scispace - formally typeset
Search or ask a question
Topic

Petri net

About: Petri net is a research topic. Over the lifetime, 25039 publications have been published within this topic receiving 406994 citations.


Papers
More filters
Book ChapterDOI
01 Sep 2008
TL;DR: This work proposes to specify an adaptive process as a set of scenarios using a Petri net syntax, and provides an adaptation operator that synthesizes and adapts the system behavior at run-time based on the given scenarios.
Abstract: In the immediate aftermath of a disaster, routine processes, even if specifically designed for such a situation, are not enacted blindly. Actions and processes rather adapt their behavior based on observations and available information. Attempts to support these processes by technology rely on process models that faithfully capture process execution and adaptation. Based on experiences from actual disaster response settings, we propose to specify an adaptive process as a set of scenarios using a Petri net syntax. Our operational model provides an adaptation operator that synthesizes and adapts the system behavior at run-time based on the given scenarios. An example illustrates our approach.

74 citations

Journal ArticleDOI
TL;DR: It is proved that state reachability in SwTPNs and all similar models is undecidable, even when bounded, which solves an open problem.
Abstract: Several extensions of Time Petri nets (TPNs) have been proposed for modeling suspension and resumption of actions in timed systems. We first introduce a simple class of TPNs extended with stopwatches (SwTPNs), and present a semi-algorithm for building exact representations of the behavior of SwTPNs, based on the known state class method for Time Petri nets. Then, we prove that state reachability in SwTPNs and all similar models is undecidable, even when bounded, which solves an open problem. Finally, we discuss overapproximation methods yielding finite abstractions of their behavior for a subclass of bounded SwTPNs, and propose a new one based on a quantization of the polyhedra representing temporal information. By adjusting a parameter, the exact behavior can be approximated as closely as desired. The methods have been implemented, experiments are reported.

74 citations

Journal ArticleDOI
TL;DR: This work investigates a method to enforce control iteratively using siphons and their corresponding dangerous markings, and a generalized elementary siphon control method is proposed such that the final supervisor is structurally simple.
Abstract: Internet-motivated video streaming systems face such complicated issues as a high degree of network-resource sharing amongst many flows, which potentially leads to deadlocks. Using siphons and their corresponding dangerous markings, this work investigates a method to enforce control iteratively. At each iteration, a generalized mutual exclusion constraint is produced to keep only those markings under which liveness is enforced. Furthermore, a generalized elementary siphon control method is proposed such that the final supervisor is structurally simple. Examples are used to illustrate the proposed approach.

74 citations

Book ChapterDOI
28 Mar 1998
TL;DR: This work presents the first decidability result concerning verification of systems that are infinite-state in “two dimensions”: they contain an arbitrary set of (identical) processes, and they use infinite data-structures, viz. real-valued clocks.
Abstract: Over the last years there has been an increasing research effort directed towards the automatic verification of infinite state systems, such as timed automata, hybrid automata, data-independent systems, relational automata, Petri nets, and lossy channel systems. We present a method for deciding reachability properties of networks of timed processes. Such a network consists of an arbitrary set of identical timed automata, each with a single real-valued clock. Using a standard reduction from safety properties to reachability properties, we can use our algorithm to decide general safety properties of timed networks. To our knowledge, this is the first decidability result concerning verification of systems that are infinite-state in “two dimensions”: they contain an arbitrary set of (identical) processes, and they use infinite data-structures, viz. real-valued clocks. We illustrate our method by showing how it can be used to automatically verify Fischer's protocol, a timer-based protocol for enforcing mutual exclusion among an arbitrary number of processes.

74 citations

Journal ArticleDOI
TL;DR: A simulation model based on hybrid Petri nets able to help transit authorities to carry out performance evaluation procedures in order to prevent, to reduce and if possible to avoid these accidents which deteriorate the image of public transport in general and make it less attractive.

74 citations


Network Information
Related Topics (5)
Control theory
299.6K papers, 3.1M citations
85% related
Control system
129K papers, 1.5M citations
85% related
Server
79.5K papers, 1.4M citations
85% related
Fuzzy logic
151.2K papers, 2.3M citations
85% related
Robustness (computer science)
94.7K papers, 1.6M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023290
2022662
2021466
2020574
2019651
2018751