Deutsch English Français Italiano |
<vsfdqb$1m8qr$2@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory Subject: Re: DDD specifies recursive emulation to HHH and halting to HHH1 --- STA Date: Mon, 31 Mar 2025 19:59:55 -0500 Organization: A noiseless patient Spider Lines: 257 Message-ID: <vsfdqb$1m8qr$2@dont-email.me> References: <vrfuob$256og$1@dont-email.me> <vs9gcg$20g2j$3@dont-email.me> <vs9h9o$23cav$2@dont-email.me> <vs9hh3$20g2j$6@dont-email.me> <vs9jie$23cav$4@dont-email.me> <vs9kb1$26cg5$2@dont-email.me> <vs9pni$27rl4$9@dont-email.me> <vs9r1b$28tqg$2@dont-email.me> <vs9t45$2f6n5$1@dont-email.me> <9f2ff3ab9b99a7bb6dfa0885f9757f810ce52e66@i2pn2.org> <vsaam4$2sfhq$1@dont-email.me> <vsbi7e$1hblk$1@dont-email.me> <vsc6qi$27lbo$2@dont-email.me> <8a3e7e93e6cad20b29d23405a0e6dbd497a492ac@i2pn2.org> <vscegq$2fv3s$2@dont-email.me> <26f33bb039fda7d28ae164cfc4d0f582d4698f31@i2pn2.org> <vsclsb$2n4jc$1@dont-email.me> <36a4c76730b23cf78ddde73c723116b5380973a1@i2pn2.org> <vsctnm$2ub5m$2@dont-email.me> <4285ea3219a2d5f2d6c52e84697fa4e3d3dc80cb@i2pn2.org> <vsd18m$379dn$1@dont-email.me> <vsdjff$3o5ff$1@dont-email.me> <vsem50$th5g$3@dont-email.me> <77c20f5832db4b47f5226dcb39bd2be7ba107a0c@i2pn2.org> <vsf8tv$1i673$2@dont-email.me> <5cb726749c8a7457af5da692f77c6a04bc0c7401@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Tue, 01 Apr 2025 02:59:56 +0200 (CEST) Injection-Info: dont-email.me; posting-host="241bb90de42b8ffb9e02315e4a6e8219"; logging-data="1778523"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+hAsdqpBVRNElFO5DoHIbd" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:sXvZKtmXYHxVK1TUtqEtlId1l84= Content-Language: en-US X-Antivirus: Norton (VPS 250331-6, 3/31/2025), Outbound message X-Antivirus-Status: Clean In-Reply-To: <5cb726749c8a7457af5da692f77c6a04bc0c7401@i2pn2.org> Bytes: 13576 On 3/31/2025 7:26 PM, Richard Damon wrote: > On 3/31/25 7:36 PM, olcott wrote: >> On 3/31/2025 5:32 PM, Richard Damon wrote: >>> On 3/31/25 2:16 PM, olcott wrote: >>>> On 3/31/2025 3:24 AM, Fred. Zwarts wrote: >>>>> Op 31.mrt.2025 om 05:13 schreef olcott: >>>>>> On 3/30/2025 9:36 PM, Richard Damon wrote: >>>>>>> On 3/30/25 10:13 PM, olcott wrote: >>>>>>>> On 3/30/2025 7:32 PM, Richard Damon wrote: >>>>>>>>> On 3/30/25 7:59 PM, olcott wrote: >>>>>>>>>> On 3/30/2025 5:50 PM, Richard Damon wrote: >>>>>>>>>>> On 3/30/25 5:53 PM, olcott wrote: >>>>>>>>>>>> On 3/30/2025 4:01 PM, Richard Damon wrote: >>>>>>>>>>>>> On 3/30/25 3:42 PM, olcott wrote: >>>>>>>>>>>>>> On 3/30/2025 8:50 AM, Fred. Zwarts wrote: >>>>>>>>>>>>>>> Op 30.mrt.2025 om 04:35 schreef olcott: >>>>>>>>>>>>>>>> On 3/29/2025 8:12 PM, Richard Damon wrote: >>>>>>>>>>>>>>>>> On 3/29/25 6:44 PM, olcott wrote: >>>>>>>>>>>>>>>>>> On 3/29/2025 5:08 PM, dbush wrote: >>>>>>>>>>>>>>>>>>> On 3/29/2025 5:46 PM, olcott wrote: >>>>>>>>>>>>>>>>>>>> On 3/29/2025 3:14 PM, dbush wrote: >>>>>>>>>>>>>>>>>>>>> On 3/29/2025 4:01 PM, olcott wrote: >>>>>>>>>>>>>>>>>>>>>> On 3/29/2025 2:26 PM, dbush wrote: >>>>>>>>>>>>>>>>>>>>>>> On 3/29/2025 3:22 PM, olcott wrote: >>>>>>>>>>>>>>>>>>>>>>>> On 3/29/2025 2:06 PM, dbush wrote: >>>>>>>>>>>>>>>>>>>>>>>>> On 3/29/2025 3:03 PM, olcott wrote: >>>>>>>>>>>>>>>>>>>>>>>>>> On 3/29/2025 10:23 AM, dbush wrote: >>>>>>>>>>>>>>>>>>>>>>>>>>> On 3/29/2025 11:12 AM, olcott wrote: >>>>>>>>>>>>>>>>>>>>>>>>>>>> On 3/28/2025 11:00 PM, dbush wrote: >>>>>>>>>>>>>>>>>>>>>>>>>>>>> On 3/28/2025 11:45 PM, olcott wrote: >>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>>>>>>> It defines that it must compute the >>>>>>>>>>>>>>>>>>>>>>>>>>>>>> mapping from >>>>>>>>>>>>>>>>>>>>>>>>>>>>>> the direct execution of a Turing Machine >>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>>>>>> Which does not require tracing an actual >>>>>>>>>>>>>>>>>>>>>>>>>>>>> running TM, only mapping properties of the >>>>>>>>>>>>>>>>>>>>>>>>>>>>> TM described. >>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>>>>> The key fact that you continue to >>>>>>>>>>>>>>>>>>>>>>>>>>>> dishonestly ignore >>>>>>>>>>>>>>>>>>>>>>>>>>>> is the concrete counter-example that I >>>>>>>>>>>>>>>>>>>>>>>>>>>> provided that >>>>>>>>>>>>>>>>>>>>>>>>>>>> conclusively proves that the finite string >>>>>>>>>>>>>>>>>>>>>>>>>>>> of machine >>>>>>>>>>>>>>>>>>>>>>>>>>>> code input is not always a valid proxy for >>>>>>>>>>>>>>>>>>>>>>>>>>>> the behavior >>>>>>>>>>>>>>>>>>>>>>>>>>>> of the underlying virtual machine. >>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>>>> In other words, you deny the concept of a >>>>>>>>>>>>>>>>>>>>>>>>>>> UTM, which can take a description of any >>>>>>>>>>>>>>>>>>>>>>>>>>> Turing machine and exactly reproduce the >>>>>>>>>>>>>>>>>>>>>>>>>>> behavior of the direct execution. >>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>>> I deny that a pathological relationship >>>>>>>>>>>>>>>>>>>>>>>>>> between a UTM and >>>>>>>>>>>>>>>>>>>>>>>>>> its input can be correctly ignored. >>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>>> In such a case, the UTM will not halt, and >>>>>>>>>>>>>>>>>>>>>>>>> neither will the input when executed directly. >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> It is not impossible to adapt a UTM such that it >>>>>>>>>>>>>>>>>>>>>>>> correctly simulates a finite number of steps of an >>>>>>>>>>>>>>>>>>>>>>>> input. >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>> 1) then you no longer have a UTM, so statements >>>>>>>>>>>>>>>>>>>>>>> about a UTM don't apply >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> We can know that when this adapted UTM simulates a >>>>>>>>>>>>>>>>>>>>>> finite number of steps of its input that this finite >>>>>>>>>>>>>>>>>>>>>> number of steps were simulated correctly. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> And therefore does not do a correct UTM simulation >>>>>>>>>>>>>>>>>>>>> that matches the behavior of the direct execution >>>>>>>>>>>>>>>>>>>>> as it is incomplete. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> It is dishonest to expect non-terminating inputs to >>>>>>>>>>>>>>>>>>>> complete. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> An input that halts when executed directly is not >>>>>>>>>>>>>>>>>>> non- terminating >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>> 2) changing the input is not allowed >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> The input is unchanged. There never was any >>>>>>>>>>>>>>>>>>>>>> indication that the input was in any way changed. >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> False, if the starting function calls UTM and UTM >>>>>>>>>>>>>>>>>>>>> changes, you're changing the input. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> When UTM1 is a UTM that has been adapted to only >>>>>>>>>>>>>>>>>>>> simulate >>>>>>>>>>>>>>>>>>>> a finite number of steps >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> And is therefore no longer a UTM that does a correct >>>>>>>>>>>>>>>>>>> and complete simulation >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> and input D calls UTM1 then the >>>>>>>>>>>>>>>>>>>> behavior of D simulated by UTM1 >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Is not what I asked about. I asked about the >>>>>>>>>>>>>>>>>>> behavior of D when executed directly. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Off topic for this thread. >>>>>>>>>>>>>>>>>> UTM1 D DOES NOT HALT >>>>>>>>>>>>>>>>>> UTM2 D HALTS >>>>>>>>>>>>>>>>>> D is the same finite string in both cases. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> No it isn't, not if it is the definition of a PROGRAM. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> _DDD() >>>>>>>>>>>>>>>> [00002172] 55 push ebp ; housekeeping >>>>>>>>>>>>>>>> [00002173] 8bec mov ebp,esp ; housekeeping >>>>>>>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD >>>>>>>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call HHH(DDD) >>>>>>>>>>>>>>>> [0000217f] 83c404 add esp,+04 >>>>>>>>>>>>>>>> [00002182] 5d pop ebp >>>>>>>>>>>>>>>> [00002183] c3 ret >>>>>>>>>>>>>>>> Size in bytes:(0018) [00002183] >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> The behavior that these machine code bytes specify: >>>>>>>>>>>>>>>> 558bec6872210000e853f4ffff83c4045dc3 >>>>>>>>>>>>>>>> as an input to HHH is different than these >>>>>>>>>>>>>>>> same bytes as input to HHH1 as a verified fact. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Or, are you admitting you don't understand the meaning >>>>>>>>>>>>>>>>> of a program? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> It seems that you "just don't believe in" verified facts. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> That completely depends on who has verified it. >>>>>>>>>>>>>> >>>>>>>>>>>>>> No it does not. That is a stupid thing to say. >>>>>>>>>>>>>> Every verified fact IS TRUE BY DEFINITION. >>>>>>>>>>>>> >>>>>>>>>>>>> No, if the verifiers lies, then his "verification" isn't >>>>>>>>>>>>> valid. >>>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> That is not the way semantic tautology works. >>>>>>>>>>>> If the father of lies says that cats are animals >>>>>>>>>>>> then cats are still animals. >>>>>>>>>>>> >>>>>>>>>>>>> Or, do you accept the verification by the election deniers >>>>>>>>>>>>> that show that there was the possibility of the fraud, ========== REMAINDER OF ARTICLE TRUNCATED ==========