Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Random-access machine
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Abstract machine in the general class of register machines}} {{Distinguish|Random-access memory|text=[[Random-access memory]]}} {{Multiple issues|{{More footnotes needed|date=December 2017}}{{Technical|date=December 2017}}{{Tone|date=December 2017}}}} In [[computer science]], '''random-access machine''' ('''RAM''' or '''RA-machine''') is a [[model of computation]] that describes an [[abstract machine]] in the general class of [[register machine]]s. The RA-machine is very similar to the [[counter machine]] but with the added capability of 'indirect addressing' of its registers. The 'registers' are intuitively equivalent to [[Random-access memory|main memory]] of a common computer, except for the additional ability of registers to store natural numbers of any size. Like the counter machine, the RA-machine contains the execution instructions in the finite-state portion of the machine (the so-called [[Harvard architecture]]). The RA-machine's equivalent of the [[universal Turing machine]]{{spaced ndash}}with its [[Computer program|program]] in the registers as well as its data{{spaced ndash}}is called the [[random-access stored-program machine]] or RASP-machine. It is an example of the so-called [[von Neumann architecture]] and is closest to the common notion of a [[computer]]. Together with the [[Turing machine]] and [[counter-machine model]]s, the RA-machine and RASP-machine models are used for [[computational complexity analysis]]. Van Emde Boas (1990) calls these three together with the [[pointer machine]], "sequential machine" models, to distinguish them from "[[parallel random-access machine]]" models. ==Informal description== An RA-machine consists of the following: * an infinite number of [[Random-access memory|memory locations]] called "'''registers'''"; each register has an [[Memory address|address]] which is a [[natural number]] or zero; each register can store exactly one natural number of any size, or a zero * the '''instruction table''', or just "table", containing execution instructions; the exact [[Instruction set architecture|instruction set]] varies depending on the author; common instructions include: increment, decrement, clear to zero, copy, conditional jump, halt; other instructions are unnecessary because they can be created by combinations of instructions from the instruction set * one special register called the "'''instruction register'''" (IR); this register points to the instruction being executed in the instruction table For a description of a similar concept, but humorous, see the esoteric programming language [[Brainfuck]].<ref>{{Cite web |last=Érdi |first=Gergő |date=6 September 2010 |title=From Register Machines to Brainfuck, part 1 |url=https://erdi.dev/blog/2010-09-06-from_register_machines_to_brainfuck,_part_1/ |access-date=2024-02-07}}</ref> ==Introduction to the model== The concept of a [[random-access]] machine (RAM) starts with the simplest model of all, the so-called [[counter machine]] model. Two additions move it away from the counter machine, however. The first enhances the machine with the convenience of indirect addressing; the second moves the model toward the more conventional accumulator-based [[computer]] with the addition of one or more auxiliary (dedicated) registers, the most common of which is called "the accumulator". === Formal definition === A ''random-access machine'' (RAM) is an abstract computational-machine model identical to a multiple-register [[counter machine]] with the addition of indirect addressing. At the discretion of instruction from its [[finite-state machine]]'s TABLE, the machine derives a "target" register's address either (i) directly from the instruction itself, or (ii) indirectly from the ''contents'' (e.g. number, label) of the "pointer" register specified in the instruction. By definition: A ''register'' is a location with both an ''address'' (a unique, distinguishable designation/locator equivalent to a natural number) and a ''content''{{spaced ndash}}a single natural number. For precision we will use the quasi-formal symbolism from Boolos-Burgess-Jeffrey (2002) to specify a register, its contents, and an operation on a register: * [r] means "the contents of register with address r". The label "r" here is a "variable" that can be filled with a natural number or a letter (e.g. "A") or a name. * → means "copy/deposit into", or "replaces", but without destruction of the source :: Example: [3] +1 → 3; means "The contents of source register with address "3", plus 1, is put into destination register with address "3" (here source and destination are the same place). If [3]=37, that is, the contents of register 3 is the number "37", then 37+1 = 38 will be put into register 3. :: Example: [3] → 5; means "The contents of source register with address "3" is put into destination register with address "5". If [3]=38, that is, the contents of register 3 is the number 38, then this number will be put into register 5. The contents of register 3 are not disturbed by this operation, so [3] continues to be 38, now the same as [5]. Definition: A ''direct'' instruction is one that specifies ''in the instruction itself'' the address of the source or destination register whose contents will be the subject of the instruction. Definition: An ''indirect instruction'' is one that specifies a "pointer register", the contents of which is the address of a "target" register. The target register can be either a source or a destination (the various COPY instructions provide examples of this). A register can address itself indirectly. :For want of a standard/convention this article will specify "direct/indirect", abbreviated as "d/i", as a parameter (or parameters) in the instruction: ::Example: COPY ( '''d''', A, '''i''', N ) means directly '''d''' get the source register's address (register "A") from the instruction itself but indirectly '''i''' get the destination address from pointer-register N. Suppose [N]=3, then register 3 is the destination and the instruction will do the following: [A] → 3. Definition: The contents of ''source register'' is used by the instruction. The source register's address can be specified either (i) directly by the instruction, or (ii) indirectly by the pointer register specified by the instruction. Definition: The contents of the ''pointer register'' is the ''address'' of the "target" register. Definition: The contents of the ''pointer register'' points to the ''target register''{{spaced ndash}}the "target" may be either a source or a destination register. Definition: The ''destination register'' is where the instruction deposits its result. The source register's address can be specified either (i) directly by the instruction, or (ii) indirectly by the pointer register specified by the instruction. The source and destination registers can be one. === Refresher: The counter-machine model === :''Melzak (1961) provides an easy visualization of a counter machine: its "registers" are holes in the ground, and these holes hold pebbles. Per an instruction, into and out of these holes "the computer" (person or machine) adds (INCrements) or removes (DECrements) a single pebble. As needed, additional pebbles come from, and excess pebbles go back into, an infinite supply; if the hole is too small to accommodate the pebbles the "computer" digs the hole bigger.'' :''Minsky (1961) and Hopcroft-Ullman 1979 (p. 171) offer the visualization of a multi-tape [[Turing machine]] with as many left-ended tapes as "registers". Each tape's length is unbounded to the right, and every square is blank except for the left end, which is marked. The ''distance'' of a tape's "head" from its left end, measured in numbers of tape-squares, represents the natural number in "the register". To DECrement the count of squares the tape head moves left; INCrement it moves right. There is no need to print or erase marks on the tape; the only conditional instructions are to check to see if the head is at the left end, by testing a left-end mark with a "Jump-if-marked instruction".'' :''The following instruction "mnemonics" e.g. "CLR (r)" are arbitrary; no standard exists.'' The [[register machine]] has, for a memory external to its finite-state machine{{spaced ndash}}an unbounded (cf: footnote|countable and unbounded) collection of discrete and uniquely labelled locations with ''unbounded'' capacity, called "registers". These registers hold only natural numbers (zero and positive integers). Per a list of sequential instructions in the finite-state machine's TABLE, a few (e.g. 2) types of primitive operations operate on the contents of these "registers". Finally, a ''conditional-expression'' in the form of an ''IF-THEN-ELSE'' is available to test the contents of one or two registers and "branch/jump" the finite-state machine out of the default instruction-sequence. '''Base model 1''': The model closest to Minsky's (1961) visualization and to Lambek (1961): * { INCrement contents of register r, DECrement contents of register r, ''IF'' contents of register r is Zero ''THEN'' Jump to instruction I<sub>z</sub> ''ELSE'' continue to next instruction }: {|class="wikitable" |- style="text-align:center; font-size:9pt; font-weight:bold; vertical-align:bottom;" ! style="width:63.6; height:12px;"| Instruction ! style="width:67.8;"| Mnemonic ! style="width:130.2;"| Action on register(s) "r" ! style="width:240.6;"| Action on finite-state machine's Instruction Register, IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| INCrement || INC ( r ) | style="text-align:center; "| [r] + 1 → r | style="text-align:center; "| [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| DECrement || DEC ( r ) | style="text-align:center; "| [r] - 1 → r | style="text-align:center; "| [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| Jump if Zero || JZ ( r, z ) | {{CNone|none}} | style="text-align:center; "| IF [r] = 0 THEN z → IR ELSE [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| Halt || H | {{CNone|none}} | style="text-align:center; "| [IR] → IR |} '''Base model 2''': The "successor" model (named after the successor function of the [[Peano axioms]]): * { INCrement the contents of register r, CLeaR the contents of register r, ''IF'' contents of register r<sub>j</sub> Equals the contents of register r<sub>k</sub> ''THEN'' Jump to instruction I<sub>z</sub> ''ELSE'' goto to next instruction } {|class="wikitable" |- style="text-align:center; font-size:9pt; font-weight:bold; vertical-align:bottom;" ! style="width:63.6; height:12px;"| Instruction ! style="width:67.8;"| Mnemonic ! style="width:130.2;"| Action on register(s) "r" ! style="width:240.6;"| Action on finite-state machine's Instruction Register, IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| CLeaR || CLR ( r ) | style="text-align:center; "| 0 → r | style="text-align:center; "| [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| INCrement || INC ( r ) | style="text-align:center; "| [r] + 1 → r | style="text-align:center; "| [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| Jump if Equal || JE (r1, r2, z) | {{CNone|none}} | style="text-align:center; "| IF [r1] = [r2] THEN z → IR ELSE [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| Halt || H | {{CNone|none}} | style="text-align:center; "| [IR] → IR |} '''Base model 3''': Used by Elgot-Robinson (1964) in their investigation of bounded and unbounded RASPs{{spaced ndash}}the "successor" model with COPY in the place of CLEAR: * { INCrement the contents of register r, COPY the contents of register r<sub>j</sub> to register r<sub>k</sub>, ''IF'' contents of register r<sub>j</sub> Equals the contents of register r<sub>k</sub> ''then'' Jump to instruction I<sub>z</sub> ''ELSE'' goto to next instruction } {|class="wikitable" |- style="text-align:center; font-size:9pt; font-weight:bold; vertical-align:bottom;" ! style="width:63.6; height:12px;"| Instruction ! style="width:67.8;"| Mnemonic ! style="width:130.2;"| Action on register(s) "r" ! style="width:240.6;"| Action on finite-state machine's Instruction Register, IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| COPY || COPY (r1, r2) | style="text-align:center; "| [r1] → r2 | style="text-align:center; "| [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| INCrement || INC ( r ) | style="text-align:center; "| [r] + 1 → r | style="text-align:center; "| [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| Jump if Equal || JE (r1, r2, z) | {{CNone|none}} | style="text-align:center; "| IF [r1] = [r2] THEN z → IR ELSE [IR] + 1 → IR |- style="font-size:9pt; vertical-align:bottom;" | style="height:11.4; "| Halt || H | {{CNone|none}} | style="text-align:center; "| [IR] → IR |} ===Creating "convenience instructions" from the base sets=== The three base sets 1, 2, or 3 above are equivalent in the sense that one can create the instructions of one set using the instructions of another set (an interesting exercise: a hint from Minsky (1967){{spaced ndash}}declare a reserved register e.g. call it "0" (or Z for "zero" or E for "erase") to contain the number 0). The choice of model will depend on which an author finds easiest to use in a demonstration, or a proof, etc. Moreover, from base sets 1, 2, or 3 we can create ''any'' of the [[primitive recursive function]]s ( cf Minsky (1967), Boolos-Burgess-Jeffrey (2002) ). (How to cast the net wider to capture the ''total'' and ''partial'' [[mu recursive function]]s will be discussed in context of indirect addressing). However, building the primitive recursive functions is difficult because the instruction sets are so ... primitive (tiny). One solution is to expand a particular set with "convenience instructions" from another set: :''These will not be subroutines in the conventional sense but rather ''blocks'' of instructions created from the base set and given a mnemonic. In a formal sense, to use these blocks we need to either (i) "expand" them into their base-instruction equivalents{{spaced ndash}}they will require the use of temporary or "auxiliary" registers so the model must take this into account, or (ii) design our machines/models with the instructions 'built in'.'' :Example: Base set 1. To create CLR (r) use the block of instructions to count down register r to zero. Observe the use of the hint mentioned above: :* CLR (r) =<sub>equiv</sub> :* ''loop'': JZ (r, ''exit'') ::* DEC (r) ::* JZ (0, ''loop'') :* ''exit'': etc. Again, all of this is for convenience only; none of this increases the model's intrinsic power. For example: the most expanded set would include each unique instruction from the three sets, plus unconditional jump J (z) i.e.: * { CLR (r), DEC (r), INC (r), CPY ( r<sub>s</sub>, r<sub>d</sub> ), JZ (r, z), JE ( r<sub>j</sub>, r<sub>k</sub>, z ), J(z) } Most authors pick one or the other of the conditional jumps, e.g. Shepherdson-Sturgis (1963) use the above set minus JE (to be perfectly accurate they use JNZ{{spaced ndash}}Jump if ''Not'' Zero in place of JZ; yet another possible convenience instruction). == The "indirect" operation == === Example of indirect addressing === In our daily lives the notion of an "indirect operation" is not unusual. :Example: A treasure hunt. :At location "Tom_&_Becky's_cave_in_pirate_chest" will be where we can find a map directing us to "the treasure": ::(1) We go to location "Tom_&_Becky's_cave..." and dig around until we find a wooden box ::(2) Inside the box is a map to the location of the treasure: "under_Thatcher's_front_porch" ::(3) We go to location "under_Thatcher's_front_porch", jackhammer away the concrete, and discover "the treasure": a sack of rusty door-knobs. [[Indirection]] specifies a location identified as the pirate chest in "Tom_&_Becky's_cave..." that acts as a ''pointer'' to any other location (including itself): its contents (the treasure map) provides the "address" of the ''target'' location "under_Thatcher's_front_porch" where the real action is occurring. ===Why the need for an indirect operation: Two major problems with the counter-machine model=== In the following one must remember that these models are abstract models with two fundamental differences from anything physically real: unbounded numbers of registers each with unbounded capacities. The problem appears most dramatically when one tries to use a counter-machine model to build a RASP that is [[Turing completeness|Turing equivalent]] and thus compute any partial [[mu recursive function]]: * ''Melzak (1961) added indirection to his "hole-and-pebble" model so that his model could modify itself with a "computed goto" and provides two examples of its use ("Decimal representation in the scale of d" and "Sorting by magnitude", whether these are used in his proof that the model is Turing equivalent is unclear since "the program itself is left to the reader as an exercise" (p. 292)). Minsky (1961, 1967) was able to demonstrate that, with suitable (but difficult-to-use) [[Gödel number]] encoding, the register model did not need indirection to be Turing equivalent; but it did need at least one unbounded register. As noted below, Minsky (1967) hints at the problem for a RASP but doesn't offer a solution. Elgot and Robinson (1964) proved that their RASP model P<sub>0</sub>{{spaced ndash}}it has no indirection capability{{spaced ndash}}cannot compute all "recursive sequential functions" (ones that have parameters of arbitrary length) if it does not have the capability of modifying its own instructions, but it can via Gödel numbers if it does (p. 395-397; in particular figure 2 and footnote p. 395). On the other hand their RASP model P'<sub>0</sub> equipped with an "index register" (indirect addressing) can compute all the "partial recursive sequential functions" (the mu recursive functions) (p. 397-398).'' :''Cook and Reckhow (1973) say it most succinctly:'' ::''The indirect instructions are necessary in order for a fixed program to access an unbounded number of registers as the inputs vary." (p. 73)'' * '''Unbounded ''capacities'' of registers versus bounded capacities of state-machine instructions''': The so-called ''finite'' state part of the machine is supposed to be{{spaced ndash}}by the normal definition of algorithm{{spaced ndash}}''very'' finite both in the number of "states" (instructions) and the instructions' sizes (their capacity to hold symbols/signs). So how does a state machine move an arbitrarily large constant directly into a register, e.g. MOVE (k, r) (Move constant k to register r)? If huge constants are necessary they must either start out in the registers themselves or be created by the state machine using a finite number of instructions e.g. multiply and add subroutines using INC and DEC (but not a quasi-infinite number of these!). ::''Sometimes the constant k will be created by use of CLR ( r ) followed by INC ( r ) repeated k times{{spaced ndash}}e.g. to put the constant k=3 into register r, i.e. 3 → r, so at the end of the instruction [r]=3: CLR (r), INC (r), INC (r), INC (r). This trick is mentioned by Kleene (1952) p. 223. The problem arises when the number to be created exhausts the number of instructions available to the ''finite'' state machine; there is always a bigger constant than the number of instructions available to the ''finite'' state machine.'' * '''Unbounded ''numbers'' of registers versus bounded state-machine instructions''': This is more severe than the first problem. In particular, this problem arises when we attempt to build a so-called RASP, a "universal machine" (see more at [[Universal Turing machine]]) that uses its finite-state machine to interpret a "program of instructions" located in its registers{{spaced ndash}}i.e. we are building what is nowadays called a [[computer]] with the [[von Neumann architecture]]. :Observe that the counter machine's finite-state machine must call out a register ''explicitly'' (directly) by its name/number: INC (65,356) calls out register number "65,365" ''explicitly''. If the number of registers exceeds the capability of the ''finite'' state machine to address them, then registers outside the bounds will be unreachable. For example, if the finite-state machine can only reach 65,536 = 2<sup>16</sup> registers then how can it reach the 65,537th? So how ''do'' we address a register beyond the bounds of the finite-state machine? One approach would be to modify the ''program''-instructions (the ones stored in the registers) so that they contain more than one command. But this too can be exhausted unless an instruction is of (potentially) unbounded size. So why not use just one "über-instruction"{{spaced ndash}}one really really big number{{spaced ndash}}that contains ''all'' the program instructions encoded into it! This is how Minsky solves the problem, but the [[Gödel number]]ing he uses represents a great inconvenience to the model, and the result is nothing at all like our intuitive notion of a "stored program computer". Elgot and Robinson (1964) come to a similar conclusion with respect to a RASP that is "finitely determined". Indeed it can access an unbounded number of registers (e.g. to fetch instructions from them) but only if the RASP allows "self modification" of its ''program'' instructions, and has encoded its "data" in a Gödel number (Fig. 2 p. 396). In the context of a more computer-like model using his RPT (repeat) instruction Minsky (1967) tantalizes us with a solution to the problem (cf p. 214, p. 259) but offers no firm resolution. He asserts: :"In general a RPT operation could not be an instruction in the finite-state part of the machine ... this might exhaust any particular amount of storage allowed in the finite part of the computer [sic, his name for his RAM models]. RPT operations require infinite registers of their own." (p. 214). He offers us a ''bounded'' RPT that together with CLR (r) and INC (r) can compute any [[primitive recursive function]], and he offers the unbounded RPT quoted above that as playing the role of μ operator; it together with CLR (r) and INC (r) can compute the mu recursive functions. But he does not discuss "indirection" or the RAM model per se. From the references in Hartmanis (1971) it appears that Cook (in his lecture notes while at UC Berkeley, 1970) has firmed up the notion of indirect addressing. This becomes clearer in the paper of Cook and Reckhow (1973){{spaced ndash}}Cook is Reckhow's Master's thesis advisor. Hartmanis' model{{spaced ndash}}quite similar to Melzak's (1961) model{{spaced ndash}}uses two and three-register adds and subtracts and two parameter copies; Cook and Reckhow's model reduce the number of parameters (registers called out in the program instructions) to one call-out by use of an accumulator "AC". '''The solution in a nutshell:''' Design our machine/model with unbounded '''indirection'''{{spaced ndash}}provide an ''unbounded'' "address" register that can potentially name (call out) any register no matter how many there are. For this to work, in general, the ''unbounded'' register requires an ability to be cleared and then incremented (and, possibly, decremented) by a potentially infinite loop. In this sense the solution represents the unbounded [[μ operator]] that can, if necessary, hunt ad infinitum along the unbounded string of registers until it finds what it is looking for. The pointer register is exactly like any other register with one exception: under the circumstances called "indirect addressing" it provides ''its'' contents, rather than the address-operand in the state machine's TABLE, to be the address of the target register (including possibly itself!). === Bounded indirection and the primitive recursive functions === If we eschew the Minsky approach of one monster number in one register, and specify that our machine model will be "like a computer" we have to confront this problem of indirection if we are to compute the recursive functions (also called the [[μ-recursive function]]s ){{spaced ndash}}both total and partial varieties. Our simpler counter-machine model can do a "bounded" form of indirection{{spaced ndash}}and thereby compute the sub-class of [[primitive recursive function]]s{{spaced ndash}}by using a primitive recursive "operator" called "definition by cases" (defined in Kleene (1952) p. 229 and Boolos-Burgess-Jeffrey p. 74). Such a "bounded indirection" is a laborious, tedious affair. "Definition by cases" requires the machine to determine/distinguish the contents of the pointer register by attempting, time after time until success, to match this contents against a number/name that the case operator ''explicitly'' declares. Thus the definition by cases starts from e.g. the lower bound address and continues ad nauseam toward the upper bound address attempting to make a match: : ''Is the number in register N equal to 0? If not then is it equal to 1? 2? 3? ... 65364? If not then we're at the last number 65365 and this had better be the one, else we have a problem!'' "Bounded" indirection will not allow us to compute the partial recursive functions{{spaced ndash}}for those we need ''unbounded'' indirection aka the [[μ operator]]. :''Suppose we had been able to continue on to number 65367, and in fact that register had what we were looking for. Then we could have completed our calculation successfully! But suppose 65367 didn't have what we needed. How far should we continue to go?'' To be [[Turing completeness|Turing equivalent]] the counter machine needs to either use the unfortunate single-register Minsky [[Gödel number]] method, or be augmented with an ability to explore the ends of its register string, ad infinitum if necessary. (A failure to find something "out there" defines what it means for an algorithm to fail to terminate; cf Kleene (1952) pp. 316ff ''Chapter XII Partial Recursive Functions'', in particular p. 323-325.) See more on this in the example below. === Unbounded indirection and the partial recursive functions === For ''unbounded'' indirection we require a "hardware" change in our machine model. Once we make this change the model is no longer a counter machine, but rather a random-access machine. Now when e.g. INC is specified, the finite-state machine's instruction will have to specify ''where'' the address of the register of interest will come from. This ''where'' can be either (i) the state machine's instruction that provides an ''explicit label'', or (ii) the ''pointer-register'' whose ''contents'' is the address of interest. Whenever an instruction specifies a register address it now will ''also'' need to specify an additional parameter "i/d"{{spaced ndash}}"indirect/direct". In a sense this new "i/d" parameter is a "switch" that flips one way to get the direct address as specified in the instruction or the other way to get the indirect address from the pointer register (which pointer register{{spaced ndash}}in some models every register can be a pointer register{{spaced ndash}}is specified by the instruction). This "mutually exclusive but exhaustive choice" is yet another example of "definition by cases", and the arithmetic equivalent shown in the example below is derived from the definition in Kleene (1952) p. 229. :Example: CPY ( indirect<sub>source</sub>, r<sub>source</sub>, direct<sub>destination</sub>, r<sub>destination</sub> ) :Assign a code to specify direct addressing as d="0" and indirect addressing as i="1". Then our machine can determine the source address as follows: :: i*[r<sub>s</sub>] + (1-i)*r<sub>s</sub> :For example, suppose the contents of register 3 are "5" (i.e. [3]=5 ) and the contents of register 4 are "2" (i.e. [4]=2 ): :: Example: CPY ( 1, 3, 0, 4 ) = CPY ( indirect, reg 3, direct, reg 4 ) ::: 1*[3] + 0*3 = [3] = source-register address 5 ::: 0*[4] + 1*4 = 4 = destination-register address 4 :: Example: CPY ( 0, 3, 0, 4 ) ::: 0*[3] + 1*3 = 3 = source-register address 3 ::: 0*[4] + 1*4 = 4 = destination-register address 4 :: Example: CPY ( 0, 3, 1, 4 ) ::: 0*[3] + 1*3 = 3 = source-register address 3 ::: 1*[4] + 0*4 = [4] = destination-register address 2 === The indirect COPY instruction === Probably the most useful of the added instructions is COPY. Indeed, Elgot-Robinson (1964) provide their models P<sub>0</sub> and P'<sub>0</sub> with the COPY instructions, and Cook-Reckhow (1973) provide their accumulator-based model with only two indirect instructions{{spaced ndash}}COPY to accumulator indirectly, COPY from accumulator indirectly. '''A plethora of instructions''': Because any instruction acting on a single register can be augmented with its indirect "dual" (including conditional and unconditional jumps, cf the Elgot-Robinson model), the inclusion of indirect instructions will double the number of single parameter/register instructions (e.g. INC (d, r), INC (i, r)). Worse, every two parameter/register instruction will have 4 possible varieties, e.g.: : CPY (d, r<sub>s</sub>, d, r<sub>d</sub> ) = COPY directly from source-register directly to destination-register : CPY (i, r<sub>sp</sub>, d, r<sub>d</sub> ) = COPY to destination-register indirectly using the source address to be found in the source-pointer register r<sub>sp</sub>. : CPY (d, r<sub>s</sub>, i, r<sub>dp</sub> ) = COPY contents of source-register indirectly into register using destination address to be found in the destination-pointer register r<sub>dp</sub>. : CPY (i, r<sub>sp</sub>, i, r<sub>dp</sub> ) = COPY indirectly the contents of the source register with address to be found in source-pointer register r<sub>sp</sub>, into the destination register with address to be found in the destination-pointer register r<sub>dp</sub>) In a similar manner every three-register instruction that involves two source registers r<sub>s1</sub> r<sub>s2</sub> and a destination register r<sub>d</sub> will result in 8 varieties, for example the addition: :: [r<sub>s1</sub>] + [r<sub>s2</sub>] → r<sub>d</sub> will yield: * ADD ( d, r<sub>s1</sub>, d, r<sub>s2</sub>, d, r<sub>d</sub> ) * ADD ( i, r<sub>sp1</sub>, d, r<sub>s2</sub>, d, r<sub>d</sub> ) * ADD ( d, r<sub>s1</sub>, i, r<sub>sp2</sub>, d, r<sub>d</sub> ) * ADD ( i, r<sub>sp1</sub>, i, r<sub>sp2</sub>, d, r<sub>d</sub> ) * ADD ( d, r<sub>s1</sub>, d, r<sub>s2</sub>, i, r<sub>dp</sub> ) * ADD ( i, r<sub>sp1</sub>, d, r<sub>s2</sub>, i, r<sub>dp</sub> ) * ADD ( d, r<sub>s1</sub>, i, r<sub>sp2</sub>, i, r<sub>dp</sub> ) * ADD ( i, r<sub>sp1</sub>, i, r<sub>sp2</sub>, i, r<sub>dp</sub> ) If we designate one register to be the "accumulator" (see below) and place strong restrictions on the various instructions allowed then we can greatly reduce the plethora of direct and indirect operations. However, one must be sure that the resulting reduced instruction-set is sufficient, and we must be aware that the reduction will come at the expense of more instructions per "significant" operation. == The notion of "accumulator A" == Historical convention dedicates a register to the accumulator, an "arithmetic organ" that literally accumulates its number during a sequence of arithmetic operations: :"The first part of our arithmetic organ ... should be a parallel storage organ which can receive a number and add it to the one already in it, which is also able to clear its contents and which can store what it contains. We will call such an organ an ''Accumulator''. It is quite conventional in principle in past and present computing machines of the most varied types, e.g. desk multipliers, standard IBM counters, more modern relay machines, the ENIAC" (boldface in original: Goldstine and von Neumann, 1946; p. 98 in Bell and Newell 1971). However, the accumulator comes at the expense of more instructions per arithmetic "operation", in particular with respect to what are called 'read-modify-write' instructions such as "Increment indirectly the contents of the register pointed to by register r2 ". "A" designates the "accumulator" register A: {|class="wikitable" |- style="text-align:left; font-size:9pt; vertical-align:bottom;" ! style="width:49.2; font-weight:bold; height:12px;"| Label ! style="font-weight:bold; width:70.2;"| Instruction ! style="width:4.8;"| ! style="font-weight:bold; width:24px;"| A ! style="font-weight:bold; width:47.4;"| r2 ! style="font-weight:bold; width:64.2;"| r378,426 ! style="font-weight:bold; width:267px;"| Description |- style="text-align:left; font-size:9pt; vertical-align:bottom;" | style="height:12px;"| | | | . . . | 378,426 | 17 | |- style="text-align:left; font-size:9pt; vertical-align:bottom;" | style="font-style:Italic; height:12px;"| INCi ( r2 ): | CPY ( i, r2, d, A ) | |style="font-weight:bold" | 17 | 378,426 | 17 | Contents of r2 points to r378,426 with contents "17": copy this to A |- style="text-align:left; font-size:9pt; vertical-align:bottom;" | style="height:12px;"| | INC ( A ) | |style="font-weight:bold" | 18 | 378,426 | 17 | Incement contents of A |- style="text-align:left; font-size:9pt; vertical-align:bottom;" | style="height:12px;"| | CPY ( d, A, i, r2 ) | | 18 | 378,426 |style="font-weight:bold" | 18 | Contents of r2 points to r378,426: copy contents of A into r378,426 |} If we stick with a specific name for the accumulator, e.g. "A", we can imply the accumulator in the instructions, for example, : INC ( A ) = INCA However, when we write the CPY instructions without the accumulator called out the instructions are ambiguous or they must have empty parameters: : CPY ( d, r2, d, A ) = CPY (d, r2, , ) : CPY ( d, A, d, r2 ) = CPY ( , , d, r2) Historically what has happened is these two CPY instructions have received distinctive names; however, no convention exists. Tradition (e.g. [[Donald Knuth|Knuth]]'s (1973) imaginary [[MIX (abstract machine)|MIX]] computer) uses two names called LOAD and STORE. Here we are adding the "i/d" parameter: : LDA ( d/i, r<sub>s</sub> ) =<sub>def</sub> CPY ( d/i, r<sub>s</sub>, d, A ) : STA ( d/i, r<sub>d</sub> ) =<sub>def</sub> CPY ( d, A, d/i, r<sub>d</sub> ) The typical accumulator-based model will have all its two-variable arithmetic and constant operations (e.g. ADD (A, r), SUB (A, r) ) use (i) the accumulator's contents, together with (ii) a specified register's contents. The one-variable operations (e.g. INC (A), DEC (A) and CLR (A) ) require only the accumulator. Both instruction-types deposit the result (e.g. sum, difference, product, quotient or remainder) in the accumulator. : Example: INCA = [A] +1 → A : Example: ADDA (r<sub>s</sub>) = [A] + [r<sub>s</sub>] → A : Example: MULA (r<sub>s</sub>) = [A] * [r<sub>s</sub>] → A If we so choose, we can abbreviate the mnemonics because at least one source-register and the destination register is always the accumulator A. Thus we have : :{ LDA (i/d, r<sub>s</sub>), STA (i/d, r<sub>d</sub>), CLRA, INCA, DECA, ADDA (r<sub>s</sub>), SUBA (r<sub>s</sub>), MULA (r<sub>s</sub>), DIVA (r<sub>s</sub>), etc.) == The notion of indirect address register "N" == If our model has an ''unbounded accumulator'' can we ''bound'' all the other registers? Not until we provide for at least one unbounded register from which we derive our indirect addresses. The minimalist approach is to use itself (Schönhage does this). Another approach (Schönhage does this too) is to declare a specific register the "indirect address register" and confine indirection relative to this register (Schonhage's RAM0 model uses both A and N registers for indirect as well as direct instructions). Again our new register has no conventional name{{spaced ndash}}perhaps "N" from "iNdex", or "iNdirect" or "address Number". For maximum flexibility, as we have done for the accumulator A{{spaced ndash}}we will consider N just another register subject to increment, decrement, clear, test, direct copy, etc. Again we can shrink the instruction to a single-parameter that provides for direction and indirection, for example. : LDAN (i/d) = CPY (i/d, N, d, A); LoaD Accumulator via iNdirection register : STAN (i/d) = CPY (d, A, i/d, N). STore Accumulator via iNdirection register Why is this such an interesting approach? At least two reasons: '''(1) An instruction set with no parameters:''' Schönhage does this to produce his RAM0 instruction set. See section below. '''(2) Reduce a RAM to a Post-Turing machine:''' Posing as minimalists, we reduce all the registers excepting the accumulator A and indirection register N e.g. '''r''' = { r0, r1, r2, ... } to an unbounded string of (very-) bounded-capacity pigeon-holes. These will do nothing but hold (very-) bounded numbers e.g. a lone bit with value { 0, 1 }. Likewise we shrink the accumulator to a single bit. We restrict any arithmetic to the registers { A, N }, use indirect operations to pull the contents of registers into the accumulator and write 0 or 1 from the accumulator to a register: :{ LDA (i, N), STA (i, N), CLR (A/N), INC (A/N), DEC(N), JZ (A/N, I<sub>z</sub>), JZ (I<sub>z</sub>), H } We push further and eliminate A altogether by the use of two "constant" registers called "ERASE" and "PRINT": [ERASE]=0, [PRINT]=1. :{ CPY (d, ERASE, i, N), CPY (d, PRINT, i, N), CLR (N), INC (N), DEC (N), JZ (i, N, I<sub>z</sub>), JZ (I<sub>z</sub>), H } Rename the COPY instructions and call INC (N) = RIGHT, DEC (N) = LEFT and we have the same instructions as the Post-Turing machine, plus an extra CLRN : :{ ERASE, PRINT, CLRN, RIGHT, LEFT, JZ (i, N, I<sub>z</sub>), JZ (I<sub>z</sub>), H } == Turing equivalence of the RAM with indirection == In the section above we informally showed that a RAM with an unbounded indirection capability produces a [[Post–Turing machine]]. The Post–Turing machine is Turing equivalent, so we have shown that the RAM with indirection is Turing equivalent. We give here a slightly more formal demonstration. Begin by designing our model with three reserved registers "E", "P", and "N", plus an unbounded set of registers 1, 2, ..., n to the right. The registers 1, 2, ..., n will be considered "the squares of the tape". Register "N" points to "the scanned square" that "the head" is currently observing. The "head" can be thought of as being in the conditional jump{{spaced ndash}}observe that it uses indirect addressing (cf Elgot-Robinson p. 398). As we decrement or increment "N" the (apparent) head will "move left" or "right" along the squares. We will move the contents of "E"=0 or "P"=1 to the "scanned square" as pointed to by N, using the indirect CPY. The fact that our tape is left-ended presents us with a minor problem: Whenever LEFT occurs our instructions will have to test to determine whether or not the contents of "N" is zero; if so we should leave its count at "0" (this is our choice as designers{{spaced ndash}}for example we might have the machine/model "trigger an event" of our choosing). :Instruction set 1 (augmented): { INC (N), DEC (N), CLR (N), CPY (d, r<sub>s</sub>,i, N), JZ ( i, r, z ), HALT } The following table both defines the Post-Turing instructions in terms of their RAM equivalent instructions and gives an example of their functioning. The (apparent)location of the head along the tape of registers r0-r5 . . . is shown shaded: {|class="toccolours" |- style="text-align:left; font-size:9pt; vertical-align:bottom; background:lavender;" ! style="width:51.6; font-weight:bold; height:12px;"| Mnemonic ! style="font-weight:bold; width:60px;"| label: | | style="width:4.8;"| ! style="font-weight:bold; width:16.2;"| E ! style="font-weight:bold; width:16.2;"| P ! style="font-weight:bold; width:16.2;"| N ! style="font-weight:bold; width:4.8;"| ! style="font-weight:bold; width:14.4;"| r0 ! style="font-weight:bold; width:14.4;"| r1 ! style="font-weight:bold; width:14.4;"| r2 ! style="font-weight:bold; width:14.4;"| r3 ! style="font-weight:bold; width:14.4;"| r4 ! style="font-weight:bold; width:14.4;"| r5 ! style="font-weight:bold; width:22.8;"| etc. ! style="font-weight:bold; width:84px;"| Action on registers ! style="font-weight:bold; width:229.2;"| Action on finite-state machine Instruction Register IR |- style="text-align:left; font-size:9pt; vertical-align:top;" | style="height:3.6;"| | | | | | | | | | | | | | | | | |- style="text-align:left; font-size:9pt; vertical-align:top;" | style="height:9.6;"| |style="font-style:Italic" | start: | | | 0 | 1 | 3 | | | | | style="background:silver;"| 1 | 0 | | | | |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3.6; "| | style="text-align:left; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| R | style="text-align:left; font-style:Italic; "| right: | style="text-align:left;" | INC ( N ) | style="text-align:left; "| | style="text-align:left; color:#969696; "| 0 | style="text-align:left; color:#969696; "| 1 | style="text-align:left; font-weight:bold; "| 4 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| 1 | style="text-align:left; background:silver; "| 0 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| [N] +1 → N | style="text-align:left; "| [IR] +1 → IR |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3.6; "| | style="text-align:left; font-style:Italic; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| P | style="text-align:left; font-style:Italic; "| print: | style="text-align:left;" | CPY ( d, P, i, N ) | style="text-align:left; "| | style="text-align:left; font-weight:bold; color:#969696; "| 0 | style="text-align:left; font-weight:bold; "| 1 | style="text-align:left; color:#969696; "| 4 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| 1 | style="text-align:left; background:silver; font-weight:bold; "| 1 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| [P]=1 → [N]=r4 | style="text-align:left; "| [IR] +1 → IR |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3px; "| | style="text-align:left; font-style:Italic; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| E | style="text-align:left; font-style:Italic; "| erase: | style="text-align:left;" | CPY ( d, E, i, N ) | style="text-align:left; "| | style="text-align:left; font-weight:bold; "| 0 | style="text-align:left; color:#969696; "| 1 | style="text-align:left; font-weight:bold; "| 4 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| 1 | style="text-align:left; background:silver; font-weight:bold; "| 0 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| [E]=0 → [N]=r4 | style="text-align:left; "| [IR] +1 → IR |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3px; "| | style="text-align:left; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| L | style="text-align:left; font-style:Italic; "| left: | style="text-align:left;" | JZ ( i, N, end ) | style="text-align:left; "| | style="text-align:left; "| 0 | style="text-align:left; color:#969696; "| 1 | style="text-align:left; font-weight:bold; "| 4 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| 1 | style="text-align:left; background:silver; "| 0 | style="text-align:left; "| | style="text-align:left; "| | {{CNone|none}} | style="text-align:left; "| IF [[N]] =r4] =0 THEN "end" → IR else [IR]+1 → IR |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| | style="text-align:left; font-style:Italic; "| | style="text-align:left;" | DEC ( N ) | style="text-align:left; "| | style="text-align:left; "| 0 | style="text-align:left; color:#969696; "| 1 | style="text-align:left; font-weight:bold; "| 3 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; background:silver; "| 1 | style="text-align:left; color:#969696; "| 0 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| [N] -1 → N | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3px; "| | style="text-align:left; font-style:Italic; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| J0 ( halt ) | style="text-align:left; font-style:Italic; "| jump_if_blank: | style="text-align:left;" | JZ ( i, N, end ) | style="text-align:left; "| | style="text-align:left; "| 0 | style="text-align:left; color:#969696; "| 1 | style="text-align:left; font-weight:bold; "| 3 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; background:silver; "| 1 | style="text-align:left; color:#969696; "| 0 | style="text-align:left; "| | style="text-align:left; "| | {{CNone|none}} | style="text-align:left; "| IF N =r3] =0 THEN "end" → IR else [IR]+1 → IR |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3px; "| | style="text-align:left; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| J1 ( halt ) | style="text-align:left; font-style:Italic; "| jump_if_mark: | style="text-align:left;" | JZ ( i, N, halt ) | style="text-align:left; "| | style="text-align:left; "| 0 | style="text-align:left; color:#969696; "| 1 | style="text-align:left; font-weight:bold; "| 3 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; background:silver; "| 1 | style="text-align:left; color:#969696; "| 0 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| N =r3] → A | style="text-align:left; "| IF N =r3] =0 THEN "end" → IR else [IR]+1 → IR |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:9.6; "| | style="text-align:left; font-style:Italic; "| end || . . . etc. | style="text-align:left; "| | style="text-align:left; "| 0 | style="text-align:left; "| 1 | style="text-align:left; "| 3 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; background:silver; "| 1 | style="text-align:left; "| 0 | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="font-size:9pt; vertical-align:top;" | style="text-align:left; height:3px; "| | style="text-align:left; font-style:Italic; "| || | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| | style="text-align:left; color:#969696; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; color:#969696; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| | style="text-align:left; "| |- style="text-align:left; font-size:9pt; vertical-align:top;" | style="height:9.6;"| |style="font-style:Italic" | halt: | H | | 0 |style="color:#969696" | 1 |style="color:#969696" | 3 | | | | | style="background:silver;"| 1 |style="color:#969696" | 0 | | | {{CNone|none}} | [IR] +1 → IR |} == Example: Bounded indirection yields a machine that is not Turing equivalent == Throughout this demonstration we have to keep in mind that the instructions in the finite-state machine's TABLE is ''bounded'', i.e. ''finite'': :"Besides a merely being a ''finite set of rules'' which gives a sequence of operations for solving a specific type of problem, an algorithm has five important features [Finiteness, Definiteness, Input, Output, Effectiveness]" (italics added, Knuth p. 4-7). :''The difficulty arises because the registers have explicit "names" (numbers) and our machine must call each out by name in order to "access" it.'' We will build the indirect CPY ( i, q, d, φ ) with the CASE operator. The address of the target register will be specified by the contents of register "q"; once the CASE operator has determined what this number is, CPY will directly deposit the contents of the register with that number into register "φ". We will need an additional register that we will call "y"{{spaced ndash}}it serves as an up-counter. :''So the following is actually a constructive demonstration or proof that we can indeed simulate the indirect CPY ( i, q, d, φ ) without a "hardware" design change to our counter machine/model. However, note that because this indirect CPY is "bounded" by the size/extent of the finite-state machine, a RASP using this indirect CPY can only calculate the [[primitive recursive functions]], not the full suite of [[mu recursive function]]s.'' The CASE "operator" is described in Kleene (1952) (p. 229) and in Boolos-Burgess-Jeffrey (2002) (p. 74); the latter authors emphasize its utility. The following definition is per Kleene but modified to reflect the familiar "IF-THEN-ELSE" construction. The CASE operator "returns" a natural number into φ depending on which "case" is satisfied, starting with "case_0" and going successively through "case_last"; if no case is satisfied then the number called "default" (aka "woops") is returned into φ (here '''x''' designates some selection of parameters, e.g. register q and the string r0, ... rlast )): ''Definition by cases'' φ ('''x''', y): :* case_0: IF Q<sub>0</sub>('''x''', y) is true THEN φ<sub>0</sub>('''x''', y) ELSE :* case_1: IF Q<sub>1</sub>('''x''', y) is true THEN φ<sub>1</sub>('''x''', y) ELSE :* cases_2 through case_next_to_last: etc. . . . . . . . . ELSE :* case_last: IF Q<sub>last</sub>('''x''', y) is true THEN φ<sub>last</sub>('''x''', y) ELSE :* default: do φ<sub>default</sub>('''x''', y) Kleene require that the "predicates" Q<sub>n</sub> that doing the testing are all mutually exclusive{{spaced ndash}}"predicates" are functions that produce only { true, false } for output; Boolos-Burgess-Jeffrey add the requirement that the cases are "exhaustive". We begin with a number in register q that represents the address of the target register. But what is this number? The "predicates" will test it to find out, one trial after another: JE (q, y, z) followed by INC (y). Once the number is identified explicitly, the CASE operator directly/explicitly copies the contents of this register to φ: :''Definition by cases'' CPY (i, q, d, φ) =<sub>def</sub> φ (q, r0, ..., rlast, y) = :* case_0: IF CLR (y), [q] - [y]=0 THEN CPY ( r0, φ ), J (exit) ELSE :* case_1: IF INC (y), [q] = [y]=1 THEN CPY ( r1, φ ), J (exit) ELSE :* case_2 through case n: IF . . . THEN . . . ELSE :* case_n: IF INC (y), [q] = [y]=n THEN CPY ( rn, φ ), J (exit) ELSE :* case_n+1 to case_last: IF . . . THEN . . . ELSE :* case_last: IF INC (y), [q] = [y]="last" THEN CPY ( rlast, φ ), J (exit) ELSE :* default: woops Case_0 ( the base step of the recursion on y) looks like this: :* ''case_0'': ::* CLR ( y ) ; set register y = 0 ::* JE ( q, y, ''_φ0'' ) ::* J ( ''case_1'' ) :::* ''_φ0:'' CPY ( r0, φ ) :::* J ( ''exit'' ) :* ''case_1:'' etc. Case_n (the induction step) looks like this; remember, each instance of "n", "n+1", ..., "last" must be an explicit natural number: :* ''case_n'': ::* INC ( y ) ::* JE ( q, y, ''_φn'' ) ::* J ( ''case_n+1'') :::* ''_φn:'' CPY ( rn, φ ) :::* J ( ''exit'' ) :*''case__n+1:'' etc. Case_last stops the induction and bounds the CASE operator (and thereby bounds the "indirect copy" operator): :* ''case_last'': ::* INC ( y ) ::* JE ( q, y, ''_φlast'' ) ::* J ( ''woops'' ) :::* ''_φlast'': CPY ( rlast, φ ) :::* J ( ''exit'' ) :*''woops:'' how do we handle an out-of-bounds attempt? :*''exit:'' etc. If the CASE could continue ad infinitum it would be the [[mu operator]]. But it can't{{spaced ndash}}its finite-state machine's "state register" has reached its maximum count (e.g. 65365 = 11111111,11111111<sub>2</sub> ) or its table has run out of instructions; it is a ''finite'' machine, after all. == Examples of models == === Register-to-register ("read-modify-write") model of Cook and Reckhow (1973) === The commonly encountered Cook and Rechkow model is a bit like the ternary-register Malzek model (written with Knuth mnemonics{{spaced ndash}}the original instructions had no mnemonics excepting TRA, Read, Print). :*<code> LOAD ( C, r<sub>d</sub> ) ; C → r<sub>d</sub></code>, C is any integer :: Example: <code>LOAD ( 0, 5 )</code> will clear register 5. :*<code> ADD ( r<sub>s1</sub>, r<sub>s2</sub>, r<sub>d</sub> ) ; [r<sub>s1</sub>] + [r<sub>s2</sub>] → r<sub>d</sub></code>, the registers can be the same or different; ::Example: <code>ADD ( A, A, A )</code> will double the contents of register A. :*<code> SUB ( r<sub>s1</sub>, r<sub>s2</sub>, r<sub>d</sub> ) ; [r<sub>s1</sub>] - [r<sub>s2</sub>] → r<sub>d</sub></code>, the registers can be the same or different: ::Example: <code>SUB ( 3, 3, 3 )</code> will clear register 3. :*<code> COPY ( i, r<sub>p</sub>, d, r<sub>d</sub> ) ; [[r<sub>p</sub>] ] → r<sub>d</sub></code>, Indirectly copy the contents of the source-register pointed to by pointer-register r<sub>p</sub> into the destination register. :*<code> COPY ( d, r<sub>s</sub>, i, r<sub>p</sub> ) ; [r<sub>s</sub>] → [r<sub>p</sub>]</code>. Copy the contents of source register r<sub>s</sub> into the destination-register pointed to by the pointer-register r<sub>p</sub>. :*<code> JNZ ( r, I<sub>z</sub> ) ;</code> Conditional jump if [r] is positive; i.e. IF [r] > 0 THEN jump to instruction z else continue in sequence (Cook and Reckhow call this: "TRAnsfer control to line m if Xj > 0") :*<code> READ ( r<sub>d</sub> ) ;</code> copy "the input" into destination register r<sub>d</sub> :*<code> PRINT ( r<sub>s</sub> ) ;</code> copy the contents of source register r<sub>s</sub> to "the output." === Schönhage's RAM0 and RAM1 (1980) === Schönhage (1980) describes a very primitive, atomized model chosen for his proof of the equivalence of his SMM [[pointer machine]] model: :"In order to avoid any explicit addressing the RAM0 has the accumulator with contents ''z'' and an additional address register with current contents ''n'' (initially 0)" (p. 494) '''RAM1 model''': Schönhage demonstrates how his construction can be used to form the more common, usable form of "successor"-like RAM (using this article's mnemonics): ::*<code> LDA k ; k --> A </code>, k is a constant, an explicit number such as "47" ::*<code> LDA ( d, r ) ; [r] → A ;</code> directly load A ::*<code> LDA ( i, r ) ; <nowiki>[[r]]</nowiki> → A ;</code> indirectly load A ::*<code> STA ( d, r ) ; [A] → r ;</code> directly store A ::*<code> STA ( i, r ) ; [A] → [r] ;</code> indirectly store A ::*<code> JEA ( r, z ) ; IF [A] = [r] then I<sub>z</sub> else continue</code> ::*<code> INCA ; [A] + 1 --> A </code> '''RAM0 model''': Schönhage's RAM0 machine has 6 instructions indicated by a single letter (the 6th "C xxx" seems to involve 'skip over next parameter'. Schönhage designated the accumulator with "z", "N" with "n", etc. Rather than Schönhage's mnemonics we will use the mnemonics developed above. ::*<code>(Z), CLRA: 0 → A</code> ::*<code>(A), INCA: [A] +1 → A</code> ::*<code>(N), CPYAN: [A] → N</code> ::*<code>(A), LDAA: <nowiki>[[A]]</nowiki> → A </code>; contents of A points to register address; put register's contents into A ::*<code>(S), STAN: [A] → [N] </code>; contents of N points to register address; put contents of A into register pointed to by N ::*<code>(C), JAZ ( z ): [A] = 0 then go to I<sub>z</sub> </code>; ambiguous in his treatment Indirection comes (i) from CPYAN (copy/transfer contents A to N) working with store_A_via_N STAN, and from (ii) the peculiar indirection instruction <code>LDAA ( <nowiki>[[A]]</nowiki> → [A] )</code>. ==Footnotes== === Finite vs unbounded === The definitional fact that any sort of counter machine without an unbounded register-"address" register must specify a register "r" by name indicates that the model requires "r" to be ''finite'', although it is "unbounded" in the sense that the model implies no upper limit to the number of registers necessary to do its job(s). For example, we do not require r < 83,617,563,821,029,283,746 nor r < 2^1,000,001, etc. :Thus our model can "expand" the number of registers, if necessary to perform a certain computation. However this ''does'' mean that whatever number the model expands to must be ''finite''{{spaced ndash}}it must be indexable with a natural number: ''ω is not an option''. We can escape this restriction by providing an unbounded register to provide the address of the register that specifies an indirect address. ==See also== * [[Real RAM]] * [[Transdichotomous model]] ==External links== * [http://savannah.nongnu.org/projects/ramemu/ Random Access Machine Emulator] * [http://www.szkup.com/?pid=msthesis&lang=en Random Access Machine Emulator] * [https://random-access-machine-emulator.netlify.app/ Random Access Machine Emulator] ==References== {{Reflist}} With a few exceptions, these references are the same as those at [[Register machine]]. ** Goldstine, Herman H., and von Neumann, John, "Planning and Coding of the Problems for an Electronic Computing Instrument", Rep. 1947, [[Institute for Advanced Study]], Princeton. Reprinted on pp. 92–119 in Bell, C. Gordon and Newell, Allen (1971), ''Computer Structures: Readings and Examples'', McGraw-Hill Book Company, New York. {{ISBN|0-07-004357-4}}}. * [[George Boolos]], [[John P. Burgess]], [[Richard Jeffrey]] (2002), ''Computability and Logic: Fourth Edition'', Cambridge University Press, Cambridge, England. The original Boolos-Jeffrey text has been extensively revised by Burgess: more advanced than an introductory textbook. "Abacus machine" model is extensively developed in Chapter 5 ''Abacus Computability''; it is one of three models extensively treated and compared{{spaced ndash}}the Turing machine (still in Boolos' original 4-tuple form) and recursion the other two. * [[Arthur Burks]], [[Herman Goldstine]], [[John von Neumann]] (1946), ''Preliminary discussion of the logical design of an electronic computing instrument'', reprinted pp. 92ff in [[Gordon Bell]] and [[Allen Newell]] (1971), ''Computer Structures: Readings and Examples'', mcGraw-Hill Book Company, New York. {{ISBN|0-07-004357-4}} . * [[Stephen Cook|Stephen A. Cook]] and Robert A. Reckhow (1973), ''Time-bounded random access machines'', Journal of Computer Systems Science 7(4):354-375. * [[Martin Davis (mathematician)|Martin Davis]] (1958), ''Computability & Unsolvability'', McGraw-Hill Book Company, Inc. New York. * [[Calvin Elgot]] and [[Abraham Robinson]] (1964), ''Random-Access Stored-Program Machines, an Approach to Programming Languages'', Journal of the Association for Computing Machinery, Vol. 11, No. 4 (October, 1964), pp. 365–399. * [[J. Hartmanis]] (1971), "Computational Complexity of Random Access Stored Program Machines," Mathematical Systems Theory 5, 3 (1971) pp. 232–245. * [[John Hopcroft]], [[Jeffrey Ullman]] (1979). ''Introduction to Automata Theory, Languages and Computation'', 1st ed., Reading Mass: Addison-Wesley. {{ISBN|0-201-02988-X}}. A difficult book centered around the issues of machine-interpretation of "languages", NP-Completeness, etc. * [[Stephen Kleene]] (1952), ''Introduction to Metamathematics'', North-Holland Publishing Company, Amsterdam, Netherlands. {{ISBN|0-7204-2103-9}}. * [[Donald Knuth]] (1968), ''The Art of Computer Programming'', Second Edition 1973, Addison-Wesley, Reading, Massachusetts. Cf pages 462-463 where he defines "a new kind of abstract machine or 'automaton' which deals with linked structures." * [[Joachim Lambek]] (1961, received 15 June 1961), ''How to Program an Infinite Abacus'', Mathematical Bulletin, vol. 4, no. 3. September 1961 pages 295-302. In his Appendix II, Lambek proposes a "formal definition of 'program'. He references Melzak (1961) and Kleene (1952) ''Introduction to Metamathematics''. * [[Z. A. Melzak]] (1961, received 15 May 1961), ''An informal Arithmetical Approach to Computability and Computation'', [[Canadian Mathematical Bulletin]], vol. 4, no. 3. September 1961 pages 279-293. Melzak offers no references but acknowledges "the benefit of conversations with Drs. R. Hamming, D. McIlroy and V. Vyssots of the Bell telephone Laborators and with Dr. H. Wang of Oxford University." * {{cite journal|author=[[Marvin Minsky]] |title=Recursive Unsolvability of Post's Problem of 'Tag' and Other Topics in Theory of Turing Machines |journal=Annals of Mathematics |date=1961 |volume=74 |pages=437–455 |doi=10.2307/1970290|jstor=1970290|issue=3|publisher=The Annals of Mathematics, Vol. 74, No. 3 }} * {{cite book |author= Marvin Minsky |title = Computation: Finite and Infinite Machines |url= https://archive.org/details/computationfinit0000mins |url-access= registration | edition = 1st | publisher = Prentice-Hall, Inc.| location = Englewood Cliffs, N. J. | year = 1967}} In particular see chapter 11: ''Models Similar to Digital Computers'' and chapter 14: ''Very Simple Bases for Computability''. In the former chapter he defines "Program machines" and in the later chapter he discusses "Universal Program machines with Two Registers" and "...with one register", etc. * [[John C. Shepherdson]] and [[H. E. Sturgis]] (1961) received December 1961 ''Computability of Recursive Functions'', Journal of the Association for Computing Machinery (JACM) 10:217-255, 1963. An extremely valuable reference paper. In their Appendix A the authors cite 4 others with reference to "Minimality of Instructions Used in 4.1: Comparison with Similar Systems". :*Kaphengst, Heinz, ''Eine Abstrakte programmgesteuerte Rechenmaschine''', Zeitschrift fur mathematische Logik und Grundlagen der Mathematik:''5'' (1959), 366-379. :*[[Andrey Ershov|Ershov, A. P.]] ''On operator algorithms'', (Russian) Dok. Akad. Nauk 122 (1958), 967-970. English translation, Automat. Express 1 (1959), 20-23. :*[[Rózsa Péter|Péter, Rózsa]] ''Graphschemata und rekursive Funktionen'', Dialectica 12 (1958), 373. :*Hermes, Hans ''Die Universalität programmgesteuerter Rechenmaschinen.'' Math.-Phys. Semsterberichte (Göttingen) 4 (1954), 42-53. * [[Arnold Schönhage]] (1980), ''Storage Modification Machines'', Society for Industrial and Applied Mathematics, SIAM J. Comput. Vol. 9, No. 3, August 1980. Wherein Schōnhage shows the equivalence of his SMM with the "successor RAM" (Random Access Machine), etc. resp. ''Storage Modification Machines'', in ''Theoretical Computer Science'' (1979), pp. 36–37 * [[Peter van Emde Boas]], "Machine Models and Simulations" pp. 3–66, in: [[Jan van Leeuwen]], ed. ''Handbook of Theoretical Computer Science. Volume A: Algorithms and Complexity'', The MIT PRESS/Elsevier, 1990. {{ISBN|0-444-88071-2}} (volume A). QA 76.H279 1990. van Emde Boas's treatment of SMMs appears on pp. 32–35. This treatment clarifies Schōnhage 1980{{spaced ndash}}it closely follows but expands slightly the Schōnhage treatment. Both references may be needed for effective understanding. * [[Hao Wang (academic)|Hao Wang]] (1957), ''A Variant to Turing's Theory of Computing Machines'', JACM (Journal of the Association for Computing Machinery) 4; 63-92. Presented at the meeting of the Association, June 23–25, 1954. [[Category:Register machines]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:CNone
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Distinguish
(
edit
)
Template:ISBN
(
edit
)
Template:Multiple issues
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Spaced ndash
(
edit
)