• Articles • Previous Articles     Next Articles

Logical Sentences as the Intent of Concepts

Yu Sun1,2, Yue-Fei Sui1, and You-Ming Xia2   

  1. 1Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, P.R. China
    2Institute of Computer Science and Information Technology, Yunnan Normal University, Kunming 650092, P.R. China
  • Received:2003-11-11 Revised:2005-03-01 Online:2005-05-10 Published:2005-05-10

Pragmatics plays animportant role in correctly understanding sentences. Much usefulinformation will be lost if the context in which a sentence isasserted is ignored. There are some approaches in logic topragmatics, such as situation theories and context logics.Although these methods associate a sentence with a context or asituation, they consider only the truth value of the sentence.However, a sentence should have more meanings than its truthvalue, and people care more about what a sentence conveys. For theaffection of contexts, the meaning of a sentence is not always itssemantic meaning and a sentence may have different pragmaticalimplications in different contexts. In this paper, a context isconsidered as some structure in the real world. A sentence fromsome logical language is conceptualized as a concept, whose intentis a set of sentences implied semantically by the sentence, and whoseextent is a set of contexts in which the sentence describes a part of the contexts. In terms of tools and theories of concepts, astrictly defined theory is given to study the pragmatics ofsentences in contexts in information systems, which cannot bederived from the sentences by using logical reasoning methods.

Key words: Term rewriting system; constructor system; head boundedness;

[1] Yule G. Pragmatics. Oxford: Oxford University Press, 1996.

[2] Peccei J. Pragmatics. Taylor & Francis Limited, UK, 1999.

[3] Jacob L Mey. Pragmatics: An Introduction.Blackwell Publisher Limited, UK, 2001.

[4] Surav M, Akman V. Modelling Context with Situations. In Proc. The IJCAI-95 Workshop on Modelling Context in KnowledgeRepresentation and Reasoning, Research Report 95/11, LAFORIA, 1995,pp.145--156.

[5] Akman V, Surav M. The use of situation theory in contextmodelling. Computational Intelligence, 1997, 13(3): 427--438.

[6] Barwise J, Perry J. Situations and Attitudes (ExpandedReissue). Stanford CSLI Publications, 1999.

[7] McCarthy J, Suvac S. Formalizing Context (ExpandedNotes). In Computing Natural Language, Aliseda A, van Glabbeek RJ, Weaterstahl D (eds.), CSLI Lecture Notes, 1998, Vol.81, pp.13--50.

[8] Serafini L. Quantificational logic of contexts revisited.Technical Report 0105-01, ITC-IRST, 2001.

[9] Bouquet P, Serafini L. Two formalizations ofcontext: A comparison. In Proc. Third International andInterdisciplinary Conference, Context'01, Dundee, Scotland, 2001, pp.87--102.

[10] Guha R, McCarthy J. Varieties of contexts. In Proc. Fourth International and Interdisciplinary Conference,Context'03, Stanford, California, USA, 2003, pp.164--177.

[11] Buvac S, Buvac V, Mason I A. Metamathematics ofcontexts. Fundamenta Informaticae, 1995, 23(3): 263--301.

[12] Ganter B, Wille R. Formal Concept Analysis:Mathematical Foundations. Springer-Verlag, Berlin, Heidelberg, 1999,pp.17--58.
[1] Su Feng. Mechanizing Weakly Ground Termination Proving of Term Rewriting Systems by Structural and Cover-Set Inductions [J]. , 2005, 20(4): 496-513 .
[2] SUN Yongqiang(孙永强),LIN Kai(林凯)and LU Chaojun(陆朝俊). Partial Completion of Equational Theories [J]. , 2000, 15(6): 0-0.
[3] SUN Yongqiang; LIN Kai; LU Chaojun;. Partial Completion of Equational Theories [J]. , 2000, 15(6): 552-559.
[4] Chen Yiyun;. Head Boundedness of Nonterminating Rewritings [J]. , 1995, 10(3): 281-284.
[5] Chen Yiyun;. Nonterminating Rewritings with Head Boundedness [J]. , 1993, 8(2): 66-75.
Full text



[1] Wu Junsheng; Wu Guangmao;. Element-Partition-Based Methods for Visualization of 3D Unstructured Grid Data[J]. , 1998, 13(5): 417 -425 .
[2] CHEN Haiming;. Function Definition Language FDL andIts Implementation[J]. , 1999, 14(4): 414 -421 .
[3] SHU Yantai; XUE Fei; JIN Zhigang; Oliver Yang;. The Impact of Self-Similar Traffic on Network Delay[J]. , 1999, 14(6): 585 -589 .
[4] MA Jun; YANG Bo; MA Shaohan;. A Practical Algorithm for the Minimum Rectilinear Steiner Tree[J]. , 2000, 15(1): 96 -99 .
[5] MA Zongmin; ZHANG W. J; MA W. Y;. Extending the Relational Model to Deal with Probabilistic Data[J]. , 2000, 15(3): 230 -240 .
[6] Hao-Jun Ai, Shui-Xian Chen, and Rui-Min Hu. Introduction to AVS Audio[J]. , 2006, 21(3): 360 -365 .
[7] Jie Liang and Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. , 2007, 22(1): 79 -87 .
[8] Da-Wei Sun (孙大为), Student Member, CCF, ACM, Gui-Ran Chang (常桂然), Shang Gao (高尚), Li-Zhong Jin (靳立忠), and Xing-Wei Wang, (王兴伟), Senior Member, CCF, ACM. Modeling a Dynamic Data Replication Strategy to Increase System Availability in Cloud Computing Environments[J]. , 2012, (2): 256 -272 .
[9] Shao-Lin Chen (陈绍林), Xi-Yuan Hu (胡晰远), Member, IEEE, and Si-Long Peng (彭思龙). Hyperspectral Imagery Denoising Using a Spatial-Spectral Domain Mixing Prior[J]. , 2012, 27(4): 851 -861 .
[10] Yang Liu, Huai-Kou Miao, Hong-Wei Zeng, Yan Ma, and Pan Liu. Nondeterministic Probabilistic Petri Net — A New Method to Study Qualitative and Quantitative Behaviors of System[J]. , 2013, 28(1): 203 -216 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved