by T2Cert
0 | 0 | 1: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 1 − arg1P ≤ 0 ∧ −1 + arg1P ≤ 0 ∧ − arg1P + arg1 ≤ 0 ∧ arg1P − arg1 ≤ 0 ∧ − arg2P + arg2 ≤ 0 ∧ arg2P − arg2 ≤ 0 ∧ − arg3P + arg3 ≤ 0 ∧ arg3P − arg3 ≤ 0 ∧ − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 | |
1 | 1 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 1 − arg1 ≤ 0 ∧ −99 + arg1 ≤ 0 ∧ − arg2P ≤ 0 ∧ arg2P ≤ 0 ∧ 100 − arg1 − arg3P ≤ 0 ∧ −100 + arg1 + arg3P ≤ 0 ∧ − arg2P + arg2 ≤ 0 ∧ arg2P − arg2 ≤ 0 ∧ − arg3P + arg3 ≤ 0 ∧ arg3P − arg3 ≤ 0 ∧ − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0 | |
2 | 2 | 1: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ − arg2 + arg3 ≤ 0 ∧ 1 − arg1P + arg1 ≤ 0 ∧ −1 + arg1P − arg1 ≤ 0 ∧ − arg1P + arg1 ≤ 0 ∧ arg1P − arg1 ≤ 0 ∧ − arg2P + arg2 ≤ 0 ∧ arg2P − arg2 ≤ 0 ∧ − arg3P + arg3 ≤ 0 ∧ arg3P − arg3 ≤ 0 ∧ − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 | |
2 | 3 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ −99 + arg2 ≤ 0 ∧ 1 + arg2 − arg3 ≤ 0 ∧ − arg2 ≤ 0 ∧ −98 + arg2 ≤ 0 ∧ − x7 + x8 ≤ 0 ∧ 1 − arg1 ≤ 0 ∧ 1 − arg2P + arg2 ≤ 0 ∧ −1 + arg2P − arg2 ≤ 0 ∧ 100 − arg1 − arg3P ≤ 0 ∧ −100 + arg1 + arg3P ≤ 0 ∧ − arg2P + arg2 ≤ 0 ∧ arg2P − arg2 ≤ 0 ∧ − arg3P + arg3 ≤ 0 ∧ arg3P − arg3 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0 | |
2 | 4 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ −99 + arg2 ≤ 0 ∧ 1 + arg2 − arg3 ≤ 0 ∧ − arg2 ≤ 0 ∧ −98 + arg2 ≤ 0 ∧ 1 − arg1 ≤ 0 ∧ 1 + x12 − x13 ≤ 0 ∧ 1 − arg2P + arg2 ≤ 0 ∧ −1 + arg2P − arg2 ≤ 0 ∧ 100 − arg1 − arg3P ≤ 0 ∧ −100 + arg1 + arg3P ≤ 0 ∧ − arg2P + arg2 ≤ 0 ∧ arg2P − arg2 ≤ 0 ∧ − arg3P + arg3 ≤ 0 ∧ arg3P − arg3 ≤ 0 ∧ − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0 | |
3 | 5 | 0: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ 0 ≤ 0 ∧ − arg1P + arg1 ≤ 0 ∧ arg1P − arg1 ≤ 0 ∧ − arg2P + arg2 ≤ 0 ∧ arg2P − arg2 ≤ 0 ∧ − arg3P + arg3 ≤ 0 ∧ arg3P − arg3 ≤ 0 ∧ − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 |
The following invariants are asserted.
0: | TRUE |
1: | TRUE |
2: | −99 + arg3P ≤ 0 ∧ 1 − arg1 ≤ 0 ∧ −99 + arg3 ≤ 0 |
3: | TRUE |
The invariants are proved as follows.
0 | (0) | TRUE | ||
1 | (1) | TRUE | ||
2 | (2) | −99 + arg3P ≤ 0 ∧ 1 − arg1 ≤ 0 ∧ −99 + arg3 ≤ 0 | ||
3 | (3) | TRUE |
0 | 0 1 | |
1 | 1 2 | |
2 | 2 1 | |
2 | 3 2 | |
2 | 4 2 | |
3 | 5 0 |
1 | 6 | : | − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg3P + arg3P ≤ 0 ∧ arg3P − arg3P ≤ 0 ∧ − arg3 + arg3 ≤ 0 ∧ arg3 − arg3 ≤ 0 ∧ − arg2P + arg2P ≤ 0 ∧ arg2P − arg2P ≤ 0 ∧ − arg2 + arg2 ≤ 0 ∧ arg2 − arg2 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0 |
2 | 13 | : | − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg3P + arg3P ≤ 0 ∧ arg3P − arg3P ≤ 0 ∧ − arg3 + arg3 ≤ 0 ∧ arg3 − arg3 ≤ 0 ∧ − arg2P + arg2P ≤ 0 ∧ arg2P − arg2P ≤ 0 ∧ − arg2 + arg2 ≤ 0 ∧ arg2 − arg2 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0 |
We remove transitions
, using the following ranking functions, which are bounded by −13.3: | 0 |
0: | 0 |
1: | 0 |
2: | 0 |
: | −4 |
: | −5 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
7 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
14 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
9 : − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg3P + arg3P ≤ 0 ∧ arg3P − arg3P ≤ 0 ∧ − arg3 + arg3 ≤ 0 ∧ arg3 − arg3 ≤ 0 ∧ − arg2P + arg2P ≤ 0 ∧ arg2P − arg2P ≤ 0 ∧ − arg2 + arg2 ≤ 0 ∧ arg2 − arg2 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
7 : − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg3P + arg3P ≤ 0 ∧ arg3P − arg3P ≤ 0 ∧ − arg3 + arg3 ≤ 0 ∧ arg3 − arg3 ≤ 0 ∧ − arg2P + arg2P ≤ 0 ∧ arg2P − arg2P ≤ 0 ∧ − arg2 + arg2 ≤ 0 ∧ arg2 − arg2 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
16 : − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg3P + arg3P ≤ 0 ∧ arg3P − arg3P ≤ 0 ∧ − arg3 + arg3 ≤ 0 ∧ arg3 − arg3 ≤ 0 ∧ − arg2P + arg2P ≤ 0 ∧ arg2P − arg2P ≤ 0 ∧ − arg2 + arg2 ≤ 0 ∧ arg2 − arg2 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
14 : − x8 + x8 ≤ 0 ∧ x8 − x8 ≤ 0 ∧ − x7 + x7 ≤ 0 ∧ x7 − x7 ≤ 0 ∧ − x13 + x13 ≤ 0 ∧ x13 − x13 ≤ 0 ∧ − x12 + x12 ≤ 0 ∧ x12 − x12 ≤ 0 ∧ − arg3P + arg3P ≤ 0 ∧ arg3P − arg3P ≤ 0 ∧ − arg3 + arg3 ≤ 0 ∧ arg3 − arg3 ≤ 0 ∧ − arg2P + arg2P ≤ 0 ∧ arg2P − arg2P ≤ 0 ∧ − arg2 + arg2 ≤ 0 ∧ arg2 − arg2 ≤ 0 ∧ − arg1P + arg1P ≤ 0 ∧ arg1P − arg1P ≤ 0 ∧ − arg1 + arg1 ≤ 0 ∧ arg1 − arg1 ≤ 0
We consider subproblems for each of the 1 SCC(s) of the program graph.
Here we consider the SCC {
, , , , , }.We remove transition
using the following ranking functions, which are bounded by −396.: | 2 − 4⋅arg1 |
: | −4⋅arg1 |
: | 1 − 4⋅arg1 |
: | 3 − 4⋅arg1 |
: | −4⋅arg1 |
: | −4⋅arg1 |
7 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] ] |
9 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] ] |
14 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] ] |
16 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] ] |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] , [0, 0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4] ] |
We remove transitions 9, using the following ranking functions, which are bounded by −3.
: | −2 |
: | 0 |
: | −3 |
: | −1 |
: | 0 |
: | 0 |
7 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
9 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
14 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
16 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We remove transitions 7, , using the following ranking functions, which are bounded by −298.
: | 1 |
: | 1 − 3⋅arg2 |
: | 0 |
: | 0 |
: | −3⋅arg2 |
: | 2 − 3⋅arg2 |
7 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
14 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0] ] |
16 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0] ] |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We remove transition 14 using the following ranking functions, which are bounded by −1.
: | 0 |
: | 0 |
: | 0 |
: | 0 |
: | − arg1 |
: | 1 |
14 | lexStrict[ [0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
16 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We remove transition 16 using the following ranking functions, which are bounded by 0.
: | 0 |
: | 0 |
: | 0 |
: | 0 |
: | 0 |
: | arg1 |
16 | lexStrict[ [0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We consider 2 subproblems corresponding to sets of cut-point transitions as follows.
There remain no cut-point transition to consider. Hence the cooperation termination is trivial.
There remain no cut-point transition to consider. Hence the cooperation termination is trivial.
T2Cert