SlideShare a Scribd company logo
1 of 14
Download to read offline
Olivia Oanea, 
                     Harro Wimmel, 
                     Karsten Wolf


New Algorithms for Deciding the
    Siphon/Trap Property 
Situation
-Siphon:       •D ⊆ D•           once empty, always empty
-Trap:         Q• ⊆ •Q           once marked, always marked

-The siphon/trap property: Every Siphon includes a marked trap

   -Necessary and sufficient for liveness in free choice nets
   -Sufficient for deadlock freedom in ordinary nets

-There can be exponentially many (even minimal) siphons


  Brute force algorithms don‘t outperform state space methods

We propose
       - a reduction to SAT (2 slides)
       - a divide-and-conquer scheme (remaining slides)
                 Karsten Wolf: New Algorithms for Deciding 
                         the Siphon/Trap Property
Reduction to SAT
                                                             q1
                   p1                                                     Siphon: (q1⋁q2⋁q3)⇒(p1⋁p2)
Well known:                                                  q2
                   p2                                                      Trap:      (p1⋁p2)⇒(q1⋁q2⋁q3)
                                                             q3


        SAT: Exists satisfying assignment?

 Siphon/trap: Exists siphon where all included traps are unmarked?
 Siphon/trap: Exists siphon where the maximal included trap is unmarked?

Maximal trap: start with S, iteratively remove places p where:
                                                                                                  p
                                  Copy place variables p(0) .. p(n)



 ⋀ t∈T(t•
            (0)⇒•t(0))⋀   ⋁
                          p∈P   p(0) ⋀⋀ ⋀i=1..n    p∈P(p
                                                           (i)⇔(p(i-1)⋀   ⋀  t∈p•t•       ⋀
                                                                                   (i-1)))⋀
                                                                                              p∈P,m0(p)>0⌝p
                                                                                                              (n)




                                     Karsten Wolf: New Algorithms for Deciding 
                                             the Siphon/Trap Property
Results

Net      |P|    |T|                   |F|                    SAT    INA
Ph10     50     40                    120                    0.05   3
Ph20     100    80                    240                    0.24   >7200
Ph200    1000   800                   2400                   119    >7200
Data10   50     40                    300                    0.12   8
Data15   75     60                    600                    0.36   28




                Karsten Wolf: New Algorithms for Deciding 
                        the Siphon/Trap Property
Divide and Conquer
-Decompose Petri net into open nets
-Compute siphons and traps of atomic components
-Condense information into interface
-Unify components and update interface information


                           -Interface place: ≤1 producing, ≤1 consuming component

                           -Composition of components yields component

                           -[Zaitsev] There exists unique decomposition into
                             atomic components

                           - [We] run-time O(n2log*n)




                            Karsten Wolf: New Algorithms for Deciding 
                                    the Siphon/Trap Property
Examples




Karsten Wolf: New Algorithms for Deciding 
        the Siphon/Trap Property
Improvement




-Preserves siphon/trap property
-Permits arbitrarily fine decomposition
                              Karsten Wolf: New Algorithms for Deciding 
                                      the Siphon/Trap Property
Siphons/Traps and components
-Siphon/trap of composition decomposes into siphons/traps of components
-Siphons/traps of components with equal interface compose to siphon/trap in
composition




                    Siphon              Siphon



          Siphon             Siphon




                          Karsten Wolf: New Algorithms for Deciding 
                                  the Siphon/Trap Property
Example




Karsten Wolf: New Algorithms for Deciding 
        the Siphon/Trap Property
Elementary Siphons/Traps
-Siphon is elementary if it is a minimal one containing p, for some interface place p
-Trap is elementary if it is a minimal one containing p,
                      for some interface place p, or some marked place p

Lemma: For evaluating the siphon/trap property, sufficient to consider
       - siphons that are local to one of the components
       - unions of elementary siphons and unions of elementary traps

Idea: Store
         - interfaces of elementary traps and siphons
         - For each elementary trap Q:
                   all minimal unions of elementary siphons that wrap Q

                                1: (a-min) a                   (a-min) ac ⊆ 3
 a                       c      2: (b-min) b                   (a-min) ad ⊆ 5
                                3: (c-min) ac                  (b-min) bc ⊆ 4
                                4: (c-min) bc                  (b-min) bd ⊆ 6
b                        d      5: (d-min) ad                  (c-min) c ⊆ 3,4
                                6: (d-min) bd                  (d-min) d ⊆ 5,6
                               Karsten Wolf: New Algorithms for Deciding 
                                       the Siphon/Trap Property
Composition 1: closed siphons
                                           c
                   a



                   b                       d

1: (a-min) a      (a-min) ac* ⊆ 3                       1‘: (c-min) c         (c-min) ca* ⊆ 3‘
2: (b-min) b      (a-min) ad ⊆ 5                        2‘: (d-min) d         (c-min) cb* ⊆ 5‘
3: (c-min) ac     (b-min) bc* ⊆ 4                       3‘: (a-min) ca        (d-min) da ⊆ 4‘
4: (c-min) bc     (b-min) bd ⊆ 6                        4‘: (a-min) da        (d-min) db ⊆ 6‘
5: (d-min) ad     (c-min) c* ⊆ 3,4                      5‘: (b-min) cb        (a-min) a ⊆ 3‘,4‘
6: (d-min) bd     (d-min) d ⊆ 5,6                       6‘: (b-min) db        (b-min) b ⊆ 5‘,6‘

        Check 3⊕3‘: contains ac*⊕ca*    … ok
        …
        Check 6⊕6‘: contains only unmarked traps                  …. Not ok

                       Formally: SAT formula
                           Karsten Wolf: New Algorithms for Deciding 
                                   the Siphon/Trap Property
Composition 2: open siphons
                                            c
                     a
                                                                            e


                    b                       d                               f

1: (a-min) a       (a-min) ac ⊆ 3                        1‘: (c-min) c          (c-min) ce ⊆ 3‘
2: (b-min) b       (a-min) ad ⊆ 5                        2‘: (d-min) d          (c-min) cf ⊆ 5‘
3: (c-min) ac      (b-min) bc ⊆ 4                        3‘: (e-min) ce         (d-min) de ⊆ 4‘
4: (c-min) bc      (b-min) bd ⊆ 6                        4‘: (e-min) de         (d-min) df ⊆ 6‘
5: (d-min) ad      (c-min) c ⊆ 3,4                       5‘: (f-min) cf         (e-min) e ⊆ 3‘,4‘
6: (d-min) bd      (d-min) d ⊆ 5,6                       6‘: (f-min) df         (f-min) f ⊆ 5‘,6‘
          1‘‘ = 1: (a-min) a                      (a-min) ae ⊆ 3‘‘,4‘‘5‘‘
          2‘‘ = 1: (b-min) b                      (a-min) af ⊆ 5‘‘,3‘‘6‘‘
          3‘‘= 3‘⊕3 = 4‘⊕5: (e-min) ae            (b-min) be ⊆ 4‘‘,3‘‘6‘‘
          4‘‘= 3‘⊕4 = 4‘⊕6: (e-min) be            (b-min) bf ⊆ 6. 4‘‘5‘‘
          5‘‘= 5‘⊕3 = 6‘⊕5: (f-min) af            (e-min) e ⊆ 3‘‘,4‘‘
          6‘‘= 5‘⊕4 = 6‘⊕6: (f-min) bf            (f-min) f ⊆ 5‘‘,6‘‘
                            Karsten Wolf: New Algorithms for Deciding 
                                    the Siphon/Trap Property
Results
Approach exponential, but mostly in the size of the interface


 Example:




-Exponentially many minimal siphons
-Linear time in our approach


                           Karsten Wolf: New Algorithms for Deciding 
                                   the Siphon/Trap Property
Conclusion
Algorithm 1: Reduction to SAT
-Boolean formula polynomial in the size of the net
-Inherits efficiency from existing SAT technology


Algorithm 2: Divide & Conquer
-Efficient decomposition into arbitrarily small components
-Siphons and traps are preserved in open net decomposition
-Abstract shared siphon/trap information to interface
-Works well if
     -net can be split according to small interfaces
     -Net has many identical components




                        Karsten Wolf: New Algorithms for Deciding 
                                the Siphon/Trap Property

More Related Content

What's hot

Estimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAMEstimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAMtakuyayamamoto1800
 
An evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsAn evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsLinaro
 
Summary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.enSummary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.enAda Darmon
 
Quadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitterQuadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitterAsaad Drake
 
Presentation final
Presentation finalPresentation final
Presentation finalKate Lu
 
Random Number Generators 2018
Random Number Generators 2018Random Number Generators 2018
Random Number Generators 2018rinnocente
 
Crabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelCrabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelJean-Marie Mudry
 
Module 13 Gradient And Area Under A Graph
Module 13  Gradient And Area Under A GraphModule 13  Gradient And Area Under A Graph
Module 13 Gradient And Area Under A Graphguestcc333c
 
Building Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and ManifoldsBuilding Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and ManifoldsDavide Eynard
 
Siddhartha fft pptx
Siddhartha fft pptxSiddhartha fft pptx
Siddhartha fft pptxSIDDHARTHA V
 

What's hot (20)

Power spectral density
Power spectral densityPower spectral density
Power spectral density
 
Estimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAMEstimation of numerical schemes in heat convection by OpenFOAM
Estimation of numerical schemes in heat convection by OpenFOAM
 
Matched filter
Matched filterMatched filter
Matched filter
 
An evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsAn evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loops
 
Summary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.enSummary of formulae_from_chapter_4.en
Summary of formulae_from_chapter_4.en
 
Quadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitterQuadrature amplitude modulation qam transmitter
Quadrature amplitude modulation qam transmitter
 
Presentation final
Presentation finalPresentation final
Presentation final
 
Bao ctics 2012
Bao ctics 2012Bao ctics 2012
Bao ctics 2012
 
Random Number Generators 2018
Random Number Generators 2018Random Number Generators 2018
Random Number Generators 2018
 
1111
11111111
1111
 
Rf2008 test 1
Rf2008 test 1Rf2008 test 1
Rf2008 test 1
 
Realizing milti-hit-ray
Realizing milti-hit-rayRealizing milti-hit-ray
Realizing milti-hit-ray
 
Crabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelCrabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic model
 
6th Semester (June; July-2014) Electronics and Communication Engineering Ques...
6th Semester (June; July-2014) Electronics and Communication Engineering Ques...6th Semester (June; July-2014) Electronics and Communication Engineering Ques...
6th Semester (June; July-2014) Electronics and Communication Engineering Ques...
 
Graph Kernelpdf
Graph KernelpdfGraph Kernelpdf
Graph Kernelpdf
 
Gsm attacks
Gsm attacksGsm attacks
Gsm attacks
 
Module 13 Gradient And Area Under A Graph
Module 13  Gradient And Area Under A GraphModule 13  Gradient And Area Under A Graph
Module 13 Gradient And Area Under A Graph
 
Building Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and ManifoldsBuilding Compatible Bases on Graphs, Images, and Manifolds
Building Compatible Bases on Graphs, Images, and Manifolds
 
NASA 2004 PP
NASA 2004 PPNASA 2004 PP
NASA 2004 PP
 
Siddhartha fft pptx
Siddhartha fft pptxSiddhartha fft pptx
Siddhartha fft pptx
 

Viewers also liked

Viewers also liked (6)

Syphon
SyphonSyphon
Syphon
 
Hydraulic structures
Hydraulic structuresHydraulic structures
Hydraulic structures
 
Turbulent flow
Turbulent flowTurbulent flow
Turbulent flow
 
Cross Drainage Works
Cross Drainage WorksCross Drainage Works
Cross Drainage Works
 
Centrifugal pump
Centrifugal pumpCentrifugal pump
Centrifugal pump
 
Reynold number (Fluid Mechanics)(FM)
Reynold number (Fluid Mechanics)(FM)Reynold number (Fluid Mechanics)(FM)
Reynold number (Fluid Mechanics)(FM)
 

Similar to Siphon

Data made out of functions
Data made out of functionsData made out of functions
Data made out of functionskenbot
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Yandex
 
射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介Simen Li
 
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...gigax2
 
Strong functional programming
Strong functional programmingStrong functional programming
Strong functional programmingEric Torreborre
 
An automated and user-friendly optical tweezers for biomolecular investigat...
An automated and user-friendly optical  tweezers for biomolecular  investigat...An automated and user-friendly optical  tweezers for biomolecular  investigat...
An automated and user-friendly optical tweezers for biomolecular investigat...Dr. Pranav Rathi
 
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationSOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationDon Sheehy
 
Yampa AFRP Introduction
Yampa AFRP IntroductionYampa AFRP Introduction
Yampa AFRP IntroductionChengHui Weng
 
Introduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCDIntroduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCDChristos Kallidonis
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...Alex Pruden
 
Analysis of T-Beam
Analysis of T-BeamAnalysis of T-Beam
Analysis of T-Beam01008828934
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Simen Li
 
Falzon Das Se Ag Compressed
Falzon Das Se Ag CompressedFalzon Das Se Ag Compressed
Falzon Das Se Ag Compressedgfalzon2
 
Math resources trigonometric_formulas
Math resources trigonometric_formulasMath resources trigonometric_formulas
Math resources trigonometric_formulasEr Deepak Sharma
 
Math resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12thMath resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12thDeepak Kumar
 
MOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDFMOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDFTsuyoshi Horigome
 

Similar to Siphon (20)

Data made out of functions
Data made out of functionsData made out of functions
Data made out of functions
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks
 
射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介射頻電子 - [第一章] 知識回顧與通訊系統簡介
射頻電子 - [第一章] 知識回顧與通訊系統簡介
 
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...CELEBRATION 2000 (3rd Deployment) & ALP 2002Generation of a 3D-Model of the ...
CELEBRATION 2000 (3rd Deployment) & ALP 2002 Generation of a 3D-Model of the ...
 
Strong functional programming
Strong functional programmingStrong functional programming
Strong functional programming
 
An automated and user-friendly optical tweezers for biomolecular investigat...
An automated and user-friendly optical  tweezers for biomolecular  investigat...An automated and user-friendly optical  tweezers for biomolecular  investigat...
An automated and user-friendly optical tweezers for biomolecular investigat...
 
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationSOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
 
Yampa AFRP Introduction
Yampa AFRP IntroductionYampa AFRP Introduction
Yampa AFRP Introduction
 
draft5
draft5draft5
draft5
 
Introduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCDIntroduction to Hadron Structure from Lattice QCD
Introduction to Hadron Structure from Lattice QCD
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
Analysis of T-Beam
Analysis of T-BeamAnalysis of T-Beam
Analysis of T-Beam
 
Chris Sherlock's slides
Chris Sherlock's slidesChris Sherlock's slides
Chris Sherlock's slides
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1]
 
Falzon Das Se Ag Compressed
Falzon Das Se Ag CompressedFalzon Das Se Ag Compressed
Falzon Das Se Ag Compressed
 
Cs262 2006 lecture6
Cs262 2006 lecture6Cs262 2006 lecture6
Cs262 2006 lecture6
 
economics
economicseconomics
economics
 
Math resources trigonometric_formulas
Math resources trigonometric_formulasMath resources trigonometric_formulas
Math resources trigonometric_formulas
 
Math resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12thMath resources trigonometric_formulas class 11th and 12th
Math resources trigonometric_formulas class 11th and 12th
 
MOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDFMOSFET Simulation (16FEB2012) in PDF
MOSFET Simulation (16FEB2012) in PDF
 

More from Universität Rostock

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsUniversität Rostock
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography RealizationUniversität Rostock
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMNUniversität Rostock
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationUniversität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAUniversität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesUniversität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAUniversität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionUniversität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageUniversität Rostock
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for ServicesUniversität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumUniversität Rostock
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAUniversität Rostock
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaUniversität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Siphon

  • 1. Olivia Oanea,  Harro Wimmel,  Karsten Wolf New Algorithms for Deciding the Siphon/Trap Property 
  • 2. Situation -Siphon: •D ⊆ D• once empty, always empty -Trap: Q• ⊆ •Q once marked, always marked -The siphon/trap property: Every Siphon includes a marked trap -Necessary and sufficient for liveness in free choice nets -Sufficient for deadlock freedom in ordinary nets -There can be exponentially many (even minimal) siphons Brute force algorithms don‘t outperform state space methods We propose - a reduction to SAT (2 slides) - a divide-and-conquer scheme (remaining slides) Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 3. Reduction to SAT q1 p1 Siphon: (q1⋁q2⋁q3)⇒(p1⋁p2) Well known: q2 p2 Trap: (p1⋁p2)⇒(q1⋁q2⋁q3) q3 SAT: Exists satisfying assignment? Siphon/trap: Exists siphon where all included traps are unmarked? Siphon/trap: Exists siphon where the maximal included trap is unmarked? Maximal trap: start with S, iteratively remove places p where: p Copy place variables p(0) .. p(n) ⋀ t∈T(t• (0)⇒•t(0))⋀ ⋁ p∈P p(0) ⋀⋀ ⋀i=1..n p∈P(p (i)⇔(p(i-1)⋀ ⋀ t∈p•t• ⋀ (i-1)))⋀ p∈P,m0(p)>0⌝p (n) Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 4. Results Net |P| |T| |F| SAT INA Ph10 50 40 120 0.05 3 Ph20 100 80 240 0.24 >7200 Ph200 1000 800 2400 119 >7200 Data10 50 40 300 0.12 8 Data15 75 60 600 0.36 28 Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 5. Divide and Conquer -Decompose Petri net into open nets -Compute siphons and traps of atomic components -Condense information into interface -Unify components and update interface information -Interface place: ≤1 producing, ≤1 consuming component -Composition of components yields component -[Zaitsev] There exists unique decomposition into atomic components - [We] run-time O(n2log*n) Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 7. Improvement -Preserves siphon/trap property -Permits arbitrarily fine decomposition Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 8. Siphons/Traps and components -Siphon/trap of composition decomposes into siphons/traps of components -Siphons/traps of components with equal interface compose to siphon/trap in composition Siphon Siphon Siphon Siphon Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 10. Elementary Siphons/Traps -Siphon is elementary if it is a minimal one containing p, for some interface place p -Trap is elementary if it is a minimal one containing p, for some interface place p, or some marked place p Lemma: For evaluating the siphon/trap property, sufficient to consider - siphons that are local to one of the components - unions of elementary siphons and unions of elementary traps Idea: Store - interfaces of elementary traps and siphons - For each elementary trap Q: all minimal unions of elementary siphons that wrap Q 1: (a-min) a (a-min) ac ⊆ 3 a c 2: (b-min) b (a-min) ad ⊆ 5 3: (c-min) ac (b-min) bc ⊆ 4 4: (c-min) bc (b-min) bd ⊆ 6 b d 5: (d-min) ad (c-min) c ⊆ 3,4 6: (d-min) bd (d-min) d ⊆ 5,6 Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 11. Composition 1: closed siphons c a b d 1: (a-min) a (a-min) ac* ⊆ 3 1‘: (c-min) c (c-min) ca* ⊆ 3‘ 2: (b-min) b (a-min) ad ⊆ 5 2‘: (d-min) d (c-min) cb* ⊆ 5‘ 3: (c-min) ac (b-min) bc* ⊆ 4 3‘: (a-min) ca (d-min) da ⊆ 4‘ 4: (c-min) bc (b-min) bd ⊆ 6 4‘: (a-min) da (d-min) db ⊆ 6‘ 5: (d-min) ad (c-min) c* ⊆ 3,4 5‘: (b-min) cb (a-min) a ⊆ 3‘,4‘ 6: (d-min) bd (d-min) d ⊆ 5,6 6‘: (b-min) db (b-min) b ⊆ 5‘,6‘ Check 3⊕3‘: contains ac*⊕ca* … ok … Check 6⊕6‘: contains only unmarked traps …. Not ok Formally: SAT formula Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 12. Composition 2: open siphons c a e b d f 1: (a-min) a (a-min) ac ⊆ 3 1‘: (c-min) c (c-min) ce ⊆ 3‘ 2: (b-min) b (a-min) ad ⊆ 5 2‘: (d-min) d (c-min) cf ⊆ 5‘ 3: (c-min) ac (b-min) bc ⊆ 4 3‘: (e-min) ce (d-min) de ⊆ 4‘ 4: (c-min) bc (b-min) bd ⊆ 6 4‘: (e-min) de (d-min) df ⊆ 6‘ 5: (d-min) ad (c-min) c ⊆ 3,4 5‘: (f-min) cf (e-min) e ⊆ 3‘,4‘ 6: (d-min) bd (d-min) d ⊆ 5,6 6‘: (f-min) df (f-min) f ⊆ 5‘,6‘ 1‘‘ = 1: (a-min) a (a-min) ae ⊆ 3‘‘,4‘‘5‘‘ 2‘‘ = 1: (b-min) b (a-min) af ⊆ 5‘‘,3‘‘6‘‘ 3‘‘= 3‘⊕3 = 4‘⊕5: (e-min) ae (b-min) be ⊆ 4‘‘,3‘‘6‘‘ 4‘‘= 3‘⊕4 = 4‘⊕6: (e-min) be (b-min) bf ⊆ 6. 4‘‘5‘‘ 5‘‘= 5‘⊕3 = 6‘⊕5: (f-min) af (e-min) e ⊆ 3‘‘,4‘‘ 6‘‘= 5‘⊕4 = 6‘⊕6: (f-min) bf (f-min) f ⊆ 5‘‘,6‘‘ Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 13. Results Approach exponential, but mostly in the size of the interface Example: -Exponentially many minimal siphons -Linear time in our approach Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property
  • 14. Conclusion Algorithm 1: Reduction to SAT -Boolean formula polynomial in the size of the net -Inherits efficiency from existing SAT technology Algorithm 2: Divide & Conquer -Efficient decomposition into arbitrarily small components -Siphons and traps are preserved in open net decomposition -Abstract shared siphon/trap information to interface -Works well if -net can be split according to small interfaces -Net has many identical components Karsten Wolf: New Algorithms for Deciding  the Siphon/Trap Property