Deutsch   English   Français   Italiano  
<v9lgqo$11vnf$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Fred. Zwarts" <F.Zwarts@HetNet.nl>
Newsgroups: comp.theory
Subject: Re: Proof that DDD specifies non-halting behavior --- point by point
 --- in our head
Date: Thu, 15 Aug 2024 20:19:03 +0200
Organization: A noiseless patient Spider
Lines: 168
Message-ID: <v9lgqo$11vnf$1@dont-email.me>
References: <v9gv4k$4sc4$1@dont-email.me>
 <561f876601b0329c0260bac26f8b6dfb6e28647f@i2pn2.org>
 <v9h5af$9jn6$1@dont-email.me>
 <aa4bc24ac5642087e81796fffc31e5022bd8823e@i2pn2.org>
 <v9h9ec$a0id$1@dont-email.me>
 <190847da05ab48555c036a799e768f555461eb43@i2pn2.org>
 <v9hbhm$abr9$1@dont-email.me>
 <28bda6bb7d9efdacadf3de76c85a4857d0f83cb3@i2pn2.org>
 <v9ibpq$f16v$4@dont-email.me>
 <be041261e6d47d07a3b29255dc408e6803d870ad@i2pn2.org>
 <v9jnm0$q0lv$1@dont-email.me>
 <54c2cf5516e1477512a9dc4df913c8747164c631@i2pn2.org>
 <v9jom1$q5o5$1@dont-email.me>
 <192e56d5bedc6f7e537857a2cf21af0d9a352edd@i2pn2.org>
 <v9jpms$qaaf$1@dont-email.me>
 <8f9bb44064cab68e97b57ace4988d14928448672@i2pn2.org>
 <v9jrmt$qio5$1@dont-email.me>
 <2ac05356328ae560088cb3887b3b64351fb7ac19@i2pn2.org>
 <v9lbmv$119bh$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 15 Aug 2024 20:19:05 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="6fe5c52353619c0eaa47b74070d55905";
	logging-data="1113839"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18zLn49lptUYj5QioXGA1UA"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:2xln1vLrHuL4MNYMZRCByvBHe9g=
In-Reply-To: <v9lbmv$119bh$2@dont-email.me>
Content-Language: en-GB
Bytes: 8888

Op 15.aug.2024 om 18:51 schreef olcott:
> On 8/15/2024 6:03 AM, Richard Damon wrote:
>> On 8/14/24 11:12 PM, olcott wrote:
>>> On 8/14/2024 10:01 PM, Richard Damon wrote:
>>>> On 8/14/24 10:38 PM, olcott wrote:
>>>>> On 8/14/2024 9:36 PM, Richard Damon wrote:
>>>>>> On 8/14/24 10:20 PM, olcott wrote:
>>>>>>> On 8/14/2024 9:11 PM, Richard Damon wrote:
>>>>>>>> On 8/14/24 10:03 PM, olcott wrote:
>>>>>>>>> On 8/14/2024 6:40 PM, Richard Damon wrote:
>>>>>>>>>> On 8/14/24 9:34 AM, olcott wrote:
>>>>>>>>>>> On 8/14/2024 6:22 AM, Richard Damon wrote:
>>>>>>>>>>>> On 8/14/24 12:24 AM, olcott wrote:
>>>>>>>>>>>>> On 8/13/2024 11:04 PM, Richard Damon wrote:
>>>>>>>>>>>>>> On 8/13/24 11:48 PM, olcott wrote:
>>>>>>>>>>>>>>> On 8/13/2024 10:21 PM, Richard Damon wrote:
>>>>>>>>>>>>>>>> On 8/13/24 10:38 PM, olcott wrote:
>>>>>>>>>>>>>>>>> On 8/13/2024 9:29 PM, Richard Damon wrote:
>>>>>>>>>>>>>>>>>> On 8/13/24 8:52 PM, olcott wrote:
>>>>>>>>>>>>>>>>>>> void DDD()
>>>>>>>>>>>>>>>>>>> {
>>>>>>>>>>>>>>>>>>>    HHH(DDD);
>>>>>>>>>>>>>>>>>>>    return;
>>>>>>>>>>>>>>>>>>> }
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> _DDD()
>>>>>>>>>>>>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>>>>>>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>>>>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>>>>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>>>>>>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>>>>>>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>>>>>>>>>>>>> [00002183] c3         ret
>>>>>>>>>>>>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> A simulation of N instructions of DDD by HHH 
>>>>>>>>>>>>>>>>>>> according to
>>>>>>>>>>>>>>>>>>> the semantics of the x86 language is necessarily 
>>>>>>>>>>>>>>>>>>> correct.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Nope, it is just the correct PARTIAL emulation of the 
>>>>>>>>>>>>>>>>>> first N instructions of DDD, and not of all of DDD, 
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> That is what I said dufuss.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Nope. You didn't. I added clairifying words, pointing 
>>>>>>>>>>>>>>>> out why you claim is incorrect.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> For an emulation to be "correct" it must be complete, as 
>>>>>>>>>>>>>>>> partial emulations are only partially correct, so 
>>>>>>>>>>>>>>>> without the partial modifier, they are not correct.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> A complete emulation of one instruction is
>>>>>>>>>>>>>>> a complete emulation of one instruction
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> A correct simulation of N instructions of DDD by HHH is
>>>>>>>>>>>>>>>>>>> sufficient to correctly predict the behavior of an 
>>>>>>>>>>>>>>>>>>> unlimited
>>>>>>>>>>>>>>>>>>> simulation.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Nope, if a HHH returns to its caller, 
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> *Try to show exactly how DDD emulated by HHH returns to 
>>>>>>>>>>>>>>>>> its caller*
>>>>>>>>>>>>>>>>> (the first one doesn't even have a caller)
>>>>>>>>>>>>>>>>> Use the above machine language instructions to show this.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Remember how English works:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> When you ask "How DDD emulated by HHH returns to its 
>>>>>>>>>>>>>>>> callers".
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Show the exact machine code trace of how DDD emulated
>>>>>>>>>>>>>>> by HHH (according to the semantics of the x86 language)
>>>>>>>>>>>>>>> reaches its own machine address 00002183
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> No. The trace is to long, 
>>>>>>>>>>>>>
>>>>>>>>>>>>> Show the Trace of DDD emulated by HHH
>>>>>>>>>>>>> and show the trace of DDD emulated by HHH
>>>>>>>>>>>>> emulated by the executed HHH
>>>>>>>>>>>>> Just show the DDD code traces.
>>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> First you need to make a DDD that meets the requirements, 
>>>>>>>>>>>> and that means that it calls an HHH that meets the 
>>>>>>>>>>>> requirements.
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> _DDD()
>>>>>>>>>>> [00002172] 55         push ebp      ; housekeeping
>>>>>>>>>>> [00002173] 8bec       mov ebp,esp   ; housekeeping
>>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD
>>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD)
>>>>>>>>>>> [0000217f] 83c404     add esp,+04
>>>>>>>>>>> [00002182] 5d         pop ebp
>>>>>>>>>>> [00002183] c3         ret
>>>>>>>>>>> Size in bytes:(0018) [00002183]
>>>>>>>>>>>
>>>>>>>>>>> The is a hypothetical mental exercise and can be
>>>>>>>>>>> accomplished even if the only DDD in the world
>>>>>>>>>>> was simply typed into a word processor and never run.
>>>>>>>>>>
>>>>>>>>>> But, must behave the rules of Computation Theory.
>>>>>>>>>>
>>>>>>>>>> That means DDD, to be a program, includes the code of HHH, and 
>>>>>>>>>> that HHH obeys the requirements of programs in computation 
>>>>>>>>>> theory, which means that it always produces the same answer to 
>>>>>>>>>> its caller for the same input.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Note, its "Behavior" is defined as what it would do when run, 
>>>>>>>>>> even if it never is,
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> No that is the big mistake of comp theory where it violates
>>>>>>>>> its own rules.
>>>>>>>>>
>>>>>>>>
>>>>>>>> WHAT rule does it violate? And where do you get it from?
>>>>>>>>
>>>>>>>
>>>>>>> You have proven that you don't care.
>>>>>>> You are like a bot programmed in rebuttal mode.
>>>>>>>
>>>>>>
>>>>>>
>>>>>> I guess you don't have an answer, AGAIN.
>>>>>>
>>>>>
>>>>> Go back and look at the last 500 times
>>>>> that I answer it.
>>>>>
>>>>
>>>> You make the claim, but can't show a reliable source for it.
>>>>
>>>
>>> I make a claim and prove that it is correct
>>> and you change the subject and form a rebuttal
>>> of the changed subject.
>>>
>>
>> No, you make a claim and present a false argument, not a proof.
>>
> 
> A simulation of N instructions of DDD by HHH according to
> the semantics of the x86 language is necessarily correct.
> 
> A correct simulation of N instructions of DDD by HHH is
> sufficient to correctly predict the behavior of an unlimited
> simulation.

========== REMAINDER OF ARTICLE TRUNCATED ==========