Computing Strong and Weak Permissions in Defeasible Logic

Open in new window