(0) Obligation:

The Runtime Complexity (full) of the given CpxTRS could be proven to be BOUNDS(1, n^1).


The TRS R consists of the following rules:

f(f(x)) → f(x)
f(s(x)) → f(x)
g(s(0)) → g(f(s(0)))

Rewrite Strategy: FULL

(1) NestedDefinedSymbolProof (BOTH BOUNDS(ID, ID) transformation)

The following defined symbols can occur below the 0th argument of g: f

Hence, the left-hand sides of the following rules are not basic-reachable and can be removed:
f(f(x)) → f(x)

(2) Obligation:

The Runtime Complexity (full) of the given CpxTRS could be proven to be BOUNDS(1, n^1).


The TRS R consists of the following rules:

g(s(0)) → g(f(s(0)))
f(s(x)) → f(x)

Rewrite Strategy: FULL

(3) RcToIrcProof (BOTH BOUNDS(ID, ID) transformation)

Converted rc-obligation to irc-obligation.

As the TRS is a non-duplicating overlay system, we have rc = irc.

(4) Obligation:

The Runtime Complexity (innermost) of the given CpxTRS could be proven to be BOUNDS(1, n^1).


The TRS R consists of the following rules:

g(s(0)) → g(f(s(0)))
f(s(x)) → f(x)

Rewrite Strategy: INNERMOST

(5) CpxTrsMatchBoundsProof (EQUIVALENT transformation)

A linear upper bound on the runtime complexity of the TRS R could be shown with a Match Bound [MATCHBOUNDS1,MATCHBOUNDS2] of 2.
The certificate found is represented by the following graph.
Start state: 5
Accept states: [6]
Transitions:
5→6[g_1|0, f_1|0, f_1|1]
5→7[g_1|1]
6→6[s_1|0, 0|0]
7→8[f_1|1]
7→9[f_1|2]
8→9[s_1|1]
9→6[0|1]

(6) BOUNDS(1, n^1)