MAYBE We are left with following problem, upon which TcT provides the certificate MAYBE. Strict Trs: { a__2nd(X) -> 2nd(X) , a__2nd(cons(X, cons(Y, Z))) -> mark(Y) , mark(cons(X1, X2)) -> cons(mark(X1), X2) , mark(from(X)) -> a__from(mark(X)) , mark(s(X)) -> s(mark(X)) , mark(2nd(X)) -> a__2nd(mark(X)) , a__from(X) -> cons(mark(X), from(s(X))) , a__from(X) -> from(X) } Obligation: innermost runtime complexity Answer: MAYBE We add following dependency tuples: Strict DPs: { a__2nd^#(X) -> c_1() , a__2nd^#(cons(X, cons(Y, Z))) -> c_2(mark^#(Y)) , mark^#(cons(X1, X2)) -> c_3(mark^#(X1)) , mark^#(from(X)) -> c_4(a__from^#(mark(X)), mark^#(X)) , mark^#(s(X)) -> c_5(mark^#(X)) , mark^#(2nd(X)) -> c_6(a__2nd^#(mark(X)), mark^#(X)) , a__from^#(X) -> c_7(mark^#(X)) , a__from^#(X) -> c_8() } and mark the set of starting terms. We are left with following problem, upon which TcT provides the certificate MAYBE. Strict DPs: { a__2nd^#(X) -> c_1() , a__2nd^#(cons(X, cons(Y, Z))) -> c_2(mark^#(Y)) , mark^#(cons(X1, X2)) -> c_3(mark^#(X1)) , mark^#(from(X)) -> c_4(a__from^#(mark(X)), mark^#(X)) , mark^#(s(X)) -> c_5(mark^#(X)) , mark^#(2nd(X)) -> c_6(a__2nd^#(mark(X)), mark^#(X)) , a__from^#(X) -> c_7(mark^#(X)) , a__from^#(X) -> c_8() } Weak Trs: { a__2nd(X) -> 2nd(X) , a__2nd(cons(X, cons(Y, Z))) -> mark(Y) , mark(cons(X1, X2)) -> cons(mark(X1), X2) , mark(from(X)) -> a__from(mark(X)) , mark(s(X)) -> s(mark(X)) , mark(2nd(X)) -> a__2nd(mark(X)) , a__from(X) -> cons(mark(X), from(s(X))) , a__from(X) -> from(X) } Obligation: innermost runtime complexity Answer: MAYBE We estimate the number of application of {1,8} by applications of Pre({1,8}) = {4,6}. Here rules are labeled as follows: DPs: { 1: a__2nd^#(X) -> c_1() , 2: a__2nd^#(cons(X, cons(Y, Z))) -> c_2(mark^#(Y)) , 3: mark^#(cons(X1, X2)) -> c_3(mark^#(X1)) , 4: mark^#(from(X)) -> c_4(a__from^#(mark(X)), mark^#(X)) , 5: mark^#(s(X)) -> c_5(mark^#(X)) , 6: mark^#(2nd(X)) -> c_6(a__2nd^#(mark(X)), mark^#(X)) , 7: a__from^#(X) -> c_7(mark^#(X)) , 8: a__from^#(X) -> c_8() } We are left with following problem, upon which TcT provides the certificate MAYBE. Strict DPs: { a__2nd^#(cons(X, cons(Y, Z))) -> c_2(mark^#(Y)) , mark^#(cons(X1, X2)) -> c_3(mark^#(X1)) , mark^#(from(X)) -> c_4(a__from^#(mark(X)), mark^#(X)) , mark^#(s(X)) -> c_5(mark^#(X)) , mark^#(2nd(X)) -> c_6(a__2nd^#(mark(X)), mark^#(X)) , a__from^#(X) -> c_7(mark^#(X)) } Weak DPs: { a__2nd^#(X) -> c_1() , a__from^#(X) -> c_8() } Weak Trs: { a__2nd(X) -> 2nd(X) , a__2nd(cons(X, cons(Y, Z))) -> mark(Y) , mark(cons(X1, X2)) -> cons(mark(X1), X2) , mark(from(X)) -> a__from(mark(X)) , mark(s(X)) -> s(mark(X)) , mark(2nd(X)) -> a__2nd(mark(X)) , a__from(X) -> cons(mark(X), from(s(X))) , a__from(X) -> from(X) } Obligation: innermost runtime complexity Answer: MAYBE The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed. { a__2nd^#(X) -> c_1() , a__from^#(X) -> c_8() } We are left with following problem, upon which TcT provides the certificate MAYBE. Strict DPs: { a__2nd^#(cons(X, cons(Y, Z))) -> c_2(mark^#(Y)) , mark^#(cons(X1, X2)) -> c_3(mark^#(X1)) , mark^#(from(X)) -> c_4(a__from^#(mark(X)), mark^#(X)) , mark^#(s(X)) -> c_5(mark^#(X)) , mark^#(2nd(X)) -> c_6(a__2nd^#(mark(X)), mark^#(X)) , a__from^#(X) -> c_7(mark^#(X)) } Weak Trs: { a__2nd(X) -> 2nd(X) , a__2nd(cons(X, cons(Y, Z))) -> mark(Y) , mark(cons(X1, X2)) -> cons(mark(X1), X2) , mark(from(X)) -> a__from(mark(X)) , mark(s(X)) -> s(mark(X)) , mark(2nd(X)) -> a__2nd(mark(X)) , a__from(X) -> cons(mark(X), from(s(X))) , a__from(X) -> from(X) } Obligation: innermost runtime complexity Answer: MAYBE The input cannot be shown compatible Arrrr..