2006
DOI: 10.1007/s00170-006-0701-5
|View full text |Cite
|
Sign up to set email alerts
|

Identification and elimination of redundant control places in petri net based liveness enforcing supervisors of FMS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
57
0
1

Year Published

2010
2010
2017
2017

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 95 publications
(58 citation statements)
references
References 31 publications
0
57
0
1
Order By: Relevance
“…Moreover, the redundancy test of all computed monitors is carried out by utilizing the method in Uzam et al 56 It can be verified that V 1 , V 2 , . .…”
Section: Subnetmentioning
confidence: 99%
“…Moreover, the redundancy test of all computed monitors is carried out by utilizing the method in Uzam et al 56 It can be verified that V 1 , V 2 , . .…”
Section: Subnetmentioning
confidence: 99%
“…The only possible sets of marked operation places for the unmarked S 10 are Ψ 1 ¼ p 3 ; f p 4 ; p 5 ; p 9 ; p 10 g & S 10 ½ , Ψ 2 ¼ p 3 ; p 4 ; p 6 ; p 9 ; p 10 f g & S 10 ½ , Ψ 3 ¼ p 2 ; p 3 ; p 6 ; p 9 ; p 10 f g & S 10 ½ , and Ψ 4 ¼ p 2 ; p 4 ; p 6 ; f p 9 ; p 10 g & S 10 ½ with markings M Ψ1 ¼ p 3 þ p 4 þ p 5 þ p 9 þ p 10 , M Ψ2 ¼ p 3 þ p 4 þ p 6 þ p 9 þ p 10 , M Ψ3 ¼ p 2 þ p 3 þ p 6 þ p 9 þ p 10 , and M Ψ4 ¼ p 2 þ p 4 þ p 6 þ p 9 þ p 10 , respectively; the number of tokens in Ψ 1 or Ψ 2 or Ψ 3 is five.…”
Section: Theorymentioning
confidence: 99%
“…Consequently, deadlocks occur due to processes holding resources mutually waiting for others to release their resources. Deadlock prevention [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] adds monitors to problematic siphons to prevent them from becoming insufficiently marked.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…For Petri nets, as a basis for activity diagrams, the elimination of redundant control places while keeping a Petri net live is described by Uzam et al [25]. In addition to presenting an approach to detect clones in models, Störrle gives an example of a transformation that removes recurring fragments of activities by factoring them into independent activities [13].…”
Section: Related Workmentioning
confidence: 99%