Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint . 2026
License: CC BY
Data sources: ZENODO
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Assertion–Deferral Control Under Fixed Semantic Verification Constraints

Authors: Riaz, Asaad;

Assertion–Deferral Control Under Fixed Semantic Verification Constraints

Abstract

This paper develops a formal decision-theoretic framework for assertion–deferral control in autonomous systems operating under fixed semantic verification constraints. Building on prior work that established the existence, measurability, and identifiability limits of uncertifiable input mass (UIM) under finite auditing resources, this paper addresses the remaining open question: how a system should act optimally when a nonzero fraction of deployment inputs cannot be externally certified. Under an explicit non-recognizability assumption, the paper proves that uncertifiability is not merely a lower bound on achievable reliability but an equality constraint governing all implementable policies. The feasible policy space collapses from an oracle-level input selection problem to a one-dimensional rate-control frontier, where no internal strategy, retraining procedure, or confidence heuristic can improve certified performance at a fixed assertion rate unless the verification boundary itself is modified. Key contributions include: A proof of the implementability gap, showing that boundary-induced non-recognizability eliminates input-level selectivity and reduces control to assertion rate selection. Derivation of rate-optimal assertion–deferral policies under both constrained and cost-based objectives. Extension to robust control when uncertifiable input mass is only interval-identified due to noisy or partial audits, yielding minimax-safe operating guarantees. A formal demonstration that reliability improvements which do not alter the semantic verification boundary are structurally illusory at deployment scale. The results clarify the limits of internal optimization and recast reliability as an environmental and verification-access property rather than a purely learning-based one. The paper completes the grounding-limited reliability program’s analysis of optimal action, characterizing the full set of implementable assertion–deferral policies once grounding limits and audit uncertainty are taken as fixed, and motivates boundary-first system architectures in which expanding or restructuring verification resources is the primary lever for improving certifiable behavior.

Keywords

Artificial intelligence, Systems Engineering, Decision, Foundations of Artificial Intelligence, uncertifiable input mass, robust control under audit uncertainty, autonomous systems auditing, Artificial Intelligence/standards, abstention under uncertainty, interval identification, grounding-limited reliability, Decision Theory, Artificial Intelligence, Autonomous Systems, Reliability Engineering, assertion–deferral control, verification-access limits, Control Theory, semantic verification boundary, selective prediction limits, Artificial Intelligence/ethics, Control engineering, rate-control under uncertainty, non-recognizability, implementability limits, Verification and Validation, AI Safety, Uncertainty Quantification, deployment-level reliability, decision-theoretic safety

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
Related to Research communities