SlideShare a Scribd company logo
1 of 14
Download to read offline
Olivia Oanea, 
                     Harro Wimmel, 
                     Karsten Wolf


New Algorithms for Deciding the
    Siphon/Trap Property 
Situation
-Siphon:       •D ⊆ D•           once empty, always empty
-Trap:         Q• ⊆ •Q           once marked, always marked

-The siphon/trap property: Every Siphon includes a marked trap

   -Necessary and sufficient for liveness in free choice nets
   -Sufficient for deadlock freedom in ordinary nets

-There can be exponentially many (even minimal) siphons


  Brute force algorithms don‘t outperform state space methods

We propose
       - a reduction to SAT (2 slides)
       - a divide-and-conquer scheme (remaining slides)
                 Karsten Wolf: New Algorithms for Deciding 
                         the Siphon/Trap Property
Reduction to SAT
                                                             q1
                   p1                                                     Siphon: (q1⋁q2⋁q3)⇒(p1⋁p2)
Well known:                                                  q2
                   p2                                                      Trap:      (p1⋁p2)⇒(q1⋁q2⋁q3)
                                                             q3


        SAT: Exists satisfying assignment?

 Siphon/trap: Exists siphon where all included traps are unmarked?
 Siphon/trap: Exists siphon where the maximal included trap is unmarked?

Maximal trap: start with S, iteratively remove places p where:
                                                                                                  p
                                  Copy place variables p(0) .. p(n)



 ⋀ t∈T(t•
            (0)⇒•t(0))⋀   ⋁
                          p∈P   p(0) ⋀⋀ ⋀i=1..n    p∈P(p
                                                           (i)⇔(p(i-1)⋀   ⋀  t∈p•t•       ⋀
                                                                                   (i-1)))⋀
                                                                                              p∈P,m0(p)>0⌝p
                                                                                                              (n)




                                     Karsten Wolf: New Algorithms for Deciding 
                                             the Siphon/Trap Property
Results

Net      |P|    |T|                   |F|                    SAT    INA
Ph10     50     40                    120                    0.05   3
Ph20     100    80                    240                    0.24   >7200
Ph200    1000   800                   2400                   119    >7200
Data10   50     40                    300                    0.12   8
Data15   75     60                    600                    0.36   28




                Karsten Wolf: New Algorithms for Deciding 
                        the Siphon/Trap Property
Divide and Conquer
-Decompose Petri net into open nets
-Compute siphons and traps of atomic components
-Condense information into interface
-Unify components and update interface information


                           -Interface place: ≤1 producing, ≤1 consuming component

                           -Composition of components yields component

                           -[Zaitsev] There exists unique decomposition into
                             atomic components

                           - [We] run-time O(n2log*n)




                            Karsten Wolf: New Algorithms for Deciding 
                                    the Siphon/Trap Property
Examples




Karsten Wolf: New Algorithms for Deciding 
        the Siphon/Trap Property
Improvement




-Preserves siphon/trap property
-Permits arbitrarily fine decomposition
                              Karsten Wolf: New Algorithms for Deciding 
                                      the Siphon/Trap Property
Siphons/Traps and components
-Siphon/trap of composition decomposes into siphons/traps of components
-Siphons/traps of components with equal interface compose to siphon/trap in
composition




                    Siphon              Siphon



          Siphon             Siphon




                          Karsten Wolf: New Algorithms for Deciding 
                                  the Siphon/Trap Property
Example




Karsten Wolf: New Algorithms for Deciding 
        the Siphon/Trap Property
Elementary Siphons/Traps
-Siphon is elementary if it is a minimal one containing p, for some interface place p
-Trap is elementary if it is a minimal one containing p,
                      for some interface place p, or some marked place p

Lemma: For evaluating the siphon/trap property, sufficient to consider
       - siphons that are local to one of the components
       - unions of elementary siphons and unions of elementary traps

Idea: Store
         - interfaces of elementary traps and siphons
         - For each elementary trap Q:
                   all minimal unions of elementary siphons that wrap Q

                                1: (a-min) a                   (a-min) ac ⊆ 3
 a                       c      2: (b-min) b                   (a-min) ad ⊆ 5
                                3: (c-min) ac                  (b-min) bc ⊆ 4
                                4: (c-min) bc                  (b-min) bd ⊆ 6
b                        d      5: (d-min) ad                  (c-min) c ⊆ 3,4
                                6: (d-min) bd                  (d-min) d ⊆ 5,6
                               Karsten Wolf: New Algorithms for Deciding 
                                       the Siphon/Trap Property
Composition 1: closed siphons
                                           c
                   a



                   b                       d

1: (a-min) a      (a-min) ac* ⊆ 3                       1‘: (c-min) c         (c-min) ca* ⊆ 3‘
2: (b-min) b      (a-min) ad ⊆ 5                        2‘: (d-min) d         (c-min) cb* ⊆ 5‘
3: (c-min) ac     (b-min) bc* ⊆ 4                       3‘: (a-min) ca        (d-min) da ⊆ 4‘
4: (c-min) bc     (b-min) bd ⊆ 6                        4‘: (a-min) da        (d-min) db ⊆ 6‘
5: (d-min) ad     (c-min) c* ⊆ 3,4                      5‘: (b-min) cb        (a-min) a ⊆ 3‘,4‘
6: (d-min) bd     (d-min) d ⊆ 5,6                       6‘: (b-min) db        (b-min) b ⊆ 5‘,6‘

        Check 3⊕3‘: contains ac*⊕ca*    … ok
        …
        Check 6⊕6‘: contains only unmarked traps                  …. Not ok

                       Formally: SAT formula
                           Karsten Wolf: New Algorithms for Deciding 
                                   the Siphon/Trap Property
Composition 2: open siphons
                                            c
                     a
                                                                            e


                    b                       d                               f

1: (a-min) a       (a-min) ac ⊆ 3                        1‘: (c-min) c          (c-min) ce ⊆ 3‘
2: (b-min) b       (a-min) ad ⊆ 5                        2‘: (d-min) d          (c-min) cf ⊆ 5‘
3: (c-min) ac      (b-min) bc ⊆ 4                        3‘: (e-min) ce         (d-min) de ⊆ 4‘
4: (c-min) bc      (b-min) bd ⊆ 6                        4‘: (e-min) de         (d-min) df ⊆ 6‘
5: (d-min) ad      (c-min) c ⊆ 3,4                       5‘: (f-min) cf         (e-min) e ⊆ 3‘,4‘
6: (d-min) bd      (d-min) d ⊆ 5,6                       6‘: (f-min) df         (f-min) f ⊆ 5‘,6‘
          1‘‘ = 1: (a-min) a                      (a-min) ae ⊆ 3‘‘,4‘‘5‘‘
          2‘‘ = 1: (b-min) b                      (a-min) af ⊆ 5‘‘,3‘‘6‘‘
          3‘‘= 3‘⊕3 = 4‘⊕5: (e-min) ae            (b-min) be ⊆ 4‘‘,3‘‘6‘‘
          4‘‘= 3‘⊕4 = 4‘⊕6: (e-min) be            (b-min) bf ⊆ 6. 4‘‘5‘‘
          5‘‘= 5‘⊕3 = 6‘⊕5: (f-min) af            (e-min) e ⊆ 3‘‘,4‘‘
          6‘‘= 5‘⊕4 = 6‘⊕6: (f-min) bf            (f-min) f ⊆ 5‘‘,6‘‘
                            Karsten Wolf: New Algorithms for Deciding 
                                    the Siphon/Trap Property
Results
Approach exponential, but mostly in the size of the interface


 Example:




-Exponentially many minimal siphons
-Linear time in our approach


                           Karsten Wolf: New Algorithms for Deciding 
                                   the Siphon/Trap Property
Conclusion
Algorithm 1: Reduction to SAT
-Boolean formula polynomial in the size of the net
-Inherits efficiency from existing SAT technology


Algorithm 2: Divide & Conquer
-Efficient decomposition into arbitrarily small components
-Siphons and traps are preserved in open net decomposition
-Abstract shared siphon/trap information to interface
-Works well if
     -net can be split according to small interfaces
     -Net has many identical components




                        Karsten Wolf: New Algorithms for Deciding 
                                the Siphon/Trap Property

More Related Content

What's hot

Estimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAMEstimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAMtakuyayamamoto1800
 
An evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsAn evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsLinaro
 
Summary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.enSummary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.enAda Darmon
 
Quadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitterQuadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitterAsaad Drake
 
Presentation final
Presentation finalPresentation final
Presentation finalKate Lu
 
Random Number Generators 2018
Random Number Generators 2018Random Number Generators 2018
Random Number Generators 2018rinnocente
 
Crabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelCrabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelJean-Marie Mudry
 
Module 13 Gradient And Area Under A Graph
Module 13  Gradient And Area Under A GraphModule 13  Gradient And Area Under A Graph
Module 13 Gradient And Area Under A Graphguestcc333c
 
Building Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and ManifoldsBuilding Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and ManifoldsDavide Eynard
 
Siddhartha fft pptx
Siddhartha fft pptxSiddhartha fft pptx
Siddhartha fft pptxSIDDHARTHA V
 

What's hot (20)

Power spectral density
Power spectral densityPower spectral density
Power spectral density
 
Estimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAMEstimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAM
 
Matched filter
Matched filterMatched filter
Matched filter
 
An evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsAn evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loops
 
Summary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.enSummary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.en
 
Quadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitterQuadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitter
 
Presentation final
Presentation finalPresentation final
Presentation final
 
Bao ctics 2012
Bao ctics 2012Bao ctics 2012
Bao ctics 2012
 
Random Number Generators 2018
Random Number Generators 2018Random Number Generators 2018
Random Number Generators 2018
 
1111
11111111
1111
 
Rf2008 test 1
Rf2008 test 1Rf2008 test 1
Rf2008 test 1
 
Realizing milti-hit-ray
Realizing milti-hit-rayRealizing milti-hit-ray
Realizing milti-hit-ray
 
Crabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelCrabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic model
 
6th Semester (June; July-2014) Electronics and Communication Engineering Ques...
6th Semester (June; July-2014) Electronics and Communication Engineering Ques...6th Semester (June; July-2014) Electronics and Communication Engineering Ques...
6th Semester (June; July-2014) Electronics and Communication Engineering Ques...
 
Graph Kernelpdf
Graph KernelpdfGraph Kernelpdf
Graph Kernelpdf
 
Gsm attacks
Gsm attacksGsm attacks
Gsm attacks
 
Module 13 Gradient And Area Under A Graph
Module 13  Gradient And Area Under A GraphModule 13  Gradient And Area Under A Graph
Module 13 Gradient And Area Under A Graph
 
Building Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and ManifoldsBuilding Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and Manifolds
 
NASA 2004 PP
NASA 2004 PPNASA 2004 PP
NASA 2004 PP
 
Siddhartha fft pptx
Siddhartha fft pptxSiddhartha fft pptx
Siddhartha fft pptx
 

Viewers also liked

Viewers also liked (6)

Syphon
SyphonSyphon
Syphon
 
Hydraulic structures
Hydraulic structuresHydraulic structures
Hydraulic structures
 
Turbulent flow
Turbulent flowTurbulent flow
Turbulent flow
 
Cross Drainage Works
Cross Drainage WorksCross Drainage Works
Cross Drainage Works
 
Centrifugal pump
Centrifugal pumpCentrifugal pump
Centrifugal pump
 
Reynold number (Fluid Mechanics)(FM)
Reynold number (Fluid Mechanics)(FM)Reynold number (Fluid Mechanics)(FM)
Reynold number (Fluid Mechanics)(FM)
 

Similar to Siphon

Data made out of functions
Data made out of functionsData made out of functions
Data made out of functionskenbot
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Yandex
 
射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介Simen Li
 
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...gigax2
 
Strong functional programming
Strong functional programmingStrong functional programming
Strong functional programmingEric Torreborre
 
An automated and user-friendly optical tweezers for biomolecular investigat...
An automated and user-friendly optical  tweezers for biomolecular  investigat...An automated and user-friendly optical  tweezers for biomolecular  investigat...
An automated and user-friendly optical tweezers for biomolecular investigat...Dr. Pranav Rathi
 
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationSOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationDon Sheehy
 
Yampa AFRP Introduction
Yampa AFRP IntroductionYampa AFRP Introduction
Yampa AFRP IntroductionChengHui Weng
 
Introduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCDIntroduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCDChristos Kallidonis
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...Alex Pruden
 
Analysis of T-Beam
Analysis of T-BeamAnalysis of T-Beam
Analysis of T-Beam01008828934
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Simen Li
 
Falzon Das Se Ag Compressed
Falzon Das Se Ag CompressedFalzon Das Se Ag Compressed
Falzon Das Se Ag Compressedgfalzon2
 
Math resources trigonometric_formulas
Math resources trigonometric_formulasMath resources trigonometric_formulas
Math resources trigonometric_formulasEr Deepak Sharma
 
Math resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12thMath resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12thDeepak Kumar
 
MOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDFMOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDFTsuyoshi Horigome
 

Similar to Siphon (20)

Data made out of functions
Data made out of functionsData made out of functions
Data made out of functions
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks
 
射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介
 
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...
 
Strong functional programming
Strong functional programmingStrong functional programming
Strong functional programming
 
An automated and user-friendly optical tweezers for biomolecular investigat...
An automated and user-friendly optical  tweezers for biomolecular  investigat...An automated and user-friendly optical  tweezers for biomolecular  investigat...
An automated and user-friendly optical tweezers for biomolecular investigat...
 
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationSOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
 
Yampa AFRP Introduction
Yampa AFRP IntroductionYampa AFRP Introduction
Yampa AFRP Introduction
 
draft5
draft5draft5
draft5
 
Introduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCDIntroduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCD
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
Analysis of T-Beam
Analysis of T-BeamAnalysis of T-Beam
Analysis of T-Beam
 
Chris Sherlock's slides
Chris Sherlock's slidesChris Sherlock's slides
Chris Sherlock's slides
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1]
 
Falzon Das Se Ag Compressed
Falzon Das Se Ag CompressedFalzon Das Se Ag Compressed
Falzon Das Se Ag Compressed
 
Cs262 2006 lecture6
Cs262 2006 lecture6Cs262 2006 lecture6
Cs262 2006 lecture6
 
economics
economicseconomics
economics
 
Math resources trigonometric_formulas
Math resources trigonometric_formulasMath resources trigonometric_formulas
Math resources trigonometric_formulas
 
Math resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12thMath resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12th
 
MOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDFMOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDF
 

More from Universität Rostock

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsUniversität Rostock
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography RealizationUniversität Rostock
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMNUniversität Rostock
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationUniversität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAUniversität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesUniversität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAUniversität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionUniversität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageUniversität Rostock
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for ServicesUniversität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumUniversität Rostock
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAUniversität Rostock
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaUniversität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Siphon

  • 1. Olivia Oanea,  Harro Wimmel,  Karsten Wolf New Algorithms for Deciding the Siphon/Trap Property 
  • 2. Situation -Siphon: •D ⊆ D• once empty, always empty -Trap: Q• ⊆ •Q once marked, always marked -The siphon/trap property: Every Siphon includes a marked trap -Necessary and sufficient for liveness in free choice nets -Sufficient for deadlock freedom in ordinary nets -There can be exponentially many (even minimal) siphons Brute force algorithms don‘t outperform state space methods We propose - a reduction to SAT (2 slides) - a divide-and-conquer scheme (remaining slides) Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 3. Reduction to SAT q1 p1 Siphon: (q1⋁q2⋁q3)⇒(p1⋁p2) Well known: q2 p2 Trap: (p1⋁p2)⇒(q1⋁q2⋁q3) q3 SAT: Exists satisfying assignment? Siphon/trap: Exists siphon where all included traps are unmarked? Siphon/trap: Exists siphon where the maximal included trap is unmarked? Maximal trap: start with S, iteratively remove places p where: p Copy place variables p(0) .. p(n) ⋀ t∈T(t• (0)⇒•t(0))⋀ ⋁ p∈P p(0) ⋀⋀ ⋀i=1..n p∈P(p (i)⇔(p(i-1)⋀ ⋀ t∈p•t• ⋀ (i-1)))⋀ p∈P,m0(p)>0⌝p (n) Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 4. Results Net |P| |T| |F| SAT INA Ph10 50 40 120 0.05 3 Ph20 100 80 240 0.24 >7200 Ph200 1000 800 2400 119 >7200 Data10 50 40 300 0.12 8 Data15 75 60 600 0.36 28 Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 5. Divide and Conquer -Decompose Petri net into open nets -Compute siphons and traps of atomic components -Condense information into interface -Unify components and update interface information -Interface place: ≤1 producing, ≤1 consuming component -Composition of components yields component -[Zaitsev] There exists unique decomposition into atomic components - [We] run-time O(n2log*n) Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 7. Improvement -Preserves siphon/trap property -Permits arbitrarily fine decomposition Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 8. Siphons/Traps and components -Siphon/trap of composition decomposes into siphons/traps of components -Siphons/traps of components with equal interface compose to siphon/trap in composition Siphon Siphon Siphon Siphon Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 10. Elementary Siphons/Traps -Siphon is elementary if it is a minimal one containing p, for some interface place p -Trap is elementary if it is a minimal one containing p, for some interface place p, or some marked place p Lemma: For evaluating the siphon/trap property, sufficient to consider - siphons that are local to one of the components - unions of elementary siphons and unions of elementary traps Idea: Store - interfaces of elementary traps and siphons - For each elementary trap Q: all minimal unions of elementary siphons that wrap Q 1: (a-min) a (a-min) ac ⊆ 3 a c 2: (b-min) b (a-min) ad ⊆ 5 3: (c-min) ac (b-min) bc ⊆ 4 4: (c-min) bc (b-min) bd ⊆ 6 b d 5: (d-min) ad (c-min) c ⊆ 3,4 6: (d-min) bd (d-min) d ⊆ 5,6 Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 11. Composition 1: closed siphons c a b d 1: (a-min) a (a-min) ac* ⊆ 3 1‘: (c-min) c (c-min) ca* ⊆ 3‘ 2: (b-min) b (a-min) ad ⊆ 5 2‘: (d-min) d (c-min) cb* ⊆ 5‘ 3: (c-min) ac (b-min) bc* ⊆ 4 3‘: (a-min) ca (d-min) da ⊆ 4‘ 4: (c-min) bc (b-min) bd ⊆ 6 4‘: (a-min) da (d-min) db ⊆ 6‘ 5: (d-min) ad (c-min) c* ⊆ 3,4 5‘: (b-min) cb (a-min) a ⊆ 3‘,4‘ 6: (d-min) bd (d-min) d ⊆ 5,6 6‘: (b-min) db (b-min) b ⊆ 5‘,6‘ Check 3⊕3‘: contains ac*⊕ca* … ok … Check 6⊕6‘: contains only unmarked traps …. Not ok Formally: SAT formula Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 12. Composition 2: open siphons c a e b d f 1: (a-min) a (a-min) ac ⊆ 3 1‘: (c-min) c (c-min) ce ⊆ 3‘ 2: (b-min) b (a-min) ad ⊆ 5 2‘: (d-min) d (c-min) cf ⊆ 5‘ 3: (c-min) ac (b-min) bc ⊆ 4 3‘: (e-min) ce (d-min) de ⊆ 4‘ 4: (c-min) bc (b-min) bd ⊆ 6 4‘: (e-min) de (d-min) df ⊆ 6‘ 5: (d-min) ad (c-min) c ⊆ 3,4 5‘: (f-min) cf (e-min) e ⊆ 3‘,4‘ 6: (d-min) bd (d-min) d ⊆ 5,6 6‘: (f-min) df (f-min) f ⊆ 5‘,6‘ 1‘‘ = 1: (a-min) a (a-min) ae ⊆ 3‘‘,4‘‘5‘‘ 2‘‘ = 1: (b-min) b (a-min) af ⊆ 5‘‘,3‘‘6‘‘ 3‘‘= 3‘⊕3 = 4‘⊕5: (e-min) ae (b-min) be ⊆ 4‘‘,3‘‘6‘‘ 4‘‘= 3‘⊕4 = 4‘⊕6: (e-min) be (b-min) bf ⊆ 6. 4‘‘5‘‘ 5‘‘= 5‘⊕3 = 6‘⊕5: (f-min) af (e-min) e ⊆ 3‘‘,4‘‘ 6‘‘= 5‘⊕4 = 6‘⊕6: (f-min) bf (f-min) f ⊆ 5‘‘,6‘‘ Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 13. Results Approach exponential, but mostly in the size of the interface Example: -Exponentially many minimal siphons -Linear time in our approach Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 14. Conclusion Algorithm 1: Reduction to SAT -Boolean formula polynomial in the size of the net -Inherits efficiency from existing SAT technology Algorithm 2: Divide & Conquer -Efficient decomposition into arbitrarily small components -Siphons and traps are preserved in open net decomposition -Abstract shared siphon/trap information to interface -Works well if -net can be split according to small interfaces -Net has many identical components Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property