Reachability in live and safe free-choice Petri nets is NP-complete
Theoretical Computer Science
Supervisory Control of Discrete Event Systems Using Petri Nets
Supervisory Control of Discrete Event Systems Using Petri Nets
Operating Systems
A compact CPN representation for embedded and control systems fault diagnosis and recovery
SEPADS'09 Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems
Safety Discrete Event Models for Holonic Cyclic Manufacturing Systems
HoloMAS '09 Proceedings of the 4th International Conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
Holonic Models for Traffic Control Systems
HoloMAS '09 Proceedings of the 4th International Conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
Formal modeling the low-level interaction between holons
ICS'09 Proceedings of the 13th WSEAS international conference on Systems
Artificial social models for Holonic systems
HoloMAS'11 Proceedings of the 5th international conference on Industrial applications of holonic and multi-agent systems for manufacturing
Hi-index | 0.00 |
A difficulty encountered when developing Holonic Manufacturing Systems (HMSs) is the need to place some or all of the intelligence associated with a holon on a small, low-powered device that has real-time constraints. This requirement must be balanced with the need to communicate with such a holon using standard, open, and sophisticated protocols. A possible solution is to split the functionality into two parts with a lightweight sub-holon on the device and an associated high-level sub-holon on a remote server. However a key difficulty is ensuring that the communication protocol between the two sub-holons is robust and reliable, while still allowing all the flexibility that is required in these types of applications. This paper explores the use of Elementary Net Systems as a basis for the specification of the communication and demonstrates that this provides a simple and robust basis for designing correct communication protocols in the case where communication is via a shared data table, such as the memory on an RFID tag.