Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v9lbmv$119bh$2@dont-email.me>
Deutsch   English   Français   Italiano  
<v9lbmv$119bh$2@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.nobody.at!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: olcott <polcott333@gmail.com>
Newsgroups: comp.theory
Subject: Re: Proof that DDD specifies non-halting behavior --- point by point
 --- in our head
Date: Thu, 15 Aug 2024 11:51:43 -0500
Organization: A noiseless patient Spider
Lines: 162
Message-ID: <v9lbmv$119bh$2@dont-email.me>
References: <v9gv4k$4sc4$1@dont-email.me>
 <561f876601b0329c0260bac26f8b6dfb6e28647f@i2pn2.org>
 <v9h5af$9jn6$1@dont-email.me>
 <aa4bc24ac5642087e81796fffc31e5022bd8823e@i2pn2.org>
 <v9h9ec$a0id$1@dont-email.me>
 <190847da05ab48555c036a799e768f555461eb43@i2pn2.org>
 <v9hbhm$abr9$1@dont-email.me>
 <28bda6bb7d9efdacadf3de76c85a4857d0f83cb3@i2pn2.org>
 <v9ibpq$f16v$4@dont-email.me>
 <be041261e6d47d07a3b29255dc408e6803d870ad@i2pn2.org>
 <v9jnm0$q0lv$1@dont-email.me>
 <54c2cf5516e1477512a9dc4df913c8747164c631@i2pn2.org>
 <v9jom1$q5o5$1@dont-email.me>
 <192e56d5bedc6f7e537857a2cf21af0d9a352edd@i2pn2.org>
 <v9jpms$qaaf$1@dont-email.me>
 <8f9bb44064cab68e97b57ace4988d14928448672@i2pn2.org>
 <v9jrmt$qio5$1@dont-email.me>
 <2ac05356328ae560088cb3887b3b64351fb7ac19@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 15 Aug 2024 18:51:44 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="b70e3e79cdddcca7f32bbdda15810b8e";
	logging-data="1090929"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18kQmAB/sbqTTnbXjSiWhzl"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:SvidEMR0XLjaBjura9U6Chq+CzM=
In-Reply-To: <2ac05356328ae560088cb3887b3b64351fb7ac19@i2pn2.org>
Content-Language: en-US
Bytes: 8280

On 8/15/2024 6:03 AM, Richard Damon wrote:
> On 8/14/24 11:12 PM, olcott wrote:
>> On 8/14/2024 10:01 PM, Richard Damon wrote:
>>> On 8/14/24 10:38 PM, olcott wrote:
>>>> On 8/14/2024 9:36 PM, Richard Damon wrote:
>>>>> On 8/14/24 10:20 PM, olcott wrote:
>>>>>> On 8/14/2024 9:11 PM, Richard Damon wrote:
>>>>>>> On 8/14/24 10:03 PM, olcott wrote:
>>>>>>>> On 8/14/2024 6:40 PM, Richard Damon wrote:
>>>>>>>>> On 8/14/24 9:34 AM, olcott wrote:
>>>>>>>>>> On 8/14/2024 6:22 AM, Richard Damon wrote:
>>>>>>>>>>> On 8/14/24 12:24 AM, olcott wrote:
>>>>>>>>>>>> On 8/13/2024 11:04 PM, Richard Damon wrote:
>>>>>>>>>>>>> On 8/13/24 11:48 PM, olcott wrote:
>>>>>>>>>>>>>> On 8/13/2024 10:21 PM, Richard Damon wrote:
>>>>>>>>>>>>>>> On 8/13/24 10:38 PM, olcott wrote:
>>>>>>>>>>>>>>>> On 8/13/2024 9:29 PM, Richard Damon wrote:
>>>>>>>>>>>>>>>>> On 8/13/24 8:52 PM, olcott wrote:
>>>>>>>>>>>>>>>>>> void DDD()
>>>>>>>>>>>>>>>>>> {
>>>>>>>>>>>>>>>>>>    HHH(DDD);
>>>>>>>>>>>>>>>>>>    return;
>>>>>>>>>>>>>>>>>> }
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> _DDD()
>>>>>>>>>>>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>>>>>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>>>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>>>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>>>>>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>>>>>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>>>>>>>>>>>> [00002183] c3         ret
>>>>>>>>>>>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> A simulation of N instructions of DDD by HHH according to
>>>>>>>>>>>>>>>>>> the semantics of the x86 language is necessarily correct.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Nope, it is just the correct PARTIAL emulation of the 
>>>>>>>>>>>>>>>>> first N instructions of DDD, and not of all of DDD, 
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> That is what I said dufuss.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Nope. You didn't. I added clairifying words, pointing out 
>>>>>>>>>>>>>>> why you claim is incorrect.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> For an emulation to be "correct" it must be complete, as 
>>>>>>>>>>>>>>> partial emulations are only partially correct, so without 
>>>>>>>>>>>>>>> the partial modifier, they are not correct.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> A complete emulation of one instruction is
>>>>>>>>>>>>>> a complete emulation of one instruction
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> A correct simulation of N instructions of DDD by HHH is
>>>>>>>>>>>>>>>>>> sufficient to correctly predict the behavior of an 
>>>>>>>>>>>>>>>>>> unlimited
>>>>>>>>>>>>>>>>>> simulation.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Nope, if a HHH returns to its caller, 
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> *Try to show exactly how DDD emulated by HHH returns to 
>>>>>>>>>>>>>>>> its caller*
>>>>>>>>>>>>>>>> (the first one doesn't even have a caller)
>>>>>>>>>>>>>>>> Use the above machine language instructions to show this.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Remember how English works:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> When you ask "How DDD emulated by HHH returns to its 
>>>>>>>>>>>>>>> callers".
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Show the exact machine code trace of how DDD emulated
>>>>>>>>>>>>>> by HHH (according to the semantics of the x86 language)
>>>>>>>>>>>>>> reaches its own machine address 00002183
>>>>>>>>>>>>>
>>>>>>>>>>>>> No. The trace is to long, 
>>>>>>>>>>>>
>>>>>>>>>>>> Show the Trace of DDD emulated by HHH
>>>>>>>>>>>> and show the trace of DDD emulated by HHH
>>>>>>>>>>>> emulated by the executed HHH
>>>>>>>>>>>> Just show the DDD code traces.
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> First you need to make a DDD that meets the requirements, and 
>>>>>>>>>>> that means that it calls an HHH that meets the requirements.
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> _DDD()
>>>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>>>> [00002183] c3         ret
>>>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>>>
>>>>>>>>>> The is a hypothetical mental exercise and can be
>>>>>>>>>> accomplished even if the only DDD in the world
>>>>>>>>>> was simply typed into a word processor and never run.
>>>>>>>>>
>>>>>>>>> But, must behave the rules of Computation Theory.
>>>>>>>>>
>>>>>>>>> That means DDD, to be a program, includes the code of HHH, and 
>>>>>>>>> that HHH obeys the requirements of programs in computation 
>>>>>>>>> theory, which means that it always produces the same answer to 
>>>>>>>>> its caller for the same input.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Note, its "Behavior" is defined as what it would do when run, 
>>>>>>>>> even if it never is,
>>>>>>>>>
>>>>>>>>
>>>>>>>> No that is the big mistake of comp theory where it violates
>>>>>>>> its own rules.
>>>>>>>>
>>>>>>>
>>>>>>> WHAT rule does it violate? And where do you get it from?
>>>>>>>
>>>>>>
>>>>>> You have proven that you don't care.
>>>>>> You are like a bot programmed in rebuttal mode.
>>>>>>
>>>>>
>>>>>
>>>>> I guess you don't have an answer, AGAIN.
>>>>>
>>>>
>>>> Go back and look at the last 500 times
>>>> that I answer it.
>>>>
>>>
>>> You make the claim, but can't show a reliable source for it.
>>>
>>
>> I make a claim and prove that it is correct
>> and you change the subject and form a rebuttal
>> of the changed subject.
>>
> 
> No, you make a claim and present a false argument, not a proof.
> 

A simulation of N instructions of DDD by HHH according to
the semantics of the x86 language is necessarily correct.

A correct simulation of N instructions of DDD by HHH is
sufficient to correctly predict the behavior of an unlimited
simulation.

Semantic tautologies prove themselves true entirely
on the basis of the meaning of their words.

-- 
Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius
========== REMAINDER OF ARTICLE TRUNCATED ==========