Results for ' ADHOC'

4 found
Order:
  1. Laudan radical account of adhocness.Baigrie Brian - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  2. The hypothesis that saves the day: ad hoc reasoning in pseudoscience.Maarten Boudry - 2013 - Logique Et Analyse 223:245-258.
    What is wrong with ad hoc hypotheses? Ever since Popper’s falsificationist account of adhocness, there has been a lively philosophical discussion about what constitutes adhocness in scientific explanation, and what, if anything, distinguishes legitimate auxiliary hypotheses from illicit ad hoc ones. This paper draws upon distinct examples from pseudoscience to provide us with a clearer view as to what is troubling about ad hoc hypotheses. In contrast with other philosophical proposals, our approach retains the colloquial, derogative meaning of adhocness, and (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  3. La composizione come identità da un punto di vista modale.Massimiliano Carrara - 2018 - Rivista Italiana di Filosofia del Linguaggio 1:26-39.
    In the debate about Composition as Identity (CI), a recurring pattern is to ask whether a certain feature of identity is also instantiated by composition. This recurring pattern is followed when, for example, the question is asked whether a whole and its parts are indiscernible. In following this pattern, it is methodologically desirable to assume the most standard account of the philosophical problems at stake. However, when the necessity of identity and the problem whether composition is as necessary as identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Download  
     
    Export citation  
     
    Bookmark