TSTP Solution File: SWW956+1 by iProver---3.9
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : iProver---3.9
% Problem : SWW956+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : run_iprover %s %d THM
% Computer : n028.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Fri May 3 03:26:55 EDT 2024
% Result : Theorem 3.46s 1.21s
% Output : CNFRefutation 3.46s
% Verified :
% SZS Type : Refutation
% Derivation depth : 11
% Number of leaves : 10
% Syntax : Number of formulae : 56 ( 19 unt; 0 def)
% Number of atoms : 101 ( 3 equ)
% Maximal formula atoms : 3 ( 1 avg)
% Number of connectives : 83 ( 38 ~; 31 |; 2 &)
% ( 0 <=>; 12 =>; 0 <=; 0 <~>)
% Maximal formula depth : 6 ( 3 avg)
% Maximal term depth : 5 ( 2 avg)
% Number of predicates : 3 ( 1 usr; 1 prp; 0-2 aty)
% Number of functors : 12 ( 12 usr; 4 con; 0-2 aty)
% Number of variables : 55 ( 1 sgn 38 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f56,axiom,
! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax55) ).
fof(f63,axiom,
! [X12,X13] :
( ( pred_attacker(X13)
& pred_attacker(X12) )
=> pred_attacker(constr_dec(X12,X13)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax62) ).
fof(f77,axiom,
! [X25] :
( pred_attacker(tuple_A_out_4(X25))
=> pred_attacker(X25) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax76) ).
fof(f79,axiom,
! [X27] :
( pred_attacker(tuple_A_out_2(X27))
=> pred_attacker(X27) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).
fof(f82,axiom,
! [X32,X33] :
( pred_attacker(tuple_A_out_1(X32,X33))
=> pred_attacker(X33) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).
fof(f83,axiom,
! [X34] :
( pred_attacker(X34)
=> pred_attacker(tuple_A_in_3(X34)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).
fof(f90,axiom,
pred_attacker(tuple_A_out_1(name_P_7,name_G_8)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax89) ).
fof(f91,axiom,
pred_attacker(tuple_A_out_2(constr_mod(constr_exp(name_G_8,name_Na),name_P_7))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax90) ).
fof(f92,axiom,
! [X42] :
( pred_attacker(tuple_A_in_3(X42))
=> pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X42,name_Na),name_P_7)))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax91) ).
fof(f94,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f95,negated_conjecture,
~ pred_attacker(name_objective),
inference(negated_conjecture,[],[f94]) ).
fof(f100,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_dec(X0,X1)) ),
inference(rectify,[],[f63]) ).
fof(f109,plain,
! [X0] :
( pred_attacker(tuple_A_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f77]) ).
fof(f111,plain,
! [X0] :
( pred_attacker(tuple_A_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f79]) ).
fof(f114,plain,
! [X0,X1] :
( pred_attacker(tuple_A_out_1(X0,X1))
=> pred_attacker(X1) ),
inference(rectify,[],[f82]) ).
fof(f115,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_A_in_3(X0)) ),
inference(rectify,[],[f83]) ).
fof(f121,plain,
! [X0] :
( pred_attacker(tuple_A_in_3(X0))
=> pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
inference(rectify,[],[f92]) ).
fof(f123,plain,
~ pred_attacker(name_objective),
inference(flattening,[],[f95]) ).
fof(f131,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f100]) ).
fof(f132,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f131]) ).
fof(f142,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_A_out_4(X0)) ),
inference(ennf_transformation,[],[f109]) ).
fof(f144,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_A_out_2(X0)) ),
inference(ennf_transformation,[],[f111]) ).
fof(f148,plain,
! [X0,X1] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_A_out_1(X0,X1)) ),
inference(ennf_transformation,[],[f114]) ).
fof(f149,plain,
! [X0] :
( pred_attacker(tuple_A_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f115]) ).
fof(f155,plain,
! [X0] :
( pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7))))
| ~ pred_attacker(tuple_A_in_3(X0)) ),
inference(ennf_transformation,[],[f121]) ).
fof(f213,plain,
! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
inference(cnf_transformation,[],[f56]) ).
fof(f220,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f132]) ).
fof(f234,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_A_out_4(X0)) ),
inference(cnf_transformation,[],[f142]) ).
fof(f236,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_A_out_2(X0)) ),
inference(cnf_transformation,[],[f144]) ).
fof(f239,plain,
! [X0,X1] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_A_out_1(X0,X1)) ),
inference(cnf_transformation,[],[f148]) ).
fof(f240,plain,
! [X0] :
( pred_attacker(tuple_A_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f149]) ).
fof(f246,plain,
pred_attacker(tuple_A_out_1(name_P_7,name_G_8)),
inference(cnf_transformation,[],[f90]) ).
fof(f247,plain,
pred_attacker(tuple_A_out_2(constr_mod(constr_exp(name_G_8,name_Na),name_P_7))),
inference(cnf_transformation,[],[f91]) ).
fof(f248,plain,
! [X0] :
( pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7))))
| ~ pred_attacker(tuple_A_in_3(X0)) ),
inference(cnf_transformation,[],[f155]) ).
fof(f250,plain,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f123]) ).
cnf(c_104,plain,
constr_dec(constr_enc(X0,X1),X1) = X0,
inference(cnf_transformation,[],[f213]) ).
cnf(c_111,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_dec(X1,X0)) ),
inference(cnf_transformation,[],[f220]) ).
cnf(c_125,plain,
( ~ pred_attacker(tuple_A_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f234]) ).
cnf(c_127,plain,
( ~ pred_attacker(tuple_A_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f236]) ).
cnf(c_130,plain,
( ~ pred_attacker(tuple_A_out_1(X0,X1))
| pred_attacker(X1) ),
inference(cnf_transformation,[],[f239]) ).
cnf(c_131,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_A_in_3(X0)) ),
inference(cnf_transformation,[],[f240]) ).
cnf(c_137,plain,
pred_attacker(tuple_A_out_1(name_P_7,name_G_8)),
inference(cnf_transformation,[],[f246]) ).
cnf(c_138,plain,
pred_attacker(tuple_A_out_2(constr_mod(constr_exp(name_G_8,name_Na),name_P_7))),
inference(cnf_transformation,[],[f247]) ).
cnf(c_139,plain,
( ~ pred_attacker(tuple_A_in_3(X0))
| pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
inference(cnf_transformation,[],[f248]) ).
cnf(c_141,negated_conjecture,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f250]) ).
cnf(c_186,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
inference(prop_impl_just,[status(thm)],[c_131,c_139]) ).
cnf(c_711,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
inference(prop_impl_just,[status(thm)],[c_186]) ).
cnf(c_1190,negated_conjecture,
~ pred_attacker(name_objective),
inference(demodulation,[status(thm)],[c_141]) ).
cnf(c_2210,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7))) ),
inference(superposition,[status(thm)],[c_711,c_125]) ).
cnf(c_2284,plain,
pred_attacker(name_G_8),
inference(superposition,[status(thm)],[c_137,c_130]) ).
cnf(c_2285,plain,
pred_attacker(constr_mod(constr_exp(name_G_8,name_Na),name_P_7)),
inference(superposition,[status(thm)],[c_138,c_127]) ).
cnf(c_2326,plain,
( ~ pred_attacker(constr_enc(X0,X1))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[status(thm)],[c_104,c_111]) ).
cnf(c_2353,plain,
( ~ pred_attacker(constr_mod(constr_exp(X0,name_Na),name_P_7))
| ~ pred_attacker(X0)
| pred_attacker(name_objective) ),
inference(superposition,[status(thm)],[c_2210,c_2326]) ).
cnf(c_2354,plain,
( ~ pred_attacker(constr_mod(constr_exp(X0,name_Na),name_P_7))
| ~ pred_attacker(X0) ),
inference(forward_subsumption_resolution,[status(thm)],[c_2353,c_1190]) ).
cnf(c_2363,plain,
~ pred_attacker(name_G_8),
inference(superposition,[status(thm)],[c_2285,c_2354]) ).
cnf(c_2366,plain,
$false,
inference(forward_subsumption_resolution,[status(thm)],[c_2363,c_2284]) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.04/0.13 % Problem : SWW956+1 : TPTP v8.1.2. Released v7.4.0.
% 0.04/0.14 % Command : run_iprover %s %d THM
% 0.14/0.35 % Computer : n028.cluster.edu
% 0.14/0.35 % Model : x86_64 x86_64
% 0.14/0.35 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.35 % Memory : 8042.1875MB
% 0.14/0.35 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.35 % CPULimit : 300
% 0.14/0.35 % WCLimit : 300
% 0.14/0.35 % DateTime : Thu May 2 22:29:03 EDT 2024
% 0.14/0.35 % CPUTime :
% 0.20/0.48 Running first-order theorem proving
% 0.20/0.48 Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --heuristic_context casc_unsat --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 3.46/1.21 % SZS status Started for theBenchmark.p
% 3.46/1.21 % SZS status Theorem for theBenchmark.p
% 3.46/1.21
% 3.46/1.21 %---------------- iProver v3.9 (pre CASC 2024/SMT-COMP 2024) ----------------%
% 3.46/1.21
% 3.46/1.21 ------ iProver source info
% 3.46/1.21
% 3.46/1.21 git: date: 2024-05-02 19:28:25 +0000
% 3.46/1.21 git: sha1: a33b5eb135c74074ba803943bb12f2ebd971352f
% 3.46/1.21 git: non_committed_changes: false
% 3.46/1.21
% 3.46/1.21 ------ Parsing...
% 3.46/1.21 ------ Clausification by vclausify_rel & Parsing by iProver...
% 3.46/1.21
% 3.46/1.21 ------ Preprocessing... sup_sim: 0 sf_s rm: 1 0s sf_e pe_s pe:1:0s pe_e sup_sim: 0 sf_s rm: 1 0s sf_e pe_s pe_e
% 3.46/1.21
% 3.46/1.21 ------ Preprocessing... gs_s sp: 2 0s gs_e snvd_s sp: 0 0s snvd_e
% 3.46/1.21
% 3.46/1.21 ------ Preprocessing... sf_s rm: 3 0s sf_e sf_s rm: 0 0s sf_e
% 3.46/1.21 ------ Proving...
% 3.46/1.21 ------ Problem Properties
% 3.46/1.21
% 3.46/1.21
% 3.46/1.21 clauses 93
% 3.46/1.21 conjectures 1
% 3.46/1.21 EPR 65
% 3.46/1.21 Horn 92
% 3.46/1.21 unary 69
% 3.46/1.21 binary 17
% 3.46/1.21 lits 124
% 3.46/1.21 lits eq 57
% 3.46/1.21 fd_pure 0
% 3.46/1.21 fd_pseudo 0
% 3.46/1.21 fd_cond 0
% 3.46/1.21 fd_pseudo_cond 0
% 3.46/1.21 AC symbols 0
% 3.46/1.21
% 3.46/1.21 ------ Schedule dynamic 5 is on
% 3.46/1.21
% 3.46/1.21 ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 3.46/1.21
% 3.46/1.21
% 3.46/1.21 ------
% 3.46/1.21 Current options:
% 3.46/1.21 ------
% 3.46/1.21
% 3.46/1.21
% 3.46/1.21
% 3.46/1.21
% 3.46/1.21 ------ Proving...
% 3.46/1.21
% 3.46/1.21
% 3.46/1.21 % SZS status Theorem for theBenchmark.p
% 3.46/1.21
% 3.46/1.21 % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 3.46/1.21
% 3.46/1.21
%------------------------------------------------------------------------------