Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The proof here is essentially the execution log of the bounding program. I imagine that this would be TB, PB or beyond. Not every proof is some clever paper, some are just brute force. Like proving a number is prime, or calculating the Nth digit of Pi. A paper doesn’t always make sense, but you can still announce what you’ve done (and maybe you get a paper with algorithmic details, but it’s not a proof for specific the instance).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: