Petri Nets and Other Models of Concurrency – ICATPN 2007
DOI: 10.1007/978-3-540-73094-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Generating Petri Net State Spaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(27 citation statements)
references
References 31 publications
0
27
0
Order By: Relevance
“…The resulting BPMN model is then transformed into a WF-net according to the mapping defined in [24]. For such a WF-net, we checked soundness using LoLA [25]. A BPMN model is classified as being perspicuous if the respective WF-net is sound; otherwise, it is classified as non-perspicuous.…”
Section: We Operationalize the Definition Of A Perspicuous Model Asmentioning
confidence: 99%
“…The resulting BPMN model is then transformed into a WF-net according to the mapping defined in [24]. For such a WF-net, we checked soundness using LoLA [25]. A BPMN model is classified as being perspicuous if the respective WF-net is sound; otherwise, it is classified as non-perspicuous.…”
Section: We Operationalize the Definition Of A Perspicuous Model Asmentioning
confidence: 99%
“…We still deal primarily with CP-nets, and the embedding of PTnets is just that, an embedding, which means we do not do any of the advanced analysis facilitated by looking at low-level nets, such as advanced state-space analysis as performed by LoLA [18], stochastic/timed analysis as performed by GreatSPN [5], or symmetry reduction as performed by CPN-AMI [11]. Adding Declare constraints is interesting as it provides Declare models with data (from the CP-nets) and provides CP-nets with a new description of control-flow at at higher level, making it easier to step-wise refinement by focusing on abstract control flow first, and add concrete control flow and data as necessary.…”
Section: Discussionmentioning
confidence: 99%
“…Handling packages received for communication patterns 1 and 2 is done by implementing a handle method (ll. [18][19][20][21][22]). An extension says it wants to intercept packages using pattern 1 by subscribing to them (ll.…”
Section: ¦ ¥mentioning
confidence: 99%
“…Additionally, fixing a number k, we used the state-of-the art Petri net model checker LoLA [19] to both establish a lower bound, by querying LoLA for existence of a reachable marking M with conc(M ) ≥ k; and to establish an upper bound, by querying LoLA if all reachable markings M satisfy conc(M ) ≤ k.…”
Section: Concurrency Threshold: a Practical Approachmentioning
confidence: 99%