{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:42Z","timestamp":1750308702322,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6.11E+15"],"award-info":[{"award-number":["6.11E+15"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["JY10000904001K5051204002K5051204009"],"award-info":[{"award-number":["JY10000904001K5051204002K5051204009"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Research Foundation for the Doctoral Program of Higher Education, the Ministry of Education, P. R. China","award":["2.01E+13"],"award-info":[{"award-number":["2.01E+13"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2013,1]]},"abstract":"<jats:p>Siphons play an important role in the development of deadlock control methods by using Petri nets. The number of siphons increases exponentially with respect to the size of a Petri net. This article presents a symbolic approach to the computation of minimal siphons in Petri nets by using binary decision diagrams (BDD). The siphons of a Petri net can be found via a set of logic conditions. The logic conditions are symbolically modeled by using Boolean algebras. The operations of Boolean algebras are implemented by BDD that are capable of representing large sets of siphons with small shared data structures. The proposed method first uses BDD to compute all siphons of a Petri net and then a binary relation is designed to extract all minimal siphons. Finally, by using a number of examples, the efficiency of the proposed method is verified through different-sized problems.<\/jats:p>","DOI":"10.1145\/2406336.2406339","type":"journal-article","created":{"date-parts":[[2013,1,29]],"date-time":"2013-01-29T16:20:55Z","timestamp":1359476455000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Computation of Minimal Siphons in Petri Nets by Using Binary Decision Diagrams"],"prefix":"10.1145","volume":"12","author":[{"given":"Yufeng","family":"Chen","sequence":"first","affiliation":[{"name":"Xidian University, China"}]},{"given":"Gaiyun","family":"Liu","sequence":"additional","affiliation":[{"name":"Xidian University, China"}]}],"member":"320","published-online":{"date-parts":[[2013,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Andersen H. R. 1997. An introduction to binary decision diagrams. Lecture notes for 49285 Advanced Algorithms E97 Department of Information Technology Technical University of Denmark.  Andersen H. R. 1997. An introduction to binary decision diagrams. Lecture notes for 49285 Advanced Algorithms E97 Department of Information Technology Technical University of Denmark."},{"volume-title":"Proceedings of the 10th International Conference on Application and Theory of Petri Nets. Springer, 1--21","author":"Barkaoui K.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.285680"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/136035.136043"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2078-5"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.853504"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/70.370500"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.807555"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-007-1110-0"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-007-1366-4"},{"key":"e_1_2_1_11_1","first-page":"1863","article-title":"Liveness enforcing supervision in video streaming systems using siphons","volume":"25","author":"Hu H. S.","year":"2009","journal-title":"J. Inf. Sci. Eng."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2009.05.006"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-008-1608-0"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2009.2032678"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207540010002405"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.878953"},{"key":"e_1_2_1_17_1","unstructured":"Jeng M. D. and Xie X. L. 1984. Deadlock detection and prevention of automated manufacturing systems using Petri nets and siphons. In Deadlock Resolution in Computer-Integrated Systems M. C. Zhou and M. P. Fanti Eds. Marcel-Dekker Inc. New York 233--281.  Jeng M. D. and Xie X. L. 1984. Deadlock detection and prevention of automated manufacturing systems using Petri nets and siphons. In Deadlock Resolution in Computer-Integrated Systems M. C. Zhou and M. P. Fanti Eds. Marcel-Dekker Inc. New York 233--281."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207549408957073"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta:20070399"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2003.820576"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.878966"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2006.885185"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.909548"},{"key":"e_1_2_1_24_1","unstructured":"Li Z. W. and Zhou M. C. 2009. Deadlock Resolution in Automated Manufacturing Systems: A Novel Petri Net Approach. Springer.   Li Z. W. and Zhou M. C. 2009. Deadlock Resolution in Automated Manufacturing Systems: A Novel Petri Net Approach . Springer."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-007-1125-6"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2006.884674"},{"key":"e_1_2_1_27_1","unstructured":"Lind-Nielsen J. 2002. BuDDy: Binary decision diagram package release 2.2. IT-University of Copenhagen (ITU).  Lind-Nielsen J. 2002. BuDDy: Binary decision diagram package release 2.2. IT-University of Copenhagen (ITU)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/647746.734068"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/647741.735973"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.926158"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2003535"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2013189"},{"volume-title":"INA: Integrated Net Analyer","year":"2003","author":"Starke P. H.","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207540500431321"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2019880"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2406336.2406339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2406336.2406339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:13:55Z","timestamp":1750277635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2406336.2406339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["10.1145\/2406336.2406339"],"URL":"https:\/\/doi.org\/10.1145\/2406336.2406339","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2013,1]]},"assertion":[{"value":"2010-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}