Time to buy, in 2010 graduated from the Philosophy Department of Nanjing University, received a doctorate of philosophy. Currently teaches at Yunnan University of Finance and Economics Marx School of Marxism, Nanjing University Institute of modern logic and applications of part-time researchers, engaged in the research of logic and game theory.
The copyright page: illustration: the following proposition is confirmed, even all the information received, but not for the establishment of public knowledge of delivered. The first step in the proof of a class is defined context. Can put an interpretation of environmental (gamma, PI) called a message context, if it satisfies the following assumptions: • environmental and / or some body we have specified information transfer action; intuitively, these actions lead to information is passed to the subject. • gamma is a record of context, the state of the environment including the sequence of actions conjunction has occurred, τ properly update status. • language includes propositions of delivered. If at least one of the information has been transmitted, we mean that delivered is really. That is to say, if at least one of the information transfer action has been completed. Because the sequence of actions conjunction includes state of the environment has been completed, it is easy to define pi to strengthen it. In order to make the conclusion as far as possible, in general, about these contextual assumption that less is more. In particular, in the heart of subject activity or their local state any assumptions do not. Similarly, can occur under the assumption that the information transfer events, and the system environment to record the events occurring on the state of the environment, not to make any assumptions and action. The second step with a context to describe a class of system. The definition of a information transmission system Irep (P, y, n), (gamma, PI) is an information delivery context, P is a run in the context of γ communication protocol. In an information transfer system, we can discuss the information transmission and the body knows the situation of information transfer. A message is called a run, the formula delivered at the beginning of an operation must be false (because at time 0 when no information is passed). Soon can be concluded in time 0 when delivered is not public knowledge. Now to show that, even in the synchronization systemAnd delivered never became public knowledge, as long as the information sufficiently unreliable. Information transmission is "fully unreliable" means intuitively that it says there may be an infinite transmission of information, so it can be a long time for the information service at any time. Therefore, a main body (not the information receiver) can find about confirmation came only a recursive method for success is receiving another message. In particular, if R have unlimited information transfer function I in R at the time points (R, l) received a message, and in the R round in time between L and M is not subject to receive information from I, then all of the other subjects will consider, at time m I is not received information is possible (because they have no reason to believe otherwise).
The first chapter is the introduction section of public knowledge source and concept system of public knowledge sources two the concept of public knowledge system of the second day public knowledge theory system and the development of cognitive logic development context two public knowledge research context third day public knowledge of a foreign research survey of two domestic study of three and the public knowledge of relevant theoretical research section fourth of this book fifth of this book innovation second chapter of public knowledge in the form of characteristic of the first section of the knowledge description of two kinds of basic methods of a logic based method and event based method, the relationship between the two two methods based on the second day the logic method of public knowledge form analysis Lewis's hierarchy explain two Haman Barwise definition third day event based method of public knowledge form analysis of a Aumann Gilbert Lewis and Aumann explain two of the definition of integration of the fourth day public knowledge and feature analysis of public knowledge levels of infinite two public knowledge fixed point features three public knowledge sharing situation explain four three explain the relationship between the third chapter S5m system of axioms and inference rules of axioms and inference rules of two public conviction of third reliability of public knowledge axiom system the first section contains a fixed point axiom system of public knowledge logic system established two formal language three axioms, inference rules and the relevant axioms in section second, public knowledge system of axioms and complete a two Kripke structures reliability and complete section of public belief logic an individual belief three Kripke semantics in section fourth of public beliefs with operator CDE (CDE) S5m (CDE) language Lm two S5m (CDE) fifth day game logic deduction of fourth chapter of public knowledge formation problem first public knowledge of application problems coordinated attack problem of mathematical induction to prove two coordinated attack problem of logical proof of the second attack, the transfer of information and public knowledge and at the same time and reliability of cognitive structure of two delay under conditions of group three coordinated attack problem in the reliability of information transmission section third public knowledge of the weakening of public knowledge reduction method two weakening public knowledge forms the fifth chapter weakening public knowledge With the coordinated attack problem first coordinated attack problem solutions to explore a strict at the same time only by assuming two game from the perspective of coordinated attack problem three coordinated attack game model of section second public P beliefs on the coordinated attack problem solving a common p - belief into two public p- beliefs on coordinated attack to solve the problem of three common p- belief problem solving sixth chapter weakening public knowledge and coordination game first day on a coordination game experiments a coordination game two on the coordination game digital experiment three coordination game. - Analysis of experimental results of second different cultural background coordination game. Change a Schelling experiments two digital coordination game show the different results of the third day weak public faith the reality on the basis of a weak public belief significance two public cultural background weak public beliefs form the conclusion of the seventh chapter Index Reference English references references in Chinese @##@. "Yunnan University of Finance and Economics Philosophy Research Series: public knowledge of logic analysis" of formal axiomatic method use the logic to try and describe the results of public knowledge, find out the difficulties and the reasons of public knowledge in practice, to explore a weakened form of public knowledge and its application. Claim to solve the realistic game problems in public knowledge weakening, and studied by experiment. The cognitive concept of new (weak public beliefs), the method for solving the coordinated attack problem using public p- belief. The public cultural background introduction of game theory, broaden the research perspective of game theory. Calls for the application value of circles of public knowledge and weakening in the form of interactive decision-making etc..
"Yunnan University of Finance and Economics Philosophy Research Series: public knowledge of logical analysis" published by the China Social Science Press.
Culture @ 2017