Canonical Prefixes of Petri Net Unfoldings Walter Vogler Universität Augsburg in cooperation with V. Khomenko, M. Koutny (CAV 2002, Acta Informatica 2003)

Slides:



Advertisements
Similar presentations
Tintu David Joy. Agenda Motivation Better Verification Through Symmetry-basic idea Structural Symmetry and Multiprocessor Systems Mur ϕ verification system.
Advertisements

Great Theoretical Ideas in Computer Science for Some.
1 Decomposing Hypergraphs with Hypertrees Raphael Yuster University of Haifa - Oranim.
Modular Processings based on Unfoldings Eric Fabre & Agnes Madalinski DistribCom Team Irisa/Inria UFO workshop - June 26, 2007.
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
Generalization and Specialization of Kernelization Daniel Lokshtanov.
Pushdown Automata Chapter 12. Recognizing Context-Free Languages Two notions of recognition: (1) Say yes or no, just like with FSMs (2) Say yes or no,
A Novel Method For Fast Model Checking Project Report.
Determinization of Büchi Automata
Merged Processes of Petri nets Victor Khomenko Joint work with Alex Kondratyev, Maciej Koutny and Walter Vogler.
IE 469 Manufacturing Systems
Distributed Computing 8. Impossibility of consensus Shmuel Zaks ©
1 Towards formal manipulations of scenarios represented by High-level Message Sequence Charts Loïc Hélouet Claude Jard Benoît Caillaud IRISA/PAMPA (INRIA/CNRS/Univ.
Rational Learning Leads to Nash Equilibrium Ehud Kalai and Ehud Lehrer Econometrica, Vol. 61 No. 5 (Sep 1993), Presented by Vincent Mak
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
1 Introduction to Computability Theory Lecture3: Regular Expressions Prof. Amos Israeli.
A Semantic Characterization of Unbounded-Nondeterministic Abstract State Machines Andreas Glausch and Wolfgang Reisig 1.
Synthesis of Embedded Software Using Free-Choice Petri Nets.
1 Introduction to Computability Theory Lecture4: Regular Expressions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture3: Regular Expressions Prof. Amos Israeli.
Introduction to Computability Theory
1 Basic abstract interpretation theory. 2 The general idea §a semantics l any definition style, from a denotational definition to a detailed interpreter.
CPSC 668Set 4: Asynchronous Lower Bound for LE in Rings1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
The Mean Square Error (MSE):. Now, Examples: 1) 2)
Programming Language Semantics Denotational Semantics Chapter 5 Based on a lecture by Martin Abadi.
Transparency No Formal Language and Automata Theory Chapter 10 The Myhill-Nerode Theorem (lecture 15,16 and B)
Courtesy Costas Busch - RPI1 NPDAs Accept Context-Free Languages.
A general approximation technique for constrained forest problems Michael X. Goemans & David P. Williamson Presented by: Yonatan Elhanani & Yuval Cohen.
Hardware and Petri nets Partial order methods for analysis and verification of asynchronous circuits.
/k soundness of free-choice workflow nets 1 of 10 Soundness of Free Choice Workflow Nets K.M. van Hee, M. Voorhoeve Eindhoven Univ. Tech.
Behaviour-Preserving Transition Insertions in Unfolding Prefixes
Branching Processes of High-Level Petri Nets Victor Khomenko and Maciej Koutny University of Newcastle upon Tyne.
*Department of Computing Science University of Newcastle upon Tyne **Institut für Informatik, Universität Augsburg Canonical Prefixes of Petri Net Unfoldings.
Merged processes – a new condensed representation of Petri net behaviour V.Khomenko 1, A.Kondratyev 2, M.Koutny 1 and W.Vogler 3 1 University of Newcastle.
Programming Language Semantics Denotational Semantics Chapter 5 Part III Based on a lecture by Martin Abadi.
Environment Modeling in Quasi- Static Scheduling EE249 Project Donald Chai Mentors: Alex Kondratyev, Yoshi Watanabe.
HELSINKI UNIVERSITY OF TECHNOLOGY *Laboratory for Theoretical Computer Science Helsinki University of Technology **Department of Computing Science University.
Handouts Software Testing and Quality Assurance Theory and Practice Chapter 5 Data Flow Testing
Minimum Cost Binary Trees Speaker: Dana Moshkovitz.
15.082J, 6.855J, and ESD.78J September 21, 2010 Eulerian Walks Flow Decomposition and Transformations.
Sequences and Series (T) Students will know the form of an Arithmetic sequence.  Arithmetic Sequence: There exists a common difference (d) between each.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
Signed-Bit Representations of Real Numbers and the Constructive Stone-Yosida Theorem Robert S. Lubarsky and Fred Richman Florida Atlantic University.
Automatic Structures Bakhadyr Khoussainov Computer Science Department The University of Auckland, New Zealand.
Reading and Writing Mathematical Proofs Spring 2015 Lecture 4: Beyond Basic Induction.
The countable character of uncountable graphs François Laviolette Barbados 2003.
ECSE Software Engineering 1I HO 4 © HY 2012 Lecture 4 Formal Methods A Library System Specification (Continued) From Specification to Design.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
Behavioral Comparison of Process Models Based on Canonically Reduced Event Structures Paolo Baldan Marlon Dumas Luciano García Abel Armas.
CSCI1600: Embedded and Real Time Software Lecture 11: Modeling IV: Concurrency Steven Reiss, Fall 2015.
Yuval Peled, HUJI Joint work with Nati Linial, Benny Sudakov, Hao Huang and Humberto Naves.
Towards an Aspect-oriented Language Module: Aspects for Petri Nets Tim Molderez, Bart Meyers, Dirk Janssens and Hans Vangheluwe Ansymo Antwerp Systems.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
CS357 Lecture 13: Symbolic model checking without BDDs Alex Aiken David Dill 1.
Process Algebra (2IF45) Basic Process Algebra Dr. Suzana Andova.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Network Systems Lab. Korea Advanced Institute of Science and Technology No.1 Maximum Norms & Nonnegative Matrices  Weighted maximum norm e.g.) x1x1 x2x2.
Pushdown Automata Chapter 12. Recognizing Context-Free Languages Two notions of recognition: (1) Say yes or no, just like with FSMs (2) Say yes or no,
Formal verification of distance vector routing protocols.
Structural methods for synthesis of large specifications
Hans Bodlaender, Marek Cygan and Stefan Kratsch
Chapter 5. Optimal Matchings
James B. Orlin Presented by Tal Kaminker
Chap 9. General LP problems: Duality and Infeasibility
Instructor: Shengyu Zhang
CSE 311: Foundations of Computing
Resolution Proofs for Combinational Equivalence
CSE 311 Foundations of Computing I
Victor Khomenko and Andrey Mokhov
Software Testing and QA Theory and Practice (Chapter 5: Data Flow Testing) © Naik & Tripathy 1 Software Testing and Quality Assurance Theory and Practice.
Presentation transcript:

Canonical Prefixes of Petri Net Unfoldings Walter Vogler Universität Augsburg in cooperation with V. Khomenko, M. Koutny (CAV 2002, Acta Informatica 2003)

UFO 072 some concepts you know unfolding Unf of a Petri net (full branching process) C : set of (finite) configurations C loc : set of local configurations [e] with e  E is [e] without e if E’ is a suffix of C’, write C’  E’

UFO 073 McMillan: construct complete finite prefix of Unf stepwise; for cut-offs, compare configurations by size ERV:more abstract setting: compare with adequate order  ( e  f if [e]  [f] ) –ERV-algorithm constructs complete finite prefix

UFO 074 step: add  - minimal possible extension e declare cut-off if there is f in  with [f]  [e] & [e] and corresponding configuration [f] reach the same marking non-deterministic choice; different results? (maybe f exists in Unf, but not yet added to this  ) e f  f

UFO 075 it seems: prefix depends on algorithm and non-deterministic choices aim: define algorithm-independent canonical prefix application: (parallel) slicing algorithm [HKK 02] processes e.g. all  - minimal possible extensions together –original correctness proof: compares each run with ERV- algorithm –new: all runs (slicing, ERV) construct the canonical prefix

UFO 076 this approach in an even more general setting: cutting contexts canonical prefix finite and complete in ~ all such contexts

UFO 077 Overview cutting contexts canonical prefix completeness finiteness and König’s Lemma algorithmics a recent application (Khomenko ATPN 07)

UFO 078 cutting contexts – motivation parameter: adequate order parameter: corresponding configuration local or general or … (general configuration for minimised prefix) parameter: information to be represented –usually: marking, i.e. two configurations with the same marking are equivalent, one of them suffices –or: marking plus state vector (for asynchronous circuits, STGs) more information, finer equivalence –or: marking up to symmetries (smaller prefix) less information, coarser equivalence

UFO 079 cutting contexts – definition cutting context  = ( , , {C e } e  E ) where 1.for each event e  E of Unf, C e  C usually C e = C loc  is dense if C e  C loc 2.  is an equivalence on C 3.  is an adequate order, i.e. a well-founded strict partial order on C (no infinite decreasing sequence), refining  4.… preserved by finite extensions …

UFO 0710 cutting contexts – definition cutting context  = ( , , {C e } e  E ) where 4.  and  are preserved by finite extensions, i.e. whenever C’  C’’ and E’ is a suffix of C’, then there exists suffix E’’ such that a.C’’  E’’  C’  E’ (not needed in standard case) b.if C’’  C’, then C’’  E’’  C’  E’ (more general than standard case) standard: E’’ obtained from E’ by natural isomorphism

UFO 0711 canonical prefix simple idea: e cut-off if C  C e with C  [e] and C  [e] Does not work in standard setting! Such a local C can actually contain a cut-off; will never be constructed, not be in canonical prefix.  e not detected as cut-off Actually, some smaller C’ with the same marking and without cut-offs exists, but it might be non-local.

UFO 0712 canonical prefix Def.: feasible events fsbl  (events with no cut-off in past, will be in prefix) and static cut-offs cut  satisfy 1. e is feasible if  cut  =  ; ( is [e] without e) 2. feasible e is static cut-off, if there is C  C e with C  [e], C  [e] and C  fsbl  \ cut . Canonical prefix Unf  induced by fsbl .

UFO 0713 canonical prefix Def.: 1.e is feasible if  cut  =  ; ( is [e] without e) 2.feasible e is static cut-off, if there is C  C e with C  [e], C  [e] and C  fsbl  \ cut .  is well-founded on E; by Noetherian induction, status of predecessors already defined: 1.f   f < e  [f]  [e]  f  e 2.f  C  [e]  [f]  C  [e]  [f]  C  [e]

UFO 0714 completeness – general notion A branching process  is complete w.r.t. a set E’ of events if: –for every C  C there is a configuration C’ in  such that C  C’ and C’  E’ =  –if C is a configuration of  such that C  E’ =  and {e} is an extension of C in Unf, then C  {e} is also a configuration in  strictly stronger than standard notion: for every configuration, all possible firings are included; –important for deadlock detection

UFO 0715 completeness – result Theorem: Unf  is complete w.r.t. cut . Proof: essentially like in [ERV], using preservation under finite extensions

UFO 0716 finiteness and König’s Lemma König’s Lemma: An infinite, locally finite, rooted, directed graph has an infinite path. not applicable to branching processes: conditions may have infinitely many outgoing arcs! Theorem: An infinite branching process always contains an infinite chain of causally related events. The result holds also for unbounded nets!

UFO 0717 finiteness and König’s Lemma used this version of König’s Lemma to prove Theorem: 1. If  has finite index and  is dense, then Unf  is finite. 2. If  has infinite index, then Unf  is infinite. Remarks: 1. Finite index means bounded in standard case; 2. clear from completeness.

UFO 0718 algorithmics Theorem: If Unf  is finite, then the ERV- and the slicing algorithm generate Unf  – for any . essential fact: if e is a possible extension, then all feasible f  [e] have already been added.

UFO 0719 a recent application V. Khomenko: Behaviour-Preserving Transition-Insertions in Unfolding Prefixes, ATPN 2007 useful for designing asynchronous circuits

UFO 0720 a recent application setting: find place for insertion by studying a prefix Unf  desirable: prefix Unf’  of the new net can be obtained from Unf  by the “same” insertions – but cut-offs may be different! solution: the “same” insertions give the canonical prefix for a different cutting context  ’ !