Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <2c58f962e8efae4d5358494672a22e02e90b4fbb@i2pn2.org>
Deutsch   English   Français   Italiano  
<2c58f962e8efae4d5358494672a22e02e90b4fbb@i2pn2.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: joes <noreply@example.org>
Newsgroups: comp.theory
Subject: Re: Self-Modifying Turing Machine
Date: Sat, 20 Jul 2024 13:24:17 -0000 (UTC)
Organization: i2pn2 (i2pn.org)
Message-ID: <2c58f962e8efae4d5358494672a22e02e90b4fbb@i2pn2.org>
References: <v6un9t$3nufp$1@dont-email.me> <v7013v$2ccv$1@dont-email.me>
	<v70nt7$61d8$6@dont-email.me>
	<58fc6559638120b31e128fe97b5e955248afe218@i2pn2.org>
	<v71mjh$bp3i$1@dont-email.me>
	<1173a460ee95e0ca82c08abecdefc80ba86646ac@i2pn2.org>
	<v71okl$bvm2$1@dont-email.me>
	<5f6daf68f1b4ffac854d239282bc811b5b806659@i2pn2.org>
	<v71ttb$crk4$1@dont-email.me>
	<60e7a93cb8cec0afb68b3e40a0e82e9d63fa8e2a@i2pn2.org>
	<v721po$h4kr$1@dont-email.me> <v73td3$qkp2$6@dont-email.me>
	<v73tvs$qpi9$1@dont-email.me> <v74n81$13bn1$1@dont-email.me>
	<fafa57d75cf800c930c76530acd72148c77fff87@i2pn2.org>
	<v75ul2$19j7l$5@dont-email.me> <v77s2f$1o4oh$1@dont-email.me>
	<v78gi1$1rc43$6@dont-email.me> <v7d5r0$2t5hr$1@dont-email.me>
	<v7dsit$30pvh$4@dont-email.me> <v7fucc$3fh57$1@dont-email.me>
	<v7gcjm$3hlc2$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 20 Jul 2024 13:24:17 -0000 (UTC)
Injection-Info: i2pn2.org;
	logging-data="3943878"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="nS1KMHaUuWOnF/ukOJzx6Ssd8y16q9UPs1GZ+I3D0CM";
User-Agent: Pan/0.145 (Duplicitous mercenary valetism; d7e168a
 git.gnome.org/pan2)
X-Spam-Checker-Version: SpamAssassin 4.0.0
Bytes: 7465
Lines: 125

Am Sat, 20 Jul 2024 08:03:50 -0500 schrieb olcott:
> On 7/20/2024 4:01 AM, Mikko wrote:
>> On 2024-07-19 14:18:05 +0000, olcott said:
>>> On 7/19/2024 2:49 AM, Mikko wrote:
>>>> On 2024-07-17 13:22:09 +0000, olcott said:
>>>>> On 7/17/2024 2:32 AM, Mikko wrote:
>>>>>> On 2024-07-16 14:04:18 +0000, olcott said:
>>>>>>> On 7/16/2024 6:53 AM, Richard Damon wrote:
>>>>>>>> On 7/15/24 10:51 PM, olcott wrote:
>>>>>>>>> On 7/15/2024 2:40 PM, olcott wrote:
>>>>>>>>>> On 7/15/2024 2:30 PM, Fred. Zwarts wrote:
>>>>>>>>>>> Op 15.jul.2024 om 04:33 schreef olcott:
>>>>>>>>>>>> On 7/14/2024 9:04 PM, Richard Damon wrote:
>>>>>>>>>>>>> On 7/14/24 9:27 PM, olcott wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Any input that must be aborted to prevent the non
>>>>>>>>>>>>>> termination of simulating termination analyzer HHH
>>>>>>>>>>>>>> necessarily specifies non-halting behavior or it would
>>>>>>>>>>>>>> never need to be aborted.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Excpet, as I have shown, it doesn't.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Your problem is you keep on ILEGALLY changing the input in
>>>>>>>>>>>>> your argument because you have misdefined what the input is.
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>> _DDD()
>>>>>>>>>>>> [00002163] 55         push ebp      ; housekeeping [00002164]
>>>>>>>>>>>> 8bec       mov ebp,esp   ; housekeeping [00002166] 6863210000
>>>>>>>>>>>> push 00002163 ; push DDD [0000216b] e853f4ffff call 000015c3
>>>>>>>>>>>> ; call HHH(DDD)
>>>>>>>>>>>> [00002170] 83c404     add esp,+04 [00002173] 5d         pop
>>>>>>>>>>>> ebp [00002174] c3         ret Size in bytes:(0018) [00002174]
>>>>>>>>>>>>
>>>>>>>>>>>> The input *is* the machine address of this finite string of
>>>>>>>>>>>> bytes: 558bec6863210000e853f4ffff83c4045dc3
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>> It seems that you do not understand x86 language. The input is
>>>>>>>>>>> not a string of bytes, but an address (00002163). This points
>>>>>>>>>>> to the starting of the code of DDD. But a simulation needs a
>>>>>>>>>>> program, not a function calling undefined other functions.
>>>>>>>>>>> Therefore, all functions called by DDD (such as HHH) are
>>>>>>>>>>> included in the code to simulate.
>>>>>>>>>>
>>>>>>>>>> *The input is the machine address of this finite*
>>>>>>>>>> *string of bytes: 558bec6863210000e853f4ffff83c4045dc3*
>>>>>>>>>>
>>>>>>>>>> You are talking about the behavior specified by that finite
>>>>>>>>>> string. When you say that a finite string *is not* a finite
>>>>>>>>>> string you are disagreeing with the law of identity.
>>>>>>>>>>
>>>>>>>>>> Every rebuttal to my work disagrees with one tautology of
>>>>>>>>>> another.
>>>>>>>>>> It is the fact that DDD calls HHH(DDD) in recursive emulation
>>>>>>>>>> that makes it impossible for DDD correctly emulated by HHH to
>>>>>>>>>> halt.
>>>>>>>>>
>>>>>>>>>> Everyone disagrees with this entirely on the basis of the
>>>>>>>>>> strawman deception (damned lie) that some other DDD somewhere
>>>>>>>>>> else has different behavior.
>>>>>>>>>
>>>>>>>>> *They disagree with the following*
>>>>>>>>>
>>>>>>>>> In other words the fact that the directly executed DDD halts
>>>>>>>>> because the HHH(DDD) that it calls has already aborted its
>>>>>>>>> simulation proves these these two different instances of DDD are
>>>>>>>>> in different process states.
>>>>>>>>
>>>>>>>> BUT must have the same behavior.
>>>>>>>>
>>>>>>>>
>>>>>>>>> The state of needing to abort the input changes after it has
>>>>>>>>> already been aborted is the same as the state of being hungry
>>>>>>>>> changes after you have had something to eat.
>>>>>>>>>
>>>>>>>>>
>>>>>>>> Can't. Since programs are unchanging, their properties can not
>>>>>>>> change.
>>>>>>>>
>>>>>>>>
>>>>>>> *WRONG* https://en.wikipedia.org/wiki/Self-modifying_code
>>>>>>
>>>>>> Your complier cannot produce self-modifying code.
>>>>>>
>>>>>>
>>>>> My compiler can accept assembly language that can derive
>>>>> self-modifying code.
>>>>
>>>> Using non-standard extensions of the language may indeed permit that
>>>> unless the program is loaded to a read-only memory. The compiler is
>>>> designed so that ordinary programs can be loaded to read-only memory.
>>>> Some operating systems prevent programs from modifying themselves as
>>>> if the program were in a read-only memory, and typical compilers
>>>> compile so that the program can be run under such operating systems.
>>>>
>>>>
>>> The bottom line is that an actual TM can modify its own code while it
>>> is running when it has access to its own TM description and it is only
>>> simulated by a UTM. In this case it can modify itself so that its
>>> input is no longer contradictory.
>> 
>> An actual Turing machine cannot change itself. A machine that can
>> change itself is not a Turing machine.
>> 
>> If you are interested in self-modifying machines you may want to study
>> LOTOS.
>> 
>>> When a Self-Modifying Turing Machine can change itself to become any
>>> other Turing Machine then it can eliminate the pathological
>>> relationship to its input.
>> It never was a Turing machine.
> A self modifying TM is merely a TM description that is simulated by a
> UTM and has access to itself on the UTM tape.
> This same idea can be implemented as an emulated x86 program that knows
> its own machine address. Self-modifying code is not a new idea. Applying
> this to TMs is a new idea.
This is your first mention of selfmodification.

> Everyone here is acting like unconventional new ideas are impossible
> because they are unconventional and new.
No, but you can't transfer conventional knowledge unchanged.

-- 
Am Fri, 28 Jun 2024 16:52:17 -0500 schrieb olcott:
Objectively I am a genius.