Deutsch   English   Français   Italiano  
<fef6ed5334bb98cd162c9a339ba227f529437e8c.camel@gmail.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: wij <wyniijj5@gmail.com>
Newsgroups: comp.theory
Subject: Re: How to write a self-referencial TM?
Date: Mon, 19 May 2025 07:54:17 +0800
Organization: A noiseless patient Spider
Lines: 377
Message-ID: <fef6ed5334bb98cd162c9a339ba227f529437e8c.camel@gmail.com>
References: <1e4f1a15826e67e7faf7a3c2104d09e9dadc6f06.camel@gmail.com>
	 <479eebef3bd93e82c8fe363908b254b11d15a799.camel@gmail.com>
	 <1002jkk$2k00a$3@dont-email.me>
	 <05e306f20fcb7c88c497e353aaecd36b30fc752a.camel@gmail.com>
	 <10053hb$3759k$1@dont-email.me>
	 <879b3c552bad9da9885e41a298b570c92bef1aaf.camel@gmail.com>
	 <10061h6$3de5f$1@dont-email.me>
	 <4bce5af2b2b8cd198af611e5d8d56598cab15b0a.camel@gmail.com>
	 <10067ok$3ib39$1@dont-email.me>
	 <e63d3083ddf6b9ab172cc24c07155410d81ce5b4.camel@gmail.com>
	 <1007lrp$3r388$1@dont-email.me>
	 <0cbe88d46c63af596e4d2ad6a846e61b7efb14bb.camel@gmail.com>
	 <1008fhf$53u$1@dont-email.me>
	 <cd31647abcc33f0978415df34ec2c8d41d886591.camel@gmail.com>
	 <100a7e4$efgi$1@dont-email.me>
	 <f94f006b40c3ca204d41be9b4507280a3a4fc17b.camel@gmail.com>
	 <100aolc$hq2u$1@dont-email.me>
	 <943f3512f1c253f770eb41519145d4159c0cd6aa.camel@gmail.com>
	 <100dhiv$167g2$1@dont-email.me>
	 <53caddf143d1319d6aef95fb8b349f6b6e07d288.camel@gmail.com>
	 <100dlrb$16vdn$3@dont-email.me>
	 <bbd53c889659463afb5e655a34eafcaf6482b94f@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Injection-Date: Mon, 19 May 2025 01:54:18 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="745d7f42001f5c9522e6574626815520";
	logging-data="1316999"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18sahzo3LdJYTwDiaunnGIY"
User-Agent: Evolution 3.54.3 (3.54.3-1.fc41)
Cancel-Lock: sha1:RMkt111Ad+2Z/XUf7Ri9J3e6bG0=
In-Reply-To: <bbd53c889659463afb5e655a34eafcaf6482b94f@i2pn2.org>
Bytes: 18007

On Sun, 2025-05-18 at 19:09 -0400, Richard Damon wrote:
> On 5/18/25 6:09 PM, olcott wrote:
> > On 5/18/2025 4:46 PM, wij wrote:
> > > On Sun, 2025-05-18 at 15:57 -0500, olcott wrote:
> > > > On 5/18/2025 3:35 PM, wij wrote:
> > > > > On Sat, 2025-05-17 at 14:39 -0500, olcott wrote:
> > > > > > On 5/17/2025 2:26 PM, wij wrote:
> > > > > > > On Sat, 2025-05-17 at 15:45 +0100, Mike Terry wrote:
> > > > > > > > On 17/05/2025 04:01, wij wrote:
> > > > > > > > > On Fri, 2025-05-16 at 23:51 +0100, Mike Terry wrote:
> > > > > > > > > > On 16/05/2025 20:35, wij wrote:
> > > > > > > > > > > On Fri, 2025-05-16 at 16:33 +0100, Mike Terry wrote:
> > > > > > > > > > > > On 16/05/2025 12:40, wij wrote:
> > > > > > > > > > > > > On Fri, 2025-05-16 at 03:26 +0100, Mike Terry wro=
te:
> > > > > > > > > > > > > > On 16/05/2025 02:47, wij wrote:
> > > > > > > > > > > > > > > On Fri, 2025-05-16 at 01:40 +0100, Mike Terry=
 wrote:
> > > > > > > > > > > > > > > > On 15/05/2025 19:49, wij wrote:
> > > > > > > > > > > > > > > > > On Thu, 2025-05-15 at 17:08 +0100, Mike T=
erry wrote:
> > > > > > > > > > > > > > > > > > On 14/05/2025 18:53, wij wrote:
> > > > > > > > > > > > > > > > > > > On Wed, 2025-05-14 at 12:24 -0500, ol=
cott wrote:
> > > > > > > > > > > > > > > > > > > > On 5/14/2025 11:43 AM, wij wrote:
> > > > > > > > > > > > > > > > > > > > > On Wed, 2025-05-14 at 09:51 -0500=
, olcott wrote:
> > > > > > > > > > > > > > > > > > > > > > On 5/14/2025 12:13 AM, wij wrot=
e:
> > > > > > > > > > > > > > > > > > > > > > > Q: Write a turing machine tha=
t performs D function=20
> > > > > > > > > > > > > > > > > > > > > > > (which
> > > > > > > > > > > > > > > > > > > > > > > calls
> > > > > > > > > > > > > > > > > > > > > > > itself):
> > > > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > > > void D() {
> > > > > > > > > > > > > > > > > > > > > > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 D();
> > > > > > > > > > > > > > > > > > > > > > > }
> > > > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > > > Easy?
> > > > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > > That is not a TM.
> > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > It is a C program that exists. Th=
erefore, there must=20
> > > > > > > > > > > > > > > > > > > > > be a
> > > > > > > > > > > > > > > > > > > > > equivalent
> > > > > > > > > > > > > > > > > > > > > TM.
> > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > > To make a TM that references it=
self the closest
> > > > > > > > > > > > > > > > > > > > > > thing is a UTM that simulates i=
ts own TM source-code.
> > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > > How does a UTM simulate its own T=
M source-code?
> > > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > > You run a UTM that has its own sour=
ce-code on its tape.
> > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > > What is exactly the source-code on it=
s tape?
> > > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > Every UTM has some scheme which can be =
applied to a (TM=20
> > > > > > > > > > > > > > > > > > & input tape)
> > > > > > > > > > > > > > > > > > that
> > > > > > > > > > > > > > > > > > is to
> > > > > > > > > > > > > > > > > > be
> > > > > > > > > > > > > > > > > > simulated.
> > > > > > > > > > > > > > > > > > The
> > > > > > > > > > > > > > > > > > scheme says how to turn the (TM + input=
 tape) into a=20
> > > > > > > > > > > > > > > > > > string of symbols
> > > > > > > > > > > > > > > > > > that
> > > > > > > > > > > > > > > > > > represent
> > > > > > > > > > > > > > > > > > that
> > > > > > > > > > > > > > > > > > computation.
> > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > So to answer your question, the "source=
-code on its=20
> > > > > > > > > > > > > > > > > > tape" is the result
> > > > > > > > > > > > > > > > > > of
> > > > > > > > > > > > > > > > > > applying
> > > > > > > > > > > > > > > > > > the
> > > > > > > > > > > > > > > > > > UTM's
> > > > > > > > > > > > > > > > > > particular scheme to the combination (U=
TM, input tape)=20
> > > > > > > > > > > > > > > > > > that is to be
> > > > > > > > > > > > > > > > > > simulated.
> > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > If you're looking for the exact string =
symbols,=20
> > > > > > > > > > > > > > > > > > obviously you would need
> > > > > > > > > > > > > > > > > > to
> > > > > > > > > > > > > > > > > > specify
> > > > > > > > > > > > > > > > > > the
> > > > > > > > > > > > > > > > > > exact
> > > > > > > > > > > > > > > > > > UTM
> > > > > > > > > > > > > > > > > > being used, because every UTM will have=
 a different=20
> > > > > > > > > > > > > > > > > > answer to your
> > > > > > > > > > > > > > > > > > question.
> > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > > Mike.
> > > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > > People used to say UTM can simulate all T=
M. I was=20
> > > > > > > > > > > > > > > > > questing such a UTM.
> > > > > > > > > > > > > > > > > Because you said "Every UTM ...", so what=
 is the source=20
> > > > > > > > > > > > > > > > > of such UTM?
> > > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > > Yes, a UTM can simulate any TM including it=
self.=C2=A0=20
> > > > > > > > > > > > > > > > (Nothing magical changes
> > > > > > > > > > > > > > > > when
> > > > > > > > > > > > > > > > a
> > > > > > > > > > > > > > > > UTM
> > > > > > > > > > > > > > > > simulates
> > > > > > > > > > > > > > > > itself, as opposed to some other TM.)
> > > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > > Supposed UTM exists, and denoted as U(X), X d=
enotes the=20
> > > > > > > > > > > > > > > tape contents of the
> > > > > > > > > > > > > > > encoding of a TM. And, U(X) should function t=
he same like X.
> > > > > > > > > > > > > > > Given instance U(U(f)), it should function li=
ke f from the=20
> > > > > > > > > > > > > > > above definition.
> > > > > > > > > > > > > > > But, U(U(f)) would fall into a 'self-referenc=
e' trap.
> > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > There is no self-reference trap.
> > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > In your notation:
> > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > -=C2=A0 f represents some computation.
> > > > > > > > > > > > > > -=C2=A0 U(f) represents U being run with f on i=
ts tape.
> > > > > > > > > > > > > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 Note this is itself a computation, distinct from=20
> > > > > > > > > > > > > > f of course
> > > > > > > > > > > > > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 but having the same behaviour.
> > > > > > > > > > > > > > -=C2=A0 U(U(f)) represents U simulating the pre=
vious computation.
> > > > > > > > > > > > > >=20
> > > > > > > > > > > > > > There is no reason U(f) cannot be simulated by =
U.=C2=A0 U will=20
> > > > > > > > > > > > > > have no knowledge that
> > > > > > > > > > > > > > it
> > > > > > > > > > > > > > is
========== REMAINDER OF ARTICLE TRUNCATED ==========