CG-Spec — Frame Standard & Comparability Governance
Pattern G.0 · Stable Part G - Discipline SoTA Patterns Kit
Tag. Architectural pattern (foundational Standard; constrains G.1–G.5)
Stage. design-time legality gate (establishes comparison legality & evidence minima; constrains run-time gates)
Primary output. CG‑Spec — a notation-independent legality gate for a CG‑Frame, published to UTS (with explicit edition pins for downstream reproducibility and RSCR).
Primary hooks. USM.ScopeSlice(G), describedEntity, SCP, MinimalEvidence, CNSpecRef, Γ‑fold, Φ(CL) / Φ_plane policy pins, UTS publication (Name Cards + edition pins).
Non-duplication note. Universal Part‑G invariants are owned by G.Core and are satisfied here only via delegation (CC‑G0‑CoreRef → CC‑GCORE‑*). Single‑owner contract-surface discipline (CN/CG) is enforced via CC‑GCORE‑CN‑CG‑1 (no shadow specs; no competing defaults).
A team defines or evolves a CG‑Frame (e.g., a frame for creativity measurement, decision quality, architecture trade‑offs, or portfolio selection). Downstream mechanisms (G.1–G.5 and beyond) must compare, aggregate, and publish CHR‑typed observations in ways that are:
Keywords
- CG-Spec
- CG-Frame
- legality gate
- ComparatorSet
- ScaleComplianceProfile (SCP)
- MinimalEvidence
- Γ-fold
- Φ(CL)
- Φ_plane
- CL-routing
- ReferencePlane
- edition pins
- RSCRTriggerKindId.
Relations
Content
Problem frame
A team defines or evolves a CG‑Frame (e.g., a frame for creativity measurement, decision quality, architecture trade‑offs, or portfolio selection). Downstream mechanisms (G.1–G.5 and beyond) must compare, aggregate, and publish CHR‑typed observations in ways that are:
- lawful with respect to measurement legality (scale/unit/polarity constraints),
- auditable with explicit evidence minima and provenance,
- reproducible via pinned editions and explicit policy ids,
- portable only via explicit crossings (bridges and reference-plane moves), never via implicit semantic leakage.
CG‑Spec is the single design-time object that fixes what comparisons and aggregations are lawful in this frame, under which pinned assumptions and minimal evidence requirements, so that run-time selection and publication can be audited without inventing new “local legality gates”.
Didactic subtitle: Design-time rules for safe, auditable comparison.
Problem
Without a single, frame-level legality standard:
- comparisons and aggregations drift into implicit assumptions (hidden scalarisation; silent totalisation of partial orders),
- numeric gates run on “whatever is available” rather than declared evidence minima and lane/carrier requirements,
- cross-context reuse happens without explicit crossing visibility and stated losses,
- selection outcomes become hard to audit because legality, evidence minima, and penalty routing are not pinned and traceable.
Forces
- Pluralism vs. comparability. Multiple traditions must co-exist while allowing lawful comparison where justified.
- Expressiveness vs. safety. Rich comparator sets and aggregators vs. measurement legality constraints.
- Locality vs. portability. Context-local semantics first; portability only via explicit bridges and explicit losses.
- Assurance vs. agility. Evidence minima must be strong enough to matter, light enough to adopt.
- Design-time vs. run-time. Keep legality standards and templates design-time; run-time only cites and applies them.
Solution — CG‑Spec as the design-time legality gate
CG‑Spec is a notation-independent UTS-published object that, for a given CG‑Frame, defines:
- the ComparatorSet (explicit, finite, typed) permitted in this frame,
- the ScaleComplianceProfile (SCP) that constrains lawful operations per characteristic,
- MinimalEvidence requirements per characteristic (lanes, carriers, freshness windows, crossing allowances, failure behavior),
- the frame’s penalty and trust folding wiring (by explicit policy ids and edition pins),
- AcceptanceStubs as design-time templates (thresholds remain owned by CAL, not by CG‑Spec),
- optional method-family hooks (e.g., illumination/QD or explore↔exploit guards) as wiring only, with semantics owned by the corresponding patterns.
CG‑Spec constrains downstream gate checks by being referenced and pinned; it is not itself an admissibility mechanism.
G.Core linkage (normative)
Builds on: G.Core (Part‑G core invariants; single-owner routing)
GCoreLinkageManifest (normative; size-controlled via profiles/sets).
Effective obligations/pins/triggers are computed by union expansion of the referenced ids (per G.Core:4.2).
Profiles/sets + explicit deltas; Nil‑elision applies.
CoreConformanceProfileIds :=GCoreConformanceProfileId.PartG.AuthoringBaseGCoreConformanceProfileId.PartG.TriStateGuardGCoreConformanceProfileId.PartG.UTSWhenPublicIdsMinted
CorePinSetIds :=GCorePinSetId.PartG.AuthoringMinimalGCorePinSetId.PartG.CrossingVisibilityPins
CorePinsRequired :=(delta over PinSets)UTSRowId[]ReferenceMapComparatorSetRef.editionSCPRef.editionΓFoldRef.edition?MinimalEvidenceRef.edition?FailureBehaviorPolicyId?
DefaultsConsumed := {DefaultId.GammaFoldForR_eff}(owner:CC‑G5.4perG.Core.DefaultOwnershipIndex)RSCRTriggerSetIds := {GCoreTriggerSetId.CGSpecGate}RSCRTriggerKindIds :=(delta over TriggerSets)RSCRTriggerKindId.EvidenceSurfaceEditRSCRTriggerKindId.TokenizationOrNameChangeRSCRTriggerKindId.DefaultOwnerChange
TriggerAliasMapRef := ∅
CG‑Spec object model (normative)
CG‑Spec is authored per CG‑Frame. It SHALL:
- be published to UTS as a notation-independent object,
- reference CHR characteristics by id (measurement semantics remain owned by CHR packs),
- constrain what comparisons and aggregations are lawful in this frame via explicit comparator specs and SCP bindings,
- declare minimal evidence gates per characteristic, including explicit failure behavior wiring,
- cite
CN‑Specfor normalization/comparability policies (no duplication and no shadow specs), - publish edition pins and policy ids so downstream selection, parity, shipping, and refresh can be reproducible and RSCR-aware.
CG‑Spec conceptual model (normative)
Local typing notes (non-exhaustive; normative intent but no shadow specs).
ComparatorSpecMUST be typed against SCP/CHR constraints. Examples of lawful comparators are frame-local choices and are authored here (e.g., dominance where lawful; lexicographic over typed traits; medoid/median for ordinal where lawful; explicit weighted sums only where legality is proven and units are aligned).MinimalEvidenceEntryMUST declare: lane requirements, evidence carriers, freshness window (if any), and explicit failure behavior wiring. The semantics of{pass|degrade|abstain}anddegrade(mode=…)are delegated toG.Core.
Interfaces (normative)
Authoring workflow for CG‑Spec (informative)
- Charter the frame. Declare
Context,Scope,describedEntity, boundary examples/non-examples, andReferenceMap. - Draft ComparatorSet and SCP. Enumerate permitted comparator forms and bind each to CHR characteristics and legality constraints (scale/unit/polarity discipline). Attach guard bindings as explicit references/pins.
- Bind Characteristics. Ensure every compared quantity is a CHR characteristic id (reuse/mint via UTS discipline).
- Declare MinimalEvidence. For each characteristic: required lanes/carriers, freshness window, crossing allowances (if any), and explicit failure behavior wiring (tri-state semantics delegated to
G.Core). - Pin trust folding and penalties. Cite the single owner for
DefaultId.GammaFoldForR_effunless explicitly overridden with proof refs; publishΦ/CL policy ids explicitly. - Publish and register regression tests. Publish
CG‑Spec@UTSwith edition-pinned segments; register RSCR tests for the frame’s legality surfaces and evidence minima. - Lifecycle and refresh readiness. Declare refresh cadence and deprecations with lexical continuity notes; ensure RSCR trigger kinds are emitted as canonical ids.
Extensions (pattern-scoped; non-core)
All blocks below are GPatternExtension modules (PatternScopeId; not new PatternIds). They store wiring only and cite semantic owners.
GPatternExtension: ContractSurfaces
-
PatternScopeId:
G.0:Ext.ContractSurfaces -
GPatternExtensionId:
ContractSurfaces -
GPatternExtensionKind:
InteropSpecific -
SemanticOwnerPatternId:
A.19 -
Uses:
{A.19} -
⊑/⊑⁺:
∅ -
RequiredPins/EditionPins/PolicyPins (minimum):
CNSpecRef.edition(and any CN-side policy ids referenced byCG‑Specfields)
-
RSCRTriggerKindIds:
{RSCRTriggerKindId.EditionPinChange, RSCRTriggerKindId.PolicyPinChange, RSCRTriggerKindId.LegalitySurfaceEdit} -
Notes (wiring-only):
CG‑SpecSHALL cite CN‑Spec; it SHALL NOT restate normalization/comparability semantics.
GPatternExtension: BridgeAndCLWiring
-
PatternScopeId:
G.0:Ext.BridgeAndCLWiring -
GPatternExtensionId:
BridgeAndCLWiring -
GPatternExtensionKind:
InteropSpecific -
SemanticOwnerPatternId:
F.9 -
Uses:
{F.9, G.7} -
⊑/⊑⁺:
∅ -
RequiredPins/EditionPins/PolicyPins (minimum):
BridgeCardId/BridgeId(when crossings are permitted)CL/CL^kandΦ/Φ_planepolicy ids (when penalties are in play)
-
RSCRTriggerKindIds:
{RSCRTriggerKindId.CrossingBundleEdit, RSCRTriggerKindId.PolicyPinChange, RSCRTriggerKindId.ReferencePlaneEdit} -
Notes (wiring-only): Crossing semantics and penalty routing are delegated to
G.Core; this module only lists the required pins used byCG‑Specentries.
GPatternExtension: SoTAPaletteInputs
-
PatternScopeId:
G.0:Ext.SoTAPaletteInputs -
GPatternExtensionId:
SoTAPaletteInputs -
GPatternExtensionKind:
DisciplineSpecific -
SemanticOwnerPatternId:
G.2 -
Uses:
{G.2} -
⊑/⊑⁺:
∅ -
RequiredPins/EditionPins/PolicyPins (minimum):
SoTA-Pack@CG‑Framerefs used to justify comparator admissibility, evidence minima, and crossing allowances (e.g., claim sheets, operator inventory, bridge matrix ids)
-
RSCRTriggerKindIds:
{RSCRTriggerKindId.EvidenceSurfaceEdit, RSCRTriggerKindId.CrossingBundleEdit, RSCRTriggerKindId.FreshnessOrDecayEvent} -
Notes (wiring-only): Any SoTA palette/tradition semantics are owned by
G.2.G.0only requires thatCG‑Specentries cite the needed SoTA artefacts for auditability.
GPatternExtension: QDAndExplorationHooks
-
PatternScopeId:
G.0:Ext.QDAndExplorationHooks -
GPatternExtensionId:
QDAndExplorationHooks -
GPatternExtensionKind:
MethodSpecific -
SemanticOwnerPatternId:
C.18 -
Uses:
{C.18, C.19, C.23} -
⊑/⊑⁺:
∅ -
RequiredPins/EditionPins/PolicyPins (minimum):
DescriptorMapRef.edition?,DistanceDefRef.edition?,InsertionPolicyRef?FailureBehaviorPolicyId/ SoS‑LOG branch policy id whendegrade(mode=…)is used
-
RSCRTriggerKindIds:
{RSCRTriggerKindId.EditionPinChange, RSCRTriggerKindId.PolicyPinChange, RSCRTriggerKindId.TelemetryDelta, RSCRTriggerKindId.FreshnessOrDecayEvent} -
Notes (wiring-only):
CG‑Specmay declare optional QD/exploration hooks; semantics remain owned by the referenced method patterns.
Archetypal Grounding — Tell–Show–Show; System / Episteme
Archetype 1: System comparability under mixed evidence and unit constraints
Tell. Two labs compare energy efficiency results of a physical system where measurements use different rigs and units, and some evidence is missing.
Show (failure without CG‑Spec). The team averages an ordinal safety rating, mixes units (“kWh” vs “MJ”), and silently treats missing lanes as zeros. Cross-lab reuse happens without explicit bridge/loss notes, so selection becomes a black box.
Show (repair with CG‑Spec). A conformant CG‑Spec:
- pins the lawful comparator(s) (e.g., unit-aligned ratio comparisons only; ordinal comparisons are order-only),
- declares
MinimalEvidencelanes/carriers and freshness windows per characteristic, - declares explicit failure behavior wiring (tri-state semantics delegated to
G.Core), - exposes crossing pins (bridge ids + CL/policy ids) when reuse across rigs is attempted,
- publishes the pinned editions so parity/refresh can detect drift.
Archetype 2: Epistemic comparability for portfolio selection across traditions
Tell. A team selects an R&D portfolio using multiple evaluation traditions: safety assurance, cost models, and readiness heuristics.
Show (failure without CG‑Spec). The team collapses partial orders into a single score, hides the threshold policy in code, and cannot explain why cross-tradition penalties changed between runs.
Show (repair with CG‑Spec). A conformant CG‑Spec:
- defines a comparator portfolio (e.g., Pareto dominance + explicit lexicographic tiebreaks where lawful),
- pins
CNSpecRef.editionand the editioned segments (ComparatorSetRef.edition,SCPRef.edition,MinimalEvidenceRef.edition), - makes
AcceptanceStubsexplicit as templates while locating thresholds in CAL (G.4), - ensures RSCR triggers are emitted when comparator or policy pins change.
Bias-Annotation
CG‑Spec can encode (and therefore amplify) biases if authored carelessly:
- Tradition favoritism. Comparator choices may privilege a tradition’s evidence style; mitigation: require explicit evidence minima and explicit crossing costs, and keep cross-tradition aggregation gated by explicit justifications.
- Metric gaming and Goodhart effects. Overemphasis on a single scalar can lead to gaming; mitigation: preserve set-return semantics and require explicit, auditable scalarisations when they are lawful and intended.
- Hidden thresholds and opaque safety policy. Embedding acceptance thresholds in prose or code hides value judgments; mitigation: keep thresholds in CAL acceptance clauses and pin policy ids.
- Scope creep. Comparisons leak across describedEntity or reference planes; mitigation: require explicit
describedEntityandReferencePlanepins and treat plane moves as explicit crossing events.
Conformance Checklist (normative)
Common Anti-Patterns and How to Avoid Them
- Anti-pattern: shadow legality gates in downstream code. Avoid by requiring downstream to cite
CG‑Specsegments by id+edition. - Anti-pattern: “one number to rule them all”. Avoid by preserving set-return outputs when only partial orders are lawful; any scalarisation must be explicit, typed, and justified.
- Anti-pattern: thresholds inside CG‑Spec or CHR. Avoid by keeping thresholds and acceptance logic in CAL and citing from
CG‑Speconly via stubs/templates. - Anti-pattern: implicit crossings. Avoid by requiring explicit bridge ids, CL/policy ids, and reference-plane pins.
Consequences
- Lawful comparability. The frame declares exactly what can be compared/aggregated and under what constraints.
- Auditable selection. Downstream selectors can justify outcomes via pinned legality surfaces and explicit evidence minima.
- Explicit portability costs. Cross-context reuse becomes deliberate and costed via visible crossings and penalties.
- Lower drift under evolution. Edition pinning + typed RSCR triggers makes comparability drift detectable and refreshable.
Rationale
CG‑Spec centralises frame-level comparability constraints so that:
- CHR authorship (G.3) remains about measurement meaning rather than implicit thresholds,
- CAL (G.4) owns context-local acceptance/threshold policies and proof ledgers,
- selectors and dispatchers (G.5) remain policy-governed and auditable rather than encoding hidden legality assumptions,
- refresh (G.11) can treat legality edits and pin changes as explicit causes with canonical trigger ids.
SoTA‑Echoing
This pattern aligns with post‑2015 best practice in evaluation and governance by:
- treating “abstain / defer” as a first-class outcome rather than forcing a single brittle scalar (cf. selective prediction / abstention and set-valued reporting practices),
- preserving multiobjective / partial-order outputs as sets (Pareto / archive thinking) rather than silently collapsing to a scalar,
- emphasising reproducibility via explicit versioning/pinning of evaluation surfaces (editions) and explicit policy identifiers,
- making evidence minima explicit and auditable (a conceptual analogue of modern reproducibility/robustness checklists and evaluation protocols),
- keeping method-family specifics modular (e.g., QD/archives, open-ended exploration budgets) via explicit wiring to owner patterns rather than embedding method semantics into the universal legality gate.
Relations
Builds on: G.Core, A.19 (CN‑Spec), A.10 (evidence carriers), A.17–A.19 / C.16 (MM‑CHR legality), A.18 (CSLC), B.3 (trust / Γ‑fold family), F.* (contexts, bridges, CL, UTS), E.10 (lexical rules), E.5.* (notation independence discipline).
Used by: G.1 (generator guards), G.2 (harvesting constraints), G.3 (required CHR), G.4 (acceptance templates / proof hooks), G.5 (eligibility gates), G.6 (evidence/pin surfaces), and downstream parity/shipping/refresh where CG‑Spec is pinned.
Publishes to: UTS (Name Cards + editioned CG‑Spec segments).