TSTP Solution File: SWV014+1 by CSE---1.6

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : CSE---1.6
% Problem  : SWV014+1 : TPTP v8.1.2. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : java -jar /export/starexec/sandbox2/solver/bin/mcs_scs.jar %s %d

% Computer : n013.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Thu Aug 31 21:31:35 EDT 2023

% Result   : Theorem 0.57s 0.99s
% Output   : CNFRefutation 0.57s
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem    : SWV014+1 : TPTP v8.1.2. Released v2.4.0.
% 0.07/0.13  % Command    : java -jar /export/starexec/sandbox2/solver/bin/mcs_scs.jar %s %d
% 0.12/0.33  % Computer : n013.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit   : 300
% 0.12/0.33  % WCLimit    : 300
% 0.12/0.33  % DateTime   : Tue Aug 29 06:26:01 EDT 2023
% 0.12/0.34  % CPUTime    : 
% 0.19/0.56  start to proof:theBenchmark
% 0.57/0.98  %-------------------------------------------
% 0.57/0.98  % File        :CSE---1.6
% 0.57/0.98  % Problem     :theBenchmark
% 0.57/0.98  % Transform   :cnf
% 0.57/0.98  % Format      :tptp:raw
% 0.57/0.98  % Command     :java -jar mcs_scs.jar %d %s
% 0.57/0.98  
% 0.57/0.98  % Result      :Theorem 0.360000s
% 0.57/0.98  % Output      :CNFRefutation 0.360000s
% 0.57/0.98  %-------------------------------------------
% 0.57/0.99  %--------------------------------------------------------------------------
% 0.57/0.99  % File     : SWV014+1 : TPTP v8.1.2. Released v2.4.0.
% 0.57/0.99  % Domain   : Software Verification
% 0.57/0.99  % Problem  : Fact 6 of the Neumann-Stubblebine analysis
% 0.57/0.99  % Version  : [Wei99] axioms.
% 0.57/0.99  % English  :
% 0.57/0.99  
% 0.57/0.99  % Refs     : [Wei99] Weidenbach (1999), Towards and Automatic Analysis of S
% 0.57/0.99  %            [Bau99] Baumgartner (1999), FTP'2000 - Problem Sets
% 0.57/0.99  % Source   : [Bau99]
% 0.57/0.99  % Names    : Fact 6 [Wei99]
% 0.57/0.99  
% 0.57/0.99  % Status   : Theorem
% 0.57/0.99  % Rating   : 0.13 v8.1.0, 0.36 v7.5.0, 0.24 v7.4.0, 0.25 v7.3.0, 0.29 v7.2.0, 0.33 v7.1.0, 0.50 v7.0.0, 0.21 v6.3.0, 0.23 v6.2.0, 0.27 v6.1.0, 0.40 v6.0.0, 0.25 v5.5.0, 0.58 v5.4.0, 0.52 v5.3.0, 0.61 v5.2.0, 0.50 v4.0.1, 0.53 v4.0.0, 0.55 v3.7.0, 0.57 v3.5.0, 0.75 v3.4.0, 0.00 v3.2.0, 0.33 v3.1.0, 0.50 v2.7.0, 0.00 v2.6.0, 0.33 v2.4.0
% 0.57/0.99  % Syntax   : Number of formulae    :   29 (  12 unt;   0 def)
% 0.57/0.99  %            Number of atoms       :   73 (   0 equ)
% 0.57/0.99  %            Maximal formula atoms :    5 (   2 avg)
% 0.57/0.99  %            Number of connectives :   45 (   1   ~;   0   |;  29   &)
% 0.57/0.99  %                                         (   0 <=>;  15  =>;   0  <=;   0 <~>)
% 0.57/0.99  %            Maximal formula depth :   12 (   4 avg)
% 0.57/0.99  %            Maximal term depth    :    6 (   2 avg)
% 0.57/0.99  %            Number of predicates  :   11 (  11 usr;   0 prp; 1-1 aty)
% 0.57/0.99  %            Number of functors    :   15 (  15 usr;   6 con; 0-4 aty)
% 0.57/0.99  %            Number of variables   :   53 (  52   !;   1   ?)
% 0.57/0.99  % SPC      : FOF_THM_RFO_NEQ
% 0.57/0.99  
% 0.57/0.99  % Comments :
% 0.57/0.99  %--------------------------------------------------------------------------
% 0.57/0.99  fof(a_holds_key_at_for_t,axiom,
% 0.57/0.99      a_holds(key(at,t)) ).
% 0.57/0.99  
% 0.57/0.99  fof(a_is_party_of_protocol,axiom,
% 0.57/0.99      party_of_protocol(a) ).
% 0.57/0.99  
% 0.57/0.99  fof(a_sent_message_i_to_b,axiom,
% 0.57/0.99      message(sent(a,b,pair(a,an_a_nonce))) ).
% 0.57/0.99  
% 0.57/0.99  fof(a_stored_message_i,axiom,
% 0.57/0.99      a_stored(pair(b,an_a_nonce)) ).
% 0.57/0.99  
% 0.57/0.99  fof(a_forwards_secure,axiom,
% 0.57/0.99      ! [U,V,W,X,Y,Z] :
% 0.57/0.99        ( ( message(sent(t,a,triple(encrypt(quadruple(Y,Z,W,V),at),X,U)))
% 0.57/0.99          & a_stored(pair(Y,Z)) )
% 0.57/0.99       => ( message(sent(a,Y,pair(X,encrypt(U,W))))
% 0.57/0.99          & a_holds(key(W,Y)) ) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(b_hold_key_bt_for_t,axiom,
% 0.57/0.99      b_holds(key(bt,t)) ).
% 0.57/0.99  
% 0.57/0.99  fof(b_is_party_of_protocol,axiom,
% 0.57/0.99      party_of_protocol(b) ).
% 0.57/0.99  
% 0.57/0.99  fof(nonce_a_is_fresh_to_b,axiom,
% 0.57/0.99      fresh_to_b(an_a_nonce) ).
% 0.57/0.99  
% 0.57/0.99  fof(b_creates_freash_nonces_in_time,axiom,
% 0.57/0.99      ! [U,V] :
% 0.57/0.99        ( ( message(sent(U,b,pair(U,V)))
% 0.57/0.99          & fresh_to_b(V) )
% 0.57/0.99       => ( message(sent(b,t,triple(b,generate_b_nonce(V),encrypt(triple(U,V,generate_expiration_time(V)),bt))))
% 0.57/0.99          & b_stored(pair(U,V)) ) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(b_accepts_secure_session_key,axiom,
% 0.57/0.99      ! [V,X,Y] :
% 0.57/0.99        ( ( message(sent(X,b,pair(encrypt(triple(X,V,generate_expiration_time(Y)),bt),encrypt(generate_b_nonce(Y),V))))
% 0.57/0.99          & b_stored(pair(X,Y)) )
% 0.57/0.99       => b_holds(key(V,X)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(t_holds_key_at_for_a,axiom,
% 0.57/0.99      t_holds(key(at,a)) ).
% 0.57/0.99  
% 0.57/0.99  fof(t_holds_key_bt_for_b,axiom,
% 0.57/0.99      t_holds(key(bt,b)) ).
% 0.57/0.99  
% 0.57/0.99  fof(t_is_party_of_protocol,axiom,
% 0.57/0.99      party_of_protocol(t) ).
% 0.57/0.99  
% 0.57/0.99  fof(server_t_generates_key,axiom,
% 0.57/0.99      ! [U,V,W,X,Y,Z,X1] :
% 0.57/0.99        ( ( message(sent(U,t,triple(U,V,encrypt(triple(W,X,Y),Z))))
% 0.57/0.99          & t_holds(key(Z,U))
% 0.57/0.99          & t_holds(key(X1,W))
% 0.57/0.99          & a_nonce(X) )
% 0.57/0.99       => message(sent(t,W,triple(encrypt(quadruple(U,X,generate_key(X),Y),X1),encrypt(triple(W,generate_key(X),Y),Z),V))) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_can_record,axiom,
% 0.57/0.99      ! [U,V,W] :
% 0.57/0.99        ( message(sent(U,V,W))
% 0.57/0.99       => intruder_message(W) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_decomposes_pairs,axiom,
% 0.57/0.99      ! [U,V] :
% 0.57/0.99        ( intruder_message(pair(U,V))
% 0.57/0.99       => ( intruder_message(U)
% 0.57/0.99          & intruder_message(V) ) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_decomposes_triples,axiom,
% 0.57/0.99      ! [U,V,W] :
% 0.57/0.99        ( intruder_message(triple(U,V,W))
% 0.57/0.99       => ( intruder_message(U)
% 0.57/0.99          & intruder_message(V)
% 0.57/0.99          & intruder_message(W) ) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_decomposes_quadruples,axiom,
% 0.57/0.99      ! [U,V,W,X] :
% 0.57/0.99        ( intruder_message(quadruple(U,V,W,X))
% 0.57/0.99       => ( intruder_message(U)
% 0.57/0.99          & intruder_message(V)
% 0.57/0.99          & intruder_message(W)
% 0.57/0.99          & intruder_message(X) ) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_composes_pairs,axiom,
% 0.57/0.99      ! [U,V] :
% 0.57/0.99        ( ( intruder_message(U)
% 0.57/0.99          & intruder_message(V) )
% 0.57/0.99       => intruder_message(pair(U,V)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_composes_triples,axiom,
% 0.57/0.99      ! [U,V,W] :
% 0.57/0.99        ( ( intruder_message(U)
% 0.57/0.99          & intruder_message(V)
% 0.57/0.99          & intruder_message(W) )
% 0.57/0.99       => intruder_message(triple(U,V,W)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_composes_quadruples,axiom,
% 0.57/0.99      ! [U,V,W,X] :
% 0.57/0.99        ( ( intruder_message(U)
% 0.57/0.99          & intruder_message(V)
% 0.57/0.99          & intruder_message(W)
% 0.57/0.99          & intruder_message(X) )
% 0.57/0.99       => intruder_message(quadruple(U,V,W,X)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_interception,axiom,
% 0.57/0.99      ! [U,V,W] :
% 0.57/0.99        ( ( intruder_message(encrypt(U,V))
% 0.57/0.99          & intruder_holds(key(V,W))
% 0.57/0.99          & party_of_protocol(W) )
% 0.57/0.99       => intruder_message(V) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_message_sent,axiom,
% 0.57/0.99      ! [U,V,W] :
% 0.57/0.99        ( ( intruder_message(U)
% 0.57/0.99          & party_of_protocol(V)
% 0.57/0.99          & party_of_protocol(W) )
% 0.57/0.99       => message(sent(V,W,U)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_holds_key,axiom,
% 0.57/0.99      ! [V,W] :
% 0.57/0.99        ( ( intruder_message(V)
% 0.57/0.99          & party_of_protocol(W) )
% 0.57/0.99       => intruder_holds(key(V,W)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(intruder_key_encrypts,axiom,
% 0.57/0.99      ! [U,V,W] :
% 0.57/0.99        ( ( intruder_message(U)
% 0.57/0.99          & intruder_holds(key(V,W))
% 0.57/0.99          & party_of_protocol(W) )
% 0.57/0.99       => intruder_message(encrypt(U,V)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(an_a_nonce_is_a_nonce,axiom,
% 0.57/0.99      a_nonce(an_a_nonce) ).
% 0.57/0.99  
% 0.57/0.99  fof(generated_keys_are_not_nonces,axiom,
% 0.57/0.99      ! [U] : ~ a_nonce(generate_key(U)) ).
% 0.57/0.99  
% 0.57/0.99  fof(generated_times_and_nonces_are_nonces,axiom,
% 0.57/0.99      ! [U] :
% 0.57/0.99        ( a_nonce(generate_expiration_time(U))
% 0.57/0.99        & a_nonce(generate_b_nonce(U)) ) ).
% 0.57/0.99  
% 0.57/0.99  fof(co1,conjecture,
% 0.57/0.99      ? [U] :
% 0.57/0.99        ( intruder_holds(key(U,b))
% 0.57/0.99        & b_holds(key(U,a)) ) ).
% 0.57/0.99  
% 0.57/0.99  %--------------------------------------------------------------------------
% 0.57/0.99  %-------------------------------------------
% 0.57/0.99  % Proof found
% 0.57/0.99  % SZS status Theorem for theBenchmark
% 0.57/0.99  % SZS output start Proof
% 0.57/1.00  %ClaNum:38(EqnAxiom:0)
% 0.57/1.00  %VarNum:156(SingletonVarNum:82)
% 0.57/1.00  %MaxLitNum:5
% 0.57/1.00  %MaxfuncDepth:5
% 0.57/1.00  %SharedTerms:24
% 0.57/1.00  %goalClause: 19
% 0.57/1.00  [1]P1(a1)
% 0.57/1.00  [2]P1(a2)
% 0.57/1.00  [3]P1(a3)
% 0.57/1.00  [4]P2(a4)
% 0.57/1.00  [5]P3(a4)
% 0.57/1.00  [8]P4(f10(a5,a1))
% 0.57/1.00  [9]P5(f12(a3,a4))
% 0.57/1.00  [10]P6(f10(a7,a1))
% 0.57/1.00  [11]P11(f10(a5,a2))
% 0.57/1.00  [12]P11(f10(a7,a3))
% 0.57/1.00  [13]P8(f13(a2,a3,f12(a2,a4)))
% 0.57/1.00  [6]P3(f6(x61))
% 0.57/1.00  [7]P3(f9(x71))
% 0.57/1.00  [14]~P3(f11(x141))
% 0.57/1.00  [19]~P10(f10(x191,a3))+~P6(f10(x191,a2))
% 0.57/1.00  [17]P9(x171)+~P9(f12(x172,x171))
% 0.57/1.00  [18]P9(x181)+~P9(f12(x181,x182))
% 0.57/1.00  [24]P9(x241)+~P8(f13(x242,x243,x241))
% 0.57/1.00  [25]P9(x251)+~P9(f15(x252,x253,x251))
% 0.57/1.00  [26]P9(x261)+~P9(f15(x262,x261,x263))
% 0.57/1.00  [27]P9(x271)+~P9(f15(x271,x272,x273))
% 0.57/1.00  [30]P9(x301)+~P9(f14(x302,x303,x304,x301))
% 0.57/1.00  [31]P9(x311)+~P9(f14(x312,x313,x311,x314))
% 0.57/1.00  [32]P9(x321)+~P9(f14(x322,x321,x323,x324))
% 0.57/1.00  [33]P9(x331)+~P9(f14(x331,x332,x333,x334))
% 0.57/1.00  [15]~P9(x152)+~P9(x151)+P9(f12(x151,x152))
% 0.57/1.00  [16]~P1(x162)+~P9(x161)+P10(f10(x161,x162))
% 0.57/1.00  [28]~P2(x282)+P7(f12(x281,x282))+~P8(f13(x281,a3,f12(x281,x282)))
% 0.57/1.00  [34]~P2(x341)+~P8(f13(x342,a3,f12(x342,x341)))+P8(f13(a3,a1,f15(a3,f6(x341),f8(f15(x342,x341,f9(x341)),a7))))
% 0.57/1.00  [35]P6(f10(x351,x352))+~P7(f12(x352,x353))+~P8(f13(x352,a3,f12(f8(f15(x352,x351,f9(x353)),a7),f8(f6(x353),x351))))
% 0.57/1.00  [36]P4(f10(x361,x362))+~P5(f12(x362,x363))+~P8(f13(a1,a2,f15(f8(f14(x362,x363,x361,x364),a5),x365,x366)))
% 0.57/1.00  [37]~P5(f12(x371,x375))+P8(f13(a2,x371,f12(x372,f8(x373,x374))))+~P8(f13(a1,a2,f15(f8(f14(x371,x375,x374,x376),a5),x372,x373)))
% 0.57/1.00  [20]~P9(x201)+~P1(x203)+~P10(f10(x202,x203))+P9(f8(x201,x202))
% 0.57/1.00  [21]P9(x211)+~P1(x212)+~P10(f10(x211,x212))+~P9(f8(x213,x211))
% 0.57/1.00  [22]~P1(x222)+~P1(x221)+~P9(x223)+P8(f13(x221,x222,x223))
% 0.57/1.00  [23]~P9(x233)+~P9(x232)+~P9(x231)+P9(f15(x231,x232,x233))
% 0.57/1.00  [29]~P9(x294)+~P9(x293)+~P9(x292)+~P9(x291)+P9(f14(x291,x292,x293,x294))
% 0.57/1.00  [38]~P3(x383)+~P11(f10(x385,x381))+~P11(f10(x386,x382))+~P8(f13(x382,a1,f15(x382,x387,f8(f15(x381,x383,x384),x386))))+P8(f13(a1,x381,f15(f8(f14(x382,x383,f11(x383),x384),x385),f8(f15(x381,f11(x383),x384),x386),x387)))
% 0.57/1.00  %EqnAxiom
% 0.57/1.00  
% 0.57/1.00  %-------------------------------------------
% 0.57/1.00  cnf(39,plain,
% 0.57/1.00     (P9(f12(a2,a4))),
% 0.57/1.00     inference(scs_inference,[],[13,24])).
% 0.57/1.00  cnf(40,plain,
% 0.57/1.00     (P9(a2)),
% 0.57/1.00     inference(scs_inference,[],[13,24,18])).
% 0.57/1.00  cnf(41,plain,
% 0.57/1.00     (P9(a4)),
% 0.57/1.00     inference(scs_inference,[],[13,24,18,17])).
% 0.57/1.00  cnf(43,plain,
% 0.57/1.00     (P7(f12(a2,a4))),
% 0.57/1.00     inference(scs_inference,[],[4,13,24,18,17,28])).
% 0.57/1.00  cnf(45,plain,
% 0.57/1.00     (P10(f10(f12(a2,a4),a1))),
% 0.57/1.00     inference(scs_inference,[],[1,4,13,24,18,17,28,16])).
% 0.57/1.00  cnf(47,plain,
% 0.57/1.00     (P9(f12(f12(a2,a4),f12(a2,a4)))),
% 0.57/1.00     inference(scs_inference,[],[1,4,13,24,18,17,28,16,15])).
% 0.57/1.00  cnf(49,plain,
% 0.57/1.00     (P8(f13(a3,a1,f15(a3,f6(a4),f8(f15(a2,a4,f9(a4)),a7))))),
% 0.57/1.00     inference(scs_inference,[],[1,4,13,24,18,17,28,16,15,34])).
% 0.57/1.00  cnf(51,plain,
% 0.57/1.00     (P9(f15(f12(a2,a4),f12(a2,a4),f12(a2,a4)))),
% 0.57/1.00     inference(scs_inference,[],[1,4,13,24,18,17,28,16,15,34,23])).
% 0.57/1.00  cnf(55,plain,
% 0.57/1.00     (P9(f8(f12(a2,a4),f12(a2,a4)))),
% 0.57/1.00     inference(scs_inference,[],[1,4,13,24,18,17,28,16,15,34,23,22,20])).
% 0.57/1.00  cnf(61,plain,
% 0.57/1.00     (P8(f13(a2,a3,f12(f8(f15(a2,f11(a4),f9(a4)),a7),f8(f6(a4),f11(a4)))))),
% 0.57/1.00     inference(scs_inference,[],[1,4,5,9,11,12,13,24,18,17,28,16,15,34,23,22,20,29,38,37])).
% 0.57/1.00  cnf(63,plain,
% 0.57/1.00     (P6(f10(f11(a4),a2))),
% 0.57/1.00     inference(scs_inference,[],[1,4,5,9,11,12,13,24,18,17,28,16,15,34,23,22,20,29,38,37,35])).
% 0.57/1.00  cnf(69,plain,
% 0.57/1.00     (P9(f8(f12(f12(a2,a4),f12(a2,a4)),f12(a2,a4)))),
% 0.57/1.00     inference(scs_inference,[],[1,47,45,23,22,20])).
% 0.57/1.00  cnf(73,plain,
% 0.57/1.00     (P10(f10(f12(f12(a2,a4),f12(a2,a4)),a1))),
% 0.57/1.00     inference(scs_inference,[],[1,47,45,23,22,20,29,16])).
% 0.57/1.00  cnf(77,plain,
% 0.57/1.00     (~P10(f10(f11(a4),a3))),
% 0.57/1.00     inference(scs_inference,[],[1,47,45,63,23,22,20,29,16,15,19])).
% 0.57/1.00  cnf(89,plain,
% 0.57/1.00     (~P9(f11(a4))),
% 0.57/1.00     inference(scs_inference,[],[2,39,3,69,73,77,1,29,23,22,20,16])).
% 0.57/1.00  cnf(91,plain,
% 0.57/1.00     (~P9(f14(f11(a4),x911,x912,x913))),
% 0.57/1.00     inference(scs_inference,[],[2,39,3,69,73,77,1,29,23,22,20,16,33])).
% 0.57/1.00  cnf(93,plain,
% 0.57/1.00     (~P9(f14(x931,f11(a4),x932,x933))),
% 0.57/1.00     inference(scs_inference,[],[2,39,3,69,73,77,1,29,23,22,20,16,33,32])).
% 0.57/1.00  cnf(113,plain,
% 0.57/1.00     (P10(f10(f12(a2,a4),a2))),
% 0.57/1.00     inference(scs_inference,[],[2,39,61,24,16])).
% 0.57/1.00  cnf(119,plain,
% 0.57/1.00     (P9(f8(f6(a4),f11(a4)))),
% 0.57/1.00     inference(scs_inference,[],[2,39,91,61,24,16,21,18,17])).
% 0.57/1.00  cnf(121,plain,
% 0.57/1.00     (~P9(f12(f14(x1211,f11(a4),x1212,x1213),x1214))),
% 0.57/1.00     inference(scs_inference,[],[93,18])).
% 0.57/1.00  cnf(127,plain,
% 0.57/1.00     (P10(f10(a2,a3))),
% 0.57/1.00     inference(scs_inference,[],[3,40,93,18,17,24,16])).
% 0.57/1.00  cnf(133,plain,
% 0.57/1.00     (~P8(f13(a1,a2,f15(f8(f14(a3,a4,a2,x1331),a5),f8(f15(a2,a2,f9(a4)),a7),f6(a4))))),
% 0.57/1.00     inference(scs_inference,[],[3,40,9,43,93,18,17,24,16,19,35,37])).
% 0.57/1.00  cnf(145,plain,
% 0.57/1.00     (P9(f6(a4))),
% 0.57/1.00     inference(scs_inference,[],[3,40,49,22,24,27,26])).
% 0.57/1.00  cnf(147,plain,
% 0.57/1.00     (P9(f8(f15(a2,a4,f9(a4)),a7))),
% 0.57/1.00     inference(scs_inference,[],[3,40,49,22,24,27,26,25])).
% 0.57/1.00  cnf(159,plain,
% 0.57/1.00     (~P8(f13(x1591,x1592,f12(f14(x1593,f11(a4),x1594,x1595),x1596)))),
% 0.57/1.00     inference(scs_inference,[],[41,121,3,26,27,25,22,24])).
% 0.57/1.00  cnf(161,plain,
% 0.57/1.00     (~P9(f14(x1611,f12(f14(x1612,f11(a4),x1613,x1614),x1615),x1616,x1617))),
% 0.57/1.00     inference(scs_inference,[],[41,121,3,26,27,25,22,24,32])).
% 0.57/1.00  cnf(193,plain,
% 0.57/1.00     (P9(f8(f12(a2,a4),a2))),
% 0.57/1.00     inference(scs_inference,[],[39,161,127,3,26,25,20])).
% 0.57/1.00  cnf(197,plain,
% 0.57/1.00     (~P9(f15(f8(f14(a3,a4,a2,x1971),a5),f8(f15(a2,a2,f9(a4)),a7),f6(a4)))),
% 0.57/1.00     inference(scs_inference,[],[39,161,133,127,3,1,2,26,25,20,27,22])).
% 0.57/1.00  cnf(203,plain,
% 0.57/1.00     (P10(f10(f12(a2,a4),a3))),
% 0.57/1.00     inference(scs_inference,[],[5,12,39,161,133,127,3,1,2,26,25,20,27,22,24,38,16])).
% 0.57/1.00  cnf(209,plain,
% 0.57/1.00     (~P6(f10(f12(a2,a4),a2))),
% 0.57/1.00     inference(scs_inference,[],[203,19])).
% 0.57/1.00  cnf(219,plain,
% 0.57/1.00     (~P9(f15(f15(f8(f14(a3,a4,a2,x2191),a5),f8(f15(a2,a2,f9(a4)),a7),f6(a4)),x2192,x2193))),
% 0.57/1.00     inference(scs_inference,[],[41,40,203,197,1,19,23,16,22,29,27])).
% 0.57/1.00  cnf(227,plain,
% 0.57/1.00     (~P8(f13(a1,a2,f15(f8(f14(a3,a4,x2271,x2272),a5),f14(x2273,f11(a4),x2274,x2275),x2276)))),
% 0.57/1.00     inference(scs_inference,[],[9,39,159,219,3,22,31,30,37])).
% 0.57/1.00  cnf(230,plain,
% 0.57/1.00     (~P8(f13(a2,a3,f12(f8(f15(a2,f12(a2,a4),f9(a4)),a7),f8(f6(a4),f12(a2,a4)))))),
% 0.57/1.00     inference(scs_inference,[],[43,9,39,159,209,219,3,22,31,30,37,35])).
% 0.57/1.00  cnf(232,plain,
% 0.57/1.00     (~P9(f14(f15(f15(f8(f14(a3,a4,a2,x2321),a5),f8(f15(a2,a2,f9(a4)),a7),f6(a4)),x2322,x2323),x2324,x2325,x2326))),
% 0.57/1.00     inference(scs_inference,[],[43,9,39,159,209,219,3,22,31,30,37,35,33])).
% 0.57/1.00  cnf(236,plain,
% 0.57/1.00     (~P9(f12(f15(f15(f8(f14(a3,a4,a2,x2361),a5),f8(f15(a2,a2,f9(a4)),a7),f6(a4)),x2362,x2363),x2364))),
% 0.57/1.00     inference(scs_inference,[],[43,9,39,159,209,219,3,22,31,30,37,35,33,32,18])).
% 0.57/1.00  cnf(246,plain,
% 0.57/1.00     (~P9(f15(f8(f14(a3,a4,x2461,x2462),a5),f14(x2463,f11(a4),x2464,x2465),x2466))),
% 0.57/1.00     inference(scs_inference,[],[227,89,119,1,2,21,22])).
% 0.57/1.00  cnf(256,plain,
% 0.57/1.00     (P9(f8(f8(f12(a2,a4),a2),f12(a2,a4)))),
% 0.57/1.00     inference(scs_inference,[],[193,89,119,113,2,21,20])).
% 0.57/1.00  cnf(264,plain,
% 0.57/1.00     (P10(f10(a4,a3))),
% 0.57/1.00     inference(scs_inference,[],[41,3,16])).
% 0.57/1.00  cnf(284,plain,
% 0.57/1.00     (~P6(f10(a4,a2))),
% 0.57/1.00     inference(scs_inference,[],[41,47,232,256,3,16,32,31,30,33,18,17,23,24,22,19])).
% 0.57/1.00  cnf(303,plain,
% 0.57/1.00     (~P8(f13(a2,a3,f12(f8(f15(a2,a4,f9(a4)),a7),f8(f6(a4),a4))))),
% 0.57/1.00     inference(scs_inference,[],[51,43,236,284,230,9,1,22,27,37,35])).
% 0.57/1.00  cnf(341,plain,
% 0.57/1.00     (~P9(f12(f8(f15(a2,a4,f9(a4)),a7),f8(f6(a4),a4)))),
% 0.57/1.00     inference(scs_inference,[],[55,303,203,3,2,20,22])).
% 0.57/1.00  cnf(343,plain,
% 0.57/1.00     (~P9(f15(x3431,f15(f8(f14(a3,a4,x3432,x3433),a5),f14(x3434,f11(a4),x3435,x3436),x3437),x3438))),
% 0.57/1.00     inference(scs_inference,[],[55,246,303,203,3,2,20,22,26])).
% 0.57/1.00  cnf(349,plain,
% 0.57/1.00     (P10(f10(f8(f12(a2,a4),f12(a2,a4)),a3))),
% 0.57/1.00     inference(scs_inference,[],[55,246,303,203,3,2,20,22,26,25,15,16])).
% 0.57/1.00  cnf(363,plain,
% 0.57/1.00     ($false),
% 0.57/1.00     inference(scs_inference,[],[55,343,341,349,264,147,145,1,3,19,16,22,27,15,20]),
% 0.57/1.00     ['proof']).
% 0.57/1.00  % SZS output end Proof
% 0.57/1.00  % Total time :0.360000s
%------------------------------------------------------------------------------