by T2Cert
0 | 0 | 1: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ i_0 − j_0 ≤ 0 ∧ −1 − i_0 + i_post ≤ 0 ∧ 1 + i_0 − i_post ≤ 0 ∧ i_0 − i_post ≤ 0 ∧ − i_0 + i_post ≤ 0 ∧ − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 | |
0 | 1 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 1 − i_0 + j_0 ≤ 0 ∧ −1 − j_0 + j_post ≤ 0 ∧ 1 + j_0 − j_post ≤ 0 ∧ j_0 − j_post ≤ 0 ∧ − j_0 + j_post ≤ 0 ∧ − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
2 | 2 | 0: | − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
1 | 3 | 0: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 1 + i_0 − n_0 ≤ 0 ∧ j_post ≤ 0 ∧ − j_post ≤ 0 ∧ j_0 − j_post ≤ 0 ∧ − j_0 + j_post ≤ 0 ∧ − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 | |
3 | 4 | 1: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ i_post ≤ 0 ∧ − i_post ≤ 0 ∧ i_0 − i_post ≤ 0 ∧ − i_0 + i_post ≤ 0 ∧ − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 | |
4 | 5 | 3: | − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 |
0 | 6 | : | − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 |
1 | 13 | : | − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0 |
We remove transitions
, using the following ranking functions, which are bounded by −13.4: | 0 |
3: | 0 |
0: | 0 |
1: | 0 |
2: | 0 |
: | −4 |
: | −5 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
: | −6 |
7 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
14 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
9 : − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
7 : − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
16 : − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
14 : − n_0 + n_0 ≤ 0 ∧ n_0 − n_0 ≤ 0 ∧ − j_post + j_post ≤ 0 ∧ j_post − j_post ≤ 0 ∧ − j_0 + j_0 ≤ 0 ∧ j_0 − j_0 ≤ 0 ∧ − i_post + i_post ≤ 0 ∧ i_post − i_post ≤ 0 ∧ − i_0 + i_0 ≤ 0 ∧ i_0 − i_0 ≤ 0
We consider subproblems for each of the 1 SCC(s) of the program graph.
Here we consider the SCC {
, , , , , , }.We remove transition
using the following ranking functions, which are bounded by 6.: | −4 − 7⋅i_0 + 7⋅n_0 |
: | −4 − 7⋅i_0 + 7⋅n_0 |
: | −7⋅i_0 + 7⋅n_0 |
: | −4 − 7⋅i_0 + 7⋅n_0 |
: | −4 − 7⋅i_0 + 7⋅n_0 |
: | −7⋅i_0 + 7⋅n_0 |
: | 1 − 7⋅i_0 + 7⋅n_0 |
7 | lexWeak[ [7, 0, 0, 0, 0, 0, 0, 0, 0, 7] ] |
9 | lexWeak[ [7, 0, 0, 0, 0, 0, 0, 0, 0, 7] ] |
14 | lexWeak[ [7, 0, 0, 0, 0, 0, 0, 0, 0, 7] ] |
16 | lexWeak[ [7, 0, 0, 0, 0, 0, 0, 0, 0, 7] ] |
lexWeak[ [0, 0, 0, 0, 7, 0, 7, 7, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 7, 0, 0, 0, 0, 7] ] | |
lexWeak[ [7, 0, 0, 0, 0, 0, 0, 0, 0, 7] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 7, 0, 0, 0, 0, 7] , [0, 0, 7, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We remove transition
using the following ranking functions, which are bounded by 1.: | −1 + 3⋅i_0 − 3⋅j_0 |
: | 1 + 3⋅i_0 − 3⋅j_0 |
: | −6 + i_0 + 2⋅i_post − 3⋅j_0 |
: | −1 + 3⋅i_0 − 3⋅j_0 |
: | 3⋅i_0 − 3⋅j_0 |
: | −7 + i_0 + 2⋅i_post − 3⋅j_0 |
: | −5 + i_0 + 2⋅i_post − 3⋅j_0 |
7 | lexWeak[ [0, 0, 0, 0, 0, 3, 0, 0, 3, 0] ] |
9 | lexWeak[ [0, 0, 0, 0, 0, 3, 0, 0, 3, 0] ] |
14 | lexWeak[ [0, 0, 0, 0, 0, 3, 2, 0, 1, 0] ] |
16 | lexWeak[ [0, 0, 0, 0, 0, 3, 2, 0, 1, 0] ] |
lexWeak[ [0, 0, 0, 3, 0, 1, 0, 0, 0, 0, 0, 0, 3] ] | |
lexStrict[ [0, 0, 0, 0, 3, 0, 3, 0, 0, 0, 0, 3, 0] , [0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 3, 0, 0, 3, 0] ] |
We remove transitions 9, 14, 16, , using the following ranking functions, which are bounded by −6.
: | −2 |
: | 0 |
: | −5 |
: | −3 |
: | −1 |
: | −6 |
: | −4 |
7 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
9 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
14 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
16 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We remove transition 7 using the following ranking functions, which are bounded by −1.
: | 0 |
: | 0 |
: | 0 |
: | −1 |
: | 0 |
: | 0 |
: | 0 |
7 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We consider 2 subproblems corresponding to sets of cut-point transitions as follows.
There remain no cut-point transition to consider. Hence the cooperation termination is trivial.
There remain no cut-point transition to consider. Hence the cooperation termination is trivial.
T2Cert