MIN Faculty
Department of Informatics
Theoretical Foundations of Computer Science

Bibliography

Linear Properties of Zero-Safe Nets with Debit Tokens

Michael Köhler-Bußmeier and Manfred Kudlek.
Linear properties of zero-safe nets with debit tokens.
Fundamenta Informaticae, 85(1-4):329-342, 2008.

Abstract: In this contribution we study an extension of zero-safe nets that allows to model cooperation scenarios. Since zero-safe nets cannot be represented as finite nets in general, we study an extension of the firing rule having a close connection to blind counter automatons and the theory of semi-flows. As a main result we obtain, that a representation can always be given as a finite P/T net - although our firing rule is an extension of the original one - i.e. it preserves all the events that have been allowed before.


BibTeX entry



@Article{Koehler+08a,
  author =  {K{\"o}hler-Bu{\ss}meier,Michael and Kudlek, Manfred}, 
  title =  {Linear Properties of Zero-Safe Nets with Debit Tokens},
  year =  2008,
  journal = {Fundamenta Informaticae},
  volume = 85,
  number = {1-4},
  pages = {329--342},
  abstract = {In this contribution we study an extension of zero-safe
                  nets that allows to model cooperation
                  scenarios. Since zero-safe nets cannot be
                  represented as finite nets in general, we study an
                  extension of the firing rule having a close
                  connection to blind counter automatons and the
                  theory of semi-flows. As a main result we obtain,
                  that a representation can always be given as a
                  finite P/T net - although our firing rule is an
                  extension of the original one - i.e. it preserves
                  all the events that have been allowed before.}
}


Copyright Notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.