I THINK ∴ I'M DANGEROUS

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
bfe [2016/04/05 19:55]
zashi [n-Depth Mean Compare]
bfe [2016/11/08 17:21]
zashi [Brainfuck]
Line 5: Line 5:
  
  
-<​html>​ 
-<a href="​https://​scontent-atl3-1.xx.fbcdn.net/​hphotos-xpa1/​v/​t1.0-9/​11216567_10203633998770577_6143067410198800947_n.jpg?​oh=96f6ae5cee070c0d138ef6a372e97d85&​oe=56A0FE0F"><​img src="​https://​scontent-atl3-1.xx.fbcdn.net/​hphotos-xpa1/​v/​t1.0-9/​11216567_10203633998770577_6143067410198800947_n.jpg?​oh=96f6ae5cee070c0d138ef6a372e97d85&​oe=56A0FE0F"​ width="​100%">​ 
-</a> 
-</​html>​ 
  
 ====== Abstract ====== ====== Abstract ======
Line 22: Line 18:
 Programmatically,​ the read/write head is equivalent to a pointer and the sheet is simply a contiguous block of RAM. Programmatically,​ the read/write head is equivalent to a pointer and the sheet is simply a contiguous block of RAM.
  
-In many ways, BF is ideal to use as programmatic genes. Aside from being Turing-complete,​ which allows it to do anything that can be accomplished with any other programming language, strings of non-functional code can exist and be bypassed. With a single character (command) mutation that bypassed code path can become active, just like actual genetic code consisting of base-pairs.+In many ways, BF is ideal to use as programmatic genes. Aside from being Turing-complete,​ which allows it to do anything that can be accomplished with any other programming language, strings of non-functional code can exist and be bypassed. With a single character (command) mutation that bypassed code path can become active, just like actual genetic code consisting of codons.
  
 ====== Specific Design Needs ====== ====== Specific Design Needs ======