YES(?,O(n^1)) We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict Trs: { a__f(X) -> f(X) , a__f(f(X)) -> a__c(f(g(f(X)))) , a__c(X) -> d(X) , a__c(X) -> c(X) , a__h(X) -> a__c(d(X)) , a__h(X) -> h(X) , mark(f(X)) -> a__f(mark(X)) , mark(g(X)) -> g(X) , mark(d(X)) -> d(X) , mark(c(X)) -> a__c(X) , mark(h(X)) -> a__h(mark(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) We add following dependency tuples: Strict DPs: { a__f^#(X) -> c_1() , a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , a__c^#(X) -> c_3() , a__c^#(X) -> c_4() , a__h^#(X) -> c_5(a__c^#(d(X))) , a__h^#(X) -> c_6() , mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , mark^#(g(X)) -> c_8() , mark^#(d(X)) -> c_9() , mark^#(c(X)) -> c_10(a__c^#(X)) , mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } and mark the set of starting terms. We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict DPs: { a__f^#(X) -> c_1() , a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , a__c^#(X) -> c_3() , a__c^#(X) -> c_4() , a__h^#(X) -> c_5(a__c^#(d(X))) , a__h^#(X) -> c_6() , mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , mark^#(g(X)) -> c_8() , mark^#(d(X)) -> c_9() , mark^#(c(X)) -> c_10(a__c^#(X)) , mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } Weak Trs: { a__f(X) -> f(X) , a__f(f(X)) -> a__c(f(g(f(X)))) , a__c(X) -> d(X) , a__c(X) -> c(X) , a__h(X) -> a__c(d(X)) , a__h(X) -> h(X) , mark(f(X)) -> a__f(mark(X)) , mark(g(X)) -> g(X) , mark(d(X)) -> d(X) , mark(c(X)) -> a__c(X) , mark(h(X)) -> a__h(mark(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) We estimate the number of application of {1,3,4,6,8,9} by applications of Pre({1,3,4,6,8,9}) = {2,5,7,10,11}. Here rules are labeled as follows: DPs: { 1: a__f^#(X) -> c_1() , 2: a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , 3: a__c^#(X) -> c_3() , 4: a__c^#(X) -> c_4() , 5: a__h^#(X) -> c_5(a__c^#(d(X))) , 6: a__h^#(X) -> c_6() , 7: mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , 8: mark^#(g(X)) -> c_8() , 9: mark^#(d(X)) -> c_9() , 10: mark^#(c(X)) -> c_10(a__c^#(X)) , 11: mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict DPs: { a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , a__h^#(X) -> c_5(a__c^#(d(X))) , mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , mark^#(c(X)) -> c_10(a__c^#(X)) , mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } Weak DPs: { a__f^#(X) -> c_1() , a__c^#(X) -> c_3() , a__c^#(X) -> c_4() , a__h^#(X) -> c_6() , mark^#(g(X)) -> c_8() , mark^#(d(X)) -> c_9() } Weak Trs: { a__f(X) -> f(X) , a__f(f(X)) -> a__c(f(g(f(X)))) , a__c(X) -> d(X) , a__c(X) -> c(X) , a__h(X) -> a__c(d(X)) , a__h(X) -> h(X) , mark(f(X)) -> a__f(mark(X)) , mark(g(X)) -> g(X) , mark(d(X)) -> d(X) , mark(c(X)) -> a__c(X) , mark(h(X)) -> a__h(mark(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) We estimate the number of application of {1,2,4} by applications of Pre({1,2,4}) = {3,5}. Here rules are labeled as follows: DPs: { 1: a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , 2: a__h^#(X) -> c_5(a__c^#(d(X))) , 3: mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , 4: mark^#(c(X)) -> c_10(a__c^#(X)) , 5: mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) , 6: a__f^#(X) -> c_1() , 7: a__c^#(X) -> c_3() , 8: a__c^#(X) -> c_4() , 9: a__h^#(X) -> c_6() , 10: mark^#(g(X)) -> c_8() , 11: mark^#(d(X)) -> c_9() } We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict DPs: { mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } Weak DPs: { a__f^#(X) -> c_1() , a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , a__c^#(X) -> c_3() , a__c^#(X) -> c_4() , a__h^#(X) -> c_5(a__c^#(d(X))) , a__h^#(X) -> c_6() , mark^#(g(X)) -> c_8() , mark^#(d(X)) -> c_9() , mark^#(c(X)) -> c_10(a__c^#(X)) } Weak Trs: { a__f(X) -> f(X) , a__f(f(X)) -> a__c(f(g(f(X)))) , a__c(X) -> d(X) , a__c(X) -> c(X) , a__h(X) -> a__c(d(X)) , a__h(X) -> h(X) , mark(f(X)) -> a__f(mark(X)) , mark(g(X)) -> g(X) , mark(d(X)) -> d(X) , mark(c(X)) -> a__c(X) , mark(h(X)) -> a__h(mark(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) The following weak DPs constitute a sub-graph of the DG that is closed under successors. The DPs are removed. { a__f^#(X) -> c_1() , a__f^#(f(X)) -> c_2(a__c^#(f(g(f(X))))) , a__c^#(X) -> c_3() , a__c^#(X) -> c_4() , a__h^#(X) -> c_5(a__c^#(d(X))) , a__h^#(X) -> c_6() , mark^#(g(X)) -> c_8() , mark^#(d(X)) -> c_9() , mark^#(c(X)) -> c_10(a__c^#(X)) } We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict DPs: { mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } Weak Trs: { a__f(X) -> f(X) , a__f(f(X)) -> a__c(f(g(f(X)))) , a__c(X) -> d(X) , a__c(X) -> c(X) , a__h(X) -> a__c(d(X)) , a__h(X) -> h(X) , mark(f(X)) -> a__f(mark(X)) , mark(g(X)) -> g(X) , mark(d(X)) -> d(X) , mark(c(X)) -> a__c(X) , mark(h(X)) -> a__h(mark(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) Due to missing edges in the dependency-graph, the right-hand sides of following rules could be simplified: { mark^#(f(X)) -> c_7(a__f^#(mark(X)), mark^#(X)) , mark^#(h(X)) -> c_11(a__h^#(mark(X)), mark^#(X)) } We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict DPs: { mark^#(f(X)) -> c_1(mark^#(X)) , mark^#(h(X)) -> c_2(mark^#(X)) } Weak Trs: { a__f(X) -> f(X) , a__f(f(X)) -> a__c(f(g(f(X)))) , a__c(X) -> d(X) , a__c(X) -> c(X) , a__h(X) -> a__c(d(X)) , a__h(X) -> h(X) , mark(f(X)) -> a__f(mark(X)) , mark(g(X)) -> g(X) , mark(d(X)) -> d(X) , mark(c(X)) -> a__c(X) , mark(h(X)) -> a__h(mark(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) No rule is usable, rules are removed from the input problem. We are left with following problem, upon which TcT provides the certificate YES(?,O(n^1)). Strict DPs: { mark^#(f(X)) -> c_1(mark^#(X)) , mark^#(h(X)) -> c_2(mark^#(X)) } Obligation: innermost runtime complexity Answer: YES(?,O(n^1)) The input was oriented with the instance of 'Small Polynomial Path Order (PS)' as induced by the safe mapping safe(f) = {1}, safe(h) = {1}, safe(mark^#) = {}, safe(c_1) = {}, safe(c_2) = {} and precedence empty . Following symbols are considered recursive: {mark^#} The recursion depth is 1. Further, following argument filtering is employed: pi(f) = [1], pi(h) = [1], pi(mark^#) = [1], pi(c_1) = [1], pi(c_2) = [1] Usable defined function symbols are a subset of: {mark^#} For your convenience, here are the satisfied ordering constraints: pi(mark^#(f(X))) = mark^#(f(; X);) > c_1(mark^#(X;);) = pi(c_1(mark^#(X))) pi(mark^#(h(X))) = mark^#(h(; X);) > c_2(mark^#(X;);) = pi(c_2(mark^#(X))) Hurray, we answered YES(?,O(n^1))