Determinables and Brute Similarities

نویسنده

  • Olivier Massin
چکیده

Ingvar Johansson has argued that there are not only determinate universals, but also determinable ones. I here argue that this view is misguided, by reviving a line of argument to the following effect: what makes determinates falling under a same determinable similar cannot be distinct from what makes them different. If true, then some similarities — imperfect similarities between simple determinates properties — are not grounded in any kind of property-sharing. Section 1 introduces some of the main points of Johansson's realism about determinables. Section 2 argues that realism about determinables entails that the difference-makers and the similarity-makers of determinate properties are distinct. Section 3 argues that the difference-and similarity-makers, if they are distinct from each other, also have to be distinct from the determinate properties themselves. Section 4 argues that both the similarity-makers and the difference-makers of determinates are epistemologically inaccessible. Section 5 puts forward two other problematic implications of the distinction between the similarity-makers and the difference-makers of determinates. Section 6 introduces the view that the similarity-makers and the difference-makers of determinate properties are one and the same. Section 7 argues that no contradiction is involved in such an identity claim, for imperfect similarity and imperfect dissimilarity between properties are two faces of the same relation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

A Study of Passwords and Methods Used in Brute-Force SSH Attacks

In its Top-20 Security Risks report for 2007, the SANS Institute called brute-force password guessing attacks against SSH, FTP and telnet servers “the most common form of attack to compromise servers facing the Internet.” A recent study also suggests that Linux systems may play an important role in the command and control networks for botnets. Defending against brute-force SSH attacks may there...

متن کامل

Determination, realization and mental causation

How can mental properties bring about physical effects, as they seem to do, given that the physical realizers of the mental goings-on are already sufficient to cause these effects? This question gives rise to the problem of mental causation (MC) and its associated threats of causal overdetermination, mental causal exclusion, and mental causal irrelevance. Some (e.g., Cynthia and Graham Macdonal...

متن کامل

Asymmetric numeral systems

In this paper will be presented new approach to entropy coding: family of generalizations of standard numeral systems which are optimal for encoding sequence of equiprobable symbols, into asymmetric numeral systems optimal for freely chosen probability distributions of symbols. It has some similarities to Range Coding but instead of encoding symbol in choosing a range, we spread these ranges un...

متن کامل

Handling state space explosion in verification of component-based systems: A review

Component-based design is a different way of constructing systems which offers numerous benefits, in particular, decreasing the complexity of system design. However, deploying components into a system is a challenging and error-prone task. Model checking is one of the reliable methods that automatically and systematically analyse the correctness of a given system. Its brute-force check of the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013