4,750 research outputs found
Two Squares of Opposition: for Analytic and Synthetic Propositions
In the paper I prove that there are two squares of opposition. The
unconventional one is built up for synthetic propositions. There a, i are
contrary, a, o (resp. e, i) are contradictory, e, o are subcontrary, a, e
(resp. i, o) are said to stand in the subalternation
Carnap’s Principle of Tolerance and logical pluralism
Logical pluralism is the claim that there is more than one adequate logic. Many authors consider Carnap as one of the forerunners of logical pluralism. More than that, they claim that Carnap’s Principle of Tolerance consists in one of the first explicit formulations a logical pluralism. Nonetheless, there is little detailed investigation to evaluate if the Principle of Tolerance necessarily implies a logical pluralism, and if so, of which kind. The aim of this paper is to analyze the Principle of Tolerance, as well as its context, and to investigate the relation between such principle and logical pluralism
GUBS, a Behavior-based Language for Open System Dedicated to Synthetic Biology
In this article, we propose a domain specific language, GUBS (Genomic Unified
Behavior Specification), dedicated to the behavioral specification of synthetic
biological devices, viewed as discrete open dynamical systems. GUBS is a
rule-based declarative language. By contrast to a closed system, a program is
always a partial description of the behavior of the system. The semantics of
the language accounts the existence of some hidden non-specified actions
possibly altering the behavior of the programmed device. The compilation
framework follows a scheme similar to automatic theorem proving, aiming at
improving synthetic biological design safety.Comment: In Proceedings MeCBIC 2012, arXiv:1211.347
Formalization of the fundamental group in untyped set theory using auto2
We present a new framework for formalizing mathematics in untyped set theory
using auto2. Using this framework, we formalize in Isabelle/FOL the entire
chain of development from the axioms of set theory to the definition of the
fundamental group for an arbitrary topological space. The auto2 prover is used
as the sole automation tool, and enables succinct proof scripts throughout the
project.Comment: 17 pages, accepted for ITP 201
Formalizing restriction categories
Restriction categories are an abstract axiomatic framework by Cockett and Lack for reasoning about (generalizations of the idea of) partiality of functions. In a restriction category, every map defines an endomap on its domain, the corresponding partial identity map. Restriction categories cover a number of examples of different flavors and are sound and complete with respect to the more synthetic and concrete partial map categories. A partial map category is based on a given category (of total maps) and a map in it is a map from a subobject of the domain. In this paper, we report on an Agda formalization of the first chapters of the theory of restriction categories, including the challenging completeness result. We explain the mathematics formalized, comment on the design decisions we made for the formalization, and illustrate them at work
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting the number of false alarms (low false positive rate). However, there exists a natural trade-off between detecting all anomalies (at the expense of raising alarms too often), and missing anomalies (but not issuing any false alarms). The parameters of a detection system play a central role in this trade-off, since they determine how responsive the system is to an intrusion attempt. Despite the importance of properly tuning the system parameters, the literature has put little emphasis on the topic, and the task of adjusting such parameters is usually left to the expertise of the system manager or expert IT personnel. In this paper, we present an autonomic approach for tuning the parameters of anomaly-based intrusion detection systems in case of SSH traffic. We propose a procedure that aims to automatically tune the system parameters and, by doing so, to optimize the system performance. We validate our approach by testing it on a flow-based probabilistic detection system for the detection of SSH attacks
Formalizing Computability Theory via Partial Recursive Functions
We present an extension to the library of the Lean theorem
prover formalizing the foundations of computability theory. We use primitive
recursive functions and partial recursive functions as the main objects of
study, and we use a constructive encoding of partial functions such that they
are executable when the programs in question provably halt. Main theorems
include the construction of a universal partial recursive function and a proof
of the undecidability of the halting problem. Type class inference provides a
transparent way to supply G\"{o}del numberings where needed and encapsulate the
encoding details.Comment: 16 pages, accepted to ITP 201
- …