 , a1 ≤ a1 , a3 ã3 ≤ ã1 , a1 ã1 ≤ ã0 , a0 ≤ ã0 , . . . , S : ã3 ` . . . , S : ã3
                                                                   Π2

                                                Π1                                     Π2
                                                                                                                     ∗R
                     a1 a3 ã3 ≤ ã0 , . . . , P : a1 , Q −∗ R : a3 , S : ã3 ` ((P ∗ (Q −∗ R)) ∗ S) : ã0
                                                                                                                                T
         a1 a3 ã3 ≤ a1 ã1 , . . . , a1 ã1 ≤ ã0 , . . . , P : a1 , Q −∗ R : a3 , S : ã3 ` ((P ∗ (Q −∗ R)) ∗ S) : ã0
                                                                                                                                F
                a1 ≤ a1 , a3 ã3 ≤ ã1 , . . . , P : a1 , Q −∗ R : a3 , S : ã3 ` ((P ∗ (Q −∗ R)) ∗ S) : ã0
                                                                                                                              R
           a3 ã3 ≤ ã1 , a1 ã1 ≤ ã0 , a0 ≤ ã0 , P : a1 , Q −∗ R : a3 , S : ã3 ` ((P ∗ (Q −∗ R)) ∗ S) : ã0
                  a1 ã1 ≤ ã0 , a0 ≤ ã0 , P : a1 , ((Q −∗ R) ∗ S) : ã1 ` ((P ∗ (Q −∗ R)) ∗ S) : ã0
                           a0 ≤ ã0 , (P ∗ ((Q −∗ R) ∗ S) : a0 ` ((P ∗ (Q −∗ R)) ∗ S) : ã0
                                   ` (P ∗ ((Q −∗ R) ∗ S)) −∗ ((P ∗ (Q −∗ R)) ∗ S) : 


                 Figure 7: GMILL-proof of (P ∗ ((Q −∗ R) ∗ S)) −∗ ((P ∗ (Q −∗ R)) ∗ S)


corresponds to a requirement) occuring in Γr for the rules to be applicable. The rules of the
GMILL calculus are given in Figure 6.
    From the proof of Theorem 3, one can derive a translation of LMILL-proofs into GMILL-
proofs so that for any LMILL-proof the corresponding GMILL-proof applies the same rules in
the same order. Therefore, since LMILL does not allow contraction, GMILL has no need for
it too. Moreover, conditions (C1) to (C5) given in Denition 12 imply that whenever ∗R and
−∗L need to be applied in GMILL, Γr contains enough assertions to make the rule applicable.
Therefore we have the following results.
Theorem 4. If a formula A has a proof in LMILL then it is has a proof in GMILL that follows
the same rule application strategy.
Theorem 5. A formula A is provable in LMILL i it is provable in GMILL.
     Figure 5 illustrates how GMILL works by giving an example of a derivation in the GMILL

14                                                                   62
Labelled Connection-based Proof Search for MILL                       Didier Galmiche and Daniel Méry




calculus for the formula (P ∗ ((Q −∗ R) ∗ S)) −∗ ((P ∗ (Q −∗ R)) ∗ S), which is exactly the one
prescribed by the reduction ordering we computed in the running example of Section 3.4.


6    Future Work
From this connection-based characterization of validity in MILL we will consider dierent per-
spectives. First we aim at dening a connection method for MILL from such a characterization
that mainly corresponds to the denition and implementation of an algorithm for solving our
constraints. A complementary question consist in studying how our results can be adapted or
rened to deal with other fragments of Intuitionistic Linear Logic and mainly rst-order ones
including quantications.
    The question of reconstruction of proofs in the MILL sequent calculus from our connection
calculus for MILL with labels and constraints has also to be explored w.r.t. existing techniques
[11]. Moreover, taking into account the relationships in MLL between some connection-based
characterizations and proof-nets [1], we aim at studying similar relationships for MILL and
propose new proof methods based on proof-net construction.


References
 [1] D. Galmiche. Connection Methods in Linear Logic and Proof nets Construction. Theoretical
     Computer Science, 232(1-2):231272, 2000.

 [2] D. Galmiche and D. Méry. Connection-based proof search in propositional BI logic. In 18th Int.
     Conference on Automated Deduction, CADE-18, LNAI 2392, pages 111128, 2002. Copenhagen,
     Danemark.
 [3] D. Galmiche and D. Méry. A Connection-based Characterization of Bi-intuitionistic Validity. In
     23rd Int. Conference on Automated Deduction, CADE-23, LNAI 6803, pages 253267, Wroclaw
     Poland, July 2011.
 [4] J.Y. Girard. Linear logic. Theoretical Computer Science, 50(1):1102, 1987.
 [5] C. Kreitz and H. Mantel. A matrix characterization for multiplicative exponential linear logic.
     Journal of Automated Reasoning, 32(2):121166, 2004.

 [6] C. Kreitz and J. Otten. Connection-based theorem proving in classical and non-classical logics.
     Journal of Universal Computer Science, 5(3):88112, 1999.

 [7] P.W. O'Hearn and D. Pym. The Logic of Bunched Implications. Bulletin of Symbolic Logic,
     5(2):215244, 1999.
 [8] J. Otten. Mleancop: A connection prover for rst-order modal logic. In Int. Joint Conference on
     Automated Reasoning, IJCAR 2014, LNAI 8562, pages 269276, Vienna, Austria, 2014.

 [9] J. Otten and C. Kreitz. A connection based proof method for intuitionistic logic. In 4th Workshop
     on Theorem Proving with Analytic Tableaux and Related Methods, LNAI 918, pages 122137, St
     Goar am Rhein, Germany, 1995. Springer Verlag.
[10] J. Otten and C. Kreitz. T-string-unication: unifying prexes in non classical proof methods. In
     5th Int. Workshop TABLEAUX'96, LNAI 1071, pages 244260, Terrasini, Palermo, Italy, 1996.
     Springer Verlag.
[11] S. Schmitt and C. Kreitz. Converting non-classical matrix proofs into sequent-style systems. In
     13th Int. Conference on Automated Deduction, LNAI 1104, pages 418432, New Brunswick, NJ,
     USA, 1996.
[12] A. Urquhart. Semantics for Relevant Logic. Journal of Symbolic Logic, 37:159169, 1972.
[13] L.A. Wallen. Automated Proof search in Non-Classical Logics. MIT Press, 1990.


                                                  63                                               15