(0) Obligation:

Clauses:

bin_tree(void).
bin_tree(T) :- ','(no(empty(T)), ','(left(T, L), ','(right(T, R), ','(bin_tree(L), bin_tree(R))))).
left(void, void).
left(tree(X1, L, X2), L).
right(void, void).
right(tree(X3, X4, R), R).
empty(void).
no(X) :- ','(X, ','(!, failure(a))).
no(X5).
failure(b).

Query: bin_tree(g)

(1) PrologToPrologProblemTransformerProof (SOUND transformation)

Built Prolog problem from termination graph ICLP10.

(2) Obligation:

Clauses:

bin_treeA(void).
bin_treeA(tree(T25, T26, T27)) :- bin_treeA(T26).
bin_treeA(tree(T25, T26, T27)) :- ','(bin_treeA(T26), bin_treeA(T27)).

Query: bin_treeA(g)

(3) PrologToPiTRSProof (SOUND transformation)

We use the technique of [TOCL09]. With regard to the inferred argument filtering the predicates were used in the following modes:
bin_treeA_in: (b)
Transforming Prolog into the following Term Rewriting System:
Pi-finite rewrite system:
The TRS R consists of the following rules:

bin_treeA_in_g(void) → bin_treeA_out_g(void)
bin_treeA_in_g(tree(T25, T26, T27)) → U1_g(T25, T26, T27, bin_treeA_in_g(T26))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → bin_treeA_out_g(tree(T25, T26, T27))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → U2_g(T25, T26, T27, bin_treeA_in_g(T27))
U2_g(T25, T26, T27, bin_treeA_out_g(T27)) → bin_treeA_out_g(tree(T25, T26, T27))

The argument filtering Pi contains the following mapping:
bin_treeA_in_g(x1)  =  bin_treeA_in_g(x1)
void  =  void
bin_treeA_out_g(x1)  =  bin_treeA_out_g
tree(x1, x2, x3)  =  tree(x1, x2, x3)
U1_g(x1, x2, x3, x4)  =  U1_g(x3, x4)
U2_g(x1, x2, x3, x4)  =  U2_g(x4)

Infinitary Constructor Rewriting Termination of PiTRS implies Termination of Prolog

(4) Obligation:

Pi-finite rewrite system:
The TRS R consists of the following rules:

bin_treeA_in_g(void) → bin_treeA_out_g(void)
bin_treeA_in_g(tree(T25, T26, T27)) → U1_g(T25, T26, T27, bin_treeA_in_g(T26))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → bin_treeA_out_g(tree(T25, T26, T27))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → U2_g(T25, T26, T27, bin_treeA_in_g(T27))
U2_g(T25, T26, T27, bin_treeA_out_g(T27)) → bin_treeA_out_g(tree(T25, T26, T27))

The argument filtering Pi contains the following mapping:
bin_treeA_in_g(x1)  =  bin_treeA_in_g(x1)
void  =  void
bin_treeA_out_g(x1)  =  bin_treeA_out_g
tree(x1, x2, x3)  =  tree(x1, x2, x3)
U1_g(x1, x2, x3, x4)  =  U1_g(x3, x4)
U2_g(x1, x2, x3, x4)  =  U2_g(x4)

(5) DependencyPairsProof (EQUIVALENT transformation)

Using Dependency Pairs [AG00,LOPSTR] we result in the following initial DP problem:
Pi DP problem:
The TRS P consists of the following rules:

BIN_TREEA_IN_G(tree(T25, T26, T27)) → U1_G(T25, T26, T27, bin_treeA_in_g(T26))
BIN_TREEA_IN_G(tree(T25, T26, T27)) → BIN_TREEA_IN_G(T26)
U1_G(T25, T26, T27, bin_treeA_out_g(T26)) → U2_G(T25, T26, T27, bin_treeA_in_g(T27))
U1_G(T25, T26, T27, bin_treeA_out_g(T26)) → BIN_TREEA_IN_G(T27)

The TRS R consists of the following rules:

bin_treeA_in_g(void) → bin_treeA_out_g(void)
bin_treeA_in_g(tree(T25, T26, T27)) → U1_g(T25, T26, T27, bin_treeA_in_g(T26))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → bin_treeA_out_g(tree(T25, T26, T27))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → U2_g(T25, T26, T27, bin_treeA_in_g(T27))
U2_g(T25, T26, T27, bin_treeA_out_g(T27)) → bin_treeA_out_g(tree(T25, T26, T27))

The argument filtering Pi contains the following mapping:
bin_treeA_in_g(x1)  =  bin_treeA_in_g(x1)
void  =  void
bin_treeA_out_g(x1)  =  bin_treeA_out_g
tree(x1, x2, x3)  =  tree(x1, x2, x3)
U1_g(x1, x2, x3, x4)  =  U1_g(x3, x4)
U2_g(x1, x2, x3, x4)  =  U2_g(x4)
BIN_TREEA_IN_G(x1)  =  BIN_TREEA_IN_G(x1)
U1_G(x1, x2, x3, x4)  =  U1_G(x3, x4)
U2_G(x1, x2, x3, x4)  =  U2_G(x4)

We have to consider all (P,R,Pi)-chains

(6) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

BIN_TREEA_IN_G(tree(T25, T26, T27)) → U1_G(T25, T26, T27, bin_treeA_in_g(T26))
BIN_TREEA_IN_G(tree(T25, T26, T27)) → BIN_TREEA_IN_G(T26)
U1_G(T25, T26, T27, bin_treeA_out_g(T26)) → U2_G(T25, T26, T27, bin_treeA_in_g(T27))
U1_G(T25, T26, T27, bin_treeA_out_g(T26)) → BIN_TREEA_IN_G(T27)

The TRS R consists of the following rules:

bin_treeA_in_g(void) → bin_treeA_out_g(void)
bin_treeA_in_g(tree(T25, T26, T27)) → U1_g(T25, T26, T27, bin_treeA_in_g(T26))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → bin_treeA_out_g(tree(T25, T26, T27))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → U2_g(T25, T26, T27, bin_treeA_in_g(T27))
U2_g(T25, T26, T27, bin_treeA_out_g(T27)) → bin_treeA_out_g(tree(T25, T26, T27))

The argument filtering Pi contains the following mapping:
bin_treeA_in_g(x1)  =  bin_treeA_in_g(x1)
void  =  void
bin_treeA_out_g(x1)  =  bin_treeA_out_g
tree(x1, x2, x3)  =  tree(x1, x2, x3)
U1_g(x1, x2, x3, x4)  =  U1_g(x3, x4)
U2_g(x1, x2, x3, x4)  =  U2_g(x4)
BIN_TREEA_IN_G(x1)  =  BIN_TREEA_IN_G(x1)
U1_G(x1, x2, x3, x4)  =  U1_G(x3, x4)
U2_G(x1, x2, x3, x4)  =  U2_G(x4)

We have to consider all (P,R,Pi)-chains

(7) DependencyGraphProof (EQUIVALENT transformation)

The approximation of the Dependency Graph [LOPSTR] contains 1 SCC with 1 less node.

(8) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

U1_G(T25, T26, T27, bin_treeA_out_g(T26)) → BIN_TREEA_IN_G(T27)
BIN_TREEA_IN_G(tree(T25, T26, T27)) → U1_G(T25, T26, T27, bin_treeA_in_g(T26))
BIN_TREEA_IN_G(tree(T25, T26, T27)) → BIN_TREEA_IN_G(T26)

The TRS R consists of the following rules:

bin_treeA_in_g(void) → bin_treeA_out_g(void)
bin_treeA_in_g(tree(T25, T26, T27)) → U1_g(T25, T26, T27, bin_treeA_in_g(T26))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → bin_treeA_out_g(tree(T25, T26, T27))
U1_g(T25, T26, T27, bin_treeA_out_g(T26)) → U2_g(T25, T26, T27, bin_treeA_in_g(T27))
U2_g(T25, T26, T27, bin_treeA_out_g(T27)) → bin_treeA_out_g(tree(T25, T26, T27))

The argument filtering Pi contains the following mapping:
bin_treeA_in_g(x1)  =  bin_treeA_in_g(x1)
void  =  void
bin_treeA_out_g(x1)  =  bin_treeA_out_g
tree(x1, x2, x3)  =  tree(x1, x2, x3)
U1_g(x1, x2, x3, x4)  =  U1_g(x3, x4)
U2_g(x1, x2, x3, x4)  =  U2_g(x4)
BIN_TREEA_IN_G(x1)  =  BIN_TREEA_IN_G(x1)
U1_G(x1, x2, x3, x4)  =  U1_G(x3, x4)

We have to consider all (P,R,Pi)-chains

(9) PiDPToQDPProof (SOUND transformation)

Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.

(10) Obligation:

Q DP problem:
The TRS P consists of the following rules:

U1_G(T27, bin_treeA_out_g) → BIN_TREEA_IN_G(T27)
BIN_TREEA_IN_G(tree(T25, T26, T27)) → U1_G(T27, bin_treeA_in_g(T26))
BIN_TREEA_IN_G(tree(T25, T26, T27)) → BIN_TREEA_IN_G(T26)

The TRS R consists of the following rules:

bin_treeA_in_g(void) → bin_treeA_out_g
bin_treeA_in_g(tree(T25, T26, T27)) → U1_g(T27, bin_treeA_in_g(T26))
U1_g(T27, bin_treeA_out_g) → bin_treeA_out_g
U1_g(T27, bin_treeA_out_g) → U2_g(bin_treeA_in_g(T27))
U2_g(bin_treeA_out_g) → bin_treeA_out_g

The set Q consists of the following terms:

bin_treeA_in_g(x0)
U1_g(x0, x1)
U2_g(x0)

We have to consider all (P,Q,R)-chains.

(11) QDPSizeChangeProof (EQUIVALENT transformation)

By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.

From the DPs we obtained the following set of size-change graphs:

  • BIN_TREEA_IN_G(tree(T25, T26, T27)) → U1_G(T27, bin_treeA_in_g(T26))
    The graph contains the following edges 1 > 1

  • BIN_TREEA_IN_G(tree(T25, T26, T27)) → BIN_TREEA_IN_G(T26)
    The graph contains the following edges 1 > 1

  • U1_G(T27, bin_treeA_out_g) → BIN_TREEA_IN_G(T27)
    The graph contains the following edges 1 >= 1

(12) YES