(0) Obligation:
Clauses:
delete(X, tree(X, void, Right), Right).
delete(X, tree(X, Left, void), Left).
delete(X, tree(X, Left, Right), tree(Y, Left, Right1)) :- delmin(Right, Y, Right1).
delete(X, tree(Y, Left, Right), tree(Y, Left1, Right)) :- ','(less(X, Y), delete(X, Left, Left1)).
delete(X, tree(Y, Left, Right), tree(Y, Left, Right1)) :- ','(less(Y, X), delete(X, Right, Right1)).
delmin(tree(Y, void, Right), Y, Right).
delmin(tree(X, Left, X1), Y, tree(X, Left1, X2)) :- delmin(Left, Y, Left1).
less(0, s(X3)).
less(s(X), s(Y)) :- less(X, Y).
Query: delete(a,a,g)
(1) PrologToDTProblemTransformerProof (SOUND transformation)
Built DT problem from termination graph DT10.
(2) Obligation:
Triples:
delminA(tree(X1, X2, X3), X4, tree(X1, X5, X6)) :- delminA(X2, X4, X5).
lessB(s(X1), s(X2)) :- lessB(X1, X2).
deleteC(X1, tree(X1, X2, X3), tree(X4, X2, X5)) :- delminA(X3, X4, X5).
deleteC(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- lessD(X1, X2).
deleteC(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- ','(lesscD(X1, X2), deleteC(X1, X3, X5)).
deleteC(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- lessD(X2, X1).
deleteC(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- ','(lesscD(X2, X1), deleteC(X1, X4, X5)).
lessD(s(X1), s(X2)) :- lessD(X1, X2).
lessJ(s(X1), s(X2)) :- lessJ(X1, X2).
pG(X1, X2, X3, X4) :- lessJ(X1, X2).
pG(X1, X2, X3, X4) :- ','(lesscJ(X1, X2), deleteE(X2, X3, X4)).
pF(X1, X2, X3, X4) :- lessB(X1, X2).
pF(X1, X2, X3, X4) :- ','(lesscB(X1, X2), deleteC(X1, X3, X4)).
pH(X1, X2, X3, X4) :- lessB(X1, X2).
pH(X1, X2, X3, X4) :- ','(lesscB(X1, X2), deleteC(s(X1), X3, X4)).
pI(X1, X2, X3, X4) :- lessJ(X1, X2).
pI(X1, X2, X3, X4) :- ','(lesscJ(X1, X2), deleteE(s(X2), X3, X4)).
deleteE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delminA(X4, X6, X7).
deleteE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- pF(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deleteC(0, X2, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- pH(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deleteE(s(X1), X3, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- pI(X2, X1, X4, X5).
deleteE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delminA(X4, X6, X7).
deleteE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- pF(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deleteC(0, X2, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- pH(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deleteE(s(X1), X3, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- pI(X2, X1, X4, X5).
deleteE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delminA(X4, X6, X7).
deleteE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- pF(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deleteC(0, X2, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- pH(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deleteE(s(X1), X3, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- pI(X2, X1, X4, X5).
deleteE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delminA(X4, X6, X7).
deleteE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- pF(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deleteC(0, X2, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- pH(X1, X2, X3, X5).
deleteE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- pG(X2, X1, X4, X5).
deleteE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deleteE(s(X1), X3, X4).
deleteE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- pI(X2, X1, X4, X5).
Clauses:
delmincA(tree(X1, void, X2), X1, X2).
delmincA(tree(X1, X2, X3), X4, tree(X1, X5, X6)) :- delmincA(X2, X4, X5).
lesscB(0, s(X1)).
lesscB(s(X1), s(X2)) :- lesscB(X1, X2).
deletecC(X1, tree(X1, void, X2), X2).
deletecC(X1, tree(X1, X2, void), X2).
deletecC(X1, tree(X1, X2, X3), tree(X4, X2, X5)) :- delmincA(X3, X4, X5).
deletecC(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- ','(lesscD(X1, X2), deletecC(X1, X3, X5)).
deletecC(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- ','(lesscD(X2, X1), deletecC(X1, X4, X5)).
lesscD(0, s(X1)).
lesscD(s(X1), s(X2)) :- lesscD(X1, X2).
deletecE(X1, tree(X1, void, X2), X2).
deletecE(X1, tree(X1, X2, void), X2).
deletecE(X1, tree(X1, X2, tree(X3, void, X4)), tree(X3, X2, X4)).
deletecE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delmincA(X4, X6, X7).
deletecE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- qcF(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deletecC(0, X2, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- qcH(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deletecE(s(X1), X3, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- qcI(X2, X1, X4, X5).
deletecE(X1, tree(X1, X2, tree(X3, void, X4)), tree(X3, X2, X4)).
deletecE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delmincA(X4, X6, X7).
deletecE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- qcF(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deletecC(0, X2, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- qcH(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deletecE(s(X1), X3, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- qcI(X2, X1, X4, X5).
deletecE(X1, tree(X1, X2, void), X2).
deletecE(X1, tree(X1, X2, tree(X3, void, X4)), tree(X3, X2, X4)).
deletecE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delmincA(X4, X6, X7).
deletecE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- qcF(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deletecC(0, X2, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- qcH(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deletecE(s(X1), X3, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- qcI(X2, X1, X4, X5).
deletecE(X1, tree(X1, X2, tree(X3, void, X4)), tree(X3, X2, X4)).
deletecE(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) :- delmincA(X4, X6, X7).
deletecE(X1, tree(X2, X3, X4), tree(X2, X5, X4)) :- qcF(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) :- deletecC(0, X2, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) :- qcH(X1, X2, X3, X5).
deletecE(X1, tree(X2, X3, X4), tree(X2, X3, X5)) :- qcG(X2, X1, X4, X5).
deletecE(s(X1), tree(0, X2, X3), tree(0, X2, X4)) :- deletecE(s(X1), X3, X4).
deletecE(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) :- qcI(X2, X1, X4, X5).
lesscJ(0, s(X1)).
lesscJ(s(X1), s(X2)) :- lesscJ(X1, X2).
qcG(X1, X2, X3, X4) :- ','(lesscJ(X1, X2), deletecE(X2, X3, X4)).
qcF(X1, X2, X3, X4) :- ','(lesscB(X1, X2), deletecC(X1, X3, X4)).
qcH(X1, X2, X3, X4) :- ','(lesscB(X1, X2), deletecC(s(X1), X3, X4)).
qcI(X1, X2, X3, X4) :- ','(lesscJ(X1, X2), deletecE(s(X2), X3, X4)).
Afs:
deleteE(x1, x2, x3) = deleteE(x3)
(3) TriplesToPiDPProof (SOUND transformation)
We use the technique of [DT09]. With regard to the inferred argument filtering the predicates were used in the following modes:
deleteE_in: (f,f,b)
delminA_in: (f,b,b)
pF_in: (f,b,f,b)
lessB_in: (f,b)
lesscB_in: (f,b)
deleteC_in: (b,f,b)
lessD_in: (b,b)
lesscD_in: (b,b)
pG_in: (b,f,f,b)
lessJ_in: (b,f)
lesscJ_in: (b,f)
pH_in: (f,b,f,b)
pI_in: (b,f,f,b)
Transforming
TRIPLES into the following
Term Rewriting System:
Pi DP problem:
The TRS P consists of the following rules:
DELETEE_IN_AAG(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) → U24_AAG(X1, X2, X3, X4, X5, X6, X7, X8, delminA_in_agg(X4, X6, X7))
DELETEE_IN_AAG(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) → DELMINA_IN_AGG(X4, X6, X7)
DELMINA_IN_AGG(tree(X1, X2, X3), X4, tree(X1, X5, X6)) → U1_AGG(X1, X2, X3, X4, X5, X6, delminA_in_agg(X2, X4, X5))
DELMINA_IN_AGG(tree(X1, X2, X3), X4, tree(X1, X5, X6)) → DELMINA_IN_AGG(X2, X4, X5)
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U25_AAG(X1, X2, X3, X4, X5, pF_in_agag(X1, X2, X3, X5))
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → PF_IN_AGAG(X1, X2, X3, X5)
PF_IN_AGAG(X1, X2, X3, X4) → U15_AGAG(X1, X2, X3, X4, lessB_in_ag(X1, X2))
PF_IN_AGAG(X1, X2, X3, X4) → LESSB_IN_AG(X1, X2)
LESSB_IN_AG(s(X1), s(X2)) → U2_AG(X1, X2, lessB_in_ag(X1, X2))
LESSB_IN_AG(s(X1), s(X2)) → LESSB_IN_AG(X1, X2)
PF_IN_AGAG(X1, X2, X3, X4) → U16_AGAG(X1, X2, X3, X4, lesscB_in_ag(X1, X2))
U16_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → U17_AGAG(X1, X2, X3, X4, deleteC_in_gag(X1, X3, X4))
U16_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → DELETEC_IN_GAG(X1, X3, X4)
DELETEC_IN_GAG(X1, tree(X1, X2, X3), tree(X4, X2, X5)) → U3_GAG(X1, X2, X3, X4, X5, delminA_in_agg(X3, X4, X5))
DELETEC_IN_GAG(X1, tree(X1, X2, X3), tree(X4, X2, X5)) → DELMINA_IN_AGG(X3, X4, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U4_GAG(X1, X2, X3, X4, X5, lessD_in_gg(X1, X2))
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → LESSD_IN_GG(X1, X2)
LESSD_IN_GG(s(X1), s(X2)) → U10_GG(X1, X2, lessD_in_gg(X1, X2))
LESSD_IN_GG(s(X1), s(X2)) → LESSD_IN_GG(X1, X2)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U5_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X1, X2))
U5_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X1, X2)) → U6_GAG(X1, X2, X3, X4, X5, deleteC_in_gag(X1, X3, X5))
U5_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X1, X2)) → DELETEC_IN_GAG(X1, X3, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U7_GAG(X1, X2, X3, X4, X5, lessD_in_gg(X2, X1))
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → LESSD_IN_GG(X2, X1)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U8_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X2, X1))
U8_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X2, X1)) → U9_GAG(X1, X2, X3, X4, X5, deleteC_in_gag(X1, X4, X5))
U8_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X2, X1)) → DELETEC_IN_GAG(X1, X4, X5)
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U26_AAG(X1, X2, X3, X4, X5, pG_in_gaag(X2, X1, X4, X5))
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → PG_IN_GAAG(X2, X1, X4, X5)
PG_IN_GAAG(X1, X2, X3, X4) → U12_GAAG(X1, X2, X3, X4, lessJ_in_ga(X1, X2))
PG_IN_GAAG(X1, X2, X3, X4) → LESSJ_IN_GA(X1, X2)
LESSJ_IN_GA(s(X1), s(X2)) → U11_GA(X1, X2, lessJ_in_ga(X1, X2))
LESSJ_IN_GA(s(X1), s(X2)) → LESSJ_IN_GA(X1, X2)
PG_IN_GAAG(X1, X2, X3, X4) → U13_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U13_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → U14_GAAG(X1, X2, X3, X4, deleteE_in_aag(X2, X3, X4))
U13_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(X2, X3, X4)
DELETEE_IN_AAG(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) → U27_AAG(X1, X2, X3, X4, deleteC_in_gag(0, X2, X4))
DELETEE_IN_AAG(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) → DELETEC_IN_GAG(0, X2, X4)
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) → U28_AAG(X1, X2, X3, X4, X5, pH_in_agag(X1, X2, X3, X5))
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) → PH_IN_AGAG(X1, X2, X3, X5)
PH_IN_AGAG(X1, X2, X3, X4) → U18_AGAG(X1, X2, X3, X4, lessB_in_ag(X1, X2))
PH_IN_AGAG(X1, X2, X3, X4) → LESSB_IN_AG(X1, X2)
PH_IN_AGAG(X1, X2, X3, X4) → U19_AGAG(X1, X2, X3, X4, lesscB_in_ag(X1, X2))
U19_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → U20_AGAG(X1, X2, X3, X4, deleteC_in_gag(s(X1), X3, X4))
U19_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → DELETEC_IN_GAG(s(X1), X3, X4)
DELETEE_IN_AAG(s(X1), tree(0, X2, X3), tree(0, X2, X4)) → U29_AAG(X1, X2, X3, X4, deleteE_in_aag(s(X1), X3, X4))
DELETEE_IN_AAG(s(X1), tree(0, X2, X3), tree(0, X2, X4)) → DELETEE_IN_AAG(s(X1), X3, X4)
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) → U30_AAG(X1, X2, X3, X4, X5, pI_in_gaag(X2, X1, X4, X5))
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) → PI_IN_GAAG(X2, X1, X4, X5)
PI_IN_GAAG(X1, X2, X3, X4) → U21_GAAG(X1, X2, X3, X4, lessJ_in_ga(X1, X2))
PI_IN_GAAG(X1, X2, X3, X4) → LESSJ_IN_GA(X1, X2)
PI_IN_GAAG(X1, X2, X3, X4) → U22_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U22_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → U23_GAAG(X1, X2, X3, X4, deleteE_in_aag(s(X2), X3, X4))
U22_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(s(X2), X3, X4)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
deleteE_in_aag(
x1,
x2,
x3) =
deleteE_in_aag(
x3)
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
delminA_in_agg(
x1,
x2,
x3) =
delminA_in_agg(
x2,
x3)
pF_in_agag(
x1,
x2,
x3,
x4) =
pF_in_agag(
x2,
x4)
lessB_in_ag(
x1,
x2) =
lessB_in_ag(
x2)
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
deleteC_in_gag(
x1,
x2,
x3) =
deleteC_in_gag(
x1,
x3)
lessD_in_gg(
x1,
x2) =
lessD_in_gg(
x1,
x2)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
pG_in_gaag(
x1,
x2,
x3,
x4) =
pG_in_gaag(
x1,
x4)
lessJ_in_ga(
x1,
x2) =
lessJ_in_ga(
x1)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
pH_in_agag(
x1,
x2,
x3,
x4) =
pH_in_agag(
x2,
x4)
pI_in_gaag(
x1,
x2,
x3,
x4) =
pI_in_gaag(
x1,
x4)
DELETEE_IN_AAG(
x1,
x2,
x3) =
DELETEE_IN_AAG(
x3)
U24_AAG(
x1,
x2,
x3,
x4,
x5,
x6,
x7,
x8,
x9) =
U24_AAG(
x2,
x3,
x6,
x7,
x8,
x9)
DELMINA_IN_AGG(
x1,
x2,
x3) =
DELMINA_IN_AGG(
x2,
x3)
U1_AGG(
x1,
x2,
x3,
x4,
x5,
x6,
x7) =
U1_AGG(
x1,
x4,
x5,
x6,
x7)
U25_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U25_AAG(
x2,
x4,
x5,
x6)
PF_IN_AGAG(
x1,
x2,
x3,
x4) =
PF_IN_AGAG(
x2,
x4)
U15_AGAG(
x1,
x2,
x3,
x4,
x5) =
U15_AGAG(
x2,
x4,
x5)
LESSB_IN_AG(
x1,
x2) =
LESSB_IN_AG(
x2)
U2_AG(
x1,
x2,
x3) =
U2_AG(
x2,
x3)
U16_AGAG(
x1,
x2,
x3,
x4,
x5) =
U16_AGAG(
x2,
x4,
x5)
U17_AGAG(
x1,
x2,
x3,
x4,
x5) =
U17_AGAG(
x1,
x2,
x4,
x5)
DELETEC_IN_GAG(
x1,
x2,
x3) =
DELETEC_IN_GAG(
x1,
x3)
U3_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U3_GAG(
x1,
x2,
x4,
x5,
x6)
U4_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U4_GAG(
x1,
x2,
x4,
x5,
x6)
LESSD_IN_GG(
x1,
x2) =
LESSD_IN_GG(
x1,
x2)
U10_GG(
x1,
x2,
x3) =
U10_GG(
x1,
x2,
x3)
U5_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U5_GAG(
x1,
x2,
x4,
x5,
x6)
U6_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U6_GAG(
x1,
x2,
x4,
x5,
x6)
U7_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U7_GAG(
x1,
x2,
x3,
x5,
x6)
U8_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U8_GAG(
x1,
x2,
x3,
x5,
x6)
U9_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U9_GAG(
x1,
x2,
x3,
x5,
x6)
U26_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U26_AAG(
x2,
x3,
x5,
x6)
PG_IN_GAAG(
x1,
x2,
x3,
x4) =
PG_IN_GAAG(
x1,
x4)
U12_GAAG(
x1,
x2,
x3,
x4,
x5) =
U12_GAAG(
x1,
x4,
x5)
LESSJ_IN_GA(
x1,
x2) =
LESSJ_IN_GA(
x1)
U11_GA(
x1,
x2,
x3) =
U11_GA(
x1,
x3)
U13_GAAG(
x1,
x2,
x3,
x4,
x5) =
U13_GAAG(
x1,
x4,
x5)
U14_GAAG(
x1,
x2,
x3,
x4,
x5) =
U14_GAAG(
x1,
x4,
x5)
U27_AAG(
x1,
x2,
x3,
x4,
x5) =
U27_AAG(
x1,
x3,
x4,
x5)
U28_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U28_AAG(
x2,
x4,
x5,
x6)
PH_IN_AGAG(
x1,
x2,
x3,
x4) =
PH_IN_AGAG(
x2,
x4)
U18_AGAG(
x1,
x2,
x3,
x4,
x5) =
U18_AGAG(
x2,
x4,
x5)
U19_AGAG(
x1,
x2,
x3,
x4,
x5) =
U19_AGAG(
x2,
x4,
x5)
U20_AGAG(
x1,
x2,
x3,
x4,
x5) =
U20_AGAG(
x1,
x2,
x4,
x5)
U29_AAG(
x1,
x2,
x3,
x4,
x5) =
U29_AAG(
x2,
x4,
x5)
U30_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U30_AAG(
x2,
x3,
x5,
x6)
PI_IN_GAAG(
x1,
x2,
x3,
x4) =
PI_IN_GAAG(
x1,
x4)
U21_GAAG(
x1,
x2,
x3,
x4,
x5) =
U21_GAAG(
x1,
x4,
x5)
U22_GAAG(
x1,
x2,
x3,
x4,
x5) =
U22_GAAG(
x1,
x4,
x5)
U23_GAAG(
x1,
x2,
x3,
x4,
x5) =
U23_GAAG(
x1,
x4,
x5)
We have to consider all (P,R,Pi)-chains
Infinitary Constructor Rewriting Termination of PiDP implies Termination of TRIPLES
(4) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELETEE_IN_AAG(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) → U24_AAG(X1, X2, X3, X4, X5, X6, X7, X8, delminA_in_agg(X4, X6, X7))
DELETEE_IN_AAG(X1, tree(X1, X2, tree(X3, X4, X5)), tree(X6, X2, tree(X3, X7, X8))) → DELMINA_IN_AGG(X4, X6, X7)
DELMINA_IN_AGG(tree(X1, X2, X3), X4, tree(X1, X5, X6)) → U1_AGG(X1, X2, X3, X4, X5, X6, delminA_in_agg(X2, X4, X5))
DELMINA_IN_AGG(tree(X1, X2, X3), X4, tree(X1, X5, X6)) → DELMINA_IN_AGG(X2, X4, X5)
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U25_AAG(X1, X2, X3, X4, X5, pF_in_agag(X1, X2, X3, X5))
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → PF_IN_AGAG(X1, X2, X3, X5)
PF_IN_AGAG(X1, X2, X3, X4) → U15_AGAG(X1, X2, X3, X4, lessB_in_ag(X1, X2))
PF_IN_AGAG(X1, X2, X3, X4) → LESSB_IN_AG(X1, X2)
LESSB_IN_AG(s(X1), s(X2)) → U2_AG(X1, X2, lessB_in_ag(X1, X2))
LESSB_IN_AG(s(X1), s(X2)) → LESSB_IN_AG(X1, X2)
PF_IN_AGAG(X1, X2, X3, X4) → U16_AGAG(X1, X2, X3, X4, lesscB_in_ag(X1, X2))
U16_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → U17_AGAG(X1, X2, X3, X4, deleteC_in_gag(X1, X3, X4))
U16_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → DELETEC_IN_GAG(X1, X3, X4)
DELETEC_IN_GAG(X1, tree(X1, X2, X3), tree(X4, X2, X5)) → U3_GAG(X1, X2, X3, X4, X5, delminA_in_agg(X3, X4, X5))
DELETEC_IN_GAG(X1, tree(X1, X2, X3), tree(X4, X2, X5)) → DELMINA_IN_AGG(X3, X4, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U4_GAG(X1, X2, X3, X4, X5, lessD_in_gg(X1, X2))
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → LESSD_IN_GG(X1, X2)
LESSD_IN_GG(s(X1), s(X2)) → U10_GG(X1, X2, lessD_in_gg(X1, X2))
LESSD_IN_GG(s(X1), s(X2)) → LESSD_IN_GG(X1, X2)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U5_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X1, X2))
U5_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X1, X2)) → U6_GAG(X1, X2, X3, X4, X5, deleteC_in_gag(X1, X3, X5))
U5_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X1, X2)) → DELETEC_IN_GAG(X1, X3, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U7_GAG(X1, X2, X3, X4, X5, lessD_in_gg(X2, X1))
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → LESSD_IN_GG(X2, X1)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U8_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X2, X1))
U8_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X2, X1)) → U9_GAG(X1, X2, X3, X4, X5, deleteC_in_gag(X1, X4, X5))
U8_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X2, X1)) → DELETEC_IN_GAG(X1, X4, X5)
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U26_AAG(X1, X2, X3, X4, X5, pG_in_gaag(X2, X1, X4, X5))
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → PG_IN_GAAG(X2, X1, X4, X5)
PG_IN_GAAG(X1, X2, X3, X4) → U12_GAAG(X1, X2, X3, X4, lessJ_in_ga(X1, X2))
PG_IN_GAAG(X1, X2, X3, X4) → LESSJ_IN_GA(X1, X2)
LESSJ_IN_GA(s(X1), s(X2)) → U11_GA(X1, X2, lessJ_in_ga(X1, X2))
LESSJ_IN_GA(s(X1), s(X2)) → LESSJ_IN_GA(X1, X2)
PG_IN_GAAG(X1, X2, X3, X4) → U13_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U13_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → U14_GAAG(X1, X2, X3, X4, deleteE_in_aag(X2, X3, X4))
U13_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(X2, X3, X4)
DELETEE_IN_AAG(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) → U27_AAG(X1, X2, X3, X4, deleteC_in_gag(0, X2, X4))
DELETEE_IN_AAG(0, tree(s(X1), X2, X3), tree(s(X1), X4, X3)) → DELETEC_IN_GAG(0, X2, X4)
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) → U28_AAG(X1, X2, X3, X4, X5, pH_in_agag(X1, X2, X3, X5))
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X5, X4)) → PH_IN_AGAG(X1, X2, X3, X5)
PH_IN_AGAG(X1, X2, X3, X4) → U18_AGAG(X1, X2, X3, X4, lessB_in_ag(X1, X2))
PH_IN_AGAG(X1, X2, X3, X4) → LESSB_IN_AG(X1, X2)
PH_IN_AGAG(X1, X2, X3, X4) → U19_AGAG(X1, X2, X3, X4, lesscB_in_ag(X1, X2))
U19_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → U20_AGAG(X1, X2, X3, X4, deleteC_in_gag(s(X1), X3, X4))
U19_AGAG(X1, X2, X3, X4, lesscB_out_ag(X1, X2)) → DELETEC_IN_GAG(s(X1), X3, X4)
DELETEE_IN_AAG(s(X1), tree(0, X2, X3), tree(0, X2, X4)) → U29_AAG(X1, X2, X3, X4, deleteE_in_aag(s(X1), X3, X4))
DELETEE_IN_AAG(s(X1), tree(0, X2, X3), tree(0, X2, X4)) → DELETEE_IN_AAG(s(X1), X3, X4)
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) → U30_AAG(X1, X2, X3, X4, X5, pI_in_gaag(X2, X1, X4, X5))
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) → PI_IN_GAAG(X2, X1, X4, X5)
PI_IN_GAAG(X1, X2, X3, X4) → U21_GAAG(X1, X2, X3, X4, lessJ_in_ga(X1, X2))
PI_IN_GAAG(X1, X2, X3, X4) → LESSJ_IN_GA(X1, X2)
PI_IN_GAAG(X1, X2, X3, X4) → U22_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U22_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → U23_GAAG(X1, X2, X3, X4, deleteE_in_aag(s(X2), X3, X4))
U22_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(s(X2), X3, X4)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
deleteE_in_aag(
x1,
x2,
x3) =
deleteE_in_aag(
x3)
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
delminA_in_agg(
x1,
x2,
x3) =
delminA_in_agg(
x2,
x3)
pF_in_agag(
x1,
x2,
x3,
x4) =
pF_in_agag(
x2,
x4)
lessB_in_ag(
x1,
x2) =
lessB_in_ag(
x2)
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
deleteC_in_gag(
x1,
x2,
x3) =
deleteC_in_gag(
x1,
x3)
lessD_in_gg(
x1,
x2) =
lessD_in_gg(
x1,
x2)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
pG_in_gaag(
x1,
x2,
x3,
x4) =
pG_in_gaag(
x1,
x4)
lessJ_in_ga(
x1,
x2) =
lessJ_in_ga(
x1)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
pH_in_agag(
x1,
x2,
x3,
x4) =
pH_in_agag(
x2,
x4)
pI_in_gaag(
x1,
x2,
x3,
x4) =
pI_in_gaag(
x1,
x4)
DELETEE_IN_AAG(
x1,
x2,
x3) =
DELETEE_IN_AAG(
x3)
U24_AAG(
x1,
x2,
x3,
x4,
x5,
x6,
x7,
x8,
x9) =
U24_AAG(
x2,
x3,
x6,
x7,
x8,
x9)
DELMINA_IN_AGG(
x1,
x2,
x3) =
DELMINA_IN_AGG(
x2,
x3)
U1_AGG(
x1,
x2,
x3,
x4,
x5,
x6,
x7) =
U1_AGG(
x1,
x4,
x5,
x6,
x7)
U25_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U25_AAG(
x2,
x4,
x5,
x6)
PF_IN_AGAG(
x1,
x2,
x3,
x4) =
PF_IN_AGAG(
x2,
x4)
U15_AGAG(
x1,
x2,
x3,
x4,
x5) =
U15_AGAG(
x2,
x4,
x5)
LESSB_IN_AG(
x1,
x2) =
LESSB_IN_AG(
x2)
U2_AG(
x1,
x2,
x3) =
U2_AG(
x2,
x3)
U16_AGAG(
x1,
x2,
x3,
x4,
x5) =
U16_AGAG(
x2,
x4,
x5)
U17_AGAG(
x1,
x2,
x3,
x4,
x5) =
U17_AGAG(
x1,
x2,
x4,
x5)
DELETEC_IN_GAG(
x1,
x2,
x3) =
DELETEC_IN_GAG(
x1,
x3)
U3_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U3_GAG(
x1,
x2,
x4,
x5,
x6)
U4_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U4_GAG(
x1,
x2,
x4,
x5,
x6)
LESSD_IN_GG(
x1,
x2) =
LESSD_IN_GG(
x1,
x2)
U10_GG(
x1,
x2,
x3) =
U10_GG(
x1,
x2,
x3)
U5_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U5_GAG(
x1,
x2,
x4,
x5,
x6)
U6_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U6_GAG(
x1,
x2,
x4,
x5,
x6)
U7_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U7_GAG(
x1,
x2,
x3,
x5,
x6)
U8_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U8_GAG(
x1,
x2,
x3,
x5,
x6)
U9_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U9_GAG(
x1,
x2,
x3,
x5,
x6)
U26_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U26_AAG(
x2,
x3,
x5,
x6)
PG_IN_GAAG(
x1,
x2,
x3,
x4) =
PG_IN_GAAG(
x1,
x4)
U12_GAAG(
x1,
x2,
x3,
x4,
x5) =
U12_GAAG(
x1,
x4,
x5)
LESSJ_IN_GA(
x1,
x2) =
LESSJ_IN_GA(
x1)
U11_GA(
x1,
x2,
x3) =
U11_GA(
x1,
x3)
U13_GAAG(
x1,
x2,
x3,
x4,
x5) =
U13_GAAG(
x1,
x4,
x5)
U14_GAAG(
x1,
x2,
x3,
x4,
x5) =
U14_GAAG(
x1,
x4,
x5)
U27_AAG(
x1,
x2,
x3,
x4,
x5) =
U27_AAG(
x1,
x3,
x4,
x5)
U28_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U28_AAG(
x2,
x4,
x5,
x6)
PH_IN_AGAG(
x1,
x2,
x3,
x4) =
PH_IN_AGAG(
x2,
x4)
U18_AGAG(
x1,
x2,
x3,
x4,
x5) =
U18_AGAG(
x2,
x4,
x5)
U19_AGAG(
x1,
x2,
x3,
x4,
x5) =
U19_AGAG(
x2,
x4,
x5)
U20_AGAG(
x1,
x2,
x3,
x4,
x5) =
U20_AGAG(
x1,
x2,
x4,
x5)
U29_AAG(
x1,
x2,
x3,
x4,
x5) =
U29_AAG(
x2,
x4,
x5)
U30_AAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U30_AAG(
x2,
x3,
x5,
x6)
PI_IN_GAAG(
x1,
x2,
x3,
x4) =
PI_IN_GAAG(
x1,
x4)
U21_GAAG(
x1,
x2,
x3,
x4,
x5) =
U21_GAAG(
x1,
x4,
x5)
U22_GAAG(
x1,
x2,
x3,
x4,
x5) =
U22_GAAG(
x1,
x4,
x5)
U23_GAAG(
x1,
x2,
x3,
x4,
x5) =
U23_GAAG(
x1,
x4,
x5)
We have to consider all (P,R,Pi)-chains
(5) DependencyGraphProof (EQUIVALENT transformation)
The approximation of the Dependency Graph [LOPSTR] contains 6 SCCs with 39 less nodes.
(6) Complex Obligation (AND)
(7) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
LESSJ_IN_GA(s(X1), s(X2)) → LESSJ_IN_GA(X1, X2)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
LESSJ_IN_GA(
x1,
x2) =
LESSJ_IN_GA(
x1)
We have to consider all (P,R,Pi)-chains
(8) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(9) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
LESSJ_IN_GA(s(X1), s(X2)) → LESSJ_IN_GA(X1, X2)
R is empty.
The argument filtering Pi contains the following mapping:
s(
x1) =
s(
x1)
LESSJ_IN_GA(
x1,
x2) =
LESSJ_IN_GA(
x1)
We have to consider all (P,R,Pi)-chains
(10) PiDPToQDPProof (SOUND transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(11) Obligation:
Q DP problem:
The TRS P consists of the following rules:
LESSJ_IN_GA(s(X1)) → LESSJ_IN_GA(X1)
R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.
(12) QDPSizeChangeProof (EQUIVALENT transformation)
By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.
From the DPs we obtained the following set of size-change graphs:
- LESSJ_IN_GA(s(X1)) → LESSJ_IN_GA(X1)
The graph contains the following edges 1 > 1
(13) YES
(14) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
LESSD_IN_GG(s(X1), s(X2)) → LESSD_IN_GG(X1, X2)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
LESSD_IN_GG(
x1,
x2) =
LESSD_IN_GG(
x1,
x2)
We have to consider all (P,R,Pi)-chains
(15) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(16) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
LESSD_IN_GG(s(X1), s(X2)) → LESSD_IN_GG(X1, X2)
R is empty.
Pi is empty.
We have to consider all (P,R,Pi)-chains
(17) PiDPToQDPProof (EQUIVALENT transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(18) Obligation:
Q DP problem:
The TRS P consists of the following rules:
LESSD_IN_GG(s(X1), s(X2)) → LESSD_IN_GG(X1, X2)
R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.
(19) QDPSizeChangeProof (EQUIVALENT transformation)
By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.
From the DPs we obtained the following set of size-change graphs:
- LESSD_IN_GG(s(X1), s(X2)) → LESSD_IN_GG(X1, X2)
The graph contains the following edges 1 > 1, 2 > 2
(20) YES
(21) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
LESSB_IN_AG(s(X1), s(X2)) → LESSB_IN_AG(X1, X2)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
LESSB_IN_AG(
x1,
x2) =
LESSB_IN_AG(
x2)
We have to consider all (P,R,Pi)-chains
(22) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(23) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
LESSB_IN_AG(s(X1), s(X2)) → LESSB_IN_AG(X1, X2)
R is empty.
The argument filtering Pi contains the following mapping:
s(
x1) =
s(
x1)
LESSB_IN_AG(
x1,
x2) =
LESSB_IN_AG(
x2)
We have to consider all (P,R,Pi)-chains
(24) PiDPToQDPProof (SOUND transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(25) Obligation:
Q DP problem:
The TRS P consists of the following rules:
LESSB_IN_AG(s(X2)) → LESSB_IN_AG(X2)
R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.
(26) QDPSizeChangeProof (EQUIVALENT transformation)
By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.
From the DPs we obtained the following set of size-change graphs:
- LESSB_IN_AG(s(X2)) → LESSB_IN_AG(X2)
The graph contains the following edges 1 > 1
(27) YES
(28) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELMINA_IN_AGG(tree(X1, X2, X3), X4, tree(X1, X5, X6)) → DELMINA_IN_AGG(X2, X4, X5)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
DELMINA_IN_AGG(
x1,
x2,
x3) =
DELMINA_IN_AGG(
x2,
x3)
We have to consider all (P,R,Pi)-chains
(29) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(30) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELMINA_IN_AGG(tree(X1, X2, X3), X4, tree(X1, X5, X6)) → DELMINA_IN_AGG(X2, X4, X5)
R is empty.
The argument filtering Pi contains the following mapping:
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
DELMINA_IN_AGG(
x1,
x2,
x3) =
DELMINA_IN_AGG(
x2,
x3)
We have to consider all (P,R,Pi)-chains
(31) PiDPToQDPProof (SOUND transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(32) Obligation:
Q DP problem:
The TRS P consists of the following rules:
DELMINA_IN_AGG(X4, tree(X1, X5, X6)) → DELMINA_IN_AGG(X4, X5)
R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.
(33) QDPSizeChangeProof (EQUIVALENT transformation)
By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.
From the DPs we obtained the following set of size-change graphs:
- DELMINA_IN_AGG(X4, tree(X1, X5, X6)) → DELMINA_IN_AGG(X4, X5)
The graph contains the following edges 1 >= 1, 2 > 2
(34) YES
(35) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U5_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X1, X2))
U5_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X1, X2)) → DELETEC_IN_GAG(X1, X3, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U8_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X2, X1))
U8_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X2, X1)) → DELETEC_IN_GAG(X1, X4, X5)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
DELETEC_IN_GAG(
x1,
x2,
x3) =
DELETEC_IN_GAG(
x1,
x3)
U5_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U5_GAG(
x1,
x2,
x4,
x5,
x6)
U8_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U8_GAG(
x1,
x2,
x3,
x5,
x6)
We have to consider all (P,R,Pi)-chains
(36) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(37) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X5, X4)) → U5_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X1, X2))
U5_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X1, X2)) → DELETEC_IN_GAG(X1, X3, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → U8_GAG(X1, X2, X3, X4, X5, lesscD_in_gg(X2, X1))
U8_GAG(X1, X2, X3, X4, X5, lesscD_out_gg(X2, X1)) → DELETEC_IN_GAG(X1, X4, X5)
The TRS R consists of the following rules:
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
s(
x1) =
s(
x1)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
DELETEC_IN_GAG(
x1,
x2,
x3) =
DELETEC_IN_GAG(
x1,
x3)
U5_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U5_GAG(
x1,
x2,
x4,
x5,
x6)
U8_GAG(
x1,
x2,
x3,
x4,
x5,
x6) =
U8_GAG(
x1,
x2,
x3,
x5,
x6)
We have to consider all (P,R,Pi)-chains
(38) PiDPToQDPProof (SOUND transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(39) Obligation:
Q DP problem:
The TRS P consists of the following rules:
DELETEC_IN_GAG(X1, tree(X2, X5, X4)) → U5_GAG(X1, X2, X4, X5, lesscD_in_gg(X1, X2))
U5_GAG(X1, X2, X4, X5, lesscD_out_gg(X1, X2)) → DELETEC_IN_GAG(X1, X5)
DELETEC_IN_GAG(X1, tree(X2, X3, X5)) → U8_GAG(X1, X2, X3, X5, lesscD_in_gg(X2, X1))
U8_GAG(X1, X2, X3, X5, lesscD_out_gg(X2, X1)) → DELETEC_IN_GAG(X1, X5)
The TRS R consists of the following rules:
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
The set Q consists of the following terms:
lesscD_in_gg(x0, x1)
U39_gg(x0, x1, x2)
We have to consider all (P,Q,R)-chains.
(40) QDPSizeChangeProof (EQUIVALENT transformation)
By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.
From the DPs we obtained the following set of size-change graphs:
- U5_GAG(X1, X2, X4, X5, lesscD_out_gg(X1, X2)) → DELETEC_IN_GAG(X1, X5)
The graph contains the following edges 1 >= 1, 5 > 1, 4 >= 2
- U8_GAG(X1, X2, X3, X5, lesscD_out_gg(X2, X1)) → DELETEC_IN_GAG(X1, X5)
The graph contains the following edges 1 >= 1, 5 > 1, 4 >= 2
- DELETEC_IN_GAG(X1, tree(X2, X5, X4)) → U5_GAG(X1, X2, X4, X5, lesscD_in_gg(X1, X2))
The graph contains the following edges 1 >= 1, 2 > 2, 2 > 3, 2 > 4
- DELETEC_IN_GAG(X1, tree(X2, X3, X5)) → U8_GAG(X1, X2, X3, X5, lesscD_in_gg(X2, X1))
The graph contains the following edges 1 >= 1, 2 > 2, 2 > 3, 2 > 4
(41) YES
(42) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → PG_IN_GAAG(X2, X1, X4, X5)
PG_IN_GAAG(X1, X2, X3, X4) → U13_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U13_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(X2, X3, X4)
DELETEE_IN_AAG(s(X1), tree(0, X2, X3), tree(0, X2, X4)) → DELETEE_IN_AAG(s(X1), X3, X4)
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) → PI_IN_GAAG(X2, X1, X4, X5)
PI_IN_GAAG(X1, X2, X3, X4) → U22_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U22_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(s(X2), X3, X4)
The TRS R consists of the following rules:
lesscB_in_ag(0, s(X1)) → lesscB_out_ag(0, s(X1))
lesscB_in_ag(s(X1), s(X2)) → U33_ag(X1, X2, lesscB_in_ag(X1, X2))
U33_ag(X1, X2, lesscB_out_ag(X1, X2)) → lesscB_out_ag(s(X1), s(X2))
lesscD_in_gg(0, s(X1)) → lesscD_out_gg(0, s(X1))
lesscD_in_gg(s(X1), s(X2)) → U39_gg(X1, X2, lesscD_in_gg(X1, X2))
U39_gg(X1, X2, lesscD_out_gg(X1, X2)) → lesscD_out_gg(s(X1), s(X2))
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
s(
x1) =
s(
x1)
lesscB_in_ag(
x1,
x2) =
lesscB_in_ag(
x2)
lesscB_out_ag(
x1,
x2) =
lesscB_out_ag(
x1,
x2)
U33_ag(
x1,
x2,
x3) =
U33_ag(
x2,
x3)
lesscD_in_gg(
x1,
x2) =
lesscD_in_gg(
x1,
x2)
0 =
0
lesscD_out_gg(
x1,
x2) =
lesscD_out_gg(
x1,
x2)
U39_gg(
x1,
x2,
x3) =
U39_gg(
x1,
x2,
x3)
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
DELETEE_IN_AAG(
x1,
x2,
x3) =
DELETEE_IN_AAG(
x3)
PG_IN_GAAG(
x1,
x2,
x3,
x4) =
PG_IN_GAAG(
x1,
x4)
U13_GAAG(
x1,
x2,
x3,
x4,
x5) =
U13_GAAG(
x1,
x4,
x5)
PI_IN_GAAG(
x1,
x2,
x3,
x4) =
PI_IN_GAAG(
x1,
x4)
U22_GAAG(
x1,
x2,
x3,
x4,
x5) =
U22_GAAG(
x1,
x4,
x5)
We have to consider all (P,R,Pi)-chains
(43) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(44) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
DELETEE_IN_AAG(X1, tree(X2, X3, X4), tree(X2, X3, X5)) → PG_IN_GAAG(X2, X1, X4, X5)
PG_IN_GAAG(X1, X2, X3, X4) → U13_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U13_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(X2, X3, X4)
DELETEE_IN_AAG(s(X1), tree(0, X2, X3), tree(0, X2, X4)) → DELETEE_IN_AAG(s(X1), X3, X4)
DELETEE_IN_AAG(s(X1), tree(s(X2), X3, X4), tree(s(X2), X3, X5)) → PI_IN_GAAG(X2, X1, X4, X5)
PI_IN_GAAG(X1, X2, X3, X4) → U22_GAAG(X1, X2, X3, X4, lesscJ_in_ga(X1, X2))
U22_GAAG(X1, X2, X3, X4, lesscJ_out_ga(X1, X2)) → DELETEE_IN_AAG(s(X2), X3, X4)
The TRS R consists of the following rules:
lesscJ_in_ga(0, s(X1)) → lesscJ_out_ga(0, s(X1))
lesscJ_in_ga(s(X1), s(X2)) → U47_ga(X1, X2, lesscJ_in_ga(X1, X2))
U47_ga(X1, X2, lesscJ_out_ga(X1, X2)) → lesscJ_out_ga(s(X1), s(X2))
The argument filtering Pi contains the following mapping:
tree(
x1,
x2,
x3) =
tree(
x1,
x2,
x3)
s(
x1) =
s(
x1)
0 =
0
lesscJ_in_ga(
x1,
x2) =
lesscJ_in_ga(
x1)
lesscJ_out_ga(
x1,
x2) =
lesscJ_out_ga(
x1)
U47_ga(
x1,
x2,
x3) =
U47_ga(
x1,
x3)
DELETEE_IN_AAG(
x1,
x2,
x3) =
DELETEE_IN_AAG(
x3)
PG_IN_GAAG(
x1,
x2,
x3,
x4) =
PG_IN_GAAG(
x1,
x4)
U13_GAAG(
x1,
x2,
x3,
x4,
x5) =
U13_GAAG(
x1,
x4,
x5)
PI_IN_GAAG(
x1,
x2,
x3,
x4) =
PI_IN_GAAG(
x1,
x4)
U22_GAAG(
x1,
x2,
x3,
x4,
x5) =
U22_GAAG(
x1,
x4,
x5)
We have to consider all (P,R,Pi)-chains
(45) PiDPToQDPProof (SOUND transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(46) Obligation:
Q DP problem:
The TRS P consists of the following rules:
DELETEE_IN_AAG(tree(X2, X3, X5)) → PG_IN_GAAG(X2, X5)
PG_IN_GAAG(X1, X4) → U13_GAAG(X1, X4, lesscJ_in_ga(X1))
U13_GAAG(X1, X4, lesscJ_out_ga(X1)) → DELETEE_IN_AAG(X4)
DELETEE_IN_AAG(tree(0, X2, X4)) → DELETEE_IN_AAG(X4)
DELETEE_IN_AAG(tree(s(X2), X3, X5)) → PI_IN_GAAG(X2, X5)
PI_IN_GAAG(X1, X4) → U22_GAAG(X1, X4, lesscJ_in_ga(X1))
U22_GAAG(X1, X4, lesscJ_out_ga(X1)) → DELETEE_IN_AAG(X4)
The TRS R consists of the following rules:
lesscJ_in_ga(0) → lesscJ_out_ga(0)
lesscJ_in_ga(s(X1)) → U47_ga(X1, lesscJ_in_ga(X1))
U47_ga(X1, lesscJ_out_ga(X1)) → lesscJ_out_ga(s(X1))
The set Q consists of the following terms:
lesscJ_in_ga(x0)
U47_ga(x0, x1)
We have to consider all (P,Q,R)-chains.
(47) QDPSizeChangeProof (EQUIVALENT transformation)
By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.
From the DPs we obtained the following set of size-change graphs:
- PG_IN_GAAG(X1, X4) → U13_GAAG(X1, X4, lesscJ_in_ga(X1))
The graph contains the following edges 1 >= 1, 2 >= 2
- U13_GAAG(X1, X4, lesscJ_out_ga(X1)) → DELETEE_IN_AAG(X4)
The graph contains the following edges 2 >= 1
- DELETEE_IN_AAG(tree(X2, X3, X5)) → PG_IN_GAAG(X2, X5)
The graph contains the following edges 1 > 1, 1 > 2
- DELETEE_IN_AAG(tree(0, X2, X4)) → DELETEE_IN_AAG(X4)
The graph contains the following edges 1 > 1
- U22_GAAG(X1, X4, lesscJ_out_ga(X1)) → DELETEE_IN_AAG(X4)
The graph contains the following edges 2 >= 1
- DELETEE_IN_AAG(tree(s(X2), X3, X5)) → PI_IN_GAAG(X2, X5)
The graph contains the following edges 1 > 1, 1 > 2
- PI_IN_GAAG(X1, X4) → U22_GAAG(X1, X4, lesscJ_in_ga(X1))
The graph contains the following edges 1 >= 1, 2 >= 2
(48) YES