<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integrating prior knowledge in automatic network reconstruction</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marie C.F. Favre</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wolfgang Marwan</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Annegret K. Wagler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>marie.favre</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>waglerg@isima.fr</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>wolfgang.marwan@ovgu.de</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Laboratoire d'Informatique, de Modelisation et d'Optimisation des Systemes (LIMOS, UMR CNRS 6158), Universite Blaise Pascal</institution>
          ,
          <addr-line>Clermont-Ferrand</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Magdeburg Center for Systems Biology (MaCS), Otto-von-Guericke-Universitat</institution>
          ,
          <addr-line>Magdeburg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2014</year>
      </pub-date>
      <volume>1159</volume>
      <fpage>45</fpage>
      <lpage>59</lpage>
      <abstract>
        <p>The reconstruction of models from experimental data is a challenging problem due to the inherited complexity of biological systems. We developed an exact, exclusively data-driven approach to reconstruct Petri nets from experimental time-series data. Our approach aims at reconstructing all such netwoks that t the given experimental data, to provide all possible alternatives of mechanisms behind the experimental observations, which typically results in a large set of solution alternatives. To keep this solution set reasonably small while still guaranteeing its completeness, we rstly generate only Petri nets being minimal in the sense that all other networks tting the data contain the reconstructed ones. We further aim at avoiding the generation of minimal solutions which are \technically correct" but would be ruled out later during a subsequent veri cation process to check whether the returned solutions are \biological meaningful" or even contradict well-established biological knowledge. For that, we propose to extent the considered input (beyond the information given with the experimental time-series data) for the reconstruction process and demonstrate with the help of a running example the in uence on the generated solution set.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Systems biology aims at the integrated experimental and theoretical analysis of
molecular or cellular networks to achieve a holistic understanding of biological
systems and processes. To gain the required insight into the underlying biological
processes, experiments are performed and experimental data are interpreted in
terms of models. Depending on the biological aim, the type and quality of the
available data, di erent types of mathematical models are used and
corresponding reconstruction methods have been developed. Our work is dedicated to Petri
nets which turned out to coherently model both static interactions in terms of
networks and dynamic processes in terms of state changes, see e.g. [
        <xref ref-type="bibr" rid="ref10 ref7">7,10</xref>
        ].
      </p>
      <p>In fact, a network P = (P; T; A; w) re ects the involved components by places
p 2 P and their interactions by transitions t 2 T , linked by weighted directed arcs
(p; t); (t; p) 2 A. Each place p 2 P can be marked with an integral number xp of
tokens de ning a system state x 2 Zj+P j, i.e., we obtain X := fx 2 ZjP j : xp 0g
as set of potential states. A transition t 2 T is enabled in a state x if xp w(p; t)
for all p with (p; t) 2 A, we denote the set of all such transitions by T (x).
Switching t 2 T (x) yields a successor state succ(x) = x0 with x0p = xp w(p; t)
for all (p; t) 2 A and x0p = xp + w(t; p) for all (t; p) 2 A. Dynamic processes are
represented by sequences of such state changes.</p>
      <p>Our central question is to reconstruct models of this type from experimental
time-series data by means of an exact, exclusively data-driven approach. This
approach takes as input a set P of places and discrete time-series data X 0 X
given by sequences (x0; x1; : : : ; xk) of experimentally observed system states.
The goal is to determine all Petri nets (P; T; A; w) that are able to reproduce
the data, i.e., that perform for each xj 2 X 0 the experimentally observed state
change to xj+1 2 X 0 in a simulation. Hence, in contrast to the normally used
stochastic simulation, we require that for states where at least two transitions
are enabled, the decision between the alternatives is not taken randomly, but a
speci c transition is selected. Thus, (standard) Petri nets have to be equipped
with additional activation rules to force the switching of speci c transitions (to
reach xj+1 from xj ), and to prevent all others from switching. For that, di erent
types of additional activation rules are possible.</p>
      <p>On the one hand, control-arcs are used to represent catalytic or inhibitory
dependencies. An extended Petri net P = (P; T; (A [ AR [ AI ); w) is a Petri
net which has, besides the (standard) arcs in A, two additional sets of so-called
control-arcs: the set of read-arcs AR P T and the set of inhibitor-arcs
AI P T ; we denote the set of all arcs by A = A [ AR [ AI . Here, a transition
t 2 T (x) coupled with a read-arc (resp. an inhibitor-arc) to a place p 2 P can
switch only if at least w(p; t) tokens (resp. less than w(p; t) tokens) are present
in p; we denote by TA(x) the set of all such transitions.</p>
      <p>
        On the other hand, in [
        <xref ref-type="bibr" rid="ref12 ref13 ref9">9,12,13</xref>
        ] priority relations among the transitions of a
network are employed to re ect the rate of the corresponding reactions, where
the fastest reaction has highest priority and, thus, is taken. In Marwan et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
it is proposed to model such priorities with the help of partial orders O on
the transitions. We call (P ; O) an (extended) Petri net with priorities, if P =
(P; T; A; w) is an (extended) Petri net and O a priority relation on T . Priorities
can prevent enabled transitions from switching: For each state x, a transition
t 2 TA(x) is allowed to switch only if there is no other enabled transition in
TA(x) with higher priority; we denote by TA;O(x) the set of all such transitions.
      </p>
      <p>
        We call (P ; O) X 0-deterministic if TA;O(x) contains at most one element
for each experimentally observed state x 2 X 0. Based on earlier results in
[
        <xref ref-type="bibr" rid="ref13 ref3 ref4 ref5 ref9">3,4,5,9,13</xref>
        ], an integrative method to reconstruct all X 0-deterministic extended
Petri nets with priorities tting given experimental time-series data X 0 was
proposed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] (see Section 2).
      </p>
      <p>Our approach aims at reconstructing all netwoks of the studied type that t
the given experimental data, to provide all possible alternatives of mechanisms
behind the experimentally observed phenomena. Typically, this results in a large
set of solution alternatives. To keep this solution set reasonably small while
still guaranteeing its completeness, we generate only Petri nets being minimal
in the sense that all other networks tting the data contain the reconstructed
ones. Here, we propose a method to insert only minimal sets of control-arcs
during the reconstruction process (see Section 2). We further aim at avoiding
the generation of minimal solutions which are \technically correct" but would
be ruled out later during a subsequent veri cation process to check whether the
returned solutions are \biological meaningful" or even contradict well-established
biological knowledge. For that, we extent the considered input by integrating
biological prior knowledge (beyond the information given with the experimental
time-series data) into the reconstruction process and demonstrate with the help
of a running example the in uence on the generated solution set (see Section 3).
We close with some concluding remarks and lines of future work.
2</p>
      <p>
        Reconstructing extended Petri nets with priorities
We describe the input, the main ideas, and the output of our approach from [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Input. A set of components P (standing for proteins, enzymes, genes, receptors
or their conformational states, later represented by the set of places) is chosen
which is expected to be crucial for the studied phenomenon. If P contains known
P -invariants (subsets P 0 P of places where the sum of the number of all tokens
on all the places in P 0 is constant, e.g., di erent functional states of a cell or
conformational states of a molecular complex), they are collected in a set IP .
      </p>
      <p>To perform an experiment, one rst triggers the system in some state x0 (by
external stimuli like the exposition to a pathogen), to generate an initial state
x1. Then the system's response to the stimulation is observed and the resulting
state changes are measured for all considered components at certain time points.
This yields a sequence of (discrete or discretized) states xj 2 ZjP j re ecting the
time-dependent response of the system to the stimulation in x1, which typically
terminates in a terminal state xk where no further changes are observed. The
corresponding experiment is X 0(x1; xk) = (x0; x1; : : : ; xk): Several experiments
starting from di erent initial states in a set Xi0ni X 0, reporting the observed
state changes, and ending at di erent terminal states in a set Xt0erm X 0
describe the studied phenomenon, and yield experimental time-series data of the
form X 0 = fX 0(x1; xk) : x1 2 Xi0ni; xk 2 Xt0ermg: Thus, the input of the
reconstruction approach is given by (P; IP ; X 0).</p>
      <p>
        Example 1. As running example, we will consider experimental biological data
from the light-induced sporulation of Physarum polycephalum as in [
        <xref ref-type="bibr" rid="ref13 ref6">6,13</xref>
        ]. In P.
polycephalum plasmodia, the photoreceptor involved in the control of
sporulation Spo is a protein which occurs in two stages PF R and PR. The
developmental decision of starving P. polycephalum plasmodia to enter the sporulation
pathway is controlled by environmental factors like visible light [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. If the
darkadapted form PF R absorbs far-red light F R, the receptor is converted into its
red-absorbing form PR, which causes sporulation after several hours [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. If PR is
exposed to red light R, it is photo-converted back to the initial state PF R
(photoreversion), which prevents sporulation if the red light pulse is given shortly
after the far-red pulse, but not if the red pulse is delivered after more than an
hour when the phytochrome photoreceptor has had su cient time to cause the
formation of a biochemical downstream signal G that subsequently causes the
sporulation of the cell. The changes between the stages PF R and PR only require
fractions of seconds and can be experimentally observed due to a change of color
of the phytochrome protein. The experimental setting consists of
For a successful reconstruction, the data X 0 need to satisfy two properties:
reproducibility and monotonicity. The data X 0 are reproducible if for each xj 2 X 0
there is a unique observed successor state succX 0 (xj ) = xj+1 2 X 0.
Reproducibility is obviously necessary and can be ensured by preprocessing [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Whether a
state xj 2 X 0 and its observed successor succX 0 (xj ) = xj+1 2 X 0 are also
consecutive system states depends on the chosen time points to measure the states
in X 0. In fact, xj+1 may be obtained from xj by a switching sequence of some
length, where the intermediate states are not reported in X 0. The data X 0 are
monotone if for each pair (xj ; xj+1) 2 X 0, the values of the elements do not
oscillate in the possible intermediate states between xj and xj+1. It was shown
in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] that monotonicity has to be required, too (which is equivalent to demand
that all essential responses are indeed reported in X 0).
Output. An extended Petri net with priorities (P; O) with P = (P; T; A; w)
ts the given data X 0 when it is able to perform every observed state change
from xj 2 X 0 to xj+1 2 X 0. For that, associate with P an incidence matrix
M 2 ZjP j jT j whose rows correspond to the places p 2 P and whose columns
M t to the update vector rt of the transitions t 2 T :
&gt;8 w(p; t) if (p; t) 2 A;
&lt;
rpt = Mpt := +w(t; p) if (t; p) 2 A;
      </p>
      <p>&gt;:0 otherwise:
Reaching xj+1 from xj by a switching sequence using the transitions from a
subset T 0 T is equivalent to obtain xj+1 from xj by adding the corresponding
columns M t of M for all t 2 T 0, i.e., xj + Pt2T 0 M t = xj+1:</p>
      <p>T has to contain enough transitions to perform all experimentally observed
switching sequences. The underlying standard network P = (P; T; A; w) is
conformal with X 0 if, for any two consecutive states xj ; xj+1 2 X 0, the linear
equation system xj+1 xj = M has an integral solution 2 NjT j such that
represents a sequence (t1; :::; tm) of transition switches, i.e., there are
intermediate states xj = y1; y2; :::; ym+1 = xj+1 with yl +M tl = yl+1 for 1 l m. The
extended Petri net P = (P; T; A; w) is catalytic conformal with X 0 if tl 2 TA(yl)
for each intermediate state yl, and the extended Petri net with priorities (P; O)
is X 0-deterministic if ftlg = TA;O(yl) holds for all yl.</p>
      <p>The desired output consists of all minimal X 0-deterministic extended Petri
nets (P; O) (all having the same set P of places as part of the input).
Example 2. We represent in Fig. 3 (page 54) several alternative X 0-deterministic
extended Petri nets tting the experimental data X 0 from our running example.</p>
      <p>We now brie y sketch the reconstruction procedure.</p>
      <p>Representing the observed responses. As initial step, extract the observed changes
of states from the experimental data. For that, de ne the set</p>
      <p>D :=
dj = xj+1</p>
      <p>
        xj : xj+1 = succX 0 (xj ) 2 X 0 :
Generating the complete list of all X 0-deterministic extended Petri nets P =
(P; T; A; w) includes nding the corresponding standard networks and their
incidence matrices M 2 ZjP j jT j. Due to monotonicity [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], it su ces to represent
any dj 2 D using sign-compatible update vectors from the following set only:
8
&gt;
&gt;
Box(dj ) = &lt;
&gt;
&gt;
:
r 2 ZjP j :
0
dp
rp dp if djp &gt; 0 &gt;9
rp 0 if djp &lt; 0 =&gt;
rp = 0 if djp = 0
Pp2P 0 rp = 0 8P 0 2 IP ;&gt;&gt;
n f0g:
Next, we determine for any dj 2 D, the set (dj ) of all integral solutions of
dj =
      </p>
      <p>
        X
rt2 Box(dj)
trt; t 2 Z+;
(1)
and for each 2 (dj ), the (multi-)set R(dj ; ) = frt 2 Box(dj ) : t (6=dj0)garoef
update vectors used for this solution . By construction, Box(dj ) and
always non-empty since dj itself is always a solution due to reproducibility [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Every permutation = (rt1 ; : : : ; rtm ) of the elements of a set R(dj ; ) gives rise
to a sequence of intermediate states xj = y1; y2; :::; ym; ym+1 = xj+1 with
=
      </p>
      <p>; (xj ; dj ) = (y1; rt1 ); (y2; rt2 ); : : : ; (ym; rtm ) :</p>
      <p>To compose all possible standard networks, we have to select exactly one
solution (dj ) for each dj 2 D and to take the union of the corresponding
sets R(dj ; 2) in order to yield the columns M t = rt of an incidence matrix M
of a conformal network. To ensure that the generated conformal networks can
be made X 0-deterministic, we proceed as follows.</p>
      <p>Detecting priority con icts between sequences. By construction, every sequence
; (xj ; dj ) induces a priority relation O , since it implies which transition ti is
supposed to have highest priority (and thus switches) for every intermediate state
yi. To impose valid priority relations O among all transitions of the reconstructed
networks, we have to take con icts between priority relations O induced by
di erent sequences into account. Two sequences and 0 are in priority con ict
t = rt0 and intermediate states y; y0 such that
if there are update vectors r 6
t; t0 2 T (y) \ T (y0) and (y; rt) 2 but (y0; rt0 ) 2 0 (since this implies t &gt; t0 in
O but t0 &gt; t in O 0 ). We have a weak (resp. strong) priority con ict if y 6= y0
(resp. y = y0) which can (resp. cannot) be resolved by adding control-arcs.</p>
      <p>We construct a priority con ict graph G = (VD [Vterm; ED [EW [ES ) whose
nodes correspond to all possible sequences ; (xj ; dj ) and whose edges re ect
weak and strong priority con icts (WPC and SPC for short):
{ VD contains the sequences ; (xj ; dj ) for all xj j =
succX 0 (xj ) xj , for all 2 (dj ) and all permutat2ionXs0 n oXft0eRr m(dja;nd).d
{ Vterm contains for all xk 2 Xt0erm the trivial sequence (xk; 0).
{ ED contains all edges between two sequences ; 0 stemming from the same
di erence vector.
{ ES (resp. EW ) re ects all SPCs (resp. WPCs) between sequences ; 0
stemming from distinct di erence vectors.</p>
      <p>In G, we generate all node subsets S selecting exactly one sequence ; (xj ; dj )
per di erence vector dj 2 D such that no SPCs occur between the selected
sequences and the nodes in Vterm. Clearly, a node 2 VD can never be selected for
any solution S if it is in SPC with a terminal state sequence or with all sequences
0 stemming from one di erence vector dj 2 D. Removing all such nodes and
their incident edges from G yields the reduced priority con ict graph G0. We can
show that the sets of suitable selections S obtained in G and G0 are equal and
that there is always at least one feasible selection.</p>
      <p>Example 4. We obtain the following reduced priority con ict graph G0 for the
running example, where bold edges indicate SPCs and thin edges WPCs.</p>
      <p>Q3
σ1(x1,d1)
σ3(x1,d1)
σ1(x7,d3)
σ1(x3,d3)
σ(x8,0)</p>
      <p>Q1
σ(x0,0)
σ1(x6,d4)
σ3(x6,d4)
σ(x4,0)
σ1(x5,d4)
σ3(x5,d4)
σ1(x2,d2)</p>
      <p>Q3
From G0, we obtain as feasible subsets Si = S0 [ Si0 with</p>
      <p>S0 = f 1(x2; d2); 1(x3; d3); 1(x7; d3)g
S10 = f 1(x1; d1); 1(x5; d4); 1(x6; d4)g, S50 = f 3(x1; d1); 1(x5; d4); 1(x6; d4)g,
S20 = f 1(x1; d1); 1(x5; d4); 3(x6; d4)g, S60 = f 3(x1; d1); 1(x5; d4); 3(x6; d4)g,
S30 = f 1(x1; d1); 3(x5; d4); 1(x6; d4)g, S70 = f 3(x1; d1); 3(x5; d4); 1(x6; d4)g,
S40 = f 1(x1; d1); 3(x5; d4); 3(x6; d4)g, S80 = f 3(x1; d1); 3(x5; d4); 3(x6; d4)g.
Constructing X 0-deterministic Petri nets. Every selected subset S corresponds
to a conformal standard network PS = (P; TS ; AS ; w): we obtain the columns of
the incidence matrix MS of the network by taking the union of all sets R(dj ; )
corresponding to the sequences = ; (xj ; dj ) selected by 2 S.
Example 5. We apply the method to the feasible sets S1 and S4 from Exp. 4 and
obtain the standard networks presented in Fig. 2 with TS1 = D and in Fig. 3
with TS4 = fd1; d2; d3; r4:1; r4:2g, respectively.</p>
      <p>
        If there are weak priority con icts 0 2 EW for nodes ; 0 2 S [ Vterm,
denoted by WPC( ; 0), the constructed standard network PS needs to be made
X 0-deterministic by inserting appropriate control-arcs. By [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a WPC( ; 0)
between two sequences and 0 involving update vectors rt 6= rt0 and intermediate
states y 6= y0 with t; t0 2 T (y) \ T (y0) such that (y; rt) 2 but (y0; rt0 ) 2 0
has to be resolved by adding appropriate control-arcs that either turn rt into a
transition t which is disabled at y0 (then t &gt; t0 forces t to switch in y whereas
only t0 is enabled at y0), or vice versa. Let P (y; y0) be the set of places where y
and y0 di er and CA( ; 0) the set of all possible control-arcs that can resolve
WPC( ; 0). Then CA( ; 0) partitions into two subsets CAt&gt;t0 ( ; 0) disabling
t at y0 containing
{ a read-arc (p; t) 2 AR with weight w(p; t) &gt; yp0 8p 2 P (y; y0) with yp &gt; y0 ,
p
{ an inhibitor-arc (p; t) 2 AI with w(p; t) &lt; yp 8p 2 P (y; y0) with yp &lt; yp0,
and CAt&lt;t0 ( ; 0) disabling t0 at y containing
{ a read-arc (p; t0) 2 AR with weight w(p; t0) &gt; yp 8p 2 P (y; y0) with yp0 &gt; yp,
{ an inhibitor-arc (p; t0) 2 AI with w(p; t0) &lt; yp0 8p 2 P (y; y0) with yp0 &lt; yp.
Remark 1. If one of y; y0 is a terminal state, say y0, then CAt&lt;t0 ( ; 0) = ;
follows since t has to be disabled at y0 and t &gt; t0 = 0 holds automatically.
Moreover, if y = y0 then P (y; y0) = ; follows which is the reason why SPCs
cannot be resolved by adding control-arcs.
      </p>
      <p>
        Due to [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], inserting one control-arc from CA( ; 0) resolves the WPC( ; 0) in
PS . Here, we further discuss mutual in uences of control-arcs in the resulting
extended Petri nets as well as the issue of only constructing minimal catalytic
conformal networks.
      </p>
      <p>On the one hand, inserting a control-arc (p; t) 2 CA( ; 0) in PS might disable
t at a state in another sequence 00 2 S n ; 0 where t is supposed to switch.
In this case, (p; t) has to be removed from CA( ; 0), resulting in a reduced set
CAS ( ; 0). On the other hand, one control-arc may resolve several WPCs in PS
if the corresponding sets CAS ( ; 0) intersect.</p>
      <p>
        Therefore, we propose the following consideration: Introduce one variable
z(p;t) 2 f0; 1g for each possible control-arc (p; t) 2 CAS ( ; 0) for all WPCs in
PS . Construct a 0=1-matrix AS whose columns correspond to all those variables
(resp. control-arcs) and whose rows encode the incidence vectors of the sets
CAS ( ; 0) for all WPCs in PS . Then any 0=1-solution z of the system AS z 1
encodes a suitable set of control-arcs resolving all WPCs in PS and, thus, a hitting
set or cover of AS . By [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], we are only interested in nding minimal models
tting X 0, where minimality is interpreted in the sense that all non-minimal
models contain another one also tting the data. We can show that using
nonminimal covers of AS yields non-minimal extended Peri nets but that we need
all of them for the sake of completeness, which corresponds to determining the
so-called blocker b(AS ) of AS .
      </p>
      <p>Example 6. We list all WPCs between sequences in our running example:
WPC1 between
WPC2 between
WPC3 between
WPC4 between
WPC5 between
WPC6 between
WPC7 between
WPC8 between
WPC9 between
WPC10 between
WPC11 between
WPC12 between
WPC13 between
σ1(x2, d2) and
σ1(x3, d3) and
σ1(x7, d3) and
σ3(x1, d1) and
σ3(x1, d1) and
σ3(x1, d1) and
σ1(x2, d2) and
σ3(x5, d4) and
σ3(x5, d4) and
σ3(x6, d4) and
σ3(x6, d4) and
σ1(x5, d4) and
σ3(x5, d4) and
σ(x0, 0)
σ(x0, 0)
σ(x0, 0)
σ1(x7, d3)
σ(x0, 0)
σ(x8, 0)
σ3(x5, d4)
σ1(x3, d3)
σ(x4, 0)
σ1(x3, d3)
σ(x4, 0)
σ3(x6, d4)
σ1(x6, d4)
due to
due to
due to
due to
due to
due to
due to
due to
due to
due to
due to
due to
due to
d2, 0
d3, 0
d3, 0
d3, r1.2
r1.2, 0
r1.2, 0
d2, r4.2
d3, r4.2
r4.2, 0
d3, r4.2
r4.2, 0
d4, r4.2
d4, r4.2
∈
∈
∈
∈
∈
∈
∈
∈
∈
∈
∈
∈
∈</p>
      <p>T (x0) ∩ T (x2)
T (x0) ∩ T (x3)
T (x0) ∩ T (x7)
T (x1) ∩ T (x7)
T (x0) ∩ T (x1)
T (x8) ∩ T (x1)
T (x2) ∩ T (x5)
T (x3) ∩ T (x5)
T (x4) ∩ T (x5)
T (x3) ∩ T (x6)
T (x4) ∩ T (x6)
T (x5) ∩ T (x6)
T (x5) ∩ T (x6)
We obtain the following control-arcs to resolve WPCs between sequences:
CA(WPC1) =
CA(WPC2) =
CA(WPC3) =
CA(WPC4) =
CA(WPC5) =
CA(WPC6) =
CA(WPC7) =
CA(WPC8) =
CA(WPC9) =
CA(WPC10) =
CA(WPC11) =
CA(WPC12) =
CA(WPC13) =
{(PFR, d2) ∈ AI, (PR, d2) ∈ AR},
{(PFR, d3) ∈ AI, (PR, d3) ∈ AR, (G, d3) ∈ AR},
{(G, d3) ∈ AR},
{(F R, d3) ∈ AI, (G, d3) ∈ AR, (F R, r1.2) ∈ AR, (G, r1.2) ∈ AI},
{{((SFpRo,,rr11..22)) ∈∈ AARI,}(,G, r1.2) ∈ AI},
{(R, r4.2) ∈ AR, (R, d2) ∈ AI},
{(R, r4.2) ∈ AR, (G, r4.2) ∈ AI, (R, d3) ∈ AI, (G, d3) ∈ AR},
{(R, r4.2) ∈ AR, (Spo, r4.2) ∈ AI, (G, r4.2) ∈ AI},
{(R, d3) ∈ AI, (R, r4.2) ∈ AR},
{(R, r4.2) ∈ AR, (Spo, r4.2) ∈ AI},
{(G, d4) ∈ AI, (G, r4.2) ∈ AR},
{(G, d4) ∈ AR, (G, r4.2) ∈ AI}.</p>
      <p>The following reductions of sets of possible control-arcs are necessary: for all
standard networks PSi , we have 1(x3; d3) and 1(x7; d3) selected
simultaneously, which both are in WPC with (x0; 0), see WPC2 and WPC3. To resolve
WPC2, we have CA(WPC2) = f(PF R; d3) 2 AI ; (PR; d3) 2 AR; (G; d3) 2 ARg.</p>
      <p>However, (PF R; d3) 2 AI and (PR; d3) 2 AR do not only disable d3 at x0,
but also d3 at x7 (due to x0PF R = x7PF R = 1 and x0PR = x7PR = 0). Since
d3 is supposed to switch at x7, we obtain CASi (WPC2) = f(G; d3) 2 ARg
as reduced set of possible control-arcs to resolve WPC2 in all networks P(Si).
Similarly, (G; r4:2) 2 AI has to be excluded from CA(WPC8) and CA(WPC9)
in PS4 and PS8 as otherwise r4:2 would be disabled at x6 where it is supposed
to switch by 3(x6; d4) 2 S4; S8.</p>
      <p>For the feasible set S4, we obtain as matrix AS4 :</p>
      <p>WPC1
WPC2
WPC3
WPC7
WPC8
WPC9
WPC10
WPC11
(PFR,dX2) ∈ AI (PR,d3X) ∈ AR (G,d3X)∈ AR (R,r4.2) ∈ AR (R,d2) ∈ AI (R,d3) ∈ AI (Spo,r4.2) ∈ AI</p>
      <p>XX X</p>
      <p>X
X
X
X
X</p>
      <p>X
X</p>
      <p>X
X
The blocker b(AS4 ) contains four minimal covers of AS4 which correspond to the
di erent sets of control-arcs in the four extended Petri nets depicted in Fig. 3,
all arising from the standard network PS4 .</p>
      <p>For S1, the matrix AS1 contains the rst 3 rows and columns of AS4 , the
blocker b(AS1 ) contains two minimal covers of AS1 which correspond to the
control-arcs in the two extended Petri nets in Fig. 2 arising from PS1 .</p>
      <p>Note that b(AS ) is non-empty if and only if none of the sets CAS ( ; 0) is
empty. We can show that there is at least one catalytic conformal network for any
given X 0. All catalytic conformal extended Petri nets PS;P 0 = (P; TS ; AS;P 0 ; w)
based on PS can be made X 0-deterministic by taking all the priorities O for all
2 S, where O is de ned by O = nti &gt; t : t 2 TAS;P 0 (yi) n ti; 1 i mo :
By construction, there are no priority con icts in the extended network PS;P 0
between O and O 0 for any ; 0 2 S, thus we obtain the studied partial order
OS;P 0 =
[ O :
2S
R
d4</p>
      <p>PFR</p>
      <p>d1</p>
      <p>PR
This nally implies:
Theorem 1. Every extended network PS;P 0 = (P; TS ; AS;P 0 ; w) together with
the partial order OS;P 0 is an X 0-deterministic extended Petri net, and there are
no other minimal extended Petri nets with priorities tting the given data X 0.
d4</p>
      <p>PR</p>
      <p>d1</p>
      <p>PFR
d2
d3
PS1b</p>
      <p>G</p>
      <p>Spo
PFR
d2
d3</p>
      <p>PR
PS4b</p>
      <p>PR
PFR
d2
d3
PS4d
r4.2
R
r4.1
G
Spo
r4.2</p>
      <p>G</p>
      <p>Spo
r4.1</p>
      <p>FR d1</p>
      <p>R
PR</p>
      <p>PFR
d2 G
d3 Spo
Standard network PS4</p>
      <p>FR d1
r4.2 R r4.1
r4.2
d1 FR</p>
      <p>FR d1
r4.1</p>
      <p>FR d1</p>
      <p>Example 7. For the two extended Petri nets based on PS1 in Fig. 2, no priorities
are needed to obtain X 0-deterministic extended Petri nets (PS1a ; ;) and (PS1b ; ;).</p>
      <p>For the four extended Petri nets in Fig. 3 based on PS4 , the priority relation
O4 = f(r4:2 &gt; d2)g is required for PS4a and PS4b , whereas O4 = f(d2 &gt;
r4:2); (d3 &gt; r4:2)g is required for PS4c and PS4d , to obtain X 0-deterministic
extended Petri nets.</p>
      <p>In total, the complete solution set contains 66 minimal X 0-deterministic
extended Petri nets with priorities, see Table 1.
3.1</p>
      <p>Integrating prior biological knowledge</p>
    </sec>
    <sec id="sec-2">
      <title>Indecomposability of di erence vectors</title>
      <p>In the step Representing the observed responses, the set of potential update
vectors which might constitute the incidence matrices of the networks are
considered. Hereby, for each dj 2 D, the set Box(dj ) contains only sign-compatible
vectors due to monotonicity (which avoids homogeneous solutions in (1)
according to minimality) and takes P -invariants into account (which avoids infeasible
intermediate states according to prior biological knowledge). In some cases, one
could restrict Box(dj ) further, e.g., if
{ dj exactly corresponds to a well-known biochemical reaction (including the
correct stoichiometry) or to a well-known mechanism (that a certain trigger
is detected by a suitable receptor),
{ experiments have shown that subsets of the input components of dj do not
lead to the observed response,
{ dj is treated as black box-like reaction where only input and output matter,
but not the intermediate mechanism due to the chosen level of detail.
In such cases, we propose to exclude the corresponding response dj 2 D from
decomposition and, instead, just de ne Box(dj ) := fdj g in accordance with the
existing knowledge.</p>
      <p>Example 8. Since the light-dependent reactions of the photoreceptor are so much
faster than the subsequent processes that are considered in the reconstruction
process, the di erence vector describing the phytochrome photoconversion will
not be decomposed into di erent reaction vectors.</p>
      <p>Thus, for the di erence vectors d1, d4 and d5 only the canonical sequences
1(x1; d1), 1(x5; d4) and 1(x6; d4) remain in the priority con ict graph, and
S1 remains as only possible selection. Accordingly, the total number of solutions
reduces from 66 to the 2 presented in Fig. 2, see Table 1.
3.2</p>
      <p>Treating equal di erence vectors in the same way
In the step Detecting priority con icts between sequences, all observed responses
dj 2 D are treated independently from each other, so far. If, however, two
di erence vectors di; dj 2 D are equal, we clearly have Box(di) = Box(dj )
and, thus, (di) = (dj ). Here, it is natural to require that both di; dj are
decomposed in the same way (i.e., by the same 2 (di) = (dj )) and that the
involved reactions are applied in the same order (i.e., by the same permutation
of the elements in the sets R(di; ) = R(dj ; )) to obtain the same transitions
(with equal control-arcs and priorities) in both cases. Indeed, using the same
{</p>
      <p>2 (di) = (dj ) corresponds to the fact that the same subset of molecules
involved in a reaction will not interact according to di erent mechanisms,
{ permutation of the elements in R(di; ) = R(dj ; ) corresponds to the fact
that the order in which the reactions are applied re ects the relative rates of
the reactions in R(di; ) = R(dj ; ), so the same relation between reaction
rates shall lead to the same priorities within the resulting sequences.
We call two sequences ; (xi; di) and 0 ; (xj ; dj ) twin sequences if di = dj
and the same and has been used. To force that twin sequences are always
selected together, we propose to add strong priority con icts between all other
sequences stemming from a pair di; dj of equal di erence vectors while creating
the priority con ict graph, since no two sequences in strong priority con ict are
selected for the same network.</p>
      <p>Example 9. In our running example, we have d3 = d6 and d4 = d5. The latter
vectors can be decomposed in di erent ways, among the resulting sequences we
have 1(x5; d4), 1(x6; d5) and 3(x5; d4), 3(x6; d5) as pairs of twin sequences.
Forcing to select these pairs together rules out the four selections S2; S3; S6; S7
so that only S1, S4, S5, S8 remain as possible selections. Accordingly, the total
number of solutions reduces from 66 to 18, as reported in Table 1.
3.3</p>
    </sec>
    <sec id="sec-3">
      <title>Knowledge on relative reaction rates</title>
      <p>In the step Constructing X 0-deterministic Petri nets, to resolve a WPC( ; 0)
between ; 0 involving update vectors rt 6= rt0 and intermediate states y 6=
y0, either transition t has to be disabled at y0 or transition t0 at y, while the
decision between t and t0 on the other state can be handled by a priority. Here,
prior knowledge about the relative reaction rates of t and t0 (e.g. gained from
the time-scales during the experiments) could help to decide whether t &gt; t0 or
t &lt; t0 better re ects the reality, and than choose between control-arcs either
from CAt&gt;t0 ( ; 0) or from CAt0&gt;t( ; 0).</p>
      <p>So far, this idea is already applied for WPCs involving a terminal state:
if y0 is a terminal state and 0 = (y0; 0) its trivial sequence, then t &gt; 0
holds automatically at y, but t has to be disabled at y0 using control-arcs from
CAt&gt;0( ; 0) whereas CAt&lt;0( ; 0) is empty.</p>
      <p>This idea can be generalized to any WPC( ; 0) where the time-scale of the
corresponding experimental observations clearly di ers in order to deduce the
correct priority t &gt; t0 or t &lt; t0. In such cases, we propose to reduce CA( ; 0)
accordingly either to CAt&gt;t0 ( ; 0) or to CAt0&gt;t( ; 0).</p>
      <p>Example 10. In our running example, we have WPC1, WPC2, WPC3, WPC5,
WPC6, WPC9, WPC11 involving a terminal state; the according reductions of
the sets CA( ; 0) to CAt&gt;0( ; 0) are already applied in Exp. 6.</p>
      <p>Moreover, WPC4, WPC7, WPC8, WPC10 involve reactions with clearly
different time-scales during the experimental observations:
{ d1 and d4 = d5 need only milliseconds to occur,
{ d2 needs about 1 hour to occur, and
{ d3 = d6 need at least 10 hours.
Accordingly, we can reduce the sets CA( ; 0) as follows:
{ due to r1:2 &gt; d3, for WPC4 only (F R; r1:2) 2 AR and (G; r1:2) 2 AI remain;
{ due to r4:2 &gt; d2, for WPC7 only (R; r4:2) 2 AR remains;
{ due to r4:2 &gt; d3, for WPC8 only (R; r4:2) 2 AR and (G; r4:2) 2 AI remain,
while for WPC10 only (R; r4:2) 2 AR is left.</p>
      <p>At least one of these WPCs occurs in the standard networks coming from the
selected sets S2 S4; S6 S8. Note that in the two remaining WPCs the
timescale of the involved responses is equal (see Exp. 6). Consequently, the number
of extended Petri nets decreases from 66 to 36 as reported in Table 1.
4</p>
      <p>
        Discussion
The subject of this paper was an approach from [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] that aims at reconstructing
all X 0-deterministic extended Petri nets that t given experimental data X 0, to
provide all possible alternatives of mechanisms behind the experimentally
observed phenomena. This typically results in a large set of solution alternatives.
To keep this solution set reasonably small while still guaranteeing its
completeness, we rstly generate only Petri nets being minimal in the sense that all
other networks tting the data contain the reconstructed ones. In the presented
approach, the minimality concept is applied twice:
{ monotone data: using only sign-compatible vectors in Box(dj ) avoids
homogeneous solutions during the decomposition of (dj ) (and super ous
transitions in the networks), see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
{ minimal hitting sets : we here proposed to use only minimal sets of
controlarcs to resolve all weak priority con icts in a standard network which avoids
unnecessary control-arcs (and arti cial dependencies), see Section 2.
This ensures that the presented approach exactly generates all minimal extended
Petri nets with priorities (Theorem 1). We further avoid generating minimal
solutions which are \technically correct" but would be ruled out later during
a subsequent veri cation process to check whether the returned solutions are
\biological meaningful" or even contradict well-established biological knowledge
as in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. For that, we extent the considered input by integrating prior biological
knowledge beyond the information given with the experimental time-series data
into the reconstruction process. We propose to integrate prior knowledge in the
following way:
{ P-invariants : helps to obtain feasible intermediate states in all sequences
which avoids the generation of solutions contradicting known facts, see [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
{ indecomposable di erence vectors : help to keep already known subnetworks
or mechanisms, see Section 3.1.
{ treating equal di erence vectors in the same way : helps to keep consistency
in the interpretation of experimental observations, see Section 3.2.
{ obeying terminal states and reaction rates : helps to chose meaningful
priorities and to avoid arti cial control-arcs, see Section 3.3.
      </p>
      <p>
        So far, the algorithmic procedure due to [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] takes as input (P; IP ; X 0) where
the list of P -invariants and the monotonicity of X 0 are already used in the rst
step Decomposing di erence vectors to determine Box(dj ). To integrate further
knowledge in the reconstruction procedure to force the algorithm to make \the
right decisions" in some intermediate steps, we suggest, based on the previous
discussions, to extend the input to (P; IP ; X 0; Din; Deq; OD) where
{ Din contains all indecomposable di erence vectors (for that, carefully select
them according to the before mentioned critera, e.g., to preserve known
subnetworks or mechanisms or to take a certain level of detail into account);
{ Deq contains all pairs of equal di erence vectors that shall be treated in the
same way (for that, only chose equal di erence vectors where also the time
elapsed during the experimental observation was equal);
{ OD contains information about the reaction rates between di erence vectors
(for that, only impose priorities for su ciently di erent rates according to
clearly di erent time scales during the experiments).
      </p>
      <p>Example 11. The three examples from Section 3 can be interpreted as follows:
{ Exp. 8 shows the result taking (P; IP ; X 0; Din = fd1; d4; d5g; ;; ;) as input;
{ Exp. 9 shows the result with (P; IP ; X 0; ;; Deq = fd3 = d6; d4 = d5g; ;);
{ Exp. 10 the result with (P; IP ; X 0; ;; ;; OD = fd1; d4; d5 &gt; d2 &gt; d3; d6g).
Whereas the rst setting reduces the number of solution alternatives to 2, the
combination of the two latter scenarios reduces the number of solution
alternatives to 12, see Table 1 below.</p>
      <p>minimal
Din 6= ∅
Deq 6= ∅</p>
      <p>OD 6= ∅
Deq, OD 6= ∅</p>
      <p>To conclude, we notice that providing indecomposable di erence vectors has
the largest impact on the solution set. However, even if no indecomposable
difference vectors can be identi ed, treating equal di erence vectors in the same
way and deducing relative reaction rates from the time-scale of the experimental
observations leads to a substantial reduction of the solution set, keeping only
\biological meaningful" network alternatives.</p>
      <p>
        The further goal is to provide an implementation for the presented
reconstruction method, including the option of integrating prior knowledge as additional
input during the reconstruction. For that, we will use Answer Set Programming
as done for the reconstruction of standard networks in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Finally, we plan to
apply the presented reconstruction approach to di erent biological
experimental data. We expect an important impact of Automatic Network Reconstruction
on the integrated experimental and theoretical analysis of biological systems
towards their holistic understanding, since computational models derived from
experimental data by our exact, exclusively data-driven approach have
predictive ability due to completeness of the solution set guaranteed by mathematical
proofs.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>M.</given-names>
            <surname>Durzinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Marwan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ostrowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Schaub</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          .
          <article-title>Automatic network reconstruction using ASP</article-title>
          .
          <source>Th. and Pract</source>
          . of Logic Progr.,
          <volume>11</volume>
          :
          <fpage>749</fpage>
          {
          <fpage>66</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>M.</given-names>
            <surname>Durzinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Marwan</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          .
          <article-title>Reconstruction of extended Petri nets from time series data and its application to signal transduction and to gene regulatory networks</article-title>
          .
          <source>BMC Systems Biology, 5</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>M.</given-names>
            <surname>Durzinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Marwan</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          .
          <article-title>Reconstruction of extended Petri nets from time-series data by using logical control functions</article-title>
          .
          <source>Journal of Mathematical Biology</source>
          ,
          <volume>66</volume>
          :
          <fpage>203</fpage>
          {
          <fpage>223</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>M.</given-names>
            <surname>Durzinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Weismantel</surname>
          </string-name>
          .
          <article-title>A combinatorial approach to reconstruct Petri nets from experimental data</article-title>
          .
          <source>Lecture Notes in Comp. Sc. (special Issue CMSP</source>
          <year>2008</year>
          ),
          <volume>5307</volume>
          :
          <fpage>328</fpage>
          {
          <fpage>346</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>M.</given-names>
            <surname>Durzinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Weismantel</surname>
          </string-name>
          .
          <article-title>An algorithmic framework for network reconstruction</article-title>
          .
          <source>J.Theor. Computer Science</source>
          ,
          <volume>412</volume>
          (
          <issue>26</issue>
          ):
          <volume>2800</volume>
          {
          <fpage>2815</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>M.</given-names>
            <surname>Favre</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          .
          <article-title>Reconstructing X 0-deterministic extended Petri nets from experimental time-series data X 0 (extended abstract)</article-title>
          .
          <source>CEUR Workshop Proceedings (Special Issue BioPPN</source>
          <year>2013</year>
          ),
          <volume>988</volume>
          :
          <fpage>45</fpage>
          {
          <fpage>59</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>I.</given-names>
            <surname>Koch</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Heiner</surname>
          </string-name>
          .
          <article-title>Petri nets</article-title>
          . In B. H.
          <string-name>
            <surname>Junker</surname>
          </string-name>
          , F. Schreiber, editor,
          <source>Biological Network Analysis</source>
          ,
          <source>Wiley Book Series on Bioinformatics</source>
          , pages
          <fpage>139</fpage>
          {
          <fpage>179</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>T.</given-names>
            <surname>Lamparter</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Marwan</surname>
          </string-name>
          .
          <article-title>Spectroscopic detection of a phytochrome-like photoreceptor in the myxomycete physarum polycephalum and the kinetic mechanism for the photocontrol of sporulation</article-title>
          .
          <source>Photochem Photobiol</source>
          ,
          <volume>73</volume>
          :
          <fpage>697</fpage>
          {
          <fpage>702</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>W.</given-names>
            <surname>Marwan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Weismantel</surname>
          </string-name>
          .
          <article-title>A mathematical approach to solve the network reconstruction problem</article-title>
          .
          <source>Math. Methods of Operations Research</source>
          ,
          <volume>67</volume>
          (
          <issue>1</issue>
          ):
          <volume>117</volume>
          {
          <fpage>132</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Pinney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Westhead</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. A.</given-names>
            <surname>McConkey</surname>
          </string-name>
          .
          <article-title>Petri net representations in systems biology</article-title>
          .
          <source>Biochem. Soc. Tarns.</source>
          ,
          <volume>31</volume>
          :
          <fpage>1513</fpage>
          {
          <fpage>1515</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>C.</given-names>
            <surname>Starostzik</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Marwan</surname>
          </string-name>
          .
          <article-title>Functional mapping of the branched signal transduction pathway that controls sporulation in Physarum polycephalum</article-title>
          . Photochem. Photobiol.,
          <volume>62</volume>
          :
          <fpage>930</fpage>
          {
          <fpage>933</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Torres</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Wagler</surname>
          </string-name>
          .
          <article-title>Encoding the dynamics of deterministic systems</article-title>
          .
          <source>Math. Methods of Operations Research</source>
          ,
          <volume>73</volume>
          :
          <fpage>281</fpage>
          {
          <fpage>300</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>A. K. Wagler</surname>
          </string-name>
          .
          <article-title>Prediction of network structure</article-title>
          . In I. Koch,
          <string-name>
            <given-names>F.</given-names>
            <surname>Schreiber</surname>
          </string-name>
          , and W. Reisig, editors,
          <source>Modeling in Systems Biology</source>
          , volume
          <volume>16</volume>
          of Computational Biology, pages
          <volume>309</volume>
          {
          <fpage>338</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>A. K. Wagler</surname>
            and
            <given-names>J.-T.</given-names>
          </string-name>
          <string-name>
            <surname>Wegener</surname>
          </string-name>
          .
          <article-title>On minimality and equivalence of Petri nets (extended abstract)</article-title>
          .
          <source>Fundamenta Informaticae</source>
          ,
          <volume>128</volume>
          :
          <fpage>209</fpage>
          {
          <fpage>222</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>A. K. Wagler</surname>
            and
            <given-names>J.-T.</given-names>
          </string-name>
          <string-name>
            <surname>Wegener</surname>
          </string-name>
          .
          <article-title>Preprocessing for network reconstruction: Feasibility test and handling infeasibilty (extended abstract)</article-title>
          .
          <source>CEUR Workshop</source>
          Proceedings (Special
          <string-name>
            <surname>Issue</surname>
            <given-names>CS</given-names>
          </string-name>
          &amp;P
          <year>2013</year>
          ), (
          <volume>1032</volume>
          ):
          <volume>434</volume>
          {
          <fpage>47</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>