TSTP Solution File: SWW956+1 by iProver---3.9

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : iProver---3.9
% Problem  : SWW956+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : run_iprover %s %d THM

% Computer : n028.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Fri May  3 03:26:55 EDT 2024

% Result   : Theorem 3.46s 1.21s
% Output   : CNFRefutation 3.46s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   11
%            Number of leaves      :   10
% Syntax   : Number of formulae    :   56 (  19 unt;   0 def)
%            Number of atoms       :  101 (   3 equ)
%            Maximal formula atoms :    3 (   1 avg)
%            Number of connectives :   83 (  38   ~;  31   |;   2   &)
%                                         (   0 <=>;  12  =>;   0  <=;   0 <~>)
%            Maximal formula depth :    6 (   3 avg)
%            Maximal term depth    :    5 (   2 avg)
%            Number of predicates  :    3 (   1 usr;   1 prp; 0-2 aty)
%            Number of functors    :   12 (  12 usr;   4 con; 0-2 aty)
%            Number of variables   :   55 (   1 sgn  38   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f56,axiom,
    ! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax55) ).

fof(f63,axiom,
    ! [X12,X13] :
      ( ( pred_attacker(X13)
        & pred_attacker(X12) )
     => pred_attacker(constr_dec(X12,X13)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax62) ).

fof(f77,axiom,
    ! [X25] :
      ( pred_attacker(tuple_A_out_4(X25))
     => pred_attacker(X25) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax76) ).

fof(f79,axiom,
    ! [X27] :
      ( pred_attacker(tuple_A_out_2(X27))
     => pred_attacker(X27) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).

fof(f82,axiom,
    ! [X32,X33] :
      ( pred_attacker(tuple_A_out_1(X32,X33))
     => pred_attacker(X33) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).

fof(f83,axiom,
    ! [X34] :
      ( pred_attacker(X34)
     => pred_attacker(tuple_A_in_3(X34)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).

fof(f90,axiom,
    pred_attacker(tuple_A_out_1(name_P_7,name_G_8)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax89) ).

fof(f91,axiom,
    pred_attacker(tuple_A_out_2(constr_mod(constr_exp(name_G_8,name_Na),name_P_7))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax90) ).

fof(f92,axiom,
    ! [X42] :
      ( pred_attacker(tuple_A_in_3(X42))
     => pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X42,name_Na),name_P_7)))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax91) ).

fof(f94,conjecture,
    pred_attacker(name_objective),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f95,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(negated_conjecture,[],[f94]) ).

fof(f100,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_dec(X0,X1)) ),
    inference(rectify,[],[f63]) ).

fof(f109,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f77]) ).

fof(f111,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f79]) ).

fof(f114,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_A_out_1(X0,X1))
     => pred_attacker(X1) ),
    inference(rectify,[],[f82]) ).

fof(f115,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_A_in_3(X0)) ),
    inference(rectify,[],[f83]) ).

fof(f121,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_in_3(X0))
     => pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
    inference(rectify,[],[f92]) ).

fof(f123,plain,
    ~ pred_attacker(name_objective),
    inference(flattening,[],[f95]) ).

fof(f131,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f100]) ).

fof(f132,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f131]) ).

fof(f142,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_A_out_4(X0)) ),
    inference(ennf_transformation,[],[f109]) ).

fof(f144,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_A_out_2(X0)) ),
    inference(ennf_transformation,[],[f111]) ).

fof(f148,plain,
    ! [X0,X1] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_A_out_1(X0,X1)) ),
    inference(ennf_transformation,[],[f114]) ).

fof(f149,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f115]) ).

fof(f155,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7))))
      | ~ pred_attacker(tuple_A_in_3(X0)) ),
    inference(ennf_transformation,[],[f121]) ).

fof(f213,plain,
    ! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
    inference(cnf_transformation,[],[f56]) ).

fof(f220,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f132]) ).

fof(f234,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_A_out_4(X0)) ),
    inference(cnf_transformation,[],[f142]) ).

fof(f236,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_A_out_2(X0)) ),
    inference(cnf_transformation,[],[f144]) ).

fof(f239,plain,
    ! [X0,X1] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_A_out_1(X0,X1)) ),
    inference(cnf_transformation,[],[f148]) ).

fof(f240,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f149]) ).

fof(f246,plain,
    pred_attacker(tuple_A_out_1(name_P_7,name_G_8)),
    inference(cnf_transformation,[],[f90]) ).

fof(f247,plain,
    pred_attacker(tuple_A_out_2(constr_mod(constr_exp(name_G_8,name_Na),name_P_7))),
    inference(cnf_transformation,[],[f91]) ).

fof(f248,plain,
    ! [X0] :
      ( pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7))))
      | ~ pred_attacker(tuple_A_in_3(X0)) ),
    inference(cnf_transformation,[],[f155]) ).

fof(f250,plain,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f123]) ).

cnf(c_104,plain,
    constr_dec(constr_enc(X0,X1),X1) = X0,
    inference(cnf_transformation,[],[f213]) ).

cnf(c_111,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_dec(X1,X0)) ),
    inference(cnf_transformation,[],[f220]) ).

cnf(c_125,plain,
    ( ~ pred_attacker(tuple_A_out_4(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f234]) ).

cnf(c_127,plain,
    ( ~ pred_attacker(tuple_A_out_2(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f236]) ).

cnf(c_130,plain,
    ( ~ pred_attacker(tuple_A_out_1(X0,X1))
    | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f239]) ).

cnf(c_131,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_A_in_3(X0)) ),
    inference(cnf_transformation,[],[f240]) ).

cnf(c_137,plain,
    pred_attacker(tuple_A_out_1(name_P_7,name_G_8)),
    inference(cnf_transformation,[],[f246]) ).

cnf(c_138,plain,
    pred_attacker(tuple_A_out_2(constr_mod(constr_exp(name_G_8,name_Na),name_P_7))),
    inference(cnf_transformation,[],[f247]) ).

cnf(c_139,plain,
    ( ~ pred_attacker(tuple_A_in_3(X0))
    | pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
    inference(cnf_transformation,[],[f248]) ).

cnf(c_141,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f250]) ).

cnf(c_186,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
    inference(prop_impl_just,[status(thm)],[c_131,c_139]) ).

cnf(c_711,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_A_out_4(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7)))) ),
    inference(prop_impl_just,[status(thm)],[c_186]) ).

cnf(c_1190,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(demodulation,[status(thm)],[c_141]) ).

cnf(c_2210,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_enc(name_objective,constr_mod(constr_exp(X0,name_Na),name_P_7))) ),
    inference(superposition,[status(thm)],[c_711,c_125]) ).

cnf(c_2284,plain,
    pred_attacker(name_G_8),
    inference(superposition,[status(thm)],[c_137,c_130]) ).

cnf(c_2285,plain,
    pred_attacker(constr_mod(constr_exp(name_G_8,name_Na),name_P_7)),
    inference(superposition,[status(thm)],[c_138,c_127]) ).

cnf(c_2326,plain,
    ( ~ pred_attacker(constr_enc(X0,X1))
    | ~ pred_attacker(X1)
    | pred_attacker(X0) ),
    inference(superposition,[status(thm)],[c_104,c_111]) ).

cnf(c_2353,plain,
    ( ~ pred_attacker(constr_mod(constr_exp(X0,name_Na),name_P_7))
    | ~ pred_attacker(X0)
    | pred_attacker(name_objective) ),
    inference(superposition,[status(thm)],[c_2210,c_2326]) ).

cnf(c_2354,plain,
    ( ~ pred_attacker(constr_mod(constr_exp(X0,name_Na),name_P_7))
    | ~ pred_attacker(X0) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_2353,c_1190]) ).

cnf(c_2363,plain,
    ~ pred_attacker(name_G_8),
    inference(superposition,[status(thm)],[c_2285,c_2354]) ).

cnf(c_2366,plain,
    $false,
    inference(forward_subsumption_resolution,[status(thm)],[c_2363,c_2284]) ).


%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.04/0.13  % Problem  : SWW956+1 : TPTP v8.1.2. Released v7.4.0.
% 0.04/0.14  % Command  : run_iprover %s %d THM
% 0.14/0.35  % Computer : n028.cluster.edu
% 0.14/0.35  % Model    : x86_64 x86_64
% 0.14/0.35  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.35  % Memory   : 8042.1875MB
% 0.14/0.35  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.14/0.35  % CPULimit : 300
% 0.14/0.35  % WCLimit  : 300
% 0.14/0.35  % DateTime : Thu May  2 22:29:03 EDT 2024
% 0.14/0.35  % CPUTime  : 
% 0.20/0.48  Running first-order theorem proving
% 0.20/0.48  Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --heuristic_context casc_unsat --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 3.46/1.21  % SZS status Started for theBenchmark.p
% 3.46/1.21  % SZS status Theorem for theBenchmark.p
% 3.46/1.21  
% 3.46/1.21  %---------------- iProver v3.9 (pre CASC 2024/SMT-COMP 2024) ----------------%
% 3.46/1.21  
% 3.46/1.21  ------  iProver source info
% 3.46/1.21  
% 3.46/1.21  git: date: 2024-05-02 19:28:25 +0000
% 3.46/1.21  git: sha1: a33b5eb135c74074ba803943bb12f2ebd971352f
% 3.46/1.21  git: non_committed_changes: false
% 3.46/1.21  
% 3.46/1.21  ------ Parsing...
% 3.46/1.21  ------ Clausification by vclausify_rel  & Parsing by iProver...
% 3.46/1.21  
% 3.46/1.21  ------ Preprocessing... sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe:1:0s pe_e  sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe_e 
% 3.46/1.21  
% 3.46/1.21  ------ Preprocessing... gs_s  sp: 2 0s  gs_e  snvd_s sp: 0 0s snvd_e 
% 3.46/1.21  
% 3.46/1.21  ------ Preprocessing... sf_s  rm: 3 0s  sf_e  sf_s  rm: 0 0s  sf_e 
% 3.46/1.21  ------ Proving...
% 3.46/1.21  ------ Problem Properties 
% 3.46/1.21  
% 3.46/1.21  
% 3.46/1.21  clauses                                 93
% 3.46/1.21  conjectures                             1
% 3.46/1.21  EPR                                     65
% 3.46/1.21  Horn                                    92
% 3.46/1.21  unary                                   69
% 3.46/1.21  binary                                  17
% 3.46/1.21  lits                                    124
% 3.46/1.21  lits eq                                 57
% 3.46/1.21  fd_pure                                 0
% 3.46/1.21  fd_pseudo                               0
% 3.46/1.21  fd_cond                                 0
% 3.46/1.21  fd_pseudo_cond                          0
% 3.46/1.21  AC symbols                              0
% 3.46/1.21  
% 3.46/1.21  ------ Schedule dynamic 5 is on 
% 3.46/1.21  
% 3.46/1.21  ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 3.46/1.21  
% 3.46/1.21  
% 3.46/1.21  ------ 
% 3.46/1.21  Current options:
% 3.46/1.21  ------ 
% 3.46/1.21  
% 3.46/1.21  
% 3.46/1.21  
% 3.46/1.21  
% 3.46/1.21  ------ Proving...
% 3.46/1.21  
% 3.46/1.21  
% 3.46/1.21  % SZS status Theorem for theBenchmark.p
% 3.46/1.21  
% 3.46/1.21  % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 3.46/1.21  
% 3.46/1.21  
%------------------------------------------------------------------------------