“…In recent years there have been several approaches directed specifically at the verification of graph transformation systems, for instance [21,10,24,1,2,4,22]. They usually address the following problem: Given a graph transformation system T generating a set reach(T ) of reachable graphs, and a set F of forbidden graphs, is the intersection reach(T ) ∩ F empty?…”