SlideShare a Scribd company logo
1 of 26
7. Implementation
Plan
•   Firing a transition
•   Evaluating a state predicate
•   Managing the state space
•   Organizing search
•   Detecting strongly connected components
Firing transitions
Marking changed via list of pre-, list of post-
places  effort does not depend on size of
net
After firing, only some transitions are checked
for enabledness
   previously enabled transitions that lost
   tokens
   previously disabled transitions that gained
   tokens
      ... managed through explicitly stored lists


   
         
       
   
         
     
   

Checking state predicates
• predicate = boolean combination of
     • p {><=≤≥≠} k

• stored in negation-free normal form

                                            φ



  φ                                     φ
            φ          φ

      
        

Managing the state space
1st state = bit vector

     




















   






   



   




   























   







other states = bit vector +decision record
 
               

Managing the state space
  find/insert a marking: one integrated process



  




















   






   



   




   























   





  dive down into decision tree
  on mismatch:
                  at decision point: switch to next vector
                  at end: found, no insert

        

                  between decision points: insert at point of mismatch




  decision records form tree
Organizing search
   General remarks

Search consists of

 - fire transitions ✔

 - find/insert marking ✔
 
 - backtracking: fire transition backwards

 
          only „constant“ time

 
         search stack consists of reference to
   transition +

 
            list of enabled transitions

 
          state space is „write-only“ memory
Organizing search
b) Depth-first search: ability to detect SCC
c) Breadth-first search:

Simulated by bounded depth-first search with
   incrementally increased bound

 Update of current marking, list of enabled
  transitions, etc. through sequence of transition
  occurrences
Detecting strongly connected
            components
    • Traditional approach: Tarjan‘s algorithm
         4                                         
        

4            6            21
5                                            
 
        
                 
 
 
 

             44                






 
               
                
      

    33               11        






 
 
     
                
          
     
   


             00                        
 
         
                
   
 

     

                                                                
             

             

                 

         

Detecting strongly connected
            components
    • LoLA approach: simplified lowlink

         4                                           
        

4            6            21
5                                            
 
          
             
 
 
 

             41                






 
                 
            
      

    31               11        






 
 
       
                
      
     
            


             00                         
 
                       
   
           
   
 

     

                                    
            
                

             

                                             
       
                    
   
             

                 

                               
                     

         

Reduction techniques
Stubborn Sets
  • Crucial: Core principle
  • Simple method:
     – If t enabled, add conflicting transitions
     – If t disabled, add pre-transitions of some
       unmarked pre-place

 place       pre-transitions

             must be included
transition   conflicting

             updated at enabledness check
The sweep-line method
• constant change  successors lie in a small window of
  progress values
                                      





        

                                                  

                                                      

Calculation of Symmetries
     7 5                          0 2        A1 ∪.... ∪ An = V
A1                                      B1
              9               4              B1 ∪....∪ Bn = V

A2 1 4                        3
                  2               6 B2       σ satisfies C        iff
     6                        9 8
                                             σ(Ai) = Bi (for all i)
                                                    07
      3                       7         B3          13
A3            0                                     29
                                   5                35
                                                    48
                      .....                         50
                                                    66
An                                      Bn
          8                        1                74
                                                    81
                                                    92
                       C
Abstract Permutation – Examples
Abstract Permutation – Examples

PP                      all permutations that
TT                      respect node type
Abstract Permutation – Examples

PP                              all permutations that
TT                              respect node type



{p1}  {p1}
   ......         Elements of some orbit
{pi-1}  {pi-1}   wrt. Ui in Ui-1
{pi}  {pk}
others1  others2
Abstract Permutation – Examples

 PP                                   all permutations that
 TT                                   respect node type



  {p1}  {p1}
     ......         Elements of some orbit
  {pi-1}  {pi-1}   wrt. Ui in Ui-1
  {pi}  {pk}
  others1  others2

New problem: given.: abstract permutation C
compute an automorphism that satisfies C

... equivalent to graph isomorphism
REFINE
        Choose A-B, A’-B’ and arc multiplicity c

    # c-neighbors in A’                           #c-neighbors in B’
    3    2     1        0                         0     1       2                    3
A                                                                                        B
                         8        9                        8           6
             6                                1
                     0                             5                        4    2
    1            2           4       3                 7       0




                                                               8           7
                     2           5                     4                        B’
        A’       1                                                 0
                          3
REFINE
         Choose A-B, A’-B’ and arc multiplicity c

     # c-neighbors in A’                           #c-neighbors in B’
     3    2     1        0                         0     1       2                    3
A                                                                                         B
                          8        9                        8           6
              6                                1
                      0                             5                        4    2
     1            2           4       3                 7       0




                                                                8           7
                      2           5                     4                        B’
         A’       1                                                 0
                           3
    Every automorphism that satisfies A-B, satisfies all resulting
    constraints
DEFINE
Choose A-B,
p ∈A          2 5        1 2
               3 8       4 5
DEFINE
Choose A-B,
p ∈A          2 5        1 2
               3 8       4 5



 2 5          1 2             2 5    1 2
  3 8         4 5              3 8   4 5



 2 5          1 2             2 5    1 2
  3 8         4 5              3 8   4 5
DEFINE
Choose A-B,
p ∈A               2 5                 1 2
                    3 8                4 5



  2 5              1 2                  2 5    1 2
   3 8             4 5                   3 8   4 5



  2 5              1 2                  2 5    1 2
   3 8             4 5                   3 8   4 5

Every automorphism tat satisfies A-B,
satisfies one of the new constraints
Computation tree

                                     4                   3
                                                 2

poly
                                 1       8           1
                                     6                   7 8
                                                               5


                                     a       b           f a
                                         e                c



                                                 R*
                                                 D
               R*                                R*                         R*
               D                                 D
   R*            R*         R*                   R*                R*

                        2            3                         2        3


                        3            8                         3        8



                        c            c                         c        c



                                                 exp
 = #Ai ! #Bi          is rare. That is, often polynomial run time
Combination of techniques
                               
 
      

                   
       



        







 
         
 
           
   

        















       
       
 

        















          

    
   
















        








        















 
               
 
     

        















            
 

        















 

        
























        

        
























          
     


       
















        

























        





        







More information
•   LoLA: ICATPN 2000, Petri Nets 2007
     – www.informatik.uni-rostock.de/tpp/

•   Stubborn sets: ICATPN 1999, Fundamenta Informaticae 2000, FMSD 2006
•   Symmetries: Acta Informatica 2000, TACAS 2000
•   Linear Algebra: TACAS 2003
•   Sweep-Line: TACAS 2004, STTT

•   Coverability graphs: FMSD 1999

•   Services: BPM 2005
•   GALS: ASYNC Krstic et al, 2005
•   Bio-chemistry: Talcott & Dill, 2005
•   Workflow: BPM 2009

More Related Content

Viewers also liked

DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLSDIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
Lyn Gile Facebook
 
Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1
Pilita Santos
 
Handtool Safety Training
Handtool Safety TrainingHandtool Safety Training
Handtool Safety Training
Dan Junkins
 
Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3
Pilita Santos
 

Viewers also liked (19)

Tools Commonly Used By Electricians
Tools Commonly Used By Electricians Tools Commonly Used By Electricians
Tools Commonly Used By Electricians
 
Electrical work s hop
Electrical work s hopElectrical work s hop
Electrical work s hop
 
Putting Out an Electrical Fire
Putting Out an Electrical FirePutting Out an Electrical Fire
Putting Out an Electrical Fire
 
3 Ways to Cut Mortises Faster and Better
3 Ways to Cut Mortises Faster and Better3 Ways to Cut Mortises Faster and Better
3 Ways to Cut Mortises Faster and Better
 
Electrical Tools
Electrical ToolsElectrical Tools
Electrical Tools
 
Electrical tools
Electrical toolsElectrical tools
Electrical tools
 
ELECTRICAL TOOLS AND EQUIPMENT
ELECTRICAL TOOLS AND EQUIPMENTELECTRICAL TOOLS AND EQUIPMENT
ELECTRICAL TOOLS AND EQUIPMENT
 
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLSDIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
DIFFERENT TYPES OF ELECTRICAL POWER AND HYDRAULIC TOOLS
 
Power press
Power pressPower press
Power press
 
Hand tools and hand hazards ppt
Hand tools and hand hazards pptHand tools and hand hazards ppt
Hand tools and hand hazards ppt
 
Classification and Types of Press
Classification and Types of PressClassification and Types of Press
Classification and Types of Press
 
Electrical supplies & materials
Electrical supplies & materialsElectrical supplies & materials
Electrical supplies & materials
 
Hand and power tool safety power point
Hand and power tool safety power pointHand and power tool safety power point
Hand and power tool safety power point
 
Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1Classification of Hand Tools - PART 1
Classification of Hand Tools - PART 1
 
Press machines ppt
Press machines pptPress machines ppt
Press machines ppt
 
Electrical tools and its function
Electrical tools and its functionElectrical tools and its function
Electrical tools and its function
 
Handtool Safety Training
Handtool Safety TrainingHandtool Safety Training
Handtool Safety Training
 
Electrical Tools and Equipment
Electrical Tools and EquipmentElectrical Tools and Equipment
Electrical Tools and Equipment
 
Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3Classification of Hand Tools - PART 3
Classification of Hand Tools - PART 3
 

Similar to Verification with LoLA: 7 Implementation

Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...
Universität Rostock
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networks
ESCOM
 
Método de Klein
Método  de KleinMétodo  de Klein
Método de Klein
Bertha Vega
 
GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...
PTIHPA
 
456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt
MohibKhan79
 
Double patterning (4/20 update)
Double patterning (4/20 update)Double patterning (4/20 update)
Double patterning (4/20 update)
Danny Luk
 
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic SynthesisMinimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Sajib Mitra
 

Similar to Verification with LoLA: 7 Implementation (20)

Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...Inside LoLA - Experiences from building a state space tool for place transiti...
Inside LoLA - Experiences from building a state space tool for place transiti...
 
Lecture.1
Lecture.1Lecture.1
Lecture.1
 
Chapter 3: Linear Systems and Matrices - Part 2/Slides
Chapter 3: Linear Systems and Matrices - Part 2/SlidesChapter 3: Linear Systems and Matrices - Part 2/Slides
Chapter 3: Linear Systems and Matrices - Part 2/Slides
 
IST module 4
IST module 4IST module 4
IST module 4
 
Ch07 linearspacealignment
Ch07 linearspacealignmentCh07 linearspacealignment
Ch07 linearspacealignment
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networks
 
Método de Klein
Método  de KleinMétodo  de Klein
Método de Klein
 
Dynamic Binary Analysis and Obfuscated Codes
Dynamic Binary Analysis and Obfuscated Codes Dynamic Binary Analysis and Obfuscated Codes
Dynamic Binary Analysis and Obfuscated Codes
 
Understanding low latency jvm gcs V2
Understanding low latency jvm gcs V2Understanding low latency jvm gcs V2
Understanding low latency jvm gcs V2
 
GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...GeneIndex: an open source parallel program for enumerating and locating words...
GeneIndex: an open source parallel program for enumerating and locating words...
 
Data structures
Data structuresData structures
Data structures
 
MapReduce for Parallel Trace Validation of LTL Properties
MapReduce for Parallel Trace Validation of LTL PropertiesMapReduce for Parallel Trace Validation of LTL Properties
MapReduce for Parallel Trace Validation of LTL Properties
 
Least Square Optimization and Sparse-Linear Solver
Least Square Optimization and Sparse-Linear SolverLeast Square Optimization and Sparse-Linear Solver
Least Square Optimization and Sparse-Linear Solver
 
Understanding low latency jvm gcs
Understanding low latency jvm gcsUnderstanding low latency jvm gcs
Understanding low latency jvm gcs
 
PRESENTATION ON DATA STRUCTURE AND THEIR TYPE
PRESENTATION ON DATA STRUCTURE AND THEIR TYPEPRESENTATION ON DATA STRUCTURE AND THEIR TYPE
PRESENTATION ON DATA STRUCTURE AND THEIR TYPE
 
456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt456589.-Compiler-Design-Code-Generation (1).ppt
456589.-Compiler-Design-Code-Generation (1).ppt
 
AA-sort with SSE4.1
AA-sort with SSE4.1AA-sort with SSE4.1
AA-sort with SSE4.1
 
Control Flow Analysis
Control Flow AnalysisControl Flow Analysis
Control Flow Analysis
 
Double patterning (4/20 update)
Double patterning (4/20 update)Double patterning (4/20 update)
Double patterning (4/20 update)
 
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic SynthesisMinimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
Minimum Cost Fault Tolerant Adder Circuits in Reversible Logic Synthesis
 

More from Universität Rostock

Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
Universität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
Universität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
Universität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
Universität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
Universität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Universität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 
service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 

Verification with LoLA: 7 Implementation

  • 2. Plan • Firing a transition • Evaluating a state predicate • Managing the state space • Organizing search • Detecting strongly connected components
  • 3. Firing transitions Marking changed via list of pre-, list of post- places  effort does not depend on size of net After firing, only some transitions are checked for enabledness previously enabled transitions that lost tokens previously disabled transitions that gained tokens ... managed through explicitly stored lists 
 
 
 
 
 
 
 

  • 4. Checking state predicates • predicate = boolean combination of • p {><=≤≥≠} k • stored in negation-free normal form φ φ φ φ φ 
 

  • 5. Managing the state space 1st state = bit vector 




















 






 



 




 























 


 other states = bit vector +decision record 
 

  • 6. Managing the state space find/insert a marking: one integrated process 




















 






 



 




 























 


 dive down into decision tree on mismatch: at decision point: switch to next vector at end: found, no insert 
 
 between decision points: insert at point of mismatch decision records form tree
  • 7. Organizing search General remarks Search consists of - fire transitions ✔ - find/insert marking ✔ - backtracking: fire transition backwards  only „constant“ time search stack consists of reference to transition + list of enabled transitions  state space is „write-only“ memory
  • 8. Organizing search b) Depth-first search: ability to detect SCC c) Breadth-first search: Simulated by bounded depth-first search with incrementally increased bound  Update of current marking, list of enabled transitions, etc. through sequence of transition occurrences
  • 9. Detecting strongly connected components • Traditional approach: Tarjan‘s algorithm 4 
 
 4 6 21 5 
 
 
 
 
 
 
 44 






 
 
 
 
 33 11 






 
 
 
 
 
 
 
 00 
 
 
 
 
 
 
 
 
 
 
 

  • 10. Detecting strongly connected components • LoLA approach: simplified lowlink 4 
 
 4 6 21 5 
 
 
 
 
 
 
 41 






 
 
 
 
 31 11 






 
 
 
 
 
 
 
 00 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

  • 12. Stubborn Sets • Crucial: Core principle • Simple method: – If t enabled, add conflicting transitions – If t disabled, add pre-transitions of some unmarked pre-place place pre-transitions must be included transition conflicting updated at enabledness check
  • 13. The sweep-line method • constant change  successors lie in a small window of progress values 
 
 
 

  • 14. Calculation of Symmetries 7 5 0 2 A1 ∪.... ∪ An = V A1 B1 9 4 B1 ∪....∪ Bn = V A2 1 4 3 2 6 B2 σ satisfies C iff 6 9 8 σ(Ai) = Bi (for all i) 07 3 7 B3 13 A3 0 29 5 35 48 ..... 50 66 An Bn 8 1 74 81 92 C
  • 16. Abstract Permutation – Examples PP all permutations that TT respect node type
  • 17. Abstract Permutation – Examples PP all permutations that TT respect node type {p1}  {p1} ...... Elements of some orbit {pi-1}  {pi-1} wrt. Ui in Ui-1 {pi}  {pk} others1  others2
  • 18. Abstract Permutation – Examples PP all permutations that TT respect node type {p1}  {p1} ...... Elements of some orbit {pi-1}  {pi-1} wrt. Ui in Ui-1 {pi}  {pk} others1  others2 New problem: given.: abstract permutation C compute an automorphism that satisfies C ... equivalent to graph isomorphism
  • 19. REFINE Choose A-B, A’-B’ and arc multiplicity c # c-neighbors in A’ #c-neighbors in B’ 3 2 1 0 0 1 2 3 A B 8 9 8 6 6 1 0 5 4 2 1 2 4 3 7 0 8 7 2 5 4 B’ A’ 1 0 3
  • 20. REFINE Choose A-B, A’-B’ and arc multiplicity c # c-neighbors in A’ #c-neighbors in B’ 3 2 1 0 0 1 2 3 A B 8 9 8 6 6 1 0 5 4 2 1 2 4 3 7 0 8 7 2 5 4 B’ A’ 1 0 3 Every automorphism that satisfies A-B, satisfies all resulting constraints
  • 21. DEFINE Choose A-B, p ∈A 2 5 1 2 3 8 4 5
  • 22. DEFINE Choose A-B, p ∈A 2 5 1 2 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5
  • 23. DEFINE Choose A-B, p ∈A 2 5 1 2 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5 2 5 1 2 2 5 1 2 3 8 4 5 3 8 4 5 Every automorphism tat satisfies A-B, satisfies one of the new constraints
  • 24. Computation tree 4 3 2 poly 1 8 1 6 7 8 5 a b f a e c R* D R* R* R* D D R* R* R* R* R* 2 3 2 3 3 8 3 8 c c c c exp = #Ai ! #Bi is rare. That is, often polynomial run time
  • 25. Combination of techniques 
 
 
 
 
 







 
 
 
 
 
 















 
 
 
 















 
 
 















 







 















 
 
 
 
 















 
 
 















 
 
























 
 
























 
 
 
 















 
























 




 







  • 26. More information • LoLA: ICATPN 2000, Petri Nets 2007 – www.informatik.uni-rostock.de/tpp/ • Stubborn sets: ICATPN 1999, Fundamenta Informaticae 2000, FMSD 2006 • Symmetries: Acta Informatica 2000, TACAS 2000 • Linear Algebra: TACAS 2003 • Sweep-Line: TACAS 2004, STTT • Coverability graphs: FMSD 1999 • Services: BPM 2005 • GALS: ASYNC Krstic et al, 2005 • Bio-chemistry: Talcott & Dill, 2005 • Workflow: BPM 2009

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n