Reference : Analysis of Permutation Equivalence in M-adhesive Transformation Systems with Negativ...
Scientific journals : Article
Engineering, computing & technology : Computer science
Analysis of Permutation Equivalence in M-adhesive Transformation Systems with Negative Application Conditions
Hermann, Frank mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ehrig, Hartmut [Technische Universit├Ąt Berlin, Germany]
Corradini, Andrea [Universita di Pisa, Italy]
Mathematical Structures in Computer Science
Cambridge University Press
Special Issue 04 (Structure Transformation)
Yes (verified by ORBilu)
Great Britain
[en] graph transformation ; permutation equivalence ; concurrency
[en] M-adhesive categories provide an abstract framework for a large variety of specification frameworks for modelling distributed and concurrent systems. They extend the well-known frameworks of adhesive and weak adhesive HLR categories and integrate high-level constructs such as attribution as in the case of typed attributed graphs.

In the current paper, we investigate -adhesive transformation systems including negative application conditions (NACs) for transformation rules, which are often used in applications. For such systems, we propose an original equivalence on transformation sequences, called permutation equivalence, that is coarser than the classical switch equivalence. We also present a general construction of deterministic processes for -adhesive transformation systems based on subobject transformation systems. As a main result, we show that the process obtained from a transformation sequence identifies its equivalence class of permutation-equivalent transformation sequences. Moreover, we show how the analysis of this process can be reduced to the analysis of the reachability graph of a generated Place/Transition Petri net. This net encodes the dependencies between rule applications of the transformation sequence, including the inhibiting effects of the NACs.
Interdisciplinary Centre for Security, Reliability and Trust
Researchers ; Professionals
The original publication is available at

File(s) associated to this reference

Fulltext file(s):

Limited access
HCE14.pdfPublisher postprint919.3 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.