skip to main content
10.1145/2000378.2000386acmotherconferencesArticle/Chapter ViewAbstractPublication PagestarkConference Proceedingsconference-collections
research-article

Hidden protocols

Published:12 July 2011Publication History

ABSTRACT

When agents know a protocol, this leads them to have expectations about future observations. Agents can update their knowledge by matching their actual observations with the expected ones. They eliminate states where they do not match. In this paper, we study how agents perceive protocols that are not commonly known, and propose a logic to reason about knowledge in such scenarios.

References

  1. A. Baltag. A logic for suspicious players: Epistemic actions and belief-updates in games. Bulletin of Economic Research, 54(1):1--45, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Bratman. Intention, Plans, and Practical Reason. Harvard University Press, Cambridge (MA), 1987.Google ScholarGoogle Scholar
  3. J. A. Brzozowski. Derivatives of regular expressions. Journal of the ACM, 11(4):481--494, 1964. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Clark. Using Language. Cambridge University Press, Cambridge, 1996.Google ScholarGoogle Scholar
  5. J. H. Conway. Regular Algebra and Finite Machines. Chapman and Hall, 1971.Google ScholarGoogle Scholar
  6. F. Dignum, B. Dunin-Keplicz, and R. Verbrugge. Creating collective intention through dialogue. Logic Journal of the IGPL, 9:145--158, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  7. R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Knowledge-based programs. Distributed Computing, 10(4):199--225, July 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Fagin, J. Y. Halpern, M. Y. Vardi, and Y. Moses. Reasoning about Knowledge. MIT Press, Cambridge, MA, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. P. Grice. Logic and conversation. In P. Cole and J. L. Morgan, editors, Syntax and semantics, volume 3. New York: Academic Press, 1975.Google ScholarGoogle Scholar
  10. B. Grosz and C. Sidner. Plans for discourse. In P. Cohen, J. Morgan, and M. Pollack, editors, Intentions in Communication, pages 417--444. MIT Press, Cambridge (MA), 1990.Google ScholarGoogle Scholar
  11. T. Hoshi. Epistemic Dynamics and Protocol Information. PhD thesis, Stanford University, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Kozen. Automata on guarded strings and applications. Technical report, Cornell University, Ithaca, NY, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. S. Miller and L. S. Moss. The undecidability of iterated modal relativization. Studia Logica, 79(3):373--407, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  14. E. Pacuit and S. Simon. Reasoning with protocols under imperfect information (abstract). Short paper presentation at AiML 2010, Moscow, 2010.Google ScholarGoogle Scholar
  15. R. Parikh and R. Ramanujam. A knowledge based semantics of messages. Journal of Logic, Language and Information, 12(4):453--467, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Pinker, M. Nowak, and J. Lee. The logic of indirect speech. Bulletin of Economic Research, 54(1):1--45, 2002.Google ScholarGoogle Scholar
  17. A. Rao and M. Georgeff. Modeling rational agents within a BDI-architecture. In R. Fikes and E. Sandewall, editors, Proceedings of the Second Conference on Knowledge Representation and Reasoning, pages 473--484. Morgan Kaufman, 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography. Doubleday, New York, NY, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. van Benthem, J. Gerbrandy, T. Hoshi, and E. Pacuit. Merging frameworks for interaction. Journal of Philosophical Logic, 38(5):491--526, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. van Benthem, J. van Eijck, and B. Kooi. Logics of communication and change. Information and Computation, 204(11):1620--1662, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. van Ditmarsch, W. van der Hoek, and B. Kooi. Dynamic Epistemic Logic, volume 337 of Synthese Library. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. H. van Ditmarsch, J. van Eijck, and R. Verbrugge. Common knowledge and common belief. In J. van Eijck and R. Verbrugge, editors, Discourses on Social Software, volume 5 of Texts in Games and Logic. Amsterdam University Press, Amsterdam, 2009.Google ScholarGoogle Scholar
  23. J. van Eijck. Perception and change in update logic. In J. van Eijck and R. Verbrugge, editors, Games, Actions and Social Software, Texts in Logic and Games (FOLLI subseries of LNCS). Springer Verlag, Berlin, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. van Eijck, J. Ruan, and T. Sadzik. Action emulation, 2008. Unpublished manuscript, available at homepages.cwi.nl/jve/papers/08/ae/ae.pdf.Google ScholarGoogle Scholar
  25. A. van Kooten Niekerk and S. Wijmer. Verkeerde Vriendschap: Lesbisch Leven in de Jaren 1920--1960. Sara, Amsterdam, 1985.Google ScholarGoogle Scholar
  26. R. Verbrugge and L. Mol. Learning to apply theory of mind. Journal of Logic, Language and Information, 17:489--511, 2008. Special issue on formal models for real people, edited by M. Counihan. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. Wang. Epistemic Modelling and Protocol Dynamics. PhD thesis, University of Amsterdam, 2010.Google ScholarGoogle Scholar
  28. Y. Wang. Reasoning about protocol change and knowledge. In Proceedings of the 4th Indian Conference on Logic and its Applications (ICLA 2011), LNAI 6521, pages 189--203. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hidden protocols

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            TARK XIII: Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge
            July 2011
            270 pages
            ISBN:9781450307079
            DOI:10.1145/2000378

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 July 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate61of177submissions,34%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader