Sciweavers

11 search results - page 2 / 3
» Two contextualist fallacies
Sort
View
IJSN
2006
65views more  IJSN 2006»
13 years 5 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
CIA
2006
Springer
13 years 9 months ago
Semantic Web Research Anno 2006: Main Streams, Popular Fallacies, Current Status and Future Challenges
In this topical1 paper we try to give an analysis and overview of the current state of Semantic Web research. We point to different interpretations of the Semantic Web as the reaso...
Frank van Harmelen
COMMA
2006
13 years 6 months ago
Knowing When To Bargain - The roles of negotiation and persuasion in dialogue
In this paper two formal dialectic systems are described, a persuasion protocol (PP0) and a negotiation protocol (NP0), together with a method for shifting from an instance of a pe...
Simon Wells, Chris Reed
ECIS
2001
13 years 6 months ago
The golden circle: A case study of organizational change at the London Ambulance Service
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
Kathy McGrath
EXACT
2009
13 years 3 months ago
Explanations and Arguments Based on Practical Reasoning
In this paper a representative example is chosen that is meant be fairly simple for illustrating the point that in a very common kind of instance, argument and explanation are mixe...
Douglas Walton