When to Move to Transfer Nets On the limits of Petri nets as models for process calculi

Gianluigi Zavattaro 1, 2, *
* Auteur correspondant
2 FOCUS - Foundations of Component-based Ubiquitous Systems
CRISAM - Inria Sophia Antipolis - Méditerranée , DISI - Dipartimento di Informatica - Scienza e Ingegneria [Bologna]
Abstract : Pierpaolo Degano has been an influential pioneer in the investigation of Petri nets as models for concurrent process calculi (see e.g. the well-known seminal work by Degano–De Nicola–Montanari also known as DDM88). In this paper, we address the limits of classical Petri nets by discussing when it is necessary to move to the so-called Transfer nets, in which transitions can also move to a target place all the tokens currently present in a source place. More precisely, we consider a simple calculus of processes that interact by generating/consuming messages into/from a shared repository. For this calculus classical Petri nets can faithfully model the process behavior. Then we present a simple extension with a primitive allowing processes to atomically rename all the data of a given kind. We show that with the addition of such primitive it is necessary to move to Transfer nets to obtain a faithful modeling.
Type de document :
Chapitre d'ouvrage
Programming Languages with Applications to Biology and Security, 9465, Springer, pp.339-353, 2015, Lecture Notes in Computer Science, 978-3-319-25526-2. 〈10.1007/978-3-319-25527-9_22〉
Liste complète des métadonnées

Littérature citée [17 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01233419
Contributeur : Zavattaro Gianluigi <>
Soumis le : mercredi 25 novembre 2015 - 10:36:59
Dernière modification le : samedi 27 janvier 2018 - 01:31:37
Document(s) archivé(s) le : samedi 29 avril 2017 - 00:10:21

Fichier

degano.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

Citation

Gianluigi Zavattaro. When to Move to Transfer Nets On the limits of Petri nets as models for process calculi. Programming Languages with Applications to Biology and Security, 9465, Springer, pp.339-353, 2015, Lecture Notes in Computer Science, 978-3-319-25526-2. 〈10.1007/978-3-319-25527-9_22〉. 〈hal-01233419〉

Partager

Métriques

Consultations de la notice

237

Téléchargements de fichiers

65