Computing and the cultures of proving.
نویسنده
چکیده
This article discusses the relationship between mathematical proof and the digital computer from the viewpoint of the 'sociology of proof': that is, an understanding of what kinds of procedures and arguments count for whom, under what circumstances, as proofs. After describing briefly the first instance of litigation focusing on the nature of mathematical proof, the article describes a variety of 'cultures of proving' that are distinguished by whether the proofs they conduct and prefer are (i) mechanized or non-mechanized and (ii) formal proofs or 'rigorous arguments'. Although these 'cultures' mostly coexist peacefully, the occasional attacks from within one on another are of interest in respect to what they reveal about presuppositions and preferences. A variety of factors underpinning the diverse cultures of proving are discussed.
منابع مشابه
The Origin of Mysticism and Sufism in Hadith
Islamic mysticism or Sufism is one of the most outstanding appearances of Islamic culture that has had a fundamental and undeniable role in the history of Islam. A careful study of the history and development of the movements of Islamic culture shows that this movement, like most other ones, has been originated from, developed, and cultivated in an Islamic environment, though it has undoubtedly...
متن کاملA Comparative Study on Presumption of Marriage Rule and Genetic Testing for Proving Parentage Under Iranian Law
Family is the most important social group, and the survival of society depends on the survival of the family and its survival depends on legitimate parentage and legal ties. Therefore, the issue of proving the parentage is one of the most sensitive issues in the Islamic law and the legislator has tried to preserve it by enacting laws. From the beginning of Islam until now, in Imami jurisprudenc...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملThe Logical Part of Essentiality and Unity of Existence in Proving the Unity of Necessary Being
This article has no abstract.
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Philosophical transactions. Series A, Mathematical, physical, and engineering sciences
دوره 363 1835 شماره
صفحات -
تاریخ انتشار 2005