Non-Deterministic Matching Algorithm for Net Transformations Electronic Communications of the EASST Volume 68 (2014) Proceedings of the 8th International Workshop on Graph-Based Tools (GraBaTs 2014) Non-Deterministic Matching Algorithm for Net Transformations Mathias Blumreiter and Julia Padberg 14 pages Guest Editors: Matthias Tichy, Bernhard Westfechtel Managing Editors: Tiziana Margaria, Julia Padberg, Gabriele Taentzer ECEASST Home Page: http://www.easst.org/eceasst/ ISSN 1863-2122 http://www.easst.org/eceasst/ ECEASST Non-Deterministic Matching Algorithm for Net Transformations Mathias Blumreiter1 and Julia Padberg2 1 Technical University Hamburg-Harburg, Germany 2 Hamburg University of Applied Sciences, Germany julia.padberg@haw-hamburg.de Abstract: Modeling and simulating dynamic systems require to represent their pro- cesses and the system changes within one model. To that effect, reconfigurable Petri nets consist of a place/transition net and a set of rules that can modify the Petri net. The application of a rule is based on finding a suitable match of the rule in the given net. This match is an isomorphic subnet that has to be located meeting requirements of the rule application as well as the simulation. In this paper a non-deterministic al- gorithm is presented for the matching in reconfigurable Petri nets. It is an extension of the VF2 algorithm for graph (sub-)isomorphisms. We show that this extension is correct and complete. Non-determinism ensures that during simulation different matches can be found for each transformation step and is hence crucial for the sim- ulation. But non-determinism has not been present in the VF2 algorithm. For the matching algorithm non-determinism is proven. Keywords: Reconfigurable Petri nets, matching algorithm, non-determinism, sim- ulation, net transformation 1 Introduction Motivation for reconfigurable Petri nets, a family of formal modeling techniques (e.g., in [EP03, LO04, KCD10]) is the observation that in increasingly many application areas the underlying system has to be dynamic in a structural sense. Complex coordination and structural adaptation at run-time (e.g., mobile ad-hoc networks, communication spaces, ubiquitous computing) are main features that need to be modeled adequately. The distinction between the net behavior and the dynamic change of its net structure is the characteristic feature that makes reconfigurable Petri nets so suitable for systems with dynamic structures. Reconfigurable Petri nets consist of marked Petri nets, i.e., a net with a marking, and a set of rules whose application modifies the net’s structure at runtime. For the sake of the main focus we subsequently consider only a small and abstract example. More complex nets and rules can be found in case studies for the applications of reconfigurable Petri nets (see [Gab14, Mod12, Rei12]). As an example of a dynamic system we use a cyclic process that can either be executed or modified. These modifications change the process by inserting addi- tional sequential steps using rule sequential_ext in Fig. 1(a) or by forking into parallel steps rule parallel_ext in Fig. 1(b). The colors of the places and transitions indicate the mappings within the rule. The net in Fig. 2(a) describes a cyclic process that can execute one step and then returns to the start. The left-hand side of the rule is the net L and shows the places 1 / 14 Volume 68 (2014) mailto:julia.padberg@haw-hamburg.de Non-Deterministic Matching Algorithm for Net Transformations (a) rule sequential_ext (b) rule parallel_ext Figure 1: Rules that need to be in the context and the transition that is deleted. In the right hand side of the rule is the net R and shows the added place and transitions as well as the context. For reasons of space we have omitted the intermediate net K that denotes the context explicitly. The rule sequential_ext is the first rule that can be applied by matching L in net start_net in Fig. 2(a). Reconfigurable Petri nets allow the application of these rules together with the firing of the transitions. Let the application of rule sequential_ext_s be the first step, followed by a firing step. This results in the net in Fig. 2(b). The resulting net has an additional place and an additional transition, denoting the process to have been modified by inserting a sequential step. Moreover, the next step has already been executed by firing the transition in the post-domain of the first place. These steps are chosen non-deterministically, so the start net in Fig. 2(a) may evolve in 20 steps to the net in Fig. 2(c) by firing transitions or applying rules. (a) net start_net (b) net after 2 steps (c) net after 20 steps Figure 2: Start and intermediate nets Proc. GraBaTs 2014 2 / 14 ECEASST The simulation of reconfigurable Petri nets has to cover the full behavior. If this is not the case, not all possible runs can be simulated and the simulation is not coherent with the semantics of reconfigurable Petri nets. Hence, it is crucial that the search of the match is non-deterministic. The match is the occurrence of a left hand side L of a rule to a target net N and is given by an injective net morphism. So, the main contribution of this paper is the presentation and imple- mentation of the non-deterministic algorithm PNVF2. This algorithm is an adaption of the VF2 algorithm [CFSV04b] for subgraph isomorphism, because a match, that is the injective occur- rence morphism, can be considered to be equivalent to a net L being isomorphic to subnet of N. The PNVF2 algorithm is correct and complete and - in contrast to the VF2 algorithm - it is non-deterministic. The paper is organized as follows: First we define reconfigurable Petri nets based on place/ transition nets. In the next section we outline the algorithm, called PNVF2, that finds non- deterministically a match of the left hand side of a given rule in a given net. We explain its main function and the data structures for the representation of the state space. In Section 4 we show that the algorithm is correct and complete, state its non-determinism and discuss its complexity. n Section 5 we then discuss related and ongoing work. 2 Reconfigurable Petri Nets We use the algebraic approach to Petri nets, so a marked place/transition net is given by N = (P,T, pre, post,m) with pre- and post-domain functions pre, post : T → P⊕ and a marking m∈ P⊕, where P⊕ is the free commutative monoid over the set P of places. Markings m1,m2 ∈ P⊕ are given by multisets or linear sums of places, defined by the free commutative monoid over the set P of places. Accordingly, we can extend relations (≤), addition (⊕) and substraction ( ) to markings. E.g., we have m1 ≤ m2 if m1( p) ≤ m2( p) for all p ∈ P. A transition t ∈ T is m-enabled for a marking m ∈ P⊕ if we have pre(t) ≤ m, and in this case the follower marking m′ is given by m′ = m pre(t)⊕ post(t) and m[t〉m′ is called firing step. To obtain the weight of an arc from a place to a transition t the pre-domain function is restricted to that place, i.e. pre(t)|p = λp ∈N for pre(t) = ∑ p∈P λp p; analogously the weight of an arc from a transition to a place is given by the restriction of the post-domain function. Note, that in [Blu13] as well as RECONNET1 decorated nets are considered. For the sake of brevity we here merely consider place/transition nets. Place/transition nets yield an M-adhesive HLR category. M-adhesive HLR systems can be considered as a unifying framework for graph and Petri net transformations providing enough structure that most notions and results from algebraic graph transformation systems are avail- able: results on parallelism and concurrency of rules and transformations, results on negative application conditions and constraints, and so on (e.g., in [EEPT06]). Net morphisms are given as a pair of mappings for the places and the transitions, so that the structure and the decoration and the marking are preserved. So, a net morphism f : N1 → N2 between two place/transition nets Ni = (Pi,Ti, prei, posti,mi,) for i ∈{1,2} is given by f = ( fP : P1 → P2, fT : T1 → T2), so that pre2◦ fT = f ⊕P ◦ pre1 and post2◦ fT = f ⊕ P ◦ post1 and m1( p) ≤ m2( fP( p)) for all p ∈ P1. Moreover, the morphism f is called strict if both fP and fT are injective and m1( p) = m2( fP( p)) holds for all p ∈ P1. 1 The tool RECONNET has been developed at the HAW Hamburg in various students projects (see [EHOP12]). 3 / 14 Volume 68 (2014) Non-Deterministic Matching Algorithm for Net Transformations A rule in the DPO-approach given by three nets called left hand side L, interface K and right hand side R, respectively, and a span2 of two strict net morphisms K → L and K → R. Then a match (or occurrence) morphism o : L → N is required that identifies the relevant parts of the left hand side in the given net N. Then a transformation step N (r,o) =⇒ N′ via rule r can be constructed in two steps. Given a rule with a match o : L → N the gluing conditions have to be satisfied in order L o �� (1) Koo // �� (2) R �� N Doo // N′ Figure 3: Net transformation to apply a rule at a given match. These conditions ensure the result is again a well-defined net. In this case, we obtain a net N′ leading to a direct transformation N (r,o) =⇒ N′ consisting of the pushouts (1) and (2) in the category of place/transition nets (see Fig. 3). So, we combine one place/transition net N together with a set of net transformation rules leading to reconfigurable place/- transition nets. Definition 1 (Reconfigurable Nets) A reconfigurable place/transition net RN = (N,R) is given by a place/transition net N and a set of net transformation rules R. 3 Matching Algorithm PNVF2 In this section we outline an algorithm that finds a match of a left hand side L of a rule in a given net N. This match being an injective net morphism implies specific requirements the algorithm has to satisfy the preservation of the net structure, that is preservation of the transitions pre- and post-domain as well as the preservation of the marking. It has to discover only adequate matches with respect to gluing conditions and it has to deliver correct matches, including the possibility of delivering all matches and ensuring the non-determinism of the simulation. For graphs one of the efficient algorithms for subgraph isomorphism is the VF2 that allows the satisfaction of the above mentioned requirements. 3.1 Outline of the Algorithm The adaptation of the VF2 algorithm [CFSV04b] to Petri nets, called PNVF2 algorithm [Blu13], uses of an intricate data structure. In contrast to the VF2 algorithm the PNVF2 algorithm needs to consider the pre- and post-domain of transitions. Given two nets N j = (P j,T j, pre j, post j,m j) for j ∈ {1,2} with pre- and post-domain functions pre j, post j : T → P⊕ we are looking for an injective morphism, the match M = (MP : P1 → P2, MT : T1 → T2). For convenience we use M as a relation M = {(v,w) | v 7→ w} as well, especially the two sets M1 = {v | (v,w) ∈ M} and M2 = {w | (v,w) ∈ M}. As a small example (in Subsect. 3.2) we consider the nets given in Fig. 4 on page 9 and search a match of N1 in N2, where the indices of places and transitions represent an fixed, but arbitrary order. The match is computed by searching recursively the possible mappings of places and tran- sitions. In the algorithm the match M describes an injective partial morphism defined by the 2 Actually, RECONNET implements the co-span DPO approach, but for the matching algorithm this is irrelevant . Proc. GraBaTs 2014 4 / 14 ECEASST current match. For the computation of the match M the PNVF2 performs a recursive depth-first search. The possible mappings of the nodes constitute the search space. At each level of re- cursion, the algorithm tries to map a source node from net N1 to different target nodes in N2. For the computation of the match we do not differentiate between places and transitions, as the search space is a combination of the place and the transition mappings. At each recursion level only one type of nodes, either places or transitions, is investigated. The node type is chosen non- deterministically, yielding candidate pairs of places or transitions. These are possible mappings and they are checked for feasibility. This feasibility comprises several conditions that ensure the preservation of the net structure, that is preservation of the transitions pre- and post-domain and the preservation of the marking. For each state s of the matching process there is a corresponding partial match M(s) = (MP(s) : P1 → P2, MT (s) : T1 → T2), which contains only a subset of the complete M. Algorithm 1 PNVF2 establish arbitrary order for places and for transitions in both nets initialize M(s0) = ∅ initialize arrays core,in and out function MATCH( intermediate state si) if (P1 ∪T1) = M1(si) then match M(si) is complete return . termination with a match else compute terminal and residual node sets compute set of candidate pairs P(si) for all (v,w) ∈ P(si) do if f easible(si,v,w) = true then compute si+1 by M(si+1) = M(si)∪{(v,w)} update arrays core,in and out MATCH(si+1) restore arrays core,in and out end if end for if i > 0 then backtrack to si−1 else no match found return . termination without a match end if end if end function After the successful mapping of a candidate the algorithm examines a new pair at the next recursion level. In this way increasing parts of the match are computed. At each recursion level 5 / 14 Volume 68 (2014) Non-Deterministic Matching Algorithm for Net Transformations the terminal and the residual node sets are computed. For j ∈ {1,2} the sets T in|outP j|T j (s) 3are based on the in- and outgoing arcs (in or out) of the current match to places and transitions for the view from net N1 or net N2. E.g., T outP1 (s) = {p ∈ (P1 − M1) | p ≤ post1(t) for t ∈ M1(s)} is the set of places, that are reached from the nodes (i.e., transitions) of net N1, that already belong to the current partial match M(s). The corresponding terminal sets T termj (s) = T in P j (s)∪T outP j (s)∪ T inT j (s)∪T out T j (s) unite the in- and outgoing places and transitions. The residual node sets P̃ j|T j contain those nodes of N j for j ∈ {1,2} that are neither in the current match nor connected to any node of the current match, e.g., P̃2(s) = P2 − M2(s)−T term2 (s). Based on these sets the set of candidate pairs is computed. According to the pre-defined order, that has been fixed during initialization, the smallest place and the smallest transition of net N1 is examined next. The possible candidate pairs of terminal nodes are given by PT in|outX = {min T in|outX1 (s)}×T in|out X2 (s) for X ∈ {P,T}. Analogously, the possible candidate pairs of residual nodes are given for X ∈ {P,T} by PX̃ = {min X̃1(s)}× X̃2(s). For the example (in Subsect. 3.2) the empty match of the first state s0 is given by M(s0) = ∅ and P(s0) = PP̃(s0) = {( p1, pa),( p1, pb),( p1, pc)} and the first candidate is the pair ( p1, pa), as p1 and pa are the first places of the corresponding order. The PNVF2 examines the terminal out sets PT outP and PT outT first. If they are empty, the candi- dates given in the terminal in sets PT inP and PT inT are used. Lastly, the candidates of the residual node sets are considered for X ∈ {P,T}: P(s) =  PT outX (s) if PT outP (s)∪PT outT (s) ,∅ PT inX (s) if PT out P (s)∪PT outT (s) = ∅∧PT inP (s)∪PT inT (s) ,∅ PX̃ (s) if PT outP (s)∪PT outT (s) = ∅∧PT inP (s)∪PT inT (s) = ∅ (1) For the candidate pair ( p1, pa) from the example (in Subsect. 3.2) we have P(s1) = PT outT (s1) = {t1}, PT inT (s1) = {t2} and PT̃ (s1) = {t3} in state s1. Since Petri nets are bipartite, the corresponding sets for places are empty. These candidate pairs are not necessarily matching pairs. Similarly to VF2 [CFSV04b], the feasibility function preserves the net structure and prunes the search space. f easible(s,v,w) depends on the state s and a candidate pair (v,w) ∈ P(s), that is either a pair of places or a pair of transitions, so for X ∈ {P,T} we have f easible(s,v,w) = f easibleX (s,v,w) with (v,w) ∈ X1 ×X2. The conditions for the feasibility are presented in six rules (see [Blu13]), which may differ for places and transitions defined below. The first rules are concerned with the preservation of the net structure, so that the found match is an injective net morphism. • rulesem,P states that the marking needs to preserved. • rulesem,T states that the number of in- and outgoing arcs of both transitions must be the same. rulesem,P ≡ m1( p1) ≤ m2( p2) rulesem,T ≡ cardpre1 (t1) = cardpre2 (t2)∧cardpost1 (t1) = cardpost2 (t2) (2) 3 T in|outP j|T j is a short notation for T in P j , T outP j , T in T j or T outT j . Proc. GraBaTs 2014 6 / 14 ECEASST • rulepred,P and rulepred,T examine the predecessors of the candidate pair. rulepred,P(s, p1, p2) ensures that for each transition t1 of N1 in the current match there is a transition t2 of N2 in the current match so that post1(t1)|p1 = post2(t2)|p2 . So, rulepred,T (s,t1,t2) ensures that for each place p1 of N1 in the match there is a place p2 = M(s)( p1) of N2 in the match so that pre1(t1)|p1 = pre2(t2)|p2 . • Analogously, rulesucc,P and rulesucc,T examine the successors of the candidate pair. rulepred,P(s, p1, p2) ≡∀t1 ∈ M1(s)∩T1 : post1(t1)|p1 = post2(M(s)(t1))|p2 rulepred,T (s,t1,t2) ≡∀p1 ∈ M1(s)∩P1 : pre1(t1)|p1 = pre2(t2)|M(s)(p1) rulesucc,P(s, p1, p2) ≡∀t1 ∈ M1(s)∩T1 : pre1(t1)|p1 = pre2(M(s)(t1))|p2 rulesucc,T (s,t1,t2) ≡∀p1 ∈ M1(s)∩P1 : post1(t1)|p1 = post2(t2)|M(s)( p1) (3) Each pair that satisfies the rules (2) and (3) leads to a correct partial match if added to the current state. However, the pursuit of all following states does not necessarily pay off. The following rules check the possibility of mapping the neighborhood of the candidates and hence prune the search space. • The rules rulein,T |P and ruleout,T |P perform a lookahead of size one for places and for transitions in the searching process by checking that there are at least as many adjacent nodes in the corresponding terminal sets of net N2 as there are in the sets of net N1. Since net morphisms preserve the pre- and post domain of the transitions the number of adjacent places must match. • The rules rulenew,T |P perform a lookahead of size two as it checks the amount of adjacent nodes in the residual node sets. rulein|out,P(sn, p1, p2) ≡ |{t1 | t1 ∈ T in|out T1 ∧ post1(t1)|p1 > 0}|≤ |{t2 | t2 ∈ T in|out T2 ∧ post2(t2)|p2 > 0}| ∧|{t1 | t1 ∈ T in|out T1 ∧ pre1(t1)|p1 > 0}|≤ |{t2 | t2 ∈ T in|out T2 ∧ pre2(t2)|p2 > 0}| rulein|out,T (sn,t1,t2) ≡ |{p1 | p1 ∈ T in|out P1 ∧ pre1(t1)|p1 > 0}| = |{p2 | p2 ∈ T in|out P2 ∧ pre1(t2)|p2 > 0}| ∧|{p1 | p1 ∈ T in|out P1 ∧ post1(t1)|p1 > 0}| = |{p2 | p2 ∈ T in|out P2 ∧ post2(t2)|p2 > 0}| rulenew,P(sn, p1, p2) ≡ |{t1 | t1 ∈ T̃1 ∧ post1(t1)|p1 > 0}|≤ |{t2 | t2 ∈ T̃2 ∧ post2(t2)|p2 > 0}| ∧|{t1 | t1 ∈ T̃1 ∧ pre1(t1)|p1 > 0}|≤ |{t2 | t2 ∈ T̃2 ∧ pre2(t2)|p2 > 0}| rulenew,T (sn,t1,t2) ≡ |{p1 | p1 ∈ P̃1 ∧ pre1(t1)|p1 > 0}| = |{p2 | p2 ∈ P̃2 ∧ pre1(t2)|p2 > 0}| ∧|{p1 | p1 ∈ P̃1 ∧ post1(t1)|p1 > 0}| = |{p2 | p2 ∈ P̃2 ∧ post2(t2)|p2 > 0}| (4) Accordingly, feasibility of pairs of places is given by f easibleP ≡ rulesem,P ∧rulepred,P ∧rulesucc,P ∧rulein,P ∧ruleout,P ∧rulenew,P (5) 7 / 14 Volume 68 (2014) Non-Deterministic Matching Algorithm for Net Transformations and feasibility of pairs of transitions is given by f easibleT ≡ rulesem,T ∧rulepred,T ∧rulesucc,T ∧rulein,T ∧ruleout,T ∧rulenew,T (6) Looking at the example (in Subsect. 4) the pair (t1,tb) cannot be considered for the match since f easibleT (s1,t1,tb) ≡ f alse. This results from rulesem,T because t1 has less incoming and outgo- ings arcs than tb. The representation of the state uses six integer arrays for each net N j, namely core j,X,in j,X,out j,X for j ∈ {1,2} and X ∈ {P,T}. These arrays are shared among all states, so if the algorithm backtracks, it restores the previous value for these arrays. The elements of these arrays are ordered according to the (arbitrary, but fixed during initialization) order of the nodes, i.e., the second element of core1,P refers to the second place of net N1 and the third element of in2,T refers to the third transition in net N2. In Subsect. 4 the six core array are presented by tables for different states in Fig. 4. In state s1 the array core1 and the array core2 are presented in the second row. The order of the nodes in both nets is given by the implicit order of their indices. So, p2 of net N1 is represented in the third column, and td of net N2 in the last column. The core arrays are used for the mappings from the perspective of each net. The elements position in the core array refers to the position of the node in the corresponding net, whereas the value refers to the mapped node in the other net. The elements of core1 and core2 point mutually to each other. The in and out arrays manage the terminal and residual node sets. Adding a pair of nodes to the current state changes the values of in and out for the neighboring nodes. The value coincides with the recursion depth, in which a node enters the terminal node set. If a pair of nodes is added to the state only those fields are set to the current depth that do not have a value. The combination of core, in and out arrays, the terminal and residual node sets can be computed. In state s2 (see Subsect. 3.2) the mapping of p1 in net N1 to the place pc in net N2 leads to core1,P[1] = 3 and core2,P[3] = 1 and the mapping of t1 to tc leads to core1,T [1] = 3 and core2,T [3] = 1. 3.2 Example For the nets given in Fig. 4, the empty match of the first state s0 is given by M(s0) = ∅ and P(s0) = PP̃(s0) = {( p1, pa),(p1, pb),(p1, pc)}. Hence, the arrays are empty as well. Ac- cording to the predefined order (given by the obvious order of the indices) the candidate pair ( p1, pa) is chosen. As f easibleP(s0, p1, pa) holds, M(s1) = {( p1, pa)} with the corresponding core, in and out arrays for state s1 in Fig. 4. Then P(s1) = PT (s1) = {(t1,tb)} is computed, but f easibleT (s1,t1,tb) ≡ f alse∧···≡ f alse. So, the algorithm backtracks and computes a new state s1 based on P(s0) = PP(s0) = {( p1, pb),( p1, pc)} leading to M(s1) = {( p1, pc)} and the arrays of state s1 in Fig. 4. Next we obtain P(s1) = PT (s1) = {(t1,tb),(t1,tc)} with f easibleT (s1,t1,tb) ≡ f alse and f easibleT (s1,t1,tc) ≡ true. The next recursion step yields M(s2) = {( p1, pc),(t1,tc)} and the arrays of state s2. Then P(s2) = PP(s2) = {( p2, pb)} and f easibleP(s2, p2, pb) ≡ true. This leads to M(s3) = {( p1, pc),(t1,tc),(p2, pb)} and the candidate pairs P(s3) = {(t2,ta),(t2,tb),(t2,td )} and f easibleT (s3,t2,ta) holds. There is no more backtracking necessary and the last state is s5 with M(s5) = {( p1, pc),(t1,tc),(p2, pb),(t2,ta),(t3,td )} being an injective net morphism. The corresponding arrays for state s5 are given in Fig. 4. Proc. GraBaTs 2014 8 / 14 ECEASST s1 N1 N2 P T P T core1 1 core2 1 in1 1 1 in2 1 1 out1 1 1 out2 1 1 new s1 N1 N2 P T P T core1 3 core2 1 in1 1 1 in2 1 1 out1 1 1 out2 1 1 1 s2 N1 N2 P T P T core1 3 3 core2 1 1 in1 1 2 1 in2 1 1 2 out1 1 2 1 out2 2 1 1 1 s5 N1 N2 P T P T core1 3 2 3 1 4 core2 2 1 2 1 3 in1 1 3 2 1 5 in2 3 1 1 3 2 5 out1 1 2 1 3 3 out2 2 1 4 1 1 3 Figure 4: Nets N1 and N2 and some states 4 Evaluation of PNVF2 4.1 Correctness Both the VF2 and the PNVF2 guarantee the correctness of the found matches. A match is considered to be correct if the structure of the source net and its annotations are preserved. And the match has to be an injective morphism. To satisfy these conditions, the algorithms examine the candidates before they add them to the respective part of the match. The candidate selection during the recursive descent makes sure that the mapping is injective. And the function f easible ensures structural and semantic compatibility. The correctness of PNVF2 is stated explicitly in Theorem 1. For Lemma 1 we need at each state the corresponding partial nets4. In these partial nets the sets of places and the sets of transitions are restricted to the matched places and transitions. Given j ∈ {1,2} and 0 ≤ i ≤ |P1|+ |T1| we define Q j,i with places P j ∩ M j(si) and transitions T j∩M j(si), and the pre- and post-domain are given by pre j|T j∩M j(si) and post j|T j∩M j(si) and the other functions accordingly. Obviously, the partial nets Q j,i are well-defined. Then each state computed by PNVF2 leads to an injective net morphism between the corresponding partial nets. 4 Note, that these nets are subgraphs but there are not necessarily net morphisms form Q j,i to N j. 9 / 14 Volume 68 (2014) Non-Deterministic Matching Algorithm for Net Transformations Lemma 1 (Correctness of f easible) Let 1 ≤ i ≤ n = |P1|+ |T1| be given. 1. If M(si−1) : Q1,i−1 → Q2,i−1 is an injective net morphism and f easible(si−1,v,w) holds for (v,w) ∈ P(si−1) and M(si) = M(si−1)∪{(v,w)}, then M(si) : Q1,i → Q2,i is an injective net morphism as well. 2. If f easible(si,v,w) = f alse, there is no injective net morphism f : N1 → N2 with fQ := f|Q1,i+1 : Q1,i+1 → Q2,i+1, where Q j,i+1 are the partial nets induced by the match M(si+1) = M(si)∪{(v,w)}. Proof sketch 1. Since M(si−1) : Q1,i−1 → Q2,i−1 is an injective net morphism, it is an injective mapping of places and an injective mapping of transitions. The addition of a pair of places (or transitions) that are not in the current sets of places (or transitions), yields again an injective mapping. For (v,w) ∈ P1×P2 f easibleP(si−1,v,w) holds (equation 5), hence the marking is preserved (rule 2). Moreover, the net structure is preserved (rule 3). Similarily, for (v,w) ∈ T1×T2 f easibleT (si−1,v,w) holds (equation 6), hence the number of in- and outgoing arcs of both transitions are the same. Moreover, the net structure is preserved (rule 3). Hence, M(si) : Q1,i → Q2,i is an injective net morphism. 2. Failure of f easible(si,v,w) (equation 5) implies that there is no injective morphisms with fQ : Q1,i+1 → Q2,i+1, and hence no f : N1 → N2 with f|Q1,i+1 = fQ. This lemma allows us to deduce that the result of PNVF2 is an injective net morphism. Theorem 1 (PNVF2 is correct and complete.) Let be given two place/transition nets N j with j ∈ {1,2} and n = |P1|+ |T1|. PNVF2 yields M(sn) if and only if there exists an injective net morphism from f : N1 → N2. Proof sketch if: If the algorithm yields M(sn) then f = M(sn) : N1 → N2 is an injective net morphism is shown by induction over n = |P1|+ |T1| the size of N1. Base M(s0) = ∅ is an injective net morphism for N1 being the empty net. Hyp. If PNVF2 yields M(sn−1) for a net N1 of size n−1 = |P1|+ |T1|, then each M(si) : Q1,i → Q2,i is an injective net morphism for i ≤ n−1 . Step For for a net N1 of size n = |P′1|+ |T ′ 1| we have two cases |P′1| = |P1|+ 1 and |T ′ 1| = |T1|. Since PNVF2 yields M(sn) and by induction hypothe- sis there is M(sn−1) : Q1,n−1 → Q2,n−1 an injective net morphism. Since PNVF2 yields M(sn), there is some p′1, p ′ 2 ∈ P(sn−1) so that f easibleP(sn−1, p ′ 1, p ′ 2) holds. We have then M(sn) : Q1,n → Q2,n = M(sn) : N1 → N2 and due to Lemma 1 this is an injective net morphism. |T′1| = |T1|+ 1 and |P ′ 1| = |P1| analogously. only if: If PNVF2 does not yield M(sn), then there is a step in each recursion path, where f easible(si,v,w) fails and due to Lemma 1 there is no injective net morphism f : N1 → N2. Proc. GraBaTs 2014 10 / 14 ECEASST 4.2 Non-Determinism The non-determinism of the matches is paramount for the simulation of reconfigurable nets, since the full potential behavior should be captured. In a situation where several different matches are possible, the algorithm has to deliver different matches for different runs. After sufficiently many runs the algorithm must have delivered each of the possible matches. A very inefficient strategy would be to compute first all possible mappings and to choose then one non-deterministically. Instead we have realized non-deterministic choice at each possible step of the algorithm. Im- plementing non-determinism at every level results in mapping source nodes randomly to target nodes. However, this strategy has also the disadvantage that it is very inefficient, as choosing random pairs the algorithm ignores the structure of the net to a large extent. This causes the matching to fail more often in larger depths of the recursion. The VF2 follows the strategy to map adjacent components to the destination net. For this purpose nodes of the terminal sets are preferred. For the sake of reasonable runtime of the PNVF2, this strategy is maintained. The VF2 algorithm requires a fixed order on the the source nodes and an order on the target nodes. This order determines the sequence in which nodes of the corresponding sets are processed and it ensures that the algorithm does not generate the same states via different execution paths. Any possible order of the nodes is sufficient, as long as it remains stable during the run. We use this fact as the main realization of non-determinism by permuting all places and transitions of both nets at each start of the algorithm. Another, but less influential, implementation of non- determinism is the random choice of the node type (i.e., choosing places or transitions) at each level of the recursion. In order to prove that the algorithm is non-deterministic, i.e., it can compute any injective net morphism between two given nets, we need to state an order of the places and transitions that leads to a given injective net morphism. Then this order is compatible with the given morphism. Lemma 2 (Compatible order) Let an injective net morphism f : N1 → N2 be given. For orders ρ = (ρX j ) : X j →{1,..., |X j|} with X ∈ {P,T} and j ∈ {1,2} with ρP1 ( p) = ρP2 ( fP(p)) and ρT1 (t) = ρT2 ( fT (t)) we have for all 0 ≤ i ≤ n = |P1|+ |T1| and all (v,w) ∈ M(si): There exists a match M(si), so that we have ρX1 (v) = ρX2 (w) If we need not to differentiate between places and transitions we use ρi instead of ρXi . Proof sketch Induction over i for 0 ≤ i ≤ n = |P1|+ |T1|: Base At state s0 we have M(s0) = ∅. Step By induction hypothesis we have M(si) and ρ1(v) = ρ2(w) for all (v,w) ∈ M(si). Then there is minimal ρ1(x) with ρ1(x) = min X1 and X1 ∈ {T in|out P1|T1 ,T̃1, P̃1}. Since f (x) = ρ−12 (ρ1(x)) and since the terminal and residual nodes sets are constructed similarly, we have that x ∈ X1 implies ρ−12 (ρ1(x)) ∈ X2 for X j ∈ {T in|out P j|T j ,T̃ j, P̃ j | j ∈ {1,2}}. So, there is one candidate pair (x,ρ−12 (ρ1(x)) ∈ P(si). As f is an injective net morphism, the rules rulesem, rulepred and rulesucc hold (see rules 2 and 3). rulein, ruleout and rulenew (see rule 4) hold, because the neighboring nodes can be mapped, as f is an injective net morphism. Hence ( f easible(si, x,ρ−12 (ρ1(x))) holds. 11 / 14 Volume 68 (2014) Non-Deterministic Matching Algorithm for Net Transformations Last, let M(si+1) = M(si)∪(x,ρ−12 (ρ1(x)). Theorem 2 (PNVF2 is non-deterministic.) Given f : N1 → N2 an injective net morphism, then PNVF2 can yield M(sn) : N1 → N2, so that M(sn) = f . From Lemma 2 we directly obtain a match M(sn) = f . 4.3 Complexity One of the most important properties of an algorithm is its complexity. In [CFSV04b] the space and time complexity of VF2 has been given for graph isomorphisms by Θ(N) and Θ(N2) for the best case and by Θ(N) and Θ(N! N) for the worst case on the number of nodes N. In principle we have the same complexity measures. Nevertheless, for a more precise investigation of the com- plexity differences of both algorithms the complexity measures have been computed explicitly for the subgraph isomorphisms in [Blu13]. In the following we assume that the execution of an elementary operation, as the reading and setting of the arrays, is done in Θ(1). Time complexity of the VF2 is based on the number of nodes of the source graph n and of the target graph m, and time complexity of the PNVF2 is based on the number of places p1 and transitions t1 of the source net and of the target net p2 and t2. For the PNVF2 the best case occurs if two equally sized nets without any arcs are considered. Due to the lack of arcs any mapping of places (resp. transitions) is a valid match. The worst case occurs if there are two almost complete nets whose search area needs to be investigated completely. In contrast to the best case, the amount of nodes in the target can be significantly higher than in the source. The analysis of the space complexity refers only to the data structures of the algorithms. As a representation of the current matching state, both algorithms use the same instance at each recursion level, namely the arrays core, in and out. Therefore the memory is allocated only once. For each graphs three arrays of length n and m are managed. And the three arrays for each of the nets have the length p1 + t1 and p2 + t2. Due to the reduced search space, as nets are bipartite graphs, we can expect the complexity results to be slightly better. Comparing the complexity measures, we consider a net as a graph, and hence have n = p1 + t1 and m = p2 + t2. Then we can rate p2t2 · ( p2 p1 ) · p1! · ( t2 t1 ) ·t1! ≤ (p2 + t2)2 · p1! ·t1! · ( p2 p1 ) · ( t2 t1 ) ≤ ( p2 + t2)2 · ( p2 p1 ) · ( t2 t1 ) ·( p1 + t1)! ≤ m2 · ( m n ) n! So, we obtain TPNV F2( p1 + t1, p2 + t2)∈O(N!·N), since we have by induction nm 2 · ( m n ) n!≤ N N!, and hence p2t2 · ( p2 p1 ) · p1! · ( t2 t1 ) · t1! ≤ m 2 · ( m n ) ·n! ≤ N · N! for n = p1 + t1, m = p2 + t2 and for N = n + m. 5 Related Work and Conclusion Obviously, reconfigurable Petri nets are closely related to graph transformations (see [MEE10]). AGG [AGG13] and its derivations as the RON-editor [BEMS08] and CPEditor [Mod12], trans- late Petri nets into attributed graphs and net rules to attributed graph rules. But they do not consider directly Petri nets, and hence do not support the separation of dynamics. An extensive Proc. GraBaTs 2014 12 / 14 ECEASST discussion of various matching algorithms has been presented in [CFSV04a] comprising exact as well as inexact algorithms. Due to the nature of the requirements we have investigated merely exact algorithms [MB00, Ull76, DZ09]. For more details see [Blu13]. The extension the VF2 algorithm by domain-specific information has been in order to speed up the pattern matching process. These search plan driven graph pattern matching techniques have been investigated in [GHS09, GBG+06, GSR05]. The Ullmann algorithm has been the basis of the RECONNET’s previous implementation, that was faulty with respect to the non-determinism and moreover did not provide means for the realization of negative application conditions, whereas, the PNVF2 has been adapted accordingly. Ongoing work concerns model checking by translating nets and rules into rewrite logic Maude and an explicit representation of an abstract reachability graph based on [Pad12]. Future work includes the investigation of the runtime behavior and memory consumption of the implemented algorithm and an experimental comparison with the VF2 algorithm to evaluate the implementa- tion. Another fruitful extension of RECONNET are control structures, as the extension of rules with negative application conditions or the introduction of transformation units. Acknowledgements: We are grateful to the referees for their valuable remarks. References [AGG13] AGG. The Attributed Graph Grammar System. 2013. Revision: 02/10/2013 15:25:28. http://user.cs.tu-berlin.de/~gragra/agg/ [BEMS08] E. Biermann, C. Ermel, T. Modica, P. Sylopp. Implementing Petri Net Transformations using Graph Transformation Tools. ECEASST 14, 2008. [Blu13] M. Blumreiter. Algorithmus zum nichtdeterministischen Matching in rekonfigurierbaren Petrinetzen. Bachelor’s thesis, Hamburg University of Applied Sciences, Germany, 2013. [CFSV04a] D. Conte, P. Foggia, C. Sansone, M. Vento. Thirty Years Of Graph Matching In Pat- tern Recognition. International Journal of Pattern Recognition and Artificial Intelligence 18(3):265–298, 2004. [CFSV04b] L. P. Cordella, P. Foggia, C. Sansone, M. Vento. A (sub)graph isomorphism algorithm for matching large graphs. Pattern Analysis and Machine Intelligence, IEEE Transactions on 26(10):1367 – 1372, oct. 2004. [DZ09] Y.-T. Dai, S.-Y. Zhang. A fast labeled graph matching algorithm based on edge matching and guided by search route. In International Conference on Wavelet Analysis and Pattern Recognition. Pp. 1–7. 2009. [EEPT06] H. Ehrig, K. Ehrig, U. Prange, G. Taentzer. Fundamentals of Algebraic Graph Transforma- tion. EATCS Monographs in TCS. Springer, 2006. [EHOP12] M. Ede, K. Hoffmann, G. Oelker, J. Padberg. ReConNet: A Tool for Modeling and Simu- lating with Reconfigurable Place/Transition Nets. In Krause and Westfechtel (eds.), Proc. of the Seventh International Workshop on Graph-Based Tools. Volume 54. Electronic Com- munications of the EASST, 2012. 13 / 14 Volume 68 (2014) http://user.cs.tu-berlin.de/~gragra/agg/ Non-Deterministic Matching Algorithm for Net Transformations [EP03] H. Ehrig, J. Padberg. Graph Grammars and Petri Net Transformations. In Desel et al. (eds.), Lectures on Concurrency and Petri Nets. Lecture Notes in Computer Science 3098, pp. 496– 536. Springer, 2003. [Gab14] K. Gabriel. Interaction on Human-Centric Communication Platforms: Modelling and Anal- ysis using Algebraic High-Level Nets and Processes. PhD thesis, Technische Universität Berlin, 2014. [GBG+06] R. Geiß, G. V. Batz, D. Grund, S. Hack, A. Szalkowski. GrGen: A Fast SPO-Based Graph Rewriting Tool. In Corradini et al. (eds.), Third International Conference on Graph Trans- formations. Lecture Notes in Computer Science 4178, pp. 383–397. Springer, 2006. [GHS09] H. Giese, S. Hildebrandt, A. Seibel. Improved Flexibility and Scalability by Interpreting Story Diagrams. ECEASST 18, 2009. [GSR05] L. Geiger, C. Schneider, C. Reckord. Template- and model-based code generation for MDA- tools. In Giese and Zündorf (eds.), Proceedings of the 3rd International Fujaba Days, pp. 57–62. 2005. [KCD10] L. Kahloul, A. Chaoui, K. Djouani. Modeling and Analysis of Reconfigurable Systems Using Flexible Petri Nets. In 4th IEEE International Symposium on Theoretical Aspects of Software Engineering. Pp. 107–116. 2010. [LO04] M. Llorens, J. Oliver. Structural and Dynamic Changes in Concurrent Systems: Reconfig- urable Petri Nets. IEEE Trans. Computers 53(9):1147–1158, 2004. [MB00] B. T. Messmer, H. Bunke. Efficient subgraph isomorphism detection: a decomposition ap- proach. Knowledge and Data Engineering, IEEE Transactions on 12(2):307–323, 2000. [MEE10] M. Maximova, H. Ehrig, C. Ermel. Formal Relationship between Petri Net and Graph Transformation Systems based on Functors between M-adhesive Categories. ECEASST 40, 2010. [Mod12] T. Modica. Formal Modeling, Simulation, and Validation of Communication Platforms. PhD thesis, Technical University of Berlin, 2012. [Pad12] J. Padberg. Abstract Interleaving Semantics for Reconfigurable Petri Nets. ECEASST 51, 2012. [Rei12] F. Reiter. Modellierung und Analyse von Szenarien des Living Place mit rekonfigurierbaren Petrinetzen. Bachelor Thesis, Hochschule für Angewandte Wissenschaften Hamburg, 2012. [Ull76] J. R. Ullmann. An Algorithm for Subgraph Isomorphism. J. ACM 23(1):31–42, Jan. 1976. Proc. GraBaTs 2014 14 / 14 Introduction Reconfigurable Petri Nets Matching Algorithm PNVF2 Outline of the Algorithm Example Evaluation of PNVF2 Correctness Non-Determinism Complexity Related Work and Conclusion