Beruflich Dokumente
Kultur Dokumente
Part of
Published by
The Society for the Study of
Artificial Intelligence and
Simulation of Behaviour
http://www.aisb.org.uk
ISBN 978-1-908187-10-9
Foreword from the Congress Chairs
For the Turing year 2012, AISB (The Society for the Study of Artificial Intel-
ligence and Simulation of Behaviour) and IACAP (The International Associa-
tion for Computing and Philosophy) merged their annual symposia/conferences
to form the AISB/IACAP World Congress. The congress took place 2–6 July
2012 at the University of Birmingham, UK.
The Congress was inspired by a desire to honour Alan Turing, and by the broad
and deep significance of Turing’s work to AI, the philosophical ramifications of
computing, and philosophy and computing more generally. The Congress was
one of the events forming the Alan Turing Year.
This volume forms the proceedings of one of the component symposia. We are
most grateful to the organizers of the Symposium for their hard work in creating it,
attracting papers, doing the necessary reviewing, defining an exciting programme
for the symposium, and compiling this volume. We also thank them for their
flexibility and patience concerning the complex matter of fitting all the symposia
and other events into the Congress week.
In the first paper, Andrew Aberdein argues that proof consists of the twin
elements of informal argumentation, whose goal is to persuade fellow mathemati-
cians of a result, and rigorous proof, consisting of valid mathematical inferences.
He then uses this distinction to suggest that different positions on the foundations
of mathematics and in theories of mathematical practice can be seen as different
positions on the admissibility of steps to each of these two elements. In the sec-
ond paper, Manfred Kerber, Christoph Lange and Colin Rowat present their work
on representing and proving theorems in economics, in particular their applica-
tion of mechanised theorem proving tools to a class of economic problems for
which very few general tools currently exist. Thirdly, Alison Pease and Ursula
Martin use Turing’s famous question “Can machines think?” as a starting point
for a thought experiment about the question “Can machines do mathematics?”,
analysing an online mathematical discussion with a view to asking how machines
could ever contribute to such a discussion. Alan Smaill argues, in the fourth paper,
that the two distinctly different proposals for the choice of connectives in linear
logic show the influence of different mathematical analogies at work. Finally,
Sandra Visokolskis combines philosophy with the history of mathematics, giving
an account of the sudden emergence of some mathematical results, characterising
discovery in mathematics as an active and experiential process.
Seventy four minutes of mathematics: An analysis of the third Mini-Polymath project ..... 19
Alison Pease and Ursula Martin
As an example of Aristotle’s approach, consider the following: is one frequently discussed example [35]; the anticipation of the
Laplace transform by Heaviside’s operator methods another [22]. To
Bryson’s method of squaring the circle, even if the circle is
insist on purity of method at this point may be appropriate if the in-
thereby squared, is still sophistical because it does not conform
formally derived results are (mis)represented as formally sound, but
to the subject in hand. So, then, any merely apparent reasoning
can otherwise only be an unnecessary brake on progress.
about these things is a contentious argument, and any reason-
In conclusion, Aristotle may charitably be read as talking only of
ing that merely appears to conform to the subject in hand, even
(mutatis mutandis) formal mathematics, and therefore not endorsing
though it be genuine reasoning, is a contentious argument: for
Option 1 after all. Latterday Aristoteleans, in so far as they insist on
it is merely apparent in its conformity to the subject matter, so
‘certain conventions to which an argument must conform to be an
that it is deceptive and plays foul [7, 171b].
argument within the discipline’ [24, 455 f.], beg the question against
Some unpacking is required. Sources both ancient and modern dis- methodological innovation. Requiring that the new method be shown
agree as to precisely what Bryson’s method comprised ([30, 18, 47 to be mathematical before it can be admitted into informal mathemat-
ff.]; [16, 35]). But there is consensus that it began by both inscribing ical reasoning is to require that it be shown to be either formally valid
and circumscribing the circle with squares, perhaps as in Fig. 4. One or heuristically useful. But the former is inappropriate for informal
school of thought, attributed to Proclus, represents Bryson’s argu- mathematics and the latter can only be demonstrated through exten-
ment as merely an existence claim: some square with an area between sive use.
the two must be equal in area to the circle. Another, questionably at-
tributed to Alexander of Aphrodisias, has Bryson proceed to inscribe
Option 2: Not All Steps Exclusively Mathematical
and circumscribe pentagons, then hexagons, and so on. With each
extra side the margin of error shrinks, so the method might charita- The Victorian mathematician J. J. Sylvester, in defending his disci-
bly be interpreted as a partial anticipation of the method Archimedes pline from the ill-informed criticism of T. H. Huxley, stressed ‘how
used to estimate the area of a circle. However, in either case Aristo- much observation, divination, induction, experimental trial, and ver-
tle would reject the result as fallacious. This has the uncomfortable ification, causation, too (if that means, as I suppose it must, mount-
corollary that, had he lived to see it, Aristotle would apparently have ing from phenomena to their reasons or causes of being2 ) have to do
rejected Archimedes’s method too. with the work of the mathematician’ [39, 1762]. This perspective em-
phasizes the connexions between mathematical practice and ordinary
reasoning, much of it comprising C-schemes, thereby leading to Op-
tion 2 or, when the ordinary reasoning is understood as underpinning
the mathematical practice, Option 3.
One important challenge to Option 2 arises from an ambiguity be-
tween two senses of the phrase ‘mathematical argument’. The am-
biguity may be resolved by applying the terminology of Toulmin
layouts. When ‘mathematical argument’ occurs in ordinary, that is
non-mathematical, discourse it often serves to indicate that the ar-
gument has a mathematical warrant and/or backing, and thereby a
mathematical qualifier. For example, in a discussion on the prospects
of two competing political candidates it might be argued that one
Figure 4. Bryson’s method of squaring the circle
candidate is too far behind to win, even if all the uncounted ballots
had been cast in his favour. The proponent of such an argument may
Of course, in one sense, Aristotle would be right: Archimedes’s stress that it was a ‘purely mathematical argument’, thereby empha-
method is not purely geometrical, and however far it is taken it does sizing its difference from typical political arguments: a more robust
not constitute a solution to the ancient (and provably insoluble) prob- 2 This would seem to be an attempt to characterize what would later be de-
lem of squaring the circle by a ruler and compass construction. The scribed as abductive reasoning, or inference to the best explanation.
warrant and qualifier. If that were the only context in which ‘mathe- from natural numbers to rational numbers, irrational numbers, nega-
matical argument’ were used it would appear that the mathematical tive numbers, imaginary numbers, transfinite numbers, and so forth.
nature of the warrant (or qualifier) was essential, thereby ruling out Each of these steps proceeded by analogy, and was initially contro-
topic-neutral schemes, and thereby Option 2. But this would be to ig- versial. These moves also gave rise to further analogies, as properties
nore the non-mathematical context—the warrant is singled out since known to apply to one sort of number were conjectured to apply to
it is what makes the argument different from other arguments to the other sorts. For example, Wallis conjectured that n p × nq = n p+q ,
same claim. In broader terms, we might also classify this as a politi- known to apply for integer p, q, also held when the indices were
cal argument, since it derives a political claim from political data. In fractional or negative [38, 158].
this second sense, a mathematical argument will be one which arises Informal analogies can be drawn from areas outside mathematics.
in mathematical discourse. Characteristically, this will entail the data For example, the optimization technique of ‘simulated annealing’ is
and claim being mathematical, but not necessarily that the warrant motivated by an analogy with the metallurgical technique of anneal-
should be so too. ing [31, 120]. The mathematical problem is that many search proce-
If warrants in mathematical arguments are not mathematical what dures designed to find the global maximum of functions of multiple
are they? The positive argument in defence of the mathematical use independent variables will halt at local optima, that is globally subop-
of C-schemes can best be made by answering this question. As dis- timal solutions. The analogous problem in metallurgy is that metals
cussed in Sect 2, although argumentation schemes have been devel- (and other crystalline substances) if cooled too quickly from a molten
oped primarily for non-mathematical contexts, many of them lend state will ‘freeze in’ irregularities, producing a structure of higher en-
themselves readily to mathematical application. For example, con- ergy level, and typically weaker structural integrity. The solution is
sider the following scheme for argument from analogy: gradual cooling, which finds an analogy in the incremental reduction
of a control parameter in the simulated annealing algorithm. Here,
A RGUMENTATION S CHEME FOR A RGUMENT FROM A NALOGY the base premiss, that is the data, is drawn from metallurgy, not math-
Similarity Premise Generally, case C1 is similar to case C2 . ematics, while the warrant asserts the analogy between the two fields,
and is thus not wholly mathematical either. Nonetheless, the claim is
Base Premise A is true (false) in case C1 . a substantial contribution to a mathematical problem. While more
Conclusion A is true (false) in case C2 . formal arguments have been made for the effectiveness of simulated
Critical Questions: annealing, as they must be if it is to have a permanent place in math-
ematics, this analogy is independently compelling, and was crucial
CQ1. Are there differences between C1 and C2 that would tend to its discovery.
to undermine the force of the similarity cited? We have seen that the data, the warrant, and thereby the quali-
CQ2. Is A true (false) in C1 ? fier of a mathematical argument may be non-mathematical. How-
ever, arguments with non-mathematical claims would ipso facto not
CQ3. Is there some other case C3 that is also similar to C1 , but
be contributions to mathematics, but rather mathematical contribu-
in which A is false (true)? [42, 315]
tions to whatever discourse the claim was drawn from. What of the
This is a C-scheme because it is topic-neutral and not necessarily de- other components of the Toulmin layout? The susceptibility of math-
ductive. Whether or not this scheme is deductively valid turns on the ematical argument to what Lakatos describes as ‘heuristic falsifiers’
interpretation of the warrant, that is the similarity premise. If ‘sim- would suggest the admissibility of non-mathematical rebuttals [26,
ilar’ is defined narrowly enough, providing an equivalence between 36]. (If a heuristic falsifier succeeds, the inferential structure is unaf-
ostensibly unrelated mathematical structures, the premise would be fected, since it is still formally valid, but the argumentational struc-
categorical, and the scheme valid. This can be a source of formidable ture would be forced to follow a different path, bypassing the ‘falsi-
insight. The graph theorist Bill Tutte gives an impressive example fied’ content.) And even ostensibly mathematical warrants may have
in describing how he and three colleagues came to falsify Lusin’s non-mathematical backing, as the next section demonstrates.
Conjecture, that no square can be dissected into smaller squares,
all of different sizes: ‘Eventually we found that a squared rectangle Option 3: No Steps Exclusively Mathematical
was equivalent to an electrical network of unit resistances. . . . We
now understood that the basic theory of squared rectangles was that The distinction between Option 2 and Option 3 turns on whether
of Kirchoff’s Laws of electrical networks. That was something we all the instantiations of mathematical schemes in the argumenta-
could look up in textbooks’ [41, 3 ff.]. The similarity premiss is the tional structure are reducible to instantiations of non-mathematical
equivalence that Tutte and his colleagues found, which could be for- schemes, or more precisely, whether all instantiations of B-schemes
mally demonstrated. Hence the base premisses, which they looked are decomposable into sequences or combinations of instantiations
up in textbooks, were known to have true analogues in the theory of of A- and C-schemes. Advocates of Option 2 hold that room must
squared rectangles. This suggests that this specific case of analogy be left for the irreducibly mathematical, even in the argumentational
may also instantiate some B-scheme which is a subscheme of the structure; proponents of Option 3 disagree.
general C-scheme for analogy above. One such subscheme is dis- This dispute may be difficult to resolve. On the one hand, there
cussed in [34, 49 f.], but a better fit may be found in the account of are elementary topic-neutral A- and C-schemes in mathematics, and
analogy in [10], which may be construed as the articulation of several many instantiations of more complex B-schemes can be reduced to
such subschemes. instantiations of such schemes in an obvious enough if tedious fash-
But even if the similarity premise is defeasible, the scheme char- ion. Such, after all, is one of the goals of proof. On the other hand,
acterizes a versatile pattern-spotting procedure which can be an in- there are many B-schemes of formidable complexity, for example
valuable source of mathematical hypotheses. (This is not to prejudge those invoking widely used but hard to prove results. Even if B-
the question whether defeasible analogies are only useful as heuris- schemes of this character can be understood as ultimately depending
tics.) A familiar example is the extension of the number concept, on elementary, topic-neutral A- or C-schemes, such schemes would
seem so remote from the use to which the B-scheme was put, espe- should be admitted to the argumentational structure. Two distinct ar-
cially in informal contexts, as to be of no practical relevance. But no- eas emerge for further exploration: firstly, the investigation of fine-
tice that this ostensible counterexample to Option 3 makes a crucial tuned, specifically mathematical B-schemes; and secondly, the appli-
concession: if the arguer is merely using the result, and not reestab- cation to mathematics of topic-neutral C-schemes.
lishing it on the fly, then the backing for his argument is not wholly
mathematical. Rather he is ultimately relying, quite properly, on an
argument from expert opinion. If the argument is challenged, the ar- REFERENCES
guer will typically make the backing more explicit to show how the
contentious scheme is supported, thereby answering one of its critical [1] A. Aberdein, ‘Managing informal mathematical knowledge: Tech-
questions. This may take the form of restating the argument in more niques from informal logic’, in MKM 2006, eds., J. M. Borwein and
W. M. Farmer, number 4108 in LNAI, pp. 208–221, Berlin, (2006).
elementary steps, thereby bringing it closer to topic-neutral schemes,
Springer-Verlag.
or the arguer may be forced to acknowledge that he is using a result [2] Andrew Aberdein, ‘Observations on sick mathematics’, in Philosoph-
which he is unable to prove, at least on demand, but has on good au- ical Perspectives on Mathematical Practice, eds., Bart Van Kerkhove,
thority, at which point he has clearly resorted to a non-mathematical Jean Paul Van Bendegem, and Jonas De Vuyst, 269–300, College Pub-
scheme. lications, London, (2010).
[3] Andrew Aberdein, ‘Rationale of the mathematical joke’, in Proceed-
More direct motivation for Option 3 may be found in the widely ings of AISB 2010 Symposium on Mathematical Practice and Cogni-
held thesis that ‘there are certain basic forms of thought and argu- tion, eds., Alison Pease, Markus Guhe, and Alan Smaill, 1–6, AISB,
ment which are prior to the development of formal Mathematics’ Leicester, (2010).
[36, 237]. Such intuitions have taken a variety of forms. For example, [4] Jesse Alama and Reinhard Kahle, ‘Checking proofs’. Unpublished,
2012.
Jody Azzouni once developed (but subsequently repudiated) a view
[5] Jesús Alcolea Banegas, ‘L’argumentació en matemàtiques’,
of informal mathematics as a subdoxastic process analogous to that in XIIè Congrés Valencià de Filosofia, ed., E. Casaban i
governing grammar, from which he infers that ‘all reasoning is topic- Moya, 135–147, Valencià, (1998). Translation online at
neutral in nature’ [9, 18 f.]. Keith Devlin reaches a similar conclu- http://my.fit.edu/%7Eaberdein/Alcolea.pdf.
sion from the grounds that mathematical ‘thought processes are com- [6] Aristotle, ‘Posterior analytics. Translated by G. R. G. Mure’, in Intro-
duction to Aristotle, ed., Richard McKeon, 9–109, Random House, New
prised of brain activation patterns that are associated with real world York, NY, (1947).
stimuli’ [13, 378]. Penelope Maddy proposes basing mathematics on [7] Aristotle, ‘On sophistical refutations. Translated by W. A. Pickard-
‘a characterization of classical logic as grounded in a rudimentary Cambridge’, in Fallacies: Classical and Contemporary Readings, eds.,
logic that’s both true of the world and embedded in our most primi- Hans V. Hansen and Robert C. Pinto, 19–38, Pennsylvania State Uni-
versity Press, University Park, PA, (1995).
tive modes of cognition’ [29, 288]. As Ian Dove concludes, ‘mathe-
[8] Jody Azzouni, ‘The derivation-indicator view of mathematical prac-
matical reasoning is already in accord with principles and techniques tice’, Philosophia Mathematica, 12(2), 81–105, (2004).
from informal logic—even if this is unnoticed by the practitioners’ [9] Jody Azzouni, ‘Why do informal proofs conform to formal norms?’,
[14, 150]. Foundations of Science, 14(1–2), 9–26, (2009).
We have seen that all four options have defenders amongst both [10] Paul Bartha, By Parallel Reasoning: The Construction and Evalua-
tion of Analogical Arguments, Oxford University Press, New York, NY,
mathematicians and philosophers. However, Option 0 relies on ei- 2010.
ther an untenable idealization of mathematical practice, or an arbi- [11] Nicolas Bourbaki, Elements of Mathematics: Theory of Sets, Springer,
trary restriction of ‘mathematics’ to exclude much of that practice. Berlin, 1968.
And Option 1 is hard to reconcile with methodological innovation. [12] Mic Detlefsen, ‘Purity as an ideal of proof’, in The Philosophy of Math-
ematical Practice, ed., Paolo Mancosu, 179–197, Oxford University
That leaves Option 2 and Option 3, both of which leave room for
Press, Oxford, (2008).
informal reasoning in mathematical practice. Resolving the debate [13] Keith Devlin, ‘A mathematician reflects on the useful and reliable illu-
between these positions turns on whether all inferences of informal sion of reality in mathematics’, Erkenntnis, 68(3), 359–379, (2008).
mathematics may be reduced to combinations of topic-neutral infer- [14] Ian J. Dove, ‘Towards a theory of mathematical argument’, Foundations
ences. A final answer to this question is beyond the scope of this of Science, 14(1–2), 137–152, (2009).
[15] Richard L. Epstein, ‘Mathematics as the art of abstraction’. Unpub-
paper, but I would suggest that the onus is on proponents of Option 2 lished, 2012.
to provide examples of informal mathematical inferences for which [16] R. J. Hankinson, ‘Aristotle on kind-crossing’, in Philosophy and the
no such reduction is possible. Sciences in Antiquity, ed., R.W. Sharples, 23–54, Ashgate, Aldershot,
(2005).
[17] G. H. Hardy, ‘Mathematical proof’, Mind, 38, 11–25, (1928).
4 Conclusion [18] T. L. Heath, Mathematics in Aristotle, Clarendon, Oxford, 1949.
[19] Reuben Hersh, ‘To establish new mathematics, we use our mental mod-
This paper has defended an account of mathematical reasoning as els and build on established mathematics’, in From an heuristic point
of view: In honor of Carlo Cellucci, Forthcoming, (2012).
comprised of two parallel structures. The argumentational structure [20] David Hitchcock, ‘Toulmin’s warrants’, in Anyone Who Has a View:
is composed of arguments by means of which mathematicians seek Theoretical Contributions to the Study of Argumentation, eds., F. H.
to persuade each other of their results. The inferential structure is van Eemeren, J. Blair, C. Willard, and A. F. Snoeck-Henkemans, 69–
composed of derivations which offer a formal counterpart to these 82, Kluwer, Dordrecht, (2003).
arguments. The precise relationship between the two structures may [21] Wilfrid Hodges, ‘An editor recalls some hopeless papers’, Bulletin of
Symbolic Logic, 4(1), 1–16, (1998).
be understood in terms of the range of argumentation schemes which [22] Bruce J. Hunt, ‘Rigorous discipline: Oliver Heaviside versus the math-
may be instantiated by steps of the argumentational structure. Just ematicians’, in The Literary Structure of Scientific Argument, ed., Peter
as different views about the foundations of mathematics may be Dear, University of Pennsylvania Press, Philadelphia, PA, (1991).
characterized in terms of the admissibility of steps in the inferen- [23] Matthew Inglis, Juan Pablo Mejı́a-Ramos, and Adrian Simpson, ‘Mod-
elling mathematical argumentation: The importance of qualification’,
tial structure, different views about mathematical practice may be Educational Studies in Mathematics, 66(1), 3–21, (2007).
characterized in terms of the admissibility of steps in the argumenta- [24] Erik C. W. Krabbe, ‘Strategic maneuvering in mathematical proofs’,
tional structure. I have made the case that a wide range of schemes Argumentation, 22(3), 453–468, (2008).
[25] Imre Lakatos, ‘Cauchy and the continuum: The significance of non-
standard analysis for the history and philosophy of mathematics’, in
Philosophical Papers, volume 2, 43–60, Cambridge University Press,
Cambridge, (1978).
[26] Imre Lakatos, ‘A renaissance of empiricism in the recent philosophy of
mathematics’, in Philosophical Papers, volume 2, 24–42, Cambridge
University Press, Cambridge, (1978).
[27] Gregory Lavers, ‘Carnap, formalism, and informal rigour’, Philosophia
Mathematica, 16(1), 4–24, (2008).
[28] Donald MacKenzie, Mechanizing Proof: Computing, Risk, and Trust,
MIT Press, Cambridge, MA, 2001.
[29] Penelope Maddy, Second Philosophy: A Naturalistic Method, Oxford
University Press, Oxford, 2007.
[30] Henry Mendell, ‘Bryson’s squaring of the circle’. http:
//www.calstatela.edu/faculty/hmendel/Ancient%
20Mathematics/Philosophical%20Texts/Bryson/
Bryson.html, n. d.
[31] Zbigniew Michalewicz and David B. Fogel, How to Solve It: Modern
Heuristics, Springer, Berlin, 2004.
[32] David Miller, ‘Do we reason when we think we reason, or do we
think?’, Learning for Democracy, 1(3), 57–71, (2005).
[33] David Miller, Out of Error: Further Essays on Critical Rationalism,
Ashgate, Aldershot, 2006.
[34] Alison Pease and Andrew Aberdein, ‘Five theories of reasoning: Inter-
connections and applications to mathematics’, Logic and Logical Phi-
losophy, 20(1-2), 7–57, (2011).
[35] George Pólya, Mathematics and Plausible Reasoning, Two Volumes,
Princeton University Press, Princeton, N.J., 1954.
[36] Abraham Robinson, ‘Formalism 64’, in Proceedings of the Interna-
tional Congress for Logic, Methodology and Philosophy of Science,
Jerusalem, ed., Y. Bar-Hillel, 228–246, North-Holland, Amsterdam,
(1964).
[37] Bertrand Russell, ‘Mathematics and the metaphysicians’, in Mysticism
and Logic, 75–95, Unwin, London, (1986 [1901]).
[38] Jacqueline A. Stedall, A Discourse Concerning Algebra: English Alge-
bra to 1685, Oxford University Press, Oxford, 2002.
[39] James Joseph Sylvester, ‘The study that knows nothing of observation’,
in The World of Mathematics, ed., James R. Newman, volume 3, 1758–
1766, Simon & Schuster, New York, NY, (1956 [1869]).
[40] Stephen Toulmin, The Uses of Argument, Cambridge University Press,
Cambridge, 1958.
[41] W. T. Tutte, Graph Theory As I Have Known It, Oxford University
Press, Oxford, 1998.
[42] Douglas N. Walton, Chris Reed, and Fabrizio Macagno, Argumentation
Schemes, Cambridge University Press, Cambridge, 2008.
Formal Representation and Proof for Cooperative Games
Manfred Kerber and Christoph Lange and Colin Rowat1
Abstract. In this contribution we present some work we have been Errors and confusion are undesirable for purely intellectual rea-
doing in representing and proving theorems from the area of eco- sons. Further, when the results claimed may come to inform public
nomics, and mainly we present work we will do in a project in which policy, as can happen with applications of economic theory to the
we will apply mechanised theorem proving tools to a class of eco- financial world, additional concerns arise and the consequences can
nomic problems for which very few general tools currently exist. For be severe. For both of these reasons it is desirable to make use of
mechanised theorem proving, the research introduces the field to a the recent progress both in mechanised theorem proving and in for-
new application domain with a large user base; more specifically, mally supporting human researchers. Mechanised theorem proving
the researchers are collaborating with developers working on state- systems have reached a level which allows their application to previ-
of-the-art theorem provers. For economics, the research will provide ously intractable areas; proof development environments are success-
tools for handling a hard class of problems; more generally, as the fully used in areas as diverse as hardware verification [12], software
first application of mechanised theorem proving to centrally involve verification (in particular in safety relevant areas [27]), mathemati-
economic theorists, it aims to properly introduce mechanised theo- cal proof development (e.g., the advanced research mathematics in
rem proving techniques to the discipline. Hales’ Flyspeck project [11]), and educational systems [23]. All se-
curity sensitive software must satisfy high standards of formal veri-
fication (Evaluation Assurance Level 7, the highest standard [6]) to
1 Introduction be approved by national agencies or accredited evaluation facilities.
In addition to providing valuable services to new application areas,
Finding stable sets [in cooperative games] involves a new tour these developments have also led to insights into the strengths and
de force of mathematical reasoning for each game or class of weaknesses of the systems themselves.
games that is considered. Other than a small number of ele- In addition to reducing the possibility of error or confusion, formal
mentary truisms . . . there is no theory, no tools, certainly no methods also enable the reuse of proof tactics and offer the eventual
algorithms. R. Aumann (Economics Nobel laureate of 2005), promise of making the process of theory development and testing
1987 [1]. faster and less costly.
206325156
85882012
19"69094726588! 72
926915
7963322826024"66
588!094923966249
26231593
932263439328277693173!922634 042393197d312
963601119492679
5654
96396
3267623492679
!31949054
77!739
%1949159996 63195312
963575422%1754
9630572739
5325
7&28!
53142'93732
53956
31499853267588
9746 56
%522739
17+2(58,4926326237735375742253
024"5449
236319(47342'93%197982756
319182721! 2G3
*83121319490949779.9632
963709271949
0116
94897319
15996589
5899822885245326011 262
96372739
930996I56
2556
2556
2G3168!
92493196394693028
4258!159996
27789325199) 2
963701173543531495
5496
949
6319820928820
3192966353261570
969
319
5319
53582
63!575
31536
94636342
9893394732
963!2
963703165
53947566205435396
5319
5358
77726703199437) 31495
56
319272671243624
582
9637157497839
65495
8!55858956
84924
2
5319
5358424977*720947 e fDAg?@?hA?ij?BBk<Dl
75
372778!+319(47388!
2
9639
52632120579
42749795414289
0577289
2
89390315879735437
95
m9309963193
953011%522739
3194289
I
56
319
96
793,%195670943220947-.9732631967+!9758 3
9192739
3153315
9967289
2G3
3194909495d
312126
32670115835393569
429
, 2
96372947d31495
7n95392479
9512
963524
%19/6&28!
53142'9370949576242
319&28!
531 63201931943
568!269469
5269395
8926'934924
497954142'9373298249019319431975
9724322885245326 42282467356963192
9637712069820I57269469
28
999396569
53265879336%522739
560/1.97 319696326256902693$50315695
89556
031
32626178254353260572963256!26956
5435637 31926'934956
55031319422%17754531947'939539
094957"9
322882031975
9
98697572094715
79323%19 2475326018972
92
9637715731279712069820799
5331533194289
057279
6569
5326582639349783765 73451324054
23194749.49
24963944935326%962
9637
94!
94963
!65
325497954126393&543563773
9637 988632
249315626953924!24673569095392479
7$557
5492
339
3242631926'9349319!3473332942589 23124
656
8326'934956
5726946695
897
56
25654245397356
54
849712073194224326295153924!
%194915999631499/6&28!
53142'93732
5395887289
9(69+319
019982,032945
5879.9692588319231942637qr
584539!&4 28!5$5 56
65"53277756
267
940193194 5426
%196994!3456732642
526332.088+793319
31943192497549522
7772652331942'9356
5XTYTZO[MG 12739
!/1598 79779269188755#1I3I
#987962457
54!23194289
56
2
653953
b9826632\%17263b35"97294573196902356
319869 94963735972319
777268246735693799
9
8"98!31539
620423539782"079523b6383693
993752632\%17
429772636976
9(6398!
F12031530956122795263`6\56
5869_2631421` 5
897028
85!542
696342899548!2657565
326
947356
71315331949783606
887979512632\575236(6398! 63194289
56
315326937028
58729
7779
9548!26
56!3
97%52I33
56
3196
77726
13346324227345399786588!31926
'9349
139
7779
56
378
3798249
209945756
979966(49731949057833899
969231799331532
c*883
92637
9619495394499432317
539
963752326937
345825394523319(4735G
6397
01234567 89
99
9
89
9
!"89
#$%
99
#
9
9
&
'9
(
)9
(
!*
9
(
&
99
@
&(
;=99
@
&(9&
(
&
99
*
9
9
&
:
(
+
9
, 99
@
&(
9(
9
@
9;L9
9
(@
:9
;
9K
- ./012354
:
99
9
<
(
5
9
96(
#9
&
9
9
9
;((
99
7
(
9
8
9
9
:";*
(
9
899
&
* I0)9
@
&(
&:L
&
C"
&
9
89
(
;
:
;
9(9(9(9
*
&
9
:
; I9M
N
O
9
(
9
@
9
P:89
QC" ;
8
(
9&
*
89
<
9
IR>&9
C
<
(
9
9
9
=9
9
9
(
E
9
)
999
&(
9
9
9 9
9
9
SL
89
$
(
(
9
9
&
9
&9
(99
@
9
)
(
*
$"
:
* 9(9
: T
U&C#%;
;>
()?8
:99
&9
&
@
;
@
&89
9
<
* 899
<K&
&
:
*
*
99
9
9
(@
&;99(
99
VWX
89
9
<
((
9
(
9
9
AB99
*
(9
(9
9
<
:9
(
9
#$99
9
9
IH89Y
9
9@
C
9
9
9
B
9
(
:T
CA#;
9@
(
BD
;E
+
*
,
9
C
9
9
I95
E
&
Y
(9Z
9
L[O
K
?
)&
?&
99&L9
O9
?9
[
9
6
9
L :89
QCA#;
(@
*
99
9
C(
@
9
9
:
@
(9
@
&;7
@
89
9
9
*
9
C((99
& 9K(9
:9
@
(
@
9
9
@
(@(
*
;
(
C
9&
-76 FG450HI I\8999)
9
)9*
(
89
99
(
()
(
9
99
&
(
K
9
@
9[
&
99
99
@
(
:
+
9,9
@
]
:T
U&*CB#;
J89
(
9
9
99
&(K
01234567 89
999
89
!
"#$%9&'$$89
#
9
(
899
9
9
9
#(
>
69
9
9
9
9
9
9
#9
(
39
(
9
#9
9
)76 *+45,-6.
9
#9
(
99
589
99
3#
89
&/
9
0(
9
(
9
(
#
#
9
1
9
9
9
#
2
#
9
589
2
99(
(
9
9
#
"
9
1
89
(
989
9
# 9
#99?9#(@6
1
9
99
999
3
#9
(
9
5
9
9
9
2#
(
89
9 972
32
3452
/
5589
6
9
21
9
&/
(9
9
(
9
2
99
89
9#
2
#
99
99
32
344455
9
32
34450(9
9
9
71
3#
9
99
9
969
9
1
59
9
9
#
9
#
1
9
(
9
(
9
#
(#
89
9
9 A BCDE5FG345H
9
(
9#
9
9(
3999
(
9532
3485589
8
#
89
9
9
1
9
1
9
32
385589
99
9
3
2
9
9#
1#9(
9
5
9
#
1
39
99
( 89
9
39
9(
99
(
6
#89
9
5I
(
#50(39#
9
1
5 29
9
I
9
9
I
9
9
(
9
32
38455:9
9
J9
6
0(
9
(
6
3
#
5I9
399
9
9
(
9
9
9
5
9
#;0
# K
(
##
<99
9
6
79
(
#63
$$$%
53&
9
994=(0(9
5
(
3$/
589
9
L
9
99
#
9
1
9
9
9 2
(
99
99
M
89
9
9
#"
9
1
#
(
9
N
9
:9
9
2
1
99
99
9
$O
!/
0
5
5 1 6
3
1 2
4 6 4 0
2789
7 2789
777 2789
0 0
5 1 2
3
1 6
4 6 4 5
2789
77 2789
7 2789
7
6
77!
"#$2789
%%7
77&&'89
%('89
%)7
77&&*'89
%%%('89
)
)%
!
'89
+,!
&7-.&./,7!&!
70.&./,7$
.&6.9
!77&7-&
,7!
&98!3&7,!7.!
127+&
3&9.8
77&&*!&*7
.8&
!78
!7&77-.3.
7$$+.3.8
-3!,77 77!
778&77&&
&98!3I9
!
>#.
&.45&969! &
!77*.
3
3
*+78#9 -&>K$4.&7!&-
7&! !90
-
&*&7&*&
78!3.& !
&98!&9 !,77
&.
>K$
::;<
! !7&&
=27&7- &
&! K$0&6.9
-&9 !7.&.$?!
,
'.&6.9
3&737,7&4
4&3&9+78#>
&
7&*!,77
&.+7 !
>7+>L-&
:;?!
9-@"77. .3.7. !9-
&*&7 & "#$C.&7
!*9
!
7.7&9$"$
!*&
.7*2A,
&8$
B97C D7!+78EF
:GH4I97&81&!,77
&.93*&
.3.4 X YZ[;\]^
D983J!+78K7
0&.
7
&9.&7
73&*,3$?!
7.9
,78&87 &&!
&7+.&
.7879
0
>$0&6.9
-3&83&&!
&7$4*
&83 78+978
.&.,!7.!,&9-/&,&&
&&!
&7!-
&&
993-3&& *77
,7!!'+978!.&6.9
&8
.&.+90
.&.'
8"8+!777.&6.9
7
+&
78
&&*7 &8
.&.7
&9.78.&7&
,9-0.&6.9
*&
+7!,&7$?!77& ,!7.!&,,.&.&-'7
7.9
,3$C70
78
! !&
3
"8-&+&7
&*8
!
L+"" .9&&*!-&,
9$>09$K+7.7&7$",7.9
*9.7&
!
>9$
&&*08
.&.$
"$0&6.9
,!7.! !777
&-$?!777.&0
6.9
,.!878!3,!
7.7
7 ! !
78&7 &&
7 !
>>&.&
>K.$?!78
7!.&6.9
+7.!
&-&3
0
X: _[HZ̀^
I97
& &
& ! !
MN%OPO&7 Q7R+7 ! 5&!.&.9!&
&
33&-6.&87 &
7.7
&!9.!
&8
!&
STUVWW&7Q7
9.9
377
&7
99
78 !70
R$?!I97&7!&
7&,!!
!.!&7.&*7 .97&$?!/3.&. 7 !.&6.9
+a%bcd%WW+77*
>>.-&+ !9-
&*77..3.7.&6.0 !&
+3&**D7!+!
&-A9!&
+7! !
9
&-@"7!
>#$ *. ! !"F>>2eJ,!7!f!
!7 &!7/
#$D9-0.&6.9
&,
&&*$D9-0.&6.9
+&
&-
0 &*19.!7.&+,!7.!,
!77
7&-!7!777&&*
7&+,!7.!3-
&
&&*
*&
+9.!! !,77.&.8
01234567839
73
623
3656
8
3
9353$35
7832
2353536456332
22$3
-
43
88
3
3
9
88456783965232
83932
2
6365343,!2.#623545643553836
4!" 83
456$
36
233+4
$67935
#623593426563$35
67%3
$6&3
6993 83,?.
'(456653)
0*368
435246
35083566$3+288,468- FGW XHIOJNLPYLZ4[T\LQRLJLP4NLSMIJMLTNU
6.8
&34338
66
6658
3
63/5 5634
3$3864
65
356
35
73863+9483656-
230653,
3596.468623338
/883&
23 353+9483456435
363+9483
5346366-
4435835
3$3553223653,051)!49. 353+9483659
35
1233686
-26892
66865
5
$
6$- 56345
3
2363+6
3
8667%3,2
2
3538848
3+48655683#35262335908
&3 9
2733+9483656353+948366%353.12335
-
456
32533538) 887393965369483+
6344353
673653
569
94835832
225
3
23
6V65
3
699323863+9483)]^_`abcade`^fgdhgbaij]haek
34563
23
6)#2346
2353234
$6233533 l_mgnoo
56
3
7323338
2$5
662
)]
8
3243256223453$
64
$6
34
$68
&3
3 ^_`abcade`^fgdhgbaij]hael_mgnoofd̀g]^depo_de`_idaicade`
64686,681)7 49. q
&3
3
!7333238j]er_sndtd^`]e`cade`^fgdhg
3858
&33
36542
323
383
662353
3*3 od_aeg̀_hdihnjb_i_eh_]hdiho_u]et]h_eì]ocade`
33
62622353/
5
2$
3$35$353+8363 835
!A23$5
6j]erianpgor_sndtd^`]e`cade`^fgdhgod_
39,#6961)!149. ianpgoraeg̀_hdihnjb_i_eh_]hdiho_u]et]h_eì]ocade`C693-
:;<66
=>
68
&359735
6468612&=).,68
934563
536565
2886448
3
,
?)(749.
2336!A.
#623563483+3
6
$
53
66238
3
2
28866
3
338456435
3)
53
6932
1235699376$3!
56
3359
6862
2
23 9&33368&646
73
6238365235
26238
3
383
2562623
6)33
,456.2336 25
423538
3
2239735646
62383655
2
46
468612365
046864435'(5235
93
6238
362562623
9
884563
23
6
9465653+453
3+9483
6- *386336348
3$38649353865346
353+9483,2363406$3+4686
45
858
9465- 66353+94833
6(3632
3$386493
.3886533
456653
3*2
83368
3- 2
223634ode_85
3
885235228
73232352
538886
35
85
2323564
2634844565
6233646
@
23 FG; vLwMIJxLJNyIJU
A3
612336
6993!583236%353
538-
3$634
623
69
654223652
2
23&3 z363453
33
73
6886
6$3
6
47623545
4
$5
64566394253
'23 12353353'
3645
4
A6
695&-
9386
9
3
3+48653
$
3+9483
6735$
6 88
88
233643
65
65634
363+
,339
8
343
38
223569931)!B49.3 3
33
2363+623545
46368863
23
69933+48
8
5332345678396944
733323 6$3
6
2365
2393V65
3
253
359
686623A3
6
5422365) !3332365
033473
3
$3545
856-
123A3
62353
26658323
235336935
8 3+)2
65
233
236886
66993388
456435
325353A
53
6456$323393
6456435- 8356
23
6,23
6
35
73
3
6(!.
3623542,C
367$
68
/536588542. C69362336
&3
225335336048
,D631)749. 8
3
253
'2
2
93862345662355335
1232
5
699376$3'E&
3+4865)2345
4
6456435
36886
3
2634269-
26
2
35
6634,2
2
983683+- 93'E
2
28&76230836505
268
3,2
-
48
2363466235. 6235&3
2.
'E32
28&3
768
373
04
3-
3862
2
6&34688765
$38
253
'!
6C
9
858
253
!6345
453356025983
2
26
25336945
$38
3
83
8326993 46
)25983
688456435646
7
23
88723932653+4865
866456%3
$3
8
63+2393
835{6
695&53863
63+-
34
3235699373
46
$3853
3
63+- 4
934265)
6993'(,2676$3
3
6 '.3
48653
7623545
4)2
973
3623538
$3675
33A6
695&3
63+4
2393426566
6
62353
69
| }PII8U
FG3 HIJKLMNOPLQRLJLP4NLSMIJMLTNU 136369936353
4566V6533353764566
563453
3$38643
65
356
35
73456435
36&36- 536385
6623536355
6
34
236%353)23
9
884563V65
3634564- 48
$335376
3
2
2456435
33535383$
35,2
253
6673
9465.
6$353
3586)
6234566
012 3455678498
7 `#T''.)"+$-+
&###+#-_"
!" ''#&#+$&+$
#$%#&###' ''()"*!!" `#.)+"##-#A
+&,-$' #&'#+$/'$#T''
''.("/&#+&01!230 ,4 +#_## .)"#+4
"&+&56!2789 !2521072:; 1<!=>>3?!0 '/$#'##'j1?566tJ/#
@ #-$"A&6!27B05>>!2C3D?1=CD5 ##&A+'&##Z$#
01!23E'01!23FG1289 !2@H4 #7u!>3>tJH-X`#
#'#&'#*!!!" ''#&''+####
#/# ''.I"/+ Y#'#.)
#4#J/ '.)4&-+
&##'$# A#+' #/+#&'*.)
%H/A#''+#&J# #&#J".)#
&''# +'_#'+#&X#Y
'#+' #Ti'&##-+/#
'&##
01K LM
N86ON4
P
Q9N8R45R
48
7
,%##&' 2^6
rvn&+'&#$%###o
&###' $/#4 `AZ&##' w"#
S/''../....-/4 #Z ##w"''w$$ ##
_'+&#"_#A&#+'T
#&/#4 #/'+od/ki(I'"
#+&#'/&###''T
&'U'/.V#- 2^x`#%'i"d/ki(W'"
&A/.W&/#X&#Y 2^]y/'+rf#A/kiIl'"
'##+&#%#
&'Z#$& 2^`#'+#/+#'#_n
z#'&#i
01[ \N9PO77568]4
9M2^ U&#Zw"i&##
Z''Z$/_A&"
_#.)##&#'#&## c#&#$%#Z'$'
+`_T%'+/&#+& ###/+#$+$ w
&$+$"`#''%#'/
$+#.a4''# '##Z$/+_
&#%{&&o d/ki)(
&#'XH'Y/&#''#'"# '"
$+#H'/bc U'#
d"/`#'e/d/f#Abg"4 2^|__&%'i#+'#'
##A/&d $#`#/#T&#
#i##'#/#
bg"##h&& #$_%'/_#A'#'$
##.)Ai#T$#''## '//#####+'#
&&##'5j37?`#''## /+&###d/ki)V'"
+$/klm'" 2^}drA'+`#Ari"d/
2^9_n'+#/& kilm'"
T&###&&#'+
''oH'/Wi(V'" .) T"%'#/&##
2^p`#e&##o`#'e/Wi(W'" T$'###''&#&/&##
2^qU'#AT#'#&&## %#XY{/A###&
T`#''#&''+# 'A/@ ~!66+$_###
###`#'+Z# #A+#%'/#&$/44
##'+'&H'/Wi).'" ##''.)'+
2^M_##'+#XYX#Y# .)#"/#.)`##%
###rbcU'#/Wi)V'" #&###$#
&#ZiA&+'4
2^
_#A#$#+'U&#&##
#&#'g#+ # ##"X%'Y&##
'/#&####"`# ##
##X4&Y/#+% &#$+$"`#%&
s,$#'#####
#'+/#$++'
&&##'+"#% .)-"i
$"/'## T#X#YX#Y/#
&###H#$'A#& #%'#_T#+'#
&'+AT"/$&+ ##&$/&#&#&/%4
$Td/ki.)'" ##.)A"
0 12345
67888$78878788
8778.88#
!887!$$!8
"8
6789
8887888 8
77Y9
Z$888%#788
7788886788
88!888
"
878
8!!8"8
78
8#7!$8%
!8#!$88#&8 788778!888#78878
!77!8!8
88$888 888$88!88%!888*88)
7877!!88#7878'78888((7 <8>$878(??G8$Y9
Z+&8878"
8)88
8!!8%!8
6788 878$
8"78$88
788778"
88(
87788
8"
8*8
78$$788
8!8"
8+67878
8888%!," 88$7787$888Y9DZ
*(
8878+ m78878 8$78#87888#8
-
888
8!8878
8$7878$
8678878$
$7!!8#8788" 78!$85W>!8
7888
8$8#$8!8!8.8*$ 7877'$8%
!8888!!8!778.8"
8%
!8#//98+0!!877$$ *
8/+#8!*
81(
+
*(1+0
7
88788*(
+# 88878!8
*
8(
/9+677!"
$8*(
7+*788" #78.878
88
78888,8
8
78887
88!8888+ 8!87878788877$7
678888
8!$8#787 678n"5
78%8#788#!8888!"
88!$8
78$*(1+#
!" !8875W >78!888#
78
778!7!$*(
+6788$ !!8#8
8$8#77$88,88
8'
8$778
78
88#788
$78#78788
!8
8*8"
#8$/#(1#(
#(1#/2#(
78$
8
@M[6 oTpT2OQ_QVT2245FQOR54TQOFPFb
/9788+3$78
!
!888!78" X!888$!!7
78
#77
845!8$
8$8#8%
!$#,888!84!88
##7788
Y//Z=88788!!7
78
#77
8
877$8#8#$
#!8 !888#%
788
8
8
8
!7$8 877
8$
788
78
>8
!
)8#78878!!77777
78
"
!8888$!
8,88#!$#88%"
67889$#:'/9!
!8#!$"8888!#
8,88
"
6;53667
36<836=67$
8!$6785
7n"5
7!,8$$!8"
8%
!8)78>878
$80)>778
$ 878$!8877887887
8
88$)78.8*<8?'9? !88$
78
X888!8#
!
+ 8$#!!88%
!888788"
@A7)77#7BC*3#:'
D!
+ =88
!78$
78
88"
!
8#88
78
78
78,8
@EF67>*9$#?'1G!
+ 88!#788788%
!8!8!#,88
@E3H8#88
88C*I78#?'91!
+
!$88!
8#78
!8$
78
8$837777877#
@AJ6788=87*
8
+K7 888=88887
78
"
88!$78!8888!7888
!8 778%
!8#,88#8!!$88
888
$7*$#88$
788%7+*<8#:'
:!
+ 788%
8!8'n"5
778
,8888,!8
8778"
@E76788=778!L*67
=#:'/:!
+ 867#X>
877788,888
8
,888#
888#78%8!"
878
"!#
788
8
@M N34O5P4QORST234ST2PJTUV5TJ2PJ4 88*7788878
!!8",88+
m8888%
!8$78
877788!
5WX8878$88$$88777 78q
8"
8",q8
"
878,$787#!7!78" !#77888
8!$!
88$
78
8 #
8!7# n8",78,888!!
8#8!8#878#8!8# 8%
!8$,888!888%
!8
78$8,#!8$
7" 78078%!8!8$8!8"
8
*88#$8#Y:#(/#/1Z+ 678,8788
88$8!88!
8
m8888%
!8$7
89*<81(+
@M[@ \]
OU^T_QV5O7U4S`QOUaPFb34c5PQ2PJQ 7778!8
,88.8878!
7888078%!8$$888!8$788!$
5W
788!8
"
87#887def 8#8787$"8*8%8$
!+$"
geheijklgY9
Z#878878$
78" 8678888
88m78X8"
012340536783059051
905107053
053
147301779813949598813
93
3070539
1 238
$43376140937
304@)9
@)973%3633433
7053730(515061363
1
93471
18841054918451)5 059070
14443
86617
7019017199074:4763033
1703
967
93069807369
3#03
3
173
16301778 634610139
3461013X135376
3
5140537667
59
*53
9194340
1 409604105967751593433 1194340
1349
053
9W7640347
3387
30
9
31051
9494307673
6984034+,7
13
10594307
38969013 39594340
378
9439907451
438751
1053406
904-,705376
./7+0053-0578
4(/7+1053-1578
4( 839
0539
30631514776
9017798717
14736
/7+2053-2 578
437887105359176394719 Y1
30540
7053578
90567W3044578
398340776
05675053677053134-2 4 -1 4 -0 4 *53763
567 053761347
9053
9019863947151596396
763
34610137
83
47670363#9
834963310536705376
67
777 336
9051105999074:405376
799894
7+,787669593
73+,0-,
734:0578
8*53
631417760538900361407430537;0363#9
8307434060;536 ZZ [\]^_`abac]dbefe]gghi
7
101749
05363893+,+,5363966170403+,7
05370363#9
83<=>?634801-,3105394397
30@) *6176
98143
053701779876105
j9
9876105
476
$433A%3433941
1896406063105396
3074140179 2
1677459333
323
9
1
83
303
947
03667
4307673
634077887$+,%9
9430941571410638390*536348017
30493 677434$1063990741994517%969017986374060177
3#63443
1036
470539907419406063973105378871
9053
90198634804176
3607
3
740690305376117730
9.B399894
7+0 $2
9813515481040537104107
321017467749
7W3063499601896E736443404
0767583C984304%/7+1 $0531
188673
63%*5390 877190761
3057
47
9053
9011949494382640403
47
3710-1,9
-1,,188578
$0538131883969883807053 07039517
0364$9
40
304%5707
7
9053
9014.
1101988139
3367105947367
0536150705381307053 6131450703957
0364072
67741014813807
8307053813%*5145911
8134053*53763
99907419945 3977
1
390763307573
74776438348@A)
170514677053734053096307670363#9
834515
963
3867743
99433
181
33
3067W30514578
9053#361
304
*530794340
13451599074741
364736
905 E7364594671
3
05336
39476
71W400590.05376
3
9014909365158338943
776D95E36 1
3057
49
176
980575067344347
9053
901194963
73571963F9
70536
9053
901981904*536376310
9 6376
3
76
197
7
909515147403
78131943965
3916073#3005349
3871079807$634
98% 9836376
*51483968578
4
5703019876188
1901
35
336
9
9053
90119476
9053
901440
304.19601896 914
4351
5
9
9053
9019805750
1053
1178
9053#9
8341515
14736134
9
3188 &359399843
053V11578
905
1444171036
47
3457871988639013$3 0791
11
98%690536059 53053605374797
309493#9
837307W3
5140761988639013$3079
7
91%9514437
93
1#GH> 0636777647
30513843&39433907
903
4403
41053
<><IJKLML?KM>N?I?KH>H>INL?KLJOPPN=OJH@)@Q)99074 49
38150X403
4
363959037618
3.
96341991
944173
6101C3759053036
46R81
39
3057
7878059040
3047
9053
901478
639083320 mR#9
834.V7
38336907642
3#9
834(7614093VYDR
67
9
763573406343090177
9036198S90536059
91536 l 4396534762103
7
3847264076
3640903
304(
90567599143613473#8913
01123453653784947
4924569405789
6403
566494
5
6450
4
45564
76073053
4
1250
EFGHIJKLMNLOLHPQ
5
4
405401190
6
064
063
026494129063707 ?4223.46607.R488
368994037(0735
5537(64
6450 55564
!07557"#$%&'3
14989
537 10149/
63464989
0637576453537(
7)4
694589
64
0032024
75607650789440930245 SLTLSLHFLQ
*+985,-494
1937(5564
507
160637022(3
55 9 R47490212
069245/661,UU12
0619)4
65/9(U(47490212
06
64
509464456.7786406
064
064
063
3075/-4 9245U/
5680
540
12458
16495437(54370198094 ' 37312
0635
5537/661,UU649960/919455/
U'99UVU9:U
373
12
0635
55376940U/
011420710.4725
203
6066401946439 29 37312
0619)4
6/661,UU12
0619)4
65/9(U'99UVU9:U
37312
06
-494
36464753442189
0
16494544589035 19)4
6'993
U/
6986419807
769495607
1606370219858 5 -412
062(/661,UU12
0619)4
65/9(U/
64375 7)4
694
74'70764841249 7)4
= A/661,UU
3
0427342547/9(U12
069U374/11@63624W
'99
6949:1024507349(57/ '99/
X Y/Y0967Z["\$]^_$^"`ab$#["c$#defgZ"%%d]^b$#["c$#de$%Z$%"f
064
063
5h
0637<3909i2/5X/1937(49':/
0078285564
509432676493458
064
063
02190
V ?43470
/j3
0j/3346k.40/8
09/0/07?35
745.3+/l+049537/=2mm]no]#"p]$#d̀]$%q`]a"p"]e"`]
63
4/
440
124585564
53
09405479.+; 20 r_#̀c$#"ns"n_e#d̀]95t95=4':6/
07<0.06537
246482237(, 7 / 422
307j/R322345b$#["c$#de$%p"$f`]d]^$]n["_pdf#def
837(5 224(4+23
06375<77'=/
*+;20,+;20259.71924
5237(5053751394
: / 267r_#̀c$#"n Z["`puv`pc$#d̀] d] w_p"b$#["c$#def
160637020
7655
054
2063758359.79405737( 1937(49i4920(''/
9 / 26707/((2467l064
063
0201123
0637587
634
0702(95'90+; 203751394412070637802(936
5 <(3
+9(90
37(2b$e[d]"\"$p]d]^xy'=tX54'X6/
99 / 267070/+4054l-4-5564
8994103937(776494
52
07060569
6945907070
76865424
646447 37wp`e""nd]^f`a#["o]#"p]$#d̀]$%z`d]#q`]a"p"]e"`]r_#̀c$#"n
388494761924
5237(
4659= {"$f`]d]^|ozqr{}~`pf[``]sdfp`d]^4'56/
*<0.065,-41<5564
7485'350
16063702 9' j/ 9>42l055037(<0.06525132518
064
063
52#_nd"f
0
994
6
35749560737(5>707
20938198569064(345402 'X /
05207070/Y7l0-1503j,0
064
063
026494
0646491412425
76936375
9559484947
419435
4765 35
4962237wp`e""nd]^f`a£¤rq4'X6/
0714989
0
263648649605.50226432482237(01 'V ?/
74l0j035+670
19(90
0736501123
06376>7364>956
949
425409
/2-4
73
0241960<U -9:509(774
19193064
7476375835
9545
0554864910963
3107652 063702<0906934549::56/
70
4589347237649)4
63755
32480
454
20
0637
09.546
/ '7 ?/
74l26378643751924
2z`_p]$%`ar_#̀c$#"n
B7642-937(70593(6474
4764,C?4
07 {"$f`]d]^¥¦46'Xt'VX49::V6/
72544059635607
404064
075441247664946067445 ': ?/?/
74lA6649/484947
4070207R342-4
73
024
6474/D/ 1960<:5UX09(774063702<0906909(774B049::56/
0123 456789
6
9
6
9866
69
6
6
5 !6975976
9
"
9
#$%&'()*+,-
)'.,/0)12&&3045)067,829:8;2<<9=
01<3 8=>
?'07@'7)07AB0,46@'(+CD1'E'/$(56FE')/6(G'H*40-
'74'I7
9
J
7I7J;2<<=
01;3 =I62K6.&L)5)06753M6H'36FN5G5)6,-,)+3'?'5,6707AI==
769
999OP
O9756J
79OQ
!7R;22S=4
6"TUU=6
=
U<VW;U;<<1=
0113 =I6 6
99
=4
5"66
669
95"69
6
76T9
9O X7
R6
6
67
6 "79"96#
Y(64''H07A,6F)1'2Z*[,+.&6,0L.672Z57HY1036,6&1+8;2<<9=
01W3 \=I] 96^6/)6,63@'0)I7
9
J
7I7<_W`=
01`3 =
6a6
96
=b979
c9X R
6
5"5
69
9O
b8IP
Q#2ZK6..de8;19_<:<<28;22;9=
01f3 =g=9
OI] 96"79!59
R6
69
#M5)1'.5)-
04,M5A5h07'ij8`9""=;V1:;_<8<_VS8 =99=
01S3 \=54!769
TX ;2<<P84
> 76
#X
6
7"978;2<<9=
01V3 =8=X7
R95"
R56
76
R
#M07HekW11:
Wf28<_`29=
01_3 =8=X7
R4
95"6!
5!7l6
6""69
9
R"79!5#Y(64''H07A,6F)1'N67H67M5)1'.5)0453*6-
40')+mn8;9;12f`8<_1S9=
0W23
=o9
p6L(K636(,*LFq4'I
R
99c9
9
;22;=
Mathematical Notation and Analogy
Alan Smaill1
Abstract. The choice of mathematical symbols, such as connec- symbol Girard Troelstra
⊥
tives, while being arbitrary from a logic point of view, is nevertheless negation ∼
important for intuitive understanding, especially in new and unfamil- mult conjunction ⊗ ⋆
mult disjunction ℘ +
iar theories. The case of Linear Logic, where there are two distinctly
mult one 1 1
different proposals for the choice of connectives, shows the influence mult zero ⊥ 0
of different mathematical analogies at work. additive conjunction & ⊓
additive disjunction ⊕ ⊔
additive one ⊤ ⊤
additive zero 0 ⊥
1 Analogy via Infomorphism linear implication ⊸ ⊸
2 Case Study: Linear Logic Design is the problem of massaging a source space, a target
space and a morphism to achieve suitable quality, subject to
Girard in 1987 introduced a new logic called Linear Logic that deals constraints. The extent to which structure is actually preserved
with propositions as resources, which can be used up or created. For gives a way to compare the quality of semiotic morphisms . . .
the standard propositional connectives (and, or, implies), the new
Goguen in [6]
system has two new connectives, known as the additive and multi-
plicative versions of the connective. Girard’s notation is given in [2]. The “preservation of structure” alluded to here corresponds to the
Subsequently Troelstra’s exposition of Linear Logic [7] uses dif- possibilities for analogical transfer, such as familiar properties asso-
ferent notation for some of the symbols, keeping others, and even ciated with a given symbol, or indeed a given similar symbol. The
swapping a couple of Girard’s symbols around. Troelstra explain his possibility of such analogical transfer is of course one of the distinc-
motivation for preferring different symbols, and gives his account of tive features of analogical reasoning in general. [1].
Girard’s own motivation. Consider using the correlation between symbols (the visual sim-
The choice of propositional connectives is given in table 1. ilarity) as indicative of a systematic relationship between two sign
systems. Thus an analogy where symbols are mapped to similar sym-
1 Edinburgh University, Scotland, email: A.Smaill@ed.ac.uk bols may support analogical transfer of the appropriate relationships
more easily than would be the case if dissimilar symbols were in-
volved. This is related to Goguen’s criteria for goodness of semiotic
morphisms in [6, sec 4], if we allow a weaker notion of preservation
of constructors.
A ⊗ (B ⊕ C) is equivalent to (A ⊗ B) ⊕ (A ⊗ C)
3 Conclusion
A view on the relationship between different axiomatisations that
takes into account similarity of symbols enables us to see the math-
ematical analogies that are in play more or less easily. There is a
cognitive claim here, which would surely be hard to substantiate,
suggesting that in situations where a particular analogical transfer
would be useful, the notation that emphasises that particular anal-
ogy would result in easier understanding, or faster problem-solving.
There is an opportunity here to look at the application of Cognitive
Modelling techniques to some version of this problem.
REFERENCES
[1] D. Gentner, ‘Analogy’, in A companion to cognitive science, eds.,
W. Bechtel and G. Graham, 107–113, Oxford: Blackwell, (1998).
[2] J.-Y. Girard, ‘Linear Logic’, Theoretical Computer Science, 50, 1–102,
(1987).
[3] Joseph Goguen, ‘Semiotic morphisms, representations, and blending for
user interface design’, in Proceedings, AMAST Workshop on Algebraic
Methods in Language Processing, eds., Fausto Spoto, Giuseppi Scollo,
and Anton Nijholt, pp. 1–15. AMAST Press, (2003).
[4] Joseph Goguen, ‘Mathematical models of cognitive space and time’, in
Reasoning and Cognition: Proceedings of the Interdisciplinary Confer-
ence on Reasoning and Cognition, eds., D. Andler, Y. Ogawa, M. Okada,
and S.Watanabe, pp. 125–148, Tokyo, (2006). Keio University Press.
On-line version updated.
[5] Joseph Goguen and Rod Burstall, ‘Institutions: Abstract model theory
for specification and programming’, Journal of the Association for Com-
puting Machinery, 39(1), 95–146, (January 1992).
[6] Joseph Goguen and D. Fox Harrell, ‘Information visualization and semi-
otic morphisms’, in Multidisciplinary Approaches to Visual Representa-
tions and Interpretations, ed., Grant Malcolm. Elsevier, (2004).
[7] A. S. Troelstra, Lectures on Linear Logic, CSLI Publications, Stanford
CA, 1992.
Discovery in Mathematics as an Experiential
Practice of Privation
Sandra Visokolskis1
ABSTRACT. The purpose of this paper is to traits which are somewhat similar to that of a
clarify certain issues concerning the notion of traumatic experience, instance that we will call “leap
creative discovery in mathematics. This is done so by into the void”, concept which we will touch upon
presenting an integrative model of the creative further below.
process based on cyclical stages, which give an But this is an experience that solves the matter as
account of the sudden emergence of mathematical it brings about a solution of the previous conflict. The
results in a disruptive, rather than in a non automatic incubation as privation leads to a kind of experience
nor mechanical, manner. which must be unraveled in order to arrive to a
This leads to the characterization of the discovery solution –which is not always achieved, but here we
in mathematics as an active and experiential process. are analyzing the favorable cases -.
When such process results in a creative act of a not It is the purpose of this work to chart a path to
completely deductive origin, it is obtained due to an disengage the threads of these cognitive mechanisms
instance of privation, i.e. what Aristotle had that are supposedly present throughout different
interpreted in terms of an attribute that a subject instances of the discovery process applied to the
could have whether it is yet in its possession or not. solution of a mathematical problem. This unfolds a
Instead, what happens at discovery process occurs more integrative approach focused on mathematical
through an unexpected twist, namely, that such practice as a cognitive experiential activity. In this
privation anticipates a breach in the standard way, we present a model of the creative discovery
reasoning, thus allowing room for creativity. process, based on recyclable stages, alternative to the
Therefore, in cases of not fully deductive derivation, one offered in 1926 by Graham Wallas [32], taking
discovery is dialectic of privation and creation. into account its criticisms, in search of a disruptive
perspective, explaining phenomena such as
incubation, flashes of insight, and other involved not
1 INTRODUCTION entirely rational cognitive processes.