Loop detection in term rewriting using the eliminating unfoldings

نویسنده

  • Étienne Payet
چکیده

In this paper, we present a fully automatizable approach to detecting loops in standard term rewriting. Our method is based on semi-unification and an unfolding operation which processes both forwards and backwards and considers variable subterms. We also describe a technique to reduce the explosion of rules caused by the unfolding process. The idea is to eliminate from the set of unfoldings some rules that are estimated as useless for detecting loops. This is done by an approximation which consists in pruning the left-hand or right-hand side of the rules used to unfold. The analyser that we have implemented is able to solve most of the examples from the Termination Competition’07 that do not terminate due to a loop.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Loop-Mediated Isothermal Amplification (LAMP) for the Rapid Diagnosis of Herpes Simplex Virus Type 1 (HSV-1)

Background and Aims: considering difficulties in usual laboratory methods in detection of viral infections, improved DNA-based diagnostic techniques are more reliable. Loop mediated isothermal amplification method (LAMP) is a nucleic acid amplification method that amplifies DNA using six primers which has been developed to diagnose viruses as a rapid and high efficiency test. In this study, the...

متن کامل

On Proving Termination of Constrained Term Rewrite Systems by Eliminating Edges from Dependency Graphs

In this paper, we propose methods for proving termination of constrained term rewriting systems, where constraints are interpreted by built-in semantics given by users, and rewrite rules are assumed to be sound for the interpretation. To this end, we extend the dependency pair framework for proving termination of unconstrained term rewriting systems to constrained term rewriting systems. Moreov...

متن کامل

Algebraic Matching of Vulnerabilities in a Low-Level Code

This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...

متن کامل

Normal Forms and Unfoldings of Linear Systems in Eigenspaces of (Anti)-Automorphisms of Order Two

In this article we classify normal forms and unfoldings of linear maps in eigenspaces of (anti)automorphisms of order two. Our main motivation is provided by applications to linear systems of ordinary differential equations, general and Hamiltonian, which have both time-preserving and time-reversing symmetries. However the theory gives a uniform method to obtain normal forms and unfoldings for ...

متن کامل

Design a Guidance Law Considering Approximation of Missile Control Loop Dynamics Using Adaptive Back-Stepping Theory

In this paper, a new guidance law is designed to improve the performance of a homing missiles guidance system in terminal phase. For this purpose first of all, the two dimensions equations of motion are formulated, then the approximation dynamic of missile control loop is added to these equations which are nonlinear whit unmatched uncertainty. Then, a new adaptive back-stepping method is develo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 403  شماره 

صفحات  -

تاریخ انتشار 2008