<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nicola Cotumaccio</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Catia Trubiani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Gran Sasso Science Institute</institution>
          ,
          <addr-line>Viale Luigi Rendina, 26-28, 67100 L'Aquila</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Helsinki</institution>
          ,
          <addr-line>Yliopistonkatu 4, 00100 Helsinki</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <fpage>3</fpage>
      <lpage>5</lpage>
      <abstract>
        <p>Both Petri Nets and finite automata are prone to the state explosion problem. A recent line of research shows the state explosion in finite automata is captured by a notion of convexity. We outline how the result on finite automata can be exploited to suggest a new approach for studying Petri nets. Petri nets are widely used to model distributed systems. The expressive power of this formalism comes to a price: Petri nets are prone to the state explosion problem [1]. A Petri net can describe a system that may have infinitely many states, thus making it dificult to analyze and simulate the system's behavior. Given a Petri net and an initial marking, the reachability graph is a (possibly infinite) graph describing all markings of the Petri nets reachable from the initial marking by firing transitions (see Figure 1). A classical result shows that it is possible to decide whether the reachability graph is ifnite by constructing the Karp-Miller tree of the Petri net. To limit the complexity of the reachability graph, it is possible to add (topological) constraints to the Petri nets that ensure that the reachability graph is small or at least finite, while still allowing the modeling of a wide range of systems (see [ 2] for a survey). A Petri net is structurally bounded if the reachability graph is finite for every choice of the initial marking. An important special case of structurally bounded Petri nets is that of conservative Petri nets, in which after firing any transition, the total number of tokens is the same as before firing the transitions. Alternatively, we can add constraints that depend on a parameter  to parameterize the size of the reachability graph as a function of . For example, a Petri net is -bounded if every marking reachable from the initial marking has the property that no place contains more than  tokens. In particular, an 1-bounded Petri net is safe. Petri nets can be seen as an extension of finite automata. In automata theory, a similar state explosion occurs when we apply the powerset construction to convert a nondeterministic automaton (NFA) into a deterministic automaton (DFA) recognizing the same regular language: if an NFA has  states, then the equivalent DFA can have up to 2 − 1 states (see Figure 1). While the expressive power of NFAs is the same as the expressive power of DFAs, determinism is extremely helpful in studying the properties of an automaton. Some basic problems in automata theory - such as the emptiness problem and the equivalence problem - are PSPACE complete on NFAs but can be solved in almost-linear time on DFAs. The natural question is whether for automata it is possible to follow the same path that we sketched for Petri nets - adding constraints to the topology of the considered NFAs to control the state explosion. A recent line of research in automata theory has shown that, indeed, a notion of convexity captures the complexity of the powerset construction and establishes an unexpected connection between data compression and automata theory, thus leading to Wheeler automata [3]. A Wheeler NFA is endowed with a total order on the set of all states. In Figure 2, the total order is given by the numbering of the states. First, the total order respects equally-labeled edges: for example, if we consider edges (10, 5, ) and (11, 6, ), we have 10 &lt; 11, and consistently we have 5 &lt; 6. Second, if we consider edges with distinct labels - such as (5, 2, ) and (11, 7, ) - we have  &lt;  and consistently the end states satisfy</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Petri Nets</kwd>
        <kwd>Convexity</kwd>
        <kwd>Data Compression</kwd>
        <kwd>Automata Theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>start
(0, 0, 1, 0, 1)
5
6
(0, 1, 1, 0, 0)</p>
      <p>
        (1, 1, 0, 0, 0)
6
1
2
1
4
2




1

 1, 2
1, 4  1, 3



1
6
6
2 &lt; 7. Wheeler automata admit a compressed representation that supports eficient pattern-matching
queries. This is crucial in bioinformatics, where both time-eficient and space-eficient algorithms
are required. For example, de Bruijn automata are used in genome assembly [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and every de Bruijn
automaton is a Wheeler automaton.
      </p>
      <p>
        Surprisingly, if we start from a Wheeler NFA and we apply the powerset construction, in the worst
case the equivalent DFA does not have 2 − 1 states, but only 2 − 1 states. This paradigm was recently
extended to arbitrary automata by introducing a new parameter  [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6, 7</xref>
        ]. Informally speaking, an
automaton has parameter  if we can partition the set of all states into  sets so that the convexity
properties of Wheeler automata hold for all the edges leaving the same set and reaching the same set.
In other words,  identified a relaxed notion of convexity. In the worst case,  is equal to the number
 of states, and the case of Wheeler automata corresponds to  = 1. Unexpectedly, the results on
Wheeler automata can be extended to arbitrary automata and, in particular, if we apply the powerset
construction to an NFA with  states, the equivalent DFA has at most 2( −  + 1) − 1. In the worst
case,  =  and we retrieve the bound 2 − 1. For  = 1 (the Wheeler case), we retrieve the bound
2 − 1. Most importantly, the quantity 2( −  + 1) − 1 is only exponential in , so we can avoid the
state explosion for small  (that is, if we have “quasi-convexity”).
      </p>
      <p>Our goal is to extend the convexity paradigm to Petri nets. This is both of theoretical and practical
interest. Currently, we do not know natural classes of automata for which  is — say — at most 5. At
the same time, many Petri nets describing real systems have a small  — intuitively, many real systems
are “quasi-convex”. For example, the Petri nets modeling the manufacturing system in Figure 2 can be
divided into 4 linear components (one for each component and one describing the process after the
merging). Every linear component can be seen as a total order, so it is intuitively reasonable to claim
that  is at most 4 in our example.</p>
      <p>We have three main objectives. First, we formalize the notion of convexity (or quasi-convexity)
and we study the properties of convex Petri nets (boundness, reachability, and so on), focusing on
a
b
d
b
f</p>
      <p>
        g
start
a
b
e
h
8
7
8
10
11
6
3
6
9
the state explosion. Second, we show how convex Petri nets can model a broad spectrum of real
systems by providing case studies. Lastly, we study the languages recognized by convex Petri nets. We
know that finite automata recognize regular language (finite strings) and -regular languages (infinite
strings). Wheeler automata recognize an interesting subclass of regular languages — Wheeler languages
— that always admit a minimum Wheeler automata, an algebraic characterization, and a Myhill-Nerode
theorem [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Petri nets can also be studied as acceptors of finite words [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and infinite words [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], so
the natural question is how to extend Wheeler languages to Petri nets by introducing the notion of
convex (or Wheeler) Petri net language.
      </p>
      <p>Acknowledgements. This work has been partially funded by the MUR-PRIN project DREAM
(20228  78 ), and the MUR-PNRR project VITALITY (00000041).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Valmari</surname>
          </string-name>
          ,
          <article-title>The state explosion problem</article-title>
          ,
          <source>in: Advanced Course on Petri Nets</source>
          , Springer,
          <year>1996</year>
          , pp.
          <fpage>429</fpage>
          -
          <lpage>528</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Esparza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nielsen</surname>
          </string-name>
          ,
          <article-title>Decidability issues for petri nets</article-title>
          ,
          <source>Petri nets newsletter 94</source>
          (
          <year>1994</year>
          )
          <fpage>5</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Alanko</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. D'Agostino</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Policriti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Prezza</surname>
          </string-name>
          ,
          <article-title>Regular languages meet prefix sorting</article-title>
          ,
          <source>in: Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms</source>
          , SODA '20,
          <string-name>
            <surname>Society</surname>
          </string-name>
          for Industrial and Applied Mathematics, USA,
          <year>2020</year>
          , p.
          <fpage>911</fpage>
          -
          <lpage>930</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Peng</surname>
          </string-name>
          , H.
          <string-name>
            <surname>C. M. Leung</surname>
            ,
            <given-names>S. M.</given-names>
          </string-name>
          <string-name>
            <surname>Yiu</surname>
            ,
            <given-names>F. Y. L.</given-names>
          </string-name>
          <string-name>
            <surname>Chin</surname>
          </string-name>
          , Idba - a practical iterative de bruijn graph de novo assembler, in: B.
          <string-name>
            <surname>Berger</surname>
          </string-name>
          (Ed.),
          <source>Research in Computational Molecular Biology</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2010</year>
          , pp.
          <fpage>426</fpage>
          -
          <lpage>440</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Cotumaccio</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. D'Agostino</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Policriti</surname>
            ,
            <given-names>N. Prezza,</given-names>
          </string-name>
          <article-title>Co-lexicographically ordering automata and regular languages - part i</article-title>
          ,
          <source>J. ACM</source>
          <volume>70</volume>
          (
          <year>2023</year>
          ). URL: https://doi.org/10.1145/3607471. doi:
          <volume>10</volume>
          .1145/ 3607471.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Cotumaccio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Prezza</surname>
          </string-name>
          ,
          <article-title>On indexing and compressing finite automata</article-title>
          , in: D.
          <string-name>
            <surname>Marx</surname>
          </string-name>
          (Ed.),
          <source>Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA</source>
          <year>2021</year>
          , Virtual Conference,
          <source>January 10 - 13</source>
          ,
          <year>2021</year>
          , SIAM,
          <year>2021</year>
          , pp.
          <fpage>2585</fpage>
          -
          <lpage>2599</lpage>
          . URL: https://doi.org/10.1137/1. 9781611976465.153. doi:
          <volume>10</volume>
          .1137/1.9781611976465.153.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Cotumaccio</surname>
          </string-name>
          ,
          <article-title>Graphs can be succinctly indexed for pattern matching in (||2 + ||5/2) time</article-title>
          , in: 2022
          <source>Data Compression Conference (DCC)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>272</fpage>
          -
          <lpage>281</lpage>
          . doi:
          <volume>10</volume>
          .1109/DCC52660.
          <year>2022</year>
          .
          <volume>00035</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Davidrajuh</surname>
          </string-name>
          ,
          <article-title>Petri nets for modeling of large discrete systems</article-title>
          , Springer,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Peterson</surname>
          </string-name>
          ,
          <article-title>Petri Net Theory and the Modeling of Systems, Prentice Hall PTR</article-title>
          , USA,
          <year>1981</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Valk</surname>
          </string-name>
          ,
          <article-title>Infinite behaviour of petri nets</article-title>
          ,
          <source>Theoretical Computer Science</source>
          <volume>25</volume>
          (
          <year>1983</year>
          )
          <fpage>311</fpage>
          -
          <lpage>341</lpage>
          . URL: https://www.sciencedirect.com/science/article/pii/0304397583901159. doi:https://doi.org/10. 1016/
          <fpage>0304</fpage>
          -
          <lpage>3975</lpage>
          (
          <issue>83</issue>
          )
          <fpage>90115</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>