Analyzing proofs in analysis

نویسنده

  • Ulrich Kohlenbach
چکیده

Using a suitable representation of real numbers as Cauchy sequences of rational numbers with fixed rate of convergency (e.g. 2) the predicate ≤ becomes Π1 while < is Σ1. Hence A :≡ ( |F (x)| ≤ 2 → |G(x)| < 2 ) can be prenexed into a formula ∨ l ∈ INA0(x, n, k, l) with decidable A0. Furthermore for a suitable standard representation of X (such that the elements of X are represented by functions f ∈ IN and every function ∈ IN can be conceived as a representative of some element ∈ X)the quantification over X reduces to quantification over IN. Therefore (2)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing the tradition, hadith, of self-knowledge with regard to the knowledge of God

  Deep thinking on the tradition and analyzing other tradition dealing with knowledge of human soul distinguish this proof from those of philosophers and theologians. Availability, unity of the path and the follower and, most particularly, its being intuitive enter the follower to an objective state and, contrary to conceptual proofs, leads him/her to the presence of God. Again, this traditio...

متن کامل

Transforming and Analyzing Proofs in the CERES-System

Cut-elimination is the most prominent form of proof transformation in logic. The elimination of cuts in formal proofs corresponds to the removal of intermediate statements (lemmas) in mathematical proofs. Cut-elimination can be applied to mine real mathematical proofs, i.e. for extracting explicit and algorithmic information. The system CERES (cut-elimination by resolution) is based on automate...

متن کامل

نصاب حد سرقت در بوته نقد

The legislator of the Islamic criminal code in article 268 has stipulated that Theft shall be punishable by &quot;hadd&quot; punishment provided that some collective conditions are met, among them, The stolen property, at the time it was taken out from the herz [the secure place] has a value equal to 4.5 chickpea coined gold or a quarter of a dinar. &nbsp;This viewpoint, although strengthene...

متن کامل

Evaluation of the q-matrix Method in Understanding Student Logic Proofs

In building intelligent tutoring systems, it is critical to be able to understand and diagnose student responses in interactive problem solving. We present a novel application of the q-matrix method, an educational data mining technique, to the problem of analyzing formal proofs. Our results indicate that automated analysis of formal proof data can provide an intelligent tutoring system with us...

متن کامل

تأملی نو در نظریه عینیت ذات و صفات الهی

Critical investigation of Identity of essence and attributes of GodThe quality of the relationship between essence and attributes of God is one of the most important issues among islamic thinkers. One of the most important theories in this field is the theory of Identity of essence and attributes of God that divided in turn into two branches,I mean, external identification and conceptual ...

متن کامل

Quantum Relational Hoare Logic

We present a logic for reasoning about pairs of interactive quantum programs – quantum relational Hoare logic (qRHL). This logic follows the spirit of probabilistic relational Hoare logic (Barthe et al. 2009) and allows us to formulate how the outputs of two quantum programs relate given the relationship of their inputs. Probabilistic RHL was used extensively for computer-verified security proo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993