TSTP Solution File: SWW959+1 by SnakeForV-SAT---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV-SAT---1.0
% Problem  : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s

% Computer : n012.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:25:06 EDT 2022

% Result   : Theorem 0.19s 0.52s
% Output   : Refutation 0.19s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   16
%            Number of leaves      :   11
% Syntax   : Number of formulae    :   52 (  18 unt;   0 def)
%            Number of atoms       :  135 (   0 equ)
%            Maximal formula atoms :    7 (   2 avg)
%            Number of connectives :  147 (  64   ~;  61   |;  10   &)
%                                         (   0 <=>;  12  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    4 (   2 avg)
%            Number of predicates  :    3 (   2 usr;   1 prp; 0-2 aty)
%            Number of functors    :   16 (  16 usr;   5 con; 0-2 aty)
%            Number of variables   :   75 (  75   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f791,plain,
    $false,
    inference(subsumption_resolution,[],[f786,f475]) ).

fof(f475,plain,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f212]) ).

fof(f212,plain,
    ~ pred_attacker(name_objective),
    inference(flattening,[],[f170]) ).

fof(f170,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(negated_conjecture,[],[f169]) ).

fof(f169,conjecture,
    pred_attacker(name_objective),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f786,plain,
    pred_attacker(name_objective),
    inference(resolution,[],[f694,f400]) ).

fof(f400,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f307]) ).

fof(f307,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f192]) ).

fof(f192,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X51] :
      ( pred_attacker(tuple_client_B_out_6(X51))
     => pred_attacker(X51) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).

fof(f694,plain,
    pred_attacker(tuple_client_B_out_6(name_objective)),
    inference(resolution,[],[f640,f526]) ).

fof(f526,plain,
    pred_attacker(constr_pkey(name_skB)),
    inference(resolution,[],[f482,f365]) ).

fof(f365,plain,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    inference(cnf_transformation,[],[f159]) ).

fof(f159,axiom,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).

fof(f482,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f282]) ).

fof(f282,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_out_2(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f226]) ).

fof(f226,plain,
    ! [X0] :
      ( pred_attacker(tuple_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f98]) ).

fof(f98,axiom,
    ! [X28] :
      ( pred_attacker(tuple_out_2(X28))
     => pred_attacker(X28) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).

fof(f640,plain,
    ! [X8] :
      ( ~ pred_attacker(X8)
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(resolution,[],[f586,f396]) ).

fof(f396,plain,
    pred_attacker(name_c),
    inference(cnf_transformation,[],[f150]) ).

fof(f150,axiom,
    pred_attacker(name_c),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax149) ).

fof(f586,plain,
    ! [X10,X11] :
      ( ~ pred_attacker(X11)
      | ~ pred_attacker(X10)
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(resolution,[],[f580,f352]) ).

fof(f352,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f153]) ).

fof(f153,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).

fof(f580,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(X2)
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f572,f409]) ).

fof(f409,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f320]) ).

fof(f320,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(ennf_transformation,[],[f194]) ).

fof(f194,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f120]) ).

fof(f120,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(tuple_client_B_in_5(X60)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).

fof(f572,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X2)
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(X1) ),
    inference(resolution,[],[f571,f364]) ).

fof(f364,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f316]) ).

fof(f316,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f179]) ).

fof(f179,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X62] :
      ( pred_attacker(X62)
     => pred_attacker(tuple_client_B_in_3(X62)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).

fof(f571,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_attacker(tuple_client_B_in_5(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(X3) ),
    inference(subsumption_resolution,[],[f570,f393]) ).

fof(f393,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f331]) ).

fof(f331,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f227]) ).

fof(f227,plain,
    ! [X1,X0] : pred_eq_bitstring_bitstring(X1,X0),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X17,X16] : pred_eq_bitstring_bitstring(X16,X17),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).

fof(f570,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_5(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_attacker(X3) ),
    inference(subsumption_resolution,[],[f569,f393]) ).

fof(f569,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_attacker(tuple_client_B_in_5(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(X3)
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB))) ),
    inference(subsumption_resolution,[],[f568,f393]) ).

fof(f568,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_5(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(X3)
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X2)) ),
    inference(resolution,[],[f387,f378]) ).

fof(f378,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f286]) ).

fof(f286,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f187]) ).

fof(f187,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f124]) ).

fof(f124,axiom,
    ! [X64] :
      ( pred_attacker(X64)
     => pred_attacker(tuple_client_B_in_2(X64)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).

fof(f387,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_adec(X3,name_skB))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS)))) ),
    inference(cnf_transformation,[],[f330]) ).

fof(f330,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_adec(X3,name_skB))
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f271]) ).

fof(f271,plain,
    ! [X1,X3,X0,X2] :
      ( ~ pred_attacker(tuple_client_B_in_3(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(flattening,[],[f270]) ).

fof(f270,plain,
    ! [X2,X0,X1,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X3))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
      | ~ pred_attacker(tuple_client_B_in_5(X2)) ),
    inference(ennf_transformation,[],[f219]) ).

fof(f219,plain,
    ! [X2,X0,X1,X3] :
      ( ( pred_attacker(tuple_client_B_in_3(X3))
        & pred_attacker(tuple_client_B_in_2(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
        & pred_attacker(tuple_client_B_in_5(X2)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f166]) ).

fof(f166,axiom,
    ! [X106,X109,X108,X107] :
      ( ( pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
        & pred_attacker(tuple_client_B_in_3(X107))
        & pred_attacker(tuple_client_B_in_5(X108))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_2(X109)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.12  % Problem    : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.13  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% 0.12/0.33  % Computer : n012.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit   : 300
% 0.12/0.33  % WCLimit    : 300
% 0.12/0.33  % DateTime   : Tue Aug 30 21:17:35 EDT 2022
% 0.12/0.34  % CPUTime    : 
% 0.19/0.48  % (11989)dis+10_1:1_fsd=on:sp=occurrence:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.19/0.49  % (11997)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=75:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/75Mi)
% 0.19/0.50  % (11984)ott+4_1:1_av=off:bd=off:nwc=5.0:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=37:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/37Mi)
% 0.19/0.50  % (11994)ott+10_1:28_bd=off:bs=on:tgt=ground:i=101:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/101Mi)
% 0.19/0.50  % (11989)Instruction limit reached!
% 0.19/0.50  % (11989)------------------------------
% 0.19/0.50  % (11989)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.50  % (12005)ott+11_1:1_drc=off:nwc=5.0:slsq=on:slsqc=1:spb=goal_then_units:to=lpo:i=467:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/467Mi)
% 0.19/0.50  % (11989)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.50  % (11989)Termination reason: Unknown
% 0.19/0.50  % (11989)Termination phase: Saturation
% 0.19/0.50  
% 0.19/0.50  % (11989)Memory used [KB]: 5756
% 0.19/0.50  % (11989)Time elapsed: 0.107 s
% 0.19/0.50  % (11989)Instructions burned: 7 (million)
% 0.19/0.50  % (11992)ott+2_1:1_fsr=off:gsp=on:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.19/0.50  % (11989)------------------------------
% 0.19/0.50  % (11989)------------------------------
% 0.19/0.51  % (12006)ott+10_1:1_kws=precedence:tgt=ground:i=482:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/482Mi)
% 0.19/0.51  % (11997)First to succeed.
% 0.19/0.51  % (12000)ott+10_1:1_tgt=ground:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.19/0.51  % (11996)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 0.19/0.52  % (12000)Also succeeded, but the first one will report.
% 0.19/0.52  % (11997)Refutation found. Thanks to Tanya!
% 0.19/0.52  % SZS status Theorem for theBenchmark
% 0.19/0.52  % SZS output start Proof for theBenchmark
% See solution above
% 0.19/0.52  % (11997)------------------------------
% 0.19/0.52  % (11997)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.52  % (11997)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.52  % (11997)Termination reason: Refutation
% 0.19/0.52  
% 0.19/0.52  % (11997)Memory used [KB]: 1407
% 0.19/0.52  % (11997)Time elapsed: 0.108 s
% 0.19/0.52  % (11997)Instructions burned: 16 (million)
% 0.19/0.52  % (11997)------------------------------
% 0.19/0.52  % (11997)------------------------------
% 0.19/0.52  % (11981)Success in time 0.172 s
%------------------------------------------------------------------------------