Automatic Network Reconstruction
|
|
- Logan Randall
- 6 years ago
- Views:
Transcription
1 Automatic Network Reconstruction Annegret K. WAGLER Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS) UMR CNRS 658 Université Blaise Pascal, Clermont-Ferrand, France BioPPN 4, Tunis Tutorial: Petri nets for multiscale Systems Biology A. Wagler June 4, 4 / 46
2 Modeling and Model Validation in Biosciences!"%$C%*5)G$-<"59H)!"#$%&'()*'#)!"#$%)+*%&#*,"') &')-.$)/&"&$'$) 34$5&6$'-*%)7*-*)) "8)*%%)9&'#) :'-$545$-*,"') ;/5*&')<"59=) :'8"56*%) E.$6$) E.$6$)F*%&#*,"') 34$5&6$'-*%)7$&(') I.$)%*&*%)%*J)*445"*.H) B$4$*-)C',%)-.$)6"#$%)"55$-%A)45$#&-)*%%)$34$5&6$'-*%)5$C%-D) Modeling and Model Validation in Biosciences Biological models: often cartoon-like informal schemes Classical lab approaches: heuristic and hypothesis-driven methods, yield potentially incomplete solution sets A. Wagler June 4, 4 / 46
3 Mathematical Models and Methods for Biological Systems exp. design validation Biological System Biological Process exp. data hypothesis Structural properties Predicted dynamics Math. Algorithms Math. proof techniques analysis simulation Mathematical Model Mathematical Problem reconstruction interpretation Mathematics for Biosciences Mathematical models: formal schemes representing structure and function of the studied system Mathematical approaches: data-driven methods, can guarantee completeness by mathematical proofs A. Wagler June 4, 4 3 / 46
4 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 4 / 46
5 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 5 / 46
6 Petri nets: The networks Standard networks P = (P, T, A, w) P set of involved components ( places ), (molecules, receptors, genes) T set of involved reactions ( transitions ), (reactions, activations,...) A (P T ) (T P) set of directed links ( arcs ), arc weights w as stoichiometric coefficients. standard network Extended networks P = (P, T, (A A R A I ), w) A R P T read-arcs A I P T inhibitor-arcs A. Wagler June 4, 4 6 / 46
7 Petri nets: The networks Standard networks P = (P, T, A, w) P set of involved components ( places ), (molecules, receptors, genes) T set of involved reactions ( transitions ), (reactions, activations,...) A (P T ) (T P) set of directed links ( arcs ), arc weights w as stoichiometric coefficients. standard network extended network Extended networks P = (P, T, (A A R A I ), w) A R P T read-arcs A I P T inhibitor-arcs A. Wagler June 4, 4 6 / 46
8 Petri nets: States and state changes States Each place p P can be marked with an integral number x p of tokens. A state can be represented as a vector x N P with entries x p for all p P. a b c d e f x = Switching enabled transitions In a standard network, t T is enabled at a state x if x p w(p, t) for all p with (p, t) A; switching t yiels a new state x with x p = x p + w(p, t) (p, t), (t, p) A. In an extended network, t T is enabled at a state x if in addition x p w(p, t) for all p with (p, t) A R and x p < w(p, t) for all p with (p, t) A I. A. Wagler June 4, 4 7 / 46
9 Petri nets: States and state changes States Each place p P can be marked with an integral number x p of tokens. A state can be represented as a vector x N P with entries x p for all p P. a b c d e f x = Switching enabled transitions In a standard network, t T is enabled at a state x if x p w(p, t) for all p with (p, t) A; switching t yiels a new state x with x p = x p + w(p, t) (p, t), (t, p) A. In an extended network, t T is enabled at a state x if in addition x p w(p, t) for all p with (p, t) A R and x p < w(p, t) for all p with (p, t) A I. A. Wagler June 4, 4 7 / 46
10 Dynamic processes and reachability Dynamic processes Dynamic processes correspond to sequences of system states, obtained by sequences of transition switches. Starting from an initial state x, explore the dynamic behavior of the system by consecutively switching enabled transitions, analyzing the reachability of certain system states Can we control transition switches and, thus, the dynamic behavior? A. Wagler June 4, 4 8 / 46
11 Prediction of the dynamic behavior Priority relations for transitions (Marwan, W. & Weismantel 8) Let G be a network and O a priority relation on its transitions. If there are two or more transitions enabled at a state, this transition with highest priority will be switched. This allows to predict the dynamic behavior of the system (instead of listing all potentially possible switching sequences). Example. Consider the network G with O = {t > t 3 } A. Wagler June 4, 4 9 / 46
12 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 / 46
13 When does a network fit given experimental data? Experimental data can be seen as sequences X = (x, x,..., x k ) of measured system states: x x x = B C B C B A = x A network fits the given data if it can reproduce the observations: Conformal network A network G = (P, T, (A A R A I ), w) with priorities O is conformal with X if it contains and correctly selects transitions to reach, from every observed state x j, its observed successor x j+. A. Wagler June 4, 4 / 46
14 When does a network fit given experimental data? Experimental data can be seen as sequences X = (x, x,..., x k ) of measured system states: x = B B C C C A x B B C C C A x B B C C C A = x A network fits the given data if it can reproduce the observations: 3 Conformal network A network G = (P, T, (A A R A I ), w) with priorities O is conformal with X if it contains and correctly selects transitions to reach, from every observed state x j, its observed successor x j+. A. Wagler June 4, 4 / 46
15 The network Reconstruction Problem Network Reconstruction Problem Input: Output: a set P of components (considered to be crucial for the studied phenomenon), experimental time series data X = (x, x,..., x m ) obtained by stimulating a biological system and observing how its states change over time. all extended networks G = (P, T, (A A R A I ), w) with priorities O being conformal with the given data X, i.e., being able to reproduce the experimental observations. Remark: Finding all networks fitting the data means to create all minimal ones (that do not reproduce the data anymore after removing any element). All reconstructed networks have the same set P of places but differ in their transitions, (control-)arcs, and priorities. A. Wagler June 4, 4 / 46
16 The network Reconstruction Problem Network Reconstruction Problem Input: Output: a set P of components (considered to be crucial for the studied phenomenon), experimental time series data X = (x, x,..., x m ) obtained by stimulating a biological system and observing how its states change over time. all extended networks G = (P, T, (A A R A I ), w) with priorities O being conformal with the given data X, i.e., being able to reproduce the experimental observations. Remark: Finding all networks fitting the data means to create all minimal ones (that do not reproduce the data anymore after removing any element). All reconstructed networks have the same set P of places but differ in their transitions, (control-)arcs, and priorities. A. Wagler June 4, 4 / 46
17 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 3 / 46
18 Overview Reconstruction Approaches Based on previous works on reconstructing standard networks (Marwan, Wagler & Weismantel 8; Durzinsky, Wagler & Weismantel ) standard networks with priorities (Marwan, Wagler & Weismantel, 8; Torres & Wagler ) extended Petri nets (Durzinsky, Marwan & Wagler and 3) and on techniques for preprocessing the experimental data (Durzinsky, Wagler & Weismantel 8 and, Wagler & Wegener 3) postprocessing the solution set (Wagler & Wegener, 3) we developed an integrative approach for reconstructing extended Petri nets with priorities (Favre & Wagler 3) A. Wagler June 4, 4 4 / 46
19 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 5 / 46
20 Time series data In an experiment, the system is triggered in some state x to generate an initial state x, then it is observed how the system responds x,..., x k. A time series X = (x ; x,..., x k ) contains discrete (or discretized) values x j p = x p (t j ) for each component p P at several time points t,..., t k : P x(t )... x(t j )... x(t k ) a x a(t )... x a(t j )... x a(t k ).... p x p(t )... x p(t j )... x p(t k ) Thereby: choose enough time points t j to capture the true time course of the values x j p for each single component p P: as we require monotone data for the reconstruction process. A. Wagler June 4, 4 6 / 46
21 Time series data In an experiment, the system is triggered in some state x to generate an initial state x, then it is observed how the system responds x,..., x k. A time series X = (x ; x,..., x k ) contains discrete (or discretized) values x j p = x p (t j ) for each component p P at several time points t,..., t k : P x(t )... x(t j )... x(t k ) a x a(t )... x a(t j )... x a(t k ).... p x p(t )... x p(t j )... x p(t k ) Thereby: choose enough time points t j to capture the true time course of the values x j p for each single component p P: x i x x i x x x x x xx x x x x x x x as we require monotone data for the reconstruction process. t x x x x x x t A. Wagler June 4, 4 6 / 46
22 The Experimental Data As several experiments, starting from different initial states, may be necessary to describe the whole phenomenon, we combine several time series to obtain the experimental data X. x = x = x = x 3 = x 4 = FR R Thereby, we assume the data X to be reproducible: stimulating the system in the same initial state must also result in the same sequence; in particular, each observed state x j must have a unique successor x j+ in X. A. Wagler June 4, 4 7 / 46
23 The Experimental Data As several experiments, starting from different initial states, may be necessary to describe the whole phenomenon, we combine several time series to obtain the experimental data X. x = x = x = x 3 = x 4 = FR R Thereby, we assume the data X to be reproducible: stimulating the system in the same initial state must also result in the same sequence; in particular, each observed state x j must have a unique successor x j+ in X. A. Wagler June 4, 4 7 / 46
24 Example: Light-induced Sporulation of P. polycephalum The states are vectors of the form x = (x FR, x R, x Pfr, x Pr, x Sp ) T having /-entries only. x = x = x = x 3 = x 4 = FR R The scheme represents experimental data X consisting of two time series (x ; x, x, x 3 ) and (x ; x 4, x ). sporulation SP triggered by far-red light FR (turns P fr into P r ) sporulation suppressed by red light R (turns P r back to P fr ) A. Wagler June 4, 4 8 / 46
25 Example: Light-induced Sporulation of P. polycephalum The states are vectors of the form x = (x FR, x R, x Pfr, x Pr, x Sp ) T having /-entries only. x = x = x = x 3 = x 4 = FR R The scheme represents experimental data X consisting of two time series (x ; x, x, x 3 ) and (x ; x 4, x ). sporulation SP triggered by far-red light FR (turns P fr into P r ) sporulation suppressed by red light R (turns P r back to P fr ) A. Wagler June 4, 4 8 / 46
26 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 9 / 46
27 The principle idea for the representation Recall that a conformal (standard) network G = (P, T, A, w) can reproduce 3 the experimentally observed sequences of system states: x t B C x = C A Representation of observed responses C A x t 3 B Use the update vectors r t Z P of the transitions with { w(p, t) if (p, t) A rp t = w(t, p) if (t, p) A else C A = x to realize the changes from one observed state x j to its observed successor x j+. A. Wagler June 4, 4 / 46
28 The principle idea for the representation Recall that a conformal (standard) network G = (P, T, A, w) can reproduce 3 the experimentally observed sequences of system states: x t B C x = C A Representation of observed responses C A x t 3 B Use the update vectors r t Z P of the transitions with { w(p, t) if (p, t) A rp t = w(t, p) if (t, p) A else C A = x to realize the changes from one observed state x j to its observed successor x j+. A. Wagler June 4, 4 / 46
29 The Difficulty: Non-observed Intermediate States Observation The given time series X = (x ; x..., x k ) may not consist of consecutive system states, as between one observed state x j and its observed successor state x j+, there may exist non-observed intermediate states.?????? To reach x j+ from x j, we may need a sequence of transitions t i,..., t k whose update vectors satisfy x j+ x j = r t i r t k : x j = C A r B C A B C A r 3 B C A C A = xj+ A. Wagler June 4, 4 / 46
30 The Difficulty: Non-observed Intermediate States Observation The given time series X = (x ; x..., x k ) may not consist of consecutive system states, as between one observed state x j and its observed successor state x j+, there may exist non-observed intermediate states.?????? To reach x j+ from x j, we may need a sequence of transitions t i,..., t k whose update vectors satisfy x j+ x j = r t i r t k : x j = C A r B C A B C A r 3 B C A C A = xj+ A. Wagler June 4, 4 / 46
31 How to find suitable update vectors? For monotone experimental data X, the intermediate states of the sequence x j = y, y,..., y k, y k+ = x j+ between any two consecutively measured states x j, x j+ X satisfy yp yp... yp k yp k+ for all p P with xp j xp j+ and yp yp... yp k yp k+ for all p P with xp j xp j+. Theorem (Durzinsky, W., Weismantel 8) To represent the difference d = x j+ x j, use only sign-compatibel vectors from r p d p if d p > Box(d) = r Z P : d p r p if d p < \ {}. r p = if d p = Remark. Other constraints may restrict this set further: if P P is a P-invariant of the system, then p P r p = follows for all suitable update vectors r. A. Wagler June 4, 4 / 46
32 How to find suitable update vectors? For monotone experimental data X, the intermediate states of the sequence x j = y, y,..., y k, y k+ = x j+ between any two consecutively measured states x j, x j+ X satisfy yp yp... yp k yp k+ for all p P with xp j xp j+ and yp yp... yp k yp k+ for all p P with xp j xp j+. Theorem (Durzinsky, W., Weismantel 8) To represent the difference d = x j+ x j, use only sign-compatibel vectors from r p d p if d p > Box(d) = r Z P : d p r p if d p < \ {}. r p = if d p = Remark. Other constraints may restrict this set further: if P P is a P-invariant of the system, then p P r p = follows for all suitable update vectors r. A. Wagler June 4, 4 / 46
33 How to find suitable update vectors? For monotone experimental data X, the intermediate states of the sequence x j = y, y,..., y k, y k+ = x j+ between any two consecutively measured states x j, x j+ X satisfy yp yp... yp k yp k+ for all p P with xp j xp j+ and yp yp... yp k yp k+ for all p P with xp j xp j+. Theorem (Durzinsky, W., Weismantel 8) To represent the difference d = x j+ x j, use only sign-compatibel vectors from r p d p if d p > Box(d) = r Z P : d p r p if d p < \ {}. r p = if d p = Remark. Other constraints may restrict this set further: if P P is a P-invariant of the system, then p P r p = follows for all suitable update vectors r. A. Wagler June 4, 4 / 46
34 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 3 / 46
35 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 3 / 46
36 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 3 / 46
37 Example: Light-induced Sporulation (cont.) Consider the time series (x ; x 4, x ) and d = x x 4 = (,,,, ) T. x = FR x = = x 4 R x We obtain the following possible update vectors: = r FR = r R Box(d) = r Z 5 : = r Pfr = r Pr = r Sp = = x 3 = The p-invariant P = {P fr, P r } implies further that r Pfr + r Pr = holds. A. Wagler June 4, 4 4 / 46
38 Representing observed state changes Theorem (Durzinsky, W., Weismantel 8) For each pair x j, x j+ X, we can represent d = x j+ x j by d = λ t r t, λ t Z + r t Box(d) and let R(d, λ) = {r t Box(d) : λ t } be the set of used transitions. Example (cont.) For d 4 = x x 4, the previous considerations showed Box(d 4 ) = = {r 3, r 4, d 4 } and we obtain two representations: λ = (,, ) T with R(d 4, λ)={r 3, r 4 } and λ = (,, ) T with R(d 4, λ )={d 4 } A. Wagler June 4, 4 5 / 46
39 Representing observed state changes Theorem (Durzinsky, W., Weismantel 8) For each pair x j, x j+ X, we can represent d = x j+ x j by d = λ t r t, λ t Z + r t Box(d) and let R(d, λ) = {r t Box(d) : λ t } be the set of used transitions. Example (cont.) For d 4 = x x 4, the previous considerations showed Box(d 4 ) = = {r 3, r 4, d 4 } and we obtain two representations: λ = (,, ) T with R(d 4, λ)={r 3, r 4 } and λ = (,, ) T with R(d 4, λ )={d 4 } A. Wagler June 4, 4 5 / 46
40 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 6 / 46
41 Sequences Sequences Every permutation π = (r t,..., r tm ) of the elements of a set R(d j, λ) yields a sequence of intermediate states x j = y, y,..., y m, y m+ = x j+ with σ π,λ (x j, d j ) = ( (y, r t ), (y, r t ),..., (y m, r tm ) ). Every sequence σ respects monotonicity and induces a priority relation O σ. Example: R(d, λ ) = {r, r } yields σ π,λ (x, d ) = ((x, r ), (x,r )) with r > r and r > σ π,λ (x, d ) = ((x, r ), (x 5, r )) with r > r and x 5 = (,,,, ) T A. Wagler June 4, 4 7 / 46
42 Sequences Sequences Every permutation π = (r t,..., r tm ) of the elements of a set R(d j, λ) yields a sequence of intermediate states x j = y, y,..., y m, y m+ = x j+ with σ π,λ (x j, d j ) = ( (y, r t ), (y, r t ),..., (y m, r tm ) ). Every sequence σ respects monotonicity and induces a priority relation O σ. Example: R(d, λ ) = {r, r } yields σ π,λ (x, d ) = ((x, r ), (x,r )) with r > r and r > σ π,λ x x r r d x σ π,λ (x, d ) = ((x, r ), (x 5, r )) with r > r and x 5 = (,,,, ) T σ π,λ r r x 5 A. Wagler June 4, 4 7 / 46
43 Running example: all obtained sequences For the running example we obtain three difference vectors x xf R xr xpf R xpr xspo x FR d 4 x x 4 d d R x x3 which can be resolved in the following sequences r 4 x FR x r 3 r r x d 4 x 6 x 5 d x r 3 r 4 r r with x 5 = (,,,, ) T and x 6 = (,,,, ) T. x 4 R d x x 3 A. Wagler June 4, 4 8 / 46
44 Priority conflicts Sequences and their conflicts Sequences σ and σ are in priority conflict if there are update vectors r t r t and intermediate states y, y such that both t, t are enabled at y, y but (y, r t ) σ and (y, r t ) σ (since this implies t > t in O σ but t > t in O σ ). weak priority conflict (WPC) if y y, the priority conflict can be resolved by adding appropriate control-arcs strong priority conflict (SPC) if y = y, the priority conflict cannot be resolved by adding appropriate control-arcs Note: we have a SPC between the trivial sequence σ(x k, ) for any terminal state x k and any sequence σ containing x k as intermediate state. Example: σ π,λ (x, d ) = ((x, r ), (x,r )) and σ(x, ) are in SPC. A. Wagler June 4, 4 9 / 46
45 Priority conflicts Sequences and their conflicts Sequences σ and σ are in priority conflict if there are update vectors r t r t and intermediate states y, y such that both t, t are enabled at y, y but (y, r t ) σ and (y, r t ) σ (since this implies t > t in O σ but t > t in O σ ). weak priority conflict (WPC) if y y, the priority conflict can be resolved by adding appropriate control-arcs strong priority conflict (SPC) if y = y, the priority conflict cannot be resolved by adding appropriate control-arcs Note: we have a SPC between the trivial sequence σ(x k, ) for any terminal state x k and any sequence σ containing x k as intermediate state. Example: σ π,λ (x, d ) = ((x, r ), (x,r )) and σ(x, ) are in SPC. A. Wagler June 4, 4 9 / 46
46 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
47 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
48 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
49 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
50 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
51 Construction of the priority conflict graph Priority conflict graph G = (V D V term, E D E W E S ) the nodes correspond to sequences: V D : the sequence σ π,λ (x j, d j ) for all permutations π of R(d j, λ) V term : the trivial sequence σ(x k, ) for all terminal states x k the edges correspond to their priority conflicts: E D : all SPCs between two sequences σ, σ from the same difference vector E S : all SPCs between sequences σ, σ from distinct difference vectors E W : all WPCs between sequences σ, σ from distinct difference vectors Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
52 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 3 / 46
53 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
54 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
55 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
56 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q A. Wagler June 4, 4 3 / 46
57 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46
58 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46
59 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46
60 Selection of suitable sequences Selection of suitable sequences Towards network composition, we have to select in G - a node set S with exactly one sequence σ V D for each difference d j - all nodes from V term such that no SPCs occur in S V term. Example: G contains the following 4 feasible sets S i V term Q Q 3 σ (x, d ) σ(x 3, ) Q 4 σ (x 4, d 4 ) Q 3 σ (x, d ) Q σ(x, d ) σ (x 4, d 4 ) σ 3 (x, d ) σ(x, ) σ 3 (x 4, d 4 ) Q S = {σ (x, d ), σ(x, d ), σ (x 4, d 4 )}, S = {σ 3(x, d ), σ(x, d ), σ (x 4, d 4 )}, S 3 = {σ (x, d ), σ(x, d ), σ 3(x 4, d 4 )}, S 4 = {σ 3(x, d ), σ(x, d ), σ 3(x 4, d 4 )}. A. Wagler June 4, 4 3 / 46
61 Existence of conformal standard networks The nodes in V D from sequences of the same difference vector d form a clique Q d. Lemma A node σ V D can never be selected for any solution S if there is a clique Q d so that σ is in strong conflict with all sequences σ Q d. In particular, no σ V D can be selected for any solution S if the sequence contains a terminal state as intermediate state. We obtain a reduced priority conflict graph G by recursively removing from V D all nodes which are completely joined to a clique Q d. Theorem (Favre, W. 3) For reproducible data X, there is at least one selection S V term in G and in G ; the sets of all possible selections S V term in G and G are equal. Remark: Outgoing from reproducible data, the existence of a solution cannot be ensured in standard networks with priorities, but in extended networks. A. Wagler June 4, 4 33 / 46
62 Existence of conformal standard networks The nodes in V D from sequences of the same difference vector d form a clique Q d. Lemma A node σ V D can never be selected for any solution S if there is a clique Q d so that σ is in strong conflict with all sequences σ Q d. In particular, no σ V D can be selected for any solution S if the sequence contains a terminal state as intermediate state. We obtain a reduced priority conflict graph G by recursively removing from V D all nodes which are completely joined to a clique Q d. Theorem (Favre, W. 3) For reproducible data X, there is at least one selection S V term in G and in G ; the sets of all possible selections S V term in G and G are equal. Remark: Outgoing from reproducible data, the existence of a solution cannot be ensured in standard networks with priorities, but in extended networks. A. Wagler June 4, 4 33 / 46
63 Standard networks with weak priority conflicts Composition of standard networks For every selected set S V term, we obtain a standard network P S by taking as transitions the union of all update vectors in the sets R(d j, λ) of the selected sequences σ S. Example: In solution S selecting σ 3 (x, d ) = {(x, r ), (x 5, r )}, σ(x, d ) and σ (x 4, d 4 ), there are two WPCs: P R between σ(x, d ) and σ(x, ) since d, are enabled at x, x r F R r d 4 R between σ 3 (x, d ) and σ(x, ) since r, are enabled at x, x d P F R Spo We next insert appropriate control-arcs to resolve all WPCs in P S. A. Wagler June 4, 4 34 / 46
64 Standard networks with weak priority conflicts Composition of standard networks For every selected set S V term, we obtain a standard network P S by taking as transitions the union of all update vectors in the sets R(d j, λ) of the selected sequences σ S. Example: In solution S selecting σ 3 (x, d ) = {(x, r ), (x 5, r )}, σ(x, d ) and σ (x 4, d 4 ), there are two WPCs: P R between σ(x, d ) and σ(x, ) since d, are enabled at x, x r F R r d 4 R between σ 3 (x, d ) and σ(x, ) since r, are enabled at x, x d P F R Spo We next insert appropriate control-arcs to resolve all WPCs in P S. A. Wagler June 4, 4 34 / 46
65 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 35 / 46
66 Resolving WPCs by disabling transitions Resolving WPCs by inserting control-arcs A WPC due to (y, r t ) σ and (y, r t ) σ can be resolved by either disabling t at state y (then t, t remain enabled at y and we add priority t > t ) or disabling t at state y (then t, t remain enabled at y and we add priority t < t ) Remark: If one of y, y is a terminal state, say y, one of the alternatives is not possible, then t has to be disabled at y and t > t = holds automatically. Example: For solution S, we can resolve the WPC between σ(x, d ) and σ(x, ) by disabling d at the terminal state x only (by adding an appropriate control-arc) and have automatically d > in x. A. Wagler June 4, 4 36 / 46
67 Resolving WPCs by disabling transitions Resolving WPCs by inserting control-arcs A WPC due to (y, r t ) σ and (y, r t ) σ can be resolved by either disabling t at state y (then t, t remain enabled at y and we add priority t > t ) or disabling t at state y (then t, t remain enabled at y and we add priority t < t ) Remark: If one of y, y is a terminal state, say y, one of the alternatives is not possible, then t has to be disabled at y and t > t = holds automatically. Example: For solution S, we can resolve the WPC between σ(x, d ) and σ(x, ) by disabling d at the terminal state x only (by adding an appropriate control-arc) and have automatically d > in x. A. Wagler June 4, 4 36 / 46
68 Disabling transitions by inserting control-arcs Disabling transitions by inserting control-arcs To resolve a WPC of (y, r t ) σ and (y, r t ) σ by disabling t at y, we insert a read-arc (p, t) with weight w(p, t) > y p for some p with y p > y p or an inhibitor-arc (p, t) with weight w(p, t) < y p for some p with y p < y p Example: To resolve the WPC between σ(x, d ) and σ(x, ), we note that x, x differ in P FR, P R and disable d at x by one of the following control-arcs: P F R P R R d 4 r F R r r F R r d 4 R P R P F R d Spo d Spo read-arc (P R, d ) by x P R > x P R inhibitor-arc (P FR, d ) by x P FR < x P FR A. Wagler June 4, 4 37 / 46
69 Which sets of control-arcs are appropriate? For each yet constructed standard network P S, we shall find control-arcs that resolve all involved WPCs: Let CA(σ, σ ) be the set of all possible control-arcs that can resolve WPC(σ, σ ) and A S be the union of all these control-arcs for WPCs in P S. To resolve the WPCs in P S, we have to find subsets A of A S hitting each CA(σ, σ ). Such hitting sets A exist if and only if none of the sets CA(σ, σ ) is empty. Non-minimal hitting sets yield extended Peri nets with unnecessary control-arcs and, thus, being not minimal. Theorem (Favre, W. 3) All minimal conformal extended Petri nets based on P S can be obtained by computing all minimal hitting sets in A S. A. Wagler June 4, 4 38 / 46
70 Which sets of control-arcs are appropriate? For each yet constructed standard network P S, we shall find control-arcs that resolve all involved WPCs: Let CA(σ, σ ) be the set of all possible control-arcs that can resolve WPC(σ, σ ) and A S be the union of all these control-arcs for WPCs in P S. To resolve the WPCs in P S, we have to find subsets A of A S hitting each CA(σ, σ ). Such hitting sets A exist if and only if none of the sets CA(σ, σ ) is empty. Non-minimal hitting sets yield extended Peri nets with unnecessary control-arcs and, thus, being not minimal. Theorem (Favre, W. 3) All minimal conformal extended Petri nets based on P S can be obtained by computing all minimal hitting sets in A S. A. Wagler June 4, 4 38 / 46
71 Determining priority relations Determining priority relations Deduce priority relations among so-obtained transitions for all selected sequences σ S by setting t > t for (y, r t ) σ and all other t enabled at y. Example: P R P F R r F R r d 4 R R d 4 r F R r P F R P R d Spo O S,P = {(r > r )} O S,P = {(r > r )} d Spo Theorem (Favre, W. 3) The so-obtained priority relations are conflict-free and reproduce the experiments. A. Wagler June 4, 4 39 / 46
72 Determining priority relations Determining priority relations Deduce priority relations among so-obtained transitions for all selected sequences σ S by setting t > t for (y, r t ) σ and all other t enabled at y. Example: P R P F R r F R r d 4 R R d 4 r F R r P F R P R d Spo O S,P = {(r > r )} O S,P = {(r > r )} d Spo Theorem (Favre, W. 3) The so-obtained priority relations are conflict-free and reproduce the experiments. A. Wagler June 4, 4 39 / 46
73 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 4 / 46
74 Solution set Theorem (Favre, W. 3) Applying this procedure to all feasible sets S V term yields the complete list of all extended Petri nets with priorities being conformal with X. Solution set: Running example PR PF R F R d d 4 R R d 4 d F R PF R PR S d Spo O : d Spo O : PR PF R r F R r d 4 R R d 4 r F R r PF R PR S d Spo O : r > r d Spo O : r > r A. Wagler June 4, 4 4 / 46
75 Solution set: Running example PR PF R F R d r 4 r 4 d F R PF R PR S 3 r 3 R R r 3 Spo Spo d d O S3,P = {(r4 > r 3 )} O S3,P = {(r4 > r 3 )} PR PF R F R d r 4 R r 3 r 3 R r 4 d F R PF R PR d Spo d Spo O S3,P = {(r4 > r 3 )} O S3,P = {(r4 > r 3 )} A. Wagler June 4, 4 4 / 46
76 Solution set: Running example PR PF R r F R r r 4 r 4 r F R r PF R PR S 4 r 3 R R r 3 Spo Spo d d O S4,P = {(r > r ), (r 4 > r 3 )} O S4,P = {(r > r ), (r 4 > r 3 )} PR PF R r F R r r 4 R r 3 r 3 R r 4 r F R r PF R PR d Spo d Spo O S4,P = {(r > r ), (r 4 > r 3 )} O S4,P = {(r > r ), (r 4 > r 3 )} A. Wagler June 4, 4 43 / 46
77 Outline Petri Nets and Extensions Network Reconstruction Problem 3 Reconstruction Approach Input Representation of observed responses Sequences and their conflicts Composition of standard networks Deducing control-arcs and priorities Output 4 Concluding Remarks and Perspectives A. Wagler June 4, 4 44 / 46
78 Concluding remarks and perspectives Achieved goals We proposed an integrative reconstruction method to generate all extended Petri nets with priorities being concormal with experimental time-series data by representing the observed difference vectors as in the case of extended networks (Durzinsky, Marwan, W. and 3), distinguishing weak and strong priority conflicts in the construction of the priority conflict graph (in contrast to Marwan, W., Weismantel 8), resolving weak priority conflicts by inserting control-arcs and determining priorities on the so-obtained transitions. Perspectives Integrate (further) biological pre-knowledge in the reconstruction process. Make the new approach accessible by a suitable implementation (ASP). Apply the approach to new biological experimental data. A. Wagler June 4, 4 45 / 46
79 Concluding remarks and perspectives Achieved goals We proposed an integrative reconstruction method to generate all extended Petri nets with priorities being concormal with experimental time-series data by representing the observed difference vectors as in the case of extended networks (Durzinsky, Marwan, W. and 3), distinguishing weak and strong priority conflicts in the construction of the priority conflict graph (in contrast to Marwan, W., Weismantel 8), resolving weak priority conflicts by inserting control-arcs and determining priorities on the so-obtained transitions. Perspectives Integrate (further) biological pre-knowledge in the reconstruction process. Make the new approach accessible by a suitable implementation (ASP). Apply the approach to new biological experimental data. A. Wagler June 4, 4 45 / 46
80 THANK YOU This work was partly founded by the French National Research Agency, the European Commission (Feder funds), the Région Auvergne within LabEx IMobS 3. A. Wagler June 4, 4 46 / 46
Integrating prior knowledge in Automatic Network Reconstruction
Integrating prior knowledge in Automatic Network Reconstruction M. Favre W. Marwan A. Wagler Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS) UMR CNRS 658 Université Blaise
More informationReconstructing X -deterministic extended Petri nets from experimental time-series data X
econstructing X -deterministic extended Petri nets from experimental time-series data X Marie C.F. Favre, Annegret K. Wagler Laboratoire d Informatique, de Modélisation et d Optimisation des Systèmes (LIMOS,
More informationA compact modeling approach for deterministic biological systems
A compact modeling approach for deterministic biological systems Luis M. Torres 1 Annegret K. Wagler 2 1 Ecuadorian Research Center on Mathematical Modeling ModeMat Escuela Politécnica Nacional, Quito
More informationThe dynamics of deterministic systems A survey
The dynamics of deterministic systems A survey Luis M. Torres 1, Annegret K. Wagler 2 luis.torres@epn.edu.ec, wagler@isima.fr 1 Centro de Modelizatión Matemática (ModeMat) Escuela Politécnica Nacional,
More informationEncoding the dynamics of deterministic systems
Math Meth Oper Res (2011) 73:281 300 DOI 10.1007/s00186-011-0353-6 ORIGINAL ARTICLE Encoding the dynamics of deterministic systems Luis M. Torres Annegret K. Wagler Received: 4 November 2009 / Accepted:
More informationPetri net models. tokens placed on places define the state of the Petri net
Petri nets Petri net models Named after Carl Adam Petri who, in the early sixties, proposed a graphical and mathematical formalism suitable for the modeling and analysis of concurrent, asynchronous distributed
More informationComplete Process Semantics for Inhibitor Nets Technical Report
Complete Process Semantics for Inhibitor Nets Technical Report Gabriel Juhás 2, Robert Lorenz 1, and Sebastian Mauser 1 1 Department of Applied Computer Science, Catholic University of Eichstätt-Ingolstadt,
More informationCOM S 330 Homework 08 Solutions. Type your answers to the following questions and submit a PDF file to Blackboard. One page per problem.
COM S 0 Homework 08 Solutions Type your answers to the following questions and submit a PDF file to Blackboard. One page per problem. Problem 1. [10pts] Let M = (S, T, s 0 ) be the state machine where
More informationDES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models
4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe
More informationExistence and uniqueness of solutions for a continuous-time opinion dynamics model with state-dependent connectivity
Existence and uniqueness of solutions for a continuous-time opinion dynamics model with state-dependent connectivity Vincent D. Blondel, Julien M. Hendricx and John N. Tsitsilis July 24, 2009 Abstract
More informationReachability in Petri nets with Inhibitor arcs
Reachability in Petri nets with Inhibitor arcs Klaus Reinhardt Universität Tübingen reinhard@informatik.uni-tuebingen.de Overview Multisets, New operators Q and Q on multisets, Semilinearity Petri nets,
More informationApplications of Petri Nets
Applications of Petri Nets Presenter: Chung-Wei Lin 2010.10.28 Outline Revisiting Petri Nets Application 1: Software Syntheses Theory and Algorithm Application 2: Biological Networks Comprehensive Introduction
More informationStructure-Based Comparison of Biomolecules
Structure-Based Comparison of Biomolecules Benedikt Christoph Wolters Seminar Bioinformatics Algorithms RWTH AACHEN 07/17/2015 Outline 1 Introduction and Motivation Protein Structure Hierarchy Protein
More informationStochastic Petri Nets. Jonatan Lindén. Modelling SPN GSPN. Performance measures. Almost none of the theory. December 8, 2010
Stochastic Almost none of the theory December 8, 2010 Outline 1 2 Introduction A Petri net (PN) is something like a generalized automata. A Stochastic Petri Net () a stochastic extension to Petri nets,
More informationRECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION
RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION MAGNUS BORDEWICH, KATHARINA T. HUBER, VINCENT MOULTON, AND CHARLES SEMPLE Abstract. Phylogenetic networks are a type of leaf-labelled,
More informationEmbedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1
Embedded Systems 6-1 - Place/transition nets REVIEW Def.: (P, T, F, K, W, M 0 ) is called a place/transition net (P/T net) iff 1. N=(P,T,F) is a net with places p P and transitions t T 2. K: P (N 0 {ω})
More informationRepresentations of All Solutions of Boolean Programming Problems
Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland
More informationTime(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA
Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic
More informationAxiomatic Semantics. Lecture 9 CS 565 2/12/08
Axiomatic Semantics Lecture 9 CS 565 2/12/08 Axiomatic Semantics Operational semantics describes the meaning of programs in terms of the execution steps taken by an abstract machine Denotational semantics
More informationGeorg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS
Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,
More informationSpecification models and their analysis Petri Nets
Specification models and their analysis Petri Nets Kai Lampka December 10, 2010 1 30 Part I Petri Nets Basics Petri Nets Introduction A Petri Net (PN) is a weighted(?), bipartite(?) digraph(?) invented
More informationNONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie
NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING Alessandro Giua Xiaolan Xie Dip. Ing. Elettrica ed Elettronica, U. di Cagliari, Italy. Email: giua@diee.unica.it INRIA/MACSI Team, ISGMP, U. de Metz, France.
More informationDecompositions of graphs into cycles with chords
Decompositions of graphs into cycles with chords Paul Balister Hao Li Richard Schelp May 22, 2017 In memory of Dick Schelp, who passed away shortly after the submission of this paper Abstract We show that
More informationOn the possible quantities of Fibonacci numbers that occur in some type of intervals
On the possible quantities of Fibonacci numbers that occur in some type of intervals arxiv:1508.02625v1 [math.nt] 11 Aug 2015 Bakir FARHI Laboratoire de Mathématiques appliquées Faculté des Sciences Exactes
More informationarxiv: v2 [cs.dm] 29 Mar 2013
arxiv:1302.6346v2 [cs.dm] 29 Mar 2013 Fixed point theorems for Boolean networks expressed in terms of forbidden subnetworks Adrien Richard Laboratoire I3S, CNRS & Université de Nice-Sophia Antipolis, France.
More informationMarkings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions
Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de
More informationA Structure Causality Relation for Liveness Characterisation in Petri Nets
Journal of Universal Computer Science, vol. 12, no. 2 (2006), 214-232 submitted: 4/10/04, accepted: 9/5/05, appeared: 28/2/06 J.UCS A Structure Causality Relation for Liveness Characterisation in Petri
More informationPetri nets. s 1 s 2. s 3 s 4. directed arcs.
Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1
More informationThe Strong Largeur d Arborescence
The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics
More informationLinear Time Analysis of Properties of Conflict-Free and General Petri nets
Linear Time Analysis of Properties of Conflict-Free and General Petri nets Paola Alimonti Esteban Feuerstein Luigi Laura Umberto Nanni Technical Report n. 9, 2010 Linear Time Analysis of Properties of
More informationTime and Timed Petri Nets
Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time
More informationOn the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms
On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms Anne Benoit, Fanny Dufossé and Yves Robert LIP, École Normale Supérieure de Lyon, France {Anne.Benoit Fanny.Dufosse
More informationMath Models of OR: Some Definitions
Math Models of OR: Some Definitions John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA September 2018 Mitchell Some Definitions 1 / 20 Active constraints Outline 1 Active constraints
More informationJoin Ordering. Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H :
IKKBZ First Lemma Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : and, hence, C H (AUVB) = C H (A) +T (A)C H (U) +T (A)T (U)C H (V ) +T (A)T
More informationarxiv: v1 [cs.ds] 20 Feb 2017
AN OPTIMAL XP ALGORITHM FOR HAMILTONIAN CYCLE ON GRAPHS OF BOUNDED CLIQUE-WIDTH BENJAMIN BERGOUGNOUX, MAMADOU MOUSTAPHA KANTÉ, AND O-JOUNG KWON arxiv:1702.06095v1 [cs.ds] 20 Feb 2017 Abstract. For MSO
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2017
Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2017 Lecture 4 Ana Bove March 24th 2017 Structural induction; Concepts of automata theory. Overview of today s lecture: Recap: Formal Proofs
More informationOn Moving Objects in Dynamic Domains
On Moving Objects in Dynamic Domains Fangzhen Lin Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Abstract In the physical world, an object
More informationExtensions to the CEGAR Approach on Petri Nets
Acta Cybernetica 21 (2014) 401 417. Extensions to the CEGAR Approach on Petri Nets Ákos Hajdu, András Vörös, Tamás Bartha, and Zoltán Mártonka Abstract Formal verification is becoming more prevalent and
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018
Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Lecture 4 Ana Bove March 23rd 2018 Recap: Formal Proofs How formal should a proof be? Depends on its purpose...... but should be convincing......
More informationPrice of Stability in Survivable Network Design
Noname manuscript No. (will be inserted by the editor) Price of Stability in Survivable Network Design Elliot Anshelevich Bugra Caskurlu Received: January 2010 / Accepted: Abstract We study the survivable
More informationON THE POSSIBLE QUANTITIES OF FIBONACCI NUMBERS THAT OCCUR IN SOME TYPES OF INTERVALS
Acta Math. Univ. Comenianae Vol. LXXXVII, 2 (2018), pp. 291 299 291 ON THE POSSIBLE QUANTITIES OF FIBONACCI NUMBERS THAT OCCUR IN SOME TYPES OF INTERVALS B. FARHI Abstract. In this paper, we show that
More informationFinite Universes. L is a fixed-length language if it has length n for some
Finite Universes Finite Universes When the universe is finite (e.g., the interval 0, 2 1 ), all objects can be encoded by words of the same length. A language L has length n 0 if L =, or every word of
More informationThe Pooling Problem - Applications, Complexity and Solution Methods
The Pooling Problem - Applications, Complexity and Solution Methods Dag Haugland Dept. of Informatics University of Bergen Norway EECS Seminar on Optimization and Computing NTNU, September 30, 2014 Outline
More informationDECOMPOSITION OF PETRI NETS
Cybernetics and Systems Analysis, Vol. 40, No. 5, 2004 DECOMPOSITION OF PETRI NETS D. A. Zaitsev UDC 519.74 The problem of splitting any given Petri net into functional subnets is considered. The properties
More informationLecture 2: Proof of Switching Lemma
Lecture 2: oof of Switching Lemma Yuan Li June 25, 2014 1 Decision Tree Instead of bounding the probability that f can be written as some s-dnf, we estimate the probability that f can be computed by a
More informationBiological Pathways Representation by Petri Nets and extension
Biological Pathways Representation by and extensions December 6, 2006 Biological Pathways Representation by and extension 1 The cell Pathways 2 Definitions 3 4 Biological Pathways Representation by and
More informationR(4,5) = 25. Stanis law P. Radziszowski JGT 19 (1995)
R(4,5) = 25 Brendan D. McKay + Department of Computer Science Australian National University GPO Box 4, ACT 2601, Australia bdm@cs.anu.edu.au Stanis law P. Radziszowski Department of Computer Science Rochester
More informationBinary Decision Diagrams
Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:
More informationExpand, Enlarge, and Check
Expand, Enlarge, and Check New algorithms for the coverability problem of WSTS G. Geeraerts 1, J.-F. Raskin 1, L. Van Begin 1,2 Département d Informatique, Université Libre de Bruxelles Boulevard du Triomphe,
More informationA Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs
Fundamenta Informaticae XX (2004) 1 23 1 IOS Press A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Javier Esparza Institute for Formal Methods in Computer Science
More informationFlat counter automata almost everywhere!
Flat counter automata almost everywhere! Jérôme Leroux and Grégoire Sutre Projet Vertecs, IRISA / INRIA Rennes, FRANCE Équipe MVTsi, CNRS / LABRI, FRANCE Counter-automata verification A simple counter-automata:
More informationTree sets. Reinhard Diestel
1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked
More informationIntuitionistic Fuzzy Estimation of the Ant Methodology
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 2 Sofia 2009 Intuitionistic Fuzzy Estimation of the Ant Methodology S Fidanova, P Marinov Institute of Parallel Processing,
More informationChapter 7. Inclusion-Exclusion a.k.a. The Sieve Formula
Chapter 7. Inclusion-Exclusion a.k.a. The Sieve Formula Prof. Tesler Math 184A Fall 2019 Prof. Tesler Ch. 7. Inclusion-Exclusion Math 184A / Fall 2019 1 / 25 Venn diagram and set sizes A = {1, 2, 3, 4,
More informationThe Downward-Closure of Petri Net Languages
The Downward-Closure of Petri Net Languages Peter Habermehl 1, Roland Meyer 1, and Harro Wimmel 2 1 LIAFA, Paris Diderot University & CNRS e-mail: {peter.habermehl,roland.meyer}@liafa.jussieu.fr 2 Department
More informationCSE 20 DISCRETE MATH SPRING
CSE 20 DISCRETE MATH SPRING 2016 http://cseweb.ucsd.edu/classes/sp16/cse20-ac/ Today's learning goals Describe computer representation of sets with bitstrings Define and compute the cardinality of finite
More informationWeek 4-5: Generating Permutations and Combinations
Week 4-5: Generating Permutations and Combinations February 27, 2017 1 Generating Permutations We have learned that there are n! permutations of {1, 2,...,n}. It is important in many instances to generate
More informationAn Equivalence result in School Choice
An Equivalence result in School Choice Jay Sethuraman May 2009 Abstract The main result of the paper is a proof of the equivalence of single and multiple lottery mechanisms for the problem of allocating
More informationChapter 3 Deterministic planning
Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions
More informationahmaxsat: Description and Evaluation of a Branch and Bound Max-SAT Solver
Journal on Satisfiability, Boolean Modeling and Computation 9 (2015) 89-128 ahmaxsat: Description and Evaluation of a Branch and Bound Max-SAT Solver André Abramé Djamal Habet Aix Marseille Université,
More informationDeterministic Decentralized Search in Random Graphs
Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.
More informationIowa State University. Instructor: Alex Roitershtein Summer Homework #5. Solutions
Math 50 Iowa State University Introduction to Real Analysis Department of Mathematics Instructor: Alex Roitershtein Summer 205 Homework #5 Solutions. Let α and c be real numbers, c > 0, and f is defined
More information7. Queueing Systems. 8. Petri nets vs. State Automata
Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models
More informationMarkov Decision Processes
Markov Decision Processes Lecture notes for the course Games on Graphs B. Srivathsan Chennai Mathematical Institute, India 1 Markov Chains We will define Markov chains in a manner that will be useful to
More informationPetri Nets (for Planners)
Petri (for Planners) B. Bonet, P. Haslum... from various places... ICAPS 2011 & Motivation Petri (PNs) is formalism for modelling discrete event systems Developed by (and named after) C.A. Petri in 1960s
More informationGraphs and Network Flows IE411. Lecture 15. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 15 Dr. Ted Ralphs IE411 Lecture 15 1 Preflow-Push Algorithms First developed by A. V. Goldberg in 1985. Best preflow-push algorithms outperform best augmenting path
More informationSearching in non-deterministic, partially observable and unknown environments
Searching in non-deterministic, partially observable and unknown environments CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2014 Soleymani Artificial Intelligence:
More informationA CHARACTERIZATION OF LOCALLY FINITE VARIETIES THAT SATISFY A NONTRIVIAL CONGRUENCE IDENTITY
A CHARACTERIZATION OF LOCALLY FINITE VARIETIES THAT SATISFY A NONTRIVIAL CONGRUENCE IDENTITY KEITH A. KEARNES Abstract. We show that a locally finite variety satisfies a nontrivial congruence identity
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationSkylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland
Yufei Tao ITEE University of Queensland Today we will discuss problems closely related to the topic of multi-criteria optimization, where one aims to identify objects that strike a good balance often optimal
More informationHeuristics for Efficient SAT Solving. As implemented in GRASP, Chaff and GSAT.
Heuristics for Efficient SAT Solving As implemented in GRASP, Chaff and GSAT. Formulation of famous problems as SAT: k-coloring (1/2) The K-Coloring problem: Given an undirected graph G(V,E) and a natural
More informationCTL satisfability via tableau A C++ implementation
CTL satisfability via tableau A C++ implementation Nicola Prezza April 30, 2015 Outline 1 Introduction 2 Parsing 3 Data structures 4 Initial sets of labels and edges 5 Cull 6 Examples and benchmarks The
More informationPetri Nets and Model Checking. Natasa Gkolfi. University of Oslo. March 31, 2017
University of Oslo March 31, 2017 Petri Nets Petri Nets : mathematically founded formalism concurrency synchronization modeling distributed systems Petri Nets Petri Nets : mathematically founded formalism
More informationIntroduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either
Introduction to Temporal Logic The purpose of temporal logics is to specify properties of dynamic systems. These can be either Desired properites. Often liveness properties like In every infinite run action
More informationRunning Time. Assumption. All capacities are integers between 1 and C.
Running Time Assumption. All capacities are integers between and. Invariant. Every flow value f(e) and every residual capacities c f (e) remains an integer throughout the algorithm. Theorem. The algorithm
More informationModeling Synchronous Systems in BIP
Unité Mixte de Recherche 5104 CNRS - INPG - UJF Centre Equation 2, avenue de VIGNATE F-38610 GIERES tel : +33 456 52 03 40 fax : +33 456 52 03 50 http://www-verimag.imag.fr Modeling Synchronous Systems
More informationOn Qualitative Analysis of Fault Trees Using Structurally Persistent Nets
On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets Ricardo J. Rodríguez rj.rodriguez@unileon.es Research Institute of Applied Sciences in Cybersecurity University of León, Spain
More informationCombinatorial optimization problems
Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:
More informationEmbedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i
Embedded Systems 15-1 - REVIEW: Aperiodic scheduling C i J i 0 a i s i f i d i Given: A set of non-periodic tasks {J 1,, J n } with arrival times a i, deadlines d i, computation times C i precedence constraints
More informationAutomatic Generation of Polynomial Invariants for System Verification
Automatic Generation of Polynomial Invariants for System Verification Enric Rodríguez-Carbonell Technical University of Catalonia Talk at EPFL Nov. 2006 p.1/60 Plan of the Talk Introduction Need for program
More informationEquivalent Forms of the Axiom of Infinity
Equivalent Forms of the Axiom of Infinity Axiom of Infinity 1. There is a set that contains each finite ordinal as an element. The Axiom of Infinity is the axiom of Set Theory that explicitly asserts that
More informationc 2011 Nisha Somnath
c 2011 Nisha Somnath HIERARCHICAL SUPERVISORY CONTROL OF COMPLEX PETRI NETS BY NISHA SOMNATH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Aerospace
More informationMath Models of OR: Branch-and-Bound
Math Models of OR: Branch-and-Bound John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA November 2018 Mitchell Branch-and-Bound 1 / 15 Branch-and-Bound Outline 1 Branch-and-Bound
More informationHierarchy among Automata on Linear Orderings
Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationAnalysis of Algorithms. Outline 1 Introduction Basic Definitions Ordered Trees. Fibonacci Heaps. Andres Mendez-Vazquez. October 29, Notes.
Analysis of Algorithms Fibonacci Heaps Andres Mendez-Vazquez October 29, 2015 1 / 119 Outline 1 Introduction Basic Definitions Ordered Trees 2 Binomial Trees Example 3 Fibonacci Heap Operations Fibonacci
More informationReachability of recurrent positions in the chip-firing game
Egerváry Research Group on Combinatorial Optimization Technical reports TR-2015-10. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.
More information1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...),
7. High Level Petri-Nets Definition 7.1 A Net Type is determined if the following specification is given: 1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...), 2. sort of labeling
More informationSimulation of Spiking Neural P Systems using Pnet Lab
Simulation of Spiking Neural P Systems using Pnet Lab Venkata Padmavati Metta Bhilai Institute of Technology, Durg vmetta@gmail.com Kamala Krithivasan Indian Institute of Technology, Madras kamala@iitm.ac.in
More informationControl of Sampled Switched Systems using Invariance Analysis
1st French Singaporean Workshop on Formal Methods and Applications Control of Sampled Switched Systems using Invariance Analysis Laurent Fribourg LSV - ENS Cachan & CNRS Laurent Fribourg Lsv - ENS Cachan
More informationChapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 4 Greedy Algorithms Slides by Kevin Wayne. Copyright Pearson-Addison Wesley. All rights reserved. 4 4.1 Interval Scheduling Interval Scheduling Interval scheduling. Job j starts at s j and finishes
More informationPain Signaling - A Case Study of the Modular Petri Net Modeling Concept with Prospect to a Protein-Oriented Modeling Platform
1 BioPPN Workshop, 20 June 2011 Pain Signaling - A Case Study of the Modular Petri Net Modeling Concept with Prospect to a Protein-Oriented Modeling Platform Mary Ann Blätke, Sonja Meyer, Wolfgang Marwan
More informationOverview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?
Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits
More informationFirst Lemma. Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : C H (AUVB) = C H (A)
IKKBZ First Lemma Lemma: The cost function C h has the ASI-Property. Proof: The proof can be derived from the definition of C H : and, hence, C H (AUVB) = C H (A) +T(A)C H (U) +T(A)T(U)C H (V) +T(A)T(U)T(V)C
More informationTime Petri Nets. Miriam Zia School of Computer Science McGill University
Time Petri Nets Miriam Zia School of Computer Science McGill University Timing Specifications Why is time introduced in Petri nets? To model interaction between activities taking into account their start
More informationDirect mapping of low-latency asynchronous
School of Electrical, Electronic & Computer Engineering Direct mapping of low-latency asynchronous controllers from STGs D.Sokolov, A.Bystrov, A.Yakovlev Technical Report Series NCL-EECE-MSD-TR-2006-110
More informationCS 4407 Algorithms Lecture: Shortest Path Algorithms
CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford
More informationRinging the Changes II
Ringing the Changes II Cayley Color Graphs Let G be a group and H a subset of G. We define a Cayley digraph (directed graph) by: Each element of G is a vertex of the digraph Γ and an arc is drawn from
More informationCrash course Verification of Finite Automata CTL model-checking
Crash course Verification of Finite Automata CTL model-checking Exercise session - 07.12.2016 Xiaoxi He 1 Reminders Big picture Objective Verify properties over DES models Formal method Absolute guarantee!
More informationFROM COHERENT TO FINITENESS SPACES
FROM COHERENT TO FINITENESS SPACES PIERRE HYVERNAT Laboratoire de Mathématiques, Université de Savoie, 73376 Le Bourget-du-Lac Cedex, France. e-mail address: Pierre.Hyvernat@univ-savoie.fr Abstract. This
More information