Arbitration as Semantic Event
by Nick Clark | Published March 27, 2026
An arbitration event arises whenever two or more credentialed skills compete for the same scope of action within an agent's cognitive cycle. The cognition patent specifies arbitration not as an internal heuristic but as a first-class structural event: each contending skill is ranked under a declared policy, the selected skill is admitted, the rejected skills are recorded with the grounds for their rejection, and the entire arbitration is anchored in the agent's lineage as an auditable artifact. The arbitration policy may be deterministic or non-deterministic, but in either embodiment the result is fully audited — non-determinism is permitted only where its sampling parameters and outcome are themselves recorded.
Mechanism
Within the LLM skill-gating subsystem, multiple skills may be admitted by the gating layer for a given task — a planner, a tool-using agent, a retrieval skill, a generative skill — each holding a credential that licenses it to operate within some scope. The cognitive cycle reaches a point at which one and only one skill must take action over a particular scope: emit a tool call, mutate a canonical field, commit a planning step. When more than one credentialed skill claims that scope, an arbitration event is constructed.
The arbitration event is a structured record. It enumerates the competing skills, the credential each holds, the scope each claims, and the proposal each has produced. The arbitration policy — itself a credentialed artifact in the policy reference — defines a ranking function over competitors. The ranking function consumes declared inputs: the credential strength of each competitor, the lineage-weighted prior performance of each within the relevant scope, the explicit priority clauses in policy, and where applicable a stochastic component drawn from a seed that is itself recorded. The ranking produces a total order; the top-ranked competitor is admitted, lower-ranked competitors are rejected, and the rejection lineage records the score gap and the policy clause that governed the decision.
The event is anchored. Anchoring means the arbitration record is committed to the agent's lineage with a content-addressed reference, such that the decision cannot be revised silently and any later replay reconstructs the same input set. Anchoring is what distinguishes a structural arbitration event from an ad-hoc selection: the event is durable, reviewable, and citable. Downstream consumers — the validation engine that checks the admitted skill's output, the regulator with credentialed read-access, the operator running a post-hoc audit — read the arbitration record as a primary artifact, not as a debug log.
Operating Parameters
The arbitration event exposes a parameter surface declared in policy. The ranking function is selected from a declared set: lexicographic priority, weighted-sum scoring, threshold-with-tiebreak, or stochastic sampling under a declared distribution. The credential-strength weighting determines how the policy weights the credential clause relative to performance history; the prior-performance window declares how far back the lineage is read. Tiebreaker clauses declare deterministic resolution when scores are equal: typically credential-issue-time, lexicographic skill identifier, or a seeded random draw whose seed is recorded in the event.
Non-deterministic policies are admissible. Where the operator wishes to permit stochastic skill selection — to encourage exploration, to break correlated failure modes, to load-balance across equivalently credentialed competitors — the policy may declare a sampling distribution. The structural requirement is that the seed, the distribution, and the realized draw all appear in the arbitration record. A non-deterministic arbitration is fully audited: an external reviewer reading the lineage can confirm that the draw was consistent with the declared distribution and that the selection was not silently biased.
Scope parameters define the granularity at which arbitration triggers. A coarse scope (any tool call) produces frequent arbitration; a fine scope (a particular field of a particular canonical record) produces rarer, more targeted arbitration. The scope predicate is part of the policy and is recorded in each event. Timeout parameters bound how long arbitration may take before the cognitive cycle falls back to a declared default — typically a no-op or a credentialed safe action — with the timeout itself recorded as a structural insufficiency event.
Alternative Embodiments
The mechanism admits embodiments that vary in ranking-function form, scope granularity, and execution topology while preserving the structural contract. A deterministic-priority embodiment uses lexicographic credential precedence and is appropriate where regulatory regimes require fully determinate behavior. A weighted-score embodiment combines credential strength with lineage-weighted performance and is appropriate where the operator wishes to reward demonstrated competence. A stochastic embodiment samples from credentialed competitors under a declared distribution and is appropriate where exploration or load-balancing is the goal. Hybrid embodiments compose these — a deterministic gate followed by stochastic tiebreak among equally-ranked finalists — under composite policy clauses each recorded in the event.
Execution topology may be local or distributed. In a local embodiment the arbitration runs within the agent process; in a distributed embodiment a credentialed arbitration authority external to the agent receives the competing proposals, performs the ranking, and returns the admitted selection as a credentialed observation. Both embodiments produce the same structural event; the topology differs in where the ranking function is evaluated and in how the lineage anchor is constructed. Cross-agent arbitration — in which credentialed peers compete to act over a shared scope — is supported as an extension of the same mechanism with the arbitration authority elevated to the inter-agent layer.
The mechanism extends beyond LLM skills. Any plurality of credentialed actors competing for shared scope — tool-using agents, retrieval engines, classical planners, embedded heuristics — admits the same arbitration treatment. The disclosure does not depend on the actors being language models; it depends on the actors being credentialed and the contention being over a structural scope.
Composition with Adjacent Primitives
Arbitration sits between gating and validation in the cognitive pipeline. The gating layer admits a set of skills as eligible to operate; arbitration selects from among contending eligibles when scope contention occurs; validation evaluates the admitted skill's output against constraint clauses. The arbitration record feeds validation as evidence — a validator reading the candidate state can cite the arbitration that produced it, and a validation rejection produces a counter-event that is itself anchored and that can trigger re-arbitration with the rejected competitor's score adjusted under the declared policy.
Forecasting interacts with arbitration through the prior-performance input: each skill's lineage-weighted historical outcomes within the relevant scope inform its ranking weight. A skill whose prior actions were validated and produced anchored beneficial outcomes accumulates ranking weight; a skill whose prior actions were rejected or produced anchored adverse outcomes loses ranking weight. The performance signal is itself a credentialed observation drawn from the agent's lineage rather than an opaque metric, and it is read under the same admissibility policy that governs other credentialed observations.
Mutation, the final cognitive stage, consumes the admitted skill's proposal and merges it into candidate state. The arbitration anchor is referenced from the mutation record so that the chain from contention through ranking through admission through mutation is traceable end-to-end. The composite chain is what the regulator audits; the structural arbitration event is the link that makes the chain coherent.
Prior-Art Distinction
Conventional approaches to multi-skill or multi-tool selection in language-model agents fall into two families. The first uses a router model — itself an LLM — that emits a free-text skill selection without producing a structural record of competitors, scores, or grounds. The decision is opaque, non-replayable, and not anchored. The second uses heuristic priority lists or hand-coded dispatch tables that select deterministically but produce no event-level artifact: the selection is implicit in the code path rather than explicit in the lineage. Neither family produces an audited arbitration event in the structural sense the patent requires.
Multi-armed bandit and reinforcement-learning skill selectors share part of the structure — they may record exploration draws and policy parameters — but they do not anchor each selection as a content-addressed lineage event tied to credential clauses, do not enumerate rejected competitors with grounds, and do not expose the rejection lineage to downstream validation and audit. The novelty is the structural elevation of selection to a first-class, credentialed, anchored, audited event with full provenance of competitors and rejection grounds, applicable to deterministic and non-deterministic policies alike.
Audit Trail and Replay
The arbitration record is constructed to support replay. Replay means an external auditor, given the lineage substrate and the credentialed policy reference, can reconstruct the arbitration end-to-end: enumerate the competing skills, recompute their scores under the recorded policy version, verify that the admitted skill is the one the policy ranks first, and confirm that any stochastic component was drawn under the recorded seed and distribution. Replay does not require access to the agent's runtime, the skills' internal state, or the operator's proprietary infrastructure; it requires only the credentialed lineage and the credentialed policy.
The audit trail anchors at multiple credential authorities. The arbitration policy is anchored at the operator's policy authority; the credentials of competing skills are anchored at the skill-issuance authority; the agent's lineage substrate is anchored at the agent operator's root. A regulator with credentialed read-access traverses the multi-anchor chain to verify that no element of the arbitration was produced under an unauthorized authority. The audit trail thereby distinguishes legitimate arbitration from any later attempt to fabricate or revise the record: a fabricated arbitration would either fail anchor verification at one of the authorities or would require compromise of multiple independent authorities to construct.
Replay also supports counterfactual analysis. An operator investigating a downstream failure may replay the arbitration under hypothetical alternative policies — what would the admitted skill have been under a different ranking function, a different credential weighting, a different seed — to assess whether the failure was attributable to the arbitration policy or to factors external to it. The counterfactual replays are themselves recorded as analysis events anchored to the original arbitration so that the counterfactual investigation is itself auditable.
Failure Handling and Re-Arbitration
Arbitration may produce an admission whose downstream validation rejects the admitted skill's output. The patent specifies re-arbitration as the structural response: the validation rejection produces a counter-event referenced from the original arbitration, and the arbitration policy is invoked again over the original competitor set with the rejected skill's score adjusted under the declared penalty clause. Re-arbitration is itself anchored as a distinct event so that the chain — arbitration, admission, validation rejection, re-arbitration, second admission — is fully traceable. Bounded retry parameters cap the number of re-arbitrations before a structural insufficiency event is raised and a credentialed safe action is taken.
Skill exhaustion, in which all eligible competitors have been admitted and rejected within the cycle's retry budget, is not silently tolerated. The exhaustion is anchored as an insufficiency event whose grounds enumerate each rejected competitor and the validation reason for each. Operators read exhaustion events as signals that the gating layer's eligible set is misaligned with the agent's operating context, and re-tune gating credentials or skill availability under credentialed policy revisions whose authoring is itself anchored.
Disclosure Scope
The disclosure covers the structural arbitration event as a first-class lineage artifact, the credentialed ranking policy that governs it, the per-competitor admission and rejection record with grounds, the support for deterministic and non-deterministic policies under audit, and the composition of arbitration with gating, validation, forecasting, and mutation. The scope spans local and distributed execution topologies, lexicographic, weighted-sum, threshold, and stochastic ranking functions, and applies to LLM skills, tool-using agents, retrieval engines, planners, and any plurality of credentialed actors contending for shared scope. The scope does not depend on the ranking function family, the underlying skill technology, or the topology of arbitration evaluation; it depends on the structural treatment of contention as an anchored, credentialed, audited event.