<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Natural Language Dialogue Formalization: From Hyperintensional Logic to Linear Logic</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Kosice</institution>
          ,
          <addr-line>Kosice</addr-line>
          ,
          <country country="SK">Slovakia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper deals with a formalization of a natural language dialogue using transparent intensional logic and predicate linear logic. In the beginning, it is necessary to choose the dialogue in a natural language. Subsequently, this dialogue is analyzed by transparent intensional logic, that allows it to capture the meaning of sentences in logical structures. At this stage, a three-step method of an analysis will be applied to the dialogue: at rst, there will be a type analysis of the lexical units, which is the base for the logical constructions that capture the meaning of the sentences and then we apply a type checking to verify the correctness of the solution. In the second part of the paper, the same dialogue is analyzed by the Ludics theory, which represents the superstructure of the predicate linear logic. In a technical presentation of Ludics theory, the dialogue is placed in a logical space and time what allows model interactions between its actors.</p>
      </abstract>
      <kwd-group>
        <kwd>Logical Analysis of Natural Language Predicate Linear Logic Transparent Intensional Logic</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Ludics Theory</p>
    </sec>
    <sec id="sec-2">
      <title>Introduction</title>
      <p>Computer programs require people to communicate with them in a formal
programming language that is accurate, unambiguous, and structured. Human speech
does not have these attributes. The natural language has not been discovered,
but gradually developed spontaneously over the centuries in communicative
practice and adapted to changing conditions in the society. This causes that people
mostly understand themselves, but sometimes their understanding of meaning
is di erent. The meaning of the natural language expressions is often ambiguous
because its logical structure is not identical to the grammatical structure.
Explaining the meaning of natural language expressions is dealt by the logic analysis
of natural language (LANL), which also allows to discovery the mistakes that
arise from misinterpretations of the premises.</p>
      <p>
        The most important requirement for a logical system examining the natural
language semantics is the expressivity. An extensional logic systems
(propositional logic, predicate logic...) are not enough expressive - for LANL needs it is
necessary to work with an intensional logical systems. This paper is built on the
following research results:
{ in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ][
        <xref ref-type="bibr" rid="ref2">2</xref>
        ][
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] was presented that the most expressive LANL system is a
transparent intensional logic (TIL), which we will deal with in this paper,
{ TIL has not been fully automated for use in the computer science yet, which
is related to its extraordinary expressive force. The solution would be to link
its apparatus with another logical system that does not have this de ciency
- in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ][
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] was presented that a suitable logic could be predicate linear logic
(PLL). PLL is not commonly used in LANL, but this paper will describe
how it can analyze the natural language dialogues.
      </p>
      <p>
        In the future research, the goal is to create the formal speci cation of a new
logic linking TIL with PLL. It will be the basis for the implementation of a
semantic machine [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] that will be able to automate the logical analysis of
natural language. A prerequisite for its implementation is to provide the necessary
architectural [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ][
        <xref ref-type="bibr" rid="ref8">8</xref>
        ][
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and security requirements [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ][
        <xref ref-type="bibr" rid="ref11">11</xref>
        ][
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Previously it will be
necessary to explore the possibilities of TIL and PLL in formalizing the meaning
of sentences from several points of view. The aim of this paper is to compare
how mentioned logic can analyze natural language dialogues.
2
      </p>
    </sec>
    <sec id="sec-3">
      <title>Transparent Intensional Logic</title>
      <p>
        The founder of TIL is Pavel Tichy [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] who (same as Frege) claimed extended
Church's simple theory of types (containing a set of individuals and truth values)
by modal and temporal parameters. TIL is high-order logic based on the concept
of possible worlds. Language of TIL is a modi ed version of the typed
objectoriented lambda calculus with a rami ed hierarchy of types.
2.1
      </p>
      <p>Basic Objects in TIL
Logical analysis of natural language is related to a speci c object base. The basic
objects of TIL which represent non-functional element types are:
{ set of truth value (true, false) o,
{ set of individuals ,
{ set of time points (real numbers) ,
{ set of logically possible worlds !.</p>
      <p>Functional types are sets partial functions ( 1,....... m), with arguments
b1,.....bm of type 1,......., m and values in . Intensions are objects of type
( !), i.e. functions from a possible worlds for any type . Most often, these
are functions of type (( )!), for simplicity it is stated in TIL as !. Some
examples of frequently used intensions are shown in Table 1.
2.2</p>
      <p>
        Constructions in TIL
Tichy introduced the concepts of construction [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] as a non-linguistic abstract
procedures which expressed the meaning of natural language expressions. The
constructions can be:
{ variable x, constructs objects based on their valuation,
{ trivialization 0X, constructs an object X without changes,
{ composition [X1 : : : Xm], constructs the result of an application of function
to arguments,
{ closure x:X (based on -abstraction), constructs function.
Example 1. Mother: \If you behave well, you'll either be playing at home with
ball or toy, or going out to the cinema or shopping. If you want to go out, I will
decide where to go.\
Son: \I want to go out.\
Mother: \Then we will go to the cinema.\
      </p>
      <p>In TIL , these sentences are analyzed in three steps - type analysis (to each
object of sentence is assigned a corresponding type), synthesis (create a
construction which represents the meaning of a sentence) a type checking (verify if
the synthesis was correctly done).</p>
      <p>Let's analyze the rst sentence: \If you (son) behave well , you'll either
be (choose) playing at home with ball or toy, or going out to the cinema or
shopping.\ 1
1. Type analysis:
son/ , behave well/(oo ) !, )/ooo, choose/(o ) !, home/(o ) !, _/ooo,
out/(o ) !.
2. Synthesis:</p>
      <p>w t [[0behave wellw t ) [0choose w t [0home w t _ 0out w t]]] 0son]
3. Type checking: (Fig. 1)
1 This analysis is simpli ed. The disjunctions of which the objects home and out are
composed were not analyzed.
w t [[0behave well w t ( [0choose w t [0home w t N
!
(oo ) !
!
ooo (o ) ! !
(o ) ! !</p>
      <p>ooo (o ) ! !
(oo )
o !
oo
o
o
(o )
o
o
(o )
o
oo
o
o
(o )
o</p>
      <p>Other sentences can be analyzed in the same way. A sentence, the meaning of
which is correctly expressed, is always a proposition with type (o) ! (same as in
Fig. 1). From this example it is clear that even though TIL is an e ective tool of
LANL, the individual sentences of the natural language are analyzed separately,
and so it is not adequate for its application on natural language dialogues. In
the next section, the same dialogue will be explored through the PLL.
3</p>
    </sec>
    <sec id="sec-4">
      <title>Predicate Linear Logic</title>
      <p>
        Linear logic, introduced in 1987 by J.Y. Girard [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], has the following
characteristics:
{ can describe real processes in the world, because it works with resources and
their consumption,
{ the formula of it is an action, a source or a literal,
{ introduces new linear logic connectives,
{ does not contain the rules of weakness and contraction.
      </p>
      <p>
        Since a intensions in the natural language expressions can be described by
using predicates, we need to introduce PLL. The formula ' in a PLL can be
formulated by the following production rule [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]:
' ::= pn j 0 j 1 j?j &gt; j '1 ( '2 j '1
'! j P (t; :::; t) j (8x)' j (9x)';
t ::= x j c j f (t; :::; t);
'2 j '1
'2 j '1O'2 j '1N'2 j '? j '? j
(1)
where 0; 1,&gt;; ? are logical constants (neutral elements), pn are atomic
statements, ; N; ; O are logical connectives, ( is linear implication, (:)? is
negation, !; ? are modal operators, P (t; :::; t) is predicate, 8; 9 are quanti ers, x is
variable, c is constant, and f (t; :::; t) is the application of a functional symbol to
a term t.
3.1
      </p>
      <p>
        Ludics Theory
The Ludics theory [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] is an extension of the PLL by time and space. Ludics
is a theory of interaction, which can overcome the di erence between grammar
and semantics. The basic principle of this calculus is handling positions of PLL
formulas, while ignoring their contents.
      </p>
      <p>Time and space in linear logic To change the polarity of the blocks (called
clusters) in proof tree means an increment of time. PLL connectives are divided
into positive and negative, which also determines the polarity of the PLL formula.
There are:
{ positive - ; , 1,0, !, 9,
{ negative - N; O, &gt;; ?, ?, 8,
{ special - ( represents dependent polarity, (:)? causes the ipping of polarity.</p>
      <p>The rules of invertibility and focalization are used to make one-step from few
follow-up steps in proof tree. In invertibility, a cluster of negative formulas is
formed, in focalization a cluster of positive formulas is originated.</p>
      <p>Talking about space in Ludics, the truth nor the content of formula, but
its location, is essential in the proof tree, known as the . The proof tree that
contains only location data is called a design. Immediate subformulas of the
A formula are enumerable, while the number of immediate subformulas can be
labelled as Bi, Bij , Bijk:::, where i; j; k are positive integers - biases and i; ij; ijk
are concatenation of particulate biases i; j; k. If all the data, except the formula
addresses, is removed in the sequences used in argument, we call it a pitchfork:
where represents one address, and context
pitchfork calculus, the following rules are applied:</p>
      <p>Axiom daimon
is a nite set of addresses. In
` ;
`
Positive and negative rule
:::</p>
      <p>i ` i:::
` ;
(+; `; ; I)
::: ` I ;</p>
      <p>I:::
`
( ; ` N)
(2)
(3)
With PLL will be analyzed the same dialogue as with TIL. The PLL formula of
the sentence: \If you behave well (W ), you'll either be playing at home with ball
(B) or toy (T ), or going out to the cinema (C) or shopping. (S)\ is:</p>
      <p>W ( ((BNT )N(C S))2 (5)</p>
      <p>From this PLL formula is possible to create a proof tree, where the following
rules of the PLL sequent calculus are used:</p>
      <p>A ` A
(id)
` '; ` ;</p>
      <p>` 'N ;
` '; 4 ((:)?)
; '? ` 4
(N)
` ';
` '
;
; A ` B; 4
` A ( B; 4</p>
      <p>(()
(
r1 )</p>
      <p>In proof tree, the change of the polarity is marked with the signs + a
what creates the polarized tree, shown in Fig. 2.
(6)
(-)</p>
      <p>(id)
W; W ? ` C; C?
` W; W ?; C; C? ((:)?)</p>
      <p>( )
` (C S); 2; W; W ?
W; W ? ` (C</p>
      <p>((:)?)
S); 2 ( )</p>
      <p>N
(+)</p>
      <p>W; W ? ` ((BNT )N(C
` W ( ((BNT )N(C</p>
      <p>S)); 1 (()
S));</p>
      <p>N - the choice depends on the son (outer non-determinism),
depend on the son (inner non-determinism).
- the choice does not
` W; W ?; B; B?
:0 ` (+; `; ; f0g)
`
:0:4:1 ` :0:1 ((@+); `; :0:4; f1g)
` :0:1; :0:4 ( ; :0; ` ff1g; f2g; f3g; f4gg)</p>
      <p>From the address tree it is possible to create the dialogue strategies. The
mother has three strategies - she always sets out the o er (positive action
( ; f0g)) and after its execution she is ready to allow her son to play with the
ball (negative action ( :0; f1; 2g)), or the toy (negative action ( ; :0; f1; 3g)), or
to go out with him (negative action ( ; :0; f1; 4g)). If a son wants to go out, his
mother chooses from two other strategies - cinema (positive action ( :0:4; f1g))
or shopping (positive action ( :0:4; f2g)).</p>
      <p>The son has four strategies - he always accepts the mother's o er (negative
action ( ; f0g)) and either wants to play with the ball (positive action ( :0; f1; 2g)),
or the toy (positive action ( ; :0; f1; 3g)), or wants to go out and he is ready
for both eventualities (two negative actions ( :0:4; f1g) and ( :0:4; f1g)), or is
ready only for going to the cinema (negative action ( :0:4; f2g)).</p>
      <p>The strategies of the dialogue actors make it possible to explore their
interactions by using principles from the game semantics. PLL allows to describe
natural language dialogues more e ectively than TIL.
4</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>In this paper the possibilities of analyzing natural language dialogues through
TIL and PLL logic systems are explored. From the presented results is clear
that each of mentioned logic systems has a certain de ciency - TIL analyzes the
sentences separately, whether they are in dialogue or not; PLL is not usually used
in LANL, because it does not allow ne-grained semantics analysis of natural
language expressions.</p>
      <p>In order to achieve the declared goals of the research, it will be necessary to
divide it into two parts, where each represents an original contribution in the
processing of the natural language. The rst phase of the project will be based
on existing and already published results in which a transparent intensional
logic has been identi ed as the logical system for LANL with the highest express
power. Because of several serious disadvantages (the absence of formal de nitions
of syntax and semantics of the system, the impossibility of specifying a complex
deductive calculus, the impossibility of creating a fully automated practical
implementation, etc.) an original logical system of source-oriented character will
be created. Its ambition will be overcome mentioned disadvantages. Following
the rst phase of the research, its capabilities will be tested and compared with
existing solutions not only through exact logical proo ng, but also through its
implementation of a semantic machine.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgment</title>
      <p>This work was supported by the following projects:
{ Faculty of Electrical Engineering and Informatics, Technical University of
Kosice under the contract No. FEI-2018-59: Semantic Machine of
SourceOriented Transparent Intensional Logic.
{ Slovak Research and Development Agency under the contract No.
SK-AT2017-0012: Semantics technologies for computer science education.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bilanova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Applications of Transparent Intensional Logic and Montague Intensional Logic on Natural Language Sentences: A Review</article-title>
          .
          <source>SCYR</source>
          <year>2017</year>
          . - Kosice : TU,
          <volume>32</volume>
          {
          <fpage>35</fpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Vokorokos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilanova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mihalyi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Linear logic operators in transparent intensional logic</article-title>
          .
          <source>Informatics</source>
          <year>2017</year>
          . - Danvers : IEEE,
          <volume>420</volume>
          {
          <fpage>424</fpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bilanova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uchnar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Comparison of the approaches of Montague and Tichy within a logical analysis of an English sentence</article-title>
          .
          <source>POSTER</source>
          <year>2017</year>
          . - Prague : Czech Technical University, 1{
          <issue>6</issue>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bilanova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dankovicova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>From Extensional Principles in the Logical Analysis of Natural Language to Intensional Principles</article-title>
          .
          <source>POSTER</source>
          <year>2018</year>
          .
          <article-title>- Praha : CVUT, 1{4 (</article-title>
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bilanova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Increasing the expressive power of the intensional logic used for logical analysis of the natural language sentences</article-title>
          .
          <source>SCYR</source>
          <year>2018</year>
          . - Kosce : TU,
          <volume>128</volume>
          {
          <fpage>129</fpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Vokorokos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pekar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adam</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daranyi</surname>
            ,
            <given-names>P:</given-names>
          </string-name>
          <article-title>Yet Another Attempt in User Authentication</article-title>
          .
          <source>Acta Polytechnica Hungarica</source>
          ,
          <volume>10</volume>
          (
          <issue>3</issue>
          ),
          <volume>37</volume>
          {
          <fpage>50</fpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Juhar</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vokorokos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Separation of concerns and concern granularity in source code</article-title>
          .
          <source>Informatics</source>
          <year>2015</year>
          . - Danvers : IEEE,
          <volume>139</volume>
          {
          <fpage>144</fpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Chovanec</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chovancova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dufala</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>DIDS based on hybrid detection</article-title>
          .
          <source>ICETA 2014 : 12th IEEE International Conference on Emerging eLearning Technologies and Applications</source>
          ,
          <volume>79</volume>
          {
          <fpage>83</fpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Chovancova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adam</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietrikova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fecilak</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simonak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chovanec</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Securing distributed computer systems using an advanced sophisticated hybrid honeypot technology</article-title>
          .
          <source>Computing and Informatics</source>
          ,
          <volume>36</volume>
          (
          <issue>1</issue>
          ),
          <volume>113</volume>
          {
          <fpage>139</fpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Adam</surname>
          </string-name>
          , N.:
          <article-title>Single input operators of the DF KPI system</article-title>
          .
          <source>Acta Polytechnica Hungarica</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <volume>73</volume>
          {
          <fpage>86</fpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Vokorokos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Madovs</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Application Security through Sandbox Virtualization</article-title>
          .
          <source>Acta Polytechnica Hungarica</source>
          ,
          <volume>12</volume>
          (
          <issue>1</issue>
          ),
          <volume>83</volume>
          {
          <fpage>101</fpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Vokorokos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Madovs</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adam</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Innovative Operating Memory Architecture for Computers using the Data Driven Computation Model</article-title>
          .
          <source>Acta Polytechnica Hungarica</source>
          ,
          <volume>10</volume>
          (
          <issue>5</issue>
          ),
          <volume>63</volume>
          {
          <fpage>79</fpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Tichy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>The Foundations of Frege's Logic</article-title>
          . Berlin and New York: De Gruyter,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Materna</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Denotation and reference</article-title>
          . Organon F: Medzinarodny Casopis Pre Analyticku Filozo u,
          <volume>17</volume>
          (
          <issue>1</issue>
          ),
          <volume>3</volume>
          {
          <fpage>20</fpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Vokorokos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilanova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dankovicova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Logic programming from the point of view of type theory and predicate linear logic</article-title>
          .
          <source>International Journal of Innovative Science and Research Technology</source>
          ,
          <volume>3</volume>
          (
          <issue>7</issue>
          ),
          <volume>756</volume>
          {
          <fpage>760</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Perhac</surname>
          </string-name>
          , J.:
          <article-title>Modeling Component Composition's Synchronization Problems by Petri Nets and Linear Logic</article-title>
          .
          <source>SCYR</source>
          <year>2018</year>
          . - Kosice : TU,
          <volume>159</volume>
          {
          <fpage>160</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Girard</surname>
          </string-name>
          , J. Y.:
          <article-title>Locus Solum: From the rules of logic to the logic of rules</article-title>
          .
          <source>Journal Mathematical Structures in Computer Science</source>
          ,
          <volume>11</volume>
          (
          <issue>3</issue>
          ),
          <volume>301</volume>
          {
          <fpage>506</fpage>
          (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fleury M.-R.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Quatrini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Troncon</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Dialogues in Ludics</article-title>
          .
          <source>PRELUDE Project - 2006-2009. Revised Selected Papers, Logic and Grammar</source>
          ,
          <volume>138</volume>
          {
          <fpage>157</fpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>