Post's lattice

In logic and universal algebra, Post's lattice denotes the lattice of all clones on a two-element set {0, 1}, ordered by inclusion. It is named for Emil Post, who published a complete description of the lattice in 1941.[1] The relative simplicity of Post's lattice is in stark contrast to the lattice of clones on a three-element (or larger) set, which has the cardinality of the continuum, and a complicated inner structure. A modern exposition of Post's result can be found in Lau (2006).[2]

Basic concepts

A Boolean function, or logical connective, is an n-ary operation f: 2n2 for some n ≥ 1, where 2 denotes the two-element set {0, 1}. Particular Boolean functions are the projections

\pi_k^n(x_1,\dots,x_n)=x_k,

and given an m-ary function f, and n-ary functions g1, ..., gm, we can construct another n-ary function

h(x_1,\dots,x_n)=f(g_1(x_1,\dots,x_n),\dots,g_m(x_1,\dots,x_n)),

called their composition. A set of functions closed under composition, and containing all projections, is called a clone.

Let B be a set of connectives. The functions which can be defined by a formula using propositional variables and connectives from B form a clone [B], indeed it is the smallest clone which includes B. We call [B] the clone generated by B, and say that B is the basis of [B]. For example, [¬, ∧] are all Boolean functions, and [0, 1, ∧, ∨] are the monotone functions.

We use the operations ¬ (negation), ∧ (conjunction or meet), ∨ (disjunction or join), → (implication), ↔ (biconditional), + (exclusive disjunction or Boolean ring addition), ↛ (nonimplication), ?: (the ternary conditional operator) and the constant unary functions 0 and 1. Moreover, we need the threshold functions

\mathrm{th}^n_k(x_1,\dots,x_n)=\begin{cases}1&\text{if }\bigl|\{i\mid x_i=1\}\bigr|\ge k,\\
0&\text{otherwise.}\end{cases}

For example, th1n is the large disjunction of all the variables xi, and thnn is the large conjunction. Of particular importance is the majority function

\mathrm{maj}=\mathrm{th}^3_2=(x\land y)\lor(x\land z)\lor(y\land z).

We denote elements of 2n (i.e., truth-assignments) as vectors: a = (a1, ..., an). The set 2n carries a natural product Boolean algebra structure. That is, ordering, meets, joins, and other operations on n-ary truth assignments are defined pointwise:

(a_1,\dots,a_n)\le(b_1,\dots,b_n)\iff a_i\le b_i\text{ for every }i=1,\dots,n,
(a_1,\dots,a_n)\land(b_1,\dots,b_n)=(a_1\land b_1,\dots,a_n\land b_n).

Naming of clones

Intersection of an arbitrary number of clones is again a clone. It is convenient to denote intersection of clones by simple juxtaposition, i.e., the clone C1C2 ∩ ... ∩ Ck is denoted by C1C2...Ck. Some special clones are introduced below:

f(a_1,\dots,a_{i-1},c,a_{i+1},\dots,a_n)=f(a_1,\dots,d,a_{i+1},\dots)\ \Rightarrow\ f(b_1,\dots,c,b_{i+1},\dots)=f(b_1,\dots,d,b_{i+1},\dots)
for every in, a, b2n, and c, d2. Equivalently, the functions expressible as f(x1, ..., xn) = a0 + a1x1 + ... + anxn for some a0, a.
\mathbf a^1\land\cdots\land\mathbf a^k=\mathbf 0\ \Rightarrow\ f(\mathbf a^1)\land\cdots\land f(\mathbf a^k)=0.
Moreover, \mathrm{T}_0^\infty=\bigcap_{k=1}^\infty\mathrm{T}_0^k is the set of functions bounded above by a variable: there exists i = 1, ..., n such that f(a) ≤ ai for all a.
As a special case, P0 = T01 is the set of 0-preserving functions: f(0) = 0.
\mathbf a^1\lor\cdots\lor\mathbf a^k=\mathbf 1\ \Rightarrow\ f(\mathbf a^1)\lor\cdots\lor f(\mathbf a^k)=1,
and \mathrm{T}_1^\infty=\bigcap_{k=1}^\infty\mathrm{T}_1^k is the set of functions bounded below by a variable: there exists i = 1, ..., n such that f(a) ≥ ai for all a.
The special case P1 = T11 consists of the 1-preserving functions: f(1) = 1.

Description of the lattice

The set of all clones is a closure system, hence it forms a complete lattice. The lattice is countably infinite, and all its members are finitely generated. All the clones are listed in the table below.

Hasse diagram of Post's lattice
Central part of the lattice
clone one of its bases
∨, ¬
P0∨, +
P1∧, →
Px ? y : z
T0k, k ≥ 2thkk+1, ↛
T0
PT0k, k ≥ 2thkk+1, x ∧ (yz)
PT0x ∧ (yz)
T1k, k ≥ 2th2k+1, →
T1
PT1k, k ≥ 2th2k+1, x ∨ (y + z)
PT1x ∨ (y + z)
M∧, ∨, 0, 1
MP0∧, ∨, 0
MP1∧, ∨, 1
MP∧, ∨
MT0k, k ≥ 2thkk+1, 0
MT0x ∧ (yz), 0
MPT0k, k ≥ 2thkk+1 for k ≥ 3,
maj, x ∧ (yz) for k = 2
MPT0x ∧ (yz)
MT1k, k ≥ 2th2k+1, 1
MT1x ∨ (yz), 1
MPT1k, k ≥ 2th2k+1 for k ≥ 3,
maj, x ∨ (yz) for k = 2
MPT1x ∨ (yz)
Λ∧, 0, 1
ΛP0∧, 0
ΛP1∧, 1
ΛP
V∨, 0, 1
VP0∨, 0
VP1∨, 1
VP
Dmaj, ¬
DPmaj, x + y + z
DMmaj
A↔, 0
AD¬, x + y + z
AP0+
AP1
APx + y + z
U¬, 0
UD¬
UM0, 1
UP00
UP11

The eight infinite families have actually also members with k = 1, but these appear separately in the table: T01 = P0, T11 = P1, PT01 = PT11 = P, MT01 = MP0, MT11 = MP1, MPT01 = MPT11 = MP.

The lattice has a natural symmetry mapping each clone C to its dual clone Cd = {fd | fC}, where fd(x1, ..., xn) = ¬fx1, ..., ¬xn) is the de Morgan dual of a Boolean function f. For example, Λd = V, (T0k)d = T1k, and Md = M.

Applications

The complete classification of Boolean clones given by Post helps to resolve various questions about classes of Boolean functions. For example:

Variants

Post originally did not work with the modern definition of clones, but with the so-called iterative systems, which are sets of operations closed under substitution

h(x_1,\dots,x_{n+m-1})=f(x_1,\dots,x_{n-1},g(x_n,\dots,x_{n+m-1})),

as well as permutation and identification of variables. The main difference is that iterative systems do not necessarily contain all projections. Every clone is an iterative system, and there are 20 non-empty iterative systems which are not clones. (Post also excluded the empty iterative system from the classification, hence his diagram has no least element and fails to be a lattice.) As another alternative, some authors work with the notion of a closed class, which is an iterative system closed under introduction of dummy variables. There are four closed classes which are not clones: the empty set, the set of constant 0 functions, the set of constant 1 functions, and the set of all constant functions.

Composition alone does not allow to generate a nullary function from the corresponding unary constant function, this is the technical reason why nullary functions are excluded from clones in Post's classification. If we lift the restriction, we get more clones. Namely, each clone C in Post's lattice which contains at least one constant function corresponds to two clones under the less restrictive definition: C, and C together with all nullary functions whose unary versions are in C.

References

  1. E. L. Post, The two-valued iterative systems of mathematical logic, Annals of Mathematics studies, no. 5, Princeton University Press, Princeton 1941, 122 pp.
  2. D. Lau, Function algebras on finite sets: Basic course on many-valued logic and clone theory, Springer, New York, 2006, 668 pp. ISBN 978-3-540-36022-3
  3. H. R. Lewis, Satisfiability problems for propositional calculi, Mathematical Systems Theory 13 (1979), pp. 45–53.
This article is issued from Wikipedia - version of the 2/25/2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.