Deutsch English Français Italiano |
<vr4lf9$48ff$3@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory Subject: Re: Every sufficiently competent C programmer knows --- Semantic Property of Finite String Date: Sat, 15 Mar 2025 14:46:49 -0500 Organization: A noiseless patient Spider Lines: 35 Message-ID: <vr4lf9$48ff$3@dont-email.me> References: <vqntaq$1jut5$1@dont-email.me> <vqp388$1tvqa$1@dont-email.me> <vqpdv9$202b2$2@dont-email.me> <vqperb$20c9k$2@dont-email.me> <E6mcnWv3nMa66036nZ2dnZfqnPWdnZ2d@brightview.co.uk> <vqs2n8$2knng$1@dont-email.me> <5429f6c8b8a8a79e06b4aeefe677cc54a2a636bf@i2pn2.org> <vqt9jp$2spcd$6@dont-email.me> <vqtag4$2t2hb$2@dont-email.me> <vqtgl0$2u7fo$1@dont-email.me> <924e22fc46d629b311b16a954dd0bed980a0a094@i2pn2.org> <vqvg7s$3s1qt$3@dont-email.me> <vqvgb4$3kfru$5@dont-email.me> <vqvi94$3tk5h$1@dont-email.me> <vr01sq$9741$1@dont-email.me> <0672fec6cb2a5c56fd674bbbb3d2b2101c8f295f@i2pn2.org> <vr185f$1aah4$1@dont-email.me> <87bju3jswc.fsf@nosuchdomain.example.com> <vr2d01$27fvs$1@dont-email.me> <vr2ju5$2deaa$3@dont-email.me> <vr3jik$392v0$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sat, 15 Mar 2025 20:46:50 +0100 (CET) Injection-Info: dont-email.me; posting-host="442a9ec1ae8b0ed609e933f76503e6e9"; logging-data="139759"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+qD/AptHksMjyF8FG/v72c" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:TZ4Tsl0zPu2RifaJDnH4rwCKZAA= X-Antivirus: Norton (VPS 250315-4, 3/15/2025), Outbound message Content-Language: en-US In-Reply-To: <vr3jik$392v0$1@dont-email.me> X-Antivirus-Status: Clean On 3/15/2025 5:08 AM, Andy Walker wrote: > On 15/03/2025 01:08, olcott wrote: >> On 3/14/2025 6:09 PM, Andy Walker wrote: >>> On 14/03/2025 19:48, Keith Thompson wrote: >>>> [...] That would imply that [PO] could solve >>>> Goldbach's Conjecture, among other things, but I haven't seen him >>>> do so. >>> Perhaps [just about] worth noting that a sufficiently long >>> [but not "infinite"] brute force attack on the GC [and many other >>> similar conjectures] would resolve the issue. >> Not if GC is true and the proof cannot algorithmically >> compressed into a finite sequence of steps. > > You didn't read, or didn't understand, the rest of my article, > which explains that, indeed, only a finite number of steps is needed. > Read on before replying: > I always respond to the first mistake. I did notice that you qualified this later on. >>> Basically, if you >>> have a program [eg, TM] of size N by some suitable measure [eg, TM >>> states] then within [eg] BB(N) steps it must find the counter-example >>> [if there is one] or else there isn't one [and the GC is proven true], >>> where BB is the Busy Beaver function. Of course, BB is uncomputable, >>> but that doesn't mean specific individual values are uncomputable, >>> just that there is no TM that computes it /in general/. > -- Copyright 2025 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer