<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: DoctorOetker</title><link>https://news.ycombinator.com/user?id=DoctorOetker</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 08:37:09 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=DoctorOetker" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>thats not how this works<p>decidability does not distribute over pointwise question asking on sets, or if you believe it does, show us the proof.<p>Telling if an EML(x,y),1 constructed expression is identically 0 is in the gray zone, as far as I can tell, it has neither been proven decidable nor been proven undecidable.<p>Nevertheless regardless of decidability the authors clearly show the multipoint sampling/testing is a decent filter, and the shorter resulting expressions have been proven correct in the results for the construction at least.</p>
]]></description><pubDate>Thu, 16 Apr 2026 12:16:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47791906</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47791906</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47791906</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>no Miklós Laczkovich's extension as described on wikipedia only says that both of the following questions are proven undecidable:<p>1) is there some value x such that some function F(x)=A(x)-B(x)=0?<p>2) is there some value x such that F(x)>0?<p>while you asked:<p>> I'm pretty sure it's not decidable if two EML trees describe the same function.<p>that would be<p>3) is for every x F(x)=A(x)-B(x)==0?<p>which Miklós Laczkovich's extension does not provide.<p>And you ignore the fact that Miklós Laczkovich's extension applies to real numbers and functions...</p>
]]></description><pubDate>Wed, 15 Apr 2026 20:20:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47784692</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47784692</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47784692</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>You wrote:<p>> It's decidable whether two NAND circuits implement the same function, I'm pretty sure it's not decidable if two EML trees describe the same function.<p>Perhaps, perhaps not, same function so basically is this question solvable:<p>A(x[,y,...]) = f(x[,y,...])-g(x[,y,...]) == 0 everywhere?<p>if a user brings EML functions f and g; given their binary EML trees; can we decide if they represent the same function, so the question form is<p>A(x)=0 EVERYWHERE?<p>(like given 2 fractions a/b == c/d ?  do the fractions represent the same fraction?)<p>From Wikipedia link reikonomusha gave:<p>> Miklós Laczkovich removed also the need for π and reduced the use of composition.[5] In particular, given an expression A(x) in the ring generated by the integers, x, sin xn, and sin(x sin xn) (for n ranging over positive integers), both the question of whether A(x) > 0 for some x and whether A(x) = 0 for some x are unsolvable.<p>Here the question forms are<p>1) exist x such that A(x) > 0 (does there exist an x where A(x) becomes positive?)<p>2) exist x such that A(x) = 0 (does there exist a value such that A(x) becomes 0? or basically find real roots<p>so at least the forms on WikiPedia don't generate the results both of you claim it does.<p>it does present undecidability results, but not straightforwardly in the context of this EML work.<p>second the Richardson's theorem is about the function on the reals, not complex functions (I mean the roots must lay <i>somewhere</i>)</p>
]]></description><pubDate>Wed, 15 Apr 2026 14:13:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47779261</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47779261</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47779261</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Google Gemma 4 Runs Natively on iPhone with Full Offline AI Inference"]]></title><description><![CDATA[
<p>can Espeak-ng provide the IPA transcription? or does it produce sound?<p>I'm surprised traditional NLP being better than ML models for this task, can you point me to a benchmark analysis pointing out that non-neural Espeak-ng is better than ML models?<p>Also, I asked for a neural model for another reason as well, I still want semantic knowledge present, I want more than pronunciation, but before I use myself as a test subject, I want to make sure I get the proper pronunciation in case the highly speculative "uploading game" works... I don't want to early systematically mis-train myself on pronunciation...</p>
]]></description><pubDate>Wed, 15 Apr 2026 13:23:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47778642</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47778642</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47778642</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Google Gemma 4 Runs Natively on iPhone with Full Offline AI Inference"]]></title><description><![CDATA[
<p>does anyone know of a decent but low memory or low parameter count multilingual model (as many languages as possible), that can faithfully produce the detailed IPA transcription given a word in a sentence in some language?<p>I want to test a hypothesis for "uploading" neural network knowledge to a user's brain, by a reaction-speed game.</p>
]]></description><pubDate>Wed, 15 Apr 2026 12:59:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47778376</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47778376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47778376</guid></item><item><title><![CDATA[New comment by DoctorOetker in "The dangers of California's legislation to censor 3D printing"]]></title><description><![CDATA[
<p>I believe such forces are the indirect result of the structure of society and economy.<p>If legal arms dealers want the state to step in because of some decentralizing technology, then for the government it would be yet another cost center to combat this phenomenon. So lobbyists need to come up with a kind of reward, and design more "palatable" proposals, so that income can be derived by somehow initiating government control into the whole decentralized technology instead of just the illegitimately decentralized subsection...<p>but punishing "the rest" for actions of a few would mean financing it with taxes, instead of scapegoating the legitimate majority of 3D printer users.</p>
]]></description><pubDate>Wed, 15 Apr 2026 10:58:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47777352</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47777352</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47777352</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>and its depressing when the rare actual progress is made, a collection of jealous practitioners comes to party-poop all over the place, <i>for bringing the insights that make the result from then on immediately obvious</i>.</p>
]]></description><pubDate>Wed, 15 Apr 2026 10:40:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47777195</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47777195</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47777195</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>that result does not apply for EML: EML doesn't have the | . | absolute value function, a prerequisite for Richardson's theorem.</p>
]]></description><pubDate>Wed, 15 Apr 2026 10:37:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47777172</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47777172</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47777172</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>SabrinaJewson claims it is a STRICT subset: EML ⊂ E<p>I remind the trivial results that both  E ⊆ EML <i>and</i> EML ⊆ E and hence EML = E<p>apart from construction: which is minimal for EML but highly redundant for E.<p>the EML paper shows that this minimal construction for EML is <i>not unique</i> so other binary operations may be found with perhaps more interesting properties, or admitting shorter binary trees for commonly used functions and values (which may reflect subjective "simplification" of expressions in mathematics.</p>
]]></description><pubDate>Wed, 15 Apr 2026 09:46:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47776838</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47776838</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47776838</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>> Odrzywolek's result is immediately obvious<p>This may or may not be true; but the burden of proof should not lay with the reader.<p>Please provide (in absence of which every reader can draw their own conclusions) a reference which simultaneously:<p>1) predates Odrzywolek's result<p>2) and demonstrates the other unary and binary operations typically tacitly assumed can be expressed in terms of a single binary operation and a constant.<p>(in other news: I can spontaneously levitate, I just don't feel like demonstrating it to you right now...)</p>
]]></description><pubDate>Wed, 15 Apr 2026 09:08:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47776532</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47776532</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47776532</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>1)<p>> Related is the paper [What is a closed-form number?], which explores the field E, defined as the smallest subfield of ℂ closed under exp and log. I believe the set of numbers that can be generated using exp-minus-log is a strict subset of this.<p>is that a typo / accidental mis-phrasing?<p>exp-minus-log construction is closed for the operations it supports, and spans both exp and log, so E must be either identical to or a subset of exp-minus-log; not the other way around.<p>2)<p>EML is spanned by a single binary operator, while the article you reference describing ("what is a closed-form number") just tacitly assumes +, -, x, / are available for free, so even in just this sense the EML construction is superior. Since EML can construct the larger presumed basic operations of E, E must be contained in it, but since the E implicitly has +, - besides exp(x) and ln(x) the reverse can also be said, so the <i>sets and functions spanned by E and EML should be equivalent</i>. So what is novel? precisely what the recent article describes: all the tacitly (+,-,x,/) and explicitly assumed (exp and ln) operations can be spanned with just 1 (non-unique) binary operation; and on top of that:<p>3)<p>the recent article describes freely available code to conduct such searches and find alternative binary operations, search for functions or constants.<p>The EML paper provides code and machinery to conduct a search for the value x in exp(-x)=x : use a multiprecision library to get an arbitrarily precise representation, and search for some EML expression to find candidates.</p>
]]></description><pubDate>Wed, 15 Apr 2026 08:55:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47776431</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47776431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47776431</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Not all elementary functions can be expressed with exp-minus-log"]]></title><description><![CDATA[
<p>:)<p>I still consider the article important, as it demonstrates techniques to conduct searches, and emphasizes the very early stage of the research (establishes non-uniqueness for example), openly wonders which other binary operators exist and which would have more desirable properties, etc.<p>Sometimes articles are important not for their immediate result, but for the tools and techniques developed to solve (often artificial or constrained) problems. The history of mathematics is filled with mathematicians studying at-the-time-rather-useless-constructions which centuries or millennia later become profound to human interaction. Think of the "value" of Euclid's greatest common divisor algorithm. What starts out as a curiosity with 0 immediate relevance for society, is now routinely used by everyone who enjoys the world wide web without their government or others MitM'ing a webpage.<p>If the result was the main claimed importance for the article, there would be more emphasis on <i>it</i> than on the methodology used to find and verify candidates, but the emphasis throughout the article is on the methodology.<p>It is far from obvious that the tricks used would have converged at all. Before this result, a lot of people would have been skeptical that it is even possible to do search candidates this way. While the gradual early-out tightening in verification <i>could</i> speed up the results, many might have argued that the approach to be used doesn't contain an assurance that the false positive rate wouldn't be excessively high (i.e. many would have said "verifying candidates does not ensure finding a solution, reality may turn out that 99.99999999999999999% of candidates turn out not to pass deeper inspection").<p>It is certainly noteworthy to publish these results as they establish the machinery for automated search of such operations.</p>
]]></description><pubDate>Wed, 15 Apr 2026 06:34:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47775464</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47775464</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47775464</guid></item><item><title><![CDATA[New comment by DoctorOetker in "All elementary functions from a single binary operator"]]></title><description><![CDATA[
<p>> And while the final result may have a compact representation as a DAG by merging common subexpressions, you also need to be able to represent potential alternative solutions, and that's where the exponential blowup comes in.<p>Thats not really necessary, imagine somewhere near the top of the binary tree a leaf ("1" or "x" or ...), with the current brute force method thats a whole binary subtree with parameters going unused.<p>One could just as well use that whole culled binary subtree as a DAG node.<p>It does require more complex routing, but selecting input nodes is a sparse task, so those routing parameters can use sparse virtual parameters, say inner products of dense vectors in some vector space, so it doesn't need to take up much memory...</p>
]]></description><pubDate>Tue, 14 Apr 2026 22:36:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47772355</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47772355</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47772355</guid></item><item><title><![CDATA[New comment by DoctorOetker in "All elementary functions from a single binary operator"]]></title><description><![CDATA[
<p>yes, and even this search doesn't actually require trillions of parameters, since the switching parameters will be sparse, which means you can apply a FakeParameter trick: suppose I want a trillion sparse parameters, thats a million by a million. Let's just model those parameters as inner products of a million vectors each of some dimension N. Now its in the regime of megabytes or a GB.<p>For extreme regularization, one can even go down to 10 arbitrary precision numbers: if we have a single vector of 10 dimensions, we can re-order the components 10! different ways.<p>10! = 3 628 800<p>so we can retrieve ~3M vectors from it, and we can form about 10 T inner products.</p>
]]></description><pubDate>Tue, 14 Apr 2026 11:04:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763995</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47763995</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763995</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>So this is very good news and was predictable.<p>LLM's are capable of producing code that passes formal verification.<p>The writing is on the wall: in the future more and more software on the abstract or platonic side of our computing base will be hermetically sealed against bugs and exploits. This quenching of bugs in the assured side will shift the mean location of bugs closer to the hardware side: at some point bugs and exploits will rely more and more on hardware quirks, and simply unspecified hardware.<p>Afterwards we can expect a long exponential decay of preventable safety violations: people mistakenly or surreptitiously disengaging the formal verification steps and shipping malicious or unverified code. Each such event will be its own big or small scandal, at some point there will be no deniability left: something must be on purpouse, either a malicious vulnerability or intentional disengagement of safety measures.<p>As the attack surface recedes towards the lower level hardware stack, it will open the debate that the community <i>needs</i> proper formal hardware descriptions (at least at the interface initially, not necessarily how the hardware has implemented it). As interface bugs get formalized 3 things can happen:<p>either vulnerabilities go extinct, and full formal hardware descriptions are not released<p>or vulnerabilities remain in each new generation of hardware, and malicious intent or negligence on behalf of the manufacturer can only be presumed, this will set up the community against manufacturers, as they demand full hardware descriptions (verilog, VHDL,...).<p>or vulnerabilities are tactically applied (vulnerabilities appear extinct to the bulk of the population, but only because manufactured vulnerabilities are sparingly exploited by the manufacturing block)<p>It is hard to predict what is more valuable: embedding HW vulnerabilities for the status quo and being able to exploit it for while before the public demands full hardware IP descriptions (verilog, VHDL) etc. or facing the end of vulnerabilities a little sooner but keeping hardware IP private (if the bugs stop with full interface descriptions).</p>
]]></description><pubDate>Tue, 14 Apr 2026 10:40:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763818</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47763818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763818</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Can Claude Fly a Plane?"]]></title><description><![CDATA[
<p>I doesn't sound ethical to eject passengers while aborting an approach, regardless of precise timing.</p>
]]></description><pubDate>Tue, 14 Apr 2026 09:28:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763270</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47763270</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763270</guid></item><item><title><![CDATA[New comment by DoctorOetker in "Phyphox – Physical Experiments Using a Smartphone"]]></title><description><![CDATA[
<p>It's just a lot cheaper to get say an ESP32 and figure out the protocol (serial?I2C?...) of the thermostat and wire it up. The raspberry pi + camera ( + light source) is going to be a lot more expensive.<p>If one doesn't have free time, consider half the budget for the RPi+camera, then just find the closest makerspace or kid with an interest in electronics and ask them if they would like to hook it up for you, you saved half your expense, the kid has some more experience and some money to show for it.<p>Same with the amplifier knob, just needs a cheap wireless microcontroller, and sufficient low pass filtering on a PWM signal, perhaps a quad op-amp IC for the filtering and the voltage buffer...</p>
]]></description><pubDate>Tue, 14 Apr 2026 09:09:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763127</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47763127</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763127</guid></item><item><title><![CDATA[New comment by DoctorOetker in "All elementary functions from a single binary operator"]]></title><description><![CDATA[
<p>he is saying that if you reserve the second argument of a binary operator as a "function selection indicator", that you have restricted yourself to an alphabet of unary functions. This means that you could at most effectively model some unary functions, but not arbitrary expression involving +,x,-,/, ^, etc.<p>Unless you had hit upon a very magical binary function where certain special values of the second parameter happens to coincide with useful unary functions, without those values trampling on a useful binary mode or region of your binary function, but the search space for such a special binary function is so large that you shouldn't demand us to disprove the existence, but rather employ your non-surprisal at the EML result and challenge you to present such a binary function, so we can challenge you to demonstrate how it captures binary functions like addition,products, exponentiation with arbitrary base etc.<p>So, can we see your construction, or if you refuse to present one, we may conclude you have implicitly reconsidered your position and understand the theoretical elegance this EML (and presumably many other) basis brings?</p>
]]></description><pubDate>Mon, 13 Apr 2026 21:29:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47758053</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47758053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47758053</guid></item><item><title><![CDATA[New comment by DoctorOetker in "All elementary functions from a single binary operator"]]></title><description><![CDATA[
<p>There is a huge number of people who understand Taylor series, know how to compute them, and the things you can do with Taylor (and other kinds of) expansions. Yet none of us identified that this binary operation spans that lot of them, but I'm willing to read references to predating observations of the same kind. The author does mention alternative systems (incomplete in some specific sense) in the paper.<p>I did however keep thinking there was a lot of attention to trying to include special constants even though we don't know that much about these constants yet, while comparatively little attention went to say elliptic integrals etc.<p>When aiming for a wide catch, you'd include some of those esoteric functions, or erf() etc...<p>I also wished they had attempted to find a representation for derivative and integrals.</p>
]]></description><pubDate>Mon, 13 Apr 2026 21:17:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47757934</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47757934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47757934</guid></item><item><title><![CDATA[New comment by DoctorOetker in "All elementary functions from a single binary operator"]]></title><description><![CDATA[
<p>I agree: I don't understand what happened, but the first "View PDF" resulted in a PDF where the hyperlinks to the figures didn't work. Upon closer inspection it wasn't v1 at all, thats a PNAS article. I am unable to remove the EDIT:... line in my original comment at this time...</p>
]]></description><pubDate>Mon, 13 Apr 2026 08:30:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47749326</link><dc:creator>DoctorOetker</dc:creator><comments>https://news.ycombinator.com/item?id=47749326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47749326</guid></item></channel></rss>