Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailLogic, evidence and consensus: Towards a more constructive debate on gaming disorder.
King, Daniel L.; Delfabbro, Paul H.; Potenza, Marc N. et al

in The Australian and New Zealand journal of psychiatry (2019), 53(11), 1047-1049

Detailed reference viewed: 96 (1 UL)
See detailLogic: A History of its Central Concepts
Gabbay, Dov M. UL; Pelletier, Francis Jeffry; Woods, John

Book published by Elsevier (2012)

Detailed reference viewed: 106 (0 UL)
Full Text
Peer Reviewed
See detailA logical account of formal argumentation
Caminada, Martin UL; Gabbay, Dov M. UL

in Studia Logica (2009)

In the current paper, we re-examine how abstract argumentation can be formulated in terms of labellings, and how the resulting theory can be applied in the field of modal logic. In particular, we are able ... [more ▼]

In the current paper, we re-examine how abstract argumentation can be formulated in terms of labellings, and how the resulting theory can be applied in the field of modal logic. In particular, we are able to express the (complete) extensions of an argumentation framework as models of a set of modal logic formulas that represents the argumentation framework. Using this approach, it becomes possible to define the grounded extension in terms of modal logic entailment. [less ▲]

Detailed reference viewed: 100 (2 UL)
Full Text
Peer Reviewed
See detailLogical Analysis of Cyber Vulnerability and Protection
David, Esther; Gabbay, Dov M. UL; Leshem, Guy et al

in IfCoLog Journal of Logics and Their Applications (2017)

The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is ... [more ▼]

The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is left behind. The IoT safety, security and privacy is composed of several key aspects. Attention has already been given to vulnerabilities associated with networked systems as authentication and encryption. However there exist more vulnerabilities issues in IoT systems for which we aim to develop a detection methodology and propose possible solutions. Specifically, here we propose techniques for security verification of an IoT system that mainly involves inconsistency and vulnerability. The proposed methods are logic based techniques that were developed especially for the new challenges that the IoT environment is facing. [less ▲]

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailA logical approach to restricting access in online social networks
Cramer, Marcos UL; Pang, Jun UL; Zhang, Yang UL

in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (2015)

Detailed reference viewed: 127 (9 UL)
Full Text
Peer Reviewed
See detailA Logical Architecture of a Normative System
Boella, Guido; van der Torre, Leon UL

in Deontic Logic and Artificial Normative Systems, 8th International Workshop on Deontic Logic in Computer Science ($$EON'06) (2006)

Logical architectures combine several logics into a more complex logical system. In this paper we study a logical architecture using input/output operations corresponding to the functionality of logical ... [more ▼]

Logical architectures combine several logics into a more complex logical system. In this paper we study a logical architecture using input/output operations corresponding to the functionality of logical components. We illustrate how the architectural approach can be used to develop a logic of a normative system based on logics of counts-as conditionals, institutional constraints, obligations and permissions. In this example we adapt for counts-as conditionals and institutional constraints a proposal of Jones and Sergot, and for obligations and permissions we adapt the input/output logic framework of Makinson and van der Torre. We use our architecture to study logical relations among counts-as conditionals, institutional constraints, obligations and permissions. We show that in our logical architecture the combined system of counts-as conditionals and institutional constraints reduces to the logic of institutional constraints, which again reduces to an expression in the underlying base logic. Counts-as conditionals and institutional constraints are defined as a pre-processing step for the regulative norms. Permissions are defined as exceptions to obligations and their interaction is characterized. [less ▲]

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detailLogical foundation of fuzzy preferential systems with application to the electre decision aid methods
Bisdorff, Raymond UL

in Computers and Operations Research (2000), 27(7-8), 673-687

Detailed reference viewed: 70 (5 UL)
Full Text
Peer Reviewed
See detailLogical foundations for bipolar and tripolar argumentation networks: preliminary results
Gabbay, Dov M. UL

in J. Log. Comput. (2016), 26(1), 247--292

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailLogical Modes of Attack in Argumentation Networks
Gabbay, Dov M. UL; Garcez, A. S. D. Avila

in Studia Logica (2009)

This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of ... [more ▼]

This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the so-called rule- based systems. We also provide a number of examples and consider a rigorous case study, which indicate that our system does not suffer from anomalies. We define consequence relations based on a notion of defeat, consider rationality postulates, and prove that one such consequence relation is consistent. [less ▲]

Detailed reference viewed: 65 (0 UL)
Peer Reviewed
See detailA logical theory about dynamics in abstract argumentation
Booth, Richard UL; Kaci, Souhila; Rienstra, Tjitze UL et al

Scientific Conference (2013)

Detailed reference viewed: 99 (7 UL)
Full Text
Peer Reviewed
See detailA logical theory about dynamics in abstract argumentation
Booth, Richard UL; Kaci, Souhila; Rienstra, Tjitze UL et al

in Scalable Uncertainty Management - 7th International Conference, SUM 2013 (2013)

We address dynamics in abstract argumentation using a logical theory where an agent’s belief state consists of an argumentation framework (AF, for short) and a constraint that encodes the outcome the ... [more ▼]

We address dynamics in abstract argumentation using a logical theory where an agent’s belief state consists of an argumentation framework (AF, for short) and a constraint that encodes the outcome the agent believes the AF should have. Dynamics enters in two ways: (1) the constraint is strengthened upon learning that the AF should have a certain outcome and (2) the AF is expanded upon learning about new arguments/attacks. A problem faced in this setting is that a constraint may be inconsistent with the AF’s outcome. We discuss two ways to address this problem: First, it is still possible to form consistent fallback beliefs, i.e., beliefs that are most plausible given the agent’s AF and constraint. Second, we show that it is always possible to find AF expansions to restore consistency. Our work combines various individual approaches in the literature on argumentation dynamics in a general setting. [less ▲]

Detailed reference viewed: 123 (6 UL)
Peer Reviewed
See detailA logical theory about dynamics in abstract argumentation
Booth, Richard UL; Kaci, Souhila; Rienstra, Tjitze UL et al

Scientific Conference (2013)

Detailed reference viewed: 122 (13 UL)
See detailLogical Tools for Handling Change in Agent-based Systems
Gabbay, Dov M. UL; Schlechta, Karl

Book published by Springer (2009)

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailA Logical Understanding of Legal Interpretation
Boella, Guido UL; Governatori, Guido; Rotolo, Antonino et al

in KR 2010 (2010)

If compliance with a norm does not achieve its purpose, then its applicability must dynamically be restricted or expanded. Legal interpretation is a mechanism from law allowing norms to be adapted to ... [more ▼]

If compliance with a norm does not achieve its purpose, then its applicability must dynamically be restricted or expanded. Legal interpretation is a mechanism from law allowing norms to be adapted to unforeseen situations. We model this mechanism for norms regulating computer systems by representing the purpose of norms by social goals and by revising the constitutive rules defining the applicability of norms. We illustrate the interpretation mechanism by examples. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailThe logics and politics of circulation: exploring the urban and non-urban spaces of Amazon.com
Hesse, Markus UL

in Ward, Kevin; Jonas, Andrew E.G.; Miller, Byron (Eds.) et al The Routledge International Handbook on Spaces of Urban Politics (2018)

The digital economy is a catalyst for the circulation of people, goods and information, affecting both urban and non-urban realms. This chapter uses the empirical case of Amazon.com to discuss the digital ... [more ▼]

The digital economy is a catalyst for the circulation of people, goods and information, affecting both urban and non-urban realms. This chapter uses the empirical case of Amazon.com to discuss the digital and physical arrangement of production, labour, distribution, advertising, purchasing, and consumption as a means of creating particular spaces of politics. What started as mail order retail for books about 20 years ago can now be understood as an all-encompassing platform for performing a variety of socio-economic practices. These practices evolve from disruptive innovation and are backed by venture capital as well as an aggressive market strategy, leading to a compartmentalized organisation of value chains. The related implications on place, space and territory reveal a certain “logics of dislocation” (Barnes 1996), creating particular spaces of circulation both in urban centres and peripheries. The abstract system’s imperative not only steers the orchestration of the firm’s network but also, given its hegemony in online-markets, threatens to assume an almost totalitarian form. It thus also performs as a powerful agent of policy-making. Against this background, the chapter explores the spaces of circulation and related politics that are produced and reproduced by Amazon.com. [less ▲]

Detailed reference viewed: 121 (0 UL)
Full Text
Peer Reviewed
See detailLogics for Security and Privacy
van der Torre, Leon UL

in 2012 (2012)

In this presentation I first review new developments of deontic logic in computer science, then I discuss the use of dynamic epistemic deontic logic to reason about privacy policies, and finally I discuss ... [more ▼]

In this presentation I first review new developments of deontic logic in computer science, then I discuss the use of dynamic epistemic deontic logic to reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese. [less ▲]

Detailed reference viewed: 83 (2 UL)
Peer Reviewed
See detailDie Logik der kurzen Wege. Räumliche Mobilität und Verkehr als Gegenstand der Stadtforschung.
Hesse, Markus UL

in Erdkunde. Wissenschaftliches Archiv für Geographie (1999), 53(4), 317-329

Detailed reference viewed: 106 (0 UL)
Full Text
Peer Reviewed
See detailLoginson: a transform and load system for very large-scale log analysis in large IT infrastructures
Vega Moreno, Carlos Gonzalo UL; Roquero, Paula; Leira, Rafael et al

in Journal of Supercomputing (2017), 73(9), 3879-3900

Nowadays, most systems and applications produce log records that are useful for security and monitoring purposes such as debugging programming errors, checking system status, and detecting configuration ... [more ▼]

Nowadays, most systems and applications produce log records that are useful for security and monitoring purposes such as debugging programming errors, checking system status, and detecting configuration problems or even attacks. To this end, a log repository becomes necessary whereby logs can be accessed and visualized in a timely manner. This paper presents Loginson, a high-performance log centralization system for large-scale log collection and processing in large IT infrastructures. Besides log collection, Loginson provides high-level analytics through a visual interface for the purpose of troubleshooting critical incidents. We note that Loginson outperforms all of the other log centralization solutions by taking full advantage of the vertical scalability, and therefore decreasing Capital Expenditure (CAPEX) and Operating Expense (OPEX) costs for deployment scenarios with a huge volume of log data. © 2017, Springer Science+Business Media New York. [less ▲]

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailLogiques administratives et persécution anti-juive. La police bruxelloise et les arrestations de 1942
Majerus, Benoît UL

in Cahiers d'Histoire du Temps Présent = Bijdragen tot de Eigentijdse Geschiedenis (2003), (12), 181--217

Detailed reference viewed: 159 (4 UL)
Full Text
See detailLes logiques de l'insertion professionnelle au Luxembourg
Haas, Claude UL

Conference given outside the academic context (2013)

Detailed reference viewed: 73 (3 UL)