[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/800161.805163acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

The predicate elimination strategy in theorem proving

Published: 04 May 1970 Publication History

Abstract

The predicate elimination strategy is a complete resolution proof strategy for multi-predicate formulas. Essentially, the procedure focuses on one of the predicate symbols P, and attempts to deduce clauses independent of P by means of resolution in which only predicates in P are “resolved away” from parent clauses. The completeness theorem states that one can in this way, deduce an unsatisfiable P-independent set of clauses, provided the given set is unsatisfiable.
The strategy is then extended to a suitable form of semantic resolution. This leads to the following strategy: in the attempt to deduce an unsatisfiable P-independent set of clauses, apply elementary resolution to “resolve away” predicates in P only from parent clauses, one of which has all of its predicates in P positive (negative).

References

[1]
Davis, M., and Putnam, H., A computing procedure for quantification theory. JACM, 7 (1960), pp. 201-215.
[2]
Friedman, J., A new decision procedure in logic with a computer realization. Ph.D. Thesis, Harvard University, 1964.
[3]
Green, C. C., Theorem proving by resolution as a basis for question-answering systems, Machine Intelligence 4, D. Michie and B. Meltzer, Eds. (Edinburgh University Press, Edinburgh, Scotland, 1969).
[4]
Loveland, D. W., Mechanical theorem-proving by model elimination. JACM, 15 (1968), pp. 236-251.
[5]
Luckham, D., Some tree paring strategies for theorem proving, Machine Intelligence 3, D. Michie ed., Edinburgh University Press, 1968, pp. 95-112.
[6]
Morris, J. B., E-Resolution: extension of resolution to include the equality relation. Proc. Int. Joint Conf. on Artificial Intelligence, Washington, D. C., May 7-9, 1969.
[7]
Robinson, J. A., A machine oriented logic based on the resolution principle, JACM, 12 (1965), pp. 23-41.
[8]
Robinson, J. A., Automatic deduction with hyper-resolution, Int. J. Computer Math, 1 (1965), pp. 227-234.
[9]
Slagle, J. R., Automatic Theorem proving with renamable and semantic resolution, JACM, 14 (1967), pp. 687-697.

Cited By

View all
  • (2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 412710.5555/3127142.3127154(163-178)Online publication date: 31-Jul-2006
  • (2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email SystemsData and Applications Security XX10.1007/11805588_12(163-178)Online publication date: 2006
  • (1976)A Resolution-Based Proof Procedure Using Deletion-Directed SearchIEEE Transactions on Computers10.1109/TC.1976.167461225:4(323-327)Online publication date: 1-Apr-1976
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '70: Proceedings of the second annual ACM symposium on Theory of computing
May 1970
234 pages
ISBN:9781450374699
DOI:10.1145/800161
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 May 1970

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

STOC '70 Paper Acceptance Rate 27 of 70 submissions, 39%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)58
  • Downloads (Last 6 weeks)6
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 412710.5555/3127142.3127154(163-178)Online publication date: 31-Jul-2006
  • (2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email SystemsData and Applications Security XX10.1007/11805588_12(163-178)Online publication date: 2006
  • (1976)A Resolution-Based Proof Procedure Using Deletion-Directed SearchIEEE Transactions on Computers10.1109/TC.1976.167461225:4(323-327)Online publication date: 1-Apr-1976
  • (1974)Automatic Theorem Proving Based on ResolutionComputer Science and Technology and their Application10.1016/B978-0-08-017806-6.50009-2(201-266)Online publication date: 1974
  • (1973)Deletion-directed search in resolution-based proof proceduresProceedings of the 3rd international joint conference on Artificial intelligence10.5555/1624775.1624782(47-50)Online publication date: 20-Aug-1973

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media