Switch to: Citations

Add references

You must login to add references.
  1. Decision support for criminal sentencing.U. Schild - 1998 - Artificial Intelligence and Law 6 (4):151-202.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Reliable Methods of Judgment Aggregation.Stephan Hartmann, Gabriella Pigozzi & Jan Sprenger - 2007 - Journal for Logic and Computation 20:603--617.
    The aggregation of consistent individual judgments on logically interconnected propositions into a collective judgment on the same propositions has recently drawn much attention. Seemingly reasonable aggregation procedures, such as propositionwise majority voting, cannot ensure an equally consistent collective conclusion. The literature on judgment aggregation refers to such a problem as the \textit{discursive dilemma}. In this paper we assume that the decision which the group is trying to reach is factually right or wrong. Hence, we address the question of how good (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Logical Modes of Attack in Argumentation Networks.Dov M. Gabbay & Artur S. D’Avila Garcez - 2009 - Studia Logica 93 (2):199-230.
    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the metalevel to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the so-called rule-based (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Argument-based extended logic programming with defeasible priorities.Henry Prakken & Giovanni Sartor - 1997 - Journal of Applied Non-Classical Logics 7 (1-2):25-75.
    ABSTRACT Inspired by legal reasoning, this paper presents a semantics and proof theory of a system for defeasible argumentation. Arguments are expressed in a logic-programming language with both weak and strong negation, conflicts between arguments are decided with the help of priorities on the rules. An important feature of the system is that these priorities are not fixed, but are themselves defeasibly derived as conclusions within the system. Thus debates on the choice between conflicting arguments can also be modelled. The (...)
    Download  
     
    Export citation  
     
    Bookmark   87 citations  
  • Premise independence in judgment aggregation.Gabriella Pigozzi & L. van der Torre - manuscript
    ment on the same propositions, and is plagued by impossibility re- 2. What is the role of independence in judgment aggregation sults. In this paper we study the central notion of independence in..
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in order (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A Meta-model of Access Control in a Fibred Security Language.Steve Barker, Guido Boella, Dov M. Gabbay & Valerio Genovese - 2009 - Studia Logica 92 (3):437-477.
    The issue of representing access control requirements continues to demand significant attention. The focus of researchers has traditionally been on developing particular access control models and policy specification languages for particular applications. However, this approach has resulted in an unnecessary surfeit of models and languages. In contrast, we describe a general access control model and a logic-based specification language from which both existing and novel access control models may be derived as particular cases and from which several approaches can be (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert Van Der Torre - 2009 - Studia Logica 92 (3):395 - 436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language (both for classical and intuitionistic fragment), we then prove that in order (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Resource-origins of Nonmonotonicity.Dov Gabbay & John Woods - 2008 - Studia Logica 88 (1):85-112.
    Formal nonmonotonic systems try to model the phenomenon that common sense reasoners are able to “jump” in their reasoning from assumptions Δ to conclusions C without their being any deductive chain from Δ to C. Such jumps are done by various mechanisms which are strongly dependent on context and knowledge of how the actual world functions. Our aim is to motivate these jump rules as inference rules designed to optimise survival in an environment with scant resources of effort and time. (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • On the evaluation of argumentation formalisms.Martin Caminada & Leila Amgoud - 2007 - Artificial Intelligence 171 (5-6):286-310.
    Download  
     
    Export citation  
     
    Bookmark   76 citations