SlideShare a Scribd company logo
Reachability Analysis via Net
Structure
HARRO WIMMEL, KARSTEN WOLF
Universität Rostock, Institut für Informatik
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 1 / 13
Overview
Basic Definitions
Reachability Problem
State Equation & Constraints
Solving the Reachability Problem using CEGAR
The Search Space
Example
Looking for Constraints
Finding Partial Solutions
The Algorithm
Experimental Results
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 2 / 13
Basic Definitions
Reachability Problem
Petri nets should be well-known.
• (N, m, m ) is a reachability problem; answer “yes” if m[σ N m for some
firing sequence σ ∈ T∗
• N = (S, T, F) Petri net, m, m ∈ NS
markings
• m = m + Cx is the state equation
• C incidence matrix, x ∈ NT
transition vector (solution)
• from m[σ m follows m = m + C℘(σ), i.e. the Parikh image ℘(σ) solves
the state equation
• necessary condition for reachability
• ℘(σ) = x is T-invariant if Cx = 0, i.e. m[σ m
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 3 / 13
Basic Definitions
Reachability Problem
Petri nets should be well-known.
• (N, m, m ) is a reachability problem; answer “yes” if m[σ N m for some
firing sequence σ ∈ T∗
• N = (S, T, F) Petri net, m, m ∈ NS
markings
• m = m + Cx is the state equation
• C incidence matrix, x ∈ NT
transition vector (solution)
• from m[σ m follows m = m + C℘(σ), i.e. the Parikh image ℘(σ) solves
the state equation
• necessary condition for reachability
• ℘(σ) = x is T-invariant if Cx = 0, i.e. m[σ m
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 3 / 13
Basic Definitions
Reachability Problem
Petri nets should be well-known.
• (N, m, m ) is a reachability problem; answer “yes” if m[σ N m for some
firing sequence σ ∈ T∗
• N = (S, T, F) Petri net, m, m ∈ NS
markings
• m = m + Cx is the state equation
• C incidence matrix, x ∈ NT
transition vector (solution)
• from m[σ m follows m = m + C℘(σ), i.e. the Parikh image ℘(σ) solves
the state equation
• necessary condition for reachability
• ℘(σ) = x is T-invariant if Cx = 0, i.e. m[σ m
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 3 / 13
Basic Definitions
State Equation & Constraints
• The solution space of the state equation m = m + Cx is semilinear
• ∃ finite B, P ⊆ NT
: m = m + Cx ⇐⇒ x = b + i ni pi for some
b ∈ B, pi ∈ P, ni ∈ N
• IP solver, e.g. lp_solve, yields “minimal” solution
• Discrimination of solutions by adding constraints (CEGAR)
• “jump”: t < n with t ∈ T, n ∈ N
• ”increment”: k
i=1 ni ti ≥ n with ti ∈ T, ni , n ∈ N
• jumps for other minimal solutions, increments for addition of T-invariants
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 4 / 13
Basic Definitions
State Equation & Constraints
• The solution space of the state equation m = m + Cx is semilinear
• ∃ finite B, P ⊆ NT
: m = m + Cx ⇐⇒ x = b + i ni pi for some
b ∈ B, pi ∈ P, ni ∈ N
• IP solver, e.g. lp_solve, yields “minimal” solution
• Discrimination of solutions by adding constraints (CEGAR)
• “jump”: t < n with t ∈ T, n ∈ N
• ”increment”: k
i=1 ni ti ≥ n with ti ∈ T, ni , n ∈ N
• jumps for other minimal solutions, increments for addition of T-invariants
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 4 / 13
Basic Definitions
State Equation & Constraints
• The solution space of the state equation m = m + Cx is semilinear
• ∃ finite B, P ⊆ NT
: m = m + Cx ⇐⇒ x = b + i ni pi for some
b ∈ B, pi ∈ P, ni ∈ N
• IP solver, e.g. lp_solve, yields “minimal” solution
• Discrimination of solutions by adding constraints (CEGAR)
• “jump”: t < n with t ∈ T, n ∈ N
• ”increment”: k
i=1 ni ti ≥ n with ti ∈ T, ni , n ∈ N
• jumps for other minimal solutions, increments for addition of T-invariants
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 4 / 13
The Search Space
b
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 5 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
3× 3×
3×
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
3× 3×
3×
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
Constraints:
b2 ≥ 1 (oder a1 < 3)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
2× 2×
3×
1× 1× 1×
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
Constraints:
b2 ≥ 1 (oder a1 < 3)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
Constraints:
b2 ≥ 1 (oder a1 < 3), c1 ≥ 1
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
2× 2×
3×
1× 1× 1×
1× 1×
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
2a1+2a2+b1+b2+b3+c1+c2+3
Constraints:
b2 ≥ 1 (oder a1 < 3), c1 ≥ 1
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
2a1+2a2+b1+b2+b3+c1+c2+3
Constraints:
b2 ≥ 1 (oder a1 < 3), c1 ≥ 1,
b2 ≥ 2 (oder a1 < 2)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
1× 1×
3×
2× 2× 2×
1× 1×
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
2a1+2a2+b1+b2+b3+c1+c2+3
a1+a2+2b1+2b2+2b3+c1+c2+3
Constraints:
b2 ≥ 1 (oder a1 < 3), c1 ≥ 1,
b2 ≥ 2 (oder a1 < 2)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
2a1+2a2+b1+b2+b3+c1+c2+3
a1+a2+2b1+2b2+2b3+c1+c2+3
Constraints:
b2 ≥ 1 (oder a1 < 3), c1 ≥ 1,
b2 ≥ 2 (oder a1 < 2),
b2 ≥ 3 (oder a1 < 1)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
An Example
s
a1
b1
x1
y1
c1
b2
z
y2
c2
b3
x2a2
f3×
3× 3× 3×
1× 1×
Final marking: s + 3f
State Equation’s Solutions:
3a1 +3a2 +3
2a1 +2a2 +b1 +b2 +b3 +3
2a1+2a2+b1+b2+b3+c1+c2+3
a1+a2+2b1+2b2+2b3+c1+c2+3
3b1 +3b2 +3b3 +c1 +c2 +3
Constraints:
b2 ≥ 1 (oder a1 < 3), c1 ≥ 1,
b2 ≥ 2 (oder a1 < 2),
b2 ≥ 3 (oder a1 < 1)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
Looking for Constraints
Building a graph
Take a firing sequence σ and a solution x of the state equation m = m +Cx with
• ℘(σ) ≤ x,
• ∀t ∈ T: x(t) > ℘(σ)(t) =⇒ ¬m[σt
We call σ a partial solution. Now build a graph G of:
• transitions t with x(t) > ℘(σ)(t)
• places s inhibiting the firing of such a t (after σ)
• an edge from s to t if s inhibits t
• an edge from t to s if t increases token count on s
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 7 / 13
Looking for Constraints
Finding Components
Get all strongly connected components (SCC) of G which have no incoming edges
(source SCCs).
Places in such SCCs cannot be marked from “inside” the graph, so tokens must
come from the outside.
=⇒ Constraint use transitions that can put tokens onto a source SCC (left side of
the constraint).
How many tokens to produce? (right side of the constraint)
• a complex problem (esp. if x(t) − ℘(σ)(t) > 1 and nets have multiarcs)
• approximation necessary
• repeated increase of the constraints by 1 token is possible
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 8 / 13
Finding Partial Solutions
• Tree of all potential firing sequences for x from m = m + Cx
• tree is finite, brute-force search possible
• depth-first-search
• enumerate partial solutions and build constraints
• Optimisations
• stubborn-set method (partial order reduction)
• additional confluence tests for x(t) − ℘(σ)(t) > n
• backtracking at repeated markings on a path
• ineffective constraints (σ is partial solution for x + y with σ = σ or
℘(σ ) = ℘(σ) + y with y a T-invariant)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 9 / 13
Finding Partial Solutions
• Tree of all potential firing sequences for x from m = m + Cx
• tree is finite, brute-force search possible
• depth-first-search
• enumerate partial solutions and build constraints
• Optimisations
• stubborn-set method (partial order reduction)
• additional confluence tests for x(t) − ℘(σ)(t) > n
• backtracking at repeated markings on a path
• ineffective constraints (σ is partial solution for x + y with σ = σ or
℘(σ ) = ℘(σ) + y with y a T-invariant)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 9 / 13
The Algorithm / Conclusion
• Get solution of the state equation using an IP solver
• Get partial solutions (maximal firing sequences), stop if full solution
• Find constraints for partial solutions
• (Multiple) calls to algorithm with state equation + constraints
Conclusion:
• Positive answer is found (use “jumps” for a complete search), except in case
of insufficient memory; witness path is found
• Negative answer can be found if state equation is infeasible or if backtracking
for ineffective constraints makes search space finite; diagnosis possible
• Extensions possible, e.g. state inequations
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 10 / 13
Experimental Results
Implementation in a tool named “Sara”.
• Garavel’s challenge (LOTOS specification): 485 places, 776 transitions, test
for dead transitions
• (Cygwin/Linux) 26/41 sec. (LoLA: 71/29 sec. + separation by hand)
• path length (medium/max) 15/28 (LoLA: 53/6232)
• SAP reference nets (business processes): 590 nets, test for relaxed
soundness
• (Cygwin/Linux) 198/110 sec. (LoLA: 24 min. + 17 unsolved)
• Boolean programs: a few nets, coverability test
• <1 second (LoLA: 1 problem with memory overflow (>32GB))
• Spezialized nets with increasing edge weights (self-constructed)
• Sara loses time exponentially compared to LoLA (always <3 sec.)
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 11 / 13
M. Berkelaar, K. Eikland, P. Notebaert: Lp solve Reference Guide,
http://lpsolve.sourceforge.net/5.5/, 2010.
H. Garavel: Efficient Petri Net tool for computing quasi-liveness,
http://www.informatik.uni-hamburg.de/cgi-bin/TGI/pnml/getpost
?id=2003/07/2709, 2003.
L.M. Kristensen, K. Schmidt, A. Valmari: Question-guided Stubborn Set Methods for
State Properties, Formal Methods in System Design 29:3, pp.215–251, Springer,
2006.
E. Mayr: An algorithm for the general Petri net reachability problem, SIAM Journal of
Computing 13:3, pp.441–460, 1984.
H. Wimmel: Sara – Structures for Automated Reachability Analysis,
http://www.informatik.uni-rostock.de/∼nl/wiki/tools/download,
2010.
K. Wolf: LoLA – A low level analyzer, http://www.informatik.uni-
rostock.de/∼nl/wiki/tools/lola, 2010.
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 12 / 13
Thanks for Your Attention!
8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 13 / 13

More Related Content

What's hot

Dsp3
Dsp3Dsp3
Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...
Pierre Jacob
 
Precomputation for SMC-ABC with undirected graphical models
Precomputation for SMC-ABC with undirected graphical modelsPrecomputation for SMC-ABC with undirected graphical models
Precomputation for SMC-ABC with undirected graphical models
Matt Moores
 
Stein's method for functional Poisson approximation
Stein's method for functional Poisson approximationStein's method for functional Poisson approximation
Stein's method for functional Poisson approximation
Laurent Decreusefond
 
Final PhD Seminar
Final PhD SeminarFinal PhD Seminar
Final PhD Seminar
Matt Moores
 
Connection between inverse problems and uncertainty quantification problems
Connection between inverse problems and uncertainty quantification problemsConnection between inverse problems and uncertainty quantification problems
Connection between inverse problems and uncertainty quantification problems
Alexander Litvinenko
 
2. polynomial interpolation
2. polynomial interpolation2. polynomial interpolation
2. polynomial interpolation
EasyStudy3
 
Small updates of matrix functions used for network centrality
Small updates of matrix functions used for network centralitySmall updates of matrix functions used for network centrality
Small updates of matrix functions used for network centrality
Francesco Tudisco
 
Spline Interpolation
Spline InterpolationSpline Interpolation
Spline Interpolation
aiQUANT
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
Christian Robert
 
QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...
QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...
QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...
The Statistical and Applied Mathematical Sciences Institute
 
BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...
BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...
BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...
Laurent Duval
 
First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...
First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...
First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...
Paris Women in Machine Learning and Data Science
 
talk MCMC & SMC 2004
talk MCMC & SMC 2004talk MCMC & SMC 2004
talk MCMC & SMC 2004
Stephane Senecal
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
The Statistical and Applied Mathematical Sciences Institute
 
cswiercz-general-presentation
cswiercz-general-presentationcswiercz-general-presentation
cswiercz-general-presentation
Chris Swierczewski
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)
Ha Phuong
 
sada_pres
sada_pressada_pres
sada_pres
Stephane Senecal
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
The Statistical and Applied Mathematical Sciences Institute
 
A new Perron-Frobenius theorem for nonnegative tensors
A new Perron-Frobenius theorem for nonnegative tensorsA new Perron-Frobenius theorem for nonnegative tensors
A new Perron-Frobenius theorem for nonnegative tensors
Francesco Tudisco
 

What's hot (20)

Dsp3
Dsp3Dsp3
Dsp3
 
Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...
 
Precomputation for SMC-ABC with undirected graphical models
Precomputation for SMC-ABC with undirected graphical modelsPrecomputation for SMC-ABC with undirected graphical models
Precomputation for SMC-ABC with undirected graphical models
 
Stein's method for functional Poisson approximation
Stein's method for functional Poisson approximationStein's method for functional Poisson approximation
Stein's method for functional Poisson approximation
 
Final PhD Seminar
Final PhD SeminarFinal PhD Seminar
Final PhD Seminar
 
Connection between inverse problems and uncertainty quantification problems
Connection between inverse problems and uncertainty quantification problemsConnection between inverse problems and uncertainty quantification problems
Connection between inverse problems and uncertainty quantification problems
 
2. polynomial interpolation
2. polynomial interpolation2. polynomial interpolation
2. polynomial interpolation
 
Small updates of matrix functions used for network centrality
Small updates of matrix functions used for network centralitySmall updates of matrix functions used for network centrality
Small updates of matrix functions used for network centrality
 
Spline Interpolation
Spline InterpolationSpline Interpolation
Spline Interpolation
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
 
QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...
QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...
QMC: Transition Workshop - Probability Models for Discretization Uncertainty ...
 
BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...
BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...
BEADS : filtrage asymétrique de ligne de base (tendance) et débruitage pour d...
 
First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...
First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...
First-Order Methods for Nonsmooth Nonconvex Optimization - Applications in Im...
 
talk MCMC & SMC 2004
talk MCMC & SMC 2004talk MCMC & SMC 2004
talk MCMC & SMC 2004
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
cswiercz-general-presentation
cswiercz-general-presentationcswiercz-general-presentation
cswiercz-general-presentation
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)
 
sada_pres
sada_pressada_pres
sada_pres
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
A new Perron-Frobenius theorem for nonnegative tensors
A new Perron-Frobenius theorem for nonnegative tensorsA new Perron-Frobenius theorem for nonnegative tensors
A new Perron-Frobenius theorem for nonnegative tensors
 

Similar to Reachability Analysis via Net Structure

Optimised Calculation of Symmetries for State Space Reduction
Optimised Calculation of Symmetries for State Space ReductionOptimised Calculation of Symmetries for State Space Reduction
Optimised Calculation of Symmetries for State Space Reduction
Universität Rostock
 
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Alexander Litvinenko
 
Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...
Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...
Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...
Boris Fackovec
 
Damiano Pasetto
Damiano PasettoDamiano Pasetto
SIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithmsSIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithms
Jagadeeswaran Rathinavel
 
11_winter_lecture-2023-2024————————-.pdf
11_winter_lecture-2023-2024————————-.pdf11_winter_lecture-2023-2024————————-.pdf
11_winter_lecture-2023-2024————————-.pdf
rachabekhouche
 
Adaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte CarloAdaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte Carlo
Christian Robert
 
Ece formula sheet
Ece formula sheetEce formula sheet
Ece formula sheet
Manasa Mona
 
Pinning and facetting in multiphase LBMs
Pinning and facetting in multiphase LBMsPinning and facetting in multiphase LBMs
Pinning and facetting in multiphase LBMs
Tim Reis
 
Determination of the Probability Size Distribution of Solid Particles in a Te...
Determination of the Probability Size Distribution of Solid Particles in a Te...Determination of the Probability Size Distribution of Solid Particles in a Te...
Determination of the Probability Size Distribution of Solid Particles in a Te...
Crimsonpublishers-Mechanicalengineering
 
Epidemic processes on switching networks
Epidemic processes on switching networksEpidemic processes on switching networks
Epidemic processes on switching networks
Naoki Masuda
 
QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...
QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...
QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...
The Statistical and Applied Mathematical Sciences Institute
 
Data sparse approximation of Karhunen-Loeve Expansion
Data sparse approximation of Karhunen-Loeve ExpansionData sparse approximation of Karhunen-Loeve Expansion
Data sparse approximation of Karhunen-Loeve Expansion
Alexander Litvinenko
 
Slides
SlidesSlides
Data sparse approximation of the Karhunen-Loeve expansion
Data sparse approximation of the Karhunen-Loeve expansionData sparse approximation of the Karhunen-Loeve expansion
Data sparse approximation of the Karhunen-Loeve expansion
Alexander Litvinenko
 
cheb_conf_aksenov.pdf
cheb_conf_aksenov.pdfcheb_conf_aksenov.pdf
cheb_conf_aksenov.pdf
Alexey Vasyukov
 
Efficient Volume and Edge-Skeleton Computation for Polytopes Given by Oracles
Efficient Volume and Edge-Skeleton Computation for Polytopes Given by OraclesEfficient Volume and Edge-Skeleton Computation for Polytopes Given by Oracles
Efficient Volume and Edge-Skeleton Computation for Polytopes Given by Oracles
Vissarion Fisikopoulos
 
CDT 22 slides.pdf
CDT 22 slides.pdfCDT 22 slides.pdf
CDT 22 slides.pdf
Christian Robert
 
CoopLoc Technical Presentation
CoopLoc Technical PresentationCoopLoc Technical Presentation
CoopLoc Technical Presentation
Nikos Fasarakis-Hilliard
 
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Varad Meru
 

Similar to Reachability Analysis via Net Structure (20)

Optimised Calculation of Symmetries for State Space Reduction
Optimised Calculation of Symmetries for State Space ReductionOptimised Calculation of Symmetries for State Space Reduction
Optimised Calculation of Symmetries for State Space Reduction
 
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
 
Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...
Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...
Gradient Dynamical Systems, Bifurcation Theory, Numerical Methods and Applica...
 
Damiano Pasetto
Damiano PasettoDamiano Pasetto
Damiano Pasetto
 
SIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithmsSIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithms
 
11_winter_lecture-2023-2024————————-.pdf
11_winter_lecture-2023-2024————————-.pdf11_winter_lecture-2023-2024————————-.pdf
11_winter_lecture-2023-2024————————-.pdf
 
Adaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte CarloAdaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte Carlo
 
Ece formula sheet
Ece formula sheetEce formula sheet
Ece formula sheet
 
Pinning and facetting in multiphase LBMs
Pinning and facetting in multiphase LBMsPinning and facetting in multiphase LBMs
Pinning and facetting in multiphase LBMs
 
Determination of the Probability Size Distribution of Solid Particles in a Te...
Determination of the Probability Size Distribution of Solid Particles in a Te...Determination of the Probability Size Distribution of Solid Particles in a Te...
Determination of the Probability Size Distribution of Solid Particles in a Te...
 
Epidemic processes on switching networks
Epidemic processes on switching networksEpidemic processes on switching networks
Epidemic processes on switching networks
 
QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...
QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...
QMC: Operator Splitting Workshop, A New (More Intuitive?) Interpretation of I...
 
Data sparse approximation of Karhunen-Loeve Expansion
Data sparse approximation of Karhunen-Loeve ExpansionData sparse approximation of Karhunen-Loeve Expansion
Data sparse approximation of Karhunen-Loeve Expansion
 
Slides
SlidesSlides
Slides
 
Data sparse approximation of the Karhunen-Loeve expansion
Data sparse approximation of the Karhunen-Loeve expansionData sparse approximation of the Karhunen-Loeve expansion
Data sparse approximation of the Karhunen-Loeve expansion
 
cheb_conf_aksenov.pdf
cheb_conf_aksenov.pdfcheb_conf_aksenov.pdf
cheb_conf_aksenov.pdf
 
Efficient Volume and Edge-Skeleton Computation for Polytopes Given by Oracles
Efficient Volume and Edge-Skeleton Computation for Polytopes Given by OraclesEfficient Volume and Edge-Skeleton Computation for Polytopes Given by Oracles
Efficient Volume and Edge-Skeleton Computation for Polytopes Given by Oracles
 
CDT 22 slides.pdf
CDT 22 slides.pdfCDT 22 slides.pdf
CDT 22 slides.pdf
 
CoopLoc Technical Presentation
CoopLoc Technical PresentationCoopLoc Technical Presentation
CoopLoc Technical Presentation
 
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
 

More from Universität Rostock

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
Universität Rostock
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
Universität Rostock
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
Universität Rostock
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
Universität Rostock
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
Universität Rostock
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
Universität Rostock
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
Universität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
Universität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
Universität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
Universität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
Universität Rostock
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
Universität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
Universität Rostock
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
Universität Rostock
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
Universität Rostock
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
Universität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Universität Rostock
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
Universität Rostock
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Universität Rostock
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
Universität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 

Reachability Analysis via Net Structure

  • 1. Reachability Analysis via Net Structure HARRO WIMMEL, KARSTEN WOLF Universität Rostock, Institut für Informatik 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 1 / 13
  • 2. Overview Basic Definitions Reachability Problem State Equation & Constraints Solving the Reachability Problem using CEGAR The Search Space Example Looking for Constraints Finding Partial Solutions The Algorithm Experimental Results 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 2 / 13
  • 3. Basic Definitions Reachability Problem Petri nets should be well-known. • (N, m, m ) is a reachability problem; answer “yes” if m[σ N m for some firing sequence σ ∈ T∗ • N = (S, T, F) Petri net, m, m ∈ NS markings • m = m + Cx is the state equation • C incidence matrix, x ∈ NT transition vector (solution) • from m[σ m follows m = m + C℘(σ), i.e. the Parikh image ℘(σ) solves the state equation • necessary condition for reachability • ℘(σ) = x is T-invariant if Cx = 0, i.e. m[σ m 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 3 / 13
  • 4. Basic Definitions Reachability Problem Petri nets should be well-known. • (N, m, m ) is a reachability problem; answer “yes” if m[σ N m for some firing sequence σ ∈ T∗ • N = (S, T, F) Petri net, m, m ∈ NS markings • m = m + Cx is the state equation • C incidence matrix, x ∈ NT transition vector (solution) • from m[σ m follows m = m + C℘(σ), i.e. the Parikh image ℘(σ) solves the state equation • necessary condition for reachability • ℘(σ) = x is T-invariant if Cx = 0, i.e. m[σ m 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 3 / 13
  • 5. Basic Definitions Reachability Problem Petri nets should be well-known. • (N, m, m ) is a reachability problem; answer “yes” if m[σ N m for some firing sequence σ ∈ T∗ • N = (S, T, F) Petri net, m, m ∈ NS markings • m = m + Cx is the state equation • C incidence matrix, x ∈ NT transition vector (solution) • from m[σ m follows m = m + C℘(σ), i.e. the Parikh image ℘(σ) solves the state equation • necessary condition for reachability • ℘(σ) = x is T-invariant if Cx = 0, i.e. m[σ m 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 3 / 13
  • 6. Basic Definitions State Equation & Constraints • The solution space of the state equation m = m + Cx is semilinear • ∃ finite B, P ⊆ NT : m = m + Cx ⇐⇒ x = b + i ni pi for some b ∈ B, pi ∈ P, ni ∈ N • IP solver, e.g. lp_solve, yields “minimal” solution • Discrimination of solutions by adding constraints (CEGAR) • “jump”: t < n with t ∈ T, n ∈ N • ”increment”: k i=1 ni ti ≥ n with ti ∈ T, ni , n ∈ N • jumps for other minimal solutions, increments for addition of T-invariants 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 4 / 13
  • 7. Basic Definitions State Equation & Constraints • The solution space of the state equation m = m + Cx is semilinear • ∃ finite B, P ⊆ NT : m = m + Cx ⇐⇒ x = b + i ni pi for some b ∈ B, pi ∈ P, ni ∈ N • IP solver, e.g. lp_solve, yields “minimal” solution • Discrimination of solutions by adding constraints (CEGAR) • “jump”: t < n with t ∈ T, n ∈ N • ”increment”: k i=1 ni ti ≥ n with ti ∈ T, ni , n ∈ N • jumps for other minimal solutions, increments for addition of T-invariants 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 4 / 13
  • 8. Basic Definitions State Equation & Constraints • The solution space of the state equation m = m + Cx is semilinear • ∃ finite B, P ⊆ NT : m = m + Cx ⇐⇒ x = b + i ni pi for some b ∈ B, pi ∈ P, ni ∈ N • IP solver, e.g. lp_solve, yields “minimal” solution • Discrimination of solutions by adding constraints (CEGAR) • “jump”: t < n with t ∈ T, n ∈ N • ”increment”: k i=1 ni ti ≥ n with ti ∈ T, ni , n ∈ N • jumps for other minimal solutions, increments for addition of T-invariants 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 4 / 13
  • 9. The Search Space b 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 5 / 13
  • 10. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 11. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f 3× 3× 3× Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 12. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f 3× 3× 3× Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 13. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 Constraints: b2 ≥ 1 (oder a1 < 3) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 14. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f 2× 2× 3× 1× 1× 1× Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 Constraints: b2 ≥ 1 (oder a1 < 3) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 15. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 Constraints: b2 ≥ 1 (oder a1 < 3), c1 ≥ 1 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 16. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f 2× 2× 3× 1× 1× 1× 1× 1× Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 2a1+2a2+b1+b2+b3+c1+c2+3 Constraints: b2 ≥ 1 (oder a1 < 3), c1 ≥ 1 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 17. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 2a1+2a2+b1+b2+b3+c1+c2+3 Constraints: b2 ≥ 1 (oder a1 < 3), c1 ≥ 1, b2 ≥ 2 (oder a1 < 2) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 18. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f 1× 1× 3× 2× 2× 2× 1× 1× Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 2a1+2a2+b1+b2+b3+c1+c2+3 a1+a2+2b1+2b2+2b3+c1+c2+3 Constraints: b2 ≥ 1 (oder a1 < 3), c1 ≥ 1, b2 ≥ 2 (oder a1 < 2) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 19. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 2a1+2a2+b1+b2+b3+c1+c2+3 a1+a2+2b1+2b2+2b3+c1+c2+3 Constraints: b2 ≥ 1 (oder a1 < 3), c1 ≥ 1, b2 ≥ 2 (oder a1 < 2), b2 ≥ 3 (oder a1 < 1) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 20. An Example s a1 b1 x1 y1 c1 b2 z y2 c2 b3 x2a2 f3× 3× 3× 3× 1× 1× Final marking: s + 3f State Equation’s Solutions: 3a1 +3a2 +3 2a1 +2a2 +b1 +b2 +b3 +3 2a1+2a2+b1+b2+b3+c1+c2+3 a1+a2+2b1+2b2+2b3+c1+c2+3 3b1 +3b2 +3b3 +c1 +c2 +3 Constraints: b2 ≥ 1 (oder a1 < 3), c1 ≥ 1, b2 ≥ 2 (oder a1 < 2), b2 ≥ 3 (oder a1 < 1) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 6 / 13
  • 21. Looking for Constraints Building a graph Take a firing sequence σ and a solution x of the state equation m = m +Cx with • ℘(σ) ≤ x, • ∀t ∈ T: x(t) > ℘(σ)(t) =⇒ ¬m[σt We call σ a partial solution. Now build a graph G of: • transitions t with x(t) > ℘(σ)(t) • places s inhibiting the firing of such a t (after σ) • an edge from s to t if s inhibits t • an edge from t to s if t increases token count on s 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 7 / 13
  • 22. Looking for Constraints Finding Components Get all strongly connected components (SCC) of G which have no incoming edges (source SCCs). Places in such SCCs cannot be marked from “inside” the graph, so tokens must come from the outside. =⇒ Constraint use transitions that can put tokens onto a source SCC (left side of the constraint). How many tokens to produce? (right side of the constraint) • a complex problem (esp. if x(t) − ℘(σ)(t) > 1 and nets have multiarcs) • approximation necessary • repeated increase of the constraints by 1 token is possible 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 8 / 13
  • 23. Finding Partial Solutions • Tree of all potential firing sequences for x from m = m + Cx • tree is finite, brute-force search possible • depth-first-search • enumerate partial solutions and build constraints • Optimisations • stubborn-set method (partial order reduction) • additional confluence tests for x(t) − ℘(σ)(t) > n • backtracking at repeated markings on a path • ineffective constraints (σ is partial solution for x + y with σ = σ or ℘(σ ) = ℘(σ) + y with y a T-invariant) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 9 / 13
  • 24. Finding Partial Solutions • Tree of all potential firing sequences for x from m = m + Cx • tree is finite, brute-force search possible • depth-first-search • enumerate partial solutions and build constraints • Optimisations • stubborn-set method (partial order reduction) • additional confluence tests for x(t) − ℘(σ)(t) > n • backtracking at repeated markings on a path • ineffective constraints (σ is partial solution for x + y with σ = σ or ℘(σ ) = ℘(σ) + y with y a T-invariant) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 9 / 13
  • 25. The Algorithm / Conclusion • Get solution of the state equation using an IP solver • Get partial solutions (maximal firing sequences), stop if full solution • Find constraints for partial solutions • (Multiple) calls to algorithm with state equation + constraints Conclusion: • Positive answer is found (use “jumps” for a complete search), except in case of insufficient memory; witness path is found • Negative answer can be found if state equation is infeasible or if backtracking for ineffective constraints makes search space finite; diagnosis possible • Extensions possible, e.g. state inequations 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 10 / 13
  • 26. Experimental Results Implementation in a tool named “Sara”. • Garavel’s challenge (LOTOS specification): 485 places, 776 transitions, test for dead transitions • (Cygwin/Linux) 26/41 sec. (LoLA: 71/29 sec. + separation by hand) • path length (medium/max) 15/28 (LoLA: 53/6232) • SAP reference nets (business processes): 590 nets, test for relaxed soundness • (Cygwin/Linux) 198/110 sec. (LoLA: 24 min. + 17 unsolved) • Boolean programs: a few nets, coverability test • <1 second (LoLA: 1 problem with memory overflow (>32GB)) • Spezialized nets with increasing edge weights (self-constructed) • Sara loses time exponentially compared to LoLA (always <3 sec.) 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 11 / 13
  • 27. M. Berkelaar, K. Eikland, P. Notebaert: Lp solve Reference Guide, http://lpsolve.sourceforge.net/5.5/, 2010. H. Garavel: Efficient Petri Net tool for computing quasi-liveness, http://www.informatik.uni-hamburg.de/cgi-bin/TGI/pnml/getpost ?id=2003/07/2709, 2003. L.M. Kristensen, K. Schmidt, A. Valmari: Question-guided Stubborn Set Methods for State Properties, Formal Methods in System Design 29:3, pp.215–251, Springer, 2006. E. Mayr: An algorithm for the general Petri net reachability problem, SIAM Journal of Computing 13:3, pp.441–460, 1984. H. Wimmel: Sara – Structures for Automated Reachability Analysis, http://www.informatik.uni-rostock.de/∼nl/wiki/tools/download, 2010. K. Wolf: LoLA – A low level analyzer, http://www.informatik.uni- rostock.de/∼nl/wiki/tools/lola, 2010. 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 12 / 13
  • 28. Thanks for Your Attention! 8. Oktober 2010 c 2010 UNIVERSITÄT ROSTOCK | FAKULTÄT FÜR INFORMATIK & ELEKTROTECHNIK, INSTITUT FÜR INFORMATIK 13 / 13