Encoding the dynamics of deterministic systems

Size: px
Start display at page:

Download "Encoding the dynamics of deterministic systems"

Transcription

1 Math Meth Oper Res (2011) 73: DOI /s ORIGINAL ARTICLE Encoding the dynamics of deterministic systems Luis M. Torres Annegret K. Wagler Received: 4 November 2009 / Accepted: 2 November 2010 / Published online: 21 April 2011 Springer-Verlag 2011 Abstract We present a model for the dynamics of discrete deterministic systems, based on an extension of the Petri nets framework. Our model relies on the definition of a priority relation between conflicting transitions, which is encoded by orienting the edges of a transition conflict graph. We provide a characterization in terms of a local consistency condition of those deterministic systems whose dynamic behavior can be encoded using our approach. Finally, we consider the problem of recognizing when an orientation of the transition conflict graph is valid for encoding the dynamic behavior of a system. Keywords Petri nets Concurrent deterministic dynamic systems 1 Introduction Petri nets constitute a well-established framework for modeling complex dynamic systems. Their broad application range includes the design of asynchronous hardware circuits (Yakovlev et al. 1996), the analysis of production and workflow systems (Adam et al. 1998), the analysis and control of batch processes (Gu and Bahri 2002), the design of distributed algorithms for networks of agents (Reisig 1998), and the modeling and simulation of biological networks (Hardy and Robillard 2004; Koch and Heiner 2008; Chaouiya et al. 2008), to cite only some prominent examples. L. M. Torres (B) Departamento de Matemática, Escuela Politécnica Nacional, Quito, Ecuador luis.torres@epn.edu.ec A. K. Wagler Faculty of Science and Technology (ISIMA, LIMOS), University Blaise Pascal, Clermont-Ferrand, France wagler@isima.fr

2 282 L. M. Torres, A. K. Wagler The structure of these systems is described by means of a network, while the studied dynamic processes are usually represented as directed paths in a corresponding reachability digraph (termed also as marking graph in the Petri net community). Several fundamental issues concerning the dynamics of such systems, which are inherently complex in nature as they involve (conflicting or concurrent) interactions of a large number of components, can be addressed within this setting, either via theoretical analysis or, in the most cases, via computer simulation. Petri nets also turned out to be a flexible modeling framework that has been extended in various ways for dealing with different applications. For instance, colored and highlevel Petri nets have been widely used for protocol specification in communication networks (Billington et al. 1999; Jensen 1997). Stochastic Petri nets are used in cases where uncertainty is attached to input data, to describe external noise generated by the environment, as well as noise that might be intrinsic to a system (Marsan et al. 1995; Balbo 2002). Hybrid Petri nets allow to model systems were both continuous and discrete processes coexist (David and Alla 2005), and the inclusion of additional features required for modeling certain biological networks has led to the definition of Hybrid Functional Petri nets (Matsuno et al. 2003). In this paper we consider another possible extension that aims at representing systems whose dynamic behavior exhibits deterministic features, as described in the following. We will introduce Petri nets and related concepts only as far as they are necessary for formulating our model. The reader interested in more information about this topic is referred to the extensive literature available (see, e.g., Reisig 1985). To model the structure of the underlying system, one uses a network, that is a weighted directed bipartite graph G = (P T, A,w) with two kinds of nodes, places and transitions, linked by weighted directed arcs. The set P of places represents the system s components, while the set T of transitions stands for the possible interactions. We denote by A the set of arcs in the network and by w the vector of their weights, with w it being the weight of arc (i, t) A. Depending on the application, some additional specific requirements may be imposed on the structure of G. Here, we only assume that the network is simple, i.e., between any place i P and any transition t T, there is at most one arc. Antiparallel pairs of arcs 1, which appear for example when modeling catalyzed chemical reactions, can be easily replaced by means of inserting additional places and transitions, see e.g. Chaouiya (2007), Marwan et al. (2008). A network G = (P T, A,w) can also be represented by its incidence matrix M := (m it ) Z P T where each row corresponds to a place i P and each column to a transition t T.Wehave w it if i P (t), m it := +w ti if i P + (t), 0 otherwise, 1 Commonly denoted as test arcs in the Petri net community.

3 Encoding the dynamics of deterministic systems 283 where P (t) := {i P : (i, t) A}, denotes the set of pre-places of t T and P + (t) := {i P : (t, i) A} the set of its post-places. Some places B P have bounded capacities associated with them, which are given by the positive integral vector u Z+ B.Astate2 of the system is an assignment of tokens to places that takes into account the capacities of the places in B and some other conditions, if necessary. Hence, any state can be represented as an integral nonnegative vector x Z+ P and the potential state space of the system is the set of all theoretically possible states: X := { x Z P + : x i u i, } i B. Observe that X is finite if B = P holds or some other conditions restrict the set of potential states. Dynamic processes are described as sequences x 1,...,x k of consecutive system states 3, where state x i+1 is obtained from x i by switching a transition t T. Thereby, t consumes w it tokens from each pre-place i P (t) and produces w ti new tokens on each post-place i P + (t). A transition t T is enabled at a state x X if switching t yields a valid successor state and disabled otherwise. Thus, T (x) := { t T : x i w it 0, i P (t); x i + w ti u i, i P + (t) B } is the set of enabled transitions at state x. Accordingly, X (t) := { x X : x i w it, i P (t); x i u i w ti, i P + (t) B } denotes the set of states at which transition t is enabled. In this setting, switching a transition t T (x) changes the state of the system from x to x + M t, where M t is the column of M associated with t. The dynamic behavior of a system expresses the way how the system changes its states over time, or in response to an external stimulus. Usually, this behavior is the result of several conflicting as well as concurrent ongoing dynamic processes. A Petri net is a pair (G, x 0 ) consisting of a network G together with an initial state x 0, and its state space is understood as the set of all further system states which can be reached from x 0 by switching sequences of transitions. Again, see Reisig (1985) for 2 Also known as a marking m : P Z + in the Petri net community. 3 Throughout this paper, we will use superindices to reference different states and subindices to specify places. Thus, x j i is the number of tokens assigned to place i at state x j.

4 284 L. M. Torres, A. K. Wagler basic definitions. In this framework, describing the dynamics of a system might be done by model animation, i.e., by simulating the flow of tokens inside the network as transitions are switched. Given a network G and an initial state x 0 X, some central problems that are usually studied in this context are: Reachability: Determine whether the system may eventually reach one of a set of target states Y X after a finite sequence of transition switches. Boundedness: Determine if there are sequences of transition switches that lead to the accumulation of an unlimited number of tokens at some place of the network. Existence of deadlocks: Determine whether the system can reach a state at which no transitions are enabled. Liveness: Determine whether the Petri net is live, i.e., whether no sequence of transition switches can put the system into a state where some transition is permanently disabled. (This is the case if for every transition t T the following holds: given any state x 1 reachable from x 0, there is a state x 2 reachable from x 1 such that t T (x 2 )). The problems mentioned above are in general hard from a computational complexity point of view. For instance, reachability was proven to require exponential space in Lipton (1976) and decidability of this problem could only be established some years later (Mayr 1981, 1984). For reversible Petri nets, i.e., Petri nets where a state x is reachable from a state x if and only if x is reachable from x, reachability can be shown to be equivalent to a special version of the polynomial ideal membership problem: Given multivariate polynomials f, g 1,...,g n over some ring, determine whether f is in the ideal generated by g 1,...,g n. This connection can be exploited to gain more insight on the complexity of the problem (see, for instance, Mayr 1995 for a survey). Moreover, Gröbner bases techniques for testing ideal membership can be adapted to study reachability in reversible Petri nets. Despite of rather discouraging worst-case lower bounds on their complexity, these methods have been successfully applied to some practical problems (Chandler and Heyworth 1999; Caprotti et al. 1995). Dynamic processes can be encoded as directed paths in a state digraph G := (X, A) where nodes represent states and, for any pair of states x, x X,wehave (x, x ) A if and only if x = x + M t for some t T (x), i.e., if x can be obtained from x by switching a single transition. The encoding size of G is of order (ū P ), with ū := min {u i : i B} or even infinite if B = P. In the Petri net community, it is commontousethetermreachability or marking graph to refer to the subgraph of G induced by the set X (x 0 ) of nodes corresponding to those states that can be reached from the initial state x 0 of the network. A particular situation occurs when so-called dynamic conflicts are present, in which two transitions are enabled, but switching one disables the other. In this case, model animation does not allow definite conclusions about any system properties, as mentioned in Koch and Heiner (2008). The reason is that the occurrence of dynamic conflicts is understood as alternative (branching) system behavior, where a decision between these alternatives is taken non-deterministically. However, there are examples of systems that show a deterministic behavior despite the existence of dynamic conflicts. More precisely, we call a dynamic system deterministic if any state x X has a unique successor state succ(x). For instance, some

5 Encoding the dynamics of deterministic systems 285 biological systems are deterministic, as stimulating them in a certain way triggers always the same response (see e.g. the light-induced sporulation of Physarum polycephalum plasmodia or the phototaxis of halobacterial cells described in Marwan and Starostzik 2002, Marwan 2003, Marwan et al. 2005). Petri nets, as originally defined, can be used to model such systems only in some trivial cases. Here we present a possible way to overcome this difficulty. To model a deterministic system (independently from its initial state), a successor function succ : X X needs to be defined which returns succ(x) for every potential state x X. Therefore, we will use the notation S = (G, u, succ) for referring to such a system. An explicit encoding of succ, for instance pointwise, is about of the same size as the state digraph G, and hence exponential in the size of G and u. Here we propose a more compact way of representing the dynamics of S, by encoding the global dynamic behavior of the system through a local selection criterion that chooses among all currently enabled transitions the one which switches to the successor state succ(x). An overview of the general aspects of our model is provided in the next section, where some potential applications are also discussed. Then we introduce the two main components of the model: the transition conflict graph and its properties are addressed in Sect. 3, while valid orientations of this conflict graph, to impose priorities among transitions as a selection criterion, are considered in Sect. 4. In the same section we also provide a characterization of the deterministic systems that can be encoded by our model. Our work is based on ideas proposed by Marwan et al. (2008), Wagler and Weismantel (2009) in the context of biological interaction networks. 2 Encoding the dynamics of deterministic systems Consider a system S = (G, u, succ) with network G = (P T, A,w) and let M denote the incidence matrix of G. Recall that the state digraph of S is defined by G := (X, A) where nodes represent potential states and a node x has an outgoing arc (x, x ) A if and only if x = x + M t for some t T (x), i.e., if x can be obtained from x by switching a single transition. We call x X a branching state if there are at least two transitions in T (x). The existence of a branching state implies either an alternative or a concurrent behavior of the system. An alternative behavior occurs when at least two transitions t j, t k T (x) are in dynamic conflict, i.e., if they cannot switch simultaneously as for some place i P, we have x i w itj w itk < 0, or x i + w t j i + w tk i > u i, thus, if x + M t j + M tk / X holds. While animating the model, either t j or t k has to be selected at x. In the case of concurrency, on the contrary, no two transitions from T (x) are in a dynamic conflict. Then all transitions in T (x) could be switched simultaneously, resulting in the valid state

6 286 L. M. Torres, A. K. Wagler x = x + t T (x) M t X. In this case, G contains paths for all possible interleaving sequences between x and x, corresponding to all possible permutations of the transitions in T (x). Petri nets are an adequate model for simulating the dynamic behavior of deterministic systems, only if no branching states are present. Otherwise, a mechanism has to be specified that allows to decide which is the right path to choose in the state digraph. This includes in particular a way of resolving dynamic conflicts. For modeling purposes, we assume in the sequel that the dynamic behavior of a deterministic system is specified in the form of a successor-oracle, which returns for every state x X, the value of succ(x), and propose a compact implementation for this oracle. Moreover, we restrict our attention to systems where the successor-oracle can be expressed via a transition selection function trans : X T, which assigns to every state x X a unique transition trans(x) T (x) that must be switched in order to reach state succ(x). Note that not all deterministic systems can be modeled in this way, see the discussion in Sect. 5. Even in the case where the dynamic behavior can be specified over a transition selection function, an explicit (i.e., pointwise) encoding of trans is extensive in the sense that it requires an amount of space proportional to the size of the state digraph G, which, as pointed out in the last section, is at least exponential on the number of places of the network. Our contribution consists in providing a compact scheme for encoding trans. As we prove in the next two sections, if S = (G, u, succ) satisfies a quite natural consistency condition, there exists a digraph D := (T, A) on the set of transitions with the following properties: for every x X,thesetT (x) induces a subgraph having a unique sink t(x) and t(x) = trans(x) is the required transition to switch from x to succ(x). Observe that this graph has a size of O( T 2 ), which is polynomial in the size of G. The arcs of D can be interpreted as priority relations between pairs of transitions, with trans(x) being the transition with highest priority among all transitions in T (x). We call such a digraph a valid orientation of the transition conflict graph. (These terms will be explained in more detail in the next two sections.) As illustrated in Algorithm 1, a valid orientation completely encodes the dynamic behavior of a deterministic system, since it can be used to obtain an implicit implementation of the successor-oracle. Given a state x X, all we need to do in order to find its successor is to determine the highest-priority transition trans(x) at x. This can be accomplished by searching for the unique sink in the subgraph of D induced by the set T (x) of enabled transitions. (If no transitions are enabled at x, the algorithm just returns the same current state x as successor state.) A predecessor of x is a state y X such that succ(y) = x. For that, we must have x = y + M trans(y). Since there are at most T candidates for the transition trans(y), it follows that the set pred(x) of all possible predecessors of x has cardinality no larger than T, and it can be constructed calling the successor oracle at most T times, as shown in Algorithm 2. Here, first a set cand(x) of all candidate transitions t T

7 Encoding the dynamics of deterministic systems 287 Algorithm 1 Implementing a successor-oracle by a valid orientation. Input: (G, u, D), x X Output: succ(x) 3: Construct the set T (x) of enabled transitions if T (x) = then return x 6: end if {Compute out-degree of transitions in the subgraph of D induced by T (x)} for t T (x) do 9: δ (t) := { tt A : t T (x) } end for {Return successor state} 12: t t T (x) with δ (t) = 0 return x + M t Algorithm 2 An implementation for a predecessor-oracle. Input: (G, u, D), x X Output: pred(x) 3: {Construct set of transition candidates} cand(x) { t T : x i + w it u i, i P (t) B; x i w ti 0, i P + (t) } {Call successor-oracle to construct sets of predecessors} 6: pred(x) for t cand(x) do y x M t 9: if trans(y) = t then pred(x) pred(x) {y} end if 12: end for {Return set of possible predecessors} return pred(x) fulfilling y := x M t X is computed, and later the condition t = trans(y) is tested for each candidate by calling the successor oracle. Computing successors and sets of predecessors is a key operation within simulation algorithms to study the dynamic behavior of a system and in particular to address the different questions described in the last section. To the best of our knowledge, currently no solution algorithm for these problems is known, which does not rely on storing explicit descriptions of the state digraph or some equivalent structure to compute succ(x) at every state x, which strongly limits the size of the networks that can be considered, due to the high memory requirements. Moreover, in certain application areas such as systems biology, the explicit values of succ(x) can only be determined by carrying out expensive and time-consuming wet lab experiments. In the context of biological systems, the concept of a regulatory structure was introduced in Marwan et al. (2008) as a mathematical model for an interaction network. Using our notation, a regulatory structure is a triple (G, u, A), where (G, u) describes a capacitated network and A is a partial order on the set of transitions. In the applications considered by the authors, this partial order contains enough constraintsto identifytrans(x) at each state x. In the next sections we extend the concept of regulatory structures in two directions: we consider which other kinds of priority

8 288 L. M. Torres, A. K. Wagler relations among transitions can be used to encode the dynamics of a system in a compact manner, and we examine when a deterministic system admits such an encoding. Other approaches have been proposed for handling dynamic conflicts in Petri nets. For instance, in Runge (2004) colored Petri nets are used as models for metabolic networks in order to avoid dynamic conflicts that could lead to system deadlocks. In a colored Petri net, each token is painted with a color from a given set, and transitions are color-aware, i.e., for each transition t T information on the number of tokens consumed (resp. produced) from each pre-place (resp. at each post-place) when t is switched is specified for each color separately. If two transitions t 1, t 2 T have a common pre-place i P, a dynamic conflict between t 1 and t 2 is avoided by specifying different color requirements for them. Thus, a token in i can enable only one of the transitions, depending on its color. The difference between this model and the one we present here lies in the application that is pursued: while in Runge (2004) colors are used as a means for ensuring that each token follows a certain metabolic pathway in the network with the goal of avoiding deadlocks, here we want to establish priorities among transitions as a compact way for encoding the dynamics of deterministic systems. 3 The transition conflict graph As observed in the last section, one key issue to be addressed when modeling the dynamic behavior of a deterministic system is the specification of a mechanism for the (unambiguous) resolution of dynamic conflicts between enabled transitions. This is precisely the idea upon which our model is built. In the following we introduce its first component in a more formal way and examine some of its properties. Let us start with a definition: Given a capacitated network (G, u), with G = (P T, A,w),the transition conflict graph of (G, u) is an undirected graph K (G,u) = (T, E) having as nodes the transitions from G, where two transitions t, t are joined by an edge if and only if there exists at least one state where both are enabled, i.e., tt E X (t) X (t ) =. As long as there is no risk of confusion, we will simply write K instead of K (G,u).It follows straightforwardly from this definition that, for every state x X,the set T (x) of enabled transitions induces a clique in K, i.e., a set of mutually adjacent nodes. Remark 1 The converse is not necessarily true, as it is shown in Fig. 1. Here, t 1, t 2 and t 4 form a clique in K, but there is no state x satisfying T (x) = {t 1, t 2, t 4 },asfor these three transitions to be enabled we must have x 2 = x 5 = 1 and x 3 = 0, and then t 5 is also enabled. However, as the sets X (t) are boxes, it is straightforward to prove that at least the inclusionwise maximal cliques in K are associated with states of the system. The transition conflict graph K can be constructed in O( P T 2 ) time using a straightforward algorithm to check for box intersections X (t) X (t ). The next lemma provides a more efficient way of computation.

9 Encoding the dynamics of deterministic systems 289 (a) (b) Fig. 1 a A capacitated network of a dynamic system, and b the corresponding transition conflict graph. All place capacities and arc weights are assumed to be equal to one Lemma 1 Consider a capacitated network (G, u), with G = (P T, A,w) and X (t) = t T. Then t, t T are in conflict if and only if w it u i w t i w it u i w ti i P (t) P + (t ) B and i P (t ) P + (t) B holds. Proof Remark that two transitions t, t T are in conflict if and only if X (t) X (t ) =. Assume w it > u i w t i holds for some i P (t) P + (t ) B, and observe that for any state x X (t) we must have x i w it > u i w t i. But then, x i + w t i > u i implies t T (x), which is equivalent to saying x X (t ). Hence, X (t) X (t ) = follows. Necessity of the second condition can be proven in a similar way. On the other hand, assume both conditions hold, and consider the state x defined by: w it, if i P (t) \ P (t ) w x i := it, if i P (t ) \ P (t) w, if i P (t) P (t ) 0, otherwise, where w := max {w it,w it }. We will show that x X (t) X(t ). To prove x X (t), observe that by construction any pre-place i P (t) fulfills x i w it. Moreover, any place i P + (t) B \ P (t ) has x i = 0 and must satisfy x i u i w ti,as otherwise X (t) =. (Note that i P + (t) i P (t), since the network is simple). Finally, if i P + (t) P (t ) B, then we have from the second condition x i = w it u i w ti. Analogously, x X (t ) follows from the first condition, and this completes the proof. Observe that, in the particular case where u = 1l, it follows as a corollary from the last lemma that two transitions t, t T are in conflict if and only if: P (t) P + (t ) B = and P (t ) P + (t) B =. (1) The following example illustrates the previous results.

10 290 L. M. Torres, A. K. Wagler Example 1 Consider the capacitated network (G, 1l), with G = ( P T, A, 1l),from Fig. 1a. Checking the pre- and post-places for all transitions in T yields the following: t i P (t i ) P + (t i ) t 1 {2} {1} t 2 {2} {3} t 3 {2} {5} t 4 {5} {1, 4} t 5 {2, 5} {3} According to (1), all pairs of transitions are in conflict, except (t 3, t 4 ) and (t 3, t 5 ), and we obtain the transition conflict graph shown in Fig. 1b. A natural question is whether transition conflict graphs arising from capacitated networks have a special structure from a graph-theoretical point of view. Observe that, according to the characterization given in Lemma 1, adding a new place i, with u i = 1, to an existing network, together with arcs of the form (t, i) and (i, t ) connecting i to two conflicting transitions t and t, and setting w ti = w it = 1, results in removing the corresponding edge tt from the conflict graph. This idea is used to prove the following result. Lemma 2 Let H be an arbitrary undirected graph. There exists a capacitated network (G, u), G = (P T, A,w), with the property that its transition conflict graph K is isomorphic to H. Proof Let H : =(V, E). Consider at first the network G : =(P T, A, 1l) with P :={1}, T :=V, and A := { (1, t) : t T }, and let u 1 = 1. As all transitions are enabled if x 1 = 1, we have K (G,u 1 ) = K V, i.e., the transition conflict graph of (G, u 1 ) is the complete graph on the set V of nodes. Now we make use of the above observation and introduce, for every pair t, t V such that tt E, a new place i in the network, together with the arcs (t, i) and (i, t ). Moreover, we set u i = w ti = w it = 1. Since this results in deleting the edge tt from the conflict graph, in the end we obtain a capacitated network (G, u) for which K = H. We have noted that the set of enabled transitions T (x) for any state x X induces a clique on K and, conversely, that any inclusionwise maximal clique from K is related to a state. In fact, there are networks where every clique from K is associated to some state. Theorem 1 Let H be an arbitrary undirected graph and Q the family of all cliques from H. There exists a capacitated network (G, u), G = (P T, A,w), such that K is isomorphic to H and, for every Q Q, there is a state x X with T (x) = Q. Proof From Lemma 2 there is a capacitated network (G, u ), G := (P T, A,w ), having H as its transition conflict graph. Moreover, as shown in the proof of that lemma, we may assume all arc weights to be equal to one and all places to have capacities equal to one. We introduce a set of additional places P := {i(t) : t T },

11 Encoding the dynamics of deterministic systems 291 Fig. 2 For any arbitrary graph H, capacitated networks (G 1, u 1 ) and (G 2, u 2 ) can be constructed such that K (G 1,u 1 ) = K (G 2,u 2 ) = H. Moreover, every clique of H is associated to a state in the second network. All place capacities and arc weights are assumed to be equal to one i.e., one new place for each transition in G. Furthermore, we define the set of arcs A := {(i(t), t) : t T }, and let u i(t) = w i(t)t = 1, t T. Denote by (G, 1l), G : =(P T, A, 1l), the new capacitated network, with P := P P and A := A A. It is straightforward to check that K (G,u ) = K (G,u) = H, as all transition conflicts in G remain in G, and no new conflicts are introduced by the transformation described above. Now consider any clique Q Q in H. IfQ is inclusionwise maximal, there is a state of G associated to Q, and the proof finishes. Otherwise, Q can be extended to an inclusionwise maximal clique Q := Q Q.Letx be a state of G for which T (x) = Q. Observe that for every t Q we must have x i(t) = 1atthe corresponding pre-place i(t) P, as otherwise t is not enabled. Moreover, setting { x i 0, if i P := and i = i(t) for some t Q, x i, otherwise, we obtain a state where each transition from Q is disabled, while the other transitions remain enabled. Hence, T (x ) = Q. Example 2 Figure 2 shows an example of the constructions described in Lemma 2 and Theorem 1. For the given graph H, two capacitated networks (G 1, u 1 ) and (G 2, u 2 ) are shown with K (G 1,u 1 ) = K (G 2,u 2 ) = H. Observe that the clique t 2 t 3 does not correspond to any state of G 1. On the other hand, the reader can verify that every clique of H is associated with some state of G 2. Indeed, any inclusionwise maximal clique Q is associated to a state x, and a state for a (non-maximal) clique Q Q can be obtained from x by switching off individual transitions, setting to zero the token values at their corresponding pre-places 4,...,7. This network is neither unique nor minimal as, for instance, deleting places 5 and 6 yields a new capacitated network with the same conflict graph and having also one state associated to every clique of H. As a generalization of the result from Theorem 1, one could ask whether, given an arbitrary graph H and an arbitrary family Q of cliques from H, (containing all inclusionwise maximal cliques) there exists a capacitated network (G, u), G = (P T, A,w), such that K is isomorphic to H and Q = {T (x) : x X }. We provide at

12 292 L. M. Torres, A. K. Wagler next a necessary condition on Q for the case when all capacities and arc weights in (G, u) are equal to one. In order to state our result, we need to introduce some notation and a lemma. Definition 1 Let A be a family of sets and B A. We say that A is closed under intersection with respect to B if, for each B B, the family: A B := {A B : A A, A B = } is closed under intersection, i.e., for any A 1, A 2 A B we have A 1 A 2 A B. Denote by P (T 1 ) and P + (T 1 ) the sets of pre-places and post-places of a given set T 1 T of transitions, i.e., P (T 1 ) := t T1 P (t), P + (T 1 ) := t T1 P + (t). (2) The following is straightforward to observe. Lemma 3 For any capacitated network (G, 1l), with G = (P T, A, 1l), ifx X and t T, we have t T (x) P (t) P (T (x)) P + (t) P + (T (x)). Proof If t T (x), both set inclusions follow directly from the definitions in (2). Conversely, note that x i = 1 must hold for every i P (T (x)), as otherwise some transition in T (x) would not be enabled. Similarly, we have x i = 0 for every i P + (T (x)). But then, t is enabled, as all its pre-transition places hold a token and all its post-transition places have enough free capacity, and it follows t T (x). Now we characterize families of cliques in the transition conflict graph related to sets of enabled transitions. Theorem 2 Let (G, 1l) be a capacitated network, with G = (P T, A, 1l), K the corresponding transition conflict graph, and Q M the family of all inclusionwise maximal cliques from K. Consider the family Q := {T (x) : x X }, containing all cliques from K that correspond to sets of enabled transitions of the system. Then, (i) Q M Q, (ii) Q is closed under intersection with respect to Q M. Proof As observed at the beginning of the section, all inclusionwise maximal cliques are associated with states of the system. To prove (ii), let Q Q M and consider two sets T 1, T 2 Q Q, with T 1 = T (x 1 ) Q and T 2 = T (x 2 ) Q for some x 1, x 2 X.

13 Encoding the dynamics of deterministic systems 293 From (i) we know there is a third state x 3 with T (x 3 ) = Q. Now consider the state ˆx defined by 0, if i P (Q) \ P (T 1 T 2 ), ˆx i := 1, if i P + (Q) \ P + (T 1 T 2 ), xi 3, otherwise. Let t T 1 T 2. Then ˆx i = x 3 i holds for every place i P (t) P + (t) and, since t is enabled at x 3 (as t Q), it remains enabled at ˆx. Conversely, assume t T ( ˆx) Q. Then we must have It follows P (t) [P (Q) \ P (T 1 T 2 )]=, and P + (t) [P + (Q) \ P + (T 1 T 2 )]=. P (t) P (T 1 T 2 ) P (T k ) P (T (x k )), P + (t) P + (T 1 T 2 ) P + (T k ) P + (T (x k )), for k = 1, 2. But then, from Lemma 3 we conclude that t is enabled at both states x 1 and x 2. Hence, t T 1 T 2,ast Q. We have proven that T 1 T 2 = T ( ˆx) Q for some state ˆx X.Itfollowsthat Q Q is closed under intersection. 4 Valid orientations As stated in the introduction, our main purpose is to encode the dynamics of a given deterministic system S = (G, u, trans) in a compact way, by introducing enough priority relations among transitions, as to be able to determine trans(x) for every x X. We have observed that the set of enabled transitions at each state corresponds to a clique in the transition conflict graph K, and hence K is a plausible candidate for a framework where these priorities could be embedded. This idea motivates the following definition. Definition 2 Let D (G,u) = (T, A) be a directed graph obtained by orienting the edges of K (G,u). D (G,u) is said to be valid for the system S = (G, u, trans) if, for every state x X with T (x) =, the subgraph induced by the nodes from T (x) has a unique sink, and this sink coincides with trans(x). As for the unoriented transition conflict graph, we will write in the following D instead of D (G,u) whenever there is no risk of confusion. Observe that the existence of a valid orientation implicitly imposes a further requirement on the nature of a dynamic system. Namely, if two states x, x X have the same set T (x) = T (x ) of enabled transitions, then both induce the same subgraph of D and, therefore, trans(x) = trans(x ) must hold. Moreover, if a transition t is enabled at two states x, x X and t is the highest-priority transition at x, then either t is also the highest-priority

14 294 L. M. Torres, A. K. Wagler transition at x or trans(x ) T (x). The next result shows that this condition is also sufficient for the existence of a valid orientation. Theorem 3 AsystemS = (G, u, trans) admits a valid orientation if and only if the following consistency condition holds: For any pair of states x and x,iftrans(x) T (x) T (x ) then either trans(x ) = trans(x) or trans(x ) T (x ) \ T (x). Proof Let Q be the family of cliques in K that are related to states of the network, i.e., Q := {Q T : Q = T (x) for some x X }. Since this family is finite, we may assume Q = {Q 1,...,Q k }. Now consider the following orientation algorithm: For each 1 i k, choose (arbitrarily) a state x i X with T (x i ) = Q i, and orient the edges {t, trans(x i )}, t T (x i ) \{trans(x i )}, in K as arcs (t, trans(x i )). If this process is consistent in the sense that no edge is oriented in opposite directions during two different iterations, then obviously it produces a valid orientation upon termination (any edges remaining unoriented when the algorithm finishes can be oriented arbitrarily). Otherwise, there is some edge tt oriented as (t, t) in some iteration i, and oriented as (t, t ) in another iteration j.but then t, t T (x i ) T (x j ), t = trans(x i ) and t = trans(x j ), which violates the consistency condition. The construction given in the last proof shows that an edge tt of K can be oriented arbitrarily if neither t nor t is the highest-priority transition at any state of the system. This observation motivates the definition of a dominance concept for transition conflicts, which was already mentioned in Wagler and Weismantel (2009). Definition 3 A conflict between two transitions t, t is dominated according to a certain valid orientation D, if for any state x X (t) X (t ), there exists a third transition ˆt T (x) \ { t, t }, with ˆt = trans(x). Obviously, dominated conflicts do not play a role in explaining the dynamic behavior of a system. The next example illustrates this. Example 3 Consider again the system given by the network G in Fig. 1a. Table 1 lists all states of the system having at least two enabled transitions. Figure 3 depicts two valid orientations D and D for the transition conflict graph K, which differ in the direction chosen for the edge t 1 t 2. One can check that at any state x X the node set corresponding to T (x) induces a subgraph of D (resp. D ) with a unique sink. Moreover, both orientations encode the same dynamic behavior, as the sinks at each state coincide. The reason for this is that no relation between t 1 and t 2 is required, since at any state x where both transitions are enabled, either t 3 or t 5 is enabled too: such a state has to satisfy x 1 = 0, x 2 = 1, and x 3 = 0, but then x 5 = 0 (resp. x 5 = 1) implies t 3 T (x) (resp. t 5 T (x)). Since both t 3 and t 5 have higher priorities than t 1 and t 2, no conflicts can occur.

15 Encoding the dynamics of deterministic systems 295 Table 1 All states of the network G from Fig. 1ahaving at least two enabled transitions x 1 x 2 x 3 x 4 x 5 T (x) {t 1, t 2, t 3 } {t 1, t 2, t 4, t 5 } {t 1, t 2, t 3 } {t 1, t 2, t 5 } {t 1, t 3 } {t 1, t 4 } {t 1, t 3 } {t 2, t 3 } {t 2, t 5 } {t 2, t 3 } {t 2, t 5 } Fig. 3 Two valid orientations for the conflict graph K from Fig. 1b. Both encode the same dynamical behavior Observe that edges corresponding to dominated conflicts could in principle be deleted from the transition conflict graph without any loss of information about the dynamics of the system. However, doing so would destroy the structural property that any state of X induces a clique on K. Another issue of interest concerns the recognition of valid orientations: Given a capacitated network (G, u), and an orientation D of the edges in the transition conflict graph, determine whether D induces a valid dynamic behavior on G, in the sense that for every state x X, the corresponding clique in D has a unique sink. Observe that a clique cannot have more than one sink, and that every clique without a sink contains a directed cycle. Hence, if D is acyclic then every clique of the graph has a unique sink, and we obtain the following result: Observation 1 Every acyclic orientation of K is valid. On the other hand, the next example shows that there are certain deterministic systems for which the valid orientation encoding the dynamic behavior contains directed cycles. Example 4 Figure 4 depicts a capacitated network (G, 1l) together with a valid orientation D of the transition conflict graph that contains a directed cycle C = (t 1, t 2, t 3 ).

16 296 L. M. Torres, A. K. Wagler Fig. 4 A capacitated network and a valid orientation for its transition conflict graph which contains a directed cycle C = (t 1, t 2, t 3 ). All arc weights and capacities of the places are assumed to be equal to one Table 2 All branching states of the system from Fig. 4 x 1 x 2 x 3 x 4 T (x) {t 1, t 2 } {t 2, t 3 } {t 1, t 3 } {t 1, t 2, t 3, t 4 } Again, the weight on each arc and the capacity of each place of the network is assumed to be equal to 1. Table 2 lists all branching states of the system and the corresponding sets of enabled transitions. It is straightforward to check that each of these sets induces a clique in D with a unique sink. Observe that the direction of every arc in C is essential for encoding the dynamic behavior of the system, as for any t, t {t 1, t 2, t 3 }, there is at least one state x X with T (x) = { t, t }. Moreover, once either t or t has been switched, the other transition is no longer enabled, due to the capacity constraint at place 4. The fact that one has to check, for each clique Q in K, if there is a corresponding state x X with T (x) = Q makes the recognition of valid orientations hard in general, as there might be up to 2 T cliques. In the following we describe a special class of orientations for which this recognition problem can be solved efficiently. Recall from Example 2 that two different dynamic systems might share the same transition conflict graph and, let us define the following equivalence relation between capacitated networks: (G, u) K (G, u ) K (G,u) = K(G,u ), where = stands for graph isomorphism. An orientation is said to be strongly valid if it is valid for all networks of some equivalence class of K. Acyclic orientations are one specific example of strongly valid orientations. In general, any orientation where every clique has a unique sink is (trivially) strongly valid. Moreover, the converse is also true, as it follows from Theorem 1 that each equivalence class contains a capacitated network (G, u) with the property that every clique in K is associated to a state. This fact makes strongly valid orientations easy to recognize.

17 Encoding the dynamics of deterministic systems 297 Theorem 4 An orientation D of the transition conflict graph of a capacitated network (G, u) is strongly valid if and only if it does not contain any directed cycle of length 3. Proof Trivially, if D contains a directed cycle of length 3, then this cycle induces a clique without sink, and D is not strongly valid. Conversely, assume D = (T, A) contains some clique Q without a sink. Since the out-degree of every node in Q is at least one, there is a directed cycle C 0 := (t 1, t 2, t 3,...,t k ), with t i Q for all 1 i k. Assume k > 3, since otherwise there is nothing to prove. Now consider the direction of edge t 1 t 3.If(t 3, t 1 ) A, then {t 1, t 2, t 3 } induces a directed cycle of length three, and we are done. Otherwise, if (t 1, t 3 ) A, we can define a directed cycle C 1 := (t 1, t 3, t 4,...,t k ) containing exactly one node less than C 0. Repeating this procedure at most k 3 times, a directed cycle of length 3 is exposed. 5 Conclusions We have examined a new approach for encoding the dynamic behavior of certain deterministic discrete systems that relies on extending the familiar framework of Petri nets. Our encoding consists in a realization of the successor-oracle as a valid orientation of the edges of the transition conflict graph K, together with Algorithm 1. This encoding is compact in the sense that the amount of space required for its storage is polynomial in the size of the network. Therefore, it is well-suited for being integrated into simulation algorithms to study the dynamics of large complex deterministic systems, and to address issues such as reachability, boundedness, existence of deadlocks, and liveness, among others. A possible interesting extension of our model concerns the study of dynamic systems where the concurrent switch of various transitions can occur. Throughout this paper we have assumed that a change from a state x X to its successor state succ(x) can always be explained by the switch of a single transition trans(x). However, there are deterministic systems where this does not hold, as shown in the following example. Example 5 Consider a deterministic system (G, 1l, succ) withnetwork G as depicted in Fig. 5 and all arc weights equal to 1. It is straightforward to check that the system has the four branching states x 0,...,x 3 shown in the figure. The following table lists the sets of enabled transitions at each of these states, as well as the corresponding successor states specified by succ: j branching state x j T (x j ) succ(x j ) 0 (1, 1, 0, 0) T {t 1, t 2 } (0, 0, 1, 1) T 1 (0, 1, 1, 0) T {t 2, t 3 } (0, 1, 0, 1) T 2 (1, 0, 0, 1) T {t 1, t 4 } (0, 1, 0, 0) T 3 (1, 1, 1, 0) T {t 2, t 3 } (1, 1, 0, 1) T Observe that t 1 and t 2 have to be switched concurrently at state x 0 to reach succ(x 0 ), whereas at each of the other branching states a single transition is switched to reach the corresponding successor state, namely, t 3 at x 1 or x 4, and t 4 at x 2. The enabled transitions are highlighted in gray in Fig. 5, while the transitions actually switched are marked in bold.

18 298 L. M. Torres, A. K. Wagler Fig. 5 A deterministic system whose dynamic behavior cannot be modeled via a transition selection function. The enabled transitions at each state are highlighted in gray, the next transitions to be switched are shown in bold. All place capacities and arc weights are assumed to be equal to one The above successor function cannot be realized with the help of a transition selection function trans due to the following reason. Considering x 0 as initial state, trans has to select one of the transitions t 1, t 2 T (x 0 ). However, any choice leads to an intermediate state (x 1 for trans(x 0 ) = t 1, x 2 for trans(x 0 ) = t 2 ) where the remaining transition from T (x 0 ) is still enabled but must not be selected, as both trans(x 1 ) = t 3 and trans(x 2 ) = t 4 are implied by the the specification of succ. (See the reachability graph in Figure 5.) Thus, none of the potential interleaving sequences between x 0 and succ(x 0 ) can be expressed by means of a sequence of single transition switches such that every switch is determined by the value of trans at the corresponding state. One way of dealing with these systems could be through the inclusion of pseudonodes in the transition conflict graph, to account for the simultaneous switching of various transitions. The disadvantage of such a modification is the dramatic increase in the size of the transition conflict graph, as (in the worst-case) the number of required pseudo-nodes may grow exponentially with respect to T. To keep the size of K polynomial, a new model parameter could be defined which limits the number of transitions that can be switched at the same time. An alternative approach consists in working on a slightly different transition conflict graph, where an edge between two transitions means that they are in dynamic conflict. In this case, T (x) does no longer induce a clique on K. Yet we can now define an orientation to be valid if for any state x X the set T (x) of enabled transitions induces a subgraph containing at least one sink. These sinks reveal an anti-chain of transitions with maximal priorities, which have to be switched concurrently. Theorem 3 can be generalized to this new setting in a straightforward manner, characterizing which deterministic systems admit valid orientations. The advantage of this scheme is that it is still compact with regard to the size of the network G. However, as the sets T (x) do not induce cliques in the conflict graph, many of the combinatorial properties pointed out in Sect. 3 do not hold anymore. Moreover, since all transitions that may switch concurrently are required to do so, it is again possible to construct examples of deterministic systems whose behavior cannot be modeled in this way.

19 Encoding the dynamics of deterministic systems 299 Finally, in some applications, for instance in systems biology, the set of rules governing the dynamic behavior of the system (i.e., the valid orientation in our model) is not known a priori, but has to be reconstructed from information provided by experimental observation. This raises other interesting questions, for instance, the search for minimal sets of edges in K such that knowledge about their orientation allows to infer the orientation of the remaining edges, see Torres and Wagler (2010) for first concepts and results. Such kind of issues are specially relevant in practice, as they can be used to assist the design of experiments, such that unnecessary experiments are avoided, as these are expensive and time-consuming. References Adam NR, Atluri V, Huang WK (1998) Modeling and analysis of workflows using Petri nets. J Intell Inf Syst 10(2): doi: /a: Balbo G (2002) Introducation to stochastic Petri nets. In: Lectures on formal methods and performance analysis: first EEF/Euro summer school on trends in computer science, Springer, New York, pp Billington J, Diaz M, Rozenberg G (1999) Application of Petri nets to communication networks, advances in Petri nets. Springer, London Caprotti O, Ferscha A, Hong H (1995) Reachability test in Petri nets by Gröbner bases. RISC-Linz Report Series 95 03, Research Institute for Symbolic Computation, Linz Chandler A, Heyworth A (1999) Gröbner basis procedures for testing Petri nets. UWB Math preprint 99.11, University of Wales, Wales. arxiv:math/ v1 Chaouiya C (2007) Petri net modelling of biological networks. Briefings in Bioinformatics pp bbm029+. doi: /bib/bbm029 Chaouiya C, Remy E, Thieffry D (2008) Petri net modelling of biological regulatory networks. J Discret Algorithms 6(2): doi: /j.jda David R, Alla H (2005) Discrete, continuous, and hybrid Petri nets. Springer, Berlin Gu T, Bahri PA (2002) A survey of Petri net applications in batch processes. Comput Ind 47(1): doi: /s (01) Hardy S, Robillard PN (2004) Modeling and simulation of molecular biology systems using Petri nets: modeling goals of various approaches. J Bioinformatics Comput Biol 2(4): Jensen K (1997) Coloured Petri nets: basic concepts, analysis methods and practical use, vol 3. Springer, New York Koch I, Heiner M, (2008) Petri nets In: Junker BH, Schreiber F (eds) Analysis of biological networks, Wiley book series in bioinformatics, pp Lipton R (1976) The reachability problem requires exponential space. Research Report 62, Computer Science Department, Yale University, USA Marsan M, Balbo G, Donatelli S, Franceschinis G, Conte G (1995) Modelling with generalized stochastic Petri nets, Wiley series in parallel computing Marwan W (2003) Theory of time-resolved somatic complementation and its use for the analysis of the sporulation control network of physarum polycephalum. Genetics 164: Marwan W, Starostzik C (2002) The sequence of regulatory events in the sporulation control network of physarum polycephalum analysed by time-resolved somatic complementation of mutants. Protist 153: Marwan W, Sujatha A, Starostzik C (2005) Reconstructing the regulatory network controlling commitment and sporulation in physarum polycephalum based on hierarchical Petri net modeling and simulation. J Theor Biol 236: Marwan W, Wagler A, Weismantel R (2008) A mathematical approach to solve the network reconstruction problem. Math Methods Oper Res 67: Matsuno H, Aoshima H, Doi A, Tanaka Y, Matsui M (2003) Biopathways representation and simulation on hybrid functional Petri net. In Silico Biol. 3(3): Mayr EW (1981) An algorithm for the general Petri net reachability problem. In: Proceedings of the 13th Ann. ACM Symposium on theory of computing, ACM Press, New York, pp

A compact modeling approach for deterministic biological systems

A compact modeling approach for deterministic biological systems A compact modeling approach for deterministic biological systems Luis M. Torres 1 Annegret K. Wagler 2 1 Ecuadorian Research Center on Mathematical Modeling ModeMat Escuela Politécnica Nacional, Quito

More information

The dynamics of deterministic systems A survey

The dynamics of deterministic systems A survey The dynamics of deterministic systems A survey Luis M. Torres 1, Annegret K. Wagler 2 luis.torres@epn.edu.ec, wagler@isima.fr 1 Centro de Modelizatión Matemática (ModeMat) Escuela Politécnica Nacional,

More information

Reconstructing X -deterministic extended Petri nets from experimental time-series data X

Reconstructing X -deterministic extended Petri nets from experimental time-series data X econstructing X -deterministic extended Petri nets from experimental time-series data X Marie C.F. Favre, Annegret K. Wagler Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS,

More information

Automatic Network Reconstruction

Automatic Network Reconstruction Automatic Network Reconstruction Annegret K. WAGLER Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS) UMR CNRS 658 Université Blaise Pascal, Clermont-Ferrand, France BioPPN

More information

Integrating prior knowledge in Automatic Network Reconstruction

Integrating prior knowledge in Automatic Network Reconstruction Integrating prior knowledge in Automatic Network Reconstruction M. Favre W. Marwan A. Wagler Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS) UMR CNRS 658 Université Blaise

More information

Generalized Pigeonhole Properties of Graphs and Oriented Graphs

Generalized Pigeonhole Properties of Graphs and Oriented Graphs Europ. J. Combinatorics (2002) 23, 257 274 doi:10.1006/eujc.2002.0574 Available online at http://www.idealibrary.com on Generalized Pigeonhole Properties of Graphs and Oriented Graphs ANTHONY BONATO, PETER

More information

Specification models and their analysis Petri Nets

Specification models and their analysis Petri Nets Specification models and their analysis Petri Nets Kai Lampka December 10, 2010 1 30 Part I Petri Nets Basics Petri Nets Introduction A Petri Net (PN) is a weighted(?), bipartite(?) digraph(?) invented

More information

Alternating paths revisited II: restricted b-matchings in bipartite graphs

Alternating paths revisited II: restricted b-matchings in bipartite graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-2005-13. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

The Maximum Flow Problem with Disjunctive Constraints

The Maximum Flow Problem with Disjunctive Constraints The Maximum Flow Problem with Disjunctive Constraints Ulrich Pferschy Joachim Schauer Abstract We study the maximum flow problem subject to binary disjunctive constraints in a directed graph: A negative

More information

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS Francesco Basile, Ciro Carbone, Pasquale Chiacchio Dipartimento di Ingegneria Elettrica e dell Informazione, Università

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

DEGREE SEQUENCES OF INFINITE GRAPHS

DEGREE SEQUENCES OF INFINITE GRAPHS DEGREE SEQUENCES OF INFINITE GRAPHS ANDREAS BLASS AND FRANK HARARY ABSTRACT The degree sequences of finite graphs, finite connected graphs, finite trees and finite forests have all been characterized.

More information

An Holistic State Equation for Timed Petri Nets

An Holistic State Equation for Timed Petri Nets An Holistic State Equation for Timed Petri Nets Matthias Werner, Louchka Popova-Zeugmann, Mario Haustein, and E. Pelz 3 Professur Betriebssysteme, Technische Universität Chemnitz Institut für Informatik,

More information

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu** 4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

Packing triangles in regular tournaments

Packing triangles in regular tournaments Packing triangles in regular tournaments Raphael Yuster Abstract We prove that a regular tournament with n vertices has more than n2 11.5 (1 o(1)) pairwise arc-disjoint directed triangles. On the other

More information

Paths and cycles in extended and decomposable digraphs

Paths and cycles in extended and decomposable digraphs Paths and cycles in extended and decomposable digraphs Jørgen Bang-Jensen Gregory Gutin Department of Mathematics and Computer Science Odense University, Denmark Abstract We consider digraphs called extended

More information

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

On the oriented chromatic index of oriented graphs

On the oriented chromatic index of oriented graphs On the oriented chromatic index of oriented graphs Pascal Ochem, Alexandre Pinlou, Éric Sopena LaBRI, Université Bordeaux 1, 351, cours de la Libération 33405 Talence Cedex, France February 19, 2006 Abstract

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Linear programming techniques for analysis and control of batches Petri nets

Linear programming techniques for analysis and control of batches Petri nets Linear programming techniques for analysis and control of batches Petri nets Isabel Demongodin, LSIS, Univ. of Aix-Marseille, France (isabel.demongodin@lsis.org) Alessandro Giua DIEE, Univ. of Cagliari,

More information

On a Conjecture of Thomassen

On a Conjecture of Thomassen On a Conjecture of Thomassen Michelle Delcourt Department of Mathematics University of Illinois Urbana, Illinois 61801, U.S.A. delcour2@illinois.edu Asaf Ferber Department of Mathematics Yale University,

More information

HYPENS Manual. Fausto Sessego, Alessandro Giua, Carla Seatzu. February 7, 2008

HYPENS Manual. Fausto Sessego, Alessandro Giua, Carla Seatzu. February 7, 2008 HYPENS Manual Fausto Sessego, Alessandro Giua, Carla Seatzu February 7, 28 HYPENS is an open source tool to simulate timed discrete, continuous and hybrid Petri nets. It has been developed in Matlab to

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

biological networks Claudine Chaouiya SBML Extention L3F meeting August

biological networks Claudine Chaouiya  SBML Extention L3F meeting August Campus de Luminy - Marseille - France Petri nets and qualitative modelling of biological networks Claudine Chaouiya chaouiya@igc.gulbenkian.pt chaouiya@tagc.univ-mrs.fr SML Extention L3F meeting 1-13 ugust

More information

GENERALIZED PIGEONHOLE PROPERTIES OF GRAPHS AND ORIENTED GRAPHS

GENERALIZED PIGEONHOLE PROPERTIES OF GRAPHS AND ORIENTED GRAPHS GENERALIZED PIGEONHOLE PROPERTIES OF GRAPHS AND ORIENTED GRAPHS ANTHONY BONATO, PETER CAMERON, DEJAN DELIĆ, AND STÉPHAN THOMASSÉ ABSTRACT. A relational structure A satisfies the n k property if whenever

More information

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

Petri nets. s 1 s 2. s 3 s 4. directed arcs. Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1

More information

On the Generation of Circuits and Minimal Forbidden Sets

On the Generation of Circuits and Minimal Forbidden Sets Mathematical Programming manuscript No. (will be inserted by the editor) Frederik Stork Marc Uetz On the Generation of Circuits and Minimal Forbidden Sets January 31, 2004 Abstract We present several complexity

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

Branch-and-Bound for the Travelling Salesman Problem

Branch-and-Bound for the Travelling Salesman Problem Branch-and-Bound for the Travelling Salesman Problem Leo Liberti LIX, École Polytechnique, F-91128 Palaiseau, France Email:liberti@lix.polytechnique.fr March 15, 2011 Contents 1 The setting 1 1.1 Graphs...............................................

More information

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems

More information

Linear Time Analysis of Properties of Conflict-Free and General Petri nets

Linear Time Analysis of Properties of Conflict-Free and General Petri nets Linear Time Analysis of Properties of Conflict-Free and General Petri nets Paola Alimonti Esteban Feuerstein Luigi Laura Umberto Nanni Technical Report n. 9, 2010 Linear Time Analysis of Properties of

More information

Price of Stability in Survivable Network Design

Price of Stability in Survivable Network Design Noname manuscript No. (will be inserted by the editor) Price of Stability in Survivable Network Design Elliot Anshelevich Bugra Caskurlu Received: January 2010 / Accepted: Abstract We study the survivable

More information

Reachability relations and the structure of transitive digraphs

Reachability relations and the structure of transitive digraphs Reachability relations and the structure of transitive digraphs Norbert Seifter Montanuniversität Leoben, Leoben, Austria Vladimir I. Trofimov Russian Academy of Sciences, Ekaterinburg, Russia November

More information

Realization Plans for Extensive Form Games without Perfect Recall

Realization Plans for Extensive Form Games without Perfect Recall Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in

More information

Solving Fuzzy PERT Using Gradual Real Numbers

Solving Fuzzy PERT Using Gradual Real Numbers Solving Fuzzy PERT Using Gradual Real Numbers Jérôme FORTIN a, Didier DUBOIS a, a IRIT/UPS 8 route de Narbonne, 3062, Toulouse, cedex 4, France, e-mail: {fortin, dubois}@irit.fr Abstract. From a set of

More information

On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States

On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States Sven De Felice 1 and Cyril Nicaud 2 1 LIAFA, Université Paris Diderot - Paris 7 & CNRS

More information

COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS

COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS QUALITATIVE ANALYIS METHODS, OVERVIEW NET REDUCTION STRUCTURAL PROPERTIES COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS LINEAR PROGRAMMING place / transition invariants state equation

More information

Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions

Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions Electronic Notes in Theoretical Computer Science Vol. 85 No. 4 (2003) URL: http://www.elsevier.nl/locate/entsc/volume85.html Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions

More information

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods. Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods. Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda We refer the reader to Jerrum s book [1] for the analysis

More information

DISTRIBUTIVE LATTICES ON GRAPH ORIENTATIONS

DISTRIBUTIVE LATTICES ON GRAPH ORIENTATIONS DISTRIBUTIVE LATTICES ON GRAPH ORIENTATIONS KOLJA B. KNAUER ABSTRACT. Propp gave a construction method for distributive lattices on a class of orientations of a graph called c-orientations. Given a distributive

More information

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic

More information

Acyclic Digraphs arising from Complete Intersections

Acyclic Digraphs arising from Complete Intersections Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

Exact Algorithms for Dominating Induced Matching Based on Graph Partition

Exact Algorithms for Dominating Induced Matching Based on Graph Partition Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Feasibility of Motion Planning on Directed Graphs

Feasibility of Motion Planning on Directed Graphs Feasibility of Motion Planning on Directed Graphs Zhilin Wu 1 and Stéphane Grumbach 2 1 CASIA-LIAMA, zlwu@liama.ia.ac.cn 2 INRIA-LIAMA, stephane.grumbach@inria.fr Abstract. Because of irreversibility of

More information

Phylogenetic Networks, Trees, and Clusters

Phylogenetic Networks, Trees, and Clusters Phylogenetic Networks, Trees, and Clusters Luay Nakhleh 1 and Li-San Wang 2 1 Department of Computer Science Rice University Houston, TX 77005, USA nakhleh@cs.rice.edu 2 Department of Biology University

More information

Reachability relations and the structure of transitive digraphs

Reachability relations and the structure of transitive digraphs Reachability relations and the structure of transitive digraphs Norbert Seifter Montanuniversität Leoben, Leoben, Austria seifter@unileoben.ac.at Vladimir I. Trofimov Russian Academy of Sciences, Ekaterinburg,

More information

Applications of Petri Nets

Applications of Petri Nets Applications of Petri Nets Presenter: Chung-Wei Lin 2010.10.28 Outline Revisiting Petri Nets Application 1: Software Syntheses Theory and Algorithm Application 2: Biological Networks Comprehensive Introduction

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Fundamenta Informaticae XX (2004) 1 23 1 IOS Press A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Javier Esparza Institute for Formal Methods in Computer Science

More information

A Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle

A Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle A Note on the Complexity of Network Reliability Problems Hans L. Bodlaender Thomas Wolle institute of information and computing sciences, utrecht university technical report UU-CS-2004-001 www.cs.uu.nl

More information

Isomorphisms between pattern classes

Isomorphisms between pattern classes Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.

More information

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...),

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 7. High Level Petri-Nets Definition 7.1 A Net Type is determined if the following specification is given: 1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 2. sort of labeling

More information

An algorithm to increase the node-connectivity of a digraph by one

An algorithm to increase the node-connectivity of a digraph by one Discrete Optimization 5 (2008) 677 684 Contents lists available at ScienceDirect Discrete Optimization journal homepage: www.elsevier.com/locate/disopt An algorithm to increase the node-connectivity of

More information

Partial characterizations of clique-perfect graphs II: diamond-free and Helly circular-arc graphs

Partial characterizations of clique-perfect graphs II: diamond-free and Helly circular-arc graphs Partial characterizations of clique-perfect graphs II: diamond-free and Helly circular-arc graphs Flavia Bonomo a,1, Maria Chudnovsky b,2 and Guillermo Durán c,3 a Departamento de Matemática, Facultad

More information

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case

More information

Petri Net Modeling of Irrigation Canal Networks

Petri Net Modeling of Irrigation Canal Networks Petri Net Modeling of Irrigation Canal Networks Giorgio Corriga, Alessandro Giua, Giampaolo Usai DIEE: Dip. di Ingegneria Elettrica ed Elettronica Università di Cagliari P.zza d Armi 09123 CAGLIARI, Italy

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

COMPUTATIONAL COMPLEXITY

COMPUTATIONAL COMPLEXITY ATHEATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Computational Complexity - Osamu Watanabe COPUTATIONAL COPLEXITY Osamu Watanabe Tokyo Institute of Technology, Tokyo, Japan Keywords: {deterministic, randomized,

More information

Strongly chordal and chordal bipartite graphs are sandwich monotone

Strongly chordal and chordal bipartite graphs are sandwich monotone Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its

More information

Properties and Classification of the Wheels of the OLS Polytope.

Properties and Classification of the Wheels of the OLS Polytope. Properties and Classification of the Wheels of the OLS Polytope. G. Appa 1, D. Magos 2, I. Mourtos 1 1 Operational Research Department, London School of Economics. email: {g.appa, j.mourtos}@lse.ac.uk

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Complete Process Semantics for Inhibitor Nets Technical Report

Complete Process Semantics for Inhibitor Nets Technical Report Complete Process Semantics for Inhibitor Nets Technical Report Gabriel Juhás 2, Robert Lorenz 1, and Sebastian Mauser 1 1 Department of Applied Computer Science, Catholic University of Eichstätt-Ingolstadt,

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

MPRI 1-22 Introduction to Verification January 4, TD 6: Petri Nets

MPRI 1-22 Introduction to Verification January 4, TD 6: Petri Nets TD 6: Petri Nets 1 Modeling Using Petri Nets Exercise 1 (Traffic Lights). Consider again the traffic lights example from the lecture notes: r r ry y r y ry g g y g 1. How can you correct this Petri net

More information

MODELING AND SIMULATION BY HYBRID PETRI NETS. systems, communication systems, etc). Continuous Petri nets (in which the markings are real

MODELING AND SIMULATION BY HYBRID PETRI NETS. systems, communication systems, etc). Continuous Petri nets (in which the markings are real Proceedings of the 2012 Winter Simulation Conference C. Laroque, J. Himmelspach, R. Pasupathy, O. Rose, and A. M. Uhrmacher, eds. MODELING AND SIMULATION BY HYBRID PETRI NETS Hassane Alla Latéfa Ghomri

More information

Parameterized Domination in Circle Graphs

Parameterized Domination in Circle Graphs Parameterized Domination in Circle Graphs Nicolas Bousquet 1, Daniel Gonçalves 1, George B. Mertzios 2, Christophe Paul 1, Ignasi Sau 1, and Stéphan Thomassé 3 1 AlGCo project-team, CNRS, LIRMM, Montpellier,

More information

Chris Bishop s PRML Ch. 8: Graphical Models

Chris Bishop s PRML Ch. 8: Graphical Models Chris Bishop s PRML Ch. 8: Graphical Models January 24, 2008 Introduction Visualize the structure of a probabilistic model Design and motivate new models Insights into the model s properties, in particular

More information

Acyclic subgraphs with high chromatic number

Acyclic subgraphs with high chromatic number Acyclic subgraphs with high chromatic number Safwat Nassar Raphael Yuster Abstract For an oriented graph G, let f(g) denote the maximum chromatic number of an acyclic subgraph of G. Let f(n) be the smallest

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 17 - Diagnosis for WF nets 1 Object We study suitable diagnosis techniques

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

An Ore-type Condition for Cyclability

An Ore-type Condition for Cyclability Europ. J. Combinatorics (2001) 22, 953 960 doi:10.1006/eujc.2001.0517 Available online at http://www.idealibrary.com on An Ore-type Condition for Cyclability YAOJUN CHEN, YUNQING ZHANG AND KEMIN ZHANG

More information

6.045: Automata, Computability, and Complexity (GITCS) Class 15 Nancy Lynch

6.045: Automata, Computability, and Complexity (GITCS) Class 15 Nancy Lynch 6.045: Automata, Computability, and Complexity (GITCS) Class 15 Nancy Lynch Today: More Complexity Theory Polynomial-time reducibility, NP-completeness, and the Satisfiability (SAT) problem Topics: Introduction

More information

A Characterization of Partial Directed Line Graphs

A Characterization of Partial Directed Line Graphs A Characterization of Partial Directed Line Graphs Nicola Apollonio Paolo G. Franciosa Abstract Can a directed graph be completed to a directed line graph? If possible, how many arcs must be added? In

More information

Restricted b-matchings in degree-bounded graphs

Restricted b-matchings in degree-bounded graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-009-1. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

arxiv:quant-ph/ v1 15 Apr 2005

arxiv:quant-ph/ v1 15 Apr 2005 Quantum walks on directed graphs Ashley Montanaro arxiv:quant-ph/0504116v1 15 Apr 2005 February 1, 2008 Abstract We consider the definition of quantum walks on directed graphs. Call a directed graph reversible

More information

Reverse mathematics of some topics from algorithmic graph theory

Reverse mathematics of some topics from algorithmic graph theory F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

On Machine Dependency in Shop Scheduling

On Machine Dependency in Shop Scheduling On Machine Dependency in Shop Scheduling Evgeny Shchepin Nodari Vakhania Abstract One of the main restrictions in scheduling problems are the machine (resource) restrictions: each machine can perform at

More information

arxiv: v1 [math.co] 5 May 2016

arxiv: v1 [math.co] 5 May 2016 Uniform hypergraphs and dominating sets of graphs arxiv:60.078v [math.co] May 06 Jaume Martí-Farré Mercè Mora José Luis Ruiz Departament de Matemàtiques Universitat Politècnica de Catalunya Spain {jaume.marti,merce.mora,jose.luis.ruiz}@upc.edu

More information

Some hard families of parameterised counting problems

Some hard families of parameterised counting problems Some hard families of parameterised counting problems Mark Jerrum and Kitty Meeks School of Mathematical Sciences, Queen Mary University of London {m.jerrum,k.meeks}@qmul.ac.uk September 2014 Abstract

More information

A note on the Isomorphism Problem for Monomial Digraphs

A note on the Isomorphism Problem for Monomial Digraphs A note on the Isomorphism Problem for Monomial Digraphs Aleksandr Kodess Department of Mathematics University of Rhode Island kodess@uri.edu Felix Lazebnik Department of Mathematical Sciences University

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

arxiv: v1 [cs.dm] 29 Oct 2012

arxiv: v1 [cs.dm] 29 Oct 2012 arxiv:1210.7684v1 [cs.dm] 29 Oct 2012 Square-Root Finding Problem In Graphs, A Complete Dichotomy Theorem. Babak Farzad 1 and Majid Karimi 2 Department of Mathematics Brock University, St. Catharines,

More information

Decomposing oriented graphs into transitive tournaments

Decomposing oriented graphs into transitive tournaments Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote

More information

Kernelization by matroids: Odd Cycle Transversal

Kernelization by matroids: Odd Cycle Transversal Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the

More information

POLYNOMIAL DIVISION AND GRÖBNER BASES. Samira Zeada

POLYNOMIAL DIVISION AND GRÖBNER BASES. Samira Zeada THE TEACHING OF MATHEMATICS 2013, Vol. XVI, 1, pp. 22 28 POLYNOMIAL DIVISION AND GRÖBNER BASES Samira Zeada Abstract. Division in the ring of multivariate polynomials is usually not a part of the standard

More information

Automata, Logic and Games: Theory and Application

Automata, Logic and Games: Theory and Application Automata, Logic and Games: Theory and Application 1. Büchi Automata and S1S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong Büchi Automata & S1S 14-19 June

More information

Berge Trigraphs. Maria Chudnovsky 1 Princeton University, Princeton NJ March 15, 2004; revised December 2, Research Fellow.

Berge Trigraphs. Maria Chudnovsky 1 Princeton University, Princeton NJ March 15, 2004; revised December 2, Research Fellow. Berge Trigraphs Maria Chudnovsky 1 Princeton University, Princeton NJ 08544 March 15, 2004; revised December 2, 2005 1 This research was partially conducted during the period the author served as a Clay

More information

The efficiency of identifying timed automata and the power of clocks

The efficiency of identifying timed automata and the power of clocks The efficiency of identifying timed automata and the power of clocks Sicco Verwer a,b,1,, Mathijs de Weerdt b, Cees Witteveen b a Eindhoven University of Technology, Department of Mathematics and Computer

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information