55,701 research outputs found

    Analysing change in international politics: a semiotic method of structural connotation

    Get PDF
    Processes such as internationalisation and privatisation bring along new challenges both for the conceptualisation and for the measurement of transformations of the state. This paper outlines a semiotic Method of Structural Connotation, which combines content- and network analysis, thus to model change in international politics. After an investigation of the methodical and epistemological chances and pitfalls a 5-step-toolbox is presented and illustrated with a current application: The Bologna-Process for a European Higher Education Area. -- Angesichts neuerer Entwicklungen wie Internationalisierung und Privatisierung stellen sich auch neue Herausforderungen für die Konzeptualisierung und Messung von Staatlichkeit im Wandel. In diesem Arbeitspapier wird eine semiotische Methode Struktureller Konnotation vorgestellt, die inhaltsanalytische und netzwerkanalytische Elemente zusammenführt, um den Wandel internationaler politischer Prozesse und Akteursfigurationen zu erfassen. Nach einer Betrachtung der methodischen und epistemologischen Herausforderungen und Chancen folgt ein konkreter Verfahrensvorschlag nach dem Baukastenprinzip. Am Beispiel des Bologna-Prozesses für einen Europäischen Hochschulraum wird das methodische Vorgehen Schritt für Schritt erläutert.

    Interpretation and Construction in Contract Law

    Get PDF
    Interpretation determines the meaning of a legal actor’s words and actions, construction their legal effect. Although the interpretation-construction distinction has a long pedigree, contract scholars today rarely attend to it, and the relationship between the two activities remains understudied. This Article provides an account of the interplay between interpretation and construction in contract law. It begins with the history of the concepts, focusing on the works of Lieber, Williston and Corbin. It adopts Corbin’s complimentary conception, according to which interpretation alone never suffices to determine speech act’s legal effects; a rule of construction is always required. The Article departs from Corbin, however, by arguing that contract law recognizes multiple types of meaning, and therefore calls for different types of interpretation. Legally relevant meanings include plain meaning, contextually determined use meaning, subjective and objective meanings, purpose, and the parties’ beliefs and intentions. Which type of meaning is legally relevant when depends on the applicable rule of construction. Consequently, although interpretation comes first in the process of determining parties’ legal obligations, the correct approach to legal interpretation is determined by rules of construction. The Article identifies two additional ways construction can be said to be prior to interpretation in contract law. First, judicial acts of construction can attach to contract boilerplate standard legal effects that depart from the words’ ordinary meaning, turning them into a legal formality. Acts of construction can thereby give boilerplate new semantic meanings, to which interpretation must attend. Second, when parties choose their words in light of their legal effects, rules of construction often figure into their communicative intentions. Rules of construction can therefore also be prior the pragmatic meaning of what parties say and do. Understanding this complex interplay between interpretation and construction is essential to understanding how the law determines the existence and content of contractual obligations. Although this Article does not argue for one or another rule of interpretation or construction, it lays the groundwork for analyses of which rules are appropriate when

    Communicative Content and Legal Content

    Get PDF
    This essay investigates a familiar set of questions about the relationship between legal texts (e.g., constitutions, statutes, opinions, orders, and contracts) and the content of the law (e.g., norms, rules, standards, doctrines, and mandates). Is the original meaning of the constitutional text binding on the Supreme Court when it develops doctrines of constitutional law? Should statutes be given their plain meaning or should judges devise statutory constructions that depart from the text to serve a purpose? What role should default rules play in the interpretation and construction of contracts? This essay makes two moves that can help lawyers and legal theorists answer these questions. First, there is a fundamental conceptual distinction between communicative content (the linguistic meaning communicated by a legal text in context) and legal content (the doctrines of the legal rules associated with a text). Second, the relationship between communicative content and legal content varies with context; different kinds of legal texts produce different relationships between linguistic meaning and legal rules

    Service composition in stochastic settings

    Get PDF
    With the growth of the Internet-of-Things and online Web services, more services with more capabilities are available to us. The ability to generate new, more useful services from existing ones has been the focus of much research for over a decade. The goal is, given a specification of the behavior of the target service, to build a controller, known as an orchestrator, that uses existing services to satisfy the requirements of the target service. The model of services and requirements used in most work is that of a finite state machine. This implies that the specification can either be satisfied or not, with no middle ground. This is a major drawback, since often an exact solution cannot be obtained. In this paper we study a simple stochastic model for service composition: we annotate the tar- get service with probabilities describing the likelihood of requesting each action in a state, and rewards for being able to execute actions. We show how to solve the resulting problem by solving a certain Markov Decision Process (MDP) derived from the service and requirement specifications. The solution to this MDP induces an orchestrator that coincides with the exact solution if a composition exists. Otherwise it provides an approximate solution that maximizes the expected sum of values of user requests that can be serviced. The model studied although simple shades light on composition in stochastic settings and indeed we discuss several possible extensions

    Bantu lexical reconstruction

    Get PDF
    Lexical reconstruction has been an important enterprise in Bantu historical linguistics since the earliest days of the discipline. In this chapter a historical overview is provided of the principal scholarly contributions to that field of study. It is also explained how the Comparative Method has been and can be applied to reconstruct ancestral Bantu vocabulary via the intermediate step of phonological reconstruction and how the study of sound change needs to be completed with diachronic semantics in order to correctly reconstruct both the form and the meaning of etymons. Finally, some issues complicating this type of historical linguistic research, such as “osculance” due to prehistoric language contact, are addressed, as well as the relationship between reconstruction and classification

    Ethical Challenges in Data-Driven Dialogue Systems

    Full text link
    The use of dialogue systems as a medium for human-machine interaction is an increasingly prevalent paradigm. A growing number of dialogue systems use conversation strategies that are learned from large datasets. There are well documented instances where interactions with these system have resulted in biased or even offensive conversations due to the data-driven training process. Here, we highlight potential ethical issues that arise in dialogue systems research, including: implicit biases in data-driven systems, the rise of adversarial examples, potential sources of privacy violations, safety concerns, special considerations for reinforcement learning systems, and reproducibility concerns. We also suggest areas stemming from these issues that deserve further investigation. Through this initial survey, we hope to spur research leading to robust, safe, and ethically sound dialogue systems.Comment: In Submission to the AAAI/ACM conference on Artificial Intelligence, Ethics, and Societ

    Past, present and future of information and knowledge sharing in the construction industry: Towards semantic service-based e-construction

    Get PDF
    The paper reviews product data technology initiatives in the construction sector and provides a synthesis of related ICT industry needs. A comparison between (a) the data centric characteristics of Product Data Technology (PDT) and (b) ontology with a focus on semantics, is given, highlighting the pros and cons of each approach. The paper advocates the migration from data-centric application integration to ontology-based business process support, and proposes inter-enterprise collaboration architectures and frameworks based on semantic services, underpinned by ontology-based knowledge structures. The paper discusses the main reasons behind the low industry take up of product data technology, and proposes a preliminary roadmap for the wide industry diffusion of the proposed approach. In this respect, the paper stresses the value of adopting alliance-based modes of operation

    A model for digital preservation repository risk relationships

    Get PDF
    The paper introduces the Preserved Object and Repository Risk Ontology (PORRO), a model that relates preservation functionality with associated risks and opportunities for their mitigation. Building on work undertaken in a range of EU and UK funded research projects (including the Digital Curation Centre , DigitalPreservationEurope and DELOS ), this ontology illustrates relationships between fundamental digital library goals and their parameters; associated rights and responsibilities; practical activities and resources involved in their accomplishment; and risks facing digital libraries and their collections. Its purpose is to facilitate a comprehensive understanding of risk causality and to illustrate opportunities for mitigation and avoidance. The ontology reflects evidence accumulated from a series of institutional audits and evaluations, including a specific subset of digital libraries in the DELOS project which led to the definition of a digital library preservation risk profile. Its applicability is intended to be widespread, and its coverage expected to evolve to reflect developments within the community. Attendees will gain an understanding of the model and learn how they can utilize this online resource to inform their own risk management activities

    Attack-Surface Metrics, OSSTMM and Common Criteria Based Approach to “Composable Security” in Complex Systems

    Get PDF
    In recent studies on Complex Systems and Systems-of-Systems theory, a huge effort has been put to cope with behavioral problems, i.e. the possibility of controlling a desired overall or end-to-end behavior by acting on the individual elements that constitute the system itself. This problem is particularly important in the “SMART” environments, where the huge number of devices, their significant computational capabilities as well as their tight interconnection produce a complex architecture for which it is difficult to predict (and control) a desired behavior; furthermore, if the scenario is allowed to dynamically evolve through the modification of both topology and subsystems composition, then the control problem becomes a real challenge. In this perspective, the purpose of this paper is to cope with a specific class of control problems in complex systems, the “composability of security functionalities”, recently introduced by the European Funded research through the pSHIELD and nSHIELD projects (ARTEMIS-JU programme). In a nutshell, the objective of this research is to define a control framework that, given a target security level for a specific application scenario, is able to i) discover the system elements, ii) quantify the security level of each element as well as its contribution to the security of the overall system, and iii) compute the control action to be applied on such elements to reach the security target. The main innovations proposed by the authors are: i) the definition of a comprehensive methodology to quantify the security of a generic system independently from the technology and the environment and ii) the integration of the derived metrics into a closed-loop scheme that allows real-time control of the system. The solution described in this work moves from the proof-of-concepts performed in the early phase of the pSHIELD research and enrich es it through an innovative metric with a sound foundation, able to potentially cope with any kind of pplication scenarios (railways, automotive, manufacturing, ...)
    • …
    corecore