This article shows how fundamental higher-order theories of mathematical structures of computer science (e.g. natural numbers [Dedekind 1888] and Actors [Hewitt et. al. 1973]) are cetegorical meaning that they can be axiomatized up to a unique isomorphism thereby removing any ambiguity in the mathematical structures being axiomatized. Having these mathematical structures precisely defined can make systems more secure because there are fewer ambiguities and holes for cyberattackers to exploit. For example, there are no infinite elements in models for natural numbers to be exploited. On the other hand, the 1st-order theories of Gödel’s results necessarily leave the mathematical structures ill-defined, e.g., there are necessarily models with i...
In this article, I explore a specific relation between mathematics and security calculations. Recall...
Malware plays a significant role in breaching computer systems. Previous research has focused on mal...
Malware plays a significant role in breaching computer systems. Previous research has focused on mal...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
International audience This article shows how fundamental higher-order theories of mathematical str...
This article follows on the introductory article “Direct Logic for Intelligent Applications” [Hewitt...
This article follows on the introductory article “Direct Logic for Intelligent Applications” [Hewitt...
This article follows on the introductory article “Direct Logic for Intelligent Applications” [Hewitt...
In this article, I explore a specific relation between mathematics and security calculations. Recall...
Malware plays a significant role in breaching computer systems. Previous research has focused on mal...
Malware plays a significant role in breaching computer systems. Previous research has focused on mal...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
This article shows how fundamental higher-order theories of mathematical structures of computer scie...
International audience This article shows how fundamental higher-order theories of mathematical str...
This article follows on the introductory article “Direct Logic for Intelligent Applications” [Hewitt...
This article follows on the introductory article “Direct Logic for Intelligent Applications” [Hewitt...
This article follows on the introductory article “Direct Logic for Intelligent Applications” [Hewitt...
In this article, I explore a specific relation between mathematics and security calculations. Recall...
Malware plays a significant role in breaching computer systems. Previous research has focused on mal...
Malware plays a significant role in breaching computer systems. Previous research has focused on mal...