SlideShare a Scribd company logo
1 of 30
Download to read offline
New Search Strategies for the Petri Net CEGAR Approach
Budapest University of Technology and Economics
Department of Measurement and Information Systems
New Search Strategies for the
Petri Net CEGAR Approach
Ákos Hajdu1, András Vörös1, Tamás Bartha2
1Department of Measurement and Information Systems
Budapest University of Technology and Economics, Budapest, Hungary
2Institute for Computer Science and Control
MTA SZTAKI, Budapest, Hungary
Petri Nets 2015, Brussels, Belgium, 26.06.2015.
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
Introduction – Reachability analysis
 Reachability analysis
o Is a given marking reachable from the initial marking?
o Drawback: complexity
• Decidable [Mayr’81]
• At least EXPSPACE-hard [Lipton’76]
• No precise upper bound is known
o Possible solutions
• Partial order reduction
• Symbolic methods
• Abstraction
New Search Strategies for the Petri Net CEGAR Approach
Introduction – Abstraction
 Abstraction
o General approach to handle large (infinite) state
spaces
• Less detailed (finite, smaller) state space representation
o Abstraction refinement is required
• A behavior in the abstract model may not be realizable
• Refine using information from the explored part
o  CounterExample Guided Abstraction Refinement
o Applying CEGAR on Petri nets [Wimmel & Wolf’11]
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
CEGAR approach on Petri nets
 Abstraction of Petri nets: state equation
m0 + Cx = m1
Initial
abstraction
Reachability
problem
State
equation
Initial marking Target marking
Firing count
of transitions
(unknown)
Incidence matrix
New Search Strategies for the Petri Net CEGAR Approach
Initial
abstraction
Reachability
problem
State
equation
CEGAR approach on Petri nets
 Analysis of the abstract model
o Solving the state equation for the
firing count of transitions
o Integer Linear Programming problem
o Necessary, but not sufficient criterion for reachability
Analysis of the
abstract model
Not reachable
No solution
m0 + Cx = m1
New Search Strategies for the Petri Net CEGAR Approach
CEGAR approach on Petri nets
 Examining the solution
o Bounded exploration of the state space
Initial
abstraction
Analysis of the
abstract modelReachability
problem
State
equation
Not reachable
No solution
Examine the
solution
Reachable
Solution
Realizable
Realizable
solution
Partial
solution
Partial
solution
New Search Strategies for the Petri Net CEGAR Approach
CEGAR approach on Petri nets
 Abstraction refinement
o Exclude the counterexample without
losing any realizable solution
o Constraints can be added to the state equation
• The state equation may become infeasible
• A new solution can be obtained
o Traversing the solution space of the state equation
Initial
abstraction
Analysis of the
abstract model
Examine the
solutionReachability
problem
State
equation
Not reachable Reachable
No solution
Solution
Realizable
Refine the
abstraction Not realizableConstraints
New Search Strategies for the Petri Net CEGAR Approach
CEGAR approach on Petri nets
 Traversing the solution space
o Semi-linear space
• Base solutions
• T-invariants
o Two types of constraints
• Jump: obtain different base solution
• Increment: reach non-base solutions
by adding T-invariants
Initial
abstraction
Analysis of the
abstract model
Examine the
solutionReachability
problem
State
equation
Not reachable Reachable
No solution
Solution
Realizable
Refine the
abstraction Not realizableConstraints
m0 + Cx = m1
New Search Strategies for the Petri Net CEGAR Approach
CEGAR approach on Petri nets
 Constraint examples
Initial
abstraction
Analysis of the
abstract model
Examine the
solutionReachability
problem
State
equation
Not reachable Reachable
No solution
Solution
Realizable
Refine the
abstraction Not realizableConstraints
(t0) (t2,t1)
Jump: t0 < 1
(t0) (t1,t0,t2)
Increment: t1 > 0
Invariants can
“lend” tokens
New Search Strategies for the Petri Net CEGAR Approach
Our previous results
 Correctness of the algorithm [Hajdu et al.’14]
o The algorithm may give a wrong answer
o Detect these cases and also solve some of them
 Completeness of the algorithm [Hajdu et al.’13]
o The algorithm may…
• …fail to decide the problem
• …fail to terminate
o Improvements, but still incomplete
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
New iteration strategy
 A reason for incompleteness
o Increment constraints add a T-invariant to a solution
o Possible cases:
1. Cannot fire
2. Fires and enables some other transition
3. Fires but does not enable any transition
– Different solution is obtained without any progress  terminate
– There may be „distant” invariants
} Repeat refinement
cycle
New Search Strategies for the Petri Net CEGAR Approach
New iteration strategy
 Our new strategy
o Extending increment constraints
• “Lending” tokens to places  “lending” tokens to invariants
o Distant invariant
• Z is a distant invariant for Y if Z can produce tokens in places
connected to Y
o Problems to be solved
• Number of tokens to “borrow”
• Termination criterion
– E.g.: X lends to Y and Y lends to X  infinite loop
New Search Strategies for the Petri Net CEGAR Approach
New iteration strategy
 Number of tokens „borrowed”
o One token at a time and repeat
o Some problems cannot be solved this way
 Termination criterion
o Form a chain of invariants
• If Z did not help Y  find distant invariant for (Z + Y)
• Union of transitions  finite
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
Search strategies
 The algorithm traverses the solution space
o Multiple jump/increment constraints
o We examined different strategies
• Depth-first search
• Breadth-first search
o We developed a complex strategy
New Search Strategies for the Petri Net CEGAR Approach
Search strategies
 Depth-first search
+ Efficient regarding memory usage
+ Fast convergence
- May not find the minimal solution
- May not terminate
 Breadth-first search
+ Always finds the minimal solution
- Less efficient than DFS
- May not terminate if there is no solution
New Search Strategies for the Petri Net CEGAR Approach
Search strategies
 Complex strategy
o Based on DFS
o Expand one level of the solution space
• All partial solutions of a solution vector
o Define an ordering between the partial
solutions
o Filter based on the order
New Search Strategies for the Petri Net CEGAR Approach
Search strategies
 Ordering
o Partial order: Parikh image of firing sequence
 Filtering
o Maximal solutions
• Closest to a realizable solutions
• Infinite loops can be detected
o Minimal solutions
• Slower convergence
• May involve different T-invariants
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
Evaluation
 Implementation: PetriDotNet framework
 Comparison of algorithms
o SARA tool
• Wimmel & Wolf
o Saturation-based method (developed at our group)
• Symbolic algorithm
 Comparison of search strategies
o BFS ↔ DFS ↔ Complex strategy
New Search Strategies for the Petri Net CEGAR Approach
Comparison of the algorithms
 FMS
o Flexible manufacturing system
o Fixed structure
o Parameter affects state space
1E-3
1E-2
1E-1
1E+0
1E+1
1E+2
10 100 1000 10000
Runtime(s)
Model parameter
Our algorithm Saturation SARA
0,001
0,01
0,1
1
10
100
10 100
Runtime(s)
Model parameter
Our algorithm Saturation SARA
 Dining philosophers
o Illustration of mutual exclusion
o Structure grows with parameter
New Search Strategies for the Petri Net CEGAR Approach
Comparison of search strategies
 Models with large solution space
0,1%
1,0%
10,0%
100,0%
Chain
1+2
Chain
1+3
Chain
1+4
Chain
1+4*
Chain
2+2
Chain
2+3
Chain
2+3*
Runtime/runtimeofBFS
Model
DFS Complex
0%
20%
40%
60%
80%
100%
120%
140%
160%
180%
Chain
1+2
Chain
1+3
Chain
1+4
Chain
1+4*
Chain
2+2
Chain
2+3
Chain
2+3*
Length/lengthofBFS
Model
DFS Complex
BFS
BFS
New Search Strategies for the Petri Net CEGAR Approach
Outline of the talk
1. Introduction
2. The CEGAR approach on Petri nets
3. New iteration strategy
4. Search strategies
5. Evaluation
6. Conclusions
New Search Strategies for the Petri Net CEGAR Approach
Conclusions
 Theoretical results
o New iteration strategy and limitations
 Practical results
o Behavior of BFS, DFS and a complex strategy
 Future work
o Forward reachability: did we reach the limits?
o How structure and behavior affects performance?
hajduakos182@gmail.com
vori@mit.bme.hu
PetriDotNet: bit.ly/1Rqnare
Measurements: bit.ly/1CoMJSG
New Search Strategies for the Petri Net CEGAR Approach
References
[Mayr’81] MAYR, EW. "An algorithm for the general Petri net reach-
ability problem." Proc. 13th Annual ACM Symposium on Theory of
Computing, 1981. 1981.
[Lipton’76] Lipton, Richard. "The reachability problem requires
exponential space." Research Report 62, Department of Computer
Science, Yale University, New Haven, Connecticut (1976).
[Wimmel & Wolf’11] Wimmel, Harro, and Karsten Wolf. "Applying
CEGAR to the Petri net state equation." Tools and Algorithms for the
Construction and Analysis of Systems. Springer Berlin Heidelberg,
2011. 224-238.
[Hajdu et al.’13] Hajdu, Ákos, et al. "Extensions to the CEGAR
approach on Petri Nets." (2013): 274-288.
[Hajdu et al.’14] Hajdu, Akos, et al. "Extensions to the CEGAR
Approach on Petri Nets." Acta Cybernetica 21 (2014): 401-417.
New Search Strategies for the Petri Net CEGAR Approach
Models
FMS
Dining philosophers
Chain 2+3

More Related Content

Viewers also liked

Pasta panna e salmone
Pasta panna e salmonePasta panna e salmone
Pasta panna e salmoneengy98
 
evaluation and outline of key changes and implementations
evaluation and outline of key changes and implementationsevaluation and outline of key changes and implementations
evaluation and outline of key changes and implementationscseerussell
 
kĩ thuật xạ trị
kĩ thuật xạ trị kĩ thuật xạ trị
kĩ thuật xạ trị Duy Thiếu
 
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Arm Igf
 
周辺beaconを取得するwearアプリを追加してローンチするまで
周辺beaconを取得するwearアプリを追加してローンチするまで周辺beaconを取得するwearアプリを追加してローンチするまで
周辺beaconを取得するwearアプリを追加してローンチするまでIkada Kaori
 
Cst sauter verdict
Cst   sauter verdictCst   sauter verdict
Cst sauter verdictkralovec
 
Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linuxhaya_alj
 

Viewers also liked (11)

Pasta panna e salmone
Pasta panna e salmonePasta panna e salmone
Pasta panna e salmone
 
猫のすすめ
猫のすすめ猫のすすめ
猫のすすめ
 
evaluation and outline of key changes and implementations
evaluation and outline of key changes and implementationsevaluation and outline of key changes and implementations
evaluation and outline of key changes and implementations
 
kĩ thuật xạ trị
kĩ thuật xạ trị kĩ thuật xạ trị
kĩ thuật xạ trị
 
Sistema reproductor femenino
Sistema reproductor femeninoSistema reproductor femenino
Sistema reproductor femenino
 
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015
 
Aplicaciones imformaticas
Aplicaciones imformaticasAplicaciones imformaticas
Aplicaciones imformaticas
 
周辺beaconを取得するwearアプリを追加してローンチするまで
周辺beaconを取得するwearアプリを追加してローンチするまで周辺beaconを取得するwearアプリを追加してローンチするまで
周辺beaconを取得するwearアプリを追加してローンチするまで
 
AGPC(CON)Rev-00 - Copy
AGPC(CON)Rev-00 - CopyAGPC(CON)Rev-00 - Copy
AGPC(CON)Rev-00 - Copy
 
Cst sauter verdict
Cst   sauter verdictCst   sauter verdict
Cst sauter verdict
 
Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linux
 

Similar to New Search Strategies for the Petri Net CEGAR Approach

Extensions to the CEGAR Approach on Petri Nets
Extensions to the CEGAR Approach on Petri NetsExtensions to the CEGAR Approach on Petri Nets
Extensions to the CEGAR Approach on Petri NetsAkos Hajdu
 
Selection K in K-means Clustering
Selection K in K-means ClusteringSelection K in K-means Clustering
Selection K in K-means ClusteringJunghoon Kim
 
Vertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale Graphs
Vertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale GraphsVertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale Graphs
Vertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale GraphsUniversidade de São Paulo
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmIJMIT JOURNAL
 
Big shadow test
Big shadow testBig shadow test
Big shadow testmunsif123
 
Agile analytics : An exploratory study of technical complexity management
Agile analytics : An exploratory study of technical complexity managementAgile analytics : An exploratory study of technical complexity management
Agile analytics : An exploratory study of technical complexity managementAgnirudra Sikdar
 
JAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discovery
JAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discoveryJAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discovery
JAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discoveryIEEEGLOBALSOFTTECHNOLOGIES
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmIJMIT JOURNAL
 
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...Xin-She Yang
 
Using SigOpt to Tune Deep Learning Models with Nervana Cloud
Using SigOpt to Tune Deep Learning Models with Nervana CloudUsing SigOpt to Tune Deep Learning Models with Nervana Cloud
Using SigOpt to Tune Deep Learning Models with Nervana CloudSigOpt
 
Metamorphic Testing Thesis Defense.pptx
Metamorphic Testing Thesis Defense.pptxMetamorphic Testing Thesis Defense.pptx
Metamorphic Testing Thesis Defense.pptxentertainmentweekly11
 
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016MLconf
 
MLConf 2016 SigOpt Talk by Scott Clark
MLConf 2016 SigOpt Talk by Scott ClarkMLConf 2016 SigOpt Talk by Scott Clark
MLConf 2016 SigOpt Talk by Scott ClarkSigOpt
 
A Study of Efficiency Improvements Technique for K-Means Algorithm
A Study of Efficiency Improvements Technique for K-Means AlgorithmA Study of Efficiency Improvements Technique for K-Means Algorithm
A Study of Efficiency Improvements Technique for K-Means AlgorithmIRJET Journal
 
Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...
Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...
Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...Soheyl
 
Orpailleur -- triclustering talk
Orpailleur -- triclustering talkOrpailleur -- triclustering talk
Orpailleur -- triclustering talkDmitrii Ignatov
 
On the Measurement of Test Collection Reliability
On the Measurement of Test Collection ReliabilityOn the Measurement of Test Collection Reliability
On the Measurement of Test Collection ReliabilityJulián Urbano
 
Deep Dive into Hyperparameter Tuning
Deep Dive into Hyperparameter TuningDeep Dive into Hyperparameter Tuning
Deep Dive into Hyperparameter TuningShubhmay Potdar
 
Using Bayesian Optimization to Tune Machine Learning Models
Using Bayesian Optimization to Tune Machine Learning ModelsUsing Bayesian Optimization to Tune Machine Learning Models
Using Bayesian Optimization to Tune Machine Learning ModelsScott Clark
 

Similar to New Search Strategies for the Petri Net CEGAR Approach (20)

Extensions to the CEGAR Approach on Petri Nets
Extensions to the CEGAR Approach on Petri NetsExtensions to the CEGAR Approach on Petri Nets
Extensions to the CEGAR Approach on Petri Nets
 
Selection K in K-means Clustering
Selection K in K-means ClusteringSelection K in K-means Clustering
Selection K in K-means Clustering
 
Vertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale Graphs
Vertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale GraphsVertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale Graphs
Vertex Centric Asynchronous Belief Propagation Algorithm for Large-Scale Graphs
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithm
 
Big shadow test
Big shadow testBig shadow test
Big shadow test
 
Agile analytics : An exploratory study of technical complexity management
Agile analytics : An exploratory study of technical complexity managementAgile analytics : An exploratory study of technical complexity management
Agile analytics : An exploratory study of technical complexity management
 
JAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discovery
JAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discoveryJAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discovery
JAVA 2013 IEEE DATAMINING PROJECT Region based foldings in process discovery
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithm
 
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
 
Using SigOpt to Tune Deep Learning Models with Nervana Cloud
Using SigOpt to Tune Deep Learning Models with Nervana CloudUsing SigOpt to Tune Deep Learning Models with Nervana Cloud
Using SigOpt to Tune Deep Learning Models with Nervana Cloud
 
Metamorphic Testing Thesis Defense.pptx
Metamorphic Testing Thesis Defense.pptxMetamorphic Testing Thesis Defense.pptx
Metamorphic Testing Thesis Defense.pptx
 
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
 
MLConf 2016 SigOpt Talk by Scott Clark
MLConf 2016 SigOpt Talk by Scott ClarkMLConf 2016 SigOpt Talk by Scott Clark
MLConf 2016 SigOpt Talk by Scott Clark
 
A Study of Efficiency Improvements Technique for K-Means Algorithm
A Study of Efficiency Improvements Technique for K-Means AlgorithmA Study of Efficiency Improvements Technique for K-Means Algorithm
A Study of Efficiency Improvements Technique for K-Means Algorithm
 
Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...
Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...
Effectiveness and Efficiency of Particle Swarm Optimization Technique in Inve...
 
I0343047049
I0343047049I0343047049
I0343047049
 
Orpailleur -- triclustering talk
Orpailleur -- triclustering talkOrpailleur -- triclustering talk
Orpailleur -- triclustering talk
 
On the Measurement of Test Collection Reliability
On the Measurement of Test Collection ReliabilityOn the Measurement of Test Collection Reliability
On the Measurement of Test Collection Reliability
 
Deep Dive into Hyperparameter Tuning
Deep Dive into Hyperparameter TuningDeep Dive into Hyperparameter Tuning
Deep Dive into Hyperparameter Tuning
 
Using Bayesian Optimization to Tune Machine Learning Models
Using Bayesian Optimization to Tune Machine Learning ModelsUsing Bayesian Optimization to Tune Machine Learning Models
Using Bayesian Optimization to Tune Machine Learning Models
 

More from Akos Hajdu

solc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart Contractssolc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart ContractsAkos Hajdu
 
Software Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based MethodsSoftware Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based MethodsAkos Hajdu
 
A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
 A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
A Preliminary Analysis on the Effect of Randomness in a CEGAR FrameworkAkos Hajdu
 
Theta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model CheckingTheta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model CheckingAkos Hajdu
 
Towards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingTowards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingAkos Hajdu
 
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...Akos Hajdu
 
Exploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR FrameworkExploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR FrameworkAkos Hajdu
 
A Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based RefinementsA Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based RefinementsAkos Hajdu
 
Petri Net Based Trajectory Optimization
Petri Net Based Trajectory OptimizationPetri Net Based Trajectory Optimization
Petri Net Based Trajectory OptimizationAkos Hajdu
 

More from Akos Hajdu (9)

solc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart Contractssolc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart Contracts
 
Software Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based MethodsSoftware Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based Methods
 
A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
 A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
 
Theta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model CheckingTheta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model Checking
 
Towards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingTowards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model Checking
 
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
 
Exploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR FrameworkExploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR Framework
 
A Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based RefinementsA Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based Refinements
 
Petri Net Based Trajectory Optimization
Petri Net Based Trajectory OptimizationPetri Net Based Trajectory Optimization
Petri Net Based Trajectory Optimization
 

Recently uploaded

Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Caco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionCaco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionPriyansha Singh
 

Recently uploaded (20)

Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Caco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionCaco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorption
 

New Search Strategies for the Petri Net CEGAR Approach

  • 1. New Search Strategies for the Petri Net CEGAR Approach Budapest University of Technology and Economics Department of Measurement and Information Systems New Search Strategies for the Petri Net CEGAR Approach Ákos Hajdu1, András Vörös1, Tamás Bartha2 1Department of Measurement and Information Systems Budapest University of Technology and Economics, Budapest, Hungary 2Institute for Computer Science and Control MTA SZTAKI, Budapest, Hungary Petri Nets 2015, Brussels, Belgium, 26.06.2015.
  • 2. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 3. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 4. New Search Strategies for the Petri Net CEGAR Approach Introduction – Reachability analysis  Reachability analysis o Is a given marking reachable from the initial marking? o Drawback: complexity • Decidable [Mayr’81] • At least EXPSPACE-hard [Lipton’76] • No precise upper bound is known o Possible solutions • Partial order reduction • Symbolic methods • Abstraction
  • 5. New Search Strategies for the Petri Net CEGAR Approach Introduction – Abstraction  Abstraction o General approach to handle large (infinite) state spaces • Less detailed (finite, smaller) state space representation o Abstraction refinement is required • A behavior in the abstract model may not be realizable • Refine using information from the explored part o  CounterExample Guided Abstraction Refinement o Applying CEGAR on Petri nets [Wimmel & Wolf’11]
  • 6. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 7. New Search Strategies for the Petri Net CEGAR Approach CEGAR approach on Petri nets  Abstraction of Petri nets: state equation m0 + Cx = m1 Initial abstraction Reachability problem State equation Initial marking Target marking Firing count of transitions (unknown) Incidence matrix
  • 8. New Search Strategies for the Petri Net CEGAR Approach Initial abstraction Reachability problem State equation CEGAR approach on Petri nets  Analysis of the abstract model o Solving the state equation for the firing count of transitions o Integer Linear Programming problem o Necessary, but not sufficient criterion for reachability Analysis of the abstract model Not reachable No solution m0 + Cx = m1
  • 9. New Search Strategies for the Petri Net CEGAR Approach CEGAR approach on Petri nets  Examining the solution o Bounded exploration of the state space Initial abstraction Analysis of the abstract modelReachability problem State equation Not reachable No solution Examine the solution Reachable Solution Realizable Realizable solution Partial solution Partial solution
  • 10. New Search Strategies for the Petri Net CEGAR Approach CEGAR approach on Petri nets  Abstraction refinement o Exclude the counterexample without losing any realizable solution o Constraints can be added to the state equation • The state equation may become infeasible • A new solution can be obtained o Traversing the solution space of the state equation Initial abstraction Analysis of the abstract model Examine the solutionReachability problem State equation Not reachable Reachable No solution Solution Realizable Refine the abstraction Not realizableConstraints
  • 11. New Search Strategies for the Petri Net CEGAR Approach CEGAR approach on Petri nets  Traversing the solution space o Semi-linear space • Base solutions • T-invariants o Two types of constraints • Jump: obtain different base solution • Increment: reach non-base solutions by adding T-invariants Initial abstraction Analysis of the abstract model Examine the solutionReachability problem State equation Not reachable Reachable No solution Solution Realizable Refine the abstraction Not realizableConstraints m0 + Cx = m1
  • 12. New Search Strategies for the Petri Net CEGAR Approach CEGAR approach on Petri nets  Constraint examples Initial abstraction Analysis of the abstract model Examine the solutionReachability problem State equation Not reachable Reachable No solution Solution Realizable Refine the abstraction Not realizableConstraints (t0) (t2,t1) Jump: t0 < 1 (t0) (t1,t0,t2) Increment: t1 > 0 Invariants can “lend” tokens
  • 13. New Search Strategies for the Petri Net CEGAR Approach Our previous results  Correctness of the algorithm [Hajdu et al.’14] o The algorithm may give a wrong answer o Detect these cases and also solve some of them  Completeness of the algorithm [Hajdu et al.’13] o The algorithm may… • …fail to decide the problem • …fail to terminate o Improvements, but still incomplete
  • 14. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 15. New Search Strategies for the Petri Net CEGAR Approach New iteration strategy  A reason for incompleteness o Increment constraints add a T-invariant to a solution o Possible cases: 1. Cannot fire 2. Fires and enables some other transition 3. Fires but does not enable any transition – Different solution is obtained without any progress  terminate – There may be „distant” invariants } Repeat refinement cycle
  • 16. New Search Strategies for the Petri Net CEGAR Approach New iteration strategy  Our new strategy o Extending increment constraints • “Lending” tokens to places  “lending” tokens to invariants o Distant invariant • Z is a distant invariant for Y if Z can produce tokens in places connected to Y o Problems to be solved • Number of tokens to “borrow” • Termination criterion – E.g.: X lends to Y and Y lends to X  infinite loop
  • 17. New Search Strategies for the Petri Net CEGAR Approach New iteration strategy  Number of tokens „borrowed” o One token at a time and repeat o Some problems cannot be solved this way  Termination criterion o Form a chain of invariants • If Z did not help Y  find distant invariant for (Z + Y) • Union of transitions  finite
  • 18. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 19. New Search Strategies for the Petri Net CEGAR Approach Search strategies  The algorithm traverses the solution space o Multiple jump/increment constraints o We examined different strategies • Depth-first search • Breadth-first search o We developed a complex strategy
  • 20. New Search Strategies for the Petri Net CEGAR Approach Search strategies  Depth-first search + Efficient regarding memory usage + Fast convergence - May not find the minimal solution - May not terminate  Breadth-first search + Always finds the minimal solution - Less efficient than DFS - May not terminate if there is no solution
  • 21. New Search Strategies for the Petri Net CEGAR Approach Search strategies  Complex strategy o Based on DFS o Expand one level of the solution space • All partial solutions of a solution vector o Define an ordering between the partial solutions o Filter based on the order
  • 22. New Search Strategies for the Petri Net CEGAR Approach Search strategies  Ordering o Partial order: Parikh image of firing sequence  Filtering o Maximal solutions • Closest to a realizable solutions • Infinite loops can be detected o Minimal solutions • Slower convergence • May involve different T-invariants
  • 23. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 24. New Search Strategies for the Petri Net CEGAR Approach Evaluation  Implementation: PetriDotNet framework  Comparison of algorithms o SARA tool • Wimmel & Wolf o Saturation-based method (developed at our group) • Symbolic algorithm  Comparison of search strategies o BFS ↔ DFS ↔ Complex strategy
  • 25. New Search Strategies for the Petri Net CEGAR Approach Comparison of the algorithms  FMS o Flexible manufacturing system o Fixed structure o Parameter affects state space 1E-3 1E-2 1E-1 1E+0 1E+1 1E+2 10 100 1000 10000 Runtime(s) Model parameter Our algorithm Saturation SARA 0,001 0,01 0,1 1 10 100 10 100 Runtime(s) Model parameter Our algorithm Saturation SARA  Dining philosophers o Illustration of mutual exclusion o Structure grows with parameter
  • 26. New Search Strategies for the Petri Net CEGAR Approach Comparison of search strategies  Models with large solution space 0,1% 1,0% 10,0% 100,0% Chain 1+2 Chain 1+3 Chain 1+4 Chain 1+4* Chain 2+2 Chain 2+3 Chain 2+3* Runtime/runtimeofBFS Model DFS Complex 0% 20% 40% 60% 80% 100% 120% 140% 160% 180% Chain 1+2 Chain 1+3 Chain 1+4 Chain 1+4* Chain 2+2 Chain 2+3 Chain 2+3* Length/lengthofBFS Model DFS Complex BFS BFS
  • 27. New Search Strategies for the Petri Net CEGAR Approach Outline of the talk 1. Introduction 2. The CEGAR approach on Petri nets 3. New iteration strategy 4. Search strategies 5. Evaluation 6. Conclusions
  • 28. New Search Strategies for the Petri Net CEGAR Approach Conclusions  Theoretical results o New iteration strategy and limitations  Practical results o Behavior of BFS, DFS and a complex strategy  Future work o Forward reachability: did we reach the limits? o How structure and behavior affects performance? hajduakos182@gmail.com vori@mit.bme.hu PetriDotNet: bit.ly/1Rqnare Measurements: bit.ly/1CoMJSG
  • 29. New Search Strategies for the Petri Net CEGAR Approach References [Mayr’81] MAYR, EW. "An algorithm for the general Petri net reach- ability problem." Proc. 13th Annual ACM Symposium on Theory of Computing, 1981. 1981. [Lipton’76] Lipton, Richard. "The reachability problem requires exponential space." Research Report 62, Department of Computer Science, Yale University, New Haven, Connecticut (1976). [Wimmel & Wolf’11] Wimmel, Harro, and Karsten Wolf. "Applying CEGAR to the Petri net state equation." Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 2011. 224-238. [Hajdu et al.’13] Hajdu, Ákos, et al. "Extensions to the CEGAR approach on Petri Nets." (2013): 274-288. [Hajdu et al.’14] Hajdu, Akos, et al. "Extensions to the CEGAR Approach on Petri Nets." Acta Cybernetica 21 (2014): 401-417.
  • 30. New Search Strategies for the Petri Net CEGAR Approach Models FMS Dining philosophers Chain 2+3