<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Methods for Solving the Post Correspondence Problem and Certificate Generation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Akihiro</forename><surname>Omori</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematical and Computing Science</orgName>
								<orgName type="institution">Tokyo Institute of Technology</orgName>
								<address>
									<settlement>Tokyo</settlement>
									<country key="JP">Japan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yasuhiko</forename><surname>Minamide</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Mathematical and Computing Science</orgName>
								<orgName type="institution">Tokyo Institute of Technology</orgName>
								<address>
									<settlement>Tokyo</settlement>
									<country key="JP">Japan</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Methods for Solving the Post Correspondence Problem and Certificate Generation</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">47DF168971F504B3980827E493091611</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:35+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Post&apos;s Correspondence Problem</term>
					<term>Formal Verification</term>
					<term>Reachability Problem</term>
					<term>Automata</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Post Correspondence Problem (PCP) is a well-known undecidable problem. Solving instances with solutions is straightforward with exploration algorithms, but proving infeasibility is challenging. This research introduces two methods to demonstrate infeasibility, including generating formal proofs in Isabelle/HOL.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The Post Correspondence Problem (PCP), proposed by Post in 1946 <ref type="bibr" target="#b0">[1]</ref>, is undecidable. PCP instances use tiles with two strings on top and bottom. <ref type="bibr">100</ref> 1 0 100 1 00</p><p>In this example, there are three kinds of tiles, each available in infinite quantities. The problem is to determine whether it is possible to arrange one or more tiles in such a way that the reading of the top and bottom strings matches. In this particular instance, a solution (indices of arrangement of tiles) is "1311322", and this shows that both the top and bottom read "1001100100100". For instances that have a solution, it is possible to find the solution within finite time using an exploration algorithm. On the other hand, determining that no solution exists is challenging, and due to the undecidability of the problem, no general algorithm exists for this purpose. Previous research has proposed heuristic algorithms for finding solutions <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref> and Ling <ref type="bibr" target="#b1">Zhao (2003)</ref>  <ref type="bibr" target="#b1">[2]</ref> attempted to solve all the problems in PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> and left 3,170 problems unsolved. PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> refers to a set of all instances where the number of tiles is 3, and the maximum length of the written strings is 4.</p><p>This research makes the following three main contributions. • Propose two novel algorithms to demonstrate that a PCP instance has no solution.</p><p>• Solve all problems of PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> except for 13 problems.</p><p>• Show an example of automatic proof generation for concrete problems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">The First Method: String Constraint Formulation</head><p>We formulate PCP as a string constraint problem. Regarding the string constraint 𝜙 of the PCP instance 𝐼, the satisfiability is undecidable. We consider 𝜙 ′ such that 𝜙(𝑤) ⟹ 𝜙 ′ (𝑤) and is efficiently decidable. Such 𝜙 ′ is referred to as a relaxation problem (simply relaxation) of 𝜙. By showing that 𝜙 ′ is unsatisfiable, we would like to show that 𝜙 is also unsatisfiable. For example, considering only the number of characters |𝑇 𝑔 (𝑤)| = |𝑇 ℎ (𝑤)| is suitable as 𝜙 ′ . Additionally, matching Parikh images or the number of specific words is another example of 𝜙 ′ . Generalizing these examples, we have the following proposition.</p><p>Proposition 2.3. Let 𝑊 be an arbitrary total integer-vector-output transducer. Consider</p><formula xml:id="formula_0">𝑊 (𝑇 𝑔 (𝑤)) ∩ 𝑊 (𝑇 ℎ (𝑤)) ≠ ∅<label>(1)</label></formula><p>This is a relaxation problem of 𝜙 and is decidable. We set some 𝑊 and hope it is infeasible.</p><p>Although details are omitted, the condition 𝑊 (𝑇 𝑔 (𝑤)) ∩ 𝑊 (𝑇 ℎ (𝑤)) ≠ ∅ can be reduced to the emptiness problem of a Parikh automaton constructed from 𝑊, 𝑇 𝑔 , 𝑇 ℎ , and their product. The Parikh automaton emptiness algorithm we use is largely similar to the one described in Section 3 of <ref type="bibr" target="#b3">[4]</ref>, so we omit the details. While not detailed here, our algorithm achieved significant speedup by applying two techniques to this algorithm: (1) delaying and dynamically adding constraints related to connectivity, and (2) reducing the problem to a natural form for Mixed Integer Programming and leveraging a cutting-edge MIP solver.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The Second Method: Transition System Formulation</head><p>Intuitively, arranging each tile one by one represents a transition, and "the remaining part of the string and whether it is on the top or bottom" represents a state. We call such a pair configuration. PCP can be formulated as a reachability problem: "Is it possible to reach the state of the empty string?" , the next state will be "top, remainder 0111. "</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Problem Definition</head><p>We formulate PCP as a reachability problem. First, we define the transition system of PCP.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3.2 (Transition System of PCP)</head><p>. Let 𝐼 = ((𝑔 1 , ℎ 1 ), … , (𝑔 𝑠 , ℎ 𝑠 )) be a PCP instance of size 𝑠 over Σ. We define the transition system 𝑇 𝑟 = (𝑄, 𝑇 , 𝐼 𝑛𝑖𝑡, 𝐵𝑎𝑑) as follows.</p><p>• State set 𝑄 = {top, bottom} × Σ * .</p><p>• Transition function 𝑇 ∶ 𝑄 → 2 𝑄 is defined as follows.</p><formula xml:id="formula_1">𝑇 (bottom, 𝑤) = {(bottom, 𝑤 ′ ) | ∃𝑖 ≤ 𝑠. 𝑤ℎ 𝑖 = 𝑔 𝑖 𝑤 ′ } ∪ {(top, 𝑤 ′ ) | ∃𝑖 ≤ 𝑠. 𝑤ℎ 𝑖 𝑤 ′ = 𝑔 𝑖 } 𝑇 (top, 𝑤) = {(top, 𝑤 ′ ) | ∃𝑖 ≤ 𝑠. 𝑤𝑔 𝑖 = ℎ 𝑖 𝑤 ′ } ∪ {(bottom, 𝑤 ′ ) | ∃𝑖 ≤ 𝑠. 𝑤𝑔 𝑖 𝑤 ′ = ℎ 𝑖 }</formula><p>• Bad state set 𝐵𝑎𝑑 = {(top, 𝜖), (bottom, 𝜖)}.</p><p>• Intial state set 𝐼 𝑛𝑖𝑡 = 𝑇 (top, 𝜖).</p><p>The states after arranging one tile is considered the initial state, as an empty arrangement is not valid.</p><p>In the following, 𝑇 is naturally extended and used as 𝑇 ∶ 2 𝑄 → 2 𝑄 . The behavior of the transition 𝑇 (bottom, 𝑤) is illustrated below. When 𝑤 is the current state, adding (𝑔 𝑖 , ℎ 𝑖 ) results in the remaining part becoming the next state 𝑤' . There are two patterns: one where the same side as the previous state continues, and one where the side changes. If 𝐼 𝑛𝑣 exists, then it implies that 𝐵𝑎𝑑 is unreachable from initial states.</p><p>In the following section, we introduce algorithms to discover 𝐼 𝑛𝑣.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Algorithm</head><p>For the Reachability Problem, many powerful algorithms like PDR (Property Directed Reachability) <ref type="bibr" target="#b4">[5]</ref> exist. We extended PDR and achieved some success (see <ref type="bibr">Section 5)</ref>. We also devised a novel ad-hoc method specific to PCP, described below.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3.6 (Configuration Automaton</head><p>). Let 𝑠 ∈ {top, bottom} and 𝐴 be a finite automaton over Σ. We call the pair (𝑠, 𝐴) the configuration automaton. The language of (s, A) is denoted as 𝐿(𝑠, 𝐴) and defined as follows. This represents a state set of the transition system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝐿(𝑠, 𝐴) = {(𝑠, 𝑤) | 𝑤 ∈ 𝐿(𝐴)}</head><p>The aim of this algorithm is to discover a pair of configuration automata (for top and bottom) that represents 𝐼 𝑛𝑣. It should be noted that not every 𝐼 𝑛𝑣 has such a pair due to the regularity of the underlying automata, which limits the scope of our consideration.</p><p>This algorithm manages a graph 𝐺 = (𝑉 , 𝐸) where each node is a configuration automaton. Specifically, each node 𝑣 is associated with a set of states of a transition system. The algorithm proceeds by expanding the overall union 𝐿(𝑉 ) = ⋃ 𝑣 𝐿(𝑣) until it becomes an invariant.</p><p>Intuitively, the edge (𝑢, 𝑣) in this graph represents a dependency relationship. This relationship means "if 𝑣 cannot reach 𝐵𝑎𝑑, then 𝑢 cannot reach 𝐵𝑎𝑑 either". If we can construct a graph where every node has such dependencies and does not contain any bad state, then 𝐿(𝑉 ) is an invariant. There are two types of this relation, as follows.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Inclusion relation: 𝐿(𝑢) ⊊ 𝐿(𝑣) 2. Transition relation: 𝑇 (𝐿(𝑢)) = 𝐿(𝑣)</head><p>The algorithm is essentially a breadth-first search (BFS). When considering only the transition relation, the process operates similarly to BFS. A distinctive feature of this algorithm is that it proactively abstracts nodes. For example, when a node such as (top, 0011101) appears, the algorithm attempts to create a node like (top, . * 110. * ) (we use a regex to represent an automaton) and draw an edge to it. If this abstracted node can reach 𝐵𝑎𝑑, it is removed and backtracking is performed. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Certificate Generation</head><p>So far, we have presented two methods and complicated algorithms. However, there is a significant possibility that my implementations for these algorithms may contain bugs. Even if we successfully solve all instances of PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>, our results would still be far from being considered trusted facts. Therefore, we decided to have our algorithm output proofs in the form of Isabelle/HOL code. Another possible approach is to use Isabelle/HOL or similar tools to verify the correctness of the algorithm's implementation. However, this makes it difficult to optimize the algorithm for speed. For instance, The first method relies on an external MIP solver for its efficiency, making it challenging. Additionally, for others to quickly trust our results, it is crucial that all instances of 𝑃𝐶𝑃 <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> and their proofs are organized and verified within some proof assistant such as Isabelle/HOL.</p><p>Currently, only the second method is capable of outputting a certificate. The first method will be addressed as future work (see Section 6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Certificate: Pair of Automata</head><p>Consider the transition system of a PCP instance. By defining the invariant concretely in Isabelle/HOL and proving each of the invariant conditions (see Definition 3.4), we can validate it. This method is independent of the implementation details used in the second method and can be utilized by various algorithms discovering invariants.</p><p>Our implementation of the second method generates the following code. Proofs such as "the existence of 𝐼 𝑛𝑣 implies that the PCP has no solution" were conducted manually in advance. Examples of complete proofs are found on the author's GitHub repository <ref type="bibr" target="#b5">[6]</ref>. <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> In this research, we address the instances of PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>. Ling Zhao (2003) <ref type="bibr" target="#b1">[2]</ref> attempted to solve all these instances but left 3,170 unsolved. The list of these instances is available on his website <ref type="bibr" target="#b6">[7]</ref>. Our goal was to solve all instances of PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>, gradually reducing the number of unsolved problems. As shown in Figure <ref type="figure">5</ref>, the initial 3,170 unsolved problems were reduced to 127 using the first method. After several additional methods, only 13 problems remained unsolved. These remaining problems are listed on the author's website <ref type="bibr" target="#b7">[8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Application to PCP</head><p>PDR, SAT, Method2(1), and Method2(2) are techniques for discovering 𝐼 𝑛𝑣. Certificate generation is implemented for those methods. The method SAT uses a SAT solver to discover 𝐼 𝑛𝑣, while Method2(1) and Method2(2) differ in their abstraction methods. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion and Future Work</head><p>We have been working for a complete resolution of PCP <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> and came close, with only 13 instances remaining unsolved. To have these results accepted as trusted facts, we also aim to provide formal proofs using Isabelle/HOL for each instance, which has been achieved for the second method. Although both goals are yet to be fully achieved, we believe they are attainable as outlined below.</p><p>To solve the remaining 13 problems, we consider two possibilities. One is to solve these instances manually. We predict that most of the 13 problems do not have solutions, and providing ad-hoc proofs by humans might be the quickest way. The other possibility involves devising new variants of the methods in this paper or investing additional computational resources. Since the manual approach can also help gain deeper insights into individual instances and PCP itself, we would like to first aim for manual resolution.</p><p>Generating certificates for the first method is challenging because it uses an external Mixed Integer Programming (MIP) solver as a subroutine. Generating a certificate for the feasibility of an MIP is straightforward, as it merely requires providing a specific solution. However, generating a certificate for infeasibility is more difficult. <ref type="bibr" target="#b8">Cheung et al. (2017)</ref>  <ref type="bibr" target="#b8">[9]</ref> extended the existing MIP solver SCIP to output easily verifiable certificates in their own format. We believe that we can overcome this difficulty by converting these certificates into Isabelle/HOL code.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>SCSS 2024 :</head><label>2024</label><figDesc>10th International Symposium on Symbolic Computation in Software Science, August 28-30, 2024, Tokyo, Japan Envelope omori.a.ab@m.titech.ac.jp (A. Omori); minamide@c.titech.ac.jp (Y. Minamide)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Example 3 . 1 .</head><label>31</label><figDesc>When arranging two tiles like 100 1 10 0 , the state representing it is "top, remainder 010. " If a transition is made by appending 111 01</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Definition 3 . 3 (Definition 3 . 4 (</head><label>3334</label><figDesc>Reachability Problem of PCP). Does there exist 𝑛 such that 𝑇 𝑛 (𝐼 𝑛𝑖𝑡) ∩ 𝐵𝑎𝑑 ≠ ∅ Inductive Invariant of PCP). A set 𝐼 𝑛𝑣 that satisfies the following three conditions is called an inductive invariant (simply invariant).• 𝐼 𝑛𝑖𝑡 ⊆ 𝐼 𝑛𝑣 • 𝐼 𝑛𝑣 is closed under 𝑇: 𝑇 (𝐼 𝑛𝑣) ⊆ 𝐼 𝑛𝑣 • 𝐼 𝑛𝑣 does not include 𝜖: 𝐵𝑎𝑑 ∩ 𝐼 𝑛𝑣 = ∅ Lemma 3.5.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 .Figure 4 :</head><label>44</label><figDesc>Figure 4 shows a successful execution example for 1111 1 0 11 1 1100 . The square nodes represent nodes with singleton languages, and the round nodes are abstracted nodes with regular expressions appearing in their labels. The dotted lines represent inclusion relations, and the solid lines represent transition relations. Note that in this figure, the transition relations are extended to 𝑛 (where 𝑛 ≥ 1) steps, with intermediate steps omitted.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>1 .</head><label>1</label><figDesc>Definition of the PCP instance 2. Definition of 𝐼 𝑛𝑣 a) The top-side Automaton b) The bottom-side Automaton 3. Proof of the closedness of 𝐼 𝑛𝑣 a) Definition of 𝑇 (𝐼 𝑛𝑣) (in the form of a specific pair of deterministic automata) b) Concrete definition of the automaton for 𝐼 𝑛𝑣 ∩ 𝑇 (𝐼 𝑛𝑣) c) Proof of 𝐼 𝑛𝑣 ∩ 𝑇 (𝐼 𝑛𝑣) = ∅ d) Proof of 𝐼 𝑛𝑣 ∩ 𝑇 (𝐼 𝑛𝑣) similarly, and show that 𝑇 (𝐼 𝑛𝑣) ⊆ 𝐼 𝑛𝑣</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Figure 2: 𝑇 ℎ Definition 2.2 (</head><label></label><figDesc>We denote the top and bottom strings on the 𝑖-th tile by 𝑔 𝑖 and ℎ 𝑖 , respectively. Let 𝑇 𝑔 and 𝑇 ℎ be transducers as defined below. Intuitively, the transducer 𝑇 𝑔 outputs 𝑔 1 for '1', 𝑔 2 for '2', and does not accept the empty string. The string 𝑤 is a solution to the PCP if and only if 𝑇 𝑔 (𝑤) = 𝑇 ℎ (𝑤). String Constraint of PCP). The constraint 𝑇 𝑔 (𝑤) = 𝑇 ℎ (𝑤) created in this way is called the string constraint of instance 𝐼.</figDesc><table><row><cell></cell><cell>1/1111</cell><cell>1/1111</cell><cell></cell><cell></cell><cell>1/1110</cell><cell>1/1110</cell><cell></cell></row><row><cell>𝑞 0</cell><cell>2/1101</cell><cell>𝑞 𝑓</cell><cell>2/1101</cell><cell>𝑞 0</cell><cell>2/1</cell><cell>𝑞 𝑓</cell><cell>2/1</cell></row><row><cell></cell><cell>3/11</cell><cell></cell><cell></cell><cell></cell><cell>3/1111</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>3/11</cell><cell></cell><cell></cell><cell></cell><cell>3/1111</cell><cell></cell></row><row><cell>Figure 1: 𝑇 𝑔</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>Example 2.1 (Example of 𝑇 𝑔 and 𝑇 ℎ ). Let PCP instance 𝐼 = ((1111, 1110), (1101, 1), (11, 1111)).</note></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was supported by JSPS KAKENHI Grant Number 19K11899 and 24K14891.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A variant of a recursively unsolvable problem</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">L</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin of the American Mathematical Society</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="page" from="264" to="268" />
			<date type="published" when="1946">1946</date>
		</imprint>
	</monogr>
	<note>Post</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Tackling Post&apos;s correspondence problem</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zhao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computers and Games</title>
				<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="326" to="344" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Creating difficult instances of the post correspondence problem</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Lorentz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computers and Games</title>
				<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="214" to="228" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">On the complexity of equational horn clauses</title>
		<author>
			<persName><forename type="first">N</forename><surname>Verma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Seidl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schwentick</surname></persName>
		</author>
		<idno type="DOI">10.1007/11532231_25</idno>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="337" to="352" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Sat-based model checking without unrolling</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Bradley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI&apos;11</title>
				<meeting>the 12th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI&apos;11<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="70" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">A</forename><surname>Omori</surname></persName>
		</author>
		<ptr target="https://github.com/Mojashi/pcp-proof" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Zhao</surname></persName>
		</author>
		<ptr target="https://webdocs.cs.ualberta.ca/~games/PCP" />
		<title level="m">Pcp documents</title>
				<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Unresolved problems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Omori</surname></persName>
		</author>
		<ptr target="https://pcp-vis.pages.dev/gallery" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Verifying integer programming results</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K H</forename><surname>Cheung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gleixner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">E</forename><surname>Steffy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Integer Programming and Combinatorial Optimization</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Eisenbrand</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Koenemann</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="148" to="160" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
