WST on Thursday, July 15th

09:00‑10:00 New Approaches
Location: IF G.03
09:00 Christian Sternagel and René Thiemann
Certification extends Termination Techniques

Several termination techniques for rewrite systems are nowadays implemented in automated termination tools, which of course may contain bugs and thus, deliver faulty termination proofs. This motivates to certify these proofs automatically using some proof assistant like Coq or Isabelle. Here, the necessary termination techniques of that proof must have been formalized and then for certification it suffices to check the correct application of these techniques in a given proof.

When formalizing polynomial orders for arbitrary carriers (which satisfy some axioms) it turned out that our theorems are even more general than those which are known from the literature. For example, we lifted polynomials with negative constants to an arbitrary carrier, resulting in polynomials with negative constants over matrices over the rationals. Another example is the merge of the arctic semiring and the arctic semiring below zero into one semiring which strictly subsumes both arctic semirings.

As all these techniques are available in our certifier CeTA we encourage tool authors to extend their termination techniques to increase their power, certified.

09:30 Madalina Erascu and Tudor Jebelean
A Purely Logical Approach to Program Termination

We present our work in progress concerning the logical foundations of the analysis of termination for imperative recursive programs. The analysis is based on forward symbolic execution \cite{360252} and functional semantics. The distinctive feature of our approach is the formulation of {\em the termination condition as an induction principle} developed from the structure of the program with respect to iterative structures (recursive calls and {\tt while} loops). Moreover the termination condition insures the existence and the uniqueness of the function implemented by the program. Note that the existence is not automatic, because a recursive program corresponds, logically, to an implicit definition. It is interesting that this inductive termination condition can be also used for proving the uniqueness of the function as well as the total correctness of the program. We show in this paper how to prove the existence of the implemented function in the case of primitive recursive functions (programs without nested recursion). The method can be applied however to all imperative recursive programs, where recursive calls are outside the loops. For other programs, termination analysis appears to involve co-recursive functions and it is subject to further investigation. The methods presented here are under implementation in the {\em Theorema} system \cite{RISC2487}.

10:30‑12:30 Complexity Analysis
Location: IF G.03
10:30 Hans Zantema
Length preserving string rewriting with exponential derivation length

Inspired by binary counting we present and analyze a small length preserving terminating string rewriting system with several nice properties, in particular having derivations of exponential length. These observations are the key for a recent proof that a particular kind of RNA-editing admits a sequence of modifications that essentially requires an exponential number of steps.

11:00 Martin Avanzini and Naohi Eguchi
A New Path Order for Exponential Time

In this note we present the Exponential Path Order EPO*. Inspired by a novel term rewriting characterisation of the exponential time functions FEXP, this order is carefully trimmed so that we believe that compatibility of TRSs implies exponentially bounded runtime complexity. Moreover, the order is complete in the sense that every exponential time function can be expressed by a TRS compatible with an instance of EPO*.

The work on EPO* is still unfinished, but we strongly believe that above mentioned results are correct.

11:30 Harald Zankl and Martin Korp
The Derivational Complexity of the Bits Function and the Derivation Gap Principle

In this note we present two proofs that the derivational complexity of the bits function is linear. The first proof is intuitive but not very suitable for implementation while the second one has been found automatically. Using the second proof idea allows the complexity tool CaT to show linear derivational complexity of the bits function for which no other current contemporary analyzer can infer a polynomial upper bound. In the second part of this note we generalize the weight gap principle of (Hirokawa and Moser, 2008).

12:00 Georg Moser and Andreas Schnabl
Dependency Graphs, Relative Rule Removal, the Subterm Criterion and Derivational Complexity

We study the derivational complexity induced by the dependency pair method, enhanced with the dependency graph refinement and the subterm criterion, allowing relative removal of rules, for base orders inducing linear derivational complexity. If relative rule removal is allowed, we get a multiply recursive upper bound, otherwise the bound is primitive recursive.

14:00‑15:00 Dependency Pairs
Location: IF G.03
14:00 Bernhard Gramlich and Felix Schernhammer
Outermost Termination via Contextual Dependency Pairs

Recently, the problem of proving outermost termination has been addressed mainly by methods relying on transformations. Here we describe a more direct approach inspired by the well-known dependency pair framework. The basic idea is to enrich dependency pairs by an additional component, namely the calling context of the corresponding recursive function call. Then one can use the additional contextual information to model DP chains adhering to certain strategies (e.g. the outermost strategy). Additionally, existing methods of the ordinary DP approach can partly be reused. Building upon this framework of contextual DPs, we describe a DP processor exploiting the additional contextual information. Basically, this processor analyzes nested contexts accumulated by consecutive DPs on DP chain candidates for (certain) redexes. If such a redex is found, the chain candidate is not a proper chain. Finally, we provide some empirical evaluation of our approach.

14:30 Cynthia Kop and Femke van Raamsdonk
Higher Order Dependency Pairs with Argument Filterings

We present a termination method for left-linear Higher-order Rewrite Systems (HRSs) that are algebraic using a higher-order generalization of dependency pairs with argument filterings.

15:30‑17:00 Orders
Location: IF G.03
15:30 Jean-Pierre Jouannaud and Jian-qi Li
A Computability Path Ordering for Polymorphic Terms

Building on CPO, the computability path ordering well-founded on a simply typed lambda structure due to Blanqui, Jouannaud and Rubio (CSL'08), we define PCPO, which is well-founded on the set of polymorphic lambda terms, hence its name. This is a new important step towards our challenge: to develop a well-founded order on the set of terms of the calculus of constructions, allowing to reduce strong normalization proofs of logical calculi to ordering comparisons of their computational rules.

We sketch the strong normalization proof, which uses an interesting new formulation of reducibility candidates "a la Girard" allowing for type-decreasing (and even kind-decreasing) rules.

16:00 Nachum Dershowitz
An Abstract Path Ordering

We show how abstract combinatorial commutation properties for separating well-foundedness of unions of relations can be applied to generic path orderings used in termination proofs.

16:30 Business Meeting