SlideShare a Scribd company logo
1 of 17
Boolean Programs and
Quantified Propositional Proof
Systems
To appear in the Bulletin of the Section of Logic
Stephen Cook and Michael Soltys
1
A propositional proof is a derivation of a
propositional tautology (e.g. ¬P ∨ P) using a
set of rules.
A nice example of a propositional proof
system is Gentzen’s PK system, where we
have sequents of propositional formulas of
the form:
A1, . . . , An → B1, . . . , Bm (∗)
and the semantics of sequents is given as
follows. We say that a truth assignment τ
satisfies the sequent (∗) iff either τ falsifies
some Ai or τ satisfies some Bi.
For example, if τ is given by P = 0, Q = 1,
R = 0 then τ satisfies
P ∨ Q, ¬R → Q ∧ ¬R
2
A sequent is equivalent to the formula
(A1 ∧ · · · ∧ An) ⊃ (B1 ∨ · · · ∨ Bm)
In other words, the conjunction of the Ai’s
implies the disjunction of the Bi’s.
We say that a sequent is valid if it is true
under all truth assignments. For example, the
following are valid sequents:
A → A
→ A, ¬A
A, ¬A →
→ A ∨ ¬A
A, A ⊃ B → B
A PK proof is a sequence of sequents, where
all the sequents are derived from previous
sequents or are logical axioms of the form
A → A, → 1 or 0 →.
3
PK Rules of inference:
weak
Γ → ∆
A, Γ → ∆
Γ → ∆
Γ → ∆, A
exch
Γ1, A, B, Γ2 → ∆
Γ1, B, A, Γ2 → ∆
Γ → ∆1, A, B, ∆2
Γ → ∆1, B, A, ∆2
cont
Γ, A, A → ∆
Γ, A → ∆
Γ → ∆, A, A
Γ → ∆, A
“¬”
Γ → ∆, A
¬A, Γ → ∆
A, Γ → ∆
Γ → ∆, ¬A
“∧”
A, B, Γ → ∆
(A ∧ B), Γ → ∆
Γ → ∆, A Γ → ∆, B
Γ → ∆, (A ∧ B)
“∨”
A, Γ → ∆ B, Γ → ∆
(A ∨ B), Γ → ∆
Γ → ∆, A, B
Γ → ∆, (A ∨ B)
cut
Γ → ∆, A A, Γ → ∆
Γ → ∆
4
Any valid sequent can be derived from initial
sequents of the form A → A, → 1 and 0 →,
using the above rules (completeness of PK),
and only valid sequents can be derived
(soundness of PK).
As an example we give a proof of one of
DeMorgan’s laws:
¬(P ∧ Q) → ¬P ∨ ¬Q
Here is the derivation:
P → P
→ P, ¬P
→ P, ¬P, ¬Q
Q → Q
Q → Q, ¬P
→ Q, ¬P, ¬Q
→ P ∧ Q, ¬P, ¬Q
→ P ∧ Q, ¬P ∨ ¬Q
¬(P ∧ Q) → ¬P ∨ ¬Q
5
Abstract Definition: A proof system is a
feasible (i.e. easily computable) map
f : {0, 1}∗ onto
−→ {tautologies}
Where {tautologies} is just the set of
propositional tautologies, and if f(x) = A
then x is the proof of the propositional
tautology A.
A proof system is polynomially bounded if
there exists a polynomial p such that for
every A ∈ {tautologies}, there exists an x
such that |x| ≤ p(|A|), i.e. every tautology has
a proof which is “proportional” to its size.
See “The Complexity of Propositional
Proofs”, by Alasdair Urquhart, in The
Bulletin of Symbolic Logic, December 1995,
for all the details.
6
Interest in propositional proof complexity
arose from two fields connected with
computers: automated theorem proving
(artificial intelligence) and computational
complexity theory.
Some Complexity Theory
P is the class of problems that can be solved
with algorithms that run in polynomial time
in the size of the input (e.g. given a truth
assignment τ, and a sequent S, does τ satisfy
S?).
NP is the class of problems whose solutions
can be verified by an algorithm that runs in
polynomial time (e.g. given a sequent S, is it
satisfiable?)
co-NP is the class of problems for which a
counter-example can be verified by an
algorithm that runs in polynomial time (e.g.
given a sequent S, is it valid?).
7
Theorem: NP = co-NP iff there is a
polynomially bounded proof system for the
propositional tautologies.
Also P = NP implies NP = co-NP, thus if we
prove that there is no polynomially bounded
proof system (which is what experts
conjecture), then it will follow that
NP = co-NP, and therefore P = NP.
The problem
P
?
= NP
has been listed by Steve Smale in the top
three “Mathematical Problems for the Next
Century” (Math Intelligencer 20, 1998).
8
How could we prove that there is no
polynomially bounded proof system? It seems
like a very difficult problem. The standard
approach is to consider stronger and stronger
proof systems, and to exhibit superpolynomial
lower bounds for each of them.
strongest Quantified PK
Extended PK
PK
————————
Bounded Depth PK
Resolution
weakest Truth Tables
However, we can only prove superpolynomial
lower bounds for the weaker systems (the
ones below the line). The systems above the
line have no known lower bounds.
9
Quantified PK
Quantified propositional PK is formed by
introducing propositional quantifiers:
∀xA(x) whose meaning is A(0) ∧ A(1)
∃xA(x) whose meaning is A(0) ∨ A(1)
The propositional quantifiers do not increase
the expressive power of formulas. Instead,
they allow us to shorten some propositional
formulas. For example, the formula
(x1,...,xn)∈{0,1}n
A(x1, . . . , xn)
has size in the order of 2n|A|, but the
equivalent quantified formula
∃x1 . . . ∃xnA(x1, . . . , xn)
has size in the order of n + |A|.
10
The quantified propositional calculus is first
discussed by B. Russell in “The Theory of
Implication”, American Journal of
Mathematics in 1906. Also, the Polish
mathematician Le´sniewski treated it in his
“Protothetic”.
Martin Dowd investigated the connection
between quantified propositional proof
systems and the complexity class PSPACE in
his PhD thesis in 1979.
A modest source of information is also a 5
page section in Jan Kraj´ıˇcek’s book
“Bounded Arithmetic, Propositional Logic,
and Complexity Theory”, 1995.
Still, little is known about quantified
propositional proof systems.
11
G is PK with ∃ and ∀
I follow the results and notation from Jan
Kraj´ıˇcek’s “Bounded Arithmetic,
Propositional Logic, and Complexity Theory”.
The quantified propositional proof system G
extends LK by allowing quantified
propositional formulas in sequents, and by
adding the following quantifier rules:
A(B), Γ → ∆
∀xA(x), Γ → ∆
Γ → ∆, A(p)
Γ → ∆, ∀xA(x)
A(p), Γ → ∆
∃xA(x), Γ → ∆
Γ → ∆, A(B)
Γ → ∆, ∃xA(x)
where B is any formula, and with the
restriction that the atom p does not occur in
the lower sequents of ∀-right and ∃-left.
12
Let G1 be the restriction of G where we allow
only strict Σ
q
1 formulas, that is, all formulas
must begin with a block of existential
quantifiers (possibly empty) followed by a
quantifier free formula. In other words, all
formulas are either quantifier free, or of the
form
∃x1 . . . ∃xnA(x1, . . . , xn)
where A(x1, . . . , xn) is quantifier free.
For example, the sequent
∃x∃y((¬x ∨ p) ∧ (¬y ∨ q)) → ∃x(x ∨ ¬p ∨ q), p ∧ q
has only Σ
q
1 formulas.
13
Witnessing
Given a sequent S, we want to have a way of
computing the values of the existential
variables on the right in terms of the free
variables, and the quantified variables on the
left. For example, consider the sequent
∃yA(x, y) → ∃yA(x, y) (∗)
where x, y are the only variables in this
sequent. In this case it is very easy. The
quantified variable y on the right can be
witnessed by the following function:
f(x, y) = y
that is, the sequent
A(x, y) → A(x, f(x, y))
is valid if (∗) was valid.
14
Suppose that π is a G1 proof. We show that
the existential quantifiers can be witnessed by
Boolean programs. We do this by induction
on the number of sequents in π.
For example, consider the contraction rule:
C(¯p) → D(¯p), ∃xB(x), ∃xB(x)
C(¯p) → D(¯p), ∃xB(x)
By Induction Hypothesis, we know that there
are Boolean programs g, h such that the
sequent
C(¯p) → D(¯p), B(g(¯p)), B(h(¯p))
is valid. Now, define f as follows:
f(¯p) =



g(¯p) if B(g(¯p))
h(¯p) otherwise
The bottom sequent can thus be converted
to the valid sequent
C(¯p) → D(¯p), B(f(¯p)),
15
Main Idea
If π is a G1 proof of a propositional tautology,
and π is tree-like, then the existential
quantifiers can be feasibly computed by
evaluating Boolean circuits. This was already
shown in Jan Kraj´ıˇcek’s book “Bounded
Arithmetic, Propositional Logic, and
Complexity Theory”.
If, on the other hand, π is not tree-like, then
it seems that evaluating the existential
quantifiers requires a lot of computational
power, i.e. Boolean programs whose
evaluation is a PSPACE complete problem.
This is shown in our paper “Boolean
Programs and Quantified Propositional Proof
Systems”.
16
References
“Boolean Programs and Quantified
Propositional Proof Systems”, by S.Cook and
M. Soltys, in this paper we introduce the
notion of Boolean programs, and we
characterize PSPACE in terms of families of
Boolean programs. We then show how to use
Boolean programs to witness quantifiers in
G1.
“The Complexity of Propositional Proofs”, by
Alasdair Urquhart, in The Bulletin of
Symbolic Logic, December 1995, a
comprehensive introduction to the complexity
of propositional proofs.
“Bounded Arithmetic, Propositional Logic,
and Complexity Theory”, by Jan Kraj´ıˇcek. A
short introduction to quantified propositional
proof systems.
17

More Related Content

What's hot

Method of direct proof
Method of direct proofMethod of direct proof
Method of direct proofAbdur Rehman
 
Propositional And First-Order Logic
Propositional And First-Order LogicPropositional And First-Order Logic
Propositional And First-Order Logicankush_kumar
 
Logic (slides)
Logic (slides)Logic (slides)
Logic (slides)IIUM
 
Propositional logic
Propositional logicPropositional logic
Propositional logicMamta Pandey
 
Discrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and ProofsDiscrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and ProofsWongyos Keardsri
 
Discrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part IDiscrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part IWongyos Keardsri
 
Discrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part IIDiscrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part IIWongyos Keardsri
 
Cs229 notes8
Cs229 notes8Cs229 notes8
Cs229 notes8VuTran231
 
CMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional LogicCMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional Logicallyn joy calcaben
 
Probabilistic diameter and its properties.
Probabilistic diameter and its properties.Probabilistic diameter and its properties.
Probabilistic diameter and its properties.inventionjournals
 
Computational logic First Order Logic_part2
Computational logic First Order Logic_part2Computational logic First Order Logic_part2
Computational logic First Order Logic_part2banujahir1
 
Computational logic First Order Logic
Computational logic First Order LogicComputational logic First Order Logic
Computational logic First Order Logicbanujahir1
 

What's hot (19)

Method of direct proof
Method of direct proofMethod of direct proof
Method of direct proof
 
Thesis 6
Thesis 6Thesis 6
Thesis 6
 
Propositional And First-Order Logic
Propositional And First-Order LogicPropositional And First-Order Logic
Propositional And First-Order Logic
 
Logic (slides)
Logic (slides)Logic (slides)
Logic (slides)
 
Reductions
ReductionsReductions
Reductions
 
3 fol examples v2
3 fol examples v23 fol examples v2
3 fol examples v2
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Mathematical Logic
Mathematical LogicMathematical Logic
Mathematical Logic
 
Math
MathMath
Math
 
Discrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and ProofsDiscrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and Proofs
 
Discrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part IDiscrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part I
 
Discrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part IIDiscrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part II
 
Cs229 notes8
Cs229 notes8Cs229 notes8
Cs229 notes8
 
CMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional LogicCMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional Logic
 
Discrete mathematics
Discrete mathematicsDiscrete mathematics
Discrete mathematics
 
Probabilistic diameter and its properties.
Probabilistic diameter and its properties.Probabilistic diameter and its properties.
Probabilistic diameter and its properties.
 
Computational logic First Order Logic_part2
Computational logic First Order Logic_part2Computational logic First Order Logic_part2
Computational logic First Order Logic_part2
 
Discrete Math Lecture 02: First Order Logic
Discrete Math Lecture 02: First Order LogicDiscrete Math Lecture 02: First Order Logic
Discrete Math Lecture 02: First Order Logic
 
Computational logic First Order Logic
Computational logic First Order LogicComputational logic First Order Logic
Computational logic First Order Logic
 

Viewers also liked

The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002Michael Soltys
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Michael Soltys
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008Michael Soltys
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006Michael Soltys
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006Michael Soltys
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for StringologyMichael Soltys
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisMichael Soltys
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationMichael Soltys
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Michael Soltys
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Michael Soltys
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004Michael Soltys
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet listsMichael Soltys
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Michael Soltys
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer ScienceMichael Soltys
 
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Michael Soltys
 

Viewers also liked (18)

The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for Stringology
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysis
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009
 
Algorithms on Strings
Algorithms on StringsAlgorithms on Strings
Algorithms on Strings
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet lists
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer Science
 
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
 

Similar to Boolean Programs Quantified Prop Proof Systems

The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database TheoryJan Hidders
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docxedwin orege
 
Fuzzy logic andits Applications
Fuzzy logic andits ApplicationsFuzzy logic andits Applications
Fuzzy logic andits ApplicationsDrATAMILARASIMCA
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheetJoachim Gwoke
 
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Dahua Lin
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
 
HypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaekHypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaekJun Taek Lee
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheetSuvrat Mishra
 
L03 ai - knowledge representation using logic
L03 ai - knowledge representation using logicL03 ai - knowledge representation using logic
L03 ai - knowledge representation using logicManjula V
 
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكروDiscrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكروDr. Khaled Bakro
 
Data mining assignment 2
Data mining assignment 2Data mining assignment 2
Data mining assignment 2BarryK88
 

Similar to Boolean Programs Quantified Prop Proof Systems (20)

The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database Theory
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docx
 
Lemh1a1
Lemh1a1Lemh1a1
Lemh1a1
 
Math Assignment Help
Math Assignment HelpMath Assignment Help
Math Assignment Help
 
Metric space
Metric spaceMetric space
Metric space
 
Fuzzy logic andits Applications
Fuzzy logic andits ApplicationsFuzzy logic andits Applications
Fuzzy logic andits Applications
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheet
 
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inference
 
Probability Cheatsheet.pdf
Probability Cheatsheet.pdfProbability Cheatsheet.pdf
Probability Cheatsheet.pdf
 
dma_ppt.pdf
dma_ppt.pdfdma_ppt.pdf
dma_ppt.pdf
 
HypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaekHypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaek
 
Mcs 013 solve assignment
Mcs 013 solve assignmentMcs 013 solve assignment
Mcs 013 solve assignment
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheet
 
HPWFcorePRES--FUR2016
HPWFcorePRES--FUR2016HPWFcorePRES--FUR2016
HPWFcorePRES--FUR2016
 
L03 ai - knowledge representation using logic
L03 ai - knowledge representation using logicL03 ai - knowledge representation using logic
L03 ai - knowledge representation using logic
 
DM(1).pptx
DM(1).pptxDM(1).pptx
DM(1).pptx
 
Predicates
PredicatesPredicates
Predicates
 
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكروDiscrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
 
Data mining assignment 2
Data mining assignment 2Data mining assignment 2
Data mining assignment 2
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Boolean Programs Quantified Prop Proof Systems

  • 1. Boolean Programs and Quantified Propositional Proof Systems To appear in the Bulletin of the Section of Logic Stephen Cook and Michael Soltys 1
  • 2. A propositional proof is a derivation of a propositional tautology (e.g. ¬P ∨ P) using a set of rules. A nice example of a propositional proof system is Gentzen’s PK system, where we have sequents of propositional formulas of the form: A1, . . . , An → B1, . . . , Bm (∗) and the semantics of sequents is given as follows. We say that a truth assignment τ satisfies the sequent (∗) iff either τ falsifies some Ai or τ satisfies some Bi. For example, if τ is given by P = 0, Q = 1, R = 0 then τ satisfies P ∨ Q, ¬R → Q ∧ ¬R 2
  • 3. A sequent is equivalent to the formula (A1 ∧ · · · ∧ An) ⊃ (B1 ∨ · · · ∨ Bm) In other words, the conjunction of the Ai’s implies the disjunction of the Bi’s. We say that a sequent is valid if it is true under all truth assignments. For example, the following are valid sequents: A → A → A, ¬A A, ¬A → → A ∨ ¬A A, A ⊃ B → B A PK proof is a sequence of sequents, where all the sequents are derived from previous sequents or are logical axioms of the form A → A, → 1 or 0 →. 3
  • 4. PK Rules of inference: weak Γ → ∆ A, Γ → ∆ Γ → ∆ Γ → ∆, A exch Γ1, A, B, Γ2 → ∆ Γ1, B, A, Γ2 → ∆ Γ → ∆1, A, B, ∆2 Γ → ∆1, B, A, ∆2 cont Γ, A, A → ∆ Γ, A → ∆ Γ → ∆, A, A Γ → ∆, A “¬” Γ → ∆, A ¬A, Γ → ∆ A, Γ → ∆ Γ → ∆, ¬A “∧” A, B, Γ → ∆ (A ∧ B), Γ → ∆ Γ → ∆, A Γ → ∆, B Γ → ∆, (A ∧ B) “∨” A, Γ → ∆ B, Γ → ∆ (A ∨ B), Γ → ∆ Γ → ∆, A, B Γ → ∆, (A ∨ B) cut Γ → ∆, A A, Γ → ∆ Γ → ∆ 4
  • 5. Any valid sequent can be derived from initial sequents of the form A → A, → 1 and 0 →, using the above rules (completeness of PK), and only valid sequents can be derived (soundness of PK). As an example we give a proof of one of DeMorgan’s laws: ¬(P ∧ Q) → ¬P ∨ ¬Q Here is the derivation: P → P → P, ¬P → P, ¬P, ¬Q Q → Q Q → Q, ¬P → Q, ¬P, ¬Q → P ∧ Q, ¬P, ¬Q → P ∧ Q, ¬P ∨ ¬Q ¬(P ∧ Q) → ¬P ∨ ¬Q 5
  • 6. Abstract Definition: A proof system is a feasible (i.e. easily computable) map f : {0, 1}∗ onto −→ {tautologies} Where {tautologies} is just the set of propositional tautologies, and if f(x) = A then x is the proof of the propositional tautology A. A proof system is polynomially bounded if there exists a polynomial p such that for every A ∈ {tautologies}, there exists an x such that |x| ≤ p(|A|), i.e. every tautology has a proof which is “proportional” to its size. See “The Complexity of Propositional Proofs”, by Alasdair Urquhart, in The Bulletin of Symbolic Logic, December 1995, for all the details. 6
  • 7. Interest in propositional proof complexity arose from two fields connected with computers: automated theorem proving (artificial intelligence) and computational complexity theory. Some Complexity Theory P is the class of problems that can be solved with algorithms that run in polynomial time in the size of the input (e.g. given a truth assignment τ, and a sequent S, does τ satisfy S?). NP is the class of problems whose solutions can be verified by an algorithm that runs in polynomial time (e.g. given a sequent S, is it satisfiable?) co-NP is the class of problems for which a counter-example can be verified by an algorithm that runs in polynomial time (e.g. given a sequent S, is it valid?). 7
  • 8. Theorem: NP = co-NP iff there is a polynomially bounded proof system for the propositional tautologies. Also P = NP implies NP = co-NP, thus if we prove that there is no polynomially bounded proof system (which is what experts conjecture), then it will follow that NP = co-NP, and therefore P = NP. The problem P ? = NP has been listed by Steve Smale in the top three “Mathematical Problems for the Next Century” (Math Intelligencer 20, 1998). 8
  • 9. How could we prove that there is no polynomially bounded proof system? It seems like a very difficult problem. The standard approach is to consider stronger and stronger proof systems, and to exhibit superpolynomial lower bounds for each of them. strongest Quantified PK Extended PK PK ———————— Bounded Depth PK Resolution weakest Truth Tables However, we can only prove superpolynomial lower bounds for the weaker systems (the ones below the line). The systems above the line have no known lower bounds. 9
  • 10. Quantified PK Quantified propositional PK is formed by introducing propositional quantifiers: ∀xA(x) whose meaning is A(0) ∧ A(1) ∃xA(x) whose meaning is A(0) ∨ A(1) The propositional quantifiers do not increase the expressive power of formulas. Instead, they allow us to shorten some propositional formulas. For example, the formula (x1,...,xn)∈{0,1}n A(x1, . . . , xn) has size in the order of 2n|A|, but the equivalent quantified formula ∃x1 . . . ∃xnA(x1, . . . , xn) has size in the order of n + |A|. 10
  • 11. The quantified propositional calculus is first discussed by B. Russell in “The Theory of Implication”, American Journal of Mathematics in 1906. Also, the Polish mathematician Le´sniewski treated it in his “Protothetic”. Martin Dowd investigated the connection between quantified propositional proof systems and the complexity class PSPACE in his PhD thesis in 1979. A modest source of information is also a 5 page section in Jan Kraj´ıˇcek’s book “Bounded Arithmetic, Propositional Logic, and Complexity Theory”, 1995. Still, little is known about quantified propositional proof systems. 11
  • 12. G is PK with ∃ and ∀ I follow the results and notation from Jan Kraj´ıˇcek’s “Bounded Arithmetic, Propositional Logic, and Complexity Theory”. The quantified propositional proof system G extends LK by allowing quantified propositional formulas in sequents, and by adding the following quantifier rules: A(B), Γ → ∆ ∀xA(x), Γ → ∆ Γ → ∆, A(p) Γ → ∆, ∀xA(x) A(p), Γ → ∆ ∃xA(x), Γ → ∆ Γ → ∆, A(B) Γ → ∆, ∃xA(x) where B is any formula, and with the restriction that the atom p does not occur in the lower sequents of ∀-right and ∃-left. 12
  • 13. Let G1 be the restriction of G where we allow only strict Σ q 1 formulas, that is, all formulas must begin with a block of existential quantifiers (possibly empty) followed by a quantifier free formula. In other words, all formulas are either quantifier free, or of the form ∃x1 . . . ∃xnA(x1, . . . , xn) where A(x1, . . . , xn) is quantifier free. For example, the sequent ∃x∃y((¬x ∨ p) ∧ (¬y ∨ q)) → ∃x(x ∨ ¬p ∨ q), p ∧ q has only Σ q 1 formulas. 13
  • 14. Witnessing Given a sequent S, we want to have a way of computing the values of the existential variables on the right in terms of the free variables, and the quantified variables on the left. For example, consider the sequent ∃yA(x, y) → ∃yA(x, y) (∗) where x, y are the only variables in this sequent. In this case it is very easy. The quantified variable y on the right can be witnessed by the following function: f(x, y) = y that is, the sequent A(x, y) → A(x, f(x, y)) is valid if (∗) was valid. 14
  • 15. Suppose that π is a G1 proof. We show that the existential quantifiers can be witnessed by Boolean programs. We do this by induction on the number of sequents in π. For example, consider the contraction rule: C(¯p) → D(¯p), ∃xB(x), ∃xB(x) C(¯p) → D(¯p), ∃xB(x) By Induction Hypothesis, we know that there are Boolean programs g, h such that the sequent C(¯p) → D(¯p), B(g(¯p)), B(h(¯p)) is valid. Now, define f as follows: f(¯p) =    g(¯p) if B(g(¯p)) h(¯p) otherwise The bottom sequent can thus be converted to the valid sequent C(¯p) → D(¯p), B(f(¯p)), 15
  • 16. Main Idea If π is a G1 proof of a propositional tautology, and π is tree-like, then the existential quantifiers can be feasibly computed by evaluating Boolean circuits. This was already shown in Jan Kraj´ıˇcek’s book “Bounded Arithmetic, Propositional Logic, and Complexity Theory”. If, on the other hand, π is not tree-like, then it seems that evaluating the existential quantifiers requires a lot of computational power, i.e. Boolean programs whose evaluation is a PSPACE complete problem. This is shown in our paper “Boolean Programs and Quantified Propositional Proof Systems”. 16
  • 17. References “Boolean Programs and Quantified Propositional Proof Systems”, by S.Cook and M. Soltys, in this paper we introduce the notion of Boolean programs, and we characterize PSPACE in terms of families of Boolean programs. We then show how to use Boolean programs to witness quantifiers in G1. “The Complexity of Propositional Proofs”, by Alasdair Urquhart, in The Bulletin of Symbolic Logic, December 1995, a comprehensive introduction to the complexity of propositional proofs. “Bounded Arithmetic, Propositional Logic, and Complexity Theory”, by Jan Kraj´ıˇcek. A short introduction to quantified propositional proof systems. 17