(0) Obligation:
Clauses:
thief(john).
thief(X) :- ','(thief(X), !).
Queries:
thief(g).
(1) CutEliminatorProof (SOUND transformation)
Eliminated all cuts by simply ignoring them[PROLOG].
(2) Obligation:
Clauses:
thief(john).
thief(X) :- thief(X).
Queries:
thief(g).
(3) PrologToPiTRSProof (SOUND transformation)
We use the technique of [LOPSTR]. With regard to the inferred argument filtering the predicates were used in the following modes:
thief_in: (b)
Transforming
Prolog into the following
Term Rewriting System:
Pi-finite rewrite system:
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
The argument filtering Pi contains the following mapping:
thief_in_g(
x1) =
thief_in_g(
x1)
john =
john
thief_out_g(
x1) =
thief_out_g
U1_g(
x1,
x2) =
U1_g(
x2)
Infinitary Constructor Rewriting Termination of PiTRS implies Termination of Prolog
(4) Obligation:
Pi-finite rewrite system:
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
The argument filtering Pi contains the following mapping:
thief_in_g(
x1) =
thief_in_g(
x1)
john =
john
thief_out_g(
x1) =
thief_out_g
U1_g(
x1,
x2) =
U1_g(
x2)
(5) DependencyPairsProof (EQUIVALENT transformation)
Using Dependency Pairs [AG00,LOPSTR] we result in the following initial DP problem:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → U1_G(X, thief_in_g(X))
THIEF_IN_G(X) → THIEF_IN_G(X)
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
The argument filtering Pi contains the following mapping:
thief_in_g(
x1) =
thief_in_g(
x1)
john =
john
thief_out_g(
x1) =
thief_out_g
U1_g(
x1,
x2) =
U1_g(
x2)
THIEF_IN_G(
x1) =
THIEF_IN_G(
x1)
U1_G(
x1,
x2) =
U1_G(
x2)
We have to consider all (P,R,Pi)-chains
(6) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → U1_G(X, thief_in_g(X))
THIEF_IN_G(X) → THIEF_IN_G(X)
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
The argument filtering Pi contains the following mapping:
thief_in_g(
x1) =
thief_in_g(
x1)
john =
john
thief_out_g(
x1) =
thief_out_g
U1_g(
x1,
x2) =
U1_g(
x2)
THIEF_IN_G(
x1) =
THIEF_IN_G(
x1)
U1_G(
x1,
x2) =
U1_G(
x2)
We have to consider all (P,R,Pi)-chains
(7) DependencyGraphProof (EQUIVALENT transformation)
The approximation of the Dependency Graph [LOPSTR] contains 1 SCC with 1 less node.
(8) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → THIEF_IN_G(X)
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
The argument filtering Pi contains the following mapping:
thief_in_g(
x1) =
thief_in_g(
x1)
john =
john
thief_out_g(
x1) =
thief_out_g
U1_g(
x1,
x2) =
U1_g(
x2)
THIEF_IN_G(
x1) =
THIEF_IN_G(
x1)
We have to consider all (P,R,Pi)-chains
(9) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(10) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → THIEF_IN_G(X)
R is empty.
Pi is empty.
We have to consider all (P,R,Pi)-chains
(11) PiDPToQDPProof (EQUIVALENT transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(12) Obligation:
Q DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → THIEF_IN_G(X)
R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.
(13) NonTerminationProof (EQUIVALENT transformation)
We used the non-termination processor [FROCOS05] to show that the DP problem is infinite.
Found a loop by semiunifying a rule from P directly.
s =
THIEF_IN_G(
X) evaluates to t =
THIEF_IN_G(
X)
Thus s starts an infinite chain as s semiunifies with t with the following substitutions:
- Semiunifier: [ ]
- Matcher: [ ]
Rewriting sequenceThe DP semiunifies directly so there is only one rewrite step from THIEF_IN_G(X) to THIEF_IN_G(X).
(14) FALSE
(15) PrologToPiTRSProof (SOUND transformation)
We use the technique of [LOPSTR]. With regard to the inferred argument filtering the predicates were used in the following modes:
thief_in: (b)
Transforming
Prolog into the following
Term Rewriting System:
Pi-finite rewrite system:
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
Pi is empty.
Infinitary Constructor Rewriting Termination of PiTRS implies Termination of Prolog
(16) Obligation:
Pi-finite rewrite system:
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
Pi is empty.
(17) DependencyPairsProof (EQUIVALENT transformation)
Using Dependency Pairs [AG00,LOPSTR] we result in the following initial DP problem:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → U1_G(X, thief_in_g(X))
THIEF_IN_G(X) → THIEF_IN_G(X)
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
Pi is empty.
We have to consider all (P,R,Pi)-chains
(18) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → U1_G(X, thief_in_g(X))
THIEF_IN_G(X) → THIEF_IN_G(X)
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
Pi is empty.
We have to consider all (P,R,Pi)-chains
(19) DependencyGraphProof (EQUIVALENT transformation)
The approximation of the Dependency Graph [LOPSTR] contains 1 SCC with 1 less node.
(20) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → THIEF_IN_G(X)
The TRS R consists of the following rules:
thief_in_g(john) → thief_out_g(john)
thief_in_g(X) → U1_g(X, thief_in_g(X))
U1_g(X, thief_out_g(X)) → thief_out_g(X)
Pi is empty.
We have to consider all (P,R,Pi)-chains
(21) UsableRulesProof (EQUIVALENT transformation)
For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.
(22) Obligation:
Pi DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → THIEF_IN_G(X)
R is empty.
Pi is empty.
We have to consider all (P,R,Pi)-chains
(23) PiDPToQDPProof (EQUIVALENT transformation)
Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.
(24) Obligation:
Q DP problem:
The TRS P consists of the following rules:
THIEF_IN_G(X) → THIEF_IN_G(X)
R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.
(25) NonTerminationProof (EQUIVALENT transformation)
We used the non-termination processor [FROCOS05] to show that the DP problem is infinite.
Found a loop by semiunifying a rule from P directly.
s =
THIEF_IN_G(
X) evaluates to t =
THIEF_IN_G(
X)
Thus s starts an infinite chain as s semiunifies with t with the following substitutions:
- Matcher: [ ]
- Semiunifier: [ ]
Rewriting sequenceThe DP semiunifies directly so there is only one rewrite step from THIEF_IN_G(X) to THIEF_IN_G(X).
(26) FALSE