Trope theory and atomic objects

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trope Bundle Theory

The aim of this paper is that of analysing trope bundle theory, its promises and some of its problems. First of all, it will begin by showing what trope bundle theory is, its development and its undoubted appeal. Then, it will focus on two problems that affect this theory, both concerned with the relation of compresence invoked in order to explain what a material object is by the bundle theory....

متن کامل

Trope theory and the Bradley regress

Trope theory is the view that the world is a world of abstract particular qualities. But if all there is are tropes, how do we account for the truth of propositions ostensibly made true by some concrete particular? A common answer is that concrete particulars are nothing but tropes in compresence. This answer seems vulnerable to an argument (first presented by F. H. Bradley) according to which ...

متن کامل

Reasoning about Atomic Objects

Atomic transactions are a widely-accepted technique for organizing activities in reliable distributed systems. In most languages and systems based on transactions, atomicity is implemented through atomic objects, which are typed data objects that provide their own synchronization and recovery. This paper describes new linguistic mechanisms for constructing atomic objects from non-atomic compone...

متن کامل

Modular Atomic Objects

A worthwhile approach to achieve transaction atomicity within object-based distributed systems is to connne concurrency control and recovery mechanisms within the shared objects themselves. Such objects, called atomic objects, enhance their modularity and can increase transaction concurrency. Nevertheless, when designed independently , atomic objects can be incompatible, and if combined, do not...

متن کامل

The Piggy Bank Cryptographic Trope

This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. We present a basic two-pass cryptographic scheme that can serve as template for a variety of implementations. Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Logic and Logical Philosophy

سال: 2008

ISSN: 1425-3305

DOI: 10.12775/llp.2008.014