Abstract 1 Introduction 2 Preliminaries 3 Overview 4 1-component 𝟑-VASS are polynomially length-bounded 5 Polynomially approximable reachability sets 6 Proof of Lemma 2 7 Future research References

Reachability in 3-VASS Is Elementary

Wojciech Czerwiński ORCID University of Warsaw, Poland Ismaël Jecker ORCID Université Marie et Louis Pasteur, CNRS, institut FEMTO-ST, F-25000 Besançon, France Sławomir Lasota ORCID University of Warsaw, Poland Łukasz Orlikowski ORCID University of Warsaw, Poland
Abstract

The reachability problem in 3-dimensional vector addition systems with states (3-VASS) is known to be PSpace-hard, and to belong to Tower. We significantly narrow down the complexity gap by proving the problem to be solvable in doubly-exponential space. The result follows from a new upper bound on the length of the shortest path: if there is a path between two configurations of a 3-VASS then there is also one of at most triply-exponential length. We show it by introducing a novel technique of approximating the reachability sets of 2-VASS by small semi-linear sets.

Keywords and phrases:
vector addition systems, Petri nets, reachability problem, dimension three, doubly exponential space, length of shortest path
Category:
Track B: Automata, Logic, Semantics, and Theory of Programming
Funding:
Wojciech Czerwiński: Supported by the ERC grant INFSYS, agreement no. 950398.
Sławomir Lasota: Supported by the ERC grant INFSYS, agreement no. 950398 and by the NCN grant 2021/41/B/ST6/00535.
Łukasz Orlikowski: Supported by the ERC grant INFSYS, agreement no. 950398.
Copyright and License:
[Uncaptioned image] © Wojciech Czerwiński, Ismaël Jecker, Sławomir Lasota, and Łukasz Orlikowski; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parallel computing models
Related Version:
Full Version: https://arxiv.org/abs/2502.13916
Acknowledgements:
We thank Radosław Piórkowski for many inspiring discussions about cones in VASS a few years ago and Filip Mazowiecki for the discussions about the reachability problem for 3-vass. We thank also Henry Sinclair-Banks for helpful discussions about [4, Thm 4.16]. We thank Qizhe Yang and Yangluo Zheng for the discussions on 3-VASS, which are geometrically 2-dimensional. Finally, we thank anonymous reviewers for helpful comments.
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

Petri nets are an established model of concurrent systems with extensive applications in various areas of theoretical computer science. For most algorithmic questions, the model is equivalent to vector addition systems with states (vass in short). A d-dimensional vass (d-vass in short) is a finite automaton equipped additionally with a finite number d of nonnegative integer counters that are updated by transitions, under the proviso that the counter values can not drop below zero. Importantly, vass have no capability to zero-test counters, and hence the model is not Turing-complete.

One of the central algorithmic problems for VASS is the reachability problem which asks, if in a given vass there is a path (a sequence of executions of transitions) from a given source configuration (consisting of a state together with counter values) to a given target configuration:

  • vass reachability problem

  • Input:    vass V, source and target configurations s,t.

  • Question: Is there a path from s to t?

Already in 1976, the problem was shown to be ExpSpace-hard by Lipton [21], and few years later decidability was shown by Mayr [22]. Later improvements [15, 16] simplified the construction, but no complexity upper bound was given until Leroux and Schmitz showed that the problem can be solved in Ackermannian complexity [18, 19]. At the same time the lower bound was lifted to Tower-hardness [8], and soon afterwards, in 2021, improved to Ackermann-hardness [17, 9].

Although the complexity of the reachability problem is now settled to be Ackermann-complete, various complexity questions remain still widely open. One of them is the complexity of the reachability problem parametrised by dimension, namely in d-dimensional vass (d-vass) for fixed d. Although the question has been investigated for a few decades, exact bounds are only known for dimensions 1 and 2 (both for unary or binary representations of numbers in counter updates). In the case of binary encoding, the reachability problem is NP-complete for 1-vass [12] and PSpace-complete for 2-vass [2], and in case of unary encoding the problem is NL-complete both for 1-vass (folklore) and for 2-vass [10]. For higher dimension almost nothing is known.

All the upper complexity bounds for dimension 1 or 2 were obtained by estimating the length of the shortest path, or of its representation. For unary 1-vass, it is a folklore that if there is a path between two configurations then there is also one of polynomial length (see [3] for more demanding quadratic upper bound), which implies NL-completeness. For binary 1-vass, a polynomial-size representation of the shortest path was provided by [12]. Concerning binary 2-vass, already in 1979 Hopcroft and Pansiot showed that the reachability sets of 2-vass are effectively semi-linear, and therefore the reachability problem is decidable [13]. Subsequently, 2-ExpTime upper complexity bound for binary 2-vass was established by [14]. In [20] Leroux and Sutre showed that even the reachability relation is semi-linear, and that the relation is flattable, namely that it can be described by a finite number of simple expressions called linear path schemes. Only in 2015, careful examination of these linear path schemes led to exponential upper bound on the length of the shortest path, and consequently to PSpace upper bound [2]. Concerning unary 2-vass, polynomial upper bound on the length of the shortest path was shown [10, 1], thus yielding NL-completeness.

Our understanding of the model drops drastically for dimensions larger than 2, as most of good properties admitted in dimension 1 or 2 vanish. For instance, already since the seminal paper [13] it is known that reachability sets of 3-vass are not necessarily semi-linear. Investigation of 3-vass was advocated by many papers cited above, e.g. [13, 2, 1], but until now no specific complexity bounds for 3-vass are known, except for generic parametric bounds known for d-vass in arbitrary fixed dimension d3. By [19], the reachability problem in d-vass is in d+4,111The complexity class i corresponds to the i-th level of Grzegorczyk’s fast-growing hierarchy [25]. later improved to d [11]. In case of 3-vass, this yields membership in 3=Tower. On the other hand, no lower bound is known for binary 3-vass except for the PSpace lower bound inherited from binary 2-vass (for unary 3-vass, NP-hardness has been recently shown by [4]). The complexity gaps remains thus huge, namely between PSpace and Tower. As our main result, we narrow down this gap significantly.

Contribution.

In this paper we investigate complexity of the reachability problem in 3-vass. Our main result is the first elementary upper complexity bound for the problem:

Theorem 1.

The reachability problem in 3-vass is in 2-ExpSpace, under binary encoding.

In particular, this refutes the natural conjecture that for every d3, the reachability problem for d-vass is d-complete and provides the first algorithm, which solves the problem for vass with finite reachability sets faster than exhaustive search.

Our way to prove Theorem 1 is by bounding triply-exponentially the length of the shortest path between the given source and target configurations. This main technical result, formulated in Lemma 2 below, applies to sequential 3-vass, which are sequences of strongly connected components V1,,Vk linked by single transitions u1,,uk1 (see Figure 1; the rigorous definition is given in Section 2).

Figure 1: A sequential 3-vass.

Given a vass V and source and target configurations s,t, by size(V,s,t) we mean the sum of absolute values of all the numbers occurring in transitions of V, s and t, plus the number thereof.

Lemma 2.

If there is a path from s to t in a sequential 3-vass V, then there is one of length at most size(V,s,t)22𝒪(k), where k is the number of components of V.

Therefore the length of the shortest path in a k-component 3-vass is bounded by M22𝒪(k), where M=size(V,s,t) is the size of input, under unary encoding. This is the first bound on the shortest path in vass of dimension higher than 2, that is not based on the size of (finite) reachability sets. Indeed, in a 3-vass of size M, the size of finite reachability sets may be an arbitrary high tower of exponentials.

In consequence of Lemma 2, Theorem 1 follows immediately: the upper bound of Lemma 2 is triple-exponential in the size of input, irrespectively whether unary or binary encoding is used, which implies the same bound on norms of configurations along the shortest path. This yields a nondeterministic double-exponential space algorithm that first guesses a sequence of components leading from the source state to the target one, and then searches for a witnessing path. Note that the complexity bound under unary encoding is not better than under binary encoding.

Lemma 2 immediately yields further upper bounds for the reachability problem, when the number of components is fixed:

Corollary 3.

For every fixed k1, the reachability problem in k-component 3-vass is:

  • in NL, under unary encoding,

  • in PSpace, under binary encoding.

Indeed, for every fixed k1, the bound of Lemma 2 is polynomial with respect to unary input size. Therefore the length of the shortest path, as well as the norm of configurations along this path, are polynomially bounded in case of unary encoding, and exponentially bounded in case of binary encoding. This bounds yield membership in NL and PSpace, respectively. Thus for every fixed k1, the complexity of k-component 3-vass matches the complexity of 2-vass.

Organisation of the paper.

We start by introducing notation and basic facts in Section 2. Overview of the proof of our main result, Lemma 2, is presented in Section 3. In Section 4 we focus on 1-component 3-vass, thus establishing the base of induction for Lemma 2. Next, in Section 5 we introduce the fundamental concept of polynomially approximable sets, and formulate our core technical result: reachability sets of 2-vass are polynomially approximable. The result is then applied in the inductive proof of Lemma 2 in Section 6. We conclude in Section 7.

2 Preliminaries

Let ,0,>0 denote the set of all, nonnegative, and positive rationals, respectively, and likewise let ,,>0 denote the respective sets of integers. For a,b, ab, let [a,b] denote the set {xaxb}. The jth coordinate of a vector wd we write as wj. Thus w=(w1,,wd). For q, by q we denote the constant vector (q,,q)d.

Vector addition systems with states.

Let d>0. A d-dimensional vector addition system with states (d-vass in short) V=(Q,T) consists of a finite set Q of states, and a finite set of transitions TQ×d×Q. A configuration c of V consists of a state qQ and a nonnegative vector wd, and is written as c=q(w). A transition u=(q,v,q) induces steps q(w)uq(w) between configurations, where w=w+v. We refer to the vector vd as the effect of the transition (q,v,q) or of an induced step. A path π in V is a sequence of steps with the proviso that the target configuration of every step matches the source configuration of the next one:

π=c0u1c1uncn. (1)

The effect eff(π)d of a path is the sum of effect of all steps, and its length is the number n of steps. We say that the path is from c0 to cn, call c0,cn source and target configuration, respectively, of the path, and write c0πcn. We also write cc if there is some path from c to c. A path q(v)q(v) in V with the same source and target state we call a cycle. A cycle is simple if the only equality of states along the cycle is the equality of source and target states. When dimension d is irrelevant, we write vass instead of d-vass.

By the geometric dimension of a d-vass we mean the dimension of the vector space Lin(V)d spanned by effects of all its simple cycles. In the sequel we most often consider 2-vass and 3-vass, but also geometrically 2-dimensional 3-vass, i.e., 3-vass of geometric dimension at most 2.

Two paths π and π can be concatenated (composed), written π;π, if the target configuration of π equals the source one of π. As long as it does not lead to confusion, we adopt a convention that when concatenating paths π;π, the latter path π is silently moved so that its source matches the target of π, under assumption that the source state of π is the same as the target state of π. For instance, we write πm to denote the m-fold concatenation of a cycle π, even if eff(π)0.

We use the following notation for measuring size of representation of a vass. By norm of a vector v=(v1,,vd)d, denoted norm(v), we mean the sum of absolute values of all numbers appearing in it: norm(v)=|v1|++|vd|; and by norm of a set of vectors P we mean the sum of norms of its elements: norm(P)={norm(v)vP}. By norm of a configuration q(w), or of a transition (q,w,q), we mean the norm of its vector w. By size of a vass V, denoted size(V), we mean the sum of norms of all its transitions, plus the number of transitions |T|. The norm of a vass is the maximal norm of its transition.

We often implicitly extend a vass V with source configuration s, or with a pair of source and target configurations s,t. Slightly overloading terminology, a pair (V,s) and a triple (V,s,t) we call a vass too. For convenience we overload further and put size(V,s)=size(V)+norm(s) and size(V,s,t)=size(V)+norm(s)+norm(t). The reverse of a vass V=(Q,T) is defined as Vrev=(Q,T), where T is obtained by reversing all transitions in T: T={(q,v,q)(q,v,q)T}. Overloading the notation again, we put (V,s,t)rev:=(Vrev,t,s).

Given a vass together with an initial configuration (V,s), we write Reach(V,s) to denote the set of configurations t such that V has a path from s to t. For every state qQ we write Reachq(V,s) to denote the set of vectors wd such that q(w)Reach(V,s). We write shortly Reach(s) and Reachq(s) if the vass V is clear from the context. If tReach(s) we say that t is reachable from s. If t+ΔReach(s) for some Δd, we say that t is coverable from s.

We consider a variant of vass, called -vass, where the nonnegativeness constraint is dropped. Syntactically, -vass is the same as vass, namely consists of a finite set of states and a finite set of transitions (Q,T). Semantically, configurations of a -vass are Q×d, while all definitions (path, reachability set, etc.) are the same as in case of vass. Equivalently, we may also speak of -configurations and -paths of a vass, i.e., configurations and paths where the nonnegativeness constraint is dropped. Note that every -path q(w)πq(w) may be lifted to become a path q(w+Δ)πq(w+Δ), for some Δd.

Sequential vass.

We define the state graph of a vass V=(Q,T): nodes are states Q, and there is an edge (q,q) if T contains a transition (q,v,q) for some vd. A vass is called strongly connected if its state graph is so. A vass V=(Q,T) is called sequential, if it can be partitioned into a number of strongly connected vass V1=(Q1,T1),,Vk=(Qk,Tk) with pairwise disjoint state spaces, and k1 transitions ui=(qi,vi,qi), for i[1,k1], where qiQi and qiQi+1 (recall Figure 1). Thus Q=Q1Qk and T=T1Tk{u1,,uk1}. We call V a k-component sequential vass, or k-component vass in short, and write down succinctly as V=(V1)u1(V2)u2uk1(Vk). The vass V1,,Vk are called components, and transitions u1,,uk1 bridges. By definition, a 1-component sequential vass is just a strongly connected vass.

Integer solutions of linear systems.

We will intensively use the following immediate corollary of [23] (see also [5, Prop. 4]):

Lemma 4 ([5], Prop. 4).

Consider a system Ax=b of m Diophantine linear equations with n unknowns, where absolute values of coefficients are bounded by N. Every pointwise minimal nonnegative integer solution has norm at most 𝒪(nN)m.

Diagonal property.

We prove that if there is a path in a vass achieving a large value on every coordinate, then there is a path of bounded length that achieves simultaneously large values on all coordinates.222Lemma 5 is inspired by [19, Lemma 4.13], but the statement and the proof are different. We consider a general case of arbitrary dimension, as we believe it is of an independent interest, but in the sequel we will use it only for dimension d=3.

Lemma 5.

For every d there are nondecreasing polynomials Pd,Rd such that for every d-vass (V,s) of norm N, with n states, and for every U, if V has a path from s that for every i[1,d] contains a configuration q(w1,,wd) with wiPd(n,N,U), then V has also a path sq(w1,,wd) of length at most Rd(n,N,U) such that wiU for every i[1,d].

Length-bound on shortest path.

A function f: is called nondecreasing if f(n)n for every n, and f(n)<f(m) for all n<m. Functions used in the sequel are most often nondecreasing. We say that a class 𝒞 of vass or -vass is length-bounded by a non-decreasing function f: if for every (V,s,t) in 𝒞, if st then sπt for some path π of length at most f(size(V,s,t)). A class 𝒞 which is length-bounded by some nondecreasing polynomial we call polynomially length-bounded. It is known that 2-vass have this property:

Lemma 6 ([1], Theorem 3.2).

2-vass are polynomially length-bounded.333[1] adopts a slightly different, but equivalent up to a constant multiplicative factor, definition of norm and size.

As a corollary of Lemmas 6 and 4, respectively, we derive the property for geometrically 2-dimensional 3-vass (using [27, Lemma 5.1]) and 3--vass, respectively:

Lemma 7.

Geometrically 2-dimensional 3-vass are polynomially length-bounded.

Lemma 8.

3--vass are polynomially length-bounded.

Lemma 2 states that there exists a constant C such that for every k, the k-component 3-vass are length-bounded by the function MM22Ck. Therefore for every fixed k, the k-component 3-vass are polynomially length-bounded, even if the degree of polynomial grows doubly exponentially in k.

3 Overview

In this section we present an overview of the proof of our main result, namely of Lemma 2. The proof proceeds by an induction on the number k of components in a sequential 3-vass. The main idea is that either the situation is easy (a short path can be obtained by lifting up a -path) or the first component can be transformed into a finite union of essentially two-dimensional vass (more precisely, finite union of geometrically 2-dimensional 3-vass), each of size bounded polynomially. This transformation is shown in Lemma 28. The induction base is shown in Section 4. We present the proof of the one component case in detail, as it illustrates the main concepts of the proof of Lemma 28, but in a much simpler setting. When the first component is transformed into essentially a 2-vass, we can use the fact that reachability sets in 2-vass are semi-linear and the size of the semi-linear representation is at most exponential [2] (the result is true as well in geometrically 2-dimensional 3-vass). This fact can be exploited to reduce reachability for k-component 3-vass to reachability for (k1)-component 3-vass of exponentially larger size, the details of this reduction are explained in Section 5 in the paragraph about the idea of the proof of Lemma 2. However, if we use semi-linear sets, the exponential blowup in unavoidable and this approach gives us a Tower algorithm resulting from a linear number of exponential blowups (thus not better than [11]). In order to improve the complexity we introduce a novel notion of suitable over- and under-approximations of semi-linear sets. One of our key technical contributions is Lemma 20 stating that reachability sets of 2-vass can be well approximated. Intuitively speaking, the precision of the approximation has to be good enough for correctness of the inductive proof; the better the precision, the bigger the representation of approximants gets. This approach allows us to reduce reachability for k-component 3-vass to reachability in (k1)-component 3-vass of size which is not anymore exponential, but is polynomial in B, where B is the minimal length of a path in (k1)-component 3-vass. This means that nm bound on the minimal path length for (k1)-component 3-vass implies roughly a nm2 bound on the minimal path length for k-component 3-vass. The transformation nmnm2 applied linear number of times results in triply-exponential upper bound for the minimal length of a path in 3-vass.

4 1-component 𝟑-VASS are polynomially length-bounded

This section is devoted to the proof of the induction base for the proof of Lemma 2:

Lemma 9.

1-component 3-vass are polynomially length-bounded.

We also develop a framework to be exploited in the induction step in Section 6. We may safely restrict to 3-vass of geometric dimension 3, as otherwise Lemma 7 immediately implies Lemma 9.

Case distinction.

A 3-vass (V,s,t), where s=p(w) and t=p(w), is forward-diagonal if p(w)p(w+Δ) in V for some Δ(>0)3. Symmetrically, (V,s,t) is backward-diagonal if (V,t,s)rev is diagonal, i.e., if p(w+Δ)p(w) in V for some Δ(>0)3. Finally, V is diagonal if it is both forward- and backward-diagonal. Obviously, the vectors Δ and Δ need not be equal in general.

Let E={e1,,en}3 be the effects of simple cycles of V. We define the (rational) open cone generated by this set to contain all positive rational combinations of vectors from E:

Cone(V)={r1e1++rnenr1,,rn>0}Lin(V).

Cone(V) is thus an open cone inside Lin(V). A 1-component 3-vass V is called wide if (>0)3Cone(V), i.e., if Cone(V) includes the whole positive orthant.

Let Len(V,s,t) denote the set of lengths of paths st in V. We need to argue that there is a nondecreasing polynomial Q such that every 1-component 3-vass (V,s,t) with a path st, has such path of length at most Q(M), where M=size(V,s,t). We split the proof into three cases:

  1. 1.

    If (V,s,t) is diagonal and wide, we exploit the fact that 3--vass are polynomially length-bounded, and use diagonality and wideness to lift a short -path into a path.

  2. 2.

    If (V,s,t) is diagonal but non-wide, we show that (V,s,t) is length-equivalent to a geometrically 2-dimensional 3-vass (V¯,s¯,t¯) of polynomially larger size, namely Len(V,s,t)=Len(V¯,s¯,t¯).

  3. 3.

    Finally, if (V,s,t) is non-diagonal, we show that (V,s,t) is length-equivalent to a set of three geometrically 2-dimensional 3-vass {(V1,s1,t1),(V2,s2,t2),(V3,s3,t3)}, namely Len(V,s,t)=Len(V1,s1,t1)Len(V2,s2,t2)Len(V3,s3,t3) of polynomially larger size.

In the two latter cases we rely on the fact that geometrically 2-dimensional 3-vass are polynomially length-bounded (Lemma 7). In consequence, Q is to be the sum of polynomials claimed in the respective cases. In the sequel let (V,s,t) be a fixed 1-component 3-vass with st, where s=p(w) and t=p(w).

Case 1. (𝑽,𝒔,𝒕) is diagonal and wide.

By diagonality, p(w)πp(w+Δ) and p(w+Δ)πp(w) for some Δ,Δ(>0)3.

Let P be a nondecreasing polynomial witnessing Lemma 8, i.e., 3--vass are length-bounded by P. As there is a path st in V, there is also a -path st, and by Lemma 8 there is a -path sσt of length at most P(M). The maximal norm N of -configurations along σ is thus bounded by MP(M), as every step may update counters by at most M.

By diagonality, the configuration p(w+1) is coverable in V from s, and symmetrically the configuration p(w+1) is coverable in Vrev from t. Due to the upper bound of Rackoff [24, Lemma 3.4], there is a nondecreasing polynomial R such that in every 3-vass of size m, the length of a covering path is at most R(m). Therefore the lengths of both paths p(w)πp(w+Δ) and p(w+Δ)πp(w) in V, where Δ,Δ(>0)3, may be assumed to be at most R(M). We argue that there is a cycle from the source configuration p(w) that increases w by some multiplicity of Δ:

Lemma 10.

There is a path p(w)δp(w+Δ) of length R(M)𝒪(1), for some >0.

Before proving the lemma we use it to complete Case 1. We build a path p(w)p(w) by concatenating 3 paths given below. The first one is δ given by Lemma 10. Note that is necessarily also bounded by R(M)𝒪(1). We replace by its sufficiently large multiplicity to enforce MP(M), which makes the length of δ and only bounded by P(M)R(M)𝒪(1). The multiplicity guarantees that the -path p(w)σp(w), lifted by Δ, becomes a path:

p(w+Δ)σp(w+Δ),

The length of σ is bounded by P(M). Finally, let δ=(π) be the -fold concatenation of the cycle π:

p(w+Δ)δp(w).

The length of this path is bounded by R(M)P(M)R(M)𝒪(1). We concatenate the three paths, τ:=δ;σ;δ, to get a required path

p(w)τp(w)

of length bounded by P(M)R(M)𝒪(1). It thus remains to prove Lemma 10 in order to complete Case 1.

Proof of Lemma 10.

Let π1 be a cycle that visits all states (it exists since the considered vass is strongly connected), and let Δ13 be its effect. Relying on Δ(>0)3, take a sufficiently large multiplicity m>0 so that π~=πm;π1 is a path with nonnegative effect. The path π~ is a cycle and its effect is Δ~=mΔ+Δ13.

As Δ(>0)3, there is >0 such that ΔΔ~(>0)3, and hence, by wideness of (V,s), we have ΔΔ~Cone(V), namely

ΔΔ~=r1e1++rnen

for some positive rationals r1,,rn>0. By Carathéodory’s Theorem [26, p.94], ΔΔ~ is a combination of some 3 vectors among e1,,en, say e1,e2,e3:

ΔΔ~=r1e1+r2e2+r3e3,

for some positive rationals r1,r2,r3>0. Therefore, the system of 3 equations

(ΔΔ~)=r1e1+r2e2+r3e3,

with unknowns ,r1,r2,r3, has a positive integer solution. We rewrite the system to:

ΔmΔ=Δ1+r1e1+r2e2+r3e3. (2)

Let σi be simple cycle of effect ei, for i[1,3]. Let σ be a -path that starts (and ends) in state p and consists of -fold concatenation of the cycle π1, with attached (r1)-fold concatenation of σ1, (r2)-fold concatenation of σ2, and (r3)-fold concatenation of σ3 (since π1 visits all states, this is possible). The effect of σ is the right-hand side of (2), and therefore σ is a -path from p(w+mΔ) to p(w+Δ):

p(w+mΔ)σp(w+Δ).

It need not be a path in general, and therefore we are going to lift it. Let k>0 be a multiplicity large enough so that σ becomes a path when lifted by (k1)mΔ, i.e., when starting in p(w+kmΔ), and also becomes a path when lifted by (k1)Δ, i.e., when ending in p(w+kΔ). In this case, the k-fold concatenation of σ is also a path:

p(w+kmΔ)σkp(w+kΔ), (3)

since all points visited in the inner iterations of σ are bounded from both sides by corresponding points visited in the first and the last iteration of σ. Precomposing this path with p(w)πkmp(w+kmΔ) yields a path p(w)p(w+kΔ), as required.

We now (roughly) bound the magnitudes of all items involved in the above reasoning by a constant power of R(M). W.l.o.g. we may assume that the cycle π1 uses every transition at most |Q|M times, and thus both the length and norm of the effect of π1 are bounded by M2. In consequence, π1 may decrease counters by at most M2. Therefore mM2, and norms of vectors Δ,Δ,Δ~ are all bounded by 𝒪(M3R(M)). The effects e1,e2,e3 of simple cycles σ1,σ2,σ3 are at most M, as no transition repeats along a simple cycle. Therefore by Lemma 4, the system (2) has a solution (,r1,r2,r3) of norm at most D=𝒪(M3R(M))3=𝒪(M9R(M)3), and σ has length at most M2D (since π1 has length at most M2). Therefore we deduce kM3D, and hence the path (3) has length at most M5D2. In consequence of the above bounds, kmM5D2, and the final path p(w)p(w+kv) has length at most R(M)M5D2𝒪(R(M)30)R(M)𝒪(1).

Case 2. (𝑽,𝒔,𝒕) is non-wide.

Every non-zero vector a=(a1,a2,a3)3 defines an open half-space

Ha={x3ax>0},

where ax=a1x1+a2x2+a3x3 stands for the inner product of x=(x1,x2,x3) and a. As V is assumed to be of geometric dimension 3, Cone(V) is an intersection of open half-spaces:

Claim 11.

Cone(V) is an intersection of finitely many open half-spaces Ha, with norm(a)D:=𝒪(M2).

Proof.

Norms of vectors generating Cone(V) – i.e., effects of simple cycles – are at most M, as no transition repeats along a simple cycle. Consider vectors a orthogonal to some of the facets of Cone(V), i.e., orthogonal to two of the vectors generating Cone(V). The vector a is thus an integer solution of a system of 2 linear equations with 3 unknowns, where absolute values of coefficients are bounded by M. By Lemma 4, there is such an integer solution with norm(a)𝒪(M2). This completes the proof.

As V is non-wide, due to Claim 11 we know that Cone(V) is a non-empty intersection of half-spaces Ha. Therefore for some of these Ha we have Cone(V)Ha, i.e., all points xCone(V) have positive inner product ax>0. This implies that the value of inner product with a may not decrease along any cycle in V:

Claim 12.

The effect δ3 of every simple cycle has nonnegative inner product aδ0.

In consequence, on every path st the value of inner product with a is polynomially bounded:

Claim 13.

Every configuration q(x) on a path from s to t satisfies BaxB, where B:=𝒪(MD).

Proof.

Let s=p(w) and t=p(w), and let b=aw and b=aw. Every path st may be decomposed into simple cycles, whose effect may only preserve or increase the inner product with a, plus a short path without cycles, and hence without repetitions of a transitions. The effect of the latter path is thus in [M,M]. Therefore, as inner product may at most multiply norms, every configuration q(x) on a path from s to t satisfies bMDaxb+MD. Knowing that norm(a)D, norm(w),norm(w)M, and that inner product may at most multiply norms, by Claim 11 we deduce

MDb,bMD,

and therefore 2MDax2MD, which implies the claim.

We define a geometrically 2-dimensional 3-vass V¯=(Q¯,T¯) by extending states with the possible values of inner product with a (bounded polynomially by Claim 13). We call V¯ the (a, B)-trim of V. The set of states Q¯ contains states of the form qb, where qQ and BbB, with the intention that every configuration c=q(x) of V has a corresponding configuration c¯=qb(x) in V¯, where ax=b. Therefore, for each transition (q,v,q)T and for all b,b[B,B] such that b+av=b, we add to T¯ the transition

(qb,v,qb). (4)
Claim 14.

V¯ is a geometrically 2-dimensional 3-vass.

Proof.

By construction, the effect of each cycle in V¯ is orthogonal to a, and therefore Lin(V¯) is included in a 2-dimensional vector space. Relying on Claim 13, paths st in V have corresponding paths in V¯, and hence we get:

Claim 15.

Len(V,s,t)=Len(V¯,s¯,t¯).

Finally, we argue that the size of V¯ is bounded polynomially with respect to the size of V:

Claim 16.

size(V¯)R(M)=𝒪(MB).

Proof.

Recalling Claims 11 and 13, namely norm(a)D, B=𝒪(MD), we deduce that transitions (4) contribute at most (2B+1)M𝒪(MB) to the size of V¯. We are now prepared to complete Case 2. Let P be the polynomial witnessing Lemma 7, i.e., geometrically 2-dimensional 3-vass are length-bounded by P. As V has a path st, By Claim 15, V¯ has a path s¯t¯. By Lemma 7, V¯ has thus a path s¯t¯ of length at most P(size(V¯)), i.e., relying on Claim 16, of length at most P(𝒪(M2D))=𝒪(P(M4)). By Claim 15 again, we get a path st in V of length 𝒪(P(M4)). This completes Case 2.

Case 3. (𝑽,𝒔,𝒕) is non-diagonal.

W.l.o.g. assume that (V,s) is not forward-diagonal (otherwise replace V by Vrev). Therefore for all states q the configuration s=q(w+(M+1)) is not coverable from s=p(w). Indeed, using strong-connectedness of V, if s were coverable from s then the configuration p(w+1) would be coverable form p(w), by extending the covering path of s with an arbitrary shortest path back to state p (that cannot decrease a counter by more than M), which would contradict forward non-diagonality.

By Lemma 5, in every path from s, some coordinate j[1,3] is bounded by B:=P3(M,M,M+1) (we take M as an upper bound for n and N, relying on P3 being nondecreasing, and take U=M+1). This property allows us, intuitively speaking, to describe all the paths of V by paths of three geometrically 2-dimensional 3-vass Vj, for j[1,3], where Vj behaves exactly like V except that dimension j is additionally kept in state. Formally, let Vj:=(Qj,Tj), where

Qj= {qbqQ,b[0,B]}
Tj= {(qb,v,qb)(q,v,q)T,b=b+vj}.

The source and target configurations in Vj are sj=pwj(w) and tj=pwj(w), and there is a tight correspondence between paths in V and paths in V1,V2,V3:

Claim 17.

Len(V,s,t)=Len(V1,s1,t1)Len(V2,s2,t2)Len(V3,s3,t3).

The size of each of Vj is bounded polynomially with respect to the size of V:

Claim 18.

The size of each of Vj is at most R(M)=𝒪(MB).

Let P be the polynomial witnessing Lemma 7. As p(w)p(w) in V, by Claim 17 there is a path pwj(w)pwj(w) in Vj for some j[1,3]. Therefore, by Lemma 7 there is such a path of length at most P(R(M)) which, again using Claim 17, implies a path p(w)p(w) in V of the same length. This polynomial bound completes Case 3, and hence also the proof of Lemma 9.

5 Polynomially approximable reachability sets

In this section we introduce the crucial concept of polynomially approximable sets. In order to motivate it, we start by sketching the overall idea of the proof of Lemma 2 (given in Section 6).

Given a finite set Pd and B, we set:

P= {p1++pkk0,p1,,pkP}
PB= {p1++pkBk0,p1,,pkP}.

Sets of the form b+P={b+ppP}, for bd and finite Pd, are called linear, and finite unions of linear sets are called semi-linear.

Idea of the proof of Lemma 2.

Let V=(V1)u1(V2)u2uk1(Vk) be a k-component 3-vass that has a path s=q(w)q(w)=t. If V is diagonal and wide, we use the pumping cycles q(w)q(w+Δ) in V1 and q(w+Δ)q(w) in Vk to lift a -path st, polynomially length-bounded due to Lemma 8, until it becomes a path (as in Case 1 in the proof of Lemma 9).

On the other hand, if V is non-diagonal or non-wide, our strategy is to reduce the number of components by 1, and to rely on the induction assumption for k1, by replacing the first component V1 by one of finitely many geometrically 2-dimensional 3-vass (as in Cases 2 and 3 of the proof of Lemma 9). Relying on the fact that the reachability sets in a geometrically 2-dimensional 3-vass are semi-linear [11], the proof could go as follows (yielding however only the already known Tower upper bound [11]). Using any of the linear sets L=a+P describing the set Reachq2(V,s), where q2 is the source state of the second component V2, transform V into a (k1)-component 3-vass V by dropping the first component V1 and the first bridge u1, and by adding to the remaining (k1)-component 3-vass (V2)u2uk1(Vk) the self-looping transitions (q2,r,q2), one for every period rP. The source configuration of V is s=q2(a), i.e., its vector is the base of L. The transformation preserves behaviour of V. In one direction, a path sq2(x)t in V crossing through q2(x) for some xL has a corresponding path q2(a)q2(x)t in V. Conversely, each path q2(a)q2(x)t in V gives rise to a path st in V, by replacing executions of the self-looping transitions q2(a)q2(x) (w.l.o.g. executed in the beginning), by a path sq2(x) in V1, bounded polynomially due to Lemma 9. However, size(V) may blow-up exponentially with respect to size(V), as bases and periods of L are only bounded exponentially, and therefore this approach could only yield a k-fold exponential bound on the length of the shortest path in k-component 3-vass.

Polynomially approximable sets are designed as a remedy against the k-fold exponential blowup. The idea is to measure the norms of base and periods of a semi-linear set L parametrically with respect to, intuitively speaking, the prospective length B of a path st in V. This allows us to control the blow-up of size of V, also parametrically with B, but requires going outside of semi-linear sets and considering their B-approximations, namely sets sandwiched between a+PB and a+P, good enough for correctness of the above-described transformation of V to V. As the outcome, the exponent of our bound on length of the shortest path in k-component 3-vass is, roughly speaking, square of the exponent of the respective bound in (k1)-component 3-vass. For k-component 3-vass this yields exponent doubly-exponential in k, and hence the bound triply-exponential in k. The rigorous reasoning is given in the proof of Lemma 25 in Section 6.

Polynomially approximable sets.

Let A,B. By a B-approximation of a linear set a+Pd we mean any set Sd satisfying a+PBSa+P. A set Xd is (A, B)-approximately semi-linear if it is a finite union of:

  • linear sets a+Pd with norm(a)BA and norm(P)A; and

  • B-approximations of linear sets a+Pd with norm(a)A and norm(P)A.

Thus X either includes B-approximation of a linear set a+P, whose norm of base is bounded by A, or X includes a whole linear set a+P, whose norm of base is only bounded by BA. In both cases, norms of periods are bounded by A.

We say that a class 𝒞 of d-vass is F-approximable for a function F:, if for every vass (V,s) in 𝒞, its state q, and B, the set Reachq(V,s) is (F(M), B)-approximately semi-linear, where M=size(V,s). The class 𝒞 is polynomially approximable if it is F-approximable, for some nondecreasing polynomial F.

Figure 2: Left: 4-component 2-vass V2. Middle: the set Reachq4(V2,q1(1,0)) and a path q1(1,0)q4(16,0). Right: bases and periods of an over-approximating semi-linear set A+P.
Example 19.

For k1, let Vk be a (2k)-component 2-vass, where each component has just one state qi and one transition: (qi,(1,2),qi) for odd i, and (qi,(2,1),qi) for even i. Bridge transitions are (qi,(0,0),qi+1). Figure 2 shows V2 (left) and a path in V2 from s=q1(1,0) to t=q4(16,0) together with the reachability set Reachq4(V2,s) (middle). In general,

Xk:=Reachq2k(Vk,s)={(x1,x2)x1+2x24k,x1+2x21mod3}. (5)

Even if the size of the reachability set is exponential in k, for small (x1,x2) it is periodic and the periods are small. The set Xk can be over-approximated by A+P for A={(1,0),(2,1),(0,2)} and P={(0,3),(3,0)} (shown on the right of Figure 2), namely for every k1 and B, the set Xk is (8, B)-approximately semi-linear. For illustration, consider Y:=Xk((1,0)+P). If (1,0)+PBXk then Y is a B-approximation of (1,0)+P with norm((1,0)),norm(P)38. Otherwise, there is some (v1,v2)((1,0)+PB)Xk, and then B is larger than 4k:

4k<v1+2v22(v1+v2)2(1+3B)8B.

Therefore by (5), each (x1,x2)Y satisfies norm(x1,x2)=x1+x2x1+2x24k<8B, and thus Y, seen as a union of singletons, is a union of linear sets with norm of base bounded by 8B and empty set of periods. In both cases, Y is (8, B)-approximately semi-linear.

In our subsequent reasoning we rely on the core technical fact:

Lemma 20.

2-vass are polynomially approximable.

We sketch here the intuition behind Lemma 20, since it is one of our main technical contributions. We first show that it is enough to show Lemma 20 for a simple class of 2-vass, called 2-slps, which are of the form α0β1α2αk1βkαk, where αi are fixed sequences of transitions and the loops βi are single transitions. This reduction uses standard techniques, namely Theorem 1 in [2] stating that the reachability relation of a 2-vass can be expressed as a union of reachability relations of a 2-lps (2-lps are 2-slps without the assumption that βi are single transitions) and Theorem 15 in [10] providing the reduction from 2-lps to 2-slps. Next, we simplify the 2-slps even more, using Theorem 4.16 in [4], which states that any two vectors reachable by an 2-slps can be reached also by a path of the 2-slps of a special form: except a short prefix and suffix it zigzags all the time between configurations close to vertical axis to configurations close to horizontal axis. Thus, to prove Lemma 20 it essentially remains to show polynomial approximability for zigzagging paths. To achieve that, we roughly speaking investigate how application of two consecutive loops β+× and β×+ affects the set of reachable configurations on some vertical line close to the vertical axis. We show that arithmetic sequence is transformed into a finite union of arithmetic sequences such that the difference is kept at most polynomial in size of the 2-slps and the first term grows additively by at most a polynomial value. All that allows us to conclude that the set of vectors reachable by zigzagging paths is a union of sets of a form similar to a+Q+PT for some a, Q, P and T. This quite easily implies polynomial approximability.

In the proof of Lemma 2 we actually need polynomial approximability not only for 2-vass, but also for its generalisation, geometrically 2-dimensional 3-vass. It is stated below and shown in the Appendix using Lemma 20.

Lemma 21.

Geometrically 2-dimensional 3-vass are polynomially approximable.

6 Proof of Lemma 2

In this section we prove Lemma 2, by induction on k. The base of induction, when k=1, follows by Lemma 9: 1-component 3-vass are polynomially length-bounded. Before engaging in the induction step we need to generalise wideness, defined up to now for 1-component 3-vass only, to all sequential 3-vass.

Sequential cones.

Consider a k-component 3-vass V=(V1)u1(V2)u2uk1(Vk). By a cascade we mean a tuple of k vectors (v1,,vk) such that the partial sum v1++vi(>0)3 for every i[1,k]. Then the sequential cone of V, denoted SeqCone(V), is the set of sums of all cascades (v1,,vk) whose every ith vector vi belongs to Cone(Vi):

SeqCone(V)={v1++vk(v1,,vk)Cone(V1)××Cone(Vk) is a cascade}.
Claim 22.

If Lin(V) is 3-dimensional then SeqCone(V) is a finitely generated open cone.

We prove the fundamental property: all reachable configurations are at close distance to the sequential cones. We focus on 3-vass, but actually the same proof works for vass in any other fixed dimension. Below, let d(x,y) denote Euclidean distance between x and y, and let d(x,S) denote the distance between x and a set S, that is d(x,S)=inf{d(x,y)yS}.

Lemma 23.

There exists a nondecreasing polynomial P such that each reachable configuration q(w) in a forward-diagonal sequential 3-vass (V,s), satisfies d(w,SeqCone(V))P(size(V,s)).

Proof.

Let V be a k-component sequential 3-vass, and M:=size(V,s). Let s=p1(w) and suppose sπq(x). W.l.o.g. we assume that q(x) is in the last component Vk; indeed, if q(x) is in V for some <k, we prove that claim for V=(V1)u1(V2)u2u1(V) and rely on the inclusion SeqCone(V)SeqCone(V). Our aim is to define a polynomial P and a point ySeqCone(V) such that d(x,y)P(M). The path π decomposes into π=π1;u1;;πk1;uk1;πk where u1,u2,,uk1 are bridge transitions. Let pi be the source state of πi and pi be the target state of πi. Let σi be a shortest path from pi to pi (there is such a path because they are in the same strongly connected component Vi). Let vi3 be the effect of πi;σi, which is a cycle in Vi.

As Cone(Vi) is an open cone, we are not guaranteed that viCone(Vi). In order to ensure this property, we add to vi some small multiples of all the simple cycles in Vi. For each i[1,k], let ci3 be the sum of effects of all simple cycles in Vi and let ε>0 be a small positive rational such that for all i[1,k] we have norm(εci)<1. Then vi+εciCone(Vi).

By forward-diagonality, the configuration p1(w+1) is coverable in V1 from s. Due to the upper bound of Rackoff [24, Lemma 3.4], instantiated to the fixed dimension 3, for some nondecreasing polynomial R the length of such a covering path p1(w)p1(w+Δ), and the norm of Δ, are both at most R(M). For some m, the vector mΔ+v1+εc1 belongs to Cone(V1) and the k-tuple

(mΔ+v1+εc1,v2+εc2,,vk+εck) (6)

is a cascade. Therefore the sum y=mΔ+Σj=1k(vj+εcj)SeqCone(V). We argue that is is enough to use polynomially bounded value of m. Since π starts in s=p1(w), each its prefix can drop by at most norm(w)M on any coordinate. Thus, for each j[1,k] we have eff(π1;u1;;πk1;uj1;πj)M. As ui are single transitions, we also have eff(u1)++eff(uj1)M. In consequence, eff(π1)++eff(πj)2M. Moreover, the sum of norms of effects of all the paths σj is at most M, which implies that v1++vj3M. Finally, for each j[1,k] we have norm(ε(c1++cj))jM. Therefore, setting m=4M guarantees that the tuple (6) is a cascade.

Let C=ε(c1++ck), S=eff(σ1)++eff(σk) and U=eff(u1)++eff(uk). We have norm(C),norm(S),norm(U)M, and y=x+mΔ+S+CU. Therefore δ=yx satisfies norm(δ)P(M):=4MR(M)+3M, and we get the bound

d(x,y)2=d(x,x+δ)2=δδnorm(δ)2

that implies d(x,y)norm(δ), and hence d(x,y)P(M) as required. We say that a k-component 3-vass V is wide if (>0)3SeqCone(V) or (>0)3SeqCone(Vrev). For k=1, the definition relaxes the definition of Section 4.

Proof of Lemma 2.

Lemma 26, formulated below, is a refinement of Lemma 2 suitable for inductive reasoning. When proving the lemma, we distinguish 2 cases, depending on whether a 3-vass is diagonal and wide (we call the 3-vass easy in this case), or not (we call it non-easy then), and rely on the following two facts:

Lemma 24.

Easy sequential 3-vass are length-bounded by Pk(M)=M𝒪(k), where k is the number of components.

Lemma 25.

There is a nondecreasing polynomial H such that for every k>1, if (k1)-component 3-vass are length-bounded by a function h then non-easy k-component 3-vass are length-bounded by the function HhHhH.

For stating Lemma 26, we define inductively a sequence of polynomials (hi)i, where h1 is the polynomial witnessing Lemma 9 (thus 1-component 3-vass are length-bounded by h1), and

hj+1=HhjHhjH.

W.l.o.g. we also assume that hj dominates the polynomial Pj of Lemma 24, namely Pj(m)hj(m) for every j,m1.

Lemma 26.

For every k1, k-component 3-vass are length-bounded by hk.

Proof.

The induction base is given by Lemma 9. For the induction step, suppose (k1)-component 3-vass are length-bounded by hk1. Easy k-component 3-vass are length-bounded by hk due to Lemma 24 and the above-assumed domination, without referring to induction assumption, while non-easy k-component 3-vass are length-bounded by hk due to Lemma 25. Let c be large enough so that H(m),h1(m)mc for every m>1, and let C=c3.

Claim 27.

hk(m)mC2k1 for all m>1.

Lemma 26 implies Lemma 2, as the right-hand side of the inequality in Claim 27 is bounded by m22𝒪(k). Lemma 2 is thus proved (once we prove Lemmas 24 and 25).

The proof of Lemma 24 generalises Case 1 of the proof of Lemma 9. The proof of Lemma 25 makes crucial use of polynomially approximable sets introduced in Section 5, and builds on Lemma 28, stated below, whose proof generalises Cases 2 and 3 of the proof of Lemma 9.

For stating and proving Lemma 28 we need a variant of sequential 3-vass: a good-for-induction k-component 3-vass V=(V1)u1(V2)u2uk1(Vk) is defined exactly like k-component sequential 3-vass, except that the first component V1 is an arbitrary geometrically 2-dimensional 3-vass, not necessarily being strongly connected.

Lemma 28.

There is a nondecreasing polynomial R such that every non-easy k-component 3-vass (V,s,t) is length-equivalent to a finite set S of good-for-induction k-component 3-vass of size at most R(size(V,s,t)), namely Len(V,s,t)=(V,s,t)SLen(V,s,t).

Proof of Lemma 25.

Relying on Lemma 28, assume w.l.o.g. that (V,s,t) is a good-for-induction k-component 3-vass of size size(V,s,t)=R(M), where R is a polynomial of Lemma 28. Let V=(V1)u1(V2)u2uk1(Vk), ui=(pi,δi,pi+1), s=p1(w) in V1 and t=pk(w) in Vk. Let F be a nondecreasing polynomial witnessing Lemma 21, and let f(x)=2R(x)F(R(x)). Let G be a nondecreasing polynomial witnessing Lemma 7, and let g(x)=G(2x2)+x.

Let B:=h(f(M)), namely the length-bound for (k1)-component vass of size f(M). Assuming sπt in V, we aim at proving that there is such a path of length at most g(h(f(h(f(M))))). Decompose the path st into

sπ1p1(v)u1p2(v)πt, (7)

where p2(v) is the first configuration of V2 appearing on π. As V1 is a geometrically 2-dimensional 3-vass, so is the lollypop 3-vass V1 obtained by adding to V1 the first bridge transition u1 (indeed, adding a bridge transition does not create any new cycles). As size(V,s,t)R(M) and F is the polynomial witnessing Lemma 21, by Lemma 21 we get:

Claim 29.

The set Reachp2(V,s) is (F(R(M)), B)-approximately semi-linear.

Thus vL=a+P, where L is a linear set () or a B-approximation thereof (). In both cases v=a+r, for rP. We construct a (k1)-component 3-vass (V,s,t) as follows. V is obtained from (V2)u2uk1(Vk) by adding, for every period vector rP, a self-looping transition (p,r,p) to V2. As the source configuration we take s=p2(a), and keep t as the target configuration.

As R is nondecreasing, B=h(f(M)) and fR we have MR(M)B. As (V,s,t) is obtained from of (V,s,t) by removing from V the part V1, adding transitions of total norm at most equal norm(P) and setting s=p2(a) therefore we estimate M=size(V,s,t) as MR(M)+norm(a)+norm(P). Recall that in the case when L is a linear set () we have norm(a)BA, norm(P)A, while in the case when L is a B-approximation () we have norm(a),norm(P)A, in our case A=F(R(M)). Thus the estimations look as follows:

()M R(M)+(B+1)F(R(M))2R(B)F(R(B))=f(B)
()M R(M)+2F(R(M))2R(M)F(R(M))=f(M),

as f was defined exactly as f(x)=2R(x)F(R(x)). Note that the latter bound is dominated by the former one, thus in both cases Mf(B)=f(h(f(M))).

There is a path st in V, namely the concatenation of a path p2(a)p2(v) using the just added self-looping transition in the state p, with the suffix π of (7):

p2(a)p2(v)πt.

By induction assumption, there is a path st in V of length at most

() =h(M)h(f(B))=h(f(h(f(M))))
() =h(M)h(f(M)).

W.l.o.g. we may assume that the path executes all just added self-looping transitions in the beginning, and therefore it splits into:

p2(a)ρ′′p2(v′′)ρt

such that the suffix ρ is actually a path in (V2)u2uk1(Vk). Since the length of the prefix ρ′′ is at most , we bound norm(v′′)M. If L is a linear set, the following claim is obvious since LReachp2(V,s). On the other hand, the claim requires a proof in case when L is a B-approximation of a linear set:

Claim 30 ().

There is a path sp2(v′′) in the lollypop 3-vass V1.

Indeed, since the length of the path st in V is at most h(f(M)) and B=h(f(M)), we deduce that v′′a+PB, and therefore sp2(v′′) in V1.

By Lemma 7, there is a path sρp2(v′′) in V1 of length at most G(M+norm(v′′))G(M(+1))G(22). Concatenating the two paths ρ and ρ we get a path

sρp2(v′′)ρt

in V, of length at most G(22)+=g()g(h(f(h(f(M))))). Taking H=f+g, the sum of polynomials f and g, we get the bound H(h(H(h(H(M))))), as required.

7 Future research

Below we list a few research questions, which we find interesting and particularly promising directions after our contribution.

Exact complexity for 3-VASS.

We have shown that shortest paths in binary 3-VASS are of at most triply-exponential length. It is tempting to conjecture that actually the upper bound for the length of the paths is shorter, at most doubly-exponential. We conjecture that it is possible with techniques similar to the developed ones, but with more focus on polynomials growing linearly with respect to norms of source and target. We leave proving this conjecture to the future research.

Example of a 𝟑-VASS with doubly-exponential path.

We have shown that shortest paths in binary 3-VASS are of at most triple-exponential length. However, currently we still do not know any example in which even a path of doubly-exponential length is needed, it might be that paths of exponential length are sufficient leading to PSpace-completeness for binary 3-VASS. It would be very interesting to find an example of a binary 3-VASS with shortest path between two configurations being doubly exponential. An example of binary 4-VASS of doubly-exponential shortest path is known (see Section 5 in [7]). Maybe some modification of this 4-VASS would allow to design a 3-VASS with similar properties.

Reachability for 𝒅-VASS with 𝒅𝟒.

It is a natural question whether our techniques extend to higher dimensions. The answer is: possibly yes, but we would need a few other structural results for 3-VASS to make a similar approach to 4-VASS possible. In the proof of Lemma 2 we do not only use 2-VASS reachability as a black box, but we use a deep understanding of the reachability relation in 2-VASS from [4]. Probably a similar understanding of the reachability relation for 3-VASS would be needed to advance understanding of 4-VASS along our lines.

In general it is very interesting to determine the complexity of the reachability problem for d-VASS. We have excluded that for each d3 the problem is d-completely, but it is still possible that the problem is dC-complete for some constant C and d big enough. Recall that in [6] it was shown that the reachability problem for (2d+4)-VASS is d-hard for any d3 and this is the best currently known lower bound for arbitrary dimension. Therefore the other natural possibility is that the reachability problem for (2d+C)-VASS is d-complete for some constant C.

Applications of the approximation technique.

Another natural research direction is to search for other applications of the technique of approximating the reachability sets, which allows to lower the complexity down, below the size of the reachability set. One particular case, which seems to be prone to such techniques is the 2-VASS with some number of -counters, namely counters, which can take values below zero. The best complexity lower bound for the reachability problem in this model is PSpace-hardness inherited from [2], while the best upper bound is Ackermann membership inherited from VASS reachability [19]. The reachability sets for that systems are not necessarily semilinear. This disqualifies most of the techniques relying on the semilinearity of reachability sets, but our techniques seem to be promising for that model.

References

  • [1] Michael Blondin, Matthias Englert, Alain Finkel, Stefan Göller, Christoph Haase, Ranko Lazic, Pierre McKenzie, and Patrick Totzke. The Reachability Problem for Two-Dimensional Vector Addition Systems with States. J. ACM, 68(5):34:1–34:43, 2021. doi:10.1145/3464794.
  • [2] Michael Blondin, Alain Finkel, Stefan Göller, Christoph Haase, and Pierre McKenzie. Reachability in Two-Dimensional Vector Addition Systems with States Is PSPACE-Complete. In Proceedings of LICS 2015, pages 32–43. IEEE Computer Society, 2015. doi:10.1109/LICS.2015.14.
  • [3] Dmitry Chistikov, Wojciech Czerwiński, Piotr Hofman, Michal Pilipczuk, and Michael Wehar. Shortest paths in one-counter systems. Log. Methods Comput. Sci., 15(1), 2019. doi:10.23638/LMCS-15(1:19)2019.
  • [4] Dmitry Chistikov, Wojciech Czerwinski, Filip Mazowiecki, Lukasz Orlikowski, Henry Sinclair-Banks, and Karol Wegrzycki. The tractability border of reachability in simple vector addition systems with states. In Proceedings of FOCS 2024, pages 1332–1354. IEEE, 2024. doi:10.1109/FOCS61266.2024.00086.
  • [5] Dmitry Chistikov and Christoph Haase. The Taming of the Semi-Linear Set. In Proceedings of ICALP 2016, volume 55 of LIPIcs, pages 128:1–128:13. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPICS.ICALP.2016.128.
  • [6] Wojciech Czerwiński, Ismaël Jecker, Sławomir Lasota, Jérôme Leroux, and Lukasz Orlikowski. New Lower Bounds for Reachability in Vector Addition Systems. In Proceedings of FSTTCS 2023, volume 284 of LIPIcs, pages 35:1–35:22, 2023. doi:10.4230/LIPICS.FSTTCS.2023.35.
  • [7] Wojciech Czerwiński, Sławomir Lasota, Ranko Lazic, Jérôme Leroux, and Filip Mazowiecki. Reachability in fixed dimension vector addition systems with states. In Proceedings of CONCUR 2020, pages 48:1–48:21, 2020.
  • [8] Wojciech Czerwiński, Sławomir Lasota, Ranko Lazic, Jérôme Leroux, and Filip Mazowiecki. The Reachability Problem for Petri Nets Is Not Elementary. J. ACM, 68(1):7:1–7:28, 2021. doi:10.1145/3422822.
  • [9] Wojciech Czerwiński and Lukasz Orlikowski. Reachability in Vector Addition Systems is Ackermann-complete. In Proceedings of FOCS 2021, pages 1229–1240. IEEE, 2021. doi:10.1109/FOCS52979.2021.00120.
  • [10] Matthias Englert, Ranko Lazic, and Patrick Totzke. Reachability in Two-Dimensional Unary Vector Addition Systems with States is NL-Complete. In Proceedings of LICS 2016, pages 477–484, 2016. doi:10.1145/2933575.2933577.
  • [11] Yuxi Fu, Qizhe Yang, and Yangluo Zheng. Improved Algorithm for Reachability in d-VASS. In Proceedings of ICALP 2024, volume 297 of LIPIcs, pages 136:1–136:18, 2024. doi:10.4230/LIPICS.ICALP.2024.136.
  • [12] Christoph Haase, Stephan Kreutzer, Joël Ouaknine, and James Worrell. Reachability in Succinct and Parametric One-Counter Automata. In Proceedings of CONCUR 2009, pages 369–383, 2009. doi:10.1007/978-3-642-04081-8_25.
  • [13] John E. Hopcroft and Jean-Jacques Pansiot. On the reachability problem for 5-dimensional vector addition systems. Theor. Comput. Sci., 8:135–159, 1979. doi:10.1016/0304-3975(79)90041-0.
  • [14] Rodney R. Howell, Louis E. Rosier, Dung T. Huynh, and Hsu-Chun Yen. Some Complexity Bounds for Problems Concerning Finite and 2-Dimensional Vector Addition Systems with States. Theor. Comput. Sci., 46(3):107–140, 1986. doi:10.1016/0304-3975(86)90026-5.
  • [15] S. Rao Kosaraju. Decidability of reachability in vector addition systems (preliminary version). In Proceedings of STOC 1982, pages 267–281, 1982. doi:10.1145/800070.802201.
  • [16] Jean-Luc Lambert. A structure to decide reachability in Petri nets. Theor. Comput. Sci., 99(1):79–104, 1992. doi:10.1016/0304-3975(92)90173-D.
  • [17] Jérôme Leroux. The Reachability Problem for Petri Nets is Not Primitive Recursive. In Proceedings of FOCS 2021, pages 1241–1252. IEEE, 2021. doi:10.1109/FOCS52979.2021.00121.
  • [18] Jérôme Leroux and Sylvain Schmitz. Demystifying Reachability in Vector Addition Systems. In Proceedings of LICS 2015, pages 56–67. IEEE Computer Society, 2015. doi:10.1109/LICS.2015.16.
  • [19] Jérôme Leroux and Sylvain Schmitz. Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension. In Proceedings of LICS 2019, pages 1–13. IEEE, 2019. doi:10.1109/LICS.2019.8785796.
  • [20] Jérôme Leroux and Grégoire Sutre. On Flatness for 2-Dimensional Vector Addition Systems with States. In Proceedings of CONCUR 2004, volume 3170 of Lecture Notes in Computer Science, pages 402–416, 2004. doi:10.1007/978-3-540-28644-8_26.
  • [21] Richard J. Lipton. The reachability problem requires exponential space. Technical report, Yale University, 1976.
  • [22] Ernst W. Mayr. An Algorithm for the General Petri Net Reachability Problem. In Proceedings of STOC 1981, pages 238–246, 1981. doi:10.1145/800076.802477.
  • [23] Loïc Pottier. Minimal Solutions of Linear Diophantine Systems: Bounds and Algorithms. In Rewriting Techniques and Applications, 4th International Conference, RTA-91, Como, Italy, April 10-12, 1991, Proceedings, volume 488 of Lecture Notes in Computer Science, pages 162–173. Springer, 1991. doi:10.1007/3-540-53904-2_94.
  • [24] Charles Rackoff. The covering and boundedness problems for vector addition systems. Theor. Comput. Sci., 6:223–231, 1978. doi:10.1016/0304-3975(78)90036-1.
  • [25] Sylvain Schmitz. Complexity hierarchies beyond elementary. ACM Trans. Comput. Theory, 8(1):3:1–3:36, 2016. doi:10.1145/2858784.
  • [26] Alexander Schrijver. Theory of linear and integer programming. Wiley-Interscience series in discrete mathematics and optimization. Wiley, 1999.
  • [27] Yangluo Zheng. Reachability in vector addition system with states parameterized by geometric dimension, 2024. doi:10.48550/arXiv.2412.14608.