Beefy Boxes and Bandwidth Generously Provided by pair Networks
Do you know where your variables are?
 
PerlMonks  

Re^5: Comparative satisfiability of regexps.

by sleepingsquirrel (Chaplain)
on Jan 20, 2005 at 23:04 UTC ( [id://423822]=note: print w/replies, xml ) Need Help??


in reply to Re^4: Comparative satisfiability of regexps.
in thread Comparative satisfiability of regexps.

As a separate note, I'm really disinclined to accept Monte Carlo proofs in the hard sciences.
I guess that means you don't trust public key encryption then, because RSA needs prime numbers to work with, but everybody just uses a variation of the Fermat test to check whether the keys generated are probably prime. But most people aren't overly concerned by this because you can set your threshold for "probably" to be, say, 100 times lower than the probablity that cosmic radiation will flip a bit in your memory causing an otherwise perfect algorthim to fail.


-- All code is 100% tested and functional unless otherwise noted.
  • Comment on Re^5: Comparative satisfiability of regexps.

Replies are listed 'Best First'.
Re^6: Comparative satisfiability of regexps.
by Meowse (Beadle) on Jan 21, 2005 at 01:10 UTC
    I still maintain that there's a difference between quantifiable stochastic approaches (where one can state definitively how likely it is that the number is non-prime) and Monte Carlo approaches (where one throws possible disconfirming values at it until one "feels confident" that it's "tested enough").

    If the nature of your regexps were such that you could say "of the possible million values in the range, we have tested a randomly selected 10% of them, and thus we are reasonably confident that the regexps will work for all values", I'd be willing to consider it as evidence, if not functional proof. But with a potentially infinite range for the regexps, I wouldn't even consider it evidence.

    Take care,

    Mickey.

Re^6: Comparative satisfiability of regexps.
by Aristotle (Chancellor) on Jan 21, 2005 at 12:20 UTC

    That analogy is flawed. That's how public key cryptography is implemented in practice, for practical reasons, to be sure. It's not how the cryptographic algorithms are constructed mathematically, however. And of course there's the quantifiable vs Monte Carlo difference Meowse mentioned.

    Makeshifts last the longest.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://423822]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others surveying the Monastery: (8)
As of 2024-04-18 09:21 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found