{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:25Z","timestamp":1725562405305},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219378"},{"type":"electronic","value":"9783540246749"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24674-9_33","type":"book-chapter","created":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T01:36:21Z","timestamp":1280972181000},"page":"311-320","source":"Crossref","is-referenced-by-count":5,"title":["A Discussion of Some Intuitions of Defeasible Reasoning"],"prefix":"10.1007","author":[{"given":"Grigoris","family":"Antoniou","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","first-page":"6","volume-title":"Proc. Symposium on Applied Computing","author":"G. Antoniou","year":"2002","unstructured":"Antoniou, G., Arief, M.: Executable Declarative Business Rules and Their Use in Electronic Commerce. In: Proc. Symposium on Applied Computing, pp. 6\u201310. ACM Press, New York (2002)"},{"issue":"2","key":"33_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/371316.371517","volume":"2","author":"G. Antoniou","year":"2001","unstructured":"Antoniou, G., Billington, D., Governatori, G., Maher, M.J.: Representation Results for Defeasible Logic. ACM Transactions on Computational Logic\u00a02(2), 255\u2013287 (2001), American","journal-title":"ACM Transactions on Computational Logic"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1093\/logcom\/3.4.379","volume":"3","author":"D. Billington","year":"1993","unstructured":"Billington, D.: Defeasible Logic is Stable. Journal of Logic and Computation\u00a03, 370\u2013400 (1993)","journal-title":"Journal of Logic and Computation"},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/S0004-3702(97)00015-5","volume":"93","author":"P. Bondarenko","year":"1997","unstructured":"Bondarenko, P., Dung, R.: Kowalski and F. Toni. An abstract, argumentation-theoretic approach to default reasoning. Artificial Intelligence\u00a093, 63\u2013101 (1997)","journal-title":"Artificial Intelligence"},{"key":"33_CR5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1613\/jair.284","volume":"4","author":"G. Brewka","year":"1996","unstructured":"Brewka, G.: Well-Founded Semantics for Extended Logic Programs with Dynamic Priorities. Journal of Artificial Intelligence Research\u00a04, 19\u201336 (1996)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"33_CR6","series-title":"Lecture Notes in Artificial Intelligence","first-page":"121","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"G. Brewka","year":"2001","unstructured":"Brewka, G.: On the Relation Between Defeasible Logic and Well-Founded Semantics. In: Eiter, T., Faber, W., Truszczy\u0144ski, M. (eds.) LPNMR 2001. LNCS (LNAI), vol.\u00a02173, p. 121. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Dumas, M., Governatori, G., ter Hofstede, A., Oaks, P.: A formal approach to negotiating agents development. Electronic Commerce Research and Applications\u00a01(2) (2002)","key":"33_CR7","DOI":"10.1016\/S1567-4223(02)00016-9"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"P. Dung","year":"1995","unstructured":"Dung, P.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming, and n-person games. Artificial Intelligence\u00a077, 321\u2013357 (1995)","journal-title":"Artificial Intelligence"},{"issue":"3","key":"33_CR9","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1145\/116825.116838","volume":"38","author":"A. Gelder van","year":"1991","unstructured":"van Gelder, A., Ross, K., Schlipf, J.: The Well-Founded Semantics for General Logic Programs. Journal of the ACM\u00a038(3), 620\u2013650 (1991)","journal-title":"Journal of the ACM"},{"key":"33_CR10","first-page":"1070","volume-title":"Proc. 5th International Conference and Symposium on Logic Programming","author":"M. Gelfond","year":"1988","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. 5th International Conference and Symposium on Logic Programming, pp. 1070\u20131080. MIT Press, Cambridge (1988)"},{"key":"33_CR11","first-page":"579","volume-title":"Proc. 7th International Conference on Logic Programming","author":"M. Gelfond","year":"1990","unstructured":"Gelfond, M., Lifschitz, V.: Logic Programs with Classical Negation. In: Proc. 7th International Conference on Logic Programming, pp. 579\u2013597. MIT Press, Cambridge (1990)"},{"key":"33_CR12","first-page":"197","volume-title":"Proc. International Logic Programming Symposium","author":"B. Grosof","year":"1997","unstructured":"Grosof, B.: Prioritized conflict handling for logic programs. In: Proc. International Logic Programming Symposium, pp. 197\u2013211. MIT Press, Cambridge (1997)"},{"key":"33_CR13","volume-title":"Proc. 1st ACM Conference on Electronic Commerce","author":"B. Grosof","year":"1999","unstructured":"Grosof, B., Lambrou, Y., Chan, H.: A Declarative Approach to Business Rules in Contracts: Courteous Logic Programs in XML. In: Proc. 1st ACM Conference on Electronic Commerce, ACM, New York (1999)"},{"key":"33_CR14","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1093\/oso\/9780198537472.003.0003","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"J. Horty","year":"1994","unstructured":"Horty, J.: Some direct theories of nonmonotonic inheritance. In: Gabbay, D., Hogger, C., Robinson, J. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, pp. 111\u2013187. Clarendon Press, Oxford (1994)"},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1023\/A:1011288805074","volume":"9","author":"J. Horty","year":"2001","unstructured":"Horty, J.: Argument construction and reinstatement in logics for defeasible reasoning. Artificial Intelligence and Law\u00a09, 1\u201328 (2001)","journal-title":"Artificial Intelligence and Law"},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0004-3702(01)00160-6","volume":"135","author":"J. Horty","year":"2002","unstructured":"Horty, J.: Skepticism and floating conclusions. Artificial Intelligence\u00a0135, 55\u201372 (2002)","journal-title":"Artificial Intelligence"},{"doi-asserted-by":"crossref","unstructured":"Horty, J.F., Thomason, R.H., Touretzky, D.: A Skeptical Theory of Inheritance in Nonmonotonic Semantic Networks. In: Proc. AAAI 1987, pp. 358\u2013363 (1987)","key":"33_CR17","DOI":"10.21236\/ADA188746"},{"issue":"4","key":"33_CR18","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/0743-1066(87)90007-0","volume":"4","author":"K. Kunen","year":"1987","unstructured":"Kunen, K.: Negation in Logic Programming. Journal of Logic Programming\u00a04(4), 289\u2013308 (1987)","journal-title":"Journal of Logic Programming"},{"issue":"6","key":"33_CR19","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1017\/S1471068401001168","volume":"1","author":"M.J. Maher","year":"2001","unstructured":"Maher, M.J.: Propositional Defeasible Logic has Linear Complexity. Theory and Practice of Logic Programming\u00a01(6), 691\u2013711 (2001)","journal-title":"Theory and Practice of Logic Programming"},{"unstructured":"Maher, M.J., Governatori, G.: A Semantic Decomposition of Defeasible Logics. In: Proc. American National Conference on Artificial Intelligence (AAAI 1999), pp. 299\u2013306 (1999)","key":"33_CR20"},{"key":"33_CR21","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0004-3702(91)90061-N","volume":"48","author":"D. Makinson","year":"1991","unstructured":"Makinson, D., Schlechta, K.: Floating conclusions and zombie paths: two deep difficulties in the \u201cdirectly skeptical\u201d approach to defeasible inheritance nets. Artificial Intelligence\u00a048, 199\u2013209 (1991)","journal-title":"Artificial Intelligence"},{"key":"33_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0004-3702(98)00073-3","volume":"103","author":"L. Morgenstern","year":"1998","unstructured":"Morgenstern, L.: Inheritance Comes of Age: Applying Nonmonotonic Techniques to Problems in Industry. Artificial Intelligence\u00a0103, 1\u201334 (1998)","journal-title":"Artificial Intelligence"},{"key":"33_CR23","first-page":"470","volume-title":"Proc. 20th Hawaii International Conference on Systems Science","author":"D. Nute","year":"1987","unstructured":"Nute, D.: Defeasible Reasoning. In: Proc. 20th Hawaii International Conference on Systems Science, pp. 470\u2013477. IEEE Press, Los Alamitos (1987)"},{"key":"33_CR24","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1093\/oso\/9780198537472.003.0007","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"D. Nute","year":"1994","unstructured":"Nute, D.: Defeasible Logic. In: Gabbay, D.M., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, vol.\u00a03, pp. 353\u2013395. Oxford University Press, Oxford (1994)"},{"unstructured":"Prakken, H.: Intuitions and the modelling of defeasible reasoning: some case studies. In: Proc. 9th International Workshop on Nonmonotonic Reasoning, Toulouse, pp. 91\u201399 (2002)","key":"33_CR25"},{"key":"33_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/0004-3702(80)90014-4","volume":"13","author":"R. Reiter","year":"1980","unstructured":"Reiter, R.: A Logic for Default Reasoning. Artificial Intelligence\u00a013, 81\u2013132 (1980)","journal-title":"Artificial Intelligence"},{"key":"33_CR27","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0004-3702(92)90057-5","volume":"55","author":"L.A. Stein","year":"1992","unstructured":"Stein, L.A.: Resolving Ambiguity in Nonmonotonic Inheritance Hierarchies. Artificial Intelligence\u00a055, 259\u2013310 (1992)","journal-title":"Artificial Intelligence"},{"key":"33_CR28","first-page":"476","volume-title":"Proc. IJCAI 1987","author":"D.D. Touretzky","year":"1987","unstructured":"Touretzky, D.D., Horty, J.F., Thomason, R.H.: A Clash of Intuitions: The Current State of Nonmonotonic Multiple Inheritance Systems. In: Proc. IJCAI 1987, pp. 476\u2013482. Morgan Kaufmann, San Francisco (1987)"}],"container-title":["Lecture Notes in Computer Science","Methods and Applications of Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24674-9_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T02:59:28Z","timestamp":1711681168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24674-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219378","9783540246749"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24674-9_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}