Soundness problem for Resource-Constrained Workflow nets revisited Natalia Sidorova and Christian Stahl.

Slides:



Advertisements
Similar presentations
Modeling issues Book: chapters 4.12, 5.4, 8.4, 10.1.
Advertisements

On 1-soundness and Soundness of Workflow Nets Lu Ping, Hu Hao and Lü Jian Department of Computer Science Nanjing University
Techniques to analyze workflows (design-time)
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 16 Relational Database Design Algorithms and Further Dependencies.
1 SE-561 Formal Methods in Software Petri Nets - I.
ICS Principles of Operating Systems Lectures 8 and 9 - Deadlocks Prof. Dmitri V. Kalashnikov dvk ics.uci.edu Slides © Prof. Nalini Venkatasubramanian.
An Introduction to Petri Nets
Introduction to Petri Nets Hugo Andrés López
1 Analysis of workflows : Verification, validation, and performance analysis. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
Petri Nets Section 2 Roohollah Abdipur.
Based on: Petri Nets and Industrial Applications: A Tutorial
PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
A Novel Method For Fast Model Checking Project Report.
Chapter 3 Petri nets Learning objectives : Introduce Petri nets
1 A class of Generalized Stochastic Petri Nets for the performance Evaluation of Mulitprocessor Systems By M. Almone, G. Conte Presented by Yinglei Song.
Soundness problem for Resource-Constrained Workflow nets.
IE 469 Manufacturing Systems
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
THIRD PART Algorithms for Concurrent Distributed Systems: The Mutual Exclusion problem.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Introduction to Computability Theory
10. Petri Nets Prof. O. Nierstrasz. Roadmap  Definition: —places, transitions, inputs, outputs —firing enabled transitions  Modelling: —concurrency.
Today’s Agenda  HW #1 Due  Quick Review  Finish Input Space Partitioning  Combinatorial Testing Software Testing and Maintenance 1.
Courtesy Costas Busch - RPI1 Non Deterministic Automata.
Distributed Systems Fall 2010 Transactions and concurrency control.
CP — Concurrent Programming 12. Petri Nets Prof. O. Nierstrasz Wintersemester 2005 / 2006.
Extensions to Consumer theory Inter-temporal choice Uncertainty Revealed preferences.
/k soundness of free-choice workflow nets 1 of 10 Soundness of Free Choice Workflow Nets K.M. van Hee, M. Voorhoeve Eindhoven Univ. Tech.
A 14← department of mathematics and computer science PROSE Checking Properties of Adaptive Workflow Nets K. van Hee, I. Lomazova, O. Oanea,
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Fall 2006Costas Busch - RPI1 Non-Deterministic Finite Automata.
1 Non-Deterministic Automata Regular Expressions.
Costas Busch - LSU1 Non-Deterministic Finite Automata.
Sequential Redundancy Removal w/o State Space Exploration A. Mehrotra, S. Qadeer, V. Singhal, R. Brayton, A. Aziz, A. Sangiovanni-Vincentelli, “Sequential.
Regular Model Checking Ahmed Bouajjani,Benget Jonsson, Marcus Nillson and Tayssir Touili Moran Ben Tulila
1 A Petri Net Siphon Based Solution to Protocol-level Service Composition Mismatches Pengcheng Xiong 1, Mengchu Zhou 2 and Calton Pu 1 1 College of Computing,
Modeling with ordinary Petri Nets Events: Actions that take place in the system The occurrence of these events is controlled by the state of the system.
Workflow Treatment with Coloured Petri Nets Alexandru Cicortaş Diana
مهندسی مجدد فرآیندهای تجاری
By J. Burns and J. Pachl Based on a presentation by Irina Shapira and Julia Mosin Uniform Self-Stabilization 1 P0P0 P1P1 P2P2 P3P3 P4P4 P5P5.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
1 More About Turing Machines “Programming Tricks” Restrictions Extensions Closure Properties.
Regular Expressions Chapter 6 1. Regular Languages Regular Language Regular Expression Finite State Machine L Accepts 2.
Process-oriented System Analysis Process Mining. BPM Lifecycle.
Inheritance in Petri Net Designs. Goals Subtyping - interface inheritance: Can the subclass use or conform to the interface of the superclass?). Projection.
Chapter 10 Graph Theory Eulerian Cycle and the property of graph theory 10.3 The important property of graph theory and its representation 10.4.
CSCI1600: Embedded and Real Time Software Lecture 11: Modeling IV: Concurrency Steven Reiss, Fall 2015.
School of Computer Science & Software Engineering
CS 542: Topics in Distributed Systems Self-Stabilization.
Page 1 Mutual Exclusion & Election Algorithms Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content.
Ordering of Events in Distributed Systems UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 739 Distributed Systems Andrea C. Arpaci-Dusseau.
From Natural Language to LTL: Difficulties Capturing Natural Language Specification in Formal Languages for Automatic Analysis Elsa L Gunter NJIT.
High Performance Embedded Computing © 2007 Elsevier Lecture 4: Models of Computation Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte.
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (aka Free-Choice Workflow Nets) Cédric Favre(1,2), Hagen Völzer(1), Peter Müller(2)
Technology of information systems Lecture 5 Process management.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
CSSE 332 Operating Systems Rose-Hulman Institute of Technology
composition of workflows
Polynomial analysis algorithms for free-choice workflow nets
Concurrency: Deadlock and Starvation
CSS 496 Business Process Re-engineering for BS(CS)
Non Deterministic Automata
Concurrent Systems Modeling using Petri Nets – Part II
Non-Deterministic Finite Automata
Non Deterministic Automata
Introduction to Petri Nets (PNs)
Presentation transcript:

Soundness problem for Resource-Constrained Workflow nets revisited Natalia Sidorova and Christian Stahl

Resource-Constrained WF-nets (RCWF-nets) Resource places P r Production net N p with production places P p P r  P p =  A Petri net N with a set of places P p  P r is an RCWF-net if its projection on P p is a workflow net. i f

Mixable instances vs. independent instances Instances in the production net can be independent, e.g. as in handling insurance claims Or they can interfere with each other: produce a number of bicycles, all exactly the same, no matter which wheels go to which one… For independent instances, we can introduce token id’s, and further reduce the model to classical Petri nets by substituting the production net by a state machine obtained from the reachability graph of the production net. So in both cases we can just deal with classical Petri nets.

Different types of resources Durable: machines, people Consumable: paper, building materials, etc. Producible: whatever you produce in your process Shared: among different workflows i f

Different types of resources Durable: machines, people Consumable: paper, building materials, etc. Producible: whatever you produce in your process Shared: among different workflows i f

Modelling Environment

Lending/borrowing resources

Modelling Environment Permanently adding resources

Modelling Environment Permanently removing resources

Modelling Environment Possibly extendable to model dependencies between the bounds, e.g. the total number of resources that can be removed permanently or temporarily

Modelling Environment Configuration of the environment: the initial marking

A simple observation Since borrowing is temporary—that is, under the fairness assumption, the environment will eventually return the borrowed resources—the choice of the initial marking for r - does not change the set of markings reachable in the composition of the workflow and the environment projected on the workflow places: The workflow can always wait until the environment returns the resources borrowed and then proceed. The same applies to lending resources. Borrowing/lending can play a role if the process is timed.

Generic case environment Goal: create an arbitrary number of cases from the interval [k1, k2] k1k2 c – cases to create d – cases possible to dismiss without creating e – cases ended

Well-defined RCWF-net The production net have no redundant places (i.e. P\{i} contains no proper siphons), The production net is k-sound, for all m E (c) ≤ k ≤ m E (c) + m E (d), no resource tokens can be created by the WF-net (checked using the incidence matrix), there exists a place invariant for the places c, d and e, guaranteeing that the number of instances remains constant for every resource place, there exists a place invariant, guaranteeing that the number of resources remains constant

Formally…

Interval soundness Let N be an RCWF-net and be an environment of N such that N  E is well-defined. Then, N is sound with if for all there is some and This definition captures many variants of interval soundness, under condition that the number of cases and the number of resources are bounded

Deciding soundness (1)

Deciding soundness (2) The short-circuited net is live and bounded.

A side note This does not hold for the “standard closure”: The RCWF-net is not (3; 1)-sound: t1 t2 t4 t1 leads to deadlock [2f; p1], while the short-circuited net is bounded and live.

Repairing Interval Unsound RCWF-Nets Construct a controller C that controls those transitions of N that produce tokens on or consume tokens from a resource place. We assume the controller cannot control actions of the environment. (In case one would find it possible to control actions of the environment, our construction can be adapted by labeling certain transitions of E and adding those actions to the alphabet of C.)

Still to be investigated Combining data and resources Resources and configurability