Recovering Argument


Book Description

This volume presents the best scholarship from the 19th National Communication Association/American Forensic Association Conference on Argumentation, which took place July 30-August 2, 2015, at Cliff Lodge, Snowbird Resort, in Alta, Utah. The Alta Conference, first held in 1979, is the oldest conference in argumentation studies in the world and biennially brings together a lively group of scholars, representing a variety of countries, with diverse perspectives on the theory and practice of argument. The essays in Recovering Argument invite reflection upon and reconsideration of argumentation’s legacy, present status, and potential roles in social, cultural, and political life. Readers will encounter essays that treat the relationship between argumentation and memory, historical approaches to argumentation, the vitality of public and interpersonal argument, argument’s role in leadership, discursive and presentational forms of argument, and the challenges of difference. Readers also will find these topics addressed from a variety of historical, social-scientific, and critical-interpretive perspectives.




Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity


Book Description

There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks. In this book, we propose novel solutions to handle these three fundamental components. To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.




Networking Argument


Book Description

This edited volume presents selected works from the 20th Biennial Alta Argumentation Conference, sponsored by the National Communication Association and the American Forensics Association and held in 2017. The conference brought together scholars from Europe, Asia, and North America to engage in intensive conversations about how argument functions in our increasingly networked society. The essays discuss four aspects of networked argument. Some examine arguments occurring in online networks, seeking to both understand and respond more effectively to the acute changes underway in the information age. Others focus on offline networks to identify historical and contemporary resources available to advocates in the modern day. Still others discuss the value-added of including argumentation scholars on interdisciplinary research teams analyzing a diverse range of subjects, including science, education, health, law, economics, history, security, and media. Finally, the remainder network argumentation theories explore how the interactions between and among existing theories offer fruitful ground for new insights for the field of argumentation studies. The wide range of disciplinary backgrounds and methodological approaches employed in Networking Argument make this volume a unique compilation of perspectives for understanding urgent and sustaining issues facing our society.




Local Theories of Argument


Book Description

Argumentation is often understood as a coherent set of Western theories, birthed in Athens and developing throughout the Roman period, the Middle Ages, the Enlightenment and Renaissance, and into the present century. Ideas have been nuanced, developed, and revised, but still the outline of argumentation theory has been recognizable for centuries, or so it has seemed to Western scholars. The 2019 Alta Conference on Argumentation (co-sponsored by the National Communication Association and the American Forensic Association) aimed to question the generality of these intellectual traditions. This resulting collection of essays deals with the possibility of having local theories of argument – local to a particular time, a particular kind of issue, a particular place, or a particular culture. Many of the papers argue for reconsidering basic ideas about arguing to represent the uniqueness of some moment or location of discourse. Other scholars are more comfortable with the Western traditions, and find them congenial to the analysis of arguments that originate in discernibly distinct circumstances. The papers represent different methodologies, cover the experiences of different nations at different times, examine varying sorts of argumentative events (speeches, court decisions, food choices, and sound), explore particular personal identities and the issues highlighted by them, and have different overall orientations to doing argumentation scholarship. Considered together, the essays do not generate one simple conclusion, but they stimulate reflection about the particularity or generality of the experience of arguing, and therefore the scope of our theories.




The Unity of the Proposition


Book Description

Richard Gaskin analyses what is distinctive about sentences and the propositions they express--what marks them off from mere aggregates of words and meanings respectively. Since he identifies the world with all the true and false propositions, his account has significant implications for our understanding of the nature of reality.




Feminist History of Philosophy: The Recovery and Evaluation of Women's Philosophical Thought


Book Description

Over the course of the past twenty-five years, feminist theory has had a forceful impact upon the history of Western philosophy. The present collection of essays has as its primary aim to evaluate past women’s published philosophical work, and to introduce readers to newly recovered female figures; the collection will also make contributions to the history of the philosophy of gender, and to the history of feminist social and political philosophy, insofar as the collection will discuss women’s views on these issues. The volume contains contributions by an international group of leading historians of philosophy and political thought, whose scholarship represents some of the very best work being done in North and Central America, Canada, Europe and Australia.




Computational Linguistics and Intelligent Text Processing


Book Description

This two-volume set, consisting of LNCS 8403 and LNCS 8404, constitutes the thoroughly refereed proceedings of the 14th International Conference on Intelligent Text Processing and Computational Linguistics, CICLing 2014, held in Kathmandu, Nepal, in April 2014. The 85 revised papers presented together with 4 invited papers were carefully reviewed and selected from 300 submissions. The papers are organized in the following topical sections: lexical resources; document representation; morphology, POS-tagging, and named entity recognition; syntax and parsing; anaphora resolution; recognizing textual entailment; semantics and discourse; natural language generation; sentiment analysis and emotion recognition; opinion mining and social networks; machine translation and multilingualism; information retrieval; text classification and clustering; text summarization; plagiarism detection; style and spelling checking; speech processing; and applications.




The Moral Psychology of Sadness


Book Description

What does it mean to be sad? What difference does it make whether, how, and why we experience our own, and other people’s, sadness? Is sadness always appropriate and can it be a way of seeing more clearly into ourselves and others? In this volume, a multi-disciplinary team of scholars - from fields including philosophy, women’s and gender studies, bioethics and public health, and neuroscience - addresses these and other questions related to this nearly-universal emotion that all of us experience, and that some of us dread. Somewhat surprisingly, sadness has been largely ignored by philosophers and others within the humanities, or else under-theorized as a subject worthy of serious and careful attention. This volume reverses this trend, presenting sadness as not merely a feeling or affect, but an emotion of great moral significance that in important ways underwrites how we understand ourselves and each other.




Communication Strategies for Engaging Climate Skeptics


Book Description

Communication Strategies for Engaging Climate Skeptics examines the intersection of climate skepticism and Christianity and proposes strategies for engaging climate skeptics in productive conversations. Despite the scientifically established threats of climate change, there remains a segment of the American population that is skeptical of the scientific consensus on climate change and the urgent need for action. One of the most important stakeholders and conversants in environmental conversations is the religious community. While existing studies have discussed environmentalism as a factor within the religious community, this book positions religion as an important factor in environmentalism and focuses on how identities play a role in environmental conversation. Rather than thinking of religious skeptics as a single unified group, Emma Frances Bloomfield argues that it is essential to recognize there are different types of skeptics so that we can better tailor our communication strategies to engage with them on issues of the environment and climate change. To do so, this work breaks skeptics down into three main types: "separators," "bargainers," and "harmonizers." The book questions monolithic understandings of climate skepticism and considers how competing narratives such as religion, economics, and politics play a large role in climate communication. Considering recent political moves to remove climate change from official records and withdraw from international environmental agreements, it is imperative now more than ever to offer practical solutions to academics, practitioners, and the public to change the conversation. To address these concerns, this book provides both a theoretical examination of the rhetoric of religious climate skeptics and concrete strategies for engaging the religious community in conversations about the environment. This book will be of great interest to students, scholars, and practitioners of climate change science, environmental communication, environmental policy, and religion.




Envisioning Machine Translation in the Information Future


Book Description

Envisioning Machine Translation in the Information Future When the organizing committee of AMTA-2000 began planning, it was in that brief moment in history when we were absorbed in contemplation of the passing of the century and the millennium. Nearly everyone was comparing lists of the most important accomplishments and people of the last 10, 100, or 1000 years, imagining the radical changes likely over just the next few years, and at least mildly anxious about the potential Y2K apocalypse. The millennial theme for the conference, “Envisioning MT in the Information Future,” arose from this period. The year 2000 has now come, and nothing terrible has happened (yet) to our electronic infrastructure. Our musings about great people and events probably did not ennoble us much, and whatever sense of jubilee we held has since dissipated. So it may seem a bit obsolete or anachronistic to cast this AMTA conference into visionary themes.