Filters








2,797 Hits in 3.5 sec

Weak Time Petri Nets Strike Back! [chapter]

Pierre-Alain Reynier, Arnaud Sangnier
2009 Lecture Notes in Computer Science  
We consider the model of Time Petri Nets where time is associated with transitions.  ...  In this paper, we focus on Time Petri Nets with weak semantics equipped with three different memory policies for the firing of transitions.  ...  Time Petri Nets Syntax. Introduced in [14] , Time Petri Nets associate a time interval with each transition of a Petri net.  ... 
doi:10.1007/978-3-642-04081-8_37 fatcat:uz3q6c2wenbabepaxeb4p6z4nm

Deficiency Zero Petri Nets and Product Form [article]

Jean Mairesse
2010 arXiv   pre-print
Consider a Markovian Petri net with race policy.  ...  Roughly, we show that the only such Petri nets having a product form are the state machines which can alternatively be viewed as Jackson networks.  ...  This provides a striking picture.  ... 
arXiv:0905.3158v3 fatcat:bwe3o2ymhfcqlm2s4mx2y3o344

Effective Stochastic Modeling of Energy-Constrained Wireless Sensor Networks

Ali Shareef, Yifeng Zhu
2012 Journal of Computer Networks and Communications  
This necessitates modeling techniques that can quickly and accurately evaluate their behavior and identify strengths and weakness. We propose Petri nets as this ideal platform.  ...  Furthermore, Petri net models are extremely easier to construct and test than either.  ...  Each has its strengths and weaknesses. We propose another method of modeling that has not been used in the past to model WSNs: Petri nets.  ... 
doi:10.1155/2012/870281 fatcat:vv3wbabownh7znbcdonszohapi

Supply chain vulnerability assessment: A network based visualization and clustering analysis approach

Jennifer Blackhurst, M. Johnny Rungtusanatham, Kevin Scheibe, Saurabh Ambulkar
2018 Journal of Purchasing and Supply Management  
Keywords Supply chain risk management, Supply chain vulnerability, Supply chain design, Petri net, Supply chain disruptions Disciplines Business Administration, Management, and Operations | Operations  ...  The approach incorporates a Petri net and Triangularization Clustering Algorithm to offer insights into a supply chain network's vulnerabilities and can be used to efficiently assess supply chain disruption  ...  This is both a strength and weakness intrinsic to the Petri net.  ... 
doi:10.1016/j.pursup.2017.10.004 fatcat:yyf345vch5e6hgxsjkfmmifv3i

Page 340 of None Vol. 70, Issue 1821 [page]

1890 None  
Peter Simp.e was as much frightened as the spectators, and a great deal more frightened than O’Brien, who dragged her ignominiously back in a net borrowed from “the carts “which had brought calves to the  ...  Petrie had already dug up pottery of the Mykene charactet, and dates it about 1400 B.c., which answers well to the time the Eighteenth Dynasty ; but now he has “ painted pottery !  ... 

An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net

Ali A. Ali, Saad M. Darwish, Shawkat K. Guirguis
2015 Journal of Advances in Computer Networks  
Index Terms-Firewall, fuzzy petri net, packet filtering, access control list (ACL).  ...  The graphical power of Petri Nets makes the packet filtering model easy to design, test, improve and maintain.  ...  and Petri Net concept.  ... 
doi:10.7763/jacn.2015.v3.144 fatcat:memtzqhwnjfgnhyju365sc67sq

Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic Petri Nets

Yuanbo Chu, Zhaohui Yuan, Jia Chen
2015 International Journal of Aerospace Engineering  
Based on the generalized stochastic petri nets (GSPN) theory and the collected basic failure modes and failure rate data of jet pipe servo valve, this paper proposes a novel modeling and simulating method  ...  that the maximum error between methods of GSPN and Markov is 2.07%, the optimal repair rate set is less than 1.71µi, and also the dynamic reliability parameters become better with increasing simulation time  ...  With the aim of extending the modelling power of stochastic petri nets, generalized stochastic petri nets were proposed [15] .  ... 
doi:10.1155/2015/171642 fatcat:5f5yjbezgzhgdhugzksylyxyye

Petri Nets with Fuzzy Logic (PNFL): Reverse Engineering and Parametrization

Robert Küffner, Tobias Petri, Lukas Windhager, Ralf Zimmer, Mark Isalan
2010 PLoS ONE  
Methodology and Principal Findings: We inferred and parametrized simulation models based on Petri Nets with Fuzzy Logic (PNFL).  ...  At the same time, overly complex approaches could generate multiple different models that explain the data equally well. PNFL appears to strike the balance between expressive power and complexity.  ...  A Petri Net with Fuzzy Logic (PNFL) can be defined as an instance of a hybrid functional Petri net (HFPN) [27] .  ... 
doi:10.1371/journal.pone.0012807 pmid:20862218 pmcid:PMC2942832 fatcat:kqm5nzfvqfe6tlpwt5qckttks4

Symmetric and Asymmetric Asynchronous Interaction

Rob van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke
2009 Electronical Notes in Theoretical Computer Science  
As our system model we use Petri nets.  ...  It turns out that the resulting hierarchy of Petri net classes can be described by semi-structural properties.  ...  The used communication primitives bear a striking similarity to our symmetrically asynchronous nets.  ... 
doi:10.1016/j.entcs.2009.06.040 fatcat:eoivwcslofdrnpg2z3cgwbb2t4

Formal verification of secure information flow in cloud computing

Wen Zeng, Maciej Koutny, Paul Watson, Vasileios Germanos
2016 Journal of Information Security and Applications  
The rest of the paper demonstrates how Petri nets and the associated verification techniques could be used to analyze the security of information flow in federated cloud systems.  ...  We then explain how Petri nets (more precisely, coloured Petri nets (CPNs)) could be used to analyse the correctness of such system.  ...  The basic definitions relating to Petri nets are given in Section 5. Section 6 outlines how Petri nets could be used to support property verification in FCSs.  ... 
doi:10.1016/j.jisa.2016.03.002 fatcat:crciodkmvzd57bskqwgrey346q

YAWL: yet another workflow language

W.M.P. van der Aalst, A.H.M. ter Hofstede
2005 Information Systems  
Languages based on Petri nets perform better when it comes to state-based workflow patterns.  ...  However, some patterns (e.g. involving multiple instances, complex synchronisations or non-local withdrawals) are not easy to map onto (high-level) Petri nets.  ...  (We will come back to this later.) As in an ordinary Petri net, transition enter removes the tokens that enabled the task.  ... 
doi:10.1016/j.is.2004.02.002 fatcat:u3g3jk6bunegbglgrvlq5fvi4q

Polar Movement of Indole-3-acetic Acid-14C in Roots of Lens and Phaseolus

S. C. Kirk, W. P. Jacobs
1968 Plant Physiology  
The time-course of loss of counts from donor blocks was similar to that found in shoots.  ...  The results with Lens were similar in many ways to those for shoots: net movement into receiver blocks was very strongly polar, followed a linear course for several hours, and showed a velocity of the  ...  decrease with time in counts donor blocks is shown at the itop of fig There was more net loss from basa4l thai apical 'donors.  ... 
doi:10.1104/pp.43.5.675 pmid:16656826 pmcid:PMC1086909 fatcat:qqd7tqfervhdxean4tpo6syrfa

Coloured Petri Nets - a Pragmatic Formal Method for Designing and Analysing Distributed Systems

Kjeld Høyer Mortensen
1997 DAIMI Report Series  
The perspective of pragmatics is our leitmotif, but at the same time in the context of CP-nets it is a kind of hypothesis of this thesis.  ...  Firstly, to get wider acceptance of CP-nets in industry, it is important to identify fruitful areas for the effective introduction of the CPN method.  ...  This belongs to the well-known class of Petri Net properties called home properties | the possibility of always getting back t o something good.  ... 
doi:10.7146/dpb.v26i522.7051 fatcat:m5hb5hispbfl3f6inhyo6dacpe

Enacting object-oriented methods by a process environment

Jen-Yen Jason Chen, Shih-Chien Chou
1998 Information and Software Technology  
Moreover, Petri Net seems weak in object modeling. For example, how can the input or output of a transition be modeled in a Petri Net? The regular expression approach is used in Hakoniwa [71.  ...  However, Petri Net is weak in modeling low-level details. To remedy that, other constructs should be provided. For example, Process Weaver provides a co-shell to access UNIX tools and services.  ... 
doi:10.1016/s0950-5849(98)00052-4 fatcat:2wjkhyacyrc3thitmukz4qqu2m

Process mining: a research agenda

W.M.P. van der Aalst, A.J.M.M. Weijters
2004 Computers in industry (Print)  
Enterprise information systems support and control operational business processes ranging from simple internal back-office processes to complex interorganizational processes.  ...  Free-choice Petri nets are a well-known and widely used subclass of Petri nets. However, many processes cannot be expressed in terms of a free-choice net.  ...  The model is represented in terms of a Petri net [46] . The Petri net can start with task A and finish with task D. These tasks are represented by transitions.  ... 
doi:10.1016/j.compind.2003.10.001 fatcat:areplhnmu5cnxcxocifypwqpbi
« Previous Showing results 1 — 15 out of 2,797 results