Deutsch English Français Italiano |
<v4l2mr$3l6pa$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory,sci.logic,comp.ai.philosophy Subject: Re: H(D,D) cannot even be asked about the behavior of D(D) V3 ---IGNORING ALL OTHER REPLIES Date: Sat, 15 Jun 2024 16:56:43 -0500 Organization: A noiseless patient Spider Lines: 139 Message-ID: <v4l2mr$3l6pa$1@dont-email.me> References: <v4kf3h$3h3iu$7@dont-email.me> <v4kfoa$2218$19@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sat, 15 Jun 2024 23:56:44 +0200 (CEST) Injection-Info: dont-email.me; posting-host="65be3053bb2d9b452c13d5ddc3153d90"; logging-data="3840810"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+YtG8u/r8kpSipVUtiqrtr" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:gPIllbZEIjrka4B+5FcirVsm4v8= In-Reply-To: <v4kfoa$2218$19@i2pn2.org> Content-Language: en-US Bytes: 6855 On 6/15/2024 11:33 AM, Richard Damon wrote: > On 6/15/24 12:22 PM, olcott wrote: >> On 6/13/2024 8:24 PM, Richard Damon wrote: >> > On 6/13/24 11:32 AM, olcott wrote: >> >> >> >> It is contingent upon you to show the exact steps of how H computes >> >> the mapping from the x86 machine language finite string input to >> >> H(D,D) using the finite string transformation rules specified by >> >> the semantics of the x86 programming language that reaches the >> >> behavior of the directly executed D(D) >> >> >> > >> > Why? I don't claim it can. >> >> The first six steps of this mapping are when instructions >> at the machine address range of [00000cfc] to [00000d06] >> are simulated/executed. >> >> After that the behavior of D correctly simulated by H diverges >> from the behavior of D(D) because the call to H(D,D) by D >> correctly simulated by H cannot possibly return to D. > > Nope, the steps of D correctly simulated by H will EXACTLY match the > steps of D directly executed, until H just gives up and guesses. > When we can see that D correctly simulated by H cannot possibly reach its simulated final state at machine address [00000d1d] after one recursive simulation and the same applies for 2,3,...N recursive simulations then we can abort the simulated input and correctly report that D correctly simulated by H DOES NOT HALT. That you call this a guess seems disingenuous at least and dishonest at most. it is as if you are denying mathematical induction. > By your defintions, the ONLY correct simulation of D by H MUST follow > the call H into the instructions of H, and then continue there forever > until H either gives up simulating, or it happens to simulate the return > from H to D (which doesn't look like it will ever happen). > Yes and when I say 2 + 3 = 5 you are not free to disagree and be correct. > This is the ONLY thing that matches your definition of Correct Simulation. > The x86 language defines the semantics of correct simulation that you denigrate this to my opinion seems disingenuous at least and dishonest at most. > And that means that you definition of the "Input" is shown to be > incorrect (or insufficient for H to do what it needs to do). The input > CAN NOT be just those instructions shown below, but must include the > contents of ALL the memory used by the program. > It is the sequence of x86 instructions specified by the machine language of D that is being examined. We cannot simply ignore the recursive simulation effect of the call from D to H(D,D). That D makes this call is what make D correctly simulated by H fail to halt. > And this comes out naturally, because to ask about the program > represented by the input, the input needs to represent a FULL PROGRAM, > which includes ALL of the algorithm used by the code, so ALL of the > program. > That D calls H in recursive simulation is what makes D correctly simulated by H never halt. H is merely watching what D does until it see that D correctly simulated by H cannot possibly halt on the basis of something just like mathematical induction. We can directly see that 1,2,3...N recursive simulations do not result in D correctly simulated by H reaching its simulated final state of [00000d1d]. > Thus, the input "D", includes its copy of H that was DEFINED by Linz and > Sipser to be part of the machine, and when you do your logic, you can't > change that code. > When Ĥ is applied to ⟨Ĥ⟩ Ĥ.q0 ⟨Ĥ⟩ ⊢* embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ ⊢* Ĥ.qy ∞ Ĥ.q0 ⟨Ĥ⟩ ⊢* embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ ⊢* Ĥ.qn (a) Ĥ copies its input ⟨Ĥ⟩ (b) Ĥ invokes embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ (c) embedded_H simulates ⟨Ĥ⟩ ⟨Ĥ⟩ (d) simulated ⟨Ĥ⟩ copies its input ⟨Ĥ⟩ (e) simulated ⟨Ĥ⟩ invokes simulated embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ (f) simulated embedded_H simulates ⟨Ĥ⟩ ⟨Ĥ⟩ (g) goto (d) with one more level of simulation When embedded_H is a UTM we can see that Ĥ ⟨Ĥ⟩ never halts. This by itself proves that the same thing applies when embedded_H is based on a UTM that stops simulating and rejects its input at any point after it sees two complete simulations show a pair of identical TMD's are simulating a pair of identical inputs. We can see this thus proving recursive simulation. > If this means that you can't do your imagining of different Hs, then you > can't do that operation. > > Any H you imagine being given the same input as this H, must see the > code for that original H, not the new hypothetical H you are imagining. > > Which sort of blows you your whole argument. > >> >> _D() >> [00000cfc](01) 55 push ebp >> [00000cfd](02) 8bec mov ebp,esp >> [00000cff](03) 8b4508 mov eax,[ebp+08] >> [00000d02](01) 50 push eax ; push D >> [00000d03](03) 8b4d08 mov ecx,[ebp+08] >> [00000d06](01) 51 push ecx ; push D >> [00000d07](05) e800feffff call 00000b0c ; call H >> [00000d0c](03) 83c408 add esp,+08 >> [00000d0f](02) 85c0 test eax,eax >> [00000d11](02) 7404 jz 00000d17 >> [00000d13](02) 33c0 xor eax,eax >> [00000d15](02) eb05 jmp 00000d1c >> [00000d17](05) b801000000 mov eax,00000001 >> [00000d1c](01) 5d pop ebp >> [00000d1d](01) c3 ret >> Size in bytes:(0034) [00000d1d] >> > -- Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer