Skip to main content

Modeling the Interaction of Computer Errors by Four-Valued Contaminating Logics

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11541))

Abstract

Logics based on weak Kleene algebra (WKA) and related structures have been recently proposed as a tool for reasoning about flaws in computer programs. The key element of this proposal is the presence, in WKA and related structures, of a non-classical truth-value that is “contaminating” in the sense that whenever the value is assigned to a formula \(\phi \), any complex formula in which \(\phi \) appears is assigned that value as well. Under such interpretations, the contaminating states represent occurrences of a flaw. However, since different programs and machines can interact with (or be nested into) one another, we need to account for different kind of errors, and this calls for an evaluation of systems with multiple contaminating values. In this paper, we make steps toward these evaluation systems by considering two logics, \(\mathsf {HYB}_{1}\) and \(\mathsf {HYB}_{2}\), whose semantic interpretations account for two contaminating values beside classical values 0 and 1. In particular, we provide two main formal contributions. First, we give a characterization of their relations of (multiple-conclusion) logical consequence—that is, necessary and sufficient conditions for a set \(\varDelta \) of formulas to logically follow from a set \(\varGamma \) of formulas in \(\mathsf {HYB}_{1}\) or \(\mathsf {HYB}_{2}\). Second, we provide sound and complete sequent calculi for the two logics.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Throughout the paper, we adopt the standard notation and basic definitions from Abstract Algebraic Logic, as presented e.g. in [13]. One important exception with regard to [13], however, concerns our definition of multiple-conclusion matrix consequence (see below).

  2. 2.

    Notice that, in using these notions, we do not assume or even try to stress that we do not allow the presence of matrices whose algebraic reduct is the trivial algebra. However, as will become clear shortly, in this paper our interest is in investigating logics induced by matrices having contaminating values which, in turn, extend the two-valued matrix inducing classical logic—i.e. the matrix whose algebraic reduct is the two-element Boolean algebra. We would like to thank an anonymous reviewer for urging us to clarify this issue.

  3. 3.

    For this notation, see also [13, Chap. 1].

  4. 4.

    We do not consider here the trivial systems resulting from \(\mathcal {D}_{} = A\) and \(\mathcal {D}_{} = \varnothing \).

  5. 5.

    A system is paraconsistent if it falsifies Ex Falso Quodlibet \(\phi ,\lnot \phi \,\models \,\beta \), and is paracomplete if it falsifies Excluded Middle \(\varnothing \,\models \,\phi \vee \lnot \phi \).

  6. 6.

    This illustrates the difference between our calculi and many-sided sequent calculi. Contrary to the latter, the bracketing in our calculi for \(\mathsf {HYB}_{1}\) and \(\mathsf {HYB}_{2}\) does not a priori correspond to truth-values.

  7. 7.

    As usual, this label denotes the standard sequent calculus for classical logic \(\mathsf {CL}\).

References

  1. Avron, A., Konikowska, B.: Proof systems for reasoning about computation errors. Studia Logica 91(2), 273–293 (2009)

    Article  MathSciNet  Google Scholar 

  2. Baaz, M., Fermüller, C., Zach, R.: Elimination of cuts in first-order many-valued logic. J. Inf. Process. Cybern. 29, 333–355 (1994)

    MATH  Google Scholar 

  3. Barrio, E., Pailos, F., Szmuc, D.: A cartography of logics of formal inconsistency and truth (2016, manuscript)

    Google Scholar 

  4. Bochvar, D.: On a three-valued calculus and its application in the analysis of the paradoxes of the extended functional calculus. Matematicheskii Sbornik 4, 287–308 (1938)

    MATH  Google Scholar 

  5. Bonzio, S., Gil-Ferez, J., Paoli, F., Peruzzi, L.: On paraconsistent weak Kleene logic: axiomatization and algebraic analysis. Studia Logica 105(2), 253–297 (2017)

    Article  MathSciNet  Google Scholar 

  6. Ciuni, R., Carrara, M.: Characterizing logical consequence in paraconsistent weak Kleene. In: Felline, L., Ledda, A., Paoli, F., Rossanese, E. (eds.) New Developments in Logic and the Philosophy of Science, pp. 165–176. College Publications, London (2016)

    Google Scholar 

  7. Ciuni, R., Carrara, M.: Semantical analysis of weak Kleene logic (Under submission, ms)

    Google Scholar 

  8. Coniglio, M.E., Corbalan, M.I.: Sequent calculi for the classical fragment of Bochvar and Halldén’s nonsense logic. In: Kesner, D., Petrucio, V., (eds.) Proceedings of the 7th LSFA Workshop, Electronic Proceedings in Computer Science, pp. 125–136 (2012)

    Article  Google Scholar 

  9. Correia, F.: Weak necessity on weak Kleene matrices. In: Advances in Modal Logic, vol. 4 (2004)

    Google Scholar 

  10. Deutsch, H.: Relevant analytic entailment. Relevance Log. Newsl. 2, 26–44 (1977)

    MATH  Google Scholar 

  11. Ferguson, T.M.: A computational interpretation of conceptivism. J. Appl. Non-Class. Log. 24(4), 333–367 (2014)

    Article  MathSciNet  Google Scholar 

  12. Ferguson, T.M.: Logics of nonsense and Parry systems. J. Philos. Log. 44(1), 65–80 (2015)

    Article  MathSciNet  Google Scholar 

  13. Font, J.M.: Abstract Algebraic Logic. College Publications, London (2016)

    MATH  Google Scholar 

  14. Halldén, S.: The Logic of Nonsense. Lundequista Bokhandeln, Uppsala (1949)

    MATH  Google Scholar 

  15. Kleene, S.: Introduction to Metamathematics. North Holland, Amsterdam (1952)

    MATH  Google Scholar 

  16. McCarthy, J.: A basis for a mathematical theory of computation. In: Braffort, P., Hirschberg, D. (eds.) Computer Programming and Formal Systems, pp. 33–70. North-Holland Publishing Company, Amsterdam (1963)

    Chapter  Google Scholar 

  17. Priest, G.: In Contradiction, 2nd edn. Oxford University Press, Oxford (2006)

    Book  Google Scholar 

  18. Szmuc, D.: Defining LFIs and LFUs in extensions of infectious logics. J. Appl. Non-Class. Log. 26(4), 286–314 (2016)

    Article  MathSciNet  Google Scholar 

  19. Wójcicki, R.: Logical matrices strongly adequate for structural sentential calculi. Bulletin de l’Academie Polonaise des Sciences Série des Sciences Mathématiques Astronomiques et Physiques 17, 333–335 (1969)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Macaulay Ferguson .

Editor information

Editors and Affiliations

Appendix

Appendix

Proof of Lemma 1: We start with the LTR direction. Suppose that \(\varGamma \vDash _{\mathcal {M}_{\mathsf {HYB}_{1}}}\varDelta \). This means that, if \(v(\psi )\in \{0,n_{2}\}\) for every \(\psi \in \varDelta \), then \(v(\phi )\in \{0,n_{2}\}\) for some \(\phi \in \varGamma \) and every \(v\in \mathrm {Hom}_{\mathbf {Fml},\mathbf {HYB}}\). Given the behavior of \(n_{2}\) w.r.t. negation, this implies that, if \(v(\theta ) = \{1,n_{2}\}\) for every \(\theta \in \varDelta ^{\lnot }\), then \(v(\zeta ) = \{1,n_{2}\}\) for some \(\zeta \in \varGamma ^{\lnot }\) and every \(v\in \mathrm {Hom}_{\mathbf {Fml},\mathbf {HYB}}\). Since \(\mathcal {D}_{\mathsf {HYB}_{2}} = \{1,n_{2}\}\), this implies \(\varDelta ^{\lnot }\,\models _{\mathcal {M}_{\mathsf {HYB}_{2}}}\,\varGamma ^{\lnot }\). The RTL direction is proved along the very same lines. \(\blacksquare \)

Proof of Theorem 1: We start with the LTR direction. We first prove that if \(\varGamma \,\models _{\mathsf {HYB}_{1}}\,\varDelta \), then \(\varGamma '\,\models _{\mathsf {HYB}_{1}}\,\varDelta \) for at least a non-empty \(\varDelta ' \subseteq \varDelta \) such that \(var(\varDelta ')\ \subseteq var(\varGamma )\). Assume the antecedent as the initial hypothesis, and suppose that for every \(\varDelta \subseteq \varDelta '\) such that \(var(\varDelta ')\ \subseteq var(\varGamma )\). This implies that there is valuation \(v\in \mathrm {Hom}_{\mathbf {Fml},\mathbf {HYB}}\) such that \(v(\psi )\in \{n_{2},0\}\) for every \(\psi \in \varDelta '\) and yet \(v(\phi )\in \{1,n_{1}\}\) for every \(\phi \in \varGamma \). By the contaminating behavior of \(n_{2}\) from Table 2 and \(var(\varDelta ')\subseteq var(\varGamma )\), this implies \(v(\psi ) = 0\) for every \(\psi \in \varDelta '\). More in general, we have \(v(p) \ne n_{2}\) for every \(p\in var(\varGamma )\), and by this, we have \(v(q) \ne n_{2}\) for every \(q\in var(\bigcup _{\varDelta '\in \mathbf {G}_{\varDelta ,\varGamma }})\). This implies that \(v(\phi ) = \{n_{1},1\}\) for every \(\phi \in \varGamma \). v can be extended to a valuation \(v'\in \mathrm {Hom}_{\mathbf {Fml},\mathbf {HYB}}\) such that \(v'(p) = v(p)\) if \(p\in var(\varGamma )\), and \(v'(p) = n_{2}\) otherwise. This implies that \(v'(\phi ) \in \{1,n_{1}\}\) for every \(\phi \in \varGamma \), \(v'(\theta ) = n_{2}\) for every \(\theta \in \varDelta \setminus \bigcup _{\varDelta '\in \mathbf {G}_{\varDelta ,\varGamma }}\), and \(v(\psi ) = 0\) for every \(\psi \in \varDelta \). But this in turn contradicts the initial hypothesis, given the definition of \(\mathsf {HYB}_{1}\)-consequence. Thus, we have that, if \(\varGamma \,\models _{\mathsf {HYB}_{1}}\,\varDelta \), then \(\varGamma \,\models _{\mathsf {HYB}_{2}}\,\varDelta '\) for at least a non-empty \(\varDelta ' \subseteq \varDelta \) such that \(var(\varDelta ')\ \subseteq var(\varGamma )\). Since \(\mathsf {HYB}_{2}\) is a sublogic of \(\mathsf {PWK}\), we conclude that \(\varGamma \,\models _{\mathsf {HYB}_{1}}\,\varDelta \) implies \(\varGamma \,\models _{\mathsf {PWK}}\,\varDelta '\) for at least a non-empty \(\varDelta ' \subseteq \varDelta \) such that \(var(\varDelta ')\ \subseteq var(\varGamma )\).

As for the RTL direction, assume as the initial hypothesis that \(\varGamma \,\models _{\mathsf {PWK}}\,\varDelta '\) for at least a non-empty \(\varDelta ' \subseteq \varDelta \) such that \(var(\varDelta ')\ \subseteq var(\varGamma )\). To establish \(\varGamma \,\models _{\mathsf {HYB}_{1}}\,\varDelta '\), fix any valuation \(U\in \mathrm {Hom}_{}\) such that \(v(\phi ) \in \{1,n_{1}\}\) for every \(\phi \in \varGamma '\). Our goal is to show that \(v(\psi ) \in \{1,n_{1}\}\) for some \(\psi \in \varDelta \). We consider two cases:

Case (1): \(v(\phi ) = n_{1}\) for some \(\phi \in \varGamma \). Fix some formula \(\theta \in \varGamma \) such that \(v(\theta ) = n_{1}\). By the contaminating behavior of \(n_{1}\) from Table 2, there is a \(q\in var(\theta )\) such that \(v(q)= n_{1}\). Remember that \(var(\varDelta ')\subseteq var(\varGamma )\), and suppose that \(q\in var(\varGamma )\cap var(\varDelta ')\). Since \(var(\varDelta ')\subseteq var(\varGamma )\) and \(v(p) \ne n_{2}\) for every \(p\in var(\varGamma )\), we have \(v(q) \ne n_{2}\) for every \(q\in var(\varDelta ')\). Suppose now that \(v(\phi ) \in \{1,n_{1}\}\) for every \(\phi \in \varGamma \) and \(v(\psi ) = 0\) for every \(\psi \in \varDelta '\). This implies that there is a valuation \(V\in \mathrm {Hom}_{}\) such that \(v(\phi ) \in \{1,n_{\}}\) for every \(\phi \in \varGamma \) and \(v(\psi ) = 0\) for every \(\psi \in \varDelta '\). But this contradicts the initial hypothesis that \(\varGamma \,\models _{\mathsf {PWK}}\,\varDelta '\).

Case (2): \(v(\phi ) \ne n_{1}\) for every \(\phi \in \varGamma '\). This implies that \(v(\phi ) = 1\) for every \(\phi \in \varGamma \), and, by the contaminating behavior of \(n_{1},n_{2}\) from Table 2, \(v(p) = 1\) for every \(p\in var(\varGamma )\). From this and \(\varGamma \,\models _{\mathsf {CL}}\,\varDelta '\) (which follows from the initial hypothesis \(\varGamma \,\models _{\mathsf {PWK}}\,\varDelta '\)), we have that \(v(\psi ) = 1\) for some \(\psi \in \varDelta \), as desired.

Since these two cases are jointly exhaustive, we conclude \(\varGamma \,\models _{\mathsf {HYB}_{1}}\,\varDelta '\). From this and the Definition of \(\models _{\mathsf {HYB}_{1}}\), it follows that \(\varGamma \,\models _{\mathsf {HYB}_{1}}\,\varDelta \). \(\blacksquare \)

Proof of Theorem 2: By Theorem 1 and Lemma 1. \(\blacksquare \)

Proof of Theorem 3: Any initial sequent has the form in which \(\varGamma \) and \(\varDelta \) are empty and \(\varGamma '=\varDelta '=\lbrace p\rbrace \). In this case, the sequent enjoys the property that:Footnote 7

figure m

It can be easily checked that this property is preserved under each of the foregoing rules. The case of the Exchange and Contraction rules, and Weakening (outside the scope of the square brackets) can be noted to preserve this property, since they correspond to properties that are valid in every Tarskian logic and \(\mathsf {HYB}_{1}\) is a Tarskian logic, as every matrix logic is—see [19]. We notice that this property is preserved by the other rules as follows. Moreover, this can also be checked to apply straightforwardly to the “push” rules and the operational rules (in- and outside the square brackets). Hence, any derivable sequent enjoys the above tripartite property.

Now, we know that \(\varXi \vDash _{\mathcal {M}_{\mathsf {HYB}_{2}}}\varTheta \) if and only if there exists a \(\varXi '\subseteq \varXi \) and a \(\varTheta '\subseteq \varTheta \) such that \(Var(\varXi ')\subseteq Var(\varTheta ')\subseteq Var(\varXi )\) and \(\varXi '\vDash _{\mathcal {M}_{\mathsf {CL}}}\varTheta '\). Because of soundness of \(\mathbf {LK}\) (a presentation of which is described in [8]), the above tripartite property entails validity in \(\mathcal {M}_{\mathsf {HYB}_{2}}\). Soundness of \(\mathsf {HYB}_{2}\) with respect to \(\mathcal {M}_{\mathsf {HYB}_{1}}\) is proved by similar reasoning. \(\blacksquare \)

Proof of Lemma 2: Assume \(\varGamma \vDash _{\mathcal {M}_{\mathsf {HYB}_{2}}} \varDelta \). Then by Corollary 1 for \(\mathcal {M}_{\mathsf {HYB}_{2}}\), we know that there are \(\varGamma ' \subseteq \varGamma \), \(\varDelta ' \subseteq \varDelta \), with \(Var(\varGamma ')\subseteq Var(\varDelta ')\subseteq Var(\varGamma )\) and \(\varGamma ' \vDash _{\mathcal {M}_{\mathsf {CL}}} \varDelta '\). By completeness of \(\mathbf {LK}\), this implies that \(\varGamma '\Rightarrow \varDelta '\) is provable in \(\mathbf {LK}\). We also know that \(Var(\varGamma ')\subseteq Var(\varDelta ')\). Hence, by [8, Lemma 21], these two observations jointly imply that \(\varGamma '\Rightarrow \varDelta '\) is provable in the sequent calculus for \(\mathsf {PWK}\). \(\blacksquare \)

Proof of Theorem 4: Assume that \(\varGamma \vDash _{\mathcal {M}_{\mathsf {HYB}_{2}}}\varDelta \). Then, by Lemma 2, there is a \(\mathsf {PWK}\) proof of \(\varGamma '\Rightarrow \varDelta '\). Call this proof, i.e. a rooted binary tree, \(\varPi \). We can design an algorithm to transform a \(\mathsf {PWK}\) proof of this sequent into an \(\mathsf {HYB}_{1}\) proof of .

First, replace every node \(\varXi \Rightarrow \varTheta \) of \(\varPi \) by a node . Then, place below each leaf, or axiom node, one instance of [Weak], such that from an axiom we infer in one step the sequent . After that, for each non-axiom node place \(\varGamma \) to the left of the square brackets in the antecedent and \(\varDelta \) to the left of the square brackets in the succedent. In the resulting proof, each \(\mathsf {PWK}\) rule is applied within the scope of the square brackets. Moreover, we can check that every application of a \(\mathsf {PWK}\) rule corresponds to a “bracketed rule” in \(\mathsf {HYB}_{1}\) that respects the corresponding provisos.

Actually, since Weakening is not fully admissible within the scope of square brackets, something must be said about this case. Suppose in an H proof of \(\varGamma '\Rightarrow \varGamma '\) there is an ineliminable application of Weakening that allows to go from a node \(\varXi \Rightarrow \varTheta \) to a node \(\varXi ,\varXi '\Rightarrow \varTheta ,\varTheta '\)—whence we can legitimately call \(\varXi '\) and \(\varTheta '\) the active (sets of) formulas in this step. Then the current algorithm can be further specified by saying that if \(\varPi \) is a proof which has no ineliminable application of Weakening, then we proceed as previously stated. However, if \(\varPi \) has an ineliminable application of Weakening, then we enlarge every node (outside the square brackets) with \(\varGamma \) and \(\varXi '\), and \(\varDelta \) and \(\varTheta '\), in their respective sides. Finally, when the \(\varPi \) requires the corresponding application of Weakening, we mimic this in \(\mathsf {HYB}_{1}\) applying the [PushL] and [PushR] rules to \(\varXi '\) and \(\varTheta '\), as needed.

This renders a rooted binary tree \(\varPi ^{*}\) with as its terminal sequent. We then proceed to apply the rules [PushL], [PushR] followed by elimination of duplicate formulas in \(\varGamma '\) and \(\varDelta '\). We end up with a \(\mathsf {HYB}_{1}\) proof ending with , for which \(\varGamma ''\cup \varGamma '=\varGamma \) and \(\varDelta ''\cup \varDelta '=\varDelta \) and \(Var(\varGamma ')\subseteq Var(\varDelta ')\subseteq Var(\varGamma ''\cup \varGamma ')=\varGamma \). \(\blacksquare \)

Proof of Theorem 5: By Theorem 3 and Lemma 1. \(\blacksquare \)

Proof of Theorem 6: By Theorem 4 and Lemma 1. \(\blacksquare \)

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer-Verlag GmbH Germany, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ciuni, R., Ferguson, T.M., Szmuc, D. (2019). Modeling the Interaction of Computer Errors by Four-Valued Contaminating Logics. In: Iemhoff, R., Moortgat, M., de Queiroz, R. (eds) Logic, Language, Information, and Computation. WoLLIC 2019. Lecture Notes in Computer Science(), vol 11541. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-59533-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-59533-6_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-59532-9

  • Online ISBN: 978-3-662-59533-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics