Refine
Year of publication
Document Type
- Monograph/Edited Volume (1219) (remove)
Language
- English (1219) (remove)
Keywords
Institute
- Institut für Mathematik (353)
- Wirtschaftswissenschaften (191)
- Hasso-Plattner-Institut für Digital Engineering gGmbH (89)
- Institut für Informatik und Computational Science (82)
- Department Linguistik (47)
- Institut für Anglistik und Amerikanistik (46)
- Sozialwissenschaften (39)
- Institut für Physik und Astronomie (35)
- Hasso-Plattner-Institut für Digital Engineering GmbH (33)
- Department Psychologie (25)
- Institut für Umweltwissenschaften und Geographie (21)
- Historisches Institut (20)
- Institut für Biochemie und Biologie (19)
- Interdisziplinäres Zentrum für Dynamik komplexer Systeme (19)
- Fachgruppe Politik- & Verwaltungswissenschaft (18)
- Institut für Romanistik (18)
- Institut für Germanistik (17)
- Institut für Jüdische Studien und Religionswissenschaft (17)
- Extern (16)
- Institut für Chemie (13)
- Institut für Geowissenschaften (13)
- MenschenRechtsZentrum (11)
- Philosophische Fakultät (11)
- Department Erziehungswissenschaft (9)
- Institut für Slavistik (8)
- Öffentliches Recht (8)
- Sonderforschungsbereich 632 - Informationsstruktur (6)
- Strukturbereich Kognitionswissenschaften (6)
- Bürgerliches Recht (5)
- Department Grundschulpädagogik (5)
- Institut für Künste und Medien (5)
- Department Sport- und Gesundheitswissenschaften (4)
- Fachgruppe Betriebswirtschaftslehre (4)
- Zentrum für Gerechtigkeitsforschung (4)
- Fachgruppe Soziologie (3)
- Klassische Philologie (3)
- Institut für Ernährungswissenschaft (2)
- WeltTrends e.V. Potsdam (2)
- Wirtschafts- und Sozialwissenschaftliche Fakultät (2)
- Zentrum für Australienforschung (2)
- Department Musik und Kunst (1)
- Fakultät für Gesundheitswissenschaften (1)
- Institut für Jüdische Theologie (1)
- Institut für Philosophie (1)
- Interdisziplinäres Zentrum für Biopolymere (1)
- Lehreinheit für Wirtschafts-Arbeit-Technik (1)
- Strafrecht (1)
- Zentrum für Qualitätsentwicklung in Lehre und Studium (ZfQ) (1)
The correctness of model transformations is a crucial element for model-driven engineering of high quality software. In particular, behavior preservation is the most important correctness property avoiding the introduction of semantic errors during the model-driven engineering process. Behavior preservation verification techniques either show that specific properties are preserved, or more generally and complex, they show some kind of behavioral equivalence or refinement between source and target model of the transformation. Both kinds of behavior preservation verification goals have been presented with automatic tool support for the instance level, i.e. for a given source and target model specified by the model transformation. However, up until now there is no automatic verification approach available at the transformation level, i.e. for all source and target models specified by the model transformation.
In this report, we extend our results presented in [27] and outline a new sophisticated approach for the automatic verification of behavior preservation captured by bisimulation resp. simulation for model transformations specified by triple graph grammars and semantic definitions given by graph transformation rules. In particular, we show that the behavior preservation problem can be reduced to invariant checking for graph transformation and that the resulting checking problem can be addressed by our own invariant checker even for a complex example where a sequence chart is transformed into communicating automata. We further discuss today's limitations of invariant checking for graph transformation and motivate further lines of future work in this direction.
Constraints allow developers to specify desired properties of systems in a number of domains, and have those properties be maintained automatically. This results in compact, declarative code, avoiding scattered code to check and imperatively re-satisfy invariants. Despite these advantages, constraint programming is not yet widespread, with standard imperative programming still the norm. There is a long history of research on integrating constraint programming with the imperative paradigm. However, this integration typically does not unify the constructs for encapsulation and abstraction from both paradigms. This impedes re-use of modules, as client code written in one paradigm can only use modules written to support that paradigm. Modules require redundant definitions if they are to be used in both paradigms. We present a language – Babelsberg – that unifies the constructs for en- capsulation and abstraction by using only object-oriented method definitions for both declarative and imperative code. Our prototype – Babelsberg/R – is an extension to Ruby, and continues to support Ruby’s object-oriented se- mantics. It allows programmers to add constraints to existing Ruby programs in incremental steps by placing them on the results of normal object-oriented message sends. It is implemented by modifying a state-of-the-art Ruby virtual machine. The performance of standard object-oriented code without con- straints is only modestly impacted, with typically less than 10% overhead compared with the unmodified virtual machine. Furthermore, our architec- ture for adding multiple constraint solvers allows Babelsberg to deal with constraints in a variety of domains. We argue that our approach provides a useful step toward making con- straint solving a generic tool for object-oriented programmers. We also provide example applications, written in our Ruby-based implementation, which use constraints in a variety of application domains, including interactive graphics, circuit simulations, data streaming with both hard and soft constraints on performance, and configuration file Management.
Babelsberg/RML
(2015)
New programming language designs are often evaluated on concrete implementations. However, in order to draw conclusions about the language design from the evaluation of concrete programming languages, these implementations need to be verified against the formalism of the design. To that end, we also have to ensure that the design actually meets its stated goals. A useful tool for the latter has been to create an executable semantics from a formalism that can execute a test suite of examples. However, this mechanism so far did not allow to verify an implementation against the design.
Babelsberg is a new design for a family of object-constraint languages. Recently, we have developed a formal semantics to clarify some issues in the design of those languages. Supplementing this work, we report here on how this formalism is turned into an executable operational semantics using the RML system. Furthermore, we show how we extended the executable semantics to create a framework that can generate test suites for the concrete Babelsberg implementations that provide traceability from the design to the language. Finally, we discuss how these test suites helped us find and correct mistakes in the Babelsberg implementation for JavaScript.
Inhalt: Habachi, Labib: Tell Basta Chapter 1: Introductory: Bubatis and its monuments Chapter II: The temple of Pepi I [I]: Description Chapter III: The temple of Pepi [III]: Finds and importance Chapter IV: General notes on the great temple [I]: Mihos temple and entrance hall Chapter V: General notes on the great temple [II]: Festival hall and hypostyle hall Chapter VI: General notes on the great temple [III]: The temple of Nektanebos (Nekht-har-hebi) Chapter VII: Work outside the temples Chapter VIII: Blocks transferred to Bubastis Chapter IX: Blocks removed from Bubastis Farid, Shafik: Preliminary report on the excavations of the antiquities department at Tell Basta
Behavioural Models
(2016)
This textbook introduces the basis for modelling and analysing discrete dynamic systems, such as computer programmes, soft- and hardware systems, and business processes. The underlying concepts are introduced and concrete modelling techniques are described, such as finite automata, state machines, and Petri nets. The concepts are related to concrete application scenarios, among which business processes play a prominent role.
The book consists of three parts, the first of which addresses the foundations of behavioural modelling. After a general introduction to modelling, it introduces transition systems as a basic formalism for representing the behaviour of discrete dynamic systems. This section also discusses causality, a fundamental concept for modelling and reasoning about behaviour. In turn, Part II forms the heart of the book and is devoted to models of behaviour. It details both sequential and concurrent systems and introduces finite automata, state machines and several different types of Petri nets. One chapter is especially devoted to business process models, workflow patterns and BPMN, the industry standard for modelling business processes. Lastly, Part III investigates how the behaviour of systems can be analysed. To this end, it introduces readers to the concept of state spaces. Further chapters cover the comparison of behaviour and the formal analysis and verification of behavioural models.
The book was written for students of computer science and software engineering, as well as for programmers and system analysts interested in the behaviour of the systems they work on. It takes readers on a journey from the fundamentals of behavioural modelling to advanced techniques for modelling and analysing sequential and concurrent systems, and thus provides them a deep understanding of the concepts and techniques introduced and how they can be applied to concrete application scenarios.
In a democracy, a constitutional separation of powers between the executive and the assembly may be desirable, but the constitutional concentration of executive power in a single human being is not. The book defends this thesis and explores ‘semi-parliamentary government’ as an alternative to presidential government. Semi-parliamentarism avoids power concentration in one person by shifting the separation of powers into the democratic assembly. The executive becomes fused with only one part of the assembly, even though the other part has at least equal democratic legitimacy and robust veto power on ordinary legislation. The book identifies the Australian Commonwealth and Japan, as well as the Australian states of New South Wales, South Australia, Tasmania, Victoria, and Western Australia, as semi-parliamentary systems. Using data from 23 countries and 6 Australian states, it maps how parliamentary and semi-parliamentary systems balance competing visions of democracy; it analyzes patterns of electoral and party systems, cabinet formation, legislative coalition-building, and constitutional reforms; it systematically compares the semi-parliamentary and presidential separation of powers; and it develops new and innovative semi-parliamentary designs, some of which do not require two separate chambers.
Biomass size spectra collate structural and functional attributes of plankton communities enabling standardised temporal and cross-system comparisons and may be rapidly obtained by automated particle counters. To examine how differences in plankton communities from highly eutrophic and more oligotrophic lakes are reflected in size spectra, a three-year time series of biomass size spectra was established for polymictic, eutrophic Lake Müggelsee, based on approximately weekly sampling and microscopic enumeration. The continuous but often bumpy size spectra reflected appropriately the seasonal and trophy-related variations in the plankton composition and growth conditions and the potential impact of daphnids on smaller plankton. We tested the hypothesis that more diverse plankton communities have smoother size spectra than impoverished ones. The spectra of L. Müggelsee and other more less eutrophic lakes covaried roughly with the functional diversity in total plankton composition but were unrelated to taxonomical diversity within the phyto- or mesozooplankton. The slopes of the normalised size spectra of Lake Müggelsee were generally more negative than -1, exhibited a recurrent seasonal pattern, and were strongly correlated with crustacean biomass. In contrast to less eutrophic systems, slopes could not be used to quantify energy fluxes within the foodweb due to highly variable algal P/B ratios and frequently bumpy size distributions. The latter indicated stronger deviations from the ideal concept of a steady energy flow along the size gradient than found in e. g. large, mesotrophic Lake Constance.
Blockchain
(2018)
The term blockchain has recently become a buzzword, but only few know what exactly lies behind this approach. According to a survey, issued in the first quarter of 2017, the term is only known by 35 percent of German medium-sized enterprise representatives. However, the blockchain technology is very interesting for the mass media because of its rapid development and global capturing of different markets.
For example, many see blockchain technology either as an all-purpose weapon— which only a few have access to—or as a hacker technology for secret deals in the darknet. The innovation of blockchain technology is found in its successful combination of already existing approaches: such as decentralized networks, cryptography, and consensus models. This innovative concept makes it possible to exchange values in a decentralized system. At the same time, there is no requirement for trust between its nodes (e.g. users).
With this study the Hasso Plattner Institute would like to help readers form their own opinion about blockchain technology, and to distinguish between truly innovative properties and hype.
The authors of the present study analyze the positive and negative properties of the blockchain architecture and suggest possible solutions, which can contribute to the efficient use of the technology. We recommend that every company define a clear target for the intended application, which is achievable with a reasonable cost-benefit ration, before deciding on this technology. Both the possibilities and the limitations of blockchain technology need to be considered. The relevant steps that must be taken in this respect are summarized /summed up for the reader in this study.
Furthermore, this study elaborates on urgent problems such as the scalability of the blockchain, appropriate consensus algorithm and security, including various types of possible attacks and their countermeasures. New blockchains, for example, run the risk of reducing security, as changes to existing technology can lead to lacks in the security and failures.
After discussing the innovative properties and problems of the blockchain technology, its implementation is discussed. There are a lot of implementation opportunities for companies available who are interested in the blockchain realization. The numerous applications have either their own blockchain as a basis or use existing and widespread blockchain systems. Various consortia and projects offer "blockchain-as-a-serviceänd help other companies to develop, test and deploy their own applications.
This study gives a detailed overview of diverse relevant applications and projects in the field of blockchain technology. As this technology is still a relatively young and fast developing approach, it still lacks uniform standards to allow the cooperation of different systems and to which all developers can adhere. Currently, developers are orienting themselves to Bitcoin, Ethereum and Hyperledger systems, which serve as the basis for many other blockchain applications.
The goal is to give readers a clear and comprehensive overview of blockchain technology and its capabilities.
In reading, word frequency is commonly regarded as the major bottom-up determinant for the speed of lexical access. Moreover, language processing depends on top-down information, such as the predictability of a word from a previous context. Yet, however, the exact role of top-down predictions in visual word recognition is poorly understood: They may rapidly affect lexical processes, or alternatively, influence only late post-lexical stages. To add evidence about the nature of top-down processes and their relation to bottom-up information in the timeline of word recognition, we examined influences of frequency and predictability on event-related potentials (ERPs) in several sentence reading studies. The results were related to eye movements from natural reading as well as to models of word recognition. As a first and major finding, interactions of frequency and predictability on ERP amplitudes consistently revealed top-down influences on lexical levels of word processing (Chapters 2 and 4). Second, frequency and predictability mediated relations between N400 amplitudes and fixation durations, pointing to their sensitivity to a common stage of word recognition; further, larger N400 amplitudes entailed longer fixation durations on the next word, a result providing evidence for ongoing processing beyond a fixation (Chapter 3). Third, influences of presentation rate on ERP frequency and predictability effects demonstrated that the time available for word processing critically co-determines the course of bottom-up and top-down influences (Chapter 4). Fourth, at a near-normal reading speed, an early predictability effect suggested the rapid comparison of top-down hypotheses with the actual visual input (Chapter 5). The present results are compatible with interactive models of word recognition assuming that early lexical processes depend on the concerted impact of bottom-up and top-down information. We offered a framework that reconciles the findings on a timeline of word recognition taking into account influences of frequency, predictability, and presentation rate (Chapter 4).
This volume Boundaries of Inclusion and Exclusion examines the many different and newly emerging ways in which citizenship refers to spatial, symbolic and social boundaries. Today, in the context of citizenship we face processes of inclusion and exclusion on national and supranational level but no less on the level of groups and individuals. The book addresses these different levels and discusses processes of inclusion and exclusion with regard to spatial, social and symbolic boundaries referring to such different problems as political participation, migration, or identity with regard to religion or the EU. This book will appeal to academics working in the field of political theory, political sociology and European studies.
Business processes are instrumental to manage work in organisations. To study the interdependencies between business processes, Business Process Architectures have been introduced. These express trigger and message ow relations between business processes. When we investigate real world Business Process Architectures, we find complex interdependencies, involving multiple process instances. These aspects have not been studied in detail so far, especially concerning correctness properties. In this paper, we propose a modular transformation of BPAs to open nets for the analysis of behavior involving multiple business processes with multiplicities. For this purpose we introduce intermediary nets to portray semantics of multiplicity specifications. We evaluate our approach on a use case from the public sector.
Business process management aims at capturing, understanding, and improving work in organizations. The central artifacts are process models, which serve different purposes. Detailed process models are used to analyze concrete working procedures, while high-level models show, for instance, handovers between departments. To provide different views on process models, business process model abstraction has emerged. While several approaches have been proposed, a number of abstraction use case that are both relevant for industry and scientifically challenging are yet to be addressed. In this paper we systematically develop, classify, and consolidate different use cases for business process model abstraction. The reported work is based on a study with BPM users in the health insurance sector and validated with a BPM consultancy company and a large BPM vendor. The identified fifteen abstraction use cases reflect the industry demand. The related work on business process model abstraction is evaluated against the use cases, which leads to a research agenda.
Cost models are an essential part of database systems, as they are the basis of query performance optimization. Based on predictions made by cost models, the fastest query execution plan can be chosen and executed or algorithms can be tuned and optimised. In-memory databases shifts the focus from disk to main memory accesses and CPU costs, compared to disk based systems where input and output costs dominate the overall costs and other processing costs are often neglected. However, modelling memory accesses is fundamentally different and common models do not apply anymore. This work presents a detailed parameter evaluation for the plan operators scan with equality selection, scan with range selection, positional lookup and insert in in-memory column stores. Based on this evaluation, a cost model based on cache misses for estimating the runtime of the considered plan operators using different data structures is developed. Considered are uncompressed columns, bit compressed and dictionary encoded columns with sorted and unsorted dictionaries. Furthermore, tree indices on the columns and dictionaries are discussed. Finally, partitioned columns consisting of one partition with a sorted and one with an unsorted dictionary are investigated. New values are inserted in the unsorted dictionary partition and moved periodically by a merge process to the sorted partition. An efficient attribute merge algorithm is described, supporting the update performance required to run enterprise applications on read-optimised databases. Further, a memory traffic based cost model for the merge process is provided.
Causes, Time, and Truth
(2016)
We need causation, time, and truth in order to know how things in the broadest sense of the term hang together in the broadest sense of the term. The essays try to say something clarifying about those three classical questions of traditional metaphysics. Not dogmatic answers are offered, but guiding perspectives and possible justifiable ways of dealing with such fundamental
Ceremonial-Acta
(2009)
Changing innovation in the pharmaceutical industry : globalization and new ways of drug development
(2000)
The volume provides a field-analytical methodology for researching knowledge based sociopolitical processes of transnationalization. Drawing on the seminal work by Pierre Bourdieu, we apply concepts of practice, habitus, and field to phenomena such as cross-national social trajectories, international procedures of evaluation, standardization and certification or supranational political structures. These transnational phenomena form part of general political struggles that legitimate social relationships in and beyond the nation state. Part 1 on "Methodological Foundations" discusses the consequences of Bourdieu's epistemology and methodology for theorizing and investigating transnational phenomena. The contributions show the import of field-theoretical concepts for post-national insights. Part 2 on "Investigating Political Fields" presents exemplary case studies in diverse research areas such as colonial imperialism, international academic rankings, European policy fields, and local school policy. While focusing on their research objects, the contributions also give an insight into the mechanisms involved in processes of transnationalization. The volume is an invitation for sociologists, political scientists and scholars in adjacent research areas to engage with reflexive and relational research practice and to further develop field-theoretical thought.
Chemical Physics
(1991)
During 1987-1998, the ciliates and their prey and predator communities in large, deep, mesotrophic Lake Constance were intensively studied as it underwent re-oligotrophication. Ciliate biomass exhibited the bimodal seasonal distribution typical for meso-eutrophic lakes, with high biomass in spring and summer and low biomass in winter and during the clear-water phase. Cluster analysis produced nine groups of temporally co-occurring ciliate morphotypes with potentially similar ecological characteristics. The clusters exhibited a larger seasonality than found in the size distribution, showing that similarly-sized ciliates had seasonally compensatory dynamics. Ciliate biomass declined by approx. 30 % during the 12 years of study, i.e. considerably less than daphnids (and total phosphorus). This yielded a significant increase in the ratio between summer ciliate and daphnid biomass as re-oligotrophication progressed, in contrast to previous studies. Few indications for a mechanistic link between phosphorus concentrations (which declined threefold during the study period) and ciliate biomass or community composition via group-specific food concentrations were found. The relative contribution of three of the nine clusters changed as re-oligotrophication progressed. Ciliate size distribution was related to reoligotrophication and daphnid biomass in summer. The smallest and largest ciliates gained in importance when daphnids decreased whereas large ciliates declined. Overall, summer daphnid biomas had a greater predictive power for attributes of the ciliate community than the other factors studied (phosphorus, prey biomass, copepod biomass). The extent of bottom-up and top-down control of ciliates appeared to be time and group specific. Overall, the ciliate community exhibited remarkably recurrent seasonal patterns despite major alternations in abiotic and biotic conditions.
On the 20.01.1991 the Latvian people defended the Latvian political elite from the Soviet OMON troops in order to achieve independence. After this impressive sign of civil society the people fell asleep, the level of mobility and the satisfaction with the functioning of democracy therefore is rather weak. The referendum (2008), to gain the right to dissolve the Parliament by the people, initiated by the Trade Unions can be assessed as a sign that there is something on the move. This paper is trying to give an impression of the situation of the civil society in terms of participation in the decision- making process. Hereby the focus lays on NGOs: What is the legal base and which problems do they face. To learn more about the situation interviews were organized with representatives of NGOs from different sectors like community development; Social inclusion; advocating gender issues as well as environment and sustainable development. As a result of the research it can be said that the civil society made some steps forward but it is still struggling with a high level of corruption, lack of interested from the elite and the ordinary people and the insecure financial state.
Clones and hyperidentities
(1996)
Closed ideals of polynomials
(1995)
Cloud security mechanisms
(2014)
Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud infrastructures. This report provides introductions to a selection of security mechanisms that were part of the "Cloud Security Mechanisms" seminar in summer term 2013 at HPI.
This volume offers a coherent and detailed picture of the diachronic development of verbal categories of Old English, Old High German, and other Germanic languages. Starting from the observation that German and English show diverging paths in the development of verbal categories, even though they descended from a common ancestor language, the contributions present in-depth, empirically founded studies on the stages and directions of these changes combining historical comparative methods with grammaticalisation theory. This collection of papers provides the reader with an indispensable source of information on the early traces of distinct developments, thus laying the foundation for a broad-scale scenario of the grammaticalisation of verbal categories. The volume will be of particular interest to scholars of language change, grammaticalisation, and diachronic sociolinguistics; it offers important new insights for typologists and for everybody interested in the make-up of verbal categories.
Complete 3D potential energy surfaces for the two lowest electronic states of the system (N2H)+
(1996)
The analysis of behavioral models is of high importance for cyber-physical systems, as the systems often encompass complex behavior based on e.g. concurrent components with mutual exclusion or probabilistic failures on demand. The rule-based formalism of probabilistic timed graph transformation systems is a suitable choice when the models representing states of the system can be understood as graphs and timed and probabilistic behavior is important. However, model checking PTGTSs is limited to systems with rather small state spaces.
We present an approach for the analysis of large scale systems modeled as probabilistic timed graph transformation systems by systematically decomposing their state spaces into manageable fragments. To obtain qualitative and quantitative analysis results for a large scale system, we verify that results obtained for its fragments serve as overapproximations for the corresponding results of the large scale system. Hence, our approach allows for the detection of violations of qualitative and quantitative safety properties for the large scale system under analysis. We consider a running example in which we model shuttles driving on tracks of a large scale topology and for which we verify that shuttles never collide and are unlikely to execute emergency brakes. In our evaluation, we apply an implementation of our approach to the running example.
This document presents the results of the seminar "Coneptual Arachitecture Patterns" of the winter term 2002 in the Hasso-Plattner-Institute. It is a compilation of the student's elaborations dealing with some conceptual architecture patterns which can be found in literature. One important focus laid on the runtime structures and the presentation of the patterns. 1. Introduction 1.1. The Seminar 1.2. Literature 2 Pipes and Filters (André Langhorst and Martin Steinle) 3 Broker (Konrad Hübner and Einar Lück) 4 Microkernel (Eiko Büttner and Stefan Richter) 5 Component Configurator (Stefan Röck and Alexander Gierak) 6 Interceptor (Marc Förster and Peter Aschenbrenner) 7 Reactor (Nikolai Cieslak and Dennis Eder) 8 Half–Sync/Half–Async (Robert Mitschke and Harald Schubert) 9 Leader/Followers (Dennis Klemann and Steffen Schmidt)
The business problem of having inefficient processes, imprecise process analyses and simulations as well as non-transparent artificial neuronal network models can be overcome by an easy-to-use modeling concept. With the aim of developing a flexible and efficient approach to modeling, simulating and optimizing processes, this paper proposes a flexible Concept of Neuronal Modeling (CoNM). The modeling concept, which is described by the modeling language designed and its mathematical formulation and is connected to a technical substantiation, is based on a collection of novel sub-artifacts. As these have been implemented as a computational model, the set of CoNM tools carries out novel kinds of Neuronal Process Modeling (NPM), Neuronal Process Simulations (NPS) and Neuronal Process Optimizations (NPO). The efficacy of the designed artifacts was demonstrated rigorously by means of six experiments and a simulator of real industrial production processes.
Contesting citizenship
(2022)
Democracy and citizenship are conceptually and empirically contested. Against the backdrop of recent and current profound transformations in and of democratic societies, this volume presents and discusses acute contestations, within and beyond national borders and boundaries. Democracy’s crucial relationships, between state and citizenry as well as amongst citizens, are rearranged and re-ordered in various spheres and arenas, impacting on core democratic principles such as accountability, legitimacy, participation and trust. This volume addresses these refigurations by bringing together empirical analyses and conceptual considerations regarding the access to and exclusion from citizenship rights in the face of migration regulation and institutional transformation, and the role of violence in maintaining or undermining social order. With its critical reflection on the consequences and repercussions of such processes for citizens’ everyday lives and for the meaning of citizenship altogether, this book transgresses disciplinary boundaries and puts into dialogue the perspectives of political theory and sociology.
In modern political philosophy social contract theory is the most prominent approach to individual rights and fair institutions. According to social contract theory the system of rights in a society ought to be justified by reconstructing its basic features as a contract between the mutually unconcerned members of society. This paper explores whether social contract theory can successfully be applied to justify rights of future generations. Three competing views are analysed: Rawls's theory of justice, Hobbes's radical liberalism and Gauthier's bargaining framework based on the Lockean proviso.