Inference-Time Execution Control as Traversal Primitive

by Nick Clark | Published March 27, 2026 | PDF

Inference invocations against the discovery substrate are governed at invocation time by per-request policy that bounds fan-out, depth, and compute. The bounds are not advisory limits checked after the fact; they are admissibility terms evaluated before each step of the traversal commits. A request that would exceed any bound does not fail in the conventional sense — it does not execute the offending step at all. Non-execution is not an error condition; it is the correct, audited outcome under a governance regime that treats every traversal step as a credentialed operation. The disclosed apparatus thus reframes inference governance from a perimeter concern about what enters the system into a per-step structural property that constrains what the substrate is willing to do under any one request, regardless of the requester's authority or intent.


Mechanism

Each inference invocation against the discovery substrate carries a policy envelope specifying, at minimum, a maximum fan-out per anchor visit, a maximum traversal depth from the entry anchor, and a maximum compute allowance measured in a substrate-defined unit accounting for both wall-clock and substrate-impact cost. The envelope is bound at the moment the request is admitted; it is not modifiable mid-flight. The admissibility gate evaluates each proposed traversal step against the envelope before the step commits, in addition to the policy, intent, trust slope, and cognitive state evaluations applied to all semantic operations.

When a proposed step would expand fan-out beyond the per-anchor bound, the gate admits a deterministic subset selected under the request's policy and emits a non-execution record for the omitted candidates. When a proposed step would extend traversal depth beyond the bound, the gate admits no further descent from that frontier; the frontier becomes a non-executed boundary in the lineage. When a proposed step would draw the request's accumulated compute past the allowance, the gate ceases admission and emits a compute-exhaustion non-execution record. In each case the request returns the partial, fully governed result it produced up to the point of bound encounter, together with the lineage describing exactly which paths were not taken and why.

Non-execution is structurally distinct from failure. A failed inference reports an error; downstream consumers respond by retrying, escalating, or surfacing the failure to a caller. A non-executed inference reports a complete, governed answer — possibly partial in its coverage of the substrate, but complete with respect to the admitted envelope — and downstream consumers respond by deciding whether the partial coverage suffices. The lineage gives the consumer the structural information needed to decide: which anchors were visited, which were enumerated but not visited, which were not enumerated, and which bound truncated the traversal. The disclosure repeatedly emphasizes this distinction because operational failures and governed truncations are routinely conflated in conventional inference systems and their conflation is the source of much governance erosion.

Operating Parameters

Fan-out bounds may be specified as absolute counts or as functions of the local anchor's degree. An absolute bound limits each visit to at most K successor anchors regardless of how many neighbors the anchor exposes; a degree-relative bound admits a fraction of neighbors with the fraction itself capped by an absolute ceiling. The choice is policy-governed and recorded in the request's envelope so that downstream auditors may reconstruct the structural shape of the admitted traversal.

Depth bounds are measured against the entry anchor under a metric defined by the substrate. The simplest metric is hop count; richer metrics accumulate semantic distance, traversal cost, or relational drift, with the bound expressed in the appropriate units. Depth bounds may be uniform across the traversal or path-dependent, with deeper descent admitted along high-trust trajectories and shallower descent enforced along low-trust trajectories. The path-dependent variant integrates with the trust slope subsystem to produce traversals that lean toward more reliable substructure under tighter policy.

Compute allowance accumulates across the traversal under a substrate-defined cost model. The cost model accounts for inference invocations performed at each anchor, the substrate-side computation required to expand each frontier, and any external resources consumed during admissibility evaluation. The allowance may be expressed as a simple counter or as a multi-dimensional budget covering distinct cost classes. The gate enforces the multi-dimensional case by admitting steps only when every dimension still has headroom; exhaustion of any one dimension truncates the traversal.

The envelope is bound to the request's credential at admission. A request that wishes to operate under a more permissive envelope must present credentials sufficient to justify the broader bounds, and the issuance of a permissive envelope is itself a credentialed event in the lineage. The substrate does not silently elevate envelopes mid-traversal; an envelope that proves inadequate for a request's needs is grounds for a new request under a new envelope, which the consumer or its delegating authority must explicitly admit.

Every non-execution is a first-class credentialed observation. The observation records the bound that truncated, the state of the traversal at truncation, the candidates that were enumerated but not visited, and the policy under which the bound was applied. The observation is admissible to downstream consumers as evidence of the boundary; consumers can compose decisions across multiple non-executed traversals to assemble fuller coverage if their policy admits the composition.

Alternative Embodiments

Embodiments differ in how the gate enforces fan-out. In a deterministic-prefix embodiment, the gate admits the K successors with highest score under the request's ranking function, producing reproducible traversals. In a sampled embodiment, the gate admits a probabilistically selected subset under a credentialed sampler, producing diverse traversals across repeated invocation. In a stratified embodiment, the gate admits successors covering distinct categories of relation so that the K-subset spans the local relational neighborhood rather than concentrating in one dimension.

Embodiments differ in how depth is enforced under interaction with relevance. In a hard-cutoff embodiment, the gate admits no descent past the bound regardless of local relevance signals. In a relevance-weighted embodiment, the gate admits a small additional depth past the bound when local relevance crosses a threshold, charging the extra depth against the compute allowance so that the structural budget is preserved across both dimensions. In a tapered embodiment, the gate admits descent past the nominal depth at progressively reduced fan-out, producing a thin probe rather than a broad expansion at the depth boundary.

Embodiments differ in how compute is accounted. In a flat-cost embodiment, every step charges a uniform cost. In a substrate-modeled embodiment, each anchor exposes its expected cost to the gate and the gate consults the model in admissibility evaluation. In an actual-cost embodiment, the gate measures observed cost during traversal and reconciles against the budget continuously, with adaptive truncation when observed cost exceeds expected cost. The embodiments are interoperable; a request may be admitted under modeled cost and then truncated under actual cost without violating its envelope.

Embodiments differ in how non-execution is surfaced. In a silent-truncation embodiment, the request returns its admitted output and the lineage carries the full non-execution record without the consumer being explicitly notified. In an event-surface embodiment, the gate emits a structured event upon each bound encounter so the consumer may react in flight. In a continuation-handle embodiment, the truncation produces a handle the consumer can present in a subsequent request to resume traversal under a new envelope, subject to fresh admissibility evaluation.

Composition With Other Subsystems

Inference governance composes with the admissibility gate by appearing as terms inside the gate's per-step evaluation rather than as a separate filter. The gate evaluates policy, intent, trust slope, cognitive state, and envelope bounds in a single composite decision. The composition prevents bypass: there is no path through the gate that satisfies admissibility but skips envelope evaluation, because envelope evaluation is admissibility.

Inference governance composes with the credentialed observation mesh by emitting non-execution events as first-class observations. Downstream policy components consume these observations and may use them to retune envelopes, escalate, or trigger compensating traversals from alternate entry anchors. The mesh accumulates non-execution alongside execution, providing a complete record of the substrate's response to each request.

Inference governance composes with the discovery object's intent track by treating drift from intent as a basis for tightening bounds rather than as an after-the-fact filter. As the gate observes the traversal departing from the request's intent, it may shrink the remaining envelope, taper the admitted depth, or terminate further descent. The composition prevents the kind of silent intent drift that conventional discovery exhibits as a long traversal accumulates relevance toward an unrelated topic.

Inference governance composes with the trust slope subsystem so that traversals along high-trust trajectories proceed under more permissive bounds and traversals along low-trust trajectories proceed under tighter bounds. The composition produces traversals that structurally lean toward reliable substructure without the request having to express that preference manually. A request with no specific bias produces high-quality output by virtue of the gate's structural deference to slope.

Inference governance composes with governed actuation by ensuring that any actuation triggered by a discovery result inherits the lineage of the traversal that produced it. An actuator presented with a discovery output reads not only the output but the envelope under which it was produced and the non-execution boundary it encountered. The actuator may then evaluate whether the partial coverage of the discovery is sufficient for its admissibility, refusing actuation when coverage is insufficient even though the discovery itself completed successfully under its envelope.

Prior-Art Distinctions

Conventional rate limits and quotas in inference services bound the number of requests an account may issue and may bound the size of the response a request may receive. They do not bound the structural shape of traversal within a single request. The disclosed apparatus differs in that the bounds are evaluated at every traversal step and are integrated into the substrate's admissibility gate; truncation is structural rather than perimeter-based.

Beam search, top-K retrieval, and similar bounded-search algorithms enforce structural bounds on a search procedure but they do not couple their bounds to credentialed governance, do not emit non-execution as a first-class observation, and do not integrate with policy, intent, or trust evaluation. The disclosed apparatus differs in that bound enforcement is one term among several admissibility terms, and the lineage records why a bound was applied and under what credential.

Resource-quota systems in cloud platforms cap aggregate consumption and emit alerts upon excess. The disclosed apparatus differs in that the cap is per-request rather than per-account, the cap is enforced as a property of admissibility rather than as a billing-driven throttle, and the response to cap encounter is a governed truncation with structured lineage rather than an alert with possibly inconsistent service behavior.

Policy-as-code admission controllers in orchestration platforms evaluate requests at ingress and either admit or reject the whole request. The disclosed apparatus differs in that admission is per-step rather than per-request and the gate may admit a request, traverse partially, and return a governed partial answer rather than rejecting the whole request when one step would exceed the envelope. The per-step granularity preserves the request's productive coverage while structurally enforcing the bound.

Recursive depth limits in interpreter and planner implementations protect against runaway computation but do not produce auditable lineage of what was not done, do not compose with credentialed governance, and treat the limit encounter as an error. The disclosed apparatus treats non-execution as the correct outcome under the envelope, preserves the lineage, and admits the request's partial output as a fully valid governed result.

Disclosure Scope

This article forms part of the Cognition Patent disclosure and supports claims directed to per-request governance of inference invocations against a discovery substrate, including the bounding of fan-out, depth, and compute, the per-step evaluation of bounds inside the admissibility gate, the treatment of bound encounter as non-execution rather than failure, the emission of non-execution as credentialed observation, and the alternative embodiments differing in how each bound is enforced. The disclosure further supports claims directed to the composition of inference governance with the admissibility gate, the credentialed observation mesh, the intent-tracking discovery object, the trust slope subsystem, and the governed actuation subsystem disclosed elsewhere in the application.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01