237,436 Hits in 3.3 sec

Levi's In Defense of Informal Logic

Christopher W. Tindale
2001 Informal Logic  
are completely devoid of one); and that informal logic should be expanded to include rhetorical ploys.  ...  And various concepts that have a common currency in informal logic are redeployed by Levi toward addressing this aim.  ... 
doi:10.22329/il.v21i2.2244 fatcat:6fsphib6jfbzpb35bm7wztsv5y

In Defense of Analogical Reasoning

Steven Gamboa
2008 Informal Logic  
I offer a defense of ana-logical accounts of scientific models by meeting certain logical objections to the legitimacy of analogical reasoning.  ...  In rebuttal, I offer a class of scientific models for which (a) there is no satisfactory non-analogical analysis, and (b) we can gain sufficient clarity for the legitimacy of the inference to be assessed  ...  Informal Logic, Vol. 28, No. 3 (2008), pp. 229-241. Information regarding these studies was gleaned from a survey of such studies by I. Mangelsdorf and J. Buschmann (2002) .  ... 
doi:10.22329/il.v28i3.595 fatcat:ep5pxtuvtzedrhrbcwd7vryjsi

In Defense of the Objective Epistemic Approach to Argumentation

John Biro, Harvey Siegel
2008 Informal Logic  
We advance some general considerations in favor of the approach and then examine the ways in which different versions of it play out with respect to the theory of fallacies, which we see as central to  ...  In this paper we defend a particular version of the epistemic approach to argumentation.  ...  in terms of persuasiveness.  ... 
doi:10.22329/il.v26i1.432 fatcat:rntsyylkdbh43buo644rjsdqty

Research on Identity Authentication Method Based on Negative Logic System [chapter]

Yexia Cheng, Yuejin Du, Jin Peng, Jun Fu, Baoxu Liu
2019 Communications in Computer and Information Science  
NLS is introduced to improve security in the essence of attack and defense. Security mechanisms based on NLS are proved effective to increase attack cost and strengthen defense ability.  ...  To solve the problem, identity authentication system and method based on negative logic system (NLS) is proposed in the paper.  ...  This work is supported by the National Natural Science Foundation of China (No. 61702508 and No. 61602470) and Strategic Priority Research Program of Chinese Academy of Sciences.  ... 
doi:10.1007/978-981-13-6621-5_1 fatcat:c3rzrnyb45bpbnedrzfo7owddu

DDM: A Demand-based Dynamic Mitigation for SMT Transient Channels [article]

Yue Zhang, Ziyuan Zhu, Dan Meng
2019 arXiv   pre-print
In this paper, we define the SMT Transient Channel, which uses the transient state of shared resources between threads to steal information.  ...  Different from the traditional software vulnerability, the microarchitecture side channel has three characteristics: extensive influence, potent threat, and tough defense.  ...  ACKNOWLEDGMENT This work was supported by the Institute of Information Engineering (IIE), Chinese Academy of Sciences. Thanks to my family and friends for their support and understanding.  ... 
arXiv:1910.12021v1 fatcat:6nvjsjws2bhupcb3k6gwo6bxma


Olha O. Zolotar, Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, Ihor M. Koropatnik
2020 Revista Gênero e Interdisciplinaridade  
The purpose of the article is to identify the problems of information protection of the defense forces in Ukraine, to find areas of their elimination.  ...  The feasibility of this study is confirmed by the fact that in the current conditions of the information society development, information technologies of the Ukrainian defense forces need to adapt to existing  ...  Thus, the formal logical method was used to investigate the legal framework of information security of the defense forces of Ukraine.  ... 
doi:10.51249/gei.v1i01.28 fatcat:rwd4voji4vcxlcbsnk3b5akdfy

Informalizing Formal Logic

Antonis Kakas
2019 Informal Logic  
This paper presents a way in which formal logic can be understood and reformulated in terms of argumentation that can help us unify formal and informal reasoning.  ...  This allows us to go beyond Classical Logic and smoothly connect it with human reasoning, thus providing a uniform argumentation-based view of both informal and formal logic.  ...  Acknowledgements: I would like to thank Francesca Toni, Paolo Mancarella and Loizos Michael for their continued collaboration on argumentation on which much of this paper rests.  ... 
doi:10.22329/il.v39i2.5169 fatcat:qnq7cctuhbcmlp3y5qupvd5bei

The Other Side of Mediatization: Expanding the Concept to Defensive Strategies

Daniel Nölleke, Andreas M Scheu, Thomas Birkner
2020 Communication Theory  
In this article, we conceptualize defensive and offensive mediatization strategies as complementary methods that social actors use to deal with media publicity and public attention as well as to proactively  ...  A secondary analysis of the data from previous research projects suggests establishing three categories of defensive mediatization strategies—persistence, shielding, and immunization—with regard to the  ...  In a similar vein, a hospital manager described another aspect of shielding, as connected to potential crisis: In times of crisis, we want to be the ones who inform the public.  ... 
doi:10.1093/ct/qtaa011 fatcat:2h3upqnxhbhmlojxkwhkq6wiju

Prospects and current status of defence information security in Ukraine

Olha O. Zolotar, Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, Ihor M. Koropatnik
2021 Linguistics and Culture Review  
The purpose of this article is to identify problems of information security of defence forces in Ukraine, to find ways of their elimination.  ...  The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to  ...  The logical and legal method was used to investigate the legal framework of information security of the defense forces of Ukraine.  ... 
doi:10.21744/lingcure.v5ns3.1545 fatcat:wfdqltltczc33aqj3j35jwo2pi

On Theory in Informal logic

Perry Weddle
1985 Informal Logic  
On Theory in Informal logic  ...  Or, one could as well saYI those who practice formal logic bear family resemblances to practitioners of the informal. II IIWhat is the role of theory in informal logic?"  ...  in which case quit calling the enterprise informal, On Theory 121 In this reasoning I want to check out two main assumptions-that whatever were called informal logic would have to be a branch of logic  ... 
doi:10.22329/il.v7i2.2710 fatcat:byuaqeb5ynaqphghz42sz5d7yy

Page 465 of JAMA: The Journal of the American Medical Association Vol. 146, Issue 5 [page]

1951 JAMA: The Journal of the American Medical Association  
inform the medical n problems pertaining to civil defense.  ...  Because of logical safet could be of mation the dearing on and humar to the resp atomic attack Definition of Radiological Defense.  ... 

Local Logics, Non-Monotonicity and Defeasible Argumentation

Gustavo A. Bodanza, Fernando A. Tohm�
2005 Journal of Logic, Language and Information  
In this paper we present an embedding of abstract argumentation systems into the framework of Barwise and Seligman's logic of information flow. We show that, taking P.M.  ...  In this structure, the key feature of non-monotonicity of commonsense reasoning obtains as the transition from one local logic to another, due to a change in certain background conditions.  ...  Acknowledgments The first author is in debt to Professor Dr. Shahid Rahman for enriching debates during his visit to Bahía Blanca, Argentina.  ... 
doi:10.1007/s10849-005-4510-2 fatcat:xrycmljjgjeuxbgubaje56mzyq

Page 251 of The Journal of Parapsychology Vol. 21, Issue 4 [page]

1957 The Journal of Parapsychology  
Would it not be logical to think, then, that there would long since have been defense officials looking over the shoulders of re- search workers in parapsychology, watching for progress toward the control  ...  Here, indeed, is one of the phenomenal aspects of modern scientific thought, that there should be, seemingly within reasonable reach of the defense system of our country, something which logically seems  ... 

Defending medical information systems against malicious software

David E Gobuty
2004 Excerpta Medica: International Congress Series  
Behavioral/Administrative Defenses Defense in Depth The Defense In Depth concept realizes that protecting the security of an enterprise is best achieved by duplicating controls at multiple locations.  ...  In addition, they also are subject to wider ranges of malicious logic that can traverse the network from one machine to the next and therefore, are vulnerable to: o Internal forms of malicious logic, which  ... 
doi:10.1016/j.ics.2004.03.046 fatcat:gorcxb2c5bekta3eyzu74krvtm

Defensive Analysis: Soundness In Extreme Conditions (Technical Report)

Yannis Smaragdakis
2016 Zenodo  
We present a defensive may-point-to analysis approach, which offers soundness in the presence of opaque code.  ...  The analysis represents points-to information only when it knows it to be a safe over-approximation of dynamic be- havior.  ...  We use a 4-callsite-sensitive (4def) defensive analysis for this benchmark,  ... 
doi:10.5281/zenodo.45127 fatcat:yz3pkbr2ebbipns47sgh5gzmlu
« Previous Showing results 1 — 15 out of 237,436 results