A Dynamic Logic of Observation and Access
First Draft!
Tomohiro Hoshi∗
Eric Pacuit†
May 14, 2009
1
Introduction and Motivation
Reasoning about rational agents interacting over time is a central topic in many areas of
philosophy, computer science and economics. An important challenge for the logician is
to account for the many dynamic processes that govern the agents’ interaction over time.
Inference, observation and communication are all examples of such processes that are the
focus of current logics of informational update and belief revision (see, for example, van
Benthem, 1996; van Ditmarsch et al., 2007; Parikh and Ramanujam, 2003)1 . A recurring
issue in any formal model that represents agents’ informational attitudes over time is how
to account for the fact that the agents are limited in their access to the available inference
steps, possible observations and available messages. This may be because the agents are
not logically omniscient and so do not have unlimited reasoning ability. But it can also
be because the agents are following a predefined protocol that explicitly limits statements
available for observation and/or communication.
Within the broad literature on epistemic logic, there are a variety of alternative accounts
that making precise a notion of an agent’s “limited access”. An early approach of Fagin and
∗
Department of Philosophy, Stanford University,
[email protected]
Department of Philosophy, Stanford University,
[email protected]
1
Of course, one may argue that (logical) inference is the central topic of any logic. What we have in mind
here is reasoning about agents that make inferences.
†
1
Halpern (1988)2 extends standard epistemic logic with an awareness operator Aϕ intended
to mean “the agent is aware of the sentence ϕ”. Recent work building on Artemov’s Logic
of Proofs (Artemov, 2001) labels epistemic modal operators with proof terms that explicitly
keep track of the agent’s justification, or evidence, for (the truth of) a formula (see, for
example, Fitting, 2005; Artemov and Nogina, 2005). Other logics focus on explicitly modeling
inferential steps that individual agents can make while interacting with other agents and the
environment (see, for example, Eberle, 1974; Ågotnes and Alechina, 2007; van Benthem,
2008; Velazquez-Quesada, 2009). Finally, van Benthem et al. (2008) develop logics to reason
about situations where the facts that agents can observe are limited by a predefined protocol
(cf. Parikh and Ramanujam, 2003). Section 4 contains a detailed comparison between the
logical framework we develop in this article with the logical frameworks referenced above, so
we will not go into any details here.
This main technical contribution of this paper builds on recent work formally relating the
two main logical accounts of the dynamics of information in social interactive situations (van
Benthem et al., 2008). The first is epistemic temporal logic (ETL, Fagin et al., 1995; Parikh
and Ramanujam, 2003) which uses linear or branching time models with added epistemic
structure induced by the agents’ different capabilities for observing events. These models
provide a “grand stage” where histories (i.e., sequences of events) of some social situations
are constrained by a protocol. Here a protocol is intended to represent the rules or
conventions that govern many of our social interactions. Imposing such rules restricts the
legitimate sequences of possible events (eg., messages or observations). The other framework
is dynamic epistemic logic (DEL, Gerbrandy, 1999; Baltag et al., 1998; van Ditmarsch
et al., 2007) that describes social interactions in terms of epistemic event models (which
may occur inside modalities of the language). Similar to the way Kripke structures3 are
used to capture the information the agents’ have about a fixed social situation, an event
2
See also (Halpern and Rego, 2005; Halpern, 2001) for a recent discussion and references to relevant
literature on the notion of awareness in game theory.
3
We assume the reader is familiar with standard epistemic logic and the various dynamic versions mentioned above. There are a number of textbooks and survey papers that have thorough introductions to these
topics. For example, see (Fagin et al., 1995; van Ditmarsch et al., 2007; ?; ?).
2
model describes the agents’ information about which actual events are currently taking
place. The temporal evolution of the situation is then computed from some initial epistemic
model through a process of successive “product updates”. The logic that we develop in this
paper merges these two perspectives on rational interaction (cf. van Benthem et al., 2008,
Section 5).
The first example of such a logic that merges ideas from ETL and DEL can be found in
Section 4 of (van Benthem et al., 2008). This logic reexamines public announcement logic
(PAL, ??) in situations where the availability of formulas for observation is constrained by
a predefined protocol. More formally, a PAL protocol is a tree of (epistemic) formulas.
ETL models are then generated from an initial epistemic model by performing a public
announcement of formulas permitted by some fixed PAL protocol4 . In this new setting
the PAL formula hAi⊤ not only express that the current model is updated by the public
announcement of A but also that A is permitted according to the predefined PAL protocol.
Taking into account this new interpretation of the PAL language, van Benthem et al. (2008)
give a sound and complete axiomatization of the class of all ETL models generated by some
epistemic model and PAL protocol5 . However, this is only one specific example of how to
merge the ETL and DEL frameworks as suggested by the following questions:
1. A public announcement is one specific type of event model, can we axiomatize classes
of ETL models generated by other types of event models?
2. Which formal languages are best suited to describe these DEL generated ETL models?
Our primary goal in this paper is to push the style of analysis from (van Benthem et al.,
2008) forward by investigating answers to the above questions. We will also relate the logical
framework from Sections ?? & 3.1 to the different logics of knowledge and “access” mentioned
above.
4
Actually the most general situation is where there are different PAL protocols at each state. This more
general setting is not important for the discussion here and the reader can consult (van Benthem et al., 2008)
for details.
5
Note that the usual method for proving completeness via reduction axioms will not work here. In
particular, since A being true does not necessarily imply that A can be announced the PAL validity A ↔ hAi⊤
is not valid (of course, hAi⊤ → A is valid since we are working with PAL protocols.)
3
2
Our Framework
This section describes the specific logical system that we will investigate in this paper.
We assume that at each moment different pieces of information are made publicly available.
However, as opposed to public announcements where all agents have access to the information
that is made available, we assume that different agents have access to different pieces of
information. Thus we are interested in ETL models generated by protocols consisting of the
following type of event model:
A
P
A
G
e
P
f
Where A is the (finite) set of agents, P is a formula (in the language defined below) and P
is the “negation” of P (i.e., P = Q if P = ¬Q and P = ¬P otherwise). This event model
represents situations where (the truth of) P is made available but only the agents A − G
have access to this information. Of course, the event itself is public so which agents actually
have access to which pieces of information is commonly known (i.e., the agents in G know
that the agents in A − G know whether P is true). We will discuss this and other underlying
assumptions in Section 4. This section focuses on the formal details of our framework.
The Language The language includes standard epistemic and dynamic modalities plus
operators intended to describe each agents’ protocol (i.e., which formulas the agent has access
to). Fix a finite set A of agents and a (countable) set of atomic propositions At. The language
LDLOA is defined inductively:
ϕ ::= ⊤ | p | ¬ϕ | ϕ ∧ ϕ | Ki ϕ | hϕiϕ | Ai ϕ
4
b i and [ϕ], and other boolean operators are
where p ∈ At and i ∈ A. The dual operators, K
defined as usual. The epistemic fragment of LDLOA without the ‘hϕi’ and ‘Ai ’ operators is
denoted LEL . The intended meaning of the modal operators is summarized below:
• Ki ϕ is intended to mean “according to i’s current information ϕ is true” (following the
standard convention we may also say “agent i knows that ϕ”).
• hϕiψ is intended to mean “after ϕ is made publicly available, ψ is true” (we may also
say “after ϕ is announced ψ is true”, but this should not be confused with the public
announcement of ϕ from (??))
• Ai ϕ is “agent i has access to ϕ” (alternatively we may say “agent i can observe ϕ” or
“agent i has the ability to observe ϕ”).
The Semantics As noted above, we are interested in ETL models generated by protocols
of a specific type of event models: public announcements of ϕ with only some of the agents
having access to content of the announcement. A protocol describes for each agent which
formulas that agent can observe. Note that “being able to observe ϕ” is an event type which
we take to mean that in situations where ϕ is true, the agent observes that ϕ and when
ϕ is false the agents observes that ¬ϕ. This explains the closure condition placed in the
definition of protocols: Let ϕ be ϕ if ϕ is of the form ¬ψ; ¬ϕ otherwise.
Definition 2.1 (Protocols) A protocol is a fuction p : A × N → ℘(LDLOA ) such that,
for every n ∈ N, i ∈ A, and ϕ ∈ LDLOA , ϕ ∈ p(i, n) iff ϕ ∈ p(i, n). We denote the set of
protocols by P tcl. For brevity, we write pni for p(i, n) where p ∈ P tcl, i ∈ A, and n ∈ N. ⊳
So a protocol describes for each agent and each moment which formulas that agent can
access. The closure condition states that agents have access to a formula iff they have access
to its “negation”. Of course, this is only one of many different properties that may be
assumed about the protocol. For example, it may be natural to assume that if an agent has
access to both ϕ and ψ then the agent must also have access to ϕ ∧ ψ. Using the access
5
modality Ai such properties will be expressible in our language. This will be discussed in
more detail below.
The formal definition of our models can be given using the machinery developed in (van
Benthem et al., 2008, Section 3). However, in the present setting many of these definitions
can be simplified.
Definition 2.2 (Models) An epistemic model is a triple (W, ∼, V ) where W is a nonempty set, ∼: A → ℘(W × W ), and V : At → ℘(W ). By convention, when (w, v) ∈∼ (i),
we write w ∼i v. An epistemic model with a protocol is a quadruple (W, ∼, V, p),
where (W, ∼, V ) is an epistemic model and p is a protocol. Given an epistemic model
M = (W, ∼, V ) and a protocol p, we denote by (M, p) the model (W, ∼, V, p).
⊳
We are restricting attention to one type of dynamic epistemic action: “making ϕ publicly
available where only some of the agents have access to (the observation of) ϕ”. Here “having
access to ϕ” means that the agent can incorporate the observation of ϕ into the agent’s
current information. Intuitively, if an agent incorporates the observation of ϕ, the should
consider possible only states where ϕ is true. But in order to do this, the agent must have
access to ϕ (this also explains the closure condition placed on protocols in Definition 2.1).
More formally, we define what it means to “make ϕ publicly available”:
Definition 2.3 (Making ϕ publicly available) Let P = (W, ∼, V, p) be an epistemic
model with a protocol. Incorporating the observation of ψ into P is the model P ⊗ ψ =
(W ′ , ∼′ , V ′ , p′ ) where
W′
∼′i
V′
:= W
∼i
6 p(i, 0)
if ψ ∈
:=
{(w, v) ∈∼i | P, w |= ψ iff P, v |= ψ} if ψ ∈ p(i, 0)
:= V
p′ (i, n) := p(i, n + 1)
where P, w |= ψ means “ψ is true at state w in P” defined below.
6
⊳
Definition 2.4 (Truth) Let P = (W, ∼, V, p) be an epistemic model with a protocol. The
truth of a formula ϕ in LDLOA is defined inductively as follows:
P, w |= p
iff w ∈ V (p) (with p ∈ P )
P, w |= ¬ϕ
iff P, w 6|= ϕ
P, w |= ϕ ∧ ψ iff P, w |= ϕ and P, w |= ψ
P, w |= Ki ϕ
iff ∀v ∈ W : if w ∼i v then P, v |= ϕ
P, w |= hψiϕ
iff
P, w |= Ai ϕ
iff ϕ ∈ p0i
(i) P, w |= ψ and (ii) P ⊗ ψ, w |= ϕ
⊳
◮ Maybe add an example?
3
Main Results
The main technical result is a sound and complete axiomatization of the class of all epistemic
models with protocols (cf. Definition 2.2) in the language LDLOA . There are two main
categories of axiom schemes. The first are essentially reduction axioms describing the effect
epistemic event on an epistemic model:
R1
hθip ↔ θ ∧ p where p ∈ At
R2
hθi¬ϕ ↔ θ ∧ ¬hθiϕ
R3
hθi(ϕ ∧ ψ) ↔ hθiϕ ∧ hθiψ
R4
hθiKi ϕ ↔ θ ∧ (Ai θ → Ki [θ]ϕ) ∧ (¬Ai θ → Ki ([θ]ϕ ∧ [θ]ϕ))
Note that hθi⊤ ↔ θ is a consequence of R1. This means that any true formula can always be
made publicly available. Of course, it may be that none of the agents actually have access to
this information (i.e., θ is no on any of the agents protocol). Thus, unlike the framework from
(van Benthem et al., 2008, Seciton 4), hθi⊤ does not mean that θ is permitted according to
7
the protocol. The only other axiom schema requiring some discussion is R4. Following the
usual reduction axiom methodology, the right-hand side describes what agents know after θ
is made publicly available in terms of the agent’s current information. The second type of
axiom schemes highlight the assumptions we make about the protocols:
P-neg
A i ϕ ↔ Ai ϕ
Ptcl
Aj ϕ → Ki Aj ϕ
Uni
hαiAi ϕ → [β]Ai ϕ
The first axiom scheme encodes the closure condition on protocols that agents have access
to ϕ iff they have access to ϕ. The last two axiom schemes highlight the assumption that
the protocols are not only common knowledge, but also are uniform. The last assumption
means that what formulas the agent can access does not depend on the earlier observations
the agent has made. Putting everything together, we have:
Definition 3.1 (Axiomatization) The logic DLOA is the smallest set containing all instances of the following axiom schemes6 Axiom Schema
K
Ki (ϕ → ψ) → (Ki ϕ → Ki ψ)
R1
hθip ↔ θ ∧ p where p ∈ At
R2
hθi¬ϕ ↔ θ ∧ ¬hθiϕ
R3
hθi(ϕ ∧ ψ) ↔ hθiϕ ∧ hθiψ
R4
hθiKi ϕ ↔ θ ∧ (Ai θ → Ki [θ]ϕ) ∧ (¬Ai θ → Ki ([θ]ϕ ∧ [θ]ϕ))
P-neg
Ptcl
A i ϕ ↔ Ai ϕ
Aj ϕ → Ki Aj ϕ
6
For concreteness, we only include the axiom schema Ki (ϕ → ψ) → (Ki ϕ → Ki ψ), but other axiomatizations will work as well such as S5.
8
Uni
hαiAi ϕ → [β]Ai ϕ
and is closed under necessitation for Ki and [θ]. We write ⊢DLOA ϕ if ϕ ∈ DLOA.
⊳
Our goal in this section is to prove the following result
Theorem 3.2 DLOA is sound and strongly complete with respect to the class of epistemic
models with protocols.
The proof is a variant of the proof found in (van Benthem et al., 2008, Section 4) which
itself is a variant of the standard Henkin construction. We construct the canonical model
from the set of DLOA maximal consistent sets (mcs). The key observation is that each mcs
contains a description of a protocol.
◮ The details here are still a bit sketchy, but this is the right idea
Let σ be a (possibly empty) finite sequence of LDLOA -formulas. We denote the length of
σ by len(σ). Also we denote by σn and σ(n) the n-th element of σ and the initial segment of σ
of the length n respectively. When n is greater than the length of σ, they denote the empty
sequence λ. Also we write hσi and [σ] for hσ1 i . . . hσlen(σ) i and [σ0 ] . . . [σlen(σ)−1 ] respectively.
Definition 3.3 (Γ-Protocol) Given a maximally consistent set Γ, we define a Γ-protocol
pΓ so that
pΓ (i, n) =
{ϕ | Ai ϕ ∈ Γ}
if n = 0
{ϕ | ∃σ1 . . . σn : hσ1 i . . . hσn iAi ϕ ∈ Γ}
if n ≥ 1
⊳
Definition 3.4 (Base Canonical Model) Let Γ be a maximally consistent set. We define
the Γ-generated canonical model P− = (WΓ , ∼Γ , VΓ , pΓ ) by:
• WΓ = {∆ | p∆ = pΓ }
• For all ∆, ∆ ∈ WΓ , (∆, ∆′ ) ∈∼Γ (i) iff {ϕ | Ki ϕ ∈ ∆} ⊆ ∆′
9
• VΓ (p) = {∆ | p ∈ ∆}
When there is no confusion, we will omit the subscript Γ.
⊳
Given a maximlally consistent set ∆ and a LDLOA -formula ϕ, we denote by ∆ϕ the set
{θ | hϕiθ ∈ ∆}. It is straightforward to show the following.
Lemma 3.5 For every maximally consistent set ∆ and a LDLOA -formula ϕ, ∆ϕ is a maximally consistent set.
Proof. The claim follows easily from R2.
qed
Given a finite sequence σ of LDLOA -formulas, we denote (. . . (∆σ1 )σ2 ) . . . ) and (. . . (PΓ ⊗
σ1 ) ⊗ σ2 ) . . . ) ⊗ σn ) by by ∆σ and PΓ ⊗ σ respectively.
Definition 3.6 (Canonical Model after σ) Given a (possibly empty) sequence σ of LDLOA formulas and the canonical model P, we define P σ = (W σ , ∼σ , V σ , pσ ) inductively as follows:
• Pλ = P
• W σ(n) = {∆σn | ∆ in P σ(n−1) } ∪ {∆σ n | ∆ in P σ(n−1) }
σ
• For all ∆χ, ∆′ χ′ ∈ W σ(n) , ∆χ ∼i (n) ∆′ χ′ iff
σ
1. ∆ ∼i (n−1) ∆′ and χ, χ′ 6∈ pσ(n−1) (i, 0) or
2. χ = χ′ and χ, χ′ ∈ pσ(n−1) (i, 0)
• V σ(n) (p) = V σ(n−1) (p)
• pσ(n) (i, n) := pσ(n−1) (i, n + 1)
⊳
Lemma 3.7 (Truth Lemma) Let P be the canonical model. Let σ be a finite sequence of
LO-formula. For every ϕ ∈ LLO and ∆ in PΓ ,
hσiϕ ∈ ∆
iff
10
P σ , ∆σ |= ϕ.
Proof. The proof is by induction on the complexity of ϕ. The base case is clear by Definition 3.4 and 3.6. The boolean cases are straightforward.
◮ The argument for the knowledge modality case can be carried out by using the axiom R3
in a way similar to the completeness proof of TPAL in (van Benthem et al., 2008)
Here we only do the cases for hχi and Ai .
Suppose ϕ is of the form hχiψ. The right-to-left direction is clear by Definition 3.4 and
3.6. Thus assume hσihχiψ ∈ ∆. Then we have P σχ , ∆σχ |= ψ by IH. By Definition ??,
clearly P σχ and P σ ⊗ χ is isomorphic (map ∆σχ in P σχ to ∆σ in P σ ⊗ χ). Therefore
we have P σ ⊗ χ, ∆σ |= ψ. Also hσihχiψ ∈ ∆ implies hσihχi⊤ ∈ ∆ by standard modal
reasoning. From this, it follows by A1 that hσiχ ∈ ∆. This gives us P σ , ∆σ |= χ. Therefore,
P σ , ∆σ |= hχiψ, as desired.
Suppose ϕ is of the form Ai ψ. First assume that ϕ ∈ ∆Θ. By definition, we have
hθn−1 i . . . hθ0 iAi ψ ∈ ∆. Since pΓ = p∆ by construction, ψ ∈ pΓ (i, n). Thus PΓ , ∆ |= Ai ψ.
For the other direction, assume that PΓ , ∆ |= Ai ψ. By construction, this implies that
′
ψ ∈ pΓ (i, n) and thus that there is some sequence Θ′ = θ0′ . . . θn−1
such that hΘ′ iAi ψ ∈ ∆.
Repeated applications of Uni yield hΘiψ ∈ ∆.
qed
The standard argument shows, using the above Truth Lemma, that every DLOA-consistent
set of formulas is satisfiable. This proves Theorem 3.2.
Other results:
• Completeness with additional closure properties on the protocol. This is easy if the
property can be expressed using Ai .
• General method for finding a sound and complete axiomatization for various types of
(fixed) DEL protocols
4
Comparisons
Public Announcement Logic The following schemas are valid in PAL but not in DLOA:
11
1. hαihβiϕ → hhαiβiϕ
2. [p]Ki p where p ∈ At
3. hθiKi ϕ ↔ hθi⊤ ∧ Ki (hθi⊤ → hθiϕ)
1. For instance, take ϕ := Ai p. Let P = (W, ∼, V, p). P, w |= hαihβiϕ requires that
α ∈ p(i, 1) and β ∈ p(i, 2), but this does not guarantee that hαiβ ∈ p(i, 1).
2. Take a model where ¬Ki p and p 6∈ p(i, 0).
3. Let θ = ϕ := p. Take a model where p is true but p 6∈ p(i, 0). Then LHS is false but
RHS is true.
However there is an embedding from the language of PAL to LDLOA that preserves validity:
Let sub(ϕ) be the set of subformulas of ϕ.
Proposition 4.1 For every formula ϕ of PAL,
ϕ is valid in PAL iff
^
^
Ai ϕ is valid in DLOA
i∈A ψ∈sub(ϕ)
Proof. Straightforward induction.
qed
TDEL
◮ We still need to specify what exactly TDEL is, especially because we allow occurrences of
DEL operators inside DEL operators. Although it can be worked out, this may need
a lot of space to give all the details. However, below gives the main idea.
Let p be a protocol and ϕ a formula in LDLOA . Define An (ϕ, p) be the set {i ∈ A | ϕ ∈
p(i, n)}. Define an event model E(ϕ, p, n) = (E, →, pre) by
1. E = {1, 2}
12
2. → (i) =
{(1, 1), (1, 2), (2, 1), (2, 2)} if ϕ ∈ p(i, n)
{(1, 1), (2, 2)}
if ϕ 6∈ p(i, n).
3. pre(1) = ϕ, pre(2) = ¬ϕ
Definition 4.2 (Translation from Models in LO to Models in TDEL) Given an LOmodel P = (W, ∼, V, p), we define a TDEL-model t(P) by Forest(MP , pP ) where MP =
(W, ∼, V ) and pP is a state-dependent protocol on M such that, for all w ∈ W , pP (w)
consists of sequences of the form σ = σ0 . . . σn where σk is of the form (E(ϕ, p, k), e) with e
in E(ϕ, p, k) for all k (0 ≤ k ≤ n).
⊳
Definition 4.3 (Translation from LO to TDEL) Given a model P = (W, ∼, V, p) in
LO, the translation function t : N × LLO → LT DEL is defined inductively as follows:
tk (⊤) = ⊤
tk (p) = p (p ∈ At)
tk (ϕ ∧ ψ) = tk (ϕ) ∧ tk (ψ)
tk (¬ϕ) = ¬tk (ϕ)
tk (K̂ϕ) = K̂tk (ϕ)
tk (hϕiψ) = hE(ϕ, p, k)itk+1 (ψ)
tk (Ai ϕ) = hE(tk (ϕ), p, k), 1i⊤ ∨ hE(tk (ϕ), p, k), 2i⊤
⊳
Proposition 4.4 Truth-Preserving Translation Given a formula ϕ ∈ LLO ,
P, w |= ϕ
iff
t(P), w |= to (ϕ).
Proof. Straightforward induction.
qed
◮ Still need to add discussion of Awareness Logics and Justification Logics
5
Conclusion and Discussion
◮ Discussion of future work: different notions of group knowledge.
13
References
Ågotnes, T. and N. Alechina (2007). The dynamics of syntactic knowledge. Journal of Logic
and Computation 17 (1), 83–116.
Artemov, S. (2001). Explicit provability and constructive semantics. Bulletin for Symbolic
Logic 7 (1), 1–36.
Artemov, S. and E. Nogina (2005). Introducing justification into epistemic logic. Journal of
Logic and Computation 15 (6), 1059–1073.
Baltag, A., L. Moss, and S. Solecki (1998). The logic of common knowledge, public announcements and private suspicions. In I. Gilboa (Ed.), Proceedings of the 7th Conference
on Theoretical Aspects of Rationality and Knowledge (TARK 98), pp. 43 – 56.
Eberle, R. (1974). A logic of believing, knowing and inferring. Synthese 26, 356 – 382.
Fagin, R. and J. Halpern (1988). Belief, awareness and limited reasoning. Artificial Intelligence 34, 39 – 76.
Fagin, R., J. Halpern, Y. Moses, and M. Vardi (1995). Reasoning about Knowledge. Boston:
The MIT Press.
Fitting, M. (2005). The loigc of proofs, semantically. Annals of Pure and Applied Logic 132,
1 – 25.
Gerbrandy, J. (1999). Bisimulations on Planet Kripke. Ph. D. thesis, Institute for Logic,
Language and Computation (DS-1999-01).
Halpern, J. (2001). Alternative semantics for unawareness. Games and Economic Behavior 37, 321 – 339.
Halpern, J. and L. Rego (2005). Interactive unawareness revisited. In Proceedings of Theoretical Aspects of Rationality and Knowledge (TARK’05).
Parikh, R. and R. Ramanujam (2003). A knowledge based semantics of messages. Journal
of Logic, Language and Information 12, 453 – 467.
van Benthem, J. (1996). Exploring Logical Dynamics. CSLI Publications.
van Benthem, J. (2008). Merging observation and access in dynamic logic. manuscript.
van Benthem, J., J. Gerbrandy, T. Hoshi, and E. Pacuit (2008). Merging frameworks of
interaction. Journal of Philosophical Logic, Forthcoming.
van Ditmarsch, H., W. van der Hoek, and B. Kooi (2007). Dynamic Epistemic Logic. Synthese Library. Springer.
Velazquez-Quesada, F. R. (2009). Inference and update. Synthese (Knowledge, Rationality
& Action), forthcoming.
14