scispace - formally typeset
Search or ask a question
Topic

Petri net

About: Petri net is a research topic. Over the lifetime, 25039 publications have been published within this topic receiving 406994 citations.


Papers
More filters
Journal ArticleDOI
13 Oct 1991
TL;DR: The use of transition reasoning rules in this application simplifies the representation and search problems for task planning where correct sequences do not depend on exact knowledge of internal states, but only their precedence relations.
Abstract: This paper discusses the problem of representation and planning of operations sequences in a robotic system using fuzzy Petri nets. In the fuzzy Petri net representation, objects whose internal states are altered during a process are termed soft objects, and the process steps where alterations may occur are labeled key transitions. A correct sequence is defined as a sequence which is feasible, complete, and satisfies precedence relations. In this formulation, the internal state of an object is represented by a global fuzzy variable attached to the token related to the degree of completion of the process. All correct operations sequences must satisfy process sequence constraints imposed by transition reasoning rules. The correct precedence relationships and the characteristics of completeness for operations in all feasible sequences are guaranteed by the prime number marking algorithm which marks the fuzzy Petri net. The use of transition reasoning rules in this application simplifies the representation and search problems for task planning where correct sequences do not depend on exact knowledge of internal states, but only their precedence relations. >

87 citations

Proceedings Article
01 Jan 2007
TL;DR: The approach for model verification and validation is presented: translating industrial models to Petri nets and mCRL2, and subsequently applying existing tools on the models derived from the initial industrial models.
Abstract: In industry, many business processes are modelled and stored in Enterprise Information Systems (EIS). Tools supporting the verification and validation of business processes can help to improve the quality of these business processes. However, existing tools can not directly be applied to models used in industry. In this paper, we present our approach for model verification and validation: translating industrial models to Petri nets and mCRL2, and subsequently applying existing tools on the models derived from the initial industrial models. The following translations are described: BPMN models to Petri nets and Petri nets to mCRL2. It is shown what the analysis on the derived models can reveal about the original models.

87 citations

Proceedings ArticleDOI
K. Knorr1
11 Dec 2000
TL;DR: By making access control matrices dynamic by means of workflows the risk of data misuse is decreased which is proven through an equation given in the paper.
Abstract: Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are static they rarely change over time. This paper shows how to make access control matrices dynamic by means of workflows. Access rights are granted according to the state of the workflow. By this practice the risk of data misuse is decreased which is proven through an equation given in the paper. The concept of workflow is defined by Petri nets which offer a solid mathematical foundation and are well suited to represent discrete models such as workflows.

87 citations

Journal ArticleDOI
TL;DR: A class of Markovian Petri Net models whose equilibrium state probabilities satisfy detailed (local) balance equations is presented, and examples of their applicability include a bus oriented multiprocessor model, a version of the classical dining philosophers problem and an alternating bit protocol model.

87 citations

Book ChapterDOI
17 Sep 2006
TL;DR: A Petri net based analysis method is proposed that provides a sufficient criterion for the termination problem of model transformations captured by graph transformation systems and is proposed to be a central validation problem of trusted model transformations.
Abstract: Despite the increasing relevance of model transformation techniques in model-driven software development, research is mainly conducted to the specification and the automation of such transformations. However, since the transformations themselves may also contain conceptual flaws, it is essential to formally analyze them prior to executing them on user models. In the current paper, we focus on a central validation problem of trusted model transformations, namely, termination and propose a Petri net based analysis method that provides a sufficient criterion for the termination problem of model transformations captured by graph transformation systems.

87 citations


Network Information
Related Topics (5)
Control theory
299.6K papers, 3.1M citations
85% related
Control system
129K papers, 1.5M citations
85% related
Server
79.5K papers, 1.4M citations
85% related
Fuzzy logic
151.2K papers, 2.3M citations
85% related
Robustness (computer science)
94.7K papers, 1.6M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023290
2022662
2021466
2020574
2019651
2018751