Abstract 1 Introduction 2 Symmetric VASS 3 Lower bound 4 Transitive and fair groups 5 Symmetric group 6 Combining groups 7 Other groups 8 Final remarks References

Reachability in Symmetric VASS

Łukasz Kamiński ORCID University of Warsaw, Poland Sławomir Lasota ORCID University of Warsaw, Poland
Abstract

We investigate the reachability problem in symmetric vector addition systems with states (vass), where transitions are invariant under a group of permutations of coordinates. One extremal case, the trivial groups, yields general vass. In another extremal case, the symmetric groups, we show that the reachability problem can be solved in PSpace, regardless of the dimension of input vass (to be contrasted with Ackermannian complexity in general vass). We also consider other groups, in particular alternating and cyclic ones. Furthermore, motivated by the open status of the reachability problem in data vass, we estimate the gain in complexity when the group arises as a combination of the trivial and symmetric groups.

Keywords and phrases:
vector addition systems, Petri nets, reachability problem, symmetry, permutation group
Funding:
Łukasz Kamiński: Partially supported by NCN grant 2021/41/B/ST6/00535.
Sławomir Lasota: Partially supported by the ERC grant INFSYS, agreement no. 950398.
Copyright and License:
[Uncaptioned image] © Łukasz Kamiński and Sławomir Lasota; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Distributed computing models
Related Version:
Full Version: https://arxiv.org/abs/2506.23578
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

Petri nets, equivalently presentable as vector addition systems with states (vass), are an established model of concurrency with widespread applications. The central algorithmic problem for this model is the reachability problem which asks whether from a given initial configuration there exists a sequence of valid execution steps reaching a given final configuration. The decidability of the problem was established in 1981 by Mayr [19], and subsequently improved by Kosaraju [11] and Lambert [12]. The exponential space lower bound was shown by Lipton already in 1976 [18]. For around 40 years these were the only known complexity bounds, and the complexity of the problem remained for a long time as one of the hardest open questions in the verification of concurrent systems. Only in the last few years we have seen a sudden progress, namely an Ackermannian upper bound [17], a breakthrough non-elementary lower bound  [3, 4], and finally the matching Ackermannian lower bound (independently [5] and [16]).

All the above-mentioned bounds are more fine-grained and apply to the problem parametrised by the dimension, where the input is restricted to d-dimensional vass (d-vass) for fixed d. Both the upper and lower bounds have been subsequently further improved [14, 2, 9], and currently the reachability problem for d-vass is known to belong to the complexity class d, and for (2d+3)-vass it is known to be d-hard. Here d denotes the dth level of the hierarchy of complexity classes corresponding to Grzegorczyk’s fast growing function hierarchy. For instance, the currently best lower bound of [2] shows the reachability problem for 9-vass to be hard for the class 3=Tower. Subsequently, [6] proved the same complexity bound even for 8-vass. Summing up, for sufficiently large dimensions the lower bound is prohibitive.

Symmetric VASS.

In this paper we investigate subclasses of d-vass which are symmetric, meaning their sets of transitions are invariant under certain permutations of the coordinates {1,,d}. Our study is parametric in the choice of a group of permutations GSd of coordinates, and our objective is to analyze the gain in complexity to be achieved when the input to the reachability problem is restricted to G-vass, the subclass of those d-vass whose sets of transitions are invariant under permutations σG. In one extreme case, when G is the trivial permutation group Id containing just the identity permutation, G-vass are just general d-vass. In another extreme case, when G=Sd is the symmetric group of degree d, transitions of G-vass are invariant under all permutations of coordinates. The two extreme cases may be combined. For instance, one can consider the permutation group G=InSdSnd of degree nd containing all permutations that are identity inside each of the n-element blocks:

{1,,n},{n+1,,2n},,{n(d1)+1,,nd},

but permute arbitrarily the whole blocks.

Our principal motivation is to exploit symmetry of a model in order to lower the prohibitively high complexity of the reachability problem in the general case. Another motivation comes from the model of data vass [13, 15, 20] extending plain vass with data. In terms of Petri nets, the extension allows tokens to carry data value coming from some infinite countable set, and allows transitions to test (dis)equalities between data values of involved tokens. When G=InSdSnd, the G-vass are exactly data vass of dimension n, where the set of data values is restricted to be finite111 The other way around, the n-dimensional data vass can be defined as G-vass, where G=InSω combines the trivial group In with the symmetric group Sω of infinite countable degree. , of size d. It is not known if the reachability problem is decidable for data vass, and our current study may shed some more light on this hard open problem.

Contribution.

Intuitively speaking, the larger the group G, the lower the complexity of the reachability problem, since whenever GH, every H-vass is automatically a G-vass. The main contribution of this paper is twofold. First, we concentrate on the potentially easiest cases, namely symmetric groups Sd, and discover a huge complexity drop: regardless of dimension d2, the reachability problem is PSpace-complete for vass invariant under symmetric groups.222 In dimension 1 the permutation group G is irrelevant, and the problem is NL- or NP-complete, for input represented in unary or binary, respectively [10]. We also prove the same complexity for another potentially easy case, namely for the alternating groups Ad: again, regardless of dimension d3, the reachability problem is PSpace-complete for vass invariant under alternating groups. Both the PSpace decision procedures are designed for a fixed dimension d, but work equally well when d is part of input. We thus get uniform PSpace upper bound for vass invariant under symmetric (resp. alternating) groups. At the other side, we prove that cyclic groups Zd are hard, namely the reachability problem for d-vass invariant under Zd is as hard as in Θ(d)-vass.

The case of trivial group G=Id coincides with general d-vass. As our second contribution we investigate combinations of symmetric groups and trivial groups, providing one positive and one negative result. On one hand, when G=InSdSnd (as discussed above) and n2, the reachability problem is as hard as in case of (n1)d-vass. From the perspective of data vass this may be interpreted as a bad news: the complexity grows with the increasing number d of data values. On the other hand, we investigate another combination of the two groups, namely G=SdInSdn containing all permutations that independently and arbitrarily permute each of d-element blocks:

{1,,d},{d+1,,2d},,{d(n1)+1,,dn},

but preserve each of the blocks. In this case we provide an exponential-time reduction to n-vass, i.e., this time the complexity is independent of the degree d of the symmetric group. The complexity in this case is thus (significantly) lower than for InSd. This is in agreement with InSd being a subgroup of SdIn, up to isomorphism of permutation groups.

2 Symmetric VASS

As usual, let , denote integers and nonnegative integers, respectively. The value of the ith coordinate of a vector 𝐰d is written as 𝐰(i), namely 𝐰=(𝐰(1),,𝐰(d)), i.e., we identify a vector with a function 𝐰:[d], where [d]={1,,d}. The norm of a vector 𝐯d is the maximum of absolute values of its coordinates, i.e., 𝐯=maxi[d]|𝐯(i)|. Then the norm of a set of vectors X is defined as X=max𝐯X𝐯. For n, by n¯ we denote the constant vector n¯=(n,,n)d, in the dimension d to be always determined by the context. For a finite set X, by |X| we denote its size.

Vector addition systems with states.

For d+={0}, we define d-dimensional vector addition systems with states, denoted shortly as d-vass, or simply vass when the dimension d is irrelevant or clear from the context. A d-vass 𝒱=(Q,T) consists of a finite set Q of states and a finite set of transitions TQ×d×Q. A configuration c of 𝒱 consists of a state qQ and a nonnegative vector 𝐰d, and is written as c=q(𝐰). A transition t=(q,𝐯,q) induces steps

q(𝐰)tq(𝐰) (1)

between configurations, where 𝐰=𝐰+𝐯. We refer to the vector 𝐯d as the effect of the transition (q,𝐯,q) or of an induced step. The norm of a transition t=(q,𝐯,q) is defined as t:=𝐯. Similarly, for a configuration c=q(𝐰), we define c:=𝐰. The norm of a vass 𝒱 is the maximal norm of its transitions, i.e., 𝒱:=maxtTt.

A run π in 𝒱 is a sequence of steps with the proviso that the target configuration of every step matches the source configuration of the next one:

π=c0t1c1tncn. (2)

We say that the run π is from c0 to cn, call c0,cn the source and the target configuration of the run, respectively, and write c0πcn. When the source configuration c0 is clear from the context, we may identify a run (2) from c0 with the sequence t1tn of transitions fired. The effect of a run is the sum of effects of all steps, and its length is the number n of steps. We also write cc if there is some run from c to c. We often use the natural operation of concatenation of runs: if α:cc and β:cc′′ then (α;β):cc′′, assuming that the target configuration of the former run coincides with the source configuration of the latter one. For convenience, we allow ourselves to drop this assumption and use the convention that the latter run β is implicitly shifted so that its source matches the target of α, as long as the shifted β is still a run. Under this convention, we write αn for n-fold concatenation of α.

In the sequel we refer to the state graph of a vass 𝒱=(Q,T), a directed graph (Q,E) whose nodes are states Q, and edges EQ2 are those pairs (q,q) for which there is a transition (q,𝐯,q)T, for some 𝐯d. This graph may contain self-loops.

Reachability problem.

One of the most fundamental computational problems studied in the setting of vass is the reachability problem (for the sake of this paper we prefer to formulate the problem for a fixed dimension d):

d-vass-Reach: given a d-vass 𝒱 together with two configurations, source s and target t, one asks if 𝒱 has a run from s to t.

Complexity of this problem in subclasses of symmetric vass, to be defined below, is the main topic studied in this paper. An input to the problem is a triple (𝒱,s,t). For simplicity, such a triple (𝒱,s,t), or a pair (𝒱,s) with just the source state, we also call a vass, hoping that this does not lead to confusion. We also use shorthands ||𝒱,s||:=max{||𝒱||,||s||} and ||𝒱,s,t||:=max{||𝒱||,||s||,||t||}.

Symmetric VASS.

Let Sd denote the symmetric group containing all permutations of [d]. Permutations of [d] act on vectors 𝐰d by permuting dimensions, namely σSn maps 𝐰 to the vector σ(𝐰) defined by σ(𝐰)(i)=𝐰(σ1(i)), or equivalently σ(𝐰)(σ(i))=𝐰(i). Treating a vector as a function 𝐰:[d], we may write

σ(𝐰)=𝐰σ1, or equivalently σ(𝐰)σ=𝐰.

We naturally extend this action to transitions, t=(q,𝐯,q)σ(t)=(q,σ(𝐯),q), and likewise to steps, runs, etc., as expected. Given a group of permutations GSd, by a G-vass, we mean any d-vass 𝒱=(Q,T) whose transitions are invariant under the action of G, namely for every permutation σG and transition tT we have σ(t)T. Thus, for every GSd, we identify a subclass of d-vass admitting the invariance property. In the most restrictive case of G=Sd, we get the subclass of d-vass invariant under all permutations of dimensions. In the less restrictive case of trivial group Id={Idd}, we get the whole class of all d-vass.

Reachability problem for symmetric VASS.

In our investigations we always assume that a group GSd (and hence also the dimension of vass) is fixed.333 Nevertheless, all our subsequent PSpace decision procedures are uniform with respect to dimension, namely they work within the same complexity bounds if dimension d is part of input. The vass reachability problem, when its input is restricted to G-vass for a fixed permutation group G, we call G-vass-Reach. For the trivial group G=Id={Idd} we get d-vass-Reach.

The set of transitions of a G-vass is determined uniquely by representatives of orbits, i.e., by representatives of the equivalence relation on transitions: tGt if t=σ(t) for some σG. Unfolding the action of G on transitions, (q,𝐯,p)G(q,𝐯,p) if and only if q=q, p=p, and 𝐯=σ(𝐯) for some σG. Equivalence classes of G are called G-orbits of transitions, or simply orbits when the group is clear from the context. When measuring the size of input we assume a succinct representation, where transitions T of a G-vass are given by orbit representatives, i.e., by a subset T~T containing one transition from every orbit. By the size of such a representation (Q,T~) of a G-vass 𝒱 we mean the bitsize of its description, e.g.,

|𝒱|=|T~|(2|Q|+dlog(2T~+1)),

where T~=maxtT~t. Note that |𝒱| is independent of a choice of orbit representatives, and logarithmic in terms of T~.

Whenever GGSd, i.e., G is a permutation subgroup of G, (a representation of) a G-vass may be canonically transformed into (a representation of) a G-vass in two different ways. Let 𝒱=(Q,T) be a G-vass. On one hand, 𝒱 is itself a G-vass, as its transitions are automatically invariant under the action of G, but the representation of 𝒱 seen as a G-vass may be exponentially larger than its representation when seen as G-vass (since the number of G-orbits of T may be exponentially larger than the number of G-orbits of T). This yields an exponential (but not necessarily polynomial) reduction from G-vass-Reach to G-vass-Reach. On the other hand, a representation of 𝒱 is automatically a representation of another G-vass 𝒱=(Q,T), where the set of transitions TT may be of exponentially smaller size than T, but the number of G-orbits of T is the same as the number of G-orbits of T. Clearly, every run of 𝒱 is a run of 𝒱, but the converse does not hold in general.

-reachability.

An important relaxation of reachability is -reachability, where one considers a relaxed notion of configurations, namely -configurations Q×d instead of Q×d. Contrary to configurations, values in -configurations may drop below 0. We define -runs exactly like runs, but using -configurations instead of configurations. Each -run, and hence also each run, induces a unique path in the state graph. Conversely, every path in the state graph gives rise to multiple different -runs, depending on the choice of source vector, and of transitions witnessing consecutive edges of a path.

The -reachability problem asks, given a G-vass (𝒱,s,t), if 𝒱 has a -run from s to t. We prove that the problem lies in NP, regardless of the choice of dimension d of vass and of the group GSd. This observation will be used later in proofs of main results.

Lemma 1.

For every permutation group G, the -reachability problem for G-vass is NP-complete.

The lemma does not follow immediately from NP upper bound for -reachability in vass, as the input is represented more succinctly in our case. In the proof we use the integer analogue of Caratheodory’s theorem [7] to get a small solution property: if there is a -run between two given configurations then there is one using only a subset of transitions of polynomial size. By guessing this subset we reduce to the -reachability problem in vass, which is in NP.

3 Lower bound

This section contains a proof of PSpace-hardness of the reachability problem in G-vass, for any GSd with d2. Later, we will indicate cases where this lower bound is tight, for instance G=Sd.

Lemma 2.

For every d2 and GSd, G-vass-Reach is PSpace-hard.

Proof.

We show a reduction from the bounded reachability problem for 1-vass, which is known to be PSpace-complete [8]. The input to this problem consists of a 1-vass (𝒱,s,f) and a number M represented in binary, and we ask if 𝒱 has a run sf with all configurations bounded by M. For simplicity, we assume that the vector of a configuration of a 1-vass q(n) is just a nonnegative integer n, and the effect of a transition (q,z,p) is just an integer z. W.l.o.g. we assume that effects of transitions of a 1-vass are nonzero and at most M.

Fix an arbitrary dimension d2. Given a 1-vass (𝒱,s,f) and M, where 𝒱=(Q,T), we construct a G-vass 𝒱=(Q,T) of dimension d whose states Q:=Q{q,t|qQ,tT} extend Q by additional auxiliary states, and whose transitions T are defined below. The idea is to represent a configuration q(n) of 𝒱 bounded by M (nM), by a configuration

q(n)¯:=q(n,,n,2Mn)

of 𝒱, while pairs q,t are additional auxiliary states. We define the set T of transitions by providing a set of orbit representatives T~T. Below, we use z+ to range over positive integers, and use the vectors

𝐯z=(M+z,,M+z,Mz)𝐯z=(Mz,,Mz,M+z)

that have value M+z (resp. Mz) on all coordinates except coordinate d which has the opposite value. We also use 𝐯=(M,,M,M). The set T~ is defined as follows:

  • For every t=(p,z,q)T, we put into T~ two transitions (recall that z+)

    t~=(p,𝐯z,q,t)t=(q,t,𝐯,q);
  • For every t=(p,z,q)T, we put into T~ two transitions

    t+=(p,𝐯,p,t)t~=(p,t,𝐯z,q).

As all vectors 𝐯z,𝐯z and 𝐯 are constant except for one coordinate, we notice that the size of T={σ(t)|tT~,σG} is at most |T|d|T~|. This is however not relevant for the reduction, as 𝒱 is represented by T~, and not by T.

We argue that there is a run sf in 𝒱 whose all configurations are bounded by M, if and only if s¯f¯ in 𝒱. For the “only if” direction we observe that every step ctc in 𝒱 which is bounded by M is simulated by two steps c¯cc¯ in 𝒱, for some intermediate configuration c with an auxiliary state. Indeed, when t=(p,z,q), a step p(n)tq(n+z) of 𝒱 which is bounded by M (n+zM), is simulated in 𝒱 by the following two steps:

p(n)¯t~q,t(M+n+z,,M+n+z,Mnz)tq(n+z)¯. (3)

In the other case, when t=(p,z,q), a step p(n)tq(nz) of 𝒱 which is bounded by M (nM), is simulated in 𝒱 by the following two steps:

p(n)¯t+p,t(M+n,,M+n,Mn)t~q(nz)¯. (4)

For the “if” direction, we consider a configuration q(n)¯=q(n,,n,2Mn), and analyze all possible two-step runs in 𝒱 starting from q(n)¯: q(n)¯cc′′. By definition of T, we deduce that the only possible such two-step runs are of the form (3) or (4). Indeed, the first transition may be only t~ for some t=(q,z,p)T, or t+ for some t=(q,z,p)T, and then the next transition is uniquely determined by the auxiliary state. In particular, we observe that only transitions from T~ can be used, i.e., all other transitions TT~ are useless if one starts from a configuration of the form p(n)¯. In consequence, if s¯f¯ in 𝒱, we have also a run sf in 𝒱 whose all configurations are bounded by M, as required. Correctness of the reduction follows.

 Remark 3.

In particular, PSpace-hardness for S2-vass improves upon PSpace-hardness for 2-vass [1].

4 Transitive and fair groups

Within this section we fix an arbitrary transitive group GSd, i.e., we assume that for every i,j[d] there exists σG such that σ(i)=j. The results of this section will be applied later to specific transitive groups G.

Pumpable VASS.

Consider a G-vass (𝒱,s,t), where s=q(𝐰) and t=q(𝐰). We say that (𝒱,s) is forward pumpable if 𝒱 has a run q(𝐰)q(𝐰+𝐞) for some 𝐞1¯. Symmetrically, (𝒱,t) is backward pumpable if (𝒱rev,t) is forward pumpable where 𝒱rev, the reverse of 𝒱, is obtained by replacing each transition (q,𝐯,q) of 𝒱 by its reverse (q,𝐯,q). Equivalently, 𝒱 has a run q(𝐰+𝐞)q(𝐰) for some 𝐞1¯. Finally, (𝒱,s,t) is pumpable if (𝒱,s) is forward pumpable, and (𝒱,t) is backward pumpable. We prove that reachability reduces to -reachability, when the group G is transitive and vass are pumpable.

Lemma 4.

If G is transitive then every pumpable G-vass (𝒱,s,t) admitting a -run from s to t, admits a run from s to t.

Proof.

Let GSd. We start by proving the following equality for all i,j[d]:

|{σG|σ(i)=j}|=|G|d. (5)

When i=j, the equality follows immediately from the Orbit-Stabilizer Theorem. Otherwise, suppose ij and take any permutation σijG such that σij(i)=j (it exists as G is transitive). By post-composing with σij we get a bijection σσijσ between permutations σG that satisfy σ(i)=i, and permutations σG that satisfy σ(i)=j. In consequence, we get the equality (5):

|{σG|σ(i)=j}|=|{σG|σ(i)=i}|=|G|d.

Consider a G-vass 𝒱 and two configurations s=q(𝐯) and t=q(𝐯), and suppose 𝒱 has a -run γ from q(𝐯) to q(𝐯), and two runs

α:q(𝐯)q(𝐯+𝐞)α:q(𝐯+𝐞)q(𝐯),

for some 𝐞,𝐞1¯. We argue that 𝒱 has a run q(𝐯)q(𝐯). W.l.o.g. we can assume that α is increasing, i.e., every coordinate of 𝐯+𝐞 is greater than the greatest coordinate of 𝐯 (otherwise we replace α by its n-fold concatenation αn:q(𝐯)q(𝐯+n𝐞), for sufficiently large n). Symmetrically, we can assume that α is decreasing, i.e., every coordinate of 𝐯+𝐞 is greater than the greatest coordinate of 𝐯.

Let G={σ1,,σm}, where σ1=Idd is the identity permutation on [d], and let

Δ:=i=1mσi(𝐞),Δ:=i=1mσi(𝐞).

As α is increasing and σ1(α)=α, the concatenation of runs

α~=σ1(α);σ2(α);;σm(α)

is forcedly a run from q(𝐯) to q(𝐯+Δ). Symmetrically, as α is decreasing and σ1(α)=α, the concatenation of runs α~=σm(α);;σ2(α);σ1(α) is forcedly a run from q(𝐯+Δ) to q(𝐯). We argue that Δ(j)=Δ(k) for every j,k[d], i.e., the effect of α~ is a constant vector. Indeed, by point-wise expansion of the equality

Δ=i=1mσi(𝐞)=i=1m𝐞σi,

and using the equality (5) to deduce that for every , the value of th coordinate 𝐞() of 𝐞 appears the same number of times on both sides of the equality below, we compute:

Δ(j)==1di:σi()=j𝐞()=(5)=1di:σi()=k𝐞()=Δ(k).

Therefore, Δ=n¯ for some n+. Analogously we prove that Δ=n¯ for some n+. Let Δ~=(nn)¯. Since Δ~=nΔ=nΔ, we may construct two runs that pump forward and backward by the same vector Δ~:

β=α~(n):q(𝐯)q(𝐯+Δ~)β=(α~)n:q(𝐯+Δ~)q(𝐯).

Thus, for sufficiently large m+, the m-fold iterations of β and β are enough to lift the -run γ into a run, i.e., to ensure that βm;γ;(β)m is a run from q(𝐯) to q(𝐯).

Fair groups.

Given d+ and a transitive permutation group GSd, we say that G is fair if there is a polynomial P such that for every R and every G-vass (𝒱,s) with S:=||𝒱,s|| and N:=𝒱, the implication (1)(2) holds, where

  1. (1)

    𝒱 has a run sp(𝐰) for some pQ and 𝐰 of norm 𝐰>P(N)(S+R),

  2. (2)

    𝒱 has a run sp(𝐰) for some pQ and 𝐰S+R+1¯.

In words: whenever (𝒱,s) has a run whose target vector exceeds P(N)(S+R) on some coordinate, (𝒱,s) is guaranteed to have a run whose target vector is greater than S+R on all coordinates; and the property holds for any chosen R.

Lemma 5.

If G is transitive and fair, then G-vass-Reach is in PSpace.

Proof.

We start with some preparatory definitions. A vass is called strongly connected if its state graph is so. A vass 𝒱=(Q,T) is called sequential, if it can be partitioned into a number of strongly connected vass 𝒱1=(Q1,T1),,𝒱k=(Qk,Tk) with pairwise disjoint state spaces, called components of 𝒱, and k1 transitions ui=(qi,𝐯i,qi), for i[k1], where qiQi and qiQi+1, called bridges of 𝒱 (see Fig. 1). For every non-sequential vass (𝒱,s,t) there is a finite set W={𝒱1,,𝒱} such that each 𝒱j is a sequential vass, and st in 𝒱 if and only if st in 𝒱j for some j[]. The set W, called sequential decomposition of 𝒱 in the sequel, may be computed based on the decomposition of the state graph of 𝒱 into strongly connected components.

Figure 1: A sequential vass.

Assume an input G-vass (𝒱,s,t), where 𝒱=(Q,T), s=q(𝐯) and t=p(𝐰), represented by orbit representatives T~T. The PSpace decision procedure to check if st, to be described below, proceeds in several steps.

As the first step, the decision procedure decomposes the state graph of 𝒱 into strongly connected components, and nondeterministically picks up one sequential vass from the sequential decomposition of (𝒱,s,t). From now on we may thus assume, w.l.o.g., that 𝒱 is sequential with k components 𝒱1,,𝒱k, the configuration s belongs to the first component, and t to the last one. The number k of components is bounded by the number |Q| of states of 𝒱. Let R:=|Q|𝒱. Thus, for every two states p,p from the same component of 𝒱, there is a path from p to p that decreases each counter by at most R.

For M+, we say that a configuration p(𝐰) is bounded by M if 𝐰M. We also say that the first component (𝒱1,s) is bounded by M if every configuration c reachable in this component from s (i.e, c satisfying sc) is bounded by M. Symmetrically, we say that the last component (𝒱k,t) is reverse bounded by M if every configuration c reverse reachable from t (i.e., c satisfying ct) in this component is bounded by M.

As the second step, the decision procedure iteratively removes either the first or the last component from (𝒱,s,t) until the following two conditions are met, for N:=𝒱 and S=||𝒱,s,t||:

  • the first component is not bounded by P(N)(S+R), and

  • the last component is not reverse bounded by P(N)(S+R),

where P is the polynomial given by the definition of a fair group. In particular, the first condition implies (1) for (𝒱1,s), and the second one implies (1) for (𝒱krev,t). Suppose the first component is bounded by P(N)(S+R) (the symmetric case, when the last component is reverse bounded by P(N)(S+R), is treated in the same way). One iteration of the removal procedure proceeds as follows, depending on whether k=1 or k>1:

Case I: 𝒌=𝟏.

If this component is the only one, the procedure checks in PSpace if st, and terminates. The check is done by a standard nondeterministic walk through the graph of configurations reachable from s, which starts at the source configuration s, and in every iteration moves to a nondeterministically chosen successor of the current configuration. It terminates when t is reached (and answers positively), or when the counter of so far visited configurations exceeds

|Q|(P(N)(S+R)+1)d,

the total number of configurations bounded by P(N)(S+R). The memory size, namely the bitsize of a single configuration, and of the value of the counter, are both polynomially bounded, and hence the whole procedure works in (nondeterministic) PSpace.

Case II: 𝒌>𝟏.

Otherwise, let u1=(p,𝐮,p) be the first bridge. We observe that if 𝒱 has a run st, then its last configuration p(𝐰) in the first component is necessarily bounded by P(N)(S+R). In consequence, since the bridge transition may increase the norm by at most N, the first configuration p(𝐰) of the run in the second component, where 𝐰=𝐰+𝐮, is forcedly bounded by P(N)(S+R)+N. Relying on this observation, the decision procedure nondeterministically chooses a vector 𝐰 with 𝐰P(N)(S+R), and checks in PSpace if q(𝐯)p(𝐰) in the first component, similarly as above. Then the procedure removes the first component from 𝒱, and takes s=p(𝐰)=p(𝐰+𝐮) as the source configuration, thus obtaining a new G-vass (𝒱,s,t) with one less component than (𝒱,s,t).

This removal is iteratively repeated until either the procedure terminates, or produces a (𝒱,s,t) with the first component not bounded by P(N)(S+R), and the last component not reverse bounded by P(N)(S+R), where N:=𝒱 and S:=||𝒱,s,t||. The bound on the norm N of the vass cannot increase, and so NN. However, in each iteration the bound on norm S of the new source vector 𝐰 increases, compared to the bound S on the norm of the previous source vector 𝐯, by a multiplicative factor 𝒪(P(N)|Q|), namely

SP(N)(S+R)+N(P(N)(1+|Q|)+1)S,

and therefore the bitsize of the source vector increases by (bounding roughly) at most 𝒪(log(P(N)|Q|))d. As the number of iterations is bounded by |Q|, the final bitsize is polynomial in the input size, and therefore all the iterations are doable in PSpace. Note that due to iterative increase of S, the first (resp. last) component not bounded (resp. not reverse bounded) by P(N)(S+R) in some iteration may become bounded (resp. reverse bounded) in subsequent iterations.

Finally, the procedure arrives at a sequential G-vass (𝒱,s,t), s=q(𝐯), t=p(𝐰), whose first component is not bounded by P(N)(S+R), and whose last component is not reverse bounded by P(N)(S+R). As G is fair, there is a configuration c reachable from s in the first component, and a configuration c reverse reachable from t in the last component (i.e., t is reachable from c), both with vectors S+R+1¯:

q(𝐯)ccp(𝐰).

As R is large enough so that every two states in the same component are connected by a path that decreases each counter by at most R, we have some runs

cq(𝐯¯)p(𝐰¯)c

in the first and the last component, respectively, with 𝐯¯,𝐰¯S+1¯. As s,tS, this means that 𝒱 is pumpable. Since G is transitive, Lemma 4 applies. In the last step, the decision procedure checks if there is a -run from s to t, which is doable in NP due to Lemma 1.

5 Symmetric group

In this section we prove PSpace-completeness of the reachability problem in case of the symmetric groups Sd, d2. Our PSpace upper bound works not only for arbitrary fixed dimension d2, but even in the uniform setting when d is part of input. When d=1, the problem is known to be NP-complete [10].

The upper bound is shown using Lemma 5, which requires proving that Sd satisfies its assumptions. The symmetric groups are obviously transitive, it is thus sufficient to show:

Lemma 6.

Sd is fair, for every d+.

Proof.

Consider an Sd-Vass 𝒱=(Q,T) and a configuration s=q(𝐯). Let S:=||𝒱,s||, let R be any constant, and B:=3S+2R. We demonstrate that Sd is fair, and that this property is witnessed by the constant polynomial P(x)=3d. Towards this we prove a slightly stronger fact: we assume that 𝒱 has a run π:q(𝐯)p(𝐰) with 𝐰>Bd, and construct a run π:q(𝐯)p(𝐰) whose target vector satisfies 𝐰S+R+1¯.

W.l.o.g. assume that 𝐰(d)>Bd. For i=1,,d1 we inductively construct runs πi:q(𝐯)p(𝐰i) satisfying

𝐰i(d)>B(di)𝐰i(j)>S+R(for all ji). (6)

We start with π0:=π. Assuming πi1 has already been constructed, we construct πi as follows. If 𝐰i1(i)>S+R then we take πi:=πi1. Otherwise, we split πi1 into πi1=α;β,

q(𝐯)αr(𝐮)r(𝐮)βp(𝐰i1),

where β is the longest suffix of the run in which the value of coordinate d does not drop below B(di).

Therefore, 𝐮(d)<B(di)+S, as otherwise β would be longer. Let Δ=𝐰i1𝐮 be the difference between the target and source of β. We observe that the value of coordinate d is increased by β by at least

Δ(d)>B(di+1)B(di)S=2S+2R,

while the value of coordinate i is increased by at most Δ(i)𝐰i1(i)S+R. Therefore, Δ(d)Δ(i)>S+R. In consequence, β contains some k steps

q1(𝐮1)t1q1(𝐮1)qk(𝐮k)tkqk(𝐮k)

induced by transitions t1=(q1,𝐞1,q1),,tk=(qk,𝐞k,qk) with effects

𝐞1=𝐮1𝐮1𝐞k=𝐮k𝐮k,

such that 𝐞(d)>𝐞(i) for [k], that is, each of the steps increases the difference between the values of coordinate d and i, and moreover

𝐞1(d)++𝐞k(d)>𝐞1(i)++𝐞k(i)+S+R, (7)

that is, the steps jointly increase the difference between the values of coordinate d and i by more than S+R. We may choose a minimal set of transitions t1,,tk satisfying (7). Hence, knowing that one step can change the difference between the values of coordinate d and i by at most by 2S, we may safely assume

𝐞1(d)++𝐞k(d)𝐞1(i)++𝐞k(i)+3S+R, (8)

that is, the steps jointly increase the difference between the values of coordinate d and i by at most 3S+R. Let σ=(iddi)Sn be the permutation that swaps coordinates d and i and preserves the others. We define a run πi:q(𝐯)p(𝐰i) by replacing each transition t in πi1 with the transition σ(t). Due to the inequality (8), the coordinate d never drops below

𝐮(d)(3S+R)>B(di)(3S+R)> 0

in πi, and 𝐰i(d)>B(di+1)(3S+R)>B(di). Furthermore, due to the inequality (7) we get 𝐰i(i)>S+R, because the coordinate i was increased by more than S+R. Other coordinates are not affected, i.e., their values are the same in πi1 and πi. Therefore, the run πi satisfies the condition (6), as required.

Finally, we arrive at a run π=πd1:q(𝐯)p(𝐰d1) with 𝐰d1(i)S+R+1 for every i[d], and this completes the proof.

Theorem 7.

Sd-vass-Reach is PSpace-complete, for every d2.

Proof.

Membership in PSpace follows immediately by Lemmas 5 and 6, and PSpace-hardness follows by Lemma 2.

6 Combining groups

In this section we investigate groups arising as combinations of smaller permutation groups. The way of combining two permutation groups GSg and HSh will be their wreath product GHSgh. The set [gh]={1,,gh} we conveniently split into h blocks:

{1,,g}{g+1,,2g}{g(h1)+1,,gh},

and write i,j to denote gj+i[gh], for i[g] and j[h]. Given a h-tuple (σ1,,σh) of permutations from G and one permutation δ from H, we define the permutation (σ1,,σh)δSgh that applies, for each j, the permutation σj on the block {g(j1)+1,,gj} independently, plus permutes the blocks according to δ, namely

(σ1,,σh)δ:i,jσj(i),δ(j).

The wreath product444 The operation is definable more concisely, as semidirect product of h-fold direct product of G with H. of G and H consists of all so constructible permutations of [gh]:

GH:={(σ1,,σh)δ|σ1,,σhG,δH}.

In the sequel we are mostly interested in combining trivial permutation groups In with symmetric groups Sd, and relating the complexity of the reachability problem for the combined group to the complexity of the problem for component groups. As we show in Theorems 8 and 10 below, it turns out that the complexity significantly depends on the order of composing the groups. In the case of the group G=InSd which allows for arbitrary permutations of d blocks (of size n each) but disallows permutations inside blocks, the complexity of G-vass-Reach is at least as high as the complexity of ((n1)d)-vass-Reach (Theorem 8). On the other hand, in the dual case of the group G=SdIn, which disallows permutations of n blocks (of size d each) but allows arbitrary simultaneous independent permutations inside blocks, we prove (in Theorem 10 below) that the complexity of G-vass-Reach drops to the complexity of n-vass-Reach. Summing up, in the former case the impact of symmetric group Sd is essentially nullified as both degrees n and d contribute significantly to the complexity of the combined group, while in the latter case the impact of symmetric group Sd is preserved, as the degree d of the symmetric group is irrelevant for complexity. We notice that the difference of complexities is in agreement with the fact that up to the isomorphism i,jj,i of permutation groups, InSd is a subgroup of SdIn.

Trivial symmetry inside blocks.

The first result we formulate slightly more generally, with an arbitrary group GSd in place of the symmetric group Sd. The reachability problem for wreath product of the trivial permutation group In with any GSd, regardless of the choice of G (which seems to be quite surprising), is at least as hard as the reachability problem for vass of dimension (n1)d:

Theorem 8.

((n1)d)-vass-Reach reduces in polynomial time to (InG)-vass-Reach, for every n2, d1 and GSd.

Proof.

Given a vass 𝒱=(Q,T) of dimension (n1)d, we define a (InG)-Vass 𝒱=(Q,T) simulating 𝒱, whose states extend Q by a number of auxiliary states:

Q=Q{q,i,t|qQ,i[d1],tT}.

A configuration q(𝐰)Q×(n1)d of 𝒱, will be simulated by a configuration q(𝐰)¯=q(𝐰¯)Q×nd of 𝒱 whose vector 𝐰¯ extends 𝐰, on the last nth coordinate of every block, by

𝐰¯(n,j)=j1(for j[d]) (9)

(we write 𝐰¯(n,j) instead of 𝐰¯(n,j), for readability). We define transitions T of 𝒱 by its orbit representatives T~T. For every vector 𝐯(n1)d we define d vectors 𝐯1,,𝐯dnd as follows:

𝐯k(i,j)={d+1i=n,j=k1i=n,jk𝐯(i,j)i<n,j=k0i<n,jk.

Thus, the value 𝐯k(n,k) on the last coordinate of kth block equals d+1, while on the last coordinate of other blocks equals 1. Furthermore, 𝐯k coincides with 𝐯 on the remaining n1 coordinates of kth block, while it is 0 on the remaining n1 coordinates of other blocks. For every transition t=(p,𝐯,q)T, we put to the set T~ the following d transitions:

td= (p,𝐯d,q,d1,t) td1= (q,d1,t,𝐯d1,q,d2,t)
t2= (q,2,t,𝐯2,q,1,t) t1= (q,1,t,𝐯1,q).

We need to prove that there is a run p(𝐰)q(𝐯) in 𝒱 if and only if there is a run p(𝐰)¯q(𝐯)¯ in 𝒱. The “only if” direction follows due to observation that every step p(𝐰)tq(𝐯) in 𝒱 is simulated by a sequence of transitions αt=td,td1,,t1, namely

p(𝐰)¯αtq(𝐯)¯ (10)

in 𝒱, as every transition tk updates coordinates 1n1 of block k, and the effect of αt on last nth coordinate of every block is 0.

For the “if” direction, we observe that due to the auxiliary states in Q, every run p(𝐰)¯q(𝐯)¯ in 𝒱, starting and ending in a state from Q, necessarily splits into segments of length d, where each segment is of the form

σd(td),σd1(td1),,σ1(t1), (11)

for some σ1,,σdInSd and t=(p,𝐯,q)T. In particular, the segment starts in pQ and ends in qQ. It is thus enough to argue that whenever p(𝐰¯)q(𝐯) in 𝒱 along a single segment (11), there is a vector 𝐯 such that 𝐯=𝐯¯ and p(𝐰)q(𝐯) in 𝒱 ().

A single segment updates coordinates 1n1 in all the d blocks, in the order determined by σ1,,σd. The crucial observation is that this order is necessarily d,d1,,1. Indeed, by the definition of the vector 𝐰¯ in (9), the first update is in the dth block as the last nth coordinate is d1 only in this block. As a result of this update, the (d1)th block is the only one with value d1 on the last n-th coordinate, and therefore the second update necessarily happens in this block. And so on, until the last update in the first block. In consequence, σi(ti)=ti for all i[d]. Therefore, the segment (11) is necessarily of the form (10), and the implication () is shown. In particular, we have shown that only transitions from T~ can be used in 𝒱 when starting from a configuration p(𝐰)¯.

Trivial symmetry between blocks.

Now we investigate the other case of wreath product of the symmetric group of degree d with the trivial permutation group of degree n, and show the complexity of the reachability problem in this case to be essentially the same as of the reachability problem for vass of dimension n.

We start with a definition and a lemma, both stated for any GSn in place of In. A configuration q(𝐰) of a (SdG)-vass 𝒱 is B-balanced if

|𝐰(i,j)𝐰(i,j)|B (12)

for every i,i[d] and j[n]. In words: in every block, the maximal difference of values is at most B. A run st of 𝒱 is B-balanced if all its configurations are so. Finally, (𝒱,s,t) is B-balanceable if an existence of a run st implies an existence of a run st which is B-balanced.

Lemma 9.

There is a polynomial P such that for every d,n1 and GSn, every (SdG)-Vass (𝒱,s,t) is P(||𝒱,s,t||)-balanceable.

Proof.

Let (𝒱,s,t) be an arbitrary (SdG)-Vass, and let N:=||𝒱,s,t||, B0:=4N2, and B:=B0+2N+8N3. Suppose 𝒱 has a run sπt. We iteratively modify this run until it becomes B-balanced.

By definition s,t<B0B, and therefore the source configuration s and the target one t are B-balanced. We make π balanced in n stages. For each j[n], in an arbitrary order, we modify the run π to make it balanced inside the jth block, i.e., to make all configurations of π satisfy (12) where i,i range over [d] but j is fixed. As the modification does not affect the other blocks, the final run is thus balanced.

From now on we concentrate on one stage, for a fixed j[n]. For a vector 𝐮dn and i,i[d], we use the notation Δii(𝐮):=𝐮(i,j)𝐮(i,j) for the difference between the values of 𝐮 on coordinates i,j and i,j. The stage amounts to iteratively modifying the run until it finally becomes balanced inside the jth block. Each such individual modification we call a microstage. Below we describe a single microstage, and argue that it decreases a certain nonnegative rank, which ensures termination of the whole stage.

Microstage.

Suppose the run π is not balanced in the jth block, namely π contains a configuration p(𝐯) such that Δii(𝐯)>B for some i,i[d]. Consider the longest infix

q(𝐰)αp(𝐯)βq(𝐰) (13)

of π, such that all its configurations p(𝐯) satisfy Δii(𝐯)B0. Since one step may change the difference between the values of coordinates (i,j) and (i,j) by at most by 2N, we notice that Δii(𝐰)<B0+2N, as otherwise α would be longer. Likewise, Δii(𝐰)<B0+2N. In consequence BΔii(𝐰)8N3 and BΔii(𝐰)8N3, and therefore α contains at least 4N2 steps that increase the difference between the values of coordinates i,j and i,j and similarly β contains at least 4N2 steps that decrease this difference. As there are at most 2N different values by which a single step can increase (or decrease) this difference, by the pigeonhole principle α contains some 2N steps that increase this difference by the same value a, and likewise β contains some 2N steps that decrease this difference by the same value b. We pick any b among the 2N steps in α, executing transitions t1,,tb, say, and replace them by σ(t1),,σ(tb), where σSdG is a permutation that swaps (i,j) and (i,j). Likewise, we choose any a among the 2N steps in β, executing transitions t1,,ta, say, and replace them by σ(t1),,σ(ta). Importantly, this modification of the run does not change its target configuration. The only coordinate whose value decreases in some configurations along the run is (i,j), but it never drops below zero since the decrease is never larger than 4N2, and B04N2. Therefore, the modification produces a run.

We claim that the following nonnegative rank decreases as a result of the microstage (where the first sum ranges over configurations r(𝐮) along the run):

r(𝐮)<[d]|Δ(𝐮)|,

on the basis of the following three observations. First, the value |Δii(𝐮)| never increases, and decreases for some 𝐮, namely for p(𝐯) in (13), the value |Δii(𝐯)|=|Δii(𝐯)| decreases by ab>0 (but Δii(𝐯) remains positive). Second, in all cases when the value |Δii(𝐮)| changes (i.e., decreases) in the microstage, this is due to adding opposite values to 𝐮(i,j) and 𝐮(i,j). Therefore, for every {i,i} and every configuration r(𝐮) in π, the value of |Δi(𝐮)|+|Δi(𝐮)| does not increase. Finally, for ,{i,i}, the value of Δ(𝐮) is preserved. In consequence, the rank of the whole run decreases, as required.

Theorem 10.

(SdIn)-vass-Reach reduces in exponential time to n-vass-Reach, for every d,n1.

Proof.

Let 𝒱=(Q,T) be (SdIn)-Vass and s,t its configurations. Let B:=P(N), where P is the polynomial of Lemma 9 and N=||𝒱,s,t||. Let :=[B]{0}. Relying on Lemma 9 we construct an n-vass 𝒱=(Q,T), where Q=Q×nd, that simulates B-balanced runs of 𝒱. Specifically, every jth block of d coordinates of 𝒱 is simulated by a single coordinate j of 𝒱 whose value is invariantly equal to the largest value in the jth block. The simulation is possible due to the auxiliary component nd of states that keeps the difference between the value of every coordinate (i,j) of 𝒱, and the largest value inside the jth block (to which (i,j) belongs). The transitions T of 𝒱 simulate transitions of T, and accordingly update the auxiliary component of states. We claim that 𝒱 has a B-balanced run st if and only if 𝒱 has a run st, where s,t are obtained from s,t by computing the auxiliary component of states, and replacing the values of each block of coordinates by the largest value in this block. The reduction is thus completed.

7 Other groups

We complete Section 5 by showing that alternating groups admit similar complexity drop as symmetric groups. We also demonstrate that sole transitivity is not enough to achieve significant drop, namely the complexity of the reachability problem in case of cyclic groups is comparable to general vass.

Alternating group.

Let AdSd denote the alternating group of degree d, i.e., the group of all even permutations of [d]. The group is generated by 3-cycles, permutations of the form σijk=(ijkjki), for pairwise distinct i,j,k[d]. When d=2 the alternating group is trivial, A2-vass = 2-vass, and the reachability problem is PSpace-complete [1]. In the sequel we thus consider degrees d3.

Lemma 11.

Ad is fair, for d3.

The argument elaborates on the proof of Lemma 6, and proceeds in two steps. First, assuming a run π with one sufficiently large coordinate at the end, by applying a permutation from Ad to a properly chosen suffix of π we construct a run with two large coordinates at the end. Second, we further modify the run to increase all coordinates above a required threshold, similarly to the proof of Lemma 6.

Theorem 12.

Ad-vass-Reach is PSpace-complete, for every d3.

Proof.

Membership in PSpace follows immediately by Lemmas 5 and 11, while PSpace-hardness follows by Lemma 2.

Cyclic groups.

Let Zn denote the cyclic group of degree n, i.e., the group Zn={σi|i{0,1,,n1}} generated by the single cyclic shift σ=(1 2n2 3 1).

Theorem 13.

n-vass-Reach reduces in polynomial time to (Z2n+8)-vass-Reach, for every n1.

In the proof, an n-vass is simulated using n consecutive counters of a Z2n+8-vass. The remaining n+8 counters are used to enforce that only one transition from each Z2n+8-orbit can be applied, which assures faithfulness of the simulation.

8 Final remarks

In this paper we have investigated the impact of symmetry in vass on the complexity of the reachability problem. The permutation groups considered in this paper split clearly into two groups. On one side there are “easy” groups, which includes both symmetric and alternating groups featuring PSpace-completeness, but also the combinations SdIn of symmetric groups and trivial ones, where the complexity is independent of the degree d of the symmetric group (dependence on the degree n of the trivial group is unavoidable). On the other side there are “hard” groups, which includes both trivial and cyclic groups, which not differ significantly in complexity, but also the dual combinations InSd of symmetric groups and trivial ones, where the complexity is dependent on both d and n. We end up with a research question left for further research: can one classify all finite permutation groups into “easy” and “hard” ones?

The model of data vass is definable in our setting as (InSω)-vass. Therefore, “hardness” of InSd may suggest that the reachability problem for data vass is harder than for plain vass. On the other hand, “easiness” of SdIn suggests that the reachability problem for the subclass of data vass invariant under independent data permutations in each dimension (definable as (SωIn)-vass in our setting) is not significantly harder than for plain vass (and, in particular, decidable). Our initial results seem to confirm both these suggestions.

References

  • [1] Michael Blondin, Alain Finkel, Stefan Göller, Christoph Haase, and Pierre McKenzie. Reachability in Two-Dimensional Vector Addition Systems with States Is PSPACE-Complete. In Proceedings of LICS 2015, pages 32–43, 2015. doi:10.1109/LICS.2015.14.
  • [2] Wojciech Czerwinski, Ismaël Jecker, Slawomir Lasota, Jérôme Leroux, and Lukasz Orlikowski. New lower bounds for reachability in vector addition systems. In Proc. FSTTCS 2023, volume 284 of LIPIcs, pages 35:1–35:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.FSTTCS.2023.35.
  • [3] Wojciech Czerwinski, Slawomir Lasota, Ranko Lazic, Jérôme Leroux, and Filip Mazowiecki. The reachability problem for Petri nets is not elementary. In Proceedings of STOC 2019, pages 24–33. ACM, 2019. doi:10.1145/3313276.3316369.
  • [4] Wojciech Czerwinski, Slawomir Lasota, Ranko Lazic, Jérôme Leroux, and Filip Mazowiecki. The Reachability Problem for Petri Nets Is Not Elementary. Journal of the ACM, 68(1):7:1–7:28, 2021. doi:10.1145/3422822.
  • [5] Wojciech Czerwinski and Lukasz Orlikowski. Reachability in Vector Addition Systems is Ackermann-complete. In Proceedings of FOCS 2021, pages 1229–1240. IEEE, 2021. doi:10.1109/FOCS52979.2021.00120.
  • [6] Wojciech Czerwiński and Łukasz Orlikowski. Lower bounds for the reachability problem in fixed dimensional vasses. In Proceedings of LICS 2022, pages 40:1–40:12. ACM, 2022. doi:10.1145/3531130.3533357.
  • [7] Friedrich Eisenbrand and Gennady Shmonin. Carathéodory bounds for integer cones. Operations Research Letters, 34(5):564–568, 2006. doi:10.1016/J.ORL.2005.09.008.
  • [8] John Fearnley and Marcin Jurdziński. Reachability in two-clock timed automata is pspace-complete. Information and Computation, 243:26–36, 2015. doi:10.1016/J.IC.2014.12.004.
  • [9] Yuxi Fu, Qizhe Yang, and Yangluo Zheng. Improved algorithm for reachability in d-vass. In Proc. ICALP 2024, volume 297 of LIPIcs, pages 136:1–136:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ICALP.2024.136.
  • [10] Christoph Haase, Stephan Kreutzer, Joël Ouaknine, and James Worrell. Reachability in succinct and parametric one-counter automata. In Proceeding of CONCUR 2009, volume 5710, pages 369–383. Springer, 2009. doi:10.1007/978-3-642-04081-8_25.
  • [11] S. Rao Kosaraju. Decidability of reachability in vector addition systems (preliminary version). In Proc. STOC 1982, pages 267–281, 1982. doi:10.1145/800070.802201.
  • [12] Jean-Luc Lambert. A structure to decide reachability in Petri nets. Theor. Comput. Sci., 99(1):79–104, 1992. doi:10.1016/0304-3975(92)90173-D.
  • [13] Slawomir Lasota. Decidability border for Petri nets with data: WQO dichotomy conjecture. In Proc. Petri Nets 2016, volume 9698 of Lecture Notes in Computer Science, pages 20–36. Springer, 2016. doi:10.1007/978-3-319-39086-4_3.
  • [14] Slawomir Lasota. Improved Ackermannian Lower Bound for the Petri Nets Reachability Problem. In Proceedings of STACS 2022, volume 219 of LIPIcs, pages 46:1–46:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.STACS.2022.46.
  • [15] Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, and James Worrell. Nets with tokens which carry data. In Proc. ICATPN 2007, volume 4546 of Lecture Notes in Computer Science, pages 301–320. Springer, 2007. doi:10.1007/978-3-540-73094-1_19.
  • [16] Jérôme Leroux. The Reachability Problem for Petri Nets is Not Primitive Recursive. In Proceedings of FOCS 2021, pages 1241–1252. IEEE, 2021. doi:10.1109/FOCS52979.2021.00121.
  • [17] Jérôme Leroux and Sylvain Schmitz. Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension. In Proceedings of LICS 2019, pages 1–13. IEEE, 2019. doi:10.1109/LICS.2019.8785796.
  • [18] Richard J. Lipton. The Reachability Problem Requires Exponential Space. Technical report, Yale University, 1976.
  • [19] Ernst W. Mayr. An algorithm for the general Petri net reachability problem. In Proc. STOC 1981, pages 238–246, 1981. doi:10.1145/800076.802477.
  • [20] Fernando Rosa-Velardo and David de Frutos-Escrig. Decidability and complexity of Petri nets with unordered data. Theor. Comput. Sci., 412(34):4439–4451, 2011. doi:10.1016/J.TCS.2011.05.007.