2011
DOI: 10.1109/tase.2010.2088120
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of Suboptimal Siphon- and FBM-Based Control Model of a Well-Known ${\rm S}^{3}{\rm PR}$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 60 publications
(49 citation statements)
references
References 25 publications
0
49
0
Order By: Relevance
“…If one lumps these monitors into a single one, fewer control places and arcs can be employed. However, the modified (called controller) region [V] ([V] plus V forms a P-invariant [17]) is larger (than that of marked operation places) and affects the uncontrolled model more; hence it reaches fewer states. The MTSI method considers all FBM while the CMTSI considers only a few equivalently lumping several FBM into the critical one.…”
Section: Intuitive Explanationmentioning
confidence: 99%
See 2 more Smart Citations
“…If one lumps these monitors into a single one, fewer control places and arcs can be employed. However, the modified (called controller) region [V] ([V] plus V forms a P-invariant [17]) is larger (than that of marked operation places) and affects the uncontrolled model more; hence it reaches fewer states. The MTSI method considers all FBM while the CMTSI considers only a few equivalently lumping several FBM into the critical one.…”
Section: Intuitive Explanationmentioning
confidence: 99%
“…3) cannot be emptied based on the theory in [17]. Siphon S 8 ¼ p 7 ; p 11 ; p 12 ; p 17 ; p 19 ; V S2 ; V S3 f g (see Table 1 in [17]) is synthesized from the core subnet obtained by adding TP-handle H TP1 [t 11 p 17 t 10 p 19 t 7 V S3 ] with resource place r=p 19 upon c 3 . S 8 is emptiable as explained below.…”
Section: Theorymentioning
confidence: 99%
See 1 more Smart Citation
“…PETRI nets (PN) have been used for modeling and analyzing concurrent systems [1][2][3][4][5][6][7][8][9].The net behavior depends not only on the graphical structure, but also on the initial marking of the net. Therefore they cannot be determined by static analysis such as dependency analysis; rather, they can be obtained with reachability analysis [11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…To resolve this problem, deadlock prevention (by adding monitors to problematic siphons) has been quite a popular research [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. Siphon is a structure object in a Petri net.…”
Section: Introductionmentioning
confidence: 99%