Vol-3170/paper5

From BITPlan ceur-ws Wiki
Revision as of 12:15, 31 March 2023 by Wf (talk | contribs) (edited by wikiedit)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Paper

Paper
edit
description  
id  Vol-3170/paper5
wikidataid  Q117351490→Q117351490
title  Analysing Adaption Processes of Hornets
pdfUrl  https://ceur-ws.org/Vol-3170/paper5.pdf
dblpUrl  https://dblp.org/rec/conf/apn/Kohler-Bussmeier22
volume  Vol-3170→Vol-3170
session  →

Analysing Adaption Processes of Hornets

load PDF

Analysing Adaption Processes of Hornets
Michael Köhler-Bussmeier1 , Heiko Rölke2
1
    University of Applied Science Hamburg, Berliner Tor 7, D-20099 Hamburg
2
    FH Graubünden, Pulvermühlestrasse 57, CH-7000 Chur


                                         Abstract
                                         In this paper we study the dynamics of self-adapting systems. Our main objective is to compare adaption
                                         dynamics of similar systems, i.e. systems that differ only in their organisational networks. We specify
                                         adaption in the formalisms of Hornets – a formalism that uses nets as tokens, i.e. they follow the
                                         nets-within-nets approach. We identify different abstractions of the reachability graph that focus on the
                                         adaption aspects of the processes. We develop key measures for adaption processes on these abstracted
                                         graphs. The key measures are used e.g. to compare two variations of the same adapting system. The ap-
                                         proach is illustrated by a case study: We analyse a Hornet-model of Axelrod’s well-known tournament
                                         where the playing agents adapt their strategies during the game.

                                         Keywords
                                         Adaption, Hornets, nets-within-nets, key measures, organisational networks




1. Introduction: The Dynamics of Adaption Processes
In general the evolution (i.e. adaption) of a system is determined by the interaction aspect of
adaptivity, i.e. how adaption is performed (e.g. via a cross-over of genes) and how the gene pool
looks like (the “how”). But, on the other hand it is relevant which objects have the possibility
to interact: Is there a opportunity for each pair of genes to meet and perform a cross-over in
the system – or are they too separated? This aspect relates to the network aspect of adaptivity
(the “who”). A company’s workflow management system constitutes an example: The set of
workflows is the gene pool, while the evolution of the workflows during the company’s lifetime
strongly relates to the organisational network.
   In this paper we like to study adaption processes where the network part plays a significant
role which cannot be ignored. We like to study these adaption processes, i.e. the trajectories
of the gene pool, in the setting of discrete event system, namely in the formal framework of
Hornets [1] as this formalism has been developed to study adaptive systems. In the context
of Hornets these two aspects – how and whom – are naturally addressed: Hornets are Petri
nets where the tokens are Petri nets again. The surrounding net is called system net and the
net-tokens are called object nets. The object nets model the adapting objects – as they define
what can happen; and the system net models the network part together with the adaption logic

PNSE’22, International Workshop on Petri Nets and Software Engineering, Bergen, Norway, 2022
" michael.koehler-bussmeier@haw-hamburg.de (M. Köhler-Bussmeier); heiko.roelke@fhgr.ch (H. Rölke)
~ https://www.haw-hamburg.de/michael-koehler-bussmeier (M. Köhler-Bussmeier);
https://www.fhgr.ch/personen/person/roelke/ (H. Rölke)
� 0000-0002-3074-4145 (M. Köhler-Bussmeier)
                                       © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
    CEUR
    Workshop
    Proceedings
                  http://ceur-ws.org
                  ISSN 1613-0073       CEUR Workshop Proceedings (CEUR-WS.org)



                                                                                                          80
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                      80–98


itself – as the system net defines which object nets are involved and how adaption looks like. In
the example of a workflow management system the object nets describe the set of workflows
and the net-tokens are the workflow instances while the system net models the whole adaption
process of workflows.
   A state 𝜇 of a Hornet is a nested multiset, where a place 𝑝̂︀𝑖 of the system net is marked with
net-tokens of the form [𝑁𝑖 , 𝑀𝑖 ]; the topology of a net-token is defined by the object net 𝑁𝑖 and
each net-token has its own marking 𝑀𝑖 :
                                          system net         net-token
                                   𝑛
                                  ∑︁ ⏞ ⏟               ⏞     ⏟
                               𝜇=     𝑝̂︀𝑖             [ 𝑁𝑖 , 𝑀𝑖               ]
                                                         ⏟ ⏞   ⏟ ⏞
                                    𝑖=1                object net ON marking

For Hornets the gene pool of this state 𝜇 is given as the set of object nets, i.e. the set of possible
net-token types: {𝑁1 , . . . , 𝑁𝑛 }. We are interested in the dynamics of this set. More specifically,
our main objective is to compare adaption dynamics of similar systems. For the example of
a workflow management system we like to compare two companies with the same initial set
of workflows but with different organisational networks, i.e. we like to study the impact of
the network on the adaption dynamics. We like to develop key values for these dynamics to
answer questions like: “Which company adapts faster?”, “Which company develops a gene pool
of greater diversity?” etc.
   The paper has the following structure: Section 2 recalls the definition of Hornets and
eHornets. The main purpose is to recall the defininition of the reachability graph of Hornets.
It can be skipped on first reading. The main contribution is given in Section 3, which describes
how adaption process can be studied in the formal framework of Hornets. We will derive a
structure describing the core adaption processes as an abstraction of the reachability graph of a
given Hornet. The dynamics of the gene pool is somehow in between two other dynamics: on
the one hand, it is much coarser than the dynamics of the whole Hornet as it abstracts from
the internal actions of the net-tokens; on the other hand is much finer than the dynamics of the
system net alone when considered as a normal p/t net. Different key values will be considered
to capture essential aspect of the adaption dynamics. In Section 4 we exemplify the theoretical
framework with a generalisation of Axelrod’s well-known tournament. The tournament is a
well-known example for adaption, especially in the context of genetic algorithms [2]. Here, we
study the impact of differences in the agents’ neighbourhood for the adaption dynamics: We
compare the dynamics on a Erdős-Rényi graph [30] to that on a Watts-Strogatz graph [31]. The
work ends with a conclusion and an outlook.


2. Hornets and Object Nets
We have defined Hornets in [1] as a generalisation of our object nets [3, 4], which follow the
nets-within-nets paradigm as proposed by Valk [5]. Approaches adapting the nets-within-nets
approach are nested nets [6], mobile predicate/transition nets [7], Reference nets [8], PN2 [9],
hypernets [10], Mobile Systems [11], and adaptive workflow nets [12]. Object Nets can be seen
as the Petri net perspective on contextual change, in contrast to the Ambient Calculus [13] or
the 𝜋-calculus [14].



                                                       81
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                   80–98




Figure 1: An Elementary Object Net System (Eos)


  With object nets we study Petri nets where the tokens are nets again, i.e. we have a nested
marking. Events are also nested. We have three different kinds of events – as illustrated by the
example given in Figure 1:
   1. System-autonomous: The system net transition ̂︀       𝑡 fires autonomously, which moves the
      net-token from 𝑝̂︀1 to 𝑝̂︀2 without changing its marking.
   2. Object autonomous: The object net fires transition 𝑡1 “moving” the black token from 𝑞1
      to 𝑞2 . The object net remains at its location 𝑝̂︀1 .
   3. Synchronisation: Whenever we add matching synchronisation inscriptions at the system
      net transition ̂︀
                     𝑡 and the object net transition 𝑡1 , then both must fire synchronously: The
      object net is moved to 𝑝̂︀2 and the black token moves from 𝑞1 to 𝑞2 inside. Whenever
      synchronisation is specified, autonomous actions are forbidden.
   For Hornets we extend object nets with algebraic concepts that allow to modify the structure
of the net-tokens as a result of a firing transition. This is a generalisation of the approach of
algebraic nets [15], where algebraic data types replace the anonymous black tokens.
Example We consider a Hornet with two workflow nets 𝑁1 and 𝑁2 as tokens – cf. Figure 2.
To model a run-time adaption, we combine 𝑁1 and 𝑁2 resulting in the net 𝑁3 = (𝑁1 ‖𝑁2 ). This
modification is modelled by transition 𝑡 of the Hornets in Fig. 2. In a binding 𝛼 with 𝑥 ↦→ 𝑁1
and 𝑦 ↦→ 𝑁2 the transition 𝑡 is enabled. Assume that (𝑥‖𝑦) evaluates to 𝑁3 for 𝛼. If 𝑡 fires it
removes the two net-tokens from 𝑝 and 𝑞 and generates one new net-token on place 𝑟. The
net-token on 𝑟 has the structure of 𝑁3 and its marking is obtained as a transfer from the token
on 𝑣 in 𝑁1 and the token on 𝑠 in 𝑁2 into 𝑁3 . This transfer is possible since all the places of 𝑁1
and 𝑁2 are also places in 𝑁3 and tokens can be transferred in the obvious way. c

          N2    𝑖       𝑠      𝑓             net-token produced on 𝑟 by 𝑡
               i2- 𝑑 - i
                       r - 𝑒 - i2
                                                      𝑖-
                                                      h       𝑢 - h    𝑣 - h𝑓1
            ZZ
            }                               N3         1
                                                         𝑎- h -  𝑏    r-  𝑐
                  q
              Zls H𝑦                         h𝑖-
                                               3   �                             𝑓3
                                                                             R - h
                                                                             @
                             r
                          - l
                    j (𝑥‖𝑦)
                    H
                                                   Rh 𝑖2 -         𝑠        𝑓�
                                                           𝑑 - rh - 𝑒 - h
                  p�  t                            @                         2
                s �𝑥⌃
                l
              �
            ⊐�
            �
          N1 𝑖1         𝑢      𝑣      𝑓
             i - 𝑎 - i - 𝑏 - ri - 𝑐 - i1


Figure 2: Modification of the net-token’s structure

  It is not hard to prove that the general Hornet formalism is Turing-complete. In [1] we have
proven that there are several possibilities to simulate counter programs: One could use the



                                                82
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                      80–98


nesting to encode counters. Another possibility is to encode counters in the algebraic structure
of the net operators.
   The use of algebraic operations in Hornets relates them to algebraic higher-order (AHO)
systems [16], which are restricted to two-levelled systems but have a greater flexibility for the
operations on net-tokens, since each net transformation is allowed. There is also a relationship to
Nested Nets [17], which are used for adaptive systems, and to distributed graph transformations
[18].

2.1. Adaption: Complexity Issues for eHornets
Let us recall our results on complexity issues of Hornets. We introduced different restrictions
to guarantee that the system has a finite state space: First, we allow at most one token on each
place, which results in the class of safe Hornets. However, this restriction does not guarantee
finite state spaces, since we have the nesting depth as a second source of undecidability [4].
Second, we restrict the universe of object nets to finite sets. Finally, we restrict the nesting depth
and introduce the class of elementary Hornets, which have a two-levelled nesting structure.
This is done in analogy to the class of elementary object net systems (Eos) [3], which are the
two-level specialisation of general object nets [3, 4]. If we rule out these sources of complexity
the remaining origin of complexity is the use of algebraic transformations, which are still
allowed for safe, elementary Hornets – a class defined in analogy to safe Eos [19].
   Safe, elementary Hornets have greater complexity when compared to their Eos counterpart:
On the one hand, we have shown in [19, 20, 21] that most problems for safe Eos are PSpace-
complete. More precisely: All problems that are expressible in LTL or CTL, which includes
reachability and liveness, are PSpace-complete. This means that with respect to these problems
safe Eos are no more complex than P/T nets. On the other hand, we have shown in [22] that
safe, elementary Hornets are beyond PSpace: We have shown a lower bound, i.e. that “the
reachability problem requires exponential space” for safe, elementary Hornets – similarly to
well known result of for bounded P/T nets [23]. In [24] we give an algorithm that needs at most
exponential space, which shows that lower and upper bound coincide.
   In [25] we studied further restrictions of Elementary Hornets – among them state machines.
The main result is that the reachability problem is PSpace-complete for this class.

2.2. Formal Definition of Elementary Hornets (eHornets)
In the following we recall the definition of eHornets from [22] which is specialised from the
general formalism of Hornets [1].

Multisets and P/T Nets A multiset m on the set 𝐷 ∑︀     is a mapping m : 𝐷 → N. Multisets can
also be represented as a formal sum in the form m = 𝑛𝑖=1 𝑥𝑖 , where 𝑥𝑖 ∈ 𝐷.
   Multiset addition is defined component-wise: (m1 + m2 )(𝑑) := m1 (𝑑) + m2 (𝑑). The empty
multiset 0 is defined as 0(𝑑) = 0 for all 𝑑 ∈ 𝐷. Multiset-difference m1 − m2 is defined by
(m1 − m2 )(𝑑) := max(m1 (𝑑) − m2 (𝑑), 0).∑︀
   The cardinality of a multiset is |m| := 𝑑∈𝐷 m(𝑑). A multiset m is finite if |m| < ∞.
The set of all finite multisets over the set 𝐷 is denoted MS (𝐷). The domain of a multiset is



                                                 83
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                         80–98


dom(m) := {𝑑 ∈ 𝐷 | m(𝑑) > 0}.
   Multiset notations are used for sets as well. The meaning will be apparent from its use.
   Any∑︀mapping 𝑓 :∑︀𝐷 → 𝐷′ extends to a multiset-homomorphism 𝑓 ♯ : MS (𝐷) → MS (𝐷′ )
by 𝑓 ( 𝑛𝑖=1 𝑥𝑖 ) = 𝑛𝑖=1 𝑓 (𝑥𝑖 ).
     ♯

   A p/t net 𝑁 is a tuple 𝑁 = (𝑃, 𝑇, pre, post), such that 𝑃 is a set of places, 𝑇 is a set of
transitions, with 𝑃 ∩ 𝑇 = ∅, and pre, post : 𝑇 → MS (𝑃 ) are the pre- and post-condition
functions. A marking of 𝑁 is a multiset of places: m ∈ MS (𝑃 ). We denote the enabling of 𝑡 in
                   𝑡                                𝑡
marking m by m →   − . Firing of 𝑡 is denoted by m →
                                                   − m′ .

Net-Algebras We define the algebraic structure of object nets. For a general introduction of
algebraic specifications cf. [26].
   Let 𝐾 be a set of net-types (kinds). A (many-sorted) specification (Σ, 𝑋, 𝐸) consists of a
signature Σ, a family of variables 𝑋 = (𝑋𝑘 )𝑘∈𝐾 , and a family of axioms 𝐸 = (𝐸𝑘 )𝑘∈𝐾 .
   A signature is a disjoint family Σ = (Σ𝑘1 ···𝑘𝑛 ,𝑘 )𝑘1 ,··· ,𝑘𝑛 ,𝑘∈𝐾 of operators. The set of terms of
type 𝑘 over a signature Σ and variables 𝑋 is denoted T𝑘Σ (𝑋).
   We use (many-sorted) predicate logic, where the terms are generated by a signature Σ and
formulae are defined by a family of predicates Ψ = (Ψ𝑛 )𝑛∈N . The set of formulae is denoted
PLΓ , where Γ = (Σ, 𝑋, 𝐸, Ψ) is the logic structure.

Object Nets and Net-Algebras Let Σ be a signature over 𝐾. A net-algebra assigns to each
type 𝑘 ∈ 𝐾 a set 𝒰𝑘 of object nets – the net universe. Each   ⋃︀ object 𝑁 ∈ 𝒰𝑘 , 𝑘 ∈ 𝐾 net is a p/t
net 𝑁 = (𝑃𝑁 , 𝑇𝑁 , pre𝑁 , post𝑁 ). We identify 𝒰 with 𝑘∈𝐾 𝒰𝑘 in the following. We assume
the family 𝒰 = (𝒰𝑘 )𝑘∈𝐾 to be disjoint.
   The nodes of the object nets in 𝒰𝑘 are not disjoint, since the firing rule allows to transfer
tokens between net tokens within the same set 𝒰𝑘 . Such a transfer is possible, if we assume
that all nets 𝑁 ∈ 𝒰𝑘 have the same set of places 𝑃𝑘 . 𝑃𝑘 is the place universe for all object nets
of kind 𝑘. In the example of Fig. 2 the object nets 𝑁1 , 𝑁2 , and 𝑁3 must belong to the same type
since otherwise it would be impossible to transfer the markings in 𝑁1 and 𝑁2 to the generated
𝑁3 .
   In general, 𝑃𝑘 is not finite. Since we like each object net to be finite in some sense, we
require that the transitions 𝑇𝑁 of each 𝑁 ∈ 𝒰𝑘 use only a finite subset of 𝑃𝑘 , i.e. ∀𝑁 ∈ 𝒰 :
|∙ 𝑇𝑁 ∪ 𝑇𝑁 ∙ | < ∞.
   The family of object nets 𝒰 is the universe of the algebra. A net-algebra (𝒰, ℐ) assigns to
each constant 𝜎 ∈ Σ𝜆,𝑘 an object net 𝜎 ℐ ∈ 𝒰𝑘 and to each operator 𝜎 ∈ Σ𝑘1 ···𝑘𝑛 ,𝑘 with 𝑛 > 0 a
mapping 𝜎 ℐ : (𝒰𝑘1 × · · · × 𝒰𝑘𝑛 ) → 𝒰𝑘 .
   A net-algebra is called finite if 𝑃𝑘 is a finite set for each 𝑘 ∈ 𝐾.
   Since all nets 𝑁 ∈ 𝒰𝑘 have the same set of places 𝑃𝑘 , which is required to be finite for
eHornets, there is an upper bound for the cardinality of 𝒰𝑘 .

Theorem 1 (Lemma 2.1 in [22]). For each 𝑘 ∈ 𝐾 the cardinality of each net universe 𝒰𝑘 is
                              4|𝑃𝑘 |
bound as follows: |𝒰𝑘 | ≤ 2(2        ).




                                                   84
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                                80–98


   A variable assignment 𝛼 = (𝛼𝑘 : 𝑋𝑘 → 𝒰𝑘 )𝑘∈𝐾 maps each variable onto an element of the
algebra. For a variable assignment 𝛼 the evaluation of a term 𝑡 ∈ T𝑘Σ (𝑋) is uniquely defined
and will be denoted as 𝛼(𝑡).
   A net-algebra, such that all axioms of (Σ, 𝑋, 𝐸) are valid, is called net-theory.

Nested Markings A marking of an eHornet assigns to each system net place one or many
net-tokens. The places of the system net are typed by the function k : 𝑃̂︀ → 𝐾, meaning that a
place 𝑝̂︀ contains net-tokens of kind k (̂︀
                                         𝑝). Since the net-tokens are instances of object nets, a
marking is a nested multiset of the form:
                 𝑛
                ∑︁
          𝜇=          𝑝̂︀𝑖 [𝑁𝑖 , 𝑀𝑖 ] where     𝑝̂︀𝑖 ∈ 𝑃̂︀, 𝑁𝑖 ∈ 𝒰k (𝑝̂︀𝑖 ) , 𝑀𝑖 ∈ MS (𝑃𝑁𝑖 ), 𝑛 ∈ N
                𝑖=1

Each addend 𝑝̂︀𝑖 [𝑁𝑖 , 𝑀𝑖 ] denotes a net-token on the place 𝑝̂︀𝑖 that has the structure of the object
net 𝑁𝑖 and the marking 𝑀𝑖 ∈ MS (𝑃𝑁𝑖 ). The set of all nested multisets is denoted as ℳ𝐻 . We
define the partial order ⊑ on nested multisets by setting 𝜇1 ⊑ 𝜇2 iff ∃𝜇 : 𝜇2 = 𝜇1 + 𝜇.
  The projection Π1𝑁 (𝜇) is the multiset of all system-net places that contain the object net 𝑁 :
                               (︁∑︁𝑛                  )︁  ∑︁𝑛
                           Π1𝑁         𝑝̂︀𝑖 [𝑁𝑖 , 𝑀𝑖 ] :=        1𝑁 (𝑁𝑖 ) · 𝑝̂︀𝑖                   (1)
                                      𝑖=1                          𝑖=1

where the indicator function 1𝑁 is defined as: 1𝑁 (𝑁𝑖 ) = 1 iff 𝑁𝑖 = 𝑁 .
  Analogously, the projection Π2𝑁 (𝜇) is the multiset of all net-tokens’ markings (that belong to
the object net 𝑁 ):        (︁∑︁𝑛                   )︁  ∑︁𝑛
                       Π2𝑁          𝑝̂︀𝑖 [𝑁𝑖 , 𝑀𝑖 ] :=        1𝑘 (𝑁𝑖 ) · 𝑀𝑖                   (2)
                                     𝑖=1                           𝑖=1

  The projection Π2𝑘 (𝜇) is the sum of all net-tokens’ markings belonging to the same type
𝑘 ∈ 𝐾:                                               ∑︁
                                       Π2𝑘 (𝜇) :=                 Π2𝑁 (𝜇)                                   (3)
                                                          𝑁 ∈𝒰𝑘


Synchronisation The transitions in an Hornet are labelled with synchronisation inscrip-
tions. We assume a fixed set of channels 𝐶 = (𝐶𝑘 )𝑘∈𝐾 .

    • The function family ̂︀        𝑙𝛼𝑘 )𝑘∈𝐾 defines the synchronisation constraints. Each transition
                              𝑙𝛼 = (̂︀
      of the system net is labelled with a multiset ̂︀       𝑡) = (𝑒1 , 𝑐1 ) + · · · + (𝑒𝑛 , 𝑐𝑛 ), where the
                                                         𝑙𝑘 (̂︀
      expression 𝑒𝑖 ∈ TΣ (𝑋) describes the called object net and 𝑐𝑖 ∈ 𝐶𝑘 is a channel. The
                            𝑘

      intention is that ̂︀
                         𝑡 fires synchronously with a multiset of object net transitions with the
      same multiset of labels. Each variable assignment 𝛼 generates the function ̂︀                  𝑡) defined
                                                                                                𝑙𝛼𝑘 (̂︀
      as:                              ∑︁                                ∑︁
                      𝑙𝛼𝑘 (̂︀
                     ̂︀    𝑡)(𝑁 ) :=        1≤𝑖≤𝑛 𝑐𝑖   for ̂︀   𝑙𝑘 (̂︀
                                                                    𝑡) =             (𝑒𝑖 , 𝑐𝑖 )              (4)
                                              𝛼(𝑒𝑖 )=𝑁
                                                                              1≤𝑖≤𝑛

      Each function ̂︀    𝑡) assigns to each object net 𝑁 a multiset of channels.
                     𝑙𝛼𝑘 (̂︀
    • For each 𝑁 ∈ 𝒰𝑘 the function 𝑙𝑁 assigns to each transition 𝑡 ∈ 𝑇𝑁 either a channel
      𝑐 ∈ 𝐶𝑘 or ⊥𝑘 , whenever 𝑡 fires without synchronisation, i.e. autonomously.



                                                         85
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                       80–98


System Net Assume we have a fixed logic Γ = (Σ, 𝑋, 𝐸, Ψ) and a net-theory (𝒰, ℐ). An
elementary higher-order object net (eHornet) is composed of a system net 𝑁          ̂︀ and the set of
object nets 𝒰. W.l.o.g. we assume 𝑁 ̸∈ 𝒰. To guarantee finite algebras for eHornets, we
                                           ̂︀
require that the net-theory (𝒰, ℐ) is finite, i.e. each place universe 𝑃𝑘 is finite.
   The system net is a net 𝑁                            ̂︀ where each arc is labelled with a multiset
                             ̂︀ = (𝑃̂︀, 𝑇̂︀, pre, post, 𝐺),
of terms: pre, post : 𝑇̂︀ → (𝑃̂︀ → MS (TΣ (𝑋))). Each transition is labelled by a guard
predicate 𝐺 ̂︀ : 𝑇̂︀ → PLΓ . The places of the system net are typed by the function k : 𝑃̂︀ → 𝐾.
As a typing constraint we have that each arc inscription has to be a multiset of terms that are
all of the kind that is assigned to the arc’s place:
                                                                   k (̂︀
                                                                      𝑝)
                        pre(̂︀
                            𝑡)(̂︀
                               𝑝),     post(̂︀
                                            𝑡)(̂︀
                                               𝑝)      ∈    MS (TΣ (𝑋))                            (5)

 For each variable binding 𝛼 we obtain the evaluated functions pre𝛼 , post𝛼 : 𝑇̂︀ → (𝑃̂︀ →
MS (𝒰)) in the obvious way.

Definition 1 (Elementary Hornet, eHornet). Assume a fixed many-sorted predicate logic
Γ = (Σ, 𝑋, 𝐸, Ψ).
  An elementary Hornet is a tuple EH = (𝑁
                                        ̂︀ , 𝒰, ℐ, k , 𝑙, 𝜇0 ) such that:

   1. 𝑁̂︀ is an algebraic net, called the system net.
   2. (𝒰, ℐ) is a finite net-theory for the logic Γ.
   3. k : 𝑃̂︀ → 𝐾 is the typing of the system net places.
   4. 𝑙 = (̂︀𝑙, 𝑙𝑁 )𝑁 ∈𝒰 is the labelling.
   5. 𝜇0 ∈ ℳ𝐻 is the initial marking.

Events The synchronisation labelling generates the set of system events Θ. We have three
kinds of events:

   1. Synchronised firing: There is at least one object net that has to be synchronised, i.e. there
      is a 𝑁 such that ̂︀    𝑡)(𝑁 ) is not empty.
                           𝑙(̂︀
      Such an event is a pair 𝜃 = ̂︀     𝑡𝛼 [𝜗], where ̂︀𝑡 is a system net transition, 𝛼 is a variable
      binding, and 𝜗 is a function that maps each object net to a multiset of its transitions, i.e.
      𝜗(𝑁 ) ∈ MS (𝑇𝑁 ). It is required that ̂︀     𝑡 and 𝜗(𝑁 ) have matching multisets of labels, i.e.
                      ♯                                              ♯
      𝑙(̂︀
      ̂︀ 𝑡)(𝑁 ) = 𝑙𝑁    (𝜗(𝑁 )) for all 𝑁 ∈ 𝒰. (Remember that 𝑙𝑁        denotes the multiset extension
      of 𝑙𝑁 .)
      The intended meaning is that ̂︀      𝑡 fires synchronously with all the object net transitions
      𝜗(𝑁 ), 𝑁 ∈ 𝒰.
   2. System-autonomous firing: The transition ̂︀       𝑡 of the system net fires autonomously, when-
      ever ̂︀  𝑡) is the empty multiset 0.
            𝑙(̂︀
      We consider system-autonomous firing as a special case of synchronised firing generated
      by the function 𝜗id , defined as 𝜗id (𝑁 ) = 0 for all 𝑁 ∈ 𝒰.
   3. Object autonomous firing: An object net transition 𝑡 in 𝑁 fires autonomously, whenever
      𝑙𝑁 (𝑡) = ⊥𝑘 .
      Object autonomous events are denoted as id 𝑝,𝑁      ̂︀ [𝜗𝑡 ], where 𝜗𝑡 (𝑁 ) = {𝑡} if 𝑁 = 𝑁 and
                                                                               ′                  ′

      0 otherwise. The meaning is that in object net 𝑁 fires 𝑡 autonomously within the place 𝑝.      ̂︀



                                                 86
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                            80–98


      For the sake of uniformity we define for an arbitrary binding 𝛼:
                                                                       {︃
                             ′     ′                       ′     ′       1 if 𝑝̂︀′ = 𝑝̂︀ ∧ 𝑁 ′ = 𝑁
            pre𝛼 (id 𝑝,𝑁 )(̂︀
                           𝑝   )(𝑁   ) = post𝛼 (id 𝑝,𝑁 )(̂︀
                                                         𝑝   )(𝑁   ) =
                                                                         0 otherwise.
                     ̂︀                            ̂︀


  The set of all events generated by the labelling 𝑙 is Θ𝑙 := Θ1 ∪ Θ2 , where Θ1 contains
synchronous events (including system-autonomous events as a special case) and Θ2 contains
the object autonomous events:
                           {︁                                                     }︁
                                                                         ♯
                 Θ1 :=       𝜏̂︀𝛼 [𝜗]     | ∀𝑁 ∈ 𝒰 : ̂︀𝑙𝛼 (̂︀
                                                           𝑡)(𝑁 ) = 𝑙𝑁     (𝜗(𝑁 ))
                           {︁                                               }︁         (6)
                 Θ2 :=           ̂︀ [𝜗𝑡 ] | 𝑝
                             id 𝑝,𝑁         ̂︀ ∈ 𝑃 , 𝑁 ∈ 𝒰k (̂︀𝑝) , 𝑡 ∈ 𝑇𝑁
                                                 ̂︀


Firing Rule A system event 𝜃 = 𝜏̂︀𝛼 [𝜗] removes net-tokens together with their individual
internal markings. Firing the event replaces a nested multiset 𝜆 ∈ ℳ𝐻 that is part of the
current marking 𝜇, i.e. 𝜆 ⊑ 𝜇, by the nested multiset 𝜌. The enabling condition is expressed by
the enabling predicate 𝜑EH (or just 𝜑 whenever EH is clear from the context):

              𝜑EH      𝜏 𝛼 [𝜗], 𝜆, 𝜌) ⇐⇒ ∀𝑘 ∈ 𝐾 :
                      (̂︀
                        𝑝 ∈ k −1 (𝑘) : ∀𝑁 ∈ 𝒰𝑘 : Π1𝑁 (𝜆)(̂︀
                      ∀̂︀                                𝑝) = pre𝛼 (̂︀  𝑝)(𝑁 ) ∧
                                                                    𝜏 )(̂︀
                        𝑝 ∈ k −1 (𝑘) : ∀𝑁 ∈ 𝒰𝑘 : Π1𝑁 (𝜌)(̂︀
                      ∀̂︀                                𝑝) = post𝛼 (̂︀  𝑝)(𝑁 ) ∧
                                                                     𝜏 )(̂︀                            (7)
                        2
                                  ∑︀         ♯
                      Π𝑘 (𝜆) ≥ 𝑁 ∈𝒰𝑘 pre𝑁 (𝜗(𝑁 )) ∧
                      Π2𝑘 (𝜌) = Π2𝑘 (𝜆) + 𝑁 ∈𝒰𝑘 post♯𝑁 (𝜗(𝑁 )) − pre♯𝑁 (𝜗(𝑁 ))
                                          ∑︀

   The predicate 𝜑EH has the following meaning: Conjunct (1) states that the removed sub-
marking 𝜆 contains on 𝑝̂︀ the right number of net-tokens, that are removed by 𝜏̂︀. Conjunct (2)
states that generated sub-marking 𝜌 contains on 𝑝̂︀ the right number of net-tokens, that are
generated by 𝜏̂︀. Conjunct (3) states that the sub-marking 𝜆 enables all synchronised transitions
𝜗(𝑁 ) in the object 𝑁 . Conjunct (4) states that the marking of each object net 𝑁 is changed
according to the firing of the synchronised transitions 𝜗(𝑁 ).
   Note, that conjunct (1) and (2) assures that only net-tokens relevant for the firing are included
in 𝜆 and 𝜌. Conditions (3) and (4) allow for additional tokens in the net-tokens.
   For system-autonomous events ̂︀   𝑡𝛼 [𝜗id ] the enabling predicate 𝜑EH can be simplified further:
Conjunct (3) is always true since pre𝑁 (𝜗id (𝑁 )) = 0. Conjunct (4) simplifies to Π2𝑘 (𝜌) = Π2𝑘 (𝜆),
which means that no token of the object nets get lost when a system-autonomous events fires.
   Analogously, for an object autonomous event 𝜏̂︀[𝜗𝑡 ] we have an idle-transition 𝜏̂︀ = id 𝑝,𝑁  ̂︀
and 𝜗 = 𝜗𝑡 for some 𝑡. Conjunct (1) and (2) simplify to Π1𝑁 ′ (𝜆) = 𝑝̂︀ = Π1𝑁 ′ (𝜌) for 𝑁 ′ = 𝑁
and to Π1𝑁 ′ (𝜆) = 0 = Π1𝑁 ′ (𝜌) otherwise. This means that 𝜆 = 𝑝[𝑀       ̂︀ ], 𝑀 enables 𝑡, and
     ̂︀ − pre𝑁 (̂︀
𝜌 = 𝑝[𝑀             𝑡) + post𝑁 (̂︀𝑡)].

Definition 2 (Firing Rule). Let EH be an eHornet and 𝜇, 𝜇′ ∈ ℳ𝐻 markings.

    • The event 𝜏̂︀𝛼 [𝜗] is enabled in 𝜇 for the mode (𝜆, 𝜌) ∈ ℳ2𝐻 iff 𝜆 ⊑ 𝜇 ∧ 𝜑EH (̂︀
                                                                                    𝜏 [𝜗], 𝜆, 𝜌)
      holds and the guard 𝐺(     𝑡) holds, i.e. 𝐸 |=𝛼ℐ 𝐺(̂︀
                              ̂︀ ̂︀                    ̂︀ 𝜏 ).
                                                                    𝜏̂︀𝛼 [𝜗](𝜆,𝜌)
    • An event 𝜏̂︀𝛼 [𝜗] that is enabled in 𝜇 can fire – denoted 𝜇 −−−−−−→ 𝜇′ .
                                                                        EH



                                                  87
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                 80–98


    • The resulting successor marking is defined as 𝜇′ = 𝜇 − 𝜆 + 𝜌.

  Note, that the firing rule has no a-priori decision how to distribute the marking on the
generated net-tokens. Therefore we need the mode (𝜆, 𝜌) to formulate the firing of 𝜏̂︀𝛼 [𝜗] in a
functional way.

Reachability Graph Firing is extended to sequences 𝑤 ∈ Θ*𝑙 in the usual way:

    • The empty sequence 𝑤 = 𝜖 is enabled iff 𝜇′ = 𝜇.
                      𝑤                   𝜃                 (𝑤·𝜃)
    • Whenever 𝜇 −−→ 𝜇′ and 𝜇′ −−→ 𝜇′′ then 𝜇 −−−→ 𝜇′ .
                      EH                EH                  EH

                  *                                                          𝑤
  We denote 𝜇 −−→ 𝜇′ whenever there is some 𝑤 such that 𝜇 −−→ 𝜇′ holds. We omit the
                 EH                                                          EH
subscript EH whenever it is clear from the context. The set of reachable markings is defined as:
                                                    {︁             }︁
                                                              *
                         RS (EH ) := RS (𝜇0 ) := 𝜇 | 𝜇0 −−→ 𝜇                                (8)
                                                                       EH

  The reachability graph RG(EH ) = (𝑉, 𝐸, 𝜇0 ) contains all nested markings 𝑉 = RS (EH )
                                                   𝜃
as vertices (or: nodes), 𝐸 = {(𝜇, 𝜇′ ) | 𝜇 →
                                           − 𝜇′ } as edges and the initial marking 𝜇0 as a
distinguished node.


3. Adaption Processes
For eHornets it is quite obvious how to define the gene pool of a system state: Obviously, we
are interested in the (multi-)set of object nets that are contained in the marking 𝜇. These are
given by the projection Π𝒰𝑘 (𝜇):
                                (︁∑︁𝑛                    )︁  ∑︁𝑛
                          Π𝒰𝑘             𝑝̂︀𝑖 [𝑁𝑖 , 𝑀𝑖 ] :=     1𝒰𝑘 (𝑁𝑖 ) · 𝑁𝑖              (9)
                                    𝑖=1                          𝑖=1

where the indicator function 1𝒰𝑘 is defined as: 1𝒰𝑘 (𝑁𝑖 ) = 1 iff 𝑁𝑖 ∈ 𝒰𝑘 .
  For the complete universe we define:
                                      ∑︁                  ∑︁𝑛
                           Π𝒰 (𝜇) :=          Π𝒰𝑘 (𝜇) =           𝑁𝑖                        (10)
                                               𝑘∈𝐾                     𝑖=1

   We define Π̃𝒰 := dom ∘ Π𝒰 to obtain the set of object nets. We use the metaphor that
Π̃𝒰 (𝜇) = {𝑁1 , . . . , 𝑁𝑛 } is the gene pool of the marking 𝜇.
   Note, that for safe Hornets we have no more object nets than system net places and therefore
|Π̃𝒰 (𝜇))| ≤ |Π𝒰 (𝜇)| ≤ |𝑃̂︀|, i.e. the gene pool is bounded.




                                                       88
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                    80–98


3.1. Adaption in the Reachability Graph
The set of reachable object nets of EH , defined as:
                                                        ⋃︁
                             𝒰(EH ) := 𝒰(𝜇0 ) :=                  Π̃𝒰 (𝜇)                       (11)
                                                     𝜇∈RS (𝜇0 )

describes the universe of reachable genes, but it does not contain any information about the
adaption dynamics at all. So, we look at the reachability graph. But, the RG of a Hornet is
usually too large to analyse, since the reachability problem requires exponential space for safe
eHornets [22]. Fortunately, the RG contains much information that is not relevant when
studying the adaption process. We like to define an abstracted version of the RG that describes
the evolution of the gene pool (as specified by the Hornet).
   As we are interested in the adaption dynamics of object nets we start with the reachability
graph and abstract from “irrelevant” events. Roughly speaking, an event is considered as
irrelevant whenever the set of object nets Π^ (𝜇) doesn’t change when firing the event (i.e. the
                                             𝒰
Hornet is stuttering with respect to the set of object nets).

Definition 3. The marking 𝜇𝑛+1 is 𝒰-reachable in (𝑉, 𝐸) from 𝜇1 whenever there is a sequence
𝜇1 𝜇2 · · · 𝜇𝑛+1 such that for all 𝑖 ∈ {1, . . . , 𝑛} we have:
                                     𝜃𝑖
                            ∃𝜃𝑖 : 𝜇𝑖 −
                                     →  𝜇𝑖+1 ∧ Π̃𝒰 (𝜇𝑖 ) = Π̃𝒰 (𝜇𝑖+1 )

Given RG(EH ) = (𝑉, 𝐸) we define the following relations on reachable markings:

    • (𝜇1 , 𝜇2 ) ∈ 𝑅1 iff 𝜇2 is 𝒰-reachable from 𝜇1 in (𝑉, 𝐸) – and vice versa.
    • (𝜇1 , 𝜇2 ) ∈ 𝑅1′ iff 𝜇2 is 𝒰-reachable from 𝜇1 in (𝑉, 𝐸).
    • (𝜇1 , 𝜇2 ) ∈ 𝑅2 iff 𝜇2 is 𝒰-reachable from 𝜇1 in the undirected graph (𝑉, (𝐸 ∪ 𝐸 −1 )).
    • (𝜇1 , 𝜇2 ) ∈ 𝑅3 iff Π̃𝒰 (𝜇1 ) = Π̃𝒰 (𝜇2 )

   In other words, 𝑅1 relates markings that are strongly connected in the reachability graph
via irrelevant events; for 𝑅1′ the connection may hold in only one direction; and 𝑅2 relates
markings that are weakly connected via irrelevant events. Unlike the other relations, 𝑅3 does
not assume any reachability relation between the markings.
   Obviously, the relations have the following properties:

Lemma 1.         • 𝑅1 is reflexive, symmetric, and transitive.
   • 𝑅1′ is reflexive and transitive, but in general not symmetric.
   • 𝑅1 = 𝑅1′ ∩ (𝑅1′ )−1
   • 𝑅2 is reflexive, symmetric, and transitive.
   • 𝑅3 is reflexive, symmetric, and transitive.

   Since 𝑅1 , 𝑅2 , and 𝑅3 are equivalences we can use them to factor the RG, i.e. equivalence
classes are condensed to a single node. All these graphs have 𝑣0 := [𝑣0 ]𝑅𝑖 as a designated initial
node.



                                                89
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                       80–98


Definition 4. Let 𝐺 = (𝑉, 𝐸, 𝑣0 ) be a graph with initial node and let ≈ ⊆ 𝑉 2 be an equivalence
on the vertices. The factorised graph is defined as 𝐺/≈ = (𝑉 ′ , 𝐸 ′ , 𝑣0′ ) with

           𝑉 ′ = [𝑉 ]≈ ,    𝐸 ′ = {([𝜇]≈ , [𝜇′ ]≈ ) | (𝜇, 𝜇′ ) ∈ 𝐸},   and      𝑣0′ := [𝑣0 ]≈

  Then, the abstracted graph RG(EH )/𝑅𝑖 where 𝑖 = 1, 2, 3 describes the evolution of the gene
pool that is specified by the Hornet.
  The three relations leads to different kinds of abstraction due to the following inclusions:

Lemma 2 (Abstraction Hierarchy). 𝑅1 ⊆ 𝑅1′ ⊆ 𝑅2 ⊆ 𝑅3

   Here, a finer equivalence leads to a larger factorised graph. With Lemma 2 we obtain
that RG(EH )/𝑅1 is closer to the original RG, while RG(EH )/𝑅3 leads to a more abstract
factorisation. More specifically:

    • The graph AG 1 (EH ) := RG(EH )/𝑅1 collapses areas in the reachability graph where
      the set of used object nets (i.e. the gene pool) doesn’t change, i.e. it abstracts away from
      stuttering.
    • The graph AG 2 (EH ) := RG(EH )/𝑅2 collapses greater areas in the RG since it is
      sufficient that there is a weak connectivity of the markings in the RG.
    • The graph AG 3 (EH ) := RG(EH )/𝑅3 collapses all markings into one single vertice
      whenever the projection Π̃𝒰 (𝜇) is the same.

3.2. Key Values of Abstract Graphs
In the following, we identify suitable graph theoretic measures to give key values of the abstract
graph (𝑉, 𝐸, 𝑣0 ). Assume that 𝑛 = |𝑉 | and 𝑚 = |𝐸|. For more aspects of graph measures cf.
[27, Chapter 17].

3.2.1. Number of Adaptivity Options
On a macroscopic scale the average degree 𝑛1 · 𝑣∈𝑉 deg(𝑣) tells us about how many evolution
                                                ∑︀
options the system has. A higher value indicates that the system has many options to adapt.
   Similarly, the density 𝑛(𝑛−1)
                            𝑚
                                 tells us something about the specificity of the adaption process
on a macroscopic scale, where a higher value indicates that the system has no specific direction
to evolve.
   Graph transitivity looks at density on a more microscopic scale. It is the probability that 𝑣’s
neighbours are connected, too:

                                   |{(𝑢, 𝑣, 𝑤) | (𝑢, 𝑣), (𝑣, 𝑤), (𝑢, 𝑤) ∈ 𝐸}|
                           𝐶𝑇 :=                                                                 (12)
                                       |{(𝑢, 𝑣, 𝑤) | (𝑢, 𝑣), (𝑣, 𝑤) ∈ 𝐸}|

   Transitivity tells us how dense the adaption process is on a small scale, i.e. when considering
triplets of nodes. A higher value indicates that there are many ways of achieving the same
adaption state, while a lower value indicates that some adaption states are reachable via a more
specific process, only



                                                   90
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                     80–98


3.2.2. Measures for the Length of Adaption Processes
We are interested in measurements of the length of the adaption process. The path length tells
us something about the convergence speed. Let 𝑑(𝑣 → 𝑣 ′ ) denote the shortest path length
from node 𝑣 to 𝑣 ′ . Then, the distances 𝑑(𝑣0 → 𝑣) describes how long the adaption dynamics is
extended from initial node. A greater path length means a longer adaption dynamics.
   The maximal distance from a given node is called its eccentricity 𝜖(𝑣):

                                     𝜖(𝑣) := max
                                              ′
                                                 𝑑(𝑣 → 𝑣 ′ )                                      (13)
                                               𝑣 ∈𝑉

The eccentricity 𝜖(𝑣0 ) tells us about the gene pool that is farthest away. We also consider the
normalised variant 𝜖(𝑣0 )/𝑛.

3.2.3. Identifying central Gene Pools
We also identify the most “central” states in the dynamics, which are in some sense the discrete,
graph-theoretical analogon of an attractor. There are several concepts of centrality in graph
theory. Here, we use betweeness centrality 𝑐𝐵 (𝑣) that is the probability for the shortest path
between two nodes to go through that node 𝑣.
                                                                             𝑣
                                    1                  ∑︁              𝑁𝑠𝑝 (𝑢 −
                                                                              → 𝑤)
                  𝑐𝐵 (𝑣) :=                                                                       (14)
                              (𝑛 − 1)(𝑛 − 2)                           𝑁𝑠𝑝 (𝑢 → 𝑤)
                                               𝑢,𝑤∈𝑉 :𝑢̸=𝑣,𝑤̸=𝑣,𝑢̸=𝑤
                                                                                              𝑣
   Here, 𝑁𝑠𝑝 (𝑢 → 𝑤) is the number of shortest paths from node 𝑢 to node 𝑤 and 𝑁𝑠𝑝 (𝑢 −  → 𝑤)
is the number of the shortest paths that go through node 𝑣.
   We use the stochastic distribution of betweeness centrality 𝑐𝑏 (𝑣) to identify which of the
nodes/genes are very central in the dynamics. The variance indicates whether the distribution
is tight around its average value: a higher variance indicates that some nodes are more central
than others.

3.3. Directedness of Adaption
Assumed that adaption always leads to an improvement, the abstract graph would contain no
cycles. In general, a system will allow for some regression for exploration issues – a try-and-error
strategy. But it is reasonable that on larger time scales adaption will lead to an improvement. So,
longer cycles are typically less common than short ones. When “ignoring” cycles, the abstract
graph describes a partial order. Therefore, we have to find a maximal sub-graph that describes
a partial order, i.e. a maximal DAG (directed acyclic graph). This sub-graph is interpreted as an
underlying dynamics of improvement – when ignoring small phases of regression. We require
that all the nodes remain reachable from the initial node 𝑣0 in the DAG. So, we generate a
maximal spanning DAG. The set of all such sub-graphs of 𝐺 = (𝑉, 𝐸, 𝑣0 ) being a DAG is:

               𝐷𝐴𝐺𝑠(𝑉, 𝐸, 𝑣0 ) := {𝐷 |         𝐷 = (𝑉, 𝐸𝐷 , 𝑣0 ) is a DAG ∧
                                                                             *}                   (15)
                                               𝐸𝐷 ⊆ 𝐸 ∧ ∀𝑣 ∈ 𝑉 : (𝑣0 , 𝑣) ∈ 𝐸𝐷




                                                 91
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                  80–98


  We are interested in a sub-DAG of maximal size:

                      𝑚0 (𝐺) := max{|𝐸𝐷 | | (𝑉, 𝐸𝐷 , 𝑣0 ) ∈ 𝐷𝐴𝐺𝑠(𝐺)}                         (16)

In other words, |𝐸| − 𝑚0 (𝐺) is the minimal number of edges to be deleted to obtain an acyclic
graph from the abstracted reachability graph 𝐺.

Definition 5. The degree of adaption directedness is dad (𝐺) := 𝑚|𝐸|
                                                                 0 (𝐺)
                                                                       .

   The degree of adaption directedness indicates, how much the dynamics is going into a certain
direction (which can be interpreted as an improvement). When 𝑑𝑎𝑑(𝐺) is close to 1, then the RG
is acyclic, and the adaption dynamics goes (almost) strictly into one direction; while a dad (𝐺)
close to 0 indicates an adaption process heavily running in cycles. Of course, we hope for a
dynamics with dad (𝐺) ≈ 1, since they are easier to interprete.
   Any subgraph 𝐷 = (𝑉, 𝐸𝐷 , 𝑣0 ) of 𝐺 = (𝑉, 𝐸, 𝑣0 ) being a DAG with maximally many edges,
i.e. |𝐸𝐷 | = 𝑚0 (𝐺), is a candidate for the underlying improvement dynamics.

                𝐷𝐴𝐺𝑚0 (𝐺) := {(𝑉, 𝐸𝐷 , 𝑣0 ) ∈ 𝐷𝐴𝐺𝑠(𝐺) | 𝑚0 (𝐺) = |𝐸𝐷 |}                      (17)

  We use depth and width of all the DAGs 𝐷 ∈ 𝐷𝐴𝐺𝑚0 (𝑉, 𝐸, 𝑣0 ) as our central key measures:

    • The DAG-depth is the largest line, i.e. a maximal clique w.r.t. li, which is the dependence
      relation of a DAG 𝐷 = (𝑉, 𝐸, 𝑣0 ) defined as li := 𝐸 * ∪ (𝐸 * )−1 ∪ id 𝑉 :

                         depth 𝐷 (𝐷) := max{|𝐿| | 𝐿 is maximal li-clique }                   (18)

      A greater depth tell us that the system is very productive with respect to adaption, since
      it is going very straight into one direction.
    • The DAG-width is the largest cut, i.e. a maximal independent set, or, alternatively, a
      maximal clique w.r.t. the independence relation co := li ∪ id 𝑉 :

                        width 𝐷 (𝐷) := max{|𝐶| | 𝐶 is maximal co-clique }                    (19)
      A greater width tells us that for a given gene pool there is a large amount of options to
      adapt – depending on structural aspects we have abstracted from in the adaption graph.
    • The depth-width ratio depth(𝐺)/width(𝐺) tells us something about the number of
      adaption options given per productive evolution step.

  We average the depth and width over all the DAGs in 𝐷𝐴𝐺𝑚0 (𝑉, 𝐸, 𝑣0 ):
                                        1               ∑︁
                   depth(𝐺) :=                                    depth 𝐷 (𝐷)                (20)
                                    |𝐷𝐴𝐺𝑚0 (𝐺)|
                                                    𝐷∈𝐷𝐴𝐺𝑚0 (𝐺)


  Analogously for width(𝐺).




                                               92
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                     80–98


3.4. Relationship between exploration and exploitation
We can transform the DAG 𝐷 = (𝑉, 𝐸, 𝑣0 ) into a tree by using a different copy of a node for
each path 𝑝 from the initial node to this node. (The definition is unproblematic, since our DAGs
have finitely many nodes, and therefore also only finitely many paths.)

Definition 6. Define the tree unfolding of a DAG 𝐷 = (𝑉, 𝐸, 𝑣0 ) as tree(𝐷) = (𝑉𝑡𝑟 , 𝐸𝑡𝑟 , 𝑣0 )
with

                           𝑉𝑡𝑟 = {𝑝 | 𝑝 = 𝑣0 . . . 𝑣 is a path in 𝐷 }
                           𝐸𝑡𝑟 = {(𝑝, 𝑝′ ) | 𝑝′ = 𝑝 · 𝑣 ′ }

   The tree structure reveals information about the relationship between exploration of the
adaption space, i.e. when the systems tests different options (and this accepts regression), and
its exploitation, i.e. when the systems sticks to a pretty good option and tries to improve it with
minor changes instead of evaluating some completely other option.
   When the tree is growing the systems explores the adaption space. When the growth stagnates
the system exploits the information gained. We try to capture this in the following measures:
The adaption tree 𝑇 has a different branching structure, i.e. less successors here and more over
there; additionally, exploration and exploitation does not necessarily come in two successive
phases, but in many, intertwined ones. So, we compare our tree with a very “tidy” reference
tree, namely a tree that starts with the exploration phase followed by the exploitation phase.
When the root is drawn at the top the tree has a △   □ -like shape, where the triangle describes the
exploration (with a high branching degree) and the rectangle describes the exploitation (with
no branching). A dynamics that has a maximal exploration leads to a tree that consists of the
triangle part only.
   Assume that the original tree 𝑇 has height ℎ0 and 𝑙0 leaves and 𝑛0 nodes. Let ℎ be the height
of the exploration-triangle and ℎ′ the height of the exploitation-rectangle in the reference tree.
Similarly, the triangle has 𝑛 nodes and 𝑙 leaves; the rectangle has 𝑛′ nodes and 𝑙′ leaves. As the
rectangle has no branching, it has the same number of leaves as the triangle: 𝑙 = 𝑙′ . We want
to have a △ □ -like tree that the same height and also the same number of nodes as the original
tree: ℎ0 = ℎ + ℎ′ and 𝑛0 = 𝑛 + 𝑛′ . We also require that the number of leaves does not change:
𝑙0 = 𝑙 = 𝑙′ .
   The new tree must have a (yet unknown) branching 𝑏 such that 𝑏ℎ = 𝑙 = 𝑙0 in the △-part
                                                                    𝑏ℎ+1 −1
of the △□ -like shape. Thus the complete triangle then has 𝑛 = 𝑏−1 nodes and 𝑙 = 𝑏 leaves.
                                                                                           ℎ

The rectangle has as many leaves as the triangle, as we have no branching here, and 𝑛′ = ℎ′ · 𝑏ℎ
nodes. So, we obtain:

                            𝑏ℎ+1 − 1
        𝑛0 = 𝑛 + 𝑛′ =                + ℎ′ · 𝑏ℎ ≈ 𝑏ℎ + ℎ′ · 𝑏ℎ = 𝑏ℎ (1 + ℎ′ ) = 𝑙0 (1 + ℎ′ )
                              𝑏−1
  Therefore, the exploitation rectangle □ has the height ℎ′ ≈ 𝑛𝑙00 − 1. From this we obtain the
height ℎ of the exploration triangle △ as ℎ = ℎ0 − ℎ′ ≈ ℎ0 − 𝑛𝑙00 + 1.
  Let 𝐷 = (𝑉, 𝐸, 𝑣0 ) be a DAG and assume that its tree unfolding 𝑇 = tree(𝐷) has 𝑙0 leaves,
𝑛0 nodes, and height ℎ0 . Then, the exploitation rate of 𝑇 = tree(𝑉, 𝐸, 𝑣0 ) is the ratio of the



                                                93
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                        80–98


rectangle height ℎ′ to the total height ℎ0 :

                                            ℎ′
                                                        (︂        )︂
                                                 1           𝑛0
                                   𝜒(𝑇 ) :=    ≈                −1                                 (21)
                                            ℎ0   ℎ0          𝑙0

  Correspondingly, the exploration rate is given as (1 − 𝜒(𝑇 )).
  We are interested in the corresponding exploration and exploitation rates in the adaption
dynamics.

Definition 7 (exploration and exploitation rates). For the DAG 𝐷 we define 𝜒(𝐷) :=
𝜒(tree(𝐷)). For an abstract reachability graph 𝐺 we define:
                                           1                 ∑︁
                            𝜒(𝐺) :=                                    𝜒(𝐷)                        (22)
                                       |𝐷𝐴𝐺𝑚0 (𝐺)|
                                                       𝐷∈𝐷𝐴𝐺𝑚0 (𝐺)

   These rates are used to characterise adaption dynamics: Systems with a high exploration
rate could be considered as adventurous, while systems with a high exploitation rate could be
considered as more conservative.


4. Case Study: Axelrod’s Tournament
In Axelrod’s Tournament [28] several agents are playing the well known prisoners’ dilemma. If
both agents cooperate (C) they both obtain a payoff, e.g. 𝑟 = 3; If only one agent cooperate the
defecting (D) gets a higher payoff of e.g. 𝑡 = 5, while the cooperating one obtains nothing 𝑠 = 0.
If both agents defect they both obtain a small payoff, e.g. 𝑝 = 1. In general, 𝑡 > 𝑟 > 𝑝 > 𝑠 ≥ 0
is assumed.

                                            cooperate (C)         defect (D)
                       cooperate (C)            3,3                  0,5
                       defect (D)               5,0                  1,1

   In the tournament version 𝑛 agents are playing this game pairwise over several rounds. The
agents are allowed to adapt their strategy over time. We assume that each agent remembers a
finite history of games already played with a given opponent. Assuming a history of size 3 a
history is ℎ = 𝑔3 𝑔2 𝑔1 = (𝑎3 , 𝑏3 )(𝑎2 , 𝑏2 )(𝑎1 , 𝑏1 ) where 𝑎𝑖 , 𝑏𝑖 ∈ {𝐶, 𝐷}. A strategy is therefore
a function 𝑠 : {𝐶, 𝐷}6 → {𝐶, 𝐷}. When describing strategies by automata each history
ℎ ∈ {𝐶, 𝐷}6 is a state and the action chosen for the current game is given by state changes.
                                                                  6
   Even for this very restricted history size we have 22 = 264 different strategies, i.e. the
strategy space is far too large to be explored directly. The classical approach to adaption is
genetic programming. The main idea is simple ([2, pg 80ff]): Each strategy evaluates its payoff
so far. The higher the payoff the higher the number of offsprings. An offspring is generated
via a cross-over mechanism, i.e. the two parents’ histories are split at some fixed point and
recombined in a cross-over fashion.
   We generalise the setting: We assume that there is a network that connects the agents and
only connected agents can play the game. We assume that a network also determines which



                                                  94
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                    80–98




Figure 3: The eHornet’s System Net for the Tournament


agents may be chosen as parents when generating a cross-over. For simplicity we assume both
networks to be equal.
   We have specified this scenario as an eHornet. Here, the object nets specify the agents,
i.e. the strategy automata. The system net (shown in a simplified version in Fig. 3) specifies
which agents are chosen for playing the game. It also specifies which agents are chosen in the
adaption process for the cross-over. The system net is parametrised with the connection graph.
The details of this case study can be found in [29].

       adaption dynamics                             Erdős-Rényi            Watts-Strogatz
       average degree 𝑛1 · 𝑣∈𝑉 deg(𝑣)
                           ∑︀
                                                  3.42                   3.14
                   𝑚
       density 𝑛(𝑛−1)                             0.13                   0.26
       transitivity 𝐶𝑇                            0.07                   0.00
       eccentricity 𝜖(𝑣0 )                        4                      3
       variance of betweeness centrality 𝑐𝐵 (𝑣)   0.05                   0.10
       adaption directedness dad (𝐺)              0.63                   0.55
       width(𝐺)/depth(𝐺)                          7/4 = 1.75             4/3 = 1.33
       rate of exploitation 𝜒(𝐺)                  0.20                   0.25
Table 1
Summary of Key Measures of Adaption Processes for different Topologies

   We study two different random graph topologies for the connection graph, namely a Erdős-
Rényi graph [30] and a Watts-Strogatz graph [31] with a rewiring probability of 𝛽 = 0.01 –
both with the same number of nodes (𝑛 = 28) and the same number of edges (𝑚 = 3𝑛 = 84),
modelled by the eHornets EH 1 and EH 2 . We have chosen these two graphs because they are
both well known random graph structures. Moreover, the Erdős-Rényi graph is the special case
of a Watts-Strogatz graph where 𝛽 = 1. It is well known that for small values of 𝛽 each pair of
nodes is connected in a Watts-Strogatz graph via a quite short path of length ∝ log(𝑛), a fact
that is also known as the small world property.
   We generate the abstract adaption graphs AG 3 (EH 𝑖 ), 𝑖 = 1, 2 for the two topologies. The
key measures of the two abstracted reachability graphs are given in Table 1. One can observe,



                                                  95
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                   80–98


for example, that the Erdős-Rényi graph is more exploring than Watts-Strogatz graph as it has
a higher average degree, a higher width/depth-ratio, and a lower exploitation rate 𝜒(𝐺). One
may hypothesize that the reason for this lies in the small world property of the Watts-Strogatz,
i.e. we have long-range connections and therefore every node is only some steps away from
any other node, which is not the case for an Erdős-Rényi graph. Therefore, the Watts-Strogatz
graph is faster in spreading good genes over the entire population.


5. Conclusion
In this contribution we developed key measures to compare adaption processes, usually adaption
processes of variants of the same system. We used the nets-within-nets formalism of Hornets
as our formal model as they provide a natural description of what is adapted within the system:
the set Π̃𝒰 (𝜇)) of net-types occurring in the current marking 𝜇. Here, the system net describes
the general system, while the marking’s set of object net types describe the changing gene-pool.
For the analysis we abstract from events in the Hornet that doesn’t effect the gene pool and
use network theoretical measures to describe a fingerprint of the adaption process.
   Here, we abstracted from events that do not change the gene-pool. Currently, we are relaxing
this even further by ignoring events that change the gene-pool only slightly, i.e. we use a
distance 𝜖 between gene-pools as an additional parameter. In future work we also like to analyse
the adaption dynamics via static properties of the Petri nets, like invariants etc. For most cases
it may be sufficient to study an under- or an over-approximation of the state space.


References
 [1] M. Köhler-Bußmeier, Hornets: Nets within nets combined with net algebra, in: K. Wolf,
     G. Franceschinis (Eds.), International Conference on Application and Theory of Petri Nets
     (ICATPN’2009), volume 5606 of Lecture Notes in Computer Science, Springer-Verlag, 2009,
     pp. 243–262.
 [2] J. H. Holland, Hidden Order: How Adaptation builds complexity, Helix Books, 1995.
 [3] M. Köhler, H. Rölke, Properties of Object Petri Nets, in: J. Cortadella, W. Reisig (Eds.),
     International Conference on Application and Theory of Petri Nets 2004, volume 3099 of
     Lecture Notes in Computer Science, Springer-Verlag, 2004, pp. 278–297.
 [4] M. Köhler-Bußmeier, F. Heitmann, On the expressiveness of communication channels for
     object nets, Fundamenta Informaticae 93 (2009) 205–219.
 [5] R. Valk, Object Petri nets: Using the nets-within-nets paradigm, in: J. Desel, W. Reisig,
     G. Rozenberg (Eds.), Advanced Course on Petri Nets 2003, volume 3098 of Lecture Notes in
     Computer Science, Springer-Verlag, 2003, pp. 819–848.
 [6] I. A. Lomazova, Nested Petri nets – a formalism for specification of multi-agent distributed
     systems, Fundamenta Informaticae 43 (2000) 195–214.
 [7] D. Xu, Y. Deng, Modeling mobile agent systems with high level Petri nets, in: IEEE
     International Conference on Systems, Man, and Cybernetics’2000, 2000.
 [8] O. Kummer, Referenznetze, Logos Verlag, 2002.




                                               96
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                                    80–98


 [9] K. Hiraishi, PN2 : An elementary model for design and analysis of multi-agent systems, in:
     F. Arbab, C. L. Talcott (Eds.), Coordination Models and Languages, COORDINATION 2002,
     volume 2315 of Lecture Notes in Computer Science, Springer-Verlag, 2002, pp. 220–235.
[10] M. A. Bednarczyk, L. Bernardinello, W. Pawlowski, L. Pomello, Modelling mobility with
     Petri hypernets, in: J. L. Fiadeiro, P. D. Mosses, F. Orejas (Eds.), Recent Trends in Algebraic
     Development Techniques (WADT 2004), volume 3423 of Lecture Notes in Computer Science,
     Springer-Verlag, 2004, pp. 28–44.
[11] C. Lakos, A Petri net view of mobility, in: Formal Techniques for Networked and
     Distributed Systems (FORTE 2005), volume 3731 of Lecture Notes in Computer Science,
     Springer-Verlag, 2005, pp. 174–188.
[12] I. A. Lomazova, K. M. van Hee, O. Oanea, A. Serebrenik, N. Sidorova, M. Voorhoeve, Nested
     nets for adaptive systems, in: Application and Theory of Petri Nets and Other Models of
     Concurrency, Lecture Notes in Computer Science, Springer-Verlag, 2006, pp. 241–260.
[13] L. Cardelli, A. D. Gordon, G. Ghelli, Mobility types for mobile ambients, in: Proceedings
     of the Conference on Automata, Languages, and Programming (ICALP’99), volume 1644
     of Lecture Notes in Computer Science, Springer-Verlag, 1999, pp. 230–239.
[14] R. Milner, J. Parrow, D. Walker, A calculus of mobile processes, parts 1-2, Information and
     computation 100 (1992) 1–77.
[15] W. Reisig, Petri nets and algebraic specifications, Theoretical Computer Science 80 (1991)
     1–34.
[16] K. Hoffmann, H. Ehrig, T. Mossakowski, High-level nets with nets and rules as tokens, in:
     Application and Theory of Petri Nets and Other Models of Concurrency, volume 3536 of
     Lecture Notes in Computer Science, Springer-Verlag, 2005, pp. 268 – 288.
[17] I. Lomazova, Nested petri nets for adaptive process modeling, in: A. Avron, N. Dershowitz,
     A. Rabinovich (Eds.), Pillars of Computer Science, volume 4800 of Lecture Notes in Computer
     Science, Springer-Verlag, 2008, pp. 460–474.
[18] G. Taentzer, Distributed graphs and graph transformation, Applied Categorical Structures
     7 (1999) 431–462.
[19] M. Köhler-Bußmeier, F. Heitmann, Safeness for object nets, Fundamenta Informaticae 101
     (2010) 29–43.
[20] M. Köhler-Bußmeier, F. Heitmann, Liveness of safe object nets, Fundamenta Informaticae
     112 (2011) 73–87.
[21] M. Köhler-Bußmeier, A survey on decidability results for elementary object systems,
     Fundamenta Informaticae 130 (2014) 99–123.
[22] M. Köhler-Bußmeier, On the complexity of the reachability problem for safe, elementary
     Hornets, Fundamenta Informaticae 129 (2014) 101–116. Dedicated to the Memory of
     Professor Manfred Kudlek.
[23] R. J. Lipton, The reachability problem requires exponential space, Research Report 62,
     Dept. of Computer science, 1976.
[24] M. Köhler-Bußmeier, F. Heitmann, An upper bound for the reachability problem of safe,
     elementary hornets, Fundamenta Informaticae 143 (2016) 89–100.
[25] M. Köhler-Bußmeier, Restricting Hornets to support adaptive systems, in: W. van der Aalst,
     E. Best (Eds.), PETRI NETS 2017, Lecture Notes in Computer Science, Springer-Verlag,
     2017.



                                                97
�Michael Köhler-Bussmeier et al. CEUR Workshop Proceedings                            80–98


[26] H. Ehrig, B. Mahr, Fundamentals of algebraic Specification, EATCS Monographs on TCS,
     Springer-Verlag, 1985.
[27] H. Sayama, Introduction to the Modeling and Analysis of Complex Systems, Open SUNY
     Textbooks, 2015.
[28] R. Axelrod, The Evolution of Cooperation, Basic Books, 1984.
[29] M. Jankowski, P. B. Dang, J. Krukenberg, Analyse evolutionärer Strategien, Term Paper,
     HAW Hamburg, 2022.
[30] P. Erdös, A. Rényi, On random graphs, Publicationes Mathematicae 6 (1959) 290–297.
[31] D. J. Watts, S. H. Strogatz, Collective dynamics of ’small-world’ networks, Nature 393
     (1998) 440–442.




                                              98
�