by T2Cert
0 | 0 | 1: | 3 − i_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
0 | 1 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ −2 + i_0 ≤ 0 ∧ −1 − i_0 + i_post ≤ 0 ∧ 1 + i_0 − i_post ≤ 0 ∧ i_0 − i_post ≤ 0 ∧ − i_0 + i_post ≤ 0 | |
3 | 2 | 0: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
3 | 3 | 0: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
3 | 4 | 1: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
2 | 5 | 3: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
4 | 6 | 5: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
1 | 7 | 6: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
6 | 8 | 4: | −1 + i_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
6 | 9 | 4: | 2 − i_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
7 | 10 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ i_post ≤ 0 ∧ − i_post ≤ 0 ∧ i_0 − i_post ≤ 0 ∧ − i_0 + i_post ≤ 0 | |
8 | 11 | 7: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 |
2 | 12 | : | − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 |
We remove transitions
, , , , , , , using the following ranking functions, which are bounded by −19.8: | 0 |
7: | 0 |
0: | 0 |
2: | 0 |
3: | 0 |
1: | 0 |
6: | 0 |
4: | 0 |
5: | 0 |
: | −8 |
: | −9 |
: | −10 |
: | −10 |
: | −10 |
: | −10 |
: | −10 |
: | −11 |
: | −12 |
: | −13 |
: | −14 |
13 | lexWeak[ [0, 0, 0, 0] ] |
lexWeak[ [0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0] , [0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0] , [0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0] , [0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] |
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
15 : − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
13 : − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0
We consider subproblems for each of the 1 SCC(s) of the program graph.
Here we consider the SCC {
, , , , }.We remove transition
using the following ranking functions, which are bounded by −13.: | −2 − 5⋅i_0 |
: | 1 − 5⋅i_0 |
: | −1 − 5⋅i_0 |
: | −5⋅i_0 |
: | 2 − 5⋅i_0 |
13 | lexWeak[ [0, 0, 0, 5] ] |
15 | lexWeak[ [0, 0, 0, 5] ] |
lexStrict[ [0, 0, 0, 0, 5, 0, 5] , [0, 0, 5, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 5] ] | |
lexWeak[ [0, 0, 0, 0, 0, 5] ] | |
lexWeak[ [0, 0, 0, 0, 0, 5] ] |
We remove transitions 13, 15, , using the following ranking functions, which are bounded by −2.
: | −2 |
: | 1 |
: | −1 |
: | 0 |
: | 2 |
13 | lexStrict[ [0, 0, 0, 0] , [0, 0, 0, 0] ] |
15 | lexStrict[ [0, 0, 0, 0] , [0, 0, 0, 0] ] |
lexWeak[ [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] |
We remove transition
using the following ranking functions, which are bounded by 0.: | 0 |
: | 0 |
: | 1 |
: | 0 |
: | 0 |
lexStrict[ [0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0] ] |
We consider 1 subproblems corresponding to sets of cut-point transitions as follows.
There remain no cut-point transition to consider. Hence the cooperation termination is trivial.
T2Cert