Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Computing Strong and Weak Permissions in Defeasible Logic

Identifieur interne : 000052 ( PascalFrancis/Corpus ); précédent : 000051; suivant : 000053

Computing Strong and Weak Permissions in Defeasible Logic

Auteurs : Guido Governatori ; Francesco Olivieri ; Antonino Rotolo ; Simone Scannapieco

Source :

RBID : Francis:14-0003337

Descripteurs français

English descriptors

Abstract

In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0022-3611
A03   1    @0 J. philos. logic
A05       @2 42
A06       @2 6
A08 01  1  ENG  @1 Computing Strong and Weak Permissions in Defeasible Logic
A09 01  1  ENG  @1 Conference on Logic and the foundations of Game and Decision Theory (LOFT10), Sevilla
A11 01  1    @1 GOVERNATORI (Guido)
A11 02  1    @1 OLIVIERI (Francesco)
A11 03  1    @1 ROTOLO (Antonino)
A11 04  1    @1 SCANNAPIECO (Simone)
A12 01  1    @1 BONANNO (Giacomo) @9 ed.
A12 02  1    @1 VAN DITMARSCH (Hans) @9 ed.
A12 03  1    @1 VAN DER HOEK (Wiebe) @9 ed.
A14 01      @1 NICTA, Queensland Research Laboratory @2 Brisbane @3 AUS @Z 1 aut. @Z 2 aut. @Z 4 aut.
A14 02      @1 Department of Computer Science, University of Verona @2 Verona @3 ITA @Z 2 aut. @Z 4 aut.
A14 03      @1 Institute for Integrated and Intelligent Systems, Griffith University @2 Nathan, Queensland @3 AUS @Z 2 aut. @Z 4 aut.
A14 04      @1 CIRSFID, University of Bologna @2 Bologna @3 ITA @Z 3 aut.
A15 01      @1 Department of Economics, University of California, @2 Davis @3 USA @Z 1 aut.
A15 02      @1 LORIA, CNRS ? Université de Lorraine @2 Nancy @3 FRA @Z 2 aut.
A15 03      @1 Department of Computer Science, University of Liverpool @2 Liverpool @3 GBR @Z 3 aut.
A20       @1 799-829
A21       @1 2013
A23 01      @0 ENG
A43 01      @1 INIST @2 25573 @5 354000507415120010
A44       @0 0000 @1 © 2014 INIST-CNRS. All rights reserved.
A45       @0 28 ref.
A47 01  1    @0 14-0003337
A60       @1 P @2 C
A61       @0 A
A64 01  1    @0 Journal of philosophical logic
A66 01      @0 NLD
C01 01    ENG  @0 In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.
C02 01  P    @0 51910 @1 X
C02 02  P    @0 519
C03 01  P  FRE  @0 Logique philosophique @5 01
C03 01  P  ENG  @0 Philosophical Logic @5 01
N21       @1 006
N44 01      @1 OTO
N82       @1 OTO
pR  
A30 01  1  ENG  @1 LOFT10 Conference on Logic and the foundations of Game and Decision Theory @2 10 @3 Sevilla ESP @4 2012-07-18

Format Inist (serveur)

NO : FRANCIS 14-0003337 INIST
ET : Computing Strong and Weak Permissions in Defeasible Logic
AU : GOVERNATORI (Guido); OLIVIERI (Francesco); ROTOLO (Antonino); SCANNAPIECO (Simone); BONANNO (Giacomo); VAN DITMARSCH (Hans); VAN DER HOEK (Wiebe)
AF : NICTA, Queensland Research Laboratory/Brisbane/Australie (1 aut., 2 aut., 4 aut.); Department of Computer Science, University of Verona/Verona/Italie (2 aut., 4 aut.); Institute for Integrated and Intelligent Systems, Griffith University/Nathan, Queensland/Australie (2 aut., 4 aut.); CIRSFID, University of Bologna/Bologna/Italie (3 aut.); Department of Economics, University of California,/Davis/Etats-Unis (1 aut.); LORIA, CNRS ? Université de Lorraine/Nancy/France (2 aut.); Department of Computer Science, University of Liverpool/Liverpool/Royaume-Uni (3 aut.)
DT : Publication en série; Congrès; Niveau analytique
SO : Journal of philosophical logic; ISSN 0022-3611; Pays-Bas; Da. 2013; Vol. 42; No. 6; Pp. 799-829; Bibl. 28 ref.
LA : Anglais
EA : In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.
CC : 51910; 519
FD : Logique philosophique
ED : Philosophical Logic
LO : INIST-25573.354000507415120010
ID : 14-0003337

Links to Exploration step

Francis:14-0003337

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Computing Strong and Weak Permissions in Defeasible Logic</title>
<author>
<name sortKey="Governatori, Guido" sort="Governatori, Guido" uniqKey="Governatori G" first="Guido" last="Governatori">Guido Governatori</name>
<affiliation>
<inist:fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Olivieri, Francesco" sort="Olivieri, Francesco" uniqKey="Olivieri F" first="Francesco" last="Olivieri">Francesco Olivieri</name>
<affiliation>
<inist:fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>Department of Computer Science, University of Verona</s1>
<s2>Verona</s2>
<s3>ITA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>Institute for Integrated and Intelligent Systems, Griffith University</s1>
<s2>Nathan, Queensland</s2>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Rotolo, Antonino" sort="Rotolo, Antonino" uniqKey="Rotolo A" first="Antonino" last="Rotolo">Antonino Rotolo</name>
<affiliation>
<inist:fA14 i1="04">
<s1>CIRSFID, University of Bologna</s1>
<s2>Bologna</s2>
<s3>ITA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Scannapieco, Simone" sort="Scannapieco, Simone" uniqKey="Scannapieco S" first="Simone" last="Scannapieco">Simone Scannapieco</name>
<affiliation>
<inist:fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>Department of Computer Science, University of Verona</s1>
<s2>Verona</s2>
<s3>ITA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>Institute for Integrated and Intelligent Systems, Griffith University</s1>
<s2>Nathan, Queensland</s2>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">14-0003337</idno>
<date when="2013">2013</date>
<idno type="stanalyst">FRANCIS 14-0003337 INIST</idno>
<idno type="RBID">Francis:14-0003337</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000052</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Computing Strong and Weak Permissions in Defeasible Logic</title>
<author>
<name sortKey="Governatori, Guido" sort="Governatori, Guido" uniqKey="Governatori G" first="Guido" last="Governatori">Guido Governatori</name>
<affiliation>
<inist:fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Olivieri, Francesco" sort="Olivieri, Francesco" uniqKey="Olivieri F" first="Francesco" last="Olivieri">Francesco Olivieri</name>
<affiliation>
<inist:fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>Department of Computer Science, University of Verona</s1>
<s2>Verona</s2>
<s3>ITA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>Institute for Integrated and Intelligent Systems, Griffith University</s1>
<s2>Nathan, Queensland</s2>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Rotolo, Antonino" sort="Rotolo, Antonino" uniqKey="Rotolo A" first="Antonino" last="Rotolo">Antonino Rotolo</name>
<affiliation>
<inist:fA14 i1="04">
<s1>CIRSFID, University of Bologna</s1>
<s2>Bologna</s2>
<s3>ITA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Scannapieco, Simone" sort="Scannapieco, Simone" uniqKey="Scannapieco S" first="Simone" last="Scannapieco">Simone Scannapieco</name>
<affiliation>
<inist:fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>Department of Computer Science, University of Verona</s1>
<s2>Verona</s2>
<s3>ITA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>Institute for Integrated and Intelligent Systems, Griffith University</s1>
<s2>Nathan, Queensland</s2>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Journal of philosophical logic</title>
<title level="j" type="abbreviated">J. philos. logic</title>
<idno type="ISSN">0022-3611</idno>
<imprint>
<date when="2013">2013</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Journal of philosophical logic</title>
<title level="j" type="abbreviated">J. philos. logic</title>
<idno type="ISSN">0022-3611</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Philosophical Logic</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Logique philosophique</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0022-3611</s0>
</fA01>
<fA03 i2="1">
<s0>J. philos. logic</s0>
</fA03>
<fA05>
<s2>42</s2>
</fA05>
<fA06>
<s2>6</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>Computing Strong and Weak Permissions in Defeasible Logic</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG">
<s1>Conference on Logic and the foundations of Game and Decision Theory (LOFT10), Sevilla</s1>
</fA09>
<fA11 i1="01" i2="1">
<s1>GOVERNATORI (Guido)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>OLIVIERI (Francesco)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>ROTOLO (Antonino)</s1>
</fA11>
<fA11 i1="04" i2="1">
<s1>SCANNAPIECO (Simone)</s1>
</fA11>
<fA12 i1="01" i2="1">
<s1>BONANNO (Giacomo)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1">
<s1>VAN DITMARSCH (Hans)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="03" i2="1">
<s1>VAN DER HOEK (Wiebe)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01">
<s1>NICTA, Queensland Research Laboratory</s1>
<s2>Brisbane</s2>
<s3>AUS</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>Department of Computer Science, University of Verona</s1>
<s2>Verona</s2>
<s3>ITA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>Institute for Integrated and Intelligent Systems, Griffith University</s1>
<s2>Nathan, Queensland</s2>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</fA14>
<fA14 i1="04">
<s1>CIRSFID, University of Bologna</s1>
<s2>Bologna</s2>
<s3>ITA</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA15 i1="01">
<s1>Department of Economics, University of California,</s1>
<s2>Davis</s2>
<s3>USA</s3>
<sZ>1 aut.</sZ>
</fA15>
<fA15 i1="02">
<s1>LORIA, CNRS ? Université de Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA15>
<fA15 i1="03">
<s1>Department of Computer Science, University of Liverpool</s1>
<s2>Liverpool</s2>
<s3>GBR</s3>
<sZ>3 aut.</sZ>
</fA15>
<fA20>
<s1>799-829</s1>
</fA20>
<fA21>
<s1>2013</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>25573</s2>
<s5>354000507415120010</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2014 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>28 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>14-0003337</s0>
</fA47>
<fA60>
<s1>P</s1>
<s2>C</s2>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Journal of philosophical logic</s0>
</fA64>
<fA66 i1="01">
<s0>NLD</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.</s0>
</fC01>
<fC02 i1="01" i2="P">
<s0>51910</s0>
<s1>X</s1>
</fC02>
<fC02 i1="02" i2="P">
<s0>519</s0>
</fC02>
<fC03 i1="01" i2="P" l="FRE">
<s0>Logique philosophique</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="P" l="ENG">
<s0>Philosophical Logic</s0>
<s5>01</s5>
</fC03>
<fN21>
<s1>006</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
<pR>
<fA30 i1="01" i2="1" l="ENG">
<s1>LOFT10 Conference on Logic and the foundations of Game and Decision Theory</s1>
<s2>10</s2>
<s3>Sevilla ESP</s3>
<s4>2012-07-18</s4>
</fA30>
</pR>
</standard>
<server>
<NO>FRANCIS 14-0003337 INIST</NO>
<ET>Computing Strong and Weak Permissions in Defeasible Logic</ET>
<AU>GOVERNATORI (Guido); OLIVIERI (Francesco); ROTOLO (Antonino); SCANNAPIECO (Simone); BONANNO (Giacomo); VAN DITMARSCH (Hans); VAN DER HOEK (Wiebe)</AU>
<AF>NICTA, Queensland Research Laboratory/Brisbane/Australie (1 aut., 2 aut., 4 aut.); Department of Computer Science, University of Verona/Verona/Italie (2 aut., 4 aut.); Institute for Integrated and Intelligent Systems, Griffith University/Nathan, Queensland/Australie (2 aut., 4 aut.); CIRSFID, University of Bologna/Bologna/Italie (3 aut.); Department of Economics, University of California,/Davis/Etats-Unis (1 aut.); LORIA, CNRS ? Université de Lorraine/Nancy/France (2 aut.); Department of Computer Science, University of Liverpool/Liverpool/Royaume-Uni (3 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Journal of philosophical logic; ISSN 0022-3611; Pays-Bas; Da. 2013; Vol. 42; No. 6; Pp. 799-829; Bibl. 28 ref.</SO>
<LA>Anglais</LA>
<EA>In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.</EA>
<CC>51910; 519</CC>
<FD>Logique philosophique</FD>
<ED>Philosophical Logic</ED>
<LO>INIST-25573.354000507415120010</LO>
<ID>14-0003337</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000052 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000052 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Francis:14-0003337
   |texte=   Computing Strong and Weak Permissions in Defeasible Logic
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022