New Canonical Representative Marking Algorithms for Place/Transition-Nets

Symmetries of a Place/Transition-net can be exploited during the state space analysis by considering only one representative marking in each orbit induced by the symmetries. This paper describes two new algorithms for the core problem of transforming a marking into an equivalent, canonical representative marking. The algorithms are based on a backtrack search through all the symmetries of the net. The first algorithm prunes the search with the marking in question and its stabilizers that are found during the search. The second algorithm first applies a standard preprocessing technique in graph isomorphism algorithms to obtain an ordered partition of the net elements in a symmetry-respecting way. The partition is then used to further prune the search through the symmetries. The efficiency of the proposed algorithms is experimentally evaluated. The results show that the new algorithms usually outperform the previous ones implemented in the LoLA tool.

[1]  A. Prasad Sistla,et al.  Symmetry Reductions in Model Checking , 1998, CAV.

[2]  B. McKay nauty User ’ s Guide ( Version 2 . 4 ) , 1990 .

[3]  Kurt Jensen Condensed state spaces for symmetrical Coloured Petri Nets , 1996, Formal Methods Syst. Des..

[4]  R. Varga,et al.  Proof of Theorem 4 , 1983 .

[5]  Javier Esparza,et al.  Implementing LTL model checking with net unfoldings , 2001, SPIN '01.

[6]  Peter Huber,et al.  Towards reachability trees for high-level Petri nets , 1985, European Workshop on Applications and Theory in Petri Nets.

[7]  Kurt Jensen,et al.  Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .

[8]  Sam Sandqvist,et al.  Aspects of modelling and simulation of genetic algorithms : a formal approach , 2002 .

[9]  Karsten Schmidt Integrating Low Level Symmetries into Reachability Analysis , 2000 .

[10]  László Babai,et al.  Canonical labeling of graphs , 1983, STOC.

[11]  Rajeev Alur,et al.  A Temporal Logic of Nested Calls and Returns , 2004, TACAS.

[12]  Somesh Jha,et al.  Exploiting symmetry in temporal logic model checking , 1993, Formal Methods Syst. Des..

[13]  A. Prasad Sistla,et al.  On-the-Fly Model Checking Under Fairness that Exploits Symmetry , 1999, Formal Methods Syst. Des..

[14]  A. Prasad Sistla,et al.  Symmetry and model checking , 1996, Formal Methods Syst. Des..

[15]  Keijo Heljanko,et al.  Combining symbolic and partial order methods for model checking 1-safe Petri nets , 2002 .

[16]  Karsten Schmidt LoLA: a low level analyser , 2000 .

[17]  K. Nurmela,et al.  COVERING A SQUARE WITH UP TO 30 EQUAL CIRCLES , 2000 .

[18]  Karsten Wolf How to calculate symmetries of Petri nets , 2000, Acta Informatica.

[19]  Hartmann J. Genrich,et al.  Predicate/Transition Nets , 1986, Advances in Petri Nets.

[20]  Tommi A. Junttila,et al.  On the symmetry reduction method for Petri nets and similar formalisms , 2003 .

[21]  Tommi A. Junttila SYMMETRY REDUCTION ALGORITHMS FOR DATA SYMMETRIES , 2002 .

[22]  Tommi A. Junttila Computational Complexity of the Place/Transition-Net Symmetry Reduction Method , 2001, J. Univers. Comput. Sci..

[23]  Kurt Jensen,et al.  Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 1, Basic Concepts , 1992 .

[24]  Karsten Wolf,et al.  LoLA: A Low Level Analyser , 2000, ICATPN.

[25]  A. Prasad Sistla,et al.  SMC: a symmetry-based model checker for verification of safety and liveness properties , 2000, TSEM.

[26]  A. Prasad Sistla Symmetry Reductions in Model-Checking , 2003, VMCAI.

[27]  Gregory Butler,et al.  Fundamental Algorithms for Permutation Groups , 1991, Lecture Notes in Computer Science.

[28]  Tommi A. Junttila Detecting and exploiting data type symmetries of algebraic system nets during reachability analys , 1999 .

[29]  Mark Jerrum,et al.  A compact representation for permutation groups , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[30]  P. H. Starke,et al.  Reachability analysis of Petri nets using symmetries , 1991 .

[31]  Grzegorz Rozenberg,et al.  High-level Petri Nets: Theory And Application , 1991 .

[32]  Chung-Wah Norris Ip,et al.  State reduction methods for automatic formal verification , 1996 .

[33]  Lars Michael Kristensen,et al.  Exploiting stabilizers and parallelism in state space generation with the symmetry method , 2001, Proceedings Second International Conference on Application of Concurrency to System Design.

[34]  Petteri Kaski,et al.  ISOMORPH-FREE EXHAUSTIVE GENERATION OF COMBINATORIAL DESIGNS , 2002 .

[35]  Giovanni Chiola,et al.  On Well-Formed Coloured Nets and Their Symbolic Reachability Graph , 1991 .

[36]  Felix Schlenk,et al.  Proof of Theorem 3 , 2005 .

[37]  T. Aura AUTHORIZATION AND AVAILABILITY - ASPECTS OF OPEN NETWORK SECURITY , 2000 .

[38]  David L. Dill,et al.  Better verification through symmetry , 1996, Formal Methods Syst. Des..

[39]  Kurt Jensen,et al.  Coloured Petri Nets , 1997, Monographs in Theoretical Computer Science An EATCS Series.

[40]  Toni Jussila,et al.  BOUNDED MODEL CHECKING FOR VERIFYING CONCURRENT PROGRAMS , 2002 .

[41]  A REACHABILITY ANALYSER FOR ALGEBRAIC SYSTEM NETS , 2001 .

[42]  Mogens Nielsen,et al.  Application and Theory of Petri Nets 2000: 21st International Conference, ICATPN 2000 Aarhus, Denmark, June 26–30, 2000 Proceedings , 2000, ICATPN.

[43]  Hartmann J. Genrich Predicate/transition nets , 1987 .

[44]  Donald L. Kreher,et al.  Combinatorial algorithms: generation, enumeration, and search , 1998, SIGA.

[45]  Richard S. Varga,et al.  Proof of Theorem 5 , 1983 .

[46]  Anna Philippou,et al.  Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.

[47]  Timo Latvala,et al.  MODEL CHECKING LINEAR TEMPORAL LOGIC PROPERTIES OF PETRI NETS WITH FAIRNESS CONSTRAINTS , 2001 .

[48]  A. Prasad Sistla,et al.  Utilizing symmetry when model-checking under fairness assumptions: an automata-theoretic approach , 1997, TOPL.