Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Size: px
Start display at page:

Download "Methods for the specification and verification of business processes MPB (6 cfu, 295AA)"

Transcription

1 Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni Workflow modules 1

2 Object We study Workflow modules to model interaction between workflows Ch.6 of Business Process Management: Concepts, Languages, Architectures 2

3 Problem Not all tasks of a workflow net are automatic: they can be triggered manually or by a message they can be used to trigger other tasks How do we represent this? 3

4 Implicit interaction Separately developed Seller workflow Some activities can input messages Some activities can rec_reject reject rec_accept accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg 2007 output messages 4

5 Implicit interaction Seller can receive Seller (symbol?) recommendations Seller can send (symbol!)?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg 2007 decisions 5

6 Interface Seller has an interface Seller for interaction It consists of some input places and ra rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg 2007 some output places 6

7 Interface P I Seller receiving? sending! P O ra rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg

8 Problem Assume the original workflow net has been validated: it is a sound (and maybe safe) workflow net When we add the (places in the) interface it is no longer a workflow net! 8

9 Workflow Modules Definition: A workflow module consists of a workflow net (P,T,F) plus a set P I of incoming places plus a set of incoming arcs F I (P I x T) plus a set P O of outgoing places plus a set of outgoing arcs F O (T x P O ) such that each transition has at most one connection to places in the interface 9

10 Problem Workflow modules must be capable to interact How do we check that their interfaces match? How do we combine them together? 10

11 Strong structural compatibility A set of workflow modules is called strongly structural compatible if for every message that can be sent there is a module who can receive it, and for every message that can be received there is a module who can send it (formats of message data are assumed to match) 11

12 Weak structural compatibility A set of workflow modules is called weakly structural compatible if all messages sent by modules can be received by other modules more likely than a complete structural match (workflow modules are developed separately) 12

13 Interaction Auctioning Service P O P I Seller sending! receiving?!rec_accept?accept!rec_reject?reject ra rr sa sr P I P O ra rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg

14 Interaction Auctioning Service Seller!rec_accept?accept!rec_reject?reject ra rr sa sr ra rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg

15 Problem We have added places and arcs to single nets We have joined places of different nets We have paired their initial markings How do we check that the system behaves well? What has this check to do with WF net soundness? 15

16 Workflow systems 16

17 Workflow system Auctioning Service Seller ra ra!rec_accept?accept!rec_reject?reject rr sa sr rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg

18 Workflow system Definition: A workflow system consists of a set of n structurally compatible workflow modules (initial places i1,...,in, final places o1,...,on) plus an initial place i and a transition ti from i to i1,...,in plus a final place o and a transition to from o1,...,on to o 18

19 Soundness of workflow systems A workflow system is just an ordinary workflow net We can check its soundness as usual 19

20 Exercise Can the system deadlock? Auctioning Service Seller ra ra!rec_accept?accept!rec_reject?reject rr sa sr rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg

21 Exercise Can the system deadlock? Auctioning Service' Seller ra ra!rec_accept?accept!rec_reject?reject rr sa sr rr sa sr?rec_reject!reject?rec_accept!accept M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg

22 Exercise Complete with missing arcs the following behavioural interfaces and check their compatibility pr pr! participation_req? participation_req ra rr ra rr! rec_accept! rec_reject? rec_reject? rec_accept ba br ba br? accept? reject! reject! accept a a? reject? accept! accept! reject r r M. Weske: Business Process Management, Springer-Verlag Berlin Heidelberg 2007 n n! notify? notify 22

23 Exercise Check compatibility of WF modules below a a e e b b f f c c g g d d h h (a) (b) 23 (c)

24 Weak soundness 24

25 Problem When checking behavioural compatibility the soundness of the overall net is a too restrictive requirement Workflow modules are designed separately, possibly reused in several systems It is unlikely that every functionality they offer is involved in each system 25

26 Problem Definition: A workflow net is weak sound if it satisfies option to complete and proper completion (dead tasks are allowed) Weak soundness can be checked on the RG It guarantees deadlock freedom and proper termination of all modules 26

27 Sound + Sound =? p1 p2 M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg 2007 p3 27

28 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

29 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

30 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

31 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

32 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

33 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

34 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

35 Sound + Sound = not sound M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

36 Sound + Sound = not sound Dead tasks! M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

37 Sound + Sound = not sound Weak Sound! M. Weske : Busines s Proce ss Management, Springer-Verlag Berlin Heide lberg

38 Exercise: Preliminaries contractor subcontractor order part N0 specification cost_statement part N1 product 38

39 Exercise: Check Weak Soundness of The Assembly order specification cost_statement product 39

40 Exercise: Check Again After Refactoring Contractor order specification cost_statement product 40

41 Exercise: Check Again After Refactoring Both order specification cost_statement product order specification cost_statement product 41

42 (Contractor zoom-in) 42

43 (Subcontractor zoom-in) 43

44 Partner existence (aka controllability) Does My Service Have Partners? Karsten Wolf Universität Rostock, Institut für Informatik, Rostock, Germany K. Jensen and W. van der Aalst (Eds.): ToPNoC II, LNCS 5460, pp , c Springer-Verlag Berlin Heidelberg

45 Problem Processes are designed in isolation (loose coupling) We would like their composition to be well-behaved Given a process: Can we guarantee that at least one partner exists? If so, can we synthesize the most permissive partner? 45

46 Controllability Assume a notion of well-behaving is defined We say that a process N is controllable if it has at least one partner N such that the composition of N with N is well-behaving 46

47 Controllability: idea Given a process N we aim to construct an automaton that over-approximates the behaviour of any partner, then we iteratively remove states and arcs that invalidate the behavioural property we are after: if we end up with the empty automaton, then the process N is uncontrollable otherwise, the automaton defines the most general strategy to collaborate with N (guaranteeing the behavioural property we are after) 47

48 Open nets Definition: An open net consists of a net (P,T,F,m0) plus incoming places P I P plus outgoing places P O P plus a finite set Mf of final markings such that each transition has at most one connection to places in the interface any initial or final marking does not mark any place in the interface 48

49 Example: open net m0 = a P I = { i } P O = { o } Mf = { b } 49

50 Notation Definition: The label of a transition t is the interface place connected to t, if any, or the special silent action tau otherwise `(t) = x if x 2 (P I [ P O ) and (t, x) 2 F _ (x, t) 2 F otherwise 50

51 Example: open net m0 = a P I = { i } P O = { o } Mf = { b } `(t 1 ) = i `(t 2 ) = o 51

52 Closed nets An open net N = (P,T,F,m0,P I,P O,Mf) is called closed if P I = P O = 52

53 Inner nets Let N = (P,T,F,m0,P I,P O,Mf) be an open net and let IO = (P I P O ) be its interface its inner net In(N) is the closed net obtained by removing the interface In(N) = ( P \ IO, T, F \ ((IO T) (T IO)), m0,,, Mf ) 53

54 Example: inner net 54

55 Bounded and responsive nets We focus on open nets N such that their inner nets In(N) are bounded (in the usual sense, they have finite occurrence graphs) responsive from any marking m either a final marking is reachable or m enables a transition t connected to the interface 55

56 Composition of open nets Given two open nets N1 = (P1,T1,F1,m01,P I 1,P O 1,Mf1) N2 = (P2,T2,F2,m02,P I 2,P O 2,Mf2) such that P I 1=P O 2 and P O 1= P I 2 56

57 Composition of open nets Given two open nets N1 = (P1,T1,F1,m01,P I,P O,Mf1) N2 = (P2,T2,F2,m02,P O,P I,Mf2) their composition N = N1 N2 is the closed net N = ( P1 P2, T1 T2, F1 F2, m01+m02,,, Mf1 Mf2 ) A final marking of the composed net is any combination of final markings of the original nets note that even if N1 and N2 are bounded and responsive, their composition N1 N2 is not necessarily so 57

58 Behavioural properties: DF A closed net N = (P,T,F,m0,,,Mf) is DF (deadlock-free) if any non-final reachable marking enables a transition 8m 2 ([m 0 i \ M f ). 9t. M t! 58

59 DF,k-controllable nets A bounded and responsive open net N = (P,T,F,m0,P I,P O,Mf) is DF,k-controllable if there is a (bounded and responsive) partner N such that N N is DF and any place p (P I P O ) is k-bounded in N N such an N is called a DF,k-strategy of N 59

60 Approach Start with a bounded and responsive open net N = (P,T,F,m0,P I,P O,Mf) 1st step Define a strategy TS0 which is an automaton such that a state q of TS0 represents the set of markings N can be in while TS0 is in q i.e. q is the view of N according to the interactions observed so far Note that TS0 can be infinite 60

61 Notation A special symbol # tags final states Given a set of markings M of N, we denote by cl(m)n the closure of M i.e., the set of markings reachable in N from any of the markings in M cl(m) N = { m 0 9m 2 M. m 0 2 [Mi N } 61

62 TS 0 =(Q, E, q 0,Q f ) TS 0 q 0 = cl({m 0 }) N q 0 2 Q if q 2 Q if # 62 q any state q has a final counterpart then q 0 = q [ # 2 Q, q! q 2 E, q! q 0 2 E if x 2 P I ^ # 62 q then q 0 = cl({m + x m 2 q}) 2 Q, q x! q 0 2 E if x 2 P O TS0 simulates the production of messages in input places TS0 simulates the consumption of messages from output places then q 0 = {m x m 2 q, m(x) > 0}\{#} 2 Q, q x! q 0 Q f = {q 2 Q # 2 q} 62

63 Approach Starting from the strategy TS0 2nd step Define a strategy TS1 that removes from TS0 all states q that contains a marking m that exceeds the capacity bound k for some place in the interface (as a consequence remove all adjacent edges and all states that become unreachable) TS1 is always a finite automaton (actually it can be constructed directly from N) 63

64 TS 1 TS 0 =(Q, E, q 0,Q f ) Q 1 = Q \{q 2 Q 9m 2 q. 9x 2 (P I [ P O ).m(x) >k} E 1 = {q! q 0 2 E q, q 0 2 Q 1 } Q f1 = Q f \ Q 1 TS 1 =(Q 1,E 1,q 0,Q f1 ) 64

65 DF,1-controllability example: TS 1 N cl({a}) N 65

66 DF,1-controllability example: TS 1 N any state q has a final counterpart 66

67 DF,1-controllability example: TS 1 simulates the production of messages in input places cl({a + i, b + o + i}) N N 67

68 DF,1-controllability example: TS 1 N any state q has a final counterpart 68

69 DF,1-controllability example: TS 1 N q1 has not outgoing arc with label i because of 1-boundedness (this is TS1, not TS0) 69

70 DF,1-controllability example: TS 1 N cl({b}) N simulates the consumption of messages from output places 70

71 DF,1-controllability example: TS 1 N any state q has a final counterpart 71

72 DF,1-controllability example: TS 1 simulates the consumption of messages from output places N cl({b + i}) N simulates the production of messages in input places 72

73 DF,1-controllability example: TS 1 N any state q has a final counterpart 73

74 DF,1-controllability example: TS 1 simulates the consumption of messages from output places N 74

75 DF,1-controllability example: TS 1 N simulates the consumption of messages from output places cl({}) N 75

76 DF,1-controllability example: TS 1 N any state q has a final counterpart 76

77 DF,1-controllability example: TS 1 N 77

78 Approach Starting from the strategy TSi Iterative step Define a strategy TSi+1 that removes from TSi all states q that can invalidate the property of interest (as a consequence remove all adjacent edges and all states that become unreachable) At some point TSj+1 = TSj and we terminate 78

79 Notation We can compose TS i with N, writtents i N States are pairs [q, m] with q 2 Q i and m 2 q if m! t m 0 in N then [q, m] `(t)! [q, m 0 ] if q! q 0 2 E i then [q, m]! [q 0,m] if q! x q 0 2 E i with x 2 P I then [q, m]! x [q 0,m+ x] if q! x q 0 2 E i with x 2 P O and m(x) > 0 then [q, m]! x [q 0,m x] 79

80 DF,1-controllability example: TS 1 N 80

81 TS i+1 TS i =(Q i,e i,q 0,Q fi ) remove the state q if q! q is the only edge with source q remove the state q if 9m 2 q such that in TS i N if [q 0,m 0 ] is reachable from [q, m] then m 0 62 M f and only sequences of -steps are possible from [q, m] 81

82 DF,1-controllability example: TS 2 82

83 DF,1-controllability example: TS 2 83 X

84 DF,1-controllability example: TS 2 X 84 X

85 DF,1-controllability example: TS 2 X X 85 X

86 DF,1-controllability example: TS 2 X X X 86 X

87 DF,1-controllability example: TS 2 87

88 DF,1-controllability example: TS 2 N 88

89 DF,1-controllability example: TS 2 N X 89

90 X DF,1-controllability example: TS 2 N X 90

91 X DF,1-controllability example: TS 2 N X X X 91

92 X DF,1-controllability example: TS 2 N X X X X 92

93 DF,1-controllability example: TS 2 N X X X X X X 93

94 DF,1-controllability example: TS 2 N X X X X X X X X 94

95 DF,1-controllability example: TS 3 95

96 DF,1-controllability example: TS 3 N 96

97 Note Note the presence of a state associated with the empty set of markings it can appear in a strategy, but is actually unreachable in the composition with N for DF,k-controllability it makes no harm 97

98 DF,k-controllability theorem Let TS = (Q,E,q0,Qf) be the automaton produced by applying the above procedure to the open net N Theorem N is DF,k-controllable iff Q (proof omitted) 98

99 Behavioural properties: LF A closed net N = (P,T,F,m0,,,Mf) is LF (livelock-free) if from any reachable marking a final marking is reachable 8m 2 [m 0 i. [mi\m f 6= ; 99

100 LF,k-controllable nets A bounded and responsive open net N = (P,T,F,m0,P I,P O,Mf) is LF,k-controllable if there is a (bounded and responsive) partner N such that N N is LF and any place p (P I P O ) is k-bounded in N N such an N is called a LF,k-strategy of N 100

101 Approach We construct TS0 and TS1 as before. We change only the iterative step Iterative step Define a strategy TSi+1 that removes from TSi all states q that can invalidate the property of interest (as a consequence remove all adjacent edges and all states that become unreachable) At some point TSj+1 = TSj and we terminate 101

102 TS i+1 TS i =(Q i,e i,q 0,Q fi ) remove the state q if 9m 2 q such that in TS i no [q 0,m 0 ] with q 0 2 Q fi ^ m 0 2 M f is reachable from [q, m] N 102

103 LF,k-controllability theorem Let TS = (Q,E,q0,Qf) be the automaton produced by applying the above procedure to the open net N Theorem N is LF,k-controllable iff Q (proof omitted) 103

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 20 - Workflow modules 1 Object We study Workflow modules to model interaction

More information

Can I Find a Partner?

Can I Find a Partner? Can I Find a Partner? Peter Massuthe 1, Alexander Serebrenik 2, Natalia Sidorova 2, and Karsten Wolf 3 1 Humboldt-Universität zu Berlin, Institut für Informatik Unter den Linden 6, 10099 Berlin, Germany

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 17 - Diagnosis for WF nets 1 Object We study suitable diagnosis techniques

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 08 - Petri nets basics 1 Object Formalization of the basic concepts of

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni - Invariants Object We introduce two relevant kinds of invariants for

More information

Characterizing Weakly Terminating Partners of Open Systems

Characterizing Weakly Terminating Partners of Open Systems Characterizing Weakly Terminating Partners of Open Systems Christian Stahl 1, Daniela Weinberg 2, and Karsten Wolf 2 1 Department of Mathematics and Computer Science, Technische Universiteit Eindhoven,

More information

Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows

Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows Oana Prisecaru and Toader Jucan Faculty of Computer Science, Al. I. Cuza University,

More information

Process Mining in Non-Stationary Environments

Process Mining in Non-Stationary Environments and Machine Learning. Bruges Belgium), 25-27 April 2012, i6doc.com publ., ISBN 978-2-87419-049-0. Process Mining in Non-Stationary Environments Phil Weber, Peter Tiňo and Behzad Bordbar School of Computer

More information

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories 1 Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo Outline: Contracts and compositional methods for system design Where and why using

More information

A Component Framework where Port Compatibility Implies Weak Termination

A Component Framework where Port Compatibility Implies Weak Termination A Component Framework where Port Compatibility Implies Weak Termination Debjyoti Bera, Kees M. van Hee, Michiel van Osch, and Jan Martijn van der Werf Department of Mathematics and Computer Science, Technische

More information

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

Multiparty Contracts: Agreeing and Implementing Interorganizational Processes

Multiparty Contracts: Agreeing and Implementing Interorganizational Processes c The Author 2005. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oupjournals.org doi:10.1093/comjnl/bxh000

More information

Reducing Complexity of Large EPCs

Reducing Complexity of Large EPCs Reducing Complexity of Large EPCs Artem Polyvyanyy, Sergey Smirnov, and Mathias Weske Business Process Technology Group Hasso Plattner Institute at the University of Potsdam D-14482 Potsdam, Germany (artem.polyvyanyy,sergey.smirnov,mathias.weske)@hpi.uni-potsdam.de

More information

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de

More information

Automata-based Verification - III

Automata-based Verification - III CS3172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20/22: email: howard.barringer@manchester.ac.uk March 2005 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

7. Queueing Systems. 8. Petri nets vs. State Automata

7. Queueing Systems. 8. Petri nets vs. State Automata Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models

More information

Automata-based Verification - III

Automata-based Verification - III COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

Simulation of Spiking Neural P Systems using Pnet Lab

Simulation of Spiking Neural P Systems using Pnet Lab Simulation of Spiking Neural P Systems using Pnet Lab Venkata Padmavati Metta Bhilai Institute of Technology, Durg vmetta@gmail.com Kamala Krithivasan Indian Institute of Technology, Madras kamala@iitm.ac.in

More information

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,

More information

Soundness of Workflow Nets with an Unbounded Resource is Decidable

Soundness of Workflow Nets with an Unbounded Resource is Decidable Soundness of Workflow Nets with an Unbounded Resource is Decidable Vladimir A. Bashkin 1 and Irina A. Lomazova 2,3 1 Yaroslavl State University, Yaroslavl, 150000, Russia v_bashkin@mail.ru 2 National Research

More information

Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets

Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets Pnina Soffer 1, Maya Kaner 2, and Yair Wand 3 1 University of Haifa, Carmel Mountain 31905, Haifa, Israel 2 Ort Braude College,

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 07 - Introduction to nets 1 Object Overview of the basic concepts of

More information

Seamless Model Driven Development and Tool Support for Embedded Software-Intensive Systems

Seamless Model Driven Development and Tool Support for Embedded Software-Intensive Systems Seamless Model Driven Development and Tool Support for Embedded Software-Intensive Systems Computer Journal Lecture - 22nd June 2009 Manfred Broy Technische Universität München Institut für Informatik

More information

Structural Analysis of Resource Allocation Systems with Synchronization Constraints

Structural Analysis of Resource Allocation Systems with Synchronization Constraints Structural Analysis of Resource Allocation Systems with Synchronization Constraints Spyros Reveliotis School of Industrial & Systems Engineering Georgia Institute of Technology Atlanta, GA 30332 USA Abstract

More information

Automatic Synthesis of Distributed Protocols

Automatic Synthesis of Distributed Protocols Automatic Synthesis of Distributed Protocols Rajeev Alur Stavros Tripakis 1 Introduction Protocols for coordination among concurrent processes are an essential component of modern multiprocessor and distributed

More information

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 07 - Introduction to nets 1 Object Overview of the basic concepts of

More information

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS Francesco Basile, Ciro Carbone, Pasquale Chiacchio Dipartimento di Ingegneria Elettrica e dell Informazione, Università

More information

Introduction. Büchi Automata and Model Checking. Outline. Büchi Automata. The simplest computation model for infinite behaviors is the

Introduction. Büchi Automata and Model Checking. Outline. Büchi Automata. The simplest computation model for infinite behaviors is the Introduction Büchi Automata and Model Checking Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 The simplest computation model for finite behaviors is the finite

More information

Generalised Computation of Behavioural Profiles based on Petri-Net Unfoldings

Generalised Computation of Behavioural Profiles based on Petri-Net Unfoldings Generalised Computation of Behavioural Profiles based on Petri-Net Unfoldings Matthias Weidlich, Felix Elliger, and Mathias Weske Hasso Plattner Institute at the University of Potsdam, Germany {Matthias.Weidlich,Mathias.Weske}@hpi.uni-potsdam.de

More information

Lecture 4 Model Checking and Logic Synthesis

Lecture 4 Model Checking and Logic Synthesis Lecture 4 Model Checking and Logic Synthesis Nok Wongpiromsarn Richard M. Murray Ufuk Topcu EECI, 18 March 2013 Outline Model checking: what it is, how it works, how it is used Computational complexity

More information

c 2011 Nisha Somnath

c 2011 Nisha Somnath c 2011 Nisha Somnath HIERARCHICAL SUPERVISORY CONTROL OF COMPLEX PETRI NETS BY NISHA SOMNATH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Aerospace

More information

The Downward-Closure of Petri Net Languages

The Downward-Closure of Petri Net Languages The Downward-Closure of Petri Net Languages Peter Habermehl 1, Roland Meyer 1, and Harro Wimmel 2 1 LIAFA, Paris Diderot University & CNRS e-mail: {peter.habermehl,roland.meyer}@liafa.jussieu.fr 2 Department

More information

Business Processes Modelling MPB (6 cfu, 295AA)

Business Processes Modelling MPB (6 cfu, 295AA) Business Processes Modelling MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 07 - Introduction to nets!1 Object Overview of the basic concepts of Petri nets Free Choice Nets (book, optional

More information

Guaranteeing Weak Termination in Service Discovery

Guaranteeing Weak Termination in Service Discovery Fundamenta Informaticae XXI (2001) 1001 1030 1001 IOS Press Guaranteeing Weak Termination in Service Discovery Karsten Wolf Universität Rostock, 18051 Rostock, Germany karsten.wolf@uni-rostock.de Daniela

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly

More information

Compositional Analysis of Timed-arc Resource Workflows with Communication

Compositional Analysis of Timed-arc Resource Workflows with Communication Compositional Analysis of Timed-arc Resource Workflows with Communication Sine Viesmose Birch Christoffer Moesgaard des105f15, Spring 2015, Aalborg University 1 Resume Workflow analysis is a relatively

More information

SPECIFICATION MODELS. Chapter 3. Overview. Introducing Hierarchy. StateCharts

SPECIFICATION MODELS. Chapter 3. Overview. Introducing Hierarchy. StateCharts hapter SPEIFITION MOELS Overview Stateharts Hierarchy oncurrency Events and ctions Simulation Semantics Non-eterminism and onflicts Petri Nets Notation oncurrency Petri Net Languages ehavioral Properties

More information

Theory of Computation

Theory of Computation Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 3: Finite State Automata Motivation In the previous lecture we learned how to formalize

More information

A subtle problem. An obvious problem. An obvious problem. An obvious problem. No!

A subtle problem. An obvious problem. An obvious problem. An obvious problem. No! A subtle problem An obvious problem when LC = t do S doesn t make sense for Lamport clocks! there is no guarantee that LC will ever be S is anyway executed after LC = t Fixes: if e is internal/send and

More information

Applications of Petri Nets

Applications of Petri Nets Applications of Petri Nets Presenter: Chung-Wei Lin 2010.10.28 Outline Revisiting Petri Nets Application 1: Software Syntheses Theory and Algorithm Application 2: Biological Networks Comprehensive Introduction

More information

Business Process Regulatory Compliance is Hard

Business Process Regulatory Compliance is Hard IEEE TRANSACTIONS ON SERVICE COMPUTING, VOL. X, NO. X, X X 1 Business Process Regulatory Compliance is Hard Silvano Colombo Tosatto, Guido Governatori and Pierre Kelsen Abstract Verifying whether a business

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

Efficient Computation of Causal Behavioural Profiles using Structural Decomposition

Efficient Computation of Causal Behavioural Profiles using Structural Decomposition Efficient Computation of Causal Behavioural Profiles using Structural Decomposition Matthias Weidlich 1, Artem Polyvyanyy 1, Jan Mendling 2, and Mathias Weske 1 1 Hasso Plattner Institute at the University

More information

CS 322 D: Formal languages and automata theory

CS 322 D: Formal languages and automata theory CS 322 D: Formal languages and automata theory Tutorial NFA DFA Regular Expression T. Najla Arfawi 2 nd Term - 26 Finite Automata Finite Automata. Q - States 2. S - Alphabets 3. d - Transitions 4. q -

More information

An Alternative Construction in Symbolic Reachability Analysis of Second Order Pushdown Systems

An Alternative Construction in Symbolic Reachability Analysis of Second Order Pushdown Systems An Alternative Construction in Symbolic Reachability Analysis of Second Order Pushdown Systems Anil Seth CSE Department, I.I.T. Kanpur, Kanpur 208016, INDIA. seth@cse.iitk.ac.in Abstract. Recently, it

More information

Before we show how languages can be proven not regular, first, how would we show a language is regular?

Before we show how languages can be proven not regular, first, how would we show a language is regular? CS35 Proving Languages not to be Regular Before we show how languages can be proven not regular, first, how would we show a language is regular? Although regular languages and automata are quite powerful

More information

Transition Predicate Abstraction and Fair Termination

Transition Predicate Abstraction and Fair Termination Transition Predicate Abstraction and Fair Termination Andreas Podelski and Andrey Rybalchenko Max-Planck-Institut für Informatik Saarbrücken, Germany POPL 2005 ETH Zürich Can Ali Akgül 2009 Introduction

More information

Embedded systems specification and design

Embedded systems specification and design Embedded systems specification and design David Kendall David Kendall Embedded systems specification and design 1 / 21 Introduction Finite state machines (FSM) FSMs and Labelled Transition Systems FSMs

More information

The priority promotion approach to parity games

The priority promotion approach to parity games The priority promotion approach to parity games Massimo Benerecetti 1, Daniele Dell Erba 1, and Fabio Mogavero 2 1 Università degli Studi di Napoli Federico II 2 Università degli Studi di Verona Abstract.

More information

Failure Diagnosis of Discrete Event Systems With Linear-Time Temporal Logic Specifications

Failure Diagnosis of Discrete Event Systems With Linear-Time Temporal Logic Specifications Failure Diagnosis of Discrete Event Systems With Linear-Time Temporal Logic Specifications Shengbing Jiang and Ratnesh Kumar Abstract The paper studies failure diagnosis of discrete event systems with

More information

Deciding Substitutability of Services with Operating Guidelines

Deciding Substitutability of Services with Operating Guidelines Deciding Substitutability of Services with Operating Guidelines Christian Stahl 1,2,, Peter Massuthe 1,2, and Jan Bretschneider 1 1 Humboldt-Universität zu Berlin, Institut für Informatik, Unter den Linden

More information

More on Regular Languages and Non-Regular Languages

More on Regular Languages and Non-Regular Languages More on Regular Languages and Non-Regular Languages CSCE A35 Decision Properties of Regular Languages Given a (representation, e.g., RE, FA, of a) regular language L, what can we tell about L? Since there

More information

for System Modeling, Analysis, and Optimization

for System Modeling, Analysis, and Optimization Fundamental Algorithms for System Modeling, Analysis, and Optimization Stavros Tripakis UC Berkeley EECS 144/244 Fall 2013 Copyright 2013, E. A. Lee, J. Roydhowdhury, S. A. Seshia, S. Tripakis All rights

More information

Extending Supervisory Controller Synthesis to Deterministic Pushdown Automata Enforcing Controllability Least Restrictively

Extending Supervisory Controller Synthesis to Deterministic Pushdown Automata Enforcing Controllability Least Restrictively 12th IFAC/IEEE Workshop on Discrete Event Systems Extending Supervisory Controller Synthesis to Deterministic Pushdown Automata Enforcing Controllability Least Restrictively A.-K. Schmuck S. Schneider

More information

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING Alessandro Giua Xiaolan Xie Dip. Ing. Elettrica ed Elettronica, U. di Cagliari, Italy. Email: giua@diee.unica.it INRIA/MACSI Team, ISGMP, U. de Metz, France.

More information

Foundations of Informatics: a Bridging Course

Foundations of Informatics: a Bridging Course Foundations of Informatics: a Bridging Course Week 3: Formal Languages and Semantics Thomas Noll Lehrstuhl für Informatik 2 RWTH Aachen University noll@cs.rwth-aachen.de http://www.b-it-center.de/wob/en/view/class211_id948.html

More information

Constraint Solving for Program Verification: Theory and Practice by Example

Constraint Solving for Program Verification: Theory and Practice by Example Constraint Solving for Program Verification: Theory and Practice by Example Andrey Rybalchenko Technische Universität München Abstract. Program verification relies on the construction of auxiliary assertions

More information

Timed Automata VINO 2011

Timed Automata VINO 2011 Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.

More information

The Parameterized Complexity of Intersection and Composition Operations on Sets of Finite-State Automata

The Parameterized Complexity of Intersection and Composition Operations on Sets of Finite-State Automata The Parameterized Complexity of Intersection and Composition Operations on Sets of Finite-State Automata H. Todd Wareham Department of Computer Science, Memorial University of Newfoundland, St. John s,

More information

On the Design of Adaptive Supervisors for Discrete Event Systems

On the Design of Adaptive Supervisors for Discrete Event Systems On the Design of Adaptive Supervisors for Discrete Event Systems Vigyan CHANDRA Department of Technology, Eastern Kentucky University Richmond, KY 40475, USA and Siddhartha BHATTACHARYYA Division of Computer

More information

On the modularity in Petri Nets of Active Resources

On the modularity in Petri Nets of Active Resources On the modularity in Petri Nets of Active Resources Vladimir A. Bashkin Yaroslavl State University Yaroslavl, 150000, Russia email: bas@uniyar.ac.ru Abstract. Petri Nets of Active Resources (AR-nets) represent

More information

Computational Models - Lecture 3

Computational Models - Lecture 3 Slides modified by Benny Chor, based on original slides by Maurice Herlihy, Brown University. p. 1 Computational Models - Lecture 3 Equivalence of regular expressions and regular languages (lukewarm leftover

More information

Note: In any grammar here, the meaning and usage of P (productions) is equivalent to R (rules).

Note: In any grammar here, the meaning and usage of P (productions) is equivalent to R (rules). Note: In any grammar here, the meaning and usage of P (productions) is equivalent to R (rules). 1a) G = ({R, S, T}, {0,1}, P, S) where P is: S R0R R R0R1R R1R0R T T 0T ε (S generates the first 0. R generates

More information

Causal Nets: A Modeling Language Tailored towards Process Discovery

Causal Nets: A Modeling Language Tailored towards Process Discovery Causal Nets: A Modeling Language Tailored towards Process Discovery Wil van der Aalst, Arya Adriansyah, and Boudewijn van Dongen Department of Mathematics and Computer Science, Technische Universiteit

More information

CSE200: Computability and complexity Space Complexity

CSE200: Computability and complexity Space Complexity CSE200: Computability and complexity Space Complexity Shachar Lovett January 29, 2018 1 Space complexity We would like to discuss languages that may be determined in sub-linear space. Lets first recall

More information

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k. Complexity Theory Problems are divided into complexity classes. Informally: So far in this course, almost all algorithms had polynomial running time, i.e., on inputs of size n, worst-case running time

More information

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford Probabilistic Model Checking Michaelmas Term 20 Dr. Dave Parker Department of Computer Science University of Oxford Overview PCTL for MDPs syntax, semantics, examples PCTL model checking next, bounded

More information

Compact Regions for Place/Transition Nets

Compact Regions for Place/Transition Nets Compact Regions for Place/Transition Nets Robin Bergenthum Department of Software Engineering and Theory of Programming, FernUniversität in Hagen robin.bergenthum@fernuni-hagen.de Abstract. This paper

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

On Parametrical Sequences in Time Petri Nets

On Parametrical Sequences in Time Petri Nets On Parametrical Sequences in Time Petri Nets Louchka Popova-Zeugmann Humboldt-Universität zu Berlin, Institut für Informatik, Unter den Linden 6, D-10099 Berlin e-mail: popova@informatik.hu-berlin.de Extended

More information

Discrete Event Systems Exam

Discrete Event Systems Exam Computer Engineering and Networks Laboratory TEC, NSG, DISCO HS 2016 Prof. L. Thiele, Prof. L. Vanbever, Prof. R. Wattenhofer Discrete Event Systems Exam Friday, 3 rd February 2017, 14:00 16:00. Do not

More information

Acceptance of!-languages by Communicating Deterministic Turing Machines

Acceptance of!-languages by Communicating Deterministic Turing Machines Acceptance of!-languages by Communicating Deterministic Turing Machines Rudolf Freund Institut für Computersprachen, Technische Universität Wien, Karlsplatz 13 A-1040 Wien, Austria Ludwig Staiger y Institut

More information

STUBBORN SETS FOR REDUCED STATE SPACE GENERATION

STUBBORN SETS FOR REDUCED STATE SPACE GENERATION STUBBORN SETS FOR REDUCED STATE SPACE GENERATION Antti Valmari Technical Research Centre of Finland Computer Technology Laboratory PO Box 201, SF-90571 OULU FINLAND Tel. int. +358 81 509 11t I ABSTRACT

More information

Closure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism

Closure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties of Regular Languages Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties Recall a closure property is a statement

More information

Principles of Program Analysis: A Sampler of Approaches

Principles of Program Analysis: A Sampler of Approaches Principles of Program Analysis: A Sampler of Approaches Transparencies based on Chapter 1 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis Springer Verlag

More information

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska LECTURE 6 CHAPTER 2 FINITE AUTOMATA 2. Nondeterministic Finite Automata NFA 3. Finite Automata and Regular Expressions 4. Languages

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Stavros Tripakis 2 VERIMAG Technical Report TR-2004-26 November 2004 Abstract We introduce problems of decentralized

More information

Probabilistic Model Checking and Strategy Synthesis for Robot Navigation

Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Dave Parker University of Birmingham (joint work with Bruno Lacerda, Nick Hawes) AIMS CDT, Oxford, May 2015 Overview Probabilistic

More information

Business Process Management

Business Process Management Business Process Management Theory: The Pi-Calculus Frank Puhlmann Business Process Technology Group Hasso Plattner Institut Potsdam, Germany 1 What happens here? We discuss the application of a general

More information

Optimal Metric Planning with State Sets in Automata Representation [3]

Optimal Metric Planning with State Sets in Automata Representation [3] Optimal Metric Planning with State Sets in Automata Representation [3] Björn Ulrich Borowsky Stefan Edelkamp Fakultät für Informatik, Technische Universität Dortmund, Germany 2008 (Slides by ) Goal and

More information

arxiv: v1 [cs.ds] 17 Mar 2017

arxiv: v1 [cs.ds] 17 Mar 2017 arxiv:1703.06733v1 [cs.ds] 17 Mar 2017 Discovering Relaxed Sound Workflow Nets using Integer Linear Programming S.J. van Zelst, B.F. van Dongen, W.M.P. van der Aalst, and H.M.W. Verbeek Department of Mathematics

More information

Let us first give some intuitive idea about a state of a system and state transitions before describing finite automata.

Let us first give some intuitive idea about a state of a system and state transitions before describing finite automata. Finite Automata Automata (singular: automation) are a particularly simple, but useful, model of computation. They were initially proposed as a simple model for the behavior of neurons. The concept of a

More information

Automata Theory (2A) Young Won Lim 5/31/18

Automata Theory (2A) Young Won Lim 5/31/18 Automata Theory (2A) Copyright (c) 2018 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later

More information

Regular Language Equivalence and DFA Minimization. Equivalence of Two Regular Languages DFA Minimization

Regular Language Equivalence and DFA Minimization. Equivalence of Two Regular Languages DFA Minimization Regular Language Equivalence and DFA Minimization Equivalence of Two Regular Languages DFA Minimization Decision Property: Equivalence Given regular languages L and M, is L = M? Algorithm involves constructing

More information

Communication and Concurrency: CCS

Communication and Concurrency: CCS Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 cours SSDE Master 1 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics,

More information

Synchronisation and Cancellation in Workflows based on Reset nets

Synchronisation and Cancellation in Workflows based on Reset nets Synchronisation and Cancellation in Workflows based on Reset nets Moe Thandar Wynn 1, W.M.P. van der Aalst 1,2, A.H.M. ter Hofstede 1 and David Edmond 1 Business Process Management Program Faculty of Information

More information

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Fundamenta Informaticae XX (2004) 1 23 1 IOS Press A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Javier Esparza Institute for Formal Methods in Computer Science

More information

Nondeterministic finite automata

Nondeterministic finite automata Lecture 3 Nondeterministic finite automata This lecture is focused on the nondeterministic finite automata (NFA) model and its relationship to the DFA model. Nondeterminism is an important concept in the

More information

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

Petri nets. s 1 s 2. s 3 s 4. directed arcs. Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1

More information

Basics of Relation Algebra. Jules Desharnais Département d informatique et de génie logiciel Université Laval, Québec, Canada

Basics of Relation Algebra. Jules Desharnais Département d informatique et de génie logiciel Université Laval, Québec, Canada Basics of Relation Algebra Jules Desharnais Département d informatique et de génie logiciel Université Laval, Québec, Canada Plan 1. Relations on a set 2. Relation algebra 3. Heterogeneous relation algebra

More information

What we have done so far

What we have done so far What we have done so far DFAs and regular languages NFAs and their equivalence to DFAs Regular expressions. Regular expressions capture exactly regular languages: Construct a NFA from a regular expression.

More information

Deciding life-cycle inheritance on Petri nets

Deciding life-cycle inheritance on Petri nets Deciding life-cycle inheritance on Petri nets H.M.W. Verbeek, T. Basten Eindhoven University of Technology P.O. Box 513, NL-5600 MB Eindhoven, The Netherlands h.m.w.verbeek@tm.tue.nl Abstract. One of the

More information

Modeling and Stability Analysis of a Communication Network System

Modeling and Stability Analysis of a Communication Network System Modeling and Stability Analysis of a Communication Network System Zvi Retchkiman Königsberg Instituto Politecnico Nacional e-mail: mzvi@cic.ipn.mx Abstract In this work, the modeling and stability problem

More information

Attack-Resilient Supervisory Control of Discrete-Event Systems

Attack-Resilient Supervisory Control of Discrete-Event Systems 1 Attack-Resilient Supervisory Control of Discrete-Event Systems Yu Wang, Alper Kamil Bozkurt and Miroslav Pajic arxiv:194.3264v1 [cs.fl] 5 Apr 219 Abstract In this work, we study the problem of supervisory

More information

CS 373: Theory of Computation. Fall 2010

CS 373: Theory of Computation. Fall 2010 CS 373: Theory of Computation Gul Agha Mahesh Viswanathan Fall 2010 1 1 Normal Forms for CFG Normal Forms for Grammars It is typically easier to work with a context free language if given a CFG in a normal

More information

Nondeterministic Finite Automata. Nondeterminism Subset Construction

Nondeterministic Finite Automata. Nondeterminism Subset Construction Nondeterministic Finite Automata Nondeterminism Subset Construction 1 Nondeterminism A nondeterministic finite automaton has the ability to be in several states at once. Transitions from a state on an

More information

Earliest Arrival Flows in Networks with Multiple Sinks

Earliest Arrival Flows in Networks with Multiple Sinks Electronic Notes in Discrete Mathematics 36 (2010) 607 614 www.elsevier.com/locate/endm Earliest Arrival Flows in Networks with Multiple Sinks Melanie Schmidt 2 Lehrstuhl II, Fakultät für Informatik Technische

More information

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1 Embedded Systems 6-1 - Place/transition nets REVIEW Def.: (P, T, F, K, W, M 0 ) is called a place/transition net (P/T net) iff 1. N=(P,T,F) is a net with places p P and transitions t T 2. K: P (N 0 {ω})

More information