Computing and the cultures of proving.

نویسنده

  • Donald MacKenzie
چکیده

This article discusses the relationship between mathematical proof and the digital computer from the viewpoint of the 'sociology of proof': that is, an understanding of what kinds of procedures and arguments count for whom, under what circumstances, as proofs. After describing briefly the first instance of litigation focusing on the nature of mathematical proof, the article describes a variety of 'cultures of proving' that are distinguished by whether the proofs they conduct and prefer are (i) mechanized or non-mechanized and (ii) formal proofs or 'rigorous arguments'. Although these 'cultures' mostly coexist peacefully, the occasional attacks from within one on another are of interest in respect to what they reveal about presuppositions and preferences. A variety of factors underpinning the diverse cultures of proving are discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Origin of Mysticism and Sufism in Hadith

Islamic mysticism or Sufism is one of the most outstanding appearances of Islamic culture that has had a fundamental and undeniable role in the history of Islam. A careful study of the history and development of the movements of Islamic culture shows that this movement, like most other ones, has been originated from, developed, and cultivated in an Islamic environment, though it has undoubtedly...

متن کامل

A Comparative Study on Presumption of Marriage Rule and Genetic Testing for Proving Parentage Under Iranian Law

Family is the most important social group, and the survival of society depends on the survival of the family and its survival depends on legitimate parentage and legal ties. Therefore, the issue of proving the parentage is one of the most sensitive issues in the Islamic law and the legislator has tried to preserve it by enacting laws. From the beginning of Islam until now, in Imami jurisprudenc...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Philosophical transactions. Series A, Mathematical, physical, and engineering sciences

دوره 363 1835  شماره 

صفحات  -

تاریخ انتشار 2005