Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <b119fc7a4b5d0599a084a3af604b13ac9782ec11@i2pn2.org>
Deutsch   English   Français   Italiano  
<b119fc7a4b5d0599a084a3af604b13ac9782ec11@i2pn2.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail
From: Richard Damon <richard@damon-family.org>
Newsgroups: comp.theory,sci.logic
Subject: Re: Ben thinks the professor Sipser is wrong
Date: Thu, 4 Jul 2024 21:56:45 -0400
Organization: i2pn2 (i2pn.org)
Message-ID: <b119fc7a4b5d0599a084a3af604b13ac9782ec11@i2pn2.org>
References: <tic5tr$25uem$6@dont-email.me> <8735bpq5jh.fsf@bsb.me.uk>
 <v66o6i$2rv8q$3@dont-email.me>
 <8bbce1bb519f205ef865a07719bf35f68170ad61@i2pn2.org>
 <v66psp$2scuh$1@dont-email.me>
 <990598b3a90c559f7125530edef9c5a0ef2c7102@i2pn2.org>
 <v677vh$2u7lu$2@dont-email.me>
 <dbebddf487aebc1c848fc07abb0f7800e068f34e@i2pn2.org>
 <v67d2s$2v7vf$1@dont-email.me>
 <9d7ed80b2fc8e04050d413c3f922ce409d55f31c@i2pn2.org>
 <v67h9h$2vnls$1@dont-email.me>
 <6a841a071e812698de7f236c0acfa127b9e321c3@i2pn2.org>
 <v67ikj$2vtu0$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 5 Jul 2024 01:56:45 -0000 (UTC)
Injection-Info: i2pn2.org;
	logging-data="2173531"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="diqKR1lalukngNWEqoq9/uFtbkm5U+w3w6FQ0yesrXg";
User-Agent: Mozilla Thunderbird
X-Spam-Checker-Version: SpamAssassin 4.0.0
In-Reply-To: <v67ikj$2vtu0$1@dont-email.me>
Content-Language: en-US
Bytes: 11689
Lines: 237

On 7/4/24 9:35 PM, olcott wrote:
> On 7/4/2024 8:21 PM, Richard Damon wrote:
>> On 7/4/24 9:12 PM, olcott wrote:
>>> On 7/4/2024 7:33 PM, Richard Damon wrote:
>>>> On 7/4/24 8:00 PM, olcott wrote:
>>>>> On 7/4/2024 6:18 PM, Richard Damon wrote:
>>>>>> On 7/4/24 6:33 PM, olcott wrote:
>>>>>>> On 7/4/2024 5:21 PM, Richard Damon wrote:
>>>>>>>> On 7/4/24 2:32 PM, olcott wrote:
>>>>>>>>> On 7/4/2024 1:17 PM, Richard Damon wrote:
>>>>>>>>>> On 7/4/24 2:04 PM, olcott wrote:
>>>>>>>>>>> <MIT Professor Sipser agreed to ONLY these verbatim words 
>>>>>>>>>>> 10/13/2022>
>>>>>>>>>>>      If simulating halt decider H correctly simulates its 
>>>>>>>>>>> input D
>>>>>>>>>>>      until H correctly determines that its simulated D would 
>>>>>>>>>>> never
>>>>>>>>>>>      stop running unless aborted then
>>>>>>>>>>>
>>>>>>>>>>>      H can abort its simulation of D and correctly report that D
>>>>>>>>>>>      specifies a non-halting sequence of configurations.
>>>>>>>>>>> </MIT Professor Sipser agreed to ONLY these verbatim words 
>>>>>>>>>>> 10/13/2022>
>>>>>>>>>>>
>>>>>>>>>>> On 10/14/2022 7:44 PM, Ben Bacarisse wrote:
>>>>>>>>>>>  > I don't think that is the shell game.  PO really /has/ an 
>>>>>>>>>>> H (it's
>>>>>>>>>>>  > trivial to do for this one case) that correctly determines 
>>>>>>>>>>> that P(P)
>>>>>>>>>>>  > *would* never stop running *unless* aborted.
>>>>>>>>>>> ...
>>>>>>>>>>>  > But H determines (correctly) that D would not halt if it 
>>>>>>>>>>> were not
>>>>>>>>>>>  > halted.  That much is a truism.
>>>>>>>>>>>
>>>>>>>>>>> Ben clearly agrees that the above criteria have been met,
>>>>>>>>>>> yet feels that professor Sipser was tricked into agreeing
>>>>>>>>>>> that this means that:
>>>>>>>>>>>      H can abort its simulation of D and correctly report that D
>>>>>>>>>>>      specifies a non-halting sequence of configurations.
>>>>>>>>>>>
>>>>>>>>>>> I spent two years deriving those words that Professor Sipser
>>>>>>>>>>> agreed with. It seems to me that every software engineer would
>>>>>>>>>>> agree that the second part is logically entailed by the first 
>>>>>>>>>>> part.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> You mean you WASTED two years and set a trap for your self 
>>>>>>>>>> that you fell into.
>>>>>>>>>>
>>>>>>>>>> The problem is that Ben is adopting your definitions that 
>>>>>>>>>> professor Sipser is not using.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Ben agrees that my criteria have been met according to their
>>>>>>>>> exact words. If you want to lie about that I won't talk to
>>>>>>>>> you again.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Which meant different things, so not the same.
>>>>>>>>
>>>>>>>> The biggest problem is your H/P interlocking program pair is 
>>>>>>>> something outside the normal scope of Computation theory.
>>>>>>>>
>>>>>>>> The way you have built your Deicder/Decider combination isn't 
>>>>>>>> actualy within the definition of normal Computaiton Theory, as 
>>>>>>>> that would have Decider as a totally independent program from 
>>>>>>>> the program it is deciding on.
>>>>>>>>
>>>>>>>> Your H and D aren't that sort of thing because they are 
>>>>>>>> interwined into a single memory space, and even share code.
>>>>>>>>
>>>>>>>> This makes some things possible to do about the pair that can 
>>>>>>>> not be done if they were independent programs, like H being able 
>>>>>>>> to detect that D calls itself (but not copies of itself, which 
>>>>>>>> is why you don't allow those copies, as that breasks your lie).
>>>>>>>>
>>>>>>>
>>>>>>> Ever heard of string comparison?
>>>>>>> H can detect that D calls copies of itself.
>>>>>>> That merely makes the details more complex.
>>>>>>
>>>>>> Nope, doesn't work. Particularly for Turing Machines.
>>>>>>
>>>>>> The problem is that the seperate compliation and linking with the 
>>>>>> resultant different address makes the byte pattern for the code 
>>>>>> not necessarily a duplicate.
>>>>>>
>>>>>> When you consider that the input is antagonistic, it can also 
>>>>>> intentionally make alterations that do not change the outward 
>>>>>> behavior, but do change the byte code.
>>>>>>
>>>>>> I seem to remember that it has been proven that, in general, the 
>>>>>> identification of an equivalent copy of yourself is uncomputable.
>>>>>>
>>>>>> We went over this before, and you could never understand it.
>>>>>>
>>>>>>>
>>>>>>>> Another of the big effect of thins, is that the way you defined 
>>>>>>>> it, D actually does have access to the decider that is going to 
>>>>>>>> decide it (if we follow your rule and name the decider H). This 
>>>>>>>> can turn what used to be an independent fully defined program P 
>>>>>>>> into a dependent program template. 
>>>>>>>
>>>>>>> The key issue is that by my basis structure that applies equally
>>>>>>> to DD correctly simulated by HH as it applies to ⟨Ĥ⟩ correctly
>>>>>>> simulated by embedded_H is that the paradoxical decision point
>>>>>>> cannot be reached. This converts the "impossible" problem into a
>>>>>>> difficult one.
>>>>>>
>>>>>> Nope. Your basic structure can not be converted back into a pair 
>>>>>> of Turing Machihes, showing it isn't based on actual Computations.
>>>>>>
>>>>>>>
>>>>>>>> Undet THAT condition, Ben agreed that yoUr H could conclude that 
>>>>>>>> no version of H could simulate the version of D that uses it, to 
>>>>>>>> its final state. Since P is a template, and not a program, it 
>>>>>>>> doesn't have the normal Objective definition of behavior, and 
>>>>>>>> thus your subjective one might need to be used, even with its 
>>>>>>>> problems.
>>>>>>>>
>>>>>>>
>>>>>>> The key point that you must acknowledge before continuing is
>>>>>>> that the criteria is met for H/D. I can't tolerate one more
>>>>>>> reply where you deny this.
>>>>>>
>>>>>> But your criteria isn't a legal critieria. The "Behavior" of the 
>>>>>> input must be an objective property of just that input, and thus 
>>>>>> can not be something that depends on the decider looking at it.
>>>>>>
>>>>>
>>>>> It must depend on the decider looking at it or we are required
>>>>> to ignore the actual fact that DDD does call HHH in recursive
>>>>> simulation. We are certainly not allowed to ignore any actual
>>>>> facts. If you can't get that then it seems we may be done talking.
>>>>
>>>>
>>>> Why do you say that? Yes, it males the problem harder (in fact in 
>>>> some cases impossible) but that is the rule.
>>>>
>>>> You seem to have a problem with the simple fact that some maps are 
>>>> just imposisble to compute.
>>>>
>>>> But that MUST be true as there is an order of infinity more maps 
>>>> than possible deciders, so most maps must not be computable.
>>>>
>>>> It CAN'T depend on the decider, 
>>>
>>> It must depend on the decider because that is an aspect
>>> that the execution trace of DDD correctly emulated by
>>> HHH specifies at machine address 0000217a.
>>
>> Nope, the correct answer depend on if DDD Halts or not, as determined 
>> by the direct execution of DDD, since that IS the behavior defined for 
>> DDD.
>>
> 
> _DDD()
> [00002172] 55         push ebp      ; housekeeping
> [00002173] 8bec       mov ebp,esp   ; housekeeping
> [00002175] 6872210000 push 00002172 ; push DDD
> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
> [0000217f] 83c404     add esp,+04
> [00002182] 5d         pop ebp
> [00002183] c3         ret
> Size in bytes:(0018) [00002183]
> 
========== REMAINDER OF ARTICLE TRUNCATED ==========