History-Dependent Petri Nets Kees van Hee, Alexander Serebrenik, Natalia Sidorova, Wil van der Aalst ?

Slides:



Advertisements
Similar presentations
Clocked Mazurkiewicz Traces and Partial Order Reductions for Timed Automata D. Lugiez, P. Niebert, S. Zennou Laboratoire d Informatique Fondamentale de.
Advertisements

An improved on-the-fly tableau construction for a real-time temporal logic Marc Geilen 12 July 2003 /e.
On 1-soundness and Soundness of Workflow Nets Lu Ping, Hu Hao and Lü Jian Department of Computer Science Nanjing University
CS 267: Automated Verification Lecture 8: Automata Theoretic Model Checking Instructor: Tevfik Bultan.
Lecture 24 MAS 714 Hartmut Klauck
Concurrent Operational Semantics of Safe Time Petri Nets Claude Jard European University of Brittany, ENS Cachan Bretagne, IRISA Campus de Ker-Lann,
1 SE-561 Formal Methods in Software Petri Nets - I.
Knowledge Based Synthesis of Control for Distributed Systems Doron Peled.
An Introduction to Petri Nets
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
Based on: Petri Nets and Industrial Applications: A Tutorial
Cook’s Theorem The Foundation of NP-Completeness.
Sequential Patterns & Process Mining Current State of Research Edgar de Graaf LIACS.
Timed Automata.
Merged Processes of Petri nets Victor Khomenko Joint work with Alex Kondratyev, Maciej Koutny and Walter Vogler.
1 Temporal Claims A temporal claim is defined in Promela by the syntax: never { … body … } never is a keyword, like proctype. The body is the same as for.
On the Dynamics of PB Systems with Volatile Membranes Giorgio Delzanno* and Laurent Van Begin** * Università di Genova, Italy ** Universitè Libre de Bruxelles,
IE 469 Manufacturing Systems
Complexity 11-1 Complexity Andrei Bulatov Space Complexity.
Petri net modeling of biological networks Claudine Chaouiya.
On the Use of Automata Techniques to Decide Satisfiability Mia Minnes May 3, 2005.
A Schedulability-Preserving Transformation of BDF to Petri Nets Cong Liu EECS 290n Class Project December 10, 2004.
FunState – An Internal Design Representation for Codesign A model that enables representations of different types of system components. Mixture of functional.
/k soundness of free-choice workflow nets 1 of 10 Soundness of Free Choice Workflow Nets K.M. van Hee, M. Voorhoeve Eindhoven Univ. Tech.
A 14← department of mathematics and computer science PROSE Checking Properties of Adaptive Workflow Nets K. van Hee, I. Lomazova, O. Oanea,
Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
Rutgers University Relational Algebra 198:541 Rutgers University.
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
A Novel Method for Formally Detecting RFID Event Using Petri Nets SEKE 2011.
An Introduction to Petri Nets Marjan Sirjani Formal Methods Laboratory University of Tehran.
DECIDABILITY OF PRESBURGER ARITHMETIC USING FINITE AUTOMATA Presented by : Shubha Jain Reference : Paper by Alexandre Boudet and Hubert Comon.
Minimization of Symbolic Automata Presented By: Loris D’Antoni Joint work with: Margus Veanes 01/24/14, POPL14.
Jianmin Wang 1, Shaoxu Song 1, Xiaochen Zhu 1, Xuemin Lin 2 1 Tsinghua University, China 2 University of New South Wales, Australia 1/23 VLDB 2013.
Towards a High-Level Petri Net Type DefinitionWorkshop on Interchange Formats for Petri Nets 1/18 June 26, 2004 Towards a High-Level Petri Net Type Definition.
Submodule construction in logics 1 Gregor v. Bochmann, University of Ottawa Using First-Order Logic to Reason about Submodule Construction Gregor v. Bochmann.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Chapter 11 Activity Diagrams. 2 “Activity diagrams are a technique to describe procedural logic, business processes, and work flows” - M. Fowler An activity.
School of Computer Science, The University of Adelaide© The University of Adelaide, Control Data Flow Graphs An experiment using Design/CPN Sue Tyerman.
LTL Model Checking 张文辉
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
CSCI1600: Embedded and Real Time Software Lecture 11: Modeling IV: Concurrency Steven Reiss, Fall 2015.
Strings Basic data type in computational biology A string is an ordered succession of characters or symbols from a finite set called an alphabet Sequence.
/faculteit technologie management PN-1 Petri nets refresher Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Faculty of Technology Management,
Decomposing Replay Problems: A Case Study Eric Verbeek and Wil van der Aalst.
T. Gregory BandyInteraction Machines SeminarFebruary 21, Union College - Computer Science Graduate Program Interaction Machines Are they more.
Quantified Data Automata on Skinny Trees: an Abstract Domain for Lists Pranav Garg 1, P. Madhusudan 1 and Gennaro Parlato 2 1 University of Illinois at.
From Natural Language to LTL: Difficulties Capturing Natural Language Specification in Formal Languages for Automatic Analysis Elsa L Gunter NJIT.
/faculteit technologie management PN-1 Petri nets refresher Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Faculty of Technology Management,
Petri-Nets and Other Models
Today’s Agenda  Quiz 4  Temporal Logic Formal Methods in Software Engineering1.
/faculteit technologie management PN-1 مهندسی مجدد فرآیندهای تجاری بخش دوم: مدلسازی فرآیندها به کمک Petri nets.
CSCI 4325 / 6339 Theory of Computation Zhixiang Chen.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
CS412/413 Introduction to Compilers Radu Rugina Lecture 3: Finite Automata 25 Jan 02.
Technology of information systems Lecture 5 Process management.
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
Slide 4- 1 Copyright © 2010 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 1- 1 Copyright © 2010 Pearson Education, Inc. Publishing.
Distributed Systems Lecture 6 Global states and snapshots 1.
Concurrent Systems Modeling using Petri Nets – Part II
بسمه‌تعالي فصل چهاردهم شبکه‌هاي پتري.
Alternating tree Automata and Parity games
Non-Deterministic Finite Automata
Towards a Generic On Line Auditing Tool (OLAT)
Introduction to Petri Nets (PNs)
Petri nets refresher Prof.dr.ir. Wil van der Aalst
Decidable Languages A language L is decidable if there is a Turing machine ML such that given any word w  0*, then: Input of ML: a  b  … w Output of.
An Introduction to Petri Nets
Petri nets refresher Prof.dr.ir. Wil van der Aalst
Presentation transcript:

History-Dependent Petri Nets Kees van Hee, Alexander Serebrenik, Natalia Sidorova, Wil van der Aalst ?

Motivation  Choices made in processes often depend on the previous events – process history  Process history is often available from logs  Encoding history-based decisions into the net structure can be complex, error-prone, and decreasing the readability  We do not model the whole state of a system, but only some aspects of it!

Goal

History logic History: a partially ordered set of labeled events  E, ≤, λ , where λ: E → Σ Operations on history:  extension with an event  union of histories Given a set of labels Σ and an event variable x, we define a formula φ, a term q and a label expression l :

Examples of history guards Short-hand notations: # S – the number of events with a label from set S,  x : φ ≡ (#x: φ)>0  x : φ ≡ (#x: φ) =(#x: true) Examples: #{ a } < #{ b }  x : ( λ( x ) = a   y : ( λ( y ) = b  x ≤ y))

Token history nets Tokens are colored with histories. Transitions have guards evaluated on the union of the histories of consumed tokens. Tokens produced by a transition firing are colored with the union of histories of the consumed tokens extended by the firing event.

Global history nets History is available to all transitions. Guards are evaluated on this history. Transition firings extend the history with a corresponding event. Global history nets are Turing complete: Take a net where transitions have unique labels. Then guards of the type allow to simulate inhibitor arcs.

Token history vs. global history Suppose the global history is aabc. What are token histories? Token on p and q might share the event with label a, but not necessarily. Corollary: token history cannot be reconstructed from the global history. Suppose the marking of the token history net is [(p,H 1 )] + [(p,H 2 )] + [(q,H 3 )] + [(q,H 4) ] where H 1 =  {e 1,e 2 }, {e 1 ≤ e 2 }, {(e 1,a),(e 2,b)} , H 2 =  {e 4,e 5 }, {e 4 ≤ e 5 }, {(e 4,a),(e 5,b)} , H 3 =  {e 1,e 3 }, {e 1 ≤ e 3 }, {(e 1,a),(e 3,c)} , H 4 =  {e 4,e 6 }, {e 4 ≤ e 6 }, {(e 4,a),(e 6,c)} . What is the global history? It might be abcabc, or aabbcc, or abacbc, etc. Corollary: the global history cannot be reconstructed from the token histories.

However we can simulate global history by token history Each transition t is connected to extra place p. Initially with the empty history: the token history of p is the global history t p

Counting Formulae Guards A counting formula φ is defined by Nets with counting formulas are Turing complete (remember: ) So we provide a translation of this class into bisimilar inhibitor nets.

Guards (#A) ρ (#B + k )

Construction for compound formulae Consider a guard g(t) for transition t in disjunctive normal form ¬φ is trivial φ 1  φ 2 : test arcs for each formulae to t φ 1  φ 2 : duplicate t into t and t’ each with one test arc

Let ( N,m ) be a Petri net with n transitions and y  Z n. The y -distance of ( N,m ) is D (( N, m ), y )) = y T · where  is the set of all executable finite firing sequences. Let A and B be two label sets and y (A,B) is a vector with 1 for transitions labeled by an A label, -1 for B labels and 0 for the rest. The y (A,B) distance is the max difference in the number of the firings of A-transitions and the number of the firings of B-transitions. There is an efficient algorithm to determine if the distance is finite! When the guards are of the form #A  # B + k and y (A,B) < , we can construct a Petri net bisimilar to the global history net. Similarly #A  # B + k and y (B,A) <  Bounded synchronization distance

LTL guards without Next LTL formulae can be translated into B Ü chi automata LTL-guards are evaluated on finite traces (history!)  they can be translated to finite deterministic automata. Synchronous product of the Petri net with these automata yields a classical Petri net.

Conclusion  Incorporating history into a model allows to separate process information from safety constraints.  History nets are Turing complete.  Still, some subclasses can be translated to classical PNs.  For some other subclasses a translation to inhibitor nets is proposed.

Future Work  The use of tokens nets for component-based systems. Need for additional operations like projection and intersection of histories  Transformation of other subclasses to PNs.  What about Presburger logic?

symbols and constructs                        *              1 (o)  2 (o)     min (t)  max (t) a*  t  p  :  t  p  : 