This document compares Petri nets and state spaces for modeling and verification. It discusses that state spaces allow modeling global state changes over time, while Petri nets consider asynchronous components and causality of events. The document also describes techniques for efficient state space generation from Petri nets, such as checking enabled transitions with constant time, firing transitions with constant effort, backtracking transitions, and storing markings in a set. Reduction techniques like linear algebra, sweep-line methods, symmetries, and stubborn sets are also covered to reduce the state space.
Conference presentation given by Niels Lohmann on December 6, 2011 in Paphos, Cyprus at the Ninth International Conference on Service-Oriented Computing (ICSOC 2011).
Invited presentation given by Niels Lohmann on December 3, 2013 in Potsdam, Germany as invited lecture at the Business Process Compliance course at the Hasso-Plattner-Institute.
Degrees of Freedom for Interference Networks with Instantaneous Relaysamin azari
The document discusses degrees of freedom (DoF) for interference networks with instantaneous relays. It motivates finding the maximum achievable DoF for such networks. It proposes an achievable scheme called aligned interference neutralization to find a lower bound on DoF and uses linear transceiver design and checking the properness of a polynomial system to find additional lower and upper bounds. Simulation results on the sum DoF for different network configurations are also presented, with future work mentioned on rate regions and generalized DoF.
This document discusses quantum photonics and its applications. It begins by outlining the importance of quantum photonics in fields like information processing, communication, measurement, and nanotechnology. It then provides an introduction to basic photonics concepts like photons, quantum states, and coherence. The document outlines several applications of quantum photonics in areas like quantum information processing, quantum metrology, quantum teleportation, and quantum cryptography. It also discusses advantages like secure communication and accurate measurements. Future challenges are identified as developing quantum computers, multi-particle teleportation, and a quantum internet. The document concludes by noting that quantum photonics will continue to play a central role in future technologies.
This document discusses quantum photonics and its applications. It begins by outlining the importance of quantum photonics in fields like information processing, communication, measurement, and nanotechnology. It then provides an introduction to basic photonics concepts like photons, quantum states, and coherence. The document outlines several applications of quantum photonics in areas like quantum information processing, quantum metrology, quantum teleportation, and quantum cryptography. It also discusses advantages like secure communication and accurate measurements. Future challenges are identified as developing quantum computers, multi-particle teleportation, and a quantum internet. The document concludes by noting that quantum photonics will continue to play a central role in future technologies.
A benchmark evaluation for incremental pattern matching in graph transformationIstvan Rath
This document summarizes a presentation given at the Budapest University of Technology and Economics about benchmarking incremental pattern matching in graph transformation. It describes two case studies used as benchmarks: model simulation using petri nets and object-relational mapping for synchronization. Performance results are presented showing that the Rete algorithm provides predictable linear scaling for incremental pattern matching in practical problems.
- Seminar, Dept. of Electrical and Computer Eng., University of California, Davis, CA, USA, May 14, 2004.
- Seminar, Dept. of Electrical and Systems Eng., Washington University in St. Louis, St. Louis, MO, USA, Dec. 3, 2004.
Tecnologia LoRa per sistemi IoT analisi ed implementazione su scheda STM32 Nu...S133931
This document discusses LoRa technology for IoT systems. It analyzes and implements LoRa on an STM32 Nucleo development board with an SX1272 LoRa chip. It evaluates the technology's long range capabilities, low power consumption, and suitability for IoT applications compared to other wireless options like cellular networks. Key aspects covered include LoRa's chirp spread spectrum modulation technique, PHY and MAC layers, transmission parameters, and use of the STM32 Nucleo pack with SX1272 expansion board for implementation and testing.
Conference presentation given by Niels Lohmann on December 6, 2011 in Paphos, Cyprus at the Ninth International Conference on Service-Oriented Computing (ICSOC 2011).
Invited presentation given by Niels Lohmann on December 3, 2013 in Potsdam, Germany as invited lecture at the Business Process Compliance course at the Hasso-Plattner-Institute.
Degrees of Freedom for Interference Networks with Instantaneous Relaysamin azari
The document discusses degrees of freedom (DoF) for interference networks with instantaneous relays. It motivates finding the maximum achievable DoF for such networks. It proposes an achievable scheme called aligned interference neutralization to find a lower bound on DoF and uses linear transceiver design and checking the properness of a polynomial system to find additional lower and upper bounds. Simulation results on the sum DoF for different network configurations are also presented, with future work mentioned on rate regions and generalized DoF.
This document discusses quantum photonics and its applications. It begins by outlining the importance of quantum photonics in fields like information processing, communication, measurement, and nanotechnology. It then provides an introduction to basic photonics concepts like photons, quantum states, and coherence. The document outlines several applications of quantum photonics in areas like quantum information processing, quantum metrology, quantum teleportation, and quantum cryptography. It also discusses advantages like secure communication and accurate measurements. Future challenges are identified as developing quantum computers, multi-particle teleportation, and a quantum internet. The document concludes by noting that quantum photonics will continue to play a central role in future technologies.
This document discusses quantum photonics and its applications. It begins by outlining the importance of quantum photonics in fields like information processing, communication, measurement, and nanotechnology. It then provides an introduction to basic photonics concepts like photons, quantum states, and coherence. The document outlines several applications of quantum photonics in areas like quantum information processing, quantum metrology, quantum teleportation, and quantum cryptography. It also discusses advantages like secure communication and accurate measurements. Future challenges are identified as developing quantum computers, multi-particle teleportation, and a quantum internet. The document concludes by noting that quantum photonics will continue to play a central role in future technologies.
A benchmark evaluation for incremental pattern matching in graph transformationIstvan Rath
This document summarizes a presentation given at the Budapest University of Technology and Economics about benchmarking incremental pattern matching in graph transformation. It describes two case studies used as benchmarks: model simulation using petri nets and object-relational mapping for synchronization. Performance results are presented showing that the Rete algorithm provides predictable linear scaling for incremental pattern matching in practical problems.
- Seminar, Dept. of Electrical and Computer Eng., University of California, Davis, CA, USA, May 14, 2004.
- Seminar, Dept. of Electrical and Systems Eng., Washington University in St. Louis, St. Louis, MO, USA, Dec. 3, 2004.
Tecnologia LoRa per sistemi IoT analisi ed implementazione su scheda STM32 Nu...S133931
This document discusses LoRa technology for IoT systems. It analyzes and implements LoRa on an STM32 Nucleo development board with an SX1272 LoRa chip. It evaluates the technology's long range capabilities, low power consumption, and suitability for IoT applications compared to other wireless options like cellular networks. Key aspects covered include LoRa's chirp spread spectrum modulation technique, PHY and MAC layers, transmission parameters, and use of the STM32 Nucleo pack with SX1272 expansion board for implementation and testing.
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
Workshop presentation given by Niels Lohmann on February 20, 2014 in Potsdam, Germany at the Sixth Central-European Workshop on Services and their Composition (ZEUS 2014).
Workshop presentation given by Niels Lohmann on December 5, 2011 in Paphos, Cyprus at the 6th International Workshop on Engineering Service-Oriented Applications (WESOA'11).
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
This document discusses an approach called "compliance by design" for ensuring that artifact-centric business processes are compliant with regulations. It involves:
1) Specifying a business process model, artifacts, agents, locations and goals
2) Translating legal texts into compliance rules
3) Modeling the compliance rules and integrating them with the business process model
4) Using tools to generate a compliant business process model that satisfies both behavioral and compliance requirements.
This approach aims to avoid subsequent proofs of compliance by building compliance into the design from the start. It also allows flexibility to change compliance rules without needing to regenerate the entire process model.
LoLA is an explicit-state model checker for Petri nets that focuses on standard properties and uses many reduction techniques such as stubborn sets, symmetries, and sweep-line heuristics to efficiently analyze large state spaces. It takes Petri nets as input in the form of place/transition nets or high-level algebraic nets and allows users to specify verification tasks involving properties such as boundedness, reachability, and temporal logics. LoLA is open source and has been used in several case studies to generate experimental results tables exploring the impact of basic design decisions.
The document describes various techniques for implementing a Petri net state space search:
1. It discusses how transitions are fired and states are evaluated by marking changed places and checking enabled transitions.
2. State predicates are stored in negation-free normal form to efficiently check state properties.
3. The state space is managed by representing states as bit vectors and organizing them in a decision tree for fast lookup and insertion.
4. Search organization involves firing transitions, finding/inserting states, and backtracking with a search stack and write-only memory approach.
This document discusses integrating the LoLA model checker as a web service for verifying Petri net properties. It lists soundness checks that LoLA can perform, including classical, weak, and relaxed soundness. It provides URLs for editing Petri nets in Oryx and calling the LoLA web service from the University of Rostock service technology site to verify properties by translating nets from PNML to LoLA format and running LoLA as a system call.
Niels Lohmann explores several case studies applying symbolic systems biology techniques:
1) Analyzing biochemical reaction chains using the tool LoLA for fast reachability queries.
2) Finding hazards in Globally Asynchronous Locally Synchronous (GALS) circuits design using Petri nets and partial order reduction.
3) Verifying service choreographies for deadlocks by translating models to open workflow nets and discovering a design flaw.
LoLA is a tool for verifying properties of Petri nets. This document discusses how to:
1. Choose and manage LoLA configurations to optimally verify properties.
2. Ask the right verification questions in a specific, modular way to efficiently verify properties.
3. Optimize Petri net modeling to take advantage of LoLA's reduction techniques and scale verification.
4. Employ scripts and makefiles to automate calling LoLA and analyzing results.
5. Integrate calling LoLA from other tools using UNIX streams for modular verification.
The document summarizes the stubborn set method for state space reduction in Petri nets. It explains that the method works by defining a stubborn set of transitions in each marking that can fire independently of transitions outside the set. This allows reducing the state space by only exploring firings within each stubborn set, while still preserving properties like deadlocks. The proof for deadlock preservation is also outlined.
LoLA is an open source tool for verifying properties of Petri nets through explicit state space generation. It features many state space reduction techniques and can verify standard properties like boundedness, reachability, and LTL/CTL formulas. LoLA was created to generate experimental results tables and explore basic design decisions like having no GUI and generating a dedicated state space for each property. It has been under development since 1998 and is aimed at helping users verify realistic models efficiently.
The document describes the input language for the LoLA model checker. It allows specifying Petri nets and verification tasks in a high-level algebraic style. Key elements include:
1. Defining sorts, operations, and their interpretations to specify the types and functions used.
2. Declaring high-level places and markings as terms over sorts to represent multiple low-level places and tokens.
3. Specifying high-level transitions as procedures with guards and input/output terms to represent multiple low-level transitions.
4. Providing verification tasks as logical formulas involving state predicates to check properties over the unfolded net.
The document discusses applying counterexample guided abstraction refinement (CEGAR) to verifying properties of Petri nets. It summarizes using the Petri net state equation to represent reachable markings as solutions to a system of linear equations. It then describes using CEGAR to iteratively check solutions and refine the abstraction by adding increments when solutions are found to be infeasible. The approach is implemented in a tool called Sara which shows better performance than other tools on verification problems involving large Petri nets and parameterized systems.
This document describes a joint research project between the University of Rostock's Computer Science and Electrical Engineering departments. The project aims to develop tools and formal methods for analyzing systems and synthesizing web services for resource-constrained devices. This will be done by applying the Devices Profile for Web Services (DPWS) standard, which allows using web service technology on embedded systems and sensor networks in a way that is compatible with existing enterprise web services. The goal is to enable web service capabilities on more intelligent devices that increasingly communicate with each other.
Workshop presentation given by Niels Lohmann on February 22, 2011 in Karlsruhe, Germany at the Third Central-European Workshop on Services and their Composition (ZEUS 2011).
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
Presentation given by Niels Lohmann on September 23, 2005 in Berlin, Germany; Talk given at the diploma defense ceremony at Humboldt-Universität zu Berlin.
Tool demonstration given by Niels Lohmann on September 1, 2006 in Eindhoven, The Netherlands at the Berlin-Eindhoven Service Technology Colloquium 2006 (B.E.S.T. 2006).
service-technology.org — A tool family for correct business processes and ser...Universität Rostock
Tool demonstration given by Niels Lohmann on September 16, 2010 in Hoboken, NJ, USA at the Eighth International Conference on Business Process Management (BPM 2010).
Invited presentation given by Niels Lohmann on June 27, 2006 in Turku, Finland as part of the Advanced Tutorial on Petri Net Modelling of Business Processes; satellite event of the PETRI NETS 2006/ACSD 2006 conferences.
Workshop presentation given by Niels Lohmann on August 16, 2007 in Eindhoven, The Netherlands at the Berlin-Eindhoven Service Technology Colloquium 2007 (B.E.S.T. 2007).
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
Workshop presentation given by Niels Lohmann on February 20, 2014 in Potsdam, Germany at the Sixth Central-European Workshop on Services and their Composition (ZEUS 2014).
Workshop presentation given by Niels Lohmann on December 5, 2011 in Paphos, Cyprus at the 6th International Workshop on Engineering Service-Oriented Applications (WESOA'11).
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
This document discusses an approach called "compliance by design" for ensuring that artifact-centric business processes are compliant with regulations. It involves:
1) Specifying a business process model, artifacts, agents, locations and goals
2) Translating legal texts into compliance rules
3) Modeling the compliance rules and integrating them with the business process model
4) Using tools to generate a compliant business process model that satisfies both behavioral and compliance requirements.
This approach aims to avoid subsequent proofs of compliance by building compliance into the design from the start. It also allows flexibility to change compliance rules without needing to regenerate the entire process model.
LoLA is an explicit-state model checker for Petri nets that focuses on standard properties and uses many reduction techniques such as stubborn sets, symmetries, and sweep-line heuristics to efficiently analyze large state spaces. It takes Petri nets as input in the form of place/transition nets or high-level algebraic nets and allows users to specify verification tasks involving properties such as boundedness, reachability, and temporal logics. LoLA is open source and has been used in several case studies to generate experimental results tables exploring the impact of basic design decisions.
The document describes various techniques for implementing a Petri net state space search:
1. It discusses how transitions are fired and states are evaluated by marking changed places and checking enabled transitions.
2. State predicates are stored in negation-free normal form to efficiently check state properties.
3. The state space is managed by representing states as bit vectors and organizing them in a decision tree for fast lookup and insertion.
4. Search organization involves firing transitions, finding/inserting states, and backtracking with a search stack and write-only memory approach.
This document discusses integrating the LoLA model checker as a web service for verifying Petri net properties. It lists soundness checks that LoLA can perform, including classical, weak, and relaxed soundness. It provides URLs for editing Petri nets in Oryx and calling the LoLA web service from the University of Rostock service technology site to verify properties by translating nets from PNML to LoLA format and running LoLA as a system call.
Niels Lohmann explores several case studies applying symbolic systems biology techniques:
1) Analyzing biochemical reaction chains using the tool LoLA for fast reachability queries.
2) Finding hazards in Globally Asynchronous Locally Synchronous (GALS) circuits design using Petri nets and partial order reduction.
3) Verifying service choreographies for deadlocks by translating models to open workflow nets and discovering a design flaw.
LoLA is a tool for verifying properties of Petri nets. This document discusses how to:
1. Choose and manage LoLA configurations to optimally verify properties.
2. Ask the right verification questions in a specific, modular way to efficiently verify properties.
3. Optimize Petri net modeling to take advantage of LoLA's reduction techniques and scale verification.
4. Employ scripts and makefiles to automate calling LoLA and analyzing results.
5. Integrate calling LoLA from other tools using UNIX streams for modular verification.
The document summarizes the stubborn set method for state space reduction in Petri nets. It explains that the method works by defining a stubborn set of transitions in each marking that can fire independently of transitions outside the set. This allows reducing the state space by only exploring firings within each stubborn set, while still preserving properties like deadlocks. The proof for deadlock preservation is also outlined.
LoLA is an open source tool for verifying properties of Petri nets through explicit state space generation. It features many state space reduction techniques and can verify standard properties like boundedness, reachability, and LTL/CTL formulas. LoLA was created to generate experimental results tables and explore basic design decisions like having no GUI and generating a dedicated state space for each property. It has been under development since 1998 and is aimed at helping users verify realistic models efficiently.
The document describes the input language for the LoLA model checker. It allows specifying Petri nets and verification tasks in a high-level algebraic style. Key elements include:
1. Defining sorts, operations, and their interpretations to specify the types and functions used.
2. Declaring high-level places and markings as terms over sorts to represent multiple low-level places and tokens.
3. Specifying high-level transitions as procedures with guards and input/output terms to represent multiple low-level transitions.
4. Providing verification tasks as logical formulas involving state predicates to check properties over the unfolded net.
The document discusses applying counterexample guided abstraction refinement (CEGAR) to verifying properties of Petri nets. It summarizes using the Petri net state equation to represent reachable markings as solutions to a system of linear equations. It then describes using CEGAR to iteratively check solutions and refine the abstraction by adding increments when solutions are found to be infeasible. The approach is implemented in a tool called Sara which shows better performance than other tools on verification problems involving large Petri nets and parameterized systems.
This document describes a joint research project between the University of Rostock's Computer Science and Electrical Engineering departments. The project aims to develop tools and formal methods for analyzing systems and synthesizing web services for resource-constrained devices. This will be done by applying the Devices Profile for Web Services (DPWS) standard, which allows using web service technology on embedded systems and sensor networks in a way that is compatible with existing enterprise web services. The goal is to enable web service capabilities on more intelligent devices that increasingly communicate with each other.
Workshop presentation given by Niels Lohmann on February 22, 2011 in Karlsruhe, Germany at the Third Central-European Workshop on Services and their Composition (ZEUS 2011).
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
Presentation given by Niels Lohmann on September 23, 2005 in Berlin, Germany; Talk given at the diploma defense ceremony at Humboldt-Universität zu Berlin.
Tool demonstration given by Niels Lohmann on September 1, 2006 in Eindhoven, The Netherlands at the Berlin-Eindhoven Service Technology Colloquium 2006 (B.E.S.T. 2006).
service-technology.org — A tool family for correct business processes and ser...Universität Rostock
Tool demonstration given by Niels Lohmann on September 16, 2010 in Hoboken, NJ, USA at the Eighth International Conference on Business Process Management (BPM 2010).
Invited presentation given by Niels Lohmann on June 27, 2006 in Turku, Finland as part of the Advanced Tutorial on Petri Net Modelling of Business Processes; satellite event of the PETRI NETS 2006/ACSD 2006 conferences.
Workshop presentation given by Niels Lohmann on August 16, 2007 in Eindhoven, The Netherlands at the Berlin-Eindhoven Service Technology Colloquium 2007 (B.E.S.T. 2007).
1. Petri Net (versus) State Spaces
Karsten Wolf
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
2. My experience with
state spaces
-INA Integrated Net Analyzer
-LoLA A Low Level Analyzer
-The service-technology.org tool family
Case studies and applications:
-Finding hazards in a GALS wrapper
-Integration into Pathway Logic Assistent
-Soundness check for 700+ industrial business process models in (avg) 2 msec
-Verification of web service choreographies
-Verification of parameterized Boolean programs
-Solving AI planning challenges
-Integration into BP related tools like ProM, Oryx
-Integration into model checking platforms (MC Kit, PEP, CPN-AMI,…)
-….To be continued
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
3. Why state spaces? Why Petri nets?
Verification based on state space
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
4. -Consider asynchronously communicating
components rather than global state changes
Why state spaces?
-Consider causality of events rather than their
ordering in time!
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
5. Petri net principles
Presence or absence of ressources
Monotonicity of firing rather than reading / writing variables
Linearity of firing rule -Consider asynchronously communicating
components rather than global state changes
Locality
-Consider causality of events rather than their
Partially ordered ordering in time!
event structures
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
6. Petri net specific
verification
Monotonicity of firing
Coverability graphs
Siphons / traps
Linearity of firing rule
invariants
Locality
Net reduction
Partially ordered
event structures
Branching prefixes
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
7. State space generation
1. Checking enabledness
2. Firing a transition
3. Backtracking
4. Managing the visited states
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
8. State space generation
1. Checking enabledness
it y
oto n ic
Mon
After firing, only check:
previously enabled transitions which have lost tokens
previously disabled transitions which have gained tokens
... managed through explicitly stored lists
… typical: reduction from linear to constant time
li ty
L oca
2. Firing a transition
3. Backtracking
4. Managing the visited states
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
9. State space generation
1. Checking enabledness
2. Firing a transition
Marking changed via list of pre-, list of post-places
- effort does not depend on size of net
- Typically: constant effort
li ty
L oca
3. Backtracking
4. Managing the visited states
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
10. State space generation
1. Checking enabledness
2. Firing a transition
3. Backtracking
ri ty
Li nea
In depth-first search: fire transition backwards
In breadth-first search: implemented as incremental depth-first search
li ty
L oca
4. Managing the visited states
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
11. Consequence:
„write-only“ storage of markings
current marking m
-fire old/new
-fire backwards
Set of visited markings
Search
stack t1
t2
t3
...
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
12. 4. Managing the visited states
only performed actions: search, insert
p1 p2 p3 p4 p5 p6 p7 p8
in e arity
L
a1 p1 + a2 p2 + a3 p3 = const.
Place
invariants
b2 p2 + b4 p4 + b6 p6 = const.
c3 b3 + c7 p7 + c8 p8 = const.
30-60% less memory
preprocessing <1sec
run time gain: 30-60%
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
13. Reduction techniques
1. Linear Algebra
2. The Sweep-Line Method
3. Symmetries
4. Stubborn Sets
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
14. 1. Linear algebra
• The invariant calculus
– originally invented for replacing state spaces
– in LoLA: used for optimizing state spaces
Already seen: place invariants
Transition invariant: firing vector of a potential cycle
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
15. Transition invariants
ty
L in eari
for termination sufficient: store one state per cycle of occurrence graph
implementation in LoLA:
transition invariants
- set of transitions that occur in every cycle
- store states where those transitions enabled
saves space, if applied in connection with stubborn sets, costs time
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
16. 2. The sweep-line method
• Relies on progress measure
ty
L in eari
LoLA computes measure automatically:
m4: p4
t3
transition invariant
p2=p1+Δt1 m3: p3
p3 = p2+Δt2 t2
... m2: p2
t1
m1: p1
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
17. 3. The symmetry method
li ty
L oca
LoLA: A symmetry = a graph automorphism of the PT-Net
All graph automorphisms = a group (up to exponentially many members)
- stored in LoLA: polynomial generating set
A marking class: all markings that can be transformed into each other by a
symmetry
- executed in LoLA: polynomial time approximation
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
19. … as derived from a program
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
20. 4. Stubborn set method
• Dedicated method for each supported property
li ty
traditional LTL-preserving method: L o ca
- one enabled transition
- the basic stubborness principal
- only invisible transitions
- at least once, on every cycle, all enabled transitions
n
Tra d i t io
LoLA: PN
- can avoid some of the criteria, depending on property
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK
21. Conclusion
Why state spaces? Why Petri nets?
That‘s why
Further reading:
• Tools: www.service-technology.org
• Group / Papers: www.informatik.uni-rostock.de/tpp/
UNIVERSITÄT ROSTOCK | FAKULTÄT INFORMATIK UND ELEKTROTECHNIK | INSTITUT FÜR INFORMATIK