Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Archer, M. S. (1987). Resisting the Revival of Relativism, International Sociology 2: 235–50.
Barnes, B., Bloor, D. and Henry, J. (1996). Scientific Knowledge: A Sociological Analysis, Athlone, London.
Bloor, D. (1973). Wittgenstein and Mannheim on the Sociology of Mathematics, Studies in the History and Philosophy of Science 4: 173–91.
Bloor, D. (1976). Knowledge and Social Imagery, Routledge, London.
Bloor, D. (1983). Wittgenstein: A Social Theory of Knowledge, Macmillan, London.
Bloor, D. (1994). “What can the Sociologist of Knowledge say about 2 + 2 = 4”, in: Mathematics, Education and Philosophy (P. Ernest, ed., London, Falmer), pp. 21–32.
Bloor, D. (1997). Wittgenstein, Rule and Institutions, Routledge, London.
Boyer, R. S. and Moore, J. S. (1984). Proof Checking the RSA Public Key Encryption Algorithm, American Mathematical Monthly 91: 181–89.
Brock, B. and Hunt, W. A. (1990). Report on the Formal Specification and Partial Verification of the VIPER Microprocessor, Computational Logic, Inc, Austin, Texas.
Cohn, A. (1989). The Notion of Proof in Hardware Verification, Journal of Automated Reasoning 5: 127–39.
Crevier, D. (1993). AI: The Tumultuous History of the Search for Artificial Intelligence, Basic Books, New York.
DeMillo, R., Lipton, R. and Perlis, A. (1979). Social Processes and Proofs of Theorems and Programs, Communications of the ACM 22: 271–80.
Fetzer, J. H. (1988). Program Verification: The Very Idea, Communications of the ACM 31: 1048–63.
Galison, P. (1997). Image and Logic: A Material Culture of Microphysics, University of Chicago Press, Chicago.
Glanz, J. (1995). Mathematical Logic Flushes out the Bugs in Chip Designs, Science (20 January) 267: 332–33.
Haack, S. (1976). The Justification of Deduction, Mind 80: 112–19.
Hayes, P. J. (1987). A Critique of Pure Treason, Computational Intelligence 3: 179–185.
Hoare, C. A. R. (1994). “How Did Software Get So Reliable Without Proof?” Talk to the Awareness Club in Computer Assisted Formal Reasoning, Heriot Watt University, Edinburgh, 21 March 1994.
Kleiner, I. (1991). Rigor and Proof in Mathematics: A Historical Perspective, Mathematics Magazine 64: 291–314.
Livingston, E. (1986). The Ethnomethodological Foundations of Mathematics, Routledge, London.
MacKenzie, D. (1991). The Fangs of the VIPER, Nature 352: 467–68.
MacKenzie, D. (1993a). The Social Negotation of Proof: An Analysis and a further Prediction, in: Formal Methods in Systems Engineering (Peter Ryan and Chris Sennett, eds., London, Springer), 23–31.
MacKenzie, D. (1993b). Negotiating Arithmetic, Constructing Proof: The Sociology of Mathematics and Information Technology, Social Studies of Science 23: 37–65.
MacKenzie, D. (1994). Computer-Related Accidental Death: An Empirical Exploration, Science and Public Policy 21: 233–48.
MacKenzie, D. (1995). The Automation of Proof: An Historical and Sociological Exploration, IEEE Annals of the History of Computing 17(3): 7–29.
MacKenzie, D. (1996). Proof and the Computer: Some Issues Raised by the Formal Verification of Computer Systems, Science and Public Policy 23: 45–53.
MacKenzie, D. (1999). Slaying the Kraken: The Sociohistory of a Mathematical Proof, Social Studies of Science 29: 7–60.
MacKenzie, D. (2000). A Worm in the Bud? Computers, Systems, and the Safety-Case Problem, in Systems, Experts, and Computation: The Systems Approach in Management and Engineering, World War II and After (Hughes, A. C., and Hughes, T. P., eds., Cambridge, Mass., MIT Press), 161–190.
MacKenzie, D. (2001). Mechanizing Proof: Computing, Risk, and Trust, MIT Press, Cambridge, Mass.
MacKenzie, D. and Pottinger, G. (1997). Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military, IEEE Annals of the History of Computing 19(3): 41–59.
MacKenzie, D. and Tierney, M. (1996). Safety-Critical and Security-Critical Computing in Britain: An Exploration, Technology Analysis and Strategic Management 9: 355–79.
Ministry of Defence (1991). Interim Defence Standard 00-55: The Procurement of Safety Critical Software in Defence Equipment, Ministry of Defence, Directorate of Standardization, Glasgow.
Myers, G. J. (1979). The Art of Software Testing, Wiley, New York.
Nidditch, P. H. (1957). Introductory Formal Logic of Mathematics, University Tutorial Press, London.
Peláez, E., Fleck, J. and MacKenzie, D. (1987). “Social Research on Software”, Paper presented to workshop of the Economic and Social Research Council, Programme on Information and Communication Technologies, Manchester, December 1987.
Stoutemyer, D. R. (1991). Crimes and Misdemeanors in the Computer Algebra Trade, Notices of the American Mathematical Society 38: 778–85.
Thistlewaite, P., McRobbie, M. A. and Meyer, R. K. (1988). Automated theorem proving in non-classical logics, Pitman, London.
Thomas, M. (1991). “VIPER Lawsuit withdrawn.” Electronic mail communication, 5 June (1991).
Tierney, M. (1992). Software Enginering Standards: The ‘Formal Methods Debate’ in the UK, Technology Analysis and Strategic Management 4: 245–78.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
MacKenzie, D. (2006). Computers and the Sociology of Mathematical Proof. In: Hersh, R. (eds) 18 Unconventional Essays on the Nature of Mathematics. Springer, New York, NY. https://doi.org/10.1007/0-387-29831-2_7
Download citation
DOI: https://doi.org/10.1007/0-387-29831-2_7
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-25717-4
Online ISBN: 978-0-387-29831-3
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)