* Step 1: ToInnermost WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict TRS:
            bits(0()) -> 0()
            bits(s(x)) -> s(bits(half(s(x))))
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1} / {0/0,s/1}
        - Obligation:
             runtime complexity wrt. defined symbols {bits,half} and constructors {0,s}
    + Applied Processor:
        ToInnermost
    + Details:
        switch to innermost, as the system is overlay and right linear and does not contain weak rules
* Step 2: DependencyPairs WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict TRS:
            bits(0()) -> 0()
            bits(s(x)) -> s(bits(half(s(x))))
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1} / {0/0,s/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits,half} and constructors {0,s}
    + Applied Processor:
        DependencyPairs {dpKind_ = WIDP}
    + Details:
        We add the following weak innermost dependency pairs:
        
        Strict DPs
          bits#(0()) -> c_1()
          bits#(s(x)) -> c_2(bits#(half(s(x))))
          half#(0()) -> c_3()
          half#(s(0())) -> c_4()
          half#(s(s(x))) -> c_5(half#(x))
        Weak DPs
          
        
        and mark the set of starting terms.
* Step 3: UsableRules WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(0()) -> c_1()
            bits#(s(x)) -> c_2(bits#(half(s(x))))
            half#(0()) -> c_3()
            half#(s(0())) -> c_4()
            half#(s(s(x))) -> c_5(half#(x))
        - Strict TRS:
            bits(0()) -> 0()
            bits(s(x)) -> s(bits(half(s(x))))
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        UsableRules
    + Details:
        We replace rewrite rules by usable rules:
          half(0()) -> 0()
          half(s(0())) -> 0()
          half(s(s(x))) -> s(half(x))
          bits#(0()) -> c_1()
          bits#(s(x)) -> c_2(bits#(half(s(x))))
          half#(0()) -> c_3()
          half#(s(0())) -> c_4()
          half#(s(s(x))) -> c_5(half#(x))
* Step 4: WeightGap WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(0()) -> c_1()
            bits#(s(x)) -> c_2(bits#(half(s(x))))
            half#(0()) -> c_3()
            half#(s(0())) -> c_4()
            half#(s(s(x))) -> c_5(half#(x))
        - Strict TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        WeightGap {wgDimension = 1, wgDegree = 1, wgKind = Algebraic, wgUArgs = UArgs, wgOn = WgOnTrs}
    + Details:
        The weightgap principle applies using the following constant growth matrix-interpretation:
          We apply a matrix interpretation of kind constructor based matrix interpretation:
          The following argument positions are considered usable:
            uargs(s) = {1},
            uargs(bits#) = {1},
            uargs(c_2) = {1},
            uargs(c_5) = {1}
          
          Following symbols are considered usable:
            all
          TcT has computed the following interpretation:
                p(0) = [0]          
             p(bits) = [0]          
             p(half) = [1] x1 + [1] 
                p(s) = [1] x1 + [10]
            p(bits#) = [1] x1 + [0] 
            p(half#) = [0]          
              p(c_1) = [0]          
              p(c_2) = [1] x1 + [0] 
              p(c_3) = [0]          
              p(c_4) = [0]          
              p(c_5) = [1] x1 + [0] 
          
          Following rules are strictly oriented:
              half(0()) = [1]         
                        > [0]         
                        = 0()         
          
           half(s(0())) = [11]        
                        > [0]         
                        = 0()         
          
          half(s(s(x))) = [1] x + [21]
                        > [1] x + [11]
                        = s(half(x))  
          
          
          Following rules are (at-least) weakly oriented:
              bits#(0()) =  [0]                   
                         >= [0]                   
                         =  c_1()                 
          
             bits#(s(x)) =  [1] x + [10]          
                         >= [1] x + [11]          
                         =  c_2(bits#(half(s(x))))
          
              half#(0()) =  [0]                   
                         >= [0]                   
                         =  c_3()                 
          
           half#(s(0())) =  [0]                   
                         >= [0]                   
                         =  c_4()                 
          
          half#(s(s(x))) =  [0]                   
                         >= [0]                   
                         =  c_5(half#(x))         
          
        Further, it can be verified that all rules not oriented are covered by the weightgap condition.
* Step 5: PredecessorEstimation WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(0()) -> c_1()
            bits#(s(x)) -> c_2(bits#(half(s(x))))
            half#(0()) -> c_3()
            half#(s(0())) -> c_4()
            half#(s(s(x))) -> c_5(half#(x))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        PredecessorEstimation {onSelection = all simple predecessor estimation selector}
    + Details:
        We estimate the number of application of
          {1,3,4}
        by application of
          Pre({1,3,4}) = {2,5}.
        Here rules are labelled as follows:
          1: bits#(0()) -> c_1()
          2: bits#(s(x)) -> c_2(bits#(half(s(x))))
          3: half#(0()) -> c_3()
          4: half#(s(0())) -> c_4()
          5: half#(s(s(x))) -> c_5(half#(x))
* Step 6: RemoveWeakSuffixes WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
            half#(s(s(x))) -> c_5(half#(x))
        - Weak DPs:
            bits#(0()) -> c_1()
            half#(0()) -> c_3()
            half#(s(0())) -> c_4()
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        RemoveWeakSuffixes
    + Details:
        Consider the dependency graph
          1:S:bits#(s(x)) -> c_2(bits#(half(s(x))))
             -->_1 bits#(0()) -> c_1():3
             -->_1 bits#(s(x)) -> c_2(bits#(half(s(x)))):1
          
          2:S:half#(s(s(x))) -> c_5(half#(x))
             -->_1 half#(s(0())) -> c_4():5
             -->_1 half#(0()) -> c_3():4
             -->_1 half#(s(s(x))) -> c_5(half#(x)):2
          
          3:W:bits#(0()) -> c_1()
             
          
          4:W:half#(0()) -> c_3()
             
          
          5:W:half#(s(0())) -> c_4()
             
          
        The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed.
          4: half#(0()) -> c_3()
          5: half#(s(0())) -> c_4()
          3: bits#(0()) -> c_1()
* Step 7: Decompose WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
            half#(s(s(x))) -> c_5(half#(x))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        Decompose {onSelection = all cycle independent sub-graph, withBound = RelativeAdd}
    + Details:
        We analyse the complexity of following sub-problems (R) and (S).
        Problem (S) is obtained from the input problem by shifting strict rules from (R) into the weak component.
        
        Problem (R)
          - Strict DPs:
              bits#(s(x)) -> c_2(bits#(half(s(x))))
          - Weak DPs:
              half#(s(s(x))) -> c_5(half#(x))
          - Weak TRS:
              half(0()) -> 0()
              half(s(0())) -> 0()
              half(s(s(x))) -> s(half(x))
          - Signature:
              {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
          - Obligation:
              innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
        
        Problem (S)
          - Strict DPs:
              half#(s(s(x))) -> c_5(half#(x))
          - Weak DPs:
              bits#(s(x)) -> c_2(bits#(half(s(x))))
          - Weak TRS:
              half(0()) -> 0()
              half(s(0())) -> 0()
              half(s(s(x))) -> s(half(x))
          - Signature:
              {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
          - Obligation:
              innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
** Step 7.a:1: RemoveWeakSuffixes WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
        - Weak DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        RemoveWeakSuffixes
    + Details:
        Consider the dependency graph
          1:S:bits#(s(x)) -> c_2(bits#(half(s(x))))
             -->_1 bits#(s(x)) -> c_2(bits#(half(s(x)))):1
          
          2:W:half#(s(s(x))) -> c_5(half#(x))
             -->_1 half#(s(s(x))) -> c_5(half#(x)):2
          
        The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed.
          2: half#(s(s(x))) -> c_5(half#(x))
** Step 7.a:2: PredecessorEstimationCP WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        PredecessorEstimationCP {onSelectionCP = any intersect of rules of CDG leaf and strict-rules, withComplexityPair = NaturalMI {miDimension = 3, miDegree = 1, miKind = Algebraic, uargs = UArgs, urules = URules, selector = Nothing}}
    + Details:
        We first use the processor NaturalMI {miDimension = 3, miDegree = 1, miKind = Algebraic, uargs = UArgs, urules = URules, selector = Nothing} to orient following rules strictly:
          1: bits#(s(x)) -> c_2(bits#(half(s(x))))
          
        The strictly oriented rules are moved into the weak component.
*** Step 7.a:2.a:1: NaturalMI WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        NaturalMI {miDimension = 3, miDegree = 1, miKind = Algebraic, uargs = UArgs, urules = URules, selector = Just first alternative for predecessorEstimation on any intersect of rules of CDG leaf and strict-rules}
    + Details:
        We apply a matrix interpretation of kind constructor based matrix interpretation (containing no more than 1 non-zero interpretation-entries in the diagonal of the component-wise maxima):
        The following argument positions are considered usable:
          uargs(c_2) = {1}
        
        Following symbols are considered usable:
          {half,bits#,half#}
        TcT has computed the following interpretation:
              p(0) = [0]             
                     [1]             
                     [0]             
           p(bits) = [0 1 2]      [1]
                     [2 2 1] x1 + [0]
                     [0 0 0]      [0]
           p(half) = [0 1 0]      [0]
                     [0 1 0] x1 + [0]
                     [0 2 0]      [1]
              p(s) = [0 1 0]      [2]
                     [0 1 0] x1 + [1]
                     [0 0 0]      [0]
          p(bits#) = [1 0 0]      [3]
                     [0 0 1] x1 + [0]
                     [0 0 1]      [0]
          p(half#) = [2 2 1]      [0]
                     [2 2 0] x1 + [0]
                     [0 2 0]      [0]
            p(c_1) = [0]             
                     [0]             
                     [0]             
            p(c_2) = [1 0 0]      [0]
                     [0 0 0] x1 + [0]
                     [0 0 0]      [0]
            p(c_3) = [2]             
                     [1]             
                     [0]             
            p(c_4) = [2]             
                     [0]             
                     [0]             
            p(c_5) = [1 0 1]      [0]
                     [2 0 0] x1 + [0]
                     [1 0 2]      [2]
        
        Following rules are strictly oriented:
        bits#(s(x)) = [0 1 0]     [5]       
                      [0 0 0] x + [0]       
                      [0 0 0]     [0]       
                    > [0 1 0]     [4]       
                      [0 0 0] x + [0]       
                      [0 0 0]     [0]       
                    = c_2(bits#(half(s(x))))
        
        
        Following rules are (at-least) weakly oriented:
            half(0()) =  [1]            
                         [1]            
                         [3]            
                      >= [0]            
                         [1]            
                         [0]            
                      =  0()            
        
         half(s(0())) =  [2]            
                         [2]            
                         [5]            
                      >= [0]            
                         [1]            
                         [0]            
                      =  0()            
        
        half(s(s(x))) =  [0 1 0]     [2]
                         [0 1 0] x + [2]
                         [0 2 0]     [5]
                      >= [0 1 0]     [2]
                         [0 1 0] x + [1]
                         [0 0 0]     [0]
                      =  s(half(x))     
        
*** Step 7.a:2.a:2: Assumption WORST_CASE(?,O(1))
    + Considered Problem:
        - Weak DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        Assumption {assumed = Certificate {spaceUB = Unknown, spaceLB = Unknown, timeUB = Poly (Just 0), timeLB = Unknown}}
    + Details:
        ()

*** Step 7.a:2.b:1: RemoveWeakSuffixes WORST_CASE(?,O(1))
    + Considered Problem:
        - Weak DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        RemoveWeakSuffixes
    + Details:
        Consider the dependency graph
          1:W:bits#(s(x)) -> c_2(bits#(half(s(x))))
             -->_1 bits#(s(x)) -> c_2(bits#(half(s(x)))):1
          
        The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed.
          1: bits#(s(x)) -> c_2(bits#(half(s(x))))
*** Step 7.a:2.b:2: EmptyProcessor WORST_CASE(?,O(1))
    + Considered Problem:
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        EmptyProcessor
    + Details:
        The problem is already closed. The intended complexity is O(1).

** Step 7.b:1: RemoveWeakSuffixes WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Weak DPs:
            bits#(s(x)) -> c_2(bits#(half(s(x))))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        RemoveWeakSuffixes
    + Details:
        Consider the dependency graph
          1:S:half#(s(s(x))) -> c_5(half#(x))
             -->_1 half#(s(s(x))) -> c_5(half#(x)):1
          
          2:W:bits#(s(x)) -> c_2(bits#(half(s(x))))
             -->_1 bits#(s(x)) -> c_2(bits#(half(s(x)))):2
          
        The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed.
          2: bits#(s(x)) -> c_2(bits#(half(s(x))))
** Step 7.b:2: UsableRules WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Weak TRS:
            half(0()) -> 0()
            half(s(0())) -> 0()
            half(s(s(x))) -> s(half(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        UsableRules
    + Details:
        We replace rewrite rules by usable rules:
          half#(s(s(x))) -> c_5(half#(x))
** Step 7.b:3: PredecessorEstimationCP WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        PredecessorEstimationCP {onSelectionCP = any intersect of rules of CDG leaf and strict-rules, withComplexityPair = NaturalMI {miDimension = 1, miDegree = 1, miKind = Algebraic, uargs = UArgs, urules = URules, selector = Nothing}}
    + Details:
        We first use the processor NaturalMI {miDimension = 1, miDegree = 1, miKind = Algebraic, uargs = UArgs, urules = URules, selector = Nothing} to orient following rules strictly:
          1: half#(s(s(x))) -> c_5(half#(x))
          
        The strictly oriented rules are moved into the weak component.
*** Step 7.b:3.a:1: NaturalMI WORST_CASE(?,O(n^1))
    + Considered Problem:
        - Strict DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        NaturalMI {miDimension = 1, miDegree = 1, miKind = Algebraic, uargs = UArgs, urules = URules, selector = Just first alternative for predecessorEstimation on any intersect of rules of CDG leaf and strict-rules}
    + Details:
        We apply a matrix interpretation of kind constructor based matrix interpretation:
        The following argument positions are considered usable:
          uargs(c_5) = {1}
        
        Following symbols are considered usable:
          {bits#,half#}
        TcT has computed the following interpretation:
              p(0) = [4]          
           p(bits) = [0]          
           p(half) = [0]          
              p(s) = [1] x1 + [1] 
          p(bits#) = [0]          
          p(half#) = [8] x1 + [2] 
            p(c_1) = [1]          
            p(c_2) = [2] x1 + [2] 
            p(c_3) = [1]          
            p(c_4) = [1]          
            p(c_5) = [1] x1 + [14]
        
        Following rules are strictly oriented:
        half#(s(s(x))) = [8] x + [18] 
                       > [8] x + [16] 
                       = c_5(half#(x))
        
        
        Following rules are (at-least) weakly oriented:
        
*** Step 7.b:3.a:2: Assumption WORST_CASE(?,O(1))
    + Considered Problem:
        - Weak DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        Assumption {assumed = Certificate {spaceUB = Unknown, spaceLB = Unknown, timeUB = Poly (Just 0), timeLB = Unknown}}
    + Details:
        ()

*** Step 7.b:3.b:1: RemoveWeakSuffixes WORST_CASE(?,O(1))
    + Considered Problem:
        - Weak DPs:
            half#(s(s(x))) -> c_5(half#(x))
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        RemoveWeakSuffixes
    + Details:
        Consider the dependency graph
          1:W:half#(s(s(x))) -> c_5(half#(x))
             -->_1 half#(s(s(x))) -> c_5(half#(x)):1
          
        The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed.
          1: half#(s(s(x))) -> c_5(half#(x))
*** Step 7.b:3.b:2: EmptyProcessor WORST_CASE(?,O(1))
    + Considered Problem:
        
        - Signature:
            {bits/1,half/1,bits#/1,half#/1} / {0/0,s/1,c_1/0,c_2/1,c_3/0,c_4/0,c_5/1}
        - Obligation:
            innermost runtime complexity wrt. defined symbols {bits#,half#} and constructors {0,s}
    + Applied Processor:
        EmptyProcessor
    + Details:
        The problem is already closed. The intended complexity is O(1).

WORST_CASE(?,O(n^1))