A Formal Model of Adjudication

نویسنده

  • Henry Prakken
چکیده

This article presents a formal dialogue game for adjudication dialogues. Existing AI & law models of legal dialogues and argumentation-theoretic models of persuasion are extended with a neutral third party, to give a more realistic account of the adjudicator’s role in legal procedures. The main feature of the model is a division into a pleadings phase, where the adversaries plea their case and the adjudicator has a largely mediating role, and a trial phase, where the adjudicator decides the dispute on the basis of the claims, arguments and evidence put forward in the pleadings phase. The model allows for explicit decisions on admissibility of evidence and burden of proof by the adjudicator in the pleadings phase. Adjudication is modelled as putting forward arguments, in particular undercutting and priority arguments, in the trial phase. The model reconciles logical aspects of burden of proof induced by the defeasible nature of arguments with dialogical aspects of burden of proof as something that can be allocated by explicit decisions on legal grounds.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hammerstein-Wiener Model: A New Approach to the Estimation of Formal Neural Information

 A new approach is introduced to estimate the formal information of neurons. Formal Information, mainly discusses about the aspects of the response that is related to the stimulus. Estimation is based on introducing a mathematical nonlinear model with Hammerstein-Wiener system estimator. This method of system identification consists of three blocks to completely describe the nonlinearity of inp...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Formal Method in Service Composition in Heath Care Systems

One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verificati...

متن کامل

Criminal Mediation as a Doctrine of Restorative Justice from the Perspective of Law and Ethics

Background: Creating the ground for peace and reconciliation through recourse to arbitration has been one of the common methods of litigation that is rooted in ethics. In the criminal justice system, judicial and police officials are the reference for investigation, inquiry and investigation. The sovereign and their representatives have the exclusive competence and no other person has the autho...

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007