<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Is Indeed Δ</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>P-complete</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jrgen Dix</string-name>
          <email>dix@in.tu-clausthal.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>What Agents Can Achieve</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Informatics, Clausthal University of Technology</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We study the model checking complexity of Alternating-time temporal logic with imperfect information and imperfect recall (atlir). Contrary to what we have stated in [11], the problem turns out to be Δ2P-complete, thus conrming the initial intuition of Schobbens [18]. We prove Δ2P-hardness through a reduction of the SNSAT problem, while the membership in Δ2P stems from the algorithm presented in [18].</p>
      </abstract>
      <kwd-group>
        <kwd>multi-agent systems</kwd>
        <kwd>model checking</kwd>
        <kwd>temporal logic</kwd>
        <kwd>strategic ability</kwd>
        <kwd>computational complexity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        ATL: Ability in Perfect Information Games
Atl is a generalization of the branching time temporal logic ctl [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], in which path quantiers
are replaced with so called cooperation modalities . Formula hhAiiϕ, where A ⊆ Agt is a coalition of
agents (Agt is the set of all agents), expresses that coalition A has a collective strategy to enforce ϕ.
Atl formulae include temporal operators: g (in the next state), (always from now on) and
U (until). Operator ♦ (now or sometime in the future) can be dened as ♦ϕ ≡ &gt; U ϕ. Like in
ctl, every occurrence of a temporal operator is immediately preceded by exactly one cooperation
modality.1 The broader language of atl∗, in which no such restriction is imposed, is not used in
this paper.
      </p>
      <p>
        A number of semantics have been dened for atl, most of them equivalent [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. In this paper,
we refer to a variant of concurrent game structures , which includes a nonempty nite set of all
agents Agt = {1, ..., k}, a nonempty set of states St, a set of atomic propositions Π, a valuation of
propositions π : Π → P(St), and the set of (atomic) actions Act. Function d : Agt × St → P(Act)
denes nonempty sets of actions available to agents at each state, and o is a (deterministic) transition
function that assigns the outcome state q0 = o(q, α1, . . . , αk) to state q and a tuple of actions
hα1, . . . , αki that can be executed by the agent in q. A strategy sa of agent a is a conditional
plan that species what a is going to do for every possible state (i.e., sa : St → Act such that
sa(q) ∈ da(q)).2 A collective strategy SA for a group of agents A ⊆ Agt is a tuple of strategies, one
per agent from A. A path λ in model M is an innite sequence of states that can be reached by
subsequent transitions, and refers to a possible course of action (or a possible computation) that
may occur in the system; by λ[i], we denote the ith position on path λ. Function out(q, SA) returns
the set of all paths that may result from agents A executing strategy SA from state q onward. Now,
informally speaking, M, q |= hhAiiϕ i there is a collective strategy SA such that ϕ holds for every
λ ∈ out(q, SA). In Section 2.3, we give a more precise semantic denition of atlir, which is the
main subject of our study.
      </p>
      <p>
        One of the most appreciated features of atl is its model checking complexity linear in the
number of transitions in the model and the length of the formula. However, after a careful
inspection, this result is not as good as it seems. This linear complexity is no more valid when we measure
the size of models in the number of states, actions and agents [
        <xref ref-type="bibr" rid="ref10 ref16">10, 16</xref>
        ], or when we represent systems
in a more compact way [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Still, we have the following.
      </p>
      <p>
        Proposition 1 ([
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]) The atl model checking problem is ptime-complete, and can be done in time
O(ml), where m is the number of transitions in the model and l is the length of the formula.
2.2
      </p>
      <p>Strategic Abilities under Incomplete Information
Atl and its models include no way of addressing uncertainty that an agent or a process may have
about the current situation. Moreover, strategies in atl can dene dierent choices for any pair
of dierent states, hence implying that an agent can recognize each (global) state of the system,
and act accordingly. Thus, it can be argued that the logic is tailored for describing and analyzing
systems in which every agent/process has complete and accurate knowledge about the current state
of the system. This is usually not the case for most application domains, where a process can
access its local state, but the state of the environment and the (local) states of other agents can be
observed only partially.</p>
      <p>
        One of the main challenges for a logic of strategic abilities under incomplete information is the
question of how agents’ knowledge should interfere with the agents’ available strategies. The early
approaches to atl with incomplete information [2, Sec.7.2],[
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ] did not handle this
interaction in a completely satisfactory way (cf. [
        <xref ref-type="bibr" rid="ref15 ref18 ref9">9, 18, 15</xref>
        ]), which triggered a urry of logics, proposed
to overcome the problems [
        <xref ref-type="bibr" rid="ref12 ref13 ref15 ref18 ref22 ref8 ref9">9, 12, 18, 15, 22, 8, 13</xref>
        ]. Most of the proposals agree that only uniform
strategies (i.e., strategies that specify the same choices in indistinguishable states) are really
executable. However, in order to identify a successful strategy, the agents must consider not only the
courses of actions starting from the current state of the system, but also those starting from states
that are indistinguishable from the current one. There are many cases here, especially when group
1The logic to which such a syntactic restriction applies is sometimes called vanilla atl (resp. vanilla ctl etc.).
2Note that in the original formulation of atl [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], strategies assign agents’ choices to sequences of states, which
suggests that agents can by denition recall the whole history of each game.
epistemics is concerned: the agents may have common, mutual or distributed knowledge about
a strategy being successful, or they may be given a hint for the right strategy by a distinguished
member (the boss), a subgroup (headquarters committee) or even another group of agents
(consulting company) etc. Most existing solutions treat only some of the cases (albeit rather in an
elegant way), while the others oer a very general treatment of the problem at the expense of
a complicated logical language (which is by no means elegant). We believe that an elegant and
general solution has been recently proposed in the form of Constructive Strategic Logic [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ],
but this claim is yet to be veried.
      </p>
      <p>Atlir stands out among the existing solutions for its simplicity. While by no means the most
expressive, we believe it can be treated as the core, minimal atl-based language for ability under
incomplete information. This is no formal statement; we just cannot think of a substantially weaker
temporal language to express abilities of agents.
2.3</p>
      <p>ATLir
Atlir includes the same formulae as atl, only the cooperation modalities are presented with a
subscript: hhAiiir to indicate that they address agents with imperfect information and imperfect
recall. Formally, the recursive denition of atlir formulae is:</p>
      <p>ϕ ::= p | ¬ϕ | ϕ ∧ ϕ | hhAiiir gϕ | hhAiiir ϕ | hhAiiirϕ U ϕ</p>
      <sec id="sec-1-1">
        <title>Again, we dene hhAiiir♦ϕ ≡ hhAiiir&gt; U ϕ.</title>
        <p>Models of atlir, imperfect information concurrent game structures (icgs), can be presented
as concurrent game structures augmented with a family of epistemic indistinguishability relations
∼a⊆ St × St, one per agent a ∈ Agt. The relations describe agents’ uncertainty: q ∼a q0 means
that, while the system is in state q, agent a considers it possible that it is in q0 now. It is required
that agents have the same choices in indistinguishable states. To recapitulate, icgs can be dened
as tuples</p>
        <p>M = hAgt, St, Π, π, Act, d, o, ∼1, ..., ∼ki,
where:
• Agt = {1, ..., k} is a nite nonempty set of all agents,
• St is a nonempty set of states,
• Π is a set of atomic propositions,
• π : Π → P(St) is a valuation of propositions,
• Act is a nite nonempty set of (atomic) actions;
• function d : Agt × St → P(Act) denes actions available to an agent in a state;
for all a ∈ Agt, q ∈ St,
d(a, q) 6= ∅
• o is a (deterministic) transition function that assigns outcome states to states and tuples of
actions; that is, o(q, α1, . . . , αk) ∈ St for every q ∈ St and hα1, . . . , αki ∈ d(1, q) × · · · × d(k, q);
• ∼1, ..., ∼k⊆ St × St are epistemic relations, one per agent. Every ∼a is assumed to be an
equivalence. We require that q ∼a q0 implies d(a, q) = d(a, q0).</p>
        <p>Again, a (memoryless) strategy of agent a is a conditional plan that species what a is going to
do in every possible state. An executable plan must prescribe the same choices for indistinguishable
states. Therefore atlir restricts the strategies that can be used by agents to the set of so called
uniform strategies. A uniform strategy of agent a is dened as a function sa : St → Act, such that:
(1) sa(q) ∈ d(a, q), and (2) if q ∼a q0 then sa(q) = sa(q0). A collective strategy for a group of agents
A = {a1, ..., ar} is a tuple of strategies SA = hsa1 , ..., sar i, one per agent from A. A collective
strategy is uniform if it contains only uniform individual strategies. Again, function out(q, SA)
returns the set of all paths that may result from agents A executing strategy SA from state q
onward:3
3The notation SA(a) stands for the strategy sa of agent a in the tuple SA = hsa1 , ..., sar i.</p>
        <p>KA QA
keep,chg keep,nop
keep,nop exch,chg
exch,nopexch,nop
exch,chg keep,chg</p>
        <p>keep,nop
ql
a
q</p>
        <p>QK
exch,chg
exch,nop
out(q, SA) = {λ = q0q1q2... | q0 = q and for every i = 1, 2, ... there exists a tuple of agents’ decisions
hα1i−1, ..., αki−1i such that αai−1 = SA(a)(qi−1) for each a ∈ A, αai−1 ∈ d(a, qi−1) for each a ∈/ A,
and o(qi−1, α1i−1, ..., αki−1) = qi}.</p>
        <p>The semantics of atlir formulae is dened as follows. The rst three lines are obvious, similar
to the denition of truth in Kripke models. While the rst states that an atomic proposition is
true in a model and a state i the valuation makes it true in this state, the next two lines dene
the usual meaning of ¬ϕ and ϕ ∧ ψ. Lines 46 dene the meaning of cooperation modalities.
M, q |= p i q ∈ π(p)
M, q |= ¬ϕ i</p>
        <p>M, q 6|= ϕ;</p>
        <p>(for p ∈ Π);
M, q |= ϕ ∧ ψ
i</p>
        <p>
          M, q |= ϕ and M, q |= ψ;
M, q |= hhAiiir gϕ i there exists a uniform strategy SA such that, for every a ∈ A, q0 ∈ St such
that q ∼a q0, and λ ∈ out(SA, q0), we have M, λ[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] |= ϕ;
M, q |= hhAiiir ϕ i there exists a uniform strategy SA such that, for every a ∈ A, q0 ∈ St such
that q ∼a q0, and λ ∈ out(SA, q0), we have M, λ[i] |= ϕ for every i ≥ 0;
M, q |= hhAiiirϕ U ψ i there exist a uniform strategy SA such that, for every a ∈ A, q0 ∈ St such
that q ∼a q0, and λ ∈ out(SA, q0), there is i ≥ 0 for which M, λ[i] |= ψ, and M, λ[j] |= ϕ for
every 0 ≤ j &lt; i.
        </p>
        <p>That is, hhAiiirϕ if coalition A has a uniform strategy, such that for every path that can possibly
result from execution of the strategy according to at least one agent from A, ϕ is the case. This is
a strong requirement, because it suces that at least one of the agents in A considers some states
q, q0 equivalent: then, all relevant paths starting from both q and q0 must be considered.</p>
        <p>Note that the universal path quantier A (for every path) from ctl can be expressed in atlir
as hh∅iiir.</p>
        <p>Example 1 (Gambling robots) Two robots (a and b) play a simple card game. The deck consists
of Ace, King and Queen ( A, K, Q). Normally, it is assumed that A is the best card, K the second
best, and Q the worst. Therefore A beats K and Q, K beats Q, and Q beats no card. At the
beginning of the game, the environment agent deals a random card to both robots (face down), so
that each player can see his own hand, but he does not know the card of the other player. Then
robot a can exchange his card for the one remaining in the deck (action exch), or he can keep the
current one (keep). At the same time, robot b can change the priorities of the cards, so that Q
becomes better than A (action chg) or he can do nothing ( nop), i.e. leave the priorities unchanged.
If a has a better card than b after that, then a win is scored, otherwise the game ends in a losing
state. An icgs M1 for the game is shown in Figure 1.</p>
        <p>It is easy to see that M1, q0 |= ¬hhaiiir♦win, because, for every a’s (uniform) strategy, if it
guarantees a win in e.g. state qAK then it fails in qAQ (and similarly for other pairs of indistinguishable
states). Let us also observe that M1, q0 |= ¬hha, biiir♦win (in order to win, a must exchange his
card in state qQK , so he must exchange his card in qQA too (by uniformity), and playing exch in
qQA leads to the losing state). On the other hand, M1, qAQ |= hha, biiir gwin (a winning strategy:
sa(qAK ) = sa(qAQ) = sa(qKQ) = keep, sb(qAQ) = sb(qKQ) = sb(qAK ) = nop; qAK , qAQ, qKQ are
the states that must be considered by a and b in qAQ). Still, M1, qAK |= ¬hha, biiir gwin.</p>
        <p>
          Schobbens [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] proved that atlir model checking is NP-hard and Δ2P-easy. He also conjectured
that the problem is Δ2P-complete. We prove that it is indeed the case in Section 3.
        </p>
        <sec id="sec-1-1-1">
          <title>Model Checking ATL ir</title>
          <p>
            Schobbens [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] proved that atlir model checking is intractable: more precisely, it is NP-hard and
Δ2P-easy when the size of the model is dened in terms of the number of transitions. He also
conjectured that the problem is Δ2P-complete. In this section, we close the gap and prove that it
is Δ2P-hard, and hence indeed Δ2P-complete. The proof proceeds by a reduction of the SNSAT
problem to atlir model checking, presented in Section 3.2.
          </p>
          <p>
            A problem is in Δ2P = PNP if it can be solved in deterministic polynomial time with subcalls to
an NP-oracle (we refer the reader to [
            <xref ref-type="bibr" rid="ref17 ref3">17, 3</xref>
            ] for more detailed information about complexity classes
and their complete problems). Class Δ2P belongs to the rst level of the polynomial hierarchy
(although the index suggests it belongs to the second level). The class is supposed to be just above
NP (unless the polynomial hierarchy collapses):
          </p>
          <p>NP ∪ co-NP ⊆ Δ2P ⊆ Σ2P ∩ Π2P.
where Σ2P = NPNP, and Π2P = co-NPNP.</p>
          <p>
            We have already investigated the complexity of atlir model checking in [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], concluding that
the problem is NP-complete. Unfortunately, our claim was incorrect: we set it right in this paper.
3.1
          </p>
          <p>
            Existing Results
Model checking atlir has been proved to be NP-hard and Δ2P-easy in the number of transitions
and the length of the formula [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]. The membership in Δ2P was demonstrated through the following
observation. If the formula to be model checked is of the form hhAiiirϕ (ϕ being gψ, ψ or ψ1 U ψ2),
where ϕ contains no more cooperation modalities, then it is sucient to guess a strategy for A,
trim the model by removing all transitions that will never be executed (according to this strategy),
and model check ctl formula Aϕ in the resulting model. Thus, model checking an arbitrary atlir
formula can be done by checking the subformulae iteratively, which requires a polynomial number
of calls to an NP algorithm.4
          </p>
          <p>
            The NP-hardness follows from a reduction of the well known SAT problem. Here, we present a
reduction which is somewhat dierent from the one in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]. We will adapt it in Section 3.2 to prove
Δ2P-hardness. In SAT, we are given a CNF formula ϕ ≡ C1 ∧ . . . ∧ Cn involving k propositional
variables from set X = {x1, ..., xk}. Each clause Ci can be written as Ci ≡ xs1i,1 ∨ . . . ∨ xski,k , where
si,j ∈ {+, −, 0}; xj+ denotes a positive occurrence of xj in Ci, xj− denotes an occurrence of ¬xj in
Ci, and xj0 indicates that xj does not occur in Ci. The problem asks if ∃X.ϕ, that is, if there is a
valuation of x1, ..., xk such that ϕ holds.
          </p>
          <p>
            We construct the corresponding icgs Mϕ as follows. There are two players: verier v and refuter
r. The refuter decides at the beginning of the game which clause Ci will have to be satised: it
is done by proceeding from the initial state q0 to a clause state qi. At qi, verier decides (by
proceeding to a proposition state qi,j ) which of the literals xjsi,j from Ci will be attempted.
Finally, at qi,j , verier attempts to prove Ci by declaring the underlying propositional variable xj
true (action &gt;) or false (action ⊥). If she succeeds (i.e., if she executes &gt; for xj+, or executes ⊥
for xj−), then the system proceeds to the winning state q&gt;. Otherwise, the system stays in qi,j .
Additionally, proposition states referring to the same variable are indistinguishable for verier, so
4The algorithm from [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] can be also used to demonstrate the upper bounds for the complexity of this problem.
yes
that she has to declare the same value of xj in all of them within a uniform strategy. A sole atlir
proposition yes holds only in the winning state q&gt;. Obviously, states corresponding to literals xj0
can be omitted from the model.
          </p>
          <p>Speaking more formally, Mϕ = hAgt, St, Π, π, Act, d, o, ∼1, ..., ∼ki, where:
• Agt = {v, r},
• St = {q0} ∪ Stcl ∪ Stprop ∪ {q&gt;},</p>
          <p>where Stcl = {q1, . . . , qn}, and Stprop = {q1,1, . . . , q1,k, . . . , qn,1, . . . , qn,k};
• Π = {yes},</p>
          <p>π(yes) = {q&gt;},
• Act = {1, ..., max(k, n), &gt;, ⊥},
• d(v, q0) = d(v, q&gt;) = {1}, d(v, qi) = {1, ..., k}, d(v, qi,j ) = {&gt;, ⊥};</p>
          <p>d(r, q) = {1, ..., n} for q = q0, and d(r, q) = {1} otherwise;
• o(q0, 1, i) = qi, o(qi, j, 1) = qi,j ,
o(qi,j , &gt;, 1) = q&gt; if si,j = +, and qi,j otherwise,
o(qi,j , ⊥, 1) = q&gt; if si,j = −, and qi,j otherwise;
• q0 ∼v q i q = q0,
qi ∼v q i q = qi,
qi,j ∼v q i q = qi0,j .</p>
          <p>As an example, model Mϕ for ϕ ≡ (x1 ∨ ¬x3) ∧ (¬x1 ∨ x2 ∨ x3) is presented in Figure 2.
Theorem 2 ϕ is satisable i</p>
          <p>Mϕ, q0 |= hhviiir♦yes.</p>
          <p>Proof.</p>
          <p>(⇒) Firstly, if there is a valuation that makes ϕ true, then for every clause Ci one can choose
a literal out of Ci that is made true by the valuation. The choice, together with the valuation,
corresponds to a uniform strategy for v such that, for all possible executions, q&gt; is achieved at the
end.</p>
          <p>(⇐) Conversely, if Mϕ, q0 |= hhviiir♦yes, then there is a strategy sv such that q&gt; is achieved for
all paths from out(q0, sv). But then the valuation, which assigns propositions x1, ..., xk with the
same values as sv, satises ϕ.</p>
          <p>Both the number of states and transitions in Mϕ are linear in the length of ϕ, and the
construction of M requires linear time too. Thus, the model checking problem for atlir is NP-hard. Note
that it is NP-hard even for formulae with a single cooperation modality, and turn-based models
with at most two agents. 5</p>
          <p>
            We already investigated the complexity of atlir model checking in [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], concluding that the
problem was NP-complete. Unfortunately, our claim was incorrect: the error occurred in the way
we handled negation in our model checking algorithm (cf. [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]). Still, as observed by Laroussinie,
Markey and Oreiby in [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ], our algorithm is correct for positive atlir i.e., atlir without
negation. Thus, the following holds.
          </p>
          <p>Proposition 3 Model checking of positive atlir is NP-complete with respect to the number of
transitions in the model and the length of the formula.</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>The Δ2P-hardness for the full atlir is proved in Section 3.2.</title>
        <p>3.2</p>
        <sec id="sec-1-2-1">
          <title>Model Checking ATLir Is Indeed Δ2P-complete</title>
          <p>
            Let us rst recall (after [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]) the denition of
          </p>
        </sec>
      </sec>
      <sec id="sec-1-3">
        <title>SNSAT, a typical Δ2P-hard problem.</title>
        <p>Denition 1 ( SNSAT)
Input: p sets of propositional variables Xr = {x1,r, ..., xk,r}, p propositional variables zr, and p
Boolean formulae ϕr in CNF, with each ϕr involving only variables in Xr ∪ {z1, ..., zr−1}, with the
following requirement:</p>
        <p>zr ≡ there exists an assignment of variables in Xr such that ϕr is true.</p>
        <p>We will also write, by abuse of notation, zr ≡ ∃Xr ϕr(z1, ..., zr−1, Xr).</p>
        <p>Output: The truth-value of zp (i.e., &gt; or ⊥).</p>
        <p>Let n be the maximal number of clauses in any ϕ1, ..., ϕp from the given input. Now, each ϕr
can be written as:
ϕr ≡ C1r ∧ . . . ∧ Cnr , and Cir ≡ xs1i,r,1 ∨ . . . ∨ xski,,rk ∨ z1sir,k+1 ∨ . . . zrs−ir,k1+r−1 .</p>
        <p>r r
Again, sir,j ∈ {+, −, 0}; x+ denotes a positive occurrence of x, x− denotes an occurrence of ¬x, and
x0 indicates that x does not occur in the clause. Similarly, sir,k+j denes the sign of zj in clause
Cr. Given such an instance of SNSAT, we construct a sequence of concurrent game structures Mr
i
for r = 1, ..., p in a similar way to the construction in Section 3.1. That is, clauses and variables
xi,r are handled in exactly the same way as before. Moreover, if zi occurs as a positive literal in
ϕr, we embed Mi in Mr, and add a transition to the initial state q0i of Mi. If ¬zi occurs in ϕr, we
do almost the same: the only dierence is that we split the transition into two steps, with a state
negir (labeled with an atlir proposition neg) added in between.</p>
        <p>More formally, Mr = hAgt, Str, Π, πr, Actr, dr, or, ∼r1, ..., ∼rki, where:
• Agt = {v, r},
• Str = {q0r, q1r, . . . , qnr, q1r,1, . . . , qnr,k, neg1r, . . . , negrr−1, q&gt;} ∪ Str−1,
• Π = {yes, neg},</p>
        <p>πr(yes) = {q&gt;},
• Actr = {1, ..., max(k + r − 1, n), &gt;, ⊥},</p>
        <p>πr(neg) = {negij | i, j = 1, ..., r},
• dr(v, q0r) = dr(v, negir) = dr(v, q&gt;) = {1}, dr(v, qir) = {1, ..., k + r − 1},
dr(v, qir,j ) = {&gt;, ⊥},
dr(r, q) = {1, ..., n} for q = q0r and {1} for the other q ∈ Str.</p>
        <p>For q ∈ Str−1, we simply include the function from Mr−1: dr(a, q) = dr−1(a, q);
• or(q0r, 1, i) = qir, or(qir, j, 1) = qir,j for j ≤ k,
or(qir, k + j, 1) = qj if sir,k+j = +, and or(qir, k + j, 1) = negjr if sir,k+j = −,
or(negjr, 1, 1) = qj ,
oorr((qqiirr,,jj ,, ⊥&gt;,, 11)) == qq&gt;&gt; iiff ssiirr,,jj == −+,, aanndd qqiirr,,jj ootthheerrwwiissee,.</p>
        <p>For q ∈ Str−1, we include the transitions from Mr−1: or(q, α) = or−1(q, α);
5In fact, it is NP-hard even for models with a single agent, although the construction must be a little dierent
to demonstrate this.
neg
x3
q
r:1
neg1
neg</p>
        <p>z1
M</p>
        <p>2
q
0
r:1
r:2
q</p>
        <p>1
q
2
neg
neg1 z
1
v:2</p>
        <p>As an example, model M3 for ϕ3 ≡ (x3 ∨ ¬z2) ∧ (¬x3 ∨ ¬z1), ϕ2 ≡ z1 ∧ ¬z1, ϕ1 ≡ (x1 ∨ x2) ∧ ¬x1,
is presented in Figure 3.</p>
        <p>Theorem 4 Let
Φ1 ≡ hhviiir(¬neg) U yes,
Φi ≡ hhviiir(¬neg) U (yes ∨ (neg ∧ A g¬Φi−1)).</p>
        <p>Now, for all r: zr is true i Mr, q0r |= Φr.</p>
        <p>Mr, q0r.</p>
        <p>Before we prove the theorem, we state an important lemma. Lemma 5 says that overlong
formulae Φi do not introduce new properties of model Mr. More precisely, a formula Φi that
includes more nestings than model Mr can be as well reduced to Φi−1 when model checked in
Lemma 5 For i ≥ r: Mr, q0r |= Φi i Mr, q0r |= Φi+1.</p>
        <p>Proof (induction on r).</p>
        <p>1. For r = 1: M1, q01 |= Φi i
include states that satisfy neg.</p>
        <p>M1, q01 |= hhviiir♦yes i M1, q01 |= Φi+1, because M1 does not
2. For r &gt; 1: Mr, q0r |= Φi+1 ≡ hhviiir(¬neg) U (yes∨(neg∧A g¬Φi)) i ∃sv∀λ ∈ out(q0r, sv)∃u
∀w ≤ u. (Mr, λ[u] |= yes or Mr, λ[u] |= neg ∧ A g¬Φi) and (Mr, λ[w] |= ¬neg) . [*]
However, each state satisfying neg has exactly one outgoing transition, so Mr, λ[u] |= neg ∧
A g¬Φi is equivalent to Mr, λ[u] |= neg and Mr, λ[u + 1] |= ¬Φi. Thus, [*] i ∃sv∀λ ∈
out(q0r, sv)∃u∀w ≤ u. (Mr, λ[u] |= yes or Mr, λ[u] |= neg and Mr, λ[u + 1] |= ¬Φi) and
(Mr, λ[w] |= ¬neg) [**].</p>
        <p>Note that, by the construction of Mr, λ[u + 1] must refer to the initial state q0j of some
submodel Mj , j &lt; r ≤ i. Thus, Mr, λ[u + 1] |= ¬Φi i Mj , q0j |= ¬Φi i (by induction)
Mj , q0j |= ¬Φi−1 i Mj , λ[u + 1] |= ¬Φi−1.</p>
        <p>So, [**] i ∃sv∀λ ∈ out(q0r, sv)∃u∀w ≤ u. (Mr, λ[u] |= yes or Mr, λ[u] |= neg and Mr, λ[u+
1] |= ¬Φi−1) and (Mr, λ[w] |= ¬neg) i Mr, q0r |= hhviiir(¬neg) U (yes∨(neg∧A g¬Φi−1)) ≡
Φi.</p>
        <p>Proof of Theorem 4 (induction on r).</p>
        <p>1. For r = 1: we use the proof of Theorem 2.
2. For r &gt; 1:</p>
        <p>For the implication from left to right ( ⇒): let zr be true: then, there is a valuation
of Xr such that ϕr holds. We construct sv as in the proof of Theorem 2. In case that some
xis has been chosen in clause Cir, we are done. In case that some zj− has been chosen in
clause Cir (note: j must be smaller than i), we have (by induction) that Mj , q0j |= ¬Φj . By
Lemma 5, also Mj , q0j |= ¬Φr, and hence Mr, q0j |= ¬Φr. So we can make the same choice
(i.e., zj−) in sv, and this will lead to state negjr, in which it holds that neg ∧ A g¬Φr.</p>
      </sec>
      <sec id="sec-1-4">
        <title>In case that some zj+ has been chosen in clause</title>
        <p>Cir, we have (by induction) that Mj , q0j |= Φj ,
and hence, by Lemma 5, Mj , q0j |= Φr. That is, there is a strategy s0v in Mj such that
(¬neg) U (yes ∨ (neg ∧ A g¬Φr−1)) holds for all paths from out(q0j , s0v). As the states in Mj
have no epistemic links to states outside of it, we can merge s0v into sv.</p>
        <p>For the other direction (⇐): let Mr, q0r |= Φr ≡ hhviiir(¬neg) U (yes ∨ (neg ∧ A g¬Φr−1)).
We take the strategy sv that enforces (¬neg) U (yes ∨ (neg ∧ A g¬Φr−1)). We rst consider
the clause Cir for which a propositional state is chosen by sv. The strategy denes a uniform
valuation for Xr that satises these clauses. For the other clauses, we have two possibilities:
• sv chooses q0j in the state corresponding to Cr. Neither yes nor neg have been encountered
i
on this path yet, so we can take sv to demonstrate that Mr, q0j |= Φr, and hence Mj , q0j |=
Φr. By Lemma 5, also Mj , q0j |= Φj . By induction, zj must be true, and hence clause
Cir is satised.
• sv chooses negjr in the state corresponding to Cr. Then, it must be that Mr, negjr |=
i
A g¬Φr−1, and hence Mj , q0j |= ¬Φr−1. By Lemma 5, also Mj , q0j |= ¬Φj . By induction,
zj must be false, and hence clause Cir (containing ¬zj ) is also satised.</p>
        <p>Thus, in order to determine the value of zp, it is sucient to model check Φp in Mp, q0p. Note
that model Mp consists of O(|ϕ|p) states and O(|ϕ|p) transitions, where |ϕ| is the maximal length
of formulae ϕ1, ..., ϕp. Moreover, the length of formula Φp is linear in p, and the construction of
Mp and Φp can be also done in time O(|ϕ|p) and O(p), respectively. In consequence, we obtain a
polynomial reduction of SNSAT to atlir model checking.</p>
        <p>Theorem 6 Model checking atlir is Δ2P-complete with respect to the number of transitions in the
model, and the length of the formula. The problem is Δ2P-complete even for turn-based models with
at most two agents.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Conclusions</title>
      <p>
        In this paper we proved that model checking of atlir formulae is Δ2P-hard, and therefore
Δ2Pcomplete. Thus, we closed an existing gap (between NP-hardness and Δ2P-easiness) in the work
of Schobbens [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], and at the same time corrected our own claim from [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        While it is possible that NP and Δ2P are identical, many believe that Δ2P is a strict superset
of NP. Still, NP and Δ2P are quite close, both belonging to the rst level of the polynomial
hierarchy. Therefore our result might seem a minor one although, technically, it was not that
trivial to prove it. On the other hand, its importance goes well beyond model checking of atlir. In
fact, Theorem 6 yields immediate corollaries with Δ2P-completeness of other logics like atol [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
Feasible atel [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], csl [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] etc., and Δ2P-hardness of etsl [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>We would like to thank Nils Bulling for careful reading of our proofs.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Henzinger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Kupferman</surname>
          </string-name>
          .
          <article-title>Alternating-time Temporal Logic</article-title>
          .
          <source>In Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS)</source>
          , pages
          <fpage>100109</fpage>
          . IEEE Computer Society Press,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Henzinger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Kupferman</surname>
          </string-name>
          .
          <article-title>Alternating-time Temporal Logic</article-title>
          .
          <source>Journal of the ACM</source>
          ,
          <volume>49</volume>
          :
          <fpage>672713</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.L.</given-names>
            <surname>BalcÆzar</surname>
          </string-name>
          , J. Diaz, and
          <string-name>
            <given-names>J.</given-names>
            <surname>Gabarr</surname>
          </string-name>
          . Structural Complexity I . Springer-Verlag,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>E.M.</given-names>
            <surname>Clarke</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.A.</given-names>
            <surname>Emerson</surname>
          </string-name>
          .
          <article-title>Design and synthesis of synchronization skeletons using branching time temporal logic</article-title>
          .
          <source>In Proceedings of Logics of Programs Workshop</source>
          , volume
          <volume>131</volume>
          of Lecture Notes in Computer Science , pages
          <fpage>5271</fpage>
          ,
          <year>1981</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Emerson</surname>
          </string-name>
          .
          <article-title>Temporal and modal logic</article-title>
          . In J. van Leeuwen, editor,
          <source>Handbook of Theoretical Computer Science</source>
          , volume B, pages
          <fpage>9951072</fpage>
          . Elsevier Science Publishers,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Goranko</surname>
          </string-name>
          .
          <article-title>Coalition games and alternating temporal logics</article-title>
          . In J. van Benthem, editor,
          <source>Proceedings of TARK VIII</source>
          , pages
          <fpage>259272</fpage>
          . Morgan Kaufmann,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Goranko</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          .
          <article-title>Comparing semantics of logics for multi-agent systems</article-title>
          .
          <source>Synthese</source>
          ,
          <volume>139</volume>
          (
          <issue>2</issue>
          ):
          <fpage>241280</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Herzig</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Troquard</surname>
          </string-name>
          .
          <article-title>Knowing how to play: Uniform choices in logics of agency</article-title>
          .
          <source>In Proceedings of AAMAS'06</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          .
          <article-title>Some remarks on alternating temporal epistemic logic</article-title>
          . In B.
          <string-name>
            <surname>Dunin-Keplicz</surname>
          </string-name>
          and R. Verbrugge, editors,
          <source>Proceedings of Formal Approaches to Multi-Agent Systems (FAMAS</source>
          <year>2003</year>
          ), pages
          <fpage>133140</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Dix</surname>
          </string-name>
          .
          <article-title>Do agents make model checking explode (computationally)? In M. Pechoucek</article-title>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Petta</surname>
          </string-name>
          , and L.Z. Varga, editors,
          <source>Proceedings of CEEMAS</source>
          <year>2005</year>
          , volume
          <volume>3690</volume>
          of Lecture Notes in Computer Science , pages
          <fpage>398407</fpage>
          . Springer Verlag,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Dix</surname>
          </string-name>
          .
          <article-title>Model checking strategic abilities of agents under incomplete information</article-title>
          . In M. Coppo, E. Lodi, and G.M. Pinna, editors,
          <source>Proceedings of ICTCS</source>
          <year>2005</year>
          , volume
          <volume>3701</volume>
          of Lecture Notes in Computer Science , pages
          <fpage>295308</fpage>
          . Springer Verlag,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          and W. van der Hoek.
          <article-title>Agents that know how to play</article-title>
          .
          <source>Fundamenta Informaticae</source>
          ,
          <volume>63</volume>
          (
          <issue>23</issue>
          ):
          <fpage>185219</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          and Thomas ¯gotnes.
          <article-title>Constructive knowledge: What agents can achieve under incomplete information</article-title>
          .
          <source>Technical Report IfI-05-10</source>
          , Clausthal University of Technology,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Wojciech</given-names>
            <surname>Jamroga</surname>
          </string-name>
          and
          <article-title>Thomas ¯gotnes. What agents can achieve under incomplete information</article-title>
          .
          <source>In Proceedings of AAMAS'06</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Jonker</surname>
          </string-name>
          .
          <article-title>Feasible strategies in Alternating-time Temporal Epistemic Logic</article-title>
          .
          <source>Master thesis</source>
          , University of Utrecht,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>F.</given-names>
            <surname>Laroussinie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Markey</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Oreiby</surname>
          </string-name>
          .
          <article-title>Expressiveness and complexity of ATL</article-title>
          .
          <source>Technical Report LSV-06-03</source>
          , CNRS &amp; ENS Cachan, France,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.H.</given-names>
            <surname>Papadimitriou</surname>
          </string-name>
          . Computational Complexity . Addison Wesley : Reading,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P. Y.</given-names>
            <surname>Schobbens</surname>
          </string-name>
          .
          <article-title>Alternating-time logic with imperfect recall</article-title>
          .
          <source>Electronic Notes in Theoretical Computer Science</source>
          ,
          <volume>85</volume>
          (
          <issue>2</issue>
          ),
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>W. van der Hoek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lomuscio</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          .
          <article-title>On the complexity of practical ATL model checking</article-title>
          . In P. Stone and G. Weiss, editors,
          <source>Proceedings of AAMAS'06</source>
          , pages
          <fpage>201208</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>W. van der Hoek and M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          .
          <article-title>Tractable multiagent planning for epistemic goals</article-title>
          . In C. Castelfranchi and W.L. Johnson, editors,
          <source>Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-02)</source>
          , pages
          <fpage>11671174</fpage>
          . ACM Press, New York,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W. van der Hoek and M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          .
          <article-title>Cooperation, knowledge and time: Alternating-time Temporal Epistemic Logic and its applications</article-title>
          .
          <source>Studia Logica</source>
          ,
          <volume>75</volume>
          (
          <issue>1</issue>
          ):
          <fpage>125157</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S. van Otterloo and G.</given-names>
            <surname>Jonker</surname>
          </string-name>
          .
          <source>On Epistemic Temporal Strategic Logic. Electronic Notes in Theoretical Computer Science</source>
          , XX:
          <fpage>3545</fpage>
          ,
          <year>2004</year>
          .
          <source>Proceedings of LCMAS'04.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>