This Page Intentionally Left Blank [50] Develop Computer Programs for Simplifying Sums That Involve Binomial CoeCients

Total Page:16

File Type:pdf, Size:1020Kb

This Page Intentionally Left Blank [50] Develop Computer Programs for Simplifying Sums That Involve Binomial Coe�Cients This page intentionally left blank [50] Develop computer programs for simplifying sums that involve binomial coecients. Exercise 1.2.6.63 in The Art of Computer Programming, Volume 1: Fundamental Algorithms by Donald E. Knuth, Addison Wesley, Reading, Massachusetts, 1968. A=B Marko Petkovsek Herbert S. Wilf University of Ljubljana University of Pennsylvania Ljubljana, Slovenia Philadelphia, PA, USA Doron Zeilberger Temple University Philadelphia, PA, USA April 27, 1997 ii Contents Foreword vii A Quick Start ... ix IBackground 1 1 Proof Machines 3 1.1Evolutionoftheprovinceofhumanthought.............. 3 1.2Canonicalandnormalforms....................... 7 1.3Polynomialidentities........................... 8 1.4Proofsbyexample?............................ 9 1.5Trigonometricidentities......................... 11 1.6Fibonacciidentities............................ 12 1.7Symmetricfunctionidentities...................... 12 1.8Ellipticfunctionidentities........................ 13 2 Tightening the Target 17 2.1Introduction................................ 17 2.2Identities.................................. 21 2.3Humanandcomputerproofs;anexample................ 23 2.4AMathematicasession.......................... 27 2.5AMaplesession.............................. 29 2.6Whereweareandwhathappensnext.................. 30 2.7Exercises.................................. 31 3 The Hypergeometric Database 33 3.1Introduction................................ 33 3.2Hypergeometricseries........................... 34 3.3Howtoidentifyaseriesashypergeometric............... 35 3.4Softwarethatidentieshypergeometricseries.............. 39 iv CONTENTS 3.5Someentriesinthehypergeometricdatabase.............. 42 3.6Usingthedatabase............................ 44 3.7Istherereallyahypergeometricdatabase?............... 48 3.8Exercises.................................. 50 II The Five Basic Algorithms 53 4 Sister Celine’s Method 55 4.1Introduction................................ 55 4.2SisterMaryCelineFasenmyer...................... 57 4.3SisterCeline’sgeneralalgorithm..................... 58 4.4 The Fundamental Theorem . 64 4.5 Multivariate and “q”generalizations.................. 70 4.6Exercises.................................. 72 5 Gosper’s Algorithm 73 5.1Introduction................................ 73 5.2Hypergeometricstorationalstopolynomials.............. 75 5.3Thefullalgorithm:Step2........................ 79 5.4Thefullalgorithm:Step3........................ 84 5.5Moreexamples.............................. 86 5.6Similarityamonghypergeometricterms................. 91 5.7Exercises.................................. 95 6 Zeilberger’s Algorithm 101 6.1Introduction................................ 101 6.2Existenceofthetelescopedrecurrence.................. 104 6.3Howthealgorithmworks......................... 106 6.4Examples................................. 109 6.5Useoftheprograms........................... 112 6.6Exercises.................................. 118 7 The WZ Phenomenon 121 7.1Introduction................................ 121 7.2WZproofsofthehypergeometricdatabase............... 126 7.3SpinosfromtheWZmethod...................... 127 7.4Discoveringnewhypergeometricidentities............... 135 7.5SoftwarefortheWZmethod....................... 137 7.6Exercises.................................. 140 CONTENTS v 8 Algorithm Hyper 141 8.1Introduction................................ 141 8.2Theringofsequences........................... 144 8.3Polynomialsolutions........................... 148 8.4Hypergeometricsolutions......................... 151 8.5AMathematicasession.......................... 156 8.6Findingallhypergeometricsolutions.................. 157 8.7Findingallclosedformsolutions..................... 158 8.8 Some famous sequences that do not have closed form . 159 8.9Inhomogeneousrecurrences........................ 161 8.10Factorizationofoperators........................ 162 8.11Exercises.................................. 164 III Epilogue 169 9 An Operator Algebra Viewpoint 171 9.1Earlyhistory............................... 171 9.2Lineardierenceoperators........................ 172 9.3Eliminationintwovariables....................... 177 9.4Modiedeliminationproblem...................... 180 9.5Discreteholonomicfunctions....................... 184 9.6Eliminationintheringofoperators................... 185 9.7Beyondtheholonomicparadigm..................... 185 9.8Bi-basicequations............................. 187 9.9Creativeanti-symmetrizing........................ 188 9.10Wavelets.................................. 190 9.11Abel-typeidentities............................ 191 9.12Anothersemi-holonomicidentity.................... 193 9.13Theart.................................. 193 9.14Exercises.................................. 195 A The WWW sites and the software 197 A.1 The Maple packages EKHAD and qEKHAD ................. 198 A.2Mathematicaprograms.......................... 199 Bibliography 201 Index 208 vi CONTENTS Foreword Science is what we understand well enough to explain to a computer. Art is everything else we do. During the past several years an important part of mathematics has been transformed from an Art to a Science: No longer do we need to get a brilliant insight in order to evaluate sums of binomial coecients, and many similar formulas that arise frequently in practice; we can now follow a mechanical procedure and discover the answers quite systematically. I fell in love with these procedures as soon as I learned them, because they worked for me immediately. Not only did they dispose of sums that I had wrestled with long and hard in the past, they also knocked o two new problems that I was working on at the time I rst tried them. The success rate was astonishing. In fact, like a child with a new toy, I can’t resist mentioning how I used the new P 2n2k 2k methods just yesterday. Long ago I had run into the sum k nk k ,whichtakes the values 1, 4, 16, 64 for n =0,1,2,3soitmustbe4n. Eventually I learned a tricky way to prove that it is, indeed, 4n; but if I had known the methods in this book I could have proved the identity immediately. Yesterday I was working on a harder problem P 2n2k 2 2k 2 whose answer was Sn = k nk k . I didn’t recognize any pattern in the rst values 1, 8, 88, 1088, so I computed away with the Gosper-Zeilberger algorithm. In 3 1 2 3 afewminutesIlearnedthatnSn =16(n 2)(2n 2n +1)Sn 1 256(n 1) Sn 2. Notice that the algorithm doesn’t just verify a conjectured identity “A = B”. It also answers the question “What is A?”, when we haven’t been able to formulate a decent conjecture. The answer in the example just considered is a nonobvious recurrence from which it is possible to rule out any simple form for Sn. I’m especially pleased to see the appearance of this book, because its authors have not only played key roles in the new developments, they are also master expositors of mathematics. It is always a treat to read their publications, especially when they are discussing really important stu. Science advances whenever an Art becomes a Science. And the state of the Art ad- vances too, because people always leap into new territory once they have understood more about the old. This book will help you reach new frontiers. Donald E. Knuth Stanford University 20 May 1995 viii CONTENTS A Quick Start ... You’ve been up all night working on your new theory, you found the answer, and it’s in the form of a sum that involves factorials, binomial coecients, and so on, such as ! ! Xn x k +1 x 2k k f(n)= ( 1) . k=0 k n k You know that many sums like this one have simple evaluations and you would like to know, quite denitively, if this one does, or does not. Here’s what to do. 1. Let F (n, k)beyoursummand, i.e., the function1 that is being summed. Your rst task is to nd the recurrence that F satises. 2. If you are using Mathematica, go to step 4 below. If you are using Maple, then get the package EKHAD either from the included diskette or from the World- WideWeb site given on page 197. Read in EKHAD,andtype zeil(F(n, k), k, n, N); in which your summand is typed, as an expression, in place of “F(n,k)”. So in the example above you might type f:=(n,k)->(-1)^k*binomial(x-k+1,k)*binomial(x-2*k,n-k); zeil(f(n,k),k,n,N); Then zeil will print out the recurrence that your summand satises (it does satisfy one; see theorems 4.4.1 on page 65 and 6.2.1 on page 105). The output recurrence will look like eq. (6.1.3) on page 102. In this example zeil prints out the recurrence ((n +2)(nx)(n+2)(nx)N2)F(n, k)=G(n, k +1)G(n, k), 1But what is the little icon in the right margin? See page 9. x A Quick Start ... where N is the forward shift operator and G is a certain function that we will ignore for the moment. In customary mathematical notation, zeil will have found that (n +2)(nx)F(n, k) (n +2)(nx)F(n+2,k)=G(n, k +1)G(n, k). 3. The next step is to sum the recurrence that you just found over all the values of k that interest you. In this case you can sum over all integers k.Theright side telescopes to zero, and you end up with the recurrence that your unknown sum f(n)satises,intheform f(n)f(n+2)=0. Since f(0) = 1 and f(1) = 0, you have found that f(n)=1,ifnis even, and f(n)=0,ifnis odd, and you’re all nished. If, on the other hand, you get a recurrence whose solution is not obvious to you because it is of order higher than the rst and it does not have constant coecients, for instance, then go to step 5 below. 4. If you are using Mathematica, then get the program Zb (see page 114 below) in the package paule-schorn from the WorldWideWeb site given
Recommended publications
  • A Dynamic Epistemic Logic Analysis of Equality Negation and Other Epistemic Covering Tasks$,$$
    A Dynamic Epistemic Logic Analysis of Equality Negation and other Epistemic Covering TasksI,II Hans van Ditmarscha, Eric´ Goubaultb, Marijana Lazi´cc, J´er´emy Ledentd, Sergio Rajsbaume aUniversit´ede Lorraine, CNRS, LORIA, F-54000 Nancy, France bLIX, CNRS, Ecole´ Polytechnique, Institute Polytechnique de Paris, France cTechnical University of Munich, Germany dDepartment of Computer and Information Sciences, University of Strathclyde, UK eInstituto de Matem´aticas, UNAM, Mexico Abstract In this paper we study the solvability of the equality negation task in a simple wait- free model where two processes communicate by reading and writing shared variables or exchanging messages. In this task, the two processes start with a private input value in the set f0; 1; 2g, and after communicating, each one must decide a binary output value, so that the outputs of the processes are the same if and only if the input values of the processes are different. This task is already known to be unsolvable; our goal here is to prove this result using the dynamic epistemic logic (DEL) approach introduced by Goubault, Ledent and Rajsbaum in GandALF 2018. We show that in fact, there is no epistemic logic formula that explains why the task is unsolvable. Furthermore, we observe that this task is a particular case of an epistemic covering task. We thus establish a connection between the existing DEL framework and the theory of covering spaces in topology, and prove that the same result holds for any epistemic covering task: no epistemic formula explains the unsolvability. Keywords: Dynamic Epistemic Logic, distributed computing, equality negation, combinatorial topology, covering spaces.
    [Show full text]
  • Arxiv:1803.01386V4 [Math.HO] 25 Jun 2021
    2009 SEKI http://wirth.bplaced.net/seki.html ISSN 1860-5931 arXiv:1803.01386v4 [math.HO] 25 Jun 2021 A Most Interesting Draft for Hilbert and Bernays’ “Grundlagen der Mathematik” that never found its way into any publi- Working-Paper cation, and 2 CVof Gisbert Hasenjaeger Claus-Peter Wirth Dept. of Computer Sci., Saarland Univ., 66123 Saarbrücken, Germany [email protected] SEKI Working-Paper SWP–2017–01 SEKI SEKI is published by the following institutions: German Research Center for Artificial Intelligence (DFKI GmbH), Germany • Robert Hooke Str.5, D–28359 Bremen • Trippstadter Str. 122, D–67663 Kaiserslautern • Campus D 3 2, D–66123 Saarbrücken Jacobs University Bremen, School of Engineering & Science, Campus Ring 1, D–28759 Bremen, Germany Universität des Saarlandes, FR 6.2 Informatik, Campus, D–66123 Saarbrücken, Germany SEKI Editor: Claus-Peter Wirth E-mail: [email protected] WWW: http://wirth.bplaced.net Please send surface mail exclusively to: DFKI Bremen GmbH Safe and Secure Cognitive Systems Cartesium Enrique Schmidt Str. 5 D–28359 Bremen Germany This SEKI Working-Paper was internally reviewed by: Wilfried Sieg, Carnegie Mellon Univ., Dept. of Philosophy Baker Hall 161, 5000 Forbes Avenue Pittsburgh, PA 15213 E-mail: [email protected] WWW: https://www.cmu.edu/dietrich/philosophy/people/faculty/sieg.html A Most Interesting Draft for Hilbert and Bernays’ “Grundlagen der Mathematik” that never found its way into any publication, and two CV of Gisbert Hasenjaeger Claus-Peter Wirth Dept. of Computer Sci., Saarland Univ., 66123 Saarbrücken, Germany [email protected] First Published: March 4, 2018 Thoroughly rev. & largely extd. (title, §§ 2, 3, and 4, CV, Bibliography, &c.): Jan.
    [Show full text]
  • Chapter 10 PROOFS of IMPOSSIBILITY and POSSIBILITY PROOFS
    Chapter 10 PROOFS OF IMPOSSIBILITY AND POSSIBILITY PROOFS There are proofs of impossibility and possibility proofs, a situation that sometimes produced a bit of confusion in the debates on hidden-variables theories and sometimes led to something worse than confusion. So, we have to clarify it. Proofs of Impossibility von Neumann Brief Beginning of the History In his famous book, providing an axiomatization of quantum mechanics, von Neumann [26] introduced in 1932 a proof of impossibility of hidden- variables theories, the famous “von Neumann’s proof.” This were a few years after the Solvay Congress of 1927 during which de Broglie’s pilot wave was defeated. Although de Broglie had already renegated his work, and rejoined the camp of orthodoxy, the publication of the proof certainly confirmed that he had lost time with his heretical detour. Furthermore, in the words of Pinch [154], “the proof was accepted and welcomed by the physics elite.” The continuation of the story shows that the acceptance was not based on a careful examination of the proof but rather on other elements such as a psychological pressure exerted by the very high reputation of its author or the unconscious desire to definitively eliminate an ill-timed and embarrassing issue. Afterward, for a long time, the rejection of hidden variables could be made just by invoking von Neumann (the man himself more than the proof). As stated by Belinfante [1], “the truth, however, happens to be that for decades nobody spoke up against von Neumann’s arguments, and that his conclusions were quoted by some as the gospel … the authority of von Neumann’s over-generalized claim for nearly two decades stifled any progress in the search for hidden variables theories.” Belinfante also [1] remarked that “the work of von Neumann (1932) was mainly concerned with the axiomatization of the mathematical methods “CH10” — 2013/10/11 — 10:28 — page 228 — #1 Hidden101113.PDF 238 10/16/2013 4:20:19 PM Proofs of Impossibility and Possibility Proofs 229 of quantum theory.
    [Show full text]
  • Fermat's Last Theorem
    Fermat's Last Theorem In number theory, Fermat's Last Theorem (sometimes called Fermat's conjecture, especially in older texts) Fermat's Last Theorem states that no three positive integers a, b, and c satisfy the equation an + bn = cn for any integer value of n greater than 2. The cases n = 1 and n = 2 have been known since antiquity to have an infinite number of solutions.[1] The proposition was first conjectured by Pierre de Fermat in 1637 in the margin of a copy of Arithmetica; Fermat added that he had a proof that was too large to fit in the margin. However, there were first doubts about it since the publication was done by his son without his consent, after Fermat's death.[2] After 358 years of effort by mathematicians, the first successful proof was released in 1994 by Andrew Wiles, and formally published in 1995; it was described as a "stunning advance" in the citation for Wiles's Abel Prize award in 2016.[3] It also proved much of the modularity theorem and opened up entire new approaches to numerous other problems and mathematically powerful modularity lifting techniques. The unsolved problem stimulated the development of algebraic number theory in the 19th century and the proof of the modularity theorem in the 20th century. It is among the most notable theorems in the history of mathematics and prior to its proof was in the Guinness Book of World Records as the "most difficult mathematical problem" in part because the theorem has the largest number of unsuccessful proofs.[4] Contents The 1670 edition of Diophantus's Arithmetica includes Fermat's Overview commentary, referred to as his "Last Pythagorean origins Theorem" (Observatio Domini Petri Subsequent developments and solution de Fermat), posthumously published Equivalent statements of the theorem by his son.
    [Show full text]
  • Quantum Bit Commitment and Unconditional Security
    Quantum bit commitment and unconditional security Horace P. Yuen∗† Department of Electrical and Computer Engineering Department of Physics and Astronomy Northwestern University Evanston, IL 60208-3118 Abstract It is generally believed that unconditionally secure quantum bit commitment is impossible, due to widespread acceptance of an impossibility proof that utilizes quantum entaglement cheating. In this paper, we delineate how the impossibiliy proof formulation misses various types of quantum bit commitment protocols based on two-way quantum communications. We point out some of the gaps in the impossibility proof reasoning, and present corresponding counterexamples. Four different types of bit commitment protocols are constructed with several new protocol techniques. A specific Type 4 protocol is described and proved unconditionally secure. Security analysis of a Type 1 protocol and a Type 2 protocol are also sketched. The security of Type 3 protocols is as yet open. A development of quantum statistical decision theory and quantum games is needed to provie a complete security analysis of many such protocols. arXiv:quant-ph/0207089v3 20 Aug 2002 ∗E-mail: [email protected] †Note: this paper analyzes in detail, for the first time, the various gaps in the QBC impossibility proof, many of which I indicated before but few of which seem to be understood. There is clearly a need to focus on these gaps, which is an issue logically distinct from whether any protocol can be proved unconditionally secure. One of the original three protocols I described in the QCM at Capri, July 2000, protocol Y3 that appeared as QBC1 in v2 of this paper, was pointed out to be insecure in the QCM at MIT, July 2002.
    [Show full text]
  • Or Many? Foundations of Mathematics in Today's Mathematical Practice
    ONE MATHEMATIC(S) OR MANY? FOUNDATIONS OF MATHEMATICS IN TODAY'S MATHEMATICAL PRACTICE ANDREI RODIN 1 Abstract. The received Hilbert-style axiomatic foundations of mathematics has been designed by Hilbert and his followers as a tool for meta-theoretical research. Foun- dations of mathematics of this type fail to satisfactory perform more basic and more practically-oriented functions of theoretical foundations such as verification of mathemat- ical constructions and proofs. Using alternative foundations of mathematics such as the Univalent Foundations is compatible with using the received set-theoretic foundations for meta-mathematical purposes provided the two foundations are mutually interpretable. Changes in foundations of mathematics do not, generally, disqualify mathematical the- ories based on older foundations but allow for reconstruction of these theories on new foundations. Mathematics is one but its foundations are many. 1. \Practical" Foundations of Mathematics and Foundations of Mathematics simpliciter Foundations of a theoretical discipline are traditionally conceived as a join between this discipline and its philosophy; accordingly, the Philosophy of Mathematics typically focuses on the foundations of mathematics (FOM) rather than on other areas of mathematical research. The Philosophy of Mathematical Practice attempts, among other things, to enlarge the scope of philosophical analysis of mathematics by paying more attention to past and present mathematical developments beyond FOM and, more specifically, beyond Date: August
    [Show full text]
  • Uncontrollability of Artificial Intelligence
    Uncontrollability of Artificial Intelligence Roman V. Yampolskiy Computer Science and Engineering, University of Louisville [email protected] Abstract means. However, it is a standard practice in computer sci- ence to first show that a problem doesn’t belong to a class Invention of artificial general intelligence is pre- of unsolvable problems [Turing, 1936; Davis, 2004] before dicted to cause a shift in the trajectory of human civ- investing resources into trying to solve it or deciding what ilization. In order to reap the benefits and avoid pit- approaches to try. Unfortunately, to the best of our falls of such powerful technology it is important to be knowledge no mathematical proof or even rigorous argu- able to control it. However, possibility of controlling mentation has been published demonstrating that the AI artificial general intelligence and its more advanced control problem may be solvable, even in principle, much version, superintelligence, has not been formally es- less in practice. tablished. In this paper we argue that advanced AI Yudkowsky considers the possibility that the control can’t be fully controlled. Consequences of uncontrol- problem is not solvable, but correctly insists that we should lability of AI are discussed with respect to future of study the problem in great detail before accepting such grave humanity and research on AI, and AI safety and se- limitation, he writes: “One common reaction I encounter is curity. for people to immediately declare that Friendly AI is an im- 1 possibility, because any sufficiently powerful AI will be 1 Introduction able to modify its own source code to break any constraints The unprecedented progress in Artificial Intelligence (AI) placed upon it.
    [Show full text]
  • A Brief History of Impossibility
    VOL. 81, NO. 1, FEBRUARY 2008 27 A Brief History of Impossibility JEFF SUZUKI Brooklyn College Brooklyn, NY jeff [email protected] Sooner or later every student of geometry learns of three “impossible” problems: 1. Trisecting the angle: Given an arbitrary angle, construct an angle exactly one-third as great. 2. Duplicating the cube: Given a cube of arbitrary volume, find a cube with exactly twice the volume. 3. Squaring the circle: Given an arbitrary circle, find a square with the same area. These problems originated around 430 BC at a time when Greek geometry was advanc- ing rapidly. We might add a fourth problem: inscribing a regular heptagon in a circle. Within two centuries, all these problems had been solved (see [3, Vol. I, p. 218–270] and [1] for some of these solutions). So if these problems were all solved, why are they said to be impossible? The “im- possibility” stems from a restriction, allegedly imposed by Plato (427–347 BC), that geometers use no instruments besides the compass and straightedge. This restriction requires further explanation. For that, we turn to Euclid (fl. 300 BC), who collected and systematized much of the plane geometry of the Greeks in his Elements. Euclid’s goal was to develop geometry in a deductive manner from as few basic assumptions as possible. The first three postulates in the Elements are (in modernized form): 1. Between any two points, there exists a unique straight line. 2. A straight line may be extended indefinitely. 3. Given any point and any length, a circle may be constructed centered at the point with radius equal to the given length.
    [Show full text]
  • In Search of the Sources of Incompleteness
    P. I. C. M. – 2018 Rio de Janeiro, Vol. 4 (4075–4092) IN SEARCH OF THE SOURCES OF INCOMPLETENESS J P Abstract Kurt Gödel said of the discovery of his famous incompleteness theorem that he sub- stituted “unprovable” for “false” in the paradoxical statement This sentence is false. Thereby he obtained something that states its own unprovability, so that if the state- ment is true, it should indeed be unprovable. The big methodical obstacle that Gödel solved so brilliantly was to code such a self-referential statement in terms of arithmetic. The shorthand notes on incompleteness that Gödel had meticulously kept are exam- ined for the first time, with a picture of the emergence of incompleteness different from the one the received story of its discovery suggests. 1. P . Kurt Gödel’s paper of 1931 about the incompleteness of mathematics, Über formal unentscheidbare Sätze der Principia Mathematica und ver- wandter Systeme I, belongs to the most iconic works of the first half of 20th century sci- ence, comparable to the ones of Einstein on relativity (1905), Heisenberg on quantum mechanics (1925), Kolmogorov on continuous-time random processes (1931), and Tur- ing on computability (1936). Gödel showed that the quest of representing the whole of mathematics as a closed, complete, and formal system is unachievable. It has been said repeatedly that Gödel’s discovery has had close to no practical effect on mathematics: the impossibility to decide some questions inside a formal system has not surfaced except in a few cases, such as the question of the convergence of what are known as Goodstein sequences.
    [Show full text]
  • The Euclid Abstract Machine
    The Euclid Abstract Machine JERZY MYCKA1?,JOSE´ FELIX´ COSTA2,FRANCISCO COELHO3 1 Institute of Mathematics, University of Maria Curie-Skłodowska Lublin, Poland § 2 Department of Mathematics, I.S.T., Universidade Tecnica´ de Lisboa and CMAF – Centro de Matematica´ e Aplicac¸oes˜ Fundamentais, Lisboa, Portugal || 3 Department of Mathematics, Universidade de Evora,´ Portugal # He took the golden Compasses, prepar’d In Gods Eternal store, to circumscribe This Universe, and all created things: One foot he center’d, and the other turn’d Round through the vast profunditie obscure, And said, thus farr extend, thus farr thy bounds, This be thy just Circumference, O World. Milton, Paradise Lost Most famous painting by William Blake § email: [email protected] || email: [email protected] # email: [email protected] ? Corresponding author 1 Abstract. Concrete non-computable functions always hide the halting function, not considering abstract Turing degrees. Even the construction of a function that grows faster than any recur- sive function — the Busy Beaver — a quite natural function, hides the halting set, that can easily be put in relation with the Busy Beaver. Is this concept of super-Turing computation re- lated only with the halting problem and its derivatives? We built an abstract machine based on the historic concept of compass and ruler constructions (a compass construction would suffice) which reveals the existence of non-computable functions not re- lated with the halting problem. These natural, and the same time, non-computable functions can help to understand the nature of the uncomputable and the purpose, the goal, and the meaning of computing beyond Turing.
    [Show full text]
  • IMPOSSIBILITY RESULTS: from GEOMETRY to ANALYSIS Davide Crippa
    IMPOSSIBILITY RESULTS: FROM GEOMETRY TO ANALYSIS Davide Crippa To cite this version: Davide Crippa. IMPOSSIBILITY RESULTS: FROM GEOMETRY TO ANALYSIS : A study in early modern conceptions of impossibility. History, Philosophy and Sociology of Sciences. Univeristé Paris Diderot Paris 7, 2014. English. tel-01098493 HAL Id: tel-01098493 https://hal.archives-ouvertes.fr/tel-01098493 Submitted on 25 Dec 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE PARIS DIDEROT (PARIS 7) SORBONNE PARIS CITE ECOLE DOCTORALE: Savoirs Scientifiques, Epistémologie, Histoire des Sciences et Didactique des disciplines DOCTORAT: Epistémologie et Histoire des Sciences DAVIDE CRIPPA IMPOSSIBILITY RESULTS: FROM GEOMETRY TO ANALYSIS A study in early modern conceptions of impossibility RESULTATS D’IMPOSSIBILITE: DE LA GEOMETRIE A L’ANALYSE Une étude de résultats classiques d’impossibilité Thèse dirigée par: Marco PANZA Soutenue le: 14 Octobre 2014 Jury: Andrew Arana Abel Lassalle Casanave Jesper Lützen (rapporteur) David Rabouin Vincenzo de Risi (rapporteur) Jean-Jacques Szczeciniarz Alla memoria di mio padre. A mia madre. Contents Preface 9 1 General introduction 14 1.1 The theme of my study . 14 1.2 A difficult context . 16 1.3 Types of impossibility arguments .
    [Show full text]
  • UC San Diego UC San Diego Electronic Theses and Dissertations
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Multimodal evidence Permalink https://escholarship.org/uc/item/2x54p2rw Author Stegenga, Jacob Publication Date 2011 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Multimodal Evidence A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Philosophy by Jacob Stegenga Committee in charge: Professor Nancy Cartwright, Chair Professor William Bechtel Professor Craig Callender Professor Naomi Oreskes Professor Robert Westman 2011 © Jacob Stegenga, 2011 All rights reserved. The Dissertation of Jacob Stegenga is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California, San Diego 2011 iii For Skye, who teaches that there is much about which to argue; For my Mother, whose arguments are sparing, and kind; For Bob, who argues well; For Alexa, who knows that one need not always argue. iv It is the profession of philosophers to question platitudes. A dangerous profession, since philosophers are more easily discredited than platitudes. David Lewis v TABLE OF CONTENTS Signature Page……………………………………………………………… iii Dedication………………………………………………………………….. iv Epigraph……………………………………………………………………. v Table of Contents…………………………………………………………... vi List of Tables………………………………………………………………. vii List of Terminology………………………………………………………... viii List of Abbreviations and Symbols…………………………………………
    [Show full text]