by T2Cert
0 | 0 | 1: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ − x_5_0 + y_6_0 ≤ 0 ∧ Result_4_0 − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_post ≤ 0 ∧ − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 | |
0 | 1 | 2: | 0 ≤ 0 ∧ 0 ≤ 0 ∧ 1 + x_5_0 − y_6_0 ≤ 0 ∧ −1 − x_5_0 + x_5_post ≤ 0 ∧ 1 + x_5_0 − x_5_post ≤ 0 ∧ x_5_0 − x_5_post ≤ 0 ∧ − x_5_0 + x_5_post ≤ 0 ∧ − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0 | |
2 | 2 | 0: | − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0 | |
3 | 3 | 0: | − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0 | |
4 | 4 | 3: | − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0 |
0 | 5 | : | − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0 |
We remove transitions
, , using the following ranking functions, which are bounded by −13.4: | 0 |
3: | 0 |
0: | 0 |
2: | 0 |
1: | 0 |
: | −5 |
: | −6 |
: | −7 |
: | −7 |
: | −7 |
: | −7 |
: | −11 |
6 | lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
8 : − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0
The following skip-transition is inserted and corresponding redirections w.r.t. the old location are performed.
6 : − y_6_0 + y_6_0 ≤ 0 ∧ y_6_0 − y_6_0 ≤ 0 ∧ − x_5_post + x_5_post ≤ 0 ∧ x_5_post − x_5_post ≤ 0 ∧ − x_5_0 + x_5_0 ≤ 0 ∧ x_5_0 − x_5_0 ≤ 0 ∧ − Result_4_post + Result_4_post ≤ 0 ∧ Result_4_post − Result_4_post ≤ 0 ∧ − Result_4_0 + Result_4_0 ≤ 0 ∧ Result_4_0 − Result_4_0 ≤ 0
We consider subproblems for each of the 1 SCC(s) of the program graph.
Here we consider the SCC {
, , , }.We remove transition
using the following ranking functions, which are bounded by 1.: | −1 − 4⋅x_5_0 + 4⋅y_6_0 |
: | 1 − 4⋅x_5_0 + 4⋅y_6_0 |
: | −2 − 4⋅x_5_0 + 4⋅y_6_0 |
: | −4⋅x_5_0 + 4⋅y_6_0 |
6 | lexWeak[ [4, 0, 0, 0, 0, 4, 0, 0, 0, 0] ] |
8 | lexWeak[ [4, 0, 0, 0, 0, 4, 0, 0, 0, 0] ] |
lexStrict[ [0, 0, 0, 0, 4, 0, 4, 4, 0, 0, 0, 0, 0] , [0, 0, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] | |
lexWeak[ [4, 0, 0, 0, 0, 4, 0, 0, 0, 0] ] |
We remove transitions 6, 8, using the following ranking functions, which are bounded by −1.
: | 0 |
: | 2 |
: | −1 |
: | 1 |
6 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
8 | lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
lexStrict[ [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] , [0, 0, 0, 0, 0, 0, 0, 0, 0, 0] ] |
We consider 1 subproblems corresponding to sets of cut-point transitions as follows.
There remain no cut-point transition to consider. Hence the cooperation termination is trivial.
T2Cert