Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v9jroj$qio5$2@dont-email.me>
Deutsch   English   Français   Italiano  
<v9jroj$qio5$2@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.nobody.at!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: olcott <polcott333@gmail.com>
Newsgroups: comp.theory
Subject: Re: Proof that DDD specifies non-halting behavior --- point by point
 --- in our head
Date: Wed, 14 Aug 2024 22:13:23 -0500
Organization: A noiseless patient Spider
Lines: 143
Message-ID: <v9jroj$qio5$2@dont-email.me>
References: <v9gv4k$4sc4$1@dont-email.me>
 <561f876601b0329c0260bac26f8b6dfb6e28647f@i2pn2.org>
 <v9h5af$9jn6$1@dont-email.me>
 <aa4bc24ac5642087e81796fffc31e5022bd8823e@i2pn2.org>
 <v9h9ec$a0id$1@dont-email.me>
 <190847da05ab48555c036a799e768f555461eb43@i2pn2.org>
 <v9hbhm$abr9$1@dont-email.me>
 <28bda6bb7d9efdacadf3de76c85a4857d0f83cb3@i2pn2.org>
 <v9ibpq$f16v$4@dont-email.me>
 <be041261e6d47d07a3b29255dc408e6803d870ad@i2pn2.org>
 <v9jnm0$q0lv$1@dont-email.me>
 <54c2cf5516e1477512a9dc4df913c8747164c631@i2pn2.org>
 <v9jom1$q5o5$1@dont-email.me>
 <192e56d5bedc6f7e537857a2cf21af0d9a352edd@i2pn2.org>
 <v9jpms$qaaf$1@dont-email.me>
 <8f9bb44064cab68e97b57ace4988d14928448672@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 15 Aug 2024 05:13:24 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="b70e3e79cdddcca7f32bbdda15810b8e";
	logging-data="871173"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+fKrhRhDTX+cemJ+yef2yu"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:nw19hO3ZloourSgmtEOxQrPFLiA=
In-Reply-To: <8f9bb44064cab68e97b57ace4988d14928448672@i2pn2.org>
Content-Language: en-US
Bytes: 7292

On 8/14/2024 10:01 PM, Richard Damon wrote:
> On 8/14/24 10:38 PM, olcott wrote:
>> On 8/14/2024 9:36 PM, Richard Damon wrote:
>>> On 8/14/24 10:20 PM, olcott wrote:
>>>> On 8/14/2024 9:11 PM, Richard Damon wrote:
>>>>> On 8/14/24 10:03 PM, olcott wrote:
>>>>>> On 8/14/2024 6:40 PM, Richard Damon wrote:
>>>>>>> On 8/14/24 9:34 AM, olcott wrote:
>>>>>>>> On 8/14/2024 6:22 AM, Richard Damon wrote:
>>>>>>>>> On 8/14/24 12:24 AM, olcott wrote:
>>>>>>>>>> On 8/13/2024 11:04 PM, Richard Damon wrote:
>>>>>>>>>>> On 8/13/24 11:48 PM, olcott wrote:
>>>>>>>>>>>> On 8/13/2024 10:21 PM, Richard Damon wrote:
>>>>>>>>>>>>> On 8/13/24 10:38 PM, olcott wrote:
>>>>>>>>>>>>>> On 8/13/2024 9:29 PM, Richard Damon wrote:
>>>>>>>>>>>>>>> On 8/13/24 8:52 PM, olcott wrote:
>>>>>>>>>>>>>>>> void DDD()
>>>>>>>>>>>>>>>> {
>>>>>>>>>>>>>>>>    HHH(DDD);
>>>>>>>>>>>>>>>>    return;
>>>>>>>>>>>>>>>> }
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> _DDD()
>>>>>>>>>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>>>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>>>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>>>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>>>>>>>>>> [00002183] c3         ret
>>>>>>>>>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> A simulation of N instructions of DDD by HHH according to
>>>>>>>>>>>>>>>> the semantics of the x86 language is necessarily correct.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Nope, it is just the correct PARTIAL emulation of the 
>>>>>>>>>>>>>>> first N instructions of DDD, and not of all of DDD, 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> That is what I said dufuss.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Nope. You didn't. I added clairifying words, pointing out 
>>>>>>>>>>>>> why you claim is incorrect.
>>>>>>>>>>>>>
>>>>>>>>>>>>> For an emulation to be "correct" it must be complete, as 
>>>>>>>>>>>>> partial emulations are only partially correct, so without 
>>>>>>>>>>>>> the partial modifier, they are not correct.
>>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> A complete emulation of one instruction is
>>>>>>>>>>>> a complete emulation of one instruction
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> A correct simulation of N instructions of DDD by HHH is
>>>>>>>>>>>>>>>> sufficient to correctly predict the behavior of an 
>>>>>>>>>>>>>>>> unlimited
>>>>>>>>>>>>>>>> simulation.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Nope, if a HHH returns to its caller, 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> *Try to show exactly how DDD emulated by HHH returns to 
>>>>>>>>>>>>>> its caller*
>>>>>>>>>>>>>> (the first one doesn't even have a caller)
>>>>>>>>>>>>>> Use the above machine language instructions to show this.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> Remember how English works:
>>>>>>>>>>>>>
>>>>>>>>>>>>> When you ask "How DDD emulated by HHH returns to its callers".
>>>>>>>>>>>>
>>>>>>>>>>>> Show the exact machine code trace of how DDD emulated
>>>>>>>>>>>> by HHH (according to the semantics of the x86 language)
>>>>>>>>>>>> reaches its own machine address 00002183
>>>>>>>>>>>
>>>>>>>>>>> No. The trace is to long, 
>>>>>>>>>>
>>>>>>>>>> Show the Trace of DDD emulated by HHH
>>>>>>>>>> and show the trace of DDD emulated by HHH
>>>>>>>>>> emulated by the executed HHH
>>>>>>>>>> Just show the DDD code traces.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> First you need to make a DDD that meets the requirements, and 
>>>>>>>>> that means that it calls an HHH that meets the requirements.
>>>>>>>>>
>>>>>>>>
>>>>>>>> _DDD()
>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>> [00002183] c3         ret
>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>
>>>>>>>> The is a hypothetical mental exercise and can be
>>>>>>>> accomplished even if the only DDD in the world
>>>>>>>> was simply typed into a word processor and never run.
>>>>>>>
>>>>>>> But, must behave the rules of Computation Theory.
>>>>>>>
>>>>>>> That means DDD, to be a program, includes the code of HHH, and 
>>>>>>> that HHH obeys the requirements of programs in computation 
>>>>>>> theory, which means that it always produces the same answer to 
>>>>>>> its caller for the same input.
>>>>>>>
>>>>>>>
>>>>>>> Note, its "Behavior" is defined as what it would do when run, 
>>>>>>> even if it never is,
>>>>>>>
>>>>>>
>>>>>> No that is the big mistake of comp theory where it violates
>>>>>> its own rules.
>>>>>>
>>>>>
>>>>> WHAT rule does it violate? And where do you get it from?
>>>>>
>>>>
>>>> You have proven that you don't care.
>>>> You are like a bot programmed in rebuttal mode.
>>>>
>>>
>>>
>>> I guess you don't have an answer, AGAIN.
>>>
>>
>> Go back and look at the last 500 times
>> that I answer it.
>>
> 
> You make the claim, but can't show a reliable source for it.
> 

Look at Mike's correction of Joes.

-- 
Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius
hits a target no one else can see." Arthur Schopenhauer