Results: 5
Computing Strong and Weak Permissions in Defeasible Logic.
- Published in:
- Journal of Philosophical Logic, 2013, v. 42, n. 6, p. 799, doi. 10.1007/s10992-013-9295-1
- By:
- Publication type:
- Article
Action Emulation between Canonical Models.
- Published in:
- Journal of Philosophical Logic, 2013, v. 42, n. 6, p. 905, doi. 10.1007/s10992-013-9298-y
- By:
- Publication type:
- Article
Editorial Introduction to the Special Issue LOFT Sevilla.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Foundations of Everyday Practical Reasoning.
- Published in:
- Journal of Philosophical Logic, 2013, v. 42, n. 6, p. 831, doi. 10.1007/s10992-013-9296-0
- By:
- Publication type:
- Article
On the Epistemic Foundation for Iterated Weak Dominance: An Analysis in a Logic of Individual and Collective attitudes.
- Published in:
- Journal of Philosophical Logic, 2013, v. 42, n. 6, p. 863, doi. 10.1007/s10992-013-9297-z
- By:
- Publication type:
- Article