scholarly journals THE FORMAL AND THE FORMALIZED: THE CASES OF SYLLOGISTIC AND SUPPOSITION THEORY

2015 ◽  
Vol 56 (131) ◽  
pp. 253-270 ◽  
Author(s):  
Catarina Dutilh Novaes

As a discipline, logic is arguably constituted of two main sub-projects: formal theories of argument validity on the basis of a small number of patterns, and theories of how to reduce the multiplicity of arguments in non-logical, informal contexts to the small number of patterns whose validity is systematically studied (i.e. theories of formalization). Regrettably, we now tend to view logic 'proper' exclusively as what falls under the first sub-project, to the neglect of the second, equally important sub-project. In this paper, I discuss two historical theories of argument formalization: Aristotle's syllogistic theory as presented in the "Prior Analytics", and medieval theories of supposition. They both illustrate this two-fold nature of logic, containing in particular illuminating reflections on how to formalize arguments (i.e. the second sub-project). In both cases, the formal methods employed differ from the usual modern technique of translating an argument in ordinary language into a specially designed symbolism, a formal language. The upshot is thus a plea for a broader conceptualization of what it means to formalize.

2021 ◽  
Author(s):  
Claas Lorenz ◽  
Vera Clemens ◽  
Max Schrötter ◽  
Bettina Schnor

Continuous verification of network security compliance is an accepted need. Especially, the analysis of stateful packet filters plays a central role for network security in practice. But the few existing tools which support the analysis of stateful packet filters show runtimes in the order of minutes to hours making them unsuitable for continuous compliance verification.<br>In this work, we address these challenges and present a solution which is based on the application of formal methods. First, we introduce the formal language FPL that enables a high-level human-understandable specification of the desired state of network security. Second, we demonstrate the instantiation of a compliance process using a verification framework that analyzes the configuration of complex networks and devices - including stateful firewalls - for compliance with FPL policies. Our evaluation results show the scalability of the presented approach for the well known Internet2 and Stanford benchmarks as well as for large firewall rule sets where it outscales state-of-the-art tools by a factor of over 41.


Philosophy ◽  
1985 ◽  
Vol 60 (234) ◽  
pp. 513-524 ◽  
Author(s):  
Andrew Rein

It is a commonplace that Frege thought ordinary language to be seriously defective. Yet his remarks about ordinary language are not always unflattering. Comparing the relation between his formal language and ordinary language to the relation between the microscope and the eye, Frege remarked: ‘[the eye], because of the range of its applicability and because of the ease with which it can adapt itself to the most varied circumstances, has a great superiority over the microscope’. The point, of course, is that, for Frege, the deficiencies of ordinary language arise in connection with the scientific endeavour: ordinary language is not an acceptable medium in which to pursue truth. As he goes on to observe: ‘… viewed as an optical instrument [the eye] reveals many imperfections … as soon as scientific purposes place strong requirements upon sharpness of resolution, the eye proves to be inadequate. On the other hand, the microscope is perfectly suited for just such purposes’.


2021 ◽  
Vol 1 (136) ◽  
pp. 69-80
Author(s):  
Sameer Salih Mahdi Al-Dahwi

Legal language is an unusual type of language which raises the interest of many people. It is considered to be one of the discourses that prefer traditional styles and values. Moreover, using this language is confined to specific places and circumstances, namely, in a court or legal texts. Additionally, legal language is radically different from ordinary language in vocabulary, morphology, syntax, and semantics, in addition to other distinctive features. In fact, one of the predominant distinctive features of legal language is that it is a formal language. It is hypothesized that formality in English legal language is realized with different ways and at different levels. It is also hypothesized that what is formal in English is not necessarily formal in Arabic. In other words, formal expressions in English and Arabic are realized differently. The data in this study has been quoted from different authentic legal texts supplemented by the researcher's renderings. 


Author(s):  
Nikolay Arkhiereev

The so-called received view of scientific theory, initially proposed by logical positivists, represented scientific theory as a set of statements of some formal language, ordered by syntactic relation of deductive derivability. By late 1960s this strategy had met with severe criticism which called into question the effectiveness of formal methods in philosophy of science. The set-theoretic (semantic) approach in formal philosophy of science, which can be treated as natural development of received view, is based on the concept of model in Tarski’s sense and is capable of neutralizing the most part of these objections.


2021 ◽  
Author(s):  
Claas Lorenz ◽  
Vera Clemens ◽  
Max Schrötter ◽  
Bettina Schnor

Continuous verification of network security compliance is an accepted need. Especially, the analysis of stateful packet filters plays a central role for network security in practice. But the few existing tools which support the analysis of stateful packet filters show runtimes in the order of minutes to hours making them unsuitable for continuous compliance verification.<br>In this work, we address these challenges and present a solution which is based on the application of formal methods. First, we introduce the formal language FPL that enables a high-level human-understandable specification of the desired state of network security. Second, we demonstrate the instantiation of a compliance process using a verification framework that analyzes the configuration of complex networks and devices - including stateful firewalls - for compliance with FPL policies. Our evaluation results show the scalability of the presented approach for the well known Internet2 and Stanford benchmarks as well as for large firewall rule sets where it outscales state-of-the-art tools by a factor of over 41.


1962 ◽  
Vol 41 (9) ◽  
pp. 552 ◽  
Author(s):  
R. Hayward ◽  
P.J. Mullins

1987 ◽  
Vol 26 (03) ◽  
pp. 93-98 ◽  
Author(s):  
F. Wingert

SummaryA formal language is presented which is used to generate a transformation table for mapping SNOMED statements to ICD codes. Non-terminal symbols define parts of the SNOMED space, the highest order of which corresponds to ICD categories. Performance of the corresponding program system and remaining problems are described.


2002 ◽  
Vol 4 (2) ◽  
pp. 127-139 ◽  
Author(s):  
Ian Patterson

This article addresses the increasingly popular approach to Freud and his work which sees him primarily as a literary writer rather than a psychologist, and takes this as the context for an examination of Joyce Crick's recent translation of The Interpretation of Dreams. It claims that translation lies at the heart of psychoanalysis, and that the many interlocking and overlapping implications of the word need to be granted a greater degree of complexity. Those who argue that Freud is really a creative writer are themselves doing a work of translation, and one which fails to pay sufficiently careful attention to the role of translation in writing itself (including the notion of repression itself as a failure to translate). Lesley Chamberlain's The Secret Artist: A Close Reading of Sigmund Freud is taken as an example of the way Freud gets translated into a novelist or an artist, and her claims for his ‘bizarre poems' are criticized. The rest of the article looks closely at Crick's new translation and its claim to be restoring Freud the stylist, an ordinary language Freud, to the English reader. The experience of reading Crick's translation is compared with that of reading Strachey's, rather to the latter's advantage.


Sign in / Sign up

Export Citation Format

Share Document