Petri Nets with Time and Cost (Tutorial)

Size: px
Start display at page:

Download "Petri Nets with Time and Cost (Tutorial)"

Transcription

1 Petri Nets with Time an Cost (Tutorial) Parosh Aziz Abulla Department of Information Technology Uppsala University Sween Richar Mayr School of Informatics, LFCS University of Einburgh Unite Kingom homepages.inf.e.ac.uk/rmayr/ Introuction Petri nets [, ] are a wiely use moel for the stuy an analysis of concurrent systems. Many ifferent formalisms have been propose which exten Petri nets with clocks an real-time constraints, leaing to various efinitions of Time Petri nets (TPNs) (see [, ] for surveys). In parallel, there have been several works on extening the moel of time automata [] with prices (weights) (see e.g., [,, 8]). Weighte time automata are suitable moels for embee systems, where we have to take into consieration the fact that the behavior of the system may be constraine by the consumption of ifferent types of resources. Concretely, weighte time automata exten classical time automata with a cost function Cost that maps every location an every transition to a nonnegative integer (or rational) number. For a transition, Cost gives the cost of performing the transition. For a location, Cost gives the cost per time unit for staying in the location. In this manner, we can efine, for each computation of the system, the accumulate cost of staying in locations an performing transitions along the computation. In this tutorial, we recall, through a sequence of examples, a very expressive moel, introuce in [], that subsumes the above moels. Price Time Petri Nets (PTPN) are a generalization of classic Petri nets [] with real-value (i.e., continuous-time) clocks, real-time constraints, an prices for computations. In a PTPN, each token is equippe with a real-value clock, representing the age of the token. The firing conitions of a transition inclue the usual ones for Petri nets. Aitionally, each arc between a place an a transition is labele with a time-interval whose bouns are natural numbers (or possibly as upper boun). These intervals can be open, close or half open. Like in time automata, this is use to encoe strict or non-strict inequalities that escribe constraints on the real-value clocks. When firing a transition, tokens which are remove from or ae to places must have ages lying in the intervals of the corresponing transition arcs. We assign a cost to computations via a cost function Cost that maps transitions an places of the Petri net to natural numbers. For a transition t, Cost(t) gives the cost of performing the transition, while for a place p, Cost(p) gives the cost per time unit per token in the place. The total cost of a computation is given by the sum of all costs of fire transitions plus the storage costs for storing certain numbers of tokens in certain places for certain times uring the computation. Like in price time automata, having integers as costs an time bouns is not a restriction, because the case of rational numbers can be reuce to the integer case. This work is supporte by UPMARC, The Uppsala Programming for Multicore Architectures Research Center. M.F. Atig, A. Rezine (Es.): Infinity EPTCS 7,, pp. 9, oi:./eptcs.7. c P. A. Abulla, R. Mayr This work is license uner the Creative Commons Attribution License.

2 Time Price Petri Nets It shoul be note that PTPN are infinite-state in several ifferent ways. First, the Petri net itself is unboune. So the number of tokens (an thus the number of clocks) can grow beyon any boun, i.e., the PTPN can create an estroy arbitrarily many clocks (unlike time automata). Seconly, every single clock value is a real number of which there are uncountably many. In [] we stuy the cost to reach a given control-state in a PTPN. In Petri net terminology, this is calle a control-state reachability problem or a coverability problem. The relate reachability problem (i.e., reaching a particular configuration) is uneciable for both continuous-time an iscrete-time TPN [], even without taking costs into account. Our goal is to compute the optimal cost for moving to a control state (equivalently for covering a set of markings). In general, a cost-optimal computation may not exist (e.g., even in price time automata it can happen that there is no computation of cost, but there exist computations of cost ε for every ε > ). We show that the infimum of the costs to reach a given control-state is computable, provie that all transition an place costs are non-negative. Outline. In the next section we introuce PTPNs. In Section we escribe a special type of computations that are sufficient to solve the cost-optimality problem. We introuce a symbolic encoing of infinite sets of markings in Section, an escribe a symbolic algorithm for solving the cost-optimality problem in Section. Finally, in Section, we give conclusions an irections for future work. Time Petri Nets In this section, we introuce Price Time Petri Nets, the set of markings, the transition relation it inuces, an the coverability problem. We use N an R to enote the sets of natural numbers (incluing ) an nonnegative reals respectively. We use a set Intrv of intervals. An open interval is written as(w : z) where w N an z N { }. Intervals can also be close in one or both irections, e.g. [w : z] is close in both irections an[w : z) is close to the left an open to the right. Moel. A Price Time Petri Net (PTPN) is a tuple N =(P,T,Cost) where P is a finite set of places. T is a finite set of transitions, where each transition t T is of the form t =(In,Out). We have that In an Out are finite multisets over P Intrv which efine the input-arcs an output-arcs of t, respectively. Cost : P T N is the cost function assigning firing costs to transitions an storage costs to places. Figure shows an example of a PTPN with five places:,,,,, an five transitions: t,t,t,t,t. The transition t has an input arc from labele with the interval [..], an two output arcs to an, labele with the intervals (..) an [..] respectively. The price (cost) associate with, is, while the price associate with t is. We let cmax enote the maximum integer appearing on the arcs of a given PTPN. In Figure, we have cmax =. Markings. A marking is a multiset over P R. The marking M efines the numbers an ages of tokens in each place in the net. In Figure, we show an example of a marking M. The marking assigns two tokens in, with ages 7.9 an.8, respectively. We will represent markings by lists of colore balls with real numbers insie. Each ball represents one token in the marking. The color escribes the place in which the token resies, while the number represents the age of the token (see Figure ). Computations. We efine two transition relations on the set of configurations: time transition an iscrete transition. A time transition increases the age of each token by the same real number. A

3 P. A. Abulla, R. Mayr (..) [..) t [..) [..) t (..) (..) (.. ) t t [..] (..) (..) (..] t (..) Figure : A Price Time Petri Net (..) t [..). [..) [..) t (..) (.. ) t t [..] (..) (..) (..). 8. (..] t (..). Figure : A marking M an its representation.

4 Time Price Petri Nets t t t..9 t t t t.. Figure : A computation π. Above each in the computation we show the transition that has fire, an below each step we show the cost of the step. iscrete transition represents the effect of firing a transition t in the PTPN. More precisely, for each input arc to the transition, we remove a token from the corresponing input place, whose age lies in the relevant interval. Also, for each input arc to the transition, we a a new token to the corresponing place. The age of the newly generate token is chosen non-eterministically from the relevant interval. Performing a iscrete transition implies paying a cost which is equal to the cost of the transition. When performing a time transition, we pay a cost per each token an time unit that is equal to the cost of the place in which the token resies. A computation is a sequence of iscrete an time transitions. The cost of a computation is the accumulate cost of all the transitions in the computation. Figure shows an example of a computation π. It starts from an initial marking where we have a single token in with age. In the seventh step of π, transition t fires removing one token from with age. The age belongs to the interval [..) (which is the interval on the arc from to t ). At the same time, it as two new tokens with ages.8 an. to the places resp.. The cost of this step is equal to. The eighth step is a time transition of length., where the ages of all tokens are increase by.. The cost of the step is etermine by the number of tokens in each place an the cost of the place, i.e.,. ( + ) =. (the cost of an are resp. ). The total cost of π is given by Cost(π)= = 8.9. For a place p, we efine M p to be the set of markings which put at least one token in the place p (regarless of the ages of the tokens). For instance, if p= then M p is the set of markings that have at least one token in. The Price Coverability Problem. We will consier two variants of the cost problem, the Cost- Threshol problem an the Cost-Optimality problem. They are both characterize by an (i) initial marking M init that places a single token (with age ) in a given initial place p init, an (ii) a set of final markings M pfin efine by a final place p fin. In other wors, we start from a marking where there is only one token with age in p init an where all the other places are empty, an then consier the cost of computations that takes us to M pfin. In the Cost-Threshol problem we ask the question whether there is a computation starting from M init an reaching a marking in M pfin with a cost that is at most v for a given threshol v N. In the Cost-Optimality problem, we want to compute the optimal (smallest) cost of reaching M pfin staring from M init. For given M init an M pfin, the optimal cost of reaching M pfin from M init may not exist. However, in

5 P. A. Abulla, R. Mayr t (..) [..) Figure : A Simple PTPN Figure : A marking in δ-form, δ =.. [], we show that the infimum of the costs of all computations is a natural number (or if M pfin is not reachable from M init ). The situation is illustrate in Figure. The optimal cost for putting a token in can be mae arbitrarily close to (but not equal to ). In such a case, we simply efine the optimal cost to be. In fact, the non-existence of an optimal cost has alreay been observe for time automata [9]. Computations in δ-form In orer to solve the Cost-Threshol an the Cost-Optimality problems, it is sufficient to consier computations of a certain form where the ages of all the tokens that appear in the computation are arbitrarily close to (within some small real number δ from) an integer. Below, we assume a real number δ : <δ <.. δ-markings. A marking M is sai to be in δ-form (Figure ) if any fractional part of the age of a token appearing in M is either smaller than δ or larger than δ. We ecompose a δ-marking into submarkings such that in every submarking the fractional parts (but not necessarily the integer parts) of the token ages are ientical. We then arrange these submarkings in a sequence M m,...,m,m,m,...,m n such that M m,...,m contain tokens with fractional parts δ in increasing orer, M contains the tokens with fractional part zero, an M,...,M n contain tokens with fractional parts< δ in increasing orer. Figure shows that partitioning of the marking M in Figure. More precisely, We start with the token with the high fractional parts, namely.9 (one token in ), followe by.9 (one token in ), followe by.97 (one token in an one token in ). Furthermore, there are two tokens with zero fractional parts (one token in an one token in ). Finally, we consier the tokens with low fractional parts, namely. (one token in, one token in, an one token in ), followe by. (one token in ), followe by.7 (one token in ). Computations in δ-form. The occurrence of a iscrete transition t is sai to be in δ-form if the ages of the newly generate tokens are close to an integer (i.e., within istance δ). This is not a property of the transition t as such, but a property of its occurrence. Figure 7 shows the result of an occurrence of t in δ-form (with δ =.) on the marking of Figure. A computation is in δ-form if:

6 Time Price Petri Nets Figure : The partitioning the marking in Figure Figure 7: An application in δ-form (δ =.) of t on the marking of Figure. The two new tokens have fractional parts that are equal to.9 resp.... Every occurrence of a iscrete transition is in δ-form, an. For every time transition, the elay is either in the interval ( : δ) or in the interval x ( δ : ). Detaile Time Transitions. We say that a time transition (from a marking M) is etaile iff at most one fractional part of any token in M changes its status about reaching or exceeing the next integer value. Figures 8 an 9 show some steps in a etaile computation. In the first transition, time passes by a positive amount but not sufficiently long to make any tokens with positive fractional parts to increase to the next integer. More precisely, the time elay is. which means that two tokens in an that have zero fractional parts, will now have positive fractional parts (.). On the other han, the two tokens in an that have the highest fractional parts (.8) will not cross to the next integer (their ages will now be.98 an.98 respectively). In the secon step, the amount of elay is. which is exactly the amount neee to allow the tokens that currently have the highest fractional parts to become integers. These tokens are the ones with ages.98 an.98 in resp.. Their new ages are. resp... In the last step, all tokens have small fractional parts. We let time pass sufficiently much (.78 time units) so that the tokens will all have high fractional parts. Every computation of a PTPN can be transforme into an equivalent one (w.r.t. reachability an cost) where all time transitions are etaile, by replacing long time transitions with several etaile shorter ones where necessary. Thus we may assume w.l.o.g. that time transitions are etaile. Detaile Computations in δ-form. In [], we show the following result. For any computation π starting from an initial marking M init (efine by a initial place p init ), an reaching a give set M pfin of final markings (efine by a final place p fin ), an for each δ : <δ <., there is a etaile computation π in δ-form where (i) π starts from the same initial marking as π, (ii) π is in δ-from, (iii) π reaches M pfin, an (iv) if π is etaile then π is etaile. This means that, to solve the Cost-Threshol an Cost-Optimality problems, it is sufficient to consier etaile computations in δ-form. Figure shows a etaile computation in δ-form for the PTPN of Figure.

7 P. A. Abulla, R. Mayr Figure 8: Detaile time transitions for δ =..

8 Time Price Petri Nets Figure 9: Detaile time transitions (cont.)..... t t t.. t t... t t.. Figure : A etaile computation in δ-form.

9 P. A. Abulla, R. Mayr 7 increasing fractional parts increasing fractional parts high fractional parts zero fractional parts low fractional parts Figure : A region r. Regions In this section, we introuce a symbolic encoing for infinite sets of markings. The encoing is a variant of the classical notion of regions []. The main ifference is that we here nee to eal with an unboune number of clocks. It is an aaptation of the encoing introuce in []. More precisely, we change the encoing of [] so that we can now eal with markings in δ-form. First, we give the efinition of regions, an then we show how to simulate time an iscrete transitions on regions. For each type of transition, we efine the cost of firing the transition from the region. Regions. A region characterizes a set of marking in δ-form for some δ : <δ <.. An example of (our notion of) a region r is shown in Figure. The region consists of three parts, referre to as H (for high), Z (for zero), an L (for low). The part H is a wor of multisets. Each element in a multiset is a colore ball with a natural number, representing one token. The color efines the place in which the token resies, while the number efines the integer part of the age of the token. Furthermore, tokens whose ages are larger than cmax + are all represente by one element (ages > cmax cannot be istinguishe by the transitions of the PTPN). The orering of the multisets reflects the orering of the factional parts of the corresponing tokens: elements belonging to the same multiset represent tokens with ientical fractional parts, an elements in successive multisets represent tokens with increasing fractional parts. The part Z consists of one multiset, an represents the tokens with zero fractional parts. Finally, the part L consists of a wor of multisets. It has a similar interpretation to H, except that it represents tokens with low fractional parts. Figure shows a marking M (of the Petri net of Figure ) satisfying the region r of Figure as follows: The left-most multiset in H contains a re ball with value an a green ball with value. They represent the token with age.9 in the place, an the token with age.9 in. The fractional parts of the two tokens are equal (.9) an high. The next multiset contains a blue ball with value. It represents the token with age.9 in. The fractional part of the token (.9) is high an is larger than the fractional parts of the tokens in the previous multiset. The right-most multiset in H contains a white ball with value an an orange ball with value. They represent the token with ages.97 in the place, an the token with age.97 in. The

10 8 Time Price Petri Nets Figure : A marking M satisfying the region of Figure. fractional parts of the two tokens are equal (.97). The fractional parts of these tokens (.97) are high an are larger than the fractional part of the token in the previous multiset. The part Z consists of a single multiset. It contains a blue ball with value an a re ball with value. They represent the token with age. in the place, an the token with age in. The fractional parts of the two tokens are zero. The left-most multiset in L contains an orange ball with value an a green ball with value. They represent the token with age. in the place, an the token with age 8. in. The fractional parts of the two tokens are equal (.) an low. The age of the token in is 8. cmax+ which means that it is represente by in r. The next multiset contains a white ball with value. It represents that token with age. in. The fractional part of the token (.) is low an is larger than the fractional parts of the tokens in the previous multiset. The next multiset contains a re ball with value. It represents that token with age. in. The fractional part of the token (.) is low an is larger than the fractional part of the token in the previous multiset. We use [[r]] to enote the set of markings satisfying r. Time Transitions. We will escribe how to encoe the effect of etaile time transitions on regions. To o that, we efine ifferent types of transitions on regions. Type I This simulates a small elay where the tokens of integer age now have a positive fractional part, but no tokens reach an integer age. An example of such a transition is shown in Figure. Here, the elay is. which is not sufficient to make the tokens with the highest fractional parts (the token with age.97 in, an the token with age.97 in ) to become integers. Notice that the tokens with zero fractional parts (the token with age. in, an the token with age. in ) will now have have low fractional parts (in fact, they will have the smallest fractional parts, namely., among all tokens in the marking). At the region level, the two elements in Z will move to L, forming the left-most multiset in L (reflecting the fact that they have the lowest fractional parts). Type II Transition. This simulates a small elay in the case where there were no tokens of integer age an the tokens with the highest fractional parts just reach the next integer age. An example of such a transition is shown in Figure. Here, the elay is., which is sufficient to make the tokens with the highest fractional parts (the token with age.98 in, an the token with age.98 in ) to become integers, i.e., an respectively. At the region level, the right-most multiset in H will move to Z, an the value of each element in the multiset is incremente by one to reflect the fact that the ages of the token moves to the next integer. Type III Transition. This simulates a elay close to (but smaller than) where the tokens with low fractional parts will now either have high fractional parts, or they have reache (an passe) the

11 P. A. Abulla, R. Mayr Figure : Type I Transition Figure : Type II Transition. next integer an thus have low fractional parts again. The tokens that alreay ha high fractional parts will all have passe the next integer an will now have high fractional parts again. No token will have an integer value after the transition (the case where some tokens have integer ages is covere in Type IV transitions, see below). Here, the elay is.9. We have three types of tokens: Tokens that have low fractional parts both before an after the transition (the token with age. in, an the token with age.7 in ). The ages of these tokens are. an. after the transition. Thus, the elay is sufficient to make their ages go beyon the next integer. After the transition, these tokens will be the only ones with low fractional parts. The relative orering of their fractional parts will not be change. The integer part of their ages will have increase by one. At the region level, these two tokens are represente by the two right-most multisets in L. After the transition, they will be the only multisets in L, an their values are incremente by each. Notice that the relative orering of these tokens insie the region will be preserve. Tokens that have low fractional parts before the transition an high fractional parts after the transition (the token with age. in, the token with age. in, the token with age. in, an the token with age 8. in ). The ages of these tokens are.98,.98,.99, resp after the transition. These tokens have the highest fractional parts among all tokens in the marking. The relative orering of the fractional parts of these tokens will not be change. Also, the elay is not sufficiently long to make their values reach (or pass) to the next integer. At the region level, the corresponing multisets move from L to H, an will now be the right-most multisets in H. The orering of these multisets is preserve. Tokens that have high fractional parts both before an after the transition (the token with

12 Time Price Petri Nets Figure : Type III Transition Figure : Type IV Transition. age.98 in, the token with age.98 in, an the token with age.99 in ). The ages of these tokens are 7.9,.9, resp..9 after the transition. The elay is sufficiently long both to make their values pass the next integer integer, an to make their fractional parts high again. However, these tokens have now the lowest fractional parts among all tokens with high fractional parts. The relative orering of the fractional parts of the tokens will not be change. At the region level, the corresponing multisets will be the left-most multisets in H. The orering of these multisets is preserve. Their values are incremente by one (to reflect that they have reache the next integer). Notice that the new value of the token in is represente by since the value is cmax +. Type IV Transition. This is similar to a Type III transition, except that some of the tokens that have low fractional parts will have integer values after the transition (see Figure ). Discrete Transitions. Figure 7 shows the firing of transition t (Figure ), an escribes how the firing of the transition may be simulate at the region level. We remove a token from whose age is in the interval [..). This is one at the region level by removing the re ball with value from Z (the ball represents a token in whose age is exactly ). We a one to token to whose age is in the interval (..), an one to token to whose age is in the interval [..). In Figure 7, this is one at the region level by aing a white ball to a multiset in H with value (the ball represents a token in whose age is in the interval (..)), an aing a blue ball to a multiset in L with value (the ball represents a token in whose age is in the interval (..)).

13 P. A. Abulla, R. Mayr Figure 7: Firing the transition t. Costs. At the region level, the cost of performing a type I or type II transition is, since we can assume the time elay to be arbitrarily small. The cost of performing a type III or type IV transition is equal to the cost of performing a time transition of time unit, since we can make the elay arbitrarily close to. Thus, the cost of performing the transition in Figure or Figure is. The cost of performing a iscrete transition at the region level is the same as the cost of performing the transition on concrete markings. Thus, the cost of performing the transition in Figure 7 is. Solving the Cost-Optimality Problem In this section we explain our solution for the Cost-Optimality problem. Here, we give an informal overview of the main ieas. The (quite complicate) technical etails can be foun in []. First, we show that the Cost-Optimality problem can be reuce to the Cost-Threshol problem. Then, we introuce a general framework of orere transition systems, which we then instantiate to the case of regions. Finally, we present an algorithm that allows to solve the Cost-Threshol problem. From Cost-Optimality to Cost-Threshol. Consier an instance the Cost-Optimality problem, efine by M init an M pfin (see Section ). The task is to compute the optimal cost of reaching M pfin from M init, i.e., the infimum of the costs of all computations reaching M pfin from M init. To compute this value, it suffices to solve the Cost-Threshol problem for any given threshol v N, i.e., to ecie whether there is any computation from M init to M pfin with cost v. To see this, we first ecie whether M pfin is reachable from M init in the unerlying time Petri net (without consiering costs). This can be reuce to the Cost-Threshol problem by setting all place an transition costs to zero an solving the Cost-Threshol problem for v=. If the answer is no, then we can efine the optimal cost to be (M pfin is not reachable form M init ). If yes, then we can fin the optimal cost v by solving the Cost-Threshol problem for threshol v=,,,,... until the answer is yes. We solve the Cost-Threshol problem using regions as symbolic encoings of sets of markings. Orere Transition Systems. An orere transition system is a triple T =(S, A, ) where S is a (potentially) infinite set of configurations (or states), is a transition relation on S, an is an orering on S. We say that is monotone wrt. if the following hols for all configurations c,c,c S: if c c an c c then there is a c such that c c an c c.

14 Time Price Petri Nets free Figure 8: Orering on Regions. For a set S S of configurations, we efine Pre(S) to be the set of preecessors of S wrt., i.e., the set of configurations from which we can reach a configuration in S through a single application (a single step) of. We efine Pre to be the reflexive transitive closure of Pre, i.e., Pre (S) is the set of configurations from which we can reach a configuration insthrough any number of steps of. A sets S is sai to be upwar-close if for any two configurations with c c, it is the case that c Simplies c S. The upwar closures of a setsof configurations is the set of configurations that are larger than or equal to some configuration inswrt., i.e., S :={c S c S.c c }. Below, we will consier ifferent transition systems that are inuce by ifferent sets of configurations an ifferent transition relations. Instantiation. Consier an instance of the Cost-Threshol problem, efine by M init, M pfin, an a threshol v. Define a configuration c to be a pair (r,u) where r is a region, an u v. Intuitively, u enotes the maximal allowe cost of the remainer of a computation that passes through r. Let S be the set of all configurations. Let C be the set of configurations of the form (r,u) where r contains only tokens in the costs places (places whose costs are larger than ), an where the number of tokens in r is smaller than u. Notice that C is finite. Consier regions r,r. We write r all r if we can obtain r from r by aing a number of tokens to r. We write r free r if we can obtain r from r by aing a number of tokens to the free places (places whose costs are ). Notice that free all. Figure 8 shows an example of two regions (interprete over the PTPN of Figure ) relate by free. For configurations c =(r,u ) an c =(r,u ), we use c all c resp. c free c to enote that u = u an that r all r resp. r free r. For a set S S of configurations, we use S free to be the upwar closure of S with respect to free, i.e., it contains all configurations that are larger than or equal to some configuration ins wrt. free. We efines all in a similar manner. Let i enote the time transition relation of type i {I,II,III,IV}, an let Disc be the iscrete transition relation. Define A := Disc, i.e., a transition of type A is either a time transition of type I or II, or a iscrete transition. Define B :=, i.e., a transition of type B is a time transition of type III or IV. For a setm, we efine Pre A (M) to be the set of markings from which we can reach a marking in M through a single application of a transition of type A. We efine Pre B (M) analogously. Algorithm. We give an overview of an algorithm to solve the reachability problem. We notice that M pfin ( ) + is reachable from M init with a cost v iff M init A B A Mpfin an the accumulate cost of all involve transitions is v. Furthermore, we observe that M pfin can be characterize by the upwar closure (wrt. all ) of a finite set of regions. Therefore, it is sufficient to give an algorithm that, given a region r fin an threshol v, checks whether there is a region r init where M init is inclue in the enotation ( ) of r init such that (r init,) +(rfin A B A,v ) all. To o that, we generate a sequence of sets of configurations V,U,V,U,..., as follows:

15 P. A. Abulla, R. Mayr ( ( V := min free Pre A (rfin,v) all ) (C free) ). This set is possible to compute as follows. The set ( r fin,v ) all is (obviously) upwar-close wrt. all. The relation A is monotone wrt. all. We can then use the backwar ( reachability ( algorithm (introuce in []) for well quasiorere systems to compute min all Pre A (rfin,v) all )) ( (. The result follows from the fact that both min all Pre A (rfin,v) all )) an C are finite. U := min free (Pre B (V free)). This set can be compute by a straightforwar application of B on the elements of V. Notice that U C free, an that it is a finite set. For k >, given the finite set U k, we compute V k := min free (Pre A (U k free) (C free)). Notice that we here are solving a reachability problem rather than coverability problem, since U k free is not upwar-close wrt. all. In fact, this problem has an extremely complicate solution (escribe in []). The construction to compute it uses many calls to a subroutine which relies on the eciability of the reachability problem for Petri nets with one inhibitor arc [, 7]. In a sense, this is unavoiable, since the reverse reuction also hols. The reachability problem for Petri nets with one inhibitor arc can be reuce to the zero-cost coverability problem for PTPN, i.e., Cost-Threshol with threshol. For k >, we compute U k := min free (Pre B (V k free)) in a similar manner to U. U k C free, an that it is a finite set. Notice that The sequence U free,u free,... is a monotone-increasing sequence of upwar-close (wrt. free ) subsets of C free. This sequence converges, because free { is a well-quasi-orering on C free. Therefore, we get U n = U n+ for some finite inex n an U n free= c c( B A ) r fin }, because the transition B is only enable in C free. Finally, we compute the (finite) set of configurations, min all (Pre A (U n free)), an check whether the set contains a configuration of the form (r init,u) such that M init belongs to the enotation of r init. Conclusions an Future Work We have given an informal escription of a metho for computing the infimum of the costs of placing a token in given place of a time Petri net, starting from a given initial marking. Interesting irections for future work inclue augmenting time with other infinite-state iscrete moels such as push-own systems an asynchronously communicating processes, an to a other quantitative parameters such as probabilistic behaviors. References [] P.A. Abulla & B. Jonsson (): Moel checking of systems with many ientical time processes. Theoretical Computer Science 9(), pp., oi:./s-97()-9. [] P.A. Abulla & R. Mayr (): Computing optimal coverability costs in price time Petri nets. In: Logic in Computer Science (LICS), th Annual IEEE Symposium on, IEEE, pp. 99 8, oi:.9/lics... [] Parosh Aziz Abulla, Karlis Cerans, Bengt Jonsson & Yih-Kuen Tsay (99): General Deciability Theorems for Infinite-State Systems. In: LICS, pp., oi:.9/lics [] R. Alur & D. Dill (99): A Theory of Time Automata. TCS, pp. 8, oi:./-97(9)9-8.

16 Time Price Petri Nets [] R. Alur, S. La Torre & G. J. Pappas (): Optimal Paths in Weighte Time Automata. In: HSCC, pp. 9, oi:.7/ [] B. Bérar, F. Cassez, S. Haa, O. Roux & D. Lime (): Comparison of Different Semantics for Time Petri Nets. In: Automate Technology for Verification an Analysis, LNCS 77, Springer Berlin Heielberg, pp. 9 7, oi:.7/98. [7] R. Bonnet (): The reachability problem for Vector Aition Systems with one zero-test. In Filip Murlak & Piotr Sankowski, eitors: Proceeings of the th International Symposium on Mathematical Founations of Computer Science (MFCS ), LNCS 97, Springer, pp. 7, oi:.7/ [8] P. Bouyer, T. Brihaye, V. Bruyère & J. Raskin (7): On the optimal reachability problem of weighte time automata. Formal Methos in System Design (), pp. 7, oi:.7/s [9] P. Bouyer, F. Cassez, E. Fleury & K. G. Larsen (): Optimal Strategies in Price Time Game Automata. In: FSTTCS : Founations of Software Technology an Theoretical Computer Science, Lecture Notes in Computer Science 8, Springer Berlin Heielberg, pp. 8, oi:.7/ [] F. D. J. Bowen (99): Moelling Time in Petri nets. In: Proc. Secon Australian-Japan Workshop on Stochastic Moels. [] K.G. Larsen, G. Behrmann, E. Brinksma, A. Fehnker, T. Hune, P. Pettersson & J. Romijn (): As Cheap as Possible: Efficient Cost-Optimal Reachability for Price Time Automata. In: Proc. th Int. Conf. on Computer Aie Verification, Lecture Notes in Computer Science, Springer Berlin Heielberg, pp. 9, oi:.7/ [] J.L. Peterson (977): Petri Nets. Computing Surveys 9(), pp., oi:./98.7. [] C.A. Petri (9): Kommunikation mit Automaten. Ph.D. thesis, University of Bonn. [] K. Reinhart (8): Reachability in Petri Nets with Inhibitor Arcs. Electronic Notes in Theoretical Computuer Science, pp. 9, oi:./j.entcs.8... [] V. Valero Ruiz, F. Cuartero Gomez & D. e Frutos Escrig (999): On non-eciability of reachability for time-arc Petri nets. In: Proceeings of the The 8th International Workshop on Petri Nets an Performance Moels, PNPM 99, IEEE Computer Society, pp. 88 9, oi:.9/pnpm

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

RT-Studio: A tool for modular design and analysis of realtime systems using Interpreted Time Petri Nets

RT-Studio: A tool for modular design and analysis of realtime systems using Interpreted Time Petri Nets RT-Studio: A tool for modular design and analysis of realtime systems using Interpreted Time Petri Nets Rachid Hadjidj and Hanifa Boucheneb Abstract. RT-Studio (Real Time Studio) is an integrated environment

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

A Test Case Generation Algorithm for Real-Time Systems

A Test Case Generation Algorithm for Real-Time Systems A Test Case Generation Algorithm for Real-Time Systems Anders Hessel and Paul Pettersson Department of Information Technology Uppsala University, P.O. Box 337 SE-751 05 Uppsala, Sweden {hessel,paupet}@it.uu.se

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Timed Automata From Theory to Implementation

Timed Automata From Theory to Implementation Timed Automata From Theory to Implementation Patricia Bouyer LSV CNRS & ENS de Cachan France Chennai january 2003 Timed Automata From Theory to Implementation p.1 Roadmap Timed automata, decidability issues

More information

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia

More information

High dimensional Apollonian networks

High dimensional Apollonian networks High imensional Apollonian networks Zhongzhi Zhang Institute of Systems Engineering, Dalian University of Technology, Dalian 11604, Liaoning, China E-mail: lutzzz063@yahoo.com.cn Francesc Comellas Dep.

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

Object Recognition Using Colour, Shape and Affine Invariant Ratios

Object Recognition Using Colour, Shape and Affine Invariant Ratios Object Recognition Using Colour, Shape an Affine Invariant Ratios Paul A. Walcott Centre for Information Engineering City University, Lonon EC1V 0HB, Englan P.A.Walcott@city.ac.uk Abstract This paper escribes

More information

Quantitative analysis of real-time systems

Quantitative analysis of real-time systems Quantitative analysis of real-time systems Patricia Bouyer bouyer@lsv.ens-cachan.fr Kim G. Larsen kgl@cs.aau.dk LSV CNRS & ENS Cachan 6 avenue du Président Wilson 9 Cachan France Uli Fahrenberg uli@cs.aau.dk

More information

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions.

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions. THREE LECTURES ON BASIC TOPOLOGY PHILIP FOTH 1. Basic notions. Let X be a set. To make a topological space out of X, one must specify a collection T of subsets of X, which are said to be open subsets of

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Multi-Clock Timed Networks

Multi-Clock Timed Networks Multi-Clock Timed Networks arosh Aziz Abdulla, Johann Deneux, and ritha Mahata Dept of Information Technology Uppsala University Sweden parosh,johannd,pritha @ituuse Abstract We consider verification of

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Test-Based Inference of Polynomial Loop-Bound Functions

Test-Based Inference of Polynomial Loop-Bound Functions Test-Base Inference of Polynomial Loop-Boun Functions Olha Shkaravska Roy Kersten Rabou University Nijmegen {shkarav,r.kersten}@cs.ru.nl Marko van Eekelen Rabou University Nijmegen an Open Universiteit

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

arxiv: v2 [cond-mat.dis-nn] 30 Mar 2018

arxiv: v2 [cond-mat.dis-nn] 30 Mar 2018 Noname manuscript No. (will be inserte by the eitor) Daan Muler Ginestra Bianconi Networ Geometry an Complexity arxiv:1711.06290v2 [con-mat.is-nn] 30 Mar 2018 Receive: ate / Accepte: ate Abstract Higher

More information

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach Inverse Moel to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach 1 HAFEZ IBRAHIM, 2 JAMALLUDIN TALIB, 3 NORMAH MAAN Department of Mathematics Universiti Teknologi Malaysia 81310

More information

1 Shortest Path Problems

1 Shortest Path Problems CS268: Geometric Algorithms Hanout #7 Design an Analysis Original Hanout #18 Stanfor University Tuesay, 25 February 1992 Original Lecture #8: 4 February 1992 Topics: Shortest Path Problems Scribe: Jim

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

A Block-Based Blind Source Separation Approach With Equilateral Triangular Microphone Array

A Block-Based Blind Source Separation Approach With Equilateral Triangular Microphone Array APSIPA ASC 2011 Xi an A Block-Base Blin Source Separation Approach With Equilateral Triangular Microphone Array Jian Zhang, Zhonghua Fu an Lei Xie Shaanxi Provincial Key Laboratory of Speech an Image Information

More information