/export/starexec/sandbox/solver/bin/starexec_run_standard /export/starexec/sandbox/benchmark/theBenchmark.xml /export/starexec/sandbox/output/output_files -------------------------------------------------------------------------------- YES proof of /export/starexec/sandbox/benchmark/theBenchmark.xml # AProVE Commit ID: 48fb2092695e11cc9f56e44b17a92a5f88ffb256 marcel 20180622 unpublished dirty Termination w.r.t. Q of the given QTRS could be proven: (0) QTRS (1) QTRS Reverse [EQUIVALENT, 0 ms] (2) QTRS (3) Strip Symbols Proof [SOUND, 0 ms] (4) QTRS (5) RFCMatchBoundsTRSProof [EQUIVALENT, 0 ms] (6) YES ---------------------------------------- (0) Obligation: Q restricted rewrite system: The TRS R consists of the following rules: a(b(a(a(a(a(x1)))))) -> a(a(a(a(a(b(a(a(a(b(a(a(a(b(x1)))))))))))))) Q is empty. ---------------------------------------- (1) QTRS Reverse (EQUIVALENT) We applied the QTRS Reverse Processor [REVERSE]. ---------------------------------------- (2) Obligation: Q restricted rewrite system: The TRS R consists of the following rules: a(a(a(a(b(a(x1)))))) -> b(a(a(a(b(a(a(a(b(a(a(a(a(a(x1)))))))))))))) Q is empty. ---------------------------------------- (3) Strip Symbols Proof (SOUND) We were given the following TRS: a(a(a(a(b(a(x1)))))) -> b(a(a(a(b(a(a(a(b(a(a(a(a(a(x1)))))))))))))) By stripping symbols from the only rule of the system, we obtained the following TRS [ENDRULLIS]: a(a(a(a(b(x))))) -> b(a(a(a(b(a(a(a(b(a(a(a(a(x))))))))))))) ---------------------------------------- (4) Obligation: Q restricted rewrite system: The TRS R consists of the following rules: a(a(a(a(b(x))))) -> b(a(a(a(b(a(a(a(b(a(a(a(a(x))))))))))))) Q is empty. ---------------------------------------- (5) RFCMatchBoundsTRSProof (EQUIVALENT) Termination of the TRS R could be shown with a Match Bound [MATCHBOUNDS1,MATCHBOUNDS2] of 1. This implies Q-termination of R. The following rules were used to construct the certificate: a(a(a(a(b(x))))) -> b(a(a(a(b(a(a(a(b(a(a(a(a(x))))))))))))) The certificate found is represented by the following graph. The certificate consists of the following enumerated nodes: 354, 355, 356, 357, 358, 359, 360, 361, 362, 363, 364, 365, 366, 367, 368, 369, 370, 371, 372, 373, 374, 375, 376, 377, 378, 379 Node 354 is start node and node 355 is final node. Those nodes are connected through the following edges: * 354 to 356 labelled b_1(0)* 355 to 355 labelled #_1(0)* 356 to 357 labelled a_1(0)* 357 to 358 labelled a_1(0)* 358 to 359 labelled a_1(0)* 359 to 360 labelled b_1(0)* 360 to 361 labelled a_1(0)* 361 to 362 labelled a_1(0)* 362 to 363 labelled a_1(0)* 363 to 364 labelled b_1(0)* 364 to 365 labelled a_1(0)* 364 to 368 labelled b_1(1)* 365 to 366 labelled a_1(0)* 365 to 368 labelled b_1(1)* 366 to 367 labelled a_1(0)* 366 to 368 labelled b_1(1)* 367 to 355 labelled a_1(0)* 367 to 368 labelled b_1(1)* 368 to 369 labelled a_1(1)* 369 to 370 labelled a_1(1)* 370 to 371 labelled a_1(1)* 371 to 372 labelled b_1(1)* 372 to 373 labelled a_1(1)* 373 to 374 labelled a_1(1)* 374 to 375 labelled a_1(1)* 375 to 376 labelled b_1(1)* 376 to 377 labelled a_1(1)* 376 to 368 labelled b_1(1)* 377 to 378 labelled a_1(1)* 377 to 368 labelled b_1(1)* 378 to 379 labelled a_1(1)* 378 to 368 labelled b_1(1)* 379 to 355 labelled a_1(1)* 379 to 368 labelled b_1(1) ---------------------------------------- (6) YES