Jingde Cheng Department of Information and Computer Sciences, Saitama University, Japan Abstract. 2.

Size: px
Start display at page:

Download "Jingde Cheng Department of Information and Computer Sciences, Saitama University, Japan cheng@ics.saitama-u.ac.jp. Abstract. 2."

Transcription

1 Normativeness, Relevance, and Temporality in Specifying and Reasoning about Information Security and Assurance: Can We have a Formal Logic System as a Unified Logical Basis? (Position Paper) Jingde Cheng Department of Information and Computer Sciences, Saitama University, Japan cheng@ics.saitama-u.ac.jp As long as a branch of science offers an abundance of problems, so long is it alive: a lack of problems foreshadows extinction or the cessation of independent development. - David Hilbert, The formulation of a problem is often more essential than its solution, which may be merely a matter of mathematical or experimental skill. To raise new questions, new possibilities, to regard old problems from a new angle, requires creative imagination and marks real advance in science. - Albert Einstein, Abstract This position paper points out the NRT problem in specifying and reasoning about information security and assurance: Although it is necessary to deal with normative, relevance, and temporal notions explicitly and soundly in specifying and reasoning about information security and assurance, until now there is no formal logic system can be used as a unified logical basis for the purpose. Therefore, how to establish a formal logic system as a unified logical basis, which takes all of normativeness, relevance, and temporality into account, to underlie specifying and reasoning about information security and assurance is a urgent research problem. 1. Introduction Information security and assurance problems are intrinsically concerning the following questions: Who is authorized (permitted, or has right) to access and modify what information by what way from what machine or site in what time or state, and who does not be authorized to do so. Therefore, information security and assurance engineering is intrinsically an engineering discipline to deal with normative requirements and their implementation and verification (validation) techniques for secure information systems. Since informal requirements and their verification and validation are completely inadequate to guaranteeing information security and information assurance, formal logic systems have been used in specifying and reasoning about information security and assurance. However, there is a problem, named the NRT problem by the present author, in specifying and reasoning about information security and assurance: Although it is necessary to deal with normative, relevance, and temporal notions explicitly and soundly in specifying and reasoning about information security and assurance, until now there is no formal logic system can be used as a unified logical basis for the purpose. Therefore, how to establish a formal logic system as a unified logical basis, which takes all of normativeness, relevance, and temporality into account, to underlie specifying and reasoning about information security and assurance is a urgent research problem. The rest of this position paper presents some informal explanations on the problem. 2. Normativeness Any approach to specifying and reasoning about information security and assurance cannot be considered to be adequate if it does not deal with normative notions explicitly and soundly. Deontic logic is a branch of philosophical logic to deal with normative notions such as obligation (ought), permission (permitted), and prohibition (may not) for underlying normative reasoning [3, 4, 10, 23, 30, 36, 37, 39, 41, 51, 52]. Informally, it can also be considered as a logic to reason about ideal versus actual states or behaviour. It seems to be an adequate tool to specify and verify information security and assurance requirements. There have been some works on application of deontic logic to specifying and reasoning about information security and assurance. Cuppens first applied deontic logic (and also epistemic logic and temporal logic) to reasoning about security [19]. Bieber and Cuppens applied deontic logic to expression of security policies, and semantics of secure dependencies [5, 6, 7]. Dignum

2 and Kuiper use deontic and temporal logic to specifying deadlines with dense time in electronic commerce [21]. However, classical deontic logic has the well-known problem of deontic paradoxes as well as the problem of implicational paradoxes. Any work on this direction can not be said to be sound if it does not pay attention to and give some solution to these paradoxes. 3. Relevance The notion of relevance is crucial to finding or predicting some thing in reasoning, discovery, and prediction because in order to know or recognize some thing previously unknown or unrecognized, we have to investigate what are relevant to our knowledge or assumptions. Reasoning is the process of drawing new conclusions from given premises, which are already known facts or previously assumed hypotheses. Therefore, reasoning is intrinsically ampliative, i.e., it has the function of enlarging or extending some things, or adding to what is already known or assumed. In general, a reasoning consists of a number of arguments (or inferences) in some order. An argument (or inference) is a set of declarative sentences consisting of one or more sentences as its premises, which contain the evidence, and one sentence as its conclusion. In an argument, a claim is being made that there is some sort of evidential relation between its premises and its conclusion: the conclusion is supposed to follow from the premises, or equivalently, the premises are supposed to entail the conclusion. Therefore, the correctness of an argument is a matter of the connection (or relevance) between its premises and its conclusion, and concerns the strength of the relation between them (Note that the correctness of an argument depends neither on whether the premises are really true or not, nor on whether the conclusion is really true or not). A logically valid reasoning is a reasoning such that its arguments are justified based on some logical validity criterion provided by a logic system in order to obtain correct conclusions (Note that here the term correct does not necessarily mean true. ). Today, there are so many different logic systems motivated by various philosophical considerations. As a result, a reasoning may be valid on one logical validity criterion but invalid on another. For example, the classical account of validity, which is one of fundamental principles and assumptions underlying classical mathematical logic and its various classical conservative extensions, is defined in terms of truth-preservation (in some certain sense of truth) as: an argument is valid if and only if it is impossible for all its premises to be true while its conclusion is false. Therefore, a classically valid reasoning must be truthpreserving. On the other hand, for any correct argument in scientific reasoning as well as our everyday reasoning, its premises must somehow be relevant to its conclusion, and vice versa. The relevant account of validity is defined in terms of relevance as: for an argument to be valid there must be some connection of meaning, i.e., some relevance, between its premises and its conclusion. Obviously, the relevance between the premises and conclusion of an argument is not accounted for by the classical logical validity criterion, and therefore, a classically valid reasoning is not necessarily relevant. Proving is the process of finding a justification for an explicitly specified statement from given premises, which are already known facts or previously assumed hypotheses. A proof is a description of a found justification. A logically valid proving is a proving such that it is justified based on some logical validity criterion provided by a logic system in order to obtain a correct proof. The most intrinsic difference between reasoning and proving is that the former is intrinsically prescriptive and predictive while the latter is intrinsically descriptive and non-predictive. The purpose of reasoning is to find some new conclusion previously unknown or unrecognized, while the purpose of proving is to find a justification for some specified statement previously given. Proving has an explicitly given target as its goal while reasoning does not. Unfortunately, until now, many studies in Computer Science and Artificial Intelligence disciplines still confuse proving with reasoning. Discovery is the process to find out or bring to light of that which was previously unknown. For any discovery, both the discovered thing and its truth must be unknown before the completion of the discovery process. Since reasoning is the only way to draw new conclusions from given premises, there is no discovery process that does not invoke reasoning. Prediction is the process to make some future event known in advance, especially on the basis of special knowledge. For any prediction, both the predicted event and its occurrence must be unknown and uncertain before the completion of prediction process. Since reasoning is the only way to draw new conclusions from given premises, there is no prediction process that does not invoke reasoning. Proving is useful in verification and validation of information security and assurance requirements and their implementation. Almost all current formal analysis techniques in information security and assurance engineering invoke somehow proving based on some formal systems. However, proving techniques can only applied to those cases where an explicit statement needed to be proved has been given previously. In practices of the real world, when we have designed, say some cryptographic protocols for a security and assurance issue, what we often want to know is the answer to this question: is there some flaws that we did not consider? Since there is no explicit statement given previously, the only way we have to adopt is reasoning. Classical mathematical logic was established in order to provide formal languages for describing the mathematical structures with which mathematicians work, and the methods of proof available to them. Both the

3 object and the method of investigation of classical mathematical logic are mathematical proof (Note that mathematical proving is different from mathematical reasoning). Given its mathematical method, it must be descriptive rather than prescriptive, and its description must be idealized. Classical mathematical logic may be suitable to searching and describing a formal proof of a previously specified theorem, but not necessarily suitable to forming a new concept and finding a new theorem because the aim, nature, and role of the classical mathematical logic is descriptive and non-predictive rather than prescriptive and predictive. Classical mathematical logic is based on the classical account of validity, and represents the notion of conditional, which is intrinsically intensional, by the truth-functional extensional notion of material implication. As a result, even if a reasoning based on classical mathematical logic is classically valid, neither the necessary relevance between its premises and conclusion nor the truth of its conclusion in the sense of conditional can be guaranteed necessarily. Classical mathematical logic is a formal logic system for describing mathematical proofs but not a logic system for reasoning. Note that all problems in classical mathematical logic concerning the classical account of validity and the notion of material implication are remained in any of its various classical conservative extensions where the classical account of validity is adopted as the logical validity criterion and the notion of conditional is represented directly or indirectly by the notion of material implication. Relevant (relevance) logic is a branch of philosophical logic to deal with the notion of entailment for underlying relevant reasoning [1, 2, 20, 22, 34, 40]. It was established during the 1950s in order to find a mathematically satisfactory way of grasping the elusive notion of relevance of antecedent to consequent in conditionals, and to obtain a notion of implication which is free from the so-called paradoxes of material and strict implication. Some major traditional relevant logic systems are system E of entailment, system R of relevant implication, and system T of ticket entailment. A major feature of these relevant logics is that they have a primitive intensional connective to represent the notion of conditional and their logical theorems include no implicational paradoxes. Strong relevant (relevance) logic proposed by the present author rejected all implicational paradoxes in classical mathematical logic as well as traditional relevant logic [11, 15]. Almost all current logic-based approaches to information security analysis are based on classical mathematical logic and its various classical and nonclassical conservative extensions, and therefore, they are verification-oriented [9, 38, 45, 46, 47]. As mentioned above, in order to deal with issues in practices of the real world, we need some reasoning-oriented approach to specifying and reasoning about information security and assurance. Relevant logic must play a crucial role in such reasoning-oriented approach. However, no research on applying relevant logic to specifying and reasoning about information security and assurance was reported until now. The only work concerning application of both relevant logic and deontic logic to specifying and reasoning about information security and assurance is the one proposed by the present author recently [17]. 4. Temporality Classical temporal logics was established in order to deal with those propositions whose truth-values may depend on time and therefore to underlie temporal reasoning [8, 24, 25, 50]. As a conservative extension of classical mathematical logic, they have remarkably expanded the uses of logic to reasoning about human (and hence computer) time-related activities [26]. In particular, they have been shown to be useful as the logic basis for specification and verification of traditional reactive systems [32, 33]. Since many information security and assurance issues are time-related, there have been some works on application of temporal logic to specifying and reasoning about information security and assurance. Syverson first proposed to add temporal formalisms to the logics of authentication [44]. Gray and McLean have applied temporal logic to specifying and verifying cryptographic protocols [29]. And, as mentioned in Section 2, Cuppens first applied deontic logic, epistemic logic, and temporal logic to reasoning about security [19], and Dignum and Kuiper use deontic and temporal logic to specifying deadlines with dense time in electronic commerce [21]. However, since any of classical temporal logics is a classical conservative extension of classical mathematical logic such that it is based on the classical account of validity and it represents the notion of conditional by the notion of material implication, all problems in classical mathematical logic concerning the classical account of validity and the notion of material implication are remained in all classical temporal logics. Therefore, even if a reasoning based on classical temporal logic is classically valid, neither the necessary relevance between its premises and conclusion nor the truth of its conclusion in the sense of conditional can be guaranteed necessarily. 5. The NRT Problem Based on the above discussions, we can say all of Normativeness, Relevance, and Temporality (NRT) are necessary to specifying, reasoning about, and verifying information security and assurance. It is well known that both deontic logic and temporal logic are modal logics in the sense that both deontic operators concerning normative notions and temporal operators concerning time notions are different interpretations of general modal operators in modal logics, and relevant logic E is also a modal logic.

4 Thus, this raises a fundamental question, the NRT problem named by the present author: How can we deal with those modal notions of normativeness, relevance, and temporality within one formal logic system as a unified logical basis to underlie specifying, reasoning about, and verifying information security and assurance? There have been some works on unifying two modal logics into one formal logic system. Stelzner first proposed relevant deontic logic [43]. Goble considered deontic logic with relevance [27]. Tagawa and the present author proposed deontic relevant logic based on strong relevant logic to remove those deontic paradoxes from classical deontic logic [48]. The present author proposed temporal relevant logic based on strong relevant logic in order to obtain one formal logic system to underlie both temporal and relevant reasoning [12, 13, 18]. However, there is no work on unifying all of deontic logic, relevant logic, and temporal logic into one formal logic system until now. At present, how to unify these modal logics is a completely open problem. Its solution needs a lot of investigations from the viewpoints of Philosophy, Logic, as well as Computer Science. 6. Concluding Remarks We have presented the NRT problem from the viewpoint of information security and assurance engineering and given some informal explanations on it. Logic is a special discipline which is considered to be the basis for all other sciences, and therefore, it is a science prior to all others, which contains the ideas and principles underlying all sciences [28, 31, 49]. Although we presented the NRT problem from the viewpoint of information security and assurance engineering, it is probably also interesting in both Philosoph and Logic. If the application domain and environment of an information system cannot be modelled as a simple YES- NO or WHITE-BLACK world (probably almost all application domains and environments in the real world are not bivalence worlds), then the notion of fuzziness and approximate reasoning have to be considered [14, 16]. Thus, in that case, the above NRT problem will become FNRT problem. References [1] A. R. Anderson and N. D. Belnap Jr., Entailment: The Logic of Relevance and Necessity, Vol. I, Princeton University Press, [2] A. R. Anderson, N. D. Belnap Jr., and J. M. Dunn, Entailment: The Logic of Relevance and Necessity, Vol. II, Princeton University Press, [3] L. Aqvist, Deontic Logic, in: D. Gabbay and F. Guenthner (Eds.), Handbook of Philosophical Logic, 2nd Edition, Vol. 8, pp , Kluwer Academic, [4] L. Aqvist, Introduction to Deontic Logic and the Theory of Normative Systems, Bibliopolis, [5] P. Bieber and F. Cuppens, Computer Security Policies and Deontic Logic, Proc. of the Workshop on Deontic Logic and Computer Science, pp , [6] P. Bieber and F. Cuppens, A Logical View of Secure Dependencies, Journal of Computer Security, Vol. 1, No. 1, [7] P. Bieber and F. Cuppens, Expression of Confidentiality Policies with Deontic Logic, in J.-J. C. Meyer and R. Wieringa (Eds.), Deontic Logic in Computer Science: Normative System Specification, pp , Wiley, [8] J. P. Burgess, Basic Tense Logic, in: D. Gabbay and F. Guenthner (Eds.), Handbook of Philosophical Logic, 2nd Edition, Vol. 7, pp. 1-42, Kluwer Academic, [9] M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, ACM Transactions on Computer Systems, Vol. 8, No. 1, pp , [10] J. Carmo and A. J. I. Jones, Deontic Logic and Contraryto-Duties, in: D. Gabbay and F. Guenthner (Eds.), Handbook of Philosophical Logic, 2nd Edition, Vol. 8, pp , Kluwer Academic, [11] J. Cheng, The Fundamental Role of Entailment in Knowledge Representation and Reasoning, Journal of Computing and Information, Vol. 2, No. 1, pp , [12] J. Cheng, Temporal Relevant Logic as the Logic Basis for Reasoning about Dynamics of Concurrent Systems, Proc IEEE-SMC Annual International Conference on Systems, Man, and Cybernetics, Vol. 1, pp , [13] J. Cheng, Temporal Relevant Logic: What Is It and Why Study It? Volume of Abstracts of the 11th IUHPS/DLMPS International Congress of Logic, Methodology and Philosophy of Science, p. 253, [14] J. Cheng, Fuzzy Relevant Logic: What Is It and Why Study It? Proc IEEE-SMC Annual International Conference on Systems, Man, and Cybernetics, Vol. 5, pp , [15] J. Cheng, A Strong Relevant Logic Model of Epistemic Processes in Scientific Discovery, in E. Kawaguchi, H. Kangassalo, H. Jaakkola, and I. A. Hamid (Eds.), Information Modelling and Knowledge Bases XI, pp , IOS Press, [16] J. Cheng, Fuzziness and Relevance: Can We Establish a Unified Logical Basis for Approximate and Relevant Reasoning? Proc. 4th Asian Fuzzy Systems Symposium, pp , [17] J. Cheng, Deontic Relevant Logic as the Logical Basis for Specifying and Reasoning about Information Security and Assurance, Volume of Abstracts of the 12th IUHPS/DLMPS International Congress of Logic, Methodology and Philosophy of Science, pp , [18] J. Cheng, Temporal Relevant Logic as the Logical Basis of Anticipatory Reasoning-Reacting Systems, 6th International Conference on Computing Anticipatory Systems, 2003.

5 [19] F. Cuppens, An Epistemic and Deontic Logic for Reasoning about Computer Security, Proc. 1st European Symposium on Research in Computer Security, pp , [20] M. R. Diaz, Topics in the Logic of Relevance, Philosophia Verlag, [21] F. Dignum and R. Kuiper, Specifying Deadlines with Dense Time Using Deontic and Temporal Logic, International Journal of Electronic Commerce, Vol. 3, pp , [22] J. M. Dunn and G. Restall, Relevance Logic, in: D. Gabbay and F. Guenthner (Eds.), Handbook of Philosophical Logic, 2nd Edition, Vol. 6, pp , Kluwer Academic, [23] J. W. Forrester, Being Good and Being Logical: Philosophical Groundwork for a New Deontic Logic, M. E. Sharpe, [24] D. M. Gabbay, I. Hodkinson, and M. Reynolds, Temporal Logic: Mathematical Foundations and Computational Aspects, Vol. 1, Oxford: Oxford University Press, [25] D. M. Gabbay, M. A. Reynolds, and M. Finger, Temporal Logic: Mathematical Foundations and Computational Aspects, Vol. 2, Oxford: Oxford University Press, [26] A. Galton (Ed.), Temporal Logics and Their Applications, Academic Press, [27] L. Goble, Deontic Logic with Relevance, in P. McNamara and H. Prakken (Eds.), Norms, Logics, and Information Systems, IOS Press, [28] K. Godel, Russell s Mathematical Logic, in Schilpp (Ed.), The Philosophy of Bertrand Russell, Open Court Publishing Company, [29] J. W. Gray and J. D. McLean, Using Temporal Logic to Specify and Verify Cryptographic Protocols (Progress Report), Proc. 8th IEEE Computer Security Foundations Workshop, [30] R. Hilpinen, Deontic Logic, in L. Goble (Ed.), The Blackwell Guide to Philosophical Logic, pp , Blackwell, [31] W. Kneale and M. Kneale, The Development of Logic, Oxford University Press, [32] Z. Manna and A. Pnueli, The Temporal Logic of Reactive and Concurrent Systems: Specification, Springer, [33] Z. Manna and A. Pnueli, Temporal Verification of Reactive Systems: Safety, Springer, [34] E. D. Mares and R. K. Meyer, Relevant Logics, in L. Goble (Ed.), The Blackwell Guide to Philosophical Logic, pp , Blackwell, [35] C. Meadows, Open Issues in Formal Methods for Cryptographic Protocol Analysis, Proc. DISCEX 2000, IEEE Computer Society Press, pp , [36] J.-J. C. Meyer and R. Wieringa (Eds.), Deontic Logic in Computer Science: Normative System Specification, Wiley, [37] J.-J. C. Meyer, R. Wieringa, and F. P. M. Dignum, The Role of Deontic Logic in The Specification of Information Systems, in J. Chomicki and G. Saake (Eds.), Logics for Databases and Information Systems, Kluwer Academic, pp , [38] D. Monniaux, Analysis of Cryptographic Protocols Using Logics of Belief: An Overview, Journal of Telecommunications and Information Technology, Vol. 4, pp , [39] D. Nute (Ed.), Defeasible Deontic Logic, Kluwer Academic, [40] S. Read, Relevant Logic: A Philosophical Examination of Inference, Basil Blackwell, [41] L. M. M. Royakkers, Extending Deontic Logic for the Formalisation of Legal Rules, Kluwer Academic, [42] B. Russell, The Principles of Mathematics, 2nd edition, Cambridge University Press, 1903, 1938, Norton Paperback Edition, Norton, [43] W. Stelzner, Relevant Deontic Logic, Journal of Philosophical Logic, Vol. 21, No. 2, pp , [44] P. Syverson, Adding Time to a Logic of Authentication, Proc. 1st ACM Conference on Computer and Communications Security, [45] P. F. Syverson and I. Cervesato, The Logic of Authentication Protocols, in R. Focardi and R. Gorrieri (Eds.), Foundations of Security Analysis and Design, Lectures Notes in Computer Science, Vol. 2171, pp , Springer-Verlag, [46] P. F. Syverson and C. Meadows, A Logical Language for Specifying Cryptographic Protocol Requirements, Proc IEEE Symposium on Research on Security and Privacy, IEEE Computer Society Press, [47] P. F. Syverson and P. C. van Oorschot, On Unifying Some Cryptographic Protocol Logics, Proc. IEEE Symposium on Research in Security and Privacy, pp , [48] T. Tagawa and J. Cheng, Deontic Relevant Logic: A Strong Relevant Logic Approach to Removing Paradoxes from Deontic Logic, in M. Ishizuka and A. Sattar (Eds.), PRICAI 2002: Trends in Artificial Intelligence, 7th Pacific Rim International Conference on Artificial Intelligence, Lectures Notes in Computer Science, Vol. 2417, pp , Springer-Verlag, [49] A. Tarski, Introduction to Logic and to the Methodology of the Deductive Sciences, 4th Edition, Revised, Oxford University Press, 1941, 1946, 1965, [50] Y. Venema, Temporal Logic, in L. Goble (Ed.), The Blackwell Guide to Philosophical Logic, pp , Blackwell, [51] G. von Wright, Deontic Logic, Mind, Vol. 60, pp. 1-15, [52] G. von Wright, Norm and Action, Routledge & Kegan Paul, 1963.

Handout #1: Mathematical Reasoning

Handout #1: Mathematical Reasoning Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or

More information

Last time we had arrived at the following provisional interpretation of Aquinas second way:

Last time we had arrived at the following provisional interpretation of Aquinas second way: Aquinas Third Way Last time we had arrived at the following provisional interpretation of Aquinas second way: 1. 2. 3. 4. At least one thing has an efficient cause. Every causal chain must either be circular,

More information

or conventional implicature [1]. If the implication is only pragmatic, explicating logical truth, and, thus, also consequence and inconsistency.

or conventional implicature [1]. If the implication is only pragmatic, explicating logical truth, and, thus, also consequence and inconsistency. 44 ANALYSIS explicating logical truth, and, thus, also consequence and inconsistency. Let C1 and C2 be distinct moral codes formulated in English. Let C1 contain a norm N and C2 its negation. The moral

More information

Computation Beyond Turing Machines

Computation Beyond Turing Machines Computation Beyond Turing Machines Peter Wegner, Brown University Dina Goldin, U. of Connecticut 1. Turing s legacy Alan Turing was a brilliant mathematician who showed that computers could not completely

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

Cosmological Arguments for the Existence of God S. Clarke

Cosmological Arguments for the Existence of God S. Clarke Cosmological Arguments for the Existence of God S. Clarke [Modified Fall 2009] 1. Large class of arguments. Sometimes they get very complex, as in Clarke s argument, but the basic idea is simple. Lets

More information

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce

More information

Lecture 2. What is the Normative Role of Logic?

Lecture 2. What is the Normative Role of Logic? Lecture 2. What is the Normative Role of Logic? What is the connection between (deductive) logic and rationality? One extreme: Frege. A law of logic is a law of rational thought. Seems problematic, if

More information

Philosophical argument

Philosophical argument Michael Lacewing Philosophical argument At the heart of philosophy is philosophical argument. Arguments are different from assertions. Assertions are simply stated; arguments always involve giving reasons.

More information

DEVELOPING HYPOTHESIS AND

DEVELOPING HYPOTHESIS AND Shalini Prasad Ajith Rao Eeshoo Rehani DEVELOPING 500 METHODS SEPTEMBER 18 TH 2001 DEVELOPING HYPOTHESIS AND Introduction Processes involved before formulating the hypotheses. Definition Nature of Hypothesis

More information

Theory of Automated Reasoning An Introduction. Antti-Juhani Kaijanaho

Theory of Automated Reasoning An Introduction. Antti-Juhani Kaijanaho Theory of Automated Reasoning An Introduction Antti-Juhani Kaijanaho Intended as compulsory reading for the Spring 2004 course on Automated Reasononing at Department of Mathematical Information Technology,

More information

CONCEPTUAL CONTINGENCY AND ABSTRACT EXISTENCE

CONCEPTUAL CONTINGENCY AND ABSTRACT EXISTENCE 87 CONCEPTUAL CONTINGENCY AND ABSTRACT EXISTENCE BY MARK COLYVAN Mathematical statements such as There are infinitely many prime numbers and 2 ℵ 0 > ℵ 0 are usually thought to be necessarily true. Not

More information

Correspondence analysis for strong three-valued logic

Correspondence analysis for strong three-valued logic Correspondence analysis for strong three-valued logic A. Tamminga abstract. I apply Kooi and Tamminga s (2012) idea of correspondence analysis for many-valued logics to strong three-valued logic (K 3 ).

More information

Five High Order Thinking Skills

Five High Order Thinking Skills Five High Order Introduction The high technology like computers and calculators has profoundly changed the world of mathematics education. It is not only what aspects of mathematics are essential for learning,

More information

Information Technology and Knowledge Management

Information Technology and Knowledge Management Information Technology and Knowledge Management E. Shimemura and Y. Nakamori Japan Advanced Institute of Science and Technology 1-1 Asahidai, Tatsunokuchi, Ishikawa 923-1292, Japan Abstract This paper

More information

Semantic Groundedness

Semantic Groundedness Semantic Groundedness Hannes Leitgeb LMU Munich August 2011 Hannes Leitgeb (LMU Munich) Semantic Groundedness August 2011 1 / 20 Luca told you about groundedness in set theory. Now we turn to groundedness

More information

The epistemic structure of de Finetti s betting problem

The epistemic structure of de Finetti s betting problem The epistemic structure of de Finetti s betting problem Tommaso Flaminio 1 and Hykel Hosni 2 1 IIIA - CSIC Campus de la Univ. Autònoma de Barcelona s/n 08193 Bellaterra, Spain. Email: tommaso@iiia.csic.es

More information

Scientific Reasoning: A Solution to the Problem of Induction

Scientific Reasoning: A Solution to the Problem of Induction International Journal of Basic & Applied Sciences IJBAS-IJENS Vol:10 No:03 49 Scientific Reasoning: A Solution to the Problem of Induction Wilayat Khan and Habib Ullah COMSATS Institute of Information

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Quine on truth by convention

Quine on truth by convention Quine on truth by convention March 8, 2005 1 Linguistic explanations of necessity and the a priori.............. 1 2 Relative and absolute truth by definition.................... 2 3 Is logic true by convention?...........................

More information

Appendix A: Science Practices for AP Physics 1 and 2

Appendix A: Science Practices for AP Physics 1 and 2 Appendix A: Science Practices for AP Physics 1 and 2 Science Practice 1: The student can use representations and models to communicate scientific phenomena and solve scientific problems. The real world

More information

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013 PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the

More information

How does the problem of relativity relate to Thomas Kuhn s concept of paradigm?

How does the problem of relativity relate to Thomas Kuhn s concept of paradigm? How does the problem of relativity relate to Thomas Kuhn s concept of paradigm? Eli Bjørhusdal After having published The Structure of Scientific Revolutions in 1962, Kuhn was much criticised for the use

More information

DEDUCTIVE & INDUCTIVE REASONING

DEDUCTIVE & INDUCTIVE REASONING DEDUCTIVE & INDUCTIVE REASONING Expectations 1. Take notes on inductive and deductive reasoning. 2. This is an information based presentation -- I simply want you to be able to apply this information to

More information

Superposition & the paradoxes of quantum mechanics

Superposition & the paradoxes of quantum mechanics Superposition & the paradoxes of quantum mechanics phil 20229 Jeff Speaks February 5, 2008 1 Some examples of quantum weirdness........................... 1 1.1 Color and hardness..................................

More information

2 Definitions. 2.1 Normative systems. 2.2 Norms in sociology

2 Definitions. 2.1 Normative systems. 2.2 Norms in sociology Introduction to Normative Multiagent Systems Guido Boella Dipartimento di Informatica Università di Torino Italy guido@di.unito.it Harko Verhagen Dept of Computer and Systems Sciences Stockholm University\KTH,

More information

Biological kinds and the causal theory of reference

Biological kinds and the causal theory of reference Biological kinds and the causal theory of reference Ingo Brigandt Department of History and Philosophy of Science 1017 Cathedral of Learning University of Pittsburgh Pittsburgh, PA 15260 E-mail: inb1@pitt.edu

More information

Time and Causation in Gödel s Universe.

Time and Causation in Gödel s Universe. Time and Causation in Gödel s Universe. John L. Bell In 1949 the great logician Kurt Gödel constructed the first mathematical models of the universe in which travel into the past is, in theory at least,

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

The History of Logic. Aristotle (384 322 BC) invented logic.

The History of Logic. Aristotle (384 322 BC) invented logic. The History of Logic Aristotle (384 322 BC) invented logic. Predecessors: Fred Flintstone, geometry, sophists, pre-socratic philosophers, Socrates & Plato. Syllogistic logic, laws of non-contradiction

More information

INDUCTIVE & DEDUCTIVE RESEARCH APPROACH

INDUCTIVE & DEDUCTIVE RESEARCH APPROACH INDUCTIVE & DEDUCTIVE RESEARCH APPROACH Meritorious Prof. Dr. S. M. Aqil Burney Director UBIT Chairman Department of Computer Science University of Karachi burney@computer.org www.drburney.net Designed

More information

3. Logical Reasoning in Mathematics

3. Logical Reasoning in Mathematics 3. Logical Reasoning in Mathematics Many state standards emphasize the importance of reasoning. We agree disciplined mathematical reasoning is crucial to understanding and to properly using mathematics.

More information

A Few Basics of Probability

A Few Basics of Probability A Few Basics of Probability Philosophy 57 Spring, 2004 1 Introduction This handout distinguishes between inductive and deductive logic, and then introduces probability, a concept essential to the study

More information

Read this syllabus very carefully. If there are any reasons why you cannot comply with what I am requiring, then talk with me about this at once.

Read this syllabus very carefully. If there are any reasons why you cannot comply with what I am requiring, then talk with me about this at once. LOGIC AND CRITICAL THINKING PHIL 2020 Maymester Term, 2010 Daily, 9:30-12:15 Peabody Hall, room 105 Text: LOGIC AND RATIONAL THOUGHT by Frank R. Harrison, III Professor: Frank R. Harrison, III Office:

More information

Kant s deontological ethics

Kant s deontological ethics Michael Lacewing Kant s deontological ethics DEONTOLOGY Deontologists believe that morality is a matter of duty. We have moral duties to do things which it is right to do and moral duties not to do things

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

One natural response would be to cite evidence of past mornings, and give something like the following argument:

One natural response would be to cite evidence of past mornings, and give something like the following argument: Hume on induction Suppose you were asked to give your reasons for believing that the sun will come up tomorrow, in the form of an argument for the claim that the sun will come up tomorrow. One natural

More information

The Normative Role of Logic Hartry Field and Peter Milne

The Normative Role of Logic Hartry Field and Peter Milne The Normative Role of Logic Hartry Field and Peter Milne WHAT IS THE NORMATIVE ROLE OF LOGIC? The paper tries to spell out a connection between deductive logic and rationality, against Harman s arguments

More information

1/9. Locke 1: Critique of Innate Ideas

1/9. Locke 1: Critique of Innate Ideas 1/9 Locke 1: Critique of Innate Ideas This week we are going to begin looking at a new area by turning our attention to the work of John Locke, who is probably the most famous English philosopher of all

More information

Writer moves somewhat beyond merely paraphrasing someone else s point of view or

Writer moves somewhat beyond merely paraphrasing someone else s point of view or RUBRIC FOR EVALUATING STUDENT PHILOSOPHY ESSAYS (APPLIED ETHICS/PHILOSOPHY OF ART AND CULTURE CONCENTRATIONS) Explanation of the rubric: The rubric incorporates aspects of an already existing model for

More information

The Advantages of Automatic Protocol Creation

The Advantages of Automatic Protocol Creation AUTOMATIC PROTOCOL CREATION FOR INFORMATION SECURITY SYSTEM Mr. Arjun Kumar arjunsingh@abes.ac.in ABES Engineering College, Ghaziabad Master of Computer Application ABSTRACT Now a days, security is very

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Likewise, we have contradictions: formulas that can only be false, e.g. (p p).

Likewise, we have contradictions: formulas that can only be false, e.g. (p p). CHAPTER 4. STATEMENT LOGIC 59 The rightmost column of this truth table contains instances of T and instances of F. Notice that there are no degrees of contingency. If both values are possible, the formula

More information

P vs NP problem in the field anthropology

P vs NP problem in the field anthropology Research Article P vs NP problem in the field anthropology Michael.A. Popov, Oxford, UK Email Michael282.eps@gmail.com Keywords P =?NP - complexity anthropology - M -decision - quantum -like game - game-theoretical

More information

Practical Research. Paul D. Leedy Jeanne Ellis Ormrod. Planning and Design. Tenth Edition

Practical Research. Paul D. Leedy Jeanne Ellis Ormrod. Planning and Design. Tenth Edition Practical Research Planning and Design Tenth Edition Paul D. Leedy Jeanne Ellis Ormrod 2013, 2010, 2005, 2001, 1997 Pearson Education, Inc. All rights reserved. Chapter 1 The Nature and Tools of Research

More information

Lecture 8 The Subjective Theory of Betting on Theories

Lecture 8 The Subjective Theory of Betting on Theories Lecture 8 The Subjective Theory of Betting on Theories Patrick Maher Philosophy 517 Spring 2007 Introduction The subjective theory of probability holds that the laws of probability are laws that rational

More information

Things That Might Not Have Been Michael Nelson University of California at Riverside mnelson@ucr.edu

Things That Might Not Have Been Michael Nelson University of California at Riverside mnelson@ucr.edu Things That Might Not Have Been Michael Nelson University of California at Riverside mnelson@ucr.edu Quantified Modal Logic (QML), to echo Arthur Prior, is haunted by the myth of necessary existence. Features

More information

Cultural Relativism. 1. What is Cultural Relativism? 2. Is Cultural Relativism true? 3. What can we learn from Cultural Relativism?

Cultural Relativism. 1. What is Cultural Relativism? 2. Is Cultural Relativism true? 3. What can we learn from Cultural Relativism? 1. What is Cultural Relativism? 2. Is Cultural Relativism true? 3. What can we learn from Cultural Relativism? What is it? Rough idea: There is no universal truth in ethics. There are only customary practices

More information

What Is Circular Reasoning?

What Is Circular Reasoning? What Is Circular Reasoning? Logical fallacies are a type of error in reasoning, errors which may be recognized and corrected by observant thinkers. There are a large number of informal fallacies that are

More information

Positive Philosophy by August Comte

Positive Philosophy by August Comte Positive Philosophy by August Comte August Comte, Thoemmes About the author.... August Comte (1798-1857), a founder of sociology, believes aspects of our world can be known solely through observation and

More information

Kant on Time. Diana Mertz Hsieh (diana@dianahsieh.com) Kant (Phil 5010, Hanna) 28 September 2004

Kant on Time. Diana Mertz Hsieh (diana@dianahsieh.com) Kant (Phil 5010, Hanna) 28 September 2004 Kant on Time Diana Mertz Hsieh (diana@dianahsieh.com) Kant (Phil 5010, Hanna) 28 September 2004 In the Transcendental Aesthetic of his Critique of Pure Reason, Immanuel Kant offers a series of dense arguments

More information

def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system.

def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system. Section 1.5 Methods of Proof 1.5.1 1.5 METHODS OF PROOF Some forms of argument ( valid ) never lead from correct statements to an incorrect. Some other forms of argument ( fallacies ) can lead from true

More information

Topic #6: Hypothesis. Usage

Topic #6: Hypothesis. Usage Topic #6: Hypothesis A hypothesis is a suggested explanation of a phenomenon or reasoned proposal suggesting a possible correlation between multiple phenomena. The term derives from the ancient Greek,

More information

General Philosophy. Dr Peter Millican, Hertford College. Lecture 3: Induction

General Philosophy. Dr Peter Millican, Hertford College. Lecture 3: Induction General Philosophy Dr Peter Millican, Hertford College Lecture 3: Induction Hume s s Fork 2 Enquiry IV starts with a vital distinction between types of proposition: Relations of ideas can be known a priori

More information

Tilburg University. Publication date: 2010. Link to publication

Tilburg University. Publication date: 2010. Link to publication Tilburg University On the formal specification of business contracts and regulatory compliance Elgammal, Onbekend; Türetken, O.; van den Heuvel, Willem-Jan; Papazoglou, Mike Published in: Proceedings of

More information

Quotes from Object-Oriented Software Construction

Quotes from Object-Oriented Software Construction Quotes from Object-Oriented Software Construction Bertrand Meyer Prentice-Hall, 1988 Preface, p. xiv We study the object-oriented approach as a set of principles, methods and tools which can be instrumental

More information

TEACHER IDENTITY AND DIALOGUE: A COMMENT ON VAN RIJSWIJK, AKKERMAN & KOSTER. Willem Wardekker VU University Amsterdam, The Netherlands

TEACHER IDENTITY AND DIALOGUE: A COMMENT ON VAN RIJSWIJK, AKKERMAN & KOSTER. Willem Wardekker VU University Amsterdam, The Netherlands International Journal for Dialogical Science Spring 2013. Vol. 7, No. 1, 61-65 Copyright 2013 by Willem Wardekker TEACHER IDENTITY AND DIALOGUE: A COMMENT ON VAN RIJSWIJK, AKKERMAN & KOSTER Willem Wardekker

More information

Math 3000 Section 003 Intro to Abstract Math Homework 2

Math 3000 Section 003 Intro to Abstract Math Homework 2 Math 3000 Section 003 Intro to Abstract Math Homework 2 Department of Mathematical and Statistical Sciences University of Colorado Denver, Spring 2012 Solutions (February 13, 2012) Please note that these

More information

Could I Have Been a Turnip? A Very Short Introduction to the Philosophy of Modality

Could I Have Been a Turnip? A Very Short Introduction to the Philosophy of Modality Could I Have Been a Turnip? A Very Short Introduction to the Philosophy of Modality Modality If something is possible, it could have happened. If something is necessary, it had to happen. If something

More information

Geometry, Technology, and the Reasoning and Proof Standard inthemiddlegradeswiththegeometer ssketchpad R

Geometry, Technology, and the Reasoning and Proof Standard inthemiddlegradeswiththegeometer ssketchpad R Geometry, Technology, and the Reasoning and Proof Standard inthemiddlegradeswiththegeometer ssketchpad R Óscar Chávez University of Missouri oc918@mizzou.edu Geometry Standard Instructional programs from

More information

Predicate logic Proofs Artificial intelligence. Predicate logic. SET07106 Mathematics for Software Engineering

Predicate logic Proofs Artificial intelligence. Predicate logic. SET07106 Mathematics for Software Engineering Predicate logic SET07106 Mathematics for Software Engineering School of Computing Edinburgh Napier University Module Leader: Uta Priss 2010 Copyright Edinburgh Napier University Predicate logic Slide 1/24

More information

C. Wohlin, "Managing Software Quality through Incremental Development and Certification", In Building Quality into Software, pp. 187-202, edited by

C. Wohlin, Managing Software Quality through Incremental Development and Certification, In Building Quality into Software, pp. 187-202, edited by C. Wohlin, "Managing Software Quality through Incremental Development and Certification", In Building Quality into Software, pp. 187-202, edited by M. Ross, C. A. Brebbia, G. Staples and J. Stapleton,

More information

Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets.

Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets. Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets. Logic is the study of reasoning. A language of propositions is fundamental to this study as well as true

More information

The result of the bayesian analysis is the probability distribution of every possible hypothesis H, given one real data set D. This prestatistical approach to our problem was the standard approach of Laplace

More information

Sanford Shieh UNDECIDABILITY, EPISTEMOLOGY AND ANTI-REALIST INTUITIONISM

Sanford Shieh UNDECIDABILITY, EPISTEMOLOGY AND ANTI-REALIST INTUITIONISM Sanford Shieh UNDECIDABILITY, EPISTEMOLOGY AND ANTI-REALIST INTUITIONISM In this paper I show that Michael Dummett s anti-realist intuitionism requires a significant place for epistemic principles. Specifically,

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

Using Patterns and Composite Propositions to Automate the Generation of Complex LTL

Using Patterns and Composite Propositions to Automate the Generation of Complex LTL University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Using Patterns and Composite Propositions to Automate the Generation of Complex

More information

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r.

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r. CHAPTER 2 Logic 1. Logic Definitions 1.1. Propositions. Definition 1.1.1. A proposition is a declarative sentence that is either true (denoted either T or 1) or false (denoted either F or 0). Notation:

More information

Divine command theory

Divine command theory Today we will be discussing divine command theory. But first I will give a (very) brief overview of the semester, and the discipline of philosophy. Why do this? One of the functions of an introductory

More information

Formal Modelling of Network Security Properties (Extended Abstract)

Formal Modelling of Network Security Properties (Extended Abstract) Vol.29 (SecTech 2013), pp.25-29 http://dx.doi.org/10.14257/astl.2013.29.05 Formal Modelling of Network Security Properties (Extended Abstract) Gyesik Lee Hankyong National University, Dept. of Computer

More information

Actuality and fake tense in conditionals *

Actuality and fake tense in conditionals * Semantics & Pragmatics Volume 8, Article 12: 1 12, 2015 http://dx.doi.org/10.3765/sp.8.12 Actuality and fake tense in conditionals * John Mackay University of Wisconsin-Madison Submitted 2014-08-02 / First

More information

DEGREE OF NEGATION OF AN AXIOM

DEGREE OF NEGATION OF AN AXIOM DEGREE OF NEGATION OF AN AXIOM Florentin Smarandache, Ph D Professor of Mathematics Chair of Department of Math & Sciences University of New Mexico 200 College Road Gallup, NM 87301, USA E-mail: smarand@unm.edu

More information

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has

More information

AGENTS AND SOFTWARE ENGINEERING

AGENTS AND SOFTWARE ENGINEERING AGENTS AND SOFTWARE ENGINEERING Michael Wooldridge Queen Mary and Westfield College, University of London London E1 4NS, United Kingdom M.J.Wooldridge@qmw.ac.uk Abstract Software engineers continually

More information

Beyond Propositional Logic Lukasiewicz s System

Beyond Propositional Logic Lukasiewicz s System Beyond Propositional Logic Lukasiewicz s System Consider the following set of truth tables: 1 0 0 1 # # 1 0 # 1 1 0 # 0 0 0 0 # # 0 # 1 0 # 1 1 1 1 0 1 0 # # 1 # # 1 0 # 1 1 0 # 0 1 1 1 # 1 # 1 Brandon

More information

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute

More information

Philosophy 104. Chapter 8.1 Notes

Philosophy 104. Chapter 8.1 Notes Philosophy 104 Chapter 8.1 Notes Inductive reasoning - The process of deriving general principles from particular facts or instances. - "induction." The American Heritage Dictionary of the English Language,

More information

A Blueprint for Universal Trust Management Services

A Blueprint for Universal Trust Management Services A Blueprint for Universal Trust Management Services Tomasz Kaszuba Krzysztof Rzadca Adam Wierzbicki Grzegorz Wierzowiecki Polish-Japanese Institute of Information Technology Warsaw, Poland adamw@pjwstk.edu.pl

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

On strong fairness in UNITY

On strong fairness in UNITY On strong fairness in UNITY H.P.Gumm, D.Zhukov Fachbereich Mathematik und Informatik Philipps Universität Marburg {gumm,shukov}@mathematik.uni-marburg.de Abstract. In [6] Tsay and Bagrodia present a correct

More information

Logic, Policy, and Federation in the Cloud. Yuri Gurevich Microsoft Research, June 12, 2012

Logic, Policy, and Federation in the Cloud. Yuri Gurevich Microsoft Research, June 12, 2012 Logic, Policy, and Federation in the Cloud Yuri Gurevich Microsoft Research, June 12, 2012 1 The future ain t what it used to be. Yogi Berra 2 PROBLEM 3 Authorization used to be simple The authorization

More information

Slippery Slopes and Vagueness

Slippery Slopes and Vagueness Slippery Slopes and Vagueness Slippery slope reasoning, typically taken as a fallacy. But what goes wrong? Is it always bad reasoning? How should we respond to a slippery slope argument and/or guard against

More information

Basic Set Theory. 1. Motivation. Fido Sue. Fred Aristotle Bob. LX 502 - Semantics I September 11, 2008

Basic Set Theory. 1. Motivation. Fido Sue. Fred Aristotle Bob. LX 502 - Semantics I September 11, 2008 Basic Set Theory LX 502 - Semantics I September 11, 2008 1. Motivation When you start reading these notes, the first thing you should be asking yourselves is What is Set Theory and why is it relevant?

More information

Unifying Epistemologies by Combining World, Description and Observer

Unifying Epistemologies by Combining World, Description and Observer Unifying Epistemologies by Combining World, Description and Observer Stuart Umpleby Research Program in Social and Organizational Learning The George Washington University Washington, DC Umpleby@gwu.edu

More information

Chapter 5: Fallacies. 23 February 2015

Chapter 5: Fallacies. 23 February 2015 Chapter 5: Fallacies 23 February 2015 Plan for today Talk a bit more about arguments notice that the function of arguments explains why there are lots of bad arguments Turn to the concept of fallacy and

More information

INCIDENCE-BETWEENNESS GEOMETRY

INCIDENCE-BETWEENNESS GEOMETRY INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

ANOTHER GENERATION OF GENERAL EDUCATION

ANOTHER GENERATION OF GENERAL EDUCATION ANOTHER GENERATION OF GENERAL EDUCATION Peter K. Bol Charles H. Carswell Professor of East Asian Languages and Civilizations I was asked to set forth some personal reflections rather than to summarize

More information

Why Cryptosystems Fail. By Ahmed HajYasien

Why Cryptosystems Fail. By Ahmed HajYasien Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.

More information

Deductive reasoning is the kind of reasoning in which, roughly, the truth of the input

Deductive reasoning is the kind of reasoning in which, roughly, the truth of the input Forthcoming in The Encyclopedia of the Mind, edited by Hal Pashler, SAGE Publishing. Editorial Board: Tim Crane, Fernanda Ferreira, Marcel Kinsbourne, and Rich Zemel. Deductive Reasoning Joshua Schechter

More information

Chapter 1 Verificationism Then and Now

Chapter 1 Verificationism Then and Now Chapter 1 Verificationism Then and Now Per Martin-Löf The term veri fi cationism is used in two different ways: the fi rst is in relation to the veri fi cation principle of meaning, which we usually and

More information

ON EXTERNAL OBJECTS By Immanuel Kant From Critique of Pure Reason (1781)

ON EXTERNAL OBJECTS By Immanuel Kant From Critique of Pure Reason (1781) ON EXTERNAL OBJECTS By Immanuel Kant From Critique of Pure Reason (1781) General Observations on The Transcendental Aesthetic To avoid all misapprehension, it is necessary to explain, as clearly as possible,

More information

The Bayesian Approach to the Philosophy of Science

The Bayesian Approach to the Philosophy of Science The Bayesian Approach to the Philosophy of Science Michael Strevens For the Macmillan Encyclopedia of Philosophy, second edition The posthumous publication, in 1763, of Thomas Bayes Essay Towards Solving

More information

The Null Hypothesis. Geoffrey R. Loftus University of Washington

The Null Hypothesis. Geoffrey R. Loftus University of Washington The Null Hypothesis Geoffrey R. Loftus University of Washington Send correspondence to: Geoffrey R. Loftus Department of Psychology, Box 351525 University of Washington Seattle, WA 98195-1525 gloftus@u.washington.edu

More information

Methodology in Social Psychology. Logics of inquiry

Methodology in Social Psychology. Logics of inquiry Methodology in Social Psychology Logics of inquiry How to carry out scientific research given our understanding of the nature of knowledge. Philosophy of Science clarifies why experimental, scientific

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us

More information

Is Justified True Belief Knowledge?

Is Justified True Belief Knowledge? Is Justified True Belief Knowledge? EDMUND GETTIER Edmund Gettier is Professor Emeritus at the University of Massachusetts, Amherst. This short piece, published in 1963, seemed to many decisively to refute

More information

ambiguous designator; analysis of knowledge; Gettier cases; justified true belief; semantic reference; speaker s reference

ambiguous designator; analysis of knowledge; Gettier cases; justified true belief; semantic reference; speaker s reference Why Gettier Cases are misleading Moti Mizrahi Florida Institute of Technology Abstract In this paper, I argue that, as far as Gettier cases are concerned, appearances are deceiving. That is, Gettier cases

More information

Mathematical Induction

Mathematical Induction Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How

More information

Introduction to Hypothesis Testing OPRE 6301

Introduction to Hypothesis Testing OPRE 6301 Introduction to Hypothesis Testing OPRE 6301 Motivation... The purpose of hypothesis testing is to determine whether there is enough statistical evidence in favor of a certain belief, or hypothesis, about

More information