Das Kapitel untersucht das strukturelle Lebensproblem in konservativen Petrinetzen, ein grundlegendes Thema in der Analyse verteilter Systeme. Sie beginnt mit der Feststellung der rechnerischen Komplexität des Erreichbarkeitsproblems, das als Ackermann-vollständig bekannt ist, und setzt es mit dem Lebendigkeitsproblem in Beziehung. Der Hauptbeitrag ist der Nachweis der Vollständigkeit von EXPSPACE für strukturelle Lebendigkeit in konservativen Netzen, die eine gewichtete Summe von Wertmarken während der Ausführung nicht verändern. Das Kapitel stellt Schlüsselkonzepte wie strukturelle Reversibilität und RB-Funktionen vor, die für das Verständnis der Komplexität dieser Systeme von entscheidender Bedeutung sind. Außerdem wird die Beziehung zwischen struktureller Lebendigkeit und anderen Analyseproblemen wie Grenzwertigkeit und Verdeckbarkeit diskutiert. Das Kapitel bietet einen detaillierten Überblick über die theoretischen Grundlagen und praktischen Implikationen dieser Ergebnisse und macht es zu einer wertvollen Ressource für Forscher und Praktiker im Bereich formaler Methoden und verteilter Systeme.
KI-Generiert
Diese Zusammenfassung des Fachinhalts wurde mit Hilfe von KI generiert.
Abstract
We show that the EXPSPACE-hardness result for structural liveness of Petri nets [Jančar and Purser, 2019] holds even for a simple subclass of conservative nets. As the main result we then show that for structurally live conservative nets the values of the least live markings are at most double exponential in the size of the nets, which entails the EXPSPACE-completeness of structural liveness for conservative Petri nets; the complexity of the general case remains unclear. As a proof ingredient with a potential of wider applicability, we present an extension of the known results bounding the smallest integer solutions of boolean combinations of linear (in)equations and divisibility constraints.
1 Introduction
Petri nets are a well-known model of a class of distributed systems; we can refer, e.g., to the monographs [25] or [3] for an introduction. The reachability problem, asking if a given target configuration is reachable from a given initial configuration, is a basic problem of system analysis; in the case of Petri nets this problem is famous for its computational complexity: its Ackermann-completeness has been only recently established (see [6, 18] for the lower bound, and [19] for the upper bound). The boundedness problem, asking if the reachability set for a given initial configuration is finite, and the liveness problem, asking if no action can become dead, are among other standard analysis problems. While boundedness is known to be EXPSPACE-complete [5, 24], liveness is tightly related to reachability [10], and is thus now known to be Ackermann-complete.
There are also natural structural versions of boundedness and liveness. The structural boundedness problem asks, given a Petri net, if the net is bounded for each possible initial configuration; the structural liveness problem asks, given a Petri net, if there is an initial configuration for which the net is live.
Anzeige
While structural boundedness is easily shown to be in PTIME (and is thus substantially easier than boundedness), structural liveness is only known to be EXPSPACE-hard and decidable [14]. In fact, the decidability result can be strengthened by the recent result on the home-space problem [12, 13] that easily implies an Ackermannian upper bound for structural liveness as well, but the huge complexity gap still calls for a clarification.
Our contribution. As a step towards clarifying the complexity of structural liveness for general Petri nets, we show the EXPSPACE-completeness in the case of conservative nets, which do not change a weighted sum of the tokens during their executions. We recall that the problem if a given net is conservative is also in PTIME, similarly as structural boundedness (see, e.g., [22]). A crucial notion in our proof is structural reversibility, called just reversibility in this paper; a net is reversible if there is a sequence of actions that contains each action at least once and whose effect is zero (it does not change the configuration when executed). Reversibility is also in PTIME, and it can be easily shown to be a necessary condition for structural liveness in the case of structurally bounded nets. Moreover, it is trivial that each conservative net is structurally bounded, and a straightforward application of Farkas’ lemma shows that each reversible structurally bounded net is conservative. Hence our EXPSPACE-completeness result can be equivalently presented as the result for structurally bounded nets. A first natural step of our future research plan is to deal with a few subtle points that would allow us to extend the result to the whole class of reversible nets.
The lower bound, the EXPSPACE-hardness, is achieved by adapting the construction of [14] that shows a reduction from the EXPSPACE-complete word problem for commutative semigroups which can be also phrased as a coverability problem for reversible Petri nets [5, 20, 21]. We recall that coverability is a weaker form of reachability: it asks whether there is a reachable configuration that is component-wise at least as large as the target. Our adaptation, described in detail in the arxiv version of this paper, shows that we get the EXPSPACE-hardness of structural liveness even in the case of nets where each transition has precisely two input places and two output places (i.e., for the nets that naturally correspond to population protocols [1]).
Our main result is the EXPSPACE upper bound. The crucial step proves that for every structurally live conservative net there is a live configuration with an at most 2-exp (double exponential) number of tokens, which in principle matches the lower bound. We achieve this by showing that for any structurally live conservative net there is a quantifier-free Presburger formula which has a “small” (i.e. 2-exp) solution and for which all solutions are live configurations. More precisely, a solution of this formula presents a collection of at most exponentially many configurations that are mutually reachable and are chosen so that they witness that they are all live.
Anzeige
For showing the existence of the mentioned Presburger formula we suggest a way to present a witness for which reachability is safely replaced with conceptually much simpler virtual reachability, which allows us to have also negative numbers of tokens in (virtual) configurations. For expressing virtual reachability of reversible nets we use linear systems, i.e. boolean combinations of linear (in)equations and divisibility constraints. As a proof ingredient with a potential of wider applicability, we present exponential bounds on the least solutions of linear systems, which is an extension of the known results like those in [23] (which are also referred to in the survey [9]).
We try to perform our analysis of 2-exp functions at a level that allows us to derive the results with sufficient rigour but without technical details that we find unnecessary. To this aim we also introduce the notion of RB-functions (“Rackoff-bounded” functions, inspired by [24]) that constitute a special case of 2-exp functions with two variables. The class of RB-functions is closed under various operations including iteration, which gives us a lucid method to build the needed new RB-functions from already established ones.
Related research. This paper can be viewed as a continuation of the research line initiated by the paper [4] which explicitly indicated that even the decidability question for structural liveness of Petri nets had been still open. As already mentioned, now the decidability and the EXPSPACE-hardness are known [14], and the decidability can be strengthened by [12, 13] that implies an Ackermannian upper bound. Another result of this research line shows the PSPACE-completeness of structural liveness for IO-nets (Immediate Observation Petri Nets) that were introduced in [8], inspired by a subclass of population protocols in [2]. The paper [8] does not consider structural liveness explicitly, but a PSPACE upper bound follows from its results on liveness immediately; an explicit self-contained proof of the PSPACE-completeness is given in [15].
There is a long list of papers that studied liveness for various subclasses of Petri nets, often exploring related structural properties (we can refer to the monographs [3, 7, 25] for examples). We can also name [11] as an example of a paper in which structural liveness is among the explicitly studied problems for a subclass of Petri nets. We will also use the known results on liveness for conservative nets, for which we can refer, e.g., to [22].
Organization of the paper. Section 2 gives basic notions and notation, introduces linear systems and RB-functions, and the main results. Section 3 proves the above mentioned 2-exp upper bound, also using the results that are proved separately in Sections 4 and 5. Section 6 discusses the EXPSPACE lower bound. A longer version of this paper can be found at arxiv.org.
2 Basic Definitions, and Results
By \(\mathbb {N}\), \(\mathbb {N}_+\), and \(\mathbb {Z}\) we denote the sets of nonnegative integers, positive integers, and integers, respectively. For \(i,j\in \mathbb {Z}\) we put \([i,j]=\{i,i{+}1,\dots ,j\}\). The unary operation |.| denotes the absolute value for numbers, the cardinality for sets, and the length for sequences. For a vector \(x\in \mathbb {Z}^d\) (\(d\in \mathbb {N}\)), by x(i) we denote the value of its component \(i\in [1,d]\), hence \(x=(x(1),x(2),\ldots ,x(d))\). We use the component-wise (partial) order\(\le \) on \(\mathbb {Z}^d\).
It will be clear from the context when a vector is understood as a column vector; e.g., if B is an \(m\times n\) matrix, then in \(Bx=b\) the vectors x, b are viewed as column vectors \(n\times 1\) and \(m\times 1\), respectively. By \(\textbf{0}\) we denote the zero vector whose type is clear from the context. Sometimes we consider vectors as elements of \(\mathbb {Z}^J\) where J is a finite subset of \(\mathbb {N}_+\); e.g., \(\mathbb {N}^d\) is viewed as equal to \(\mathbb {N}^{[1,d]}\). For \(x\in \mathbb {Z}^d\) and \(J\subseteq [1,d]\), by \(x_{|{J}}\) we denote the (restricted) vector from \(\mathbb {Z}^J\) satisfying \(x{_{| J}}(i)=x(i)\) for each \(i\in J\); for \(X\subseteq \mathbb {Z}^d\) we put \(X_{|{J}}=\{x_{|{J}}\mid x\in X\}\).
We use “\(\cdot \)” for the standard multiplication, but \((x \cdot y)\) for \(x,y\in \mathbb {Z}^d\) denotes the dot product \(\sum _{i=1}^d x(i)\cdot y(i)\). The rank of an \(m\times n\) matrix B is denoted by \(\operatorname {rank}(B)\); hence \(\operatorname {rank}(B)\le \min \{m,n\}\).
We use the norms of \(x\in \mathbb {Z}^J\) and finite sets \(X\subseteq \mathbb {Z}^J\) (where \(\mathbb {Z}^J\) can be \(\mathbb {Z}^d\)):
$$ ||x||=\max _{i\in J}|x(i)|, \ \ \Vert x \Vert _{1}=\sum _{i\in J}|x(i)|, \ \ ||X||=\max _{x\in X}||x||, \ \ \Vert X \Vert _{1}=\max _{x\in X}\Vert x \Vert _{1}; $$
hence \(0\le ||x||\le \Vert x \Vert _{1}\le |J|\cdot ||x||\), and \(0\le ||X||\le \Vert X \Vert _{1}\le |J|\cdot ||X||\). We define \(||B||\) and \(\Vert B \Vert _{1}\) also for matrices over \(\mathbb {Z}\), viewing them as the sets of their rows: for an \(m\times n\) matrix B, \(\Vert B \Vert =\max _{i,j}|B_{ij}|\) and \(\Vert B \Vert _{1}=\max _{i\in [1,m]}\sum _{j=1}^n|B_{ij}|\).
For \(X\subseteq \mathbb {Z}^d\), by \(X^*\) we denote the submonoid of \((\mathbb {Z}^d,+)\)generated by X, i.e. the set of finite sums of elements of X.
Fig. 1.
Conservative net \(A_1\) with a live configuration (left); restriction \(A_2\) of \(A_1\) (right).
Petri Nets. A Petri netAof dimension\(d\in \mathbb {N}\), a d-dim net A for short, is a finite set of pairs \(a=(a_-,a_+) \in \mathbb {N}^d \times \mathbb {N}^d\) which are called actions (or transitions); we put \(||A||=\max _{a\in A}||a||\) where \(||a||=||\{a_+,a_-\}||\).
A configuration (or a marking) of A is a vector \(x\in \mathbb {N}^d\), attaching the values x(i) (the number of tokens) to the components (or places) \(i\in [1,d]\). Each action \(a=(a_-,a_+)\) has the associated displacement, namely \(\varDelta (a)=(a_+-a_-)\in \mathbb {Z}^d\). A d-dim netA is conservative if there is \(w\in (\mathbb {N}_+)^d\) such that \((\varDelta (a) \cdot w)=0\) for all \(a\in A\); if \(w(i)=1\) for all \(i\in [1,d]\), then A is 1-conservative.
Example. Figure 1(left) shows a conservative 5-dim net \(A_1\) with 4 actions (and with \(w=(1,1,1,2,1)\)); e.g., \(a_1= \left( (a_1)_-,(a_1)_+\right) = \left( (1,0,1,0,1),(0,1,2,0,0)\right) \), \(\varDelta (a_1)=({-}1,1,1,0,{-}1)\), \(\varDelta (a_3)=(0,0,{-}2,1,0)\), ...
If \({x}=c+{a_-}\) and \({y}=c+{a_+}\) for some \(c\in \mathbb {N}^d\), then we have \({x}\xrightarrow {a}{y}\); this defines the relation\(\xrightarrow {a}\) on \(\mathbb {N}^d\). (For \(A_1\) in Figure 1 we have \((0,2,0,1,0)\xrightarrow {a_2}(1,1,0,1,0)\) but not\((0,2,0,0,0)\xrightarrow {a_2}(1,1,0,0,0)\).) For an action sequence \(\sigma =a_1a_2\ldots a_k\), the relation \(\xrightarrow {\sigma }\,\subseteq \mathbb {N}^d\times \mathbb {N}^d\) is the composition \(\xrightarrow {a_1}\circ \xrightarrow {a_2}\cdots \circ \xrightarrow {a_k}\), with the displacement\(\varDelta (\sigma )=\sum _{j=1}^k \varDelta (a_j)\). Hence \(x\xrightarrow {\sigma }y\) implies \(y=x+\varDelta (\sigma )\) but not necessarily vice versa. To \(x\xrightarrow {\sigma }y\) we also refer as to an execution ofA. The reachability relation ofA is \({\mathop {\rightarrow }\limits ^{*}}\,\subseteq \mathbb {N}^d\times \mathbb {N}^d\) where \(x\xrightarrow {*}y\) if \(x\xrightarrow {\sigma }y\) for some \(\sigma \).
For a d-dim net A, the virtual reachability relation of A is the relation
on \(\mathbb {Z}^d\) for which
if \(y-x=\varDelta (\sigma )\) for some action sequence \(\sigma \); in this case we speak on a virtual executionofA. We define \(A _{\delta }=\{\varDelta (a)\mid a\in A\}\), and note that
iff \((y-x)\in (A _{\delta })^*\); we further write \(A _{\delta }^*\) instead of \((A _{\delta })^*\). A net A is structurally reversible, called just reversible in this paper, if the monoid \(A _{\delta }^*\) is a subgroup of \((\mathbb {Z}^d,+)\), i.e., if for every \(a\in A\) we have \(-\varDelta (a)\in A _{\delta }^*\); in this case the virtual reachability is symmetric:
iff
.
For a d-dim net A and \(I\subseteq [1,d]\), the |I|-dim net \(A_{|{I}}\) arises by the restriction of A to the components in I. We also refer to executions \(x\xrightarrow {\sigma }y\) (or virtual executions
) of \(A_{|{I}}\), implicitly assuming that \(x,y\in \mathbb {N}^I\) (or \(x,y\in \mathbb {Z}^I\)) and that the actions in \(\sigma \) are restricted to I (\(a\in A\) is in \(A_{|{I}}\) viewed as \(((a_-)_{|{I}},(a_+)_{|{I}})\)). We note that reversibility of A implies reversibility of \(A_{|{I}}\); this implication does not hold for conservativeness. (In Figure 1, \(A_2=(A_1)_{|{[1,4]}}\) is not conservative since \(\varDelta (a_1a_2)=(0,0,1,0)\).)
A configuration\(x\in \mathbb {N}^d\) of a net A is live if for all \(a\in A\) and \(x'\) such that \(x{\mathop {\rightarrow }\limits ^{*}}x'\) there is y such that \(x'{\mathop {\rightarrow }\limits ^{*}}y\) and \(y\ge a_-\) (hence \(y\xrightarrow {a}y+\varDelta (a)\)). A netA is structurally live if it has a live configuration. (\(A_1\) in Figure 1 is an example.)
Linear Systems. Let \(\textbf{x}\) be a variable ranging over \(\mathbb {Z}^d\), a d-dim variable for short. A constraint of the form \((\alpha \cdot \textbf{x})\sim c\) where \(\alpha \in \mathbb {Z}^d\), \(c\in \mathbb {Z}\), and \(\sim \mathop {\in }\,\{=,\ge \}\) is an equality constraint if \(\sim \) is \(=\), and an inequality constraint if \(\sim \) is \(\ge \); it is a homogeneous constraint if \(c=0\). For \(m\in \mathbb {N}_+\), a constraint \((\alpha \cdot \textbf{x})\equiv c\,(\bmod \, m)\), where \(\alpha \in [0,m{-}1]^d\) and \(c\in [0,m{-}1]\), is called a divisibility constraint. A d-dim linear systemS is a propositional formula in which atomic propositions are equality, inequality, and divisibility constraints, for a fixed d-dim variable. The set\([[S]]\) of solutions of S consists of the vectors \(x\in \mathbb {Z}^d\) satisfying S; if \([[S]]\ne \emptyset \), then S is satisfiable. By \(||S||\) we mean the least \(s\in \mathbb {N}\) such that \(\max \{||\alpha ||,|c|\}\le s\) for all equality and inequality constraints \((\alpha \cdot \textbf{x})\sim c\) in S; moreover, \(\operatorname {lcm}(S)\) is the least common multiple of all m occurring in \((\bmod \, m)\) in divisibility constraints in S, stipulating \(\operatorname {lcm}(S)=1\) if there are no such constraints.
Given a set \(M\subseteq \mathbb {N}^d\), by \(\min _\le (M)\) we denote the set of minimal vectors in M w.r.t. the (component-wise) order \(\le \). Since \(\le \) is a well quasi order on \(\mathbb {N}^d\), the set \(\min _\le (M)\) is finite. In [23], Pottier provided several bounds for minimal nonnegative solutions of a conjunction of homogeneous equality constraints. We now recall a bound that is particularly useful for us.
Lemma 1
([23]). Let \(M=\{x\in \mathbb {N}^n \mid Bx=\textbf{0}\}\) where B is an \(m\times n\) matrix over \(\mathbb {Z}\). Then \(X=\min _{\le }(M\smallsetminus \{\textbf{0}\})\) is a finite set such that \(M=X^*\). Moreover the following bound holds, where \(r=\operatorname {rank}(B)\):
\(\Vert X \Vert _{1}\le (1+\Vert B \Vert _{1})^r\).
We note that the “rank” bound r in Lemma 1 satisfies \(r\le \min \{m,n\}\). There is also a bound on the solutions of a conjunction of inequality constraints, \(Bx\ge b\), in [23], but with the exponent m; this is not convenient for us when m, the number of constraints, is much larger than \(n=d\), the dimension related to our problem. Therefore in Section 4 we provide a proof of the following theorem:
Theorem 2
Any satisfiable d-dim linear system S has a solution \(x\in \mathbb {Z}^d\) such that \(\Vert x \Vert _{1}\le \operatorname {lcm}(S)\cdot (d+1)\cdot \left( 2+d+d^{\,2}\cdot ||S||\right) ^{2d+1}\).
Remark. Given a structurally live conservative d-dim net A, we will later (in the proof of Theorem 5) use a \(d'\)-dim linear system S where \(d'=d+d\cdot 2^d\); it is crucial for us that Theorem 2 then yields a solution that is at most 2-exp in d. By [16, Theorem 3.12] we could derive that for S, even in the case of no divisibility constraints, the size of the minimal automaton encoding \([[S]]\) in binary is bounded by \((2+2\cdot ||S||)^{|S|}\) where |S| is the number of constraints in S; in our case \(|S|\ge 2^d\). The bounds on the values of minimal solutions of S that can be derived from the shortest accepting paths of that automaton are thus not smaller than \(2^{(2+2\cdot ||S||)^{|S|}}\), which is 3-exp in d.
Linear Systems for Subgroups of \(\mathbb {Z}^d\). In the sequel, by a group we mean a subgroup of \((\mathbb {Z}^d,+)\), which is also called a lattice in this context. The group spanned by a set \(X\subseteq \mathbb {Z}^d\) is the monoid \((X\cup -X)^*\), i.e., the set of finite sums of elements of \(X\cup -X\) . In Section 5 we prove the following theorem that provides a way to encode any group by a linear system, with a bound on its size.
Theorem 3
Let L be the group spanned by a finite set \(X\subseteq \mathbb {Z}^d\). There exists a linear system S such that \([[S]]=L\) and the following bounds hold:
\(||S||\le d\cdot d\,!\cdot \Vert X \Vert ^d\) and \(\operatorname {lcm}(S)\le d\,!\cdot \Vert X \Vert ^d\).
We thus get a corollary characterizing virtual reachability of reversible nets:
Corollary 4
For every reversible d-dim net A there is a 2d-dim linear system \(S_A\) such that
and we have
\(||S_A||\le d\cdot d\,!\cdot \Vert A _{\delta } \Vert ^d\) and \(\operatorname {lcm}(S_A)\le d\,!\cdot \Vert A _{\delta } \Vert ^d\).
Proof
We recall that
iff \(y-x\in A _{\delta }^*\), and that \(A _{\delta }^*\) is a subgroup of \((\mathbb {Z}^d,+)\) when A is reversible. Let S be the linear system, with a variable \(\textbf{x}\) ranging over \(\mathbb {Z}^d\), guaranteed by Theorem 3 for \(L=A _{\delta }^*\); we note that L is spanned by \(A _{\delta }\). From S we create \(S_A\) with variables \((\textbf{x},\textbf{y})\) ranging over \(\mathbb {Z}^d\times \mathbb {Z}^d\) by replacing every occurrence of \(\textbf{x}\) by \(\textbf{y}-\textbf{x}\). It follows that \([[S_A]]\) is the set of pairs \((x,y)\in \mathbb {Z}^d\times \mathbb {Z}^d\) such that
, and that \(||S_A||=||S||\) and \(\operatorname {lcm}(S_A)=\operatorname {lcm}(S)\). \(\square \)
RB-functions. We call a function \(f:\mathbb {N}^2\rightarrow \mathbb {N}\) an RB-function (from “Rackoff bounded”) if there are \(c\in \mathbb {N}\) and a polynomial \(p:\mathbb {N}\rightarrow \mathbb {N}\) so that
for all \(m,d\in \mathbb {N}\). Using this notion, we state our main theorem:
Theorem 5
There is an RB-function f with the following property:
for every structurally live conservative Petri net A of dimension d there is a live configuration \(x\in \mathbb {N}^d\) with \(||x||\le f(||A||,d)\).
Corollary 6
Structural liveness for conservative nets is EXPSPACE-complete.
Proof
Given a structurally live conservative d-dim net A, we can guess a live configuration \(x\in \mathbb {N}^d\) guaranteed by Theorem 5, whose binary presentation fits in exponential space. Since verifying livenes of x can be done in polynomial space w.r.t. the binary encoding of A and x (see, e.g., Lemma 5 in [22]), we have the upper bound. The lower bound follows by adapting the reduction from [14], as discussed in Section 6 and demonstrated in the arxiv version of this paper. \(\square \)
Convention on RB-functions. It is straightforward to derive that the set of RB-functions (defined by (1)) is closed under the standard operations of sum, product, and composition, when the composition is defined by \(f\circ g\,(m,d)=f(g(m,d),d)\). Moreover, if f(m, d) is an RB-function, then \(f'(m,d)=f^{(d)}(m,d)\) is an RB-function as well, when \(f^{(i)}\) denotes \(f\circ f\cdots \circ f\) where f occurs i times. We use these facts implicitly when deriving the existence of RB-functions. For convenience, we also assume that each RB-functionf that we consider satisfies \(m\le f(m,d)\), and is nondecreasing, i.e. \((m\le m'\wedge d\le d')\Rightarrow f(m,d)\le f(m',d')\).
Convention on using “small” and “large”. In the following proof, if we consider a d-dim net A and say that a value\(k\in \mathbb {N}\) is small, then we mean that \(k\le f(||A||,d)\) for an RB-function f (independent of A) whose existence is clear from the context or will be clarified later, while its concrete form might be left implicit. When we say that a value\(k\in \mathbb {N}\) is (sufficiently) large, then we analogously mean that \(k\ge f(||A||,d)\) for a suitable RB-function f. We use the same convention for Petri nets with states (PNSs) that are introduced later; in such cases the size \(||A||\) in \(f(||A||,d)\) is replaced with \(||G||\) for the respective PNS G.
Overview of the proof. In Section 3.1 we show that structurally live conservative nets are reversible, and that for any
in a reversible net there is a virtual execution from x to y that consists of small segments that stepwise approach the target y from the start x. Section 3.2 introduces Petri nets with states (PNSs) that handle the case when some components in live configurations are necessarily small, in which case their values can be viewed as “control states”. In Section 3.3 we show how to extract a suitable PNS G with a small set of control states when given a structurally live conservative net A. Section 3.4 then shows how to reduce virtual reachability in the extracted PNS G to virtual reachability in a small net \(A_{\textsc {sc}}^G\) whose actions correspond to simple cycles in the control unit of G. Sections 3.5 and 3.6 give a characterization of large nonlive configurations of G in terms of virtual reachability in \(A_{\textsc {sc}}^G\). Finally, Section 3.7 uses this characterization to prove Theorem 5 by defining a related linear system and applying Corollary 4 and Theorem 2. We remark that we use the name lemma for a few important ingredients of the main proof; the proofs of lemmas use facts captured by propositions.
3.1 Virtual reachability in reversible nets
By a bottom SCC (strongly connected component) of a netA we mean a nonempty set X of configurations where for each \(x\in X\) we have \(\{y\mid x{\mathop {\rightarrow }\limits ^{*}}y\}=X\).
Proposition 7
(Finite bottom SCCs, and reversibility).
Given a conservative net A, the reachability set \(R(x)=\{y\mid x{\mathop {\rightarrow }\limits ^{*}}y\}\) of any configuration x of A is finite and subsumes a bottom SCC \(X\subseteq R(x)\). If A is, moreover, structurally live, then A is reversible (due to a live bottom SCC).
We recall that the virtual reachability of any reversible net A is symmetric (
implies
), since \(A _{\delta }^*\) is a group in this case; we can thus segment virtual executions
into small parts that are “directed” from the start x to the target y, as we now explain.
For any \(d\in \mathbb {N}\), we define the function \(\textsc {sign}:\mathbb {Z}^d\rightarrow \{-1,0,1\}^d\) so that for all \(x\in \mathbb {Z}^d\) and \(i\in [1,d]\) we have \(\textsc {sign}(x)(i)=-1\) if \(x(i)<0\), \(\textsc {sign}(x)(i)=0\) if \(x(i)=0\), and \(\textsc {sign}(x)(i)=1\) if \(x(i)>0\). On \(\mathbb {Z}^d\) we define the partial order \(\preceq \) :
\(x\preceq y\) if \(\textsc {sign}(x)=\textsc {sign}(y)\) and \(|x(i)|\le |y(i)|\) for all \(i\in [1,d]\).
For \(X\subseteq \mathbb {Z}^d\), \(\min _\preceq (X)\) denotes the set of minimal elements of X w.r.t. \(\preceq \) ; this set is finite, and for each \(x\in X\) there is \(y\in \min _\preceq (X)\) such that \(y\preceq x\), since \(\preceq \) is a wqo (well quasi order).
Proposition 8
(“Directed” decomposition of group elements).
If \(L\subseteq \mathbb {Z}^d\) is a group and \(y\in L\), then \(y=z+(y-z)\) where \(z\in \min _\preceq (L)\subseteq L\), \(z\preceq y\), and \((y-z)\in L\); here for each \(i\in [1,d]\) we have: if \(y(i)=0\), then \(0=z(i)=y(i)\); if \(y(i)>0\), then \(0<z(i)\le y(i)\); and if \(y(i)<0\), then \(0>z(i)\ge y(i)\), which also entails that \(||y-z||<||y||\) when \(y\ne \textbf{0}\).
Corollary 9
(Segmenting virtual executions for reversible nets).
Given a reversible net A (hence \(A _{\delta }^*\) is a group), if
then there are \(z_1,z_2,\dots ,z_k\) in \(\min _\preceq (A _{\delta }^*)\) such that
(2)
and for each \(j\in [1,k]\) we have \(z_j\preceq y-(x+z_1+z_2\cdots +z_{j-1})\).
The next lemma shows that \(||\min _\preceq (A _{\delta }^*)||\) is small (hence the steps in (2) are small). In its precise form (shown in the arxiv version), the lemma might find applications in more general contexts; it does not assume that \(A _{\delta }^*\) is a group, so it is applicable to all Petri nets. We note that the precise bound is exponential, not double exponential, but the claim here is sufficient at our level of analysis.
Lemma 10
(For any finite \(A\subseteq \mathbb {Z}^d\), \(||\min _\preceq (A^*)||\)is small).
There is an RB-function f with the following property:
for any finite set \(A\subseteq \mathbb {Z}^d\) we have \(\Vert \min _\preceq (A^*) \Vert \le f(||A||,d)\).
3.2 Petri nets with states (PNSs)
It will turn out that it is convenient for our proof (of Theorem 5) when there is a live bottom SCC X containing a configuration x with all components x(i) being sufficiently large (since (non)reachability between configurations x, y with all components being large coincides with their virtual (non)reachability, as is expressed more precisely later).
But liveness is not monotonic (if x is live and \(x\le y\), then y is not necessarily live, even in the case of conservative nets), and we cannot assume that structurally live nets have live configurations with all components being large; we must also handle the cases when some components, constituting a set \(I\subseteq [1,d]\), are small in all configurations in the respective live bottom SCC X. In this case it will be convenient to view the restriction \(X_{|{I}}\) as a set of (control) states, and to present any configuration \(x\in X\) as the pair \((p,x')\) where \(p=x_{|{I}}\) and \(x'=x_{|{J}}\) for \(J=[1,d]\smallsetminus I\). (For the structurally live conservative net \(A_1\) in Figure 1 it is not hard to check that each live configuration has (very) small values in the components (places) \(p_1,p_2,p_3,p_4\), while the value in \(p_5\) can be arbitrarily large.)
This leads us to (a special type of) the notion of Petri nets with states.
Petri Nets with States (PNSs). Given a bottom SCC X of a conservative d-dim net A, for any \(I\subseteq [1,d]\) we get a Petri net with states (PNS)\(G_{(X,I)}\) as described below; for them we will also use a result from [17] where a more general definition of PNSs is given.
We view \(G_{(X,I)}\) as a tuple (an “enhanced graph”) (Q, A, E) where \(Q=X_{|{I}}\) is the set of states, A is the underlying Petri net, and E is the set of edges\((p,a,q)\in Q\times A\times Q\) such that \(p\xrightarrow {a}q\) in the restricted net \(A_{|{I}}\).
For \(G=G_{(X,I)}=(Q,A,E)\) we say that G is of dimensiond (inherited from A), or that G is a d-dim PNS. We define the norm ofG as \(||G||=\max \{||Q||,||A||\}\) (which might be much smaller than \(||X||\)). By the set \(\textsc {Conf}(G)\) of configurations of the PNS G we mean the set \(\{x\in \mathbb {N}^d\mid x_{|{I}}\in Q\}\) that is equivalently presented as \(Q\times \mathbb {N}^J\), where \(J=[1,d]\smallsetminus I\).
Remark. The dimension of \(G=G_{(X,I)}=(Q,A,E)\) in the above notation could be naturally defined as |J| (which corresponds to the notion of dimension in the case of vector addition systems with states) but we define it as d to stress that the underlying net A is always the primary object for us.
For each action \(a\in A\), the relation \(\xrightarrow {a}_G\) is the restriction of \(\xrightarrow {a}\mathop {\subseteq }\mathbb {N}^d\times \mathbb {N}^d\) (related to A) to the set \(\textsc {Conf}(G)\times \textsc {Conf}(G)\). The notation \((p,x)\xrightarrow {a}(q,y)\) refers to \(\xrightarrow {a}_G\) implicitly. The notation \((p,x)\xrightarrow {\sigma }(q,y)\), for action sequences \(\sigma \), and \((p,x){\mathop {\rightarrow }\limits ^{*}}(q,y)\) refers to executions ofG, which are implicitly based on the relations \(\xrightarrow {a}_G\) (and thus constitute a subset of the set of executions of A).
For the graph (Q, A, E) (with labelled edges), we use the standard notions of paths, cycles, simple cycles, and their displacements: the displacement of a path \((p_0,a_1,p_1)(p_1,a_2,p_2)\cdots (p_{k-1},a_k,p_k)\) is \(\varDelta (a_1\cdots a_k)\in \mathbb {Z}^d\) (where \(\varDelta (a_1\cdots a_k)_{|{I}}=p_k-p_0\)). We note that our definition guarantees that the graph \(G_{(X,I)}\) is strongly connected, and that there is a cycle that visits all states in Q and all edges in E and has the displacement \(\textbf{0}\) (since \(G_{(X,I)}\) has arisen from a bottom SCC X).
We remark that the PNS \(G_{(X,\emptyset )}\) has a single state and corresponds to the original net A, with the set of configurations (isomorphic with) \(\mathbb {N}^d\). On the other hand, \(\textsc {Conf}(G_{(X,[1,d])})\) is finite, since it is (isomorphic with) X.
Reversibility of PNSs, and Restricted PNSs. By the above definition, each PNS \(G=G_{(X,I)}=(Q,A,E)\) is reversible in the sense that for every edge \((p,a,q)\in E\) there is a path from q to p labelled with \(\sigma \) such that \(\varDelta (a) + \varDelta (\sigma ) = \textbf{0}\).
For technical reasons we will also consider PNSs arising from the PNSs \(G_{(X,I)}\) as follows: For a d-dim PNS \(G=G_{(X,I)}=(Q,A,E)\) and \(J'\subseteq J=[1,d]\smallsetminus I\), by \(G_{|{J'}}\) we denote the restricted PNS arising from G by removing (ignoring) the components from \(J\smallsetminus J'\); the set of configurations of \(G_{|{J'}}\) is thus \(Q\times \mathbb {N}^{J'}\), and the executions of \(G_{|{J'}}\) are executions of \(A_{|{I\cup J'}}\). We note that the reversibility of G entails that the PNS \(G_{|{J'}}\) is also reversible.
Proper PNSs. Since we have defined \(G_{(X,I)}=(Q,A,E)\) for any \(I\subseteq [1,d]\), we cannot exclude that for \(A_{|{I}}\) we have \(p\xrightarrow {a} p'\) where \(p\in Q\) and \(p'\not \in Q\); in other words, Q might not be a bottom SCC related to \(A_{|{I}}\).
We say that a PNS\(G=G_{(X,I)}=(Q,A,E)\) is proper if Q is a bottom SCC related to \(A_{|{I}}\). We observe that in this case each execution of A from any x such that \(x_{|{I}}\in Q\) is, in fact, also an execution of G.
We now show that \(G_{(X,I)}=(Q,A,E)\) is proper if there is \(x\in X\) for which \(x_{|{J}}\), where \(J=[1,d]\smallsetminus I\), is sufficiently large w.r.t. \(||G||\) in all components. For \(C\in \mathbb {N}\), by the area\(\mathop {\uparrow }(C,\dots ,C)\) we mean the set \(\{x\in \mathbb {N}^{J}\mid x(i)\ge C\) for all \(i\in J\}\) when the respective set J is clear from the context.
Proposition 11
(Large “counters” inX induce that Gis proper).
There is an RB-function \(f _\textsc {prop}\) with the following property:
for every d-dim PNS \(G=G_{(X,I)}=(Q,A,E)\), if there is \(x\in X\) with \(x_{|{J}}\in \mathop {\uparrow }(C,\dots ,C)\) for \(J=[1,d]\smallsetminus I\) and \(C=f _\textsc {prop}(||G||,d)\), then G is a proper PNS.
Proof
(Idea.) Suppose \(p\in Q=X_{|{I}}\), \(p\xrightarrow {a}p'\) in \(A_{|{I}}\), and \((q,x)\in X\) where \(x\in \mathop {\uparrow }(C,\dots ,C)\) for a large value C. Since there is a short path (i.e., a path of a small length) \(q\xrightarrow {\sigma }p\), we have \((q,x)\xrightarrow {\sigma }(p,x+\varDelta (\sigma ))\xrightarrow {a}(p',x+\varDelta (\sigma a))\in X\), which implies \(p'\in X_{|{I}}\). \(\square \)
3.3 Extracting a proper PNS \(G_{(X,I)}\) from a bottom SCC X
Lemma 12
(Small \(G_{(X,I)}\)with large counters, by a given RB-function). For any RB-function f there is an RB-function \(\bar{f}\) with the following property:
for any conservative d-dim net A and any bottom SCC X related to A there is a set \(I\subseteq [1,d]\) such that
1.
for the d-dim PNS \(G=G_{(X,I)}=(Q,A,E)\) we have \(||Q||\le \bar{f}(||A||,d)\);
2.
there is \((q,x)\in X\) with \(x\in \mathop {\uparrow }(C,\dots ,C)\) where \(C=f(||G||,d)\).
We can imagine that for each RB-function f we fix some \(\bar{f}\) guaranteed by the lemma; we thus get the notion of an f-extracted PNS related to (A, X) by which we mean the PNS \(G_{(X,I)}\) for a set \(I\subseteq [1,d]\) guaranteed by this lemma for f and \(\bar{f}\). Referring to Proposition 11, we note that if \(f\ge f _\textsc {prop}\) then each f-extracted PNS is proper.
To prove the lemma, we use a result on extractors from [17]. By a d-dim extractor\(\lambda \) we mean a tuple (or a sequence) \((\lambda _1,\lambda _2,\dots ,\lambda _d)\in (\mathbb {N}_+)^d\) where \(\lambda _1\le \lambda _2 \le \dots \le \lambda _{d}\). For technical convenience we also refer to \(\lambda _0\) and \(\lambda _{d+1}\), stipulating \(\lambda _0=1\) and \(\lambda _{d+1}=\lambda _d\). For \(m\in \mathbb {N}\) we say that \(\lambda \) is m-adapted if \(\lambda _{i+1}\ge \lambda _i+m\cdot (\lambda _i)^i\), for all \(i=0,1,\dots ,d{-}1\).
Proposition 13
(a weaker version of Lemma 20 in Section 6 of [17]). Let X be an SCC related to a d-dim net A (a bottom SCC of a conservative net is a particular case), and let \((\lambda _1,\lambda _2,\dots ,\lambda _d)\) be a d-dim extractor that is \(||A||\)-adapted. There exists a set \(I\subseteq [1,d]\) satisfying the following conditions, where \(J=[1,d]\smallsetminus I\):
a)
\(||X{_{| I}}||<\lambda _{|I|}\) (hence for all \(x\in X\) and \(i\in I\) we have \(x(i)<\lambda _{|I|}\));
b)
there is \(x\in X\) such that for all \(j\in J\) we have \(x(j)\ge \lambda _{|I|+1}-||A||\cdot |I|\cdot (\lambda _{|I|})^{|I|}\).
We note that if \(I=\emptyset \) then by b) there is \(x\in X\) with \(x(i)\ge \lambda _1\) for all \(i\in [1,d]\) and a) can be viewed as vacuous; or formally we put \(X_{|{\emptyset }}=\{()\}\) and \(||\{()\}||=0\), which entails \(||X_{|{\emptyset }}||<1=\lambda _0\). If \(I=[1,d]\), then for all \(x\in X\) and \(i\in [1,d]\) we have \(x(i)< \lambda _d\), and b) is vacuous.
Proof of Lemma 12. (Idea.) Let f be an RB-function. We define the three-argument function \(\lambda (m,d,i)\) for \(m,d\in \mathbb {N}\) and \(i\in [1,d]\), written rather as \(\lambda ^{<m,d>}_i\):
we put \(\lambda ^{<m,d>}_1=f(m,d)\),
for \(i=1,2,\dots ,d{-}1\) we put \(\lambda ^{<m,d>}_{i{+}1}=f(\lambda ^{<m,d>}_i,d)+m\cdot i\cdot (\lambda ^{<m,d>}_i)^i\).
Given a conservative d-dim net A and a bottom SCC X related to A, we consider \(I\subseteq [1,d]\), and the respective \(G_{(X,I)}\), that is guaranteed by Proposition 13 for the extractor \((\lambda ^{<||A||,d>}_1, \lambda ^{<||A||,d>}_2,\dots , \lambda ^{<||A||,d>}_d)\) which is clearly \(||A||\)-adapted. The function \(\bar{f}(m,d)=\lambda ^{<m,d>}_d\) is an RB-function such that the conditions 1 and 2 in the lemma are satisfied. \(\square \)
3.4 Virtual reachability reduced from PNSs to nets
Given a d-dim PNS \(G=G_{(X,I)}\), on the set \(\textsc {Conf}(G)\) we also define the virtual reachability relation: for an action sequence \(\sigma \) we have
if there is a path from p to q labelled with \(\sigma \) and for \(J=[1,d]\smallsetminus I\) we have \(\varDelta (\sigma )_{|{J}}=y-x\) (while \(\varDelta (\sigma )_{|{I}}=q-p\) by the above definitions). By
we denote that
for some \(\sigma \). This notation also applies to the PNSs \(G_{|{J'}}\).
Remark. Even if \(G=G_{(X,I)}=(Q,A,E)\) is proper, and thus all executions of A from any x with \(x_{|{I}}\in Q\) are also executions of G, we might have that
holds for A but does not hold for G even if \(x_{|{I}},y_{|{I}}\in Q\): a virtual execution of A can “sink below zero” in any component while for G we require that the restriction of a virtual execution to I is a standard execution of \(A_{|{I}}\).
Proposition 14 provides some conditions under which
implies \((p,x){\mathop {\rightarrow }\limits ^{*}}(q,y)\). It follows from a result in [17] that was shown for more general reversible PNSs than our PNSs \(G=G_{(X,I)}\) and their restrictions \(G_{|{J'}}\).
Proposition 14
(Virtual and standard reachability, Lemma 5 in [17]). There are RB-functions \(f_0\) and \(f _\textsc {vr}\) with the following property:
for any (reversible) d-dim PNS G, if
and both x and y are in \(\mathop {\uparrow }(C,\dots ,C)\) for \(C=f_0(||G||,d)\), then we also have \((p,x){\mathop {\rightarrow }\limits ^{*}}(q,y)\) and, moreover, there is an execution \((p,x)\xrightarrow {\sigma }(q,y)\) where \(|\sigma |\le f _\textsc {vr}(||G||,d)\cdot ||y-x||\).
In fact, the lemma in [17] is more precise, and the respective RB-functions \(f_0\), \(f _\textsc {vr}\) are exponential, not double exponential. Similarly as in Lemma 10 (to which Proposition 14 is closely related), we are rather generous at our level of analysis. We further use the notation
\(C _\textsc {v=r}^G=f_0(||G||,d)\);
the virtual reachability relation
thus coincides with the reachability relation \({\mathop {\rightarrow }\limits ^{*}}\) in the area \(\mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\), i.e. for the pairs of configurations in \(Q\times \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\) where Q is the state set of G. Moreover, if the maximal component-difference \(||y-x||\) of two vectors x, y in this area is small, and
, then there is also a short execution \((p,x)\xrightarrow {\sigma }(q,y)\).
A crux of virtual reachability in a PNS is captured by cyclic virtual executions
; we will now relate them to a corresponding small net.
Given a PNS \(G=G_{(X,I)}=(Q,A,E)\), where \(J=[1,d]\smallsetminus I\), we fix
in which the actions are defined so that their displacements constitute the set
\((A_{\textsc {sc}}^G) _{\delta }=\{z\in \mathbb {Z}^d\mid \) there is a simple cycle in (Q, A, E) with the displacement \(z \}\);
for each \(z\in (A_{\textsc {sc}}^G) _{\delta }\) there is an action \((z_-,z_+)\) in \(A_{\textsc {sc}}^G\) where \(z_+\) and \(z_-\) arise from z and \(-z\), respectively, by replacing all negative components with 0.
Proposition 15
(Virtual reachability for Gand the small net \(A_{\textsc {sc}}^G\)).
For any PNS \(G=(Q,A,E)\) we have:
iff
in \(A_{\textsc {sc}}^G\). Moreover, \(||A_{\textsc {sc}}^G||\le ||A||\cdot |Q|\) (hence \(||A_{\textsc {sc}}^G||\le f(||G||,d)\) for an RB-function f).
3.5 Down reachability of dead configurations
To get another ingredient for the proof of Theorem 5, we look how nonlive configurations (p, x) with all components of x being large can reach configurations (q, y) in which some actions are dead.
We say that a configuration\(x\in \mathbb {N}^d\) of a d-dim net A is dead if some action \(a\in A\) is dead at x, i.e., a is disabled at each configuration in \(R(x)=\{y\mid x{\mathop {\rightarrow }\limits ^{*}}y\}\). (In other contexts configurations are called dead if all actions are disabled but we use this weaker notion.) Hence a configuration x is live iff it cannot reach any dead configuration. Rackoff’s result for coverability in [24] gives us:
Proposition 16
(Deadness determined by small components, by [24]). There is an RB-function \(f _\textsc {dead}\) with the following property:
For any d-dim net A and any configuration \(y\in \mathbb {N}^d\), the \(f _\textsc {dead}\)-small components of y, namely the vector \(y_{|{\textsc {s}_y}}\) for \(\textsc {s}_y=\{i\in [1,d]\mid y(i)<f _\textsc {dead}(||A||,d)\}\), determine whether y is dead; moreover, if \(y_{|{\textsc {s}_y}}\) determines that y is dead, then each \(y'\) satisfying \((y')_{|{\textsc {s}_y}}=y_{|{\textsc {s}_y}}\) is dead.
Now we aim to prove Proposition 18; roughly speaking, it shows a situation when a start vector that is larger than but close to a target vector (in particular to a dead configuration) is also close w.r.t. the reachability distance. This result will be then used in the proof of Lemma 19. But we first recall another useful result from [17], for general Petri nets (that are not necessarily reversible).
Proposition 17
(Mutual reachability in nets, Theorem 2 in [17]). There is an RB-function \(f _\textsc {mr}\) with the following property:
for any d-dim net A, if \(x{\mathop {\rightarrow }\limits ^{*}}y\) and \(y{\mathop {\rightarrow }\limits ^{*}}x\) then there are executions \(x\xrightarrow {\sigma _1}y\) and \(y\xrightarrow {\sigma _2}x\) such that \(|\sigma _1\sigma _2|\le f _\textsc {mr}(||A||,d)\cdot ||x-y||\).
Proposition 18
(Down reachability in PNSs).
There is an RB-function \(f _\textsc {dr}\) with the following property:
for any proper d-dim PNS \(G=G_{(X,I)}=(Q,A,E)\) and any \(J'\subseteq [1,d]\smallsetminus I\), if \((q,x){\mathop {\rightarrow }\limits ^{*}}(q,y)\) for \(G_{|{J'}}\) (hence \(x,y\in \mathbb {N}^{J'}\)), \(x\in \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\), and \(x\ge y\) (y is “down” w.r.t. x), then there is an execution \((q,x)\xrightarrow {\sigma }(q,y)\) of \(G_{|{J'}}\) where \(|\sigma |\le f _\textsc {dr}(||G||,d)\cdot ||x-y||\).
Proof
(Idea.) Let \(G,J',q,x,y\) satisfy the above assumptions, and let \(A'\) arise from \(A_{|{I\cup J'}}\) by adding actions \((\textbf{0},\textbf{e}_i)\) for all \(i\in J'\) where \(x(i)>y(i)\); \(\textbf{e}_i(i)=1\) and \(\textbf{e}_i(j)=0\) for \(j\ne i\). For \(A'\) we thus have both \((q,x){\mathop {\rightarrow }\limits ^{*}}(q,y)\) and \((q,y){\mathop {\rightarrow }\limits ^{*}}(q,x)\), and \(||A'||\le ||A||\); hence there is an execution \((q,x)\xrightarrow {\rho }(q,y)\) of \(A'\) where \(|\rho |\le f _\textsc {mr}(||A||,d)\cdot ||x-y||\) (by Proposition 17). We can assume \(\rho \) to be in the form \(\rho =\rho _1\rho _2\) where \(\rho _1\) contains precisely the added increasing actions \((\textbf{0},\textbf{e}_i)\); thus \((q,x)\xrightarrow {\rho }(q,y)\) can be written as \((q,x)\xrightarrow {\rho _1}(q,x+\varDelta (\rho _1))\xrightarrow {\rho _2}(q,y)\) where \((q,x+\varDelta (\rho _1))\xrightarrow {\rho _2}(q,y)\) is an execution of \(A_{|{I\cup J'}}\), and thus also an execution of \(G_{|{J'}}\). By reversibility of \(G_{|{J'}}\) and the assumption \((q,x){\mathop {\rightarrow }\limits ^{*}}(q,y)\) we get
and use Proposition 14 to finish the proof. \(\square \)
3.6 (Virtual) reachability of quasi-dead configurations
We consider a PNS \(G=G_{(X,I)}=(Q,A,E)\). When saying that a configuration (q, y) is dead, we mean that it is dead for A (at least one action \(a\in A\) is dead). Given an RB-function f, we say that
a configuration (p, x) is f-quasi-dead if \(x\in \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\) and
there is \((p,x)\xrightarrow {\rho }(q,y)\) where (q, y) is dead and \(|\rho |\le f(||G||,d)\).
Lemma 19
(Large nonlive reach quasi-dead configurations).
There are RB-functions \(f_1,f_2\) for which the following claim is true. Every proper d-dim PNS \(G=G_{(X,I)}=(Q,A,E)\) satisfies the following implication:
if (p, x) is nonlive and \(x\in \mathop {\uparrow }(C,\dots ,C)\) for \(C=f_2(||G||,d)\), then there is some \(f_1\)-quasi-dead configuration \((p,x')\) such that \((p,x){\mathop {\rightarrow }\limits ^{*}}(p,x')\).
Proof
(Idea.) Let \(G=G_{(X,I)}=(Q,A,E)\) be a proper d-dim PNS, where \(J=[1,d]\smallsetminus I\), and let \((p,x_0)\) be a nonlive configuration with \(x_0\in \mathop {\uparrow }(C,\dots ,C)\) for a large number C. To prove the lemma, it suffices to show that
, i.e.
for the |J|-dim net \(A_{\textsc {sc}}^G\) (recall (3)), where \(x_1\in \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\) and \((p,x_1)\) can reach a dead configuration by a short execution.
We fix a dead configuration \((q,y_0)\) such that \((p,x_0)\xrightarrow {*} (q,y_0)\), and a shortest path \(p\xrightarrow {\pi }q\) in the graph (Q, A, E). The facts that \(||\varDelta (\pi )||\) is small, C is large and G is reversible entail that
where \(y_1=x_0+\varDelta (\pi )_{|{J}}\), and thus all components of \(y_1\) are large. We assume that \(y_0(i)<f _\textsc {dead}(||A||,d)\) for some \(i\in J\), since otherwise also \((q,y_1)\) is dead (recall Proposition 16) and we are done (\((p,x_0)\) reaches a dead configuration, namely \((q,y_1)\), by a short execution). Hence (we can assume that) \(||y_1-y_0||\) is large, and any virtual execution of \(A_{\textsc {sc}}^G\) demonstrating
(which holds by reversibility of G and \(A_{\textsc {sc}}^G\)) is long. We fix a segmented virtual execution
(4)
of \(A_{\textsc {sc}}^G\) as shown by (2) in Corollary 9. Proposition 15 and Lemma 10 show that \(||A_{\textsc {sc}}^G||\) and \(||\min _\preceq ((A_{\textsc {sc}}^G) _{\delta }^*)||\) are small, and we note that for some small j the value \(y_2=y_0+\sum _{i=1}^j z_i\) (reached by a short prefix of (4)) satisfies that both \(y_2\) and \(y_2-\varDelta (\pi )\) are in \(\mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\) and, moreover, \((p,y_2{-}\varDelta (\pi ))\xrightarrow {\pi }(q,y_2)\). For \(x_1=y_2-\varDelta (\pi )\) we thus get
, which entails \((p,x_0){\mathop {\rightarrow }\limits ^{*}}(p,x_1)\) (since both \(x_0,x_1\) are in \(\mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\)) and \((p,x_1)\xrightarrow {\pi }(q,y_2){\mathop {\rightarrow }\limits ^{*}}(q,y_0)\) (since
and both \(y_2\) and \(y_1\) are in \(\mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\)).
To finish the proof, it suffices to show that there is a short \(\sigma \) such that \((q,y_2)\xrightarrow {\sigma }(q,y')\) where \((q,y')\) is a dead configuration (which does not immediately follow from \((q,y_2)\xrightarrow {*}(q,y_0)\)). We recall that \(||y_2-y_0||\) is small (since j in the definition of \(y_2\) is small), and \(y_2\) is an intermediate vector for the pair \(y_0,y_1\). We put \(J _\textsc {down}=\{i\in J\mid y_1(i)\ge y_0(i)\}\); hence for all \(i\in J _\textsc {down}\) we have \(y_2(i)\ge y_0(i)\), and by applying Proposition 18 to \(G_{|{J _\textsc {down}}}\) we get a short \(\sigma \) such that \((q,(y_2)_{|{J _\textsc {down}}})\xrightarrow {\sigma }(q,(y_0)_{|{J _\textsc {down}}})\). Since for \(i\in J\smallsetminus J _\textsc {down}\) we have \(y_0(i)\ge y_2(i)\ge y_1(i)\) and these values are large, we get \((q,y_2)\xrightarrow {\sigma }(q,y')\) where \((y')_{|{J _\textsc {down}}}=(y_0)_{|{J _\textsc {down}}}\), which entails that \((q,y')\) is dead (by Proposition 16). \(\square \)
We fix some RB-functions \(f_1,f_2,\bar{f}\) with the following property:
For any conservative d-dim net A and any bottom SCC \(X\subseteq \mathbb {N}^d\) related to A, any \(f_2\)-extracted PNS \(G=G_{(X,I)}=(Q,A,E)\) satisfies the following conditions, for \(J=[1,d]\smallsetminus I\) and \(C=f_2(||G||,d)\):
a)
G is a proper PNS (i.e., Q is a bottom SCC for \(A_{|{I}}\)), and \(||Q||\le \bar{f}(||A||,d)\);
b)
there is \(x\in X\) such that (\(x_{|{I}}\in Q\) and) \(x_{|{J}}\in \mathop {\uparrow }(C,\dots ,C)\);
c)
\(C\ge C _\textsc {v=r}^G\);
d)
for all \(p\in Q\) and \(x\in \mathop {\uparrow }(C,\dots ,C)\), if (p, x) is nonlive (as a configuration of A) then there is \(x'\in \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\) such that
and \((p,x')\) is \(f_1\)-quasi-dead.
The existence of such RB-functions \(f_1,f_2,\bar{f}\) follows from Lemmas 19 and 12.
Based on \(f_1,f_2,\bar{f}\), we aim to show that there is an RB-function f such that for each structurally live conservative d-dim net A there is a live configuration \(x\in \mathbb {N}^d\) satisfying \(||x||\le f(||A||,d)\). The existence of such a function f will follow by the further discussion.
We fix a structurally live conservative d-dim net A and a live bottom SCC \(X\subseteq \mathbb {N}^d\), and consider an \(f_2\)-extracted PNS \(G=G_{(X,I)}=(Q,A,E)\) (for which the above conditions a)-d) hold). If \(J=\emptyset \) (i.e., \(I=[1,d]\)), then \(Q=X\) and each \(p\in Q\) is a live configuration of A satisfying \(||p||\le \bar{f}(||A||,d)\) (and thus any RB-function \(f\ge \bar{f}\) satisfies our aim in this case). Hence we further assume \(J\ne \emptyset \), and we fix
a live configuration \((p_0,x_0)\in Q\times \left( \mathbb {N}^J\cap \mathop {\uparrow }(C,\dots ,C)\right) \) for \(C=f_2(||G||,d)\).
(by b) we can choose \((p_0,x_0)\) in the live SCC X). We say that \(x\in \mathbb {N}^J\) is good if \(x\in \mathop {\uparrow }(C,\dots ,C)\) and \((p_0,x)\) is live, and that \(x'\in \mathbb {N}^J\) is bad if \((p_0,x')\) is an \(f_1\)-quasi-dead configuration (which entails that \(x'\in \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\)). Hence
(5)
where we refer to the virtual reachability of the |J|-dim net \(A_{\textsc {sc}}^G\) defined around (3); the claim (5) follows from the condition d).
We will transform the characterization (5) of good vectors by negative virtual reachability constraints to a characterization by \(2^{|J|}\) positive virtual reachability constraints that will allow us to use Corollary 4 and Theorem 2 for deriving the existence of small good vectors. To this aim we first define a |J|-dimensional extractor \(\lambda =(\lambda _1,\lambda _2,\dots ,\lambda _{|J|})\), now stipulating \(\lambda _0=0\) and \(\lambda _{|J|+1}=\lambda _{|J|}\):
for \(i=1,2,\dots ,|J|\) (hence \(\lambda _1=\max \{f _\textsc {dead}(||A||,d),C _\textsc {v=r}^G\} + ||A||\cdot f_1(||G||,d)\)). By \(f _\textsc {dead}\) and \(f _\textsc {vr}\) we refer to the RB-functions from Propositions 16 and 14, respectively. It is clear that \(\lambda _{|J|}\) is small (i.e., \(\lambda _{|J|}\le f'(||A||,d)\) for an RB-function \(f'\) independent of A).
Claim 1
For each \(x\in \mathbb {N}^{J}\) there is a unique maximal set \(J_x^\lambda \subseteq J\) such that \(x(i)<\lambda _{|J^\lambda _x|}\) for all \(i\in J^\lambda _x\), and \(x(i)\ge \lambda _{|J^\lambda _x|+1}\) for all \(i\in J\smallsetminus J^\lambda _x\).
Claim 2
For all \(x,x'\in \mathbb {N}^J\cap \mathop {\uparrow }(C _\textsc {v=r}^G,\dots ,C _\textsc {v=r}^G)\) such that \(J^\lambda _x=J^\lambda _{x'}=J'\) and
we have: if \(x'\) is bad, then \((p_0,x)\) is a nonlive configuration.
For each\(J'\subseteq J\), in the set
we fix a vector\(x_{J'}\) with the least value \(\textsc {dif}(x_{J'},J')\) (“difference from the \(J'\)-class”) where for vectors \(x\in \mathbb {N}^J\) we put \(\textsc {dif}(x,J')=\max \left( \textsc {above}(x,J')\cup \textsc {below}(x,J')\right) \) for the sets \(\textsc {above}(x,J')= \{x(i)-(\lambda _{|J'|}-1)\mid i\in J',x(i)\ge \lambda _{|J'|}\}\) and
\(\textsc {below}(x,J')=\{\lambda _{|J'|+1}-x(i)\mid i\in J\smallsetminus J', x(i)<\lambda _{|J'|+1} \}\) (where \(\max (\emptyset )=0\)). Hence \(\textsc {dif}(x,J')\in \mathbb {N}\), and \(\textsc {dif}(x,J')=0\) iff \(J^\lambda _x=J'\); therefore \(J^\lambda _{x_{J'}}\ne J'\) iff \(\textsc {dif}(x_{J'},J')>0\). We note that \((p_0,x_{J'})\) is a live configuration, for each \(J'\subseteq J\) (since \((p_0,x_0){\mathop {\rightarrow }\limits ^{*}}(p_0,x_{J'})\) and \((p_0,x_0)\) is live).
For \(B\in \mathbb {N}\) we define the equivalence \(\equiv _{\le B}\) on \(\mathbb {N}^J\): \(x\equiv _{\le B}y\) if for each \(i\in J\) we have either \(x(i)>B\) and \(y(i)>B\), or \(x(i)=y(i)\). We define the following value \(B_0\), which is small (also due to Lemma 10):
If \(x\equiv _{\le B_0}y\) then \(J^\lambda _x=J^\lambda _y\). (This follows trivially from definitions.)
Claim 4
Claim 4. For any \(\bar{x}\in \mathbb {N}^J\cap \mathop {\uparrow }(C,\dots ,C)\), if for each \(J'\subseteq J\) there is \(\bar{x}_{J'}\) such that
and \(\bar{x}_{J'}\equiv _{\le B_0} x_{J'}\), then \(\bar{x}\) is good.
Now we observe that the conditions put on \(\bar{x}\) in Claim 4 can be expressed by a linear system \(\bar{S}=S_0\wedge \bigwedge _{J'\subseteq J}S_{J'}\): All linear systems \(S_0\) and \(S_{J'}\), \(J'\subseteq J\), share the same integer variables \(\textbf{x}_1,\textbf{x}_2,\dots ,\textbf{x}_{|J|}\), and each \(S_{J'}\) has, moreover, its own variables \(\textbf{y}^{J'}_1,\textbf{y}^{J'}_2,\dots ,\textbf{y}^{J'}_{|J|}\); the system \(S_0\) expresses \((\textbf{x}_1,\textbf{x}_2,\dots ,\textbf{x}_{|J|})\in \mathop {\uparrow }(C,\dots ,C)\), i.e., \(S_0=\bigwedge _{i\in J}(\textbf{x}_i\ge C)\). Each \(S_{J'}\) is based on a linear system \(S_{A_{\textsc {sc}}^G}\) that is guaranteed by Corollary 4 and expresses
(for \(A_{\textsc {sc}}^G\)), to which it adds the constraints guaranteeing \((\textbf{y}^{J'}_1,\textbf{y}^{J'}_2,\dots ,\textbf{y}^{J'}_{|J|})\equiv _{\le B_0}x_{J'}\) (hence the constraint \(\textbf{y}^{J'}_i=x_{J'}(i)\) for all \(i\in J\) for which \((x_{J'})(i)\le B_0\) and the constraint \(\textbf{y}^{J'}_i> B_0\) for all \(i\in J\) for which \((x_{J'})(i)>B_0\)).
The solutions of the system \(\bar{S}\) are the tuples \((x,(y_{J'})_{J'\subseteq J})\in \mathbb {N}^{|J|+|J|\cdot 2^{|J|}}\) satisfying \(x\in \mathop {\uparrow }(C,\dots ,C)\) and, for all \(J'\subseteq J\),
and \(y_{J'}\equiv _{\le B_0}x_{J'}\). Since \((x_0,(x_{J'})_{J'\subseteq J})\in [[\bar{S}]]\), the system \(\bar{S}\) is satisfiable. The dimension of the linear system \(\bar{S}\) is at most \(d+d\cdot 2^d\), and it is a routine to verify that Corollary 4 and Theorem 2 guarantee a solution \((x,(y_{J'})_{J'\subseteq J})\) with the norm bounded by \(f(||A||,d)\) for some RB-function f (independent of A).
The proof of Theorem 5 is thus finished. \(\square \)
We first extend Lemma 1 to equality constraints that are not homogeneous:
Lemma 20
Let \(N=\{y\in \mathbb {N}^d \mid Cy=c\}\) where C is a \(k\times d\) matrix over \(\mathbb {Z}\), and \(c\in \mathbb {Z}^k\). Then \(Y=\min _{\le }(N)\) is a finite set such that \(N=Y+\{x\in \mathbb {N}^d\mid Cx=0\}\). Moreover the following bound holds where \(r=\operatorname {rank}(C)\):
\(\Vert Y \Vert _{1}\le \Vert c \Vert _{1} (2+r \Vert C \Vert )^r\).
Proof
(Idea.) We first reduce the proof to the special case \(k=\operatorname {rank}(C)\) and \(c\in \mathbb {N}^k\). Then we apply Lemma 1 to \(Bx=\textbf{0}\) where \(x\in \mathbb {N}^{d+k}\), \(B=[C | -I]\), and I is the \(k\times k\) identity matrix. In fact \(B(y,z)=\textbf{0}\) where \((y,z)\in \mathbb {N}^d\times \mathbb {N}^k\) is equivalent to \(Cy=z\). \(\square \)
The following lemma handles a conjunction of inequality constraints.
Lemma 21
Let \(Z=\{z\in \mathbb {N}^d \mid Cz\ge c\}\) where C is a \(k\times d\) matrix over \(\mathbb {Z}\), and \(c\in \mathbb {Z}^k\). The following bound holds where \(r=\operatorname {rank}(C)\):
If Z is empty, the lemma is trivial. Otherwise, let \(z\in \min _{\le }(Z)\). We denote by \(C_j\) for \(j\in [1,k]\) the jth row of C. We introduce \(s=\max \{||C||,||c||\}\) and \(h=(s-1)+s(1+d s)^r\) and \(J=\{j\in [1,k] \mid C_j z\le h\}\). We also denote by \(C'\) the \(|J|\times d\) matrix obtained from C by keeping rows in J. We introduce \(N=\{y\in \mathbb {N}^d \mid C' y=C'z\}\), and \(M=\{x\in \mathbb {N}^d \mid C'x=\textbf{0}\}\). Since \(z\in N\), there exists \(y\in \min _{\le }(N)\) such that \(y\le z\). Lemma 20 shows that \(\Vert y \Vert _{1}\le d h(2+r s)^r\) since \(\operatorname {rank}(C')\le \operatorname {rank}(C)\). Let \(x=z-y\) and notice that \(x\in M\).
Assume by contradiction that \(x\not =\textbf{0}\). In this case, there exists \(x'\in \min _{\le }(M\setminus \{\textbf{0}\})\) such that \(x'\le x\). Lemma 1 shows that \(\Vert x' \Vert _{1}\le (1+d s)^r\). Let \(z'=z-x'\). Since \(z'=y+(x-x')\), it follows that \(z'\in \mathbb {N}^d\). Let us prove that \(Cz'\ge c\). Let \(j\in [1,k]\) and let us prove that \(C_jz'\ge c(j)\). If \(j\in J\) then \(C_jz'=C_j z\ge c(j)\). If \(j\not \in J\), we have \(C_jz'=C_jz-C_jx'\ge h+1-s\Vert x' \Vert _{1}\ge h+1-s(1+d s)^r= s\ge c(j)\). It follows that \(z'\in Z\) which contradicts the minimality of z. If follows that \(x=\textbf{0}\).
From \(z=y\), we derive \(\Vert z \Vert _{1}\le d h(2+d s)^r\). From \(h=(s-1)+s(1+d s)^r\), we get \(\Vert z \Vert _{1}\le (2+ds)^{2r+1}\). \(\square \)
We strengthen Theorem 2 for linear systems without divisibility constraints:
Lemma 22
Any satisfiable d-dim linear system S with no divisibility constraints has a solution \(x\in \mathbb {Z}^d\) such that \(\Vert x \Vert _{1}\le \left( 2+d+d\cdot ||S||\right) ^{2d+1}\).
Proof
(Idea.) By putting S in disjunctive normal form, we reduce the problem to a conjunction of inequality constraints. The proof then follows from Lemma 21. \(\square \)
Proof of Theorem 2. We consider a satisfiable linear system S. We introduce \(\ell =\operatorname {lcm}(S)\). Euclidean divisor by \(\ell \) shows that \(\mathbb {Z}^d\) is the disjoint union of sets \(a+\ell \mathbb {Z}^d\) where a ranges in the finite set of vectors \([0,\ell -1]^d\). In particular \([[S]]\) is the disjoint union of the sets \([[S]]\cap (a+\ell \mathbb {Z}^d)\) where \(a\in [0,\ell -1]^d\). Since \([[S]]\) is non-empty, there exists a vector \(a\in [0,\ell -1]^d\) such that the set \([[S]]\cap (a+\ell \mathbb {Z}^d)\) is non empty. This last set can be denoted by a linear system \(S_a\) obtained from S by replacing:
equality constraints \((\alpha \cdot \textbf{x})=c\) by \((\alpha \cdot \textbf{x})=\frac{c-(\alpha \cdot a)}{\ell }\) if \(\ell \) divides \(c-(\alpha \cdot a)\), and by false otherwise.
divisibility constraints \((\alpha \cdot \textbf{x})\equiv c\,(\bmod \, m)\) by the boolean value \((\alpha \cdot a)\equiv c\,(\bmod \, m)\).
Now, just observe that \([[S]]\cap (a+\ell \mathbb {Z}^d)=a+\ell [[S_a]]\) and in particular \(S_a\) is satisfiable. Notice that if \((\alpha \cdot \textbf{x})\sim c\) is a constraint of S where \(\sim \) is the equality or the inequality, then \(|(\alpha \cdot a)|\le d(\ell -1)||S||\) and \(|c|\le ||S||\). We deduce that \(|c-(\alpha \cdot a)|\le d\ell ||S||\). We have proved the inequality \(||S_a||\le d||S||\). As \(S_a\) does not contain any divisibility constraint, Lemma 22 shows that there exists a solution y of \(S_a\) such that \(\Vert y \Vert _{1}\le (2+d+d||S_a||)^{2d+1}\). Observe that \(x=a+\ell y\) is a solution of S. Moreover \(\Vert x \Vert _{1}\le d(\ell -1) +\ell (2+d+d^2||S||)^{2d+1}\le (d+1)\ell (2+d+d^2||S||)^{2d+1}\). \(\square \)
5 Linear Systems for Groups
In this section, we introduce a linear system denoting a group spanned by a finite set of vectors. More precisely, we prove Theorem 3, all other results of this section are only used for proving that theorem.
We define the rank of a set \(X\subseteq \mathbb {Z}^d\) as the maximal \(r\in [0,d]\) such that there exists a finite sequence \(x_1,\ldots ,x_k\in X\) such that r is the rank of the \(d\times k\) matrix \([x_1|\cdots |x_k]\). This rank is denoted as \(\operatorname {rank}(X)\). We recall some classical results from the book [26, Chapter 4]. In that book, groups L are assumed to be full-rank, i.e. \(\operatorname {rank}(L)=d\). In order to overcome this limitation, we introduce the notion of maximal ranking set. A set \(K\subseteq \{1,\ldots ,d\}\) is called a maximal ranking set for a set \(X\subseteq \mathbb {Q}^d\) if \(\operatorname {rank}(X{_{| K}})=|K|=\operatorname {rank}(X)\), where \(X{_{| K}}=\{x{_{| K}}\mid x\in X\}\). Classical linear algebra results shows that any set admits a maximal ranking set.
Example. The maximal ranking sets of \(\{(1,1)\}\) are \(\{1\}\) and \(\{2\}\), for \(\{(1,0)\}\) and \(\{(1,0),(0,1)\}\) the unique maximal ranking sets are \(\{1\}\) and \(\{1,2\}\) respectively.
A Hermite decomposition of (K, L) where K is a maximal ranking set of a group L is a sequence \((v_i)_{i\in K}\) of vectors in \(\mathbb {N}^d\) that span the group L and such that for every \(i,j\in K\), we have \(v_j(i)<v_i(i)\) if \(j<i\), \(v_j(i)>0\) if \(j=i\), and \(v_j(i)=0\) if \(j>i\). Recall that there exists a unique Hermite decomposition of (K, L). We denote by \(\det _K(L)\) the product \(\prod _{i\in K}v_i(i)\). This product corresponds to the determinant of the triangular matrix \((v_i(j))_{i,j\in K}\).
We first provide the following two lemmas that are obtained thanks to classical matrix operations that provide a way to reduce proofs to the special case of full-rank groups L.
Lemma 23
Let L be a group spanned by a sequence of vectors in \([-m,m]^d\) for some \(m\in \mathbb {N}\), let K be a maximal ranking set for L, and let r be the rank of L. The Hermite decomposition \((v_i)_{i\in K}\) of (K, L) satisfies \(\det _K(L)\le (r!)m^r\) and \(\Vert v_i \Vert \le d(r!)m^r\) for every \(i\in K\).
Given a vector \(x\in \mathbb {Z}^d\) and a positive integer \(\ell \ge 1\), let us introduce that \([x]_{\ell }\) the unique vector in \([0,\ell -1]^d\) such that \(x\in [x]_{\ell }+\ell \mathbb {Z}^d\).
Lemma 24
Let L be a group spanned by a sequence of vectors in \([-m,m]^d\) for some \(m\in \mathbb {N}\), let K be a maximal ranking set for L, let \(r=|K|\), and let \(\ell =\det _K(L)\). Let \(B=[L{_{| K}}]_{\ell }\). There exists a linear system S given as a conjunction of \(d-r\) homogeneous equality constraints such that \(\Vert S \Vert \le r(r!)m^r\) and such that L is the set of solutions x of S satisfying \([x{_{| K}}]_{\ell }\in B\).
We are now ready for proving Theorem 3. Let L be a group spanned by a finite set \(X\subseteq [-m,m]^d\) for some \(m\in \mathbb {N}\). We introduce a maximal ranking set K for L, let \(r=|K|\), and \(\ell =\det _K(L)\). Lemma 23 shows that \(\ell \le (d!)m^d\). Let \(B=[L{_{| K}}]_{\ell }\). Lemma 24 shows that there exists a linear system \(S_0\) given as a conjunction of \(d-r\) homogeneous equality constraints such that \(\Vert S_0 \Vert \le d(d!)m^d\) and such that L is the set of solutions x of \(S_0\) satisfying \([x{_{| K}}]_{\ell }\in B\). It follows that the following linear system S satisfies \(L=[[S]]\).
We recall the EXPSPACE-complete uniform word problem for commutative semigroups [21]: an instance consists of a finite alphabet \(\Sigma \), a finite set of equations \(u\equiv v\) for \(u,v\in \Sigma ^*\) and \(u_0,v_0\in \Sigma ^*\), and we ask whether \(u_0\equiv v_0\). The crux of the high complexity is the fact that the commutative semigroup defined by \(a\equiv b^{2^{2^n}}\) (which can be written in space \(O(2^n)\) when using binary notation for exponents) can be embedded in a commutative semigroup of size O(n) (even when using unary notation for exponents). In fact, by [21] even the (weaker) coverability version in which \(u_0,v_0\in \Sigma \) and we ask whether \(u_0\equiv v_0w\) for some \(w\in \Sigma ^*\) is EXPSPACE-complete.
The mentioned problems can be naturally presented by reversible Petri nets, and [14] shows how a given instance of the coverability problem for reversible Petri nets can be transformed into a net A that is structurally live iff the instance is positive. In the arxiv version we show that we can transform such a net A so that it becomes 1-conservative, and even such that in each vector in the actions \((a_-,a_+)\in A\) two components have the value one while the other are zero. This reduction, together with the above mentioned fact on the equation \(a\equiv b^{2^{2^n}}\), witnesses that structural liveness of conservative nets is EXPSPACE-hard and also that the 2-exp upper bound in Theorem 5cannot be essentially improved.
Acknowledgments
Jiří Valůšek was supported by Grant No. IGA_PrF_2024_024 of IGA of Palacký University Olomouc. We also thank the reviewers for their helpful comments.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.