Logic, Language, Information, and Computation
暂无分享,去创建一个
Takeo Kanade | Jon M. Kleinberg | Bernhard Steffen | John C. Mitchell | Friedemann Mattern | Switzerland Moni Naor | T. Kanade | J. Kleinberg | F. Mattern | B. Steffen | John C. Mitchell
[1] Ringo Baumann. What Does it Take to Enforce an Argument? Minimal Change in abstract Argumentation , 2012, ECAI.
[2] Phan Minh Dung,et al. On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning, Logic Programming and n-Person Games , 1995, Artif. Intell..
[3] Davide Grossi,et al. When Are Two Arguments the Same ? Invariance in Abstract Argumentation , 2012 .
[4] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[5] Ringo Baumann,et al. Normal and strong expansion equivalence for argumentation frameworks , 2012, Artif. Intell..
[6] Pietro Baroni,et al. Solving Semantic Problems with Odd-Length Cycles in Argumentation , 2003, ECSQARU.
[7] Trevor J. M. Bench-Capon,et al. Argumentation in artificial intelligence , 2007, Artif. Intell..
[8] Martin Wigbertus Antonius Caminada. Comparing Two Unique Extension Semantics for Formal Argumentation : Ideal and Eager , 2007 .
[9] Jean-Yves Béziau,et al. LUKASIEWICZ'S THREE-VALUED LOGIC BASED ON SUSZKO'S BIVALENT SEMANTICS ⁄ , 1999 .
[10] Mário S. Alvim,et al. On the Relation between Differential Privacy and Quantitative Information Flow , 2011, ICALP.
[11] Marcelo Arenas,et al. Counting beyond a Yottabyte, or how SPARQL 1.1 property paths will prevent adoption of the standard , 2012, WWW.
[12] Wim Martens,et al. The complexity of evaluating path expressions in SPARQL , 2012, PODS '12.
[13] Davide Grossi,et al. Argumentation in the View of Modal Logic , 2010, ArgMAS.
[14] David Clark,et al. Quantified Interference for a While Language , 2005, QAPL.
[15] Dov M. Gabbay,et al. A Logical Account of Formal Argumentation , 2009, Stud Logica.
[16] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[17] Pablo Barceló,et al. Querying graph databases , 2013, PODS '13.
[18] Bart Verheij,et al. Two Approaches to Dialectical Argumentation: Admissible Sets and Argumentation Stages , 1999 .
[19] Paolo Mancarella,et al. Computing ideal sceptical argumentation , 2007, Artif. Intell..
[20] Sjur K. Dyrkolbotn,et al. Doing Argumentation using Theories in Graph Normal Form , 2012 .
[21] Martin Caminada,et al. A QBF-based formalization of abstract argumentation semantics , 2013, J. Appl. Log..
[22] Prakash Panangaden,et al. Anonymity protocols as noisy channels , 2008, Inf. Comput..
[23] Davide Grossi,et al. On the logic of argumentation theory , 2010, AAMAS.
[24] Mário S. Alvim,et al. Measuring Information Leakage Using Generalized Gain Functions , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[25] Stefan Woltran,et al. Characterizing Strong Equivalence for Argumentation Frameworks , 2010, KR.
[26] Martin Caminada,et al. On the evaluation of argumentation formalisms , 2007, Artif. Intell..
[27] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[28] Paul E. Dunne,et al. Semi-stable semantics , 2006, J. Log. Comput..