# 8.5 PETRI NETS. Figure A computer program. Figure 8.5.2

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 8.5 PETRI NETS Consider the computer program shown in Figure Normally, the instructions would be processed sequentially first, A = 1, then B = 2, and so on. However, notice that there is no logical reason that prevents the first three instructions A = 1; B = 2; C = 3 from being processed in any order or concurrently. With the continuing decline of the cost of computer hardware, and processors in particular, there is increasing interest in concurrent processing to achieve greater speed and efficiency. The use of Petri nets, graph models of concurrent processing, is one method of modeling and studying concurrent processing. DEFINITION A Petri net is a directed graph G = (V, E), where V = P T and P T =. Any edge e in E is incident on one member of P and one member of T.The set P is called the set of places and the set T is called the set of transitions. Less formally, a Petri net is a directed, bipartite graph where the two classes of vertices are called places and transitions. In general, parallel edges are allowed in Petri nets; however, for simplicity, we will not permit parallel edges. A 1 B 2 C 3 A A+1 C B+C B A+C Figure A computer program. EXAPLE An example of a Petri net is given in Figure Places are typically drawn as circles and transitions as bars or rectangular boxes. Figure A Petri net. Circles are places and bars are transitions. DEFINITION A marking of a Petri net assigns each place a nonnegative integer. A Petri net with a marking is called a marked Petri net (or sometimes just a Petri net). If a marking assigns the nonnegative integer n to place p, we say that there are n tokens on p. The tokens are represented as black dots. EXAPLE An example of a marked Petri net is given in Figure

2 p 1 t 1 p 2 p 2 p 4 Figure A marked Petri net. In modeling, the places represent conditions, the transitions represent events, and the presence of at least one token in a place (condition) indicates that that condition is met. EXAPLE Petri Net odel of a Computer Program In Figure we have modeled the computer program of Figure Here the events (transitions) are the instructions, and the places represent the conditions under which an instruction can be executed. p 1 p 2 p 3 A = 1 B = 2 C = 3 p 4 p 5 p 6 A = A+1 B = A+ C p 7 p 9 C = B+ C p 8 Figure The program of Figure as a Petri net. The tokens indicate that the conditions for executing A = 1,B = 2, and C = 3 are met. DEFINITION In a Petri net, if an edge is directed from place p to transition t, we say that p is an input place for transition t. Anoutput place is defined similarly. If every input place for a transition t has at least one token, we say that t is enabled. A firing of an enabled transition removes one token from each input place and adds one token to each output place. EXAPLE In the Petri net of Figure 8.5.3, places p 1 and p 3 are input places for transition t 1. Transitions t 1 and are enabled, but transition is not enabled. If we fire transition t 1, we obtain the marked Petri net of Figure Transition is

3 now enabled. If we then fire transition, we obtain the net shown. At this point no transition is enabled and thus none may be fired. p 1 t 1 p 2 Fire p 1 t 1 p 2 p 2 p 4 p 2 p 4 Figure Firing transition. DEFINITION If a sequence of firings transforms a marking to a marking, we say that is reachable from. EXAPLE In Figure 8.5.6, is reachable from by first firing transition t 1 and then firing. In modeling, the firing of a transition simulates the occurrence of that event. Of course, an event can take place only if all of the conditions for its execution have been met; that is, the transition can be fired only if it is enabled. By putting tokens in places p 1,p 2, and p 3 in Figure 8.5.4, we show that the conditions for executing the instructions A = 1,B = 2, and C = 3 are met. The program is ready to be executed. Since the transitions A = 1,B = 2, and C = 3 are enabled, they can be fired in any order or concurrently. Transition C = B + C is enabled only if places p 5 and p 6 have tokens. But these places will have tokens only if transitions B = 2 and C = 3 have been fired. In other words, the condition under which the event C = B +C can occur is that B = 2 and C = 3 must have been executed. In this way we model the legal execution sequences of Figure and the implicit concurrency within this program. Among the most important properties studied in Petri net theory are liveness and safeness. Liveness is related to the absence of deadlocks and safeness is related to bounded memory capacity. EXAPLE Petri Net odel of a Shared Computer System Two persons are sharing a computer system that has a disk drive D and a printer P. Each person needs both. A possible Petri net model of this situation is shown in Figure The marking indicates that both D and P are available. Now suppose that person 1 requests D and then P (while person 2 requests neither). The occurrences of these events are simulated by first firing transition request D and then firing transition request P for person 1. The

4 Fire t 1 t 1 t 1 Fire Fire t 1 Figure arking is reachable from by firing t 1 and then. resulting Petri net is shown in Figure When person 1 finishes the processing and releases, simulated by firing the transitions process and then release, we return to the Petri net of Figure If person 2 requests D and then P (while person 1 requests neither), we obtain a similar firing sequence. Again, assume that we have the situation of Figure Now suppose that person 1 requests D and then person 2 requests P. After the appropriate transitions are fired to simulate the occurrences of these events, we obtain the Petri net of Figure Notice that at this point, no transition can fire. Person 1 is waiting for person 2 to release P and person 2 is waiting for person 1 to release D. Activity within the system stops. We say that a deadlock occurs. Formally, we say that a marked Petri net is deadlocked if no transition can fire. Prevention of deadlocks within concurrent processing environments is a major practical concern. Example motivates the following definition. DEFINITION A marking for a Petri net is live if, beginning from, no matter what sequence of firings has occurred, it is possible to fire any given transition by proceeding through some additional firing sequence.

5 D available P available Figure Person 1 Person 2 A Petri net model of a shared computer system. Each person needs disk drive D and printer P. The marking indicates that are available. D available P available Figure Person 1 Person 2 The Petri net of Figure after firing request D and then request P for person 1. After person 1 finishes processing and releases D and P, simulated by firing process and then release, we obtain the Petri net of Figure again. If a marking is live for a Petri net P, then no matter what sequence of

6 D available P available Person 1 Person 2 Figure The Petri net of Figure after firing request D for person 1 and request P for person 2. At this point the Petri net is deadlocked; that is, no transition can fire. transitions is fired, P will never deadlock. Indeed, we can fire any transition by proceeding through some additional firing sequence. EXAPLE The marking of the net of Figure is live. To see this, notice that the only transition for marking that can be fired is t 1, which produces marking. The only transition for marking that can be fired is, which produces marking. The only transition for marking that can be fired is, which returns us to marking. Thus any firing sequence, starting with marking, produces one of the markings,,or and from there we can fire any transition t 1, or by proceeding as in Figure Therefore, the marking for the net of Figure is live. EXAPLE The marking shown in Figure is not live since after transition A = 1is fired, it can never fire again. If a place is regarded as having limited capacity, boundedness assures us that no place will overflow. DEFINITION A marking for a Petri net is bounded if there is some positive integer n having the property that in any firing sequence, no place ever receives more

7 than n tokens. If a marking is bounded and in any firing sequence no place ever receives more than one token, we call a safe marking. If each place represents a register capable of holding one computer word and if an initial marking is safe, we are guaranteed that the memory capacity of the registers will not be exceeded. EXAPLE The markings of Figure are safe. The marking of Figure is not safe, since as shown, if transition t 1 is fired, place p 2 then has two tokens. By listing all the markings reachable from, it can be verified that is bounded and live (see Exercise 7). p 1 p 3 p 1 p 3 p 2 p 4 Fire t 1 p 2 p 4 t p 6 1 t p 6 1 p 5 Figure two tokens. Exercises arking is not safe. After t 1 is fired, p 2 holds p 5 In Exercises 1 3, model each program by a Petri net. Provide a marking that represents the situation prior to execution of the program. 1. A = 1 B = 2 C = A + B C = C A = 2 B = A + A C = 3 D = A + A C = A + B + C 3. A = 1 S = 0 10 S = S + A A = A + 1 GOTO Describe three situations involving concurrency that might be modeled as Petri nets. 5. Give an example of a marked Petri net in which two transitions are enabled, but firing either one disables the other. 6. Consider the following algorithm for washing a lion.

8 1. Get lion. 2. Get soap. 3. Get tub. 4. Put water in tub. 5. Put lion in tub. 6. Wash lion with soap. 7. Rinse lion. 8. Remove lion from tub. 9. Dry lion. odel this algorithm as a Petri net. Provide a marking that represents the situation prior to execution. 7. Show that the marking of Figure is live and bounded. Answer the following questions for each marked Petri net in Exercises (a) Which transitions are enabled? (b) Show the marking that results from firing t 1. (c) Is live? (d) Is safe? (e) Is bounded? (f) Show or describe all markings reachable from. (g) Exhibit a marking (other than the marking that puts zero tokens in each place) not reachable from t 1 t 4 t t 1 t 1

9 12. t 1 t Give an example of a Petri net with a marking that is safe, but not live. 14. Give an example of a Petri net with a marking that is bounded, but not safe. 15. The Dining Philosophers Problem (see [Dijkstra, 1968]) concerns five philosophers seated at a round table. Each philosopher either eats or meditates. The table is set alternately with one plate and one chopstick. Eating requires two chopsticks so that if each philosopher picks up the chopstick to the right of the plate, none can eat the system will deadlock. odel this situation as a Petri net. Your model should be live so that the system will not deadlock and so that, at any point, any philosopher can potentially either eat or meditate. 16. Develop an alternative Petri net model for the situation of Example that prevents deadlock. If each place in a marked Petri net P has one incoming and one outgoing edge, then P can be redrawn as a directed graph where vertices correspond to transitions and edges to places. The tokens are placed on the edges. Such a graph is called a marked graph. Here we show a marked Petri net and its representation as a marked graph. (a) (b) 17. Which Petri nets in Exercises 8 17 can be redrawn as marked graphs? 18. Redraw the marked Petri net as a marked graph.

10 19. Redraw the marked Petri net as a marked graph. The token count of a simple directed cycle in a marked graph is the number of tokens on all the edges in the cycle. 20. Show that the token count of a simple directed cycle does not change during any firing sequence. 21. Show that a marking for a marked graph G is live if and only if places at least one token in each simple directed cycle in G. 22. Show that a live marking is safe for a marked graph G if and only if every edge in G belongs to a simple directed cycle with token count one. 23. Give an example of a marked graph with a nonlive marking in which every edge belongs to a simple directed cycle with token count one. 24. Let G be a marked graph. Show that each edge in G is contained in a simple directed cycle if and only if every marking for G is bounded. 25. Let G be a directed graph where, if we ignore the direction of the edges in G, G is connected as an undirected graph. Show that G has a live and safe marking if and only if given any two vertices v and w in G there is a directed path from v to w.

### Homework 15 Solutions

PROBLEM ONE (Trees) Homework 15 Solutions 1. Recall the definition of a tree: a tree is a connected, undirected graph which has no cycles. Which of the following definitions are equivalent to this definition

### Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

### Modelling Workflow with Petri Nets. CA4 BPM PetriNets

Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering

### Solutions to Exercises 8

Discrete Mathematics Lent 2009 MA210 Solutions to Exercises 8 (1) Suppose that G is a graph in which every vertex has degree at least k, where k 1, and in which every cycle contains at least 4 vertices.

### Programma della seconda parte del corso

Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,

### Analysis of Algorithms, I

Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

### SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

### CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

### 2.3 Scheduling jobs on identical parallel machines

2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed

### Graph. Consider a graph, G in Fig Then the vertex V and edge E can be represented as:

Graph A graph G consist of 1. Set of vertices V (called nodes), (V = {v1, v2, v3, v4...}) and 2. Set of edges E (i.e., E {e1, e2, e3...cm} A graph can be represents as G = (V, E), where V is a finite and

### COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

### COT5405 Analysis of Algorithms Homework 3 Solutions

COT0 Analysis of Algorithms Homework 3 Solutions. Prove or give a counter example: (a) In the textbook, we have two routines for graph traversal - DFS(G) and BFS(G,s) - where G is a graph and s is any

### Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 19 - Event-driven process chains 1 Object We overview EPC and the main

### Midterm Practice Problems

6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

### A Tutorial Introduction 1

Preface From the Old to the New Acknowledgments xv xvii xxi Verilog A Tutorial Introduction 1 Getting Started 2 A Structural Description 2 Simulating the binarytoeseg Driver 4 Creating Ports For the Module

### Computer Science 217

Computer Science 217 Midterm Exam Fall 2009 October 29, 2009 Name: ID: Instructions: Neatly print your name and ID number in the spaces provided above. Pick the best answer for each multiple choice question.

### Data Structures. Chapter 8

Chapter 8 Data Structures Computer has to process lots and lots of data. To systematically process those data efficiently, those data are organized as a whole, appropriate for the application, called a

### Math 55: Discrete Mathematics

Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What

### Lecture 17 : Equivalence and Order Relations DRAFT

CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion

### Workflow Simulation in a Virtual World

Workflow Simulation in a Virtual World Keith Perkins Masters Thesis Defense Presentation 3 May 2011 Thesis Committee Dr. Craig Thompson (adviser) Dr. Brajendra Panda Dr. Gordon Beavers Outline Introduction

### Process Modeling Notations and Workflow Patterns

Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros

### A4-R3: COMPUTER ORGANISATION

A4-R3: COMPUTER ORGANISATION NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

### Kirsten Sinclair SyntheSys Systems Engineers

Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use

### Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

OPERATING SYSTEMS DEADLOCKS Jerry Breecher 7: Deadlocks OPERATING SYSTEM Deadlocks What is a deadlock? What Is In This Chapter? Staying Safe: Preventing and Avoiding Deadlocks Living Dangerously: Let the

### 2) What is the structure of an organization? Explain how IT support at different organizational levels.

(PGDIT 01) Paper - I : BASICS OF INFORMATION TECHNOLOGY 1) What is an information technology? Why you need to know about IT. 2) What is the structure of an organization? Explain how IT support at different

### COLORED GRAPHS AND THEIR PROPERTIES

COLORED GRAPHS AND THEIR PROPERTIES BEN STEVENS 1. Introduction This paper is concerned with the upper bound on the chromatic number for graphs of maximum vertex degree under three different sets of coloring

### BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective

BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016

### (Refer Slide Time: 2:14)

(Refer Slide Time: 2:14) Digital Circuits and Systems Prof. S. Srinivasan Professor Department of Electrical Engineering Indian Institute of Technology, Madras Lecture # 24 Design of Synchronous Sequential

### T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

### Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

### 8 Simulatability of Net Types

8 Simulatability of Net Types In chapter 7 was presented different higher order net types. Now we discuss the relations between these net types, place transition nets, and condition event nets. Especially

System Modeling Introduction Rugby Meta-Model Finite State Machines Petri Nets Untimed Model of Computation Synchronous Model of Computation Timed Model of Computation Integration of Computational Models

### Railway Network Modelling Using Petri Nets

Mandira Banik et al IJCSET July 2013 Vol 3, Issue 7,249-255 Railway Network Modelling Using Petri Nets Mandira Banik, Sudeep Ghosh Guru Nanak Institute of Technology, West Bengal,India Abstract - This

### Virtual Time and Timeout in Client-Server Networks

Virtual Time and Timeout in Client-Server Networks Jayadev Misra July 13, 2011 Contents 1 Introduction 2 1.1 Background.............................. 2 1.1.1 Causal Model of Virtual Time...............

### Operating Systems OBJECTIVES 7.1 DEFINITION. Chapter 7. Note:

Chapter 7 OBJECTIVES Operating Systems Define the purpose and functions of an operating system. Understand the components of an operating system. Understand the concept of virtual memory. Understand the

### TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.

CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express

Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection

### Reflection and Refraction

Equipment Reflection and Refraction Acrylic block set, plane-concave-convex universal mirror, cork board, cork board stand, pins, flashlight, protractor, ruler, mirror worksheet, rectangular block worksheet,

### Load Balancing and Termination Detection

Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection

### (Refer Slide Time: 00:01:23 min)

Computer Aided Design Prof. Anoop Chalwa Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture No. # 02 Input Output Devices, Raster Graphics Today we will be talking about

### TYPES OF NUMBERS. Example 2. Example 1. Problems. Answers

TYPES OF NUMBERS When two or more integers are multiplied together, each number is a factor of the product. Nonnegative integers that have exactly two factors, namely, one and itself, are called prime

### System model. Section 7.1. Operating Systems: Deadlock p. 1/15

System model Section 7.1 Resources: CPU, memory, files, devices, semaphores, etc. divided into several types each type has one or more identical instances Processes: 1. Request resource. (If resource cannot

### Why? A central concept in Computer Science. Algorithms are ubiquitous.

Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

### Using UML Part Two Behavioral Modeling Diagrams

UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

### Social Media Mining. Graph Essentials

Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

### Sample Problems in Discrete Mathematics

Sample Problems in Discrete Mathematics This handout lists some sample problems that you should be able to solve as a pre-requisite to Computer Algorithms Try to solve all of them You should also read

### Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

### Mathematics Curricular Guide SIXTH GRADE SCHOOL YEAR. Updated: Thursday, December 02, 2010

Mathematics Curricular Guide SIXTH GRADE 2010-2011 SCHOOL YEAR 1 MATHEMATICS SCOPE & SEQUENCE Unit Title Dates Page 1. CMP 2 Bits and Pieces I... 3 2. How Likely Is It? (Probability)... 6 3. CMP 2 Bits

### END TERM Examination, May 2014 (Model Test Paper) B.Tech (IT) IV Semester

END TERM Examination, May 2014 (Model Test Paper) B.Tech (IT) IV Semester Paper Code: ETCS - 212 Subject: Operating Systems Time: 3 hrs Maximum Marks: 75 Note: Attempt five questions including Q. No. 1

### Parallelization of a "Masyu" Puzzle solver

John Lilley Parallelization of a "Masyu" Puzzle solver The "Masyu" (aka "Pearls") puzzle consists of a rectangular board divided into rows and columns, on which a number of white and black "pearls" are

### Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

### (Refer Slide Time 6:09)

Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology, Madras Lecture 3 Combinational Logic Basics We defined digital signal as a signal which

### Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes

Paper Reference(s) 6689/01 Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes Materials required for examination Nil Items included with

### Model Simulation in Rational Software Architect: Business Process Simulation

Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation

### Two General Methods to Reduce Delay and Change of Enumeration Algorithms

ISSN 1346-5597 NII Technical Report Two General Methods to Reduce Delay and Change of Enumeration Algorithms Takeaki Uno NII-2003-004E Apr.2003 Two General Methods to Reduce Delay and Change of Enumeration

### . 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9

Introduction The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive integer We say d is a

### END TERM Examination(Model Test Paper) Fourth Semester[B.Tech]

END TERM Examination(Model Test Paper) Fourth Semester[B.Tech] Paper Code: ETCS - 212 Subject: Operating System Time: 3 hrs Maximum Marks: 75 Note: Q.No.1 is compulsory. Attempt any four questions of remaining

### EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer

WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction

### PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The

### 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008

MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

Deadlock Emin Gun Sirer Deadlock Deadlock is a problem that can exist when a group of processes compete for access to fixed resources Def: deadlock exists among a set of processes if every process is waiting

### BRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS

International Journal of Cooperative Information Systems c World Scientific Publishing Company BRIDGING THE GAP BETWEEN BUSINESS MODELS WORKFLOW SPECIFICATIONS JULIANE DEHNERT Fraunhofer ISST, Mollstr.

### 6.852: Distributed Algorithms Fall, 2009. Class 2

.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

### Partitioning edge-coloured complete graphs into monochromatic cycles and paths

arxiv:1205.5492v1 [math.co] 24 May 2012 Partitioning edge-coloured complete graphs into monochromatic cycles and paths Alexey Pokrovskiy Departement of Mathematics, London School of Economics and Political

### State Space Analysis: Properties, Reachability Graph, and Coverability graph. prof.dr.ir. Wil van der Aalst

State Space Analysis: Properties, Reachability Graph, and Coverability graph prof.dr.ir. Wil van der Aalst Outline Motivation Formalization Basic properties Reachability graph Coverability graph PAGE 1

### Process Modeling Notations and Workflow Patterns

Process Modeling Notations and Workflow Patterns Stephen A. White IBM Corporation ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros has resulted

### CHAPTER 2 GRAPHS F G C D

page 1 of Section 2.1 HPTR 2 GRPHS STION 1 INTROUTION basic terminology graph is a set of finitely many points called vertices which may be connected by edges. igs 1 3 show three assorted graphs. v1 v2

### Chapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan

Chapter 2 Basic Structure of Computers Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Outline Functional Units Basic Operational Concepts Bus Structures Software

### The relationship of a trees to a graph is very important in solving many problems in Maths and Computer Science

Trees Mathematically speaking trees are a special class of a graph. The relationship of a trees to a graph is very important in solving many problems in Maths and Computer Science However, in computer

### (Refer Slide Time: 01.26)

Discrete Mathematical Structures Dr. Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture # 27 Pigeonhole Principle In the next few lectures

### FCS 2013 FINITE CAPACITY SCHEDULING

FCS 2013 FINITE CAPACITY SCHEDULING INSTALLATION PROCEDURE Microsoft Dynamics NAV 2013 Contents 1 Installation observations... 3 2 Installation procedure from the OLIVIA s website.... 3 3 Installation

### Resource Allocation Graphs

Resource llocation Graphs Roger Henriksson Department of Computer Science Lund University he possibility of deadlock is an undesired property (to say the least) of safety-critical real-time systems. herefore,

### HOMEWORK #3 SOLUTIONS - MATH 3260

HOMEWORK #3 SOLUTIONS - MATH 3260 ASSIGNED: FEBRUARY 26, 2003 DUE: MARCH 12, 2003 AT 2:30PM (1) Show either that each of the following graphs are planar by drawing them in a way that the vertices do not

### Lecture Notes on Spanning Trees

Lecture Notes on Spanning Trees 15-122: Principles of Imperative Computation Frank Pfenning Lecture 26 April 26, 2011 1 Introduction In this lecture we introduce graphs. Graphs provide a uniform model

### Chapter 4. Polynomial and Rational Functions. 4.1 Polynomial Functions and Their Graphs

Chapter 4. Polynomial and Rational Functions 4.1 Polynomial Functions and Their Graphs A polynomial function of degree n is a function of the form P = a n n + a n 1 n 1 + + a 2 2 + a 1 + a 0 Where a s

### Automata and Languages

Automata and Languages Computational Models: An idealized mathematical model of a computer. A computational model may be accurate in some ways but not in others. We shall be defining increasingly powerful

### GOAL-BASED INTELLIGENT AGENTS

International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

### Chapter 1: Introduction. What is an Operating System?

Chapter 1: Introduction What is an operating system? Simple Batch Systems Multiprogramming Batched Systems Time-Sharing Systems Personal-Computer Systems Parallel Systems Distributed Systems Real -Time

### Grade 7 & 8 Math Circles. Mathematical Games - Solutions

Faculty of Mathematics Waterloo, Ontario N2L 3G1 Grade 7 & 8 Math Circles November 19/20/21, 2013 Mathematical Games - Solutions 1. Classic Nim and Variations (a) If the Nim Game started with 40 matchsticks,

### University of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures

University of Pisa MSc in Computer Engineering Business Processes Management Large and complex organizations are a tangible manifestation of advanced technology, more than machinery itself. (J.K. Galbraith)

### Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 14 Non-Binary Huffman Code and Other Codes In the last class we

### A linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form

Section 1.3 Matrix Products A linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form (scalar #1)(quantity #1) + (scalar #2)(quantity #2) +...

### Grade 6 Math Circles. Multiplication

Faculty of Mathematics Waterloo, Ontario N2L 3G1 Introduction Grade 6 Math Circles November 5/6, 2013 Multiplication At this point in your schooling you should all be very comfortable with multiplication.

### TI-86 Graphing Calculator Keystroke Guide

TI-86 Graphing Calculator Keystroke Guide In your textbook you will notice that on some pages a key-shaped icon appears next to a brief description of a feature on your graphing calculator. In this guide

### Formal Modeling of Testing Software for Cyber-Physical Automation Systems

Formal Modeling of Testing Software for Cyber-Physical Automation Systems Igor Buzhinsky, Cheng Pang, Valeriy Vyatkin igor.buzhinsky@gmail.com DIAS Workshop, Helsinki August 21, 2015 I. Buzhinsky et al.

### PROCESS-ORIENTED ARCHITECTURES FOR ELECTRONIC COMMERCE AND INTERORGANIZATIONAL WORKFLOW

Information Systems Vol.??, No.??, pp.??-??, 1999 Copyright 1999 Elsevier Sciences Ltd. All rights reserved Printed in Great Britain 0306-4379/98 \$17.00 + 0.00 PROCESS-ORIENTED ARCHITECTURES FOR ELECTRONIC

### Safety verification of software using structured Petri nets

Safety verification of software using structured Petri nets Krzysztof Sacha Warsaw University of Technology, Institute of Control and Computation Engineering, ul. Nowowiejska 15/19, 00-665 Warszawa, Poland

Load Balancing Load Balancing Load balancing: distributing data and/or computations across multiple processes to maximize efficiency for a parallel program. Static load-balancing: the algorithm decides

### Case Study: Load Testing and Tuning to Improve SharePoint Website Performance

Case Study: Load Testing and Tuning to Improve SharePoint Website Performance Abstract: Initial load tests revealed that the capacity of a customized Microsoft Office SharePoint Server (MOSS) website cluster

### Notes on Matrix Multiplication and the Transitive Closure

ICS 6D Due: Wednesday, February 25, 2015 Instructor: Sandy Irani Notes on Matrix Multiplication and the Transitive Closure An n m matrix over a set S is an array of elements from S with n rows and m columns.

### PRACTICE BOOK COMPUTER SCIENCE TEST. Graduate Record Examinations. This practice book contains. Become familiar with. Visit GRE Online at www.gre.

This book is provided FREE with test registration by the Graduate Record Examinations Board. Graduate Record Examinations This practice book contains one actual full-length GRE Computer Science Test test-taking

### Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling

### APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

### Lecture 2: The Complexity of Some Problems

IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 2: The Complexity of Some Problems David Mix Barrington and Alexis Maciel July 18, 2000

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still