| Deutsch English Français Italiano |
|
<bcf949e2aca3a7b537f4457049ac2e3884570bbf@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: joes <noreply@example.org> Newsgroups: comp.theory Subject: Re: embedded_H applied to =?UTF-8?B?4p+oxKTin6kg4p+oxKTin6k=?= Date: Mon, 29 Jul 2024 20:08:44 -0000 (UTC) Organization: i2pn2 (i2pn.org) Message-ID: <bcf949e2aca3a7b537f4457049ac2e3884570bbf@i2pn2.org> References: <v6rg65$32o1o$3@dont-email.me> <v734ct$mjis$2@dont-email.me> <056325e336f81a50f4fb9e60f90934eaac823d22@i2pn2.org> <v73gk2$obtd$1@dont-email.me> <e2958e7ea04d53590c79b53bfb4bc9dff468772b@i2pn2.org> <v742r2$s48s$2@dont-email.me> <210383b2ee318f68a96d94aec314ee8b93f79b7f@i2pn2.org> <v75u22$19j7l$4@dont-email.me> <fde630817c49562bc765bdbc98e16a1582bcad53@i2pn2.org> <v78mda$1smtm$2@dont-email.me> <v7d5cl$2t3ja$1@dont-email.me> <v7ds0o$30pvh$3@dont-email.me> <v7fs29$3f4g7$1@dont-email.me> <v7gd17$3hlc2$2@dont-email.me> <v7ikn4$1jv5$1@dont-email.me> <v7j2pg$3o7r$3@dont-email.me> <v7l3di$idv1$1@dont-email.me> <v7lnrf$luh0$1@dont-email.me> <v7niqp$13ghd$1@dont-email.me> <v7obbn$17h8r$1@dont-email.me> <v7qfm6$1m5ce$1@dont-email.me> <v7qvs3$1onhe$2@dont-email.me> <v7vnnn$2os1v$1@dont-email.me> <v80akb$2rabc$5@dont-email.me> <v82751$39qck$1@dont-email.me> <v82v0a$3dftr$4@dont-email.me> <v84tv8$3rmit$1@dont-email.me> <v88f8e$i7kl$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Mon, 29 Jul 2024 20:08:44 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="797754"; mail-complaints-to="usenet@i2pn2.org"; posting-account="nS1KMHaUuWOnF/ukOJzx6Ssd8y16q9UPs1GZ+I3D0CM"; User-Agent: Pan/0.145 (Duplicitous mercenary valetism; d7e168a git.gnome.org/pan2) X-Spam-Checker-Version: SpamAssassin 4.0.0 Bytes: 5460 Lines: 73 Am Mon, 29 Jul 2024 11:16:13 -0500 schrieb olcott: > On 7/28/2024 3:02 AM, Mikko wrote: >> On 2024-07-27 14:08:10 +0000, olcott said: >>> On 7/27/2024 2:21 AM, Mikko wrote: >>>> On 2024-07-26 14:08:11 +0000, olcott said: >>>>> On 7/26/2024 3:45 AM, Mikko wrote: >>>>>> On 2024-07-24 13:33:55 +0000, olcott said: >>>>>>> On 7/24/2024 3:57 AM, Mikko wrote: >>>>>>>> On 2024-07-23 13:31:35 +0000, olcott said: >>>>>>>>> On 7/23/2024 1:32 AM, 0 wrote: >>>>>>>>>> On 2024-07-22 13:46:21 +0000, olcott said: >>>>>>>>>>> On 7/22/2024 2:57 AM, Mikko wrote: >>>>>>>>>>>> On 2024-07-21 13:34:40 +0000, olcott said: >>>>>>>>>>>>> On 7/21/2024 4:34 AM, Mikko wrote: >>>>>>>>>>>>>> On 2024-07-20 13:11:03 +0000, olcott said: >>>>>>>>>>>>>>> On 7/20/2024 3:21 AM, Mikko wrote: >>>>>>>>>>>>>>>> On 2024-07-19 14:08:24 +0000, olcott said: >>>>>>>>>>>>> (b) We know that a decider is not allowed to report on the >>>>>>>>>>>>> behavior computation that itself is contained within. >>>>>>>>>>>> >>>>>>>>>>>> No, we don't. There is no such prohibition. >>>>>>>>>>> Another different TM can take the TM description of this >>>>>>>>>>> machine and thus accurately report on its actual behavior. >>>>>>>>>> If a Turing machine can take a description of a TM as its input >>>>>>>>>> or as a part of its input it can also take its own description. >>>>>>>>>> Every Turing machine can be given its own description as input >>>>>>>>>> but a Turing machine may interprete it as something else. >>>>>>>>>> >>>>>>>>> In this case we have two x86utm machines that are identical >>>>>>>>> except that DDD calls HHH and DDD does not call HHH1. >>>>>>>> >>>>>>>> That DDD calls HHH and DDD does not call HHH1 is not a difference >>>>>>>> between two unnamed turing machines. >>>>>>>> >>>>>>> The same thing happens at the Peter Linz Turing Machine level I >>>>>>> will provide that more difficult example if and only if you prove >>>>>>> that you understand this one. Way to disgruntle your "reviewers". >>>>>> However, Peter Linz does not call taht same thing a difference. >>>> Some of the properties you assert exsit actually do exist, some >>>> don't. >>> (a) Ĥ copies its input ⟨Ĥ⟩ >>> (b) Ĥ invokes embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ >>> (c) embedded_H simulates ⟨Ĥ⟩ ⟨Ĥ⟩ >>> (d) simulated ⟨Ĥ⟩ copies its input ⟨Ĥ⟩ >>> (e) simulated ⟨Ĥ⟩ invokes simulated embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ >>> (f) simulated embedded_H simulates ⟨Ĥ⟩ ⟨Ĥ⟩ >>> (g) goto (d) with one more level of simulation >>> You are supposed to evaluate the above as a contiguous sequence of >>> moves such that non-halting behavior is identified. >> >> The above is an obvious tight loop of (d), (e), (f), and (g). >> Its relevance (it any) to the topic of the discussion is not obvious. >> > When we compute the mapping from the input to embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ > to the behavior specified by this input we know that embedded_H is > correct to transition to Ĥ.qn. > Everyone say no, no that it not the behavior of the computation that > embedded_H is contained within: Ĥ applied to ⟨Ĥ⟩. > It is not supposed to be (or allowed to be) the behavior of the > executing Turing machine that embedded_H is contained within. > It is only supposed to be the behavior that the input to embedded_H > specifies and this includes recursive simulation. From the fact that the simulation is recursive we know that the embedded H is the same as the outer one. -- Am Sat, 20 Jul 2024 12:35:31 +0000 schrieb WM in sci.math: It is not guaranteed that n+1 exists for every n.