Hi Bill,

| 1) One advantage of Tarski's axioms over Hilbert's is that they're
| ``more'' FOL.  In my Hilbert paper, I'm constantly using set theory,
| and we use sets to define notions like rays, angles and triangles, and
| the congruence axioms are based on these set-definitions.  So what a
| great place to try out HOL set theory ideas!

Indeed so, though as Phil pointed out earlier, you may need to be
careful not to assume the axiom of infinity without justification.
That shouldn't be a danger since you will be using the special
geometric type of points without relying on any infinite types like
:num that are already there. In fact, Phil and Jacques have an
interesting paper where they systematically derive the natural
numbers from some of Hilbert's axioms.

| That would really make a joke out of my scheme.  An aggressive
| automation would be able to handle this simpler proof, because
| TarskiModel is a label saying that S satisfies Tarski's axioms,
| including A1 and A2.  Well, much to my relief, this simpler proof
| didn't work.  Which means that the Mizar automation is so
| non-aggressive that we can do 2-column proofs this way.  I assume 
| miz3 is similarly non-aggressive.

In general, the default miz3 prover may be more powerful than Mizar's
because it first tries "HOL_BY" (which is close to Mizar's basic
prover) and then MESON (which is a more general first-order prover.
However, since "TarskiModel(....)" refers to something merely defined
to be equal to the conjunction of the axioms, rather than actually
*being* the conjunction of those axioms, neither prover will
automatically take that definition into account. So indeed I don't
think this will by default work in miz3 either. This situation does
seem right from a pedagogical point of view if you want to identify
clearly where each axiom and earlier theorem gets used in a proof.

John.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
hol-info mailing list
hol-info@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/hol-info

Reply via email to