Information Technology Reference
In-Depth Information
R i ¼ N R
ForEach p n 2 P C
ForEach t k s.t. t k 2 p n ^: Q h ð p n Þ t k
M( p n , t k , p nk , . R i )
EndFor
EndFor
While ( 9 s 2 P i s.t. S( s ) ^: D S ( s ))
t ¼ s
If t ¼f s g
D( s , R i )
D( t , R i )
ElseIf t f s g^9 s 0 2 t f s g s.t. : D S ð s 0 Þ
Mark s as dead
ElseIf t f s g^8 s 0 2 t f s g) D S ð s 0 Þ
D( t , R i )
D( t , R i )
EndIf
ForEach p m 2 P i s.t. S( p m ) ^j p m
j> 1
ForEach t j 2 p m
M( p m , t j , p mj , R i )
EndFor
EndFor
EndWhile
The decomposition algorithm is intuitively explained as follows.
For each conflict place, it removes all the unwanted branches according
to a given selection tuple. First, for each conflict place, the branches not
selected are isolated (the first ForEach procedure). Afterwards, all the
source places in the net are examined; they are deleted with their
succeeding transitions or marked as dead , until no new node can be
removed/marked (the While procedure).
3.4 EFFECTIVENESS AND EFFICIENCY OF THE
DATA-DRIVEN APPROACH
3.4.1 Solution Effectiveness
Theorem 3.1. (Solution Effectiveness)
Given a service net N S and a
requirement I
!
O, if there is a feasible solution with respect to require-
ment I
!
O, the decomposition algorithm can find it.
Search WWH ::




Custom Search