SlideShare a Scribd company logo
1 of 17
Boolean Programs and
Quantified Propositional Proof
Systems
To appear in the Bulletin of the Section of Logic
Stephen Cook and Michael Soltys
1
A propositional proof is a derivation of a
propositional tautology (e.g. ¬P ∨ P) using a
set of rules.
A nice example of a propositional proof
system is Gentzen’s PK system, where we
have sequents of propositional formulas of
the form:
A1, . . . , An → B1, . . . , Bm (∗)
and the semantics of sequents is given as
follows. We say that a truth assignment τ
satisfies the sequent (∗) iff either τ falsifies
some Ai or τ satisfies some Bi.
For example, if τ is given by P = 0, Q = 1,
R = 0 then τ satisfies
P ∨ Q, ¬R → Q ∧ ¬R
2
A sequent is equivalent to the formula
(A1 ∧ · · · ∧ An) ⊃ (B1 ∨ · · · ∨ Bm)
In other words, the conjunction of the Ai’s
implies the disjunction of the Bi’s.
We say that a sequent is valid if it is true
under all truth assignments. For example, the
following are valid sequents:
A → A
→ A, ¬A
A, ¬A →
→ A ∨ ¬A
A, A ⊃ B → B
A PK proof is a sequence of sequents, where
all the sequents are derived from previous
sequents or are logical axioms of the form
A → A, → 1 or 0 →.
3
PK Rules of inference:
weak
Γ → ∆
A, Γ → ∆
Γ → ∆
Γ → ∆, A
exch
Γ1, A, B, Γ2 → ∆
Γ1, B, A, Γ2 → ∆
Γ → ∆1, A, B, ∆2
Γ → ∆1, B, A, ∆2
cont
Γ, A, A → ∆
Γ, A → ∆
Γ → ∆, A, A
Γ → ∆, A
“¬”
Γ → ∆, A
¬A, Γ → ∆
A, Γ → ∆
Γ → ∆, ¬A
“∧”
A, B, Γ → ∆
(A ∧ B), Γ → ∆
Γ → ∆, A Γ → ∆, B
Γ → ∆, (A ∧ B)
“∨”
A, Γ → ∆ B, Γ → ∆
(A ∨ B), Γ → ∆
Γ → ∆, A, B
Γ → ∆, (A ∨ B)
cut
Γ → ∆, A A, Γ → ∆
Γ → ∆
4
Any valid sequent can be derived from initial
sequents of the form A → A, → 1 and 0 →,
using the above rules (completeness of PK),
and only valid sequents can be derived
(soundness of PK).
As an example we give a proof of one of
DeMorgan’s laws:
¬(P ∧ Q) → ¬P ∨ ¬Q
Here is the derivation:
P → P
→ P, ¬P
→ P, ¬P, ¬Q
Q → Q
Q → Q, ¬P
→ Q, ¬P, ¬Q
→ P ∧ Q, ¬P, ¬Q
→ P ∧ Q, ¬P ∨ ¬Q
¬(P ∧ Q) → ¬P ∨ ¬Q
5
Abstract Definition: A proof system is a
feasible (i.e. easily computable) map
f : {0, 1}∗ onto
−→ {tautologies}
Where {tautologies} is just the set of
propositional tautologies, and if f(x) = A
then x is the proof of the propositional
tautology A.
A proof system is polynomially bounded if
there exists a polynomial p such that for
every A ∈ {tautologies}, there exists an x
such that |x| ≤ p(|A|), i.e. every tautology has
a proof which is “proportional” to its size.
See “The Complexity of Propositional
Proofs”, by Alasdair Urquhart, in The
Bulletin of Symbolic Logic, December 1995,
for all the details.
6
Interest in propositional proof complexity
arose from two fields connected with
computers: automated theorem proving
(artificial intelligence) and computational
complexity theory.
Some Complexity Theory
P is the class of problems that can be solved
with algorithms that run in polynomial time
in the size of the input (e.g. given a truth
assignment τ, and a sequent S, does τ satisfy
S?).
NP is the class of problems whose solutions
can be verified by an algorithm that runs in
polynomial time (e.g. given a sequent S, is it
satisfiable?)
co-NP is the class of problems for which a
counter-example can be verified by an
algorithm that runs in polynomial time (e.g.
given a sequent S, is it valid?).
7
Theorem: NP = co-NP iff there is a
polynomially bounded proof system for the
propositional tautologies.
Also P = NP implies NP = co-NP, thus if we
prove that there is no polynomially bounded
proof system (which is what experts
conjecture), then it will follow that
NP = co-NP, and therefore P = NP.
The problem
P
?
= NP
has been listed by Steve Smale in the top
three “Mathematical Problems for the Next
Century” (Math Intelligencer 20, 1998).
8
How could we prove that there is no
polynomially bounded proof system? It seems
like a very difficult problem. The standard
approach is to consider stronger and stronger
proof systems, and to exhibit superpolynomial
lower bounds for each of them.
strongest Quantified PK
Extended PK
PK
————————
Bounded Depth PK
Resolution
weakest Truth Tables
However, we can only prove superpolynomial
lower bounds for the weaker systems (the
ones below the line). The systems above the
line have no known lower bounds.
9
Quantified PK
Quantified propositional PK is formed by
introducing propositional quantifiers:
∀xA(x) whose meaning is A(0) ∧ A(1)
∃xA(x) whose meaning is A(0) ∨ A(1)
The propositional quantifiers do not increase
the expressive power of formulas. Instead,
they allow us to shorten some propositional
formulas. For example, the formula
(x1,...,xn)∈{0,1}n
A(x1, . . . , xn)
has size in the order of 2n|A|, but the
equivalent quantified formula
∃x1 . . . ∃xnA(x1, . . . , xn)
has size in the order of n + |A|.
10
The quantified propositional calculus is first
discussed by B. Russell in “The Theory of
Implication”, American Journal of
Mathematics in 1906. Also, the Polish
mathematician Le´sniewski treated it in his
“Protothetic”.
Martin Dowd investigated the connection
between quantified propositional proof
systems and the complexity class PSPACE in
his PhD thesis in 1979.
A modest source of information is also a 5
page section in Jan Kraj´ıˇcek’s book
“Bounded Arithmetic, Propositional Logic,
and Complexity Theory”, 1995.
Still, little is known about quantified
propositional proof systems.
11
G is PK with ∃ and ∀
I follow the results and notation from Jan
Kraj´ıˇcek’s “Bounded Arithmetic,
Propositional Logic, and Complexity Theory”.
The quantified propositional proof system G
extends LK by allowing quantified
propositional formulas in sequents, and by
adding the following quantifier rules:
A(B), Γ → ∆
∀xA(x), Γ → ∆
Γ → ∆, A(p)
Γ → ∆, ∀xA(x)
A(p), Γ → ∆
∃xA(x), Γ → ∆
Γ → ∆, A(B)
Γ → ∆, ∃xA(x)
where B is any formula, and with the
restriction that the atom p does not occur in
the lower sequents of ∀-right and ∃-left.
12
Let G1 be the restriction of G where we allow
only strict Σ
q
1 formulas, that is, all formulas
must begin with a block of existential
quantifiers (possibly empty) followed by a
quantifier free formula. In other words, all
formulas are either quantifier free, or of the
form
∃x1 . . . ∃xnA(x1, . . . , xn)
where A(x1, . . . , xn) is quantifier free.
For example, the sequent
∃x∃y((¬x ∨ p) ∧ (¬y ∨ q)) → ∃x(x ∨ ¬p ∨ q), p ∧ q
has only Σ
q
1 formulas.
13
Witnessing
Given a sequent S, we want to have a way of
computing the values of the existential
variables on the right in terms of the free
variables, and the quantified variables on the
left. For example, consider the sequent
∃yA(x, y) → ∃yA(x, y) (∗)
where x, y are the only variables in this
sequent. In this case it is very easy. The
quantified variable y on the right can be
witnessed by the following function:
f(x, y) = y
that is, the sequent
A(x, y) → A(x, f(x, y))
is valid if (∗) was valid.
14
Suppose that π is a G1 proof. We show that
the existential quantifiers can be witnessed by
Boolean programs. We do this by induction
on the number of sequents in π.
For example, consider the contraction rule:
C(¯p) → D(¯p), ∃xB(x), ∃xB(x)
C(¯p) → D(¯p), ∃xB(x)
By Induction Hypothesis, we know that there
are Boolean programs g, h such that the
sequent
C(¯p) → D(¯p), B(g(¯p)), B(h(¯p))
is valid. Now, define f as follows:
f(¯p) =



g(¯p) if B(g(¯p))
h(¯p) otherwise
The bottom sequent can thus be converted
to the valid sequent
C(¯p) → D(¯p), B(f(¯p)),
15
Main Idea
If π is a G1 proof of a propositional tautology,
and π is tree-like, then the existential
quantifiers can be feasibly computed by
evaluating Boolean circuits. This was already
shown in Jan Kraj´ıˇcek’s book “Bounded
Arithmetic, Propositional Logic, and
Complexity Theory”.
If, on the other hand, π is not tree-like, then
it seems that evaluating the existential
quantifiers requires a lot of computational
power, i.e. Boolean programs whose
evaluation is a PSPACE complete problem.
This is shown in our paper “Boolean
Programs and Quantified Propositional Proof
Systems”.
16
References
“Boolean Programs and Quantified
Propositional Proof Systems”, by S.Cook and
M. Soltys, in this paper we introduce the
notion of Boolean programs, and we
characterize PSPACE in terms of families of
Boolean programs. We then show how to use
Boolean programs to witness quantifiers in
G1.
“The Complexity of Propositional Proofs”, by
Alasdair Urquhart, in The Bulletin of
Symbolic Logic, December 1995, a
comprehensive introduction to the complexity
of propositional proofs.
“Bounded Arithmetic, Propositional Logic,
and Complexity Theory”, by Jan Kraj´ıˇcek. A
short introduction to quantified propositional
proof systems.
17

More Related Content

What's hot

Method of direct proof
Method of direct proofMethod of direct proof
Method of direct proofAbdur Rehman
 
Propositional And First-Order Logic
Propositional And First-Order LogicPropositional And First-Order Logic
Propositional And First-Order Logicankush_kumar
 
Logic (slides)
Logic (slides)Logic (slides)
Logic (slides)IIUM
 
Propositional logic
Propositional logicPropositional logic
Propositional logicMamta Pandey
 
Discrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and ProofsDiscrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and ProofsWongyos Keardsri
 
Discrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part IDiscrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part IWongyos Keardsri
 
Discrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part IIDiscrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part IIWongyos Keardsri
 
Cs229 notes8
Cs229 notes8Cs229 notes8
Cs229 notes8VuTran231
 
CMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional LogicCMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional Logicallyn joy calcaben
 
Probabilistic diameter and its properties.
Probabilistic diameter and its properties.Probabilistic diameter and its properties.
Probabilistic diameter and its properties.inventionjournals
 
Computational logic First Order Logic_part2
Computational logic First Order Logic_part2Computational logic First Order Logic_part2
Computational logic First Order Logic_part2banujahir1
 
Computational logic First Order Logic
Computational logic First Order LogicComputational logic First Order Logic
Computational logic First Order Logicbanujahir1
 

What's hot (19)

Method of direct proof
Method of direct proofMethod of direct proof
Method of direct proof
 
Thesis 6
Thesis 6Thesis 6
Thesis 6
 
Propositional And First-Order Logic
Propositional And First-Order LogicPropositional And First-Order Logic
Propositional And First-Order Logic
 
Logic (slides)
Logic (slides)Logic (slides)
Logic (slides)
 
Reductions
ReductionsReductions
Reductions
 
3 fol examples v2
3 fol examples v23 fol examples v2
3 fol examples v2
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Mathematical Logic
Mathematical LogicMathematical Logic
Mathematical Logic
 
Math
MathMath
Math
 
Discrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and ProofsDiscrete-Chapter 05 Inference and Proofs
Discrete-Chapter 05 Inference and Proofs
 
Discrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part IDiscrete-Chapter 04 Logic Part I
Discrete-Chapter 04 Logic Part I
 
Discrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part IIDiscrete-Chapter 04 Logic Part II
Discrete-Chapter 04 Logic Part II
 
Cs229 notes8
Cs229 notes8Cs229 notes8
Cs229 notes8
 
CMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional LogicCMSC 56 | Lecture 1: Propositional Logic
CMSC 56 | Lecture 1: Propositional Logic
 
Discrete mathematics
Discrete mathematicsDiscrete mathematics
Discrete mathematics
 
Probabilistic diameter and its properties.
Probabilistic diameter and its properties.Probabilistic diameter and its properties.
Probabilistic diameter and its properties.
 
Computational logic First Order Logic_part2
Computational logic First Order Logic_part2Computational logic First Order Logic_part2
Computational logic First Order Logic_part2
 
Discrete Math Lecture 02: First Order Logic
Discrete Math Lecture 02: First Order LogicDiscrete Math Lecture 02: First Order Logic
Discrete Math Lecture 02: First Order Logic
 
Computational logic First Order Logic
Computational logic First Order LogicComputational logic First Order Logic
Computational logic First Order Logic
 

Viewers also liked

The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002Michael Soltys
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Michael Soltys
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008Michael Soltys
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006Michael Soltys
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006Michael Soltys
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for StringologyMichael Soltys
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisMichael Soltys
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationMichael Soltys
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Michael Soltys
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Michael Soltys
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004Michael Soltys
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet listsMichael Soltys
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Michael Soltys
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer ScienceMichael Soltys
 
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Michael Soltys
 

Viewers also liked (18)

The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for Stringology
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysis
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009
 
Algorithms on Strings
Algorithms on StringsAlgorithms on Strings
Algorithms on Strings
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet lists
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer Science
 
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
 

Similar to Boolean Programs Quantified Prop Proof Systems

The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database TheoryJan Hidders
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docxedwin orege
 
Fuzzy logic andits Applications
Fuzzy logic andits ApplicationsFuzzy logic andits Applications
Fuzzy logic andits ApplicationsDrATAMILARASIMCA
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheetJoachim Gwoke
 
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Dahua Lin
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
 
HypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaekHypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaekJun Taek Lee
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheetSuvrat Mishra
 
L03 ai - knowledge representation using logic
L03 ai - knowledge representation using logicL03 ai - knowledge representation using logic
L03 ai - knowledge representation using logicManjula V
 
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكروDiscrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكروDr. Khaled Bakro
 
Data mining assignment 2
Data mining assignment 2Data mining assignment 2
Data mining assignment 2BarryK88
 

Similar to Boolean Programs Quantified Prop Proof Systems (20)

The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database Theory
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docx
 
Lemh1a1
Lemh1a1Lemh1a1
Lemh1a1
 
Math Assignment Help
Math Assignment HelpMath Assignment Help
Math Assignment Help
 
Metric space
Metric spaceMetric space
Metric space
 
Fuzzy logic andits Applications
Fuzzy logic andits ApplicationsFuzzy logic andits Applications
Fuzzy logic andits Applications
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheet
 
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inference
 
Probability Cheatsheet.pdf
Probability Cheatsheet.pdfProbability Cheatsheet.pdf
Probability Cheatsheet.pdf
 
dma_ppt.pdf
dma_ppt.pdfdma_ppt.pdf
dma_ppt.pdf
 
HypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaekHypergroupsAssociationSchemes_leejuntaek
HypergroupsAssociationSchemes_leejuntaek
 
Mcs 013 solve assignment
Mcs 013 solve assignmentMcs 013 solve assignment
Mcs 013 solve assignment
 
Probability cheatsheet
Probability cheatsheetProbability cheatsheet
Probability cheatsheet
 
HPWFcorePRES--FUR2016
HPWFcorePRES--FUR2016HPWFcorePRES--FUR2016
HPWFcorePRES--FUR2016
 
L03 ai - knowledge representation using logic
L03 ai - knowledge representation using logicL03 ai - knowledge representation using logic
L03 ai - knowledge representation using logic
 
DM(1).pptx
DM(1).pptxDM(1).pptx
DM(1).pptx
 
Predicates
PredicatesPredicates
Predicates
 
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكروDiscrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
Discrete mathematics Ch2 Propositional Logic_Dr.khaled.Bakro د. خالد بكرو
 
Data mining assignment 2
Data mining assignment 2Data mining assignment 2
Data mining assignment 2
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Boolean Programs Quantified Prop Proof Systems

  • 1. Boolean Programs and Quantified Propositional Proof Systems To appear in the Bulletin of the Section of Logic Stephen Cook and Michael Soltys 1
  • 2. A propositional proof is a derivation of a propositional tautology (e.g. ¬P ∨ P) using a set of rules. A nice example of a propositional proof system is Gentzen’s PK system, where we have sequents of propositional formulas of the form: A1, . . . , An → B1, . . . , Bm (∗) and the semantics of sequents is given as follows. We say that a truth assignment τ satisfies the sequent (∗) iff either τ falsifies some Ai or τ satisfies some Bi. For example, if τ is given by P = 0, Q = 1, R = 0 then τ satisfies P ∨ Q, ¬R → Q ∧ ¬R 2
  • 3. A sequent is equivalent to the formula (A1 ∧ · · · ∧ An) ⊃ (B1 ∨ · · · ∨ Bm) In other words, the conjunction of the Ai’s implies the disjunction of the Bi’s. We say that a sequent is valid if it is true under all truth assignments. For example, the following are valid sequents: A → A → A, ¬A A, ¬A → → A ∨ ¬A A, A ⊃ B → B A PK proof is a sequence of sequents, where all the sequents are derived from previous sequents or are logical axioms of the form A → A, → 1 or 0 →. 3
  • 4. PK Rules of inference: weak Γ → ∆ A, Γ → ∆ Γ → ∆ Γ → ∆, A exch Γ1, A, B, Γ2 → ∆ Γ1, B, A, Γ2 → ∆ Γ → ∆1, A, B, ∆2 Γ → ∆1, B, A, ∆2 cont Γ, A, A → ∆ Γ, A → ∆ Γ → ∆, A, A Γ → ∆, A “¬” Γ → ∆, A ¬A, Γ → ∆ A, Γ → ∆ Γ → ∆, ¬A “∧” A, B, Γ → ∆ (A ∧ B), Γ → ∆ Γ → ∆, A Γ → ∆, B Γ → ∆, (A ∧ B) “∨” A, Γ → ∆ B, Γ → ∆ (A ∨ B), Γ → ∆ Γ → ∆, A, B Γ → ∆, (A ∨ B) cut Γ → ∆, A A, Γ → ∆ Γ → ∆ 4
  • 5. Any valid sequent can be derived from initial sequents of the form A → A, → 1 and 0 →, using the above rules (completeness of PK), and only valid sequents can be derived (soundness of PK). As an example we give a proof of one of DeMorgan’s laws: ¬(P ∧ Q) → ¬P ∨ ¬Q Here is the derivation: P → P → P, ¬P → P, ¬P, ¬Q Q → Q Q → Q, ¬P → Q, ¬P, ¬Q → P ∧ Q, ¬P, ¬Q → P ∧ Q, ¬P ∨ ¬Q ¬(P ∧ Q) → ¬P ∨ ¬Q 5
  • 6. Abstract Definition: A proof system is a feasible (i.e. easily computable) map f : {0, 1}∗ onto −→ {tautologies} Where {tautologies} is just the set of propositional tautologies, and if f(x) = A then x is the proof of the propositional tautology A. A proof system is polynomially bounded if there exists a polynomial p such that for every A ∈ {tautologies}, there exists an x such that |x| ≤ p(|A|), i.e. every tautology has a proof which is “proportional” to its size. See “The Complexity of Propositional Proofs”, by Alasdair Urquhart, in The Bulletin of Symbolic Logic, December 1995, for all the details. 6
  • 7. Interest in propositional proof complexity arose from two fields connected with computers: automated theorem proving (artificial intelligence) and computational complexity theory. Some Complexity Theory P is the class of problems that can be solved with algorithms that run in polynomial time in the size of the input (e.g. given a truth assignment τ, and a sequent S, does τ satisfy S?). NP is the class of problems whose solutions can be verified by an algorithm that runs in polynomial time (e.g. given a sequent S, is it satisfiable?) co-NP is the class of problems for which a counter-example can be verified by an algorithm that runs in polynomial time (e.g. given a sequent S, is it valid?). 7
  • 8. Theorem: NP = co-NP iff there is a polynomially bounded proof system for the propositional tautologies. Also P = NP implies NP = co-NP, thus if we prove that there is no polynomially bounded proof system (which is what experts conjecture), then it will follow that NP = co-NP, and therefore P = NP. The problem P ? = NP has been listed by Steve Smale in the top three “Mathematical Problems for the Next Century” (Math Intelligencer 20, 1998). 8
  • 9. How could we prove that there is no polynomially bounded proof system? It seems like a very difficult problem. The standard approach is to consider stronger and stronger proof systems, and to exhibit superpolynomial lower bounds for each of them. strongest Quantified PK Extended PK PK ———————— Bounded Depth PK Resolution weakest Truth Tables However, we can only prove superpolynomial lower bounds for the weaker systems (the ones below the line). The systems above the line have no known lower bounds. 9
  • 10. Quantified PK Quantified propositional PK is formed by introducing propositional quantifiers: ∀xA(x) whose meaning is A(0) ∧ A(1) ∃xA(x) whose meaning is A(0) ∨ A(1) The propositional quantifiers do not increase the expressive power of formulas. Instead, they allow us to shorten some propositional formulas. For example, the formula (x1,...,xn)∈{0,1}n A(x1, . . . , xn) has size in the order of 2n|A|, but the equivalent quantified formula ∃x1 . . . ∃xnA(x1, . . . , xn) has size in the order of n + |A|. 10
  • 11. The quantified propositional calculus is first discussed by B. Russell in “The Theory of Implication”, American Journal of Mathematics in 1906. Also, the Polish mathematician Le´sniewski treated it in his “Protothetic”. Martin Dowd investigated the connection between quantified propositional proof systems and the complexity class PSPACE in his PhD thesis in 1979. A modest source of information is also a 5 page section in Jan Kraj´ıˇcek’s book “Bounded Arithmetic, Propositional Logic, and Complexity Theory”, 1995. Still, little is known about quantified propositional proof systems. 11
  • 12. G is PK with ∃ and ∀ I follow the results and notation from Jan Kraj´ıˇcek’s “Bounded Arithmetic, Propositional Logic, and Complexity Theory”. The quantified propositional proof system G extends LK by allowing quantified propositional formulas in sequents, and by adding the following quantifier rules: A(B), Γ → ∆ ∀xA(x), Γ → ∆ Γ → ∆, A(p) Γ → ∆, ∀xA(x) A(p), Γ → ∆ ∃xA(x), Γ → ∆ Γ → ∆, A(B) Γ → ∆, ∃xA(x) where B is any formula, and with the restriction that the atom p does not occur in the lower sequents of ∀-right and ∃-left. 12
  • 13. Let G1 be the restriction of G where we allow only strict Σ q 1 formulas, that is, all formulas must begin with a block of existential quantifiers (possibly empty) followed by a quantifier free formula. In other words, all formulas are either quantifier free, or of the form ∃x1 . . . ∃xnA(x1, . . . , xn) where A(x1, . . . , xn) is quantifier free. For example, the sequent ∃x∃y((¬x ∨ p) ∧ (¬y ∨ q)) → ∃x(x ∨ ¬p ∨ q), p ∧ q has only Σ q 1 formulas. 13
  • 14. Witnessing Given a sequent S, we want to have a way of computing the values of the existential variables on the right in terms of the free variables, and the quantified variables on the left. For example, consider the sequent ∃yA(x, y) → ∃yA(x, y) (∗) where x, y are the only variables in this sequent. In this case it is very easy. The quantified variable y on the right can be witnessed by the following function: f(x, y) = y that is, the sequent A(x, y) → A(x, f(x, y)) is valid if (∗) was valid. 14
  • 15. Suppose that π is a G1 proof. We show that the existential quantifiers can be witnessed by Boolean programs. We do this by induction on the number of sequents in π. For example, consider the contraction rule: C(¯p) → D(¯p), ∃xB(x), ∃xB(x) C(¯p) → D(¯p), ∃xB(x) By Induction Hypothesis, we know that there are Boolean programs g, h such that the sequent C(¯p) → D(¯p), B(g(¯p)), B(h(¯p)) is valid. Now, define f as follows: f(¯p) =    g(¯p) if B(g(¯p)) h(¯p) otherwise The bottom sequent can thus be converted to the valid sequent C(¯p) → D(¯p), B(f(¯p)), 15
  • 16. Main Idea If π is a G1 proof of a propositional tautology, and π is tree-like, then the existential quantifiers can be feasibly computed by evaluating Boolean circuits. This was already shown in Jan Kraj´ıˇcek’s book “Bounded Arithmetic, Propositional Logic, and Complexity Theory”. If, on the other hand, π is not tree-like, then it seems that evaluating the existential quantifiers requires a lot of computational power, i.e. Boolean programs whose evaluation is a PSPACE complete problem. This is shown in our paper “Boolean Programs and Quantified Propositional Proof Systems”. 16
  • 17. References “Boolean Programs and Quantified Propositional Proof Systems”, by S.Cook and M. Soltys, in this paper we introduce the notion of Boolean programs, and we characterize PSPACE in terms of families of Boolean programs. We then show how to use Boolean programs to witness quantifiers in G1. “The Complexity of Propositional Proofs”, by Alasdair Urquhart, in The Bulletin of Symbolic Logic, December 1995, a comprehensive introduction to the complexity of propositional proofs. “Bounded Arithmetic, Propositional Logic, and Complexity Theory”, by Jan Kraj´ıˇcek. A short introduction to quantified propositional proof systems. 17