YES(O(1),O(n^1)) 8.27/3.42 YES(O(1),O(n^1)) 8.27/3.42 8.27/3.42 We are left with following problem, upon which TcT provides the 8.27/3.42 certificate YES(O(1),O(n^1)). 8.27/3.42 8.27/3.42 Strict Trs: { h(f(x, y)) -> f(f(a(), h(h(y))), x) } 8.27/3.42 Obligation: 8.27/3.42 runtime complexity 8.27/3.42 Answer: 8.27/3.42 YES(O(1),O(n^1)) 8.27/3.42 8.27/3.42 The input is overlay and right-linear. Switching to innermost 8.27/3.42 rewriting. 8.27/3.42 8.27/3.42 We are left with following problem, upon which TcT provides the 8.27/3.42 certificate YES(O(1),O(n^1)). 8.27/3.42 8.27/3.42 Strict Trs: { h(f(x, y)) -> f(f(a(), h(h(y))), x) } 8.27/3.42 Obligation: 8.27/3.42 innermost runtime complexity 8.27/3.42 Answer: 8.27/3.42 YES(O(1),O(n^1)) 8.27/3.42 8.27/3.42 We add the following dependency tuples: 8.27/3.42 8.27/3.42 Strict DPs: { h^#(f(x, y)) -> c_1(h^#(h(y)), h^#(y)) } 8.27/3.42 8.27/3.42 and mark the set of starting terms. 8.27/3.42 8.27/3.42 We are left with following problem, upon which TcT provides the 8.27/3.42 certificate YES(O(1),O(n^1)). 8.27/3.42 8.27/3.42 Strict DPs: { h^#(f(x, y)) -> c_1(h^#(h(y)), h^#(y)) } 8.27/3.42 Weak Trs: { h(f(x, y)) -> f(f(a(), h(h(y))), x) } 8.27/3.42 Obligation: 8.27/3.42 innermost runtime complexity 8.27/3.42 Answer: 8.27/3.42 YES(O(1),O(n^1)) 8.27/3.42 8.27/3.42 We use the processor 'matrix interpretation of dimension 2' to 8.27/3.42 orient following rules strictly. 8.27/3.42 8.27/3.42 DPs: 8.27/3.42 { 1: h^#(f(x, y)) -> c_1(h^#(h(y)), h^#(y)) } 8.27/3.42 8.27/3.42 Sub-proof: 8.27/3.42 ---------- 8.27/3.42 The following argument positions are usable: 8.27/3.42 Uargs(c_1) = {1, 2} 8.27/3.42 8.27/3.42 TcT has computed the following constructor-based matrix 8.27/3.42 interpretation satisfying not(EDA) and not(IDA(1)). 8.27/3.42 8.27/3.42 [h](x1) = [0 3] x1 + [0] 8.27/3.42 [1 0] [0] 8.27/3.42 8.27/3.42 [f](x1, x2) = [1 1] x1 + [0 0] x2 + [4] 8.27/3.42 [0 0] [1 1] [4] 8.27/3.42 8.27/3.42 [a] = [0] 8.27/3.42 [0] 8.27/3.42 8.27/3.42 [h^#](x1) = [0 1] x1 + [0] 8.27/3.42 [0 0] [0] 8.27/3.42 8.27/3.42 [c_1](x1, x2) = [1 0] x1 + [1 0] x2 + [1] 8.27/3.42 [0 0] [0 0] [0] 8.27/3.42 8.27/3.42 The order satisfies the following ordering constraints: 8.27/3.42 8.27/3.42 [h(f(x, y))] = [0 0] x + [3 3] y + [12] 8.27/3.42 [1 1] [0 0] [4] 8.27/3.42 >= [0 0] x + [3 3] y + [12] 8.27/3.42 [1 1] [0 0] [4] 8.27/3.42 = [f(f(a(), h(h(y))), x)] 8.27/3.42 8.27/3.42 [h^#(f(x, y))] = [1 1] y + [4] 8.27/3.42 [0 0] [0] 8.27/3.42 > [1 1] y + [1] 8.27/3.42 [0 0] [0] 8.27/3.42 = [c_1(h^#(h(y)), h^#(y))] 8.27/3.42 8.27/3.42 8.27/3.42 The strictly oriented rules are moved into the weak component. 8.27/3.42 8.27/3.42 We are left with following problem, upon which TcT provides the 8.27/3.42 certificate YES(O(1),O(1)). 8.27/3.42 8.27/3.42 Weak DPs: { h^#(f(x, y)) -> c_1(h^#(h(y)), h^#(y)) } 8.27/3.42 Weak Trs: { h(f(x, y)) -> f(f(a(), h(h(y))), x) } 8.27/3.42 Obligation: 8.27/3.42 innermost runtime complexity 8.27/3.42 Answer: 8.27/3.42 YES(O(1),O(1)) 8.27/3.42 8.27/3.42 The following weak DPs constitute a sub-graph of the DG that is 8.27/3.42 closed under successors. The DPs are removed. 8.27/3.42 8.27/3.42 { h^#(f(x, y)) -> c_1(h^#(h(y)), h^#(y)) } 8.27/3.42 8.27/3.42 We are left with following problem, upon which TcT provides the 8.27/3.42 certificate YES(O(1),O(1)). 8.27/3.42 8.27/3.42 Weak Trs: { h(f(x, y)) -> f(f(a(), h(h(y))), x) } 8.27/3.42 Obligation: 8.27/3.42 innermost runtime complexity 8.27/3.42 Answer: 8.27/3.42 YES(O(1),O(1)) 8.27/3.42 8.27/3.42 No rule is usable, rules are removed from the input problem. 8.27/3.42 8.27/3.42 We are left with following problem, upon which TcT provides the 8.27/3.42 certificate YES(O(1),O(1)). 8.27/3.42 8.27/3.42 Rules: Empty 8.27/3.42 Obligation: 8.27/3.42 innermost runtime complexity 8.27/3.42 Answer: 8.27/3.42 YES(O(1),O(1)) 8.27/3.42 8.27/3.42 Empty rules are trivially bounded 8.27/3.42 8.27/3.42 Hurray, we answered YES(O(1),O(n^1)) 8.27/3.44 EOF