<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ethical Decision Making under the Weak Completion Semantics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Steffen H o¨lldobler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International Center for Computational Logic, Technische Universita ̈t Dresden, Germany and North-Caucasus Federal University</institution>
          ,
          <addr-line>Stavropol, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>The weak completion semantics is a novel computational theory based on logic programs. It is extended to deal with equalities, which is a prerequisite to represent and reason about actions and causality as in the fluent calculus. This is discussed in the context of ethical decision making. In order to decide questions about the moral permissibility of actions, counterfactuals need to be considered. Somewhat surprisingly, this can be straightforwardly done in the extended approach.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The weak completion semantics (WCS) is a novel cognitive
theory. Its original idea is based on [Stenning and van
Lambalgen2008] who proposed to model human reasoning tasks
by, firstly, reasoning towards a normal logic program to
represent the reasoning task and, secondly, by reasoning with
respect to the least model of the normal logic program.
Unfortunately, Stenning and van Lambalgen’s approach contained
a technical bug which was corrected in [Ho¨lldobler and
Kencana Ramli2009].</p>
      <p>
        The WCS is based on many techniques and methods from
logic programming and computational logic. However, these
techniques and methods are usually tweaked a little bit in
order to model human reasoning tasks adequately. For
example, programs are not completed in the sense of [Clark1978],
but only weakly completed. Instead of the semantic operator
introduced in [Fitting1985], a modified operator introduced
in [Stenning and van Lambalgen2008] is used. Instead of the
three-valued Kripke-Kleene logic used in [Fitting1985,
Stenning and van Lambalgen2008], the three-valued Łukasiewicz
logic [Łukasiewicz1920] is used. Because of the latter,
normal logic programs admit a least model and reasoning is
performed with respect to this model
        <xref ref-type="bibr" rid="ref12">(see [Ho¨lldobler and
Kencana Ramli2009])</xref>
        .
      </p>
      <p>The approach has been applied to various human
reasoning tasks like the suppression task [Byrne1989, Dietz et
al.2012], the selection task [Wason1968, Dietz et al.2013],
and human syllogistic reasoning [Khemlani and
JohnsonLaird2012, Oliviera da Costa et al.2017]. In fact, WCS
performed better on the human syllogistic reasoning tasks than
all 12 cognitive theories discussed in [Khemlani and
JohnsonLaird2012]. As all human reasoning tasks are solved within
one framework, the WCS is an integrated and computational
cognitive theory. We are unaware of any other theory of this
kind and with such a wide variety of applications.</p>
      <p>Recently, ethical decision making has received much
attention as autonomous agents become part of our daily life.
In particular, we were inspired by [Pereira and
Saptawijaya2016], who studied computational models of machine
ethics. Various ethical problems are implemented as logic
programs and these programs can be queried for moral
permissibility. Unfortunately, their approach does not provide
a general method to account for ethical dilemmas and is not
integrated into a cognitive theory about human reasoning.</p>
      <p>The problems studied in [Pereira and Saptawijaya2016]
were trolley problems or variants thereof like the bystander
case. In these problems, actions with direct and indirect
effects must be considered. Hence, in order to model and
reason about these problems within the WCS, the WCS must be
extended to deal with actions and causality. We have chosen
the fluent calculus [Ho¨lldobler and Schneeberger1990] for
modeling actions and causality because it treats fluents as
resources which can be consumed and produced. This property
is shared with Petri networks [Ho¨lldobler and Jovan2014], the
latter of which have already been used in computational
models for human reasoning [Barrett2010].</p>
      <p>In the fluent calculus [Ho¨lldobler and Schneeberger1990]
states are represented as multisets of fluent. Multisets are
represented with the help of a binary function symbol written
infix and a constant 1 such that is commutative, associative,
and 1 is its unit element. For example, the multisets f_ g_ and
f_a; b; b g_ are represented by the fluent terms 1 and a b b,
respectively. In order to deal with function symbols like in
the WCS, we need to extend WCS to handle equality.
Luckily, as shown in [Dietz Saldanha et al.2018] the key properties
of the WCS, viz. the existence of a least model and the fact
that this model can be computed as the least fixed point of an
appropriate semantic operator, hold also for logic programs
with equality.</p>
      <p>In this paper, we will focus on the representation of the
bystander case. We will show how to represent this
problem in the extended approach. In particular, we formalize
a purely utilitarian view [Bentham2009] and the doctrine of
double effect [Aquinas1988]. In order to decide which action
is morally permissible in the bystander case we need to
reason about a counterfactual [Nickerson2015]. It turns out, that
this can be straightforwardly done in the extended approach.
2</p>
    </sec>
    <sec id="sec-2">
      <title>The Weak Completion Semantics with</title>
    </sec>
    <sec id="sec-3">
      <title>Equality</title>
      <p>
        We assume the reader to be familiar with the WCS as
presented in [Ho¨lldobler2015, Dietz Saldanha et al.2017]. In
the weak completion semantics with equality (WCSE) a logic
program P is considered together with a set E of equations.
As shown in [Jaffar et al.1984], E defines a finest
congruence relation on the set of ground terms. Let [t] denote the
congruence class defined by the ground term t. For example,
[a b b] = [b a b] = [b b a 1]. Furthermore,
let [p(t1; : : : ; tn)] be an abbreviation for p([t1]; : : : ; [tn]),
where p is an n-ary relation symbol and all ti, 1 i n,
are ground terms. [p(t1; : : : ; tn)] = [q(s1; : : : ; qm)] if and
only if p = q, n = m, and [ti] = [si] for all 1 i n.
For example, [p(a b b; 1)] = [p(b a b; 1 1]. We
consider E -interpretations and E -models as usual
        <xref ref-type="bibr" rid="ref15">(see e.g. [Jaffar
et al.1984])</xref>
        .
      </p>
      <p>As shown in [Dietz Saldanha et al.2018], a logic program
P together with a set E of equation has a least E -model
under the three-valued Łukasiewicz logic [Łukasiewicz1920].
This model is the least fixed point of the following semantic
operator: Let I be an E -interpretation. We define E (I) =
P
hJ &gt;; J ?i where</p>
      <p>J &gt;
J ?
=
=
f[A] j there exists A Body 2 gP</p>
      <p>and I(Body) = &gt;g;
f[A] j there exists A Body 2 gP
and for all A0 Body 2 gP
with [A] = [A0]
we find I(Body) = ?g;
and gP denotes the set of all ground instances of clauses
occurring in P.</p>
      <p>One should observe that the set E of equations is built
into the computation of the E -operator: In the computation</p>
      <p>P
of J &gt;, if a ground atom A is mapped to true because it is the
head of a rule whose body is true, then all members of the
congruence class containing A are mapped to true. Likewise,
in the computation of J ? we do not only have to consider all
rules with head A, but all rules whose head A0 is in the same
congruence class as A, and if A is mapped to false, then all
members of the congruence class containing A are mapped to
false.
3</p>
    </sec>
    <sec id="sec-4">
      <title>The Bystander Case</title>
      <p>A trolley, whose conductor has fainted, is headed towards two
people walking on the main track.1 The banks of the track are
so steep that these two people will not be able to get off the
track in time. Hank is standing next to a switch, which can
turn the trolley onto a side track, thereby preventing it from
killing the two people. However, there is a man standing on
1Note that in the original trolley problem, five people are on the
main track. For the sake of simplicity, we assume that only two
people are on the main track.
(trolley moving to track 1)
(trolley killing first human)
(trolley killing second human)
the side track. Hank can change the switch, killing him. Or
he can refrain from doing so, letting the two die. Is it morally
permissible for Hank to change the switch?</p>
      <p>The case is illustrated in Figure 1 (initial state). The tracks
are divided into segments 0, 1, and 2, the arrow represents that
the trolley t is moving forward and that the track is clear (c),
the switch is in position m (main) but can be changed into
position s (side), and a bullet above a track segment represents a
human (h) on this track. t; c, and h may be indexed to denote
the track to which they apply. In addition, we need a fluent d
denoting a dead human.</p>
      <p>We choose to represent a state by a pair of multisets
consisting of the casualties in its second element and all other
fluents in its first element. Multisets are represented by
socalled fluent terms in the fluent calculus, i.e., the initial state
of the bystander case is the pair
(t0 c0
m
h1
h1
codes the multiset f_t0; c0; m; h1; h1; h2 g_.
of fluent terms. The casualties are represented in the second
element of (1) by the constant 1 encoding the empty
multiset. Initially, there are no casualties, but casualties will play
a special role when preferring one action over another as will
be discussed later in this section. The first element of (1)
en</p>
      <p>There are two kinds of actions, the ones which can be
performed by Hank (the direct actions donothing and change),
and the actions which are performed by the trolley (the
indirect actions downhill and kill ). We will represent the actions
by the trolley explicitly with the help of a five-place relation
symbol action specifying the preconditions, the name, and
the immediate effects of an action. As a state is represented
by two multisets, the preconditions anf the immediate effects
have also two parts:
action(t0 c0
action(t0 c0
m; 1; downhill ; t1 c0
s; 1; downhill ; t2 c0
m; 1)
s; 1)
&gt;
&gt;
action(t1
action(t2
&gt;
&gt;
If the trolley is on track 0, this track is clear, and the switch is
in position m, then it will run downhill onto track 1 whereas
track 0 remains clear and the switch will remain in
position m; if, however, the switch is in position s, the trolley will
run downhill onto track 2. If the trolley is on either track 1
or 2 and there is a human on this track, it will kill the human
leading to a casualty.</p>
      <p>The possible actions of Hank are the base cases in the
definition of causality:2
causes(donothing ; t0 c0 m
causes(change; t0 c0 s h1
It checks whether in a given state (P1 Z1; P2 Z2) an
action A0 is applicable, which is the case if the
preconditions (P1; P2) are contained in the given state. If this holds,
then the action is executed leading to the successor state
(E1 Z1; E2 Z2), where (E1; E2) are the direct effects of the
action A0. In other words, if an action is applied, then its
preconditions are consumed and its direct effects are produced.
Such an action application is considered to be a
ramification [Thielscher2003] with respect to the initial, direct action
performed by Hank. Hence, the first argument A of causes is
not changed. The execution of an action is also conditioned
by :ab(A0), where ab is an abnormality predicate. Such
abnormalities were introduced in [Stenning and van
Lambalgen2008] to represent conditionals as licenses for inference.
In this example, there is nothing abnormal known with
respect to the actions downhill and kill and, consequently, the
assumptions
ab(downhill ) ?
ab(kill ) ?
are added to the program. But we can imagine situations,
where the trolley will only cross the switch if the switch is
not broken.3</p>
      <p>2In the original version of the fluent calculus, causes is a ternary
predicate stating that the execution of a plan transfers an initial into
a goal state. Its base case is of the form causes(X; [ ]; X), i.e.,
the empty plans transforms arbitrary states X into X. Generating
models bottom up using a semantic operator one has to consider all
ground instances of this atom, which is usually too large to consider
as a base case for human reasoning episodes. The solution presented
in this paper overcomes this problem in that we only have a small
number of base cases depending on the number of options an agent
like Hank may consider.</p>
      <p>3If the switch is broken, the trolley may derail. Such a scenario
can be modeled in WCSE as well, but it is beyond the scope of this
paper to discuss it in detail.
0
0
m
m
m
s
s
s
1
2</p>
      <p>Let P be the program consisting of the clauses mentioned
in this section so far and E be the set of equations specifying
that is associative, commutative, and 1 being its unit
element. Hank has the choice to do nothing or to change the
switch. Depending on his decision, the trolley will execute
its actions which are computed as ramifications in the fluent
calculus [Thielscher2003]. If Hank is doing nothing, then the
least E -model of P – which is equal to the least fixed point
of E – is computed by iterating E starting with the empty
interpretation h;; ;i. The followingPequivalence classes will</p>
      <p>P
be mapped to true in subsequent iterations:4
[causes(donothing ; t0 c0
[causes(donothing ; t1 c0
[causes(donothing ; t1 c0
[causes(donothing ; t1 c0
m
m
m
m
h1
h1
h1
h2; d
h1 h2; 1)]
h1 h2; 1)]
h2; d)]
d)]
They correspond precisely to the four states shown in
Figure 1. No further action is applicable to the elements of the
final congruence class. The two people on the main track will
be killed.</p>
      <p>On the other hand, if Hank is changing the switch, then the
least fixed point of PE contains</p>
      <p>[causes(change; t2 c0 s h1 h1; d)]:
The two people on the main track will be saved but the person
on the side track will be killed. This case is illustrated in
Figure 2.</p>
      <p>The two cases can be compared by means of a prefer
clause:
prefer (A1; A2)
causes(A1; Z1; D1) ^
causes(A2; Z2; D1 d
:abprefer (A1)
abprefer (change) ?
abprefer (donothing )</p>
      <p>D2) ^
?
Comparing D1 and D1 d D2, action A2 leads to at least
one more dead person than action A1. Hence, A1 is preferred
over A2 if nothing abnormal is known about A1.</p>
      <p>4The first two iterations of PE are shown in detail in the
Appendix.</p>
      <p>Under an utilitarian point of view [Bentham2009], the
change action is preferable to the donothing action as it will
kill fewer humans. On the other hand, we know that a purely
utilitarian view is not allowed in case of human casualties.
Hank may ask himself: Would I still save the humans on the
main track if there were no human on the side track and I
changed the switch? This is a counterfactual. But we can
easily deal with it in WCSE by starting a new computation
with the additional fact
causes(change; t0 c0
s h1
h1 c2; 1)
&gt;:
(4)
Comparing (2) and (4), h2 has been replaced by c2. There is
no human on track 2 anymore and, hence, this track is clear.
This is a minimal change necessary to satisfy the precondition
of the counterfactual. In this case, the least E -model of the
extended program will contain
[causes(change; t0 c0
s h1
h1 c2; 1)]:
This case is illustrated in Figure 3. Using
permissible(change)
prefer (change; donothing ) ^
causes(change; t2 c0 s h1
:abpermissible (change)
abpermissible (change)
?
allows Hank to conclude that changing the switch is
permissible within the doctrine of double effect [Aquinas1988].
4</p>
    </sec>
    <sec id="sec-5">
      <title>Discussion</title>
      <p>We have extended the WCS to WCSE and we have shown
how the bystander case can be modeled in the extended
approach. We believe that the methods and techniques
can be applied to all ethical decision problems discussed
in [Pereira and Saptawijaya2016]. In [Dietz Saldanha et
al.2018] we have already considered the footbridge and the
loop case. Moreover, we have applied the doctrine of triple
effect [Kamm2006] to distinguish between direct and indirect
intentional killings. Currently, we are working out the details
for all problems. For us it is important that all these
problems can be discussed within the presented framework and
are compatable to our solutions for other human reasoning
tasks like the suppression and the selection task.</p>
      <p>On the other hand, there are many open questions. The
examples discussed in this paper are hand-crafted and we would
like to develop an extension, where examples taken from the
h1 c2; 1) ^
being true under I1 is
moral machine project (moralmachine.mit.edu) can
be automatically treated under WCSE. We also would like to
generalize the reasoning such that if an action does something
good and nothing abnormal is known, then it is permissible.
This, however, requires a formalization of ‘something good’
and very likely a formalization of ‘something bad’. And,
we should have a closer look at counterfactuals and minimal
change.</p>
      <p>Acknowledgements I’d like to thank Dominic
Deckert, Emmanuelle-Anna Dietz Saldanha, Sybille Schwarz, and
Lim Yohanes Stefanus for jointly developing the weak
completion semantics with equality.</p>
    </sec>
    <sec id="sec-6">
      <title>Appendix</title>
      <p>Let P be the program developed in Section 3 and E be the
set of equations specifying that is associative, commutative,
and 1 being its unit element. Let I0 = h;; ;i be the empty
interpretation. Suppose Hank has decided to do nothing. Then,</p>
      <p>PE (I0) = I1 = hI1&gt;; I1?i;
where
I1&gt; = f [causes(donothing ; t0 c0 m h1 h1 h2; 1)];
[action(t0 c0 m; 1; downhill ; t1 c0 m; 1)];
[action(t0 c0 s; 1; downhill ; t2 c0 s; 1)];
[action(t1 h1; 1; kill ; t1; d)];
[action(t2 h2; 1; kill ; t2; d)] g;
I1? = f [ab(downhill )];</p>
      <p>[ab(kill )] g:
Considering the body of (3) we find that both possible ground
instances of ab(A0), viz. ab(downhill ) and ab(kill ), are false
under I1 and, consequently, their negations are true under I1.
The only ground instance of
causes(A; P1</p>
      <p>Z1; P2</p>
      <p>Z2)
causes(donothing ; t0 c0
m
h1
h1
h2; 1):
Hence, we are searching for a ground instance of
action(P1; P2; A0; E1; E2)
being true under I1 such that the ground instance of P1 is
contained in t0 c0 m h1 h1 h2 and the ground instance of P2
is contained in 1. There are four candidates in I1. The only
possible ground instance of an action meeting the conditions
is
action(t0 c0
m; 1; downhill ; t1 c0
m; 1):
(7)
Comparing the second arguments of (5) and (6) with the first
argument of (7) we find that</p>
      <p>P1 = t0 c0
m
and</p>
      <p>Z1 = h1 h1 h2:
Likewise, comparing the third arguments of (5) and (6) with
the second argument of (7) we find that P2 = 1 and Z2 = 1.
Combining Z1 with the fourth argument of (7) and, likewise,
combining Z2 with the fifth argument of (7) we learn that
causes(donothing ; t1 c0
m
h1
h1
must be true under PE (I1).
(5)
(6)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[Aquinas</source>
          , 1988]
          <string-name>
            <given-names>T.</given-names>
            <surname>Aquinas</surname>
          </string-name>
          .
          <article-title>Summa Theologica II-II, q</article-title>
          .
          <volume>64</volume>
          ,
          <issue>art</issue>
          . 7, “Of Killing”. In W. P. Baumgarth and
          <string-name>
            <surname>R.J</surname>
          </string-name>
          . Regan, editors,
          <source>On Law, Morality, and Politics</source>
          , pages
          <fpage>226</fpage>
          -
          <lpage>227</lpage>
          . Hackett Publishing Co., Indianapolis,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>[Barrett</source>
          , 2010]
          <string-name>
            <given-names>L.</given-names>
            <surname>Barrett</surname>
          </string-name>
          .
          <article-title>An Architecture for Structured, Concurrent, Real-time Action</article-title>
          .
          <source>PhD thesis</source>
          , Computer Science Division, University of California at Berkeley,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>[Bentham</source>
          , 2009]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bentham</surname>
          </string-name>
          .
          <article-title>An Introduction to the Principles of Morals and Legislation</article-title>
          . Dover Publications Inc.,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>[Byrne</source>
          ,
          <year>1989</year>
          ]
          <string-name>
            <given-names>R. M. J.</given-names>
            <surname>Byrne</surname>
          </string-name>
          .
          <article-title>Suppressing valid inferences with conditionals</article-title>
          .
          <source>Cognition</source>
          ,
          <volume>31</volume>
          :
          <fpage>61</fpage>
          -
          <lpage>83</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>[Clark</source>
          , 1978]
          <string-name>
            <given-names>K. L.</given-names>
            <surname>Clark</surname>
          </string-name>
          .
          <article-title>Negation as failure</article-title>
          . In H. Gallaire and J. Minker, editors,
          <source>Logic and Databases</source>
          , pages
          <fpage>293</fpage>
          -
          <lpage>322</lpage>
          . Plenum, New York,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [Dietz et al.,
          <year>2012</year>
          ]
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Ho¨lldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the suppression task</article-title>
          . In N. Miyake,
          <string-name>
            <given-names>D.</given-names>
            <surname>Peebles</surname>
          </string-name>
          , and
          <string-name>
            <surname>R. P</surname>
          </string-name>
          . Cooper, editors,
          <source>Proceedings of the 34th Annual Conference of the Cognitive Science Society</source>
          , pages
          <fpage>1500</fpage>
          -
          <lpage>1505</lpage>
          .
          <source>Cognitive Science Society</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Dietz et al.,
          <year>2013</year>
          ]
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Ho¨lldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the abstract and the social case of the selection task</article-title>
          .
          <source>In Proceedings Eleventh International Symposium on Logical Formalizations of Commonsense Reasoning</source>
          ,
          <year>2013</year>
          . commonsensereasoning.org/2013/ proceedings.html.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>[Dietz</surname>
          </string-name>
          Saldanha et al.,
          <year>2017</year>
          ]
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz Saldanha</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Ho¨lldobler, and I. Loureˆdo Rocha. The weak completion semantics</article-title>
          . In C. Schon and U. Furbach, editors,
          <source>Proceedings of the Workshop on Bridging the Gap between Human and Automated Reasoning - Is Logic and Automated Reasoning a Foundation for Human Reasoning?</source>
          , volume
          <year>1994</year>
          , pages
          <fpage>18</fpage>
          -
          <lpage>30</lpage>
          . CEUR-WS.org,
          <year>2017</year>
          . http: //ceur-ws.
          <source>org/</source>
          Vol-1994/.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>[Dietz</surname>
          </string-name>
          Saldanha et al.,
          <year>2018</year>
          ]
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz Saldanha</surname>
          </string-name>
          , S. Ho¨lldobler, S. Schwarz, and
          <string-name>
            <given-names>L. Y.</given-names>
            <surname>Stefanus</surname>
          </string-name>
          .
          <article-title>The weak completion semantics and equality</article-title>
          .
          <source>In Proceedings of the 22nd International Conference on Logic for Programming</source>
          ,
          <source>Artificial Intelligence, and Reasoning (LPAR-22)</source>
          . EPiC series in Computing,
          <year>2018</year>
          . (to appear).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[Fitting</source>
          , 1985]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fitting</surname>
          </string-name>
          .
          <article-title>A Kripke-Kleene semantics for logic programs</article-title>
          .
          <source>Journal of Logic Programming</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ):
          <fpage>295</fpage>
          -
          <lpage>312</lpage>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>[Ho¨lldobler and Jovan</source>
          , 2014]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨lldobler and</article-title>
          <string-name>
            <given-names>F.</given-names>
            <surname>Jovan</surname>
          </string-name>
          .
          <article-title>Advanced Petri nets and the fluent calculus</article-title>
          . In S. Ho¨lldobler,
          <string-name>
            <given-names>A.</given-names>
            <surname>Malikov</surname>
          </string-name>
          , and C. Wernhard, editors,
          <source>Proceedings of the Young Scientists' International Workshop on Trends in Information Processing</source>
          , volume
          <volume>1145</volume>
          <source>of CEUR Workshop Proceedings</source>
          , pages
          <fpage>15</fpage>
          -
          <lpage>24</lpage>
          . CEUR-WS.org,
          <year>2014</year>
          . http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1145</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[Ho¨lldobler and Kencana Ramli</source>
          ,
          <year>2009</year>
          ]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨lldobler and</article-title>
          <string-name>
            <surname>C. D. P. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logic programs under threevalued Łukasiewicz's semantics</article-title>
          . In P. M. Hill and D. S. Warren, editors,
          <source>Logic Programming</source>
          , volume
          <volume>5649</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>464</fpage>
          -
          <lpage>478</lpage>
          . SpringerVerlag Berlin Heidelberg,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>[Ho¨lldobler and Schneeberger</source>
          , 1990]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨lldobler and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Schneeberger</surname>
          </string-name>
          .
          <article-title>A new deductive approach to planning</article-title>
          .
          <source>New Generation Computing</source>
          ,
          <volume>8</volume>
          :
          <fpage>225</fpage>
          -
          <lpage>244</lpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [Ho¨lldobler, 2015]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>¨lldobler. Weak completion semantics and its applications in human reasoning</article-title>
          . In U. Furbach and C. Schon, editors,
          <source>Bridging 2015 - Bridging the Gap between Human and Automated Reasoning</source>
          , volume
          <volume>1412</volume>
          <source>of CEUR Workshop Proceedings</source>
          , pages
          <fpage>2</fpage>
          -
          <lpage>16</lpage>
          . CEURWS.org,
          <year>2015</year>
          . http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1412</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [Jaffar et al.,
          <year>1984</year>
          ]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jaffar</surname>
          </string-name>
          ,
          <string-name>
            <surname>J-L. Lassez</surname>
            , and
            <given-names>M. J.</given-names>
          </string-name>
          <string-name>
            <surname>Maher</surname>
          </string-name>
          .
          <article-title>A theory of complete logic programs with equality</article-title>
          .
          <source>In Proceedings of the International Conference on Fifth Generation Computer Systems</source>
          , pages
          <fpage>175</fpage>
          -
          <lpage>184</lpage>
          . ICOT,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[Kamm</source>
          , 2006]
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Kamm</surname>
          </string-name>
          . Intricate Ethics: Rights, Responsibilities, and
          <string-name>
            <given-names>Permissible</given-names>
            <surname>Harm</surname>
          </string-name>
          . Oxford University Press, Oxford,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [Khemlani and
          <string-name>
            <surname>Johnson-Laird</surname>
          </string-name>
          ,
          <year>2012</year>
          ]
          <string-name>
            <given-names>S.</given-names>
            <surname>Khemlani</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Johnson-Laird</surname>
          </string-name>
          .
          <article-title>Theories of the syllogism: A metaanalysis</article-title>
          .
          <source>Psychological Bulletin</source>
          ,
          <volume>138</volume>
          (
          <issue>3</issue>
          ):
          <fpage>427</fpage>
          -
          <lpage>457</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>[Łukasiewicz</source>
          , 1920]
          <string-name>
            <given-names>J.</given-names>
            <surname>Łukasiewicz</surname>
          </string-name>
          .
          <article-title>O logice tro´jwartos´ciowej</article-title>
          .
          <source>Ruch Filozoficzny</source>
          ,
          <volume>5</volume>
          :
          <fpage>169</fpage>
          -
          <lpage>171</lpage>
          ,
          <year>1920</year>
          .
          <article-title>English translation: On Three-Valued Logic</article-title>
          . In: Jan Łukasiewicz Selected Works. (L. Borkowski, ed.), North Holland,
          <fpage>87</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[Nickerson</source>
          ,
          <year>2015</year>
          ]
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Nickerson</surname>
          </string-name>
          .
          <source>Conditional Reasoning</source>
          . Oxford University Press,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <source>[Oliviera da Costa</source>
          et al.,
          <year>2017</year>
          ]
          <string-name>
            <given-names>A.</given-names>
            <surname>Oliviera da Costa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz Saldanha</surname>
          </string-name>
          , S. Ho¨lldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to human syllogistic reasoning</article-title>
          . In G. Gunzelmann,
          <string-name>
            <given-names>A.</given-names>
            <surname>Howes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tenbrink</surname>
          </string-name>
          , and E. J. Davelaar, editors,
          <source>Proceedings of the 39th Annual Conference of the Cognitive Science Society</source>
          , pages
          <fpage>883</fpage>
          -
          <lpage>888</lpage>
          , Austin, TX,
          <year>2017</year>
          . Cognitive Science Society.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>[Pereira and Saptawijaya</source>
          , 2016]
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Pereira</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Saptawijaya</surname>
          </string-name>
          .
          <source>Programming Machine Ethics</source>
          . Springer, Berlin, Heidelberg,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>[Stenning and van Lambalgen</source>
          ,
          <year>2008</year>
          ]
          <string-name>
            <given-names>K.</given-names>
            <surname>Stenning and M. van Lambalgen</surname>
          </string-name>
          .
          <source>Human Reasoning and Cognitive Science</source>
          . MIT Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>[Thielscher</source>
          , 2003]
          <string-name>
            <given-names>M.</given-names>
            <surname>Thielscher</surname>
          </string-name>
          .
          <article-title>Controlling semiautomatic systems with FLUX (extended abstract)</article-title>
          . In C. Palamidessi, editor,
          <source>Logic Programming</source>
          , volume
          <volume>2916</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>515</fpage>
          -
          <lpage>516</lpage>
          . Springer, Berlin, Heidelberg,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <source>[Wason</source>
          , 1968]
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Wason</surname>
          </string-name>
          .
          <article-title>Reasoning about a rule</article-title>
          .
          <source>The Quarterly Journal of Experimental Psychology</source>
          ,
          <volume>20</volume>
          :
          <fpage>273</fpage>
          -
          <lpage>281</lpage>
          ,
          <year>1968</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>