Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Termination of rewriting under strategies

Published: 02 March 2009 Publication History

Abstract

A termination proof method for rewriting under strategies, based on an explicit induction on the termination property, is presented and instantiated for the innermost, outermost, and local strategies. Rewriting trees are simulated by proof trees generated with an abstraction mechanism, narrowing and constraints representing sets of ground terms. Abstraction introduces variables to represent normal forms without computing them and to control the narrowing mechanism, well known to easily diverge. The induction ordering is not given a priori, but defined with ordering constraints, incrementally set during the proof. It is established that termination under strategy is equivalent to the construction of finite proof trees schematizing terminating rewriting trees. Sufficient effective conditions to ensure finiteness are studied and the method is illustrated on several examples for each specific strategy.

Supplementary Material

Gnaedig Appendix (a10-gnaedig-apndx.pdf)
Online appendix to termination of rewriting under strategies. The appendix supports the information on article 10.

References

[1]
Alarcón, B., Gutiérrez, R., and Lucas, S. 2006. Context-Sensitive dependency pairs. In Proceedings of the 26th International Conference on Foundations of Software Technology and Theoretical Computer Science. Lecture Notes in Computer Science, vol. 4337. Springer, 297 --308.
[2]
Alarcón, B. and Lucas, S. 2007. Termination of innermost context-sensitive rewriting using dependency pairs. In Proceedings of the 6th International Symposium on Frontiers of Combining Systems. Lecture Notes in Artificial Intelligence, Springer.
[3]
Alpuente, M., Escobar, S., and Lucas, S. 2004. Correct and complete (positive) strategy annotations for OBJ. In Proceedings of the 5th International Workshop on Rewriting Logic and its Applications. Electronic Notes In Theoretical Computer Science, vol. 71, 70--89.
[4]
Arts, T. and Giesl, J. 1997. Proving innermost normalisation automatically. In Proceedings of the 8th Conference on Rewriting Techniques and Applications. Lecture Notes in Computer Science, vol. 1232. Springer, 157--171.
[5]
Arts, T. and Giesl, J. 2000. Termination of term rewriting using dependency pairs. Theor. Comput. Sci. 236, 133--178.
[6]
Baader, F. and Nipkow, T. 1998. Term Rewriting and All That. Cambridge University Press, New York.
[7]
Barendsen, E., Bethke, I., Heering, J., Kennaway, R., Klint, P., van Oostrom, V., van Raamsdonk, F., de Vries, F.-J., and Zantema, H. 2003. Term Rewriting Systems. Cambridge Tracts in Theoretical Computer Science, vol. 55. Cambridge University Press.
[8]
Ben Cherifa, A. and Lescanne, P. 1987. Termination of rewriting systems by polynomial interpretations and its implementation. Sci. Comput. Program. 9, 2, 137--160.
[9]
Borovanský, P., Kirchner, C., Kirchner, H., Moreau, P.-E., and Ringeissen, C. 1998. An Overview of ELAN. In Proceedings of the 2nd International Workshop on Rewriting Logic and its Applications, C. Kirchner and H. Kirchner, Eds. Electronic Notes in Theoretical Computer Science. Elsevier Science (North-Holland).
[10]
Borralleras, C., Ferreira, M., and Rubio, A. 2000. Complete monotonic semantic path orderings. In Proceedings of the 17th International Conference on Automated Deduction. Lecture Notes in Computer Science, vol. 1831. Springer, 346--364.
[11]
Brand, M., Deursen, A., Heering, J., Jong, H., Jonge, M., Kuipers, T., Klint, P., Moonen, L., Olivier, P., Scheerder, J., Vinju, J., Visser, E., and Visser, J. 2001. The ASF+SDF meta-environment: A component-based language development environment. In Compiler Construction (CC ’01), R. Wilhelm, Ed. Lecture Notes in Computer Science, vol. 2027. Springer, 365--370.
[12]
Cirstea, H. and Kirchner, C. 2001. The rewriting calculus — Part I and II. Logic J. Interest Group Pure App. Logics 9, 427--498.
[13]
Cirstea, H., Kirchner, C., Liquori, L., and Wack, B. 2003. Rewrite strategies in the rewriting calculus. In Electronic Notes in Theoretical Computer Science, Vol. 86, B. Gramlich and S. Lucas, Eds. Elsevier.
[14]
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., and Talcott, C. 2003. The Maude 2.0 system. In Proceedings of the 14th International Conference on Rewriting Techniques and Applications, R. Nieuwenhuis, Ed. Lecture Notes in Computer Science, vol. 2706. Springer, 76--87.
[15]
Comon, H. 1991. Disunification: A survey. In Computational Logic. Essays in honor of Alan Robinson, J.-L. Lassez and G. Plotkin, Eds. The MIT press, Cambridge, MA, Chapter 9, 322--359.
[16]
Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., and Tommasi, M. 1997. Tree automata techniques and applications. Release October, 1st 2002.
[17]
Dershowitz, N. 1982. Orderings for term rewriting systems. Theor. Comput. Sci. 17, 279--301.
[18]
Dershowitz, N. and Hoot, C. 1995. Natural termination. Theor. Comput. Sci. 142, 2, 179--207.
[19]
Dershowitz, N. and Jouannaud, J.-P. 1990. Handbook of Theoretical Computer Science. Vol. B. Elsevier Science (North-Holland), Chapter 6: Rewrite systems, 244--320. Also as Res. rep. 478, LRI.
[20]
Dershowitz, N. and Plaisted, D. 2001. Rewriting. In Handbook of Automated Reasoning, A. Robinson and A. Voronkov, Eds. Vol. I. Elsevier Science, Chapter 9, 535--610.
[21]
Eker, S. 1998. Term rewriting with operator evaluation strategies. In Proceedings of the 2nd International Workshop on Rewriting Logic and its Applications, C. Kirchner and H. Kirchner, Eds.
[22]
Fernández, M.-L., Godoy, G., and Rubio, A. 2005. Orderings for innermost termination. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications, J. Giesl, Ed. Lecture Notes in Computer Science, vol. 3467. Springer, 17--31.
[23]
Fissore, O. 2003. Terminaison de la réécriture sous stratégies. Ph.D. thesis, Université Henri Poincaré-Nancy I, France.
[24]
Fissore, O., Gnaedig, I., and Kirchner, H. 2001. Termination of rewriting with local strategies. In Selected Papers of the 4th International Workshop on Strategies in Automated Deduction, M. P. Bonacina and B. Gramlich, Eds. Electronic Notes in Theoretical Computer Science, vol. 58. Elsevier Science (North-Holland).
[25]
Fissore, O., Gnaedig, I., and Kirchner, H. 2002a. CARIBOO: An induction based proof tool for termination with strategies. In Proceedings of the 4th International Conference on Principles and Practice of Declarative Programming. ACM Press, 62--73.
[26]
Fissore, O., Gnaedig, I., and Kirchner, H. 2002b. Outermost ground termination. In Proceedings of the 4th International Workshop on Rewriting Logic and Its Applications. Electronic Notes in Theoretical Computer Science, vol. 71. Elsevier Science (North-Holland).
[27]
Fissore, O., Gnaedig, I., and Kirchner, H. 2002c. Outermost ground termination — Extended version. Tech. rep. A02-R-493, LORIA, Nancy, France. December.
[28]
Fissore, O., Gnaedig, I., and Kirchner, H. 2003a. CARIBOO: A multi-strategy termination proof tool based on induction. In Proceedings of the 6th International Workshop on Termination, A. Rubio, Ed, 77--79.
[29]
Fissore, O., Gnaedig, I., and Kirchner, H. 2003b. Simplification and termination of strategies in rule-based languages. In Proceedings of the 5th International Conference on Principles and Practice of Declarative Programming. ACM Press, 124--135.
[30]
Fissore, O., Gnaedig, I., and Kirchner, H. 2004. A proof of weak termination providing the right way to terminate. In Proceedings of the 1st International Colloquium on Theoretical Aspects of Computing. Lecture Notes in Computer Science, vol. 3407. Springer, 356--371.
[31]
Fissore, O., Gnaedig, I., Kirchner, H., and Moussa, L. 2005. Cariboo, A termination proof tool for rewriting-based programming languages with strategies, version 1.1. Free GPL Licence, APP registration IDDN.FR.001.170013.001.S.P.2005.000.10600. Available at http://cariboo.loria.fr/.
[32]
Futatsugi, K. and Nakagawa, A. 1997. An overview of the Cafe specification environment -- An algebraic approach for creating, verifying, and maintaining formal specifications over networks. In Proceedings of the 1st IEEE International Conference on Formal Engineering Methods.
[33]
Genet, T. 1998. Decidable approximations of sets of descendants and sets of normal forms. In Proceedings of the 9th Conference on Rewriting Techniques and Applications. Lecture Notes in Computer Science, vol. 1379. Springer, 151--165.
[34]
Giesl, J. and Middeldorp, A. 1999. Transforming context-sensitive rewrite systems. In Proceedings of the 10th International Conference on Rewriting Techniques and Applications. Lecture Notes in Computer Science, vol. 1631. Springer, 271--285.
[35]
Giesl, J. and Middeldorp, A. 2003. Innermost termination of context-sensitive rewriting. In Proceedings of the 6th International Conference on Developments in Language Theory (DLT'02). Lecture Notes in Computer Science, vol. 2450. Springer, 231--244.
[36]
Giesl, J., Swiderski, S., Schneider-Kamp, P., and Thiemann, R. 2006. Automated termination analysis for Haskell: From term rewriting to programming languages. In Proceedings of the 17th International Conference on Rewriting Techniques and Applications, 297--312.
[37]
Giesl, J., Thiemann, R., and Schneider-Kamp, P. 2004. The dependency pair framework: Combining techniques for automated termination proofs. In Proceedings of the 11th International Conference on Logic for Programming, Artificial Intelligence and Reasoning. Lecture Notes in Artificial Intelligence, vol. 3452. Springer, 301--331.
[38]
Giesl, J., Thiemann, R., Schneider-Kamp, P., and Falke, S. 2003. Improving dependency pairs. In Proceedings of the 10th International Conference on Logic for Programming, Artificial Intelligence and Reasoning. Lecture Notes in Artificial Intelligence, vol. 2850. Springer, 165 --179.
[39]
Gnaedig, I. 2007. Induction for positive almost sure termination. In Proceedings of the 9th ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming. ACM Press, 167--177.
[40]
Gnaedig, I. and Kirchner, H. 2006. Computing constructor forms with non terminating rewrite programs. In Proceedings of the 8th ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming. ACM Press, 121--132.
[41]
Gnaedig, I. and Kirchner, H. 2007. Narrowing, abstraction and constraints for proving properties of reduction relations. In Rewriting, Computation and Proof. Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of His 60th Birthday, H. Comon-Lundh, et al., Eds. Lecture Notes in Computer Science, vol. 4600. Springer, 44--67.
[42]
Gnaedig, I., Kirchner, H., and Genet, T. 1999. Induction for termination. Tech. rep. 99.R.338, LORIA, Nancy, France. December.
[43]
Goguen, J., Winkler, T., Meseguer, J., Futatsugi, K., and Jouannaud, J. 1992. Introducing OBJ3. Tech. rep., Computer Science Laboratory, SRI International. March.
[44]
Goubault-Larreck, J. 2001. Well-Founded recursive relations. In Proceedings of the 15th International Workshop in Computer Science Logic (CSL'01). Lecture Notes in Computer Science, vol. 2142. Springer.
[45]
Gramlich, B. 1995. Abstract relations between restricted termination and confluence properties of rewrite systems. Fundam. Info. 24, 3--23.
[46]
Gramlich, B. 1996. On proving termination by innermost termination. In Proceedings of the 7th Conference on Rewriting Techniques and Applications, H. Ganzinger, Ed. Lecture Notes in Computer Science, vol. 1103. Springer, 93--107.
[47]
Kamin, S. and Lévy, J.-J. 1982. Attempts for generalizing the recursive path ordering. Inria, Rocquencourt.
[48]
Kirchner, C. 2005. Strategic rewriting. Electronic. Notes in Theoretical Computer. Science, vol. 124, 2, 3--9.
[49]
Kirchner, C., Kirchner, H., and Rusinowitch, M. 1990. Deduction with symbolic constraints. Revue d'Intelligence Artificielle 4, 3, 9--52. (Special issue on automatic deduction.)
[50]
Krishna Rao, M. 2000. Some characteristics of strong normalization. Theor. Comput. Sci. 239, 141--164.
[51]
Kruskal, J. B. 1960. Well-Quasi ordering, the tree theorem and Vazsonyi's conjecture. Trans. Amer. Math. Soc. 95, 210--225.
[52]
Lankford, D. S. 1979. On proving term rewriting systems are noetherian. Tech. rep., Louisiana Technical University, Mathematics Deptartment, Ruston Louisiana.
[53]
Lucas, S. 1996. Termination of context-sensitive rewriting by rewriting. In Proceedings of the 23rd International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 1099. Springer, 122--133.
[54]
Lucas, S. 2001a. Termination of on-demand rewriting and termination of OBJ programs. In Proceedings of the 3rd International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP'01), H. Sondergaard, Ed. ACM Press, New York, 82--93.
[55]
Lucas, S. 2001b. Termination of rewriting with strategy annotations. In Proceedings of the 8th International Conference on Logic for Programming, Artificial Intelligence and Reasoning, (LPAR'01), A. Voronkov and R. Nieuwenhuis, Eds. Lecture Notes in Artificial Intelligence, vol. 2250. Springer, Berlin, 669--684.
[56]
Lucas, S. 2002. Context-Sensitive rewriting strategies. Inf. Comput. 178, 1, 294--343.
[57]
Middeldorp, A. and Hamoen, E. 1994. Completeness results for basic narrowing. Appl. Algebra Eng. Commun. and Comput. 5, 3-4, 213--253.
[58]
Moreau, P.-E., Ringeissen, C., and Vittek, M. 2003. A pattern matching compiler for multiple target languages. In Proceedings of the 12th Conference on Compiler Construction, G. Hedin, Ed. Lecture Notes in Computer Science, vol. 2622. Springer, 61--76.
[59]
Nakamura, M. and Ogata, K. 2000. The evaluation strategy for head normal form with and without on-demand flags. In Proceedings of the 3rd International Workshop on Rewriting Logic and its Applications (WRLA'00), K. Futatsugi, Ed. Electronic Notes in Theoretical Computer Science, 211--227.
[60]
Nguyen, Q.-H. 2001. Compact normalisation trace via lazy rewriting. In Proceedings of the 1st International Workshop on Reduction Strategies in Rewriting and Programming (WRS' 01), S. Lucas and B. Gramlich, Eds. Vol. 57. Elsevier Science Publishers (North-Holland). http://www.elsevier.com/locate/entcs/volume57.html.
[61]
Panitz, S. E. and Schmidt-Schauss, M. 1997. TEA: Automatically proving termination of programs in a non-strict higher-order functional language. In Proceedings of the Static Analysis Symposium'97. Lecture Notes in Computer Science, vol. 1302. Springer, 345--360.
[62]
Plaisted, D. 1978. Well-Founded orderings for proving termination of systems of rewrite rules. Tech. rep. R-78-932, Department of Computer Science, Univesity of Illinois at Urbana Champaign. July.
[63]
van Oostrom, V. and de Vrijer, R. 2003. Term Rewriting Systems. Cambridge Tracts in Theoretical Computer Science, vol. 55. Cambridge University Press, Chapter 9. Strategies.
[64]
Visser, E. 2001. Stratego: A language for program transformation based on rewriting strategies. System description for Stratego 0.5. In Proceedings of the 12th International Conference on Rewriting Techniques and Applications, A. Middeldorp, Ed. Lecture Notes in Computer Science, vol. 2051. Springer, 357--361.
[65]
Visser, E. 2004. Program transformation with Stratego/XT: Rules, strategies, tools, and systems in StrategoXT-0.9. In Domain-Specific Program Generation, C. Lengauer et al., Eds. Lecture Notes in Computer Science, vol. 3016. Spinger, 216--238.
[66]
Zantema, H. 1995. Termination of term rewriting by semantic labelling. Fundam. Inf. 24, 89--105.

Cited By

View all

Index Terms

  1. Termination of rewriting under strategies

                                              Recommendations

                                              Comments

                                              Information & Contributors

                                              Information

                                              Published In

                                              cover image ACM Transactions on Computational Logic
                                              ACM Transactions on Computational Logic  Volume 10, Issue 2
                                              February 2009
                                              275 pages
                                              ISSN:1529-3785
                                              EISSN:1557-945X
                                              DOI:10.1145/1462179
                                              Issue’s Table of Contents
                                              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                                              Publisher

                                              Association for Computing Machinery

                                              New York, NY, United States

                                              Publication History

                                              Published: 02 March 2009
                                              Accepted: 01 September 2007
                                              Revised: 01 August 2007
                                              Received: 01 September 2006
                                              Published in TOCL Volume 10, Issue 2

                                              Permissions

                                              Request permissions for this article.

                                              Check for updates

                                              Author Tags

                                              1. Abstraction
                                              2. induction
                                              3. innermost
                                              4. local strategy
                                              5. narrowing
                                              6. ordering constraint
                                              7. outermost
                                              8. termination

                                              Qualifiers

                                              • Research-article
                                              • Research
                                              • Refereed

                                              Contributors

                                              Other Metrics

                                              Bibliometrics & Citations

                                              Bibliometrics

                                              Article Metrics

                                              • Downloads (Last 12 months)4
                                              • Downloads (Last 6 weeks)1
                                              Reflects downloads up to 07 Mar 2025

                                              Other Metrics

                                              Citations

                                              Cited By

                                              View all
                                              • (2021)Applications and extensions of context-sensitive rewritingJournal of Logical and Algebraic Methods in Programming10.1016/j.jlamp.2021.100680121(100680)Online publication date: Jun-2021
                                              • (2019)Analysis of Rewrite-Based Access Control PoliciesElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2009.02.072234(55-75)Online publication date: 5-Jan-2019
                                              • (2015)Rewriting Strategies and Strategic Rewrite ProgramsLogic, Rewriting, and Concurrency10.1007/978-3-319-23165-5_18(380-403)Online publication date: 27-Aug-2015
                                              • (2014)Equational Logic and RewritingComputational Logic10.1016/B978-0-444-51624-4.50006-X(255-282)Online publication date: 2014
                                              • (2013)A rewriting point of view on strategiesElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.112.15112(99-105)Online publication date: 1-Mar-2013
                                              • (2013)Programming errors in traversal programs over structured dataScience of Computer Programming10.1016/j.scico.2011.11.00678:10(1770-1808)Online publication date: 1-Oct-2013
                                              • (2012)Twenty years of rewriting logicThe Journal of Logic and Algebraic Programming10.1016/j.jlap.2012.06.00381:7-8(721-781)Online publication date: Oct-2012
                                              • (2011)Automated termination proofs for haskell by term rewritingACM Transactions on Programming Languages and Systems (TOPLAS)10.1145/1890028.189003033:2(1-39)Online publication date: 7-Feb-2011
                                              • (2011)Proving weak properties of rewritingTheoretical Computer Science10.1016/j.tcs.2011.04.028412:34(4405-4438)Online publication date: Aug-2011
                                              • (2010)Extensional and Intensional StrategiesElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.15.115(1-19)Online publication date: 26-Jan-2010
                                              • Show More Cited By

                                              View Options

                                              Login options

                                              Full Access

                                              View options

                                              PDF

                                              View or Download as a PDF file.

                                              PDF

                                              eReader

                                              View online with eReader.

                                              eReader

                                              Figures

                                              Tables

                                              Media

                                              Share

                                              Share

                                              Share this Publication link

                                              Share on social media