SlideShare a Scribd company logo
The Reflection Theorem
Formalizing Meta-Theoretic Reasoning
Lawrence C. Paulson
Computer Laboratory
Lecture Overview
• Motivation for the Reflection Theorem
• Proving the Theorem in Isabelle
• Applying the Reflection Theorem

2
Why Do Proofs By Machine?
• Claim: too many been done already!
– Gödel’s incompleteness theorem (Shankar)
– thousands of Mizar proofs

• Reply: many types of reasoning are hard to
formalize.
– Algebraic structures (e.g. group theory)
– Meta-level reasoning (e.g. about own proof)
3
Idea of the Reflection Theorem

f has the same
meaning in M as in Ma,
for arbitrarily large a

4
The Reflection Theorem
Define the class
where

is a monotonic and
continuous family of sets.

For each formula
there are arbitrarily large ordinals a such
that f holds in M iff f holds in Ma
5
Why is it Hard to Formalize?
• “f holds in M” is not definable in ZF!
– Because M is a proper class
– Tarski: the nondefinability of truth

• f could take any number of arguments
• There is a different proof for each f
– Reflection is a meta-theorem
– … and not a theorem scheme
6
Must Define Truth Syntactically

The relativization of f to M
7
Lecture Overview
• Motivation for the Reflection Theorem
• Proving the Theorem in Isabelle
• Applying the Reflection Theorem

8
Isabelle/ZF
• Same code base as Isabelle/HOL
• Higher-order metalogic, ideal for
– Theorem schemes
– Classes
– Class functions

• Develops set theory from the ZermeloFraenkel axioms to transfinite cardinals
9
Proving the Reflection Theorem
in Isabelle/ZF
• Use a clean proof from Mostowski, 1969
– closed unbounded classes of ordinals
– normal functions (continuous, increasing)

• One lemma for each logical connective
• Isabelle automatically uses the lemmas to
prove instances of the theorem
10
Closed/Unbounded Classes
• Closed means closed under unions (limits)
of ordinals
• If M, N are C.U. then so is M « N
• The fixedpoints of a continuous, increasing
function form a C.U. class
• E.g. the many solutions of
11
Essence of Proof
• “Skolemize” each $ quantifier, obtaining a
normal function, F
– The fixedpoints of F give the desired class of
ordinals

• For f Ÿ y simply intersect the classes
• Negation and atomic cases are trivial

12
Lecture Overview
• Motivation for the Reflection Theorem
• Proving the Theorem in Isabelle
• Applying the Reflection Theorem

13
The Axiom of Choice and the
Generalized Continuum Hypothesis
• Gödel (1940) proved them consistent with
set theory
– A deep and important theorem
– Addressed Hilbert’s First Problem

• Modern treatments (in ZF) require the
Reflection theorem
14
Sketch of Gödel’s Proof
• Define the constructible universe, L
– La+1 adds subsets that can be defined from
existing elements (in La) by a formula
– L contains only sets that must exist

• Show that L satisfies the ZF axioms
– Comprehension uses Reflection Theorem:
f holds in L iff f holds in some La

• Show that L satisfies AC and GCH
15
Showing That L “Thinks” All Sets
are Constructible
• Amounts to showing that the construction of
L is idempotent
• Relies on the concept of absoluteness:
– f is absolute if it’s preserved in all models
– Not absolute: powersets, function spaces,
transfinite cardinals

• Requires analysing L’s definition down to
the last detail
16
Applying Reflection to L
• Define a ZF datatype of FOL formulas
• Define a vocabulary for Reflection
– No function symbols; purely relational!
– All concepts from the empty set to “constructible”
– Repeat for the formula datatype

• For each instance of Comprehension, prove an
instance of Reflection (automatically)
• Giant terms describe the classes of ordinals
17
Finish the Consistency Proof?
• Gödel, 1940: if a contradiction from AC and
GCH could be derived, it could be
transformed into a contradiction from the
axioms of set theory alone.
• Theorem statement lies outside the
language of set theory!
• It is an even better example of metatheoretic reasoning.
18

More Related Content

Viewers also liked

IPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICI
IPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICIIPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICI
IPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICI
Haskell Lambda
 
Metalogic: The non-algorithmic side of the mind
Metalogic: The non-algorithmic side of the mindMetalogic: The non-algorithmic side of the mind
Metalogic: The non-algorithmic side of the mind
Haskell Lambda
 
Epigenetics: psiconeuroendocrinology and lamarckian-like evolution
Epigenetics: psiconeuroendocrinology and lamarckian-like evolutionEpigenetics: psiconeuroendocrinology and lamarckian-like evolution
Epigenetics: psiconeuroendocrinology and lamarckian-like evolution
Haskell Lambda
 
Teleologia della musica
Teleologia della musicaTeleologia della musica
Teleologia della musica
Haskell Lambda
 
Fractal Mind: from simple rule to complex phenomena
Fractal Mind: from simple rule to complex phenomenaFractal Mind: from simple rule to complex phenomena
Fractal Mind: from simple rule to complex phenomena
Haskell Lambda
 
Quantum models of brain
Quantum models of brainQuantum models of brain
Quantum models of brain
Haskell Lambda
 

Viewers also liked (9)

Matter
MatterMatter
Matter
 
1cwolf
1cwolf1cwolf
1cwolf
 
IPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICI
IPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICIIPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICI
IPNOSI TERAPEUTICA ED ESPRESSIONE GENICA: ASPETTI BIOINFORMATICI
 
Metalogic: The non-algorithmic side of the mind
Metalogic: The non-algorithmic side of the mindMetalogic: The non-algorithmic side of the mind
Metalogic: The non-algorithmic side of the mind
 
Epigenetics: psiconeuroendocrinology and lamarckian-like evolution
Epigenetics: psiconeuroendocrinology and lamarckian-like evolutionEpigenetics: psiconeuroendocrinology and lamarckian-like evolution
Epigenetics: psiconeuroendocrinology and lamarckian-like evolution
 
Teleologia della musica
Teleologia della musicaTeleologia della musica
Teleologia della musica
 
Fractal Mind: from simple rule to complex phenomena
Fractal Mind: from simple rule to complex phenomenaFractal Mind: from simple rule to complex phenomena
Fractal Mind: from simple rule to complex phenomena
 
Quantum models of brain
Quantum models of brainQuantum models of brain
Quantum models of brain
 
Struktur atom
Struktur atomStruktur atom
Struktur atom
 

Similar to The Reflection Theorem: Formalizing Meta-Theoretic Reasoning

Metamathematics of contexts
Metamathematics of contextsMetamathematics of contexts
Metamathematics of contextsHossam Saraya
 
Metamathematics of contexts
Metamathematics of contextsMetamathematics of contexts
Metamathematics of contextsHossam Saraya
 
MACHINE LEARNING-LEARNING RULE
MACHINE LEARNING-LEARNING RULEMACHINE LEARNING-LEARNING RULE
MACHINE LEARNING-LEARNING RULE
DrBindhuM
 
Common Logic: An Evolutionary Tale
Common Logic: An Evolutionary TaleCommon Logic: An Evolutionary Tale
Common Logic: An Evolutionary Tale
PhiloWeb
 
Logic in Predicate and Propositional Logic
Logic in Predicate and Propositional LogicLogic in Predicate and Propositional Logic
Logic in Predicate and Propositional Logic
ArchanaT32
 
Logic.ppt
Logic.pptLogic.ppt
Logic.ppt
syedadamiya
 

Similar to The Reflection Theorem: Formalizing Meta-Theoretic Reasoning (6)

Metamathematics of contexts
Metamathematics of contextsMetamathematics of contexts
Metamathematics of contexts
 
Metamathematics of contexts
Metamathematics of contextsMetamathematics of contexts
Metamathematics of contexts
 
MACHINE LEARNING-LEARNING RULE
MACHINE LEARNING-LEARNING RULEMACHINE LEARNING-LEARNING RULE
MACHINE LEARNING-LEARNING RULE
 
Common Logic: An Evolutionary Tale
Common Logic: An Evolutionary TaleCommon Logic: An Evolutionary Tale
Common Logic: An Evolutionary Tale
 
Logic in Predicate and Propositional Logic
Logic in Predicate and Propositional LogicLogic in Predicate and Propositional Logic
Logic in Predicate and Propositional Logic
 
Logic.ppt
Logic.pptLogic.ppt
Logic.ppt
 

More from Lawrence Paulson

Proving Security Protocols Correct
Proving Security Protocols CorrectProving Security Protocols Correct
Proving Security Protocols Correct
Lawrence Paulson
 
MetiTarski's menagerie of cooperating systems
MetiTarski's menagerie of cooperating systemsMetiTarski's menagerie of cooperating systems
MetiTarski's menagerie of cooperating systems
Lawrence Paulson
 
Automated theorem proving for special functions: the next phase
Automated theorem proving for special functions: the next phaseAutomated theorem proving for special functions: the next phase
Automated theorem proving for special functions: the next phase
Lawrence Paulson
 
Theorem proving and the real numbers: overview and challenges
Theorem proving and the real numbers: overview and challengesTheorem proving and the real numbers: overview and challenges
Theorem proving and the real numbers: overview and challenges
Lawrence Paulson
 
Source-Level Proof Reconstruction for Interactive Proving
Source-Level Proof Reconstruction for Interactive ProvingSource-Level Proof Reconstruction for Interactive Proving
Source-Level Proof Reconstruction for Interactive Proving
Lawrence Paulson
 
Defining Functions on Equivalence Classes
Defining Functions on Equivalence ClassesDefining Functions on Equivalence Classes
Defining Functions on Equivalence Classes
Lawrence Paulson
 
Organizing Numerical Theories using Axiomatic Type Classes
Organizing Numerical Theories using Axiomatic Type ClassesOrganizing Numerical Theories using Axiomatic Type Classes
Organizing Numerical Theories using Axiomatic Type Classes
Lawrence Paulson
 
A Generic Tableau Prover and Its Integration with Isabelle
A Generic Tableau Prover and Its Integration with IsabelleA Generic Tableau Prover and Its Integration with Isabelle
A Generic Tableau Prover and Its Integration with Isabelle
Lawrence Paulson
 
Mechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication ProtocolMechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication Protocol
Lawrence Paulson
 
Mechanizing set theory: cardinal arithmetic and the axiom of choice
Mechanizing set theory: cardinal arithmetic and the axiom of choiceMechanizing set theory: cardinal arithmetic and the axiom of choice
Mechanizing set theory: cardinal arithmetic and the axiom of choice
Lawrence Paulson
 
MetiTarski: An Automatic Prover for Real-Valued Special Functions
MetiTarski: An Automatic Prover for Real-Valued Special FunctionsMetiTarski: An Automatic Prover for Real-Valued Special Functions
MetiTarski: An Automatic Prover for Real-Valued Special FunctionsLawrence Paulson
 
Proving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by InductionProving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by InductionLawrence Paulson
 
A Machine-Assisted Proof of Gödel's Incompleteness Theorems
A Machine-Assisted Proof of Gödel's Incompleteness TheoremsA Machine-Assisted Proof of Gödel's Incompleteness Theorems
A Machine-Assisted Proof of Gödel's Incompleteness TheoremsLawrence Paulson
 

More from Lawrence Paulson (13)

Proving Security Protocols Correct
Proving Security Protocols CorrectProving Security Protocols Correct
Proving Security Protocols Correct
 
MetiTarski's menagerie of cooperating systems
MetiTarski's menagerie of cooperating systemsMetiTarski's menagerie of cooperating systems
MetiTarski's menagerie of cooperating systems
 
Automated theorem proving for special functions: the next phase
Automated theorem proving for special functions: the next phaseAutomated theorem proving for special functions: the next phase
Automated theorem proving for special functions: the next phase
 
Theorem proving and the real numbers: overview and challenges
Theorem proving and the real numbers: overview and challengesTheorem proving and the real numbers: overview and challenges
Theorem proving and the real numbers: overview and challenges
 
Source-Level Proof Reconstruction for Interactive Proving
Source-Level Proof Reconstruction for Interactive ProvingSource-Level Proof Reconstruction for Interactive Proving
Source-Level Proof Reconstruction for Interactive Proving
 
Defining Functions on Equivalence Classes
Defining Functions on Equivalence ClassesDefining Functions on Equivalence Classes
Defining Functions on Equivalence Classes
 
Organizing Numerical Theories using Axiomatic Type Classes
Organizing Numerical Theories using Axiomatic Type ClassesOrganizing Numerical Theories using Axiomatic Type Classes
Organizing Numerical Theories using Axiomatic Type Classes
 
A Generic Tableau Prover and Its Integration with Isabelle
A Generic Tableau Prover and Its Integration with IsabelleA Generic Tableau Prover and Its Integration with Isabelle
A Generic Tableau Prover and Its Integration with Isabelle
 
Mechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication ProtocolMechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication Protocol
 
Mechanizing set theory: cardinal arithmetic and the axiom of choice
Mechanizing set theory: cardinal arithmetic and the axiom of choiceMechanizing set theory: cardinal arithmetic and the axiom of choice
Mechanizing set theory: cardinal arithmetic and the axiom of choice
 
MetiTarski: An Automatic Prover for Real-Valued Special Functions
MetiTarski: An Automatic Prover for Real-Valued Special FunctionsMetiTarski: An Automatic Prover for Real-Valued Special Functions
MetiTarski: An Automatic Prover for Real-Valued Special Functions
 
Proving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by InductionProving Properties of Security Protocols by Induction
Proving Properties of Security Protocols by Induction
 
A Machine-Assisted Proof of Gödel's Incompleteness Theorems
A Machine-Assisted Proof of Gödel's Incompleteness TheoremsA Machine-Assisted Proof of Gödel's Incompleteness Theorems
A Machine-Assisted Proof of Gödel's Incompleteness Theorems
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

The Reflection Theorem: Formalizing Meta-Theoretic Reasoning

  • 1. The Reflection Theorem Formalizing Meta-Theoretic Reasoning Lawrence C. Paulson Computer Laboratory
  • 2. Lecture Overview • Motivation for the Reflection Theorem • Proving the Theorem in Isabelle • Applying the Reflection Theorem 2
  • 3. Why Do Proofs By Machine? • Claim: too many been done already! – Gödel’s incompleteness theorem (Shankar) – thousands of Mizar proofs • Reply: many types of reasoning are hard to formalize. – Algebraic structures (e.g. group theory) – Meta-level reasoning (e.g. about own proof) 3
  • 4. Idea of the Reflection Theorem f has the same meaning in M as in Ma, for arbitrarily large a 4
  • 5. The Reflection Theorem Define the class where is a monotonic and continuous family of sets. For each formula there are arbitrarily large ordinals a such that f holds in M iff f holds in Ma 5
  • 6. Why is it Hard to Formalize? • “f holds in M” is not definable in ZF! – Because M is a proper class – Tarski: the nondefinability of truth • f could take any number of arguments • There is a different proof for each f – Reflection is a meta-theorem – … and not a theorem scheme 6
  • 7. Must Define Truth Syntactically The relativization of f to M 7
  • 8. Lecture Overview • Motivation for the Reflection Theorem • Proving the Theorem in Isabelle • Applying the Reflection Theorem 8
  • 9. Isabelle/ZF • Same code base as Isabelle/HOL • Higher-order metalogic, ideal for – Theorem schemes – Classes – Class functions • Develops set theory from the ZermeloFraenkel axioms to transfinite cardinals 9
  • 10. Proving the Reflection Theorem in Isabelle/ZF • Use a clean proof from Mostowski, 1969 – closed unbounded classes of ordinals – normal functions (continuous, increasing) • One lemma for each logical connective • Isabelle automatically uses the lemmas to prove instances of the theorem 10
  • 11. Closed/Unbounded Classes • Closed means closed under unions (limits) of ordinals • If M, N are C.U. then so is M « N • The fixedpoints of a continuous, increasing function form a C.U. class • E.g. the many solutions of 11
  • 12. Essence of Proof • “Skolemize” each $ quantifier, obtaining a normal function, F – The fixedpoints of F give the desired class of ordinals • For f Ÿ y simply intersect the classes • Negation and atomic cases are trivial 12
  • 13. Lecture Overview • Motivation for the Reflection Theorem • Proving the Theorem in Isabelle • Applying the Reflection Theorem 13
  • 14. The Axiom of Choice and the Generalized Continuum Hypothesis • Gödel (1940) proved them consistent with set theory – A deep and important theorem – Addressed Hilbert’s First Problem • Modern treatments (in ZF) require the Reflection theorem 14
  • 15. Sketch of Gödel’s Proof • Define the constructible universe, L – La+1 adds subsets that can be defined from existing elements (in La) by a formula – L contains only sets that must exist • Show that L satisfies the ZF axioms – Comprehension uses Reflection Theorem: f holds in L iff f holds in some La • Show that L satisfies AC and GCH 15
  • 16. Showing That L “Thinks” All Sets are Constructible • Amounts to showing that the construction of L is idempotent • Relies on the concept of absoluteness: – f is absolute if it’s preserved in all models – Not absolute: powersets, function spaces, transfinite cardinals • Requires analysing L’s definition down to the last detail 16
  • 17. Applying Reflection to L • Define a ZF datatype of FOL formulas • Define a vocabulary for Reflection – No function symbols; purely relational! – All concepts from the empty set to “constructible” – Repeat for the formula datatype • For each instance of Comprehension, prove an instance of Reflection (automatically) • Giant terms describe the classes of ordinals 17
  • 18. Finish the Consistency Proof? • Gödel, 1940: if a contradiction from AC and GCH could be derived, it could be transformed into a contradiction from the axioms of set theory alone. • Theorem statement lies outside the language of set theory! • It is an even better example of metatheoretic reasoning. 18