Parameterized Reachability Trees for Algebraic Petri Nets

Size: px
Start display at page:

Download "Parameterized Reachability Trees for Algebraic Petri Nets"

Transcription

1 Parameterized Reachability Trees for Algebraic Petri Nets Karsten Schmidt Humboldt Universität zu Berlin, Institut für Informatik Unter den Linden 6, Berlin keywords: nets, analysis of higher level net models Abstract This paper is concerned with parameterized reachability trees, which have been proposed by M. Lindquist for predicate/transition nets. We discuss the application of this concept to algebraic nets. For this purpose a slight modification of several definitions is necessary due to the different net descriptions, transition rules and theoretical backgrounds. That s why we present the whole concept from the bottom for algebraic nets. The work related to this research is supported by the Deutsche Forschungsgemeinschaft within SFB Introduction The main idea of higher level Petri net models is to distinguish the control and data flow of a system from data representations, which usually appear as net inscriptions. This way small and descriptive models can be derived even for complex systems. There are two important classes of formalisms for the analysis of such a model. The first one deals with the translation of the model into a low level net (that is, a place/transition net or a condition/event net). This way all the analysis methods which have been developed for these net classes can be established for higher level nets, too. Unfortunately this approach fails in most cases where the domains of the involved data are infinite, since an equivalent low level representation in this case usually does not exist. Using the second class of formalisms, one deals with a symbolic manipulation of the net inscriptions. This way one tries to avoid the necessity to regard all the infinitely many imaginable values of the data involved in the system. A well known representative of this group is doubtless the invariant method ([Jen81], [Rei91],[Sch94]). Apart from this, symbolic methods can be established for other formalisms as well, even for reachability analysis. In [Lin89] a formalism based on symbolic computations has been presented to derive a reduced representation of the reachability graph for predicate/transition nets. The aim of this paper is to apply this formalism to algebraic Petri nets ([Rei91]). Though the main ideas are completely the same as for predicate/transition nets, one has to pay attention to the differences between the two net classes, which force several modifications of details involved in the calculus. Among other things there are for instance different transition rules (due to the safe interpretation of predicate/transition nets), different formalisms behind the data representations and a different distribution of the data description between transitions and arcs. Therefore some notations and even some of the concepts which have been introduced in [Lin89] have to be modified. For this reason we present the whole story from the bottom for algebraic nets. Parameterized reachability trees are folded representations of the usual reachability graphs, that is, they contain the complete information on the reachability of markings. So the method has much in common with the reduction of reachability graphs due to the equivalent marking method (cf. [Sta91], [HJJ84]), but for parameterized reachability analysis it is not necessary to perform any preprocessing, for instance to compute the net symmetries (cf. [SSt91], [Sch93]). The main idea is rather to fire transitions symbolically, that is, without explicitly fixing the occurrence mode. This firing mode is represented by a symbol a parameter only. The- 1

2 refore the successor marking is an expression which depends on this parameter. For every assignment of a permitted occurrence mode to a corresponding parameter this expression can be evaluated to a reachable marking. But since we do not perform this evaluation during the construction of the graph, we may reduce the combinatorial explosion of the state space. We will present an example which illustrates this reduction. 2 Basic Definitions First we recall some basic concepts from the theory of abstract data types. For details, please refer to [EM85]. Definition 1 (Specifications) A signature Σ = [S, Ω] consists of a set S of sorts and a family Ω = {Ω w,s } w S,s S of operation symbols. For e being the empty word, Ω e,s is the set of constant symbols of sort s. A set of Σ variables is a family X = {X s } s S of variables. The set T Ω,s (X) of (Ω, X) terms of sort s is inductively defined by 1. X s Ω e,s T Ω,s (X) and 2. for ω Ω s1 s n,s and T i T Ω,si (X), ω(t 1,,T n ) T Ω,s (X). The set T Ω,s := T Ω,s ( ) contains the ground terms of sort s, T Ω (X) := s S T Ω,s(X) is the set of Σ terms over X, and T Ω := T Ω ( ) is the set of Σ ground terms. A Σ equation of sort s over X is a pair [L, R] of terms L, R T Ω,s (X). A specification D = [Σ, E] consists of a signature Σ and a set E of Σ equations. Definition 2 (Algebras) A Σ algebra A = [S A, Ω A ] consists of a family S A = {s A } s S of domains and a set Ω A = {ω A ω Ω} of operations, where ω A : s 1A s na s A for ω Ω s1 s n,s. The elements ω A for ω Ω e,s can be identified with elements of s A. An assignment is a family α = {α s } s S of mappings α s : X s s A. An evaluation according to an assignment α is a family of mappings {α # s } s S with α # s : T Ω,s (X) s A which is defined inductively by 1. α # s (x) := α s (x) for x X s, and 2. α # s (ω(t 1,, T n )) := ω A (α # s 1 (T 1 ),, α # s n (T n )) for ω Ω s1 s n,s. For ground terms T T Ω,s we define the value of T in A # A (T) := α # s (T) for an arbitrary assignment α (the value is actually not dependent on α, since ground terms do not contain variables). A Σ equation [L, R] is valid in a Σ algebra A iff for all assignments α, α # (L) = α # (R). For a specification D = [Σ, E] the Σ algebra A is a D algebra ( or a model of D) iff all the equations in E are valid in A. Definition 3 (Substitutions) Let X and Y be two sets of Σ variables. A substitution X is an assignment σ : X T Ω (Y ), (X s T Ω,s (Y )). A ground substitution is a substitution σ : X T Ω. An injective substitution σ : X Y is called renaming. For a term T and a substitution σ the term σ(t) (often written as Tσ) results from simultaneously replacing the variables in T by their corresponding σ values. Definition 4 (Term Equivalence) Two terms T 1 and T 2 are equivalent according to a specification D = [Σ, E] (T 1 E T 2 ) iff for all D algebras A and all assignments α in A, α # A (T 1) = α # A (T 2). E is an equivalence relation on T Ω (X). It is actually a congruence relation, i.e. T 1 E T 2 implies T 1 σ E T 2 σ for arbitrary substitutions σ. With [T] E we denote the equivalence class of the term T according to the relation E. Definition 5 (Initial Algebra) Let D = [Σ, E] be a specification. The initial algebra I of D consists of the domains s I := {[T] E T T Ω,s } and the operations ω I with ω I ([T 1 ] E,, [T n ] E ) := [ω(t 1,, T n )] E. Due to the properties of the relation E the initial algebra is a model of D. Furthermore it satisfies the no junk property (every element of I is represented by a ground term) and the no confusion property (there are no equations valid except those which are implied by E). Though there are several models for a specification and it is very interesting to obtain results which are valid for several models, we will consider exclusively initial algebras in the sequel. Definition 6 (Multisets) For a set M, a multiset over M is a mapping from M into the integer numbers. A multiset is semipositive iff all the values are greater or equal 0. A multiset is finite iff it has finite support. The empty multiset over M, denoted by ϑ M, assigns 0 to every element of M. For an element m M, the multiset m assigns 1 to m and 0 to every other m M. The multisets µ 1 + µ 2 and µ 1 µ 2 are defined by (µ 1 + µ 2 )(m) := µ 1 (m)+µ 2 (m) and (µ 1 µ 2 )(m) := µ 1 (m) µ 2 (m). This way every finite multiset can be represented as 2

3 a formal sum of the m(m M). In such formal sums we usually write m instead of m. A multiset µ 1 is less or equal to µ 2 iff for all m M, µ 1 (m) µ 2 (m). Note, that we do without scalar multiplication of multisets. This will simplify some future considerations. For multisets of terms we have to define an alternative comparison relation, which is closer related to the relation E. Definition 7 (Multiterms) A multiterm is a multiset over a set of terms. A multiterm µ 1 represented by the formal sum µ 1 = T 1 + T m is less or equal to µ 2 = T T n with respect to the set of equations E (µ 1 E µ 2 ) iff [T 1 ] E + + [T m ] E [T 1 ] E + + [T n ] E. Definition 8 (Algebraic Petri Nets) A tuple AN = [D; P, T, F; ψ, ξ, λ; m 0 ] is an algebraic Petri net iff 1. D = [Σ, E] is a specification with Σ = [S, Ω]; 2. [P, T, F] is a net, i.e. P and T are finite and disjoint sets called places and transitions, respectively, and F is a relation F (P T) (T P), the elements of which are called arcs; 3. ψ is a sort assignment ψ : P S; 4. ξ assigns a set of Σ variables ξ(t) to each transition t T; 5. λ is the arc inscription such that for f = [p, t] or f = [t, p] in F, λ(f) is a multiterm over T Ω,ψ(p) (ξ(t)); 6. m 0 is a marking, i.e. it assigns a finite multiterm over T Ω,ψ(p) to every p P. m 0 is called the initial marking. For f / F we define λ(f) := ϑ. With t and t + we denote the P vectors defined by t (p) := λ([p, t]) and t + (p) := λ([t, p]), respectively. It is possible to interpret an algebraic Petri net according to an arbitrary model of the specification D. The result is a colored net. This way all the behavioral aspects of an algebraic net can be traced back to colored nets. Since we will restrict ourselves to the initial algebra only, we can define the transition rule of an algebraic net directly. Definition 9 (Transition Rule) Any ground substitution β of ξ(t) is an occurrence mode of transition t T. A transition t T is enabled in an occurrence mode β at a marking m iff for all p P with [p, t] F, λ([p, t])β E m(p). If t is enabled in β at m, then t may fire yielding the marking m, where for all p P, m (p) = m(p) λ([p, t])β + λ([t, p]β. We write m t,β m in this case. The set of markings reachable from a target marking m, written R AN (m ), is the smallest set of markings, which contains m and if m R AN (m ) and m t,β m for some occurrence mode β, then there is a marking in R AN (m 0 ) which is componentwise equivalent to m with respect to E. For further details according to algebraic Petri nets, please refer to [Rei91]. 3 Parameterized Markings In the introduction we mentioned that parameterized markings are expressions which involve original markings and their change by transition occurrences. These expressions can be written as multiterms of the kind < old marking > t + t +, where the t and t + contain variables which serve as the parameters for the occurrence mode (an example will be presented at the end of the paper). Unfortunately the concept of multisets is not completely sufficient to obtain sound results. Some of these problems will be considered in section 5. For the moment we should accept that we need a more expressive structure than multiterms for the description of parameterized markings. The difference we have to make is to pay attention to the order, in which we insert terms into a multiterm. For this purpose we make a more restrictive use of the concept formal sum and distinguish carefully the formal sums from multiterms. Especially we assume the entries in a formal sum to be in a fixed order which we never change during computations. This way (when we add tokens always at the right end of the sum) we preserve the knowledge about the order in which we have added the terms. We will emphasize this distinction by using the special and signs for formal sums, while we carry on using the + and signs to operate on multiterms. Definition 10 A formal sum is inductively defined by 3

4 1. The empty word is a formal sum; 2. A single term is a formal sum; 3. Given a formal sum L and and a term T, L T and L T are formal sums. Given a formal sum L = [ ]T 1 T 2 T 3 T n we say, that n is the length of L, T i is the term at position i of L, for all the terms T 1,,T i 1 we say that they appear left of T i, while all the terms T i+1,, T n appear right of T i. All the formal sums [ ]T 1 T 2 T j(j n) where every term T i (1 i j) is preceded by the same sign as in L is called prefix of L. All the terms in L which are preceded by the occur negative, the remaining ones positive. Definition 11 Let L be a formal sum and M = T 1 + +T n a semipositive multiterm. If we want to add the terms T 1,,T n to L and the order of the terms in M is of no interest, then we write L M for L T 1 T n and L M for L T 1 T n, respectively. The next definition establishes a connection between multiterms and formal sums. Definition 12 Let L be a formal sum. Then L is the multiterm which is represented by replacing the symbols and appearing in L by + and, respectively. Parameterized markings are P vectors. Every component of this vector will be a formal sum as defined above. The only restriction is that the terms appearing in the component p of course have to respect the sort ψ(p). Definition 13 A parameterized marking is a P vector of formal sums, where the formal sum belonging to a place p consists only of terms which are contained in T Ω,ψ(p) (X). To be able to handle parameterized markings correctly, we have to specify their meaning. For this purpose we consider the set of all those markings, which arise from fixing the parameters. Naturally we consider only those fixings which lead to sound markings, that is semipositive multisets in every component. Unfortunately this restriction is not sufficient to obtain a useful interpretation of parameterized markings in every case. Instead we require, that not only the formal sums in a parameterized marking describe semipositive multiterms, but also all their prefixes. As mentioned above, the reasons for this additional requirement will be taken up in section 5. Definition 14 Let M be a parameterized marking. UNFOLD(M) is the set of all P vectors m for which a ground substitution σ of the variables occurring in M exists such that for all places p it holds m(p) = M(p)σ and all prefixes L of M(p) satisfy Lσ E ϑ. Since especially all the M(p)σ have to be non negative multiterms, UNFOLD(M) is a sound set of markings. Example. Consider the vector M = (a b x c, a b c x, x) where a, b, c are assumed to be constant symbols while x stands for a variable. UNFOLD(M) consists of (a + c, a + c, b) and (b + c, b + c, a), while (a + b, a + b, c) is not in UNFOLD(M), since for x instantiated to c the prefix a b x of the first component of M does not stand for a semipositive multiterm. 4 Operations on Parameterized Markings This section is concerned with operations we will apply to parameterized markings during the construction or interpretation of a parameterized reachability tree. In order to translate the idea of symbolic computation into action, all these operations should be based on syntactical operations, such as unification, and they should work without unfolding a parameterized marking into a set of real markings. At least any complete unfolding should be avoided. Before starting, we present a characterization for UNFOLD(M) which is more suitable for the operations considered in the sequel. Normally, when one wants to instantiate a multiterm in such a way, that the instance becomes semipositive, one looks for terms occurring with negative multiplicity and tries to find corresponding terms with positive multiplicity such that these two terms cancel each other out. Thereby one instantiates the multiterm step by step, since one has to unify the terms before cancelling them out. Trying all possible ways to assign 4

5 negative entries to unifiable positive ones and cancelling them out one finds successively all semipositive instances of the target multiterm. The situation for unfoldings seems to be much more complicated, since not only the multiterm represented by the whole formal sum has to be semipositive, but also all multiterms corresponding to its prefixes. The following theorem states, that in principle the same procedure as explained above can be applied to find the elements of UNFOLD(M), with only one difference, namely that we look for positive counterparts of a negative term T only left of its appearance in a formal sum. Theorem 1 Let M be a parameterized marking. UNFOLD(M) is the set of all those markings m for which there is a ground substitution σ of the variables appearing in M and for all places p it holds 1. there is an injective mapping ϕ p from the negative terms appearing in M(p) to the positive terms appearing in M(p) such that for every term T appearing negative in M(p) it holds 1.1. ϕ p (T) appears left of T and 1.2. Tσ E ϕ p (T)σ, 2. for every place p, M(p)σ E m(p). We skip the quite technical proof. Example. Consider the same vector as in the previous example M = (a b x c, a b c x, x) In the first component we may map x either to a or to b. Mapping x to a we have to instantiate x to a. Therefore we have to map x to a in the second component, too. The third component does not inherit any restrictions, and therefore M[x a] = (b+c, b+c, a) is contained in UNFOLD(M) as well as (a + c, a + c, b) which we obtain by mapping x to b in both the first and second component. In contrary we are not allowed to map x to c in the first component, since c appears right of x. Doing that nevertheless, we would obtain the wrong marking (a + b, a + b, c) With the help of this theorem several operations on parameterized markings can be performed. Emptiness of UNFOLD(M). The first operation on parameterized markings we will need in the sequel is the test whether or not there are markings contained in the unfolding of a target marking M. This test can be derived immediately from theorem 1. Let M be a parameterized marking. It holds UNFOLD(M) = iff there is an (arbitrary!) substitution σ for the variables appearing in M and for all places p there is an injective mapping ϕ p from the terms appearing negative in M(p) to the terms appearing positive in M(p) such that for all negative terms T it holds 1. ϕ p (T) appears left of T and 2. Tσ E ϕ p (T)σ Given a family of mappings ϕ p, the question whether σ exists, corresponds to the question of the existence of solutions for the E unification problem {T? E ϕ p(t) p P, T appearing negative in M(p)}. Therefore, to check UNFOLD(M) = we have to try successively all the possible combinations for the ϕ p and for every such combination we have to solve the above unification problem until either we get a solution of one of the problems or the unification problems for all possible fixings of the ϕ p turn out to be inconsistent. This implementation of the considered problem makes sense only for specifications with a finitary equation theory. Furthermore it requires a unification algorithm, which is able to decide the unifiability of a given unification problem. Currently most of the universal E unification tools do only enumerate the solutions of a given problem. Therefore the use of parameterized reachability analysis depends considerably on the specification, especially on the set of equations. Actually the considered operation might be seen as an unfolding of the parameterized marking. But on one hand we can stop trying all the combinations when the first solution has been found, and on the other hand this solution might be a substitution which contains variables, and therefore a pattern for many elements of the unfolding of the parameterized marking. Thus the test for U N F OLD(M) = is at most a partial unfolding. Markings contained in UNFOLD(M). A marking is contained in the unfolding of a parameterized marking iff it can be instantiated in such a way, that 5

6 1. every negative term can be cancelled out by some positive term and 2. the remaining positive terms are equivalent to the target marking. For this reason a marking m is contained in U N F OLD(M) for a parameterized marking M iff 1. The cardinality of M equals the cardinality of m (that is, the number of positive entries in M minus the number of negative entries in M equals the number of entries in m), and 2. UNFOLD(M m). This way we have traced back the problem to the one discussed above. Inclusion of Unfoldings. For the construction of a reachability tree it is necessary to detect, whether the unfolding of a parameterized marking is included in the unfolding of another one. If it turns out, that the unfolding of a node is covered by another one, then we do not need to compute the successors of a node in the parameterized reachability tree. Currently no syntactical criterion is known, which is both necessary and sufficient for the containment of two unfoldings of parameterized markings. In principle it is enough to have some sufficient conditions for containment. If we do not detect the containment of two unfoldings, we will have more nodes in our graph, (in the worst case infinitely many, where finitely many would be enough), but the redundant nodes have no influence on the reachability problem. That is, the quality of the criteria has a noticeable effect on the feasibility of the method, but not on its correctness. In the sequel we will present a sufficient condition and an efficient necessary condition to exclude nodes from the costly containment test. We hope, that experience with implementations of the parameterized marking method will lead to better and faster criteria. The idea of the sufficient condition is simply based on the well known fact that every marking which we can obtain from an instance of a parameterized marking, we can obtain from the marking itself, too. Theorem 2 Let M and M be two parameterized markings. If there is a substitution σ such that M E Mσ, then it holds UNFOLD(M ) UNFOLD(M). Considering the example application at the end of this paper, we find out, that usually the above condition, applied without additional arguments, is not strong enough to prove containment. Therefore we have to complete this condition with a certain number of rules. Up to now these rules are not sufficiently formalized and that s why we leave this problem to future work. The concluding example will show, how such rules should look like. The necessary condition is based on the observation that all the markings in the unfolding of a parameterized marking have a common property, namely the number of tokens on every place. This number can be obtained by counting the positive and negative entries in the formal sums of a parameterized marking. This way for a lot of parameterized markings the consideration of sufficient conditions may be skipped. 5 Transition Occurrences When we want to build a reachability tree, we have to establish a reachability relation between different parameterized markings. This reachability relation should be based on transition occurrences. Since parameterized markings stand for sets of real markings, the relation to be established should be compatible to the reachability relation for real markings. On the other hand the central idea of parameterized reachability analysis is not to fix the occurrence modes. Therefore the arc inscriptions of a tree we are looking for will be whole transitions. A reasonable reachability relation between parameterized markings will be the following: A parameterized marking M is reachable from another one M via transition t iff UNFOLD(M ) contains exactly those markings m such that a m UNFOLD(M) and an occurrence mode β for t exist with m t,β m. Fortunately this parameterized successor marking of a parameterized marking M with respect to a transition t can be expressed without any problems. Theorem 3 Let M be a parameterized marking and t be a transition. Let τ be a renaming of the variables in ξ(t) such that none of the images of τ appears in any term of M. Then it holds UNFOLD(M t τ t + τ) = {m m β : m UNFOLD(M) m t,β m }. Proof. First we assume, that m and β exist such that m t,β m and will show, that m 6

7 UNFOLD(M t τ t + τ). Since m UNFOLD(M), there exists a substitution σ such that all prefixes of Mσ are semipositive. Consider (M t τ t + τ)σ for the substitution σ which we define as { σ σ(x), x appears in M (x) = β(τ 1 (x)), x appears in τ(ξ(t)) Obviously, all prefixes of M t τ t + τ which are already prefixes of M, yield a semipositive multiterm, due to the choice of σ. All prefixes, which contain additionally terms of t τ are semipositive, since t has concession in β at m and therefore even (M t τ)σ = m t β is semipositive. The terms of t + τ do not cause any restrictions of the semipositivity and therefore all the prefixes of (M t τ t + τ)σ are semipositive. Finally, (M t τ t + τ)σ = Mσ t β + t + β = m and therefore m UNFOLD(M t τ t + τ). For the reverse direction assume, that m UNFOLD(M t τ t + τ). We have to show the existence of a m UNFOLD(M) and a β such that m t,β m. According to the assumption there is a σ such that all the prefixes of (M t τ t + τ)σ are semipositive. Among these prefixes there are especially all the prefixes of Mσ and (M t τ)σ. Therefore we can immediately conclude for σ := σ Variables in M and β := σ τ(ξ(t)) τ 1 : 1. m := Mσ (= Mσ) is contained in UNFOLD(M) 2. t has concession in β at m (since m t β ϑ) 3. m t β + t + β = Mσ t β + t + β = (M t τ t + τ)σ = m. There are some remarks concerning this theorem. First, the renaming τ of the variables in ξ(t) is nothing but the introduction of a new set of parameters for the occurrence mode. Second, as promised in section 3, we have to justify that we use formal sums for parameterized markings rather than multiterms. For this purpose consider the net in figure 1. The marking described in this figure is (a b, a b c, ϑ). t 1 has concession at this marking in the two modes [x a] and [x b]. The parameterized successor marking is (a b x c, a b c x, x). The unfolding of this marking consists of (a +c, a + c, b) p 1 a+b x c t 1 x a+b+c p 2 x p 3 Figure 1: A serious problem to be solved by the unfolding procedure and (b + c, b + c, a), exactly the results of firing t 1 in the two stated modes, respectively. If we would interpret the successor marking as a multiterm without respect to the prefixes, we would obtain a third marking, namely by fixing x to c. The result is (a + b, a + b, c), which is obviously an unreachable marking. The reason for this divergence is, that in the first component a + b x + c we cancel out the x which represents the occurrence mode in which t 1 fires, and the term c which appears at the place as a result of just this firing, that is, after the token x is standing for has to be removed. Therefore the unfolding without respect to the prefixes is too weak to preserve reachability in the unfoldings of successor markings, while the presented definition for the unfolding of a parameterized marking is strong enough for this purpose. Using the correct unfold rule the non reachable marking is excluded successfully, since instantiating x to c would cause the prefix a b x of the first component of the parameterized successor marking to be not semipositive. This prefix belongs to the prefixes of M t τ which are especially responsible for restricting the parameters of the fired transition t to those occurrence modes, in which it has concession. In the proof of theorem 3 we argued with these prefixes. As a third remark to theorem 3 we should compare the parameterized marking method for algebraic nets with the one for predicate/transition nets. One of the most important differences between algebraic nets and predicate/transition nets concerns the transition rules. While in the algebraic net calculus it is allowed to have several tokens of one and the same color on a place, there is at most one token per color allowed on a place of a predicate/transition net in order to establish a closer relation to first order logic. This safety requirement 7

8 causes a safe transition rule. Especially it is forbidden to fire transitions in modes, where one and the same color appears more than once on some arc, or where a token is produced on a place in a color in which there is already one. Another difference between algebraic nets and predicate/transition nets is the appearance of guard formula at transitions of predicate/transition nets. Firing a transition is restricted to those modes which satisfy the guard of the transition. These guards are compensated in algebraic nets with more powerful arc inscriptions. Reading [Lin89] gives the impression, that these two features the safe transition rule and transition guards cause a lot of additional considerations to be performed to cope with these features. In the case of algebraic nets we pay for this simplification with restrictions according to the algebraic specification, due to its behavior with respect to unification. We are not sure, whether this is a disadvantage of the algebraic net case, since in [Lin89] there is no detailed consideration of how to algorithmically involve transition guards into the parameterized marking calculus. The guard free case of predicate/transition nets, which is mainly considered in the formalisms of [Lin89], can be covered without problems by algebraic nets, except for the save transition rule, since the arc inscriptions allowed in predicate/transition nets, namely n tuples of constant symbols and variables, can be specified algebraically within the empty set of equations, which has however a very pleasant behavior with respect to unification. 6 Parameterized Reachability Trees After having discussed how parameterized markings coincide with transition occurrences, we will put together several parameterized markings to a tree, based on the successor relation induced by transition occurrences. This tree we will call parameterized reachability tree. First, we need a starting point, which should correspond to the initial marking of the considered net. Definition 15 Let AN = [D; P, T, F; ψ, ξ, λ; m 0 ] be an algebraic net. A parameterized initial marking is any parameterized marking, the unfolding of which contains exactly the initial marking m 0 of AN. A parameterized initial marking can be obtained for instance by replacing all the + signs in the formal sum descriptions of the components of m 0 by the sign. This is only a technical act to distinguish consistently between multiterms and term lists. Actually it will be of no importance at all which description is chosen for the initial marking. That s why we will call it the parameterized initial marking in the sequel. If we are interested exclusively in the set of reachable markings, then all we have to construct is a set of parameterized markings such that the union of their unfoldings equals the set of reachable markings. This set of parameterized markings can be computed by starting with a parameterized marking which represents the initial marking and then step by step computing the successor markings due to transition occurrences as stated in theorem 3. This way we obtain in a canonical way a computation tree, the nodes of which are parameterized markings. If we additionally label the arcs between the computed nodes with the corresponding transitions, we can read off those transitions, which do not occur at all in the tree. It will turn out that these transitions are dead at the initial marking. For dealing with reachability it makes no sense to compute the successors of a node, when the computation of its successors is covered by another one. In the case that a set of markings M is a subset of M, the set of all markings reachable from a node in M is included in the set of nodes reachable from a node in M. For this reason it is not necessary to consider the successors of a parameterized marking M, when it is guaranteed, that the successors of a covering parameterized marking M (that is, UNFOLD(M) UNFOLD(M )) will be considered. The following definition formalizes the concept of parameterized reachability trees. Definition 16 A parameterized reachability tree for an algebraic net AN is a directed labelled tree PRT = [N, E], whereby N is a set of parameterized markings, E is a set of edges labelled with transitions and 1. The initial parameterized marking of AN is the root of PRT; 2. If M is a node in N and E is an edge from M to M labelled with t, then M = M t τ t + τ for a renaming τ of ξ(t) such that τ(ξ(t)) does not contain a variable which appears in M; 3. If a parameterized marking M is contained in N then there exists at least one M N with 8

9 UNFOLD(M) UNFOLD(M ) (possibly M itself), such that for all transitions t T with UNFOLD(M t τ) (τ chosen as above) there is an edge from M labelled with t. The second item of this definition determines, that there are no parameterized markings in this tree which do not stand in the successor relation considered in the previous section. Therefore the tree does not contain unreachable markings. The third item of the definition assures, that it contains at least all reachable markings. Nevertheless the the definition offers an ambiguity. If there is a marking M in the tree for which there are M with UNFOLD(M) UNFOLD(M ), then the successors of M may or may not be contained in the graph. We have to permit this ambiguity to be able to involve our containment decision procedure which, as explained earlier, is incomplete. Theorem 4 Let PRT = [N, E] be a parameterized reachability tree for an algebraic net AN = [D; P, T, F; ψ, ξ, λ; m 0 ]. Then for the set R AN (m 0 ) of all markings reachable from m 0 in AN it holds R AN (m 0 ) = M N UNFOLD(M) Proof. Follows immediately from theorem 3. Theorem 5 Let AN = [D; P, T, F; ψ, ξ, λ; m 0 ] be an algebraic net and PRT = [N, E] a parameterized reachability tree for it. Let t be a transition which does not appear as a label of any edge in E. Then t is dead at m 0, Proof. Assume the contrary. Then there would be a marking m reachable from m 0 and an occurrence mode β for t such that m t,β. Due to theorem 4 there is a parameterized marking M N such that m UNFOLD(M). Theorem 3 states, that UNFOLD(M t τ t + τ). According to the third item of definition 16 there is an edge in E labelled with t in contrary to the assumption. 7 Example Figure 2 shows an algebraic net representing a storage maintenance scheme. There are different processes which are allowed to write to a given unit, and such which read from it. While reading can be done concurrently, no process is allowed to read or to write while another one is writing. Furthermore the place KEY assures, that no process is allowed ew N er x x y y y M WRI x SEM REA REA WRI rq N N x PND N x y y y x bw KEY br Figure 2: An algebraic net modelling a concurrent read / exclusive write protocol to start reading, when another process requests a write operation. The parameterized reachability tree for M = a+b and N = a + b + c is depicted in figure 3. 1 br rq 2 3 rq br er bw er rq br er (=1) ew rq er rq (=3) er 7 (=2) (=1) ew (=4) er 14 (=8) (=5) (=3) Figure 3: A parameterized reachability tree for the considered net We have not written the markings to the nodes, since they can be obtained canonically remembering the definition of parameterized reachability trees. For instance, the label of node No. 7 is m 0 br [y z 1 ] br + [y z 1 ] rq [x z 2 ] rq + [x z 2 ] er [y z 3 ] er + [y z 3 ] resulting in Marking No. 7 WRI a b z 2 PND z 2 WRI REA c d e z 1 z 3 REA z 1 z 3 SEM c d e z 1 z 3 KEY 9

10 The remark under the seventh node in figure 3 means, that the unfoldings of markings No. 7 and No. 3 are equal and therefore the successors of node 7 have not been computed. For showing this equivalence, we try to simplify the 7th marking. First we see, that z 3 can be unified with z 1 (due to the sum z 1 z 3 on REA, then the sum on KEY can be removed, furthermore on REA and SEM the terms z 1 z 3 cancel each other out, since z 1 appears nowhere else after this cancellation and that s why the information, that it is one of the constants c, d or e is of no more interest. All these operations did not change the unfolding. Comparing the resulting vector Marking No. 7 WRI a b z 2 PND z 2 WRI REA c d e REA SEM c d e KEY with the third marking Marking No. 3 WRI a b z 4 PND z 4 WRI REA c d e REA SEM c d e KEY we find out, that these vectors differ only in the name of a parameter. Therefore their unfoldings are equal. Similar considerations can be applied to all nodes which we stated to be equivalent to other ones. 8 Conclusions We have seen, that parameterized reachability analysis can be applied to algebraic nets as well as Lindqvist did it for predicate/transition nets. Thereby we found, that the unsafe transition rule and the absence of transition guards lead to a significant simplification of the method. At least with respect to the transition rule this has been predicted by Lindqvist. In the case of algebraic nets, we are able to involve the whole information about the effect of transition occurrences in the parameterized reachability analysis, since all of this information is contained in the arc inscriptions, while in the case of predicate/transition nets it seems to be difficult to handle the information which is coded as transition guards. On the other hand, the method is restricted to specifications which are well formed with respect to the unification problem. But having the theory of abstract data types available, one can clearly distinguish between manageable arc inscriptions and arc inscriptions which are too complex for symbolic computations. This way we may preselect nets where symbolic methods have a chance and those to which we should not apply symbolic methods. All in all, it seems to be worth trying an implementation and getting some experience whether the method is suitable in practice. This implementation has to offer much stronger conditions for the inclusion problem than considered here. References [EM85] H. Ehrig, B. Mahr. Fundamentals of Algebraic Specifications, volume 1 of EATCS Monographs on Theoretical Computer Science 6. Springer, Berlin, [Gen87] H. Genrich. Predicate/Transition Nets, Lecture Notes on Computer Science 254, pages , [HJJ84] Huber, A. Jensen, Jepsen, K. Jensen. Towards Reachability Trees for High level Petri Nets. In Advances in Petri Nets 1984, Lecture Notes on Computer Science 188, pages , [Jen81] K. Jensen. Coloured Petri Nets and the Invariant Method. Theoretical Computer Science, 14: , [Lin89] M. Lindqvist. Parameterized Reachability Trees for Predicate/Transition Nets. Acta Polytechnica Scandinavica, Ma 54, [Rei91] W. Reisig. Petri Nets and Algebraic Specifications. Theoretical Computer Science, 80:1 34, [SSt91] K. Schmidt, P. Starke. An Algorithm to Compute the Symmetries of Petri Nets. Petri Net Newsletter, 40:25 30, [Sch93] K. Schmidt. Symmetries of Petri Nets. Petri Net Newsletter, 43:9 25, [Sch94] K. Schmidt. T Invariants of Algebraic Petri Nets. Informatik Bericht, 31, [Sta91] P.H. Starke. Reachability Analysis of Petri Nets Using Symmetries. J. Syst. Anal. Model. Simul., 8: ,

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

Basic counting techniques. Periklis A. Papakonstantinou Rutgers Business School

Basic counting techniques. Periklis A. Papakonstantinou Rutgers Business School Basic counting techniques Periklis A. Papakonstantinou Rutgers Business School i LECTURE NOTES IN Elementary counting methods Periklis A. Papakonstantinou MSIS, Rutgers Business School ALL RIGHTS RESERVED

More information

Safety Analysis versus Type Inference

Safety Analysis versus Type Inference Information and Computation, 118(1):128 141, 1995. Safety Analysis versus Type Inference Jens Palsberg palsberg@daimi.aau.dk Michael I. Schwartzbach mis@daimi.aau.dk Computer Science Department, Aarhus

More information

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

Petri nets. s 1 s 2. s 3 s 4. directed arcs. Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Efficient Algorithm for Reachability Checking in Modeling

Efficient Algorithm for Reachability Checking in Modeling Efficient Algorithm for Reachability Checking in Modeling Alexander Letichevsky 1, Olexander Letychevskyi 1, and Vladimir Peschanenko 2 1 Glushkov Institute of Cybernetics of NAS of Ukraine, 40 Glushkova

More information

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING Alessandro Giua Xiaolan Xie Dip. Ing. Elettrica ed Elettronica, U. di Cagliari, Italy. Email: giua@diee.unica.it INRIA/MACSI Team, ISGMP, U. de Metz, France.

More information

The Decent Philosophers: An exercise in concurrent behaviour

The Decent Philosophers: An exercise in concurrent behaviour Fundamenta Informaticae 80 (2007) 1 9 1 IOS Press The Decent Philosophers: An exercise in concurrent behaviour Wolfgang Reisig Humboldt-Universität zu Berlin Institute of Informatics Unter den Linden 6,

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION. Sami Evangelista Serge Haddad Jean-François Pradat-Peyre

NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION. Sami Evangelista Serge Haddad Jean-François Pradat-Peyre NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION Sami Evangelista Serge Haddad Jean-François Pradat-Peyre CEDRIC-CNAM Paris 292, rue St Martin, 75003 Paris LAMSADE-CNRS UMR 7024 Université Paris 9 Place

More information

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1 Embedded Systems 6-1 - Place/transition nets REVIEW Def.: (P, T, F, K, W, M 0 ) is called a place/transition net (P/T net) iff 1. N=(P,T,F) is a net with places p P and transitions t T 2. K: P (N 0 {ω})

More information

Compact Regions for Place/Transition Nets

Compact Regions for Place/Transition Nets Compact Regions for Place/Transition Nets Robin Bergenthum Department of Software Engineering and Theory of Programming, FernUniversität in Hagen robin.bergenthum@fernuni-hagen.de Abstract. This paper

More information

Algorithms for pattern involvement in permutations

Algorithms for pattern involvement in permutations Algorithms for pattern involvement in permutations M. H. Albert Department of Computer Science R. E. L. Aldred Department of Mathematics and Statistics M. D. Atkinson Department of Computer Science D.

More information

Lecture Notes on From Rules to Propositions

Lecture Notes on From Rules to Propositions Lecture Notes on From Rules to Propositions 15-816: Substructural Logics Frank Pfenning Lecture 2 September 1, 2016 We review the ideas of ephemeral truth and linear inference with another example from

More information

c 2011 Nisha Somnath

c 2011 Nisha Somnath c 2011 Nisha Somnath HIERARCHICAL SUPERVISORY CONTROL OF COMPLEX PETRI NETS BY NISHA SOMNATH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Aerospace

More information

Decidable Subsets of CCS

Decidable Subsets of CCS Decidable Subsets of CCS based on the paper with the same title by Christensen, Hirshfeld and Moller from 1994 Sven Dziadek Abstract Process algebra is a very interesting framework for describing and analyzing

More information

Analysing Signal-Net Systems

Analysing Signal-Net Systems Analysing Signal-Net Systems Peter H. Starke, Stephan Roch Humboldt-Universität zu Berlin Institut für Informatik Unter den Linden 6, D-10099 Berlin {starke,roch}@informatik.hu-berlin.de September 2002

More information

Trace- and Failure-Based Semantics for Responsiveness

Trace- and Failure-Based Semantics for Responsiveness Trace- and Failure-Based Semantics for Responsiveness Walter Vogler 1 and Christian Stahl 2 and Richard Müller 2,3 1 Institut für Informatik, Universität Augsburg, Germany vogler@informatik.uni-augsburg.de

More information

A Canonical Contraction for Safe Petri Nets

A Canonical Contraction for Safe Petri Nets A Canonical Contraction for Safe Petri Nets Thomas Chatain and Stefan Haar INRIA & LSV (CNRS & ENS Cachan) 6, avenue du Président Wilson 935 CACHAN Cedex, France {chatain, haar}@lsvens-cachanfr Abstract

More information

On Parametrical Sequences in Time Petri Nets

On Parametrical Sequences in Time Petri Nets On Parametrical Sequences in Time Petri Nets Louchka Popova-Zeugmann Humboldt-Universität zu Berlin, Institut für Informatik, Unter den Linden 6, D-10099 Berlin e-mail: popova@informatik.hu-berlin.de Extended

More information

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Fundamenta Informaticae XX (2004) 1 23 1 IOS Press A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Javier Esparza Institute for Formal Methods in Computer Science

More information

Two hours. Examination definition sheet is available at the back of the examination. UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE

Two hours. Examination definition sheet is available at the back of the examination. UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE COMP 60332 Two hours Examination definition sheet is available at the back of the examination. UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Automated Reasoning and Verification Date: Wednesday 30th

More information

Can I Find a Partner?

Can I Find a Partner? Can I Find a Partner? Peter Massuthe 1, Alexander Serebrenik 2, Natalia Sidorova 2, and Karsten Wolf 3 1 Humboldt-Universität zu Berlin, Institut für Informatik Unter den Linden 6, 10099 Berlin, Germany

More information

CHAPTER 3: THE INTEGERS Z

CHAPTER 3: THE INTEGERS Z CHAPTER 3: THE INTEGERS Z MATH 378, CSUSM. SPRING 2009. AITKEN 1. Introduction The natural numbers are designed for measuring the size of finite sets, but what if you want to compare the sizes of two sets?

More information

Petri Nets and Model Checking. Natasa Gkolfi. University of Oslo. March 31, 2017

Petri Nets and Model Checking. Natasa Gkolfi. University of Oslo. March 31, 2017 University of Oslo March 31, 2017 Petri Nets Petri Nets : mathematically founded formalism concurrency synchronization modeling distributed systems Petri Nets Petri Nets : mathematically founded formalism

More information

An Holistic State Equation for Timed Petri Nets

An Holistic State Equation for Timed Petri Nets An Holistic State Equation for Timed Petri Nets Matthias Werner, Louchka Popova-Zeugmann, Mario Haustein, and E. Pelz 3 Professur Betriebssysteme, Technische Universität Chemnitz Institut für Informatik,

More information

Pitfalls in public key cryptosystems based on free partially commutative monoids and groups

Pitfalls in public key cryptosystems based on free partially commutative monoids and groups Pitfalls in public key cryptosystems based on free partially commutative monoids and groups María Isabel González Vasco 1 and Rainer Steinwandt 2 1 Área de Matemática Aplicada, Universidad Rey Juan Carlos

More information

Learning Large-Alphabet and Analog Circuits with Value Injection Queries

Learning Large-Alphabet and Analog Circuits with Value Injection Queries Learning Large-Alphabet and Analog Circuits with Value Injection Queries Dana Angluin 1 James Aspnes 1, Jiang Chen 2, Lev Reyzin 1,, 1 Computer Science Department, Yale University {angluin,aspnes}@cs.yale.edu,

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 17 - Diagnosis for WF nets 1 Object We study suitable diagnosis techniques

More information

CS 173: Induction. Madhusudan Parthasarathy University of Illinois at Urbana-Champaign. February 7, 2016

CS 173: Induction. Madhusudan Parthasarathy University of Illinois at Urbana-Champaign. February 7, 2016 CS 173: Induction Madhusudan Parthasarathy University of Illinois at Urbana-Champaign 1 Induction February 7, 016 This chapter covers mathematical induction, and is an alternative resource to the one in

More information

The Integers. Peter J. Kahn

The Integers. Peter J. Kahn Math 3040: Spring 2009 The Integers Peter J. Kahn Contents 1. The Basic Construction 1 2. Adding integers 6 3. Ordering integers 16 4. Multiplying integers 18 Before we begin the mathematics of this section,

More information

Equational Logic. Chapter 4

Equational Logic. Chapter 4 Chapter 4 Equational Logic From now on First-order Logic is considered with equality. In this chapter, I investigate properties of a set of unit equations. For a set of unit equations I write E. Full first-order

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:

More information

Expand, Enlarge, and Check

Expand, Enlarge, and Check Expand, Enlarge, and Check New algorithms for the coverability problem of WSTS G. Geeraerts 1, J.-F. Raskin 1, L. Van Begin 1,2 Département d Informatique, Université Libre de Bruxelles Boulevard du Triomphe,

More information

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic Mathematics 114L Spring 2018 D.A. Martin Mathematical Logic 1 First-Order Languages. Symbols. All first-order languages we consider will have the following symbols: (i) variables v 1, v 2, v 3,... ; (ii)

More information

The Integers. Math 3040: Spring Contents 1. The Basic Construction 1 2. Adding integers 4 3. Ordering integers Multiplying integers 12

The Integers. Math 3040: Spring Contents 1. The Basic Construction 1 2. Adding integers 4 3. Ordering integers Multiplying integers 12 Math 3040: Spring 2011 The Integers Contents 1. The Basic Construction 1 2. Adding integers 4 3. Ordering integers 11 4. Multiplying integers 12 Before we begin the mathematics of this section, it is worth

More information

CHRISTIAN-ALBRECHTS-UNIVERSITÄT KIEL

CHRISTIAN-ALBRECHTS-UNIVERSITÄT KIEL INSTITUT FÜR INFORMATIK UND PRAKTISCHE MATHEMATIK A Constraint-Based Algorithm for Contract-Signing Protocols Detlef Kähler, Ralf Küsters Bericht Nr. 0503 April 2005 CHRISTIAN-ALBRECHTS-UNIVERSITÄT KIEL

More information

2.5.2 Basic CNF/DNF Transformation

2.5.2 Basic CNF/DNF Transformation 2.5. NORMAL FORMS 39 On the other hand, checking the unsatisfiability of CNF formulas or the validity of DNF formulas is conp-complete. For any propositional formula φ there is an equivalent formula in

More information

Proof Theoretical Studies on Semilattice Relevant Logics

Proof Theoretical Studies on Semilattice Relevant Logics Proof Theoretical Studies on Semilattice Relevant Logics Ryo Kashima Department of Mathematical and Computing Sciences Tokyo Institute of Technology Ookayama, Meguro, Tokyo 152-8552, Japan. e-mail: kashima@is.titech.ac.jp

More information

Lecture 2: Syntax. January 24, 2018

Lecture 2: Syntax. January 24, 2018 Lecture 2: Syntax January 24, 2018 We now review the basic definitions of first-order logic in more detail. Recall that a language consists of a collection of symbols {P i }, each of which has some specified

More information

MPRI 1-22 Introduction to Verification January 4, TD 6: Petri Nets

MPRI 1-22 Introduction to Verification January 4, TD 6: Petri Nets TD 6: Petri Nets 1 Modeling Using Petri Nets Exercise 1 (Traffic Lights). Consider again the traffic lights example from the lecture notes: r r ry y r y ry g g y g 1. How can you correct this Petri net

More information

Keywords: Specification technique, expressive power, computation models, sequential algorithms, transition systems, Abstract State Machines

Keywords: Specification technique, expressive power, computation models, sequential algorithms, transition systems, Abstract State Machines Computing and Informatics, Vol. 22, 2003, 209 219 THE EXPRESSIVE POWER OF ABSTRACT-STATE MACHINES Wolfgang Reisig Institut für Informatik Humboldt Universität zu Berlin Unter den Linden 6 10099 Berlin,

More information

Chapter 4: Computation tree logic

Chapter 4: Computation tree logic INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification

More information

Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems. Joachim Wehler

Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems. Joachim Wehler Free-Choice Petri Nets without Frozen okens, and Bipolar Synchronization Systems Joachim Wehler Ludwig-Maximilians-Universität München, Germany joachim.wehler@gmx.net Abstract: Bipolar synchronization

More information

Cheat Sheet Equational Logic (Spring 2013) Terms. Inductive Construction. Positions: Denoting Subterms TERMS

Cheat Sheet Equational Logic (Spring 2013) Terms. Inductive Construction. Positions: Denoting Subterms TERMS TERMS Cheat Sheet Equational Logic (Spring 2013) The material given here summarizes those notions from the course s textbook [1] that occur frequently. The goal is to have them at hand, as a quick reminder

More information

The unfolding of general Petri nets

The unfolding of general Petri nets Foundations of Software Technology and Theoretical Computer Science (Bangalore) 2008. Editors: R. Hariharan, M. Mukund, V. Vinay; pp - The unfolding of general Petri nets Jonathan Hayman and Glynn Winskel

More information

fakultät für informatik informatik 12 technische universität dortmund Petri nets Peter Marwedel Informatik 12 TU Dortmund Germany

fakultät für informatik informatik 12 technische universität dortmund Petri nets Peter Marwedel Informatik 12 TU Dortmund Germany 12 Petri nets Peter Marwedel Informatik 12 TU Dortmund Germany Introduction Introduced in 1962 by Carl Adam Petri in his PhD thesis. Focus on modeling causal dependencies; no global synchronization assumed

More information

5 Set Operations, Functions, and Counting

5 Set Operations, Functions, and Counting 5 Set Operations, Functions, and Counting Let N denote the positive integers, N 0 := N {0} be the non-negative integers and Z = N 0 ( N) the positive and negative integers including 0, Q the rational numbers,

More information

The non-logical symbols determine a specific F OL language and consists of the following sets. Σ = {Σ n } n<ω

The non-logical symbols determine a specific F OL language and consists of the following sets. Σ = {Σ n } n<ω 1 Preliminaries In this chapter we first give a summary of the basic notations, terminology and results which will be used in this thesis. The treatment here is reduced to a list of definitions. For the

More information

Alan Bundy. Automated Reasoning LTL Model Checking

Alan Bundy. Automated Reasoning LTL Model Checking Automated Reasoning LTL Model Checking Alan Bundy Lecture 9, page 1 Introduction So far we have looked at theorem proving Powerful, especially where good sets of rewrite rules or decision procedures have

More information

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories 1 Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo Outline: Contracts and compositional methods for system design Where and why using

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 08 - Petri nets basics 1 Object Formalization of the basic concepts of

More information

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing

More information

The complexity of recursive constraint satisfaction problems.

The complexity of recursive constraint satisfaction problems. The complexity of recursive constraint satisfaction problems. Victor W. Marek Department of Computer Science University of Kentucky Lexington, KY 40506, USA marek@cs.uky.edu Jeffrey B. Remmel Department

More information

Proof: If (a, a, b) is a Pythagorean triple, 2a 2 = b 2 b / a = 2, which is impossible.

Proof: If (a, a, b) is a Pythagorean triple, 2a 2 = b 2 b / a = 2, which is impossible. CS103 Handout 07 Fall 2013 October 2, 2013 Guide to Proofs Thanks to Michael Kim for writing some of the proofs used in this handout. What makes a proof a good proof? It's hard to answer this question

More information

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for? Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits

More information

Proof Techniques (Review of Math 271)

Proof Techniques (Review of Math 271) Chapter 2 Proof Techniques (Review of Math 271) 2.1 Overview This chapter reviews proof techniques that were probably introduced in Math 271 and that may also have been used in a different way in Phil

More information

DISTRIBUTIVE LATTICES ON GRAPH ORIENTATIONS

DISTRIBUTIVE LATTICES ON GRAPH ORIENTATIONS DISTRIBUTIVE LATTICES ON GRAPH ORIENTATIONS KOLJA B. KNAUER ABSTRACT. Propp gave a construction method for distributive lattices on a class of orientations of a graph called c-orientations. Given a distributive

More information

CS632 Notes on Relational Query Languages I

CS632 Notes on Relational Query Languages I CS632 Notes on Relational Query Languages I A. Demers 6 Feb 2003 1 Introduction Here we define relations, and introduce our notational conventions, which are taken almost directly from [AD93]. We begin

More information

Parikh s theorem. Håkan Lindqvist

Parikh s theorem. Håkan Lindqvist Parikh s theorem Håkan Lindqvist Abstract This chapter will discuss Parikh s theorem and provide a proof for it. The proof is done by induction over a set of derivation trees, and using the Parikh mappings

More information

Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008

Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 MATH-LITERACY MANUAL Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 2 Algebraic Epressions 2.1 Terms and Factors 29 2.2 Types of Algebraic Epressions 32 2.3 Transforming

More information

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de

More information

Atomic Fragments of Petri Nets Extended Abstract

Atomic Fragments of Petri Nets Extended Abstract Atomic Fragments of Petri Nets Extended Abstract Monika Heiner 1, Harro Wimmel 2, and Karsten Wolf 2 1 Brunel University Uxbridge/London, on sabbatical leave from Brandenburgische Technische Universität

More information

Some Examples of Lexicographic Order Algorithms and some Open Combinatorial Problems

Some Examples of Lexicographic Order Algorithms and some Open Combinatorial Problems Some Examples of Lexicographic Order Algorithms and some Open Combinatorial Problems Dimitar Vandev A general reasoning based on the lexicographic order is studied. It helps to create algorithms for generation

More information

Algebra Exam. Solutions and Grading Guide

Algebra Exam. Solutions and Grading Guide Algebra Exam Solutions and Grading Guide You should use this grading guide to carefully grade your own exam, trying to be as objective as possible about what score the TAs would give your responses. Full

More information

Coloured Petri Nets Based Diagnosis on Causal Models

Coloured Petri Nets Based Diagnosis on Causal Models Coloured Petri Nets Based Diagnosis on Causal Models Soumia Mancer and Hammadi Bennoui Computer science department, LINFI Lab. University of Biskra, Algeria mancer.soumia@gmail.com, bennoui@gmail.com Abstract.

More information

Complete Process Semantics for Inhibitor Nets Technical Report

Complete Process Semantics for Inhibitor Nets Technical Report Complete Process Semantics for Inhibitor Nets Technical Report Gabriel Juhás 2, Robert Lorenz 1, and Sebastian Mauser 1 1 Department of Applied Computer Science, Catholic University of Eichstätt-Ingolstadt,

More information

Johns Hopkins Math Tournament Proof Round: Automata

Johns Hopkins Math Tournament Proof Round: Automata Johns Hopkins Math Tournament 2018 Proof Round: Automata February 9, 2019 Problem Points Score 1 10 2 5 3 10 4 20 5 20 6 15 7 20 Total 100 Instructions The exam is worth 100 points; each part s point value

More information

Tutorial on Mathematical Induction

Tutorial on Mathematical Induction Tutorial on Mathematical Induction Roy Overbeek VU University Amsterdam Department of Computer Science r.overbeek@student.vu.nl April 22, 2014 1 Dominoes: from case-by-case to induction Suppose that you

More information

Abstract Algebra I. Randall R. Holmes Auburn University. Copyright c 2012 by Randall R. Holmes Last revision: November 11, 2016

Abstract Algebra I. Randall R. Holmes Auburn University. Copyright c 2012 by Randall R. Holmes Last revision: November 11, 2016 Abstract Algebra I Randall R. Holmes Auburn University Copyright c 2012 by Randall R. Holmes Last revision: November 11, 2016 This work is licensed under the Creative Commons Attribution- NonCommercial-NoDerivatives

More information

Applied Logic. Lecture 1 - Propositional logic. Marcin Szczuka. Institute of Informatics, The University of Warsaw

Applied Logic. Lecture 1 - Propositional logic. Marcin Szczuka. Institute of Informatics, The University of Warsaw Applied Logic Lecture 1 - Propositional logic Marcin Szczuka Institute of Informatics, The University of Warsaw Monographic lecture, Spring semester 2017/2018 Marcin Szczuka (MIMUW) Applied Logic 2018

More information

a (b + c) = a b + a c

a (b + c) = a b + a c Chapter 1 Vector spaces In the Linear Algebra I module, we encountered two kinds of vector space, namely real and complex. The real numbers and the complex numbers are both examples of an algebraic structure

More information

ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR DEADLOCK PROBLEMS OF FLEXIBLE MANUFACTURING SYSTEMS USING PETRI NETS

ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR DEADLOCK PROBLEMS OF FLEXIBLE MANUFACTURING SYSTEMS USING PETRI NETS Proceedings of the IASTED International Conference Modelling, Identification and Control (AsiaMIC 2013) April 10-12, 2013 Phuket, Thailand ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR

More information

Reading 11 : Relations and Functions

Reading 11 : Relations and Functions CS/Math 240: Introduction to Discrete Mathematics Fall 2015 Reading 11 : Relations and Functions Instructor: Beck Hasti and Gautam Prakriya In reading 3, we described a correspondence between predicates

More information

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity Universität zu Lübeck Institut für Theoretische Informatik Lecture notes on Knowledge-Based and Learning Systems by Maciej Liśkiewicz Lecture 5: Efficient PAC Learning 1 Consistent Learning: a Bound on

More information

A framework based on implementation relations for implementing LOTOS specifications

A framework based on implementation relations for implementing LOTOS specifications Published in: Computer Networks and ISDN Systems, 25 (1992), 23-41 A framework based on implementation relations for implementing LOTOS specifications Guy Leduc Research Associate of the National Fund

More information

The constructible universe

The constructible universe The constructible universe In this set of notes I want to sketch Gödel s proof that CH is consistent with the other axioms of set theory. Gödel s argument goes well beyond this result; his identification

More information

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,

More information

Hierarchic Superposition: Completeness without Compactness

Hierarchic Superposition: Completeness without Compactness Hierarchic Superposition: Completeness without Compactness Peter Baumgartner 1 and Uwe Waldmann 2 1 NICTA and Australian National University, Canberra, Australia Peter.Baumgartner@nicta.com.au 2 MPI für

More information

07 Equational Logic and Algebraic Reasoning

07 Equational Logic and Algebraic Reasoning CAS 701 Fall 2004 07 Equational Logic and Algebraic Reasoning Instructor: W. M. Farmer Revised: 17 November 2004 1 What is Equational Logic? Equational logic is first-order logic restricted to languages

More information

Reading the Linearizability paper of Herlihy and Wing

Reading the Linearizability paper of Herlihy and Wing Reading the Linearizability paper of Herlihy and Wing Uri Abraham May 28, 2013 Abstract We read Herlihy and Wing important paper on the concept of linearizability, and reconstruct that text in the Tarskian

More information

= ϕ r cos θ. 0 cos ξ sin ξ and sin ξ cos ξ. sin ξ 0 cos ξ

= ϕ r cos θ. 0 cos ξ sin ξ and sin ξ cos ξ. sin ξ 0 cos ξ 8. The Banach-Tarski paradox May, 2012 The Banach-Tarski paradox is that a unit ball in Euclidean -space can be decomposed into finitely many parts which can then be reassembled to form two unit balls

More information

Computation Tree Logic (CTL) & Basic Model Checking Algorithms

Computation Tree Logic (CTL) & Basic Model Checking Algorithms Computation Tree Logic (CTL) & Basic Model Checking Algorithms Martin Fränzle Carl von Ossietzky Universität Dpt. of Computing Science Res. Grp. Hybride Systeme Oldenburg, Germany 02917: CTL & Model Checking

More information

A Static Analysis Technique for Graph Transformation Systems

A Static Analysis Technique for Graph Transformation Systems A Static Analysis Technique for Graph Transformation Systems Paolo Baldan, Andrea Corradini, and Barbara König Dipartimento di Informatica, Università di Pisa, Italia {baldan,andrea,koenigb}@di.unipi.it

More information

Equivalent Forms of the Axiom of Infinity

Equivalent Forms of the Axiom of Infinity Equivalent Forms of the Axiom of Infinity Axiom of Infinity 1. There is a set that contains each finite ordinal as an element. The Axiom of Infinity is the axiom of Set Theory that explicitly asserts that

More information

Time and Timed Petri Nets

Time and Timed Petri Nets Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time

More information

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers ALGEBRA CHRISTIAN REMLING 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers by Z = {..., 2, 1, 0, 1,...}. Given a, b Z, we write a b if b = ac for some

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic Introduction to EF-games Inexpressivity results for first-order logic Normal forms for first-order logic Algorithms and complexity for specific classes of structures General complexity bounds Preliminaries

More information

Reverse mathematics of some topics from algorithmic graph theory

Reverse mathematics of some topics from algorithmic graph theory F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 75

Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 75 Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 75 Teknillisen korkeakoulun tietojenkäsittelyteorian laboratorion tutkimusraportti 75 Espoo 2002 HUT-TCS-A75

More information

NEUTRIX CALCULUS I NEUTRICES AND DISTRIBUTIONS 1) J. G. VAN DER CORPUT. (Communicated at the meeting of January 30, 1960)

NEUTRIX CALCULUS I NEUTRICES AND DISTRIBUTIONS 1) J. G. VAN DER CORPUT. (Communicated at the meeting of January 30, 1960) MATHEMATICS NEUTRIX CALCULUS I NEUTRICES AND DISTRIBUTIONS 1) BY J. G. VAN DER CORPUT (Communicated at the meeting of January 30, 1960) It is my intention to give in this lecture an exposition of a certain

More information

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...),

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 7. High Level Petri-Nets Definition 7.1 A Net Type is determined if the following specification is given: 1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 2. sort of labeling

More information

Realization Plans for Extensive Form Games without Perfect Recall

Realization Plans for Extensive Form Games without Perfect Recall Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in

More information

Testing congruence and symmetry for general 3-dimensional objects

Testing congruence and symmetry for general 3-dimensional objects Computational Geometry 27 (2004) 3 11 www.elsevier.com/locate/comgeo Testing congruence and symmetry for general 3-dimensional objects Peter Brass a,,1, Christian Knauer b a Department of Computer Science,

More information

On the Effectiveness of Symmetry Breaking

On the Effectiveness of Symmetry Breaking On the Effectiveness of Symmetry Breaking Russell Miller 1, Reed Solomon 2, and Rebecca M Steiner 3 1 Queens College and the Graduate Center of the City University of New York Flushing NY 11367 2 University

More information

Chapter One. The Real Number System

Chapter One. The Real Number System Chapter One. The Real Number System We shall give a quick introduction to the real number system. It is imperative that we know how the set of real numbers behaves in the way that its completeness and

More information

Design of Distributed Systems Melinda Tóth, Zoltán Horváth

Design of Distributed Systems Melinda Tóth, Zoltán Horváth Design of Distributed Systems Melinda Tóth, Zoltán Horváth Design of Distributed Systems Melinda Tóth, Zoltán Horváth Publication date 2014 Copyright 2014 Melinda Tóth, Zoltán Horváth Supported by TÁMOP-412A/1-11/1-2011-0052

More information