2010
DOI: 10.4204/eptcs.15.5
|View full text |Cite
|
Sign up to set email alerts
|

Extending Context-Sensitivity in Term Rewriting

Abstract: We propose a generalized version of context-sensitivity in term rewriting based on the notion of "forbidden patterns". The basic idea is that a rewrite step should be forbidden if the redex to be contracted has a certain shape and appears in a certain context. This shape and context is expressed through forbidden patterns. In particular we analyze the relationships among this novel approach and the commonly used notion of context-sensitivity in term rewriting, as well as the feasibility of rewriting with forbi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…Finally, in Section 5 we extended our approach to strategies defined by forbidden patterns [6]. Forbidden patterns are very expressive and in particular, they can also be used to describe strategies such as innermost, outermost, or context-sensitive rewriting.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, in Section 5 we extended our approach to strategies defined by forbidden patterns [6]. Forbidden patterns are very expressive and in particular, they can also be used to describe strategies such as innermost, outermost, or context-sensitive rewriting.…”
Section: Resultsmentioning
confidence: 99%
“…Finally, recently a generalization of innermost / outermost / context-sensitive rewriting has been introduced: rewriting with forbidden patterns [6]. In this paper we also develop a decision procedure for loops under forbidden patterns.…”
Section: Introductionmentioning
confidence: 99%
“…To support a broad variety of strategies we consider forbidden pattern rewriting, which covers for instance innermost, outermost, and context-sensitive rewriting [9,15]. Hence the formalization of techniques for forbidden pattern strategies has the significant advantage that a wide range of strategies can be treated by the same formalism, so CeTA internally converts all outermost and context-sensitive strategies into forbidden patterns before the certifier for nontermination proofs is invoked, cf.…”
Section: Forbidden Patternsmentioning
confidence: 99%
“…It now covers techniques for nonlooping nonterminating TRSs. Moreover, as strategy specification we now support an extended version of forbidden patterns [9], which generalizes many common strategies like (leftmost)innermost, (leftmost)-outermost, and context-sensitive rewriting [15]. Finally, we also integrated a mechanism to support partial nontermination proofs, which further increases the applicability of our certifier and led to the detection of a severe soundness bug of AProVE, which has now been fixed.…”
Section: Introductionmentioning
confidence: 99%
“…• For the termination analysis one is not restricted to the CDP framework. One can for instance use the transformation of [11].…”
Section: For All Cdp Sequencesmentioning
confidence: 99%