Abstract
Among his numerous collaborations, over the last decade, Andre Scedrov has formed quite a stable research group. This would not have been possible without his leading scientific role, which has been equally measured by his generous personality, hospitality, and kindness. Among the obtained results and mathematical solutions, the group is particularly fond of real-time abstractions, called Circle-Configurations, which provide a way of handling both density as well as infinity of time in the model. Having in mind the broadness and variety of Andre Scedrov’s interests, we hope to offer here yet another view on these constructions and formal timed models, enriched with the cognitive science perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Is it time for change?.
- 2.
The perception of time is the perception of change.
References
Bar-Yam, Y.: Dynamics of Complex Systems. CRC Press, Boca Raton (2019)
Brdar, M., Brdar-Szabó, R., Perak, B.: Metaphor repositories and cross-linguistic comparison. In: Metaphor and Metonymy in the Digital Age: Theory and Methods for Building Repositories of Figurative Language, vol. 8, p. 64 (2019)
Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur. 12(2), 247–311 (2004)
Emmeche, C., Køppe, S., Stjernfelt, F.: Explaining emergence: towards an ontology of levels. J. Gen. Philos. Sci. 28(1), 83–117 (1997)
Gödel, K.: An example of a new type of cosmological solutions of Einstein’s field equations of gravitation. Rev. Mod. Phys. 21(3), 447 (1949)
Jaffe, A.: The illusion of time. Nature 556(7701), 304–306 (2018)
Kanovich, M., Kirigin, T.B., Nigam, V., Scedrov, A., Talcott, C.: Discrete vs. dense times in the analysis of cyber-physical security protocols. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 259–279. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46666-7_14
Kanovich, M.I., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.L.: Time, computational complexity, and probability in the analysis of distance-bounding protocols. J. Comput. Secur. 25(6), 585–630 (2017)
Kanovich, M.I., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.L., Perovic, R.: A rewriting framework and logic for activities subject to regulations. Math. Struct. Comput. Sci. 27(3), 332–375 (2017)
Matthews, W.J., Meck, W.H.: Temporal cognition: connecting subjective time to perception, attention, and memory. Psychol. Bull. 142(8), 865 (2016)
Núñez, R.E., Sweetser, E.: With the future behind them: convergent evidence from aymara language and gesture in the crosslinguistic comparison of spatial construals of time. Cogn. Sci. 30(3), 401–450 (2006)
Perak, B.: The role of the metonymy and metaphor in the conceptualization of nation. an emergent ontological analysis of syntactic-semantic constructions. In: Metaphors in the Discourse of the National. John Benjamins (2019)
Perak, B., D’Alessio, S.P.: Culture as an emergent property of the embodied cognition. In: Avanture kulture: kulturalni studiji u lokalnom kontekstu. Jesenski i Turk (2013)
Rovelli, C.: The Order of Time. Riverhead Books (2019)
Schilpp, P.A., Gödel, K.: A remark about the relationship between relativity theory and idealistic philosophy (1949)
Urquiza, A.A., et al.: Resource-bounded intruders in denial of service attacks. In: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), pp. 382–38214. IEEE (2019)
Acknowledgments
This work has been supported in part by the Croatian Science Foundation under the project UIP-05-2017-9219 and the University of Rijeka under the project Initial Grants 1016-2017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ban Kirigin, T., Perak, B. (2020). There’s No Time, The Problem of Conceptualising Time. In: Nigam, V., et al. Logic, Language, and Security. Lecture Notes in Computer Science(), vol 12300. Springer, Cham. https://doi.org/10.1007/978-3-030-62077-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-62077-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62076-9
Online ISBN: 978-3-030-62077-6
eBook Packages: Computer ScienceComputer Science (R0)