TSTP Solution File: SWW958+1 by Enigma---0.5.1

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Enigma---0.5.1
% Problem  : SWW958+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : enigmatic-eprover.py %s %d 1

% Computer : n027.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 600s
% DateTime : Thu Jul 21 00:03:11 EDT 2022

% Result   : Theorem 17.05s 3.56s
% Output   : CNFRefutation 17.05s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   10
%            Number of leaves      :   21
% Syntax   : Number of clauses     :   64 (  22 unt;   0 nHn;  53 RR)
%            Number of literals    :  133 (  11 equ;  73 neg)
%            Maximal clause size   :    4 (   2 avg)
%            Maximal term depth    :    4 (   2 avg)
%            Number of predicates  :    3 (   1 usr;   1 prp; 0-2 aty)
%            Number of functors    :   16 (  16 usr;   5 con; 0-2 aty)
%            Number of variables   :   89 (  15 sgn)

% Comments : 
%------------------------------------------------------------------------------
cnf(i_0_273,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(tuple_client_A_in_1(X3))
    | ~ pred_attacker(tuple_client_A_in_4(X2,X1)) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_273) ).

cnf(i_0_243,plain,
    ( pred_attacker(tuple_client_A_in_4(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_243) ).

cnf(i_0_247,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_client_A_in_2(X1)) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_247) ).

cnf(i_0_272,plain,
    ( pred_attacker(tuple_client_A_out_3(name_A,constr_aenc(constr_add(name_Na,name_Sa),X1)))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(tuple_client_A_in_1(X1)) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_272) ).

cnf(i_0_246,plain,
    ( pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_246) ).

cnf(i_0_268,plain,
    pred_attacker(tuple_out_1(constr_pkey(name_skA))),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_268) ).

cnf(i_0_248,plain,
    ( pred_attacker(tuple_client_A_in_1(X1))
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_248) ).

cnf(i_0_251,plain,
    ( pred_attacker(constr_adec(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_251) ).

cnf(i_0_191,plain,
    constr_adec(constr_aenc(X1,constr_pkey(X2)),X2) = X1,
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_191) ).

cnf(i_0_242,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_client_A_out_3(X2,X1)) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_242) ).

cnf(i_0_252,plain,
    ( pred_attacker(constr_add(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_252) ).

cnf(i_0_195,plain,
    constr_add(constr_add(X1,X2),X3) = constr_add(X1,constr_add(X2,X3)),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_195) ).

cnf(i_0_192,plain,
    constr_add(X1,constr_neg(X1)) = constr_ZERO,
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_192) ).

cnf(i_0_193,plain,
    constr_add(X1,constr_ZERO) = X1,
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_193) ).

cnf(i_0_197,plain,
    ( pred_attacker(constr_pkey(X1))
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_197) ).

cnf(i_0_194,plain,
    constr_add(X1,X2) = constr_add(X2,X1),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_194) ).

cnf(i_0_277,negated_conjecture,
    ~ pred_attacker(name_Sa),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_277) ).

cnf(i_0_239,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_client_A_out_5(X1)) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_239) ).

cnf(i_0_205,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_out_1(X1)) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_205) ).

cnf(i_0_250,plain,
    ( pred_attacker(constr_aenc(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_250) ).

cnf(i_0_253,plain,
    pred_attacker(constr_ZERO),
    file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-bwqob9pn/input.p',i_0_253) ).

cnf(c_0_299,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(tuple_client_A_in_1(X3))
    | ~ pred_attacker(tuple_client_A_in_4(X2,X1)) ),
    i_0_273 ).

cnf(c_0_300,plain,
    ( pred_attacker(tuple_client_A_in_4(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    i_0_243 ).

cnf(c_0_301,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_client_A_in_2(X1)) ),
    i_0_247 ).

cnf(c_0_302,plain,
    ( pred_attacker(tuple_client_A_out_3(name_A,constr_aenc(constr_add(name_Na,name_Sa),X1)))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(tuple_client_A_in_1(X1)) ),
    i_0_272 ).

cnf(c_0_303,plain,
    ( pred_attacker(tuple_client_A_in_2(X1))
    | ~ pred_attacker(X1) ),
    i_0_246 ).

cnf(c_0_304,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(tuple_client_A_in_1(X3))
    | ~ pred_attacker(X1) ),
    inference(csr,[status(thm)],[inference(spm,[status(thm)],[c_0_299,c_0_300]),c_0_301]) ).

cnf(c_0_305,plain,
    ( pred_attacker(tuple_client_A_out_3(name_A,constr_aenc(constr_add(name_Na,name_Sa),X1)))
    | ~ pred_attacker(tuple_client_A_in_1(X1))
    | ~ pred_attacker(X2) ),
    inference(spm,[status(thm)],[c_0_302,c_0_303]) ).

cnf(c_0_306,plain,
    pred_attacker(tuple_out_1(constr_pkey(name_skA))),
    i_0_268 ).

cnf(c_0_307,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(tuple_client_A_in_1(X2))
    | ~ pred_attacker(X1)
    | ~ pred_attacker(X3) ),
    inference(spm,[status(thm)],[c_0_304,c_0_303]) ).

cnf(c_0_308,plain,
    ( pred_attacker(tuple_client_A_in_1(X1))
    | ~ pred_attacker(X1) ),
    i_0_248 ).

cnf(c_0_309,plain,
    ( pred_attacker(constr_adec(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    i_0_251 ).

cnf(c_0_310,plain,
    constr_adec(constr_aenc(X1,constr_pkey(X2)),X2) = X1,
    i_0_191 ).

cnf(c_0_311,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_client_A_out_3(X2,X1)) ),
    i_0_242 ).

cnf(c_0_312,plain,
    ( pred_attacker(tuple_client_A_out_3(name_A,constr_aenc(constr_add(name_Na,name_Sa),X1)))
    | ~ pred_attacker(tuple_client_A_in_1(X1)) ),
    inference(spm,[status(thm)],[c_0_305,c_0_306]) ).

cnf(c_0_313,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(X1)
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X3) ),
    inference(spm,[status(thm)],[c_0_307,c_0_308]) ).

cnf(c_0_314,plain,
    ( pred_attacker(constr_add(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    i_0_252 ).

cnf(c_0_315,plain,
    constr_add(constr_add(X1,X2),X3) = constr_add(X1,constr_add(X2,X3)),
    i_0_195 ).

cnf(c_0_316,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(constr_aenc(X1,constr_pkey(X2)))
    | ~ pred_attacker(X2) ),
    inference(spm,[status(thm)],[c_0_309,c_0_310]) ).

cnf(c_0_317,plain,
    ( pred_attacker(constr_aenc(constr_add(name_Na,name_Sa),X1))
    | ~ pred_attacker(tuple_client_A_in_1(X1)) ),
    inference(spm,[status(thm)],[c_0_311,c_0_312]) ).

cnf(c_0_318,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(X1)
    | ~ pred_attacker(X2) ),
    inference(spm,[status(thm)],[c_0_313,c_0_306]) ).

cnf(c_0_319,plain,
    ( pred_attacker(constr_add(X1,constr_add(X2,X3)))
    | ~ pred_attacker(constr_add(X1,X2))
    | ~ pred_attacker(X3) ),
    inference(spm,[status(thm)],[c_0_314,c_0_315]) ).

cnf(c_0_320,plain,
    constr_add(X1,constr_neg(X1)) = constr_ZERO,
    i_0_192 ).

cnf(c_0_321,plain,
    constr_add(X1,constr_ZERO) = X1,
    i_0_193 ).

cnf(c_0_322,plain,
    ( pred_attacker(constr_add(name_Na,name_Sa))
    | ~ pred_attacker(tuple_client_A_in_1(constr_pkey(X1)))
    | ~ pred_attacker(X1) ),
    inference(spm,[status(thm)],[c_0_316,c_0_317]) ).

cnf(c_0_323,plain,
    ( pred_attacker(constr_pkey(X1))
    | ~ pred_attacker(X1) ),
    i_0_197 ).

cnf(c_0_324,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(constr_adec(X1,name_skA),constr_neg(name_Na))))
    | ~ pred_attacker(X1) ),
    inference(spm,[status(thm)],[c_0_318,c_0_306]) ).

cnf(c_0_325,plain,
    constr_add(X1,X2) = constr_add(X2,X1),
    i_0_194 ).

cnf(c_0_326,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(constr_add(X1,X2))
    | ~ pred_attacker(constr_neg(X2)) ),
    inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_319,c_0_320]),c_0_321]) ).

cnf(c_0_327,plain,
    ( pred_attacker(constr_add(name_Na,name_Sa))
    | ~ pred_attacker(X1) ),
    inference(csr,[status(thm)],[inference(spm,[status(thm)],[c_0_322,c_0_308]),c_0_323]) ).

cnf(c_0_328,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_add(X1,constr_neg(name_Na))))
    | ~ pred_attacker(constr_aenc(X1,constr_pkey(name_skA))) ),
    inference(spm,[status(thm)],[c_0_324,c_0_310]) ).

cnf(c_0_329,plain,
    constr_add(constr_ZERO,X1) = X1,
    inference(spm,[status(thm)],[c_0_321,c_0_325]) ).

cnf(c_0_330,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(constr_add(X2,X1))
    | ~ pred_attacker(constr_neg(X2)) ),
    inference(spm,[status(thm)],[c_0_326,c_0_325]) ).

cnf(c_0_331,plain,
    pred_attacker(constr_add(name_Na,name_Sa)),
    inference(spm,[status(thm)],[c_0_327,c_0_306]) ).

cnf(c_0_332,negated_conjecture,
    ~ pred_attacker(name_Sa),
    i_0_277 ).

cnf(c_0_333,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_client_A_out_5(X1)) ),
    i_0_239 ).

cnf(c_0_334,plain,
    ( pred_attacker(tuple_client_A_out_5(constr_neg(name_Na)))
    | ~ pred_attacker(constr_aenc(constr_ZERO,constr_pkey(name_skA))) ),
    inference(spm,[status(thm)],[c_0_328,c_0_329]) ).

cnf(c_0_335,plain,
    ~ pred_attacker(constr_neg(name_Na)),
    inference(sr,[status(thm)],[inference(spm,[status(thm)],[c_0_330,c_0_331]),c_0_332]) ).

cnf(c_0_336,plain,
    ( pred_attacker(X1)
    | ~ pred_attacker(tuple_out_1(X1)) ),
    i_0_205 ).

cnf(c_0_337,plain,
    ~ pred_attacker(constr_aenc(constr_ZERO,constr_pkey(name_skA))),
    inference(sr,[status(thm)],[inference(spm,[status(thm)],[c_0_333,c_0_334]),c_0_335]) ).

cnf(c_0_338,plain,
    ( pred_attacker(constr_aenc(X1,X2))
    | ~ pred_attacker(X2)
    | ~ pred_attacker(X1) ),
    i_0_250 ).

cnf(c_0_339,plain,
    pred_attacker(constr_pkey(name_skA)),
    inference(spm,[status(thm)],[c_0_336,c_0_306]) ).

cnf(c_0_340,plain,
    pred_attacker(constr_ZERO),
    i_0_253 ).

cnf(c_0_341,plain,
    $false,
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_337,c_0_338]),c_0_339]),c_0_340])]),
    [proof] ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem  : SWW958+1 : TPTP v8.1.0. Released v7.4.0.
% 0.07/0.13  % Command  : enigmatic-eprover.py %s %d 1
% 0.12/0.34  % Computer : n027.cluster.edu
% 0.12/0.34  % Model    : x86_64 x86_64
% 0.12/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.34  % Memory   : 8042.1875MB
% 0.12/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.34  % CPULimit : 300
% 0.12/0.34  % WCLimit  : 600
% 0.12/0.34  % DateTime : Sun Jun  5 21:27:40 EDT 2022
% 0.12/0.34  % CPUTime  : 
% 0.20/0.46  # ENIGMATIC: Selected complete mode:
% 17.05/3.56  # ENIGMATIC: Solved by Enigma+tptp-cade20-model02-h2e15+lgb-t150-d30-l6400-e0.15+coop-mzr02:
% 17.05/3.56  # ENIGMA: LightGBM model '/export/starexec/sandbox/solver/bin/data/Enigma/tptp-cade20-model02-h2e15/lgb-t150-d30-l6400-e0.15/model.lgb' loaded. (hash_base: 32768; conj_feats: 15; version: 991; iters: 150)
% 17.05/3.56  # Preprocessing time       : 0.870 s
% 17.05/3.56  
% 17.05/3.56  # Proof found!
% 17.05/3.56  # SZS status Theorem
% 17.05/3.56  # SZS output start CNFRefutation
% See solution above
% 17.05/3.56  # Training examples: 0 positive, 0 negative
% 17.05/3.56  
% 17.05/3.56  # -------------------------------------------------
% 17.05/3.56  # User time                : 0.916 s
% 17.05/3.56  # System time              : 0.134 s
% 17.05/3.56  # Total time               : 1.050 s
% 17.05/3.56  # ...preprocessing         : 0.870 s
% 17.05/3.56  # ...main loop             : 0.180 s
% 17.05/3.56  # Maximum resident set size: 167856 pages
% 17.05/3.56  
%------------------------------------------------------------------------------