SlideShare a Scribd company logo
1 of 38
Partner Generation for Petri Net Based Service Models Karsten Wolf (= Karsten Schmidt) Universität Rostock Open Workflow Nets
Wellformedness Workflow nets:  Soundness - always possible to reach end state - every transition reachable open Workflow nets:  There exist partner(s) such that - always possible to reach end state  (Controllability) - every transition reachable (Transition covering)
Several variations of problem ,[object Object],[object Object],[object Object],[object Object],[object Object]
Deciding centralized  controllability Step 1: upper approximation of  partner behaviour (  ,-) € C T B      oWFN can move partner can move both can move end state deadlock !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) !T !€ (  ,CT) (  ,C€),(  ,C),(  ,-) , (  ,B) !€ ?B !T !C !T !C !€ ?B !C (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) (  ,C€T),(  ,CT),(  ,T),(  ,C), (  ,T) (  ,C)
Deciding centralized  controllability Step 2: remove bad states (  ,-) !T !€ (  ,CT) (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !C !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      oWFN can move partner can move both can move end state deadlock !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) !€ !T !C (  ,C€T),(  ,CT),(  ,T),(  ,C), (  ,T) (  ,C)
Deciding centralized  controllability Step 3: iterate (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      oWFN can move partner can move both can move end state deadlock !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) !T (  ,CT) !C
Deciding centralized  controllability Step 4: (optional): construct oWFN (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) € C T B
Centralized partner generation: results ,[object Object],[object Object],[object Object],[object Object],[object Object]
An example, without reduction ,[object Object],[object Object]
Same example (with reduction) ,[object Object],[object Object]
Example for a reduction rule I  Do not send messages that cannot be consumed in the future of at least one state Preserves most permissive partner
Example for a reduction rule II Do not send anything as long as you can receive something Does not preserve  most permissive partner !b
Decentralized partner generation traced back to centralized case:  C 1  ... C n      C 1  || ... || C n   Approach:  as central case, but remove - bad states - states where actions belonging to different parties are not commutative Algorithm is nondeterministic
Example a b   !b !a !a 1. !b 2.
Decentralized partner generation: results ,[object Object],[object Object]
Autonomous partner generation a b  ? not possible in this example
Cooperative partners ,[object Object],[object Object],[object Object],[object Object]
Rules for cooperation ,[object Object],a   2. If only receive transitions are activated in inner oWFN,  including one for  your  port, provide an action (impossible in this example) a b   a b  
Results: cooperative partner generation ,[object Object],[object Object],[object Object]
Relations between settings ,[object Object],[object Object],[object Object]
Partner generation w.r.t. specification ,[object Object],[object Object]
Excluding „ I do not  want tea!“ Remove nodes containing T (  ,-) !€ !C (  ,C) (  ,€) , (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C (  ,-) € C T B      !T (  ,T) !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B)
Enforcing ,[object Object],[object Object],[object Object],[object Object],[object Object],(  ,-) (  ,C) (  ,€) , (  ,-) (  ,T) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T
Enforcing „ I want coffee!“ Step 2: split Undecided states (  ,-) (  ,C) (  ,€) , (  ,-) (  ,T) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T
Enforcing „ I want coffee!“ Step 3: Remove  unsuccessful end states (  ,-) (  ,C) (  ,€) , (  ,-) (  ,T) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T ?B (  ,-)
Enforcing „ I want coffee!“ Step 4: Generate partner (  ,-) !€ !C (  ,C) (  ,€) , (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C (  ,-) € C T B      !T (  ,T) !T !€ (  ,T€),(  ,T),(  ,-) , (  ,B)
Synchronous interaction  Simultaneous occurrence relevant (irrelevant in  asynchronous case) Otherwise, same algorithms applicable
Further variations ,[object Object],[object Object]
Justification of construction (centralized partner)   K(q) = { m | [m,q] reachable in composed system} …  remember construction …
Solution ,[object Object],[object Object],[object Object]
Properties of partners I ,[object Object],[object Object],a b c     ,  a   b,  ,  a   c,   ,  a   b,  ,  a  c,  a b a c c a b a Not knowledge driven Knowledge-driven
Properties of partners II a b c      a  b   ac   bc   c   a b c   b   bc   c   a b c  a  c not knowledge-aware knowledge-aware P w.r.t. N  knowlegde-aware  iff removing all but one incoming edges does not change K(q)
Claims ,[object Object],[object Object],[object Object],[object Object]
Ad 1. mb    mb ka ,[object Object],a b c     a  b   ac   bc   c   a b c   b   bc   c   a b c  a  c not knowledge-aware knowledge-aware
Ad 2. mb ka    mb ka kd Idea: merge states q, q‘ with K(q) = K(q‘) a b c     ,  a   b,  ,  a   c,   ,  a   b,  ,  a  c,  a b a c c a b a Not knowledge driven Knowledge-driven
Ad 3. Construction of most permissive mb ka kd partner ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proof of properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example ! ? ? !  

More Related Content

Viewers also liked

Omg bpmn tutorial
Omg bpmn tutorialOmg bpmn tutorial
Omg bpmn tutorial
uhuru1973
 

Viewers also liked (7)

Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
 
Process architecture - Part II
Process architecture - Part IIProcess architecture - Part II
Process architecture - Part II
 
How to use BPMN* for modelling business processes
How to use BPMN* for modelling business processesHow to use BPMN* for modelling business processes
How to use BPMN* for modelling business processes
 
Process architecture - Part I
Process architecture - Part IProcess architecture - Part I
Process architecture - Part I
 
Omg bpmn tutorial
Omg bpmn tutorialOmg bpmn tutorial
Omg bpmn tutorial
 
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
From Conceptual to Executable BPMN Process Models A Step-by-Step MethodFrom Conceptual to Executable BPMN Process Models A Step-by-Step Method
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft Visio
 

Similar to Partner Generation for Petri Net Based Service Models

2011 Db Distributed
2011 Db Distributed2011 Db Distributed
2011 Db Distributed
atali
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured prediction
zukun
 
Using Petri Net Invariants in State Space Construction
Using Petri Net Invariants in State Space ConstructionUsing Petri Net Invariants in State Space Construction
Using Petri Net Invariants in State Space Construction
Universität Rostock
 

Similar to Partner Generation for Petri Net Based Service Models (20)

Set Algebra for Service Behavior
Set Algebra for Service BehaviorSet Algebra for Service Behavior
Set Algebra for Service Behavior
 
Operating Guidelines for Petri Net Based Services Models
Operating Guidelines for Petri Net Based Services ModelsOperating Guidelines for Petri Net Based Services Models
Operating Guidelines for Petri Net Based Services Models
 
differential equations Boyce & Diprima Solution manual
differential equations Boyce & Diprima Solution manualdifferential equations Boyce & Diprima Solution manual
differential equations Boyce & Diprima Solution manual
 
Cav03tut
Cav03tutCav03tut
Cav03tut
 
Elementary Differential Equations and Boundary Value Problems
Elementary Differential Equations and Boundary Value ProblemsElementary Differential Equations and Boundary Value Problems
Elementary Differential Equations and Boundary Value Problems
 
2011 Db Distributed
2011 Db Distributed2011 Db Distributed
2011 Db Distributed
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured prediction
 
Adauctions
AdauctionsAdauctions
Adauctions
 
COCOA: Communication-Efficient Coordinate Ascent
COCOA: Communication-Efficient Coordinate AscentCOCOA: Communication-Efficient Coordinate Ascent
COCOA: Communication-Efficient Coordinate Ascent
 
sysprog2 Part1
sysprog2 Part1sysprog2 Part1
sysprog2 Part1
 
Realizability Analysis for Message-based Interactions Using Shared-State Proj...
Realizability Analysis for Message-based Interactions Using Shared-State Proj...Realizability Analysis for Message-based Interactions Using Shared-State Proj...
Realizability Analysis for Message-based Interactions Using Shared-State Proj...
 
Concurrency in Distributed Systems : Leslie Lamport papers
Concurrency in Distributed Systems : Leslie Lamport papersConcurrency in Distributed Systems : Leslie Lamport papers
Concurrency in Distributed Systems : Leslie Lamport papers
 
Verifying Deadlock and Livelock Freedom in an SOA Scenario
Verifying Deadlock and Livelock Freedom in an SOA ScenarioVerifying Deadlock and Livelock Freedom in an SOA Scenario
Verifying Deadlock and Livelock Freedom in an SOA Scenario
 
C Programming Interview Questions
C Programming Interview QuestionsC Programming Interview Questions
C Programming Interview Questions
 
Using Petri Net Invariants in State Space Construction
Using Petri Net Invariants in State Space ConstructionUsing Petri Net Invariants in State Space Construction
Using Petri Net Invariants in State Space Construction
 
froglogic Coco Code Coverage Presentation
froglogic Coco Code Coverage Presentationfroglogic Coco Code Coverage Presentation
froglogic Coco Code Coverage Presentation
 
Word2vec and Friends
Word2vec and FriendsWord2vec and Friends
Word2vec and Friends
 
Attention is All You Need (Transformer)
Attention is All You Need (Transformer)Attention is All You Need (Transformer)
Attention is All You Need (Transformer)
 
mmds
mmdsmmds
mmds
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 

More from Universität Rostock

Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
Universität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
Universität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
Universität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
Universität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
Universität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
Universität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Universität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Partner Generation for Petri Net Based Service Models

  • 1. Partner Generation for Petri Net Based Service Models Karsten Wolf (= Karsten Schmidt) Universität Rostock Open Workflow Nets
  • 2. Wellformedness Workflow nets: Soundness - always possible to reach end state - every transition reachable open Workflow nets: There exist partner(s) such that - always possible to reach end state (Controllability) - every transition reachable (Transition covering)
  • 3.
  • 4. Deciding centralized controllability Step 1: upper approximation of partner behaviour (  ,-) € C T B      oWFN can move partner can move both can move end state deadlock !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) !T !€ (  ,CT) (  ,C€),(  ,C),(  ,-) , (  ,B) !€ ?B !T !C !T !C !€ ?B !C (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) (  ,C€T),(  ,CT),(  ,T),(  ,C), (  ,T) (  ,C)
  • 5. Deciding centralized controllability Step 2: remove bad states (  ,-) !T !€ (  ,CT) (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !C !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      oWFN can move partner can move both can move end state deadlock !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) !€ !T !C (  ,C€T),(  ,CT),(  ,T),(  ,C), (  ,T) (  ,C)
  • 6. Deciding centralized controllability Step 3: iterate (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      oWFN can move partner can move both can move end state deadlock !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) !T (  ,CT) !C
  • 7. Deciding centralized controllability Step 4: (optional): construct oWFN (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T (  ,C) (  ,€) , (  ,-) (  ,T) € C T B
  • 8.
  • 9.
  • 10.
  • 11. Example for a reduction rule I  Do not send messages that cannot be consumed in the future of at least one state Preserves most permissive partner
  • 12. Example for a reduction rule II Do not send anything as long as you can receive something Does not preserve most permissive partner !b
  • 13. Decentralized partner generation traced back to centralized case: C 1 ... C n  C 1 || ... || C n Approach: as central case, but remove - bad states - states where actions belonging to different parties are not commutative Algorithm is nondeterministic
  • 14. Example a b   !b !a !a 1. !b 2.
  • 15.
  • 16. Autonomous partner generation a b  ? not possible in this example
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Excluding „ I do not want tea!“ Remove nodes containing T (  ,-) !€ !C (  ,C) (  ,€) , (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C (  ,-) € C T B      !T (  ,T) !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B)
  • 23.
  • 24. Enforcing „ I want coffee!“ Step 2: split Undecided states (  ,-) (  ,C) (  ,€) , (  ,-) (  ,T) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ ?B (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T
  • 25. Enforcing „ I want coffee!“ Step 3: Remove unsuccessful end states (  ,-) (  ,C) (  ,€) , (  ,-) (  ,T) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C !T !€ (  ,T€),(  ,T),(  ,-) , (  ,B) (  ,-) € C T B      !€ !C !T ?B (  ,-)
  • 26. Enforcing „ I want coffee!“ Step 4: Generate partner (  ,-) !€ !C (  ,C) (  ,€) , (  ,-) !€ (  ,C€),(  ,C),(  ,-) , (  ,B) ?B !C (  ,-) € C T B      !T (  ,T) !T !€ (  ,T€),(  ,T),(  ,-) , (  ,B)
  • 27. Synchronous interaction  Simultaneous occurrence relevant (irrelevant in asynchronous case) Otherwise, same algorithms applicable
  • 28.
  • 29. Justification of construction (centralized partner)   K(q) = { m | [m,q] reachable in composed system} … remember construction …
  • 30.
  • 31.
  • 32. Properties of partners II a b c      a  b   ac  bc  c  a b c   b   bc  c  a b c  a  c not knowledge-aware knowledge-aware P w.r.t. N knowlegde-aware iff removing all but one incoming edges does not change K(q)
  • 33.
  • 34.
  • 35. Ad 2. mb ka  mb ka kd Idea: merge states q, q‘ with K(q) = K(q‘) a b c     ,  a   b,  ,  a   c,   ,  a   b,  ,  a  c,  a b a c c a b a Not knowledge driven Knowledge-driven
  • 36.
  • 37.
  • 38. Example ! ? ? !  

Editor's Notes

  1. Punkte + Sprechblase, animieren
  2. Punkte + Sprechblase, animieren
  3. Punkte + Sprechblase, animieren
  4. Punkte + Sprechblase, animieren
  5. Punkte + Sprechblase, animieren
  6. Punkte + Sprechblase, animieren
  7. Punkte + Sprechblase, animieren
  8. Punkte + Sprechblase, animieren
  9. Punkte + Sprechblase, animieren