Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <84b09a0d53d77e2a8fddf567226d05c0d65e60c0.camel@gmail.com>
Deutsch   English   Français   Italiano  
<84b09a0d53d77e2a8fddf567226d05c0d65e60c0.camel@gmail.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: wij <wyniijj5@gmail.com>
Newsgroups: comp.theory
Subject: Re: Incorrect requirements --- Computing the mapping from the input
 to HHH(DD)
Date: Sat, 10 May 2025 14:00:05 +0800
Organization: A noiseless patient Spider
Lines: 71
Message-ID: <84b09a0d53d77e2a8fddf567226d05c0d65e60c0.camel@gmail.com>
References: <vv97ft$3fg66$1@dont-email.me> <vvjg6a$28g5i$3@dont-email.me>
	 <d577d485d0f5dfab26315f54f91eb84f25eecc40@i2pn2.org>
	 <87bjs2cyj6.fsf@nosuchdomain.example.com> <vvkffn$2m36t$4@dont-email.me>
	 <vvl84g$2rl0l$10@dont-email.me>
	 <c0b0db5de5c7f7ccb24b06d44108deb41fbde8dc@i2pn2.org>
	 <vvlm2k$30idv$1@dont-email.me> <vvlnad$2uvnf$5@dont-email.me>
	 <vvlnpj$30vce$1@dont-email.me> <vvlsp5$31vqc$1@dont-email.me>
	 <vvlv04$32kt3$1@dont-email.me> <87r00xchn5.fsf@nosuchdomain.example.com>
	 <23a27379d226b7b3b9f8c303a492f66edc9019ff.camel@gmail.com>
	 <vvmgtr$3a34p$7@dont-email.me>
	 <1020d30c2c5b5a7cce584777131d5ce414b480ea.camel@gmail.com>
	 <vvmk29$3atmt$3@dont-email.me>
	 <0323d5ca6d757a1e35d7e4cf5eb4fc8f41bc866a.camel@gmail.com>
	 <vvmlk0$3blcs$1@dont-email.me>
	 <c6904fbe42c4ad1eb3d1dcc50d18e6e75f159d75.camel@gmail.com>
	 <vvmmtd$3bqvb$1@dont-email.me>
	 <9f5774bfb493325652f97d72f760ad98442c333d.camel@gmail.com>
	 <vvmnl5$3c2gn$1@dont-email.me>
	 <f430dde2c5313bf6657c11b7a9eca183e2432291.camel@gmail.com>
	 <vvmou2$3cac3$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Injection-Date: Sat, 10 May 2025 08:00:07 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c665478d8699930ce63ac26f3a79e21a";
	logging-data="3518251"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/Va7dzUCHBTBH9xzmrkjBi"
User-Agent: Evolution 3.54.3 (3.54.3-1.fc41)
Cancel-Lock: sha1:BXZLnM4SleKtrU3DrVTiC7WNXIY=
In-Reply-To: <vvmou2$3cac3$1@dont-email.me>
Bytes: 4781

On Sat, 2025-05-10 at 00:41 -0500, olcott wrote:
> On 5/10/2025 12:27 AM, wij wrote:
> > On Sat, 2025-05-10 at 00:19 -0500, olcott wrote:
> > > On 5/10/2025 12:13 AM, wij wrote:
> > > > On Sat, 2025-05-10 at 00:06 -0500, olcott wrote:>>
> > > > > When mathematical mapping is properly understood
> > > > > it will be known that functions computed by models
> > > > > of computation must transform their input into
> > > > > outputs according to the specific steps of an
> > > > > algorithm.
> > > > >=20
> > > > > _DDD()
> > > > > [00002172] 55=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 pus=
h ebp=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ; housekeeping
> > > > > [00002173] 8bec=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 mov ebp,esp=
=C2=A0=C2=A0 ; housekeeping
> > > > > [00002175] 6872210000 push 00002172 ; push DDD
> > > > > [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
> > > > > [0000217f] 83c404=C2=A0=C2=A0=C2=A0=C2=A0 add esp,+04
> > > > > [00002182] 5d=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 pop=
 ebp
> > > > > [00002183] c3=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ret
> > > > > Size in bytes:(0018) [00002183]
> > > > >=20
> > > > > For example HHH(DDD) only correctly map to the
> > > > > behavior that its input actually specifies by correctly
> > > > > emulating DDD according to the rules of the x86 language.
> > > > >=20
> > > > > This causes the first four instructions of DDD
> > > > > to be emulated followed by HHH emulating itself
> > > > > emulating the first three instructions of DDD.
> > > > >=20
> > > > > It is right at this recursive simulation just
> > > > > before HHH(DDD) is called again that HHH recognizes
> > > > > the repeating pattern and rejects DDD.
> > > >=20
> > > > Yes, but you still did not answer the question: Is POOH exactly abo=
ut HP?
> > > >=20
> > >=20
> > > =C2=A0=C2=A0>>>>> H(D)=3D1 if D() halt.
> > > =C2=A0=C2=A0>>>>> H(D)=3D0 if D() not halt.
> > >=20
> > > Right now it is mostly about proving the
> > > above requirements are is mistaken.
> > >=20
> >=20
> > Why is the requirement invalid?
> >=20
> > H(D)=3D1 if D() halt.
> > H(D)=3D0 if D() not halt.
> >=20
>=20

> The notion that the behavior specified by the finite
> string input to a simulating termination analyzer

POOH reads(takes) its input as a function, not 'finite string'.
Are you talking about POOH now? There is no POOH that takes
'finite string'.

> does sometimes differ from the behavior of its direct
> execution. It is a provably different sequence of steps.

So, you are talking about the behavior of the 'simulating termination analy=
zer'
i.e. POOH? (not really about the HP)