{"title":"终止重写和禁用模式的自动合成","authors":"B. Gramlich, Felix Schernhammer","doi":"10.4204/EPTCS.44.3","DOIUrl":null,"url":null,"abstract":"We introduce a modified version of the well-known dependency pair framework that is suitable forthe termination analysis of rewriting under forbidden pattern restrictions. By attaching contexts todependency pairs that represent the calling contexts of the corresponding recursive function calls,it is possible to incorporate the forbidden pattern restrictions in the (adapted) notion of dependencypair chains, thus yielding a sound and complete approach to termination analysis. Building uponthis contextual dependency pair framework we introduce a dependency pair processor that simplifiesproblems by analyzing the contextual information of the dependency pairs. Moreover, we show howthis processor can be used to synthesize forbidden patterns suitable for a given term rewriting systemon-the-fly during the termination analysis.","PeriodicalId":282428,"journal":{"name":"IEEE International Wireless Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Termination of Rewriting with and Automated Synthesis of Forbidden Patterns\",\"authors\":\"B. Gramlich, Felix Schernhammer\",\"doi\":\"10.4204/EPTCS.44.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We introduce a modified version of the well-known dependency pair framework that is suitable forthe termination analysis of rewriting under forbidden pattern restrictions. By attaching contexts todependency pairs that represent the calling contexts of the corresponding recursive function calls,it is possible to incorporate the forbidden pattern restrictions in the (adapted) notion of dependencypair chains, thus yielding a sound and complete approach to termination analysis. Building uponthis contextual dependency pair framework we introduce a dependency pair processor that simplifiesproblems by analyzing the contextual information of the dependency pairs. Moreover, we show howthis processor can be used to synthesize forbidden patterns suitable for a given term rewriting systemon-the-fly during the termination analysis.\",\"PeriodicalId\":282428,\"journal\":{\"name\":\"IEEE International Wireless Symposium\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE International Wireless Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4204/EPTCS.44.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Wireless Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4204/EPTCS.44.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Termination of Rewriting with and Automated Synthesis of Forbidden Patterns
We introduce a modified version of the well-known dependency pair framework that is suitable forthe termination analysis of rewriting under forbidden pattern restrictions. By attaching contexts todependency pairs that represent the calling contexts of the corresponding recursive function calls,it is possible to incorporate the forbidden pattern restrictions in the (adapted) notion of dependencypair chains, thus yielding a sound and complete approach to termination analysis. Building uponthis contextual dependency pair framework we introduce a dependency pair processor that simplifiesproblems by analyzing the contextual information of the dependency pairs. Moreover, we show howthis processor can be used to synthesize forbidden patterns suitable for a given term rewriting systemon-the-fly during the termination analysis.