| Deutsch English Français Italiano |
|
<e85fad21effef2b8fb74485a025b65858a3f385c@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: Richard Damon <richard@damon-family.org> Newsgroups: comp.theory Subject: Re: Every sufficiently competent C programmer knows --- Semantic Property of Finite String Date: Fri, 14 Mar 2025 21:57:39 -0400 Organization: i2pn2 (i2pn.org) Message-ID: <e85fad21effef2b8fb74485a025b65858a3f385c@i2pn2.org> References: <vqntaq$1jut5$1@dont-email.me> <vqp388$1tvqa$1@dont-email.me> <vqpdv9$202b2$2@dont-email.me> <vqperb$20c9k$2@dont-email.me> <E6mcnWv3nMa66036nZ2dnZfqnPWdnZ2d@brightview.co.uk> <vqs2n8$2knng$1@dont-email.me> <5429f6c8b8a8a79e06b4aeefe677cc54a2a636bf@i2pn2.org> <vqt9jp$2spcd$6@dont-email.me> <vqtag4$2t2hb$2@dont-email.me> <vqtgl0$2u7fo$1@dont-email.me> <924e22fc46d629b311b16a954dd0bed980a0a094@i2pn2.org> <vqvg7s$3s1qt$3@dont-email.me> <vqvgb4$3kfru$5@dont-email.me> <vqvi94$3tk5h$1@dont-email.me> <vr01sq$9741$1@dont-email.me> <0672fec6cb2a5c56fd674bbbb3d2b2101c8f295f@i2pn2.org> <vr185f$1aah4$1@dont-email.me> <87bju3jswc.fsf@nosuchdomain.example.com> <vr2d01$27fvs$1@dont-email.me> <vr2ju5$2deaa$3@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sat, 15 Mar 2025 01:57:39 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="228289"; mail-complaints-to="usenet@i2pn2.org"; posting-account="diqKR1lalukngNWEqoq9/uFtbkm5U+w3w6FQ0yesrXg"; User-Agent: Mozilla Thunderbird In-Reply-To: <vr2ju5$2deaa$3@dont-email.me> Content-Language: en-US X-Spam-Checker-Version: SpamAssassin 4.0.0 Bytes: 3077 Lines: 32 On 3/14/25 9:08 PM, olcott wrote: > On 3/14/2025 6:09 PM, Andy Walker wrote: >> On 14/03/2025 19:48, Keith Thompson wrote: >>> [...] That would imply that [PO] could solve >>> Goldbach's Conjecture, among other things, but I haven't seen him >>> do so. >> >> Perhaps [just about] worth noting that a sufficiently long >> [but not "infinite"] brute force attack on the GC [and many other >> similar conjectures] would resolve the issue. > > Not if GC is true and the proof cannot algorithmically > compressed into a finite sequence of steps. So, are you now admitting that it is possible for GC to be true, and no finite proof (the only kind of proof that exists) might exist, and thus that GC might be the instance that makes the system incomplete? > >> Basically, if you >> have a program [eg, TM] of size N by some suitable measure [eg, TM >> states] then within [eg] BB(N) steps it must find the counter-example >> [if there is one] or else there isn't one [and the GC is proven true], >> where BB is the Busy Beaver function. Of course, BB is uncomputable, >> but that doesn't mean specific individual values are uncomputable, >> just that there is no TM that computes it /in general/. >> >> [I have mentioned here before that BB gives us a much less >> troublesome way of attacking the HP than the standard proofs.] >> > >