Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailInput/output logics
Parent, Xavier UL; van der Torre, Leon UL

in Abstract book of 9th De Morgan Workshop on Deontic Logic (2009)

In a range of contexts, one comes across processes resembling inference, but where input propositions are not in general included among outputs, and the operation is not in any way reversible. Exa mples ... [more ▼]

In a range of contexts, one comes across processes resembling inference, but where input propositions are not in general included among outputs, and the operation is not in any way reversible. Exa mples arise in contexts of conditional obligations, goals, ideals, preferences , actions, and beliefs. Our purpose is to develop a theory of such input/output operations . Four are singled out: simple- minded, basic (making intelligent use of disjunctiv e inputs), simple-minded reusable (in which outputs may be recycled as inputs), and b asic reusable. They are defined semantically and characterised by derivation rules, as well as in terms of relabeling procedures and modal operators. Their behaviour is studied on both semantic and syntactic levels [less ▲]

Detailed reference viewed: 60 (7 UL)
Full Text
Peer Reviewed
See detailInput/output logics with a consistency check
Parent, Xavier UL; van der Torre, Leon UL

in Pigozzi, Gabriella; Broersen, Jan; Condoravdi, Cleo (Eds.) et al Deontic Logic and Normative Systems (DEON 2018) (2018)

Norm-based semantics to deontic logic typically come in an unconstrained and constrained version, where the unconstrained version comes with a proof system, and the constraints handle phenomena such as ... [more ▼]

Norm-based semantics to deontic logic typically come in an unconstrained and constrained version, where the unconstrained version comes with a proof system, and the constraints handle phenomena such as dilemmas, contrary-to-duty reasoning, uncertaintyanddefeasibility. Thisisanalogoustotheuseofrule-basedlanguagesin non-monotonic logic such as logic programming or default logic, but in contrast to the traditional modal framework. Traditionally, for example, specific modal deontic logics have been defined that make dilemmas inconsistent, as well as other modal deontic logics representing dilemmas in a consistent way. This issue was raised recently in the input/output logic framework, and weaker unconstrained logics have been defined handling phenomena like dilemmas and contrary-to-duty reasoning. In this paper we introduce a semantics and proof theory for a system with various desirable properties. We show that our new deontic logic satisfies a criterion posed several years ago by Broersen and van der Torre, allowing deontic detachment while preventing Prakken and Sergot’s pragmatic oddities as well as Sergot’s drowning problem. [less ▲]

Detailed reference viewed: 63 (5 UL)
Full Text
Peer Reviewed
See detailInput/Output STIT Logic for Normative Systems
Sun, Xin UL

in Proceedings of the 9th International Web Rule Symposium (RuleML) (2015)

Detailed reference viewed: 78 (4 UL)
Peer Reviewed
See detailInquire Europe Conference
Mehra, Rajnish UL

Scientific Conference (2014)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailInquiring the Potential of Evoking Small-World Properties for Self- Organizing Communication Networks
Brust, Matthias R. UL; Rothkugel, Steffen UL; Ribeiro, Carlos H. C.

in Proceedings of International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06) (2006)

Detailed reference viewed: 78 (3 UL)
Full Text
Peer Reviewed
See detailInquiry identity and science teacher professional development
Wilmes, Sara UL; Bryce, Nadine; Bellino, Marissa

in Cultural Studies of Science Education (2016), 11(2), 235-251

An effective inquiry-oriented science teacher possesses more than the skills of teaching through investigation. They must address philosophies, and ways of interacting as a member of a group of educators ... [more ▼]

An effective inquiry-oriented science teacher possesses more than the skills of teaching through investigation. They must address philosophies, and ways of interacting as a member of a group of educators who value and practice science through inquiry. Professional development opportunities can support inquiry identity development, but most often they address teaching practices from limited cognitive perspectives, leaving unexplored the shifts in identity that may accompany teachers along their journey in becoming skilled in inquiry-oriented instruction. In this forum article, we envision Victoria Deneroff’s argument that ‘‘professional development could be designed to facilitate reflexive transformation of identity within professional learning environments’’ (2013, p. 33). Instructional coaching, cogenerative dialogues, and online professional communities are discussed as ways to promote inquiry identity formation and collaboration in ways that empower and deepen science teachers’ conversations related to personal and professional efficacy in the service of improved science teaching and learning. [less ▲]

Detailed reference viewed: 92 (2 UL)
Full Text
Peer Reviewed
See detailInquisitorial Procedures and General Principles of Law: The Duty of Care in the Case Law of the European Court of Justice
Hofmann, Herwig UL

in Jacobs, Laverne; Bagley, Sasha (Eds.) The Nature of Inquisitorial Processes in Administrative Regimes (2013)

The question of who is in charge of providing (and possibly proving) the relevant information for decision-making appears to be one of the key questions resulting in the classification of a procedure as ... [more ▼]

The question of who is in charge of providing (and possibly proving) the relevant information for decision-making appears to be one of the key questions resulting in the classification of a procedure as “adversarial” or “inquisitorial.” [less ▲]

Detailed reference viewed: 190 (6 UL)
Peer Reviewed
See detailInroads in Testing Access Control
Mouelhi, Tejeddine UL; El Kateb, Donia UL; Le Traon, Yves UL

in Advances in Computers (2015)

Detailed reference viewed: 161 (20 UL)
Peer Reviewed
See detailInsertion of a bacterial gene into the mouse germ line using an infectious retrovirus vector.
Huszar, D.; Balling, Rudi UL; Kothary, R. et al

in Proceedings of the National Academy of Sciences of the United States of America (1985), 82(24), 8587-91

Using a Moloney leukemia virus vector containing the bacterial neo gene, we demonstrate that retrovirus vectors can be used to introduce genes into the mouse germ line. Infection of preimplantation ... [more ▼]

Using a Moloney leukemia virus vector containing the bacterial neo gene, we demonstrate that retrovirus vectors can be used to introduce genes into the mouse germ line. Infection of preimplantation embryos with the vector MLV-NEO.1 resulted in integration of neo sequences in approximately equal to 10% of the progeny mice. One of these animals, mouse F.2, contained approximately six MLV-NEO.1 proviruses at independent integration sites, each present at less than a single copy per cell. This mosaic mouse transmitted one of these proviruses to her offspring, producing a line of transgenic mice carrying a full-length, unrearranged MLV.NEO.1 provirus at a single chromosomal integration site. Mice homozygous at this MLV-NEO.1 locus have also been produced. No expression of the neo gene has been detected in the transgenic mice, either by screening of primary bone marrow or lung cells for resistance to G418 or by RNA transfer blot analysis of RNA from several tissues. In addition, the neo gene was found to be extensively methylated in the transgenic mice; however, treatment of primary cells with 5-azacytidine did not induce G418 resistance. The inactivity of the MLV-NEO.1 provirus in transgenic mice and potential means of eliciting neo expression under these conditions are discussed. [less ▲]

Detailed reference viewed: 121 (0 UL)
See detailL'insertion professionnelle des jeunes et personnes âgées de 45 ans et plus: discours, pratiques et enjeux.
Haas, Claude UL

Book published by Université du Luxembourg (2010)

Detailed reference viewed: 90 (14 UL)
Full Text
Peer Reviewed
See detailInside Cambodian Insurgency. A Sociological Perspective on Civil Wars and Conflict (by D. Bultmann)
Kolnberger, Thomas UL

in Internationales Asienforum - International Quarterly for Asien Studies (2015), 46(3-4, autumn), 414-416

Detailed reference viewed: 96 (0 UL)
Full Text
Peer Reviewed
See detailInside the Serbian war machine: The Milošević intercepts, 1991-1992
Glaurdic, Josip UL

in East European Politics & Societies (2009), 23(1), 86-104

This article examines the arguably most interesting pieces of evidence used during the trial of Slobodan Milošević at the International Criminal Tribunal for the former Yugoslavia—more than two hundred ... [more ▼]

This article examines the arguably most interesting pieces of evidence used during the trial of Slobodan Milošević at the International Criminal Tribunal for the former Yugoslavia—more than two hundred recordings of intercepted conversations that took place in 1991 and 1992 between Milošević, Radovan Karadžić, Dobrica Ćosić, and various other protagonists on the Serbian side of the wars in Croatia and Bosnia and Herzegovina (BiH). Analysis of the intercepts presented in this article makes several important contributions to the interpretation of events in former Yugoslavia during that period. First, it identifies the ideological foundations of Milošević-led Serbian war campaigns in the political influence of Dobrica Ćosić and his platform of “unification of Serbs.” Second, it contributes to the vigorous debate regarding the possible deal between Milošević and the Croatian president Franjo Tuđman for the division of BiH. It confirms that negotiations took place, but that Milošević and his associates had no intention of respecting any agreement and wanted the whole of BiH until at least late 1991. Third, it provides indications that Milošević held the position of the de facto commander-in-chief in the operations of the Yugoslav People's Army in Croatia and BiH. And fourth, it establishes that the two institutions of force Milošević had direct legal control over—Serbia's State Security Service and Ministry of Interior—were his principal means of control over Croatian and Bosnian Serbs and instruments in the aggression against BiH even after its international recognition. [less ▲]

Detailed reference viewed: 104 (0 UL)
See detailInside the Trading Zone: Doing Digital Hermeneutics in an Interdisciplinary Setting
van der Heijden, Tim UL; Tatarinov, Juliane UL

Scientific Conference (2019, October 11)

Our contribution examines the conference theme of digital hermeneutics from the perspective of the Doctoral Training Unit (DTU) in ‘Digital History and Hermeneutics’, a four-year interdisciplinary ... [more ▼]

Our contribution examines the conference theme of digital hermeneutics from the perspective of the Doctoral Training Unit (DTU) in ‘Digital History and Hermeneutics’, a four-year interdisciplinary research and training program hosted by the Centre for Contemporary and Digital History (C²DH) at the University of Luxembourg. The DTU is designed as an experimental platform for collaboration or ‘trading zone’, in which thirteen doctoral candidates with different disciplinary backgrounds – from history, linguistics and philosophy to computer and information science – study and reflect on the epistemological and methodological implications of the ‘digital turn’ on historical research. This presentation reflects on the project’s first year, in which the doctoral candidates were introduced to various skills and methods in digital humanities, including text mining, digital source criticism, database structures, data visualization, GIS analysis, tool criticism and algorithmic critique; and its second year, when data collections had been created and research tools identified that were going to be applied to it. By doing so, it presents some of the main practical and epistemological opportunities and challenges of “thinkering” with digital tools and technologies in the Digital History Lab of the C2DH, and it reflects scientific dissemination strategies for the group and the individual. The analysis is informed by studies on interdisciplinarity, digital humanities infrastructures and communities of practice. It furthermore draws on a series of semi-structured interviews and self-reflexive training reports, in which the doctoral candidates of the DTU reflect on their experiences in doing digital hermeneutics in an interdisciplinary setting. [less ▲]

Detailed reference viewed: 50 (9 UL)
See detailInside the Trading Zone: Thinkering at C²DH digital history Lab
Fickers, Andreas

Presentation (2019, October 03)

Detailed reference viewed: 20 (3 UL)
Full Text
Peer Reviewed
See detailInside the Trading Zone: Thinkering in a Digital History Lab
Fickers, Andreas UL; van der Heijden, Tim UL

in Digital Humanities Quarterly (2020), 14(3),

The goal of this article is to critically reflect on the practical and epistemological challenges of doing historical research in the digital age. The analysis is based on a case study of the Doctoral ... [more ▼]

The goal of this article is to critically reflect on the practical and epistemological challenges of doing historical research in the digital age. The analysis is based on a case study of the Doctoral Training Unit (DTU) “Digital History and Hermeneutics”, an interdisciplinary research and training programme that was established at the Luxembourg Centre for Contemporary and Digital History (C²DH) of the University of Luxembourg. The DTU is designed as interdisciplinary trading zone that applies the method of “thinkering” – the tinkering with technology combined with the critical reflection on the practice of doing digital history. Based on this case study, the article addresses the question of how to constitute an interdisciplinary trading zone in practice and how to situate this trading zone in physical working environments, like a Digital History Lab and shared office space. [less ▲]

Detailed reference viewed: 79 (2 UL)
Full Text
Peer Reviewed
See detailInsider Attacks and Privacy of RFID Protocols
van Deursen, Ton UL; Radomirovic, Sasa UL

in EuroPKI 2011 (2012)

Detailed reference viewed: 71 (0 UL)
See detailInsider dealing and criminal law: les liaisons dangereuses?
Seredynska, Iwona UL

Doctoral thesis (2011)

Detailed reference viewed: 60 (4 UL)
See detailInsider Threat: Memory Confidentiality and Integrity in the Cloud
Rocha, Francisco UL

Book published by LAP Lambert Academic Publishing (2015)

Detailed reference viewed: 63 (7 UL)
Full Text
Peer Reviewed
See detailInsider Threats to Information Security, Digital Espionage, and Counter-Intelligence
You, Ilsun; Lenzini, Gabriele UL; De Santis, Alfredo

in IEEE Systems Journal (2017), 11(2),

Detailed reference viewed: 106 (19 UL)
Peer Reviewed
See detailInsider Trading and the Patent Application Process
Hussinger, Katrin UL; Keusch, Thomas; Moers, Frank

Scientific Conference (2013)

Detailed reference viewed: 123 (2 UL)