TSTP Solution File: SWW959+1 by SnakeForV-SAT---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV-SAT---1.0
% Problem : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% Computer : n012.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:25:06 EDT 2022
% Result : Theorem 0.19s 0.52s
% Output : Refutation 0.19s
% Verified :
% SZS Type : Refutation
% Derivation depth : 16
% Number of leaves : 11
% Syntax : Number of formulae : 52 ( 18 unt; 0 def)
% Number of atoms : 135 ( 0 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 147 ( 64 ~; 61 |; 10 &)
% ( 0 <=>; 12 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 4 ( 2 avg)
% Number of predicates : 3 ( 2 usr; 1 prp; 0-2 aty)
% Number of functors : 16 ( 16 usr; 5 con; 0-2 aty)
% Number of variables : 75 ( 75 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f791,plain,
$false,
inference(subsumption_resolution,[],[f786,f475]) ).
fof(f475,plain,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f212]) ).
fof(f212,plain,
~ pred_attacker(name_objective),
inference(flattening,[],[f170]) ).
fof(f170,negated_conjecture,
~ pred_attacker(name_objective),
inference(negated_conjecture,[],[f169]) ).
fof(f169,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f786,plain,
pred_attacker(name_objective),
inference(resolution,[],[f694,f400]) ).
fof(f400,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f307]) ).
fof(f307,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f192]) ).
fof(f192,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f694,plain,
pred_attacker(tuple_client_B_out_6(name_objective)),
inference(resolution,[],[f640,f526]) ).
fof(f526,plain,
pred_attacker(constr_pkey(name_skB)),
inference(resolution,[],[f482,f365]) ).
fof(f365,plain,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
inference(cnf_transformation,[],[f159]) ).
fof(f159,axiom,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).
fof(f482,plain,
! [X0] :
( ~ pred_attacker(tuple_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f282]) ).
fof(f282,plain,
! [X0] :
( ~ pred_attacker(tuple_out_2(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f226]) ).
fof(f226,plain,
! [X0] :
( pred_attacker(tuple_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f98]) ).
fof(f98,axiom,
! [X28] :
( pred_attacker(tuple_out_2(X28))
=> pred_attacker(X28) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).
fof(f640,plain,
! [X8] :
( ~ pred_attacker(X8)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(resolution,[],[f586,f396]) ).
fof(f396,plain,
pred_attacker(name_c),
inference(cnf_transformation,[],[f150]) ).
fof(f150,axiom,
pred_attacker(name_c),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax149) ).
fof(f586,plain,
! [X10,X11] :
( ~ pred_attacker(X11)
| ~ pred_attacker(X10)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(resolution,[],[f580,f352]) ).
fof(f352,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f153]) ).
fof(f153,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).
fof(f580,plain,
! [X2,X0,X1] :
( ~ pred_attacker(X2)
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(resolution,[],[f572,f409]) ).
fof(f409,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f320]) ).
fof(f320,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_5(X0)) ),
inference(ennf_transformation,[],[f194]) ).
fof(f194,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).
fof(f572,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X2)
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X1) ),
inference(resolution,[],[f571,f364]) ).
fof(f364,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f316]) ).
fof(f316,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f179]) ).
fof(f179,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(f571,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X3) ),
inference(subsumption_resolution,[],[f570,f393]) ).
fof(f393,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f331]) ).
fof(f331,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f227]) ).
fof(f227,plain,
! [X1,X0] : pred_eq_bitstring_bitstring(X1,X0),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X17,X16] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(f570,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(X3) ),
inference(subsumption_resolution,[],[f569,f393]) ).
fof(f569,plain,
! [X2,X3,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X3)
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB))) ),
inference(subsumption_resolution,[],[f568,f393]) ).
fof(f568,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(X3)
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X2)) ),
inference(resolution,[],[f387,f378]) ).
fof(f378,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f286]) ).
fof(f286,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f187]) ).
fof(f187,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).
fof(f387,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_adec(X3,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS)))) ),
inference(cnf_transformation,[],[f330]) ).
fof(f330,plain,
! [X0,X1,X2,X3] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_adec(X3,name_skB))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f271]) ).
fof(f271,plain,
! [X1,X3,X0,X2] :
( ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(flattening,[],[f270]) ).
fof(f270,plain,
! [X2,X0,X1,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X2)) ),
inference(ennf_transformation,[],[f219]) ).
fof(f219,plain,
! [X2,X0,X1,X3] :
( ( pred_attacker(tuple_client_B_in_3(X3))
& pred_attacker(tuple_client_B_in_2(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
& pred_attacker(tuple_client_B_in_5(X2)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f166,axiom,
! [X106,X109,X108,X107] :
( ( pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_2(X109)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.12 % Problem : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.13 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% 0.12/0.33 % Computer : n012.cluster.edu
% 0.12/0.33 % Model : x86_64 x86_64
% 0.12/0.33 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33 % Memory : 8042.1875MB
% 0.12/0.33 % OS : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33 % CPULimit : 300
% 0.12/0.33 % WCLimit : 300
% 0.12/0.33 % DateTime : Tue Aug 30 21:17:35 EDT 2022
% 0.12/0.34 % CPUTime :
% 0.19/0.48 % (11989)dis+10_1:1_fsd=on:sp=occurrence:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.19/0.49 % (11997)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=75:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/75Mi)
% 0.19/0.50 % (11984)ott+4_1:1_av=off:bd=off:nwc=5.0:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=37:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/37Mi)
% 0.19/0.50 % (11994)ott+10_1:28_bd=off:bs=on:tgt=ground:i=101:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/101Mi)
% 0.19/0.50 % (11989)Instruction limit reached!
% 0.19/0.50 % (11989)------------------------------
% 0.19/0.50 % (11989)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.50 % (12005)ott+11_1:1_drc=off:nwc=5.0:slsq=on:slsqc=1:spb=goal_then_units:to=lpo:i=467:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/467Mi)
% 0.19/0.50 % (11989)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.50 % (11989)Termination reason: Unknown
% 0.19/0.50 % (11989)Termination phase: Saturation
% 0.19/0.50
% 0.19/0.50 % (11989)Memory used [KB]: 5756
% 0.19/0.50 % (11989)Time elapsed: 0.107 s
% 0.19/0.50 % (11989)Instructions burned: 7 (million)
% 0.19/0.50 % (11992)ott+2_1:1_fsr=off:gsp=on:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.19/0.50 % (11989)------------------------------
% 0.19/0.50 % (11989)------------------------------
% 0.19/0.51 % (12006)ott+10_1:1_kws=precedence:tgt=ground:i=482:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/482Mi)
% 0.19/0.51 % (11997)First to succeed.
% 0.19/0.51 % (12000)ott+10_1:1_tgt=ground:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.19/0.51 % (11996)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 0.19/0.52 % (12000)Also succeeded, but the first one will report.
% 0.19/0.52 % (11997)Refutation found. Thanks to Tanya!
% 0.19/0.52 % SZS status Theorem for theBenchmark
% 0.19/0.52 % SZS output start Proof for theBenchmark
% See solution above
% 0.19/0.52 % (11997)------------------------------
% 0.19/0.52 % (11997)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.52 % (11997)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.52 % (11997)Termination reason: Refutation
% 0.19/0.52
% 0.19/0.52 % (11997)Memory used [KB]: 1407
% 0.19/0.52 % (11997)Time elapsed: 0.108 s
% 0.19/0.52 % (11997)Instructions burned: 16 (million)
% 0.19/0.52 % (11997)------------------------------
% 0.19/0.52 % (11997)------------------------------
% 0.19/0.52 % (11981)Success in time 0.172 s
%------------------------------------------------------------------------------