<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Deciding Reachability and Coverability in Lossy EOS</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francesco Di Cosmo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Soumodev Mal</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tephilla Prince</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Chennai Mathematical Institute</institution>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Free University of Bozen-Bolzano</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>IIT Dharwad</institution>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>74</fpage>
      <lpage>95</lpage>
      <abstract>
        <p>Elementary Object Systems (EOSs) are a representative of the nets-within-nets paradigm, where the places of a system Petri Net (PN) can also host object nets in place of standard black tokens. Recently, EOSs were put forward to naturally capture the notion of break-downs, under the let-it-crash approach, even when lacking any extra domain knowledge: break-downs can afect only the computational units modeled by object nets. The break-downs are represented by removing all tokens from the internal markings of the object nets, so as to enforce a deadlock. In this setting, one can check whether a property is robust, i.e., if it holds even in front of at most a given number of break-downs (possibly infinitely many). The approach of induced deadlocks is reminiscent of lossy Petri Nets, where some token (possibly all) may be non-deterministically lost. The partial loss of a marking can be seen as a more ifne-grained variant of break-down, where the EOS components partially degrade. However, checking the decidability of reachability/coverability for EOSs with lossy steps has not been charted yet. In this paper, we fully chart the decidability status of reachability and coverability in front of various forms of lossiness: only at the object net level, only at the system net level, or at both. We do that for both EOSs and the fragment of conservative EOSs. Our results show that almost all the studied problems are undecidable. The only decidable cases regard conservative EOSs in front of any given positive number of losses and EOSs in front of arbitrarily many losses, both at the system and object net level. The latter result is especially interesting, since finitely many losses still result in undecidability.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Nets-within-nets</kwd>
        <kwd>Coverability</kwd>
        <kwd>Reachability</kwd>
        <kwd>Elementary Object Systems</kwd>
        <kwd>Robustness</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Imperfections are natural in the context of message passing systems: imperfect communication
channels may spontaneously lose, duplicate, or shufle carried messages or even deliver new
unwanted ones. When compared to their perfect counterpart, verification of imperfect systems
is usually easier. For example, reachability in Communicating Finite Automata (CFA) over
perfect (FIFO) channels is undecidable [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], but it is decidable when the channels are lossy [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
(messages may be non-deterministically lost and never delivered) or unordered [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] (the message
sending and reception order may be diferent). The same principle generally holds even outside
CFA. Specifically, two counter machines can encode Turing Machines [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] and sufer from
undecidable reachability. Instead, Mayr [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ] showed that if lossiness is applied to the counters
(the natural numbers stored in the counters may non-deterministically decrease), then
reachability becomes decidable; nevertheless, several other problems remain undecidable. Similar results
are also available for Petri Nets (PNs): Bouajjani and Mayr [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] studied the impact of lossiness on
the model checking problem of Vector Addition Systems with States (VASS, equivalent to Petri
Nets) against fragments of the Modal  -Calculus. In this case, while the EF (and EG) fragment
of the UB language (which includes negation and labeled variants of the CTL next operator) is
undecidable for VASS [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], it is decidable for lossy VASS.
      </p>
      <p>
        Imperfections may be naturally interpreted as perturbations of the system configurations
and, thus, vericfiation of imperfect systems can be studied under the lens of robustness [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ],
i.e., checking whether a property holds if at most  perturbations occur, for some given  ď |N|.
Recently, Köhler-Bussmeier and Capra [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] put forward the nets-within-nets paradigm [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to
naturally specify robustness properties in a Multi Agent System (MAS) context. Specifically,
in the PN setting, black tokens that mark a fixed set of places are moved around by a fixed set
of transitions. In contrast, in nets-within-nets, the tokens could additionally be PN objects
themselves. Thus, even without further expert information on the net design, these object
tokens naturally model agents, which might be afected by perturbations. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], perturbations
follow a drastic let it crash approach, causing agent break-downs. Technically, this is achieved
by enforcing a deadlock in the object token. However, nets-within-nets with less disruptive
perturbations may still be suitable to model perturbed MAS, where the agents may sufer
imperfections even without completely breaking down.
      </p>
      <p>
        In this paper, we lay the foundations for our ongoing project on formal verification of
imperfect nets-within-nets. We focus on Elementary Object Systems (EOSs) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], which are a
simple nets-within-nets model, yet featuring most of the important ingredients. Moreover, they
can be generalized to more sophisticated models, such as full-fledged Object Systems [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This
makes EOSs an excellent candidate for our study. Our key contributions are:
1. We formally define three forms of lossiness in the EOS setting, corresponding to the
nesting levels of the tokens.
2. We provide examples illustrating the relevance of these lossiness relations and formalize
lossy reachability/coverability problems on them.
      </p>
      <p>
        3. We completely chart the decidability status of these problems (see Tab. 1).
Standard reachability/coverability problems have been studied in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], but only in a perfect
setting, i.e., without lossiness. Preliminary results on EOS robustness were put forward in
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. However, they do not address the problem of perturbations on reachability/coverability
in a systematic way. To the best of our knowledge, ours is the first work that attempts a full
formal classification of EOS reachability/coverability with lossy perturbations. As discussed
above, the concept of lossiness is well established in the PN literature; the most relevant works
are [
        <xref ref-type="bibr" rid="ref14 ref7 ref8">8, 7, 14</xref>
        ]. However, their approach uniformly interleaves each standard step with lossiness
and, thus, does not properly address robustness, where also the number of lossy events is of
interest. Moreover, when compared to PNs, EOSs ofer more room for lossiness because of the
nesting of tokens. This may significantly complicate the picture. Instead, we consider the full
spectrum of lossiness, from one occurrence to infinitely many, at all nesting levels.
      </p>
      <p>The paper outline is as follows. Preliminaries, including EOSs, are in Sec. 2. Lossy EOS
relations and problems are in Sec. 3. In Sec. 4 and Sec. 5 we study theoretical aspects of lossy
reachability/coverability problems. In Sec. 6, Sec. 7, and Sec. 8, we prove several
decidability/undecidability results for reachability/coverability. We draw our conclusions in Sec. 9.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <sec id="sec-2-1">
        <title>2.1. Binary Relations</title>
        <p>Let us fix some notation for binary relations. Given a set , the identity relation id  on  is
the relation tp, q P 2 |  P u. Given a binary relation ă on , we denote its reflexive
closure ă Yid  by ď and its anti-reflexive part ă zid  by ň. We use the symbol ą to denote
the relation such that,  ą  if  ă . For example, if ă is transitive, then ď and ě are
transitive and reflexive (i.e., quasi orders). The same applies to the symbols ă and ą and their
closures. From now on, we use ă to denote arbitrary transitive relations, and ă (possibly with
a subscript) to represent fixed transitive relations, e.g., the standard order of N.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Multisets</title>
        <p>A multiset  on a set  is a mapping  :  Ñ N. The support of  is the set Supppq “ t |
pq ą 0u. The multiset  is finite if its Supppq is finite. The family of all multisets over 
is denoted by ‘. We denote a finite multiset  by enumerating the elements  P Supppq
exactly pq times in between tt and uu, where the ordering is irrelevant. For example, the
ifnite multiset  : t, u ÝÑ N such that pq “ 1 and pq “ 2 is denoted by tt, , uu.
The empty multiset ttuu (with empty support) is also denoted by H. On the empty domain
 “ H the only defined multiset is H; to stress this out we denote this special case, i.e., the
empty multiset over the empty domain, by . Given two multisets 1 and 2 on , we
define 1 ` 2 and 1 ´ 2 on  as follows: p1 ` 2qpq “ 1pq ` 2pq and
p1 ´ 2qpq “ p1pq ´ 2pq, 0q. Similarly, for a finite set  of indices, řP ttuu
denotes the multiset  over ŤP tu such that pq “ |t P  |  “ u| for each  P .
With a slight abuse of notation, we omit the double brackets, i.e., řP ttuu “ řP . If
 “ t1, . . . , u, then řP  “ ř“1 . Finally, we write 1 Ď 2 if, for each  P , we
have 1pq ď 2pq.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Petri Nets</title>
        <p>
          We assume that the reader is familiar with standard PNs. Here we just fix the notation (see,
e.g., [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]). We denote a PN  as a tuple  “ p, ,  q, where  is a finite place set,  is a
ifnite transition set, and  is a flow function. Where useful, we equivalently interpret  via the
functions pre :  Ñ p Ñ Nq where pre pqpq “  p, q and post :  Ñ p Ñ Nq
where post pqpq “  p, q. For example, a transition  P  is enabled on a marking  (finite
multiset of places) if, for each place  P  , we have pre pqpq ď  pq. Its firing results in the
marking  1 such that  1pq “  pq ´ pre pqpq ` post pqpq, for each  P  . We denote
markings according to multiset notation. For example, the marking  that places one token on
place  and two on place  is denoted by tt, , uu. The empty marking is denoted by H. We
also work with the special empty PN ■ “ pH, H, Hq, whose only marking is .
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Elementary Object Systems</title>
        <p>
          An EOS [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] is, intuitively, a PN (called system net) whose tokens carry an internal PN (called
object net), taken from a finite set  . Each place can host only one fixed type of internal PN.
The EOS fires events, which synchronize a transition  in the system net and multisets  p q of
transitions in the object nets  consumed by  .
        </p>
        <p>Definition 1 (EOS). An EOS E is a tuple E “ x^ ,  , , Θy where:
1. ^ “ x^ , ^ , ^ y is a PN called system net; ^ contains a special set ^ “ t |  P
 u Ď ^ of idle transitions such that, for each distinct ,  P ^ , we have ^ p, q “
^
^ p, q “ 1 and ^ p, q “ ^ p, q “ 0.
2.  is a finite set of PNs, called object PNs, such that ■ P  and if
p1, 1, 1q, p2, 2, 2q P  Y ^ ,1 then 1 X 2 “ H and 1 X 2 “ H.
3.  : ^ Ñ  is called the typing function.
4. Θ is a finite set of events where each event is a pair p^,  q, where ^ P ^ and  :  Ñ
Ťp,, qP  ‘, such that  pp, ,  qq P  ‘ for each p, ,  q P  and, if ^ “ ,
then  ppqq ‰ H.</p>
        <p>Since the nets in  are disjoint, we can denote each event x^,  y, as a pair x^,  y for a
multiset  over Ťp,, qP  such that  pq “  p qpq where  “ p, ,  q P  and
 P  . EOS tokens are nested, i.e., each token at a system place  carries a PN marking  for the
object net pq. EOS markings, also called nested markings, are multisets of nested tokens. With
a slight abuse of notation, we denote markings omitting double curly brackets from multiset
notation.</p>
        <p>Definition 2 (Nested Markings). Let E “ x^ ,  , , Θy be an EOS. The set of nested tokens
 pEq of E is the set Ťp,, qP p´1p, ,  q ˆ  ‘q. The set of nested markings ℳpEq of E
is  pEq‘. Given ,  P ℳpEq, we say that  is a sub-marking of  if  Ď  .</p>
        <p>Note that  is a sub-marking of  if there is some nested marking  1 such that  “  `  1.
EOSs inherit the graphical representation of PNs with the provision that we represent nested
tokens via a dashed line from the system net place to an instance of the object net where the
internal marking is represented in the standard PN way. However, if the nested token is x, y
for a system net place  of type ■ , we represent it with a black-token ■ on . If a place  hosts
 ą 2 black-tokens, then we represent them by writing  on . Each event x^,  y is depicted by
labeling ^ by x y (possibly omitting double curly brackets). If there are several events involving
^, then ^ has several labels.</p>
        <p>Example 1. Fig. 1 depicts the system net ^ (the idle transitions are omitted) and object net
drone of an EOS E “ x^ ,  , , Θy modeling a drone that (1) moves between a base and a field,
(2) has two batteries, (3) consumes one charge-unit per battery per movement, and (4) charges
its batteries by multiples of two charge-units when at base. Technically,  “ tdrone, ■ u
(even if ■ is unused), pbaseq “ pfieldq “ drone, and Θ synchronizes takeOff and land
(respectively charge) in ^ with move (charge1 and charge2) in drone. Formally, Θ “
txtakeOff, ttmoveuuy, xland, ttmoveuuy, xcharge, ttcharge1uuy, xcharge, ttcharge2uuyu.
1This way, the system net and the object nets are pairwise distinct.
t
en charge
tseym ^xcharge1yxcharge2y
S
base takeOf xmovey field
land xmovey</p>
        <p>The marking  “ xdrone, ttbatt1, batt1uuy represents a single partially charged drone at
base, with two charge units in the first battery.</p>
        <p>When firing an event x,  y, nested tokens in the system net are consumed according to the
preconditions of  in the standard PN way. At the same time, for each object net  , the inner
tokens are merged so as to obtain a PN marking  p q for  (possibly empty). Then, transitions
in  p q are fired in the standard PN way obtaining markings  1p q. Next, nested markings
with empty inner markings are produced in the system net according to the postconditions of
 . Finally, the markings  1p q are non-deterministically distributed among the empty nested
tokens, according to the typing function. To be fired, the event must be enabled at both the
system and at the object net level. This is captured by the enabledness condition, which makes
use of projection operators at the system (Π1) and at the object net level (Π2 for each  P  ).
Definition 3 (Projection Operators). Let E be an EOS x^ ,  , , Θy. The projection operators
Π1 maps each nested marking  “ řP x^, y for E to the PN marking řP ^ for ^ . Given
an object net  P  , the projection operators Π2 maps each nested marking  “ řP x^, y
for E to the PN marking řP  for  where  “ t P  | p^q “  u.</p>
        <p>To define the enabledness condition, we need the following notation. We set pre p p qq “
řP pre pq where pqP is an enumeration of  p q counting multiplicities. We analogously
set post p p qq “ řP post pq.</p>
        <p>Definition 4 (Enabledness Condition). Let E be an EOS x^ ,  , , Θy. Given an event  “
x^,  y P Θ and two markings ,  P ℳpEq, the enabledness condition Φpx^,  y, ,  q holds if
Π1p q “ pre^ p^q ^ Π1p q “ post^ p^q ^ @ P  , Π2 p q ě pre p p qq ^
@ P  , Π2 p q “ Π2 p q ´ pre p p qq ` post p p qq
results in the step  ÝpÝ,Ý, ÝÑq  ´  `  .</p>
        <p>The event  is enabled with mode p,  q on a marking  if Φp, ,  q holds and  Ď  . Its firing
Example 2. In the setting of the EOS E and marking  in Ex. 1 (Fig. 1), the event
xcharge, ttcharge1uuy is enabled on  “ xbase, ttbatt1, batt1uuy with mode p,  q where
 “  and  “ xbase, ttbatt1, batt1, batt1, batt1uuy. Since  “  , its firing results in the
step  ÝxÝ,Ý, ÝÑy  . Instead, the event xcharge, ttcharge2uuy is enabled on  with mode p,  1q
where  1 “ xbase, ttbatt1, batt1, batt2, batt2uuy. Its firing results in the step  ÝxÝ,Ý,ÝÑ1y  1.
These are the only enabling modes for xcharge, ttcharge1uuy and xcharge, ttcharge2uuy
on  . No other event is enabled on  , irrespective of the mode.</p>
        <p>
          The reachability problem for EOSs is defined in the usual way, i.e., whether there is a run
(sequence of event firings) from an initial marking  0 to a target marking   . Also coverability
definition is standard, but with respect to the order
ď (denoted by ĺ in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]; see Def. 6 below)
that allows one to add both (1) tokens in the inner markings of available nested tokens (2) or
nested tokens with some internal marking on the system net places. It is known that both these
problems are undecidable (Th. 4.3 in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. However, coverability is decidable on the fragment of
conservative EOSs (cEOSs; Th. 5.2 in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]), where, for each system net transition , if  consumes
a nested token on a place of type  , then it also produces at least one token on a place of the
same type  . Nevertheless, reachability remains undecidable (Th. 5.5 in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]).
Definition 5 (cEOS). A cEOS is an EOS E “ x^ ,  , , Θy with ^ “ x^ , ^ , ^ y where, for all
 P ^ and ^ P Suppppre^ pqq, there exists ^1 P Suppppost^ pqq such that p^q “ p^1q.
^ ^ ^
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Problem</title>
      <p>We study reachability and coverability of EOSs (cEOSs) afected by several forms of lossiness.
First, we define three lossiness relations and show their relevance. Second, we formally define
the problem we study in the following sections.</p>
      <sec id="sec-3-1">
        <title>3.1. Lossy EOSs</title>
        <p>We study EOSs (cEOSs) afected by lossiness, where nested markings may non-deterministically
lose their tokens according to a quasi order, called lossiness relation. Lossiness can occur (1) at
the object level, if lossiness removes only tokens from the inner markings of nested tokens,
(2) at the system level, if lossiness removes whole nested tokens only, and (3) at both levels
(the full EOS), if both whole nested tokens and/or regular tokens from the remaining nested
(object-lossiness), ď (system-lossiness), and ď (full-lossiness) as defined next.
tokens are removed. These levels are captured, respectively, by the lossiness quasi orders ď</p>
        <sec id="sec-3-1-1">
          <title>Definition 6.</title>
          <p>Given an EOS E and two nested markings  and  1 for E, we have (1) 
there is some nested marking  2 such that  ď  2 ď  1.</p>
          <p>ř</p>
          <p>“ ř
 Ď  1 or, equivalently, there is some  2 such that  1 “  `  2, (2) 
ď  1 if we can write
P x^, y and  1 “
P x^, 1y and, for each  P ,  Ď 1, and (3)  ď  1 if
ď  1 if
Example 3. Consider the marking 
ing 1 or 2 charge units we obtain the markings  1
“ xbase, ttbatt1, batt1uuy in Ex. 1. By
remov“
xbase, ttbatt1uuy and  2 “
xbase, Hy.</p>
          <p>By adding to  a discharged token at place field, we obtain the  1 “
xbase, ttbatt1, batt1uuy ` xfield, Hy. By removing the drone from  , we obtain  2 “ H.
We have, among the others,  1 ě  ,</p>
          <p>ě  1 ě  2,  1 ě  ,  1 ě  2, and  1 ě  2.</p>
          <p>
            The relation ď coincides with ĺ in [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. Moreover, the order of ď and ď is irrelevant in
ď definition (Rem. 1 below). An EOS (cEOS) sufering from object-, system-, or full-lossiness
is called, respectively, object-, system-, or full-lossy EOS (cEOS) or, simply lossy EOS (cEOS).
          </p>
          <p>These lossiness relations are relevant to model non-deterministic phenomena not directly
captured by the EOS. For example, in the context of Ex. 1, object-lossiness results in the
nondeterministic loss of tokens at places batt1 and batt2, which models the partial/total discharge
charge2
‚
discharging2</p>
          <p>
            charge1
charging1
discharging1
charging0
charge0
‚
of drone batteries because of non-modeled drone movements within the base or the field, or
because of other unexpected phenomena. In a slightly more complex EOS, with intermediate
places capturing the flight from base to field and vice-versa, object-lossiness captures also
the non-deterministic usage of extra charge-units because of contingencies like strong winds.
Instead, system lossiness results in the loss of nested tokens modeling drones. This captures the
loss of drones because of, e.g., break-downs, wrong flight paths, or seizure from higher priority
processes (assuming the EOS is a module in a more complex system). Full-lossiness capture both
aspects. Similar interpretations can be given each time the (nested) tokens represent resources,
like charge-units or drones in Ex. 1. These scenarios are common in the literature (see, e.g.,
water- and fire-units in [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ] and raw-resources in production plants in [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]).
          </p>
          <p>
            Lossy EOSs are relevant also to capture partial/total internal break-downs. This happens,
e.g., when the tokens model resource containers instead of resources themselves. For example,
after modifying the drone object net into the object net drone2 in Fig. 2,2 each regular token
represents a battery with bounded capacity. Its charge level is captured by its position in the
object net. Consequently, object-lossiness represents the break-down of internal components,
in this case the battery. The loss of all batteries results in drone deadlock (cf. [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ]). This case is
analogous to the application of system-lossiness discussed above, since drones can be seen as
internal components of a higher level process (captured by the whole EOS): the loss/break-down
of all drones results in system deadlock. More in general, this interpretation applies when the
EOS uses conservative system and/or object nets.3 Also these scenario are common in the
literature (see, e.g., the finite control of robots [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ], the internal state of fire-fighters in [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], and
customers and cars in [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ]).
          </p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Lossy-reachability/coverability</title>
        <p>We study the problem of ℓ-reachability/coverability, i.e., whether a target nested marking can be
reached/covered from an initial one via a run sufering at most ℓ lossy steps, where ℓ P N Y tu.4
These problems are relevant to study EOS robustness in front of losses/break-downs.
Definition 7. Given a transition system TS “ p, Ñq, a transitive relation ă on  , and an
ℓ P N Y tu, a pă, ℓq-run in TS is a run whose steps are labeled either by Ñ, called standard
steps, or by ą, called ă-lossy or lossy steps, and at most ℓ steps are lossy. The set of pă, ℓq-runs
2Also the events have to be modified accordingly, i.e., for each  P t0, 1, 2u, by synchronizing takeOff and
landing with discharge n object net transitions, and charge with the charge n object net transitions.
3A PN is conservative when each transition consumes and produces the same number of tokens.
4Recall that  is the first limit ordinal, whose cardinality is |N|, i.e., the same as N.
from  0 is denoted by Runsℓpă,  0q. A pă, ℓq-run is called ℓ1-strong if it contains exactly ℓ1
lossy steps.</p>
        <p>The definition also applies to reflexive or anti-reflexive transitive relations, i.e., we can also
talk about pĺ, ℓq-runs and pň, ℓq-runs. We denote a labeled step from  to  1 by  ⇝  1.
To stress that the step is labeled by Ñ or by ă, we denote it by  Ñ  1 or by  ą  1,
respectively. Whenever we have a lossy run  from  to  1, we write  ⇝   1. The pă,
ℓqreachability/coverability problems ask whether a target can be reached/covered under ă from
an initial configuration with at most ℓ ă-lossy steps.</p>
        <p>Definition 8 (pă, ℓq-reachability/coverability for EOSs (cEOSs)). Let ℓ P N Y tu.
Input: An EOS (cEOS) , an initial marking  0 and a target marking  1 for .
Output of reachability: Is there a run  P Runsℓpă,  0q such that  0 ⇝   1?
Output of coverability: Is there a run  P Runsℓpă,  0q such that  0 ⇝   ě  1 for some  ?</p>
        <p>We call these problems lossy-problems. A ă-lossy-problem is a lossy-problem under ă. The
degree of a pă, ℓq-reachability/coverability problem is ℓ. If ℓ “ 0 we obtain standard
reachability/coverability, i.e., over perfect runs. Our objective is to fully chart the decidability status of
the lossy-problems for ď , ď, and ď. Previous results for EOSs are available only for ℓ “ 0
and the relation ď . Consequently, they do not inform us on the status of the other (proper)
lossy-problems, whose study still requires a careful and in-depth analysis.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Coincident Problems</title>
      <p>The well known notion of compatibility from WSTS has a strong impact on ℓ-reachability
problems. In fact, we now show that all these problems, for ℓ ě 1 (including ) and any quasi
order ĺ, collapse to pĺ, 0q-coverability if and only if the lossiness relation is compatible.
Lemma 1. Each yes-instance of pĺ, ℓq-reachability is also a yes instance of pĺ, ℓq-coverability.
Proof. Immediate consequence of reflexivity of the quasi order ĺ.</p>
      <p>Lemma 2. Each yes-instance of pĺ, ℓq-coverability is also a yes instance of pĺ, ℓ`1q-reachability,
if ℓ is finite, and a yes-instance of pĺ, q-reachability, if ℓ “ .</p>
      <p>Proof. If  1 is coverable from  0, then there is a pĺ, ℓq-run  from  0 to  and  ľ  1. Take the
run  1 as the run  followed by the lossy step  ľ  1. Thus,  1 reaches  1 from  0. Moreover,
if ℓ is finite, then  1 is a pĺ, ℓ ` 1q-run and, otherwise,  1 is a pĺ, q-run.</p>
      <p>Corollary 1. pĺ, q-reachability and pĺ, q-coverability coincide.</p>
      <p>
        Note that Cor. 1 is consistent with other lossy PN models (see, e.g., [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]).
      </p>
      <p>Lemma 3. Each yes-instance of pĺ, ℓq-reachability or pĺ, ℓq-coverability is also a yes instance
of pĺ, q-reachability or pĺ, q-coverability, respectively.</p>
      <p>Proof. Immediate consequence of the fact that each pĺ, ℓq-run is also a pĺ, q-run.</p>
      <p>Summarising, for each quasi order ĺ, the ĺ-lossy-problems form a hierarchy ordered
according to inclusion of the yes-instance sets. For each  P N, the -th hierarchy level for ĺ is the
pĺ, {2q-reachability problem, if  is even, and the pĺ, p ´ 1q{2q-coverability problem, if  is odd.
We say that the hierarchy collapses if all the pĺ, ℓq-reachability and pĺ, ℓq-coverability problems
with ℓ ě 1 coincide with (standard) pĺ, 0q-coverability or, equivalently, if the yes-instances of
pĺ, q-reachability are also yes-instances of pĺ, 0q-coverability. The next lemma states that
this latter property is equivalent to compatibility, that is, if  1 ľ  2 Ñ  3, then there is a  4
such that  1 Ñ˚  4 ľ  3.</p>
      <p>Lemma 4. ĺ is compatible if each yes-instance of pĺ, q-reachability is also a yes-instance of
pĺ, 0q-coverability.</p>
      <p>Proof. Assume that ĺ is compatible. If 1 is reachable from 0 via an -run  , then, without
loss of generality, we can assume that  is finite and, thus, it is a ℓ-run for some finite ℓ. By
compatibility, we can push, one by one, the finitely many lossy steps in  at the end of the run,
obtaining an ℓ-run  1 (possibly with diferent length) where all lossy steps occur at the end, i.e.,
 1 is of the form 0 Ñ˚ 1 ľ 2 ¨ ¨ ¨ ľ ℓ ľ 1. By transitivity of ľ, there is also a run  2 of
the form 0 Ñ˚ 1 ľ 1, which witness that 1 is ĺ-coverable from 0. Vice-versa, assume
that each yes-instance of pĺ, q-reachability is also a yes-instance of pĺ, 0q-coverability. If
0 ľ 1 Ñ 2, then 2 is pĺ, 1q-reachable from 0, as well as pĺ, q-reachable. Thus, 2 is also
coverable from 0, i.e., 0 Ñ˚ 1 ľ 2.</p>
      <p>Corollary 2. The hierarchy of lossy-problems induced by ĺ collapses if ĺ is compatible.</p>
      <p>
        Note that Cor. 2 can be generalized to other lossy models, since its proof does not take
advantage of the technical details of lossy EOSs, but relies only on a compatible quasi order.
This fact has some immediate consequence on the lossy-problems we are studying. In fact, it
is known that ď is strong compatible on cEOSs, that is, if  1 ě  2 ÝxÝ,Ý, ÝÑy  3, then there is
some  4 such that  1 ÝxÝ,Ý, ÝÑy  4 (Lemma 5.1 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]). Thus, the hierarchy for full-lossy cEOSs
collapses. Note that ď is not compatible over EOSs. This helps to prove the undecidability of
reachability and coverability over them (cf. Th.4.3 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]). Since pď , 0q-coverability for cEOSs
is decidable (Th. 5.2 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]), we obtain the following theorem.
      </p>
      <p>Theorem 1. For ℓ ě 1, pď , ℓq-reachability and pď , ℓq-coverability for cEOSs are decidable.</p>
      <p>Instead ď is compatible for both EOSs and cEOSs, as shown next.</p>
      <p>Lemma 5. If p,  q enables the event  on  and  1 ě  , then p,  q enables the event  also on
 1.</p>
      <p>Proof. If p,  q enables the event  on  , then the enabledness formula Φp, ,  q holds and
 ď  . Since  ď  1, by transitivity of ď, we have that  ď  1. Thus, p,  q enables  on
 1.</p>
      <p>Lemma 6. ď is strong compatible on EOSs.
 1
ě

 2 ` Δp 3qě 2</p>
      <p>Proof. If  1 ě  2 ÝxÝ,Ý, ÝÑy  3, then  ď  2,  3 “  2 ´  `  , and there is some Δp 2q such
that  1 “  2 ` Δp 2q. Moreover, since p,  q enables  on  2, then, by Lemma 5, p,  q enables
 on  1. Thus, there is a  4 such that  1 ÝxÝ,Ý, ÝÑy  4. Moreover, by EOS semantics and the fact
that  ď  2, we have that  4 “  1 ´  `  “  2 ` Δp 2q ´  `  ě  2 ´  `  “  3.
Theorem 2. The hierarchies for system-lossy EOSs and system-lossy cEOSs collapse.</p>
      <p>Thus, the study of system-lossiness on EOSs and cEOSs boils down to pď, 0q-coverability
for EOSs and cEOSs (we study them in Th. 6 below). Finally, we show that ď is compatible on
cEOSs. The following preliminary remarks can be easily proved.</p>
      <p>Remark 1. ď “ď ˝ ď“ď ˝ ď.</p>
      <p>Remark 2. Π1p 1q ` Π1p 2q “ Π1p 1 `  2q. If  1 ď  2, then Π1p 1q “ Π1p 2q.
Lemma 7. ď is strong compatible on cEOSs.</p>
      <p>
        Proof. The proof is depicted in Fig. 3. If  1 ě  2 ÝxÝ,Ý, ÝÑy  3, then, since ďĎď and ď is
strong compatible on cEOSs (Th. 5.1 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]), there is some  4 such that  1 ÝxÝ,Ý, ÝÑy  4 ě  3.
Since ď “ď ˝ ď (Rem. 1), there is also some  14 such that  3 ď  14 ď  4. Thus, there
is some Δp 3q such that  14 “  3 ` Δp 3q and, by Rem. 2, we have Π1p 14q “ Π1p 4q.
Note that, by EOS semantics,  1 and  2 ` Δp 3q have respectively the predecessors  4 “
 1 ´  `  and  14 “  2 ` Δp 3q ´  `  . By some simple algebra,5 Π1p 1q “ Π1p 2 ` Δp 3qq.
However, again by Rem. 2, since  2 ď  1, we have Π1p 1q “ Π1p 2q and, summarising,
Π1p 2q ` Π1pΔp 3qq “ Π1p 2 ` Δp 3qq “ Π1p 1q “ Π1p 2q. Thus, Π1pΔp 3qq “ H.
Consequently, Δp 3q “ H and  4 ě  14 “  3 ` Δp 3q “  3.
      </p>
      <p>Theorem 3. The hierarchy for object-lossy cEOSs collapses.</p>
      <p>Thus, the study of object-lossiness on cEOSs boils down to pď, 0q-coverability (we study this
problem in Th. 5). Summarising, compatibility considerably simplifies the landscape of lossy
problems for lossy cEOSs and for system-lossy EOSs. Specifically, for cEOSs, the only relevant
problems are only the status of pď, 0q-coverability and of pď, 0q-coverability. Similarly, for
system-lossy EOSs, the only relevant question is the status of pď, 0q-coverability.
5Π1p 1q ` Π1p q ` Π1p q “ Π1p 1 ´  `  q “ Π1p 4q “ Π1p 14q “ Π1p 2 ` Δp 3q ´  `  q “ Π1p 2 `
Δp 3qq ´ Π1p q ` Π1p q.
count n Sy
e s
t</p>
      <p>t
^ em
with initial marking  0 “ ttx1, ttuuyuu.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Distinct Problems</title>
      <p>
        Unfortunately, compatibility does not hold for ď and ď on EOSs. This is the main fact
allowing the simulation of inhibitory nets via EOSs in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Thus, the hierarchies induced by
distinct. We make use of a gadget with a dedicated place that counts the lossy steps.
ď and ď do not collapse. In fact, we now show that all the problems in the hierarchy are
      </p>
      <sec id="sec-5-1">
        <title>Definition 9.</title>
        <p>1. ^ =p^ , ^ , ^ q where ^ “ t1, 2, count u, ^ “ t 1,  2u, ^ pq “ 1 if  P tp1,  1q,</p>
        <p>The lossiness-counter gadget  is the EOS p^ ,  , , Θq depicted in Fig. 4 where
p 1, count q, p 1, 2q, p2,  2q, p 2, count q, p 2, 1qu and ^ pq “ 0 otherwise,
2.  “ t1, 2u where 1 “ ptu, tinc1u, 1q, 1ptpinc1, quq “ 1, 1ptp, inc1quq,
2 “ ptu, tinc2u, 2uq, 2ptpinc2, quq “ 1, and 2ptp, inc12quq,
4. Θ “ tx 1, inc2y, x 2, inc1yu.
3. p1q “ 1, p2q “ 2, and pcount q “ ■ , and</p>
        <p>In what follows, we work with a fixed initial nested marking  0 “ x1, ttuuy of .</p>
        <sec id="sec-5-1-1">
          <title>5.1. Distinct Problems for Object-lossy EOSs</title>
          <p>We first study the case of object-lossiness.
from  0 in  if  is pň, ℓq-reachable from  0.</p>
          <p>Lemma 8. Let ă be a transitive relation. Given ℓ P N Y tu, we have that  is pĺ, ℓq-reachable
Proof. Each ň-lossy step  1 ŋ  2 can be interpreted as a ĺ-lossy step  1 ľ  2. Thus, each
pň, ℓq-run can be interpreted as a pĺ, ℓq-run. Similarly, each pĺ, ℓq-run that does not contain
reflexive</p>
          <p>lossy steps of the form 
maximal finite or infinite sub-run
ľ  can be interpreted as a pň, ℓq-run. Moreover, each

ľ 
ľ . . . 
ľ . . . of an arbitrary pĺ, ℓq-run  can be
substituted by a single occurrence of  , obtaining a pĺ, ℓq-run without reflexive lossy steps.
pň, ℓq-run from its initial nested-marking  0. This run has the form
Lemma 9. For each ℓ ě 0, the lossiness-counter gadget  exhibits a single maximal ℓ-strong
 0 ŋ  10 Ñ  1 ŋ  11 Ñ  2 ŋ . . .  ℓ´1 ŋ  1ℓ´1 Ñ  ℓ
where, for each  ď ℓ, we have   “ x, ttuuy ` xcount , y and  1 “ x`1, Hy ` xcount , y
where, for each  P N,  “ 1 and  “  if  is even and  “ 2 and  “  if  is odd.
Proof. By induction on ℓ. If ℓ “ 0, then, since  0 is a deadlock for Ñ, the run  0 of length 0 is
the only pň, ℓq-run. Moreover, 0 is even and  0 “ x1, ttuuy ` 0xcount, y.</p>
          <p>If the inductive hypothesis holds for an arbitrary even ℓ, then  ℓ “ x1, ttuuy ` ℓxcount , y
is a deadlock for Ñ. The only way to continue the run is by one ŋ step. However, the only
token that can be lost under ď is the token inside x1, ttuuy, thus, the only ď-successor of
 ℓ is  1ℓ “ x1, Hy ` ℓxcount , y. On  1ℓ there is no available ŋ step and the only enabled
event is p 1, inc2q with mode p,  q where  “ x1, Hy and  “ x2, ttuuy ` xcount , y. Its
ifring reaches  ℓ`1 “ x2, ttuuy ` pℓ ` 1qxcount , y. This configuration is a deadlock for Ñ
and the so obtained pň, ℓ ` 1q-run from  0 to  ℓ`1 already contains ℓ ` 1 ň-steps. Thus, this
run is maximal among the pň, ℓ ` 1q-runs.</p>
          <p>If the inductive hypothesis holds for an arbitrary odd ℓ, the same argument applies with the
provision that 1 and 2,  and , as well as p 1, inc2q and p 2, inc1q, have to be swapped.
Corollary 3. For each finite ℓ, the set of nested markings which are pď, ℓq-reachable from  0 is
t  |  P t0, . . . , ℓuu Y t 1 |  P t0, . . . , ℓ ´ 1uu where   and  1 are defined as in Lemma 9.</p>
          <p>Consequently, using the same notation as in Lem. 9, for each ℓ P N, we have that  1ℓ is
pď, ℓq-coverable but not pď, ℓq-reachable and  ℓ`1 is pď, ℓ ` 1q-reachable but not pď,
ℓqcoverable. Thus, the sequence of yes-instance sets of pď, ℓq-reachability/coverability problems
(recall Lem. 1 and Lem. 2) is a sequence of proper subsets. Consequently, for each finite ℓ,
all pď, ℓq-reachability/coverability problems are pairwise distinct. Moreover, while pď,
qreachability coincides with pď, q-coverability by Lem. 4, also pď, q-reachability is distinct
from pď, ℓq-reachability/coverability for each ℓ.6
Corollary 4. For each ℓ1 ă ℓ2 ď , we have that pď, ℓ1q-reachability, pď, ℓ1q-coverability,
pď, ℓ2q-reachability, and pď, ℓ2q-coverability are pair-wise distinct problems.</p>
        </sec>
        <sec id="sec-5-1-2">
          <title>5.2. Distinct Problems for Full-lossy EOSs</title>
          <p>A fact analogous to Cor. 4 applies also to ď . In fact, even if  exhibits more complex maximal
pň , ℓq-runs, we still need ℓ lossy steps to put ℓ tokens on count . We first show that if a marking
is reachable/coverable using ď -lossy steps, then it is also covered under ď by some marking
reachable via a run as in Lem. 9.</p>
          <p>Lemma 10. If  P Runsℓpď ,  0q and  0 ⇝   , then there is some  ě  and there is an
ℓ1-strong run  1 P Runsℓ1 pň,  0q such that  0 ⇝  1  , for some ℓ1 ď ℓ.</p>
          <p>Proof. Since ď “ď ˝ ď, we can expand each ď -lossy step in two subsequent ď- and
ďlossy steps. By compatibility of ď on EOSs (Lem. 7) and the fact that ď ˝ ď“ď ˝ ď (Rem. 1),
we can push all the ď-lossy steps at the end of the run, obtaining a run  1 P Runsℓpď,  0q
such that  0 ⇝  1  ě ¨ ¨ ¨ ě  , for some marking  . By transitivity of ď, we have  ě  .
6Otherwise, it would coincide also with pď, ℓ ` 1q-reachability/coverability. Thus, pď,
ℓqreachability/coverability and pď, ℓ ` 1q-reachability/coverability would coincide, which is a contradiction.
Moreover, we can drop the ď-lossy steps in  1 of the form  ě  for some  , obtaining an
ℓ1-strong run  2 P Runsℓ1 pň,  0q for some ℓ1 ď ℓ.</p>
          <p>We now show that also the sequence of yes-instance sets of ď -lossy reachability/coverability
problems (recall Lem. 1 and Lem. 2) is a sequence of proper subsets. We do that by using the
same markings  ℓ and  1ℓ defined in Lem. 9.</p>
          <p>Lemma 11. Using the notation in Lem. 9, for each finite ℓ P N, we have that  ℓ`1 is pď , ℓ `
1qreachable, but not pď , ℓq-coverable.</p>
          <p>Proof. By Lem. 9 we know that  ℓ`1 is pď, ℓ ` 1q-reachable and, thus, also pď , ℓ `
1qreachable. We now show that  ℓ`1 is not pď , ℓq-coverable. Assume by contradiction that
 ℓ`1 is pď , ℓq-coverable. Then, there is some run  P Runsℓpď ,  0q and a nested marking
 such that  0 ⇝   ě  ℓ`1. Since  ℓ`1 ě pℓ ` 1qxcount , y, also  ě pℓ ` 1qxcount , y.
Thus,  ě pℓ ` 1qxcount , y.7 By applying Lem. 10 on the run  , there is some nested marking
 1 ě  and, for some ℓ1 ď ℓ, a ℓ1-strong run  1 P Runsℓ1 pň,  0q such that  0 ⇝  1  1. Thus,
by Lem. 9, we have that either  1 “  ℓ1 or  1 “  1ℓ1´1 and, hence,  1 places at most ℓ1 black
tokens on count . However,  1 ě  ě ℓ ` 1xcount , y, i.e.,  1 puts at least ℓ ` 1 tokens on
count even if ℓ1 ď ℓ ă ℓ ` 1, which is a contradiction.</p>
          <p>Lemma 12. Using the notation in Lem. 9, for each finite ℓ P N, we have that  1ℓ`1 is pď ,
ℓqcoverable, but not pď , ℓq-reachable.</p>
          <p>Proof. By Lem. 9 we know that  1ℓ`1 is pď, ℓq-coverable and, thus, also pď , ℓq-coverable. We
now show that  1ℓ`1 is not pď , ℓq-reachable. Assume by contradiction that  1ℓ`1 is pď ,
ℓqreachable. Then, there is some run  P Runsℓpď ,  0q such that  0 ⇝   1ℓ`1. By applying
Lem. 10 on the run  , there is some nested marking  ě  1ℓ`1 and, for some ℓ1 ď ℓ, a ℓ1-strong
run  1 P Runsℓ1 pň,  0q such that  0 ⇝  1  . Since  ě  1ℓ`1 ě pℓ ` 1qxcount , y, we have
that  puts at least ℓ ` 1 tokens on count . However, by Lem. 9, we have that either  “  ℓ1 or
 “  1ℓ1´1. Hence,  puts at most ℓ1 ď ℓ ă ℓ ` 1 tokens on count , which is a contradiction.
Corollary 5. For each ℓ1 ă ℓ2 ď , we have that pď , ℓ1q-reachability, pď , ℓ1q-coverability,
pď , ℓ2q-reachability, and pď , ℓ2q-coverability are pair-wise distinct problems.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Undecidability for object- and system-lossy cEOSs</title>
      <p>
        We now study the decidability status of pď, 0q-coverability and pď, 0q-coverability for cEOSs.
In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], reachability for cEOSs is proved undecidable via a reduction from reachability of 2CMs.
We provide a variant of that reduction that reduces reachability of 2CMs to ď-coverability and
to ď-coverability of cEOSs. This proves that both coverability problems are undecidable. By
Th. 3 and Th. 2, all ℓ-reachability problems for object-lossy and system-lossy cEOSs are, thus,
undecidable. Since cEOSs are a special case of EOSs, undecidability applies also to object-lossy
and system-lossy EOSs.
7In fact,  ě pℓ ` 1qxcount, y implies that there is some  such that  ě  ě pℓ ` 1qxcount, y; since the
latter marking only places black tokens at the system net level,  is obtained by adding zero tokens at the object
net level, i.e.,  “ pℓ ` 1qxcount, y. Hence  ě pℓ ` 1qxcount, y.
inc  dec
      </p>
      <p>inc  dec


(c)
1
2
next

■
1</p>
      <sec id="sec-6-1">
        <title>6.1. Reduction to Reachability</title>
        <p>We show a reduction from reachability of a target configuration p , 1, 2q of any 2CM
 “ p, ,  0q with increment, decrement, and zero-check instructions to reachability of a
cEOS E.</p>
        <p>Definition 10. Given a 2CM  “ p, ,  0q, we define the EOS E “ p^ ,  , , Θq where
1. ^ “ p^ , ^ , ^ q is such that:
• ^ contains , a place , a place next for each instruction  P  , and two places 
and 1 for each counter cnt  ;
• ^ contains two transitions 1 and 2 for each instruction  P  ;
• For each increment (resp., decrement, zero-check) instruction  P  , ^ captures the
pre- and post-conditions depicted in Fig. 5a (Fig. 5b, Fig. 5c).
2.  contains the net ■ and a single net  “ p, ,  q where  “ tu,  “ tinc , decN u,
 pinc , q “  p, dec q “ 1, and  p, inc q “  pdec , q “ 0.
3. p1q “ p2q “ pq “  and pq “ ■ for each other place  P ^ zt1, 2, u.
4. The synchronization structure Θ contains the events
• 1 “ p , ttinc uuq and 2 “ p , Hq for each increment instruction .</p>
        <p>1 2
• 1 “ p , ttdec uuq and 2 “ p , Hq for each decrement instruction .</p>
        <p>1 2
• 1 “ p1 , Hq and 2 “ p2 , Hq for each zero-check instruction .</p>
        <p>Note that E is a cEOS. It weakly simulates the increment and decrement instructions of 
and performs zero-guesses in place of zero-check instructions. These guesses may be wrong
but leave behind them two irreversible evidences: tokens in the internal marking of the object
net at  and non-matching numbers of tokens on the place  and in the object net on 1 , for
some  P t0, 1u. The former can be detected by pď, 0q-coverability; the latter can be detected
by pď, 0q-coverability. We make these notions precise.</p>
        <p>Definition 11. We say that a nested marking  for E is legal if it places exactly one
objecttoken  at 0, 1, and , exactly one ■ on exactly one place  P , and no token on any place
in ^ zt10, 11, u. If  is legal, we denote
1. by r s1 the number of black tokens placed at 1 ,
2. by r s the number of black-tokens in the object-token at  ,
3. by r s the number of black-tokens in the object-token at , and
4. by r s the place  P  marked by  with a black-token.
Moreover, we say that  :
1. is broken at (counter)  if r s ‰ r s1 , sub-broken at  if r s ă r s1 , broken at  if
r s ‰ 0,
2. is broken if it is broken at 0, at 1, or at ,
3. encodes the 2CM configuration  “ p, 0, 1q, denoted by  “ xy, if  is non-broken
and c=pr s, r s0, r s1q.</p>
        <p>The following lemma is a direct consequence of the pre- and post-conditions of the transitions
in E, the shape of its synchronization structure Θ, the EOS semantics, and Def. 10. Its proof
consists in simple, yet space-consuming algebraic checks and, thus, it is omitted.
Lemma 13. Let  P tp, `, , 1q, p, ´, , 1q, p, “, , 1qu X  and  a legal nested marking for
E. If 1 is enabled on  , there is some  1 and  2 such that  ÝÑ  1 ÝÑ2  2 and
1
1. r s “ ,  2 is legal , r 2s “ 1, r 2s1´ “ r s1´ , and r 2 1
s1´ “ r s11´ .
2. if  “ p, `, , 1q, then r 2s “ r s ` 1, r 2s1 “ r s1 ` 1 and r 2s “ r s.
3. if  “ p, ´, , 1q, then r 2s “ r s ´ 1, r 2s1 “ r s1 ´ 1 and r 2s “ r s.
4. if  “ p, “, , 1q, then r 2s “ 0, r 2s1 “ r s1 , and r 2s “ r s ` r s .
Corollary 6. Let  ÝÑ  1 ÝÑ2  2 and  legal. If  is sub-broken at 0 or at 1, then  2 is sub-broken
1
at 0 or at 1, respectively. If  is broken at , then  2 is broken at .</p>
        <p>Corollary 7. Let  ÝÑ  1 ÝÑ2  2, and  legal and non-broken at 0 or at 1. If  2 is broken at 0
1
or at 1, respectively, then  2 is sub-broken at 0 or at 1.</p>
        <p>Corollary 8. Let  ÝÑ  1 ÝÑ2  2,  legal, and  P tp, `, , 1q, p, ´, , 1qu X  . If  is
1
non-broken, then  2 is non-broken.</p>
        <p>Cor. 8 indicates that the simulation of increment or decrement instructions cannot lead, on
their own, to broken markings. We now show that this is not the case for some simulation of
zero-checks, called wrong zero-guesses.</p>
        <p>Definition 12. A wrong zero-guess on counter  is a run  ÝÑ  1 ÝÑ2  2 where  is a zero-check
1
instruction on counter ,  is legal, and r s ą 0.</p>
        <p>Lemma 14. If  :  ÝÑ  1 ÝÑ2  2 and  is legal and non-broken, then  2 is broken at  for some
1
 P t0, 1u if  is a wrong zero-guess on counter .</p>
        <p>Proof. By Cor. 8, since  is not broken at  but  2 is,  is a zero-check instruction on counter
. If r s “ r s1 “ 0, then r 2s “ 0 “ r s1 “ r 2s1 and  2 is not broken at , contradiction.
Thus, r s “ r s ą 0 and, thus,  is a wrong zero-guess. Vice-versa, if  is a wrong-zero guess
1
on counter , then, by Lemma 13,  2 is broken at .</p>
        <p>The next lemma is proved analogously.</p>
        <p>Lemma 15. If  :  ÝÑ  1 ÝÑ2  2 and  is legal and non-broken, then  is broken at  if  is a
1
wrong zero-guess.
Corollary 9. If  : xp0, 0, 0qy Ñ˚  is a run of even length, then the following are equivalent:
(1)  is sub-broken at 0 or 1, (2)  is broken at , (3)  is broken, and (4)  has a wrong zero-guess.
0
ÝÑ</p>
        <p>Clearly, for each run 0 1 Ñ 1 . . . in  there is a run
x0y ÝÝ1Ñ0  0 ÝÝ2Ñ0 x1y ÝÝ1Ñ1  1 ÝÝ2Ñ1 . . .. If the target configuration p , 0, 1q is
reachable from p0, 0, 0q in , then   “ xp , 0, 1qy is reachable from  0 “ xp0, 0, 0qy in
E. Vice-versa, if   is reachable from  0 in E via a run  , then,   is legal, non-broken,
r  s “  , and  has even length. Thus,  does not have any wrong zero-guess and can be
simulated by a corresponding run in  from p0, 0, 0q.</p>
        <p>Theorem 4. p , 0, 1q is reachable from p0, 0, 0q in  if   “ xp , 0, 1qy is reachable
from  0 “ xp0, 0, 0qy in E.</p>
        <p>Note that the EOS in Def. 10 is a cEOS. Thus, since 2CM reachability is undecidable, our
result confirms that reachability for cEOSs is undecidable. However, we can conclude more.
6.2. From Reachability to pď, 0q-coverability
We now show that our construction yields undecidability also for pď, 0q-coverability. This is
based on the fact that the nested marking   in Th. 4 is reachable if and only if it is pď,
0qcoverable. In fact, if  0 Ñ˚  ě   , then, for each  P t0, 1u,
1.  and   mark in the same way all system net places of type ■ .
2. r s is well-defined, r s “ r  s “  ,  is reachable only via runs of even length,
and  is legal.
3. for each  P t0, 1u, r s1 “ r  s1 “ r  s ď r s ;
4. if  is broken at , then by Cor. 6 and Cor. 7 it is sub-broken at  and, thus, r s ă r s1 ď
r s , contradiction; thus,  is not broken at  and is not broken at 0 and, consequently,
not broken at .</p>
        <p>5. r s “ r s1 “ r  s1 “ r  s and r s “ 0 “ r  s.</p>
        <p>Summarising  and   coincide. Thus,   is pď, 0q-coverable from  0 if it is reachable. By
Th. 4, we obtain the following result.</p>
        <p>Theorem 5. pď, 0q-coverability for cEOSs is undecidable.</p>
        <p>
          By Th. 3, by undecidability of reachability for cEOSs (Th.5.5 in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]), and by the fact that
each cEOS is also an EOS, we obtain the following result.
        </p>
        <p>Corollary 10. For each ℓ P N Y tu, we have that pď, ℓq-reachability and pď, ℓq-coverability
for cEOSs and for EOSs are undecidable.
6.3. From Reachability to pď, 0q-coverability
We now show that similar statements apply also for pď, 0q-coverability. In fact, if  0 Ñ˚  ě
  , then, for each  P t0, 1u,
1.  places at least one black-token on r  s “  , thus  is reachable only via runs of even
length, and  is legal.</p>
        <p>count
enabling
0

1
q0</p>
        <p>E</p>
        <p>2. possibly with the exception of 10 and 11,  and   coincide on all system net places,
including all object-tokens on them.
3. r s “ r  s “ r  s1 ď r s1 and r s “ r  s, thus  is not broken and r s1 “ r s “
r  s .</p>
        <p>Summarising  and   coincide. Thus,   is pď, 0q-coverable from  0 if it is reachable. By
Th. 4, we obtain the following result.</p>
        <p>Theorem 6. pď, 0q-coverability for cEOSs is undecidable.</p>
        <p>
          By Th. 2, by undecidability of reachability for cEOSs (Th.5.5 in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]), and the fact that each
cEOS is also an EOS, we obtain the following corollaries.
        </p>
        <p>Corollary 11. For each ℓ P N Y tu, we have that pď, ℓq-reachability and pď, ℓq-coverability
for cEOSs and for EOSs are undecidable.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Undecidability for full-lossy EOSs</title>
      <p>We now show that all pď , ℓq-reachability problems for EOSs with finite ℓ ě 1 are undecidable.
This is achieved via a reduction of reachability of 2CMs to pď , ℓq-reachability with any given
ℓ.</p>
      <p>Fix the value of ℓ ě 1. Given an arbitrary 2CM  “ p, ,  0q, a target configuration
^
p , 1, 2q of , and its simulating EOS E “ p , , , Θq as in Sec. 6, we merge
E^, w“ithYp^the,,l^Θoss,iYn^eΘssq-caqonwudnhte^erre g^“ad“gpe^pt^,^ “Y, p^^^,q,,^weY,st^ar,tΘ,w^iqthfYroth^me SqE.eOcS. 4ℳ.Sp“ecipfica^ll,y,forY</p>
      <p>We now add to ℳ a system net transition enabling together with a dedicated event  “
xenabling , Hy (see Fig. 6). This transition consumes (1) ℓ tokens from count , (2) one from 1 if
ℓ is even, (3) one from 2 if ℓ is odd. The transition enabling produces (1) one in 0, and (2) one
object-token with empty internal marking in each of , 0, and 1. We call the so obtained EOS
ℱ . The initial marking  0 of ℱ is x1, ttuuy, as for .</p>
      <p>Note that, along the runs of ℱ , the event  “ xenabling , Hy fires at most once. Before firing
, there is no token on E while, after firing , there is no token on . Let  be a pď , ℓq-run
of ℱ . If  is not fired along  , then  does not reach the target marking   “ xp , 1, 2qy
(which puts some token on E). Otherwise,  can be split into two runs  1 and  2, such that

 “  1 ÑÝ  2. Since  consumes ℓ tokens from count and one from either 1 or 2 in , the
last marking  1 in  1 has to put at least ℓ tokens on count and at least one token on either 1
or 2, respectively.</p>
      <p>If  1 is not ℓ-strong, then it is ℓ1-strong for some ℓ1 ă ℓ. By Lem. 10, there is some ℓ2-strong
run  P Runsℓ2 pň,  0q for some ℓ2 ď ℓ1 such that  0 ⇝  11  ě  1 for some marking  .
Thus, by Lem. 9,  puts on count at most ℓ2 ă ℓ tokens. Since  ě  1, so does  1, which is a
contradiction. Thus,  1 is ℓ-strong.</p>
      <p>Consequently, since  is a pď , ℓq-run,  2 must be a (perfect) pď , 0q-run of E. Also,
because of the post-conditions of enabling , the first marking in  2 is xp0, 0, 0qy. Thus, the
2CM  reaches the target p , 1, 2q from p0, 0, 0q if E has a (perfect) pď , 0q-run from
xp0, 0, 0qy to   “ xp , 1, 2qy if ℱ exhibits an ℓ-strong pď , ℓq-run from  0 to   if ℱ
exhibits pď , ℓq-run from  0 to   . Since reachability of 2CM is undecidable, we get the next
theorem.</p>
      <p>Theorem 7. For each finite ℓ P N, pď , ℓq-reachability for EOSs is undecidable.</p>
      <p>
        One can adapt this construction so as to concatenate the lossy-counter gadget  with any
EOS E (in place of E for any 2CM ). If the initial marking of E contains several nested tokens,
a chain of enabling events like  may be necessary to initialize it. As above, in order to fire
them, the pď , ℓq-runs of the concatenated EOS ℱ have to preliminary fire all their lossy steps.
Moreover, after firing , the intended initial marking of E is initialized and the pď , ℓq-runs of
ℱ can continue only by simulating E without any further lossy step. Thus, E reaches/covers
a target marking   if ℱ pď , ℓq-reaches/covers the same target   from  0 “ x1, ttuuy.
Since (perfect) pď , 0q-reachability is known to be undecidable for EOSs (Th. 4.3 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]), one
get again Th. 7. Moreover, also (perfect) pď , 0q-coverability is known to be undecidable (again,
Th. 4.3 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]). Thus, we get undecidability also for pď , ℓq-coverability for each finite ℓ.
Theorem 8. For each finite ℓ P N, pď , ℓq-coverability for EOSs is undecidable.
8. Decidability of pď , q-reachability for EOSs
We now show that pď , q-reachability is decidable for EOSs. We use a modified semantics for
full-lossy EOSs which merges standard and lossy steps.
      </p>
      <p>Definition 13. A merged-EOS (mEOS) is an EOS interpreted under the semantics induced by
the step relation ⇝ where ⇝ “ě Y Ñ.</p>
      <p>Since EOSs and mEOSs are syntactically the same, given an EOS E, we denote by E the
EOS E interpreted under the standard Ñ step relation (S stands for standard), and by E the
EOS E interpreted under the ⇝ step relation (M stands for merged). Similarly, we denote the
set of predecessors of  in E by Pred p q and in E by Pred  p q. The benefit of mEOSs is
that ď becomes trivially compatible. This solves the major source of undecidability behind the
undecidability result of ď -reachability for EOSs.</p>
      <p>Lemma 16. ď is compatible for mEOSs.</p>
      <p>Proof. By definition of ⇝ , if  1 ě  2 ⇝  3, then either (1)  1 ě  2 ě  3 and, by
transitivity of ě , also  1 ⇝ ˚  1 ě  3, or (2)  1 ě  2 Ñ  3 and, by definition of ⇝ and
reflexivity of ď , also  1 ⇝  3 ě  3.</p>
      <p>
        Consequently, since ď is a well-quasi order (see Th.5.2 in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]), mEOSs with ď are
wellstructured transition systems (WSTS; see [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]). Clearly, ď is decidable. Moreover, mEOSs have
the efective pred-basis property. This is because, Ò Pred  pÒ  q “Ò t uY Ò Pred pÒ  q and
E has the efective pred-basis property [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], where Ò  denotes the upward-closure of .8
Lemma 17. For an EOS E and a nested marking  , we have Ò Pred  pÒ  q “Ò  Y Ò Pred pÒ
 q.
      </p>
      <p>Proof. If  1 PÒ Pred  pÒ  q, then there are  1 and  2 such that  1 ě  1 ⇝  2 ě  . If
 1 ě  2, then, by transitivity of ď , we have that  1 PÒ  . If  1 Ñ  2, then  1 P Pred pÒ  q
and, hence,  1 PÒ Pred pÒ  q. Vice-versa, since ÑĎ⇝ , we have Pred p q Ď Pred  p q and,
thus, Ò Pred pÒ  q Ď Ò Pred  pÒ  q. Moreover, since  1 ě  implies  1 P Pred  p q, we
have Ò t 1u ĎÒ Pred  Ò p q.</p>
      <p>We can then apply the theory of WSTS and obtain decidability of coverability for mEOSs.
Lemma 18. pď , 0q-coverability for mEOSs is decidable.</p>
      <p>Since each pď , q-run in E is a pď , 0q-run in E and vice-versa, we have that pď ,
0qcoverability for E coincides with pď , q-coverability for E, which, in turn, coincides with
pď , q-reachability for E (Cor. 4). We thus obtain the following theorem.
Theorem 9. pď , q-reachability is decidable for EOSs.</p>
      <p>Concerning the complexity of pď , q-reachability for EOSs, this problem extends pď ,
qreachability for cEOSs, which is equivalent to pď , 0q-coverability for cEOSs. By noting that
these can encode PN coverability, we obtain a lower bound for pď , q-reachability for EOSs.
Theorem 10. pď , q-reachability is EXPSPACE-hard for EOSs.</p>
    </sec>
    <sec id="sec-8">
      <title>9. Conclusions</title>
      <p>
        We have completely charted the decidability status of all lossy-reachability problems for three
lossiness relations: full-lossiness ď , object-lossiness ď, and system-lossiness ď. The
decidability landscape is summarized in Tab. 1. For cEOSs, proper lossy-reachability coincides with
standard coverability under the respective lossiness quasi order. All problems for object- and
system-lossy EOSs and cEOSs are undecidable. This is enabled by the fact that the orders ď
and ď are not well-quasi orders (cf. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]). For full-lossy EOSs, all pď , ℓq-reachability problems
are undecidable even if they do not coincide with standard coverability under ď . The most
interesting result is the decidability of pď , q-reachability for EOSs. This result follows from
the fact that each quasi order ĺ induces a WSTS when interpreted over pĺ, q-runs (cf. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]). This
problem is at least as hard as ď -coverability for cEOSs, which, in turn, extends PN coverability.
This yields an EXPSPACE lower-bound. The precise complexity of pď , q-reachability for
8I.e., if  is a set of markings, Ò  is the set of markings  such that  ě  for some  P ; also, Ò  denotes
Ò t u.
Problem
0-reach.
      </p>
      <p>cover.</p>
      <p>S
O
cE ℓ-reach./cover. for ℓ P N0
-reach./cover</p>
      <p>0-reach
S cover.</p>
      <p>EO ℓ-reach./cover. for ℓ P N0
-reach./cover
EOSs and, to the best of our knowledge, of ď -coverability for cEOSs, remains uncharted. We
aim to fill this gap in future works.</p>
      <p>
        Decidability of pď , q-reachability enables, in principle, the analysis of EOS models, e.g., of
business processes where resources may be lost both at the system and object level. However,
where undecidability applies, we may still perform verification by employing partial procedures,
e.g., by resorting to bounded model checking approaches. Recently, in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], a Maude encoding
of EOSs was proposed and reachability searches on a bounded EOS were performed. However,
to the best of our knowledge, there is no tool that natively addresses (bounded) model checking
of lossy EOSs. Such a tool should also be able to express formulas about the number and
distribution of the lossy steps in the runs. This feature is reminiscent of program definitions
in the temporal operators of Dynamic Propositional Logic (PDL) [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ]. Interestingly, recent
Answer Set Programming tools [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], such as Telingo [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], support PDL constraints, which may
be used to perform bounded model checking. A recent prototype [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] is discussed in [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The
development of such a tool would enable us to practically verify the robustness of EOS models.
      </p>
      <p>
        Another direction for further studies is the analysis of reset versions ď , ď, and ď, where,
for each place, at each step either no or all tokens on the place are lost. The reset object-lossy
case is especially interesting in light of [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], where break-downs are modeled precisely by
induced deadlocks of object-tokens via the loss of all tokens (reset) in the object. However, the
technique we used to show undecidability of pℓ, ď q-reachability for finite ℓ and EOSs can be
seamlessly applied to reset object- and full lossiness. Moreover, since these reset relations are
not compatible (even for cEOSs) nor well-quasi orders, we expect that all of these problems
(even -reachability for cEOSs) are undecidable. Further interesting variants of lossy relations
include diferent types of imperfections such as spontaneous token moves, duplications, and
insertions.
      </p>
      <p>
        When compared to lossy EOSs, lossy PNs exhibit a much more restricted landscape. This is
mainly due to the fact that the absence of nesting results in only one lossiness relation (which
removes regular tokens from the PN). Moreover, by compatibility, its hierarchy collapses to
two decidable problems, i.e., standard reachability (non-elementary) and standard coverability
(EXPSPACE-complete). This picture is distinct even from that of full-lossy cEOSs, where, even if
pď , 0q-coverability is decidable, standard reachability is undecidable. Moreover, it is likely that
pď , 0q-coverability for cEOSs is harder than coverability for PNs. It would also be interesting
to compare EOSs with (likely) more expressive models of computation, such as lossy counter
machines (LCM) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. To that end, several additional verification problems are relevant, e.g., those
studied in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for LCM. However, the number of lossy step parameters was not considered there
and, thus, a preliminary study on LCM robustness seems necessary. Nevertheless, assuming
that problems with  lossy steps are always easier than those with a finite number, it is likely
that all undecidability results in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] also hold for their robustness version. This leaves little
room for decidability results on the robustness of LCM.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Brand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zafiropulo</surname>
          </string-name>
          ,
          <article-title>On communicating finite-state machines</article-title>
          ,
          <source>J. ACM</source>
          <volume>30</volume>
          (
          <year>1983</year>
          )
          <fpage>323</fpage>
          -
          <lpage>342</lpage>
          . URL: https://doi.org/10.1145/322374.322380.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Chambart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Schnoebelen</surname>
          </string-name>
          ,
          <article-title>Mixing lossy and perfect fifo channels</article-title>
          ,
          <source>in: International Conference on Concurrency Theory</source>
          , volume
          <volume>5201</volume>
          <source>of LNCS</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>340</fpage>
          -
          <lpage>355</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -85361-9_
          <fpage>28</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Aiswarya</surname>
          </string-name>
          ,
          <article-title>On network topologies and the decidability of reachability problem</article-title>
          ,
          <source>in: International Conference on Networked Systems</source>
          , volume
          <volume>12129</volume>
          <source>of LNCS</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -67087-
          <issue>0</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Minsky</surname>
          </string-name>
          ,
          <article-title>Computation: finite and infinite machines</article-title>
          , Prentice-Hall, Inc., USA,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dershowitz</surname>
          </string-name>
          ,
          <article-title>Let's be honest</article-title>
          ,
          <source>Commun. ACM</source>
          <volume>64</volume>
          (
          <year>2021</year>
          )
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          . URL: https://doi.org/10. 1145/3431281.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Mayr</surname>
          </string-name>
          , Lossy Counter Machines,
          <source>Technical Report</source>
          ,
          <year>1998</year>
          . URL: https://mediatum.ub.tum. de/1094480.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Mayr</surname>
          </string-name>
          , Undecidable problems in unreliable computations,
          <source>Theoretical Computer Science</source>
          <volume>297</volume>
          (
          <year>2003</year>
          )
          <fpage>337</fpage>
          -
          <lpage>354</lpage>
          . doi:
          <volume>10</volume>
          .1016/S0304-
          <volume>3975</volume>
          (
          <issue>02</issue>
          )
          <fpage>00646</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bouajjani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mayr</surname>
          </string-name>
          ,
          <article-title>Model checking lossy vector addition systems</article-title>
          ,
          <source>in: Annual Symposium on Theoretical Aspects of Computer Science</source>
          , volume
          <volume>1563</volume>
          <source>of LNCS</source>
          ,
          <year>1999</year>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>333</lpage>
          . URL: https://doi.org/10.1007/3-540-49116-3_
          <fpage>30</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Esparza</surname>
          </string-name>
          ,
          <article-title>Decidability of model checking for infinite-state concurrent systems</article-title>
          ,
          <source>Acta Informatica</source>
          <volume>34</volume>
          (
          <year>1997</year>
          )
          <fpage>85</fpage>
          -
          <lpage>107</lpage>
          . URL: https://doi.org/10.1007/s002360050074.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Baroglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Micalizio</surname>
          </string-name>
          ,
          <article-title>Fragility and robustness in multiagent systems</article-title>
          , in: International Workshop on Engineering Multi-Agent
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , volume
          <volume>12589</volume>
          <source>of LNCS</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>77</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -66534-
          <issue>0</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Köhler-Bussmeier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Capra</surname>
          </string-name>
          ,
          <article-title>Robustness: A natural definition based on nets-within-nets</article-title>
          ,
          <source>in: International Workshop on Petri Nets and Software Engineering</source>
          , volume
          <volume>3430</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>70</fpage>
          -
          <lpage>87</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3430</volume>
          /paper5.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Valk</surname>
          </string-name>
          ,
          <article-title>Object Petri nets: Using the nets-within-nets paradigm</article-title>
          ,
          <source>in: Advances in Petri Nets</source>
          , volume
          <volume>3098</volume>
          <source>of LNCS</source>
          ,
          <year>2003</year>
          , pp.
          <fpage>819</fpage>
          -
          <lpage>848</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -27755-2_
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Köhler-Bußmeier</surname>
          </string-name>
          ,
          <article-title>A survey of decidability results for elementary object systems</article-title>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>130</volume>
          (
          <year>2014</year>
          )
          <fpage>99</fpage>
          -
          <lpage>123</lpage>
          . URL: https://doi.org/10.3233/FI-2014-983.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Schnoebelen</surname>
          </string-name>
          ,
          <article-title>Lossy counter machines decidability cheat sheet</article-title>
          , in: International Workshop on Reachability Problems, volume
          <volume>6227</volume>
          <source>of LNCS</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>75</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -15349-
          <issue>5</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T.</given-names>
            <surname>Murata</surname>
          </string-name>
          ,
          <article-title>Petri nets: Properties, analysis and applications</article-title>
          , IEEE
          <volume>77</volume>
          (
          <year>1989</year>
          )
          <fpage>541</fpage>
          -
          <lpage>580</lpage>
          . doi:
          <volume>10</volume>
          .1109/5.24143.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Capra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Köhler-Bussmeier</surname>
          </string-name>
          ,
          <article-title>Modelling adaptive systems with nets-within-nets in maude</article-title>
          , in: International Conference on Evaluation of Novel Approaches to Software Engineering,
          <year>2023</year>
          , pp.
          <fpage>487</fpage>
          -
          <lpage>496</lpage>
          . URL: https://doi.org/10.5220/0011860000003464.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Lomazova</surname>
          </string-name>
          , Nested Petri nets
          <article-title>- a formalism for specification and verification of multiagent distributed systems</article-title>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>43</volume>
          (
          <year>2000</year>
          )
          <fpage>195</fpage>
          -
          <lpage>214</lpage>
          . doi:
          <volume>10</volume>
          .3233/ FI-2000-43123410.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Köhler</surname>
          </string-name>
          ,
          <article-title>Reachable markings of object Petri nets</article-title>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>79</volume>
          (
          <year>2007</year>
          )
          <fpage>401</fpage>
          -
          <lpage>413</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Finkel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Schnoebelen</surname>
          </string-name>
          ,
          <article-title>Well-structured transition systems everywhere!</article-title>
          ,
          <source>Theoretical Computer Science</source>
          <volume>256</volume>
          (
          <year>2001</year>
          )
          <fpage>63</fpage>
          -
          <lpage>92</lpage>
          . URL: https://www.sciencedirect.com/science/article/ pii/S030439750000102X, iSS.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lasota</surname>
          </string-name>
          ,
          <article-title>Decidability border for Petri nets with data: WQO dichotomy conjecture</article-title>
          ,
          <source>in: Application and Theory of Petri Nets and Concurrency</source>
          , volume
          <volume>9698</volume>
          <source>of LNCS</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>36</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -39086-
          <issue>4</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>M. J. Fischer</surname>
            ,
            <given-names>R. E.</given-names>
          </string-name>
          <string-name>
            <surname>Ladner</surname>
          </string-name>
          ,
          <article-title>Propositional dynamic logic of regular programs</article-title>
          ,
          <source>J. Comput. Syst. Sci</source>
          .
          <volume>18</volume>
          (
          <year>1979</year>
          )
          <fpage>194</fpage>
          -
          <lpage>211</lpage>
          . URL: https://doi.org/10.1016/
          <fpage>0022</fpage>
          -
          <lpage>0000</lpage>
          (
          <issue>79</issue>
          )
          <fpage>90046</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Balbiani</surname>
          </string-name>
          , E. Lorini,
          <article-title>Ockhamist propositional dynamic logic: A natural link between PDL and CTL</article-title>
          , in: Logic, Language, Information, and
          <source>Computation Proceedings</source>
          , volume
          <volume>8071</volume>
          <source>of LNCS</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>265</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -39992-3_
          <fpage>22</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gebser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kaminski</surname>
          </string-name>
          , B. Kaufmann, T. Schaub,
          <article-title>Multi-shot ASP solving with clingo</article-title>
          ,
          <source>Theory Pract. Log. Program</source>
          .
          <volume>19</volume>
          (
          <year>2019</year>
          )
          <fpage>27</fpage>
          -
          <lpage>82</lpage>
          . URL: https://doi.org/10.1017/S1471068418000054.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>P.</given-names>
            <surname>Cabalar</surname>
          </string-name>
          ,
          <article-title>Temporal ASP: from logical foundations to practical use with telingo</article-title>
          ,
          <source>in: Reasoning Web. Declarative Artificial Intelligence</source>
          , volume
          <volume>13100</volume>
          <source>of LNCS</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>94</fpage>
          -
          <lpage>114</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -95481-
          <issue>9</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>T.</given-names>
            <surname>Prince</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Di</surname>
          </string-name>
          <string-name>
            <surname>Cosmo</surname>
          </string-name>
          ,
          <source>Nets within nets telingo analyser</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .5281/zenodo. 11401876.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>F.</given-names>
            <surname>Di Cosmo</surname>
          </string-name>
          , T. Prince,
          <article-title>Bounded verification of petri nets and EOSs using Telingo: an experience report</article-title>
          ,
          <source>in: CILC'24: 39th Italian Conference on Computational Logic</source>
          , June 26-28,
          <year>2024</year>
          , Rome, Italy,
          <year>2024</year>
          . To appear.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>