Deutsch English Français Italiano |
<v4kh6a$3hugj$4@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory,sci.logic Subject: H(D,D) cannot even be asked about the behavior of D(D) V3 ---IGNORING ALL OTHER REPLIES Date: Sat, 15 Jun 2024 11:57:45 -0500 Organization: A noiseless patient Spider Lines: 47 Message-ID: <v4kh6a$3hugj$4@dont-email.me> References: <v45tec$4q15$1@dont-email.me> <v46na7$3ifov$4@i2pn2.org> <v48be9$rgsh$1@dont-email.me> <v48gh6$3kcoe$4@i2pn2.org> <v48jv2$se9c$1@dont-email.me> <v49dge$3kcoe$5@i2pn2.org> <v4a0hs$157ic$3@dont-email.me> <v4ak5o$3kcoe$6@i2pn2.org> <v4am8r$19edk$1@dont-email.me> <v4apjs$19rnv$1@dont-email.me> <v4arp0$1a7uo$1@dont-email.me> <v4b1c3$3nf9n$3@i2pn2.org> <v4b50m$1f89t$5@dont-email.me> <v4c12r$3oop0$3@i2pn2.org> <v4cjl7$1o4b4$1@dont-email.me> <v4d991$3qbnc$1@i2pn2.org> <v4da12$1sioe$1@dont-email.me> <v4dbmf$3qbnc$3@i2pn2.org> <v4dcd6$1sioe$3@dont-email.me> <v4df0h$3qbnd$1@i2pn2.org> <v4dhf5$1tsdf$2@dont-email.me> <v4dja1$3qbnd$5@i2pn2.org> <v4djhf$1tsdf$6@dont-email.me> <v4dk7b$3qbnc$8@i2pn2.org> <v4dl3b$225kb$1@dont-email.me> <v4dn5u$3qbnd$8@i2pn2.org> <v4dop4$22o4a$2@dont-email.me> <v4dq07$3qbnc$12@i2pn2.org> <v4dqq0$2353n$1@dont-email.me> <v4el9m$3rsd6$3@i2pn2.org> <v4f3ec$2akmh$2@dont-email.me> <v4g65a$3tn6q$1@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sat, 15 Jun 2024 18:57:46 +0200 (CEST) Injection-Info: dont-email.me; posting-host="65be3053bb2d9b452c13d5ddc3153d90"; logging-data="3734035"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+BetZFMKw7R6AWQETHZOgp" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:S1glX7dN/UbxnxuuOriNEOBdGGA= In-Reply-To: <v4g65a$3tn6q$1@i2pn2.org> Content-Language: en-US Bytes: 3740 On 6/13/2024 8:24 PM, Richard Damon wrote: > On 6/13/24 11:32 AM, olcott wrote: >> >> It is contingent upon you to show the exact steps of how H computes >> the mapping from the x86 machine language finite string input to >> H(D,D) using the finite string transformation rules specified by >> the semantics of the x86 programming language that reaches the >> behavior of the directly executed D(D) >> > > Why? I don't claim it can. When I ask you to provide the mapping from the input to H(D,D) to each step of the behavior of D(D) and and you refuse then within Socratic questioning you have proved to not be interested in an honest dialog. The first six steps of this mapping are when instructions at the machine address range of [00000cfc] to [00000d06] are simulated/executed. What are the remaining steps that prove that the input to H(D,D) has the behavior of D(D) ??? _D() [00000cfc](01) 55 push ebp [00000cfd](02) 8bec mov ebp,esp [00000cff](03) 8b4508 mov eax,[ebp+08] [00000d02](01) 50 push eax ; push D [00000d03](03) 8b4d08 mov ecx,[ebp+08] [00000d06](01) 51 push ecx ; push D [00000d07](05) e800feffff call 00000b0c ; call H [00000d0c](03) 83c408 add esp,+08 [00000d0f](02) 85c0 test eax,eax [00000d11](02) 7404 jz 00000d17 [00000d13](02) 33c0 xor eax,eax [00000d15](02) eb05 jmp 00000d1c [00000d17](05) b801000000 mov eax,00000001 [00000d1c](01) 5d pop ebp [00000d1d](01) c3 ret Size in bytes:(0034) [00000d1d] -- Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer