首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
It is shown that there is a Kripke incomplete logic in NExt(KTB ⊕ □2 p → □3 p). Furthermore, it is also shown that there exists a continuum of Kripke incomplete logics in NExt(KTB ⊕ □5 p → □6 p). Presented by Michael Zakharyaschev  相似文献   

2.
Batens  Diderik  Meheus  Joke 《Studia Logica》2000,66(3):327-348
This paper describes the adaptive logic of compatibility and its dynamic proof theory. The results derive from insights in inconsistency-adaptive logic, but are themselves very simple and philosophically unobjectionable. In the absence of a positive test, dynamic proof theories lead, in the long run, to correct results and, in the short run, sometimes to final decisions but always to sensible estimates. The paper contains a new and natural kind of semantics for S5from which it follows that a specific subset of the standard worlds-models is characteristic for S5.  相似文献   

3.
The title of this paper is a theorem, which I am going to state and prove. The theorem extends from prepositional to predicate languages the result I presented in [5].  相似文献   

4.
I argue that our acts of moral appraisal should be communicative. Praise and blame should communicate, to the appraised, information about their status and competences as moral agents; that they are recognised by the appraiser as a competent moral agent, and thus a legitimate candidate for appraisal. I argue for this thesis by drawing on empirical data about factors that can affect motivation. On the basis of such data, I formulate a constraint, and argue that two prominent models of moral appraisal – a consequentialist model and Wallace’s ‘evaluative response’ model – violate this constraint. The model that I propose – the communicative conception of appraisal – does not violate this constraint. This conception, I argue, can provide a fuller picture of the role of appraisals in deepening agents’ commitment to moral norms. On this model, praise and blame has not only an evaluative component, but also communicates to the agent competence affirming information.
Jules HolroydEmail:
  相似文献   

5.
Socratic Method in the Euthyphro can be fruitfully analysed as a method of irony interpretation. Socrates' method – the irony of irony interpretation – is to pretend that Euthyphro is an ironist in order to transform him into a self-ironist. To be a self-ironist is to ironize one's knowledge of virtue in order to bring an intuitive and unarticulated awareness of virtue to mind. The exercise of the capacity for self-irony is then a mode of striving for the good.  相似文献   

6.
On the Representation of N4-Lattices   总被引:2,自引:1,他引:1  
Odintsov  Sergei P. 《Studia Logica》2004,76(3):385-405
N4-lattices provide algebraic semantics for the logic N4, the paraconsistent variant of Nelson's logic with strong negation. We obtain the representation of N4-lattices showing that the structure of an arbitrary N4-lattice is completely determined by a suitable implicative lattice with distinguished filter and ideal. We introduce also special filters on N4-lattices and prove that special filters are exactly kernels of homomorphisms. Criteria of embeddability and to be a homomorphic image are obtained for N4-lattices in terms of the above mentioned representation. Finally, subdirectly irreducible N4-lattices are described.  相似文献   

7.
This paper examines some of the illustrative features of doing participant observation research with Muslims both in the field and back “home.” It is based on my experiences of conducting research in East Java, Indonesia in the classicalist Islamic boarding schools. My religious subjectivity was important to my research in a number of ways including: (1) the ways in which the community tried to define my subjectivity; (2) the nature of my personal religious subjectivity; and (3) academic interpretations of my role and my subject position vis-à-vis Islam and the profession of anthropology.
Ronald Lukens-BullEmail:
  相似文献   

8.
Relations among weight, calcium, and milk have received considerable attention, but inconsistencies remain regarding strength and direction of associations. Calcium, milk, other beverages, and weight status associations were examined among children >75th BMI percentile from three studies. Results indicated negative relations between z-BMI and non-whole milk and calcium in one sample, with lower z-BMI and percent body fat among older children drinking any non-whole milk. In one older child sample, z-BMI and percent body fat were higher for whole milk consumers. The only significant relation observed for other beverages was the negative association between juice and percent body fat in younger children. Milk, calcium, and child weight status associations are inconsistent, and appear dependent on milk type and child age.  相似文献   

9.
From time to time, the idea that enduring things can change has been challenged. The latest challenge has come in the form of what David Lewis has called a “decisive objection”, which claims to deduce a contradiction from the idea that enduring things change with respect to their temporary intrinsics, when that idea is combined with eternalism. It is my aim in this paper to explain why I think that no argument has yet appeared that deduces a contradiction from a combination of eternalism and the idea that enduring things change with respect to their temporary intrinsics, except ones that do so by committing scope fallacies.
Lawrence B. LombardEmail:
  相似文献   

10.
Supernatural Miracles and Religious Inclusiveness   总被引:1,自引:1,他引:0  
Morgan Luck 《Sophia》2007,46(3):287-293
In this paper I shall assess Clarke’s assertion that all definitions of miracles that purport to satisfy the criterion of religious inclusiveness should substitute the term ‘supernatural’ for ‘non-natural’. In addition, I shall attempt to strengthen Clarke’s conception of the supernatural by offering an analysis of what it means for something to be ‘above’ nature. Lastly, I shall offer a new argument as to why Clarke’s intention-based definition of miracles is necessarily less religiously inclusive than Mumford’s causation-based definition.
Morgan LuckEmail:
  相似文献   

11.
Anonymous speech plays a fundamental role in America’s political history. However, that long tradition of anonymous communications faces an image problem in today’s age of spam, computer viruses, spyware, denial-of-service attacks on websites, and identity theft. The criminals and hackers who perpetrate these insults on the commercial Internet are, for the most part, anonymous; we simply do not know the identities of these bad guys. Yet, the promise of anonymous communications is vital to the preservation of political liberty across the globe. Therefore, how should we regard anonymity in a digital age? And how should we strike the right balance between security and anonymity online? To begin, we should not consider the outlawing of anonymous communications as the answer to today’s cybersecurity threats. Commercial sector “regulation” of anonymity, so to speak, can play a significant role in combating these problems. Increasingly, online authentication has become important to both personal security and to cybersecurity in general. Some recent proposals toward bolstering security have included greater authentication of the source of emails to deal with spam and the requirement that those who conduct transactions online reveal their identities – seeming violations of online culture. Policymakers also want a say in the matter, and as the process unfolds, they might feel increasingly tempted to intervene whenever issues impacting privacy and authentication emerge in debates over telecommunications, intellectual property, biometrics, cybersecurity, and more. Regardless, government should not strip us of our anonymity online. Cybersecurity concerns may instead call for the marketplace – not regulators – to deal with the fact that many threats stem from that very lack of authentication. The inclusion of greater authentication standards into online services by private vendors will lead to their working in concert in unprecedented ways that may draw attention from regulatory and antitrust authorities. But these private, experimental efforts have no implications for political liberty – nor are they anticompetitive. Private solutions are the only real hope we have for decreasing cybersecurity threats, given that previous government efforts to regulate the Internet – for example, outlawing spam in 2004 – have not lived up to expectations. Political anonymity and commercial anonymity are not the same thing, and the distinction requires better appreciation. Over the coming tumultuous period of dealing with online threats, policymakers should allow the experimentation necessary to cope with today’s lack of online authentication to proceed with minimal interference.  相似文献   

12.
The Muslimwoman     
In the 6 years that have elapsed since the events of 9/11 Muslims have become the Other and veiled Muslim women have become their visible representatives. Standing in for their communities, they have attracted international media attention. So intertwined are gender and religion that they have become one. I have coined the term the Muslimwoman to describe this erasure of diversity. Some women reject this label. Others use it to empower themselves and even to subvert the identification. In the process they are constructing a new kind of cosmopolitanism. This essay asks how women can derive agency from an ascribed identity that posits their invisibility and silence.
miriam cookeEmail:
  相似文献   

13.
The goal of this two-part series of papers is to show that constructive logic with strong negation N is definitionally equivalent to a certain axiomatic extension NFL ew of the substructural logic FL ew . In this paper, it is shown that the equivalent variety semantics of N (namely, the variety of Nelson algebras) and the equivalent variety semantics of NFL ew (namely, a certain variety of FL ew -algebras) are term equivalent. This answers a longstanding question of Nelson [30]. Extensive use is made of the automated theorem-prover Prover9 in order to establish the result. The main result of this paper is exploited in Part II of this series [40] to show that the deductive systems N and NFL ew are definitionally equivalent, and hence that constructive logic with strong negation is a substructural logic over FL ew . Presented by Heinrich Wansing  相似文献   

14.
Privacy is one good among other goods and should be weighed as such. The relationship between technology and privacy is best viewed as an arms race between advancements that diminish privacy and those that better protect it, rather than the semi-Luddite view which sees technology as one-sided development enabling those who seek to invade privacy to overrun those who seek to protect it. The merits or defects of particular technologies are not inherent to the technologies, but rather, depend on how they are used and above all, on how closely their use is monitored and accounted for by the parties involved. In order to reassure the public and to ensure accountability and oversight, a civilian review board should be created to monitor the government’s use of surveillance and related technologies. Proper accountability requires multiple layers of oversight, and should not be left solely in the hands of the government.
Amitai EtzioniEmail:
  相似文献   

15.
周祯祥 《哲学动态》2006,4(2):55-58
一动态命题逻辑的来源和基本构想动态逻辑DL(DYNAM IC LOGIC)是关于行动和程序推理的形式系统。DL可以描述为三个经典逻辑的合成:一是一阶谓词逻辑;二是模态逻辑;三是正则事件(REGULAR EVENT)的代数。DL区分于经典逻辑的地方是其真值的特性:经典逻辑的真值是静态的,一公式Φ的真值由其结构中自由变元的取值所决定,公式Φ导致的真值和赋值被看做不可改变的。[1]而动态逻辑在这点上正好相反,在DL中,有清晰的被称做程序的语形结构,这些程序的作用就是改变变元的值,由此进而改变公式的值。这些改变在经典谓词逻辑中,是在元逻辑的层…  相似文献   

16.
The concern of this work is how knowledge based on design experience can be developed, disseminated, articulated, and acquired. We propose the notion of inspirational patterns, or i-patterns, which refers to abstractions of core ideas and essential elements from a class of coherent examples, pointing to promising regions in the design space. Most current work on patterns concentrates on proven solutions to recurring problems; i-patterns, on the other hand, are oriented toward the innovative and inspirational. The design domain of interest to us is interaction design, which can be roughly defined as design with digital materials. More specifically, we focus on the intersection of tangible interfaces and social computing that is called embodied interaction. The paper presents nine i-patterns for embodied interaction, including “Virtual information is tied to positions in the material world” and “Heterogeneous virtual information fuses into a few sensory parameters.” Published in Proc. Nordes 2005, submitted for republication in Knowledge, Technology and Policy.  相似文献   

17.
Greg Janzen 《Philosophia》2008,36(3):355-366
According to reductive intentionalism, the phenomenal character of a conscious experience is constituted by the experience's intentional (or representational) content. In this article I attempt to show that a phenomenon in visual perception called change blindness poses a problem for this doctrine. Specifically, I argue that phenomenal character is not sensitive, as it should be if reductive intentionalism is correct, to fine-grained variations in content. The standard anti-intentionalist strategy is to adduce putative cases in which phenomenal character varies despite sameness of content. This paper explores an alternative antiintentionalist tack, arguing, by way of a specific example involving change blindness, that content can vary despite sameness of phenomenal character.
Greg JanzenEmail:
  相似文献   

18.
We study those models of ZFCwhich are embeddable, as the class of all standard sets, in a model of internal set theory >ISTor models of some other nonstandard set theories. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

19.
Different types of consent are used to obtain human biospecimens for future research. This variation has resulted in confusion regarding what research is permitted, inadvertent constraints on future research, and research proceeding without consent. The National Institutes of Health (NIH) Clinical Center's Department of Bioethics held a workshop to consider the ethical acceptability of addressing these concerns by using broad consent for future research on stored biospecimens. Multiple bioethics scholars, who have written on these issues, discussed the reasons for consent, the range of consent strategies, and gaps in our understanding, and concluded with a proposal for broad initial consent coupled with oversight and, when feasible, ongoing provision of information to donors. This article describes areas of agreement and areas that need more research and dialogue. Given recent proposed changes to the Common Rule, and new guidance regarding storing and sharing data and samples, this is an important and timely topic.  相似文献   

20.
Kowalski  Tomasz 《Studia Logica》2004,77(2):255-265
We prove that all semisimple varieties of FL ew-algebras are discriminator varieties. A characterisation of discriminator and EDPC varieties of FL ew-algebras follows. It matches exactly a natural classification of logics over FL ew proposed by H. Ono.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号