منابع مشابه
How Hard Are the Sceptical Paradoxes?
The sceptic about the external world presents us with a paradox: an apparently acceptable argument for an apparently unacceptable conclusion—that we do not know anything about the external world. Some paradoxes, for instance the liar and the sorites, are very hard. The defense of a purported solution to either of these two inevitably deploys the latest in high-tech philosophical weaponry. On th...
متن کاملThe ‘‘sceptical chymist’’: intermolecular doubts and paradoxes
Physico-chemical doubts and paradoxes abound in the description of forces and in the molecular simulation of the crystalline state, as they did in Boyle’s times about the inner structure of matter. Solidstate structuring and bonding are still characterized in sometimes doubtful, sometimes paradoxical, and sometimes distorted terminologies. Phase transitions are mostly considered as just relatio...
متن کاملHow hard are hard triggers?
We study Abusch’s (2002; 2010) distinction between hard and soft triggers from an experimental point of view. We show that there are apparent counterexamples to the distinction, discuss their status and describe future experiments aiming at clarifying the processing issues that form the core of the problem.
متن کاملHow hard are Lexicodes ? ∗
L formed by the above procedure is actually a linear code called the lexicode. Let dim(L) = k; then, step (3) is repeated 2 times. So, the dimension of the code is known after the algorithm finishes. However, starting with the all-zero vector 0, and repeating step (3) 2 times (using zero padding to the left of the already constructed codewords whenever necessary) gives us a lexicode of length n...
متن کاملHow powerful are the DDH hard groups?
The question whether Identity-Based Encryption (IBE) can be based on the Decisional DiffieHellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. We study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a secure Identity-Based Encryption system using, in a black box way, only the DDH...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nous
سال: 2004
ISSN: 0029-4624,1468-0068
DOI: 10.1111/j.1468-0068.2004.00471.x