Chapter 10 PROOFS of IMPOSSIBILITY and POSSIBILITY PROOFS

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 10 PROOFS of IMPOSSIBILITY and POSSIBILITY PROOFS Chapter 10 PROOFS OF IMPOSSIBILITY AND POSSIBILITY PROOFS There are proofs of impossibility and possibility proofs, a situation that sometimes produced a bit of confusion in the debates on hidden-variables theories and sometimes led to something worse than confusion. So, we have to clarify it. Proofs of Impossibility von Neumann Brief Beginning of the History In his famous book, providing an axiomatization of quantum mechanics, von Neumann [26] introduced in 1932 a proof of impossibility of hidden- variables theories, the famous “von Neumann’s proof.” This were a few years after the Solvay Congress of 1927 during which de Broglie’s pilot wave was defeated. Although de Broglie had already renegated his work, and rejoined the camp of orthodoxy, the publication of the proof certainly confirmed that he had lost time with his heretical detour. Furthermore, in the words of Pinch [154], “the proof was accepted and welcomed by the physics elite.” The continuation of the story shows that the acceptance was not based on a careful examination of the proof but rather on other elements such as a psychological pressure exerted by the very high reputation of its author or the unconscious desire to definitively eliminate an ill-timed and embarrassing issue. Afterward, for a long time, the rejection of hidden variables could be made just by invoking von Neumann (the man himself more than the proof). As stated by Belinfante [1], “the truth, however, happens to be that for decades nobody spoke up against von Neumann’s arguments, and that his conclusions were quoted by some as the gospel … the authority of von Neumann’s over-generalized claim for nearly two decades stifled any progress in the search for hidden variables theories.” Belinfante also [1] remarked that “the work of von Neumann (1932) was mainly concerned with the axiomatization of the mathematical methods “CH10” — 2013/10/11 — 10:28 — page 228 — #1 Hidden101113.PDF 238 10/16/2013 4:20:19 PM Proofs of Impossibility and Possibility Proofs 229 of quantum theory. His side remarks on hidden variables were merely an unfortunate step away from the main line of reasoning.” This was more than unfortunate, however; it was erroneous, and even deeply erroneous, “because of the obviousness of inapplicability of one of von Neumann’s axioms to any realistic hidden variables theory [1].” As far as I know, the first person to challenge the validity of von Neu- mann’s proof was the philosopher Grete Hermann in 1935 [117], three years after von Neumann’s book, followed nine years after, in 1944, by another philosopher, Hans Reichenbach [134], according to Pinch [154]. As noted by Bitbol [133], and can be checked in the original reference, recently republished with enlightening complementary discussions by Léna Soler, Hermann correctly identified the weakest point of von Neu- mann’s proof, namely, the misleading use of an additivity condition of average values (which are soon to be discussed), pointed out by Bell again in 1966 [188]. Furthermore, she charged von Neumann’s proof with the accusation of circularity. Likely because they were philosophers, Hermann and Reichenbach seemingly did not have much influence on the community of physicists. Very often, they are even forgotten or dismissed. For instance, Pipkin [156] could erroneously write that it was Bell, in 1966, “who first pointed out the axiom by which von Neumann’s formulation violated the elementary principles of any realistic hidden variables theory,” a statement strongly and strangely in agreement with Belinfante [1] when he claimed, five years before that “The first to publicly pinpoint the axiom by which von Neumann’s formulation violated the elementary principles of any realistic hidden variables theory was Bell (1966).” As far as I know, the first physicist to challenge von Neumann was Bohm, twenty years after the proof was proposed, in one of his 1952 papers [30]. The best rebuttal of the early Bohm has obviously been the fact that he produced a logically consistent hidden-variables theory. This was a constructivist rebuttal, explicitly showing that what was demon- strated as being impossible was in fact possible. It definitely established that something was wrong with von Neumann’s proof; but what exactly was wrong? This is something that was compulsory to establish. The for- mal answer to this issue by Bohm was rather poorly conceived, but he correctly identified the most important point, namely, that von Neumann implicitly restricted himself, in his proof, to an excessively narrow class of hidden-variables theories. It just so happened that the early Bohm’s pilot wave did not pertain to this class. Louis de Broglie then also manifested “CH10” — 2013/10/11 — 10:28 — page 229 — #2 Hidden101113.PDF 239 10/16/2013 4:20:19 PM 230 Hidden Worlds in Quantum Physics a reluctance against von Neumann’s proof, e.g., in [62, 64]. The fact that Bohm’s rebuttal was unsatisfactory, and required more clarification, was also pointed out by Bell [188], who commented, “The analysis of Bohm seems to lack clarity, or else accuracy ….” Bell’s Rebuttal of von Neumann Accepting the idea that von Neumann’s proof has been rebutted, PEDES- TRIANS (∼∼∼∼) are allowed to skip this subsubsection. Bell [188] was able to make clear in a fairly laconic way what was unclear in Bohm’s attack against von Neumann. In essence, his identifi- cation of the reason why von Neumann failed is in agreement with what Hermann had already understood, some thirty years before. It was, how- ever, the influence of Bell’s paper, about thirty-five years after the proof was announced to the world, a long Middle Age for hidden variables, that was the most powerful. The dragon was struck down.At that time there was a dragon still living and it had to be destroyed; this was not obvious to all scientists, as we can infer from the following quotation [188]: “The present paper … is addressed to those who do find the question interesting, and more particularly to those among them who believe that ‘the question concerning the existence of such hidden variables received an early and decisive answer in the form of von Neumann’s proof on the mathemati- cal impossibility of such variables in quantum theory’.” The influence of Bell’s paper is acknowledged by Bitbol [133] when he stated that the very sociological turnaround of the community of physicists regarding von Neu- mann’s theorem nevertheless only took place from 1966 on, the date of the publication of Bell’s paper … Bell’s attack pointed out a faulty additivity postulate used by von Neumann that, when applied to hidden-variables theories, was “one of the weakest points in the proof,” in the words of Jammer [24]. The essential assumption used by von Neumann, the one we called above the “additivity condition on average values,” from now on called the additivity postulate, is described in the following statement: “Any linear combination of any two Hermitian operators represents an observable, and the same linear com- bination of expectation values is the expectation value of the combination.” In the words of Mermin [197], this was “von Neumann’s silly assumption.” The sentence quoted above actually contains two statements. The first one says that any linear combination of any two Hermitian operators rep- resents an observable. This seems obvious, but it actually is not guaranteed “CH10” — 2013/10/11 — 10:28 — page 230 — #3 Hidden101113.PDF 240 10/16/2013 4:20:19 PM Proofs of Impossibility and Possibility Proofs 231 at all. Let us, however, forget this problem as irrelevant for our purpose and focuss on the second statement, the one we properly call the additivity postulate, saying that the same linear combination of expectation values is the expectation value of the combination. Let us consider two Hermitian operators A and B, and let us assume that the sum of the two Hermitian operators A and B is another Hermitian operator, defining an observable, which we denote by C. Let us remark that we have been here a bit more careful than von Neumann. We do not claim that C is an observable for any couple (A, B). We just consider a couple such that C is indeed an observable. We then have C = A + B (10.1) The additivity postulate tells us that C=A+B (10.2) where X is the expectation value of X. In quantum mechanics, the expec- tation value of X for a given wave function can be evaluated according to the following rule: ∗ X= Xdr (10.3) where ∗ is the complex conjugate of . Then, the additivity postu- late is seen to be always true in quantum mechanics, since C= ∗Cdr = ∗(A + B)dr ∗ ∗ = Adr + Bdr =A+B (10.4) In particular, it is true regardless of the value of the commutator [A, B]; that is, it does not depend on whether or not the operators A and B commute. As obvious as it seems, the additivity postulate is not trivial. This can be exemplified by noting that it does not necessarily apply to eigenvalues. To see this, let us consider a counterexample taken from Jammer [24]. Let us consider the spin component of an electron in the direction along “CH10” — 2013/10/11 — 10:28 — page 231 — #4 Hidden101113.PDF 241 10/16/2013 4:20:19 PM 232 Hidden Worlds in Quantum Physics the bisector line between the x axis and the y axis. This observable is represented by the operator 1 S45◦ = √ (σx + σy) (10.5) 2 The outcome of the measurement of S45◦ for the electron, a spin-1/2 particle, may be either h/¯ 2or−h/¯ 2; that√ is, the eigenvalues are ±1, in units of h/¯ 2.
Recommended publications
  • A Dynamic Epistemic Logic Analysis of Equality Negation and Other Epistemic Covering Tasks$,$$
    A Dynamic Epistemic Logic Analysis of Equality Negation and other Epistemic Covering TasksI,II Hans van Ditmarscha, Eric´ Goubaultb, Marijana Lazi´cc, J´er´emy Ledentd, Sergio Rajsbaume aUniversit´ede Lorraine, CNRS, LORIA, F-54000 Nancy, France bLIX, CNRS, Ecole´ Polytechnique, Institute Polytechnique de Paris, France cTechnical University of Munich, Germany dDepartment of Computer and Information Sciences, University of Strathclyde, UK eInstituto de Matem´aticas, UNAM, Mexico Abstract In this paper we study the solvability of the equality negation task in a simple wait- free model where two processes communicate by reading and writing shared variables or exchanging messages. In this task, the two processes start with a private input value in the set f0; 1; 2g, and after communicating, each one must decide a binary output value, so that the outputs of the processes are the same if and only if the input values of the processes are different. This task is already known to be unsolvable; our goal here is to prove this result using the dynamic epistemic logic (DEL) approach introduced by Goubault, Ledent and Rajsbaum in GandALF 2018. We show that in fact, there is no epistemic logic formula that explains why the task is unsolvable. Furthermore, we observe that this task is a particular case of an epistemic covering task. We thus establish a connection between the existing DEL framework and the theory of covering spaces in topology, and prove that the same result holds for any epistemic covering task: no epistemic formula explains the unsolvability. Keywords: Dynamic Epistemic Logic, distributed computing, equality negation, combinatorial topology, covering spaces.
    [Show full text]
  • This Page Intentionally Left Blank [50] Develop Computer Programs for Simplifying Sums That Involve Binomial CoeCients
    This page intentionally left blank [50] Develop computer programs for simplifying sums that involve binomial coecients. Exercise 1.2.6.63 in The Art of Computer Programming, Volume 1: Fundamental Algorithms by Donald E. Knuth, Addison Wesley, Reading, Massachusetts, 1968. A=B Marko Petkovsek Herbert S. Wilf University of Ljubljana University of Pennsylvania Ljubljana, Slovenia Philadelphia, PA, USA Doron Zeilberger Temple University Philadelphia, PA, USA April 27, 1997 ii Contents Foreword vii A Quick Start ... ix IBackground 1 1 Proof Machines 3 1.1Evolutionoftheprovinceofhumanthought.............. 3 1.2Canonicalandnormalforms....................... 7 1.3Polynomialidentities........................... 8 1.4Proofsbyexample?............................ 9 1.5Trigonometricidentities......................... 11 1.6Fibonacciidentities............................ 12 1.7Symmetricfunctionidentities...................... 12 1.8Ellipticfunctionidentities........................ 13 2 Tightening the Target 17 2.1Introduction................................ 17 2.2Identities.................................. 21 2.3Humanandcomputerproofs;anexample................ 23 2.4AMathematicasession.......................... 27 2.5AMaplesession.............................. 29 2.6Whereweareandwhathappensnext.................. 30 2.7Exercises.................................. 31 3 The Hypergeometric Database 33 3.1Introduction................................ 33 3.2Hypergeometricseries........................... 34 3.3Howtoidentifyaseriesashypergeometric..............
    [Show full text]
  • Arxiv:1803.01386V4 [Math.HO] 25 Jun 2021
    2009 SEKI http://wirth.bplaced.net/seki.html ISSN 1860-5931 arXiv:1803.01386v4 [math.HO] 25 Jun 2021 A Most Interesting Draft for Hilbert and Bernays’ “Grundlagen der Mathematik” that never found its way into any publi- Working-Paper cation, and 2 CVof Gisbert Hasenjaeger Claus-Peter Wirth Dept. of Computer Sci., Saarland Univ., 66123 Saarbrücken, Germany [email protected] SEKI Working-Paper SWP–2017–01 SEKI SEKI is published by the following institutions: German Research Center for Artificial Intelligence (DFKI GmbH), Germany • Robert Hooke Str.5, D–28359 Bremen • Trippstadter Str. 122, D–67663 Kaiserslautern • Campus D 3 2, D–66123 Saarbrücken Jacobs University Bremen, School of Engineering & Science, Campus Ring 1, D–28759 Bremen, Germany Universität des Saarlandes, FR 6.2 Informatik, Campus, D–66123 Saarbrücken, Germany SEKI Editor: Claus-Peter Wirth E-mail: [email protected] WWW: http://wirth.bplaced.net Please send surface mail exclusively to: DFKI Bremen GmbH Safe and Secure Cognitive Systems Cartesium Enrique Schmidt Str. 5 D–28359 Bremen Germany This SEKI Working-Paper was internally reviewed by: Wilfried Sieg, Carnegie Mellon Univ., Dept. of Philosophy Baker Hall 161, 5000 Forbes Avenue Pittsburgh, PA 15213 E-mail: [email protected] WWW: https://www.cmu.edu/dietrich/philosophy/people/faculty/sieg.html A Most Interesting Draft for Hilbert and Bernays’ “Grundlagen der Mathematik” that never found its way into any publication, and two CV of Gisbert Hasenjaeger Claus-Peter Wirth Dept. of Computer Sci., Saarland Univ., 66123 Saarbrücken, Germany [email protected] First Published: March 4, 2018 Thoroughly rev. & largely extd. (title, §§ 2, 3, and 4, CV, Bibliography, &c.): Jan.
    [Show full text]
  • Fermat's Last Theorem
    Fermat's Last Theorem In number theory, Fermat's Last Theorem (sometimes called Fermat's conjecture, especially in older texts) Fermat's Last Theorem states that no three positive integers a, b, and c satisfy the equation an + bn = cn for any integer value of n greater than 2. The cases n = 1 and n = 2 have been known since antiquity to have an infinite number of solutions.[1] The proposition was first conjectured by Pierre de Fermat in 1637 in the margin of a copy of Arithmetica; Fermat added that he had a proof that was too large to fit in the margin. However, there were first doubts about it since the publication was done by his son without his consent, after Fermat's death.[2] After 358 years of effort by mathematicians, the first successful proof was released in 1994 by Andrew Wiles, and formally published in 1995; it was described as a "stunning advance" in the citation for Wiles's Abel Prize award in 2016.[3] It also proved much of the modularity theorem and opened up entire new approaches to numerous other problems and mathematically powerful modularity lifting techniques. The unsolved problem stimulated the development of algebraic number theory in the 19th century and the proof of the modularity theorem in the 20th century. It is among the most notable theorems in the history of mathematics and prior to its proof was in the Guinness Book of World Records as the "most difficult mathematical problem" in part because the theorem has the largest number of unsuccessful proofs.[4] Contents The 1670 edition of Diophantus's Arithmetica includes Fermat's Overview commentary, referred to as his "Last Pythagorean origins Theorem" (Observatio Domini Petri Subsequent developments and solution de Fermat), posthumously published Equivalent statements of the theorem by his son.
    [Show full text]
  • Quantum Bit Commitment and Unconditional Security
    Quantum bit commitment and unconditional security Horace P. Yuen∗† Department of Electrical and Computer Engineering Department of Physics and Astronomy Northwestern University Evanston, IL 60208-3118 Abstract It is generally believed that unconditionally secure quantum bit commitment is impossible, due to widespread acceptance of an impossibility proof that utilizes quantum entaglement cheating. In this paper, we delineate how the impossibiliy proof formulation misses various types of quantum bit commitment protocols based on two-way quantum communications. We point out some of the gaps in the impossibility proof reasoning, and present corresponding counterexamples. Four different types of bit commitment protocols are constructed with several new protocol techniques. A specific Type 4 protocol is described and proved unconditionally secure. Security analysis of a Type 1 protocol and a Type 2 protocol are also sketched. The security of Type 3 protocols is as yet open. A development of quantum statistical decision theory and quantum games is needed to provie a complete security analysis of many such protocols. arXiv:quant-ph/0207089v3 20 Aug 2002 ∗E-mail: [email protected] †Note: this paper analyzes in detail, for the first time, the various gaps in the QBC impossibility proof, many of which I indicated before but few of which seem to be understood. There is clearly a need to focus on these gaps, which is an issue logically distinct from whether any protocol can be proved unconditionally secure. One of the original three protocols I described in the QCM at Capri, July 2000, protocol Y3 that appeared as QBC1 in v2 of this paper, was pointed out to be insecure in the QCM at MIT, July 2002.
    [Show full text]
  • Or Many? Foundations of Mathematics in Today's Mathematical Practice
    ONE MATHEMATIC(S) OR MANY? FOUNDATIONS OF MATHEMATICS IN TODAY'S MATHEMATICAL PRACTICE ANDREI RODIN 1 Abstract. The received Hilbert-style axiomatic foundations of mathematics has been designed by Hilbert and his followers as a tool for meta-theoretical research. Foun- dations of mathematics of this type fail to satisfactory perform more basic and more practically-oriented functions of theoretical foundations such as verification of mathemat- ical constructions and proofs. Using alternative foundations of mathematics such as the Univalent Foundations is compatible with using the received set-theoretic foundations for meta-mathematical purposes provided the two foundations are mutually interpretable. Changes in foundations of mathematics do not, generally, disqualify mathematical the- ories based on older foundations but allow for reconstruction of these theories on new foundations. Mathematics is one but its foundations are many. 1. \Practical" Foundations of Mathematics and Foundations of Mathematics simpliciter Foundations of a theoretical discipline are traditionally conceived as a join between this discipline and its philosophy; accordingly, the Philosophy of Mathematics typically focuses on the foundations of mathematics (FOM) rather than on other areas of mathematical research. The Philosophy of Mathematical Practice attempts, among other things, to enlarge the scope of philosophical analysis of mathematics by paying more attention to past and present mathematical developments beyond FOM and, more specifically, beyond Date: August
    [Show full text]
  • Uncontrollability of Artificial Intelligence
    Uncontrollability of Artificial Intelligence Roman V. Yampolskiy Computer Science and Engineering, University of Louisville [email protected] Abstract means. However, it is a standard practice in computer sci- ence to first show that a problem doesn’t belong to a class Invention of artificial general intelligence is pre- of unsolvable problems [Turing, 1936; Davis, 2004] before dicted to cause a shift in the trajectory of human civ- investing resources into trying to solve it or deciding what ilization. In order to reap the benefits and avoid pit- approaches to try. Unfortunately, to the best of our falls of such powerful technology it is important to be knowledge no mathematical proof or even rigorous argu- able to control it. However, possibility of controlling mentation has been published demonstrating that the AI artificial general intelligence and its more advanced control problem may be solvable, even in principle, much version, superintelligence, has not been formally es- less in practice. tablished. In this paper we argue that advanced AI Yudkowsky considers the possibility that the control can’t be fully controlled. Consequences of uncontrol- problem is not solvable, but correctly insists that we should lability of AI are discussed with respect to future of study the problem in great detail before accepting such grave humanity and research on AI, and AI safety and se- limitation, he writes: “One common reaction I encounter is curity. for people to immediately declare that Friendly AI is an im- 1 possibility, because any sufficiently powerful AI will be 1 Introduction able to modify its own source code to break any constraints The unprecedented progress in Artificial Intelligence (AI) placed upon it.
    [Show full text]
  • A Brief History of Impossibility
    VOL. 81, NO. 1, FEBRUARY 2008 27 A Brief History of Impossibility JEFF SUZUKI Brooklyn College Brooklyn, NY jeff [email protected] Sooner or later every student of geometry learns of three “impossible” problems: 1. Trisecting the angle: Given an arbitrary angle, construct an angle exactly one-third as great. 2. Duplicating the cube: Given a cube of arbitrary volume, find a cube with exactly twice the volume. 3. Squaring the circle: Given an arbitrary circle, find a square with the same area. These problems originated around 430 BC at a time when Greek geometry was advanc- ing rapidly. We might add a fourth problem: inscribing a regular heptagon in a circle. Within two centuries, all these problems had been solved (see [3, Vol. I, p. 218–270] and [1] for some of these solutions). So if these problems were all solved, why are they said to be impossible? The “im- possibility” stems from a restriction, allegedly imposed by Plato (427–347 BC), that geometers use no instruments besides the compass and straightedge. This restriction requires further explanation. For that, we turn to Euclid (fl. 300 BC), who collected and systematized much of the plane geometry of the Greeks in his Elements. Euclid’s goal was to develop geometry in a deductive manner from as few basic assumptions as possible. The first three postulates in the Elements are (in modernized form): 1. Between any two points, there exists a unique straight line. 2. A straight line may be extended indefinitely. 3. Given any point and any length, a circle may be constructed centered at the point with radius equal to the given length.
    [Show full text]
  • In Search of the Sources of Incompleteness
    P. I. C. M. – 2018 Rio de Janeiro, Vol. 4 (4075–4092) IN SEARCH OF THE SOURCES OF INCOMPLETENESS J P Abstract Kurt Gödel said of the discovery of his famous incompleteness theorem that he sub- stituted “unprovable” for “false” in the paradoxical statement This sentence is false. Thereby he obtained something that states its own unprovability, so that if the state- ment is true, it should indeed be unprovable. The big methodical obstacle that Gödel solved so brilliantly was to code such a self-referential statement in terms of arithmetic. The shorthand notes on incompleteness that Gödel had meticulously kept are exam- ined for the first time, with a picture of the emergence of incompleteness different from the one the received story of its discovery suggests. 1. P . Kurt Gödel’s paper of 1931 about the incompleteness of mathematics, Über formal unentscheidbare Sätze der Principia Mathematica und ver- wandter Systeme I, belongs to the most iconic works of the first half of 20th century sci- ence, comparable to the ones of Einstein on relativity (1905), Heisenberg on quantum mechanics (1925), Kolmogorov on continuous-time random processes (1931), and Tur- ing on computability (1936). Gödel showed that the quest of representing the whole of mathematics as a closed, complete, and formal system is unachievable. It has been said repeatedly that Gödel’s discovery has had close to no practical effect on mathematics: the impossibility to decide some questions inside a formal system has not surfaced except in a few cases, such as the question of the convergence of what are known as Goodstein sequences.
    [Show full text]
  • The Euclid Abstract Machine
    The Euclid Abstract Machine JERZY MYCKA1?,JOSE´ FELIX´ COSTA2,FRANCISCO COELHO3 1 Institute of Mathematics, University of Maria Curie-Skłodowska Lublin, Poland § 2 Department of Mathematics, I.S.T., Universidade Tecnica´ de Lisboa and CMAF – Centro de Matematica´ e Aplicac¸oes˜ Fundamentais, Lisboa, Portugal || 3 Department of Mathematics, Universidade de Evora,´ Portugal # He took the golden Compasses, prepar’d In Gods Eternal store, to circumscribe This Universe, and all created things: One foot he center’d, and the other turn’d Round through the vast profunditie obscure, And said, thus farr extend, thus farr thy bounds, This be thy just Circumference, O World. Milton, Paradise Lost Most famous painting by William Blake § email: [email protected] || email: [email protected] # email: [email protected] ? Corresponding author 1 Abstract. Concrete non-computable functions always hide the halting function, not considering abstract Turing degrees. Even the construction of a function that grows faster than any recur- sive function — the Busy Beaver — a quite natural function, hides the halting set, that can easily be put in relation with the Busy Beaver. Is this concept of super-Turing computation re- lated only with the halting problem and its derivatives? We built an abstract machine based on the historic concept of compass and ruler constructions (a compass construction would suffice) which reveals the existence of non-computable functions not re- lated with the halting problem. These natural, and the same time, non-computable functions can help to understand the nature of the uncomputable and the purpose, the goal, and the meaning of computing beyond Turing.
    [Show full text]
  • IMPOSSIBILITY RESULTS: from GEOMETRY to ANALYSIS Davide Crippa
    IMPOSSIBILITY RESULTS: FROM GEOMETRY TO ANALYSIS Davide Crippa To cite this version: Davide Crippa. IMPOSSIBILITY RESULTS: FROM GEOMETRY TO ANALYSIS : A study in early modern conceptions of impossibility. History, Philosophy and Sociology of Sciences. Univeristé Paris Diderot Paris 7, 2014. English. tel-01098493 HAL Id: tel-01098493 https://hal.archives-ouvertes.fr/tel-01098493 Submitted on 25 Dec 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE PARIS DIDEROT (PARIS 7) SORBONNE PARIS CITE ECOLE DOCTORALE: Savoirs Scientifiques, Epistémologie, Histoire des Sciences et Didactique des disciplines DOCTORAT: Epistémologie et Histoire des Sciences DAVIDE CRIPPA IMPOSSIBILITY RESULTS: FROM GEOMETRY TO ANALYSIS A study in early modern conceptions of impossibility RESULTATS D’IMPOSSIBILITE: DE LA GEOMETRIE A L’ANALYSE Une étude de résultats classiques d’impossibilité Thèse dirigée par: Marco PANZA Soutenue le: 14 Octobre 2014 Jury: Andrew Arana Abel Lassalle Casanave Jesper Lützen (rapporteur) David Rabouin Vincenzo de Risi (rapporteur) Jean-Jacques Szczeciniarz Alla memoria di mio padre. A mia madre. Contents Preface 9 1 General introduction 14 1.1 The theme of my study . 14 1.2 A difficult context . 16 1.3 Types of impossibility arguments .
    [Show full text]
  • UC San Diego UC San Diego Electronic Theses and Dissertations
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Multimodal evidence Permalink https://escholarship.org/uc/item/2x54p2rw Author Stegenga, Jacob Publication Date 2011 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Multimodal Evidence A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Philosophy by Jacob Stegenga Committee in charge: Professor Nancy Cartwright, Chair Professor William Bechtel Professor Craig Callender Professor Naomi Oreskes Professor Robert Westman 2011 © Jacob Stegenga, 2011 All rights reserved. The Dissertation of Jacob Stegenga is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California, San Diego 2011 iii For Skye, who teaches that there is much about which to argue; For my Mother, whose arguments are sparing, and kind; For Bob, who argues well; For Alexa, who knows that one need not always argue. iv It is the profession of philosophers to question platitudes. A dangerous profession, since philosophers are more easily discredited than platitudes. David Lewis v TABLE OF CONTENTS Signature Page……………………………………………………………… iii Dedication………………………………………………………………….. iv Epigraph……………………………………………………………………. v Table of Contents…………………………………………………………... vi List of Tables………………………………………………………………. vii List of Terminology………………………………………………………... viii List of Abbreviations and Symbols…………………………………………
    [Show full text]