Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v4m5l6$3v4ql$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v4m5l6$3v4ql$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Mikko <mikko.levanto@iki.fi>
Newsgroups: comp.theory
Subject: Re: H(D,D) cannot even be asked about the behavior of D(D) V3 ---IGNORING ALL OTHER REPLIES
Date: Sun, 16 Jun 2024 10:53:10 +0300
Organization: -
Lines: 46
Message-ID: <v4m5l6$3v4ql$1@dont-email.me>
References: <v4kf3h$3h3iu$7@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 16 Jun 2024 09:53:10 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="74f755c506b0c5a7af4442a28e232cbf";
	logging-data="4166485"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+Nxh6kX+eWFmkL/c9t9q0+"
User-Agent: Unison/2.2
Cancel-Lock: sha1:oCLYdWuJSGx5P3Cipa49f7ryYlo=
Bytes: 2658

On 2024-06-15 16:22:09 +0000, olcott said:

> On 6/13/2024 8:24 PM, Richard Damon wrote:
>  > On 6/13/24 11:32 AM, olcott wrote:
>  >>
>  >> It is contingent upon you to show the exact steps of how H computes
>  >> the mapping from the x86 machine language finite string input to
>  >> H(D,D) using the finite string transformation rules specified by
>  >> the semantics of the x86 programming language that reaches the
>  >> behavior of the directly executed D(D)
>  >>
>  >
>  > Why? I don't claim it can.
> 
> The first six steps of this mapping are when instructions
> at the machine address range of [00000cfc] to [00000d06]
> are simulated/executed.
> 
> After that the behavior of D correctly simulated by H diverges
> from the behavior of D(D) because the call to H(D,D) by D
> correctly simulated by H cannot possibly return to D.
> 
> _D()
> [00000cfc](01) 55          push ebp
> [00000cfd](02) 8bec        mov ebp,esp
> [00000cff](03) 8b4508      mov eax,[ebp+08]
> [00000d02](01) 50          push eax       ; push D
> [00000d03](03) 8b4d08      mov ecx,[ebp+08]
> [00000d06](01) 51          push ecx       ; push D
> [00000d07](05) e800feffff  call 00000b0c  ; call H
> [00000d0c](03) 83c408      add esp,+08
> [00000d0f](02) 85c0        test eax,eax
> [00000d11](02) 7404        jz 00000d17
> [00000d13](02) 33c0        xor eax,eax
> [00000d15](02) eb05        jmp 00000d1c
> [00000d17](05) b801000000  mov eax,00000001
> [00000d1c](01) 5d          pop ebp
> [00000d1d](01) c3          ret
> Size in bytes:(0034) [00000d1d]

When you put "V2" or "V3" or something similar on the subject line
you should tell what is different from the original version.

-- 
Mikko