Skip to main content

The Social Negotiation of Proof: An Analysis and a further Prediction

  • Chapter
Formal Methods in Systems Engineering

Abstract

This paper is a preliminary report on one aspect of a research project studying the development of formal methods in computer science, which is being conducted as part of the Economic and Social Research Council’s Programme on Information and Communication Technologies (PICT). The overall goal of the project is to discover the factors encouraging, retarding and shaping the emergence and adoption in the UK of formal methods. The approach being taken includes case-studies, historical work and international comparison.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barnes B. T.S. Kuhn and Social Science. Macmillan, London, 1982

    Google Scholar 

  2. Bloor, D Knowledge and Social Imagery. Routledge and Kegan Paul, London, 1976

    Google Scholar 

  3. Barnes, B. Interests and the Growth of Knowledge. Routledge and Kegan Paul, London, 1977

    Google Scholar 

  4. Shapin, S. History of Science and its Sociological Reconstructions. History of Science 1982; 20: 157–211

    Google Scholar 

  5. Pelaez E, Fleck J, MacKenzie D. Social Research on Software. Paper read to National Workshop of Programme in Information and Communications Technologies, Manchester, 1987

    Google Scholar 

  6. Grabiner JV. Is Mathematical Truth Time-Dependent. American Mathematical Monthly 1974; 81: 354–65

    Article  MATH  MathSciNet  Google Scholar 

  7. Hughes NH: Foreword to Charter Technologies Ltd., VIPER Microprocessor Development Tools, December 1987

    Google Scholar 

  8. MacKenzie D. The Fangs of the VIPER. Nature 1991; 352: 467–68

    Article  Google Scholar 

  9. Boyer RS, Moore JS. Proof Checking the RSA Public Key Encryption Algorithm. Am Math Monthly 1984; 91: 181–89

    Article  MATH  MathSciNet  Google Scholar 

  10. Cohn A. The Notion of Proof in Hardware Verification. J Aut Reasoning 1989; 5: 127–139

    MATH  Google Scholar 

  11. Brock B, Hunt WA Jr. Report on the Formal Specification and Partial Verification of the VIPER Microprocessor. Computational Logic, Inc., Austin, Texas, 15 January 1990 (Technical report no. 46).

    Google Scholar 

  12. Kershaw J: Foreword to [11].

    Google Scholar 

  13. Thomas M. VIPER Lawsuit withdrawn. Electronic mail communication, 5 June 1991

    Google Scholar 

  14. de Millo RA, Lipton RJ, Perlis AJ. Social Processes and Proofs of Theorems and Programs. Comm ACM 1979; 22: 271–80

    Article  Google Scholar 

  15. Lamport L. As quoted in Shapiro SS, Computer Software as Technology: An Examination of Technological Development. PhD thesis, Carnegie Mellon University, 1990

    Google Scholar 

  16. Dijkstra EW. On a Political Pamphlet from the Middle Ages. ACM SIG-SOFT, Software Eng Notes April 1978; 3 (2): 14–16

    Article  MathSciNet  Google Scholar 

  17. Dijkstra EW. Formal Techniques and Sizeable Programs. In Dijkstra, Selected Writings on Computing. Springer, New York, 1982, pp. 205–214

    Google Scholar 

  18. Appel K, Haken W. As quoted in Davis PJ, Hersh R, Why should I believe a Computer? In Davis, Hersh, The Mathematical Experience. Harvester, Brighton, 1981, pp. 380–87

    Google Scholar 

  19. Fetzer JH. Program Verification: The Very Idea. Comm ACM 1988; 31: 1048–63

    Article  Google Scholar 

  20. Ministry of Defence. The Procurement of Safety Critical Software in Defence Equipment. Ministry of Defence Directorate of Standardisation, Glasgow, 5 April 1991 (Interim Defence Standard 00–55/Issue 1)

    Google Scholar 

  21. Makinson DC. Topics in Modern Logic. Methuen, London, 1973

    Google Scholar 

  22. Manna Z, Waldinger R. Constructive Logic considered Obstructive. Typescript, no date

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag London Limited

About this chapter

Cite this chapter

MacKenzie, D. (1993). The Social Negotiation of Proof: An Analysis and a further Prediction. In: Ryan, P., Sennett, C. (eds) Formal Methods in Systems Engineering. Springer, London. https://doi.org/10.1007/978-1-4471-1975-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-1975-3_3

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19751-5

  • Online ISBN: 978-1-4471-1975-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics