(0) Obligation:

Clauses:

fl([], [], 0).
fl(.(E, X), R, s(Z)) :- ','(append(E, Y, R), fl(X, Y, Z)).
append([], X, X).
append(.(X, Xs), Ys, .(X, Zs)) :- append(Xs, Ys, Zs).

Query: fl(g,a,g)

(1) PrologToPiTRSViaGraphTransformerProof (SOUND transformation)

Transformed Prolog program to (Pi-)TRS.

(2) Obligation:

Pi-finite rewrite system:
The TRS R consists of the following rules:

flA_in_gag([], [], 0) → flA_out_gag([], [], 0)
flA_in_gag(.(T8, T9), T12, s(T11)) → U1_gag(T8, T9, T12, T11, pB_in_gaagg(T8, X13, T12, T9, T11))
pB_in_gaagg([], T18, T18, T9, T11) → U2_gaagg(T18, T9, T11, flA_in_gag(T9, T18, T11))
U2_gaagg(T18, T9, T11, flA_out_gag(T9, T18, T11)) → pB_out_gaagg([], T18, T18, T9, T11)
pB_in_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11) → U3_gaagg(T25, T26, X38, T28, T9, T11, pB_in_gaagg(T26, X38, T28, T9, T11))
U3_gaagg(T25, T26, X38, T28, T9, T11, pB_out_gaagg(T26, X38, T28, T9, T11)) → pB_out_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11)
U1_gag(T8, T9, T12, T11, pB_out_gaagg(T8, X13, T12, T9, T11)) → flA_out_gag(.(T8, T9), T12, s(T11))

The argument filtering Pi contains the following mapping:
flA_in_gag(x1, x2, x3)  =  flA_in_gag(x1, x3)
[]  =  []
0  =  0
flA_out_gag(x1, x2, x3)  =  flA_out_gag(x1, x2, x3)
.(x1, x2)  =  .(x1, x2)
s(x1)  =  s(x1)
U1_gag(x1, x2, x3, x4, x5)  =  U1_gag(x1, x2, x4, x5)
pB_in_gaagg(x1, x2, x3, x4, x5)  =  pB_in_gaagg(x1, x4, x5)
U2_gaagg(x1, x2, x3, x4)  =  U2_gaagg(x2, x3, x4)
pB_out_gaagg(x1, x2, x3, x4, x5)  =  pB_out_gaagg(x1, x2, x3, x4, x5)
U3_gaagg(x1, x2, x3, x4, x5, x6, x7)  =  U3_gaagg(x1, x2, x5, x6, x7)

(3) DependencyPairsProof (EQUIVALENT transformation)

Using Dependency Pairs [AG00,LOPSTR] we result in the following initial DP problem:
Pi DP problem:
The TRS P consists of the following rules:

FLA_IN_GAG(.(T8, T9), T12, s(T11)) → U1_GAG(T8, T9, T12, T11, pB_in_gaagg(T8, X13, T12, T9, T11))
FLA_IN_GAG(.(T8, T9), T12, s(T11)) → PB_IN_GAAGG(T8, X13, T12, T9, T11)
PB_IN_GAAGG([], T18, T18, T9, T11) → U2_GAAGG(T18, T9, T11, flA_in_gag(T9, T18, T11))
PB_IN_GAAGG([], T18, T18, T9, T11) → FLA_IN_GAG(T9, T18, T11)
PB_IN_GAAGG(.(T25, T26), X38, .(T25, T28), T9, T11) → U3_GAAGG(T25, T26, X38, T28, T9, T11, pB_in_gaagg(T26, X38, T28, T9, T11))
PB_IN_GAAGG(.(T25, T26), X38, .(T25, T28), T9, T11) → PB_IN_GAAGG(T26, X38, T28, T9, T11)

The TRS R consists of the following rules:

flA_in_gag([], [], 0) → flA_out_gag([], [], 0)
flA_in_gag(.(T8, T9), T12, s(T11)) → U1_gag(T8, T9, T12, T11, pB_in_gaagg(T8, X13, T12, T9, T11))
pB_in_gaagg([], T18, T18, T9, T11) → U2_gaagg(T18, T9, T11, flA_in_gag(T9, T18, T11))
U2_gaagg(T18, T9, T11, flA_out_gag(T9, T18, T11)) → pB_out_gaagg([], T18, T18, T9, T11)
pB_in_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11) → U3_gaagg(T25, T26, X38, T28, T9, T11, pB_in_gaagg(T26, X38, T28, T9, T11))
U3_gaagg(T25, T26, X38, T28, T9, T11, pB_out_gaagg(T26, X38, T28, T9, T11)) → pB_out_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11)
U1_gag(T8, T9, T12, T11, pB_out_gaagg(T8, X13, T12, T9, T11)) → flA_out_gag(.(T8, T9), T12, s(T11))

The argument filtering Pi contains the following mapping:
flA_in_gag(x1, x2, x3)  =  flA_in_gag(x1, x3)
[]  =  []
0  =  0
flA_out_gag(x1, x2, x3)  =  flA_out_gag(x1, x2, x3)
.(x1, x2)  =  .(x1, x2)
s(x1)  =  s(x1)
U1_gag(x1, x2, x3, x4, x5)  =  U1_gag(x1, x2, x4, x5)
pB_in_gaagg(x1, x2, x3, x4, x5)  =  pB_in_gaagg(x1, x4, x5)
U2_gaagg(x1, x2, x3, x4)  =  U2_gaagg(x2, x3, x4)
pB_out_gaagg(x1, x2, x3, x4, x5)  =  pB_out_gaagg(x1, x2, x3, x4, x5)
U3_gaagg(x1, x2, x3, x4, x5, x6, x7)  =  U3_gaagg(x1, x2, x5, x6, x7)
FLA_IN_GAG(x1, x2, x3)  =  FLA_IN_GAG(x1, x3)
U1_GAG(x1, x2, x3, x4, x5)  =  U1_GAG(x1, x2, x4, x5)
PB_IN_GAAGG(x1, x2, x3, x4, x5)  =  PB_IN_GAAGG(x1, x4, x5)
U2_GAAGG(x1, x2, x3, x4)  =  U2_GAAGG(x2, x3, x4)
U3_GAAGG(x1, x2, x3, x4, x5, x6, x7)  =  U3_GAAGG(x1, x2, x5, x6, x7)

We have to consider all (P,R,Pi)-chains

(4) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

FLA_IN_GAG(.(T8, T9), T12, s(T11)) → U1_GAG(T8, T9, T12, T11, pB_in_gaagg(T8, X13, T12, T9, T11))
FLA_IN_GAG(.(T8, T9), T12, s(T11)) → PB_IN_GAAGG(T8, X13, T12, T9, T11)
PB_IN_GAAGG([], T18, T18, T9, T11) → U2_GAAGG(T18, T9, T11, flA_in_gag(T9, T18, T11))
PB_IN_GAAGG([], T18, T18, T9, T11) → FLA_IN_GAG(T9, T18, T11)
PB_IN_GAAGG(.(T25, T26), X38, .(T25, T28), T9, T11) → U3_GAAGG(T25, T26, X38, T28, T9, T11, pB_in_gaagg(T26, X38, T28, T9, T11))
PB_IN_GAAGG(.(T25, T26), X38, .(T25, T28), T9, T11) → PB_IN_GAAGG(T26, X38, T28, T9, T11)

The TRS R consists of the following rules:

flA_in_gag([], [], 0) → flA_out_gag([], [], 0)
flA_in_gag(.(T8, T9), T12, s(T11)) → U1_gag(T8, T9, T12, T11, pB_in_gaagg(T8, X13, T12, T9, T11))
pB_in_gaagg([], T18, T18, T9, T11) → U2_gaagg(T18, T9, T11, flA_in_gag(T9, T18, T11))
U2_gaagg(T18, T9, T11, flA_out_gag(T9, T18, T11)) → pB_out_gaagg([], T18, T18, T9, T11)
pB_in_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11) → U3_gaagg(T25, T26, X38, T28, T9, T11, pB_in_gaagg(T26, X38, T28, T9, T11))
U3_gaagg(T25, T26, X38, T28, T9, T11, pB_out_gaagg(T26, X38, T28, T9, T11)) → pB_out_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11)
U1_gag(T8, T9, T12, T11, pB_out_gaagg(T8, X13, T12, T9, T11)) → flA_out_gag(.(T8, T9), T12, s(T11))

The argument filtering Pi contains the following mapping:
flA_in_gag(x1, x2, x3)  =  flA_in_gag(x1, x3)
[]  =  []
0  =  0
flA_out_gag(x1, x2, x3)  =  flA_out_gag(x1, x2, x3)
.(x1, x2)  =  .(x1, x2)
s(x1)  =  s(x1)
U1_gag(x1, x2, x3, x4, x5)  =  U1_gag(x1, x2, x4, x5)
pB_in_gaagg(x1, x2, x3, x4, x5)  =  pB_in_gaagg(x1, x4, x5)
U2_gaagg(x1, x2, x3, x4)  =  U2_gaagg(x2, x3, x4)
pB_out_gaagg(x1, x2, x3, x4, x5)  =  pB_out_gaagg(x1, x2, x3, x4, x5)
U3_gaagg(x1, x2, x3, x4, x5, x6, x7)  =  U3_gaagg(x1, x2, x5, x6, x7)
FLA_IN_GAG(x1, x2, x3)  =  FLA_IN_GAG(x1, x3)
U1_GAG(x1, x2, x3, x4, x5)  =  U1_GAG(x1, x2, x4, x5)
PB_IN_GAAGG(x1, x2, x3, x4, x5)  =  PB_IN_GAAGG(x1, x4, x5)
U2_GAAGG(x1, x2, x3, x4)  =  U2_GAAGG(x2, x3, x4)
U3_GAAGG(x1, x2, x3, x4, x5, x6, x7)  =  U3_GAAGG(x1, x2, x5, x6, x7)

We have to consider all (P,R,Pi)-chains

(5) DependencyGraphProof (EQUIVALENT transformation)

The approximation of the Dependency Graph [LOPSTR] contains 1 SCC with 3 less nodes.

(6) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

FLA_IN_GAG(.(T8, T9), T12, s(T11)) → PB_IN_GAAGG(T8, X13, T12, T9, T11)
PB_IN_GAAGG([], T18, T18, T9, T11) → FLA_IN_GAG(T9, T18, T11)
PB_IN_GAAGG(.(T25, T26), X38, .(T25, T28), T9, T11) → PB_IN_GAAGG(T26, X38, T28, T9, T11)

The TRS R consists of the following rules:

flA_in_gag([], [], 0) → flA_out_gag([], [], 0)
flA_in_gag(.(T8, T9), T12, s(T11)) → U1_gag(T8, T9, T12, T11, pB_in_gaagg(T8, X13, T12, T9, T11))
pB_in_gaagg([], T18, T18, T9, T11) → U2_gaagg(T18, T9, T11, flA_in_gag(T9, T18, T11))
U2_gaagg(T18, T9, T11, flA_out_gag(T9, T18, T11)) → pB_out_gaagg([], T18, T18, T9, T11)
pB_in_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11) → U3_gaagg(T25, T26, X38, T28, T9, T11, pB_in_gaagg(T26, X38, T28, T9, T11))
U3_gaagg(T25, T26, X38, T28, T9, T11, pB_out_gaagg(T26, X38, T28, T9, T11)) → pB_out_gaagg(.(T25, T26), X38, .(T25, T28), T9, T11)
U1_gag(T8, T9, T12, T11, pB_out_gaagg(T8, X13, T12, T9, T11)) → flA_out_gag(.(T8, T9), T12, s(T11))

The argument filtering Pi contains the following mapping:
flA_in_gag(x1, x2, x3)  =  flA_in_gag(x1, x3)
[]  =  []
0  =  0
flA_out_gag(x1, x2, x3)  =  flA_out_gag(x1, x2, x3)
.(x1, x2)  =  .(x1, x2)
s(x1)  =  s(x1)
U1_gag(x1, x2, x3, x4, x5)  =  U1_gag(x1, x2, x4, x5)
pB_in_gaagg(x1, x2, x3, x4, x5)  =  pB_in_gaagg(x1, x4, x5)
U2_gaagg(x1, x2, x3, x4)  =  U2_gaagg(x2, x3, x4)
pB_out_gaagg(x1, x2, x3, x4, x5)  =  pB_out_gaagg(x1, x2, x3, x4, x5)
U3_gaagg(x1, x2, x3, x4, x5, x6, x7)  =  U3_gaagg(x1, x2, x5, x6, x7)
FLA_IN_GAG(x1, x2, x3)  =  FLA_IN_GAG(x1, x3)
PB_IN_GAAGG(x1, x2, x3, x4, x5)  =  PB_IN_GAAGG(x1, x4, x5)

We have to consider all (P,R,Pi)-chains

(7) UsableRulesProof (EQUIVALENT transformation)

For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.

(8) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

FLA_IN_GAG(.(T8, T9), T12, s(T11)) → PB_IN_GAAGG(T8, X13, T12, T9, T11)
PB_IN_GAAGG([], T18, T18, T9, T11) → FLA_IN_GAG(T9, T18, T11)
PB_IN_GAAGG(.(T25, T26), X38, .(T25, T28), T9, T11) → PB_IN_GAAGG(T26, X38, T28, T9, T11)

R is empty.
The argument filtering Pi contains the following mapping:
[]  =  []
.(x1, x2)  =  .(x1, x2)
s(x1)  =  s(x1)
FLA_IN_GAG(x1, x2, x3)  =  FLA_IN_GAG(x1, x3)
PB_IN_GAAGG(x1, x2, x3, x4, x5)  =  PB_IN_GAAGG(x1, x4, x5)

We have to consider all (P,R,Pi)-chains

(9) PiDPToQDPProof (SOUND transformation)

Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.

(10) Obligation:

Q DP problem:
The TRS P consists of the following rules:

FLA_IN_GAG(.(T8, T9), s(T11)) → PB_IN_GAAGG(T8, T9, T11)
PB_IN_GAAGG([], T9, T11) → FLA_IN_GAG(T9, T11)
PB_IN_GAAGG(.(T25, T26), T9, T11) → PB_IN_GAAGG(T26, T9, T11)

R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.

(11) QDPSizeChangeProof (EQUIVALENT transformation)

By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.

From the DPs we obtained the following set of size-change graphs:

  • PB_IN_GAAGG([], T9, T11) → FLA_IN_GAG(T9, T11)
    The graph contains the following edges 2 >= 1, 3 >= 2

  • PB_IN_GAAGG(.(T25, T26), T9, T11) → PB_IN_GAAGG(T26, T9, T11)
    The graph contains the following edges 1 > 1, 2 >= 2, 3 >= 3

  • FLA_IN_GAG(.(T8, T9), s(T11)) → PB_IN_GAAGG(T8, T9, T11)
    The graph contains the following edges 1 > 1, 1 > 2, 2 > 3

(12) YES