<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Guarded Fragments Meet Dynamic Logic: The Story of Regular Guards (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bartosz Jan Bednarczyk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emanuel Kieroński</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Computer Science, University of Wrocław</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Knowledge-Based Systems Group, TU Wien</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The Guarded Fragment (GF) of first-order logic ( FO), introduced by Andréka et al. [1], generalizes modal and description logics (DLs) to higher-arity relational vocabularies. Over the past 25 years, GF has become the canonical first-order fragment that balances expressive power with attractive model-theoretic properties, such as the finite model property [ 2], preservation theorems [3], and robust decidability under various extensions involving fixed-point operators [ 4] or query languages [5]. Since classical (polyadic) multi-modal and description logic formulae embed naturally into GF via standard translations, this fragment serves as a versatile logical framework central to both theoretical studies and applications in KR and databases. However, not all widely-used families of modal and description logics (DLs) are expressible within the scope of GF, as it cannot express properties such as transitivity or equivalence of relations. Consequently, translating transitive description logics like those from the  family of DLs or modal logics interpreted over equivalence frames including S5, into the guarded fragment is not directly possible. To overcome this limitation, Ganzinger et al. [6] initiated the study of semantically-constrained guards, an extension of GF allowing certain relations-confined to guards-to be interpreted with additional semantic constraints, notably transitivity or equivalence. This direction spurred intensive research, yielding several positive results, notably the 2ExpTime-completeness of GF extended with (conjunctions of) transitive guards (consult the works of Szwast&amp;Tendera [7], Kazakov [8] and Kieroński&amp;Rudolph [9]), as well as the two-variable fragment of GF augmented by transitive or equivalence closures of binary guards, established by Michaliszyn and his co-authors [10, 11]. Check Tendera's survey [12] for a comprehensive overview. On the negative side, natural extensions of GF with equality (GF≈ ), intended to capture popular description logics from the ℛ family, turned out to be undecidable. Examples include GF≈ with exponentiation (regular expressions that are compositions of the same letter) [13] or associative compositional axioms [8]. The decidability status of these logics without equality ≈ is still open. Consequently, there is no known decidable extension of GF with semantically-constrained guards captures propositional dynamic logic (PDL) and its generalizations such as the  family [14] of DLs, PDL with intersection and converse (ICPDL) [15], or its higher-arity extensions of DLs like ℒℛ [16].</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Our Contributions</title>
      <p>We introduce and study a novel logic called RGF, which extends (equality- and constant-free) GF
by allowing ICPDL-programs as guards (cf. Def. 1). Our main result establishes that Sat(RGF) is
2ExpTime-complete, matching the complexity of plain GF and ICPDL. This also lifts decidability to
several logics where it was previously known only in their two-variable case. Our proof employs a fusion
technique, reducing Sat(RGF) to instances of the satisfiability problem in plain GF or two-variable
RGF, which is in turn solvable via an encoding to ICPDL.</p>
      <p>Theorem 1. The satisfiability problem for RGF is 2ExpTime-complete.
◀</p>
      <p>We further address two questions: (i) Is the query entailment problem decidable for RGF? (ii) Is
there an expressive fragment of RGF of complexity lower than 2ExpTime? We answer question (i)
negatively, showing undecidability of conjunctive query entailment even for two-variable fluted GF
with a single transitive guard, substantially strengthening prior results of Gottlob et al. [17, Thm. 1] on
entailment of unions of conjunctive queries over GF2 with transitive guards in three ways: our logic is
more restricted (belongs to the so-called fluted fragment), our queries do not use disjunction (we use
conjunctive queries rather than the unions thereof), and our proof is also applicable to the finite-model
scenario (which remained open).</p>
      <p>Theorem 2. Both finite and general CQ entailment problems are undecidable for RGF, already for its
lfuted two-variable fragment with a single transitive guard. ◀</p>
      <p>By fluted formulae we mean index-normal formulae (on any branch of its syntax tree, the -th
quantifier bounds precisely ) where any atom  (¯) in the scope of a quantifier bounding  (but not
+1), the sequence ¯ is a sufix of the sequence 1, 2, . . . , . Our undecidability transfers to ℒ
extended with unqualified existential restrictions with intersection of the form ∃(r ∩ s).⊤, inclusion
axioms of the form r ⊆ s ∪ t, and a single transitivity statement.</p>
      <p>For (ii) we conduct a thorough case analysis, pinpointing when subfragments of RGF admit lower
complexity than 2ExpTime. We conclude that a novel forward variant of GF extended with transitive
closure is the largest (in a natural sense) ExpSpace-complete fragment of RGF.</p>
      <p>Theorem 3 (Simplified statement) . The satisfiability problem for the forward subfragment RGF with
the set of operators restricted to {· +, · * , ?} is ExpSpace-complete. The inclusion of other operators makes
already the fluted two-variable fragment of RGF 2ExpTime-hard. ◀</p>
    </sec>
    <sec id="sec-3">
      <title>3. Our Motivations</title>
      <p>
        We explain our motivations behind the study of the GF with regular guards in the form of a Q&amp;A.
¬ Why the guarded fragment (GF)?
Because GF is the canonical extension of modal and description logics to the setting of higher-arity
relations [18], heavily investigated in the last 25 years. GF is not only well-behaved both computationally [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
and model-theoretically [19], but is also robust under extensions like fixed points [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] or
semanticallyconstrained guards [12]. It was studied also in the setting of knowledge representation in multiple
recent papers [20, 21, 22, 23, 24].
¬ Do we generalize any previously studied logics?
Yes, many of them. First, as GF encodes (via the standard translation, see e.g. Section 2.6.1 of Baader’s
textbook 2017) multi-modal and description logics [18], our logic also encodes (via an analogous
translation) ICPDL and its subfragments such as ℒreg or ℛℐ (Horrocks et al. 2006). There also
exists a natural translation from (counting-free fragment of) ℒℛreg (Calvanese et al. 2008) to RGF.
Second, there is a long tradition of studying GF extended with semantically-constrained guards [12],
i.e. distinguished relations (available only as guards) interpreted as transitive (Ganzinger et al. 1999)
or equivalence [27] relations, or as transitive [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] or equivalence (Kieroński et al. 2017) closures of
another relation (that may also appear only as a guard). As one can simulate transitive or equivalence
relation R with S+ and (S ∪ S− )* for a fresh relation S, our logic strictly extends all of the mentioned
logics. Moreover, the mentioned papers concerning transitive and equivalence closures only focused
on the extensions of GF2 (two-variable GF), and hence our logic lifts them (without ≈ ) to the case of
full GF and provides the tight complexity bound. Other ideas concern GF with exponentiation (regular
expressions that are composition of the same letter) [13] or associative compositional axioms [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] (i.e.
axioms R ∘ S ⊆ T where R, S, T occurring only in guards). Both of them can be easily simulated in
our framework. Finally, GF with conjunctions of transitive relations in guards [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] can be expressed in
RGF by employing ∩ operator. All of this makes RGF a desirable object of study.
¬ Are there any closely related but incomparable logics?
The closest logic is the Unary Negation Fragment [28] with regular-path expressions [29] UNreg, together
with its very recent generalizations with transitive closure operators [30] and guarded negation [31]. All
of these logics share 2ExpTime complexity of their (formula) satisfiability problem, but their expressive
powers are incomparable. Indeed, RGF is not able to express conjunctive queries, while the other logics
cannot express that R* -reachable elements are B-connected. Yet another related logic is GNFPup by
Benedikt et al. 2016, which extends the guarded (negation) fragment [33] with fixed-point operators
with unguarded parameters. The syntax of GNFPup is complicated, but the logic seems to embed
ICPDL. Unfortunately, according to our understanding, such an encoding leads to a non-constant
“pdepth” of the resulting formulae, leading to a non-elementary fragment of the logic. The expressive
powers of GNFPup and RGF are again incomparable and the separating examples are as before.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Our Logic</title>
      <p>we define both RGF-programs and RGF-formulae.</p>
      <p>We work with structures over a fixed countably-infinite
equality- and constant-free relational signature
Σ := ΣFO ∪· ΣR , where all predicates in ΣR , called regular predicates, are binary. By mutual induction,
Definition 1 (RGF). RGF-programs are given by the grammar:
, 
::= B | B¯ |  ∘  |  ∪ |
 ∩ |  * |  + |  ?,
where B ∈ ΣR and  is an RGF-formula with a sole free variable. An RGF-guard  for a formula  is
either an atom over ΣFO or  () for some RGF-program  , such that free variables of  include all free
variables of  . The set RGF of RGF-formulae is defined with the grammar:</p>
      <p>,  ′ ::= A(¯) | ¬ |  ∧  ′ | ∃  () | ∃¯( ∧  ),
where A ∈ ΣFO and  is an RGF-guard for  . The semantics of RGF-programs is:</p>
      <p>Name
Test / Predicate
Converse operator
Concatenation
Kleene star/plus
Union / Intersection  ∪ /  ∩</p>
      <p>* /  +
Syntax of 
 ? / B</p>
      <p>¯
 ∘</p>
      <p>Semantics  A of  in a structure A
{(a, a) | A |=  [a]} / Binary relation</p>
      <p>{(b, a) | (a, b) ∈  A}
{(a, c) | ∃b.(a, b) ∈  A
∧ (b, c) ∈  A</p>
      <p>}
where  0 := ⊤? and  +1 := ( ) ∘  .</p>
      <p />
      <p>A</p>
      <p>∪  A /  A
⋃︀∞=0( )A / ⋃︀∞
=1</p>
      <p>∩  A
( )A,
◀</p>
      <p>Why are constant symbols excluded from Σ?
¬
¬
Our logic generalizes a plethora of extensions of GF with semantically-constrained guards (consult
transitive guards, is a fragment of RGF. We explain our design choices.
the introduction). For instance, transitive and equivalence relations in guards can be simulated in
RGF using R+ and (R ∪ R¯ )* for a fresh binary relation R. Hence, GF+TG, the extension of GF with
¬ Why is the signature separated, i.e. Σ := ΣFO ∪· ΣR ?
To ensure that binary predicates from ΣR appear only in guards; otherwise, even the two-variable
guarded fragment with transitivity is undecidable [6, Th. 2].</p>
      <p>Why is the equality symbol ≈</p>
      <p>excluded from Σ?
Its inclusion makes our logic undecidable, already for GF2 with compositional axioms [8, Th. 5.3.1],
conjunctions of transitive guards [8, Th. 5.3.2], or exponentiation [13, Th. 3.1].</p>
      <p>They are expected to preserve decidability, especially given that the key theorem of
2ExpTimecompleteness of ICPDL [34, Th. 3.28] extends to Hybrid ICPDL.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Future Work</title>
      <p>Future work may proceed along two directions. One promising path is to extend the ICPDL-based
guards to more expressive formalisms, such as linear Datalog or non-binary transitive closure
operators. This would help eliminate the asymmetry between the binary nature of regular guards and the
higher-arity relations allowed in GF. The alternative path is to tackle the finite satisfiability problem for
RGF. This problem is very challenging—even for minimal fragments of ICPDL like LoopPDL—and
has resisted resolution for over 40 years, indicating that significant breakthroughs and new
techniques will be required. A more pragmatic direction is to study fragments of RGF with the FMP
(the finite model property). While formulae like ∀1∃2R(12) combined with either ¬∃1R+(11)
or ∀12(R+(11) → B(12) ∧ ¬B(21)) destroy the FMP by enforcing infinite, non-loopable
R-chains, one may hope that fluted RGF retains it. With similar counter-examples we show:
Lemma 1. For the set of allowed operators Op being either {· +, ?}, {· +, · * }, {· +, ¯·}, or {· +, ∘} we have
that the fluted RGF with the operators in programs restricted to these from Op does not have the finite
model property. ◀
We can already prove that FRGF[· +] has the FMP and we are currently trying to extend our
approach to FRGF[· +, ∩, ∪]. More details are coming soon!</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This work was supported by NCN grants 2024/53/N/ST6/01390 (Bartosz Bednarczyk) and
2021/41/B/ST6/00996 (Emanuel Kieroński). This paper is an extended abstract of our paper recently
accepted to KR 2025. Its extended version will be publicly available on arXiv soon.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used GPT-4 and Grammarly in order to: Grammar and
spelling check, Improve writing style, and Paraphrase and reword. After using these tools, the authors
reviewed and edited the content as needed and take full responsibility for the publication’s content.
[11] E. Kieroński, I. Pratt-Hartmann, L. Tendera, Equivalence Closure in the Two-Variable Guarded</p>
      <p>Fragment, Journal of Logic and Computation 27 (2017) 999–1021.
[12] L. Tendera, Finite Model Reasoning in Expressive Fragments of First-Order Logic, in: M4M at</p>
      <p>ICLA, 2017.
[13] J. Michaliszyn, Konstrukcje PDL w Logice ze Strażnikami, Master’s thesis, University of Wrocław,
2008. Available (in polish) at https://ii.uni.wroc.pl/~jmi/papers/magisterka.PDF.
[14] D. Calvanese, T. Eiter, M. Ortiz, Regular Path Queries in Expressive Description Logics with</p>
      <p>Nominals, in: C. Boutilier (Ed.), IJCAI, 2009.
[15] S. Göller, M. Lohrey, C. Lutz, PDL with Intersection and Converse: Satisfiability and Infinite-State</p>
      <p>Model Checking, Journal of Symbolic Logic 74 (2009) 279–314.
[16] D. Calvanese, G. D. Giacomo, M. Lenzerini, Conjunctive Query Containment and Answering Under</p>
      <p>Description Logic Constraints, ACM Transactions on Computational Logic 9 (2008) 22:1–22:31.
[17] G. Gottlob, A. Pieris, L. Tendera, Querying the Guarded Fragment with Transitivity, in: ICALP,
2013.
[18] E. Grädel, Description Logics and Guarded Fragments of First Order Logic, in: DL, 1998.
[19] E. Grädel, M. Otto, The Freedoms of (Guarded) Bisimulation, in: Johan van Benthem on Logic and</p>
      <p>Information Dynamics, Springer, 2014, pp. 3–31.
[20] C. Lutz, Q. Manière, Adding Circumscription to Decidable Fragments of First-Order Logic: A</p>
      <p>Complexity Rollercoaster, in: KR, 2024.
[21] J. C. Jung, C. Lutz, H. Pulcini, F. Wolter, Separating Data Examples by Description Logic Concepts
with Restricted Signatures, in: KR, 2021.
[22] D. Figueira, S. Figueira, E. Pin Baque, Finite Controllability for Ontology-Mediated Query
Answering of CRPQ, in: KR, 2020.
[23] S. Zheng, R. Schmidt, Deciding the Loosely Guarded Fragment and Querying Its Horn Fragment</p>
      <p>Using Resolution, in: AAAI, 2020.
[24] P. Bourhis, M. Morak, A. Pieris, Making Cross Products and Guarded Ontology Languages</p>
      <p>Compatible, in: IJCAI, 2017.
[25] F. Baader, I. Horrocks, C. Lutz, U. Sattler, An Introduction to Description Logic, Cambridge</p>
      <p>University Press, 2017.
[26] I. Horrocks, O. Kutz, U. Sattler, The Even More Irresistible SROIQ, in: KR, 2006.
[27] E. Kieroński, Results on the Guarded Fragment with Equivalence or Transitive Relations, in: CSL,
2005.
[28] L. Segoufin, B. ten Cate, Unary Negation, Logical Methods in Computer Science 9 (2013).
[29] J. C. Jung, C. Lutz, M. Martel, T. Schneider, Querying the Unary Negation Fragment with Regular</p>
      <p>Path Expressions, in: ICDT, 2018.
[30] D. Figueira, S. Figueira, A Common Ancestor of PDL, Conjunctive Queries, and Unary Negation</p>
      <p>First-order, ArXiV (version 1) (2025).
[31] Y. Nakamura, Guarded Negation Transitive Closure Logic is 2-EXPTIME-complete, ArXiV (version
2) (2025).
[32] M. Benedikt, P. Bourhis, M. Vanden Boom, A Step Up in Expressiveness of Decidable Fixpoint</p>
      <p>Logics, in: LICS, 2016.
[33] V. Bárány, B. ten Cate, L. Segoufin, Guarded Negation, Journal of the ACM 62 (2015) 22:1–22:26.
[34] S. Göller, Computational Complexity of Propositional Dynamic Logics, Ph.D. thesis, University of
Leipzig, 2008. URL: http://www.lsv.fr/Publis/PAPERS/PDF/goeller-phd14.pdf.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H.</given-names>
            <surname>Andréka</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Németi</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. van Benthem</surname>
          </string-name>
          ,
          <source>Modal Languages and Bounded Fragments of Predicate Logic, Journal of Philosophical Logic</source>
          <volume>27</volume>
          (
          <year>1998</year>
          )
          <fpage>217</fpage>
          -
          <lpage>274</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Grädel</surname>
          </string-name>
          ,
          <source>On The Restraining Power of Guards, Journal of Symbolic Logic</source>
          <volume>64</volume>
          (
          <year>1999</year>
          )
          <fpage>1719</fpage>
          -
          <lpage>1742</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Otto</surname>
          </string-name>
          , Highly Acyclic Groups,
          <article-title>Hypergraph Covers, and the Guarded Fragment</article-title>
          ,
          <source>Journal of the ACM</source>
          <volume>59</volume>
          (
          <year>2012</year>
          ) 5:
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          :
          <fpage>40</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>E.</given-names>
            <surname>Grädel</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Walukiewicz</surname>
          </string-name>
          , Guarded Fixed Point Logic, in: LICS,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Bárány</surname>
          </string-name>
          , G. Gottlob,
          <string-name>
            <given-names>M.</given-names>
            <surname>Otto</surname>
          </string-name>
          , Querying the Guarded Fragment,
          <source>Logical Methods in Computer Science</source>
          <volume>10</volume>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ganzinger</surname>
          </string-name>
          , C. Meyer, M.
          <article-title>Veanes, The Two-Variable Guarded Fragment with Transitive Relations</article-title>
          , in: LICS,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Szwast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tendera</surname>
          </string-name>
          ,
          <article-title>The Guarded Fragment with Transitive Guards</article-title>
          ,
          <source>Annals of Pure and Applied Logic</source>
          <volume>128</volume>
          (
          <year>2004</year>
          )
          <fpage>227</fpage>
          -
          <lpage>276</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kazakov</surname>
          </string-name>
          ,
          <article-title>Saturation-Based Decision Procedures For Extensions Of The Guarded Fragment</article-title>
          ,
          <source>Ph.D. thesis, Universität des Saarlandes</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kieroński</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rudolph</surname>
          </string-name>
          ,
          <article-title>Finite Model Theory of the Triguarded Fragment and Related Logics</article-title>
          , in: LICS,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Michaliszyn</surname>
          </string-name>
          ,
          <article-title>Decidability of the Guarded Fragment with the Transitive Closure</article-title>
          , in: ICALP,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>