| Deutsch English Français Italiano |
|
<vuj18i$2lf64$6@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!news.quux.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory Subject: Turing Machine computable functions apply finite string transformations to inputs Date: Sat, 26 Apr 2025 11:22:42 -0500 Organization: A noiseless patient Spider Lines: 56 Message-ID: <vuj18i$2lf64$6@dont-email.me> References: <vu6lnf$39fls$2@dont-email.me> <vua9oi$2lub6$1@dont-email.me> <vudkah$1ona3$1@dont-email.me> <vufi61$3k099$1@dont-email.me> <vugddv$b21g$2@dont-email.me> <0a2eeee6cb4b6a737f6391c963386745a09c8a01@i2pn2.org> <vugvr3$pke9$8@dont-email.me> <4818688e0354f32267e3a5f3c60846ae7956bed2@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sat, 26 Apr 2025 18:22:43 +0200 (CEST) Injection-Info: dont-email.me; posting-host="5a7e6621f5c9c3039edfa65a4f0d306b"; logging-data="2800836"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19pQEvpbfmh9zZi+ymFIgbK" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:nO32T0nPy23qsrl8Gd2mr/vfO50= X-Antivirus: Norton (VPS 250426-4, 4/26/2025), Outbound message X-Antivirus-Status: Clean Content-Language: en-US In-Reply-To: <4818688e0354f32267e3a5f3c60846ae7956bed2@i2pn2.org> Bytes: 3775 On 4/25/2025 5:09 PM, joes wrote: > Am Fri, 25 Apr 2025 16:46:11 -0500 schrieb olcott: >> On 4/25/2025 11:54 AM, Richard Damon wrote: >>> On 4/25/25 12:31 PM, olcott wrote: > >>>> Once we understand that Turing computable functions are only allowed >>>> to derived their outputs by applying finite string operations to their >>>> inputs then my claim about the behavior of DD that HHH must report on >>>> is completely proven. >>>> >>> Youy have your words wrong. They are only ABLE to use finite algorithms >>> of finite string operations. The problem they need to solve do not need >>> to be based on that, but on just general mappings of finite strings to >>> finite strings that might not be described by a finite algorithm. >>> The mapping is computable, *IF* we can find a finite algorith of >>> transformation steps to make that mapping. >>> >> There are no finite string operations that can be applied to the input >> to HHH(DD) that derive the behavior of of the directly executed DD thus >> DD is forbidden from reporting on this behavior. > Yes, there are, the operations that the processor executes. How did you > think it works? > When you try to actually show the actual steps instead of being stuck in utterly baseless rebuttal mode YOU FAIL! _DD() [00002133] 55 push ebp ; housekeeping [00002134] 8bec mov ebp,esp ; housekeeping [00002136] 51 push ecx ; make space for local [00002137] 6833210000 push 00002133 ; push DD [0000213c] e882f4ffff call 000015c3 ; call HHH(DD) [00002141] 83c404 add esp,+04 [00002144] 8945fc mov [ebp-04],eax [00002147] 837dfc00 cmp dword [ebp-04],+00 [0000214b] 7402 jz 0000214f [0000214d] ebfe jmp 0000214d [0000214f] 8b45fc mov eax,[ebp-04] [00002152] 8be5 mov esp,ebp [00002154] 5d pop ebp [00002155] c3 ret Size in bytes:(0035) [00002155] When any HHH emulates DD according to the finite string transformation rules specified by the x86 language (the line of demarcation between correct and incorrect emulation) no emulated DD can possibly reach its final halt state and halt. -- Copyright 2025 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer