<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Probabilistic Communication Structured Acyclic Nets</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Nadiyah</forename><surname>Almutairi</surname></persName>
							<email>n.m.r.almutairi2@newcastle.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computing</orgName>
								<orgName type="institution">Newcastle University Science Square</orgName>
								<address>
									<addrLine>Newcastle Helix</addrLine>
									<postCode>NE4 5TG</postCode>
									<settlement>Newcastle upon Tyne</settlement>
									<country key="GB">U.K</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Probabilistic Communication Structured Acyclic Nets</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">AD93A924C36E5190B1AFAD775D979B7B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T15:28+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Petri net</term>
					<term>acyclic net</term>
					<term>communication structured acyclic net</term>
					<term>conflict</term>
					<term>confusion</term>
					<term>cluster-acyclic net</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A fundamental concept used in the area of concurrent systems modelling is conflict. In this paper, we outline two approaches leading to a conflict-concurrent model where distributed choices are resolved in a way which allows one to carry out probabilistic estimation. In particular, the concept of cluster-acyclic net is introduced to transform a net with confusion (a specific combination of conflict and concurrency which makes the probabilistic estimation problematic), into another net whose structure is free-choice which facilitates probabilistic estimation. Then the approaches of removing confusion is extended into Communication Structured Acyclic nets (csa-nets) which is so far lacked of probabilistic analysis. csanets are sets of acyclic nets which can communicate by means of synchronous and asynchronous interactions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Communication Structured Acyclic Nets (csa-nets) are derived from Structured Occurrence Nets (SONs), which was first introduced in <ref type="bibr" target="#b0">[1]</ref> and elaborated in <ref type="bibr" target="#b1">[2]</ref>. csa-nets consist of multiple acyclic nets that are joined together with the objective of recording information about the behaviour of Complex Evolving Systems (CESs). <ref type="bibr" target="#b2">[3]</ref> lists the features of a CES as being composed of wide array of (sub)systems that interact with each other and with its surrounding environment, resulting in a highly complex structure. The structure of csa-nets is suitable to represent the activities of such systems where the cognitive complexity can be reduced. For instance, <ref type="bibr" target="#b1">[2]</ref> introduce the basic formalization of SON to represent complex fault-error-failure chains. Also, <ref type="bibr" target="#b2">[3]</ref> shows that SON can be used to visualise and analyse behaviour of CESs and <ref type="bibr" target="#b3">[4]</ref> demonstrates its capabilities for modelling cybercrime investigation. Previous work on SONs is related to a framework for provenance <ref type="bibr" target="#b4">[5]</ref>, timed behaviours <ref type="bibr" target="#b5">[6]</ref>, and for csa-net a SAT-based model checking proposed in <ref type="bibr" target="#b6">[7]</ref>.</p><p>One of the potential applications of csa-nets is complex crime investigation systems. In crime investigation, full information about a specific activity is, in general, not available <ref type="bibr" target="#b7">[8]</ref>. Hence (often numerous) alternate scenarios are pursued by investigators in order to clarify the status of a crime or accident. That is because such a system is characterized as being inherent nondeterminism which originates from the lack of the ability to observe the system. To cope with this feature, investigators need to consider all the possible scenarios. However, considering all possible scenarios might result in meaningless conclusion. Thus, reasoning about what is probable along with what is possible is an essential to obtain meaningful conclusion <ref type="bibr" target="#b8">[9]</ref>. Therefore, providing effective probabilistic estimation of different scenarios would greatly help crime investigators to find answers to crucial questions concerning the incident.</p><p>There are several works combining probabilistic reasoning and Petri nets. For example, in <ref type="bibr" target="#b9">[10]</ref> nets were covered by so-called agents and the non-deterministic and probabilistic decisions were resolved on the basis of local information. The choice of the set of agents that were responsible for the resolution of the choices was done independently. In <ref type="bibr" target="#b10">[11]</ref>, probabilistic models have been explored for a specific variant of Petri nets. In <ref type="bibr" target="#b11">[12]</ref>, generalized Markov chains were developed as an extension of Petri nets.The paper <ref type="bibr" target="#b12">[13]</ref> extended Mazurkiewicz equivalence to probabilistic words, which were defined as probability distribution, to describe the probabilistic net systems.</p><p>Providing a probabilistic framework for concurrent models relies on the presence of conflict transitions which can be associated with positive numerical weights, so that the conflict is resolved by taking their weights into consideration. This seems trivial when the structure of nets is restricted to free-choice. However, if it is not the case, then the probabilistic analysis for concurrent models requires to take a special case in consideration. A confusion arises when conflict and concurrency are overlapped which causes problematic probabilistic estimation. A considerable amount of literature has been published on handling confusion. For example, in <ref type="bibr" target="#b13">[14]</ref>, a confusion-free net was constructed by a recursive static decomposition of given net. Probabilities were then added to the new non-deterministic net in order to account for the conflict between transitions. Also, confusion was controlled in <ref type="bibr" target="#b14">[15]</ref> by attaching an external event with each transition involved in confusion. Then a control sequence is chosen so that the execution of these transitions is controlled. <ref type="bibr" target="#b15">[16]</ref> provides algorithms to detect confusion and an approach of avoiding it by enforcing a constraint of supervisory control to ensure that conflict transitions are enabled together so that confusion cannot occur in marking evolution. Time is introduced in <ref type="bibr" target="#b16">[17]</ref> to distinguish the proprieties of weighted transitions to resolve the confusion.</p><p>A general comment which applies to the above past research is that they are all concerned with standard Petri nets. The key contribution of this paper is to find solutions for nets supporting different kinds of interprocess communication. In this paper we extend the probabilistic analysis into csa-nets which is so far lacked of such an extension. The confusion phenomena is also extended and an approach of removing it based on the technique proposed by <ref type="bibr" target="#b13">[14]</ref> is introduced.</p><p>The paper is organised as follow. Section 2 presents acyclic nets and their properties. Clusteracyclic nets are introduced in Section 3 and it is shown how to remove confusion in such a case. Section 4 presents csa-nets and their properties. The definition of confusion is extended to csa-nets and the approach of removing it is discussed in Section 5. We conclude in Section 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Acyclic Petri nets</head><p>Acyclic Petri nets are a well-established and basic model for representing system behaviour. They can be used to model synchronisation and conflict, two fundamental concepts used in the area of concurrent systems. In this section we first introduce acyclic nets and their properties. Probabilistic acyclic nets are introduced after that. In addition, the notion of confusion is discussed. We propose algorithms used for removing it in Section 3. An occurrence net <ref type="bibr" target="#b1">[2]</ref> is an acyclic net such that | • 𝑝| ≤ 1 and |𝑝 • |≤ 1, for every place 𝑝. An occurrence net describes a single execution of some concurrent system in such a way that only the details of causality and concurrency between transitions are captured.</p><formula xml:id="formula_0">𝑝 0 𝑎 𝑝 1 𝑝 2 𝑔 𝑝 5 𝑒 𝑓 𝑝 3 ℎ 𝑝 4 (𝑎) 𝑝 0 𝑎 𝑝 1 𝑝 2 𝑔 𝑝 5 𝑒 𝑝 3 ℎ 𝑝 4 (𝑏)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Basic definitions.</head><p>A scenario of acnet is an occurrence net ocnet such that:</p><p>• 𝑇 ocnet ⊆ 𝑇 acnet and 𝑃 ocnet = 𝑃 𝑖𝑛𝑖𝑡 acnet ∪ post acnet (𝑇 ocnet ), and • pre ocnet (𝑡) = pre acnet (𝑡) and post ocnet (𝑡) = post acnet (𝑡), for every 𝑡 ∈ 𝑇 ocnet .</p><p>It is maximal if there is no scenario ocnet ′ satisfying 𝑇 ocnet ⊂ 𝑇 ocnet ′ . This is denoted by ocnet ∈ scenarios(acnet) and ocnet ∈ maxscenarios(acnet), respectively. Each scenario is identified by its transitions 𝑉 ⊆ 𝑇 and is given by scenario acnet (𝑉 ) = (𝑃, 𝑉, 𝐹 acnet | (𝑃 ×𝑉 )∪(𝑉 ×𝑃 ) ), where 𝑃 = 𝑃 init acnet ∪ 𝑉 • . Figure <ref type="figure" target="#fig_0">1</ref>(b) shows a maximal scenario. Given an acyclic net, its execution proceeds by the occurrence (or firing) of sets of transitions. Let acnet = (𝑃, 𝑇, 𝐹 ) be an acyclic net.</p><p>• markings(acnet) = {𝑀 | 𝑀 ⊆ 𝑃 } are the markings (shown by placing tokens within the circles), and We can treat individual transitions as singleton steps; e.g., a step sequence {𝑡}{𝑢}{𝑤, 𝑣}{𝑧} can be denoted by 𝑡𝑢{𝑤, 𝑣}𝑧.</p><formula xml:id="formula_1">𝑀 init acnet = 𝑃 init acnet is the default initial marking. • steps(acnet) = {𝑈 ⊆ 𝑇 | 𝑈 ̸ = ∅ ∧ ∀𝑡 ̸ = 𝑢 ∈ 𝑈 : • 𝑡 ∩ • 𝑢 = ∅} are the steps. • enabled acnet (𝑀 ) = {𝑈 ∈ steps(acnet) | • 𝑈 ⊆ 𝑀 }</formula><p>Well-formedness. An acyclic net acnet is well-formed if each transition occurs in at least one step sequence and the following hold, for every step sequence 𝑈 1 . . . 𝑈 𝑘 ∈ sseq(acnet):</p><formula xml:id="formula_2">(i) 𝑡 • ∩ 𝑢 • = ∅, for every 1 ≤ 𝑖 ≤ 𝑘 and all 𝑡 ̸ = 𝑢 ∈ 𝑈 𝑖 ; and (ii) 𝑈 • 𝑖 ∩ 𝑈 • 𝑗 = ∅, for all 1 ≤ 𝑖 &lt; 𝑗 ≤ 𝑘.</formula><p>Intuitively, a well-formed acyclic net does not have 'useless' transitions and no place is filled more than once in any given step sequence. Hence, all its behaviours can be interpreted in terms of causal histories as it is guaranteed that each transition is caused by a unique set of transitions. Each occurrence net is well-formed, and an acyclic net is well-formed iff each transition occurs in at least one scenario, and each step sequence is a step sequence of at least one scenario. Each step sequence 𝜎 of a well-formed acyclic net acnet induces a scenario scenario acnet (𝜎) = scenario acnet (𝑉 ), where 𝑉 are the transitions occurring in 𝜎. Thus, different step sequences may generate the same scenario, and conversely, each scenario is generated by at least one step sequence. Moreover, two maximal step sequences generate the same scenario iff their executed transitions are identical.</p><p>Conflict, causality and concurrency. Let acnet = (𝑃, 𝑇, 𝐹 ) be an acyclic net.</p><formula xml:id="formula_3">• 𝑡 ̸ = 𝑢 ∈ 𝑇 are in direct (forward) conflict, denoted 𝑡# 0 𝑢, if • 𝑡 ∩ • 𝑢 ̸ = ∅.</formula><p>• conflset acnet (𝑀, 𝑡) = {𝑡} ∪ {𝑢 ∈ enabled acnet (𝑀 ) | 𝑡# 0 𝑢} is the conflict set of 𝑡 ∈ 𝑇 enabled at a marking 𝑀 .</p><p>• caused acnet (𝑥) = {𝑦 ∈ 𝑃 ∪ 𝑇 | 𝑥𝐹 + 𝑦} are the nodes caused by 𝑥 ∈ 𝑃 ∪ 𝑇 .</p><formula xml:id="formula_4">• subnet acnet (𝑉 ) = ( • 𝑉 ∪ 𝑉 • , 𝑉, 𝐹 | ( • 𝑉 ×𝑉 )∪(𝑉 ×𝑉 • ) ), for every 𝑉 ⊆ 𝑇 .</formula><p>Calculating probabilities in acyclic nets. In order to find probabilities of alternate scenarios, conflicting transitions are assigned positive numerical weights, representing the likelihood of transitions. From now on, each acyclic net has an additional (last) component 𝜔 defined as a mapping from the set of transitions to positive integers. For each transition 𝑡, 𝜔(𝑡) is its weight which in diagrams annotates the corresponding node. Also, we assume that the weights are assigned to the transitions rather than the arcs and are represented inside the boxes. In such cases the names of transitions are represented outside. Probabilities of concurrent transitions are given by the products of their weights over the sum of the weights of transitions in their conflict sets. More precisely, we define the probability of executing a transition 𝑡 and step 𝑈 enabled at a reachable marking 𝑀 as:</p><formula xml:id="formula_5">𝑐 0 1 ℎ 𝑐 2 𝑐 1 1 𝑔 6 𝑒 3 𝑓 (𝑎) 𝑝 0 𝑑 1 𝑝 1 𝑝 2 𝑎 7 𝑏 3 𝑐 3 (𝑏) 𝑝 1 6 𝑏 4 𝑑 𝑝 4 𝑝 3 𝑝 2 7 𝑐 3 𝑎 (𝑐)</formula><formula xml:id="formula_6">P acnet (𝑀, 𝑡) = 𝜔(𝑡) ∑︀ 𝑢∈conflsetacnet(𝑀,𝑡) 𝜔(𝑢)</formula><p>and P acnet (𝑀, 𝑈 ) = ∏︁ 𝑡∈𝑈 P acnet (𝑀, 𝑡) .</p><formula xml:id="formula_7">Then, assuming 𝑀 0 [𝑈 1 ⟩ acnet 𝑀 1 . . . 𝑀 𝑘−1 [𝑈 𝑘 ⟩ acnet 𝑀 𝑘 , we define the probability of execution 𝜎 = 𝑈 1 . . . 𝑈 𝑘 as P acnet (𝜎) = P acnet (𝑀 0 , 𝑈 1 ) • . . . • P acnet (𝑀 𝑘−1 , 𝑈 𝑘 ).</formula><p>Consider the acyclic net acnet in Figure <ref type="figure" target="#fig_1">2</ref>(a), where 𝑒 and 𝑓 are in direct conflict and have weights 6 and 3, respectively. Such a conflict can be resolved probabilistically at reachable markings 𝑀 = {𝑐 1 , 𝑐 2 } and 𝑀 ′ = {𝑐 1 } by the following calculation: P acnet (𝑀, 𝑒) = P acnet (𝑀 ′ , 𝑒) = 𝜔(𝑒)/(𝜔(𝑒) + 𝜔(𝑓 )) = 6/9. Note that ℎ and 𝑔 are certain transitions since no transition competes with them for a token, and so their weights are irrelevant.</p><p>There are two possible scenarios for this acyclic net: ocnet 1 = scenario({ℎ, 𝑔, 𝑒}) and ocnet 2 = scenario({ℎ, 𝑔, 𝑓 }). Each can be executed by following different maximal step sequences:</p><p>• ocnet 1 has three executions: 𝜎 1 = ℎ𝑒𝑔, 𝜎 2 = ℎ𝑔𝑒, and 𝜎 3 = ℎ{𝑒, 𝑔}. Their probabilities are the same as we have:</p><formula xml:id="formula_8">P acnet (𝜎 1 ) = 1 • (6/9) • 1 = 6/9, P acnet (𝜎 2 ) = 1 • 1 • (6/9) = 6/9 and P acnet (𝜎 3 ) = 1 • ((6/9) • 1) = 6/9.</formula><p>• ocnet 2 has also three executions with probabilities equal to 3/9.</p><p>As a result, we can assign probabilities to the two scenarios: P acnet (ocnet 1 ) = 6/9 and P acnet (ocnet 2 ) = 3/9. Note that P acnet (ocnet 1 ) + P acnet (ocnet 2 ) = 1. A key issue is to ensure in each case that no matter which of the executions of a scenario is followed in the calculation of probabilities, the same value is obtained (in other words, all maximal step sequences generated from a scenario should have the same probability). One can then define the probability of a scenario as P acnet (ocnet) = P acnet (𝜎), where 𝜎 is any execution of ocnet. Also, in a sound probability model, the sum of the probabilities of all possible scenarios should be 1. However, the above is not always the case as acyclic nets can exhibit confusion described next.</p><p>Confusion. An interplay between conflict and concurrency can lead to a situation called confusion which interferes with the calculation of probabilities. In a symmetric confusion, executing transition 𝑓 concurrent with 𝑒 removes at least one transition from the conflict set of 𝑒.</p><p>In an asymmetric confusion, executing transition 𝑓 concurrent with 𝑒 adds a new transition to the conflict set of 𝑒 <ref type="bibr" target="#b17">[18]</ref>. Hence, the order in which one chooses to execute 𝑒 and 𝑓 may lead to different probabilities.</p><p>A well-formed acyclic net acnet has a confusion <ref type="bibr" target="#b13">[14]</ref> at a reachable marking 𝑀 if there are distinct transitions 𝑒, 𝑓, ℎ such that {𝑒, 𝑓 } ∈ enabled acnet (𝑀 ) and one of the following holds:</p><p>• 𝑒# 0 ℎ# 0 𝑓 and ℎ ∈ enabled acnet (𝑀 ).</p><formula xml:id="formula_9">• 𝑒# 0 ℎ and ℎ ∈ enabled acnet (𝑀 ′ ) ∖ enabled acnet (𝑀 ), where 𝑀 [𝑓 ⟩ acnet 𝑀 ′ .</formula><p>We then denote symconfused acnet (𝑀, 𝑒, 𝑓, ℎ) in the first (symmetric) case, and in the second (asymmetric) case we denote asymconfused acnet (𝑀, 𝑒, 𝑓, ℎ) . Proposition 1. Let acnet be a well-formed acyclic net and 𝑀 be its reachable marking. If it is the case that symconfused acnet (𝑀, 𝑒, 𝑓, ℎ) or asymconfused acnet (𝑀, 𝑒, 𝑓, ℎ) holds, then we have </p><formula xml:id="formula_10">conflset acnet (𝑀, 𝑒) ̸ = conflset acnet (𝑀 ′ , 𝑒) and 𝑒 ∈ enabled acnet (𝑀 ′ ), where 𝑀 [𝑓 ⟩ acnet 𝑀 ′ .</formula><formula xml:id="formula_11">𝜎 3 = 𝑑{𝑎, 𝑐}). The probability of 𝜎 1 is P acnet (𝜎 1 ) = 1 • 7/10 • 1 = 7/10</formula><p>. However, if 𝜎 2 is executed, then the resulting probability is P acnet (𝜎 2 ) = 3/6 ̸ = P acnet (𝜎 1 ). Hence one cannot assign a probability to ocnet 1 . A similar conclusion can be reached for the acyclic net in Figure <ref type="figure" target="#fig_1">2</ref>(c) which exhibits asymmetric confusion asymconfused acnet (𝑀 init acnet , 𝑎, 𝑏, 𝑐). A crucial property is that in a confusion-free acyclic net, conflict sets of transitions are constant for all the executions of each scenario.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 2. Let acnet be a confusion-free well-formed acyclic net.</head><p>1. If 𝑀 and 𝑀 ′ are two reachable markings of acnet such that 𝑀 [⟩ acnet 𝑀 ′ , then we have conflset acnet (𝑀, 𝑡) = conflset acnet (𝑀 ′ , 𝑡), for every 𝑡 ∈ enabled acnet (𝑀 ) ∩ enabled acnet (𝑀 ′ ).</p><p>2. If 𝑀 and 𝑀 ′ are two reachable markings of ocnet ∈ scenarios(acnet), then it is the case that conflset acnet (𝑀, 𝑡) = conflset acnet (𝑀 ′ , 𝑡), for every 𝑡 ∈ enabled ocnet (𝑀 ) ∩ enabled ocnet (𝑀 ′ ).</p><p>Hence, for confusion-free acyclic nets one can calculate probabilities of individual scenarios. Note that there are classes of nets which exclude confusion by imposing structural restrictions, e.g., free-choice nets <ref type="bibr" target="#b18">[19]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Cluster-acyclic nets</head><p>The approach of removing confusion is based on identifying the choice points by applying the concept of clusters.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>168-187</head><p>A cluster of a well-formed acyclic net acnet = (𝑃, 𝑇, 𝐹 ) is a non-empty set 𝜅 ⊆ 𝑇 such that</p><formula xml:id="formula_12">𝜅 × 𝜅 ⊆ (# 0 ) * and if • 𝑡 ⊆ • 𝜅, then 𝑡 ∈ 𝜅. It is maximal if there is no cluster 𝜅 ′ such that 𝜅 ′ ⊂ 𝜅. Moreover, ⊏ is a relation on the maximal clusters such that 𝜅 ⊏ 𝜅 ′ if caused(𝜅) ∩ • 𝜅 ′ ̸ = ∅.</formula><p>The set of all clusters is denoted by clusters(acnet), and the set of all maximal clusters is denoted by maxclusters(acnet).</p><p>A maximal cluster is an equivalence class of the relation (# 0 ) * , and so the set of maximal clusters partitions the set of all transitions. Below we will consider a subclass of acyclic nets where the ordering ⊏ is a strict partial order on the set maximal of clusters.</p><p>A well-formed backward deterministic acyclic net is cluster-acyclic if the relation ⊏ on its maximal clusters is a strict partial order. Note that cluster-acyclic nets include all free-choice well-formed backward deterministic acyclic nets as well as all extended free-choice acyclic nets.</p><p>A transaction of a maximal cluster 𝜅 of a well-formed backward deterministic cluster-acyclic net with a marking 𝑀 ⊆ • 𝜅 is a step 𝜃 included in 𝜅 such that • 𝜃 ⊆ 𝑀 . Moreover, it is maximal if there is no transaction 𝜃 ′ such that 𝜃 ⊂ 𝜃 ′ , and we denote 𝜃 ∈ maxtrans(𝜅, 𝑀 ). Intuitively, a transaction is one of possible ways of executing the subnet induced by the cluster. From now on we assume that every cluster-acyclic net is well-formed and backward deterministic. Also, a cluster 𝑉 = {𝑡 1 , . . . , 𝑡 𝑘 } can be denoted as 𝜃 𝑡 1 ...𝑡 𝑘 . Proposition 3. Let 𝜅 be a cluster of a cluster-acyclic net acnet.</p><formula xml:id="formula_13">1. (𝜅 × 𝜅) ∩ 𝐹 + = ∅.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">caused(𝜅) =</head><p>⋃︀ caused(trans(𝜅, • 𝜅)).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">maxtrans(𝜅,</head><p>• 𝜅) ⊆ maxsseq(subnet acnet (𝜅)).</p><p>4. scenario subnetacnet(𝜅) (maxtrans(𝜅, • 𝜅)) = maxscenarios(subnet acnet (𝜅)).</p><p>Since the transaction of a cluster are maximal step sequences generating all maximal scenarios of the subnet induced by the cluster, one can say that the behaviour of the cluster is described by its transactions.</p><p>Consider again the confused acyclic net in Figure <ref type="figure" target="#fig_1">2</ref>(c). Figure <ref type="figure" target="#fig_3">3</ref> shows its two maximal clusters, 𝜅 1 = {𝑏, 𝑑} and 𝜅 2 = {𝑎, 𝑐}, together with their presets. We have 𝜅 1 ⊏ 𝜅 2 and 𝜅 2 ̸ ⊏ 𝜅 1 , and so the net is cluster-acyclic. Moreover, we have: maxtrans(𝜅 1 , {𝑝 1 }) = {{𝑏}, {𝑑}}, maxtrans(𝜅 2 , {𝑝 2 , 𝑝 3 }) = {{𝑎}, {𝑐}}, and maxtrans(𝜅 2 , {𝑝 2 }) = {{𝑎}}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Removing confusion from cluster-acyclic net (Approach A)</head><p>In this section, acnet = (𝑃, 𝑇, 𝐹 ) is a fixed cluster-acyclic net.</p><p>The encoding of a cluster-acyclic net acnet into an confusion-free acyclic net is based on negative places. For a place 𝑝 ∈ 𝑃 , its negative image is denoted by 𝑝. Moreover, the original transitions are replaced by transitions representing transactions associated with clusters. We will proceed as follows:</p><p>• All places of acnet together with their markings are retained. In addition, for each place 𝑝 ∈ 𝑃 , an empty place 𝑝 is created.</p><p>168-187 • All transitions of acnet are removed. Instead, for each cluster 𝜅 with marking 𝑀 ⊆ • 𝜅 and all its transactions 𝜃 in maxtrans(𝜅, 𝑀 ) a new transition is created. Its preset are the places in the preset of 𝜅 and the negative versions of all places in ( • 𝜅 ∖ 𝑀 ). Its postset are all the places in the postset of 𝜃 and the negative versions of places caused by 𝜅 which are not caused by 𝜃 (when such a place 𝑝 is marked, one can be sure that the original place 𝑝 will never be marked).</p><formula xml:id="formula_14">𝑝 1 𝑏 𝑑 𝑝 4 𝑝 3 𝑝 2 𝑐 𝑎 𝜅 1 𝜅 2 (𝑎) 𝑝 1 𝑡 𝑏 𝑡 𝑑 𝑝 4 𝑝 3 𝑝 3 𝑝 2 𝑡 𝑐 𝑡 𝑎 𝑡 ′ 𝑎 (𝑏)</formula><p>• Negative places which have no influence on the behaviour are removed.</p><p>The following definition provides full details of the encoding.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1 (encoding cluster-acyclic net).</head><p>The confusion-free encoding of a cluster-acyclic net acnet = (𝑃, 𝑇, 𝐹 ) is an acyclic net confree(acnet) = (𝑃 ′ , 𝑇 ′ , 𝐹 ′ ) constructed in three steps. First, we generate:</p><formula xml:id="formula_15">• 𝑃 ′ = 𝑃 ∪ 𝑃 . • 𝑇 ′ = {𝑡 𝜅,𝜃,𝑀 | 𝜅 ∈ maxclusters(acnet) ∧ 𝑀 ⊆ • 𝜅 ∧ 𝜃 ∈ maxtrans(𝜅, 𝑀 )} • • 𝑡 = 𝑀 ∪ ( • 𝜅 ∖ 𝑀 ) and 𝑡 • = 𝜃 • ∪ caused(𝜅 ∖ 𝜃) ∩ 𝑃 , for every 𝑡 = 𝑡 𝜅,𝜃,𝑀 ∈ 𝑇 ′ .</formula><p>After that we delete all places 𝑝 ∈ 𝑃 such that</p><formula xml:id="formula_16">• 𝑝 = ∅ or 𝑝 • = ∅. ◇</formula><p>Crucially, for every reachable marking 𝑀 , if 𝑝 ∈ 𝑀 , then 𝑝 / ∈ 𝑀 . Note that confree(acnet) contains no negative images of initial nor final places of acnet. Moreover, if acnet is free-choice, then confree(acnet) is isomorphic to acnet.</p><p>Figure <ref type="figure" target="#fig_3">3</ref>(b) shows the result of our encoding for the confused cluster-acyclic net in Figure <ref type="figure" target="#fig_2">2(c</ref>). Despite the fact that there are two transitions based on cluster 𝜅 2 and transaction 𝜃 = {𝑎}, their presets are different, as one of them is associated with marking {𝑝 2 } and the other with {𝑝 2 , 𝑝 3 }. Note that the two copies of the original transition 𝑎, 𝑡 𝑎 and 𝑡 ′ 𝑎 , never occur in the same step sequence, as 𝑝 3 and 𝑝 3 cannot receive tokens in the same execution.</p><p>The behaviour of the constructed confusion-free acyclic net is closely linked to the original one. At first, both 𝑡 𝑏 and 𝑡 𝑑 are enabled. If 𝑡 𝑏 is executed, 𝑡 𝑎 and 𝑡 𝑐 become enabled. Executing 𝑡 𝑑 , on the other hand, produces tokens in places 𝑝 6 and 𝑝 3 , which enables 𝑡 ′ 𝑎 . The only behaviour in the original net that is not preserved is the possibility of executing 𝑎 before 𝑑 as this execution leads to ambiguous analysis of system behaviour as 𝑎 is executed before 𝑐 is enabled. Thus, even though 𝑎 is initially enabled, its firing is delayed until the decision between 𝑏 and 𝑑 is taken. Therefore, the construction steps include delay and additional causality for some transitions similarly as in <ref type="bibr" target="#b13">[14]</ref>. Figure <ref type="figure" target="#fig_4">4</ref> shows another example of our translation for a confused cluster-acyclic net. In this case, there are three maximal clusters (𝜅 1 = {𝑎, 𝑏}, 𝜅 2 = {𝑐, 𝑑}, and 𝜅 3 = {𝑥, 𝑦, 𝑧}). The acyclic nets constructed above are confusion-free.</p><formula xml:id="formula_17">𝑝 1 𝑏 𝑎 𝑝 6 𝑝 4 𝑝 2 𝑐 𝑑 𝑝 5 𝑝 7 𝑝 3 𝑧 𝑥 𝑦 𝜅 3 𝜅 1 𝜅 2 (𝑎) 𝑝 1 𝑡 𝑏 𝑡 𝑎 𝑝 6 𝑝 4 𝑝 2 𝑡 𝑐 𝑡 𝑑 𝑝 5 𝑝 3 𝑝 7 𝑝 5 𝑝 4 𝑡 𝑦 𝑡 𝑥𝑧 𝑡 ′ 𝑧 𝑡 ′′ 𝑧 𝑡 ′ 𝑥𝑧 (𝑏)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 4. confree(acnet) is a confusion-free acyclic net, for every cluster-acyclic net acnet.</head><p>The proposition below shows that the behaviour of the constructed confusion-free net is closely linked to the original cluster-acyclic net. To show the this, for every set of transitions 𝑈 of confree(acnet), we denote 𝑇 𝑈 = ⋃︀ {𝜃 | 𝑡 𝜅,𝜃,𝛽 ∈ 𝑈 }.</p><p>Proposition 5. Let acnet be a cluster-acyclic net. Compared to the encoding in <ref type="bibr" target="#b13">[14]</ref>, we feel that the encoding in this paper is simpler because of the following:</p><p>• The contact-free net resulting from the encoding uses the same net model as all acyclic nets (i.e., persistent places and extended markings are not needed).</p><p>• The number of negative places is smaller than in <ref type="bibr" target="#b13">[14]</ref>.</p><p>• There is no need to use dynamic nets as an intermediate step of the construction.</p><p>• We expect that our encoding will be much easier to comprehend and use by practitioners with relatively limited formal methods skills.</p><p>Additionally, one of the limitations of <ref type="bibr" target="#b13">[14]</ref> is that only the case of backward deterministic nets has been addressed. In our work not reported here, we extended the encoding to the unfolding semantics, where more general cases can be considered. We do not expect the fact that our encoding works for a subclass of cluster-acyclic nets to be limiting in practical applications. This is based on the examples modelling investigations we evaluated, and also on the fact that in case of non-compliance it is always possible to require an investigator to provide additional information to 'repair' the net, or using other source of information, e.g., timing information associated with places and transitions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Removing confusion from cluster-acyclic net (Approach B)</head><p>In this section the acyclic net acnet is restricted to the class of binary synchronisation acyclic nets such that, for every transition 𝑡 ∈ 𝑇 , | • 𝑡| ⩽ 2.</p><p>Let acnet = (𝑃, 𝑇, 𝐹 ) be a well-formed backward deterministic cluster-acyclic net and 𝜅 ∈ clusters(acnet). A border of 𝜅 is a minimal set of non-initial places 𝛽 ⊆ • 𝜅 such that</p><formula xml:id="formula_18">( • 𝜅) • ∖ 𝜅 ⊆ 𝛽 • . A transaction 𝜅 is a maximal step 𝜃 included in 𝜅.</formula><p>The sets of all borders and transactions of 𝜅 are denoted by borders(𝜅) and trans(𝜅), respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 2 (encoding binary synchronisation cluster-acyclic net). The confusion-free encoding of a binary synchronisation cluster-acyclic net acnet = (𝑃, 𝑇, 𝐹</head><p>) is an acyclic net confree ′ (acnet) = (𝑃 ′ , 𝑇 ′ , 𝐹 ′ ) constructed in three steps. First, we generate: 168-187</p><formula xml:id="formula_19">• 𝑃 ′ = 𝑃 ∪ 𝑃 . • 𝑇 ′ = {𝑡 𝜅,𝜃,𝛽 | 𝜅 ∈ clusters(acnet) ∧ 𝜃 ∈ trans(𝜅) ∧ 𝛽 ∈ borders(𝜅)}. 𝑝 1 𝑝 2 𝑝 3 𝑝 4 𝑑 𝑏 𝑒 𝑐 𝜅 1 (sub-)cluster 𝜅 borders(𝜅) trans(𝜅) 𝜅 𝑏𝑒𝑑𝑐 = {𝑏, 𝑑, 𝑒, 𝑐} ∅ {{𝜃 𝑏𝑑 }, {𝜃 𝑏𝑐 }, {𝜃 𝑒𝑐 }} 𝜅 𝑏 = {𝑏} {{𝑝 3 }} {{𝜃 𝑏 }} 𝜅 𝑏𝑒 = {𝑏, 𝑒} {{𝑝 2 }} {{𝜃 𝑏 }, {𝜃 𝑒 }} 𝜅 𝑏𝑒𝑑 = {𝑏, 𝑒, 𝑑} {{𝑝 4 }} {{𝜃 𝑏𝑑 }, {𝜃 𝑒 }} 𝜅 𝑐𝑑 = {𝑐, 𝑑} {{𝑝 1 }} {{𝜃 𝑐 }, {𝜃 𝑑 }} 𝜅 𝑐 = {𝑐} {{𝑝 3 }} {{𝜃 𝑐 }} 𝜅 𝑑 = {𝑑} {{𝑝 1 , 𝑝 4 }} {{𝜃 𝑑 }}</formula><formula xml:id="formula_20">• • 𝑡 = • 𝜅 ∪ 𝛽 and 𝑡 • = 𝜃 • ∪ caused(𝜅 ∖ 𝜃) ∩ 𝑃 , for every 𝑡 = 𝑡 𝜅,𝜃,𝛽 ∈ 𝑇 ′ .</formula><p>After that we delete all places 𝑝 ∈ 𝑃 such that </p><formula xml:id="formula_21">𝜅 𝑏𝑒𝑑𝑐 𝑝 1 𝑝 2 𝑝 3 𝑝 4 𝑑 𝑏 𝑒 𝑐 𝑝 1 𝑝 2 𝑝 3 𝑝 4 𝜏 𝑏𝑐 𝜏 𝑒𝑐 𝜏 𝑏𝑑 𝜅 𝑏𝑒𝑑 𝑝 1 𝑝 2 𝑝 3 𝑑 𝑏 𝑒 𝑝 1 𝑝 2 𝑝 3 𝜏 ′ 𝑏𝑑 𝜏 𝑒 𝑝 4 𝜅 𝑏𝑒 𝑝 1 𝑝 3 𝑏 𝑒 𝑝 1 𝑝 3 𝜏 ′ 𝑒 𝜏 𝑏 𝑝 2 𝜅 𝑐𝑑 𝑝 2 𝑝 3 𝑝 4 𝑑 𝑐 𝑝 3 𝑝 2 𝑝 4 𝜏 𝑐 𝜏 𝑑 𝑝 1 𝜅 𝑑 𝑝 2 𝑝 3 𝑑 𝑝 3 𝑝 2 𝜏 ′ 𝑑 𝑝 1 𝑝 4 𝜅 𝑐 𝑝 2 𝑝 4 𝑐 𝑝 2 𝑝 4 𝜏 ′ 𝑐 𝑝 3 𝜅 𝑏 𝑝 1 𝑏 𝑝 1 𝜏 ′ 𝑏 𝑝<label>3</label></formula><p>Figure <ref type="figure">6</ref>: All the clusters and their associated maximal transactions for the binary synchronised acyclic net in Figure <ref type="figure" target="#fig_5">5</ref>, where 𝜏 𝑏𝑑 = 𝑡 𝜅 𝑏𝑒𝑑𝑐 ,{𝑏,𝑑},∅ , etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>168-187</head><p>with symmetric confusion. It also shows its (sub-)clusters and the corresponding borders and maximal transactions. Figure <ref type="figure">6</ref> shows the clusters and their correspond encoded transitions derived from the maximal transactions associated with each cluster. The maximal cluster is maxclusters(𝜅 𝑏𝑒𝑑𝑐 ) with its maximal transactions maxtrans(𝜅 𝑏𝑒𝑑𝑐 ) = {{𝜃 𝑏𝑑 }, {𝜃 𝑏𝑐 }, {𝜃 𝑒𝑐 }}. Since all the pre-places of 𝜅 1 are included together with their output transitions, borders(𝜅 1 ) = ∅. All the sub-clusters with their maximal transactions are shown in Figure <ref type="figure">6</ref>. Note that borders(𝜅 𝑏 ) = {𝑝 3 } = borders(𝜅 𝑐 ) and 𝜏 ′ 𝑏 , 𝜏 ′ 𝑐 are not in conflict hence, in the encoding 𝑝 3 will be split into 𝑝 3 and 𝑝 ′ 3 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Communication structured acyclic nets</head><p>Basic definitions. Communication structured acyclic nets add communication to represent the interaction among several separated subsystems <ref type="bibr" target="#b9">[10]</ref>. Each communication structured acyclic net is a set of acyclic nets with synchronous or asynchronous communication between their transitions implemented using extra nodes called buffer places (which provided a motivation for a/syn connections discussed, e.g., in <ref type="bibr" target="#b19">[20]</ref>). When two transitions are subject to synchronous communication, they are always executed together, but under asynchronous communication they may be executed simultaneously or one of them after the other.</p><p>A communication structured acyclic net (or csa-net) is a tuple csan = (acnet 1 , . . . , acnet 𝑛 , 𝑄, 𝑊 ) (𝑛 ≥ 1) such that:</p><p>• acnet 1 , . . . , acnet 𝑛 are well-formed acyclic nets with disjoint sets of nodes. We denote:</p><formula xml:id="formula_22">𝑋 csan = 𝑋 acnet 1 ∪ • • • ∪ 𝑋 acnet𝑛 , for 𝑋 ∈ {𝑃, 𝑇, 𝐹, 𝑃 init }.</formula><p>• 𝑄 is a finite set of buffer places disjoint from 𝑃 csan ∪𝑇 csan and 𝑊 ⊆ (𝑄×𝑇 csan )∪(𝑇 csan ×𝑄) is a set of arcs. We also denote 𝑄 csan = 𝑄, 𝑊 csan = 𝑊 .</p><p>• For every 𝑞 ∈ 𝑄, there is 𝑧 ∈ 𝑇 such that 𝑧𝑊 𝑞, and if 𝑡𝑊 𝑞 and 𝑞𝑊 𝑢 then 𝑡 and 𝑢 belong to different acnet 𝑖 's. A scenario of a csa-net csan is a cso-net cson = (ocnet 1 , . . . , ocnet 𝑛 , 𝑄 ′ , 𝑊 ′ ) such that: (i)</p><p>ocnet 𝑖 ∈ scenarios(acnet 𝑖 ), for every 1 ≤ 𝑖 ≤ 𝑛; (ii) 𝑄 ′ ⊆ 𝑄 and 𝑊 ′ ⊆ 𝑊 ; and (iii) pre cson (𝑡) = pre csan (𝑡) and post cson (𝑡) = post csan (𝑡), for every 𝑡 ∈ 𝑇 cson . Moreover, cson is maximal if there is no scenario cson ′ satisfying 𝑇 cson ⊂ 𝑇 cson ′ . We denote this by ocnet ∈ scenarios(csan) and ocnet ∈ maxscenarios(csan), respectively. Each scenario of a csa-net csan is identified by the set of its transitions 𝑉 , and denoted by scenario csan (𝑉 ). 168-187 (a) Step sequence semantics. Let csan be a csa-net.</p><formula xml:id="formula_23">acnet 1 acnet 2 • 𝑝 1 𝑝 2 𝑝 3 𝑝 4 𝑎 𝑏 𝑐 𝑑 • 𝑝 5 𝑝 6 𝑝 7 𝑒 𝑓 𝑞 1 𝑞 2 𝑞 3 acnet 1 acnet 2 • 𝑝 1 𝑝 3 𝑝 4 𝑐 𝑑 • 𝑝 5 𝑝 6 𝑝 7 𝑒 𝑓 𝑞 1 𝑞 2 𝑞 3<label>(b)</label></formula><p>• markings(csan) = {𝑀 | 𝑀 ⊆ 𝑃 csan ∪ 𝑄 csan } are the markings and 𝑀 init csan = 𝑃 init csan is the default initial marking.</p><formula xml:id="formula_24">• steps(csan) = {𝑈 ⊆ 𝑇 csan | 𝑈 ̸ = ∅ ∧ ∀𝑡 ̸ = 𝑢 ∈ 𝑈 : pre csan (𝑡) ∩ pre csan (𝑢) = ∅} are the steps.</formula><p>• enabled csan (𝑀 ) = {𝑈 ∈ steps(csan) | pre csan (𝑈 ) ⊆ 𝑀 ∪ (post csan (𝑈 ) ∩ 𝑄)} are the steps enabled at 𝑀 , and a step 𝑈 enabled at 𝑀 can be executed yielding a new marking</p><formula xml:id="formula_25">𝑀 ′ = (𝑀 ∪ post csan (𝑈 )) ∖ pre csan (𝑈 ). This is denoted by 𝑀 [𝑈 ⟩ csan 𝑀 ′ .</formula><p>Let 𝑀 0 , . . . , 𝑀 𝑘 (𝑘 ≥ 0) be markings and 𝑈 1 , . . . , 𝑈 𝑘 be steps of a csa-net csan such that 𝑀 𝑖−1 [𝑈 𝑖 ⟩ csan 𝑀 𝑖 , for every 1 ≤ 𝑖 ≤ 𝑘.</p><p>• 𝜇 = 𝑀 0 𝑈 1 𝑀 1 . . . 𝑀 𝑘−1 𝑈 𝑘 𝑀 𝑘 is a mixed step sequence from 𝑀 0 to 𝑀 𝑘 and 𝜎 = 𝑈 1 . . . 𝑈 𝑘 is a step sequence from 𝑀 0 to 𝑀 𝑘 . We denote 𝑀 0 [𝜇⟩⟩ csan 𝑀 𝑘 and 𝑀 0 [𝜎⟩ csan 𝑀 𝑘 , respectively. Moreover, 𝑀 0 [⟩ csan 𝑀 𝑘 denotes that 𝑀 𝑘 is reachable from 𝑀 0 .</p><p>• If 𝑀 0 = 𝑀 init csan , then 𝜇 ∈ mixsseq(csan) is a mixed step sequence, 𝜎 ∈ sseq(csan) is a step sequence, and 𝑀 𝑘 is a reachable marking of csan. Also, if 𝜎 cannot be extended further, it is a maximal step sequence in maxsseq(csan).</p><p>In contrast to the step sequence of an acyclic net, where a step consists only of enabled transitions, in a csa-net an enabled step 𝑈 can involve a/synchronous communications. That is, it can use not only the tokens of the places within acyclic nets, but also tokens in the buffer places generated in the same step <ref type="bibr" target="#b2">[3]</ref>.</p><p>In Figure <ref type="figure" target="#fig_7">7</ref>(a), transitions 𝑒 and 𝑐 are communicating asynchronously, so they can be executed together, or 𝑒 then 𝑐 (but not 𝑐 before 𝑒). On the other hand, 𝑑 and 𝑓 must be executed simultaneously as they are involved in synchronous communication. Therefore, some possible maximal step sequences are {𝑎, 𝑒}𝑏, 𝑎{𝑏, 𝑒}, 𝑒𝑐{𝑑, 𝑓 }, and {𝑒, 𝑐}{𝑑, 𝑓 }.</p><p>168-187 (a) Calculating probabilities in csa-nets. We now extend the notion of calculating probabilities in acyclic nets to well-formed csa-nets. In order to determine probabilities of alternate scenarios, each syn-cycle 𝑆 is assigned a positive numerical weight 𝜔(𝑆). Below we assume that</p><formula xml:id="formula_26">acnet 1 acnet 2 𝑝 1 𝑒 𝑝 2 5 𝐴 𝐵 3 𝑝 3 𝑞 1 𝑝 4 𝑓 𝑝 5 𝑞 2 𝐶 2 𝐷 4 𝑝 6 acnet 1 acnet 2 𝑝 1 7 𝐴 𝐵 3 𝑝 2 𝑝 3 𝑝 4 𝐶 2 𝐷 3 𝑝 6 𝑝 7 𝑞 1 𝑞 2 (b)</formula><formula xml:id="formula_27">𝜔(𝑆) = 𝜔(𝑡 1 ) + • • • + 𝜔(𝑡 𝑘 )</formula><p>, where each 𝜔(𝑡 𝑖 ) is the weight of transition 𝑡 𝑖 as before. We then define the probability of a syn-cycle 𝑆 enabled at a reachable marking 𝑀 as the weight of 𝑆 divided the weight of all the enabled 𝑆 ′ ∈ syncycles(csan) that are in conflict with 𝑆 enabled at 𝑀 , and then calculate the probability of a step 𝑈 composed of syn-cycles 𝑆 1 , . . . , 𝑆 𝑘 :</p><formula xml:id="formula_28">P csan (𝑀, 𝑆) = 𝜔(𝑆) ∑︀ 𝑆 ′ ∈conflsetcsan(𝑀,𝑆) 𝜔(𝑆 ′ ) P csan (𝑀, ⨄︀ 𝑘 𝑖=1 𝑆 𝑖 ) = ∏︀ 𝑘 𝑖=1 P csan (𝑀, 𝑆 𝑖 ) .</formula><p>Then the probability of 𝜎 = 𝑈 1 . . . 𝑈 𝑘 is P csan (𝜎) = P csan (𝑀 0 , 𝑈 1 ) • . . . • P csan (𝑀 𝑘−1 , 𝑈 𝑘 ), where 𝑀 0 , . . . , 𝑀 𝑘−1 are such that 𝑀 𝑖−1 [𝑈 𝑖 ⟩ csan 𝑀 𝑖 , for every 1 ≤ 𝑖 ≤ 𝑘. Figure <ref type="figure" target="#fig_9">8</ref> illustrates the notion of csa-nets with weights (the weights are shown inside transitions in conflict). In Figure <ref type="figure" target="#fig_9">8</ref>(a), there are two maximal scenarios of acnet 1 involving either 𝐴 or 𝐵, and also two scenarios for acnet 2 involving either 𝐶 or 𝐷. Then csan has four scenarios: cson 1 = scenario csan ({𝑒, 𝑓, 𝐴, 𝐶}), cson 2 = scenario csan ({𝑒, 𝑓, 𝐴, 𝐷}), cson 3 = scenario csan ({𝑒, 𝑓, 𝐵, 𝐶}), and cson 4 = scenario csan ({𝑒, 𝑓, 𝐵, 𝐷}). There are also five syncycles: 𝑆 1 = {𝑒, 𝑓 }, 𝑆 2 = {𝐴}, 𝑆 3 = {𝐵}, 𝑆 4 = {𝐶}, and 𝑆 5 = {𝐷}.</p><p>The probabilities of scenarios are calculated through their maximal step sequences. For example, cson 1 has three: Confusion in probabilistic csa-nets. Consider the csa-net csan in Figure <ref type="figure" target="#fig_9">8(b)</ref>. The two possible scenarios are cson 1 = scenario csan ({𝐴, 𝐷}) and cson 2 = scenario csan ({𝐵, 𝐶}). Note that the latter scenario is executed in a single execution step due to a synchronous communication that forms the syn-cycle 𝑆 1 = {𝐵, 𝐶}. In scenario csan ({𝐴, 𝐷}) transitions belong to separate syn-cycles as 𝑆 2 = {𝐴} and 𝑆 3 = {𝐷}, and it has three different maximal step sequences: 𝜎 1 = 𝑆 2 𝑆 3 , 𝜎 2 = 𝑆 3 𝑆 2 , and 𝜎 3 = (𝑆 2 ∪ 𝑆 3 ). If 𝜎 1 is executed, then the probability of 𝑆 3 is 1 (𝐷 is in this case is a certain transition), and so we get P csan (𝜎 1 ) = (7/10) • 1 = 7/10. However, if 𝜎 2 is executed, then the resulting probability is (3/5) • 1 = 3/5. Hence, one cannot assign probability to cson 1 . The behaviour of this net is similar to the acyclic net with symmetric confusion in Figure <ref type="figure" target="#fig_1">2</ref>(b). Here, 𝐴 and 𝐷 are independent transitions, but firing any of them has influence on the conflict set of the other. For example, firing 𝐴 decreases the conflict set of 𝐷, which is why confusion arises.</p><p>A well-formed csa-net csan has a confusion at a reachable marking 𝑀 if there are distinct syn-cycles 𝑆 1 , 𝑆 2 , 𝑆 3 ∈ syncycles(csan) such that 𝑆 1 , 𝑆 2 , 𝑆 1 ⊎ 𝑆 2 ∈ enabled csan (𝑀 ), and one of the following holds:</p><p>• 𝑆 1 # 0 𝑆 3 # 0 𝑆 2 and 𝑆 3 ∈ enabled csan (𝑀 ).</p><p>• 𝑆 1 # 0 𝑆 3 and 𝑆 3 ∈ enabled csan (𝑀 ′ ) ∖ enabled csan (𝑀 ), where 𝑀 [𝑆 2 ⟩ csan 𝑀 ′ .</p><p>We then denote symconfused csan (𝑀, 𝑆 1 , 𝑆 2 , 𝑆 3 ) in the first (symmetric) case, and in the second (asymmetric) case we denote asymconfused csan (𝑀, 𝑆 1 , 𝑆 2 , 𝑆 3 ). If csan has no confusion at all the reachable markings, then it is confusion-free.</p><p>For the csa-net in Figure <ref type="figure" target="#fig_9">8</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Removing confusion from csa-nets</head><p>In this section, we assume that a well-formed csa-net csan has a confusion. To remove the confusion from csan, it is encoded into a single acyclic net. If the result is an acyclic wellformed net whose clusters are acyclic, the approaches proposed in Section 3.1 is applied. The encoding of csan is based on expanding the underlying transitions involved in asynchronous communications. Hence, buffer places are considered as regular places. For the transitions communicate synchronously, they are always combined together as one synchronised transition. The buffer places are removed for combined synchronised transitions. The transitions of csan are removed. Instead, for each syn-cycle 𝑆 of csan, a transition 𝜏 𝑆 is created (graphically, we put the transitions of 𝑆 inside the box representing 𝜏 𝑆 ). Its preset and postset are those of syn-cycle 𝑆 except those involved in synchronous communication. The encoding is done as follows:</p><p>• All the places of csan together with their markings are retained.</p><p>• Each buffer place becomes a regular place.</p><p>• For each syn-cycle 𝑆 ∈ syncycles(csan), transition 𝜏 𝑆 is created. Its presets are the pre-places of 𝑆 except the buffer places in pre csan (𝑆) ∩ post csan (𝑆). Its post-sets are the post-places of 𝑆 except the buffer places in pre csan (𝑆) ∩ post csan (𝑆).  • The original buffer places with empty pre-sets are removed.</p><p>The following definition formally captures the details of the encoding. Let csan be a well-formed csa-net. Then acyclicnet(csan) = (𝑃, 𝑇, 𝐹 ) is constructed so that:</p><formula xml:id="formula_29">• 𝑃 = 𝑃 csan ∪ 𝑄 csan and 𝑇 = {𝜏 𝑆 | 𝑆 ∈ syncycles(csan)},</formula><p>• pre acnet (𝜏 𝑆 ) = pre csan (𝑆) ∖ 𝑄 csan ∩ pre csan (𝑆) ∩ post csan (𝑆), for every 𝜏 𝑆 ∈ 𝑇 , and</p><formula xml:id="formula_30">• post acnet (𝜏 𝑆 ) = post csan (𝑆) ∖ 𝑄 csan ∩ pre csan (𝑆) ∩ post csan (𝑆), for every 𝜏 𝑆 ∈ 𝑇 .</formula><p>After that, the original buffer places with empty pre-sets are removed and, if acyclicnet(csan) is a well-formed acyclic net whose clusters are acyclic, we apply the construction from Section 2.</p><p>Figure <ref type="figure" target="#fig_11">9</ref>(a) illustrates the notion of asymmetric confusion in a well-formed csa-net csan. The csan is composed of two acyclic nets, acnet 1 and acnet 2 , with asynchronous communication via buffer place 𝑞 1 . There are four syn-cycles: 𝑆 1 = {𝑎}, 𝑆 2 = {𝑏}, 𝑆 3 = {𝑐}, and 𝑆 4 = {𝑑}. These syn-cycles exhibit asymmetric confusion, as we have asymconfused csan (𝑆 1 ∪ 𝑆 4 , 𝑆 2 , 𝑆 3 ). The acyclic net in Figure <ref type="figure" target="#fig_11">9</ref>(b) is acyclicnet(csan). Its transitions are the transitions derived from the syn-cycles in Figure <ref type="figure" target="#fig_11">9</ref>(a). Each syn-cycle 𝑆 = {𝑥} is removed and instead transition 𝜏 𝑥 is created. Note that despite the fact that there is an asynchronous communication between 𝑏 and 𝑐, and so they might be executed simultaneously, they are encoded as singleton transitions and the buffer place 𝑞 1 as a regular place. Note also that the behaviour of the constructed acyclic net is closely linked to the original csa-net. First, scenario acnet (𝜏 𝑎 , 𝜏 𝑑 ) and scenario acnet (𝜏 𝑏 , 𝜏 𝑑 ) can be executed in any order. The only behaviour that is not preserved is the possibility of executing {𝑏, 𝑐} as the corresponding syn-cycles, 𝑆 2 = {𝑏} and 𝑆 3 = {𝑐}, are not explicitly synchronised. Note that the transformed net in Figure <ref type="figure" target="#fig_11">9</ref>(b) is cluster-acyclic.</p><p>The following result shows that the behaviour of the constructed acyclic net is equivalent to the original csa-net. Below, for a set of transitions 𝑈 of the former, 𝑇 𝑈 = ⋃︀ {𝑆 | 𝜏 𝑆 ∈ 𝑈 }.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 9.</head><p>Let csan be a well-formed csa-net, and acnet = acyclicnet(csan). The first stage of the approach of removing confusion in csan of Figure <ref type="figure" target="#fig_11">9</ref>(a) was already presented. We now present the second and third stages. Since the transformed acyclic net is cluster-acyclic, the techniques of the confusion-free encoding in Section 3.1 can be applied. There are two maximal clusters in this case: 𝜅  <ref type="figure" target="#fig_11">9</ref>, for the cluster-acyclicity constraint hold. Therefore, it is possible to reuse the proposed approach discussed in Section 3.1 after transforming csan into acyclicnet(csan). However, there is an intuition that cluster-acyclicity constraint can be checked at the level of csa-nets. This happens when asynchronous communications between the transitions of the component acyclic nets are unidirectional, in the following sense.</p><p>The net in Figure <ref type="figure" target="#fig_11">9</ref>(a) adheres this condition. However, if exists an a∖synchronous communication between (𝑑, 𝑎) ∈ 𝑊 csan as it is portrayed in Figure <ref type="figure" target="#fig_12">10</ref>(a), then the csan is not cluster-acyclic. As a result, even if this net is transformed into an acyclic net, the approach proposed previously is not applicable as it depicted in Figure <ref type="figure" target="#fig_12">10(b)</ref>. In order to solve this issue, one can construct the equivalent acyclic net differently by combining all the transitions involve in asynchronous communications into one synchronised transition. For example, the transitions (𝑏, 𝑐) ∈ 𝑊 csan and (𝑑, 𝑎) ∈ 𝑊 csan whose communications are asynchronous in Figure <ref type="figure" target="#fig_12">10(a)</ref> can be translated into one synchronised transition 𝜏 𝑏𝑐 and 𝜏 𝑑𝑎 respectively as the semantic of asynchronous communication allows those transitions to be executed together. Figure <ref type="figure" target="#fig_12">10(c)</ref> shows the alternative encoding of csan in (a). Proposition 10. Let csan = (acnet 1 , . . . , acnet 𝑛 , 𝑄, 𝑊 ) (𝑛 ≥ 1) be a well-formed csa-net such that each acnet 𝑖 is cluster-acyclic and, for each 1 ≤ 𝑖 &lt; 𝑗𝑙𝑒𝑞𝑛, there are no 𝑡 ∈ 𝑇 acnet 𝑗 and 𝑢 ∈ 𝑇 acnet 𝑖 such that (𝑡, 𝑢) ∈ 𝑊 2 csan . Then acyclicnet(csan) is a cluster-acyclic.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>This paper investigated two approaches of removing confusion in acyclic nets, one of which is based on the work presented in <ref type="bibr" target="#b13">[14]</ref>. Then the proposed solution was lifted to the level of csa-nets. There are some issues regarding the approach of handling the confusion in csa-nets as the acyclicity constraint may not be satisfied due to communication, and one may address these issues by combining transitions involved in synchronous communication. In the future work, we plan to extend the current work to behavioural structured occurrence nets <ref type="bibr" target="#b1">[2]</ref>, where the dynamic behaviour of a concurrent system is represented at different levels of abstraction.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Acyclic net with initial marking (a), and one of its maximal scenarios (b).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Acyclic nets with weights: backward deterministic (a), with symmetric confusion (b), and with asymmetric confusion (c).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 (</head><label>2</label><figDesc>Figure2(b) depicts a well-formed acyclic net acnet with symmetric confusion such that we have symconfused acnet (𝑀, 𝑎, 𝑐, 𝑏), where 𝑀 = {𝑝 1 , 𝑝 2 }. Consider the scenario ocnet 1 = scenario acnet ({𝑑, 𝑎, 𝑐}) with three executions (𝜎 1 = 𝑑𝑎𝑐, 𝜎 2 = 𝑑𝑐𝑎, and 𝜎 3 = 𝑑{𝑎, 𝑐}). The probability of 𝜎 1 is P acnet (𝜎 1 ) = 1 • 7/10 • 1 = 7/10. However, if 𝜎 2 is executed, then the resulting probability is P acnet (𝜎 2 ) = 3/6 ̸ = P acnet (𝜎 1 ). Hence one cannot assign a probability to ocnet 1 . A similar conclusion can be reached for the acyclic net in Figure2(c) which exhibits asymmetric confusion asymconfused acnet (𝑀 init acnet , 𝑎, 𝑏, 𝑐). A crucial property is that in a confusion-free acyclic net, conflict sets of transitions are constant for all the executions of each scenario.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: (a) maximal clusters with their presets of the acyclic net in Figure 2(c), (b) encoding the cluster-acyclic net of into a confusion-free acyclic net with negative place, where: 𝑡 𝑏 = 𝑡 𝜅1,{𝑏},{𝑝1} , 𝑡 𝑑 = 𝑡 𝜅1,{𝑑},{𝑝1} , 𝑡 𝑎 = 𝑡 𝜅2,{𝑎},{𝑝2,𝑝3} , 𝑡 𝑐 = 𝑡 𝜅2,{𝑐},{𝑝2,𝑝3} , and 𝑡 ′ 𝑎 = 𝑡 𝜅2,{𝑎},{𝑝2} .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: (a) acyclic net with two types of confusion and its encoding to confusion-free acyclic net (b), where: 𝑡 𝑎 = 𝑡 𝜅1,{𝑎},{𝑝1} , 𝑡 𝑏 = 𝑡 𝜅1,{𝑏},{𝑝1} , 𝑡 𝑐 = 𝑡 𝜅2,{𝑐},{𝑝2} , 𝑡 𝑑 = 𝑡 𝜅2,{𝑑},{𝑝2} , 𝑡 𝑥𝑧 = 𝑡 𝜅3,{𝑥,𝑧},{𝑝3,𝑝4,𝑝5} , 𝑡 𝑦 = 𝑡 𝜅3,{𝑦},{𝑝3,𝑝4,𝑝5} , 𝑡 ′ 𝑥𝑧 = 𝑡 𝜅3,{𝑥,𝑧},{𝑝3,𝑝4,𝑝5} , 𝑡 𝑧 = 𝑡 𝜅3,{𝑧},{𝑝3,𝑝4,𝑝5} .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: A maximal cluster 𝜅 𝑏𝑒𝑑𝑐 of a binary synchronisation acyclic net, and the borders and maximal transactions of 𝜅 𝑏𝑒𝑑𝑐 and its sub-clusters (all places are assumed to be non-initial).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>For</head><label></label><figDesc>all 𝑥 ∈ 𝑃 csan ∪ 𝑇 csan ∪ 𝑄 csan , we denote pre csan (𝑥) = {𝑧 | (𝑧, 𝑥) ∈ 𝐹 csan ∪ 𝑊 csan } and post csan (𝑥) = {𝑧 | (𝑥, 𝑧) ∈ 𝐹 csan ∪ 𝑊 csan } (and similarly for sets of nodes).The csan is backward deterministic (or bdcsa-net) if the component acyclic nets are backward deterministic and | pre csan (𝑞)| = 1, for every 𝑞 ∈ 𝑄 csan . Moreover, csan is a communication structured occurrence net (or cso-net) if: (i) the component acyclic nets are occurrence nets; (ii) | pre csan (𝑞)| = 1 and | post csan (𝑞)| ≤ 1, for every 𝑞 ∈ 𝑄 csan ; and (iii) no place in 𝑃 csan belongs to a cycle in the graph of csan. A cso-net exhibits backward determinism and forward determinism providing full and unambiguous information about the causal histories of all transitions it involves. Figure7(b) shows a cso-net.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 7 (</head><label>7</label><figDesc>b) shows a maximal scenario for the csa-net in Figure7(a).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: csa-net with initial marking (a), and cso-net with initial marking (b).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Probabilistic communication structured acyclic nets.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>𝜎 1 =</head><label>1</label><figDesc>{𝑒, 𝑓 }𝐴𝐶, 𝜎 2 = {𝑒, 𝑓 }𝐶𝐴, and 𝜎 3 = {𝑒, 𝑓 }{𝐴, 𝐶}. All with the same probability 10/48, e.g., using 𝜎 1 we get P csan (cson 1 ) = 1 • (5/8) • (2/6) = 10/48. Also, cson 2 , cson 3 , cson 4 each has three different executions and their probabilities are equal as well. As a result, one can assign probabilities to the four scenarios. P csan (cson 2 ) = 1•(3/8)•(2/6) = 6/48, P csan (cson 3 ) = 1 • (5/8) • (4/6) = 20/48, and P csan (cson 4 ) = 1 • (3/8) • (4/6) = 12/48. Note that P csan (cson 1 ) + P csan (cson 2 ) + P csan (cson 3 ) + P csan (cson 4 ) = 1.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: Confused csa-net (a), its equivalent acyclic net (b), and its confusion-free acyclic net (c).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>1 =</head><label>1</label><figDesc>{𝜏 𝑎 , 𝜏 𝑏 } and 𝜅 2 = {𝜏 𝑐 , 𝜏 𝑑 } with 𝜅 1 ⊏ 𝜅 2 . The associated maximal transactions are:maxtrans(𝜅 1 , {𝑝 1 }) = {{𝜏 𝑎 }, {𝜏 𝑏 }}, maxtrans(𝜅 2 , {𝑝 4 , 𝑞 1 }) = {{𝜏 𝑐 }, {𝜏 𝑑 }},and maxtrans(𝜅 2 , {𝑝 4 }) = {{𝜏 𝑑 }}. The net in Figure 9(c) represents the third stage, which is carried out similarly to the first approach for the net in Figure 3(b). Asynchronous communication and csa-net acyclicity. Consider again the nets in Figure</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>are the steps enabled at a marking 𝑀 , and a step 𝑈 enabled at 𝑀 can be executed yielding a new marking𝑀 ′ = (𝑀 ∪ 𝑈 • ) ∖ • 𝑈 . This is denoted by 𝑀 [𝑈 ⟩ acnet 𝑀 ′ .Let 𝑀 0 , . . . , 𝑀 𝑘 (𝑘 ≥ 0) be markings and 𝑈 1 , . . . , 𝑈 𝑘 be steps of an acyclic net acnet such that 𝑀 𝑖−1 [𝑈 𝑖 ⟩ acnet 𝑀 𝑖 , for every 1 ≤ 𝑖 ≤ 𝑘.• 𝜇 = 𝑀 0 𝑈 1 𝑀 1 . . . 𝑀 𝑘−1 𝑈 𝑘 𝑀 𝑘 isa mixed step sequence from 𝑀 0 to 𝑀 𝑘 and 𝜎 = 𝑈 1 . . . 𝑈 𝑘 is a step sequence from 𝑀 0 to 𝑀 𝑘 . We denote 𝑀 0 [𝜇⟩⟩ acnet 𝑀 𝑘 and 𝑀 0 [𝜎⟩ acnet 𝑀 𝑘 , respectively, and 𝑀 0 [⟩ acnet 𝑀 𝑘 denotes that 𝑀 𝑘 is reachable from 𝑀 0 . • If 𝑀 0 = 𝑀 init acnet , then 𝜇 ∈ mixsseq(acnet) is a mixed step sequence, 𝜎 ∈ sseq(acnet) is a step sequence, and 𝑀 𝑘 is a reachable marking of acnet. Also, if 𝜎 cannot be extended further, it is a maximal step sequence in maxsseq(acnet).</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>• 𝑝 = ∅ or 𝑝 • = ∅. Finally, we replace each remaining place 𝑝 ∈ 𝑃 with 𝑝 • = {𝑡 1 , . . . , 𝑡 𝑘 } by new places 𝑝 𝑡 1 , . . . , 𝑝 𝑡 𝑘 satisfying • (𝑝 𝑡 𝑖 ) = • 𝑝 and (𝑝 𝑡 𝑖 ) • = {𝑡 𝑖 }, for every 1 ≤ 𝑖 ≤ 𝑘. ◇Figure5shows a maximal cluster 𝜅 𝑏𝑒𝑑𝑐 of some binary synchronisation acyclic net acnet</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head></head><label></label><figDesc>(b), we have symconfused csan (𝑀, 𝑆 1 , 𝑆 2 , 𝑆 3 ). Let csan be a well-formed csa-net and 𝑀 be its reachable marking. If it is the cae that symconfused csan (𝑀, 𝑆 1 , 𝑆 2 , 𝑆 3 ) or asymconfused csan (𝑀, 𝑆 1 , 𝑆 2 , 𝑆 3 ), then we have conflset csan (𝑀, 𝑆 1 ) ̸ = conflset csan (𝑀 ′ , 𝑆 1 ) and 𝑆 1 ∈ enabled csan (𝑀 ′ ), where 𝑀 [𝑆 2 ⟩ csan 𝑀 ′ .</figDesc><table><row><cell>Proposition 8.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head></head><label></label><figDesc>1. For every cson ∈ maxscenarios(csan), there is a maximal step sequence 𝑈 1 . . . 𝑈 𝑘 of acnet such that 𝑇 𝑈 1 . . . 𝑇 𝑈 𝑘 is a maximal step sequence of cson. Figure 10: csa-net (a), its encoding into acyclic net which is not cluster-acyclic (b), and another encoding (c).2. If 𝑈 1 . . . 𝑈 𝑘 is a step sequence of acnet, then 𝑇 𝑈 1 . . . 𝑇 𝑈 𝑘 is a step sequence of csan.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>168-187</cell></row><row><cell></cell><cell>𝑝 1</cell><cell>𝑎</cell><cell>𝑏</cell><cell>acnet 1</cell><cell>𝑝 1</cell><cell>𝜏 𝑏</cell><cell>𝑞 1</cell><cell>𝑝 1</cell><cell>𝜏 𝑏𝑐 𝜏 𝑏</cell><cell>𝑞 1</cell></row><row><cell>(𝑎)</cell><cell>𝑞 2</cell><cell></cell><cell></cell><cell>𝑞 1</cell><cell>(𝑏)</cell><cell>𝜏 𝑎</cell><cell>(𝑐)</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>𝑐</cell><cell>acnet 2</cell><cell>𝑝 4</cell><cell>𝜏 𝑐</cell><cell></cell><cell>𝑝 4</cell><cell>𝜏 𝑑𝑎</cell></row><row><cell></cell><cell>𝑝 4</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>𝑑</cell><cell></cell><cell></cell><cell></cell><cell>𝜏 𝑑</cell><cell>𝑞 2</cell><cell></cell><cell>𝜏 𝑑</cell><cell>𝑞 2</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Well-formed csa-nets. A csa-net csan is well-formed if each transition occurs in at least one step sequence and the following hold, for every step sequence 𝑈 1 . . . 𝑈 𝑘 ∈ sseq(csan): (i) post csan (𝑡) ∩ post csan (𝑢) = ∅, for every 1 ≤ 𝑖 ≤ 𝑘 and all transitions 𝑡 ̸ = 𝑢 ∈ 𝑈 𝑖 ; and (ii)</p><p>Intuitively, a well-formed csa-net does not have 'useless' transitions and no place is filled more than once in any given step sequence. Each cso-net is well-formed, and a csa-net is well-formed iff each transition occurs in at least one scenario, and each step sequence is a step sequence of at least one scenario.</p><p>Each step sequence 𝜎 of a well-formed csa-net csan induces a scenario scenario csan (𝜎) = scenario csan (𝑉 ), where 𝑉 are the transitions occurring in 𝜎. Thus, different step sequences may generate the same scenario, and conversely, each scenario is generated by at least one step sequence. Moreover, two maximal step sequences generate the same scenario iff their executed transitions are identical.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Syn-cycles.</head><p>In the case of cso-nets each executed step can unambiguously represented as a disjoint union of sub-steps which cannot be further decomposed.</p><p>A syn-cycle of a cso-net cson is a maximal non-empty set of transitions 𝑆 ⊆ 𝑇 csan such that, for all 𝑡 ̸ = 𝑢 ∈ 𝑆, (𝑡, 𝑢) ∈ 𝑊 + cson . The set of all syn-cycles is denoted by syncycles(cson). The idea behind the notion of syn-cycles is to capture fully synchronous communications <ref type="bibr" target="#b9">[10]</ref>. In Figure <ref type="figure">7</ref>(a), there is one non-singleton syn-cycle 𝑆 = {𝑑, 𝑓 }.</p><p>The set of all syn-cycles syncycles(cson) is a partition of the transition set 𝑇 cson . As stated below, each step occurring in step sequences of a cso-net can be partitioned into syn-cycles (in a unique way). Proposition 6. Let 𝑀 be a reachable marking of a cso-net cson and 𝑀 [𝑈 ⟩ cson 𝑀 ′ . Then there are 𝑈 1 , . . . , 𝑈 𝑘 ∈ syncycles(cson)</p><p>This means, for example, that all reachable markings of a cso-net can be generated by executing syn-cycles rather than all the potential steps. Moreover, the same holds for every well-formed csa-net csan and the syn-cycles of its scenarios given by syncycles(csan) = ⋃︀ {syncycles(cson) | cson ∈ scenarios(csan)}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 7.</head><p>Let 𝑀 be a reachable marking of a well-formed cso-net csan and 𝑀 [𝑈 ⟩ csan 𝑀 ′ . Then there are 𝑈 1 , . . . , 𝑈 𝑘 ∈ syncycles(csan</p><p>Conflict in csa-net. Let csan be a well-formed csa-net.</p><p>• Two syn-cycles 𝑆 ̸ = 𝑆 ′ ∈ syncycles(csan) are in direct forward conflict, denoted 𝑆# 0 𝑆 ′ , if pre csan (𝑆) ∩ pre csan (𝑆 ′ ) ̸ = ∅.</p><p>• The conflict set of a syn-cycle 𝑆 ∈ syncycles(csan) enabled at a marking 𝑀 of csan is given as conflset csan (𝑀, 𝑆) = {𝑆} ∪ {𝑆 ′ ∈ enabled csan (𝑀 ) | 𝑆# 0 𝑆 ′ }.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Failures: Their definition, modelling and analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theoretical Aspects of Computing -ICTAC 2007, 4th International Colloquium</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Jones</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Z</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Woodcock</surname></persName>
		</editor>
		<meeting><address><addrLine>Macau, China</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">September 26-28, 2007. 2007</date>
			<biblScope unit="volume">4711</biblScope>
			<biblScope unit="page" from="260" to="274" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Structured occurrence nets: A formalism for aiding system failure prevention and analysis techniques</title>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundam. Inform</title>
		<imprint>
			<biblScope unit="volume">97</biblScope>
			<biblScope unit="page" from="41" to="91" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Visualisation and analysis of complex behaviours using structured occurrence nets</title>
		<author>
			<persName><forename type="first">B</forename><surname>Li</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Alharbi</surname></persName>
		</author>
		<title level="m">Analysing and visualizing big data sets of crime investigations using structured occurrence nets</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Modelling provenance using structured occurrence networks</title>
		<author>
			<persName><forename type="first">P</forename><surname>Missier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Provenance and Annotation of Data and Processes -4th International Provenance and Annotation Workshop, IPAW 2012</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Groth</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Frew</surname></persName>
		</editor>
		<meeting><address><addrLine>Santa Barbara, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">June 19-21, 2012. 2012</date>
			<biblScope unit="volume">7525</biblScope>
			<biblScope unit="page" from="183" to="197" />
		</imprint>
	</monogr>
	<note>Revised Selected Papers</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Time in structured occurrence nets</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bhattacharyya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<ptr target="org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Workshop on Petri Nets and Software Engineering 2016</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">L</forename><surname>Cabac</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Kristensen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Rölke</surname></persName>
		</editor>
		<meeting>the International Workshop on Petri Nets and Software Engineering 2016<address><addrLine>Toruń, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1591">June 20-21, 2016. 1591. 2016</date>
			<biblScope unit="page" from="35" to="55" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Verification of communication structured acyclic nets using SAT</title>
		<author>
			<persName><forename type="first">N</forename><surname>Almutairi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
		<ptr target="org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Workshop on Petri Nets and Software Engineering 2021</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Köhler-Bussmeier</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Kindler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Rölke</surname></persName>
		</editor>
		<meeting>the International Workshop on Petri Nets and Software Engineering 2021</meeting>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2021">2907. 2021</date>
			<biblScope unit="page" from="175" to="194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Structured occurrence nets: incomplete, contradictory and uncertain failure evidence</title>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>School of Computing Science, Newcastle University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Probabilistic graphical models: principles and techniques</title>
		<author>
			<persName><forename type="first">D</forename><surname>Koller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Friedman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>MIT press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Taming Confusion for Modeling and Implementing Probabilistic Concurrent Systems</title>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Katoen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Peled</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">7792</biblScope>
			<biblScope unit="page" from="411" to="430" />
			<date type="published" when="2013">2013</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Probabilistic event structures and domains</title>
		<author>
			<persName><forename type="first">D</forename><surname>Varacca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Völzer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Winskel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">358</biblScope>
			<biblScope unit="page" from="173" to="199" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">True-concurrency probabilistic models: Markov nets and a law of large numbers</title>
		<author>
			<persName><forename type="first">S</forename><surname>Abbes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Benveniste</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">390</biblScope>
			<biblScope unit="page" from="129" to="170" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Probabilistic Petri nets and Mazurkiewicz equivalence</title>
		<author>
			<persName><forename type="first">D</forename><surname>Varacca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nielsen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Concurrency and probability: Removing confusion, compositionally</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bruni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Melgratti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Montanari</surname></persName>
		</author>
		<idno>CoRR abs/1710.04570</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Confusion diagnosis and avoidance of discrete event systems using supervisory control</title>
		<author>
			<persName><forename type="first">X</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Ahmari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E.-T</forename><forename type="middle">A M</forename></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Abouel</surname></persName>
		</author>
		<author>
			<persName><surname>Nasr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEJ Transactions on Electrical and Electronic Engineering</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>/a-n/a</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Confusion avoidance for discrete event systems by P/E constraints and supervisory control</title>
		<author>
			<persName><forename type="first">X</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Al-Ahmari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>El-Tamimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">S</forename><surname>Abouel Nasr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IMA Journal of Mathematical Control and Information</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="309" to="332" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Non-Deterministic Generalised Stochastic Petri Nets Modelling and Analysis</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Bamberg</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Confusion avoidance for discrete event systems by P/E constraints and supervisory control</title>
		<author>
			<persName><forename type="first">X</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Al-Ahmari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>El-Tamimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">S</forename><surname>Abouel Nasr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IMA Journal of Mathematical Control and Information</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="309" to="332" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Free Choice Petri Nets</title>
		<author>
			<persName><forename type="first">J</forename><surname>Desel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Esparza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Cambridge Tracts in Theoretical Science</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<date type="published" when="1995">1995</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Regions of Petri nets with a/sync connections</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kleijn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pietkiewicz-Koutny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">454</biblScope>
			<biblScope unit="page" from="189" to="198" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
