{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:30:11Z","timestamp":1747805411908},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T00:00:00Z","timestamp":1580774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T00:00:00Z","timestamp":1580774400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11334-020-00358-3","type":"journal-article","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T15:03:04Z","timestamp":1580828584000},"page":"181-197","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Exploiting local persistency for reduced state-space generation"],"prefix":"10.1007","volume":"16","author":[{"given":"K.","family":"Barkaoui","sequence":"first","affiliation":[]},{"given":"H.","family":"Boucheneb","sequence":"additional","affiliation":[]},{"given":"Z.","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,4]]},"reference":[{"issue":"4","key":"358_CR1","doi-asserted-by":"publisher","first-page":"25:1","DOI":"10.1145\/3073408","volume":"64","author":"PA Abdulla","year":"2017","unstructured":"Abdulla PA, Aronis S, Jonsson B, Sagonas K (2017) Source sets: a foundation for optimal dynamic partial order reduction. J ACM 64(4):25:1\u201325:49","journal-title":"J ACM"},{"key":"358_CR2","doi-asserted-by":"crossref","unstructured":"Barkaoui K, Boucheneb H, Li Z (2018) Exploiting local persistency for reduced state space generation. In: International conference on verification and evaluation of computer and communication systems (VECoS), volume 11181 of Lecture Notes in Computer Science, pp 166\u2013181","DOI":"10.1007\/978-3-030-00359-3_11"},{"key":"358_CR3","doi-asserted-by":"crossref","unstructured":"Barkaoui K, Couvreur J-M, Klai K (2005) On the equivalence between liveness and deadlock-freeness in Petri nets. In: Applications and theory of Petri nets 2005, 26th international conference, ICATPN 2005, Miami, USA, June 20\u201325, 2005, proceedings, pp 90\u2013107","DOI":"10.1007\/11494744_7"},{"key":"358_CR4","doi-asserted-by":"crossref","unstructured":"Barkaoui K, Pradat-Peyre J-F (1996) On liveness and controlled siphons in Petri nets. In: Application and theory of Petri nets 1996, 17th international conference, Osaka, Japan, June 24\u201328, 1996, proceedings, pp 57\u201372","DOI":"10.1007\/3-540-61363-3_4"},{"key":"358_CR5","unstructured":"Chen Y (2015) Optimal supervisory control of flexible manufacturing systems. Thesis. Le Cnam"},{"issue":"10","key":"358_CR6","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TSMC.2014.2307284","volume":"44","author":"YF Chen","year":"2014","unstructured":"Chen YF, Li ZW, Barkaoui K (2014) New Petri net structure and its application to optimal supervisory control: interval inhibitor arcs. IEEE Trans Syst Man Cybern 44(10):1384\u20131400","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"358_CR7","unstructured":"Desel J, Juh\u00e1s G (2001) \u201dWhat is a Petri net?\u201d. In: Unifying Petri nets, advances in Petri Nets, pp 1\u201325"},{"key":"358_CR8","doi-asserted-by":"crossref","unstructured":"Godefroid P (1996) Partial-order methods for the verification of concurrent systems: an approach to the state-explosion problem, volume 1032 of Lecture Notes in Computer Science. Springer","DOI":"10.1007\/3-540-60761-7"},{"key":"358_CR9","first-page":"125","volume-title":"Deadlock and liveness properties of Petri nets","author":"MV Iordache","year":"2006","unstructured":"Iordache MV (2006) Deadlock and liveness properties of Petri nets. Birkh\u00e4user, Boston, pp 125\u2013151"},{"key":"358_CR10","unstructured":"Junttila T (2005) On the symmetry reduction method for Petri nets and similar formalisms. In PhD dissertation, Helsinki University of Technology, Espoo, Finland"},{"issue":"2","key":"358_CR11","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TSMCB.2007.914706","volume":"38","author":"ZW Li","year":"2008","unstructured":"Li ZW, Zhao M (2008) On controllability of dependent siphons for deadlock prevention in generalized Petri nets. IEEE Trans Syst Man Cybern 38(2):369\u2013384","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"358_CR12","doi-asserted-by":"crossref","unstructured":"Peled D (1993) All from one, one for all: on model checking using representatives. In: Computer aided verification, 5th international conference, CAV \u201993, Elounda, Greece, June 28\u2013July 1, 1993, proceedings, pp 409\u2013423","DOI":"10.1007\/3-540-56922-7_34"},{"issue":"5","key":"358_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/S0020-0190(97)00133-6","volume":"63","author":"D Peled","year":"1997","unstructured":"Peled D, Wilke T (1997) Stutter-invariant temporal properties are expressible without the next-time operator. Inf Process Lett 63(5):243\u2013246","journal-title":"Inf Process Lett"},{"key":"358_CR14","volume-title":"Petri net theory and the modeling of systems","author":"JL Peterson","year":"1981","unstructured":"Peterson JL (1981) Petri net theory and the modeling of systems. Prentice Hall PTR, Upper Saddle River"},{"key":"358_CR15","unstructured":"Ribet P-O, Vernadat F, Berthomieu B (2002) On combining the persistent sets method with the covering steps graph method. In: Formal techniques for networked and distributed systems\u2014FORTE 2002, 22nd IFIP WG 6.1 International conference Houston, Texas, USA, Nov 11\u201314, 2002, proceedings, pp 344\u2013359"},{"issue":"4","key":"358_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF00709154","volume":"1","author":"A Valmari","year":"1992","unstructured":"Valmari A (1992) A stubborn attack on state explosion. Formal Methods Syst Des 1(4):297\u2013322","journal-title":"Formal Methods Syst Des"},{"key":"358_CR17","unstructured":"Valmari A (1996) The state explosion problem. In: Lectures on Petri nets I: basic models, advances in Petri nets, the volumes are based on the advanced course on Petri nets, held in Dagstuhl, Sept 1996, pp 429\u2013528"},{"issue":"3\u20134","key":"358_CR18","doi-asserted-by":"publisher","first-page":"377","DOI":"10.3233\/FI-2011-613","volume":"113","author":"A Valmari","year":"2011","unstructured":"Valmari A, Hansen H (2011) Can stubborn sets be optimal? Fundam Inform 113(3\u20134):377\u2013397","journal-title":"Fundam Inform"},{"key":"358_CR19","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-662-55862-1_7","volume":"12","author":"A Valmari","year":"2017","unstructured":"Valmari A, Hansen H (2017) Stubborn set intuition explained. Trans Petri Nets Other Models Concurr 12:140\u2013165","journal-title":"Trans Petri Nets Other Models Concurr"},{"key":"358_CR20","unstructured":"van der Aalst W (1998) Finding errors in the design of a workflow process: a Petri-net-based approach. In: Workflow management: net-based concepts, models, techniques, and tools (WFM \u201998): proceedings of the workshop, June 22, 1998, Lisbon, Portugal, Computing Science Reports. Technische Universiteit Eindhoven, pp 60\u201381"},{"key":"358_CR21","doi-asserted-by":"crossref","unstructured":"Vernadat F, Az\u00e9ma P, Michel F (1996) Covering step graph. In: Application and theory of Petri nets 1996, 17th international conference, Osaka, Japan, June 24\u201328, 1996, proceedings, pp 516\u2013535","DOI":"10.1007\/3-540-61363-3_28"},{"key":"358_CR22","unstructured":"Wildberger NJ (2003) A new look at multiset. In: School of Mathematics, UNSW Sydney 2052, pp 1\u201321"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-020-00358-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-020-00358-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-020-00358-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T01:04:38Z","timestamp":1612314278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-020-00358-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,4]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["358"],"URL":"https:\/\/doi.org\/10.1007\/s11334-020-00358-3","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,4]]},"assertion":[{"value":"31 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}