Deutsch   English   Français   Italiano  
<v9klf4$u594$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Mikko <mikko.levanto@iki.fi>
Newsgroups: comp.theory
Subject: Re: Proof that DDD specifies non-halting behavior --- point by point --- in our head
Date: Thu, 15 Aug 2024 13:32:04 +0300
Organization: -
Lines: 119
Message-ID: <v9klf4$u594$1@dont-email.me>
References: <v9gv4k$4sc4$1@dont-email.me> <561f876601b0329c0260bac26f8b6dfb6e28647f@i2pn2.org> <v9h5af$9jn6$1@dont-email.me> <aa4bc24ac5642087e81796fffc31e5022bd8823e@i2pn2.org> <v9h9ec$a0id$1@dont-email.me> <190847da05ab48555c036a799e768f555461eb43@i2pn2.org> <v9hbhm$abr9$1@dont-email.me> <28bda6bb7d9efdacadf3de76c85a4857d0f83cb3@i2pn2.org> <v9ibpq$f16v$4@dont-email.me> <be041261e6d47d07a3b29255dc408e6803d870ad@i2pn2.org> <v9jnm0$q0lv$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 15 Aug 2024 12:32:05 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="12fc9c697b40d6367e6f93c8d12f250c";
	logging-data="988452"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18RK3iJis+FKVdNRhItgtZR"
User-Agent: Unison/2.2
Cancel-Lock: sha1:U2uqx5I0tum0yQemDG/sdHluXQo=
Bytes: 5671

On 2024-08-15 02:03:44 +0000, olcott said:

> On 8/14/2024 6:40 PM, Richard Damon wrote:
>> On 8/14/24 9:34 AM, olcott wrote:
>>> On 8/14/2024 6:22 AM, Richard Damon wrote:
>>>> On 8/14/24 12:24 AM, olcott wrote:
>>>>> On 8/13/2024 11:04 PM, Richard Damon wrote:
>>>>>> On 8/13/24 11:48 PM, olcott wrote:
>>>>>>> On 8/13/2024 10:21 PM, Richard Damon wrote:
>>>>>>>> On 8/13/24 10:38 PM, olcott wrote:
>>>>>>>>> On 8/13/2024 9:29 PM, Richard Damon wrote:
>>>>>>>>>> On 8/13/24 8:52 PM, olcott wrote:
>>>>>>>>>>> void DDD()
>>>>>>>>>>> {
>>>>>>>>>>>    HHH(DDD);
>>>>>>>>>>>    return;
>>>>>>>>>>> }
>>>>>>>>>>> 
>>>>>>>>>>> _DDD()
>>>>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>>>>> [00002183] c3         ret
>>>>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>>>> 
>>>>>>>>>>> A simulation of N instructions of DDD by HHH according to
>>>>>>>>>>> the semantics of the x86 language is necessarily correct.
>>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Nope, it is just the correct PARTIAL emulation of the first N 
>>>>>>>>>> instructions of DDD, and not of all of DDD,
>>>>>>>>> 
>>>>>>>>> That is what I said dufuss.
>>>>>>>> 
>>>>>>>> Nope. You didn't. I added clairifying words, pointing out why you claim 
>>>>>>>> is incorrect.
>>>>>>>> 
>>>>>>>> For an emulation to be "correct" it must be complete, as partial 
>>>>>>>> emulations are only partially correct, so without the partial modifier, 
>>>>>>>> they are not correct.
>>>>>>>> 
>>>>>>> 
>>>>>>> A complete emulation of one instruction is
>>>>>>> a complete emulation of one instruction
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>> 
>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>>> A correct simulation of N instructions of DDD by HHH is
>>>>>>>>>>> sufficient to correctly predict the behavior of an unlimited
>>>>>>>>>>> simulation.
>>>>>>>>>> 
>>>>>>>>>> Nope, if a HHH returns to its caller,
>>>>>>>>> 
>>>>>>>>> *Try to show exactly how DDD emulated by HHH returns to its caller*
>>>>>>>>> (the first one doesn't even have a caller)
>>>>>>>>> Use the above machine language instructions to show this.
>>>>>>>>> 
>>>>>>>> 
>>>>>>>> Remember how English works:
>>>>>>>> 
>>>>>>>> When you ask "How DDD emulated by HHH returns to its callers".
>>>>>>> 
>>>>>>> Show the exact machine code trace of how DDD emulated
>>>>>>> by HHH (according to the semantics of the x86 language)
>>>>>>> reaches its own machine address 00002183
>>>>>> 
>>>>>> No. The trace is to long,
>>>>> 
>>>>> Show the Trace of DDD emulated by HHH
>>>>> and show the trace of DDD emulated by HHH
>>>>> emulated by the executed HHH
>>>>> Just show the DDD code traces.
>>>>> 
>>>> 
>>>> First you need to make a DDD that meets the requirements, and that 
>>>> means that it calls an HHH that meets the requirements.
>>>> 
>>> 
>>> _DDD()
>>> [00002172] 55         push ebp      ; housekeeping
>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>> [00002175] 6872210000 push 00002172 ; push DDD
>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>> [0000217f] 83c404     add esp,+04
>>> [00002182] 5d         pop ebp
>>> [00002183] c3         ret
>>> Size in bytes:(0018) [00002183]
>>> 
>>> The is a hypothetical mental exercise and can be
>>> accomplished even if the only DDD in the world
>>> was simply typed into a word processor and never run.
>> 
>> But, must behave the rules of Computation Theory.
>> 
>> That means DDD, to be a program, includes the code of HHH, and that HHH 
>> obeys the requirements of programs in computation theory, which means 
>> that it always produces the same answer to its caller for the same 
>> input.
>> 
>> 
>> Note, its "Behavior" is defined as what it would do when run, even if 
>> it never is,
>> 
> 
> No that is the big mistake of comp theory where it violates
> its own rules.

The big mistake is yours where you violate the rules of computation
theory and honest discussion.

-- 
Mikko