Depth Boundedness in Multiset Rewriting Systems with Name Binding

被引:0
|
作者
Rosa-Velardo, Fernando [1 ]
机构
[1] Univ Complutense Madrid, Dpto Sistemas Informat & Computac, E-28040 Madrid, Spain
来源
REACHABILITY PROBLEMS | 2010年 / 6227卷
关键词
PI-CALCULUS; PETRI NETS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we consider nu-MSR, a formalism that combines the two main existing approaches for multiset rewriting, namely MSR and CMRS. In nu-MSR we rewrite multisets of atomic formulae, in which some names may be restricted. nu-MSR are Turing complete. In particular, a very straightforward encoding of pi-calculus process can be done. Moreover, p nu-PN, an extension of Petri nets in which tokens are tuples of pure names, are equivalent to nu-MSR. We know that the monadic subclass of nu-MSR is a Well Structured Transition System. Here we prove that depth-bounded nu-MSR, that is, nu-MSR systems for which the interdependance of names is bounded, are also Well Structured, by following the analogous steps to those followed by R. Meyer in the case of the pi-calculus. As a corollary, also depth-bounded p nu-PN are WSTS, so that coverability is decidable for them.
引用
收藏
页码:161 / 175
页数:15
相关论文
共 50 条
  • [21] Approximate Probabilistic Parallel Multiset Rewriting Using MCMC
    Luedtke, Stefan
    Schroeder, Max
    Kirste, Thomas
    KI 2018: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, 11117 : 73 - 85
  • [22] Sequential and maximally parallel multiset rewriting: reversibility and determinism
    Artiom Alhazov
    Rudolf Freund
    Kenichi Morita
    Natural Computing, 2012, 11 : 95 - 106
  • [23] Swarm-Based Multiset Rewriting Computing Models
    Fujioka, Kaoru
    UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2019, 2019, 11493 : 79 - 93
  • [24] Solving the SAT problem with the string multiset rewriting calculus
    Battyanyi, Peter
    COMPUTING, 2024, 106 (05) : 1321 - 1334
  • [25] Relating strands and multiset rewriting for security protocol analysis
    Cervesato, I
    Durgin, N
    Mitchell, J
    Lincoln, P
    Scedrov, A
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 35 - 54
  • [26] Visual multiset rewriting: Applications to diagram parsing and reasoning
    Bottoni, Paolo
    Meyer, Bernd
    Presicce, Francesco Parisi
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, 2235 : 45 - 67
  • [27] Sequential and maximally parallel multiset rewriting: reversibility and determinism
    Alhazov, Artiom
    Freund, Rudolf
    Morita, Kenichi
    NATURAL COMPUTING, 2012, 11 (01) : 95 - 106
  • [28] What's in a Name?: Rewriting and fight for the name
    Weeber, Jeanne
    TRANS-REVUE DE LITTERATURE GENERALE ET COMPAREE, 2016, 20
  • [29] Relating multiset rewriting and process algebras for security protocol analysis
    Bistarelli, Stefano
    Cervesato, Iliano
    Lenzini, Gabriele
    Martinelli, Fabio
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 3 - 47
  • [30] An object-oriented coordination model based on multiset rewriting
    Bodeveix, JP
    Percebois, C
    Majoul, S
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS - PROCEEDINGS OF THE ISCA 9TH INTERNATIONAL CONFERENCE, VOLS I AND II, 1996, : 664 - 671