Automatic Network Reconstruction

Size: px
Start display at page:

Download "Automatic Network Reconstruction"

Transcription

1 Automatic Network Reconstruction Annegret K. WAGLER Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS) UMR CNRS 658 Université Blaise Pascal, Clermont-Ferrand, France BioPPN 4, Tunis Tutorial: Petri nets for multiscale Systems Biology A. Wagler June 4, 4 / 46

2 Modeling and Model Validation in Biosciences!"%$C%*5)G$-<"59H)!"#$%&'()*'#)!"#$%)+*%&#*,"') &')-.$)/&"&$'$) 34$5&6$'-*%)7*-*)) "8)*%%)9&'#) :'-$545$-*,"') ;/5*&')<"59=) :'8"56*%) E.$6$) E.$6$)F*%&#*,"') 34$5&6$'-*%)7$&(') I.$)%*&*%)%*J)*445"*.H) B$4$*-)C',%)-.$)6"#$%)"55$-%A)45$#&-)*%%)$34$5&6$'-*%)5$C%-D) Modeling and Model Validation in Biosciences Biological models: often cartoon-like informal schemes Classical lab approaches: heuristic and hypothesis-driven methods, yield potentially incomplete solution sets A. Wagler June 4, 4 / 46

3 Mathematical Models and Methods for Biological Systems exp. design validation Biological System Biological Process exp. data hypothesis Structural properties Predicted dynamics Math. Algorithms Math. proof techniques analysis simulation Mathematical Model Mathematical Problem reconstruction interpretation Mathematics for Biosciences Mathematical models: formal schemes representing structure and function of the studied system Mathematical approaches: data-driven methods, can guarantee completeness by mathematical proofs A. Wagler June 4, 4 3 / 46

4 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 4 / 46

5 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 5 / 46

6 Petri nets: The networks Standard networks P = (P, T, A, w) P set of involved components ( places ), (molecules, receptors, genes) T set of involved reactions ( transitions ), (reactions, activations,...) A (P T ) (T P) set of directed links ( arcs ), arc weights w as stoichiometric coefficients. standard network Extended networks P = (P, T, (A A R A I ), w) A R P T read-arcs A I P T inhibitor-arcs A. Wagler June 4, 4 6 / 46

7 Petri nets: The networks Standard networks P = (P, T, A, w) P set of involved components ( places ), (molecules, receptors, genes) T set of involved reactions ( transitions ), (reactions, activations,...) A (P T ) (T P) set of directed links ( arcs ), arc weights w as stoichiometric coefficients. standard network extended network Extended networks P = (P, T, (A A R A I ), w) A R P T read-arcs A I P T inhibitor-arcs A. Wagler June 4, 4 6 / 46

8 Petri nets: States and state changes States Each place p P can be marked with an integral number x p of tokens. A state can be represented as a vector x N P with entries x p for all p P. a b c d e f x = Switching enabled transitions In a standard network, t T is enabled at a state x if x p w(p, t) for all p with (p, t) A; switching t yiels a new state x with x p = x p + w(p, t) (p, t), (t, p) A. In an extended network, t T is enabled at a state x if in addition x p w(p, t) for all p with (p, t) A R and x p < w(p, t) for all p with (p, t) A I. A. Wagler June 4, 4 7 / 46

9 Petri nets: States and state changes States Each place p P can be marked with an integral number x p of tokens. A state can be represented as a vector x N P with entries x p for all p P. a b c d e f x = Switching enabled transitions In a standard network, t T is enabled at a state x if x p w(p, t) for all p with (p, t) A; switching t yiels a new state x with x p = x p + w(p, t) (p, t), (t, p) A. In an extended network, t T is enabled at a state x if in addition x p w(p, t) for all p with (p, t) A R and x p < w(p, t) for all p with (p, t) A I. A. Wagler June 4, 4 7 / 46

10 Dynamic processes and reachability Dynamic processes Dynamic processes correspond to sequences of system states, obtained by sequences of transition switches. Starting from an initial state x, explore the dynamic behavior of the system by consecutively switching enabled transitions, analyzing the reachability of certain system states Can we control transition switches and, thus, the dynamic behavior? A. Wagler June 4, 4 8 / 46

11 Prediction of the dynamic behavior Priority relations for transitions (Marwan, W. & Weismantel 8) Let G be a network and O a priority relation on its transitions. If there are two or more transitions enabled at a state, this transition with highest priority will be switched. This allows to predict the dynamic behavior of the system (instead of listing all potentially possible switching sequences). Example. Consider the network G with O = {t > t 3 } A. Wagler June 4, 4 9 / 46

12 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 / 46

13 When does a network fit given experimental data? Experimental data can be seen as sequences X = (x, x,..., x k ) of measured system states: x x x = B C B C B A = x A network fits the given data if it can reproduce the observations: Conformal network A network G = (P, T, (A A R A I ), w) with priorities O is conformal with X if it contains and correctly selects transitions to reach, from every observed state x j, its observed successor x j+. A. Wagler June 4, 4 / 46

14 When does a network fit given experimental data? Experimental data can be seen as sequences X = (x, x,..., x k ) of measured system states: x = B B C C C A x B B C C C A x B B C C C A = x A network fits the given data if it can reproduce the observations: 3 Conformal network A network G = (P, T, (A A R A I ), w) with priorities O is conformal with X if it contains and correctly selects transitions to reach, from every observed state x j, its observed successor x j+. A. Wagler June 4, 4 / 46

15 The network Reconstruction Problem Network Reconstruction Problem Input: Output: a set P of components (considered to be crucial for the studied phenomenon), experimental time series data X = (x, x,..., x m ) obtained by stimulating a biological system and observing how its states change over time. all extended networks G = (P, T, (A A R A I ), w) with priorities O being conformal with the given data X, i.e., being able to reproduce the experimental observations. Remark: Finding all networks fitting the data means to create all minimal ones (that do not reproduce the data anymore after removing any element). All reconstructed networks have the same set P of places but differ in their transitions, (control-)arcs, and priorities. A. Wagler June 4, 4 / 46

16 The network Reconstruction Problem Network Reconstruction Problem Input: Output: a set P of components (considered to be crucial for the studied phenomenon), experimental time series data X = (x, x,..., x m ) obtained by stimulating a biological system and observing how its states change over time. all extended networks G = (P, T, (A A R A I ), w) with priorities O being conformal with the given data X, i.e., being able to reproduce the experimental observations. Remark: Finding all networks fitting the data means to create all minimal ones (that do not reproduce the data anymore after removing any element). All reconstructed networks have the same set P of places but differ in their transitions, (control-)arcs, and priorities. A. Wagler June 4, 4 / 46

17 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 3 / 46

18 Overview Reconstruction Approaches Based on previous works on reconstructing standard networks (Marwan, Wagler & Weismantel 8; Durzinsky, Wagler & Weismantel ) standard networks with priorities (Marwan, Wagler & Weismantel, 8; Torres & Wagler ) extended Petri nets (Durzinsky, Marwan & Wagler and 3) and on techniques for preprocessing the experimental data (Durzinsky, Wagler & Weismantel 8 and, Wagler & Wegener 3) postprocessing the solution set (Wagler & Wegener, 3) we developed an integrative approach for reconstructing extended Petri nets with priorities (Favre & Wagler 3) A. Wagler June 4, 4 4 / 46

19 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 5 / 46

20 Time series data In an experiment, the system is triggered in some state x to generate an initial state x, then it is observed how the system responds x,..., x k. A time series X = (x ; x,..., x k ) contains discrete (or discretized) values x j p = x p (t j ) for each component p P at several time points t,..., t k : P x(t )... x(t j )... x(t k ) a x a(t )... x a(t j )... x a(t k ).... p x p(t )... x p(t j )... x p(t k ) Thereby: choose enough time points t j to capture the true time course of the values x j p for each single component p P: as we require monotone data for the reconstruction process. A. Wagler June 4, 4 6 / 46

21 Time series data In an experiment, the system is triggered in some state x to generate an initial state x, then it is observed how the system responds x,..., x k. A time series X = (x ; x,..., x k ) contains discrete (or discretized) values x j p = x p (t j ) for each component p P at several time points t,..., t k : P x(t )... x(t j )... x(t k ) a x a(t )... x a(t j )... x a(t k ).... p x p(t )... x p(t j )... x p(t k ) Thereby: choose enough time points t j to capture the true time course of the values x j p for each single component p P: x i x x i x x x x x xx x x x x x x x as we require monotone data for the reconstruction process. t x x x x x x t A. Wagler June 4, 4 6 / 46

22 The Experimental Data As several experiments, starting from different initial states, may be necessary to describe the whole phenomenon, we combine several time series to obtain the experimental data X. x = x = x = x 3 = x 4 = FR R Thereby, we assume the data X to be reproducible: stimulating the system in the same initial state must also result in the same sequence; in particular, each observed state x j must have a unique successor x j+ in X. A. Wagler June 4, 4 7 / 46

23 The Experimental Data As several experiments, starting from different initial states, may be necessary to describe the whole phenomenon, we combine several time series to obtain the experimental data X. x = x = x = x 3 = x 4 = FR R Thereby, we assume the data X to be reproducible: stimulating the system in the same initial state must also result in the same sequence; in particular, each observed state x j must have a unique successor x j+ in X. A. Wagler June 4, 4 7 / 46

24 Example: Light-induced Sporulation of P. polycephalum The states are vectors of the form x = (x FR, x R, x Pfr, x Pr, x Sp ) T having /-entries only. x = x = x = x 3 = x 4 = FR R The scheme represents experimental data X consisting of two time series (x ; x, x, x 3 ) and (x ; x 4, x ). sporulation SP triggered by far-red light FR (turns P fr into P r ) sporulation suppressed by red light R (turns P r back to P fr ) A. Wagler June 4, 4 8 / 46

25 Example: Light-induced Sporulation of P. polycephalum The states are vectors of the form x = (x FR, x R, x Pfr, x Pr, x Sp ) T having /-entries only. x = x = x = x 3 = x 4 = FR R The scheme represents experimental data X consisting of two time series (x ; x, x, x 3 ) and (x ; x 4, x ). sporulation SP triggered by far-red light FR (turns P fr into P r ) sporulation suppressed by red light R (turns P r back to P fr ) A. Wagler June 4, 4 8 / 46

26 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 9 / 46

27 The principle idea for the representation Recall that a conformal (standard) network G = (P, T, A, w) can reproduce 3 the experimentally observed sequences of system states: x t B C x = C A Representation of observed responses C A x t 3 B Use the update vectors r t Z P of the transitions with { w(p, t) if (p, t) A rp t = w(t, p) if (t, p) A else C A = x to realize the changes from one observed state x j to its observed successor x j+. A. Wagler June 4, 4 / 46

28 The principle idea for the representation Recall that a conformal (standard) network G = (P, T, A, w) can reproduce 3 the experimentally observed sequences of system states: x t B C x = C A Representation of observed responses C A x t 3 B Use the update vectors r t Z P of the transitions with { w(p, t) if (p, t) A rp t = w(t, p) if (t, p) A else C A = x to realize the changes from one observed state x j to its observed successor x j+. A. Wagler June 4, 4 / 46

29 The Difficulty: Non-observed Intermediate States Observation The given time series X = (x ; x..., x k ) may not consist of consecutive system states, as between one observed state x j and its observed successor state x j+, there may exist non-observed intermediate states.?????? To reach x j+ from x j, we may need a sequence of transitions t i,..., t k whose update vectors satisfy x j+ x j = r t i r t k : x j = C A r B C A B C A r 3 B C A C A = xj+ A. Wagler June 4, 4 / 46

30 The Difficulty: Non-observed Intermediate States Observation The given time series X = (x ; x..., x k ) may not consist of consecutive system states, as between one observed state x j and its observed successor state x j+, there may exist non-observed intermediate states.?????? To reach x j+ from x j, we may need a sequence of transitions t i,..., t k whose update vectors satisfy x j+ x j = r t i r t k : x j = C A r B C A B C A r 3 B C A C A = xj+ A. Wagler June 4, 4 / 46

31 How to find suitable update vectors? For monotone experimental data X, the intermediate states of the sequence x j = y, y,..., y k, y k+ = x j+ between any two consecutively measured states x j, x j+ X satisfy yp yp... yp k yp k+ for all p P with xp j xp j+ and yp yp... yp k yp k+ for all p P with xp j xp j+. Theorem (Durzinsky, W., Weismantel 8) To represent the difference d = x j+ x j, use only sign-compatibel vectors from r p d p if d p > Box(d) = r Z P : d p r p if d p < \ {}. r p = if d p = Remark. Other constraints may restrict this set further: if P P is a P-invariant of the system, then p P r p = follows for all suitable update vectors r. A. Wagler June 4, 4 / 46

32 How to find suitable update vectors? For monotone experimental data X, the intermediate states of the sequence x j = y, y,..., y k, y k+ = x j+ between any two consecutively measured states x j, x j+ X satisfy yp yp... yp k yp k+ for all p P with xp j xp j+ and yp yp... yp k yp k+ for all p P with xp j xp j+. Theorem (Durzinsky, W., Weismantel 8) To represent the difference d = x j+ x j, use only sign-compatibel vectors from r p d p if d p > Box(d) = r Z P : d p r p if d p < \ {}. r p = if d p = Remark. Other constraints may restrict this set further: if P P is a P-invariant of the system, then p P r p = follows for all suitable update vectors r. A. Wagler June 4, 4 / 46

33 How to find suitable update vectors? For monotone experimental data X, the intermediate states of the sequence x j = y, y,..., y k, y k+ = x j+ between any two consecutively measured states x j, x j+ X satisfy yp yp... yp k yp k+ for all p P with xp j xp j+ and yp yp... yp k yp k+ for all p P with xp j xp j+. Theorem (Durzinsky, W., Weismantel 8) To represent the difference d = x j+ x j, use only sign-compatibel vectors from r p d p if d p > Box(d) = r Z P : d p r p if d p < \ {}. r p = if d p = Remark. Other constraints may restrict this set further: if P P is a P-invariant of the system, then p P r p = follows for all suitable update vectors r. A. Wagler June 4, 4 / 46

34 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 3 / 46

35 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 3 / 46

36 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 3 / 46

37 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 4 / 46

38 Representing observed state changes Theorem (Durzinsky, W., Weismantel 8) For each pair x j, x j+ X, we can represent d = x j+ x j by d = λ t r t, λ t Z + r t Box(d) and let R(d, λ) = {r t Box(d) : λ t } be the set of used transitions. Example (cont.) For d 4 = x x 4, the previous considerations showed Box(d 4 ) = = {r 3, r 4, d 4 } and we obtain two representations: λ = (,, ) T with R(d 4, λ)={r 3, r 4 } and λ = (,, ) T with R(d 4, λ )={d 4 } A. Wagler June 4, 4 5 / 46

39 Representing observed state changes Theorem (Durzinsky, W., Weismantel 8) For each pair x j, x j+ X, we can represent d = x j+ x j by d = λ t r t, λ t Z + r t Box(d) and let R(d, λ) = {r t Box(d) : λ t } be the set of used transitions. Example (cont.) For d 4 = x x 4, the previous considerations showed Box(d 4 ) = = {r 3, r 4, d 4 } and we obtain two representations: λ = (,, ) T with R(d 4, λ)={r 3, r 4 } and λ = (,, ) T with R(d 4, λ )={d 4 } A. Wagler June 4, 4 5 / 46

40 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 6 / 46

41 Sequences Sequences Every permutation π = (r t,..., r tm ) of the elements of a set R(d j, λ) yields a sequence of intermediate states x j = y, y,..., y m, y m+ = x j+ with σ π,λ (x j, d j ) = ( (y, r t ), (y, r t ),..., (y m, r tm ) ). Every sequence σ respects monotonicity and induces a priority relation O σ. Example: R(d, λ ) = {r, r } yields σ π,λ (x, d ) = ((x, r ), (x,r )) with r > r and r > σ π,λ (x, d ) = ((x, r ), (x 5, r )) with r > r and x 5 = (,,,, ) T A. Wagler June 4, 4 7 / 46

42 Sequences Sequences Every permutation π = (r t,..., r tm ) of the elements of a set R(d j, λ) yields a sequence of intermediate states x j = y, y,..., y m, y m+ = x j+ with σ π,λ (x j, d j ) = ( (y, r t ), (y, r t ),..., (y m, r tm ) ). Every sequence σ respects monotonicity and induces a priority relation O σ. Example: R(d, λ ) = {r, r } yields σ π,λ (x, d ) = ((x, r ), (x,r )) with r > r and r > σ π,λ x x r r d x σ π,λ (x, d ) = ((x, r ), (x 5, r )) with r > r and x 5 = (,,,, ) T σ π,λ r r x 5 A. Wagler June 4, 4 7 / 46

43 Running example: all obtained sequences For the running example we obtain three difference vectors x xf R xr xpf R xpr xspo x FR d 4 x x 4 d d R x x3 which can be resolved in the following sequences r 4 x FR x r 3 r r x d 4 x 6 x 5 d x r 3 r 4 r r with x 5 = (,,,, ) T and x 6 = (,,,, ) T. x 4 R d x x 3 A. Wagler June 4, 4 8 / 46

44 Priority conflicts Sequences and their conflicts Sequences σ and σ are in priority conflict if there are update vectors r t r t and intermediate states y, y such that both t, t are enabled at y, y but (y, r t ) σ and (y, r t ) σ (since this implies t > t in O σ but t > t in O σ ). weak priority conflict (WPC) if y y, the priority conflict can be resolved by adding appropriate control-arcs strong priority conflict (SPC) if y = y, the priority conflict cannot be resolved by adding appropriate control-arcs Note: we have a SPC between the trivial sequence σ(x k, ) for any terminal state x k and any sequence σ containing x k as intermediate state. Example: σ π,λ (x, d ) = ((x, r ), (x,r )) and σ(x, ) are in SPC. A. Wagler June 4, 4 9 / 46

45 Priority conflicts Sequences and their conflicts Sequences σ and σ are in priority conflict if there are update vectors r t r t and intermediate states y, y such that both t, t are enabled at y, y but (y, r t ) σ and (y, r t ) σ (since this implies t > t in O σ but t > t in O σ ). weak priority conflict (WPC) if y y, the priority conflict can be resolved by adding appropriate control-arcs strong priority conflict (SPC) if y = y, the priority conflict cannot be resolved by adding appropriate control-arcs Note: we have a SPC between the trivial sequence σ(x k, ) for any terminal state x k and any sequence σ containing x k as intermediate state. Example: σ π,λ (x, d ) = ((x, r ), (x,r )) and σ(x, ) are in SPC. A. Wagler June 4, 4 9 / 46

46 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

47 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

48 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

49 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

50 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

51 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

52 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 3 / 46

53 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

54 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

55 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

56 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46

57 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46

58 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46

59 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46

60 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46

61 Existence of conformal standard networks The nodes in V D from sequences of the same difference vector d form a clique Q d. Lemma A node σ V D can never be selected for any solution S if there is a clique Q d so that σ is in strong conflict with all sequences σ Q d. In particular, no σ V D can be selected for any solution S if the sequence contains a terminal state as intermediate state. We obtain a reduced priority conflict graph G by recursively removing from V D all nodes which are completely joined to a clique Q d. Theorem (Favre, W. 3) For reproducible data X, there is at least one selection S V term in G and in G ; the sets of all possible selections S V term in G and G are equal. Remark: Outgoing from reproducible data, the existence of a solution cannot be ensured in standard networks with priorities, but in extended networks. A. Wagler June 4, 4 33 / 46

62 Existence of conformal standard networks The nodes in V D from sequences of the same difference vector d form a clique Q d. Lemma A node σ V D can never be selected for any solution S if there is a clique Q d so that σ is in strong conflict with all sequences σ Q d. In particular, no σ V D can be selected for any solution S if the sequence contains a terminal state as intermediate state. We obtain a reduced priority conflict graph G by recursively removing from V D all nodes which are completely joined to a clique Q d. Theorem (Favre, W. 3) For reproducible data X, there is at least one selection S V term in G and in G ; the sets of all possible selections S V term in G and G are equal. Remark: Outgoing from reproducible data, the existence of a solution cannot be ensured in standard networks with priorities, but in extended networks. A. Wagler June 4, 4 33 / 46

63 Standard networks with weak priority conflicts Composition of standard networks For every selected set S V term, we obtain a standard network P S by taking as transitions the union of all update vectors in the sets R(d j, λ) of the selected sequences σ S. Example: In solution S selecting σ 3 (x, d ) = {(x, r ), (x 5, r )}, σ(x, d ) and σ (x 4, d 4 ), there are two WPCs: P R between σ(x, d ) and σ(x, ) since d, are enabled at x, x r F R r d 4 R between σ 3 (x, d ) and σ(x, ) since r, are enabled at x, x d P F R Spo We next insert appropriate control-arcs to resolve all WPCs in P S. A. Wagler June 4, 4 34 / 46

64 Standard networks with weak priority conflicts Composition of standard networks For every selected set S V term, we obtain a standard network P S by taking as transitions the union of all update vectors in the sets R(d j, λ) of the selected sequences σ S. Example: In solution S selecting σ 3 (x, d ) = {(x, r ), (x 5, r )}, σ(x, d ) and σ (x 4, d 4 ), there are two WPCs: P R between σ(x, d ) and σ(x, ) since d, are enabled at x, x r F R r d 4 R between σ 3 (x, d ) and σ(x, ) since r, are enabled at x, x d P F R Spo We next insert appropriate control-arcs to resolve all WPCs in P S. A. Wagler June 4, 4 34 / 46

65 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 35 / 46

66 Resolving WPCs by disabling transitions Resolving WPCs by inserting control-arcs A WPC due to (y, r t ) σ and (y, r t ) σ can be resolved by either disabling t at state y (then t, t remain enabled at y and we add priority t > t ) or disabling t at state y (then t, t remain enabled at y and we add priority t < t ) Remark: If one of y, y is a terminal state, say y, one of the alternatives is not possible, then t has to be disabled at y and t > t = holds automatically. Example: For solution S, we can resolve the WPC between σ(x, d ) and σ(x, ) by disabling d at the terminal state x only (by adding an appropriate control-arc) and have automatically d > in x. A. Wagler June 4, 4 36 / 46

67 Resolving WPCs by disabling transitions Resolving WPCs by inserting control-arcs A WPC due to (y, r t ) σ and (y, r t ) σ can be resolved by either disabling t at state y (then t, t remain enabled at y and we add priority t > t ) or disabling t at state y (then t, t remain enabled at y and we add priority t < t ) Remark: If one of y, y is a terminal state, say y, one of the alternatives is not possible, then t has to be disabled at y and t > t = holds automatically. Example: For solution S, we can resolve the WPC between σ(x, d ) and σ(x, ) by disabling d at the terminal state x only (by adding an appropriate control-arc) and have automatically d > in x. A. Wagler June 4, 4 36 / 46

68 Disabling transitions by inserting control-arcs Disabling transitions by inserting control-arcs To resolve a WPC of (y, r t ) σ and (y, r t ) σ by disabling t at y, we insert a read-arc (p, t) with weight w(p, t) > y p for some p with y p > y p or an inhibitor-arc (p, t) with weight w(p, t) < y p for some p with y p < y p Example: To resolve the WPC between σ(x, d ) and σ(x, ), we note that x, x differ in P FR, P R and disable d at x by one of the following control-arcs: P F R P R R d 4 r F R r r F R r d 4 R P R P F R d Spo d Spo read-arc (P R, d ) by x P R > x P R inhibitor-arc (P FR, d ) by x P FR < x P FR A. Wagler June 4, 4 37 / 46

69 Which sets of control-arcs are appropriate? For each yet constructed standard network P S, we shall find control-arcs that resolve all involved WPCs: Let CA(σ, σ ) be the set of all possible control-arcs that can resolve WPC(σ, σ ) and A S be the union of all these control-arcs for WPCs in P S. To resolve the WPCs in P S, we have to find subsets A of A S hitting each CA(σ, σ ). Such hitting sets A exist if and only if none of the sets CA(σ, σ ) is empty. Non-minimal hitting sets yield extended Peri nets with unnecessary control-arcs and, thus, being not minimal. Theorem (Favre, W. 3) All minimal conformal extended Petri nets based on P S can be obtained by computing all minimal hitting sets in A S. A. Wagler June 4, 4 38 / 46

70 Which sets of control-arcs are appropriate? For each yet constructed standard network P S, we shall find control-arcs that resolve all involved WPCs: Let CA(σ, σ ) be the set of all possible control-arcs that can resolve WPC(σ, σ ) and A S be the union of all these control-arcs for WPCs in P S. To resolve the WPCs in P S, we have to find subsets A of A S hitting each CA(σ, σ ). Such hitting sets A exist if and only if none of the sets CA(σ, σ ) is empty. Non-minimal hitting sets yield extended Peri nets with unnecessary control-arcs and, thus, being not minimal. Theorem (Favre, W. 3) All minimal conformal extended Petri nets based on P S can be obtained by computing all minimal hitting sets in A S. A. Wagler June 4, 4 38 / 46

71 Determining priority relations Determining priority relations Deduce priority relations among so-obtained transitions for all selected sequences σ S by setting t > t for (y, r t ) σ and all other t enabled at y. Example: P R P F R r F R r d 4 R R d 4 r F R r P F R P R d Spo O S,P = {(r > r )} O S,P = {(r > r )} d Spo Theorem (Favre, W. 3) The so-obtained priority relations are conflict-free and reproduce the experiments. A. Wagler June 4, 4 39 / 46

72 Determining priority relations Determining priority relations Deduce priority relations among so-obtained transitions for all selected sequences σ S by setting t > t for (y, r t ) σ and all other t enabled at y. Example: P R P F R r F R r d 4 R R d 4 r F R r P F R P R d Spo O S,P = {(r > r )} O S,P = {(r > r )} d Spo Theorem (Favre, W. 3) The so-obtained priority relations are conflict-free and reproduce the experiments. A. Wagler June 4, 4 39 / 46

73 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 4 / 46

74 Solution set Theorem (Favre, W. 3) Applying this procedure to all feasible sets S V term yields the complete list of all extended Petri nets with priorities being conformal with X. Solution set: Running example PR PF R F R d d 4 R R d 4 d F R PF R PR S d Spo O : d Spo O : PR PF R r F R r d 4 R R d 4 r F R r PF R PR S d Spo O : r > r d Spo O : r > r A. Wagler June 4, 4 4 / 46

75 Solution set: Running example PR PF R F R d r 4 r 4 d F R PF R PR S 3 r 3 R R r 3 Spo Spo d d O S3,P = {(r4 > r 3 )} O S3,P = {(r4 > r 3 )} PR PF R F R d r 4 R r 3 r 3 R r 4 d F R PF R PR d Spo d Spo O S3,P = {(r4 > r 3 )} O S3,P = {(r4 > r 3 )} A. Wagler June 4, 4 4 / 46

76 Solution set: Running example PR PF R r F R r r 4 r 4 r F R r PF R PR S 4 r 3 R R r 3 Spo Spo d d O S4,P = {(r > r ), (r 4 > r 3 )} O S4,P = {(r > r ), (r 4 > r 3 )} PR PF R r F R r r 4 R r 3 r 3 R r 4 r F R r PF R PR d Spo d Spo O S4,P = {(r > r ), (r 4 > r 3 )} O S4,P = {(r > r ), (r 4 > r 3 )} A. Wagler June 4, 4 43 / 46

77 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 44 / 46

78 Concluding remarks and perspectives Achieved goals We proposed an integrative reconstruction method to generate all extended Petri nets with priorities being concormal with experimental time-series data by representing the observed difference vectors as in the case of extended networks (Durzinsky, Marwan, W. and 3), distinguishing weak and strong priority conflicts in the construction of the priority conflict graph (in contrast to Marwan, W., Weismantel 8), resolving weak priority conflicts by inserting control-arcs and determining priorities on the so-obtained transitions. Perspectives Integrate (further) biological pre-knowledge in the reconstruction process. Make the new approach accessible by a suitable implementation (ASP). Apply the approach to new biological experimental data. A. Wagler June 4, 4 45 / 46

79 Concluding remarks and perspectives Achieved goals We proposed an integrative reconstruction method to generate all extended Petri nets with priorities being concormal with experimental time-series data by representing the observed difference vectors as in the case of extended networks (Durzinsky, Marwan, W. and 3), distinguishing weak and strong priority conflicts in the construction of the priority conflict graph (in contrast to Marwan, W., Weismantel 8), resolving weak priority conflicts by inserting control-arcs and determining priorities on the so-obtained transitions. Perspectives Integrate (further) biological pre-knowledge in the reconstruction process. Make the new approach accessible by a suitable implementation (ASP). Apply the approach to new biological experimental data. A. Wagler June 4, 4 45 / 46

80 THANK YOU This work was partly founded by the French National Research Agency, the European Commission (Feder funds), the Région Auvergne within LabEx IMobS 3. A. Wagler June 4, 4 46 / 46

Integrating prior knowledge in Automatic Network Reconstruction

Integrating prior knowledge in Automatic Network Reconstruction Integrating prior knowledge in Automatic Network Reconstruction M. Favre W. Marwan A. Wagler Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS) UMR CNRS 658 Université Blaise

More information

Reconstructing X -deterministic extended Petri nets from experimental time-series data X

Reconstructing X -deterministic extended Petri nets from experimental time-series data X econstructing X -deterministic extended Petri nets from experimental time-series data X Marie C.F. Favre, Annegret K. Wagler Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS,

More information

A compact modeling approach for deterministic biological systems

A compact modeling approach for deterministic biological systems A compact modeling approach for deterministic biological systems Luis M. Torres 1 Annegret K. Wagler 2 1 Ecuadorian Research Center on Mathematical Modeling ModeMat Escuela Politécnica Nacional, Quito

More information

The dynamics of deterministic systems A survey

The dynamics of deterministic systems A survey The dynamics of deterministic systems A survey Luis M. Torres 1, Annegret K. Wagler 2 luis.torres@epn.edu.ec, wagler@isima.fr 1 Centro de Modelizatión Matemática (ModeMat) Escuela Politécnica Nacional,

More information

Encoding the dynamics of deterministic systems

Encoding the dynamics of deterministic systems Math Meth Oper Res (2011) 73:281 300 DOI 10.1007/s00186-011-0353-6 ORIGINAL ARTICLE Encoding the dynamics of deterministic systems Luis M. Torres Annegret K. Wagler Received: 4 November 2009 / Accepted:

More information

Petri net models. tokens placed on places define the state of the Petri net

Petri net models. tokens placed on places define the state of the Petri net Petri nets Petri net models Named after Carl Adam Petri who, in the early sixties, proposed a graphical and mathematical formalism suitable for the modeling and analysis of concurrent, asynchronous distributed

More information

Complete Process Semantics for Inhibitor Nets Technical Report

Complete Process Semantics for Inhibitor Nets Technical Report Complete Process Semantics for Inhibitor Nets Technical Report Gabriel Juhás 2, Robert Lorenz 1, and Sebastian Mauser 1 1 Department of Applied Computer Science, Catholic University of Eichstätt-Ingolstadt,

More information

COM S 330 Homework 08 Solutions. Type your answers to the following questions and submit a PDF file to Blackboard. One page per problem.

COM S 330 Homework 08 Solutions. Type your answers to the following questions and submit a PDF file to Blackboard. One page per problem. COM S 0 Homework 08 Solutions Type your answers to the following questions and submit a PDF file to Blackboard. One page per problem. Problem 1. [10pts] Let M = (S, T, s 0 ) be the state machine where

More information

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

Existence and uniqueness of solutions for a continuous-time opinion dynamics model with state-dependent connectivity

Existence and uniqueness of solutions for a continuous-time opinion dynamics model with state-dependent connectivity Existence and uniqueness of solutions for a continuous-time opinion dynamics model with state-dependent connectivity Vincent D. Blondel, Julien M. Hendricx and John N. Tsitsilis July 24, 2009 Abstract

More information

Reachability in Petri nets with Inhibitor arcs

Reachability in Petri nets with Inhibitor arcs Reachability in Petri nets with Inhibitor arcs Klaus Reinhardt Universität Tübingen reinhard@informatik.uni-tuebingen.de Overview Multisets, New operators Q and Q on multisets, Semilinearity Petri nets,

More information

Applications of Petri Nets

Applications of Petri Nets Applications of Petri Nets Presenter: Chung-Wei Lin 2010.10.28 Outline Revisiting Petri Nets Application 1: Software Syntheses Theory and Algorithm Application 2: Biological Networks Comprehensive Introduction

More information

Structure-Based Comparison of Biomolecules

Structure-Based Comparison of Biomolecules Structure-Based Comparison of Biomolecules Benedikt Christoph Wolters Seminar Bioinformatics Algorithms RWTH AACHEN 07/17/2015 Outline 1 Introduction and Motivation Protein Structure Hierarchy Protein

More information

Stochastic Petri Nets. Jonatan Lindén. Modelling SPN GSPN. Performance measures. Almost none of the theory. December 8, 2010

Stochastic Petri Nets. Jonatan Lindén. Modelling SPN GSPN. Performance measures. Almost none of the theory. December 8, 2010 Stochastic Almost none of the theory December 8, 2010 Outline 1 2 Introduction A Petri net (PN) is something like a generalized automata. A Stochastic Petri Net () a stochastic extension to Petri nets,

More information

RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION

RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION MAGNUS BORDEWICH, KATHARINA T. HUBER, VINCENT MOULTON, AND CHARLES SEMPLE Abstract. Phylogenetic networks are a type of leaf-labelled,

More information

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1 Embedded Systems 6-1 - Place/transition nets REVIEW Def.: (P, T, F, K, W, M 0 ) is called a place/transition net (P/T net) iff 1. N=(P,T,F) is a net with places p P and transitions t T 2. K: P (N 0 {ω})

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic

More information

Axiomatic Semantics. Lecture 9 CS 565 2/12/08

Axiomatic Semantics. Lecture 9 CS 565 2/12/08 Axiomatic Semantics Lecture 9 CS 565 2/12/08 Axiomatic Semantics Operational semantics describes the meaning of programs in terms of the execution steps taken by an abstract machine Denotational semantics

More information

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,

More information

Specification models and their analysis Petri Nets

Specification models and their analysis Petri Nets Specification models and their analysis Petri Nets Kai Lampka December 10, 2010 1 30 Part I Petri Nets Basics Petri Nets Introduction A Petri Net (PN) is a weighted(?), bipartite(?) digraph(?) invented

More information

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING Alessandro Giua Xiaolan Xie Dip. Ing. Elettrica ed Elettronica, U. di Cagliari, Italy. Email: giua@diee.unica.it INRIA/MACSI Team, ISGMP, U. de Metz, France.

More information

Decompositions of graphs into cycles with chords

Decompositions of graphs into cycles with chords Decompositions of graphs into cycles with chords Paul Balister Hao Li Richard Schelp May 22, 2017 In memory of Dick Schelp, who passed away shortly after the submission of this paper Abstract We show that

More information

On the possible quantities of Fibonacci numbers that occur in some type of intervals

On the possible quantities of Fibonacci numbers that occur in some type of intervals On the possible quantities of Fibonacci numbers that occur in some type of intervals arxiv:1508.02625v1 [math.nt] 11 Aug 2015 Bakir FARHI Laboratoire de Mathématiques appliquées Faculté des Sciences Exactes

More information

arxiv: v2 [cs.dm] 29 Mar 2013

arxiv: v2 [cs.dm] 29 Mar 2013 arxiv:1302.6346v2 [cs.dm] 29 Mar 2013 Fixed point theorems for Boolean networks expressed in terms of forbidden subnetworks Adrien Richard Laboratoire I3S, CNRS & Université de Nice-Sophia Antipolis, France.

More information

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de

More information

A Structure Causality Relation for Liveness Characterisation in Petri Nets

A Structure Causality Relation for Liveness Characterisation in Petri Nets Journal of Universal Computer Science, vol. 12, no. 2 (2006), 214-232 submitted: 4/10/04, accepted: 9/5/05, appeared: 28/2/06 J.UCS A Structure Causality Relation for Liveness Characterisation in Petri

More information

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

Petri nets. s 1 s 2. s 3 s 4. directed arcs. Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1

More information

The Strong Largeur d Arborescence

The Strong Largeur d Arborescence The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics

More information

Linear Time Analysis of Properties of Conflict-Free and General Petri nets

Linear Time Analysis of Properties of Conflict-Free and General Petri nets Linear Time Analysis of Properties of Conflict-Free and General Petri nets Paola Alimonti Esteban Feuerstein Luigi Laura Umberto Nanni Technical Report n. 9, 2010 Linear Time Analysis of Properties of

More information

Time and Timed Petri Nets

Time and Timed Petri Nets Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time

More information

On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms

On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms Anne Benoit, Fanny Dufossé and Yves Robert LIP, École Normale Supérieure de Lyon, France {Anne.Benoit Fanny.Dufosse

More information

Math Models of OR: Some Definitions

Math Models of OR: Some Definitions Math Models of OR: Some Definitions John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA September 2018 Mitchell Some Definitions 1 / 20 Active constraints Outline 1 Active constraints

More information

Join Ordering. Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H :

Join Ordering. Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : IKKBZ First Lemma Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : and, hence, C H (AUVB) = C H (A) +T (A)C H (U) +T (A)T (U)C H (V ) +T (A)T

More information

arxiv: v1 [cs.ds] 20 Feb 2017

arxiv: v1 [cs.ds] 20 Feb 2017 AN OPTIMAL XP ALGORITHM FOR HAMILTONIAN CYCLE ON GRAPHS OF BOUNDED CLIQUE-WIDTH BENJAMIN BERGOUGNOUX, MAMADOU MOUSTAPHA KANTÉ, AND O-JOUNG KWON arxiv:1702.06095v1 [cs.ds] 20 Feb 2017 Abstract. For MSO

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2017

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2017 Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2017 Lecture 4 Ana Bove March 24th 2017 Structural induction; Concepts of automata theory. Overview of today s lecture: Recap: Formal Proofs

More information

On Moving Objects in Dynamic Domains

On Moving Objects in Dynamic Domains On Moving Objects in Dynamic Domains Fangzhen Lin Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Abstract In the physical world, an object

More information

Extensions to the CEGAR Approach on Petri Nets

Extensions to the CEGAR Approach on Petri Nets Acta Cybernetica 21 (2014) 401 417. Extensions to the CEGAR Approach on Petri Nets Ákos Hajdu, András Vörös, Tamás Bartha, and Zoltán Mártonka Abstract Formal verification is becoming more prevalent and

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Lecture 4 Ana Bove March 23rd 2018 Recap: Formal Proofs How formal should a proof be? Depends on its purpose...... but should be convincing......

More information

Price of Stability in Survivable Network Design

Price of Stability in Survivable Network Design Noname manuscript No. (will be inserted by the editor) Price of Stability in Survivable Network Design Elliot Anshelevich Bugra Caskurlu Received: January 2010 / Accepted: Abstract We study the survivable

More information

ON THE POSSIBLE QUANTITIES OF FIBONACCI NUMBERS THAT OCCUR IN SOME TYPES OF INTERVALS

ON THE POSSIBLE QUANTITIES OF FIBONACCI NUMBERS THAT OCCUR IN SOME TYPES OF INTERVALS Acta Math. Univ. Comenianae Vol. LXXXVII, 2 (2018), pp. 291 299 291 ON THE POSSIBLE QUANTITIES OF FIBONACCI NUMBERS THAT OCCUR IN SOME TYPES OF INTERVALS B. FARHI Abstract. In this paper, we show that

More information

Finite Universes. L is a fixed-length language if it has length n for some

Finite Universes. L is a fixed-length language if it has length n for some Finite Universes Finite Universes When the universe is finite (e.g., the interval 0, 2 1 ), all objects can be encoded by words of the same length. A language L has length n 0 if L =, or every word of

More information

The Pooling Problem - Applications, Complexity and Solution Methods

The Pooling Problem - Applications, Complexity and Solution Methods The Pooling Problem - Applications, Complexity and Solution Methods Dag Haugland Dept. of Informatics University of Bergen Norway EECS Seminar on Optimization and Computing NTNU, September 30, 2014 Outline

More information

DECOMPOSITION OF PETRI NETS

DECOMPOSITION OF PETRI NETS Cybernetics and Systems Analysis, Vol. 40, No. 5, 2004 DECOMPOSITION OF PETRI NETS D. A. Zaitsev UDC 519.74 The problem of splitting any given Petri net into functional subnets is considered. The properties

More information

Lecture 2: Proof of Switching Lemma

Lecture 2: Proof of Switching Lemma Lecture 2: oof of Switching Lemma Yuan Li June 25, 2014 1 Decision Tree Instead of bounding the probability that f can be written as some s-dnf, we estimate the probability that f can be computed by a

More information

Biological Pathways Representation by Petri Nets and extension

Biological Pathways Representation by Petri Nets and extension Biological Pathways Representation by and extensions December 6, 2006 Biological Pathways Representation by and extension 1 The cell Pathways 2 Definitions 3 4 Biological Pathways Representation by and

More information

R(4,5) = 25. Stanis law P. Radziszowski JGT 19 (1995)

R(4,5) = 25. Stanis law P. Radziszowski JGT 19 (1995) R(4,5) = 25 Brendan D. McKay + Department of Computer Science Australian National University GPO Box 4, ACT 2601, Australia bdm@cs.anu.edu.au Stanis law P. Radziszowski Department of Computer Science Rochester

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:

More information

Expand, Enlarge, and Check

Expand, Enlarge, and Check Expand, Enlarge, and Check New algorithms for the coverability problem of WSTS G. Geeraerts 1, J.-F. Raskin 1, L. Van Begin 1,2 Département d Informatique, Université Libre de Bruxelles Boulevard du Triomphe,

More information

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Fundamenta Informaticae XX (2004) 1 23 1 IOS Press A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Javier Esparza Institute for Formal Methods in Computer Science

More information

Flat counter automata almost everywhere!

Flat counter automata almost everywhere! Flat counter automata almost everywhere! Jérôme Leroux and Grégoire Sutre Projet Vertecs, IRISA / INRIA Rennes, FRANCE Équipe MVTsi, CNRS / LABRI, FRANCE Counter-automata verification A simple counter-automata:

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

Intuitionistic Fuzzy Estimation of the Ant Methodology

Intuitionistic Fuzzy Estimation of the Ant Methodology BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 2 Sofia 2009 Intuitionistic Fuzzy Estimation of the Ant Methodology S Fidanova, P Marinov Institute of Parallel Processing,

More information

Chapter 7. Inclusion-Exclusion a.k.a. The Sieve Formula

Chapter 7. Inclusion-Exclusion a.k.a. The Sieve Formula Chapter 7. Inclusion-Exclusion a.k.a. The Sieve Formula Prof. Tesler Math 184A Fall 2019 Prof. Tesler Ch. 7. Inclusion-Exclusion Math 184A / Fall 2019 1 / 25 Venn diagram and set sizes A = {1, 2, 3, 4,

More information

The Downward-Closure of Petri Net Languages

The Downward-Closure of Petri Net Languages The Downward-Closure of Petri Net Languages Peter Habermehl 1, Roland Meyer 1, and Harro Wimmel 2 1 LIAFA, Paris Diderot University & CNRS e-mail: {peter.habermehl,roland.meyer}@liafa.jussieu.fr 2 Department

More information

CSE 20 DISCRETE MATH SPRING

CSE 20 DISCRETE MATH SPRING CSE 20 DISCRETE MATH SPRING 2016 http://cseweb.ucsd.edu/classes/sp16/cse20-ac/ Today's learning goals Describe computer representation of sets with bitstrings Define and compute the cardinality of finite

More information

Week 4-5: Generating Permutations and Combinations

Week 4-5: Generating Permutations and Combinations Week 4-5: Generating Permutations and Combinations February 27, 2017 1 Generating Permutations We have learned that there are n! permutations of {1, 2,...,n}. It is important in many instances to generate

More information

An Equivalence result in School Choice

An Equivalence result in School Choice An Equivalence result in School Choice Jay Sethuraman May 2009 Abstract The main result of the paper is a proof of the equivalence of single and multiple lottery mechanisms for the problem of allocating

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

ahmaxsat: Description and Evaluation of a Branch and Bound Max-SAT Solver

ahmaxsat: Description and Evaluation of a Branch and Bound Max-SAT Solver Journal on Satisfiability, Boolean Modeling and Computation 9 (2015) 89-128 ahmaxsat: Description and Evaluation of a Branch and Bound Max-SAT Solver André Abramé Djamal Habet Aix Marseille Université,

More information

Deterministic Decentralized Search in Random Graphs

Deterministic Decentralized Search in Random Graphs Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.

More information

Iowa State University. Instructor: Alex Roitershtein Summer Homework #5. Solutions

Iowa State University. Instructor: Alex Roitershtein Summer Homework #5. Solutions Math 50 Iowa State University Introduction to Real Analysis Department of Mathematics Instructor: Alex Roitershtein Summer 205 Homework #5 Solutions. Let α and c be real numbers, c > 0, and f is defined

More information

7. Queueing Systems. 8. Petri nets vs. State Automata

7. Queueing Systems. 8. Petri nets vs. State Automata Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models

More information

Markov Decision Processes

Markov Decision Processes Markov Decision Processes Lecture notes for the course Games on Graphs B. Srivathsan Chennai Mathematical Institute, India 1 Markov Chains We will define Markov chains in a manner that will be useful to

More information

Petri Nets (for Planners)

Petri Nets (for Planners) Petri (for Planners) B. Bonet, P. Haslum... from various places... ICAPS 2011 & Motivation Petri (PNs) is formalism for modelling discrete event systems Developed by (and named after) C.A. Petri in 1960s

More information

Graphs and Network Flows IE411. Lecture 15. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 15. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 15 Dr. Ted Ralphs IE411 Lecture 15 1 Preflow-Push Algorithms First developed by A. V. Goldberg in 1985. Best preflow-push algorithms outperform best augmenting path

More information

Searching in non-deterministic, partially observable and unknown environments

Searching in non-deterministic, partially observable and unknown environments Searching in non-deterministic, partially observable and unknown environments CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2014 Soleymani Artificial Intelligence:

More information

A CHARACTERIZATION OF LOCALLY FINITE VARIETIES THAT SATISFY A NONTRIVIAL CONGRUENCE IDENTITY

A CHARACTERIZATION OF LOCALLY FINITE VARIETIES THAT SATISFY A NONTRIVIAL CONGRUENCE IDENTITY A CHARACTERIZATION OF LOCALLY FINITE VARIETIES THAT SATISFY A NONTRIVIAL CONGRUENCE IDENTITY KEITH A. KEARNES Abstract. We show that a locally finite variety satisfies a nontrivial congruence identity

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

Skylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland

Skylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland Yufei Tao ITEE University of Queensland Today we will discuss problems closely related to the topic of multi-criteria optimization, where one aims to identify objects that strike a good balance often optimal

More information

Heuristics for Efficient SAT Solving. As implemented in GRASP, Chaff and GSAT.

Heuristics for Efficient SAT Solving. As implemented in GRASP, Chaff and GSAT. Heuristics for Efficient SAT Solving As implemented in GRASP, Chaff and GSAT. Formulation of famous problems as SAT: k-coloring (1/2) The K-Coloring problem: Given an undirected graph G(V,E) and a natural

More information

CTL satisfability via tableau A C++ implementation

CTL satisfability via tableau A C++ implementation CTL satisfability via tableau A C++ implementation Nicola Prezza April 30, 2015 Outline 1 Introduction 2 Parsing 3 Data structures 4 Initial sets of labels and edges 5 Cull 6 Examples and benchmarks The

More information

Petri Nets and Model Checking. Natasa Gkolfi. University of Oslo. March 31, 2017

Petri Nets and Model Checking. Natasa Gkolfi. University of Oslo. March 31, 2017 University of Oslo March 31, 2017 Petri Nets Petri Nets : mathematically founded formalism concurrency synchronization modeling distributed systems Petri Nets Petri Nets : mathematically founded formalism

More information

Introduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either

Introduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either Introduction to Temporal Logic The purpose of temporal logics is to specify properties of dynamic systems. These can be either Desired properites. Often liveness properties like In every infinite run action

More information

Running Time. Assumption. All capacities are integers between 1 and C.

Running Time. Assumption. All capacities are integers between 1 and C. Running Time Assumption. All capacities are integers between and. Invariant. Every flow value f(e) and every residual capacities c f (e) remains an integer throughout the algorithm. Theorem. The algorithm

More information

Modeling Synchronous Systems in BIP

Modeling Synchronous Systems in BIP Unité Mixte de Recherche 5104 CNRS - INPG - UJF Centre Equation 2, avenue de VIGNATE F-38610 GIERES tel : +33 456 52 03 40 fax : +33 456 52 03 50 http://www-verimag.imag.fr Modeling Synchronous Systems

More information

On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets

On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets Ricardo J. Rodríguez rj.rodriguez@unileon.es Research Institute of Applied Sciences in Cybersecurity University of León, Spain

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i Embedded Systems 15-1 - REVIEW: Aperiodic scheduling C i J i 0 a i s i f i d i Given: A set of non-periodic tasks {J 1,, J n } with arrival times a i, deadlines d i, computation times C i precedence constraints

More information

Automatic Generation of Polynomial Invariants for System Verification

Automatic Generation of Polynomial Invariants for System Verification Automatic Generation of Polynomial Invariants for System Verification Enric Rodríguez-Carbonell Technical University of Catalonia Talk at EPFL Nov. 2006 p.1/60 Plan of the Talk Introduction Need for program

More information

Equivalent Forms of the Axiom of Infinity

Equivalent Forms of the Axiom of Infinity Equivalent Forms of the Axiom of Infinity Axiom of Infinity 1. There is a set that contains each finite ordinal as an element. The Axiom of Infinity is the axiom of Set Theory that explicitly asserts that

More information

c 2011 Nisha Somnath

c 2011 Nisha Somnath c 2011 Nisha Somnath HIERARCHICAL SUPERVISORY CONTROL OF COMPLEX PETRI NETS BY NISHA SOMNATH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Aerospace

More information

Math Models of OR: Branch-and-Bound

Math Models of OR: Branch-and-Bound Math Models of OR: Branch-and-Bound John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA November 2018 Mitchell Branch-and-Bound 1 / 15 Branch-and-Bound Outline 1 Branch-and-Bound

More information

Hierarchy among Automata on Linear Orderings

Hierarchy among Automata on Linear Orderings Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

Analysis of Algorithms. Outline 1 Introduction Basic Definitions Ordered Trees. Fibonacci Heaps. Andres Mendez-Vazquez. October 29, Notes.

Analysis of Algorithms. Outline 1 Introduction Basic Definitions Ordered Trees. Fibonacci Heaps. Andres Mendez-Vazquez. October 29, Notes. Analysis of Algorithms Fibonacci Heaps Andres Mendez-Vazquez October 29, 2015 1 / 119 Outline 1 Introduction Basic Definitions Ordered Trees 2 Binomial Trees Example 3 Fibonacci Heap Operations Fibonacci

More information

Reachability of recurrent positions in the chip-firing game

Reachability of recurrent positions in the chip-firing game Egerváry Research Group on Combinatorial Optimization Technical reports TR-2015-10. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...),

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 7. High Level Petri-Nets Definition 7.1 A Net Type is determined if the following specification is given: 1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 2. sort of labeling

More information

Simulation of Spiking Neural P Systems using Pnet Lab

Simulation of Spiking Neural P Systems using Pnet Lab Simulation of Spiking Neural P Systems using Pnet Lab Venkata Padmavati Metta Bhilai Institute of Technology, Durg vmetta@gmail.com Kamala Krithivasan Indian Institute of Technology, Madras kamala@iitm.ac.in

More information

Control of Sampled Switched Systems using Invariance Analysis

Control of Sampled Switched Systems using Invariance Analysis 1st French Singaporean Workshop on Formal Methods and Applications Control of Sampled Switched Systems using Invariance Analysis Laurent Fribourg LSV - ENS Cachan & CNRS Laurent Fribourg Lsv - ENS Cachan

More information

Chapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 4 Greedy Algorithms Slides by Kevin Wayne. Copyright Pearson-Addison Wesley. All rights reserved. 4 4.1 Interval Scheduling Interval Scheduling Interval scheduling. Job j starts at s j and finishes

More information

Pain Signaling - A Case Study of the Modular Petri Net Modeling Concept with Prospect to a Protein-Oriented Modeling Platform

Pain Signaling - A Case Study of the Modular Petri Net Modeling Concept with Prospect to a Protein-Oriented Modeling Platform 1 BioPPN Workshop, 20 June 2011 Pain Signaling - A Case Study of the Modular Petri Net Modeling Concept with Prospect to a Protein-Oriented Modeling Platform Mary Ann Blätke, Sonja Meyer, Wolfgang Marwan

More information

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for? Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits

More information

First Lemma. Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : C H (AUVB) = C H (A)

First Lemma. Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : C H (AUVB) = C H (A) IKKBZ First Lemma Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : and, hence, C H (AUVB) = C H (A) +T(A)C H (U) +T(A)T(U)C H (V) +T(A)T(U)T(V)C

More information

Time Petri Nets. Miriam Zia School of Computer Science McGill University

Time Petri Nets. Miriam Zia School of Computer Science McGill University Time Petri Nets Miriam Zia School of Computer Science McGill University Timing Specifications Why is time introduced in Petri nets? To model interaction between activities taking into account their start

More information

Direct mapping of low-latency asynchronous

Direct mapping of low-latency asynchronous School of Electrical, Electronic & Computer Engineering Direct mapping of low-latency asynchronous controllers from STGs D.Sokolov, A.Bystrov, A.Yakovlev Technical Report Series NCL-EECE-MSD-TR-2006-110

More information

CS 4407 Algorithms Lecture: Shortest Path Algorithms

CS 4407 Algorithms Lecture: Shortest Path Algorithms CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford

More information

Ringing the Changes II

Ringing the Changes II Ringing the Changes II Cayley Color Graphs Let G be a group and H a subset of G. We define a Cayley digraph (directed graph) by: Each element of G is a vertex of the digraph Γ and an arc is drawn from

More information

Crash course Verification of Finite Automata CTL model-checking

Crash course Verification of Finite Automata CTL model-checking Crash course Verification of Finite Automata CTL model-checking Exercise session - 07.12.2016 Xiaoxi He 1 Reminders Big picture Objective Verify properties over DES models Formal method Absolute guarantee!

More information

FROM COHERENT TO FINITENESS SPACES

FROM COHERENT TO FINITENESS SPACES FROM COHERENT TO FINITENESS SPACES PIERRE HYVERNAT Laboratoire de Mathématiques, Université de Savoie, 73376 Le Bourget-du-Lac Cedex, France. e-mail address: Pierre.Hyvernat@univ-savoie.fr Abstract. This

More information