8 Simulatability of Net Types

Size: px
Start display at page:

Download "8 Simulatability of Net Types"

Transcription

1 8 Simulatability of Net Types In chapter 7 was presented different higher order net types. Now we discuss the relations between these net types, place transition nets, and condition event nets. Especially it would be considered the mutual simulatability of different net types. We have seen that modelling with higher order net types is easier but on the other side some properties like boundedness or liveness are not decidable. Therefore exist innocuous and dangerous modifications. Because the introduction of the firing rule with capacities can be reduced to standard concepts this is innocuously. But introducing the firing rule with priorities it leads to a higher order net class than the class of place transition nets. Definition 8.1 A net type NT 1 is called simulatable by net type NT 2 2 if exists an algorithm which for every net N 1 of type NT 1 constructs a net N 2 of type NT 2 and unique mappings ζ (translation of states) and τ (translation of transitions) such that: (a) Mapping ζ maps the reachability set R 2 of N 2 to the reachability set R 1 of N 1 where the initial marking m 0 (2) of N 2 is mapped to the initial marking m 0 (1) of N 1. (b) Mapping τ maps the set of transition T 2 of N 2 to the set of transitions T 1 of N 1 whereas additionally is included the empty word. (c) If m 2, m 2 R 2, q W(T 2 ) and m 2 [q> m 2 (in N 2 ) then holds ζ (m 2 ) [τ(q) > ζ (m 2 ) (in N 1 ). (d) If m 1, m 1 R 1, q W(T 1 ) and m 1 [q> m 1 (in N 1 ) then exist markings m 2, m 2 R 2, q W(T 2 ) with m 1 = ζ (m 2 ), q = τ(q ), m 2 [q > m 2 (in N 2 ), and m 1 = ζ (m 2 ). If furthermore the mapping ζ is bijective we speak about simulatability of the state behaviour. If the construction of net N 2, ζ, and τ is done node by node and arc by arc whereas only information about the node and its environment are used but not about the whole net or its reachability set, then we are speaking about local simulatability. 120

2 If a net type NT 1 is simulatable by net type NT 2 and vice versa then we say that the net types are equivalent. Theorem 8.1 A place transition net is locally simulatable by a loop free ordinary place transition net. Proof idea: Every place p of N which input arcs have the maximal multiplicity in(p) and which output arcs have maximal the multiplicity out(p) is substituted by a loop of places and transitions with in(p) + out(p)-places. The multiple arcs are distributed to the places of the loop. Using mapping τ the empty word ε is allocated to the transitions of the loop. For a marking m of the constructed net the marking ζ(m) has exactly the same number of tokens in place p like in m in the places of the corresponding loop. Figure 8.1 shows an example for this construction. Fig. 8.1: Transformation of a PT-net into an ordinary PT-net Theorem 8.2 Every bounded place transition net is locally simulatable by a safe Petri net (CE-net). 121

3 Proof idea: Every k-bounded place p (k 1) is splitted into k+1 places p 0,...,p n and the adjacent transitions are splitted in k transitions t 1,..., t k (where holds τ(t 1 ) =... =τ(t k ) = t) such that in every reachable marking m exactly one place contains a token. It is marked the place pi iff place p contains exactly i tokens in the corresponding marking ζ (m). Figure 8.2 shows an example for theorem 8.2. Fig. 8.2: Transformation of a PT-net into a safe PT-net Theorem 8.3 Every PT-net with capacities is locally simulatable with a PT-net (without capacities). The next figure demonstrates how the introducing of co-places realises the transformation of theorem 8.3. A co-place gets as initial marking a number of tokens which equals to the difference between the capacity of the corresponding place and its initial marking. If a transition puts tokens to a place then it consumes the same number of tokens from the coplace and vice versa if a transition consumes tokens from a place then it puts the same number of tokens to the corresponding co-place. 122

4 Fig. 8.3: Transformation of a PT-net with capacities into a PT-net without capacities In definition was introduced the firing rule with maximal steps. If we use this firing rule for normal place transitions nets without time then it is also possible to implement the null test for unbounded places. How to test if a place test is clean or not shows the following figure. Fig. 8.4: Null test for unbounded places in a PT-net using the firing rule with maximal steps If an unbounded place test is clean then fires the sequence of sets [t 1 ], [t 2 ] and place p 0 gets a token. But if place test is marked then the fire sequence are the sets [t 1, t 3 ], [t 4 ] and place p 1 would be marked. 123

5 9. Model Checking - see INA-handbook, p

Diagnosing workflow processes using Woflan

Diagnosing workflow processes using Woflan Diagnosing workflow processes using Woflan H.M.W. Verbeek 1, T. Basten 2, and W.M.P. van der Aalst 3 1 Dept. of Computing Science, Eindhoven University of Technology, The Netherlands wsineric@win.tue.nl

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

Architecture of Information Systems

Architecture of Information Systems Architecture of Information Systems using the theory of Petri nets lecture notes for Systeemmodelleren 1 (2M310) K. van Hee N. Sidorova M. Voorhoeve and J. van der Woude Department of Computing Science

More information

Analysis of Algorithms I: Binary Search Trees

Analysis of Algorithms I: Binary Search Trees Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary

More information

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

More information

On the Unique Games Conjecture

On the Unique Games Conjecture On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Midterm Practice Problems

Midterm Practice Problems 6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

How To Understand A Self-Adapting Recovery Net (Sarn)

How To Understand A Self-Adapting Recovery Net (Sarn) DOI 10.1007/s10619-007-7020-1 Self-adapting recovery nets for policy-driven exception handling in business processes Rachid Hamadi Boualem Benatallah Brahim Medjahed Springer Science+Business Media, LLC

More information

Process Mining Using BPMN: Relating Event Logs and Process Models

Process Mining Using BPMN: Relating Event Logs and Process Models Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:

More information

Efficient Reductions for LTL Formulae Verification

Efficient Reductions for LTL Formulae Verification Efficient Reductions for LTL Formulae Verification Serge Haddad a and Jean-François Pradat-Peyre b a LAMSADE-CNRS UMR 7024 Université Paris-Dauphine, Place du Maréchal de Lattre de Tassigny, 75775 Paris

More information

Safety verification of software using structured Petri nets

Safety verification of software using structured Petri nets Safety verification of software using structured Petri nets Krzysztof Sacha Warsaw University of Technology, Institute of Control and Computation Engineering, ul. Nowowiejska 15/19, 00-665 Warszawa, Poland

More information

Theory of Computation Chapter 2: Turing Machines

Theory of Computation Chapter 2: Turing Machines Theory of Computation Chapter 2: Turing Machines Guan-Shieng Huang Feb. 24, 2003 Feb. 19, 2006 0-0 Turing Machine δ K 0111000a 01bb 1 Definition of TMs A Turing Machine is a quadruple M = (K, Σ, δ, s),

More information

Reducing Clocks in Timed Automata while Preserving Bisimulation

Reducing Clocks in Timed Automata while Preserving Bisimulation Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

Structural Detection of Deadlocks in Business Process Models

Structural Detection of Deadlocks in Business Process Models Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de

More information

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation: CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

More information

UNIVERSIDADE DE SÃO PAULO

UNIVERSIDADE DE SÃO PAULO UNIVERSIDADE DE SÃO PAULO Instituto de Ciências Matemáticas e de Computação ISSN 0103-2569 Comments on On minimizing the lengths of checking sequences Adenilso da Silva Simão N ō 307 RELATÓRIOS TÉCNICOS

More information

System Modeling Introduction Rugby Meta-Model Finite State Machines Petri Nets Untimed Model of Computation Synchronous Model of Computation Timed Model of Computation Integration of Computational Models

More information

14.1 Rent-or-buy problem

14.1 Rent-or-buy problem CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms

More information

How To Improve Availability In Local Disaster Recovery

How To Improve Availability In Local Disaster Recovery 2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore A Petri Net Model for High Availability in Virtualized Local Disaster Recovery

More information

The Relative Worst Order Ratio for On-Line Algorithms

The Relative Worst Order Ratio for On-Line Algorithms The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk

More information

Data Structures Fibonacci Heaps, Amortized Analysis

Data Structures Fibonacci Heaps, Amortized Analysis Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:

More information

Genet A tool for the synthesis and mining of Petri nets. Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya

Genet A tool for the synthesis and mining of Petri nets. Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya Genet A tool for the synthesis and mining of Petri nets Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya 2 Contents 1.1 Overview of the tool.......................

More information

Throughput constraint for Synchronous Data Flow Graphs

Throughput constraint for Synchronous Data Flow Graphs Throughput constraint for Synchronous Data Flow Graphs *Alessio Bonfietti Michele Lombardi Michela Milano Luca Benini!"#$%&'()*+,-)./&0&20304(5 60,7&-8990,.+:&;/&."!?@A>&"'&=,0B+C. !"#$%&'()* Resource

More information

BRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS

BRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS International Journal of Cooperative Information Systems c World Scientific Publishing Company BRIDGING THE GAP BETWEEN BUSINESS MODELS WORKFLOW SPECIFICATIONS JULIANE DEHNERT Fraunhofer ISST, Mollstr.

More information

Computationally Complete Spiking Neural P Systems Without Delay: Two Types of Neurons Are Enough

Computationally Complete Spiking Neural P Systems Without Delay: Two Types of Neurons Are Enough Computationally Complete Spiking Neural P Systems Without Delay: Two Types of Neurons Are Enough Rudolf Freund 1 and Marian Kogler 1,2 1 Faculty of Informatics, Vienna University of Technology Favoritenstr.

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Bounded LTL Model Checking with Stable Models

Bounded LTL Model Checking with Stable Models Under consideration for publication in Theory and Practice of Logic Programming 1 Bounded LTL Model Checking with Stable Models KEIJO HELJANKO and ILKKA NIEMELÄ Helsinki University of Technology Department

More information

Sequential Data Structures

Sequential Data Structures Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year

More information

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt

More information

Kirsten Sinclair SyntheSys Systems Engineers

Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use

More information

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

High-level Petri Nets

High-level Petri Nets High-level Petri Nets Model-based system development Aarhus University, Denmark Presentation at the Carl Adam Petri Memorial Symposium, Berlin, February 4, 2011 1 Concurrent systems are very important

More information

A Petri Net Model for Hardware/Software Codesign

A Petri Net Model for Hardware/Software Codesign Design Automation for Embedded Systems, 4, 243 310 (1999) c 1999 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. A Petri Net Model for Hardware/Software Codesign PAULO MACIEL Departamento

More information

Lecture 3: Put Options and Distribution-Free Results

Lecture 3: Put Options and Distribution-Free Results OPTIONS and FUTURES Lecture 3: Put Options and Distribution-Free Results Philip H. Dybvig Washington University in Saint Louis put options binomial valuation what are distribution-free results? option

More information

1. Domain Name System

1. Domain Name System 1.1 Domain Name System (DNS) 1. Domain Name System To identify an entity, the Internet uses the IP address, which uniquely identifies the connection of a host to the Internet. However, people prefer to

More information

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de

More information

Polarization codes and the rate of polarization

Polarization codes and the rate of polarization Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,

More information

1. Let P be the space of all polynomials (of one real variable and with real coefficients) with the norm

1. Let P be the space of all polynomials (of one real variable and with real coefficients) with the norm Uppsala Universitet Matematiska Institutionen Andreas Strömbergsson Prov i matematik Funktionalanalys Kurs: F3B, F4Sy, NVP 005-06-15 Skrivtid: 9 14 Tillåtna hjälpmedel: Manuella skrivdon, Kreyszigs bok

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

Advanced Topics in Software Engineering (02265) The project(s) Ekkart Kindler

Advanced Topics in Software Engineering (02265) The project(s) Ekkart Kindler Advanced Topics in Software Engineering (02265) The project(s) Projects Part of this course is a project (ca. 2 ECTS points) The evaluation of this course is based on the result of this project The project

More information

Linear Programming Notes V Problem Transformations

Linear Programming Notes V Problem Transformations Linear Programming Notes V Problem Transformations 1 Introduction Any linear programming problem can be rewritten in either of two standard forms. In the first form, the objective is to maximize, the material

More information

Dimitris Chatzidimitriou. Corelab NTUA. June 28, 2013

Dimitris Chatzidimitriou. Corelab NTUA. June 28, 2013 AN EFFICIENT ALGORITHM FOR THE OPTIMAL STABLE MARRIAGE PROBLEM Dimitris Chatzidimitriou Corelab NTUA June 28, 2013 OUTLINE 1 BASIC CONCEPTS 2 DEFINITIONS 3 ROTATIONS 4 THE ALGORITHM DIMITRIS CHATZIDIMITRIOU

More information

Union-Find Problem. Using Arrays And Chains

Union-Find Problem. Using Arrays And Chains Union-Find Problem Given a set {,,, n} of n elements. Initially each element is in a different set. ƒ {}, {},, {n} An intermixed sequence of union and find operations is performed. A union operation combines

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

On Dealing With Semantically Conflicting Business Process Changes

On Dealing With Semantically Conflicting Business Process Changes On Dealing With Semantically Conflicting Business Process Changes Stefanie Rinderle Manfred Reichert Peter Dadam University of Ulm, Faculty of Computer Science, Dept. Databases and Information Systems

More information

LTL Model Checking with Logic Based Petri Nets

LTL Model Checking with Logic Based Petri Nets LTL Model Checking with Logic Based Petri Nets Tristan M. Behrens and Jürgen Dix IfI Technical Report Series IfI-07-04 Impressum Publisher: Institut für Informatik, Technische Universität Clausthal Julius-Albert

More information

Programma della seconda parte del corso

Programma della seconda parte del corso Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,

More information

Batch Production Scheduling in the Process Industries. By Prashanthi Ravi

Batch Production Scheduling in the Process Industries. By Prashanthi Ravi Batch Production Scheduling in the Process Industries By Prashanthi Ravi INTRODUCTION Batch production - where a batch means a task together with the quantity produced. The processing of a batch is called

More information

Place/Transition Petri Nets

Place/Transition Petri Nets Place/Transition Petri Nets JSrg Desel 1 and Wolfgang Reisig 2 1 Institut fiir Angewandte Informatik und Formale Beschreibungsverfahren Universit t Karlsruhe, Germany desel@aifb.uni-karlsruhe.de 2 Institut

More information

Genetic Process Mining: An Experimental Evaluation

Genetic Process Mining: An Experimental Evaluation Genetic Process Mining: An Experimental Evaluation A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

A Labeling Algorithm for the Maximum-Flow Network Problem

A Labeling Algorithm for the Maximum-Flow Network Problem A Labeling Algorithm for the Maximum-Flow Network Problem Appendix C Network-flow problems can be solved by several methods. In Chapter 8 we introduced this topic by exploring the special structure of

More information

Formal Approaches to Business Processes through Petri Nets

Formal Approaches to Business Processes through Petri Nets Formal Approaches to Business Processes through Petri Nets Nick ussell Arthur H. M. ter Hofstede a university 2009, www.yawlfoundation.org Acknowledgement These slides summarize the content of Chapter

More information

A Test Case Generator for the Validation of High-Level Petri Nets

A Test Case Generator for the Validation of High-Level Petri Nets A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: desel@aifb.uni-karlsruhe.de Andreas Oberweis, Torsten

More information

Randomized algorithms

Randomized algorithms Randomized algorithms March 10, 2005 1 What are randomized algorithms? Algorithms which use random numbers to make decisions during the executions of the algorithm. Why would we want to do this?? Deterministic

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

Combining Software and Hardware Verification Techniques

Combining Software and Hardware Verification Techniques Formal Methods in System Design, 21, 251 280, 2002 c 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Combining Software and Hardware Verification Techniques ROBERT P. KURSHAN VLADIMIR

More information

Challenges in Business Process Management: Verification of business processes using Petri nets

Challenges in Business Process Management: Verification of business processes using Petri nets Challenges in Business Process Management: Verification of business processes using Petri nets W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,

More information

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net

The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the

More information

Approximation of an Open Polygonal Curve with a Minimum Number of Circular Arcs and Biarcs

Approximation of an Open Polygonal Curve with a Minimum Number of Circular Arcs and Biarcs Approximation of an Open Polygonal Curve with a Minimum Number of Circular Arcs and Biarcs R. L. Scot Drysdale a Günter Rote b,1 Astrid Sturm b,1 a Department of Computer Science, Dartmouth College b Institut

More information

Outline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1

Outline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1 GRAPH THEORY LECTURE STRUCTURE AND REPRESENTATION PART A Abstract. Chapter focuses on the question of when two graphs are to be regarded as the same, on symmetries, and on subgraphs.. discusses the concept

More information

Shortest Inspection-Path. Queries in Simple Polygons

Shortest Inspection-Path. Queries in Simple Polygons Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,

More information

GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

Approximating the Minimum Chain Completion problem

Approximating the Minimum Chain Completion problem Approximating the Minimum Chain Completion problem Tomás Feder Heikki Mannila Evimaria Terzi Abstract A bipartite graph G = (U, V, E) is a chain graph [9] if there is a bijection π : {1,..., U } U such

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

Small Maximal Independent Sets and Faster Exact Graph Coloring

Small Maximal Independent Sets and Faster Exact Graph Coloring Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected

More information

The Halting Problem is Undecidable

The Halting Problem is Undecidable 185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine

More information

Solutions of Equations in One Variable. Fixed-Point Iteration II

Solutions of Equations in One Variable. Fixed-Point Iteration II Solutions of Equations in One Variable Fixed-Point Iteration II Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011

More information

Lecture 2 Introduction to Data Flow Analysis

Lecture 2 Introduction to Data Flow Analysis Lecture 2 Introduction to Data Flow Analysis I. Introduction II. Example: Reaching definition analysis III. Example: Liveness analysis IV. A General Framework (Theory in next lecture) Reading: Chapter

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

Arrangements And Duality

Arrangements And Duality Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,

More information

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard

More information

6.1 Basic Right Triangle Trigonometry

6.1 Basic Right Triangle Trigonometry 6.1 Basic Right Triangle Trigonometry MEASURING ANGLES IN RADIANS First, let s introduce the units you will be using to measure angles, radians. A radian is a unit of measurement defined as the angle at

More information

Calculate the value of π

Calculate the value of π Rakesh Goel CEO, SK Dynamics P. Ltd., B5 Industrial Estate, Roorkee 247 667 I. Abstract: π is a constant extensively used in Mathematics and application of mathematics in Physics etc. In fact, π is considered

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

Verification of Computing Policies and Other Hard Problems

Verification of Computing Policies and Other Hard Problems Verification of Computing Policies and Other Hard Problems Mohamed G Gouda University of Texas at Austin gouda@cs.utexas.edu Presentation at METIS-2014 1 Computing Policy A computing policy is a formalism

More information

Cleaning Structured Event Logs: A Graph Repair Approach

Cleaning Structured Event Logs: A Graph Repair Approach Cleaning Structured Event Logs: A Repair Approach Jianmin Wang, Shaoxu Song, Xuemin Lin, Xiaochen Zhu, Jian Pei Key Laboratory for Information System Security, MoE; TNList; School of Software, Tsinghua

More information

Soundness of Workflow Nets with Reset Arcs

Soundness of Workflow Nets with Reset Arcs Soundness of Workflow Nets with Reset Arcs W.M.P. van der Aalst 1,2, K.M. van Hee 1, A.H.M. ter Hofstede 2, N. Sidorova 1, H.M.W. Verbeek 1, M. Voorhoeve 1, and M.T. Wynn 2 1 Department of Mathematics

More information

Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16

Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16 Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz Michel.Schinz@epfl.ch Assistant: Iulian Dragos INR 321, 368 64

More information

Composing Supply Chains through Multi-unit Combinatorial Reverse Auctions with Transformability Relationships among Goods

Composing Supply Chains through Multi-unit Combinatorial Reverse Auctions with Transformability Relationships among Goods JOURNAL OF L A TEX CLASS FILES, VOL. 6, NO., JANUARY 7 Composing Supply Chains through Multi-unit Combinatorial Reverse Auctions with Transformability Relationships among Goods Andrea Giovannucci, Jesús

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER

THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER JASPER DEANTONIO Abstract. This paper is a study of the Turing Degrees, which are levels of incomputability naturally arising from sets of natural numbers.

More information

Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms. Part 3: P, NP Hard Problems Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

More information

Postulate 17 The area of a square is the square of the length of a. Postulate 18 If two figures are congruent, then they have the same.

Postulate 17 The area of a square is the square of the length of a. Postulate 18 If two figures are congruent, then they have the same. Chapter 11: Areas of Plane Figures (page 422) 11-1: Areas of Rectangles (page 423) Rectangle Rectangular Region Area is measured in units. Postulate 17 The area of a square is the square of the length

More information

Finite Automata and Regular Languages

Finite Automata and Regular Languages CHAPTER 3 Finite Automata and Regular Languages 3. Introduction 3.. States and Automata A finite-state machine or finite automaton (the noun comes from the Greek; the singular is automaton, the Greek-derived

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Papers in Business and Economics Solving symmetric mixed-model multilevel just-in-time scheduling problems Malte Fliedner, Nils Boysen, Armin Scholl 18/2008 Jenaer Schriften zur Wirtschaftswissenschaft

More information

CSC 505, Fall 2000: Week 8

CSC 505, Fall 2000: Week 8 Objecties: CSC 505, Fall 2000: Week 8 learn abot the basic depth-first search algorithm learn how properties of a graph can be inferred from the strctre of a DFS tree learn abot one nontriial application

More information

Improving Data Quality: Consistency and Accuracy

Improving Data Quality: Consistency and Accuracy Improving Data Quality: Consistency and Accuracy Gao Cong 1 Wenfei Fan 2,3 Floris Geerts 2,4,5 Xibei Jia 2 Shuai Ma 2 1 Microsoft Research Asia 2 University of Edinburgh 4 Hasselt University 3 Bell Laboratories

More information