MAXIMALITY OF LOGIC WITHOUT IDENTITY
نویسندگان
چکیده
Abstract Lindström’s theorem obviously fails as a characterization of first-order logic without identity ( $\mathcal {L}_{\omega \omega }^{-} $ ). In this note, we provide fix: show that is maximal abstract satisfying weak form the isomorphism property (suitable for identity-free languages and studied in [11]), Löwenheim–Skolem property, compactness. Furthermore, compactness can be replaced by being recursively enumerable validity under certain conditions. proofs, use strong upwards not available framework with identity.
منابع مشابه
Maximality with or without binariness: Transfer-type characterizations
We provide the first necessary and sufficient conditions in the literature for the existence of maximal elements in a non-binary choice framework. As an application, the characterization of the existence of maximal elements for acyclic binary relations obtained in Rodŕıguez-Palmero and Garćıa-Lapresta, 2002, Mathematical Social Sciences 43, 55-60, is deduced as a Corollary. Further characteriza...
متن کاملATB Movement without Identity
A standard claim in the literature on coordination is that movement out of coordinate structures proceeds 'Across-the-board', a term originally due to Ross 1967 and worked out in some detail in Williams 1978. This is the basis for allowing exceptions to the Coordinate Structure Constraint (CSC) which disallows movement out of one conjunct if no movement takes place out of all of the other conju...
متن کاملMinimizing Maximality
Judgments about the locus of synchronic personal identity are often guided by the intuition that “I” am the thing that thinks, or minimally, that neither my body nor any part of it is a thinker distinct from me. Ted Sider argues in a series of articles that in order to reconcile this intuition with the principle of microphysical supervenience, we must accept ‘being a thinker’ as a maximal prope...
متن کاملwoman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin IBE is an hybrid construction that is proved to be secure (using proof techniques borrowed from those for KEM-DEM constructions) in the random oracle model under a slightly stronger assumption than the original IBE ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Symbolic Logic
سال: 2023
ISSN: ['1943-5886', '0022-4812']
DOI: https://doi.org/10.1017/jsl.2023.2