-
11The Contemporary Theory of Metaphor: Myths, Developments and ChallengesMetaphor and Symbol 26 (3): 161-185. 2011.This article discusses some of the claims of the earlier and later versions of the Contemporary Theory of Metaphor (CTM) and addresses some of the criticism that has been leveled against it. It is argued that much of this criticism arises from common misconceptions as to the real claims made by the theory. However, CTM is still in need of further exploration and empirical support. In this connection, we identify some areas where research is still needed and supply our own developments. We argue …Read more
-
10Comparing low and medium cost computer-based technologies suitable for cryptographic attacksLogic Journal of the IGPL 27 (2): 177-188. 2019.
-
13Design and optimization of the input modules of a DPA toolboxLogic Journal of the IGPL 24 (1). 2016.
-
1Linear symmetric rankings for TU-gamesTheory and Decision 82 (4): 461-484. 2017.We define ranking as an equivalence relation on the set of power indices and study those that have a linear and symmetric representative. Moreover, we classify—or parametrize—those rankings that reward “positive” payoffs for “positive” participation. It is shown that these are in 1-1 correspondence with the points of the standard simplex. Moreover, this correspondence is convex. Finally, we contrast this classification with Saari–Sieberg’s approach via “positive” semi-values.
-
16Two proposals for group signature schemes based on number theory problemsLogic Journal of the IGPL 21 (4): 648-658. 2013.
-
12Using the Spanish national identity card in social networksLogic Journal of the IGPL 28 (4): 519-530. 2020.The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the…Read more
-
6Building brand narratives with hashtags on Twitter : A cognitive-pragmatic analysis on the emergence of a new advertising subgenrePragmatics Cognition 25 (3): 515-542. 2018.
-
6Building brand narratives with hashtags on TwitterPragmatics and Cognition 25 (3): 515-542. 2018.This paper investigates the use of hashtags in the building of brand narratives (i.e. the open-ended, unfolding and participative depiction of a company’s core ideology and beliefs). A collection of over 700 hashtags involved in the creation of the advertising narratives of the four leading soft drinks brands in 2017 (i.e.Coca-Cola, Pepsi, RedBull, Nescafé) has been analyzed both quantitatively and qualitatively to unveil their functions and formal characteristics, as well as the cognitive proce…Read more
-
18XL burgers, shiny pizzas, and ascending drinks: Primary metaphors and conceptual interaction in fast food printed advertisingCognitive Linguistics 30 (3): 531-570. 2019.Journal Name: Cognitive Linguistics Issue: Ahead of print
-
22Cooperative games with homogeneous groups of participantsTheory and Decision 79 (3): 451-461. 2015.We consider a class of games, which we call “groups’ games”, in which players are partitioned into classes within which players may be considered indistinguishable. We compute explicit formulas for some of the principal values restricted to these games. This is particularly useful for dealing with games with a large number of players where the usual formulas would be impractical to compute. We give several examples that illustrate how this idea may be applied to concrete situations.
-
11Cognitive grounding for cross-cultural commercial communicationCognitive Linguistics 25 (2): 203-248. 2014.