Nonangelic Concurrent Game Semantics
Abstract
The hiding operation, crucial in the compositional aspect of game semantics, removes computation paths not leading to observable results. Accordingly, games models are usually biased towards angelic nondeterminism: diverging branches are forgotten.
We present here new categories of games, not suffering from this bias. In our first category, we achieve this by avoiding hiding altogether; instead morphisms are uncovered strategies (with neutral events) up to weak bisimulation. Then, we show that by hiding only certain events dubbed inessential we can consider strategies up to isomorphism, and still get a category – this partial hiding remains sound up to weak bisimulation, so we get a concrete representations of programs (as in standard concurrent games) while avoiding the angelic bias. These techniques are illustrated with an interpretation of affine nondeterministic PCF which is adequate for weak bisimulation; and may, must and fair convergences.
1 Introduction
Game semantics represents programs as strategies for two player games determined by the types. Traditionally, a strategy is simply a collection of execution traces, each presented as a play (a structured sequence of events) on the corresponding game. Beyond giving a compositional framework for the formal semantics of programming languages, game semantics proved exceptionally versatile, providing very precise (often fully abstract) models of a variety of languages and programming features. One of its rightly celebrated achievements is the realisation that combinations of certain effects, such as various notions of state or control, could be characterised via corresponding conditions on strategies (innocence, well bracketing, ...) in a single unifying framework. This led Abramsky to propose the semantic cube programme [1], aiming to extend this success to further programming features: concurrency, nondeterminism, probabilities, etc...
However, this elegant picture soon showed some limitations. While indeed the basic category of games was successfully extended to deal with concurrency [10, 13], nondeterminism [11], and probabilities [9] among others, these extensions (although fully abstract) are often incompatible with each other, and really, incompatible as well with the central condition of innocence. Hence a semantic hypercube encompassing all these effects remained out of reach. It is only recently that some new progress has been made with the discovery that some of these effects could be reconciled in a more refined, more intensional games framework. For instance, in [6, 16] innocence is reconciled with nondeterminism, and in [15] with probabilities. In [7], innocence is reconciled with concurrency.
But something is still missing: the works above dealing with nondeterministic innocence consider only mayconvergence; they ignore execution branches leading to divergence. To some extent this seems to be a fundamental limitation of the game semantics methodology: at the heart of the composition of strategies lies the hiding operation that removes unobservable events. Diverging paths, by nature nonobservable, are forgotten by hiding. Some models of musttesting do exist for particular languages, notably McCusker and Harmer’s model for nondeterministic Idealized Algol [11]; the model works by annotating strategies with stopping traces, recording where the program may diverge. But this approach again mixes poorly with other constructions (notably innocence), and more importantly, is tied to may and must equivalences. It is not clear how it could be extended to support richer notions of convergence, such as fairtesting [2].
Our aim is to present a basis for nondeterministic game semantics which, besides being compatible with innocence, concurrency, etc., is not biased towards maytesting; it is nonangelic. It should not be biased towards musttesting either; it should in fact be agnostic with respect to the testing equivalence, and support them all. Clearly, for this purpose it is paramount to remember the nondeterministic branching information; indeed in the absence of that information, notions such as fairtesting are lost. In fact, there has been a lot of activity in the past five years or so around games model that do observe the branching information. It is a feature of Hirschowitz’s work presenting strategies as presheaves or sheaves on certain categories of cospans [12]; of Tsukada and Ong’s work on nondeterministic innocence via sheaves [16]; and of our own line of work presenting strategies as certain event structures [5, 7, 14].
But observing branching information is not sufficient. Of the works mentioned above, those of Tsukada and Ong and our own previous work are still angelic, because they rely on hiding for composition. On the other hand, Hirschowitz’s work gets close to achieving our goals; by refraining from hiding altogether, his model constructs an agnostic and precise representation of the operational behaviour of programs, on which he then considers fairtesting. But by not considering hiding he departs from the previous work and methods of game semantics, and from the methodology of denotational semantics. In contrast, we would like an agnostic games model that still has the categorical structure of traditional semantics. A games model with partial hiding was also recently introduced by Yamada [18], albeit for a different purpose: he uses partial hiding to represent normalization steps, whereas we use it to represent finegrained nondeterminism.
Contributions. In this paper, we present the first category of games and strategies equipped to handle nondeterminism, but agnostic with respect to the notion of convergence (including fair convergence). We showcase our model by interpreting \(\mathbf{APCF_+}\), an affine variant of nondeterministic PCF: it is the simplest language featuring the phenomena of interest. We show adequacy with respect to may, must and fair convergences. The reader will find in the first author’s PhD thesis [3] corresponding results for full nondeterministic PCF (with detailed proofs), and an interpretation of a higherorder language with shared memory concurrency. In [3], the model is proved compatible with our earlier notions of innocence, by establishing a result of full abstraction for may equivalence, for nondeterministic PCF. We have yet to prove full abstraction in the fair and must cases; finite definability does not suffice anymore.
Outline. We begin Sect. 2 by introducing \(\mathbf{APCF_+}\). To set the stage, we describe an angelic interpretation of \(\mathbf{APCF_+}\) in the category \({\mathbf {CG}}\) built in [14] with strategies up to isomorphism, and hint at our two new interpretations. In Sect. 3, starting from the observation that the cause of “angelism” is hiding, we omit it altogether, constructing an uncovered variant of our concurrent games, similar to that of Hirschowitz. Despite not hiding, when restricting the location of nondeterministic choices to internal events, we can still obtain a category up to weak bisimulation. But weak bisimulation is not perfect: it does not preserve musttesting, and is not easily computed. So in Sect. 4, we reinstate some hiding: we show that by hiding all synchronised events except some dubbed essential, we arrive at the best of both worlds. We get an agnostic category of games and strategies up to isomorphism, and we prove our adequacy results.
2 Three Interpretations of Affine Nondeterministic PCF
2.1 Syntax of \(\mathbf{APCF_+}\)
The first rule is multiplicative: \(\varGamma \) and \(\varDelta \) are disjoint. The operational semantics is that of PCF extended with the (only) two nondeterministic rules Open image in new window and Open image in new window .
2.2 Game Semantics and Event Structures
Game semantics interprets an open program by a strategy, recording the behaviour of the program (Player) against the context (Opponent) in a 2player game. Usually, the executions recorded are represented as plays, i.e. linear sequences of computational events called moves; a strategy being then a set of such plays. For instance, the nondeterministic boolean would be represented as the (evenprefix closure of the) set of plays \(\{\text {q}^ \cdot \mathtt {t\!t}^+, \text {q}^ \cdot \mathtt {f\!f}^+\}\) on the game for booleans. In the play \(\text {q}^ \cdot \mathtt {t\!t}^+\), the context starts the computation by asking the value of the program \((\text {q}^)\) and the program replies (\(\mathtt {t\!t}^+\)). Polarity indicates the origin (Program (\(+\)) or Opponent/Environment (−)) of the event.
In this picture, the usual chronological linear order is replaced by an explicit partial order representing causality. Moves are concurrent when they are incomparable (as the two Player questions here). Following the longstanding convention in game semantics, we show which component of the type a computational event corresponds to by displaying it under the corresponding occurrence of a ground type. For instance in this diagram, Opponent first triggers the computation by asking the output value, and then and concurrently evaluates his two arguments. The arguments having evaluated to \(\mathtt {t\!t}\), and can finally answer Opponent’s initial question and provide the output value.
In [7], we have shown how deterministic pure functional parallel programs can be interpreted (in a fully abstract way) using such representations.
2.3 Interpretations of \(\mathbf{APCF_+}\) with Event Structures
Let us introduce informally our interpretations by showing which event structures they associate to certain terms of \(\mathbf{APCF_+}\).
Hiding is crucial in order for composition to satisfy basic categorical properties (without it, the identity candidate, copycat, is not even idempotent). Strategies on event structures are usually considered up to isomorphism, which is the strongest equivalence relation that makes sense. Without hiding, there is no hope to recover categorical laws up to isomorphism. However, it turns out that, treating events in the middle as \(\tau \)transitions (\(*\) in Fig. 1a), weak bisimulation equates enough strategies to get a category. Following these ideas, a category of uncovered strategies up to weak bisimilarity is built in Sect. 3.
Interpretation with Partial Hiding. However, considering uncovered strategies up to weak bisimulation blurs their concrete nature; causal information is lost, for instance. Moreover checking for weak bisimilarity is computationally expensive, and because of the absence of hiding, a term evaluating to \(\mathbf {skip}\) may yield a very large representative. However, there is a way to cut down the strategies to reach a compromise between hiding no internal events, or hiding all of them and collapsing to an angelic interpretation.
In our games based on event structures, having a nonambiguous notion of an occurrence of event allows us to give a simple definition of the internal events we need to retain (Definition 9). Hiding other internal events yields a strategy still weakly bisimilar to the original (uncovered) strategy, while allowing us to get a category up to isomorphism. The interpretation of M in this setting appears in Fig. 1c. As before, only the events under the result type (not labelled \(*\)) are now visible, i.e. observable by a context. But the events corresponding to the argument evaluation are only partially hidden; those remaining are considered internal, treated like \(\tau \)transitions. Because of their presence, the partial hiding performed loses no information (w.r.t. the uncovered interpretation) up to weak bisimilarity. But we have hidden enough so that the required categorical laws between strategies hold w.r.t. isomorphism. The model is more precise and concrete than that of weak bisimilarity, preserves causal information and preserves mustconvergence (unlike weak bisimilarity).
Following these ideas, a category of partially covered strategies up to iso (the target of our adequacy results) is constructed in Sect. 4.
3 Uncovered Strategies up to Weak Bisimulation
We now construct a category of “uncovered strategies”, up to weak bisimulation. Uncovered strategies are very close to the partial strategies of [8], but [8] focused on connections with operational semantics rather than categorical structure.
3.1 Preliminaries on Event Structures
Definition 1

If \(e \in E\), the set \([e] = \{e' \in E \mid e' \le e \}\) is finite,

For all \(e \in E\), the set \(\{e\}\) is consistent,

For all \(Y \in \mathrm {Con}_E\), for all \(X \subseteq Y\), then \(X \in \mathrm {Con}_E\).

If \(X \in \mathrm {Con}_E\) and \(e \le e' \in X\) then \(X \cup \{e\}\) is consistent.
A downclosed subset of events whose finite subsets are all consistent is called a configuration. The set of finite configurations of E is denoted \(\mathscr {C}(E)\). If \(x \in \mathscr {C} (E)\) and \(e \not \in x\), we write Open image in new window when \(x' = x \cup \{e\} \in \mathscr {C} (E)\); this is the covering relation between configurations, and we say that e gives an extension of x. Two extensions e and \(e'\) of x are compatible when \(x \cup \{e, e'\} \in \mathscr {C} (E)\), incompatible otherwise. In the latter case, we have a minimal conflict between e and \(e'\) in context x (written Open image in new window ).
These event structures are based on consistent sets rather than the more commonlyencountered binary conflict relation. Consistent sets are more general, and more handy mathematically, but throughout this paper, event structures concretely represented in diagrams will only use binary conflict, i.e. the relation Open image in new window does not depend on x, meaning Open image in new window whenever y extends with e, and with \(e'\) – in which case we only write Open image in new window . Then consistent sets can be recovered as those finite \(X \subseteq E\) such that Open image in new window for all \(e, e'\in X\). Our diagrams display the relation Open image in new window , along with the Hasse diagram of \(\le _E\), called immediate causality and denoted by Open image in new window . All the diagrams above denote event structures. The missing ingredient in making the diagrams formal is the names accompanying the events (\(\mathbf {q}, \mathtt {t\!t}, \mathtt {f\!f}, \dots \)). These will arise as annotations by events from games, themselves event structures, representing the types.
The parallel composition \(E_0 \parallel E_1\) of event structures \(E_0\) and \(E_1\) has for events \((\{0\} \times E_0) \cup (\{1\} \times E_1)\). The causal order is given by \((i, e) \le _{E_0 \parallel E_1} (j, e')\) when \(i = j\) and \(e \le _{E_i} e'\), and consistent sets by those finite subsets of \(E_0 \parallel E_1\) that project to consistent sets in both \(E_0\) and \(E_1\).
A (partial) map of event structures \(f: A \rightharpoonup B\) is a (partial) function on events which (1) maps any finite configuration of A to a configuration of B, and (2) is locally injective: for \(a, a' \in x \in \mathscr {C} (A)\) and \(fa = fa'\) (both defined) then \(a = a'\). We write \(\mathscr {E}\) for the category of event structures and total maps and \(\mathscr {E}_\bot \) for the category of event structures and partial maps.
An event structure with partial polarities is an event structure A with a map \({ pol}: A \rightarrow \{, +, *\}\) (where events are labelled “negative”, “positive”, or “internal” respectively). It is a game when no events are internal. The dual \(A^\perp \) of a game A is obtained by reversing polarities. Parallel composition naturally extends to games. If x and y are configurations of an event structure with partial polarities we use \(x \subseteq ^p y\) where \(p \in \{, +, *\}\) for \( x \subseteq y~ \& ~{ pol}(y\setminus x) \subseteq \{p\}\).
Given an event structure E and a subset \(V \subseteq E\) of events, there is an event structure \(E \downarrow V\) whose events are V and causality and consistency are inherited from E. This construction is called the projection of E to V and is used in [14] to perform hiding during composition.
3.2 Definition of Uncovered Prestrategies
As in [14], we first introduce prestrategies and their composition, and then consider strategies, those prestrategies wellbehaved with respect to copycat.
Uncovered Prestrategies. An uncovered prestrategy on a game A is a partial map of event structures \(\sigma : S \rightharpoonup A\). Events in the domain of \(\sigma \) are called visible or external, and events outside invisible or internal. Via \(\sigma \), visible events inherit polarities from A.
Uncovered prestrategies are drawn just like the usual strategies of [14]: the event structure S has its events drawn as their labelling in A if defined or \( *\) if undefined. The drawing of Fig. 1a is an example of an uncovered prestrategy. From an (uncovered) prestrategy, one can get a prestrategy in the sense of [14]: for \( \sigma : S \rightharpoonup A\), define \(S_\downarrow = S \downarrow \text {dom}(\sigma )\) where \(\text {dom}(\sigma )\) is the domain of \( \sigma \). By restriction \( \sigma \) yields \( \sigma _\downarrow : S_\downarrow \rightarrow A\), called a covered prestrategy. A configuration x of S can be decomposed as the disjoint union \(x_\downarrow \cup x_*\) where \(x_\downarrow \) is a configuration of \(S_\downarrow \) and \(x_*\) a set of internal events of S.
A prestrategy from a game A to a game B is a (uncovered) prestrategy on \(A^\perp \parallel B\). An important prestrategy from a game A to itself is the copycat prestrategy. In \(A^\perp \parallel A\), each move of A appears twice with dual polarity. The copycat prestrategy \(\ c\!\!\!\!c\,_A\) simply waits for the negative occurrence of a move a before playing the positive occurrence. See [5] for a formal definition.
Isomorphism of strategies [14] can be extended to uncovered prestrategies:
Definition 2
Prestrategies \( \sigma : S \rightharpoonup A, \tau : T \rightharpoonup A\) are isomorphic (written \( \sigma \cong \tau \)) if there is an iso \( \varphi : S \cong T\) s.t. \( \tau \circ \varphi = \sigma \) (equality of partial maps).
Interaction of Prestrategies. Recall that in the covered case, composition is performed first by interaction, then hiding; where interaction of prestrategies is described as their pullback in the category of total maps [14]. Even though \(\mathscr {E}_\bot \) has pullbacks, those pullbacks are inadequate to describe interaction. In [8], uncovered strategies are seen as total maps \(\sigma : S \rightarrow A \parallel N\), and their interaction as a pullback involving these. This method has its awkwardness so, instead, here we give a direct universal construction of interaction, replacing pullbacks.
We start with the simpler case of a closed interaction of a prestrategy Open image in new window against a counter prestrategy Open image in new window . As in [5] we first describe the expected states of the closed interaction in terms of secured bijections, from which we construct an event structure; before characterising the whole construction via a universal property.
Definition 3
Definition 4

events: those interaction states (x, y) such that \( \varphi _{x, y}\) has a top element,

causality: \((x, y) \le _{S\wedge T} (x', y')\) iff \(x \subseteq x'\) and \(y \subseteq y'\),

consistency: a finite set of interaction states \(X \subseteq S \wedge T\) is consistent iff its union \(\bigcup X\) is an interaction state in \(\mathscr {S}_{ \sigma , \tau }\).
This event structure comes with partial maps \( \varPi _1 : S \wedge T \rightharpoonup S\) and \( \varPi _2 : S \wedge T \rightharpoonup T\), analogous to the usual projections of a pullback: for \((x, y) \in S \wedge T\), \( \varPi _1(x, y)\) is defined to \(s \in S\) whenever the topelement of \( \varphi _{x, y}\) is \(((0, s), w_2)\) for some \(w_2 \in x_ {_*} \parallel y \). The map \( \varPi _1\) is undefined only on events of \(S \wedge T\) corresponding to internal events of T (i.e. (x, y) with top element of \(\varphi _{x,y}\) of the form ((1, t), (1, t))). The map \(\varPi _2\) is defined symmetrically, and undefined on events corresponding to internal events of S. We write \( \sigma \wedge \tau \) for \( \sigma \circ \varPi _1 = \tau \circ \varPi _2 : S \wedge T \rightharpoonup A\).
Lemma 1
If for all \(p \in X\) with \(f\,p\) and \(g\,p\) defined, \( \sigma (f\, p) = \tau (g\, p)\) is defined, then there exists a unique \( \langle f, g \rangle : X \rightharpoonup S \wedge T\) making the two upper triangles commute.
Weak Bisimulation. To compare uncovered prestrategies, we cannot use isomorphisms as in [14], since as hinted earlier, \(\ c\!\!\!\!c\,_A \circledast \sigma \) comprises synchronised events not corresponding to those in \(\sigma \). To solve this, we introduce weak bisimulation between uncovered strategies:
Definition 5

If Open image in new window such that s is visible, then there exists Open image in new window with \( \sigma s = \tau t\) and \(x'\,{\mathscr {R}}\,y''\) (and the symmetric condition for \( \tau \))

If Open image in new window such that s is internal, then there exists \(y \subseteq ^{*} y'\) such that \(x'\,{\mathscr {R}}\,y'\) (and the symmetric condition for \( \tau \))
Two uncovered prestrategies \( \sigma , \tau \) are weakly bisimilar (written \( \sigma \simeq \tau \)) when there is a weak bisimulation between them.
Associativity of interaction (up to isomorphism, hence up to weak bisimulation) follows directly from Lemma 1. Moreover, it is straightforward to check that weak bisimulation is a congruence (i.e. compatible with composition).
Composition of Covered Strategies. From interaction, we can easily define the composition of covered strategies. If \( \sigma : S \rightarrow A^\perp \parallel B\) and \( \tau : T \rightarrow B^\perp \parallel C\) are covered prestrategies, their composition (in the sense of [14]) \( \tau \odot \sigma \) is defined as \(( \tau \circledast \sigma )_{\downarrow }\). The operation \( \downarrow \) is wellbehaved with respect to interaction:
Lemma 2
For \( \sigma , \tau \) composable prestrategies, \(( \tau \circledast \sigma )_{\downarrow } \cong \tau _{\downarrow } \odot \sigma _{\downarrow }.\)
3.3 A CompactClosed Category of Uncovered Strategies
Although we have a notion of morphism (prestrategies) between games and an associative composition, we do not have a category up to weak bisimulation yet. Unlike in [14], races in a game may cause copycat on this game to not be idempotent (see [3] for a counterexample), which is necessary for it to be an identity. To ensure that, we restrict ourselves to racefree games: those such that whenever a configuration x can be extended by \(a_1, a_2\) of distinct polarities, the union \(x \cup \{a_1, a_2\}\) is consistent. From now on, games are assumed racefree.
Lemma 3
For a racefree game A, \(\ c\!\!\!\!c\,_A \circledast \ c\!\!\!\!c\,_A \simeq \ c\!\!\!\!c\,_A\).
Proof
It will follow from the forthcoming Lemma 4.
Uncovered Strategies. Finally, we characterise the prestrategies invariant under composition with copycat. The two ingredients of [5, 14], receptivity and courtesy (called innocence in [14]) are needed, but this is not enough: we need another condition as witnessed by the following example.
Consider the strategy Open image in new window on the game \(A = \oplus _1\, \oplus _2\) playing nondeterministically one of the two moves. Then the interaction \(\ c\!\!\!\!c\,_A \circledast \sigma \) is:
It is not weakly bisimilar to \(\sigma \): \(\ c\!\!\!\!c\,_A \circledast \sigma \) can do \(*_1\), an internal transition, to which \( \sigma \) can only respond by not doing anything. Then \( \sigma \) can still do \( \oplus _1\) and \( \oplus _2\) whereas \(\ c\!\!\!\!c\,_A \circledast \sigma \) cannot: it is committed to doing \( \oplus _1\). To solve this problem, we need to force strategies to decide their nondeterministic choices secretly, by means of internal events – so \(\sigma \) will not be a valid uncovered strategy, but \(\ c\!\!\!\!c\,_A \circledast \sigma \) will. Indeed, \(\ c\!\!\!\!c\,_A \circledast (\ c\!\!\!\!c\,_A \circledast \sigma )\) below is indeed weakly bisimilar to \(\ c\!\!\!\!c\,_A \circledast \sigma \).
Definition 6

receptivity: if Open image in new window is such that Open image in new window with \(a \in A\) negative, then there exists a unique Open image in new window with \( \sigma s = a\).

courtesy: if Open image in new window and s is positive or \(s'\) is negative, then Open image in new window .

secrecy: if \(x \in \mathscr {C} (S)\) extends with \(s_1, s_2\) but \(x\cup \{s_1, s_2\} \not \in \mathscr {C}(S)\), then \(s_1\) and \(s_2\) are either both negative, or both internal.
Receptivity and courtesy are stated exactly as in [14]. As a result, hiding the internal events of an uncovered strategy yields a strategy \(\sigma _\downarrow \) in the sense of [14].
For any game A, \(\ c\!\!\!\!c\,_A\) is an uncovered strategy: it satisfies secrecy as its only minimal conflicts are inherited from the game and are between negative events.
The Category \({\mathbf {CG}}_{\circledast }\) . Our definition of uncovered strategy does imply that copycat is neutral for composition.
Lemma 4
Let \( \sigma : S \rightharpoonup A\) be an uncovered strategy. Then \(\ c\!\!\!\!c\,_A \circledast \sigma \simeq \sigma \).
The result follows immediately:
Theorem 1
Racefree games and uncovered strategies up to weak bisimulation form a compactclosed category \(\mathbf {CG}_{ \circledast }\).
3.4 Interpretation of Affine Nondeterministic PCF
From now on, strategies are by default considered uncovered. We sketch the interpretation of \(\mathbf{APCF_+}\) inside \(\mathbf {CG}_{ \circledast }\). As a compactclosed category, \(\mathbf {CG}_{ \circledast }\) supports an interpretation of the linear \( \lambda \)calculus. However, the empty game 1 is not terminal, as there are no natural transformation \( \epsilon _A : A \rightarrow 1\) in \(\mathbf {CG}_{ \circledast }\).
The negative category \({ \mathbf {CG}}^_{ \circledast }\). We solve this issue as in [4], by looking at negative strategies and negative games.
Definition 7
An event structure with partial polarities is negative when all its minimal events are negative.
A strategy \(\sigma : S \rightharpoonup A\) is negative when S is. Copycat on a negative game is negative, and negative strategies are stable under composition:
Lemma 5
There is a subcategory \({{\varvec{CG}}}^_{ \circledast }\) of \({{\varvec{CG}}}_\circledast \) consisting in negative racefree games and negative strategies. It inherits a monoidal structure from \({{\varvec{CG}}}\) in which the unit (the empty game) is terminal.
Moreover, \(\mathbf {CG}^_\circledast \) has products. The product Open image in new window of two games A and B, has events, causality, polarities as for \(A\parallel B\), but consistent sets restricted to those of the form \(\{0\} \times X\) or \(\{1\} \times X\) with X consistent in A or B. The projections are Open image in new window , and Open image in new window .
Finally, the pairing of negative strategies \(\sigma : S \rightharpoonup A^\perp \parallel B\) and \(\tau : T \rightarrow A^\perp \parallel C\) is the obvious map Open image in new window , and the laws for the cartesian product are direct verifications.
We also need a construction to interpret the function space. However, for A and B negative, \(A^\perp \parallel B\) is not usually negative. To circumvent this, we introduce a negative variant \(A \multimap B\), the linear arrow. To simplify the presentation, we only define it in a special case. A game is wellopened when it has at most one initial event. When B is wellopened, we define \(A \multimap B\) to be 1 if \(B = 1\); and otherwise \(A^\perp \parallel B\) with the exception that every move in A depends on the single minimal move in B. As a result \( \multimap \) preserves negativity. We get:
Lemma 6
If B is wellopened, \(A \multimap B\) is wellopened and is an exponential object of A and B.
Interpretation of Terms. Interpretation of the affine \( \lambda \)calculus in \(\mathbf {CG}_^\circledast \) follows standard methods. First, the primitives \(\mathtt {t\!t}, \mathtt {f\!f}, \bot , \mathtt {if}\) are interpreted as:
Definition 8
 Events:

An initial event \(\bot \) plus one event per derivation \(M \rightarrow ^* M'\).
 Causality:

\(\bot \) is below other events, and derivations are ordered by prefix
 Consistency:

A set of events is consistent when its events are comparable.
 Labelling:

\(\bot \) has label \(\text {q}\), a derivation \(M \rightarrow ^* b\) where \(b \in \{\mathtt {t\!t}, \mathtt {f\!f}\}\) is labelled by b. Other derivations are internal.
As a result, \(\mathfrak t(M)\) is a tree. Our main result of adequacy can now be stated:
Theorem 2
For a term Open image in new window and \( \llbracket M \rrbracket _{\circledast }\) are weakly bisimilar.
We need to consider Open image in new window and not simply \(\mathfrak t(M)\) to ensure secrecy. From this theorem, adequacy results for may and fair convergences arise:
Corollary 1
 May:

\(M \rightarrow ^* \mathtt {t\!t}\) if and only if \( \llbracket M \rrbracket _{ \circledast }\) contains a positive move
 Fair:

For all \(M \rightarrow ^* M'\), \(M'\) can converge, if and only if all finite configurations of \( \llbracket M' \rrbracket _{ \circledast }\) can be extended to contain a positive move.
However, we cannot conclude adequacy for must equivalence from Theorem 2. Indeed, must convergence is not generally stable under weak bisimilarity: for instance, (the strategies representing) \(\mathtt {t\!t}\) and Open image in new window are weakly bisimilar but the latter is not must convergent. To address this in the next section we will refine the interpretation to obtain a closer connection with syntax.
4 Essential Events
The model presented in the previous section is very operational; configurations of \( \llbracket M \rrbracket _{ \circledast }\) can be seen as derivations for an operational semantics. The price, however, is that besides the fact that the interpretation grows dramatically in size, we can only get a category up to weak bisimulation, which can be too coarse (for instance for must convergence). We would like to remove all events that are not relevant to the behaviour of terms up to weak bisimulation. In other words, we want a notion of essential internal events that (1) suffices to recover all behaviour with respect to weak bisimulation, but which (2) is not an obstacle to getting a category up to isomorphism (which amounts to \(\ c\!\!\!\!c\,_A \circ \sigma \cong \sigma \)).
4.1 Definition of Essential Events
As shown before, the loss of behaviours when hiding is due to the disappearance of events participating in a conflict. A neutral event may not have visible consequences but still be relevant if in a minimal conflict; such events are essential.
Definition 9
Let \( \sigma : S \rightharpoonup A\) be an uncovered prestrategy. An essential event of S is an event s which is either visible, or (internal and) involved in a minimal conflict (that is such that we have Open image in new window for some \(s', x\)).
Write \(E_S\) for the set of essential events of \( \sigma \). Any prestrategy \( \sigma : S \rightharpoonup A\) induces another prestrategy \( \mathscr {E}(\sigma ) : \mathscr {E}(S) = S \downarrow E_S \rightharpoonup A \) called the essential part of \( \sigma \). The following proves that our definition satisfies (1): no behaviour is lost.
Lemma 7
An uncovered prestrategy \( \sigma : S \rightharpoonup A\) is weakly bisimilar to \(\mathscr {E}(\sigma )\).
This induces a new notion of (associative) composition only keeping the essential events. For \( \sigma : A^\perp \parallel B\) and \( \tau : B^\perp \parallel C\), let \( \tau \circledcirc \sigma = \mathscr {E} ( \tau \circledast \sigma )\). We observe that \(\mathscr {E}( \tau \circledast \sigma ) \cong \mathscr {E}(\tau ) \circledcirc \mathscr {E}(\sigma )\).
Which prestrategies compose well with copycat with this new composition?
4.2 Essential Strategies
We now can state property (2): the events added by composition with copycat are inessential, hence hidden during composition:
Theorem 3
Let \( \sigma : S \rightharpoonup A\) be an uncovered strategy. Then \(\ c\!\!\!\!c\,_A \circledcirc \sigma \cong \mathscr {E}(\sigma )\).
This prompts the following definition. An uncovered prestrategy \(\sigma \) is essential when it is a strategy, and if, equivalently: (1) all its events are essential, (2) \( \sigma \cong \mathscr {E} ( \sigma )\). We obtain a characterisation of strategies in the spirit of [14]:
Theorem 4
A prestrategy \( \sigma : S \rightharpoonup A\) is essential if and only if \(\ c\!\!\!\!c\,_A \circledcirc \sigma \cong \sigma \).
As a result, we get:
Theorem 5
Racefree games, and essential strategies up to isomorphism form a compactclosed category \({{\varvec{CG}}}_{ \circledcirc }\).
Relationship Between \(\mathbf {CG}\) and \(\mathbf {CG}_{ \circledcirc }\). Covered strategies can be made into a compactclosed category [5, 14]. Remember that the composition of \( \sigma : S \rightarrow A^\perp \parallel B\) and \( \tau : T \rightarrow B^\perp \parallel C\) in \(\mathbf {CG}\) is defined as \( \tau \odot \sigma = ( \tau \circledast \sigma )_ \downarrow \).
Lemma 8
The operation \( \sigma \mapsto \sigma _\downarrow \) extends to an identityonobject functor \({{\varvec{CG}}}_{ \circledcirc } \rightarrow {{\varvec{CG}}}_{}\).
In the other direction, a strategy \(\sigma :A\) might not be an essential strategy; in fact it might not even be an uncovered strategy, as it may fail secrecy. Sending \(\sigma \) to \(\ c\!\!\!\!c\,_A \circledcirc \sigma \) delegates the nondeterministic choices to internal events and yields an essential strategy, but this operation is not functorial.
Relationship Between \(\mathbf {CG}_{ \circledcirc }\) and \(\mathbf {CG}_{\circledast }\). The forgetful operation mapping an essential strategy \( \sigma \) to itself, seen as an uncovered strategy, defines a functor \(\mathbf {CG}_{\circledcirc } \rightarrow \mathbf {CG}_{\circledast }\). Indeed, if two essential strategies are isomorphic, they are also weakly bisimilar. Moreover, we have that \( \tau \circledast \sigma \simeq \mathscr {E}( \tau \circledast \sigma ) = \tau \circledcirc \sigma \). However the operation \(\mathscr {E}(\cdot )\) does not extend to a functor in the other direction even though \(\mathscr {E}( \tau ) \circledcirc \mathscr {E} ( \sigma ) \cong \mathscr {E}( \tau \circledast \sigma )\), as it is defined only on concrete representatives, not on equivalence classes for weak bisimilarity.
4.3 Interpretation of \(\mathbf{APCF_+}\)
We now show that this new category also supports a sound and adequate interpretation of \(\mathbf{APCF_+}\) for various testing equivalences, including must. As before, we need to construct the category of negative games and strategies.
Lemma 9
There is a cartesian symmetric monoidal category \({{\varvec{CG}}}^_{ \circledcirc }\) of negative racefree games and negative essential strategies up to isomorphism. Wellopened negative racefree games form an exponential ideal of \({{\varvec{CG}}}^_{ \circledcirc }\).
Theorem 6
For all terms \( \vdash M : \mathbb {B}\), \(\mathscr {E}(\mathfrak t(M)) \cong \llbracket M \rrbracket _{\circledcirc }\).
Theorem 6 implies Theorem 2. It also implies adequacy for must:
Corollary 2
The interpretation \( \llbracket \cdot \rrbracket _{\circledcirc }\) is adequate for may, and fair, and must: \( \vdash M : \mathbb {B}\) has no infinite derivations if and only if all (possibly infinite) maximal configurations of \( \llbracket M \rrbracket _{ \circledcirc }\) have a positive event.
This result also implies that \( \llbracket \cdot \rrbracket _{ \circledast }\) is adequate for must.
5 Conclusion
We have described an extension of the games of [14] to uncovered strategies, composed without hiding. It has strong connections with operational semantics, as the interpretations of terms of base type match their tree of reductions. It also forms a compactclosed category up to weak bisimulation, and is adequate for the denotational semantics of programming languages. Identifying the inessential events as those responsible for the nonneutrality of copycat, we remove them to yield a compact closed category up to isomorphism. Doing so we obtain our soughtafter setting for the denotational semantics of programming languages, one agnostic w.r.t. the chosen testing equivalence. The work blends well with the technology of [7] (symmetry, concurrent innocence) dealing with nonaffine languages and characterising strategies corresponding to pure programs; these developments appear in the first author’s PhD thesis [3].
Notes
Acknowledgements
We gratefully acknowledge the support of the ERC Advanced Grant ECSYM, EPSRC grants EP/K034413/1 and EP/K011715/1, and LABEX MILYON (ANR10LABX0070) of Université de Lyon, within the program “Investissements d’Avenir” (ANR11IDEX0007) operated by the ANR.
References
 1.Abramsky, S.: Game semantics for programming languages. In: Prívara, I., Ružička, P. (eds.) MFCS 1997. LNCS, vol. 1295, pp. 1–4. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0029944CrossRefGoogle Scholar
 2.Brinksma, E., Rensink, A., Vogler, W.: Fair testing. In: Lee, I., Smolka, S.A. (eds.) CONCUR 1995. LNCS, vol. 962, pp. 313–327. Springer, Heidelberg (1995). https://doi.org/10.1007/3540602186_23CrossRefGoogle Scholar
 3.Castellan, S.: Concurrent structures in game semantics. Ph.D. thesis, ENS Lyon, France (2017)Google Scholar
 4.Castellan, S., Clairambault, P.: Causality vs. interleaving in game semantics. In: CONCUR 2016  Concurrency Theory (2016)Google Scholar
 5.Castellan, S., Clairambault, P., Rideau, S., Winskel, G.: Games and strategies as event structures. Log. Methods Comput. Sci. 13 (2017)Google Scholar
 6.Castellan, S., Clairambault, P., Winskel, G.: Symmetry in concurrent games. In: Henzinger, T.A., Miller, D. (eds.) CSLLICS 2014, Vienna, Austria, July 14–18, 2014, p. 28. ACM (2014)Google Scholar
 7.Castellan, S., Clairambault, P., Winskel, G.: The parallel intensionally fully abstract games model of PCF. In: LICS 2015. IEEE Computer Society (2015)Google Scholar
 8.Castellan, S., Hayman, J., Lasson, M., Winskel, G.: Strategies as concurrent processes. Electr. Notes Theor. Comput. Sci. 308, 87–107 (2014)MathSciNetCrossRefGoogle Scholar
 9.Danos, V., Harmer, R.: Probabilistic game semantics. In: 15th Annual IEEE Symposium on Logic in Computer Science, Santa Barbara, California, USA, 26–29 June 2000, pp. 204–213 (2000)Google Scholar
 10.Ghica, D.R., Murawski, A.S.: Angelic semantics of finegrained concurrency. Ann. Pure Appl. Log. 151(2–3), 89–114 (2008)MathSciNetCrossRefGoogle Scholar
 11.Harmer, R., McCusker, G.: A fully abstract game semantics for finite nondeterminism. In: 14th Annual IEEE Symposium on Logic in Computer Science, Trento, Italy, 2–5 July 1999, pp. 422–430 (1999)Google Scholar
 12.Hirschowitz, T.: Full abstraction for fair testing in CCS. In: Heckel, R., Milius, S. (eds.) CALCO 2013. LNCS, vol. 8089, pp. 175–190. Springer, Heidelberg (2013). https://doi.org/10.1007/9783642402067_14CrossRefMATHGoogle Scholar
 13.Laird, J.: A game semantics of idealized CSP. Electr. Notes Theor. Comput. Sci. 45, 232–257 (2001)CrossRefGoogle Scholar
 14.Rideau, S., Winskel, G.: Concurrent strategies. In: LICS, pp. 409–418. IEEE Computer Society (2011)Google Scholar
 15.Tsukada, T., Luke Ong, C.H.: Innocent strategies are sheaves over plays  deterministic, nondeterministic and probabilistic innocence. CoRR, abs/1409.2764 (2014)Google Scholar
 16.Tsukada, T., Luke Ong, C.H.: Nondeterminism in game semantics via sheaves. In: 30th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2015, Kyoto, Japan, 6–10 July 2015, pp. 220–231 (2015)Google Scholar
 17.Winskel, G.: Event structures. In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) ACPN 1986. LNCS, vol. 255, pp. 325–392. Springer, Heidelberg (1987). https://doi.org/10.1007/3540179062_31CrossRefGoogle Scholar
 18.Yamada, N., Abramsky, S.: Dynamic games and strategies. CoRR, abs/1601.04147 (2016)Google Scholar
Copyright information
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.