SlideShare a Scribd company logo
1 of 26
7. Implementation
Plan
•   Firing a transition
•   Evaluating a state predicate
•   Managing the state space
•   Organizing search
•   Detecting strongly connected components
Firing transitions
Marking changed via list of pre-, list of post-
places  effort does not depend on size of
net
After firing, only some transitions are checked
for enabledness
   previously enabled transitions that lost
   tokens
   previously disabled transitions that gained
   tokens
      ... managed through explicitly stored lists


   
         
       
   
         
     
   

Checking state predicates
• predicate = boolean combination of
     • p {><=≤≥≠} k

• stored in negation-free normal form

                                            φ



  φ                                     φ
            φ          φ

      
        

Managing the state space
1st state = bit vector

     




















   






   



   




   























   







other states = bit vector +decision record
 
               

Managing the state space
  find/insert a marking: one integrated process



  




















   






   



   




   























   





  dive down into decision tree
  on mismatch:
                  at decision point: switch to next vector
                  at end: found, no insert

        

                  between decision points: insert at point of mismatch




  decision records form tree
Organizing search
   General remarks

Search consists of

 - fire transitions ✔

 - find/insert marking ✔
 
 - backtracking: fire transition backwards

 
          only „constant“ time

 
         search stack consists of reference to
   transition +

 
            list of enabled transitions

 
          state space is „write-only“ memory
Organizing search
b) Depth-first search: ability to detect SCC
c) Breadth-first search:

Simulated by bounded depth-first search with
   incrementally increased bound

 Update of current marking, list of enabled
  transitions, etc. through sequence of transition
  occurrences
Detecting strongly connected
            components
    • Traditional approach: Tarjan‘s algorithm
         4                                         
        

4            6            21
5                                            
 
        
                 
 
 
 

             44                






 
               
                
      

    33               11        






 
 
     
                
          
     
   


             00                        
 
         
                
   
 

     

                                                                
             

             

                 

         

Detecting strongly connected
            components
    • LoLA approach: simplified lowlink

         4                                           
        

4            6            21
5                                            
 
          
             
 
 
 

             41                






 
                 
            
      

    31               11        






 
 
       
                
      
     
            


             00                         
 
                       
   
           
   
 

     

                                    
            
                

             

                                             
       
                    
   
             

                 

                               
                     

         

Reduction techniques
Stubborn Sets
  • Crucial: Core principle
  • Simple method:
     – If t enabled, add conflicting transitions
     – If t disabled, add pre-transitions of some
       unmarked pre-place

 place       pre-transitions

             must be included
transition   conflicting

             updated at enabledness check
The sweep-line method
• constant change  successors lie in a small window of
  progress values
                                      





        

                                                  

                                                      

Calculation of Symmetries
     7 5                          0 2        A1 ∪.... ∪ An = V
A1                                      B1
              9               4              B1 ∪....∪ Bn = V

A2 1 4                        3
                  2               6 B2       σ satisfies C        iff
     6                        9 8
                                             σ(Ai) = Bi (for all i)
                                                    07
      3                       7         B3          13
A3            0                                     29
                                   5                35
                                                    48
                      .....                         50
                                                    66
An                                      Bn
          8                        1                74
                                                    81
                                                    92
                       C
Abstract Permutation – Examples
Abstract Permutation – Examples

PP                      all permutations that
TT                      respect node type
Abstract Permutation – Examples

PP                              all permutations that
TT                              respect node type



{p1}  {p1}
   ......         Elements of some orbit
{pi-1}  {pi-1}   wrt. Ui in Ui-1
{pi}  {pk}
others1  others2
Abstract Permutation – Examples

 PP                                   all permutations that
 TT                                   respect node type



  {p1}  {p1}
     ......         Elements of some orbit
  {pi-1}  {pi-1}   wrt. Ui in Ui-1
  {pi}  {pk}
  others1  others2

New problem: given.: abstract permutation C
compute an automorphism that satisfies C

... equivalent to graph isomorphism
REFINE
        Choose A-B, A’-B’ and arc multiplicity c

    # c-neighbors in A’                           #c-neighbors in B’
    3    2     1        0                         0     1       2                    3
A                                                                                        B
                         8        9                        8           6
             6                                1
                     0                             5                        4    2
    1            2           4       3                 7       0




                                                               8           7
                     2           5                     4                        B’
        A’       1                                                 0
                          3
REFINE
         Choose A-B, A’-B’ and arc multiplicity c

     # c-neighbors in A’                           #c-neighbors in B’
     3    2     1        0                         0     1       2                    3
A                                                                                         B
                          8        9                        8           6
              6                                1
                      0                             5                        4    2
     1            2           4       3                 7       0




                                                                8           7
                      2           5                     4                        B’
         A’       1                                                 0
                           3
    Every automorphism that satisfies A-B, satisfies all resulting
    constraints
DEFINE
Choose A-B,
p ∈A          2 5        1 2
               3 8       4 5
DEFINE
Choose A-B,
p ∈A          2 5        1 2
               3 8       4 5



 2 5          1 2             2 5    1 2
  3 8         4 5              3 8   4 5



 2 5          1 2             2 5    1 2
  3 8         4 5              3 8   4 5
DEFINE
Choose A-B,
p ∈A               2 5                 1 2
                    3 8                4 5



  2 5              1 2                  2 5    1 2
   3 8             4 5                   3 8   4 5



  2 5              1 2                  2 5    1 2
   3 8             4 5                   3 8   4 5

Every automorphism tat satisfies A-B,
satisfies one of the new constraints
Computation tree

                                     4                   3
                                                 2

poly
                                 1       8           1
                                     6                   7 8
                                                               5


                                     a       b           f a
                                         e                c



                                                 R*
                                                 D
               R*                                R*                         R*
               D                                 D
   R*            R*         R*                   R*                R*

                        2            3                         2        3


                        3            8                         3        8



                        c            c                         c        c



                                                 exp
 = #Ai ! #Bi          is rare. That is, often polynomial run time
Combination of techniques
                               
 
      

                   
       



        







 
         
 
           
   

        















       
       
 

        















          

    
   
















        








        















 
               
 
     

        















            
 

        















 

        
























        

        
























          
     


       
















        

























        





        







More information
•   LoLA: ICATPN 2000, Petri Nets 2007
     – www.informatik.uni-rostock.de/tpp/

•   Stubborn sets: ICATPN 1999, Fundamenta Informaticae 2000, FMSD 2006
•   Symmetries: Acta Informatica 2000, TACAS 2000
•   Linear Algebra: TACAS 2003
•   Sweep-Line: TACAS 2004, STTT

•   Coverability graphs: FMSD 1999

•   Services: BPM 2005
•   GALS: ASYNC Krstic et al, 2005
•   Bio-chemistry: Talcott & Dill, 2005
•   Workflow: BPM 2009

More Related Content

Viewers also liked

Tools Commonly Used By Electricians
Tools Commonly Used By Electricians Tools Commonly Used By Electricians
Tools Commonly Used By Electricians Aidan Vosz
 
Electrical work s hop
Electrical work s hopElectrical work s hop
Electrical work s hopammar90khalil
 
Putting Out an Electrical Fire
Putting Out an Electrical FirePutting Out an Electrical Fire
Putting Out an Electrical FireAidan Vosz
 
3 Ways to Cut Mortises Faster and Better
3 Ways to Cut Mortises Faster and Better3 Ways to Cut Mortises Faster and Better
3 Ways to Cut Mortises Faster and BetterAcme Tools
 
Electrical Tools
Electrical ToolsElectrical Tools
Electrical Toolsdean dundas
 
ELECTRICAL TOOLS AND EQUIPMENT
ELECTRICAL TOOLS AND EQUIPMENTELECTRICAL TOOLS AND EQUIPMENT
ELECTRICAL TOOLS AND EQUIPMENTLudher Mollins
 
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLSDIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLSLyn Gile Facebook
 
Classification and Types of Press
Classification and Types of PressClassification and Types of Press
Classification and Types of Presssanket32
 
Electrical supplies & materials
Electrical supplies & materialsElectrical supplies & materials
Electrical supplies & materialsMichael Recolito
 
Hand and power tool safety power point
Hand and power tool safety power pointHand and power tool safety power point
Hand and power tool safety power pointShane Johns
 
Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1Pilita Santos
 
Electrical tools and its function
Electrical tools and its functionElectrical tools and its function
Electrical tools and its functionFortunato de Guzman
 
Handtool Safety Training
Handtool Safety TrainingHandtool Safety Training
Handtool Safety TrainingDan Junkins
 
Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3Pilita Santos
 

Viewers also liked (19)

Tools Commonly Used By Electricians
Tools Commonly Used By Electricians Tools Commonly Used By Electricians
Tools Commonly Used By Electricians
 
Electrical work s hop
Electrical work s hopElectrical work s hop
Electrical work s hop
 
Putting Out an Electrical Fire
Putting Out an Electrical FirePutting Out an Electrical Fire
Putting Out an Electrical Fire
 
3 Ways to Cut Mortises Faster and Better
3 Ways to Cut Mortises Faster and Better3 Ways to Cut Mortises Faster and Better
3 Ways to Cut Mortises Faster and Better
 
Electrical Tools
Electrical ToolsElectrical Tools
Electrical Tools
 
Electrical tools
Electrical toolsElectrical tools
Electrical tools
 
ELECTRICAL TOOLS AND EQUIPMENT
ELECTRICAL TOOLS AND EQUIPMENTELECTRICAL TOOLS AND EQUIPMENT
ELECTRICAL TOOLS AND EQUIPMENT
 
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLSDIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
 
Power press
Power pressPower press
Power press
 
Hand tools and hand hazards ppt
Hand tools and hand hazards pptHand tools and hand hazards ppt
Hand tools and hand hazards ppt
 
Classification and Types of Press
Classification and Types of PressClassification and Types of Press
Classification and Types of Press
 
Electrical supplies & materials
Electrical supplies & materialsElectrical supplies & materials
Electrical supplies & materials
 
Hand and power tool safety power point
Hand and power tool safety power pointHand and power tool safety power point
Hand and power tool safety power point
 
Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1
 
Press machines ppt
Press machines pptPress machines ppt
Press machines ppt
 
Electrical tools and its function
Electrical tools and its functionElectrical tools and its function
Electrical tools and its function
 
Handtool Safety Training
Handtool Safety TrainingHandtool Safety Training
Handtool Safety Training
 
Electrical Tools and Equipment
Electrical Tools and EquipmentElectrical Tools and Equipment
Electrical Tools and Equipment
 
Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3
 

Similar to Verification with LoLA: 7 Implementation

Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...Universität Rostock
 
Chapter 3: Linear Systems and Matrices - Part 2/Slides
Chapter 3: Linear Systems and Matrices - Part 2/SlidesChapter 3: Linear Systems and Matrices - Part 2/Slides
Chapter 3: Linear Systems and Matrices - Part 2/SlidesChaimae Baroudi
 
IST module 4
IST module 4IST module 4
IST module 4Vijaya79
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networksESCOM
 
Método de Klein
Método  de KleinMétodo  de Klein
Método de KleinBertha Vega
 
Dynamic Binary Analysis and Obfuscated Codes
Dynamic Binary Analysis and Obfuscated Codes Dynamic Binary Analysis and Obfuscated Codes
Dynamic Binary Analysis and Obfuscated Codes Jonathan Salwan
 
Understanding low latency jvm gcs V2
Understanding low latency jvm gcs V2Understanding low latency jvm gcs V2
Understanding low latency jvm gcs V2Jean-Philippe BEMPEL
 
GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...PTIHPA
 
MapReduce for Parallel Trace Validation of LTL Properties
MapReduce for Parallel Trace Validation of LTL PropertiesMapReduce for Parallel Trace Validation of LTL Properties
MapReduce for Parallel Trace Validation of LTL PropertiesSylvain Hallé
 
Least Square Optimization and Sparse-Linear Solver
Least Square Optimization and Sparse-Linear SolverLeast Square Optimization and Sparse-Linear Solver
Least Square Optimization and Sparse-Linear SolverJi-yong Kwon
 
PRESENTATION ON DATA STRUCTURE AND THEIR TYPE
PRESENTATION ON DATA STRUCTURE AND THEIR TYPEPRESENTATION ON DATA STRUCTURE AND THEIR TYPE
PRESENTATION ON DATA STRUCTURE AND THEIR TYPEnikhilcse1
 
456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).pptMohibKhan79
 
Control Flow Analysis
Control Flow AnalysisControl Flow Analysis
Control Flow AnalysisEdgar Barbosa
 
Double patterning (4/20 update)
Double patterning (4/20 update)Double patterning (4/20 update)
Double patterning (4/20 update)Danny Luk
 
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic SynthesisMinimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic SynthesisSajib Mitra
 

Similar to Verification with LoLA: 7 Implementation (20)

Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...
 
Lecture.1
Lecture.1Lecture.1
Lecture.1
 
Chapter 3: Linear Systems and Matrices - Part 2/Slides
Chapter 3: Linear Systems and Matrices - Part 2/SlidesChapter 3: Linear Systems and Matrices - Part 2/Slides
Chapter 3: Linear Systems and Matrices - Part 2/Slides
 
IST module 4
IST module 4IST module 4
IST module 4
 
Ch07 linearspacealignment
Ch07 linearspacealignmentCh07 linearspacealignment
Ch07 linearspacealignment
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networks
 
Método de Klein
Método  de KleinMétodo  de Klein
Método de Klein
 
Dynamic Binary Analysis and Obfuscated Codes
Dynamic Binary Analysis and Obfuscated Codes Dynamic Binary Analysis and Obfuscated Codes
Dynamic Binary Analysis and Obfuscated Codes
 
Understanding low latency jvm gcs V2
Understanding low latency jvm gcs V2Understanding low latency jvm gcs V2
Understanding low latency jvm gcs V2
 
GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...
 
Data structures
Data structuresData structures
Data structures
 
MapReduce for Parallel Trace Validation of LTL Properties
MapReduce for Parallel Trace Validation of LTL PropertiesMapReduce for Parallel Trace Validation of LTL Properties
MapReduce for Parallel Trace Validation of LTL Properties
 
Least Square Optimization and Sparse-Linear Solver
Least Square Optimization and Sparse-Linear SolverLeast Square Optimization and Sparse-Linear Solver
Least Square Optimization and Sparse-Linear Solver
 
Understanding low latency jvm gcs
Understanding low latency jvm gcsUnderstanding low latency jvm gcs
Understanding low latency jvm gcs
 
PRESENTATION ON DATA STRUCTURE AND THEIR TYPE
PRESENTATION ON DATA STRUCTURE AND THEIR TYPEPRESENTATION ON DATA STRUCTURE AND THEIR TYPE
PRESENTATION ON DATA STRUCTURE AND THEIR TYPE
 
456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt
 
AA-sort with SSE4.1
AA-sort with SSE4.1AA-sort with SSE4.1
AA-sort with SSE4.1
 
Control Flow Analysis
Control Flow AnalysisControl Flow Analysis
Control Flow Analysis
 
Double patterning (4/20 update)
Double patterning (4/20 update)Double patterning (4/20 update)
Double patterning (4/20 update)
 
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic SynthesisMinimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
 

More from Universität Rostock

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsUniversität Rostock
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography RealizationUniversität Rostock
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMNUniversität Rostock
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAUniversität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesUniversität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAUniversität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionUniversität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageUniversität Rostock
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for ServicesUniversität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumUniversität Rostock
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAUniversität Rostock
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaUniversität Rostock
 
service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...Universität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 
service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...
 

Recently uploaded

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 

Recently uploaded (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 

Verification with LoLA: 7 Implementation

  • 2. Plan • Firing a transition • Evaluating a state predicate • Managing the state space • Organizing search • Detecting strongly connected components
  • 3. Firing transitions Marking changed via list of pre-, list of post- places  effort does not depend on size of net After firing, only some transitions are checked for enabledness previously enabled transitions that lost tokens previously disabled transitions that gained tokens ... managed through explicitly stored lists 
 
 
 
 
 
 
 

  • 4. Checking state predicates • predicate = boolean combination of • p {><=≤≥≠} k • stored in negation-free normal form φ φ φ φ φ 
 

  • 5. Managing the state space 1st state = bit vector 




















 






 



 




 























 


 other states = bit vector +decision record 
 

  • 6. Managing the state space find/insert a marking: one integrated process 




















 






 



 




 























 


 dive down into decision tree on mismatch: at decision point: switch to next vector at end: found, no insert 
 
 between decision points: insert at point of mismatch decision records form tree
  • 7. Organizing search General remarks Search consists of - fire transitions ✔ - find/insert marking ✔ - backtracking: fire transition backwards  only „constant“ time search stack consists of reference to transition + list of enabled transitions  state space is „write-only“ memory
  • 8. Organizing search b) Depth-first search: ability to detect SCC c) Breadth-first search: Simulated by bounded depth-first search with incrementally increased bound  Update of current marking, list of enabled transitions, etc. through sequence of transition occurrences
  • 9. Detecting strongly connected components • Traditional approach: Tarjan‘s algorithm 4 
 
 4 6 21 5 
 
 
 
 
 
 
 44 






 
 
 
 
 33 11 






 
 
 
 
 
 
 
 00 
 
 
 
 
 
 
 
 
 
 
 

  • 10. Detecting strongly connected components • LoLA approach: simplified lowlink 4 
 
 4 6 21 5 
 
 
 
 
 
 
 41 






 
 
 
 
 31 11 






 
 
 
 
 
 
 
 00 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

  • 12. Stubborn Sets • Crucial: Core principle • Simple method: – If t enabled, add conflicting transitions – If t disabled, add pre-transitions of some unmarked pre-place place pre-transitions must be included transition conflicting updated at enabledness check
  • 13. The sweep-line method • constant change  successors lie in a small window of progress values 
 
 
 

  • 14. Calculation of Symmetries 7 5 0 2 A1 ∪.... ∪ An = V A1 B1 9 4 B1 ∪....∪ Bn = V A2 1 4 3 2 6 B2 σ satisfies C iff 6 9 8 σ(Ai) = Bi (for all i) 07 3 7 B3 13 A3 0 29 5 35 48 ..... 50 66 An Bn 8 1 74 81 92 C
  • 16. Abstract Permutation – Examples PP all permutations that TT respect node type
  • 17. Abstract Permutation – Examples PP all permutations that TT respect node type {p1}  {p1} ...... Elements of some orbit {pi-1}  {pi-1} wrt. Ui in Ui-1 {pi}  {pk} others1  others2
  • 18. Abstract Permutation – Examples PP all permutations that TT respect node type {p1}  {p1} ...... Elements of some orbit {pi-1}  {pi-1} wrt. Ui in Ui-1 {pi}  {pk} others1  others2 New problem: given.: abstract permutation C compute an automorphism that satisfies C ... equivalent to graph isomorphism
  • 19. REFINE Choose A-B, A’-B’ and arc multiplicity c # c-neighbors in A’ #c-neighbors in B’ 3 2 1 0 0 1 2 3 A B 8 9 8 6 6 1 0 5 4 2 1 2 4 3 7 0 8 7 2 5 4 B’ A’ 1 0 3
  • 20. REFINE Choose A-B, A’-B’ and arc multiplicity c # c-neighbors in A’ #c-neighbors in B’ 3 2 1 0 0 1 2 3 A B 8 9 8 6 6 1 0 5 4 2 1 2 4 3 7 0 8 7 2 5 4 B’ A’ 1 0 3 Every automorphism that satisfies A-B, satisfies all resulting constraints
  • 21. DEFINE Choose A-B, p ∈A 2 5 1 2 3 8 4 5
  • 22. DEFINE Choose A-B, p ∈A 2 5 1 2 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5
  • 23. DEFINE Choose A-B, p ∈A 2 5 1 2 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5 Every automorphism tat satisfies A-B, satisfies one of the new constraints
  • 24. Computation tree 4 3 2 poly 1 8 1 6 7 8 5 a b f a e c R* D R* R* R* D D R* R* R* R* R* 2 3 2 3 3 8 3 8 c c c c exp = #Ai ! #Bi is rare. That is, often polynomial run time
  • 25. Combination of techniques 
 
 
 
 
 







 
 
 
 
 
 















 
 
 
 















 
 
 















 







 















 
 
 
 
 















 
 
 















 
 
























 
 
























 
 
 
 















 
























 




 







  • 26. More information • LoLA: ICATPN 2000, Petri Nets 2007 – www.informatik.uni-rostock.de/tpp/ • Stubborn sets: ICATPN 1999, Fundamenta Informaticae 2000, FMSD 2006 • Symmetries: Acta Informatica 2000, TACAS 2000 • Linear Algebra: TACAS 2003 • Sweep-Line: TACAS 2004, STTT • Coverability graphs: FMSD 1999 • Services: BPM 2005 • GALS: ASYNC Krstic et al, 2005 • Bio-chemistry: Talcott & Dill, 2005 • Workflow: BPM 2009

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n