Information Flow and Impossible Situations

نویسنده

  • SEBASTIAN SEQUOIAH-GRAYSON
چکیده

Classical semantic information (CSI) assigns the same body of semantic information (Cont) as well as the same amount of semantic information (cont or inf) to logically equivalent sentences. A corollary of this fact is that all logically true sentences will receive a null assignment of semantic information via Cont as well as a zero measure of semantic information via cont or inf. The originators of CSI allowed that there be (but did not develop) a sensible notion of psychological information (PI) whereby its measure on logically true sentences would be greater than zero. By extension they allowed that this notion of PI would be such that non-identical measures could be assigned to logically equivalent sentences in general. The task undertaken in the article is to specify the basis of a theory of PI that satisfies these constraints. This project utilizes the frame semantics of substructural logics. The threat of a perceived ad hoc association is countered by an independent argument for the explication of the incomplete and inconsistent worlds (impossible situations) constituting frame semantics in terms of confused doxastic states. Combined with existing interpretations of frame semantics in terms of information flow, the result is a specification of the basis of a novel theory of the information flow between the doxastic states of agents, i.e. the specification of the basis of a novel theory of PI. A substructural logic no stronger than the linear logic DMALL is proposed as providing the appropriate semantics. I am indebted to Luciano Floridi, Greg Restall, Antony Eagle, Joel Mason and especially Patrick Allo for saving me from myself on more than one occasion. I would also like to thank an anonymous referee at Logique et Analyse for making many insightful suggestions and for bringing several errors to my attention. Any that remain are entirely my responsibility. Faculty of Philosophy and IEG, Computing Laboratory, The University of Oxford, Great Britain. “03sequoiah” 2006/11/13 page 372 i i

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

Identification of Hazardous Situations using Kernel Density Estimation Method Based on Time to Collision, Case study: Left-turn on Unsignalized Intersection

The first step in improving traffic safety is identifying hazardous situations. Based on traffic accidents’ data, identifying hazardous situations in roads and the network is possible. However, in small areas such as intersections, especially in maneuvers resolution, identifying hazardous situations is impossible using accident’s data. In this paper, time-to-collision (TTC) as a traffic conflic...

متن کامل

Determining language contact effects in ancient contact situations

Proving the existence of ancient language contacts is easy; proving the existence of ancient contact-induced language change is much more difficult, by comparison to analyses of modern contact situations. This paper surveys some ancient contacts and their effects on the languages. The main conclusion is that the historical methods used for analyzing better-documented contact situations can be a...

متن کامل

Dynamic mode decomposition of controlled H- and K-type transitions

In many situations, owing to the complexity of flow, access to detailed representation of the flow field is impossible. Therefore, the capability of representing the essential physics through fewer degrees of freedom (model reduction) is of great value. For example, control systems rely on models through differential equations. The use of partial differential equations governing the flow is int...

متن کامل

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006