<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Hierarchy of persistency with respect to the length of action&apos;s disability</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Kamila</forename><surname>Barylska</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Mathematics and Computer Science</orgName>
								<orgName type="institution">Nicolaus Copernicus University</orgName>
								<address>
									<addrLine>Chopina 12/18</addrLine>
									<postCode>87-100</postCode>
									<settlement>Toruń</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Edward</forename><surname>Ochmański</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Mathematics and Computer Science</orgName>
								<orgName type="institution">Nicolaus Copernicus University</orgName>
								<address>
									<addrLine>Chopina 12/18</addrLine>
									<postCode>87-100</postCode>
									<settlement>Toruń</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Institute of Computer Science</orgName>
								<orgName type="institution">Polish Academy of Sciences</orgName>
								<address>
									<addrLine>Jana Kazimierza 5</addrLine>
									<postCode>01-248</postCode>
									<settlement>Warszawa</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Hierarchy of persistency with respect to the length of action&apos;s disability</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2079C288B393E868B7CA0D9423B15254</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T04:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Petri nets</term>
					<term>concurrency</term>
					<term>persistency</term>
					<term>decision problems</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The notion of persistency, based on the rule "no action can disable another one" is one of the classical notions in concurrency theory. We recall two ways of generalization of this notion: the first is "no action can kill another one" and the second "no action can kill another enabled one". Afterwards we present an infinite hierarchy of computations in which one action disables another one for no longer than a specified number of steps (e/l-k-persistency). We prove that if an action is disabled, and not killed, by another one, it can not be postponed indefinitely. Finally we deal with decision problems about e/l-k persistency. We show that this kind of persistency is decidable with respect to steps, markings and nets.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The notion of persistency is one of the most frequently discussed issues in the Petri net theory - <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12</ref>] and many others. It is being studied not only in terms of theoretical properties, and also as a useful tool for designing and analyzing software environments <ref type="bibr" target="#b2">[3]</ref>. In software engineering, persistency is a desirable property and many systems may not work properly without it.</p><p>We say that an action of a processing system is persistent if, whenever it becomes enabled, it remains enabled until executed. A system is said to be persistent if all its actions are persistent. This classical notion is introduced by Karp/Miller <ref type="bibr" target="#b9">[10]</ref>. Also interesting, with practical applications, is the notion of weak persistency introduced and investigated in <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b8">9]</ref>. In section 3, we bring to mind two generalizations of the classical notion (defined in <ref type="bibr" target="#b1">[2]</ref>): l/l persistency and e/l-persistency. An action is said to be l/l-persistent if it remains live until executed, and is e/l-persistent if, whenever it is enabled, it cannot be killed by another action. For uniformity, we name the traditional persistency notion e/epersistency. Next, we recall that those kinds of persistency are decidable in the class place/transition nets.</p><p>In section 4, we extend the hierarchy mentioned above with an infinite hierarchy of e/l-persistent steps. A step M aM is said to be e/l-k-persistent for some k ∈ N if the execution of an action a pushes the execution of any other enabled action away for at most k steps. We prove that if an action is disabled by another one, it can not be postponed indefinitely. We show that if a p/t-net is e/l-persistent, then it is e/l-k-persistent for some k ∈ N (Theorem 3) and such a k can be effectively found (Theorem 9). We also point, that the above-cited result does not hold for nets which do not have the monotonicity property (for example for inhibitor nets).</p><p>Afterwards, we investigate the set of markings in which two actions are enabled simultaneously, and also the set of reachable markings with that feature. We show that the minimum of the latter is finite and effectively determined. We also prove that if some action pushes the enabledness of another one away for more than k steps, then it also needs to happen in some minimal reachable marking enabling these two actions.</p><p>Finally, we show that e/l-k-persistency is decidable with respect to steps (Theorem 1), markings (Theorem 2) and nets (Theorem 7).</p><p>The concluding section contains some questions and plans for further investigations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Basic Notions</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Denotations</head><p>The set of non-negative integers is denoted by N. Given a set X, the cardinality (number of elements) of X is denoted by |X|, the powerset (set of all subsets) by 2 X , the cardinality of the powerset is 2 |X| . Multisets over X are members of N X , i.e. functions from X into N.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Petri Nets and Their Computations</head><p>The definitions concerning Petri nets are mostly based on <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1 (Nets).</head><p>Net is a triple N = (P, T, F ), where:</p><p>-P and T are finite disjoint sets, of places and transitions, respectively;</p><formula xml:id="formula_0">-F ⊆ P × T ∪ T × P is a relation, called the flow relation.</formula><p>For all a ∈ T we denote:</p><formula xml:id="formula_1">• a = {p ∈ P | (p, a) ∈ F } -the set of entries to a a • = {p ∈ P | (a, p) ∈ F } -the set of exits from a</formula><p>Petri nets admit a natural graphical representation. Nodes represent places and transitions, arcs represent the flow relation. Places are indicated by circles, and transitions by boxes.</p><p>The set of all finite strings of transitions is denoted by T * , the length of w ∈ T * is denoted by |w|, number of occurrences of a transition a in a string w is denoted by |w| a , two strings u, v ∈ T * such that (∀a ∈ T ) |u| a = |v| a are said to be Parikh equivalent.</p><p>Definition 2 (Place/Transition Nets). Place/transition net (shortly, p/tnet) is a quadruple S = (P, T, F, M 0 ), where:</p><p>-N = (P, T, F ) is a net, as defined above; -M 0 ∈ N P is a multiset of places, named the initial marking; it is marked by tokens inside the circles, capacity of places in unlimited.</p><p>Multisets of places are named markings. In the context of p/t-nets, they are mostly represented by nonnegative integer vectors of dimension |P |, assuming that P is strictly ordered. The natural generalizations, for vectors, of arithmetic operations + and −, as well as the partial oder , all defined componentwise, are well known and their formal definitions are omitted.</p><p>In this context, by • a(a • ) we understand a vector of dimension |P | which has 1 in every coordinate corresponding to a place that is an entry to (an exit from, respectively) a and 0 in other coordinates.</p><p>A transition a ∈ T is enabled in a marking M whenever • a ≤ M (all its entries are marked). If a is enabled in M , then it can be executed, but the execution is not forced. The execution of a transition a changes the current marking M to the new marking M = (M − • a) + a • (tokens are removed from entries, then put to exits). The execution of an action a in a marking M we call a (sequential) step. We shall denote M a for the predicate "a is enabled in M " and M aM for the predicate "a is enabled in M and M is the resulting marking".</p><p>This notions and predicates we extend, in a natural way, to strings of transitions: M εM for any marking M , and M vaM (v ∈ T * , a ∈ T ) iff M vM and M aM .</p><p>If M wM , for some w ∈ T * , then M is said to be reachable from M ; the set of all markings reachable from M is denoted by [M . Given a p/t-net S = (P, T, F, M 0 ), the set [M 0 of markings reachable from the initial marking M 0 is called the reachability set of S, and markings in [M 0 are said to be reachable in S.</p><p>A transition a ∈ T is said to be live in a marking M if there is a string u ∈ T * such that ua is enabled in M . A transition a ∈ T that is not live in a marking M is said to be dead in a marking M . If M aM and a transition b = a is enabled (live) in M and not enabled (not live) in M , then we say that (the execution of) a disables (kills) b.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3 (Inhibitor nets ).</head><p>Inhibitor net is a quintuple S = (P, T, F, I, M 0 ), where:</p><p>-(P, T, F, M 0 ) is a p/t-net, as defined above; -I ⊆ P × T is the set of inhibitor arcs (depicted by edges ended with a small empty circle). Sets of entries and exits are denoted by • a and a • , as in p/tnets; the set of inhibitor entries to a is denoted by</p><formula xml:id="formula_2">• a = {p ∈ P | (p, a) ∈ I}.</formula><p>A transition a ∈ T (of an inhibitor net) is enabled in a marking M whenever •a ≤ M (all its entries are marked) and (∀p ∈ • a) M (p) = 0 -all inhibitor entries to a are empty. The execution of a leads to the resulting marking</p><formula xml:id="formula_3">M = (M − • a) + a • .</formula><p>The following well-known fact follows easily from Definitions 1 and 2.</p><p>Fact 1 (Diamond and big diamond properties) Any place/transition net possesses the following property: Big Diamond Property:</p><formula xml:id="formula_4">If M uM &amp; M vM &amp; u ≈ v (Parikh equivalence), then M = M . Its special case with |u| = |v| = 2 is called the Diamond Property: If M abM &amp; M baM , then M = M . Definition 4 (ω-extension). Let Ω = N ∪ {ω},</formula><p>where ω is a new symbol (denoted infinity). We extend, in a natural way, arithmetic operations: ω + n = ω, ω − n = ω, and the order: (∀n ∈ N) n &lt; ω. The set of k-dimensional vectors over Ω we shall denote by Ω k , and its elements we shall call ω-vectors. Operations +, − and the order ≤ in Ω k are componentwise. For X ⊆ Ω k , we denote by Min(X) the set of all minimal (wrt ≤) members of X, and by Max(X) the set of all maximal (wrt ≤) members of X. Let v, v ∈ Ω k be ω-vectors such that v ≤ v , then we say that v covers v ( v is covered by v ) .</p><p>Let us recall the well known important fact known as the Dickson's Lemma.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 1 ([6]</head><p>). Any subset of incomparable elements of Ω k is finite. Definition 5. We say that a Petri net S = (P, T, F, M 0 ) has the monotonicity property if and only if</p><formula xml:id="formula_5">(∀w ∈ T * )(∀M, M ∈ N |P | ) M w ∧ M ≤ M ⇒ M w.</formula><p>Fact 2 P/t-nets have the monotonicity property.</p><p>Proof. Obvious, since in p/t-nets the tokens of M −M can be regarded as frozen (disactive) tokens.</p><p>Fact 3 Inhibitor nets do not have the monotonicity property.</p><p>Proof. Let us look at the example of Fig. <ref type="figure" target="#fig_0">1</ref>. It can be easily seen that M 1 &lt; M 1 . M 1 a holds but M 1 a doesn't hold.</p><p>Remark: In the paper we will use the notions of reachability graph (tree) and coverability graph (tree). We assume that the notions are known to the reader. Their definitions can be found in any monograph or survey about Petri nets (see <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b12">13]</ref> or arbitrary else). The notion of persistency is one of the classical notions in concurrency theory. The notion is recalled in <ref type="bibr" target="#b1">[2]</ref> (named in the sequel e/e-persistency). Some of its generalizations: l/l-persistency and e/l-persistency are also introduced there.</p><p>Let us sketch the notions informally. The classical e/e-persistency means "no action can disable another one", the l/l-persistency means "no action can kill another one" and the e/l-persistency means "no action can kill another enabled one". Let us go on to formal definitions. Definition 6 (Three kinds of persistency). Let S = (P, T, F, M 0 ) be a place/transition net.</p><formula xml:id="formula_6">If (∀M ∈ [M 0 ) (∀a, b ∈ T ) -M a ∧ M b ∧ a = b ⇒ M ab, then S is said to be e/e-persistent; -M a ∧ (∃u)M ub ∧ a = b ⇒ (∃v)M avb, then S is said to be l/l-persistent; -M a ∧ M b ∧ a = b ⇒ (∃v)M avb, then S is said to be e/l-persistent.</formula><p>The classes of e/e-persistent (l/l-persistent, e/l-persistent) p/t-nets will be denoted by P e/e , P l/l and P e/l , respectively.</p><p>It is shown in <ref type="bibr" target="#b1">[2]</ref> that the following decision problems are decidable:</p><formula xml:id="formula_7">Instance: A p/t net (N, M 0 ) Questions:</formula><p>EE Net Persistency Problem: Is the net S e/e-persistent? LL Net Persistency Problem: Is the net S l/l-persistent? EL Net Persistency Problem: Is the net S e/l-persistent?</p><p>4 Hierarchy of e/l-persistency</p><p>In the previous section we defined three kinds of persistency. Now, we extend the hierarchy mentioned above with an infinite hierarchy of e/l-persistent steps.</p><p>Definition 7 (E/l-persistent steps -an infinite hierarchy).</p><p>Let S = (P, T, F, M 0 ) be a p/t-net, let M be a marking. W call a step M aM :</p><p>e/l-0-persistent iff it is e/e-persistent (the execution of an action a does not disable any other action); e/l-1-persistent iff Remark: Note that e/l-∞-persistent steps are exactly e/l-persistent steps.</p><p>Directly from Definition 7 we get the Fact 4 Let S = (P, T, F, M 0 ) be a p/t-net, let M be a marking. If the step M aM is e/l-k-persistent for some k ∈ N, then it is also e/l-i-persistent for every i ≥ k.</p><p>Definition 8. Let S = (P, T, F, M 0 ) be a p/t-net, M be a marking and k ∈ N.</p><p>Marking M is e/l-k-persistent iff for every action a ∈ T that is enabled in M the step M a is e/l-k-persistent. P/t-net S = (N, M 0 ) is e/l-k-persistent iff every marking reachable in S is e/l-k-persistent. We denote the class of e/l-k-persistent p/t-nets by P e/l−k .</p><p>The direct conclusion from Fact 4 and Definition 8 is as follows:</p><p>Fact 5 Let S = (P, T, F, M 0 ) be a p/t-net, M be a marking, and k ∈ N. If the marking M is e/l-k-persistent, then it is also e/l-i-persistent for every i ≥ k. If the net S is e/l-k-persistent, then it is also e/l-i-persistent for every i ≥ k.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Now we can formulate the problem:</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>EL-k Step Persistency Problem</head><p>Instance: P/t-net S, marking M , action a ∈ T enabled in M . Question:Is the step M a e/l-k-persistent?</p><p>Theorem 1. The EL-k Step Persistency Problem is decidable (for any k ∈ N).</p><p>Proof. An algorithm of checking if a step M a is e/l-k-persistent (for some k ∈ N) for a given net S = (N, M 0 ): Let us build the part of the depth of k+1 (we call it the (k+1)-component) of the reachability tree of (N, M ), where M is a marking obtained from M by execution of a. The step M a is e/l-k-persistent if for every action b ∈ T , such that a = b and b is enabled in M , there is a path in the (k+1)-component of the reachability tree of (N, M ) containing an arc labeled by b.</p><p>Let us introduce another problem:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>EL-k Marking Persistency Problem</head><p>Instance:P/t-net S = (N, M 0 ), marking M . Question:Is the marking M e/l-k-persistent?</p><p>Theorem 2. The EL-k Marking Persistency Problem is decidable (for any k ∈ N).</p><p>Proof. For every action a ∈ T that is enabled in a marking M , we check if a step M a is e/l-k-persistent (for some k ∈ N) for a given net S = (N, M 0 ), using the algorithm of Theorem 1.</p><p>Let us recall the well-known fact, that follows from the Dickson's Lemma 1.</p><p>Fact 6 Every infinite sequence of markings contains an infinite increasing (not necessarily strictly) subsequence of markings.</p><p>Recall also that p/t-nets have the monotonicity property -Fact 2.</p><p>Let us define the notion of k-enabledness.</p><p>Definition 9 (k-enabledness). Let S = (P, T, F, M 0 ) be a p/t-net, let M be a marking. For k ∈ N we say that the action a ∈ T is k-enabled in the marking M if and only if ∃w ∈ T * , such that |w| ≤ k ∧ M wa.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Now, we can show:</head><p>Lemma 2. Let S be a p/t-net. For an arbitrary a ∈ T there exists a natural number k a ∈ N, such that in every marking M the transition a is k a -enabled or it is dead.</p><p>Proof. Suppose that the lemma does not hold for some action a ∈ T . It means that for each k ∈ N there is a marking M such that M is not k-enabled but not dead. This means that M is k -enabled for some k &gt; k. Thus, there exists an infinite sets of markings M 1 , M 2 , . . . and integers k 1 &lt; k 2 &lt; . . ., such that the action a is live in each marking M i and it is not k i -enabled in M i for all i = 1, 2, . . .. Let us choose (by Fact 6) an infinite increasing sequence of markings</p><formula xml:id="formula_8">M i1 ≤ M i2 ≤ . . .. Since the action a is live in M i1 , it is k-enabled in M i1 , for some k ∈ N.</formula><p>As the strictly increasing sequence k 1 &lt; k 2 &lt; . . . is infinite, k &lt; k ij for some j. By the monotonicity property (Fact 2), the action a is k-enabled, hence k ij -enabled in the marking M ij . Contradiction.</p><p>Remark: Note that the proof of Lemma 2 is purely existential, it does not present any algorithm for finding k. Now, we are ready to formulate the main theorem of the chapter: Theorem 3. If a p/t-net is e/l-persistent, then it is e/l-k-persistent for some k ∈ N. In words: Whenever an action is disabled by another one, it is pushed away for not more than k-steps.</p><p>Proof. If the net is e/l-persistent, then no action kills another enabled one. From the Lemma 2 we know, that if an action a ∈ T is not dead then it is k a -enabled. Let us take K = max{k a |a ∈ T }, for the numbers k a from the Lemma 2. One can see that every action in the net that is not dead, is K-enabled. Thus, the execution of any action may postpone the execution of an action a for at most K steps. So we have the implication: if a p/t-net is e/l-persistent, then it is e/l-K-persistent, for K defined above. Fig. <ref type="figure">2</ref>. A p/t-net that is e/l-3 persistent but not e/l-2 persistent Example 1. Let us look at the example of Fig. <ref type="figure">2</ref>. The only possible situation for temporary disabling an action by another one is the execution of a that disables b. And then b could be enabled again after the execution of the sequence cde, so after 3 steps. Hence, the net is e/l-3-persistent, and obviously not e/l-2persistent.</p><p>The following example shows that Theorem 3 does not hold for nets without the monotonicity property.</p><p>Example 2. Let us look at the example of Fig. <ref type="figure" target="#fig_2">3</ref>. We can see an inhibitor net and its computation such that for every k ∈ N one can push an action away for a distance greater than k steps. This net is life, hence it is e/l-persistent, but it is not e/l-k-persistent for any k ∈ N. In the infinite computation acbcdaecbcddaeecbcdddaeeecb . . . the first a pushes b away for 1 step, the second -for 2 steps and every k-th a -for k steps. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">EL-k Net Persistency Problem</head><p>In the previous section, we established that an action can not postpone another action indefinitely (Theorem 3). We proved, that if a p/t-net is e/l-persistent, then it is e/l-k-persistent for some k ∈ N. We showed that such a k exists but we did not present any algorithm for finding this k.</p><p>In view of the statements above, let us consider the following problem:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>EL-k Net Persistency Problem</head><p>Instance:P/t-net S = (N, M 0 ), k ∈ N. Question:Is the net S e/l-k-persistent?</p><p>To solve this problem we must prove a set of auxiliary facts.</p><p>From this moment, let S = (N, M 0 ) be an arbitrary p/t-net.</p><p>Let us define the following set of markings: Proof. Let M = minE a,b . We build a coverability graph for the p/t-net S. We check whether in the graph exists a vertex corresponding to an ω-marking M such that M covers M . If so, then actions a and b are simultaneously enabled in some reachable marking of the net S. Otherwise, those transitions are never enabled at the same time.</p><formula xml:id="formula_9">E a,b = {M ∈ N |P | | M a ∧ M</formula><p>Let Min[M 0 be a set of minimal (wrt ≤) reachable markings of the net S. As members of Min[M 0 are incomparable, the set Min[M 0 is finite, by Lemma 1.</p><p>Le us denote by RE a,b the set of all reachable markings of the net S enabling actions a and b simultaneously:</p><formula xml:id="formula_10">RE a,b = {M ∈ [M 0 | M a ∧ M b} = E a,b ∩ [M 0 .</formula><p>Let Min(RE a,b ) be a set of all minimal reachable markings of the net S enabling action a and b simultaneously.</p><p>Let us recall the Set Reachability Problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Set Reachability Problem</head><p>Instance:P/t-net S = (N, M 0 ) and a set X ⊆ N |P | . Question:Is there a marking M ∈ X, reachable in S?</p><p>Theorem 5. If X ⊆ N k is a rational convex set, then the X-Reachability Problem is decidable in the class of p/t-nets.</p><p>Proof. In <ref type="bibr" target="#b1">[2]</ref>.  Proof. We introduce an algorithm of deciding if an action a pushes the execution of an action b away for more than k steps in some reachable marking M .</p><p>1. We check whether any markings from the set E a,b is reachable. (a) If not, we answer NO. (b) Otherwise: i. We build the set Min(RE a,b ).</p><p>ii. For all markings M 1 ∈ Min(RE a,b ):</p><formula xml:id="formula_11">M 2 := M 1 a.</formula><p>We build a part of the depth of k+1 (the (k+1)-component) of the reachability tree of (N, M 2 ). If the piece has an edge labeled by b, we answer NO. Otherwise we answer YES.</p><p>And now the proof of decidability of the EL-k Net Persistency Problem is ready.  From <ref type="bibr" target="#b1">[2]</ref> we know that the problems are decidable. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Questions for Further Work</head><p>It is shown in <ref type="bibr" target="#b0">[1]</ref> that if we change the firing rule in the following way: only e/e-persistent computations are permitted, then we get a new class of nets (we call them nonviolence nets) which are computationally equivalent to Turing machines. We plan to investigate net classes, with firing rules changed (only e/l-kpersistent computations are allowed) and answer the question:</p><p>Question 1: What is the computational power of nets created this way?</p><p>We investigated p/t-nets because they are easy to examine (mainly due to their convenient properties such as the monotonicity property). We would like to study the hierarchy of e/l-k-persistency in more difficult extensions of p/t-nets.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Non-monotonic inhibitor net</figDesc><graphic coords="5,273.13,116.81,69.07,54.27" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>(∀b ∈ T, b = a) M b ⇒ [M ab ∨ (∃c ∈ T )M acb] (the execution of an action a pushes the execution of any other enabled action away for at most 1 step); e/l-2-persistent iff (∀b ∈ T, b = a) M b ⇒ (∃w ∈ T * )[|w| ≤ 2 ∧ M awb] (the execution of an action a pushes the execution of any other enabled action away for at most 2 steps); . . . e/l-k-persistent for some k ∈ N iff (∀b ∈ T, b = a) M b ⇒ (∃w ∈ T * )[|w| ≤ k∧ M awb] (the execution of an action a pushes the execution of any other enabled action away for at most k steps); . . . e/l-∞-persistent iff (∀b ∈ T, b = a) M b ⇒ (∃w ∈ T * ) M awb (the execution of an action a pushes the execution of any other enabled action away).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. An inhibitor net and its infinite computation</figDesc><graphic coords="9,221.26,116.93,172.69,65.71" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Theorem 4 .</head><label>4</label><figDesc>b}-the set of markings enabling actions a and b simultaneously. Let us define minE a,b ∈ N |P | , the minimum marking enabling actions a and b simultaneously: if ( • a[i] = 1 ∨ • b[i] = 1) then minE a,b [i] := 1 else minE a,b [i] := 0 (for i = {1, . . . , |P |}). Note that minE a,b = minE a,b + N |P | . Let us formulate an auxiliary problem: Mutual Enabledness Reachability Problem Instance:P/t-net S = (N, M 0 ), actions a, b ∈ T . Question:Is there a marking M such that M ∈ E a,b and M ∈ [M 0 ? (Is there a reachable marking M such that actions a and b are both enabled in M ?) The Mutual Enabledness Reachability Problem is decidable.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Proposition 1 .Example 3 .Proposition 2 .</head><label>132</label><figDesc>The set Min(RE a,b ) can be effectively constructed. Proof. Sketch of the proof: We put into work the theory of residue sets of Valk/Jantzen [14]. By Valk's/Jantzen's Theory, to show that the set of minimal elements of the set RE a,b is effectively computable, it is enough to demonstrate that the set RE a,b ↑ has the property RES (where RE a,b ↑= {x ↑| x ∈ RE a,b } and x ↑= {z ∈ N |P | | x ≤ z}). We show it using decidability Theorem 5). The set of all minimal reachable markings of the net depicted in Fig.4 enabling action a and b simultaneously, is Min(RE a,b ) = {[1, 1, 1], [2, 0, 1]}. If there exists a marking M ∈ RE a,b such that the execution of an action a in M pushes the execution of an action b away for more than k steps (for some k ∈ N), then there exists some minimal marking M ∈ Min(RE a,b ) such that the execution of an action a in M pushes the execution of an action b away for more than k steps, too.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 4 .Theorem 6 .</head><label>46</label><figDesc>Fig. 4. A p/t-net.</figDesc><graphic coords="11,238.56,116.96,138.27,143.01" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Theorem 7 .</head><label>7</label><figDesc>The EL-k Net Persistency Problem is decidable (for any k ∈ N).Proof. S is e/l-k-persistent iff the algorithm solving EL-k Transition Persistency Problem answers NO for all ordered pairs (a, b) ∈ T × T , a = b.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Finally, let us</head><label></label><figDesc>bring to mind decision another problems defined in [2]: Transitions Persistency Problems Instance:P/t-net S = (N, M 0 ), and transitions a, b ∈ T, a = b. Questions (informally): EE-Persistency Problem: Does a disable an enabled b? LL-Persistency Problem: Does a kill a live b? EL-Persistency Problem: Does a kill an enabled b?</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Theorem 8 .Theorem 9 .</head><label>89</label><figDesc>For a given p/t net S = (N, M 0 ) and a pair of transitions a, b ∈ T one can calculate a minimum number k a,b ∈ N such that a postpones an enabled b for at most k a,b steps (if such a number exists). Proof. We ask whether a kills an enabled b (EL-Persistency Problem). If YES then k a,b does not exist (a kills b) else: We compute a set Min(RE a,b ). We build the reachability tree as long as from every M ∈ Min(RE a,b ) a path leads to a vertex M (it can be an empty path) such M b. The maximum length of such paths is the desired number k a,b . If a p/t-net S = (N, M 0 ) is e/l-persistent, then it is e/l-k-persistent for some k ∈ N and such a k can be effectively computed. Proof. For every pair (a, b) of transitions we find k a,b defined above. The number we are looking for is k = max(k a,b : a, b ∈ T ).</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">PNSE'12 -Petri Nets and Software Engineering</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="128" xml:id="foot_1">PNSE'12 -Petri Nets and Software Engineering</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="132" xml:id="foot_2">PNSE'12 -Petri Nets and Software Engineering</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Acknowledgments</head><p>The authors are very grateful to the anonymous referees, for their very sound remarks and suggestions.</p></div>
			</div>


			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The study is cofounded by the European Union from resources of the European Social Fund.Project PO KL "Information technologies: Research and their interdisciplinary applications", Agreement UDA-POKL.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On persistent reachability in petri nets</title>
		<author>
			<persName><forename type="first">Kamila</forename><surname>Barylska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lukasz</forename><surname>Mikulski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Edward</forename><surname>Ochmanski</surname></persName>
		</author>
		<ptr target=".org" />
	</analytic>
	<monogr>
		<title level="m">ACSD/Petri Nets Workshops</title>
				<editor>
			<persName><forename type="first">Susanna</forename><surname>Donatelli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Jetty</forename><surname>Kleijn</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Ricardo</forename><forename type="middle">Jorge</forename><surname>Machado</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">João</forename><forename type="middle">M</forename><surname>Fernandes</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">827</biblScope>
			<biblScope unit="page" from="373" to="384" />
		</imprint>
	</monogr>
	<note type="report_type">CEUR-WS</note>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Levels of persistency in place/transition nets</title>
		<author>
			<persName><forename type="first">Kamila</forename><surname>Barylska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Edward</forename><surname>Ochmanski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundam. Inform</title>
		<imprint>
			<biblScope unit="volume">93</biblScope>
			<biblScope unit="issue">1-3</biblScope>
			<biblScope unit="page" from="33" to="43" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Model checking of persistent Petri nets</title>
		<author>
			<persName><forename type="first">E</forename><surname>Best</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Esparza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">626</biblScope>
			<biblScope unit="page">35</biblScope>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Decomposition theorems for bounded persistent petri nets</title>
		<author>
			<persName><forename type="first">Eike</forename><surname>Best</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Philippe</forename><surname>Darondeau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Petri Nets</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Kees</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Rüdiger</forename><surname>Van Hee</surname></persName>
		</editor>
		<editor>
			<persName><surname>Valk</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5062</biblScope>
			<biblScope unit="page" from="33" to="51" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Place or transition petri nets</title>
		<author>
			<persName><forename type="first">Jorg</forename><surname>Desel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wolfgang</forename><surname>Reisig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Basic Models, Advances in Petri Nets</title>
		<title level="s">Lecture Notes in Computer Science (LNCS</title>
		<editor>
			<persName><forename type="first">Wolfgang</forename><surname>Reisig</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Grzegorz</forename><surname>Rozenberg</surname></persName>
		</editor>
		<meeting><address><addrLine>New York; Dagstuhl, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="1996-09">September 1996. 1998</date>
			<biblScope unit="volume">1491</biblScope>
			<biblScope unit="page" from="122" to="173" />
		</imprint>
	</monogr>
	<note>Lectures on Petri Nets. revised paper</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Finiteness of the odd perfect and primitive abundant numbers with n distinct prime factors</title>
		<author>
			<persName><forename type="first">Leonard</forename><forename type="middle">E</forename><surname>Dickson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Amer. J. Math</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="413" to="422" />
			<date type="published" when="1913">1913</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The decidability of persistence for vector addition systems</title>
		<author>
			<persName><forename type="first">Jan</forename><surname>Grabowski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="20" to="23" />
			<date type="published" when="1980-08-29">29 August 1980</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Decidability questions for petri nets</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hack</surname></persName>
		</author>
		<idno>TR-161</idno>
	</analytic>
	<monogr>
		<title level="j">for Comp. Sci</title>
		<imprint>
			<date type="published" when="1976-06">June 1976</date>
		</imprint>
		<respStmt>
			<orgName>MIT Lab</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">On structural conditions for weak persistency and semilinearity of petri nets</title>
		<author>
			<persName><forename type="first">Ichikawa</forename><surname>Hiraishi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">TCS: Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">93</biblScope>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Parallel program schemata</title>
		<author>
			<persName><forename type="first">R</forename><surname>Karp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Miller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computer and System Sciences</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="147" to="195" />
			<date type="published" when="1969">1969</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Properties of conflict-free and persistent petri nets</title>
		<author>
			<persName><forename type="first">Robertson</forename><surname>Landweber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JACM: Journal of the ACM</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Persistence of vector replacement systems is decidable</title>
		<author>
			<persName><forename type="first">Ernst</forename><forename type="middle">W</forename><surname>Mayr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Acta Informatica</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="309" to="318" />
			<date type="published" when="1981">1981</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Starke</surname></persName>
		</author>
		<title level="m">Petri-Netze</title>
				<meeting><address><addrLine>East Berlin, GDR</addrLine></address></meeting>
		<imprint>
			<publisher>VEB Deutscher Verlag der Wissenschaften</publisher>
			<date type="published" when="1980">1980</date>
		</imprint>
	</monogr>
	<note>in German</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The residue of vector sets with applications to decidability problems in petri nets</title>
		<author>
			<persName><forename type="first">Jantzen</forename><surname>Valk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACTAINF: Acta Informatica</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Normal petri nets</title>
		<author>
			<persName><surname>Yamasaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">TCS: Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">On weak persistency of Petri nets</title>
		<author>
			<persName><forename type="first">Hideki</forename><surname>Yamasaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="94" to="97" />
			<date type="published" when="1981-12-13">13 December 1981</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
