A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Weak Time Petri Nets Strike Back!
[chapter]
2009
Lecture Notes in Computer Science
We consider the model of Time Petri Nets where time is associated with transitions. ...
In this paper, we focus on Time Petri Nets with weak semantics equipped with three different memory policies for the firing of transitions. ...
Time Petri Nets Syntax. Introduced in [14] , Time Petri Nets associate a time interval with each transition of a Petri net. ...
doi:10.1007/978-3-642-04081-8_37
fatcat:uz3q6c2wenbabepaxeb4p6z4nm
Deficiency Zero Petri Nets and Product Form
[article]
2010
arXiv
pre-print
Consider a Markovian Petri net with race policy. ...
Roughly, we show that the only such Petri nets having a product form are the state machines which can alternatively be viewed as Jackson networks. ...
This provides a striking picture. ...
arXiv:0905.3158v3
fatcat:bwe3o2ymhfcqlm2s4mx2y3o344
Effective Stochastic Modeling of Energy-Constrained Wireless Sensor Networks
2012
Journal of Computer Networks and Communications
This necessitates modeling techniques that can quickly and accurately evaluate their behavior and identify strengths and weakness. We propose Petri nets as this ideal platform. ...
Furthermore, Petri net models are extremely easier to construct and test than either. ...
Each has its strengths and weaknesses. We propose another method of modeling that has not been used in the past to model WSNs: Petri nets. ...
doi:10.1155/2012/870281
fatcat:vv3wbabownh7znbcdonszohapi
Supply chain vulnerability assessment: A network based visualization and clustering analysis approach
2018
Journal of Purchasing and Supply Management
Keywords Supply chain risk management, Supply chain vulnerability, Supply chain design, Petri net, Supply chain disruptions Disciplines Business Administration, Management, and Operations | Operations ...
The approach incorporates a Petri net and Triangularization Clustering Algorithm to offer insights into a supply chain network's vulnerabilities and can be used to efficiently assess supply chain disruption ...
This is both a strength and weakness intrinsic to the Petri net. ...
doi:10.1016/j.pursup.2017.10.004
fatcat:yyf345vch5e6hgxsjkfmmifv3i
Page 340 of None Vol. 70, Issue 1821
[page]
1890
None
Peter Simp.e was as much frightened as the spectators, and a great deal more frightened than O’Brien, who dragged her ignominiously back in a net borrowed from “the carts “which had brought calves to the ...
Petrie had already dug up pottery of the Mykene charactet, and dates it about 1400 B.c., which answers well to the time the Eighteenth Dynasty ; but now he has “ painted pottery ! ...
An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net
2015
Journal of Advances in Computer Networks
Index Terms-Firewall, fuzzy petri net, packet filtering, access control list (ACL). ...
The graphical power of Petri Nets makes the packet filtering model easy to design, test, improve and maintain. ...
and Petri Net concept. ...
doi:10.7763/jacn.2015.v3.144
fatcat:memtzqhwnjfgnhyju365sc67sq
Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic Petri Nets
2015
International Journal of Aerospace Engineering
Based on the generalized stochastic petri nets (GSPN) theory and the collected basic failure modes and failure rate data of jet pipe servo valve, this paper proposes a novel modeling and simulating method ...
that the maximum error between methods of GSPN and Markov is 2.07%, the optimal repair rate set is less than 1.71µi, and also the dynamic reliability parameters become better with increasing simulation time ...
With the aim of extending the modelling power of stochastic petri nets, generalized stochastic petri nets were proposed [15] . ...
doi:10.1155/2015/171642
fatcat:5f5yjbezgzhgdhugzksylyxyye
Petri Nets with Fuzzy Logic (PNFL): Reverse Engineering and Parametrization
2010
PLoS ONE
Methodology and Principal Findings: We inferred and parametrized simulation models based on Petri Nets with Fuzzy Logic (PNFL). ...
At the same time, overly complex approaches could generate multiple different models that explain the data equally well. PNFL appears to strike the balance between expressive power and complexity. ...
A Petri Net with Fuzzy Logic (PNFL) can be defined as an instance of a hybrid functional Petri net (HFPN) [27] . ...
doi:10.1371/journal.pone.0012807
pmid:20862218
pmcid:PMC2942832
fatcat:kqm5nzfvqfe6tlpwt5qckttks4
Symmetric and Asymmetric Asynchronous Interaction
2009
Electronical Notes in Theoretical Computer Science
As our system model we use Petri nets. ...
It turns out that the resulting hierarchy of Petri net classes can be described by semi-structural properties. ...
The used communication primitives bear a striking similarity to our symmetrically asynchronous nets. ...
doi:10.1016/j.entcs.2009.06.040
fatcat:eoivwcslofdrnpg2z3cgwbb2t4
Formal verification of secure information flow in cloud computing
2016
Journal of Information Security and Applications
The rest of the paper demonstrates how Petri nets and the associated verification techniques could be used to analyze the security of information flow in federated cloud systems. ...
We then explain how Petri nets (more precisely, coloured Petri nets (CPNs)) could be used to analyse the correctness of such system. ...
The basic definitions relating to Petri nets are given in Section 5. Section 6 outlines how Petri nets could be used to support property verification in FCSs. ...
doi:10.1016/j.jisa.2016.03.002
fatcat:crciodkmvzd57bskqwgrey346q
YAWL: yet another workflow language
2005
Information Systems
Languages based on Petri nets perform better when it comes to state-based workflow patterns. ...
However, some patterns (e.g. involving multiple instances, complex synchronisations or non-local withdrawals) are not easy to map onto (high-level) Petri nets. ...
(We will come back to this later.) As in an ordinary Petri net, transition enter removes the tokens that enabled the task. ...
doi:10.1016/j.is.2004.02.002
fatcat:u3g3jk6bunegbglgrvlq5fvi4q
Polar Movement of Indole-3-acetic Acid-14C in Roots of Lens and Phaseolus
1968
Plant Physiology
The time-course of loss of counts from donor blocks was similar to that found in shoots. ...
The results with Lens were similar in many ways to those for shoots: net movement into receiver blocks was very strongly polar, followed a linear course for several hours, and showed a velocity of the ...
decrease with time in counts donor blocks is shown at the itop of fig There was more net loss from basa4l thai apical 'donors. ...
doi:10.1104/pp.43.5.675
pmid:16656826
pmcid:PMC1086909
fatcat:qqd7tqfervhdxean4tpo6syrfa
Coloured Petri Nets - a Pragmatic Formal Method for Designing and Analysing Distributed Systems
1997
DAIMI Report Series
The perspective of pragmatics is our leitmotif, but at the same time in the context of CP-nets it is a kind of hypothesis of this thesis. ...
Firstly, to get wider acceptance of CP-nets in industry, it is important to identify fruitful areas for the effective introduction of the CPN method. ...
This belongs to the well-known class of Petri Net properties called home properties | the possibility of always getting back t o something good. ...
doi:10.7146/dpb.v26i522.7051
fatcat:m5hb5hispbfl3f6inhyo6dacpe
Enacting object-oriented methods by a process environment
1998
Information and Software Technology
Moreover, Petri Net seems weak in object modeling. For example, how can the input or output of a transition be modeled in a Petri Net? The regular expression approach is used in Hakoniwa [71. ...
However, Petri Net is weak in modeling low-level details. To remedy that, other constructs should be provided. For example, Process Weaver provides a co-shell to access UNIX tools and services. ...
doi:10.1016/s0950-5849(98)00052-4
fatcat:2wjkhyacyrc3thitmukz4qqu2m
Process mining: a research agenda
2004
Computers in industry (Print)
Enterprise information systems support and control operational business processes ranging from simple internal back-office processes to complex interorganizational processes. ...
Free-choice Petri nets are a well-known and widely used subclass of Petri nets. However, many processes cannot be expressed in terms of a free-choice net. ...
The model is represented in terms of a Petri net [46] . The Petri net can start with task A and finish with task D. These tasks are represented by transitions. ...
doi:10.1016/j.compind.2003.10.001
fatcat:areplhnmu5cnxcxocifypwqpbi
« Previous
Showing results 1 — 15 out of 2,797 results