<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Thomas A˚gotnes and Dirk Walther. A logic of strategic ability under bounded
memory. Journal of Logic, Language and Information</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>An extension of RB-ATL</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nguyen Hoang Nga</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2009</year>
      </pub-date>
      <volume>18</volume>
      <issue>1</issue>
      <fpage>55</fpage>
      <lpage>77</lpage>
      <abstract>
        <p>RB-ATL is a logic to specify coalitional properties of multiagent systems where actions cost certain amount of resources. RB-ATL allows us to express properties such as within a limited amount of resources, a group of agents can produce a particular result but not another. This paper extends RB-ATL so that it is possible to express coalitional properties where we only consider the limitation over a subset of all resources.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>In previous work [2], we have presented a logic, namely RB-ATL, which allows
expressing and reasoning about properties of coalitional ability under resource
constraints. The logic extended ATL [3] where a bound over resources is added into
each cooperation modality. Each resource bound, defined as a vector, specifies the
upper bound over each resource available to (or willing to contribute by) an agent
or a group of agents. This means it is not possible to express properties in RB-ATL
where the upper bound over a subset of resources is of interest.</p>
      <p>
        For example, let us consider a set of two resources: memory and network
bandwidth. It is possible to express in RB-ATL the property that Agents 1 and 2 can
enforce p to become true without using more than 4 units of memory and 2 units
of network bandwidth by the formula ⟪{1, 2}(
        <xref ref-type="bibr" rid="ref1 ref3">4,2</xref>
        )⟫⊺U p. However, if we would
like to express the same property except we do not care about how much
network bandwidth can be used, it is not possible to do so in RB-ATL unless the
language allows infinite disjunction. For this reason, the property can only be
written as ⋁n≥0⟪{1, 2}(4,n)⟫⊺U p. In order to express such properties, in this paper, we
extend RB-ATL by allowing the inclusion of an extra symbol ∞ in the resource
bounds. The idea is that whenever no limit is required over a resource, we can set
the bound for this resource as ∞. We also show that the resulting logic RBATL∞
is sound and complete.
      </p>
      <p>The remainder of this paper is structured as follows. We first briefly recall the
syntax and semantics of RB-ATL. Then, we introduce the syntax and semantics
of the extended logic RBATL∞. After that, we give a complete axiomatization
followed by a sketch proof of the completeness. At the end is the section of related
work and conclusion.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Resource-bounded ATL</title>
      <p>As RBATL∞ is based on RB-ATL [2], we first briefly recall RB-ATL. RB-ATL
extended ATL in order to allow expressing properties of coalitional ability under
limited amounts of resources. Bounds on resources are defined as vectors of
numbers each of which corresponds to the bound on a type of resources. If we fix a
finite set of resources r, then the set of bounds is defined as B = N∣r∣. Given a set
of propositions Φ and a finite set of agents N , formulas of RB-ATL are defined by
the following syntax:
ϕ ∶∶= p ∣ ¬ϕ ∣ ϕ ∨ ψ ∣ ⟪A ⟫◯ϕ ∣ ⟪Ab⟫ϕU ψ ∣ ⟪A ⟫ ◻ ϕ
b b
b
where p ∈ Φ, A ⊆ N and b ∈ B. Intuitively, ⟪A ⟫◯ϕ says that the coalition A
can co-operate (in one step) to make ϕ true without spending more than b amount
b ϕU ψ means that the coalition A can co-operate (in
of resources. Similarly, ⟪A ⟫
many consecutive steps) to eventually make ψ true without spending more than b
b
amount of resources while keeping ϕ true; and ⟪A ⟫ ◻ ϕ says that the coalition</p>
      <sec id="sec-2-1">
        <title>A can co-operative from now on to guaranty that ϕ is true without spending more than b amount of resources.</title>
      </sec>
      <sec id="sec-2-2">
        <title>For convenience, we only study the soundness and completeness of the normal form version of RB-ATL whose syntax is as follows:</title>
      </sec>
      <sec id="sec-2-3">
        <title>For short, normal form RB-ATL are referred to as RB-ATL in the rest of this paper.</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>We also use ∼ ϕ to denote the equivalent normal form formula of ¬ϕ.</title>
      <sec id="sec-3-1">
        <title>Semantics of RB-ATL is defined in terms of Resource-bounded Concurrent</title>
        <p>Game Structures (RB-CGS) together with the notions of move, co-move, strategy
and co-strategy. A Resource-bounded Concurrent Game Structure (RB-CGS) is a
tuple S = (n, Q, Π, π, d, c, δ) where:
• n ≥ 1 is the number of players (agents), we denote the set of players {1, . . . , n}
by N
• Q is a non-empty set of states
• Π is a finite set of propositional variables
• π ∶ Q → ℘(Π) is a mapping which assigns each state in Q a subset of
propositional variables
• d ∶ Q × N → N is a mapping to indicate the number of available moves
(actions) for each player a ∈ N at a state q ∈ Q such that d(q, a) ≥ 1. At each
state q ∈ Q, we denote the set of joint moves available for all players in N
by D(q). That is</p>
        <p>D(q) = {1, . . . , d(q, 1)} × . . . × {1, . . . , d(q, n)}
• c ∶ Q × N × N → B is a mapping to indicate the minimal amount of resources
required by each move available to each agent at a specific state.
• δ ∶ Q × Nn → Q is a mapping which assigns the next state of the system after
agents perform a joint move in D(q) from a state.</p>
      </sec>
      <sec id="sec-3-2">
        <title>From the definition of RB-CGSs, resource bounds are used to specify the costs</title>
        <p>of actions performed by agents. In order to express the spending of a subset of
agents in one or many steps, we aggregate the spending of each agent in the subset.</p>
      </sec>
      <sec id="sec-3-3">
        <title>This type of aggregation is called parallel aggregation. Another type of aggregation</title>
        <p>is called serial where an agent (coalition) performs some (joint) action and then
performs another (joint) action; the aggregative spending of the agent (coalition)
after the two steps is the serial aggregation of the costs of the two (joint) actions.</p>
      </sec>
      <sec id="sec-3-4">
        <title>For simplicity, we assume in this paper that both types of aggregations are defined as addition.</title>
        <p>Given a RB-CGS S = (n, Q, Π, π, d, c, δ), we denote the set of infinite
sequences of states by Qω as usual. Let λ = q0q1 . . . ∈ Qω, we denote λ i
[ ] = qi
and λ[i, j] = qi . . . qj . A move for a coalition A ⊆ N at a state q ∈ Q is a tuple
σA = (σa)a∈A such that 1 ≤ σa ≤ d(q, a). For convenience, we denote DA(q)
to be the set of all moves for A at q. Furthermore, given m ∈ D(q), we
denote mA = (ma)a∈A. Then we define the set of all possible outcomes by a move
σA ∈ DA(q) at a state q as follows</p>
        <p>out(q, σA) = {q′ ∈ Q ∣ ∃m ∈ D(q) ∶ mA = σA ∧ q′ = δ(q, m)}
The cost of a move σA ∈ DA(q) then is defined as cost(q, σA) = ∑a∈A c(q, a, σa).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>A strategy for a coalition A ⊆ N is a mapping FA which associates each</title>
      <p>sequence λq ∈ Q+ to a move in DA(q). A computation λ ∈ Qω is consistent with
FA iff for all i ≥ 0, λ[i + 1] ∈ out(λ[i], FA(λ[0, i])). We denote by out(q, FA)
the set of all such sequences λ starting from q, i.e. q = λ 0 . Given a bound
[ ]
b ∈ B, a computation λ ∈ out(q, FA) is b-consistent with FA iff, for every i ≥ 0,
i
∑j=0 cost(λ[i], FA(λ[0, i])) ≤ b. We denote out(q0, FA, b) the set of all such
sequences. Then, a strategy FA is a b-strategy iff out(q, FA) = out(q, FA, b) for
any q ∈ Q.</p>
      <sec id="sec-4-1">
        <title>Similarly to the case of moves and strategies, we define a co-move for a coali</title>
        <p>tion A ⊆ N as a mapping σAc ∶ DA(q) → Q such that σAc(σA) ∈ out(q, σA) for
any σA ∈ DA(q). We denote DAc(q) be the set of all co-moves for A at a state
q ∈ Q. A state q′ is consistent with a co-move σc iff there is some move σA such
that σc(σA) = q′. We define the set of consistent outcomes for a co-move σc by
out(q, σc) = {q′ ∈ Q ∣ q′ is consistent with σc}</p>
        <sec id="sec-4-1-1">
          <title>Given a bound b ∈ B, a state q′ is b-consistent with a co-move σc at q iff there is</title>
          <p>some move σA ∈ DA(q) with cost(q, σA) ≤ b such that σc(σA) = q′. We denote
the set of b-consistent outcomes for a co-move σc by</p>
          <p>out(q, σc, b) = {q′ ∈ Q ∣ q′ is b-consistent with σc at q}</p>
          <p>A co-strategy for a coalition A ⊆ N is a mapping FAc which assigns each
sequence λq ∈ Q+ to a co-move in DAc(q). We say a computation λ ∈ Qω is
consistent with FAc iff, for all i ≥ 0, λ[i + 1] ∈ out(λ[i], FAc (λ[0, i])). Let us define
out(q, FAc ) to be the set of all such sequences where q = λ 0 . We say a
computa[ ]
tion λ ∈ out(q, FAc ) is b-consistent with FAc iff, for all i ≥ 0, there is a sequence of
moves σA0 ∈ DA(λ[0]), . . . , σAi ∈ DA(λ[i]) such that λj+1 = FAc (λ[0, j])(σAj) for
all j = 0, . . . , i and ∑j cost(λ[j], σAj) ≤ b. Let us denote out(q, FAc , b) be the set
of all such sequences where q = λ[0].</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>The truth of a RB-ATL formula ϕ at a state q of a RB-CGS S is defined by</title>
        <p>induction on the structure of ϕ. We ignore the propositional cases, other cases are
listed as follows:</p>
        <p>b
• S, q ⊧ ⟪A ⟫◯ϕ iff there exists a b-strategy FA such that for all λ ∈ out(q, FA),</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>S, λ[1] ⊧ ϕ iff there is a move σA ∈ DA(q) such that for all q′ ∈ out(σA),</title>
      <p>S, q′ ⊧ ϕ
• S, q ⊧ ¬⟪A ⟫◯ϕ iff there exists a co-strategy FAc such that for all λ ∈
b
out(q, FA, b), S, λ[1] ⊧∼ ϕ iff there is a co-move σc ∈ DAc(q) such that
for all σA ∈ DA(q) and cost(σA) ≤ b, S, σc(σA) ⊧∼ ϕ</p>
      <p>b
• S, q ⊧ ⟪A ⟫ ◻ ϕ iff there exists a b-strategy FA for any λ ∈ out(q, FA),</p>
      <p>S, λ[i] ⊧ ϕ for all i ≥ 0
• S, q ⊧ ¬⟪A ⟫ ◻ ϕ iff there exists a co-strategy FAc for any λ ∈ out(q, FAc , b),
b
S, λ[i] ⊧ ϕ for all i ≥ 0
3</p>
    </sec>
    <sec id="sec-6">
      <title>Syntax and semantics of RBATL∞</title>
      <p>We define the set of resource bounds with infinity as B∞ = (N ∪ {∞})∣r∣. To make
addition and comparison over resource bounds compatible with infinity, we extend
them to include the case ∞ as follows:
n + ∞ = n + ∞ = ∞
∞ + ∞ = ∞
n ≤ ∞
∞ ≤ ∞
where n ∈ N. Notice that costs of actions in RB-CGSs are still defined by B while
bounds appearing in RB-ATL formulas may include infinity. The syntax of (normal
form) RBATL∞ is defined as follows.
b
where p ∈ Φ, b ∈ B∞ and A ⊆ N . We define the ⟪∅ ⟫◯ modality as the dual one
of ⟪N b⟫◯, i.e. ⟪∅ ⟫◯ϕ ≡ ¬⟪N b⟫◯ ∼ ϕ. This modality is to say that a system
b
of multiple agents cannot avoid some thing if they are not allowed to spend more
than some b amount of resources.</p>
      <p>The semantics of RBATL∞ is also defined by means of RB-CSGs. However,
we need to extend the notion of b-consistency of strategies to include the case where
b ∈ B∞. Given a bound b ∈ B∞ and a strategy FA, a computation λ ∈ out(q, FA)
i
is b-consistent with FA iff, for every i ≥ 0, ∑j=0 cost(λ[i], FA(λ[0, i])) ≤ b. We
denote out(q0, FA, b) the set of all such sequences. Then, a strategy FA is a
bstrategy iff out(q, FA) = out(q, FA, b) for any q ∈ Q. Similar extensions are also
applied for the case of co-moves and co-strategies.</p>
      <p>Given a RB-CGS S = (n, Q, Π, π, d, c, δ), the truth of a RBATL∞ formula is
defined inductively as follows where A is a non-empty coalition:
• S, q ⊧ p iff p ∈ π(q)
• S, q ⊧ ¬p iff p ∉ π(q)</p>
      <p>b
• S, q ⊧ ⟪A ⟫◯ϕ iff there exists a b-strategy FA such that for all λ ∈ out(q, FA),</p>
    </sec>
    <sec id="sec-7">
      <title>S, λ[1] ⊧ ϕ. In other words, it is equivalent to say that there is a move</title>
      <p>σA ∈ DA(q) such that for all q′ ∈ out(σA), S, q′ ⊧ ϕ
• S, q ⊧ ¬⟪A ⟫◯ϕ iff there exists a co-strategy FAc such that for all λ ∈
b
out(q, FA, b), S, λ[1] ⊧∼ ϕ. In other words, it is equivalent to say that there
is a co-move σc ∈ DAc(q) such that for all σA ∈ DA(q) and cost(σA) ≤ b,
S, σc(σA) ⊧∼ ϕ</p>
      <p>b
• S, q ⊧ ⟪∅ ⟫◯ϕ iff for every b-strategy FN for all λ ∈ out(q, FA), S, λ[1] ⊧
ϕ</p>
      <p>b
• S, q ⊧ ¬⟪∅ ⟫◯ϕ iff there is a b-strategy FN such that for all λ ∈ out(q, FN ),
S, λ[1] ⊧∼ ϕ</p>
      <p>b ϕU ψ iff there exists a co-strategy FAc such that for all λ ∈
• S, q ⊧ ¬⟪A ⟫
out(q, FA, b), either S, λ[i] ⊧ ψ for all i ≥ 0 or if there is a position i ≥ 0
such that S, λ[i] ⊧ ψ then there exists 0 ≤ j &lt; i such that S, λ[j] ⊧∼ ϕ
4</p>
    </sec>
    <sec id="sec-8">
      <title>Axiomatisation</title>
      <p>In this section, we present an axiomatisation system of RBATL∞. We first
introduce notations appearing in the axiomatisation. In the following, A, A1, A2
denotes non-empty coalitions, b, b1, b2 and d ∈ B∞. We say that b +∞ d = e for any
b, d and e ∈ B∞ iff for every i = 1, . . . , ∣r∣,
bi + di = ei if ei =/ ∞
bi = di = ∞ if ei = ∞
Intuitively, +∞ is used to split the usage of resources over multiple stages. As ∞ in
some bound component means no constraint is required on the corresponding
resource, we can also ignore the limitation on this resource in each stage by assigning
∞ to the corresponding component in each stage. For example, consider the bound
(2, 3, ∞), it can be split into (1, 2, ∞) and (1, 1, ∞) so that the bound on the third
resource is ignored. Using +∞ rather than + makes sure that the number of ways
to split of resource bounds is finite.</p>
      <p>Hence, we define the following macros:
⟪¬A⟪Ab⟫b◯⟫◯◻◻ϕϕ==⋁⋀b1b+1∞+∞b2b=2b=⟪bA¬b⟪1A⟫◯b1 ⟫⟪◯Ab⟪2A⟫b◻2 ⟫ϕ◻ ϕ</p>
      <p>b
¬⟪A ⟫◯ϕU ψ = ⋀b1+∞b2=b ¬b1⟪A⟫◯b1 ⟪Ab2
⟪A ⟫b◯ϕU ψ = ⋁b1+∞b2=b⟪Ab1 ⟫◯⟪A⟫ϕb2U⟫ϕψU ψ
⟪∅b⟫b◯ ◻ ϕ = ⋀b1+∞b2=b⟪∅ b⟫1◯⟪∅b2b⟫2 ◻ ϕ
¬⟪∅ ⟫◯ ◻ ϕ = ⋁b1+∞b2=b⟪∅ ⟫◯⟪∅ ⟫ ◻ ϕ</p>
      <sec id="sec-8-1">
        <title>Similar to the reason of introducing +∞, we also define a zero bound 0¯b with</title>
        <p>respect to a bound b in B∞ as follows, for all i = 1, . . . , ∣r∣
(0¯b)i =
0 if bi =/ ∞
∞ otherwise</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>This means we ignore any component which is ∞.</title>
      <sec id="sec-9-1">
        <title>The axiomatisation system of RBATL∞ is as follows:</title>
        <p>Axioms</p>
        <p>b
( ) ¬⟪A ⟫◯</p>
        <p>b
(⊺) ⟪A ⟫◯⊺
(PL) Tautologies of Propositional Logic
(B) ⟪A ⟫◯ϕ → ⟪Ad⟫◯ϕ</p>
        <p>b
where b ≤ d
(S) ⟪Ab11 ⟫◯ϕ ∧ ⟪Ab22 ⟫◯ψ → ⟪(A1 ∪ A2)b1+b2 ⟫◯(ϕ ∧ ψ)
where A1 ∩ A2 = ∅
(S∅) ⟪∅b1 ⟫◯ϕ ∧ ⟪∅b2 ⟫◯ψ → ⟪∅b1 ⟫◯(ϕ ∧ ψ)</p>
        <p>where b1 ≤ b2
(SN ) ⟪N b1 ⟫◯ϕ ∧ ⟪∅b2 ⟫◯ψ → ⟪N b1 ⟫◯(ϕ ∧ ψ)
where b1 ≤ b2
Inference rules
b
(⟪A ⟫◯-Monotonicity)
(⟪∅b⟫◻-Necessitation)
ϕ → ψ
⟪Ab⟫◯ϕ → ⟪Ab⟫◯ψ</p>
        <p>ϕ
⟪∅b⟫ ◻ ϕ
(⟪Ab⟫◻-Induction) θ → (ϕ ∧ (⟪Ab⟫◯ ◻ ϕ ∨ ⟪A0¯b ⟫◯θ))
θ → ⟪Ab⟫ ◻ ϕ
(⟪Ab⟫U -Induction) (ψ ∨ (ϕ ∧ (⟪Ab⟫◯ϕU ψ) ∨ ⟪A0¯b ⟫◯θ))) → θ
⟪Ab⟫ϕU ψ → θ</p>
      </sec>
      <sec id="sec-9-2">
        <title>Proposition 1. The above axiomatization system for RBATL∞ is sound and com</title>
        <p>plete.</p>
      </sec>
      <sec id="sec-9-3">
        <title>In the rest of this section, we provide a sketch proof of Proposition 1. As</title>
        <p>the proof of soundness is straightforward, it is ignored here. To prove the
completeness, as usual, we will construct a model for any consistent formula ϕ0 of</p>
      </sec>
      <sec id="sec-9-4">
        <title>RBATL∞. The constructed models are in the form of fixed-branch trees defined as follows.</title>
      </sec>
      <sec id="sec-9-5">
        <title>Given a finite alphabet Θ, we denote the sets of finite words and infinite words</title>
        <p>of Θ by Θ∗ and Θω, respectively.</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Definition 1. A tree T is a subset of N∗ where for any x ⋅ c ∈ T , where x ∈ N∗ and</title>
      <p>c ∈ N:
• x ∈ T
• x ⋅ c′ ∈ T for all 0 ≤ c′ ≤ c</p>
      <sec id="sec-10-1">
        <title>Given a tree T , is the root of T . Nodes of T are elements of T . We define</title>
        <p>succ ∶ T → 2T as a function to return the successors of a node x ∈ T . Formally,
succ(x) = {x ⋅ c ∈ T ∣ c ∈ N}. The degree d(x)of a node x is defined as the
cardinality of succ(x), i.e. d x</p>
        <p>( ) = ∣succ(x)∣. A node x is a leaf iff d(x) = 0. A
node x is an interior node iff d(x) &gt; 0.</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Definition 2. Given a set Θ, a Θ-labeled tree is a pair (T, V ) where T is a tree</title>
      <p>and V ∶ T → Θ is a mapping which labels each node of T with an element of Θ.</p>
      <p>Given a finite set of agents N = {1, . . . , n}, for the purpose of constructing
models for consistent formulas of RB-ATL, we are interested in a special form of
Θ-labeled trees (T, V ) where Θ is the set 2Π of subsets of propositions and the
degree of every node of T is fixed by some given number k ∈ N, i.e. deg (x) =
kn for all x ∈ T . Then, a 2Π-labeled tree (T, V ) with a fixed degree kn can be
considered as the skeleton of a model for RB-ATL formulas. We call a tree with a
fixed degree kn as a kn-tree. Informally, each node of T is considered as a state.
tForoxm⋅ kenac−h 1st.aWte exc∈anT n,athmeereeaarcehktnratnrsaintisoitniofnros mto xitstosuxcc⋅ecsbsyoras,tnuapmlee(lya1f,ro..m. ,xan⋅0)
where
1. 1 ≤ ai ≤ k
2. encode((a1, . . . , an)) = c
Where encode ∶ {1, . . . , k}n → {0, . . . , kn − 1} is a bijective function which is
defined as</p>
      <p>encode((x1, . . . , xn)) = (x1 − 1)kn−1 + (x2 − 1)kn−2 + . . . + (xn − 1)
For convenience, we call the inverse function of encode as decode. Then, each
transition from x to x ⋅ c can be considered as the effect of the joint action of
n agents in N where agent i performs the action ai for all i ∈ {1, . . . , n} and
(a1, . . . , an) = decode(c). Moreover, to become a model for RB-ATL formulas,
we need to supply for each 2Π-labeled kn-tree (T, V ) a costing function which
defines the cost of each action of an agent at a node on the tree. We have the
following definition.</p>
      <sec id="sec-11-1">
        <title>Definition 3. A 2Π-labeled kn-costed-tree is a tuple (T, V, C) where (T, V ) is a</title>
      </sec>
      <sec id="sec-11-2">
        <title>2Π-labeled kn-tree and C ∶ T × N × {1, . . . , k} → B is a costing function.</title>
      </sec>
      <sec id="sec-11-3">
        <title>Given a 2Π-labeled kn-costed-tree (T, V, C), we define the corresponding RB</title>
        <p>CGS S(T,V,C) = (n, T, Π, V, d, C, δ) where d(x, i) = k for all x ∈ T and i ∈ N and
δ(x, (a1, . . . , an)) = x ⋅encode((a1, . . . , an)). It is straightforward that S(T,V,C) is
9
well-defined. We shall write (T, V, C), x ⊧ ϕ for S(T,V,C), x ⊧ ϕ and (T, V, C) ⊧
ϕ for (T, V, C), ⊧ ϕ. Furthermore, we also have that in S(T,V,C), the available
joint actions for any coalition A at any state are the same, i.e. DA(x) = DA(x′)
for any x, x′ ∈ T , hence we shall write ΔA for DA(x).</p>
        <sec id="sec-11-3-1">
          <title>Notice that when constructing the tree model for a consistent formula, we build</title>
          <p>kn-costed-trees which are labeled by subsets of formulas rather than only a subset
of propositional variables. However, we can consider them as models for RB-ATL
formulas by restricting the labeling function V over the set of propositions, i.e.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>V (t) ∩ Π. Finally, we define a simple tree as a tree which consists of only a root</title>
      <p>and its children.</p>
      <sec id="sec-12-1">
        <title>The ingredients for labeling nodes of tree during the construction are defined</title>
        <p>in terms of closure of ϕ0.</p>
        <p>Definition 4. The closure cl(ϕ0) is the smallest set of formulas that satisfies the
following closure condition:
• All sub-formulas of ϕ including itself are in cl(ϕ0)
• If ⟪Ab⟫ ◻ ϕ is in cl(ϕ0), then so are ⟪Ab1 ⟫◯⟪Ab2 ⟫ ◻ ϕ for all b1 +∞ b2 = b
and also ⟪A0b ⟫◯⟪Ab⟫ ◻ ϕ
• If ⟪Ab⟫ϕU ψ is in cl(ϕ0), then so are ⟪Ab1 ⟫◯⟪Ab2 ⟫ϕU ψ for all b1+∞b2 = b
and also ⟪A0b ⟫◯⟪Ab⟫ϕU ψ
• If ϕ is in cl(ϕ0), then so is ∼ ϕ
• cl(ϕ0) is also closed under finite positively boolean operator (∨ and ∧) up
to tautology equivalence.</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>Hence, cl(ϕ0) is finite. We denote cl(ϕ0)◯ to be the set of all formulas of</title>
      <p>b b
form ⟪A ⟫◯ϕ or ¬⟪A ⟫◯ϕ in cl(ϕ0).</p>
      <sec id="sec-13-1">
        <title>Then, the following three lemmas describe each step of the construction of the tree model. We only provide the proof of the last lemma.</title>
        <p>Lemma 1. Let Φ = {⟪Ab11 ⟫◯ϕ1, . . . , ⟪Abkk ⟫◯ϕk, ¬⟪A ⟫◯ϕ} be a consistent set
b
of formulas where:
• All Ai are both non-empty and pair-wise disjoint
• ⋃i Ai ⊆ A
• ∑i bi ≤ b
We have Ψ = {ϕ1, . . . , ϕk, ∼ ϕ} is also consistent.</p>
        <p>10
Lemma 2. Let Φ = {⟪Ab11 ⟫◯ϕ1, . . . , ⟪Abkk ⟫◯ϕk, ⟪∅e1 ⟫◯χ1, . . . , ⟪∅em ⟫◯χm}
be a consistent set of formulas where:
• All Ai are both non-empty and pair-wise disjoint
• ∑i bi ≤ ej for all j
We have Ψ = {ϕ1, . . . , ϕk, χ1, . . . , χm} is also consistent.</p>
      </sec>
      <sec id="sec-13-2">
        <title>We now use the above lemma to construct a simple tree which is locally consistent for a consistent set of formulas.</title>
        <p>Definition 5. A tree (T, V, C) is locally consistent if and only if for any interior
node t ∈ T :</p>
        <p>b</p>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>1. If ⟪A ⟫◯ϕ ∈ V (t), then there is a move σA such that C(t, A, σA) ≤ b and for any c ∈ out(σA) we have ϕ ∈ V (c)</title>
      <p>b</p>
    </sec>
    <sec id="sec-15">
      <title>2. If ¬⟪A ⟫◯ϕ ∈ V (t), then for any move σA with C(t, A, σA) ≤ b, there exists c ∈ out(σA) where ∼ ϕ ∈ V (c)</title>
      <p>Lemma 3. Let Φ be a finite consistenbt set of formulas, Φ◯ the subset of Φ which
contains all formulas of the forms ⟪A ⟫◯ϕ or their negations from Φ and k some
number where ∣Φ◯∣ &lt; k, there is a simple kn-costed-tree (T, V, C) which is locally
consistent such that V ( ) = Φ.</p>
      <sec id="sec-15-1">
        <title>Proof. Firstly, we have ¬⟪N b⟫◯ϕ and ¬⟪∅ ⟫◯ϕ are equivalent to ⟪∅ ⟫◯ ∼ ϕ</title>
        <p>b b
and ⟪N b⟫◯ ∼ ϕ, respectively. Therefore, we only considber the case when Φ◯
does not contain formulas of the form ¬⟪N b⟫◯ϕ and ¬⟪∅ ⟫◯ϕ.</p>
        <p>Assume that
Φ◯
= {⟪Ab11 ⟫◯ϕ1, . . . , ⟪Abmm ⟫◯ϕm}∪
{¬⟪ Be11 ⟫◯ψ1, . . . , ¬⟪Bldl ⟫◯ψl}∪</p>
        <p>
          d1
{⟪∅ ⟫◯χ1, . . . , ⟪∅eh ⟫◯χh}
where all Ai are non-empty, all Bi are both non-empty and not equal to the grand
coalition N . We define a vector max ∈ B where each component of max is the
maximal bound except infinity of the corresponding resource appearing in Φ◯. In
the case that there is no maximal bound, then the component of max is set to 0.
For example, assume that ∣r∣ = 2 and Φ◯ = {⟪{1, 2}(
          <xref ref-type="bibr" rid="ref1 ref1">2,2</xref>
          )⟫◯p, ⟪{1}(3,∞)⟫◯p},
then max = (
          <xref ref-type="bibr" rid="ref1 ref2">3, 2</xref>
          ); in another case, if Φ◯ = {⟪{1}(3,∞)⟫◯p} then max = (
          <xref ref-type="bibr" rid="ref2">3, 0</xref>
          ).
        </p>
        <p>Then, we define a function deinf ∶ B∞ → B which removes infinity from a
bound as follows: deinf(b) = b′ where for all i = 1, . . . , ∣r∣
(b′)i =
(b)i if (b)i =/ ∞
maxi +1 otherwise
11</p>
      </sec>
    </sec>
    <sec id="sec-16">
      <title>Let e be a bound of resources such that e &gt; deinf(ei) for all i ∈ {1, . . . , h}.</title>
      <p>We construct a tree with a root labelled by Φ and kn children, each is denoted
by c = encode(a1, . . . , an) where ai ∈ {1, . . . , k}. Intuitively, we allow each agent
i to perform k different actions and the special action k for each agent will be
considered as the costless idle-action. We shall denote c i
( ) = ai for the action
performed by agent i with the corresponding outcome c. In the following, we
define the labeling function V (c) for each node c and the cost function C( , i, a)
for each agent i and action a ∈ {1, . . . , k}.</p>
      <p>For each ⟪Abpp ⟫◯ϕp ∈ Φ◯ wherein Ap =/ ∅, ϕp is added to V (c) whenever
c(i) = p for all i ∈ Ap. Let minAp be the smallest number in Ap, we assign the
cost of action p performed by minAp to be bp, i.e. C( , minAp , p) = deinf(bp). For
actions of other agents i in Ap, we assign C( , i, p) = 0¯.</p>
      <p>After considering all ⟪Abpp ⟫◯ϕp ∈ Φ◯, for all other unassigned-cost actions,
i.e. actions a &gt; m but a &lt; k for all agents, we simply set their costs to be e. The
action k performed by all agents is defined to associate with the cost 0. We denote
ep
C(c) = ∑i∈N C( , i, c(i)). Then, for each ⟪∅p ⟫◯χp ∈ Φ , χp is added to V (c)
◯
whenever C(c) ≤ ep.</p>
    </sec>
    <sec id="sec-17">
      <title>Finally, we will add at most one formula from the negation formulas of Φ◯</title>
      <p>to V (c). We denote C(c, A) = ∑i∈A C( , i, c(i)). For each c, let Φ−◯(c) =
{¬⟪Bd⟫◯ψ ∈ Φ◯ ∣ C(c, B) ≤ d} = {¬⟪Bid1i1 ⟫◯ψi1 , . . . , ¬⟪Bidllcc ⟫◯ψlc } where
i1 &lt; i2 &lt; . . . &lt; ilc . Let I = {i ∣ m &lt; c(i) ≤ m + lc} and j = ∑i∈I (c(i) − 1 − m)
mod lc + 1. Consider ¬⟪Bidjij ⟫◯ψij : if N ∖ Bij ⊆ I, then ∼ ψij is added into V (c).</p>
      <sec id="sec-17-1">
        <title>We now need to show that our simple tree is locally consistent. In the first step,</title>
        <p>we show that all labels are consistent. It is obvious that V ( ) = Φ is consistent.</p>
      </sec>
    </sec>
    <sec id="sec-18">
      <title>Let us firstly consider every child c of the root where ∼ ψq ∈ V (c) from some</title>
      <p>negation formula in Φ . This will imply that there will be no χ ∈ V (c) from the
formulas of the form ⟪◯∅b⟫◯χ in Φ◯. The reason is that because some ∼ ψq ∈</p>
    </sec>
    <sec id="sec-19">
      <title>V (c), there must be some agent performing an action a ∈ {m + 1, . . . , m + lc} as</title>
      <p>otherwise I = ∅ and the condition N ∖ Bij ⊆ I fails since Bij =/ N . We know that
the cost of this action is e, then C(c) ≥ e, therefore, no χ will be added into V (c).
b</p>
    </sec>
    <sec id="sec-20">
      <title>When there is no ϕ ∈ V (c) from the formulas of the form ⟪A ⟫◯ϕ in Φ◯, the</title>
      <p>proof is trivial as there is only one ∼ ψq ∈ V (c). If there are some ϕp ∈ V (c) where
⟪Abpp ⟫◯ϕp ∈ Φ◯, then for each p, c(i) = p &lt; m for all i ∈ Ap. Hence, all Ap
are pair-wise disjoint. This simply shows that the set of ⟪Abpp ⟫◯ϕp ∈ Φ◯ where
ϕp ∈ V (c) and ∼ ⟪Bqbq ⟫◯ψq satisfies the conditions of Lemma 1. Therefore, V (c)
is consistent.</p>
    </sec>
    <sec id="sec-21">
      <title>Now, we consider every child c of the root where there is no ∼ ψ ∈ V (c) from</title>
      <p>some negation formula in Φ .
◯
12
b</p>
    </sec>
    <sec id="sec-22">
      <title>When there is no ϕ ∈ V (c) from the formulas of the form ⟪A ⟫◯ϕ in Φ◯, the</title>
      <p>proof is trivial as there are only some χq ∈ V (c). If there are some ϕp ∈ V (c) where
a⟪lAlbpApp⟫ ◯arϕeppa∈irΦ-w◯isaenddiAsjopi=/nt∅.,Ftohrenanfyorχeqac∈hVp,(cc)(ib)y=spo m&lt;em⟪f∅oerqa⟫l◯liχ∈qA∈p.ΦH◯e,nwcee,
have that eq ≥ C(c) ≥ ∑peqbp. This simply shows that the set of ⟪Abpp ⟫◯ϕp ∈ Φ◯
where ϕp ∈ V (c) and ⟪∅q ⟫◯χq satisfies the conditions of Lemma 2. Therefore,</p>
    </sec>
    <sec id="sec-23">
      <title>V (c) is consistent.</title>
      <sec id="sec-23-1">
        <title>Let us now check the conditions of local consistency on the newly built tree.</title>
        <p>For ⟪Abpp ⟫◯ϕp ∈ Φ◯, it is straightforward that the move σAp where all agents
in Ap performs action p &lt; m has cost equal to bp and for any c ∈ out(σAp ),
ϕp ∈ V (c).</p>
        <p>For ¬⟪Bpdp ⟫◯ψp ∈ Φ◯ and σ being an arbitrary move of agents in Bp of which
cost is at most equal to dp, we will point out an output c ∈ out(σ) where ∼ ψ ∈ V (c)
and the actions of agents out of Bp are within m + 1 and m + l which always cost
e amount of resources. Even though we do not know the exact actions of agents
out of Bp, the costs of those unspecified actions are known to be e. Hence, we can
determine the set Φ−◯(c) = {¬⟪Bid1i1 ⟫◯ψi1 , . . . , ¬⟪Bidliclc ⟫◯ψilc } as well as lc. It
is obvious that ¬⟪Bpdp ⟫◯ψp ∈ Φ−◯(c), then p = ir for some 1 ≤ r ≤ lc. Let σi
be the action performed by agent i in Bp, we define c(i) = σi for all i ∈ Bp. Let
I′ = {i ∈ Bq ∣ m &lt; c(i) ≤ m + lc} and j′ = ∑i∈I′ (c(i) − 1 − m)) mod lc. We select
an arbitrary i′ ∉ Bp and set c(i′) = m + (r − 1 − j′) mod lc + 1. For all other i ∉ Bp,
let c(i) = m + 1. Then, we have I = {i ∣ m &lt; c(i) ≤ m + lc} = (N ∖ Bp) ∪ I′.
Therefore, ∑i∈I (c(i) − 1 − m) mod lc + 1 = ∑i∈I′∪{i′}(c(i) − 1 − m) mod lc + 1 =
(j′ + c(i′) − 1 − m) mod lc + 1 = (r − 1) mod lc + 1 = r, and N ∖ Bp ⊆ I because
I = (N ∖ Bp) ∪ I′. Hence ∼ ψp ∈ V (c).</p>
      </sec>
      <sec id="sec-23-2">
        <title>Let us consider an example of building such a locally consistent tree. Consider</title>
        <p>a system of 2 agents, i.e. N = {1, 2}, 1 resource, i.e. ∣r∣ = 1, and the following set
Φ of RB-ATL formulas.</p>
        <p>Φ</p>
        <p>= {⟪11⟫◯p, ⟪2∞⟫◯(p → q), ¬⟪12⟫◯q, ¬⟪22⟫◯p, ⟪∅2⟫◯(¬q)}
It is easy to see that max = 2 and we can pick e = 3. We now construct a simple
tree which is locally consistent and the root is labeled by Φ . As ∣Φ ∣ = 5, let us
consider the number of actions for each agent k = 6. Then, the set of outcomes is
O =C{o(ni,sjid)e∣r1th≤eif,ojrm≤u6l}a. ⟪11⟫◯p ∈ Φ , we add to the label of every V ((1, j))
the formula p, for any 1 ≤ j ≤ 6. The cost of action 1 of agent 1 is 1.</p>
      </sec>
    </sec>
    <sec id="sec-24">
      <title>Consider the formula ⟪2∞⟫◯(p → q) ∈ Φ , we add to the label of every</title>
    </sec>
    <sec id="sec-25">
      <title>V ((i, 2)) the formula p → q, for any 1 ≤ i ≤ 6. The cost of action 2 of agent 2 is</title>
      <p>max +1 = 3.</p>
      <sec id="sec-25-1">
        <title>As we mean the action 6 for both agents to be the idle action, we simply assign</title>
        <p>the cost 0 for 6 of both agents. Then we assign the cost e = 3 for all cost-unassigned
actions of both agents. After this step, we add ¬q to every outcome (i, j) of which
the total cost of i and j is no more than 2.</p>
      </sec>
    </sec>
    <sec id="sec-26">
      <title>We have the assignment of labels V ((i, j)) for every 1 ≤ i, j ≤ 6 so far as in</title>
      <p>
        the following table where each column (row) corresponds to an action of agent 1
(
        <xref ref-type="bibr" rid="ref1">2</xref>
        ) together with its cost.
      </p>
      <p>AC 11 23 33 43 53 60
2133 {p, {pp→} q} {p {→} q} {p {→} q} {p {→} q} {p {→} q} {p {→} q}
56430333 {p{{{,ppp¬}}}q} {{{{}}}} {{{{}}}} {{{{}}}} {{{{}}}} {¬{{{}}}q}</p>
      <sec id="sec-26-1">
        <title>Let us consider the negation formulas in Φ . We take each outcome into ac</title>
        <p>count to decide whether one of the sub-formulas of the negation formulas in Φ is
included in the label of the outcome.</p>
        <p>We consider the outcome c = (11, 13), then Φ (c) = {¬⟪12⟫◯q}. Then lc = 1,
I = {i ∣ 2 &lt; c(i) ≤ 2 + 1} = ∅. Therefore, as N ∖ {1} ⊆/ I, ¬q is not included in
V (c).</p>
        <p>We consider the outcome c = (11, 33), then Φ (c) = {¬⟪12⟫◯q}. Then lc = 1,
I = W{ie∣ c2o&lt;nsci(die)r ≤th2e +ou1t}co=m{e2c}.=T(h3e3r,e6f0o)re,,thaesnNΦ∖ {(1c)} =⊆ {I¬,¬⟪2q2i⟫s ◯incpl}u.dTedheinn lVc (=c1),.
I = {i ∣ 2 &lt; c(i) ≤ 2 + 1} = {1}. Therefore, as N ∖ {2} ⊆ I, ¬p is included in V (c).</p>
      </sec>
      <sec id="sec-26-2">
        <title>We can apply the similar argument, and obtain the following table.</title>
        <p>AC 11 23 33 43 53 60
2133 {p, {pp→} q} {p {→} q} {p {→} q} {p {→} q} {p {→} q} {p {→} q}
54633033 {{pp{{,,pp¬¬}}qq}} {{{{}}}} {¬{{{}}}p} {{{{}}}} {{{{}}}} {{¬¬{{}}qq}}</p>
        <p>In the following, Γ is the finite set of all maximal consistent sets of formulas
from cl(ϕ0). As cl(ϕ0) is finite, Γ is also finite. We extend the construction for
satisfying eventuality formulas which are in forms of ⟪Ab⟫ϕU ψ and ⟪A ⟫ ◻ ϕ by
b
the following lemma. We also omit the proof.</p>
        <p>14</p>
        <sec id="sec-26-2-1">
          <title>Firstly, we say that a formula ⟪A ⟫ b</title>
          <p>b ϕU ψ (¬⟪A ⟫ ◻ ϕ) is realised from a node
t of a Γ-labeled tree (T, V, C) if there exists a strategy (co-strategy) FA such that
for all λ ∈ out(t, FA, b) (λ ∈ out(t, FAc , b)), there is some i such that ψ ∈ V (λ[i])
and ϕ ∈ V (λ[j]) for all j ∈ {0, i − 1} (∼ ϕ ∈ V (λ[i])).</p>
          <p>Lemma 4. For each formula ⟪Ab⟫ϕU ψ (¬⟪A ⟫ ◻ ϕ) and x ∈ Γ, there is finite
b
Γ-labeled kn-costed-tree (T, V, C) where:
• k = ∣cl(ϕ0)◯∣ + 1
• (T, V, C) is locally consistent
• V ( ) = x
• If ⟪Ab⟫ϕU ψ ∈ x (¬⟪A ⟫◻ϕ ∈ x) then (T, V, C) realises ⟪Ab⟫ϕU ψ (¬⟪A ⟫◻
b b
ϕ)from</p>
        </sec>
      </sec>
      <sec id="sec-26-3">
        <title>Then, the final construction is as follows. For each consistent set x in Γ and</title>
        <p>an eventual formula ϕ of cl(ϕ0), we have a finite tree (Tx,ϕ, Vx,ϕ, Cx,ϕ) which
realises ϕ with the root having label x. Let the eventual formulas in cl(ϕ0) be
listed as ϕe0, . . . , ϕem. In the following, we have the definition of the final tree.</p>
      </sec>
    </sec>
    <sec id="sec-27">
      <title>Definition 6. The final tree (Tϕ0 , Vϕ0 , Cϕ0 ) is constructed inductively as follows.</title>
      <p>• Initially, select an arbitrary x ∈ Γ such that ϕ0 ∈ x. As that formula is
consistent, x must exist. Let (Tx,ϕe0 , Vx,ϕe0 , Cx,ϕe0 ) be the initial tree.
• Given the tree constructed so far and the last used eventual formula ϕe.
i</p>
    </sec>
    <sec id="sec-28">
      <title>Then, for every leaf labelled by y ∈ Γ of the currently constructed tree, we</title>
      <p>replace it with the tree (Ty,ϕje , Vy,ϕje , Cy,ϕje ) where j = i + 1 if i &lt; m or j = 0
if otherwise.</p>
    </sec>
    <sec id="sec-29">
      <title>Let Sϕ0 be the model which is based on (Tϕ0 , Vϕ0 , Cϕ0 ). We have the follow</title>
      <p>ing truth lemma which completes the proof of completeness of the axiomatization
system for RBATL∞. The proof of this lemma is omitted in this paper.</p>
    </sec>
    <sec id="sec-30">
      <title>Lemma 5. For every node t of (Tϕ0 , Vϕ0 , Cϕ0 ) and every formula ϕ ∈ cl(ϕ0), if</title>
      <p>ϕ ∈ Vϕ0 (t) then Sϕ0 , t ⊧ ϕ.
5</p>
    </sec>
    <sec id="sec-31">
      <title>Related work and Conclusion</title>
      <p>The extended logic RBATL∞ is an useful tool which allows us to flexibly express
properties in multiagent systems where available amount of resources may affect
15
the ability of the agents. Rather than specifying upper-bounds on every resource in
a property, we can set up limitation over some resources which are of interest. A
sound and complete axiomatization of RBATL∞ is also presented in this paper.</p>
      <sec id="sec-31-1">
        <title>Recently, there have been several efforts on logics for expressing resource</title>
        <p>bounded properties for multi-agent systems. In [4], the authors extend the
temporal logic CTL (and CTL∗) where agents not only consume but also produce
resources. However, such logics only express properties of single agent system.</p>
      </sec>
      <sec id="sec-31-2">
        <title>In [1], the authors extend ATL in order to express properties of coalitional abilities</title>
        <p>of bounded-memory multi-agent systems. The limitation of memory in the logic is
set up by restricting the size of strategy mappings and the length of history in each
strategy mapping. Both extensions have no axiomatization result.</p>
      </sec>
      <sec id="sec-31-3">
        <title>In the future, we will consider the satisfiability and model-checking problem of RBATL∞.</title>
      </sec>
    </sec>
    <sec id="sec-32">
      <title>Acknowledgments</title>
      <sec id="sec-32-1">
        <title>I gratefully acknowledge Natasha Alechina for supporting and giving me valuable comments and suggestions about the proofs. I also thank anonymous referees for careful reading, corrections and suggestions on the text.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Natasha</given-names>
            <surname>Alechina</surname>
          </string-name>
          , Brian Logan, Nguyen Hoang Nga, and
          <string-name>
            <given-names>Abdur</given-names>
            <surname>Rakib</surname>
          </string-name>
          .
          <article-title>Resource-bounded alternating-time temporal logic</article-title>
          .
          <source>In Wiebe van der Hoek</source>
          , Gal Kaminka, Yves Lesperance,
          <string-name>
            <given-names>Michael</given-names>
            <surname>Luck</surname>
          </string-name>
          , and Sandip Sen, editors,
          <source>Proceedings of the Ninth International Conference on Autonomous Agents and Multiagent Systems (AAMAS</source>
          <year>2010</year>
          ), Toronto, Canada, May
          <year>2010</year>
          . IFAAMAS, IFAAMAS. (to appear).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.A.</given-names>
            <surname>Henzinger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Kupferman</surname>
          </string-name>
          .
          <article-title>Alternating-time temporal logic</article-title>
          .
          <source>Journal of the ACM (JACM)</source>
          ,
          <volume>49</volume>
          (
          <issue>5</issue>
          ):
          <fpage>672</fpage>
          -
          <lpage>713</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Nils</given-names>
            <surname>Bulling</surname>
          </string-name>
          and
          <string-name>
            <given-names>Berndt</given-names>
            <surname>Farwer</surname>
          </string-name>
          .
          <article-title>RTL and RTL∗: Expressing abilities of resource-bounded agents</article-title>
          . In J. Dix, M. Fisher, and P. Novak, editors,
          <source>Proceedings 10th International Workshop Computational Logic in Multi-Agent Systems</source>
          , pages
          <fpage>2</fpage>
          -
          <lpage>19</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>