References of "David, Esther"
     in
Bookmark and Share    
Peer Reviewed
See detailTalmudic Norms Approach to Mixtures with a Solution to the Paradox of the Heap: A Position Paper
David, Esther; David, Rabbi S.; Gabbay, Dov M. UL et al

in Beyond Faith and Rationality (2020)

This paper offers a Talmudic norms solution to the paradox of the heap. The claim is that the paradox arises because philosophers use the wrong language to discuss it. We need a language about objects ... [more ▼]

This paper offers a Talmudic norms solution to the paradox of the heap. The claim is that the paradox arises because philosophers use the wrong language to discuss it. We need a language about objects which is capable of expressing not only the declarative properties of the object (such as being a heap) but also how the object/heap was constructed. Such a view of objects comes from the Talmudic theory of mixtures. To this we add a first attempt at modelling the Talmudic normative theory of mixing (Talmudic calculus of Sorites). We seek a correlation between Talmudic positions on mixtures and philosophical positions on Sorites. The Talmud is very practical and cannot allow for any theoretically unresolved paradox to get in the way, and so it has a lot to offer to philosophy in general and to the heap paradox in particular. [less ▲]

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailThe Talmudic Logic Project, Ongoing Since 2008
Gabbay, Dov M. UL; Schild, Uri; David, Esther

in Logica Universalis (2019), 13(4), 425--442

We describe the state of the Talmudic Logic project as of end of 2019. The Talmud is the most comprehensive and fundamental work of Jewish religious law, employing a large number of logical components ... [more ▼]

We describe the state of the Talmudic Logic project as of end of 2019. The Talmud is the most comprehensive and fundamental work of Jewish religious law, employing a large number of logical components centuries ahead of their time. In many cases the basic principles are not explicitly formulated, which makes it difficult to formalize and make available to the modern student of Logic. This project on Talmudic Logic, aims to present logical analysis of Talmudic reasoning using modern logical tools. We investigate principles of Talmudic Logic and publish a series of books, one book or more for each principle. http://www.collegepublications.co.uk/stl/ The series begins with the systematic analysis of Talmudic inference rules. The first book shows that we can present Talmudic reasoning intuitions as a systematic logical system basic to modern non-deductive reasoning, such as Argumentum A Fortiori, Abduction and Analogy. The second book offers a systematic common sense method for intuitively defining sets and claims that this method adequately models the Talmudic use of the rules Klal uPrat. These books also criticize modern Talmudic research methodology. Later books deal with additional topics like Deontic logic, and Temporal logic, Agency and processes in the Talmud and more. The aims of the project are two fold: 1. To import into the Talmudic study modern logical methods with a view to help understand complicated Talmudic passages, which otherwise cannot be addressed. 2. To export from the Talmud new logical principles which are innovative and useful to modern contemporary logic. [less ▲]

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailLogical Analysis of Cyber Vulnerability and Protection
David, Esther; Gabbay, Dov M. UL; Leshem, Guy et al

in IfCoLog Journal of Logics and Their Applications (2017)

The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is ... [more ▼]

The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is left behind. The IoT safety, security and privacy is composed of several key aspects. Attention has already been given to vulnerabilities associated with networked systems as authentication and encryption. However there exist more vulnerabilities issues in IoT systems for which we aim to develop a detection methodology and propose possible solutions. Specifically, here we propose techniques for security verification of an IoT system that mainly involves inconsistency and vulnerability. The proposed methods are logic based techniques that were developed especially for the new challenges that the IoT environment is facing. [less ▲]

Detailed reference viewed: 89 (3 UL)