Results for 'weakly computably traceable'

1000+ found
Order:
  1.  44
    Demuth randomness and computational complexity.Antonín Kučera & André Nies - 2011 - Annals of Pure and Applied Logic 162 (7):504-513.
    Demuth tests generalize Martin-Löf tests in that one can exchange the m-th component a computably bounded number of times. A set fails a Demuth test if Z is in infinitely many final versions of the Gm. If we only allow Demuth tests such that GmGm+1 for each m, we have weak Demuth randomness.We show that a weakly Demuth random set can be high and , yet not superhigh. Next, any c.e. set Turing below a Demuth random set is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  35
    Weak computability and representation of reals.Xizhong Zheng & Robert Rettinger - 2004 - Mathematical Logic Quarterly 50 (4-5):431-442.
    The computability of reals was introduced by Alan Turing [20] by means of decimal representations. But the equivalent notion can also be introduced accordingly if the binary expansion, Dedekind cut or Cauchy sequence representations are considered instead. In other words, the computability of reals is independent of their representations. However, as it is shown by Specker [19] and Ko [9], the primitive recursiveness and polynomial time computability of the reals do depend on the representation. In this paper, we explore how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  9
    Lowness for isomorphism, countable ideals, and computable traceability.Johanna N. Y. Franklin & Reed Solomon - 2020 - Mathematical Logic Quarterly 66 (1):104-114.
    We show that every countable ideal of degrees that are low for isomorphism is contained in a principal ideal of degrees that are low for isomorphism by adapting an exact pair construction. We further show that within the hyperimmune free degrees, lowness for isomorphism is entirely independent of computable traceability.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  19
    Intrinsic smallness.Justin Miller - 2021 - Journal of Symbolic Logic 86 (2):558-576.
    Recent work in computability theory has focused on various notions of asymptotic computability, which capture the idea of a set being “almost computable.” One potentially upsetting result is that all four notions of asymptotic computability admit “almost computable” sets in every Turing degree via coding tricks, contradicting the notion that “almost computable” sets should be computationally close to the computable sets. In response, Astor introduced the notion of intrinsic density: a set has defined intrinsic density if its image under any (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  28
    Weihrauch degrees, omniscience principles and weak computability.Vasco Brattka & Guido Gherardi - 2011 - Journal of Symbolic Logic 76 (1):143 - 176.
    In this paper we study a reducibility that has been introduced by Klaus Weihrauch or, more precisely, a natural extension for multi-valued functions on represented spaces. We call the corresponding equivalence classes Weihrauch degrees and we show that the corresponding partial order induces a lower semi-lattice. It turns out that parallelization is a closure operator for this semi-lattice and that the parallelized Weihrauch degrees even form a lattice into which the Medvedev lattice and the Turing degrees can be embedded. The (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  6.  27
    Lowness for genericity.Liang Yu - 2006 - Archive for Mathematical Logic 45 (2):233-238.
    We study lowness for genericity. We show that there exists no Turing degree which is low for 1-genericity and all of computably traceable degrees are low for weak 1-genericity.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  7.  63
    Computing Strong and Weak Permissions in Defeasible Logic.Guido Governatori, Francesco Olivieri, Antonino Rotolo & Simone Scannapieco - 2013 - Journal of Philosophical Logic 42 (6):799-829.
    In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  8.  14
    Weakly precomplete computably enumerable equivalence relations.Serikzhan Badaev & Andrea Sorbi - 2016 - Mathematical Logic Quarterly 62 (1-2):111-127.
    Using computable reducibility ⩽ on equivalence relations, we investigate weakly precomplete ceers (a “ceer” is a computably enumerable equivalence relation on the natural numbers), and we compare their class with the more restricted class of precomplete ceers. We show that there are infinitely many isomorphism types of universal (in fact uniformly finitely precomplete) weakly precomplete ceers, that are not precomplete; and there are infinitely many isomorphism types of non‐universal weakly precomplete ceers. Whereas the Visser space of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Weak emergence and computer simulation.Mark Bedau - 2011 - In Paul Humphreys & Cyrille Imbert (eds.), Models, Simulations, and Representations. Routledge.
     
    Export citation  
     
    Bookmark   8 citations  
  10.  7
    Minimal weak truth table degrees and computably enumerable Turing degrees.R. G. Downey - 2020 - Providence, RI: American Mathematical Society. Edited by Keng Meng Ng & Reed Solomon.
    Informal construction -- Formal construction -- Limiting results.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  11
    Computable Scott sentences and the weak Whitehead problem for finitely presented groups.Gianluca Paolini - 2024 - Annals of Pure and Applied Logic 175 (7):103441.
  12. Weak Presentations of Computable Fields.Carl G. Jockusch & Alexandra Shlapentokh - 1995 - Journal of Symbolic Logic 60 (1):199 - 208.
    It is shown that for any computable field K and any r.e. degree a there is an r.e. set A of degree a and a field F ≅ K with underlying set A such that the field operations of F (including subtraction and division) are extendible to (total) recursive functions. Further, it is shown that if a and b are r.e. degrees with b ≤ a, there is a 1-1 recursive function $f: \mathbb{Q} \rightarrow \omega$ such that f(Q) ∈ a, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  26
    On computational complexity in weakly admissible structures.Viggo Stoltenberg-Hansen - 1980 - Journal of Symbolic Logic 45 (2):353-358.
  14.  20
    Interpreting N in the computably enumerable weak truth table degrees.André Nies - 2001 - Annals of Pure and Applied Logic 107 (1-3):35-48.
    We give a first-order coding without parameters of a copy of in the computably enumerable weak truth table degrees. As a tool, we develop a theory of parameter definable subsets.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  13
    Monotonically Computable Real Numbers.Robert Rettinger, Xizhong Zheng, Romain Gengler & Burchard von Braunmühl - 2002 - Mathematical Logic Quarterly 48 (3):459-479.
    Area number x is called k-monotonically computable , for constant k > 0, if there is a computable sequence n ∈ ℕ of rational numbers which converges to x such that the convergence is k-monotonic in the sense that k · |x — xn| ≥ |x — xm| for any m > n and x is monotonically computable if it is k-mc for some k > 0. x is weakly computable if there is a computable sequence s ∈ ℕ (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  16.  45
    Delineating classes of computational complexity via second order theories with weak set existence principles. I.Aleksandar Ignjatović - 1995 - Journal of Symbolic Logic 60 (1):103-121.
    Aleksandar Ignjatović. Delineating Classes of Computational Complexity via Second Order Theories with Weak Set Existence Principles (I).
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  58
    A random set which only computes strongly jump-traceable C.e. Sets.Noam Greenberg - 2011 - Journal of Symbolic Logic 76 (2):700 - 718.
    We prove that there is a ${\mathrm{\Delta }}_{2}^{0}$ , 1-random set Y such that every computably enumerable set which is computable from Y is strongly jump-traceable. We also show that for every order function h there is an ω-c.e. random set Y such that every computably enumerable set which is computable from Y is h-jump-traceable. This establishes a correspondence between rates of jump-traceability and computability from ω-c.e. random sets.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  44
    A strong law of computationally weak subsets.Bjørn Kjos-Hanssen - 2011 - Journal of Mathematical Logic 11 (1):1-10.
    We show that in the setting of fair-coin measure on the power set of the natural numbers, each sufficiently random set has an infinite subset that computes no random set. That is, there is an almost sure event [Formula: see text] such that if [Formula: see text] then X has an infinite subset Y such that no element of [Formula: see text] is Turing computable from Y.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  23
    Traces, traceability, and lattices of traces under the set theoretic inclusion.Gunther Mainhardt - 2013 - Archive for Mathematical Logic 52 (7-8):847-869.
    Let a trace be a computably enumerable set of natural numbers such that V[m]={n:〈n,m〉∈V}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${V^{[m]} = \{n : \langle n, m\rangle \in V \}}$$\end{document} is finite for all m, where 〈.,.〉\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\langle^{.},^{.}\rangle}$$\end{document} denotes an appropriate pairing function. After looking at some basic properties of traces like that there is no uniform enumeration of all traces, we prove varied results on traceability and variants thereof, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. Is weak emergence just in the mind?Mark A. Bedau - 2008 - Minds and Machines 18 (4):443-459.
    Weak emergence is the view that a system’s macro properties can be explained by its micro properties but only in an especially complicated way. This paper explains a version of weak emergence based on the notion of explanatory incompressibility and “crawling the causal web.” Then it examines three reasons why weak emergence might be thought to be just in the mind. The first reason is based on contrasting mere epistemological emergence with a form of ontological emergence that involves irreducible downward (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   45 citations  
  21.  20
    Logic and computation, Proceedings of a workshop held at Carnegie Mellon University, June 30–July 2, 1987, edited by Wilfried Sieg, Contemporary Mathematics, vol. 106, American Mathematical Society, Providence1990, xiv + 297 pp. - Douglas K. Brown. Notions of closed subsets of a complete separable metric space in weak subsystems of second order arithmetic. Pp. 39–50. - Kostas Hatzikiriakou and Stephen G. Simpson. WKL0 and orderings of countable abelian groups. Pp. 177–180. - Jeffry L. Hirst. Marriage theorems and reverse mathematics. Pp. 181–196. - Xiaokang Yu. Radon–Nikodym theorem is equivalent to arithmetical comprehension. Pp. 289–297. - Fernando Ferreira. Polynomial time computable arithmetic. Pp. 137–156. - Wilfried Buchholz and Wilfried Sieg. A note on polynomial time computable arithmetic. Pp. 51–55. - Samuel R. Buss. Axiomatizations and conservation results for fragments of bounded arithmetic. Pp. 57–84. - Gaisi Takeuti. Sharply bounded arithmetic and the function a – 1. Pp. 2. [REVIEW]Jörg Hudelmaier - 1996 - Journal of Symbolic Logic 61 (2):697-699.
  22.  42
    Weak Measurement and Weak Information.Boaz Tamir & Sergei Masis - 2012 - Foundations of Physics 42 (4):531-543.
    Weak measurement devices resemble band pass filters: they strengthen average values in the state space or equivalently filter out some ‘frequencies’ from the conjugate Fourier transformed vector space. We thereby adjust a principle of classical communication theory for the use in quantum computation. We discuss some of the computational benefits and limitations of such an approach, including complexity analysis, some simple examples and a realistic not-so-weak approach.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. Neural Computation and the Computational Theory of Cognition.Gualtiero Piccinini & Sonya Bahar - 2013 - Cognitive Science 37 (3):453-488.
    We begin by distinguishing computationalism from a number of other theses that are sometimes conflated with it. We also distinguish between several important kinds of computation: computation in a generic sense, digital computation, and analog computation. Then, we defend a weak version of computationalism—neural processes are computations in the generic sense. After that, we reject on empirical grounds the common assimilation of neural computation to either analog or digital computation, concluding that neural computation is sui generis. Analog computation requires continuous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   62 citations  
  24.  14
    Computably enumerable sets below random sets.André Nies - 2012 - Annals of Pure and Applied Logic 163 (11):1596-1610.
    We use Demuth randomness to study strong lowness properties of computably enumerable sets, and sometimes of Δ20 sets. A set A⊆N is called a base for Demuth randomness if some set Y Turing above A is Demuth random relative to A. We show that there is an incomputable, computably enumerable base for Demuth randomness, and that each base for Demuth randomness is strongly jump-traceable. We obtain new proofs that each computably enumerable set below all superlow Martin-Löf (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  14
    Weakly binary expansions of dense meet‐trees.Rosario Mennuni - 2022 - Mathematical Logic Quarterly 68 (1):32-47.
    We compute the domination monoid in the theory of dense meet‐trees. In order to show that this monoid is well‐defined, we prove weak binarity of and, more generally, of certain expansions of it by binary relations on sets of open cones, a special case being the theory from [7]. We then describe the domination monoids of such expansions in terms of those of the expanding relations.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  28
    Demystifying Weak Measurements.R. E. Kastner - 2017 - Foundations of Physics 47 (5):697-707.
    A large literature has grown up around the proposed use of ‘weak measurements’ to allegedly provide information about hidden ontological features of quantum systems. This paper attempts to clarify the fact that ‘weak measurements’ involve strong measurements on one member of an entangled system. The only thing ‘weak’ about such measurements is that the correlation established via the entanglement does not correspond to eigenstates of the ‘weakly measured observable’ for the remaining component system subject to the weak measurement. All (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  27. Quantifying weak emergence.Paul Hovda - 2008 - Minds and Machines 18 (4):461-473.
    The concept of weak emergence is a refinement or specification of the intuitive, general notion of emergence. Basically, a fact about a system is said to be weakly emergent if its holding both (i) is derivable from the fundamental laws of the system together with some set of basic (non-emergent) facts about it, and yet (ii) is only derivable in a particular manner, called “simulation.” This essay analyzes the application of this notion Conway’s Game of Life, and concludes that (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  28. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of data and this helps (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  94
    Weak and strong theories of truth.Michael Sheard - 2001 - Studia Logica 68 (1):89-101.
    A subtheory of the theory of self-referential truth known as FS is shown to be weak as a theory of truth but equivalent to full FS in its proof-theoretic strength.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  30.  44
    Weak theories of nonstandard arithmetic and analysis.Jeremy Avigad - manuscript
    A general method of interpreting weak higher-type theories of nonstandard arithmetic in their standard counterparts is presented. In particular, this provides natural nonstandard conservative extensions of primitive recursive arithmetic, elementary recursive arithmetic, and polynomial-time computable arithmetic. A means of formalizing basic real analysis in such theories is sketched.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31. Groundwork for weak analysis.António M. Fernandes & Fernando Ferreira - 2002 - Journal of Symbolic Logic 67 (2):557-578.
    This paper develops the very basic notions of analysis in a weak second-order theory of arithmetic BTFA whose provably total functions are the polynomial time computable functions. We formalize within BTFA the real number system and the notion of a continuous real function of a real variable. The theory BTFA is able to prove the intermediate value theorem, wherefore it follows that the system of real numbers is a real closed ordered field. In the last section of the paper, we (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  32.  39
    The computable Lipschitz degrees of computably enumerable sets are not dense.Adam R. Day - 2010 - Annals of Pure and Applied Logic 161 (12):1588-1602.
    The computable Lipschitz reducibility was introduced by Downey, Hirschfeldt and LaForte under the name of strong weak truth-table reducibility [6]). This reducibility measures both the relative randomness and the relative computational power of real numbers. This paper proves that the computable Lipschitz degrees of computably enumerable sets are not dense. An immediate corollary is that the Solovay degrees of strongly c.e. reals are not dense. There are similarities to Barmpalias and Lewis’ proof that the identity bounded Turing degrees of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33. On Weak Lewis Distributive Lattices.Ismael Calomino, Sergio A. Celani & Hernán J. San Martín - forthcoming - Studia Logica:1-41.
    In this paper we study the variety \(\textsf{WL}\) of bounded distributive lattices endowed with an implication, called weak Lewis distributive lattices. This variety corresponds to the algebraic semantics of the \(\{\vee,\wedge,\Rightarrow,\bot,\top \}\) -fragment of the arithmetical base preservativity logic \(\mathsf {iP^{-}}\). The variety \(\textsf{WL}\) properly contains the variety of bounded distributive lattices with strict implication, also known as weak Heyting algebras. We introduce the notion of WL-frame and we prove a representation theorem for WL-lattices by means of WL-frames. We extended (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  7
    A weakly 2-generic which Bounds a minimal degree.Rodney G. Downey & Satyadev Nandakumar - 2019 - Journal of Symbolic Logic 84 (4):1326-1347.
    Jockusch showed that 2-generic degrees are downward dense below a 2-generic degree. That is, if a is 2-generic, and $0 < {\bf{b}} < {\bf{a}}$, then there is a 2-generic g with $0 < {\bf{g}} < {\bf{b}}.$ In the case of 1-generic degrees Kumabe, and independently Chong and Downey, constructed a minimal degree computable from a 1-generic degree. We explore the tightness of these results.We solve a question of Barmpalias and Lewis-Pye by constructing a minimal degree computable from a weakly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  17
    Characterizing lowness for Demuth randomness.Laurent Bienvenu, Rod Downey, Noam Greenberg, André Nies & Dan Turetsky - 2014 - Journal of Symbolic Logic 79 (2):526-560.
    We show the existence of noncomputable oracles which are low for Demuth randomness, answering a question in [15]. We fully characterize lowness for Demuth randomness using an appropriate notion of traceability. Central to this characterization is a partial relativization of Demuth randomness, which may be more natural than the fully relativized version. We also show that an oracle is low for weak Demuth randomness if and only if it is computable.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Computational and conceptual emergence.Paul Humphreys - 2008 - Philosophy of Science 75 (5):584-594.
    A twofold taxonomy for emergence is presented into which a variety of contemporary accounts of emergence fit. The first taxonomy consists of inferential, conceptual, and ontological emergence; the second of diachronic and synchronic emergence. The adequacy of weak emergence, a computational form of inferential emergence, is then examined and its relationship to conceptual emergence and ontological emergence is detailed. †To contact the author, please write to: Corcoran Department of Philosophy, 120 Cocke Hall, University of Virginia, Charlottesville, VA 22904‐4780; e‐mail: [email protected].
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  37.  41
    Weak relevant justification logics.Shawn Standefer - 2023 - Journal of Logic and Computation 33 (7):1665–1683.
    This paper will develop ideas from [44]. We will generalize their work in two directions. First, we provide axioms for justification logics over the base logic B and show that the logic permits a proof of the internalization theorem. Second, we provide alternative frames that more closely resemble the standard versions of the ternary relational frames, as well as a more general approach to the completeness proof. We prove that soundness and completeness hold for justification logics over a wide variety (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  10
    Effective weak and vague convergence of measures on the real line.Diego A. Rojas - 2023 - Archive for Mathematical Logic 63 (1):225-238.
    We expand our effective framework for weak convergence of measures on the real line by showing that effective convergence in the Prokhorov metric is equivalent to effective weak convergence. In addition, we establish a framework for the study of the effective theory of vague convergence of measures. We introduce a uniform notion and a non-uniform notion of vague convergence, and we show that both these notions are equivalent. However, limits under effective vague convergence may not be computable even when they (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  57
    Weakly associative relation algebras with polyadic composition operations.Vera Stebletsova - 2000 - Studia Logica 66 (2):297-323.
    In this paper we introduced various classes of weakly associative relation algebras with polyadic composition operations. Among them is the class RWA of representable weakly associative relation algebras with polyadic composition operations. Algebras of this class are relativized representable relation algebras augmented with an infinite set of operations of increasing arity which are generalizations of the binary relative composition. We show that RWA is a canonical variety whose equational theory is decidable.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  33
    A Computational Model of Pragma-dialectics as a Tool for its Analysis and Evaluation.Alejandro Secades - 2015 - Informal Logic 35 (3):342-377.
    The overall goal of this paper is to show that computational modelling of argumentation theories is a useful tool to deepen them. Specifically, it provides a basic computational formalization of part of Pragma-dialectics’ model of a critical discussion, which serves as a basis for analyzing this influential theory of argumentation. Such analysis reveals some weaknesses and leaves some questions opened for Pragma-dialectics. Particularly, it shows that the model of a critical discussion is not independent of the model of reasoning/inference chosen, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Mathematics, Computation, Language and Poetry: The Novalis Paradox.Paul Redding - 2014 - In Dalia Nassar (ed.), The Relevance of Romanticism: Essays on German Romantic Philosophy. pp. 221-238.
    Recent scholarship has helped to demythologise the life and work of Georg Philipp Friedrich von Hardenberg who, as the poet “Novalis”, had come to instantiate the nineteenth-century’s stereotype of the romantic poet. Among Hardenberg’s interests that seem to sit uneasily with this literary persona were his interests in science and mathematics, and especially in the idea, traceable back to Leibniz, of a mathematically based computational approach to language. Hardenberg’s approach to language, and his attempts to bring mathematics to bear (...)
     
    Export citation  
     
    Bookmark  
  42.  41
    Weak Cardinality Theorems.Till Tantau - 2005 - Journal of Symbolic Logic 70 (3):861 - 878.
    Kummer's Cardinality Theorem states that a language A must be recursive if a Turing machine can exclude for any n words ω1...., ωn one of the n + 1 possibilities for the cardinality of {ω1...., ωn} ∩ A. There was good reason to believe that this theorem is a peculiarity of recursion theory: neither the Cardinality Theorem nor weak forms of it hold for resource-bounded computational models like polynomial time. This belief may be flawed. In this paper it is shown (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  43. Weak Strong AI: An elaboration of the English Reply to the Chinese Room.Ronald L. Chrisley - unknown
    Searle (1980) constructed the Chinese Room (CR) to argue against what he called \Strong AI": the claim that a computer can understand by virtue of running a program of the right sort. Margaret Boden (1990), in giving the English Reply to the Chinese Room argument, has pointed out that there isunderstanding in the Chinese Room: the understanding required to recognize the symbols, the understanding of English required to read the rulebook, etc. I elaborate on and defend this response to Searle. (...)
     
    Export citation  
     
    Bookmark  
  44. Computation and intentionality: A recipe for epistemic impasse.Itay Shani - 2005 - Minds and Machines 15 (2):207-228.
    Searle’s celebrated Chinese room thought experiment was devised as an attempted refutation of the view that appropriately programmed digital computers literally are the possessors of genuine mental states. A standard reply to Searle, known as the “robot reply” (which, I argue, reflects the dominant approach to the problem of content in contemporary philosophy of mind), consists of the claim that the problem he raises can be solved by supplementing the computational device with some “appropriate” environmental hookups. I argue that not (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  18
    Computing strength of structures related to the field of real numbers.Gregory Igusa, Julia F. Knight & Noah David Schweber - 2017 - Journal of Symbolic Logic 82 (1):137-150.
    In [8], the third author defined a reducibility$\le _w^{\rm{*}}$that lets us compare the computing power of structures of any cardinality. In [6], the first two authors showed that the ordered field of reals${\cal R}$lies strictly above certain related structures. In the present paper, we show that$\left \equiv _w^{\rm{*}}{\cal R}$. More generally, for the weak-looking structure${\cal R}$ℚconsisting of the real numbers with just the ordering and constants naming the rationals, allo-minimal expansions of${\cal R}$ℚare equivalent to${\cal R}$. Using this, we show that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Modeling the interaction of computer errors by four-valued contaminating logics.Roberto Ciuni, Thomas Macaulay Ferguson & Damian Szmuc - 2019 - In Rosalie Iemhoff, Michael Moortgat & Ruy de Queiroz (eds.), Logic, Language, Information, and Computation. Berlín, Alemania: pp. 119-139.
    Logics based on weak Kleene algebra (WKA) and related structures have been recently proposed as a tool for reasoning about flaws in computer programs. The key element of this proposal is the presence, in WKA and related structures, of a non-classical truth-value that is “contaminating” in the sense that whenever the value is assigned to a formula ϕ, any complex formula in which ϕ appears is assigned that value as well. Under such interpretations, the contaminating states represent occurrences of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  30
    On Categorical Equivalence of Weak Monadic Residuated Distributive Lattices and Weak Monadic c-Differential Residuated Distributive Lattices.Jun Tao Wang, Yan Hong She, Peng Fei He & Na Na Ma - 2023 - Studia Logica 111 (3):361-390.
    The category \(\mathbb {DRDL}{'}\), whose objects are c-differential residuated distributive lattices satisfying the condition \(\textbf{CK}\), is the image of the category \(\mathbb {RDL}\), whose objects are residuated distributive lattices, under the categorical equivalence \(\textbf{K}\) that is constructed in Castiglioni et al. (Stud Log 90:93–124, 2008). In this paper, we introduce weak monadic residuated lattices and study some of their subvarieties. In particular, we use the functor \(\textbf{K}\) to relate the category \(\mathbb {WMRDL}\), whose objects are weak monadic residuated distributive lattices, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  31
    Generalized weak presentations.Alexandra Shlapentokh - 2002 - Journal of Symbolic Logic 67 (2):787-819.
    Let K be a computable field. Let F be a collection of recursive functions over K, possibly including field operations. We investigate the following question. Given an r.e. degree a, is there an injective map j: K $\longrightarrow \mathbb{N}$ such that j(K) is of degree a and all the functions in F are translated by restrictions of total recursive functions.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  49. Weak and Strong Constructivist Foundations.M. C. Bettoni - 2013 - Constructivist Foundations 9 (1):19-21.
    Open peer commentary on the article “Constructivism and Computation: Can Computer-Based Modeling Add to the Case for Constructivism?” by Manfred Füllsack. Upshot: Füllsack’s article offers many interesting ideas but falls short of elucidating the relationship between constructivism and computation. It could profit by taking into consideration stronger constructivist foundations such as the distinction between machine and organism, the relationship between reality and the observer, and Ceccato’s theory of attention.
     
    Export citation  
     
    Bookmark  
  50.  38
    Explaining moral weakness.Elizabeth Rapaport - 1973 - Philosophical Studies 24 (3):174-182.
    I will contend against Davidson that weak actions are susceptible to rational explanation and that the view that they are not is traceable to a misconception of the requirements for explaining conduct by citing the agent's reasons for acting.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000