U.Mechanism - Law‑governed application to a SubjectKind over a BaseType
Pattern A.6.1 · Stable Part A - Kernel Architecture Cluster
One‑line summary. A U.Mechanism is a specialisation of U.Signature (A.6.0): its Vocabulary is an explicit OperationAlgebra whose operators publish SlotSpecs (A.6.5), its Laws are a LawSet, and it adds AdmissibilityConditions (operational guards) plus a named Transport clause for cross‑context use. Transport is Bridge‑only (per F.9) with penalties routed to the Reliability channel only (R, or R_eff when distinguished) (per B.3); F/G remain invariant; CL^plane follows C.2.1 CHR:ReferencePlane. Realizations MAY be published, but MUST be monotone w.r.t. the Mechanism’s LawSet (and any imported Signature laws) and MUST treat imported signatures as opaque (use imports/provides + ClaimIds).
Status. Normative [A] in Part A (Kernel).
Placement. Immediately after A.6.0 as A.6.1. USM (A.2.6) and UNM (A.19/C.16) become instances conforming to A.6.1 (no semantic change to either).
Mint vs reuse. This pattern mints the Kernel lexemes U.Mechanism, U.MechMorph, and U.MechAuthoring, plus the descriptive record names MechanismDescription, MechFamilyDescription, and MechInstanceDescription. It reuses U.Signature (A.6.0), U.Type, U.BoundedContext, and Part F Bridge/CL/ReferencePlane terms without changing them; it does not mint new U.Type core types.
Type. Architectural pattern (kernel‑level; notation‑independent).
LEX.TokenClass (E.10). Declared here for the tokens minted by this pattern (see E.10:7.1).
LEX.TokenClass(U.Mechanism) = KernelTokenLEX.TokenClass(U.MechMorph) = KernelTokenLEX.TokenClass(U.MechAuthoring) = KernelTokenLEX.TokenClass(MechanismDescription) = KernelTokenLEX.TokenClass(MechFamilyDescription) = KernelTokenLEX.TokenClass(MechInstanceDescription) = KernelToken
Give FPF one uniform kernel shape for things like USM (set‑algebra on context slices) and UNM (classes of admissible normalizations with ≡_UNM) so authors can define, compare, refine, compose, and port mechanisms without re‑inventing the meta‑language; all cross‑context use is Bridge‑only with CL penalties to R/R_eff, never to F/G.
Keywords
- Mechanism
- OperationAlgebra
- LawSet
- AdmissibilityConditions
- Transport
- Bridge-only.
Relations
Content
Problem frame
Give FPF one uniform kernel shape for things like USM (set‑algebra on context slices) and UNM (classes of admissible normalizations with ≡_UNM) so authors can define, compare, refine, compose, and port mechanisms without re‑inventing the meta‑language; all cross‑context use is Bridge‑only with CL penalties to R/R_eff, never to F/G.
Problem
Without a kernel abstraction, scope/normalization/comparison constructs proliferate with incompatible algebras and guard surfaces; cross‑context reuse lacks visible Bridge/CL routing; comparability drifts into illegal scalarisation (e.g., ordinal means). FPF already curbs this via A.6.0 (Signature discipline, SignatureManifest), USM (scope algebra & Γ_time), UNM (normalize‑then‑compare), and CG‑Spec (lawful comparators/ScoringMethods)—but lacks a common meta‑slot for “mechanism.”
Forces
Locality vs transport. Semantics are context‑local; crossing contexts is Bridge‑only (Part F/B.3); penalties hit R/R_eff; F/G invariant.
Expressivity vs legality. Rich operators vs CHR legality and CG‑Spec (no ordinal averages; lawful unit alignment).
Time determinacy. Explicit Γ_time; no implicit latest. (Required in USM’s ContextSlice.)
Slot clarity vs specialisation depth. Multi‑level specialisations require explicit SlotSpecs (A.6.5) and monotone refinement of ValueKinds; SlotKinds are stable across levels (no implicit positional parameters).
Signature hygiene. Obey SignatureManifest discipline (A.6.0:4.4.1): explicit imports/provides, acyclic imports, and no redeclare. Treat imported signatures as opaque (reference only their provides symbols + ClaimIds) and keep realizations monotone.
Solution
Mechanism Intension
A U.Mechanism publishes
U.Mechanism.Intension := ⟨IntensionHeader, Imports, SubjectBlock := ⟨SubjectKind, BaseType, SliceSet, ExtentRule, ResultKind?⟩, SlotIndex, OperationAlgebra, LawSet, AdmissibilityConditions, Applicability, Transport, Γ_timePolicy, PlaneRegime, Audit⟩
and admits Realizations that respect it. The shape is notation‑independent and conceptual (no tooling, storage, or CI metadata).
-
A.6.0 alignment (normative).
U.Mechanismis a specialisation ofU.Signature(A.6.0). A mechanism publication SHALL include the universal four‑row Signature Block (SubjectBlock / Vocabulary / Laws / Applicability). The canonical mapping is:
– SubjectBlock ↔SubjectBlock
– Vocabulary ↔OperationAlgebra(including inline SlotSpecs per A.6.0:4.1.1 / A.6.5)
– Laws ↔LawSet
– Applicability ↔Applicability
SlotIndexis a mechanism-only index/projection over SlotSpecs used byOperationAlgebra(and any extra SlotSpecs used only byAdmissibilityConditions); it does not introduce a fifth Signature row and does not relax A.6.0:4.1.1. Mechanism‑only additions areAdmissibilityConditions,Transport,Γ_timePolicy,PlaneRegime, andAudit; they extend the Signature without contradicting its intension/specification split (A.6.0; CC‑A.6.0‑5). -
IntensionHeader.
id(PascalCase),version(SemVer),status(draft/review/stable/deprecated). SignatureManifest coupling (normative). If the mechanism is intended to be imported/reused, it MUST include aSignatureManifest(A.6.0:4.4.1) immediately above its Signature Block. When both are present: –IntensionHeader.id = SignatureManifest.id–IntensionHeader.version = SignatureManifest.version–IntensionHeader.status = SignatureManifest.status(whenstatusis present) –Imports = SignatureManifest.importsand any public symbols minted by the Mechanism’s Signature Block MUST appear inSignatureManifest.provides. Avoid duplicatingimports/provideselsewhere: dependency edges and exported names live in the manifest; operational details live in the mechanism. -
Imports. (Optional) SignatureIds that supply non‑Kernel symbols used by this mechanism’s Signature Block and/or this mechanism’s operation algebra. If the mechanism includes a
SignatureManifest, thenImportsMUST equalSignatureManifest.imports. If present, the list MUST be acyclic and MUST respect the layering rule in A.6.0:4.4.1 (E.5.3 + E.10). -
BaseType. A
U.Typethe mechanism ranges over. CHR spaces (e.g., aU.CharacteristicSpace/chart family) appear here as types; outside CHR, use set‑typedU.Types. A conformantU.Mechanismpublication MUST NOT mint a new core type here; it MUST reference existingU.Types. If planes differ, state the ReferencePlane policy (see PlaneRegime). -
SubjectKind / SliceSet / ExtentRule / ResultKind? / SlotIndex. • SubjectKind. The intensional kind acted upon (C.3.1/3.2), separate from quantification. • SliceSet. The addressable set of Context slices (USM: ContextSliceSet). • ExtentRule. A rule yielding
Extension(SubjectKind, slice)(C.3.2), used as the quantifier’s domain. • ResultKind? Optional intensional kind for outputs ofOperationAlgebra. • SlotIndex. A set (or map) of SlotSpecsSlotSpec = ⟨SlotKind, ValueKind, refMode⟩(A.6.0:4.1.1; A.6.5) covering every argument position used by OperationAlgebra and AdmissibilityConditions. SlotKinds are stable names for substitution and specialisation; parameter names/indices are presentation only.
For Vocabulary-level operators, SlotSpecs remain declared in each operator’s parameter block (A.6.0:4.1.1).SlotIndexis an extracted index that MUST be mechanically derivable from those declarations (plus any guard-only SlotSpecs). Guard-only SlotSpecs SHALL be authored as part of the AdmissibilityConditions predicate signatures (not only as prose) so they remain mechanically extractable. Shorthand views (didactic only). Authors MAY include a simple name→ValueKind list (aValueKindView) as a didactic projection of SlotSpecs, but it SHALL NOT replace SlotSpecs (SlotKind/ValueKind/refMode) in normative Mechanism definitions. If present, it MUST be mechanically derivable fromSlotIndex(e.g.,ValueKindView = π_value(SlotIndex)by droppingrefMode). The colloquial label ParamKind is permitted only in prose as a synonym for theValueKindcomponent of a SlotSpec; it MUST NOT be introduced as a field name, token, or type. -
OperationAlgebra. Named operations whose signatures are expressed over SlotKinds from
SlotIndex(A.6.5); no implicit parameters. For every n‑ary operator, its Vocabulary declaration SHALL publish SlotSpec triples per argument position (A.6.0:4.1.1); positional indices are presentation only. Examples:
• USM:∈, ⊆, ∩, SpanUnion, translate, widen, narrow, refit.
• UNM:apply(method),compose,quotient(≡_UNM); normalize‑then‑compare. -
LawSet. Equations/invariants (no proofs here). Admissions/eligibility tests belong under AdmissibilityConditions, not here. Laws MUST be compatible with CHR legality where numeric comparison/aggregation is induced. Examples: • USM: serial intersection; SpanUnion only where a named independence assumption is satisfied (state features/axes, validity window, evidence class);
translateuses declared Bridges; Γ_time is mandatory.
• UNM: scale‑appropriate transforms — ratio→positive‑scalar; interval→affine; ordinal→monotone; nominal→categorical;tabular:LUT(+uncertainty).
(A conformantU.Mechanismpublication MUST NOT mint a new Kernel token for “certificate”; if such a type is later required, it MUST follow DRR/LEX minting.) -
AdmissibilityConditions. Deterministic, context‑local operational guard predicates that fail closed (e.g., “Scope covers TargetSlice” with named Γ_time; “NormalizationMethod class + validity window named”). Predicate arguments SHALL be declared via SlotSpecs from
SlotIndex(A.6.5), not as implicit positional parameters. Unknowns → {degrade | abstain}; never coerce to 0/false. -
Applicability. Binding to a
U.BoundedContextwith stance/plane/time notes and any CG‑Spec/MM‑CHR legality claims; cross‑context use is declared via Transport only. -
Transport. Bridge‑only semantics for cross‑context / cross‑plane use: name the Bridge and channel (
Scope|Kind) per F.9, and record ReferencePlane(src,tgt) per C.2.1. Terminology: thisTransportclause is a declarative policy surface; it does not introduce aU.Transferedge (see E.18 term separation). The Transport clause MUST NOT restate CL ladders,CL^plane, or Φ/Ψ tables; it MUST reference the applicable policy ids / registries instead; penalties route to R/R_eff only and never mutate F/G (per B.3). Crossings are explicit; no implicit crossings. Where USM or KindBridge are used together, apply the two‑bridge rule (scope CL and kindCL^kpenalties handled separately to the Reliability channel (R/R_eff)). -
Γ_timePolicy. Point/window/policy; no implicit “latest.” Validity windows are named; required whenever guards reference time.
-
PlaneRegime. Declare
ReferencePlaneon values/paths; when planes differ, name CL^plane and apply a Φ_plane policy (Part F/B.3). Plane penalties do not change CL; route to R/R_eff only; F/G stay invariant. -
Audit. Conceptual audit surface only (no data/telemetry workflows): crossings are publishable on UTS; surface policy‑ids rather than tables. Edition pins and regression hooks (if any) are referenced by id; operational details remain out of scope.
-
SignatureBlock alignment. The referenced Signature’s four‑row Block (A.6.0) is canonical. Any mechanism rendering MUST preserve that block (or an explicit projection of it) and MUST obey A.6.5 for n‑ary argument discipline. SlotKinds and SlotSpecs in
SlotIndexremain part of the Vocabulary row (A.6.0) and MUST obey A.6.5. -
Compatibility with A.6.* A.6.1 is a strict specialisation of A.6.0: the canonical four‑row Signature Block remains the source of truth; additional Mechanism fields (algebra, carriers, evidence) must not introduce new semantic rows or shadow the signature’s
imports/provides.
U.MechMorph - Refinement, Extension, Equivalence & Composition
Intent. Provide structure‑preserving relations & constructors between mechanisms.
Definitions.
-
Refinement
M′ ⊑ M: narrows the SubjectBlock and/or SlotSpecs (ValueKinds/refMode for inherited SlotKinds) and/or strengthensLawSet/AdmissibilityConditions(safe substitution; Liskov‑style). A Refinement MUST NOT rename SlotKinds or add new required arguments to inherited operations. -
Extension
M ⊑⁺ M″: adds operations (and any new SlotKinds used only by those new operations) without weakening existing Laws/Guards; old programs remain valid (conservative extension). -
Equivalence
M ≡ M′: there exists a bijective mapping between Subjects/ops preserving/reflecting LawSet (up‑to‑isomorphism on BaseType and OperationAlgebra). -
Quotient
M/≈: factor by a congruence (e.g., ≡_UNM for charts). -
Product
M×N: independent BaseTypes; ops are component‑wise; ensures no illegal cross‑ops (e.g., set‑algebra discipline forSpanUnion). Where independence is claimed, name and justify the assumption (do not mint new Kernel types here).
Multi-level specialisation ladders (normative)
Many families need a generic mechanism at the top (e.g., “select anything”) and progressively specialised mechanisms below (e.g., “select a method by decision theory”, “select a telemetry pack”). To keep such ladders modular and to prevent cross‑level leakage:
-
Explicit parent + morphism kind. Any mechanism that specialises another MUST name its parent and declare whether the step is a Refinement (
⊑) or an Extension (⊑⁺). A specialisation family MUST be acyclic (a DAG). -
SlotKind invariance across levels. For every inherited operation/guard predicate, SlotKinds are invariant (A.6.5). A specialisation step MUST NOT rename an inherited SlotKind, change its documented semantics, or rely on positional re‑ordering instead of SlotKind identity.
-
ValueKind monotonicity. A Refinement MAY narrow
ValueKind(i.e.,ValueKind′ ⊑ ValueKindin Kind‑CAL) and/orrefModefor an inherited SlotKind, and MAY strengthen Laws/Guards. It MUST NOT widen ValueKinds or relax Guards; otherwise mint a new parent mechanism or publish an adapter mechanism. -
No new mandatory inputs to inherited operations. If a specialisation needs extra inputs, it MUST introduce a new operation (Extension) or an adapter mechanism; it MUST NOT retrofit new required parameters into an inherited operation signature.
-
No upward leakage. A top‑level mechanism in a ladder SHOULD mention only the most general ValueKinds required by its SlotSpecs and Laws. Domain‑specific artefacts (e.g., decision‑theory policies, OEE generators, evaluation packs) belong in specialised mechanisms that refine slots and/or add operations.
Informative selector ladder sketch. SelectorMechanism can declare a stable slot interface (CandidateSetSlot, ComparisonResultSlot, CriteriaSlot, ContextSlot, SelectionSlot) with generic ValueKinds. SelectorMethodMechanism ⊑ SelectorMechanism then narrows CandidateSetSlot.ValueKind to U.Method and (by Extension) adds decision‑theory specific slots/ops; an OEE generator is authored as a separate mechanism that produces candidate/criteria packs consumed by the selector.
Transport Bridge⋅M: lifts across Contexts/planes; names CL/CL^k/CL^plane regimes; penalties → R_eff only; UTS row recommended for publication; ReferencePlane(src,tgt) recorded. If mapping losses are material, narrow the mapped set or publish an adapter (best practice).
Passing example. USM′ = USM + “publish named independence‑assumption evidence for SpanUnion” ⇒ Refinement (strengthened law; substitution‑safe).
Normalization quotient. UNM / ≡_UNM exposes compare‑on‑invariants surfaces for CPM/USCM (normalize‑then‑compare).
U.MechAuthoring - Instantiation template
MechanismDescription (E.8 Tell–Show–Show; I/D/S‑compliant):
Mechanism: U.<Name> (Kernel conceptual description; no tooling fields)
Imports: <Signatures / U.Types> - SubjectBlock: <SubjectKind, BaseType, SliceSet, ExtentRule, ResultKind?> - SlotSpecs: <SlotIndex (A.6.5)> - OperationAlgebra: <operators with SlotKinds> - LawSet: <equations/invariants> - AdmissibilityConditions: <admission predicates with SlotKinds; Γ_time> - Transport: <Bridge channels; CL/CL^k/CL^plane named; ReferencePlane(src,tgt)> - PlaneRegime: <world|concept|episteme rules>
MechFamilyDescription & MechInstanceDescription
-
MechFamilyDescription:
{Mechanism.Intension, Realizationα, Realizationβ, …}— each Realization may tighten (never relax) Laws (Liskov‑style). -
MechInstanceDescription:
{Mechanism.Intension@Context, Windows, named Φ/Ψ/Φ_plane regimes, BridgeIds}— a conceptual instance; operational telemetry/workflows are out of scope.
Defaults
- Local‑first semantics. All judgments are context‑local; crossings are explicit and costed (CL→R only).
- Compliance‑first comparability. Numeric comparison/aggregation requires CG‑Spec (lawful SCP, Γ‑fold, MinimalEvidence); partial orders return sets; no ordinal means.
- Tri‑state discipline.
unknown → {degrade|abstain};sandbox/probe‑onlyis a LOG branch with a policy‑id (no implicitunknown→0/false). - R‑only penalties. Φ/Ψ/Φ_plane are monotone and bounded; penalties route to
R_effonly; F/G invariant.
Born‑via‑A.6.1 sketch (informative)
PTM — Publication & Telemetry Mechanism (informative)
BaseType: SoTA‑Pack(Core), PathId/PathSliceId, PolicyId. OperationAlgebra: emit selector‑ready packs with parity pins and telemetry stubs; listen for edition/illumination bumps; trigger slice‑scoped refresh.
LawSet: no change of dominance defaults unless CAL policy promotes; edition-aware refresh.
Guards: GateCrossing visibility harness blocks publication on missing crossing attestations (BridgeCard+UTS row, ReferencePlane, CL/CL^k/CL^plane, Φ/Ψ policy-ids), on lane-purity violations (CL→R only; F/G invariant), or on lexical SD violations (E.10).
Transport/Audit: G.10/G.11 publication & refresh semantics (CL routing to R/R_eff).
Informative SoTA: telemetry hooks align with post‑2015 quality‑diversity families (CMA‑ME/MAE, DQD/MEGA) and open‑ended methods (POET‑class) when monitored via illumination telemetry rather than scored.
60‑second didactic script
“To mint a mechanism, fill a Mechanism.Intension: declare SubjectBlock (SubjectKind, BaseType, SliceSet, ExtentRule, ResultKind?) and SlotSpecs (use a
SignatureManifestif it is reusable); then OperationAlgebra/Laws/AdmissibilityConditions and Γ_time; define Transport (Bridge/CL with penalties to R only), and Audit (UTS + Path pins). USM and UNM are already such mechanisms; the same template births comparison, scoring, and publication mechanisms—safely bound to CG‑Spec—without leaving the kernel grammar.”
Quick “builder’s” checklist (author‑facing)
- Draft a run↔design charter: why this Mechanism, which guard surfaces and comparability are in scope; which
DesignRunTag/CtxState.locusboundary it mediates; is a Γ_m (CAL) builder needed?
-
Fill Mechanism.Intension (SubjectBlock, SlotSpecs, OperationAlgebra, LawSet, AdmissibilityConditions, Applicability, Transport, Γ_timePolicy, PlaneRegime, Audit).
-
Bind CHR legality & CG‑Spec when comparing/aggregating (ComparatorSet, ScaleComplianceProfile (SCP), MinimalEvidence, Γ‑fold).
Ship UTS + G.10; wire G.11 telemetry (PathSlice‑keyed); ensure penalties route to R_eff only.
Archetypal Grounding
U.Scope (Claim/Work/Publication) — USM as a U.Mechanism instance (informative example)
- Imports:
U.ContextSliceSet; Part F.9 Bridge; C.2.1 ReferencePlane (noted for crossings); C.2.2 F–G–R; C.2.3 U.Formality. - BaseType:
U.ContextSliceSet. - SliceSet:
U.ContextSliceSet(addressableU.ContextSlices). - SubjectKind:
U.Scopewith specializationsU.ClaimScope(G),U.WorkScope, andU.PublicationScope. - OperationAlgebra:
∈, ⊆, ∩, SpanUnion, translate, widen, narrow, refit. - LawSet: serial intersection; SpanUnion only where a named independence assumption is satisfied (state features/axes, validity window, evidence class); translate uses declared Bridges; Γ_time is mandatory.
- AdmissibilityConditions: deterministic “Scope covers TargetSlice”; fail‑closed;
unknown → {degrade|abstain}(no implicitunknown→0/false). - Transport: Bridge‑only with CL; penalties →
R_eff; F/G invariant; publish UTS notes. - Γ_timePolicy:
point | window | policy; no implicit “latest.” - PlaneRegime: not applicable to scope sets (scope is set‑valued over
ContextSlice, no value‑plane); CL^plane N/A.
Bias-Annotation (informative)
This pattern intentionally biases Mechanism authoring toward explicit contracts, context-local semantics, and auditable reuse.
- Gov (governance). Bias toward publishable obligations (Signature rows, CC items) and explicit policy-ids for crossings. Risk: perceived authoring overhead. Mitigation: reuse the
U.MechAuthoringtemplate; keep Realizations opaque and put operational details outside the Kernel. - Arch (architecture). Bias toward locality-first semantics and Bridge-only transport with costs routed to R/R_eff. Risk: reduced convenience for ad-hoc cross-context reuse. Mitigation: publish adapter mechanisms and make crossings explicit via
Transport(CC‑UM.3/CC‑UM.4). - Onto/Epist (ontology/epistemology). Bias toward lawful comparability (CHR legality; CG‑Spec binding) and against illegal scalarisation (e.g., ordinal means). Risk: some heuristic scoring practices become non-conformant. Mitigation: represent uncertainty explicitly and use
unknown → {degrade|abstain}rather than coercions (CC‑UM.7). - Prag (practice). Bias toward notation-independence and against tool/vendor tokens in the Kernel. Risk: teams may want to inline CI/telemetry fields. Mitigation: keep audit surfaces conceptual (
Audit) and reference operational hooks by id only (CC‑UM.6). - Did (didactic). Bias toward explicit SlotKinds/SlotSpecs over positional parameters. Risk: steep learning curve. Mitigation: allow non-normative projections (
ValueKindView) and include a “60‑second” script plus a builder’s checklist (A.6.1:4.7/4.8).
Conformance Checklist (normative)
Common Anti-Patterns and How to Avoid Them (informative)
Consequences (informative)
- Uniform kernel shape. Scope, normalization, comparison families can be authored and compared without lexical drift.
- Auditable reuse. GateCrossings are UTS-visible via CrossingBundle (E.18); penalties are transparent (R only), with LanePurity + Lexical SD (E.10) checks runnable (GateChecks in A.21; Bridge+UTS discipline A.27; BridgeCard F.9).
- Scalarisation avoids illegality. Partial orders remain set‑valued; cross‑scale arithmetic is blocked by CG‑Spec/CSLC.
Rationale (informative)
Anchoring mechanisms in an explicit Signature → Realization discipline (A.6.0 SignatureManifest + CC‑UM.2 monotonicity/opacity) keeps reuse safe: signatures are the contract; realizations may vary but cannot relax laws. It also makes cross‑context (Bridge) crossings explicit and costed on R_eff (never F/G).
SoTA-Echoing (post-2015 practice alignment) (informative)
Purpose. To show how the FPF concept of a Mechanism (law-governed signature with guards and transport) aligns with, and improves upon, leading research and engineering practices after 2015.
All comparisons are informative: they serve didactic continuity, not new normative force.
Contemporary references (post-2015 sources)
SoTA binding note (E.8:11). No dedicated SoTA‑Pack(Mechanisms) (G.2) is registered at the time of writing; until one exists, this section cites primary post‑2015 sources directly and SHOULD later be reduced to ClaimSheet/CorpusLedger/BridgeMatrix ids (to avoid forking untracked SoTA narrative).
-
Algebraic effects and handlers (post‑2015 effect systems and handler implementations) — Adopt/Adapt. They motivate the split “operation signature vs handling”; A.6.1 keeps
OperationAlgebraexplicit and addsLawSet,AdmissibilityConditions, andΓ_timeso legality and time are not implicit. (e.g., Hillerström & Lindley, 2018; Multicore/OCaml‑5 effect handlers, 2021–2022). -
Typed semantic translation frameworks (institution‑style morphisms and functorial data migration) — Adapt. A.6.1 uses explicit refinement/extension/quotient structure (
U.MechMorph) but requires cross‑Context transport to be Bridge‑only with penalties routed to R/R_eff. (e.g., Spivak & Schultz, 2017; CQL practice, 2017–2023). -
Policy‑as‑Code (declarative guard/risk rules) — Adapt. A.6.1 turns runtime policies into deterministic, fail‑closed
AdmissibilityConditionswith named Γ_time windows; evaluators and tool binding stay out of Core. (e.g., Open Policy Agent / Rego, 2016+; UL 4600:2020; ISO 21448:2019). -
Session / typestate types (post‑2015 protocol safety) — Adapt. Protocol constraints inform how guards can restrict legal operator sequences, but A.6.1 keeps the contract as signature+laws and surfaces sequencing constraints as explicit guard predicates rather than hidden state. (e.g., Scalas & Yoshida, 2016–2018; mainstream session‑type toolchains, 2017–2024).
-
Lawful measurement and calibrated uncertainty (monotone and calibrated learning, conformal prediction) — Adopt/Adapt. Modern calibrated methods show why comparability must be explicit; A.6.1 binds induced numeric operations to CG‑Spec/CSLC and forbids illegal scalarisation (e.g., ordinal means). (e.g., Romano et al., 2019; Angelopoulos & Bates, 2021).
Each source corresponds to a distinct Tradition: formal semantics, categorical algebra, compliance automation, protocol safety, and lawful AI.
Alignment with A.6.1 fields and concepts
Adopt / Adapt / Reject summary
-
Adopt. The “explicit operations + explicit laws” stance from modern semantics work, and the calibrated/monotone stance from lawful ML, because both reduce hidden assumptions.
-
Adapt. Typed translation ideas and policy‑as‑code idioms into a kernel form that is Context‑local by default, with explicit guards (
AdmissibilityConditions) and explicit time windows (Γ_timePolicy) instead of implicit recency. -
Reject. Tool‑bound semantics, automatic recency heuristics, and any cross‑scale arithmetic without CSLC proof; A.6.1 also rejects implicit cross‑Context/plane reuse.
-
Cross‑Context/plane delta (E.8:11). Whenever a SoTA practice would reuse semantics across Contexts/planes, A.6.1 requires an explicit
BridgeId(F.9) plus CL /CL^k/CL^planeanchors and Φ/Ψ/Φ_plane policy‑ids (B.3), with penalties routed toR/R_effonly (never mutatingF/G).
Holonic repeatability
The same correspondence holds at every holonic level:
a part-holon declares its own OperationAlgebra/LawSet/AdmissibilityConditions; a whole-holon merges them via Bridges; a meta-holon re-binds mechanisms under a new Γ-closure. All penalties remain in R / R_eff, while F / G invariants propagate intact.
Relations (quick pointers)
Builds on A.6.0; instantiates A.2.6 USM (ContextSlice, Γ_time, ∩/SpanUnion/translate) and A.19/C.16 UNM (classes, ≡_UNM, validity windows); uses Part B (Bridges, CL/CL^k/CL^plane; no implicit crossings); binds CG‑Spec for any numeric comparison/aggregation; telemetry/publication via G.10/G.11.