A Note on the Parameterised Complexity
of Coverability in Vector Addition Systems
Abstract
We investigate the parameterised complexity of the classic coverability problem for vector addition systems (VAS): given a finite set of vectors , an initial configuration , and a target configuration , decide whether starting from , one can iteratively add vectors from to ultimately arrive at a configuration that is larger than or equal to on every coordinate, while not observing any negative value on any coordinate along the way. We consider two natural parameters for the problem: the dimension and the size of , defined as the total bitsize of its encoding. We present several results charting the complexity of those two parameterisations, among which the highlight is that coverability for VAS parameterised by the dimension and with all the numbers in the input encoded in unary is complete for the class under PL-reductions. We also discuss open problems in the topic, most notably the question about fixed-parameter tractability for the parameterisation by the size of .
Keywords and phrases:
vector addition system, Petri net, parameterised complexity, coverabilityFunding:
Michał Pilipczuk: ††margin:Copyright and License:
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms ; Software and its engineering Model checking ; Theory of computation ConcurrencyAcknowledgements:
This research was initiated during the InfAut 2024 workshop in Warlity Wielkie, Poland. The authors thank the organisers for launching such a fruitful event. They also thank an anonymous reviewer for pointing them to a relevant discussion in Hack’s PhD thesis [26].Editors:
Akanksha Agrawal and Erik Jan van LeeuwenSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Vector Addition Systems.
Vector addition systems are a well-established model with a very simple definition: a -dimensional vector addition system (VAS) [31] is a finite set of vectors in , which defines a step relation between configurations in : for all in and in , provided that is in . One usually interprets the coordinates of a configuration as counters that may take non-negative integer values; then represents a set of allowed updates to the counter values, which can be applied only if none of the counters becomes negative.
In spite of this apparent simplicity, vector addition systems can exhibit highly complex behaviours. Famously, their reachability problem is -complete [35, 34, 13]: given as input a -dimensional VAS , an initial configuration , and a target configuration , the reachability problem asks whether is reachable from in , i.e., whether . This combination of a simple definition with rich behaviours makes vector addition systems – along with the equivalent model of Petri nets – well-suited whenever one needs to model systems managing multiple discrete resources, e.g., threads in concurrent computations, molecules in chemical reactions [3, 4], organisms in biological processes [5], etc., but also as a theoretical tool involved in establishing decidability and complexity statements for a variety of decision problems in logic, formal languages, verification, etc. [42, Section 5].
The Coverability Problem.
In this note, we are interested in a decision problem with a less extreme complexity: given the same input, the coverability problem asks whether there exists a coordinate-wise larger or equal configuration such that . This relaxation of the reachability problem was first shown decidable by Karp and Miller [31], before being proven -hard by Lipton [36] and to belong to by Rackoff [40].
Like reachability, coverability in vector addition systems inter-reduces with numerous decision problems, notably in relation to the automated verification of safety properties in concurrent or distributed systems [30, 29, 22, 16, 18, 23, 2, 6], as well as reasoning on data-aware logics or systems [15, 25, 1]. These applications have motivated a thorough investigation of the problem [31, 36, 40, 9, 33, 32, 44] and the development of several tools specifically targeted at solving it [19, 8, 24].
Towards Parameterised Complexity.
Rosier and Yen [41] refined Rackoff’s analysis to identify the contribution of several parameters to the final complexity of the coverability problem. Among those, the main parameter driving the complexity is the dimension, i.e., the number of counters of the system. Indeed, Rackoff obtains his result by showing a bound on the length of the shortest covering runs from the source to the target configuration, which is in when parameterised by the dimension , where is the size of the input encoded in unary. (While -completeness holds with both a unary and a binary encoding, the complexity landscape changes as soon as one isolates the dimension as a parameter).
This upper bound on the length of shortest covering runs in unary-encoded VAS was recently improved to by Künnemann, Mazowiecki, Schütze, Sinclair-Banks, and Węgrzycki [32, Theorem 3.3], and this matches the lower bound in the family of systems constructed by Lipton [36]. In turn, this upper bound on the length of the shortest covering runs entails that the coverability problem with a unary encoding can be solved either in non-deterministic space or in deterministic time [32, Corollary 3.4]; moreover, the latter time bound is also achieved by the classical backward coverability algorithm [44, Corollary 4.5]. Finally, as also shown by Künnemann et al. through a parameterised reduction from the parameterised clique problem , this time bound is optimal if one assumes the Exponential Time Hypothesis: under the ETH, no algorithm running in deterministic time for coverability may exist [32, Theorem 4.2].
Surprisingly, in spite of this long line of results focusing on coverability in vector addition systems, and in particular when isolating the dimension as a key parameter, the question of the parameterised complexity of the problem has not been considered (see Section 2.4 for literature on other parameterisations on Petri nets, which are not directly comparable).
Problem ()
- input
-
a -dimensional VAS , an initial configuration , and a target configuration
- parameter
-
- question
-
does cover in , i.e., does there exist such that ?
From the viewpoint of parameterised complexity, when using a unary encoding, the deterministic time bounds from [32, 44] immediately yield that is in , while the parameterised reduction from in [32] shows -hardness (see Figure 1 for an overview of the parameterised complexity classes discussed in this note).
Fixed Systems and Parameterisation by Size.
A long-standing open question on decision problems for VAS, already raised by Hack [26, page 172] and revived in recent years [28, 17, 12], is whether any meaningful statements can be made about the complexity for a fixed VAS. In this direction, Draghici, Haase, and Ryzhikov [17] have recently shown that there exists a fixed such that the coverability problem (and thus also the reachability problem) for with a binary encoding of the initial/target configurations is already -hard. This complexity of coverability in a fixed VAS is also related to a question on the length of shortest covering runs by Czerwiński [12]. A natural way to approach these questions within the framework of parameterised complexity is to ask about the complexity of coverability when parameterised by the size of the encoding of the system, which we denote by .
Problem ()
- input
-
a -dimensional VAS , an input configuration , and a target configuration
- parameter
-
- question
-
does cover in , i.e., does there exist such that ?
This is an a priori easier problem than the one parameterised by the dimension, as there is a straightforward parameterised reduction from this problem to the one of coverability parameterised by dimension (see Remark 2.1).
Contributions.
Our main contribution in this note is to refine the bounds and pinpoint the exact parameterised complexity of : the problem is -complete under PL reductions with a unary encoding (see Section 3), and --complete under FPT reductions with a binary encoding (see Section 4). These results are mainly applications of the rich literature dedicated to the coverability problem in vector addition systems: the upper bounds stem from the non-deterministic space bounds from Rackoff’s and subsequent works [40, 41, 32], while --hardness with a binary encoding follows from the -hardness of coverability in a fixed VAS [17, Corollary 2]. The lower bound is a new proof, which relies on a result of Wehar [46] on the intersection non-emptiness problem for finite automata. Importantly given the dearth of “natural” complete problems for these two parameterised complexity classes and in particular for , these results significantly enrich the library of known complete problems, as most of the inter-reducible problems we mentioned earlier also have natural parameters that correspond to the dimension.
As a consequence of these results, we also conclude that is --complete when using a binary encoding (see Section 4), and in when using a unary encoding (see Section 3). Our motivation here is to restate the questions about the complexity of coverability and reachability in fixed VAS [28, 17, 12] within the framework of parameterised complexity, which we discuss more extensively in Section 5.
2 Preliminaries
2.1 Parameterised Problems, Classes, and Reductions
Let be a finite alphabet. While a decision problem is just a language , a parameterised problem is a set . If the pair is an instance of a parameterised problem, we refer to as the input to the problem and we refer to as the parameter. We use the shorthand for the length of , whenever this does not create confusion.
The framework of parameterised complexity has led to rich hierarchies of complexity classes, notably refining the distinction between and in the presence of parameters through the class of fixed-parameter tractable problems, along with classes of intractable parameterised problems: the - and -hierarchies, and the complexity classes - and ; see Figure 1 for a depiction of these classes. A broad introduction to parameterised complexity theory can be found in the book of Flum and Grohe [21], see also the survey of de Haan and Szeider [14] for a comprehensive overview of parameterised classes of high complexity. We provide below a basic recollection of material that will be relevant to us, based on these two sources.
Parameterised Reductions.
An FPT reduction (respectively a PL reduction, which stands for parameterised logspace) from the parameterised problem to the parameterised problem is a mapping such that
-
(1)
for all , we have if and only if ;
-
(2)
there is a computable function and a constant such that is computable in time (respectively computable in space ); and
-
(3)
there is a computable function such that for all , say with , we have .
Parameterised Space Complexity Classes.
Although these classes are perhaps less well-known, the parameterised paradigm can be also applied to space complexity.
Regarding nondeterministic logarithmic space complexity, a parameterised problem is in (uniform) [11, Proposition 18] if there is a computable function and a non-deterministic algorithm that, given a pair , decides whether in space at most . In particular, is included in the closure of under FPT reductions by [11, Proposition 23]. When working with parameterised complexity classes like , , -, etc., FPT reductions suffice, but for , one needs to work with PL reductions. When stating completeness results, we always specify what type of reductions we have in mind.
Regarding polynomial space complexity, a parameterised problem is in - if there is a computable function and a problem such that and for all instances , we have if and only if . Thus, - consists of all problems that can be decided using at most polynomial space after some precomputation that only involves the parameter. One can also view - as the space complexity-concerned analogue of . In fact, it is easy to prove (see [21, Exercise 8.40]) that a parameterised problem is in - if and only if it can be solved in FPT space; that is, in space bounded by for some computable function and . In order to establish --hardness under FPT reductions, it suffices to prove that there exists some fixed value of the parameter for which the problem is -hard under polynomial-time reductions (see [21, Corollary 2.16]).
2.2 Vector Addition Systems and Related Models
As explained in the introduction, vector addition systems are equivalent to a number of models; in particular, vector addition systems with states are more convenient in order to prove complexity lower bounds, while Petri nets are better suited for modelling concurrent systems. This section succinctly introduces vector addition systems with states and Petri nets and here we argue that the usual reduction between their versions of the coverability problem holds also in the parameterised setting.
Basic Notation.
We use bold font for vectors. We index the -th component of a vector with square brackets by writing . Given two vectors , we write if for all . Given a vector , we define and . When working with unary encodings, we define the size of a vector as , and when using a binary encoding, as . We write when the encoding is implicit. Then the size of a vector addition system in either encoding is , thus defining when encoded in unary and when encoded in binary. Note that in both cases, we have in a non-trivial VAS of dimension .
Remark 2.1.
For an input VAS of some dimension , an initial configuration , and a target configuration , the map from to is a PL reduction (and thus also an FPT reduction) from the problem to the problem in both a unary and a binary encoding.
Vector Addition Systems with States.
A -dimensional vector addition system with states (-VASS) [27] is a pair consisting of a finite set of states and a finite set of transitions . To discuss the complexity of decision problems for VASS, we define the size of a VASS as .
Each index can be seen as a counter with a valuation in : a configuration of a -VASS is a pair consisting of the current state and the current counter values ; we use the notation for configurations. Given two configurations and , there is a step if there exists a transition such that ; we may refer to as the update of the transition , and will also write to emphasise that transition was taken from to .
A path in a VASS is a sequence of transitions such that for every ; then its length is its number of transitions. A run in a VASS is a sequence of configurations such that, for every , ; in other words, . Let be a path and let be a run such that, for every , . Then we write to denote that the run is performed along the path , and if the precise path is not relevant.
| where | ||||
The coverability problem for VASS takes as input a VASS , an initial configuration , and a target configuration , and asks whether there exists such that there is a run . We denote the parameterisations of this decision problem by and .
A VAS can therefore be seen as a VASS with a single state, which is dropped entirely from the definition. Conversely, by a well-known result from the seventies by Hopcroft and Pansiot, one can simulate the states of a VASS at the cost of three extra dimensions in a VAS [27, Lemma 2.1]. For clarity, the obtained VAS has an equivalent reachability relation between configurations; a configuration in the original VASS corresponds to configurations of the form in the VAS, where , , and are values bounded by that represent the state , and such that for throughout the computation. Each transition of the VASS is simulated by a sequence of three transitions of the VAS, the first two checking the current state and the last one performing the update. See Figure 2 for an illustration of this construction.
Fact 2.2 (c.f. [27, Lemma 2.1]).
The parameterised problems and are equivalent up to PL reductions, and so are the parameterised problems and , all this both with a unary and with a binary encoding.
Petri nets.
A Petri net [38] is a tuple where is a finite set of places, is a finite set of transitions, and is a (weighted) flow function. It defines a transition system with configurations in , i.e. multisets of places (aka markings) that can equivalently be seen as vectors in , and steps whenever and for all in . We write if the marking is reachable from the marking by a finite sequence of such steps. The dimension of a Petri net is , its number of places; its size is . The coverability problem for Petri nets takes as input a Petri net , an initial marking , and a target marking , and asks whether there exists such that . We denote the parameterisations of this decision problem by and .
See Figure 2(a) on Figure 2(a) for a depiction of a Petri net with and as a directed bipartite graph, with places represented by circles, transitions by rectangles, and arcs from places to transitions representing the input flow and arcs from transitions to places representing the output flows ; the absence of an arc denotes a flow of , and an arc without weight denotes a flow of .
As is well-known, a Petri net can be encoded as an equivalent -dimensional VASS with states (see Figure 2(b) on Figure 2(b)), and conversely a -dimensional VAS can be encoded as an equivalent Petri net with places and one transition per vector , with input flow the absolute values of the negative values in and output flow the positive values in . Thus we have the following equivalence in terms of parameterised problems.
Fact 2.3.
The problems and are equivalent up to PL reductions, and so are the problems and , all this both with a unary and with a binary encoding.
2.3 The Complexity of Coverability
Upper Bounds.
Regarding the complexity upper bounds, consider an input of the coverability problem for a -dimensional VAS with initial configuration and target configuration , encoded in unary with size . The approach pioneered by Rackoff [40] to establish the upper bound is the following, and will also be pertinent for the discussion in Section 5. A finite sequence of steps for some is a covering run or coverability witness; its length is its number of steps. What Rackoff showed is that, if there is a covering run, then there exists one of length bounded by . The best known (and actually optimal) upper bound for this length is the following.
Fact 2.4 ([32, Theorem 3.3]).
Shortest covering witnesses for an instance of coverability encoded in unary have length bounded by .
As a direct corollary, using algorithms that exhaustively explore the space of bounded configurations, one can determine the complexity of coverability in VAS.
Corollary 2.5 (cf. [32, Corollary 3.4]).
There exists both a deterministic -time algorithm and a non-deterministic -space algorithm for coverability, where is the size of the input encoded in unary.
In the multi-parameter analysis of the complexity, one usually focuses on the deterministic algorithm, which yields that coverability can be solved in pseudo-polynomial deterministic time when the dimension is fixed. In the parameterised setting, this also yields that with a unary encoding is in .
In this paper however, we are more interested in the other, non-deterministic algorithm, which we repeat from [32, Corollary 3.4] for the sake of completeness. The algorithm starts with the initial configuration and iteratively guesses the consecutive transitions in a run while keeping track of the current configuration and the total number of transitions applied so far (all the numbers are encoded in binary). If during this iteration, it encounters a configuration covering the target configuration, then it accepts, and if the bound on the length of provided by ˜2.4 is exceeded without encountering a covering configuration, it rejects. The correctness of the algorithm follows directly from ˜2.4. As for the space complexity, observe that every configuration encountered during the run will have all the counters bounded by , and the same can be also said about the length counter. Hence, the space needed to store all the relevant information is bounded by .
Lower Bounds.
Regarding the lower bounds, Lipton [36] was the first to show the -hardness of the reachability problem, with a proof that also applies to coverability. The idea of the construction is to define by induction over a family of VAS of dimension that builds up counter values bounded by , allowing to simulate zero tests on those counters. This leads to a simulation of a -counter machine with counter values bounded by , thereby proving -hardness. By a slight modification of the construction, one also obtains the following counterpart to ˜2.4.
Fact 2.6 (c.f. [9, Theorem 3]).
Shortest covering witnesses for an instance of coverability encoded in unary may have length as large as .
Lipton’s construction was exploited as part of a parameterised reduction from to [32, Theorem 4.2], showing the -hardness of the problem.
2.4 Further Related Work
Watel, Weisser, and Barth [45] investigate an optimisation variant of the coverability problem in weighted Petri nets: each transition has a non-negative weight in , and the goal is to find a covering witness where the sum of weights is minimal. The parameters they consider are , the maximal input and output flow weights, the size of the target marking, and the number of steps in the sought covering witness, none of which is comparable to our parameterisations by dimension or size of the Petri net.
Praveen [39] defines a graph associated with a Petri net whose vertex set is – the set of places – and edges whenever there exists a transition with and . Praveen then shows that the coverability problem parameterised by both the size of a vertex cover and by the maximal flow weight is in - [39, Theorem 4.5]. While this is in essence a refinement of the parameterisation by the dimension of the Petri net (which bounds the size of a vertex cover), the added flow weight parameter makes this result not directly comparable.
3 Unary Encoding
This section is dedicated to proving the following theorem pinpointing the exact complexity of the coverability problem in vector addition systems, when parameterised by the dimension and using a unary encoding. This is a significant improvement over the upper bound and [1]-hardness mentioned in [32].
Theorem 3.1.
is -complete under PL reductions when using a unary encoding.
Using the reduction from Remark 2.1, this shows that the same upper bound also applies to the parameterisation by size.
Corollary 3.2.
is in when using a unary encoding.
The membership to follows from Rackoff’s upper bound, that is, ˜2.4. The lower bound, however, requires some attention. We prove it using a reduction from the intersection non-emptiness problem for deterministic finite automata, which is presented in Lemma 3.3 below. To state it, we first need to establish terminology related to automata.
Finite Automata.
A deterministic finite automaton (DFA) over a finite alphabet , consists of a finite set of states, a set of transitions, an initial state , and a set of final states, with the restriction that, for every state and letter , there is at most one state such that . For a transition ; for a word is a sequence ; it is accepting if is final. The language recognised by is the set of words for which there exists some accepting run. We shall assume that a DFA is specified by its adjacency matrix, and therefore that the size of a given DFA is .
Our interest for DFAs stems from their intersection non-emptiness problem, a well-known -complete problem, which when parameterised by the number of DFAs is one the very few known -complete problems in the literature [46, Corollary 3.5].
Problem ()
- input
-
DFAs , …, over the same alphabet
- parameter
-
- question
-
is , i.e., does there exist a word with an accepting run in each ?
Reduction to Coverability.
The lower bound in Theorem 3.1 follows from the PL reduction from to captured by the following statement.
Lemma 3.3.
Let be DFAs over a common alphabet . One can compute a -VASS , an initial configuration , and a target configuration in space such that if and only if there exists and a run from to in .
Proof.
Suppose for every . Without loss of generality, we shall assume that . It will also be convenient for us to number the states; and we may also assume without loss of generality that .
Overview.
We construct a VASS with counters that come in pairs: for each , there are counters and used to store the current state of automaton . Precisely, that the current state of is , for some , is reflected by counter values and . The construction of ensures that, except for some intermediate configurations, the following invariant is maintained: for each , we have and .
With this way of encoding of a selection of states of , we emulate applying a transition of any through a pair of transitions in as follows. Suppose we would like to apply a transition of that goes from to , for some : then, we may apply two transitions in
-
first, one that subtracts from and from , and
-
then, one that adds to and to .
Thanks to the invariant, the first transition can be fired only if we indeed have and (and the state encoded by those counters is ), and firing it brings both counters to . Then the second transition sets and . Thus, firing the two transitions in both verifies that the current state is , and updates this state to .
With this basic gadget understood, we may explain the overall construction of , depicted in Figure 3. We create two special states: the starting state and the ending state . The initial configuration is where , which corresponds to setting every automaton to its initial state. Next, for each we construct a -section, which is essentially a loop that goes from back to , and a checking section, which is essentially a path from to . Thus, any run from to first loops some number of times through the -sections, and finally proceed through the checking section to . The intention is that the effect of performing a loop through the -section, for some , is an update of the values of the counters of that corresponds to performing a -transition in each of the automata . This is done within consecutive parts of the -section, each responsible for updating the state of a different using the gadgets described in the previous paragraph. Thus, choosing consecutive loops through the -sections corresponds to choosing consecutive letters of a word over , and simulating the runs of all the automata on . Finally, we construct the checking section using a similar method so that it can be traversed if and only if each automaton is in a final state; this verifies that is in the intersection of the languages of . Again, the checking section consist of parts, each responsible for checking the state of a different . See Section 3.1 for an illustration of this construction.
Formal Construction.
We start by constructing the two special states and . Next, for every we construct the -section. It contains one part for each defined as follows. Let be the number of -transitions in . Then we introduce many states: one starting state, one ending state, and one intermediate state for each -transition in . Furthermore, for every -transition in , we construct two transitions in : the first transition from the starting state to the intermediate state that updates the counters by subtracting from and from (and does not update the other counters); the second transition from the intermediate state to the ending state that updates the counters similarly by adding to and to (and does not update the other counters). Finally, we connect all the parts of the -section into a path as follows by adding for each , a counter-neutral (not changing the values of the counters) transition from the ending state of the -th part to the starting state of the -st part. The section is connected to the rest of the VASS by counter-neutral transitions from to the starting state of the first part, and from the ending state of the last part to .
Next, we present the construction of the checking section, which amounts to constructing the -th part, for each , each with two states: one starting state and one ending state. Further, we construct many transitions: one for each final state of . Precisely, for each final state of (for some ), we construct a transition in from the starting state to the ending state that subtracts from and from (and does not update the other counters). It is important to note that this is only possible if and (i.e., when is currently at ). Accordingly, the only possible way to go is through the -th part of the checking section is if is currently in a final state. We connect again all the parts of the checking section into a path by adding counter-neutral transitions from to the starting state of the first part, from the ending state of the last part to , and from the ending state of the -th part to the starting state of the -st part, for each .
Finally, we set the initial configuration of to , where sets and for every , and the target configuration to (so ). The following claim verifies the correctness of the reduction.
Claim 3.4.
The following conditions are equivalent.
-
There exists a word over that is accepted by all the automata .
-
There is run of from configuration to some configuration with state .
The proof of ˜3.4 follows easily from the construction along the lines sketched at the beginning of the proof; we give a more formal explanation in Section A.1.
Space Complexity.
Let us finally observe that the VASS can be constructed in space , because the states and transitions of can be computed using three pointers
-
for the current automaton ,
-
for the current letter, and
-
, which together with determines the transition in the deterministic automaton .
This sums up to space for the reduction; as furthermore for each , this is indeed the same as space.
We may now conclude this section by proving Theorem 3.1.
Proof of Theorem 3.1.
Membership in follows from the algorithm in nondeterministic space from Corollary 2.5 (c.f. [32, Corollary 3.4]). The -hardness follows from ˜2.2 and the PL reduction described by Lemma 3.3 along with the -hardness of proven by Wehar [46, Corollary 3.5].
3.1 Example
Let us illustrate the construction on the three DFAs over the alphabet of Figure 4, and construct a -VASS for which coverability between two specified configurations holds if and only if the intersection of the languages of the three DFAs is non-empty.
The languages of the three DFAs are the following.
-
accepts all words of even length.
-
accepts all words that contain at least one “” and at least one “”.
-
accepts all non-empty words where the first and second letter is not “”.
The intersection of these languages is not empty; the shortest words in the intersection of their languages are “” and “”.
The resulting -VASS is presented in Figure 5. We set to be the greatest number of states of any of the DFAs. The VASS has three sections: the -section (the top row of the figure), the -section (the middle row of the figure), and the checking section (the bottom row of the figure). There are three parts in each section, one for each of the three DFAs.
First, let us consider the second part in the -section; here there is one pair of transitions for each -transition in . For example, consider the transitions coloured in red in Figure 4 and Figure 5. The red pair of transitions in corresponds to the red -transition from the first state (top left) to the second state (top right) in . The two transitions in have the updates and , respectively. The first red transition in checks if the current state of is the first state ( and ). The second red transition in then updates the counters so that the current state of is the second state ( and ).
Second, let us consider the third part of the checking section; here there are two transitions, one for each of the two final states of . If the current counter values have and or the counter values have and , then it is would be possible to pass through this part. Indeed, when the counter values of contain and , then the current state of is the second state (top right) which is a final state. Similarly, when the counter values of contain and , then the current state of is the fourth state (bottom right) which is also a final state.
As the intersection of the languages recognised by the DFAs is non-empty, we know by ˜3.4 that there is a run from to . The run corresponding to the word follows a path of over 50 transitions; listing every intermediate configuration of the run is impractical, so we list below the main features of the run.
-
1.
From , pass through the -section to reach .
-
2.
From , pass through the -section to reach .
-
3.
From , pass through the -section to reach .
-
4.
From , pass through the -section to reach .
-
5.
From , pass through the checking section to finally reach .
4 Binary Encoding
In this section, we show the --completeness of the coverability problem parameterised either by dimension or size, when the input is encoded in binary. As in the case of a unary encoding, the upper bound follows from the non-deterministic space bounds from Rackoff’s and subsequent works [40, 41, 32]. Regarding the lower bound, we rely on the -hardness of coverability in a fixed VAS shown by Draghici, Haase, and Ryzhikov [17].
Theorem 4.1.
The problems and are --complete under FPT reductions when using a binary encoding.
Proof.
Regarding the upper bound, recall that the coverability problem can be solved in non-deterministic space where is the dimension and is the size of the input in unary [32, Corollary 3.4]. This in turn provides an algorithm working in non-deterministic space where is the size of the input in binary, showing that is in -. By the parameterised reduction from Remark 2.1, this also shows that is in -.
Regarding the lower bound, [17, Corollary 2] shows that there exists a fixed VASS (thus of fixed size, and actually of dimension ) such that the coverability problem for is -hard under the assumption that the starting and the target configuration are encoded in binary. By ˜2.2, there is a fixed VAS (of dimension ) with the same property, thus showing that and are --hard under FPT reductions.111The --hardness of also follows from the fact that coverability in binary-encoded -VASS is -hard [20, 7], which implies that coverability in binary-encoded -VAS is -hard.
A consequence is that, while coverability with either parameterisation is in when encoded in unary, if the problem with a binary encoding were to belong to , then . Indeed, if this were the case, then coverability in the fixed VAS provided by [17, Corollary 2] would be in .
5 Discussion and Open Problems
Our results shed some light on the broader landscape of the parameterised complexity of decision problems related to vector addition systems. Let us consider the coverability problem and the reachability problem; both have meaningful parameterisations either by dimension or by size. A first set of questions is simply whether the parameterised problem is in or not. A second set of questions concerns bounding the length of witness runs, and is motivated by the discussion in Section 2.3, where we saw that this approach has been instrumental in the understanding of the complexity of coverability. Given an initial configuration and a target configuration in a VAS , a shortest witness is a run for some in the case of coverability or a run in the case of reachability, such that the number of steps in the run is minimal. For a parameter (the dimension or the size of ), we will say that shortest witnesses have fixed-parameter length (FPT length) if there is a computable function and constant such that shortest witnesses have length at most .
This setup leads to four questions, that can each be asked with a parameterisation by dimension or by size, and using a unary or a binary encoding.
Negative Cases.
Quite a few of these questions have negative answers. In the case of parameterisation by dimension, we have the following:
-
A positive answer to (CP) would entail in the case of a unary encoding by Theorem 3.1, which would bring in particular a collapse of the - and -hierarchies down to , because by [11, Proposition 23] (recall Figure 1). It would entail in the case of a binary encoding by Theorem 4.1, which is if and only if .
-
(RP) and (RL) have a negative answer regardless of the choice of encoding since the reachability problem in dimension is hard for the fast-growing complexity class [34, 13], and the shortest witnesses in their instances have length at least where is the th fast-growing function (see [43] for a reference on fast-growing complexity).
Turning our attention to parameterisation by size and a binary encoding, we have:
-
A positive answer to either (CP) or (RP) would again entail by Theorem 4.1.
Open Questions.
Our questions are therefore only relevant in the case of a unary encoding and a parameterisation by size. In that setting, (CL) is essentially Question 3 by Czerwiński [12]222Hack observed [26, page 171] that shortest coverability witnesses were of linear length if, in addition to the VAS, the initial configuration was fixed (thanks to the coverability tree construction [31]). On a similar note, Rackoff’s analysis [40] even yields a constant bound on the length of shortest coverability witnesses if we fix both the VAS and the target configuration. and (RL) is essentially a conjecture due Hack [26, page 172] that has recently been restated by Jecker [28]. Both of these questions were originally phrased in terms of an upper bound in a fixed VAS; here we cast them in the terminology of parameterised complexity.
Those two questions are connected to (CP) and (RP): an FPT length on shortest witnesses implies the existence of a nondeterministic algorithm that guesses and checks this witness. With a unary encoding, this entails that the problem is in -, while with a binary encoding, this entails that the problem is in -. Recall that all we know at the moment are and - upper bounds for coverability with unary and binary encoding, and no reasonable upper bounds for reachability. Thus (CL) and (RL) provide an original angle of attack on (CP) and (RP), respectively, and a positive answer would yield
-
the --completeness of reachability parameterised by size with a binary encoding, and
-
an indication that the complexity of the problems parameterised by size with a unary encoding is likely lower than or -.
In summary, we believe that (CP) and (RP) are excellent open questions in parameterised complexity that deserve further investigation, whereas (CL) and (RL) are auxiliary conjectures whose resolution might be very insightful for (CP) and (RP).
As a further indication on the easiness of coverability and reachability parameterised by size with a unary encoding, note that in a fixed VAS , the coverability problem and the reachability problem are sparse languages, meaning that there exists a polynomial such that, for all , the number of instances of the language of length is bounded by . Indeed, as and thus its dimension are fixed, there are at most possible pairs of initial and target configurations such that . This tells us that if there exists a fixed such that either coverability or reachability for with unary encoding is -hard, then by Mahaney’s Theorem [37, Theorem 3.1]. Similarly, -hardness entails [10, Corollary 3].
References
- [1] Parosh Aziz Abdulla, C. Aiswarya, Mohamed Faouzi Atig, Marco Montali, and Othmane Rezine. Complexity of reachability for data-aware dynamic systems. In Proceedings of ACSD 2018, pages 11–20. IEEE Computer Society, 2018. doi:10.1109/ACSD.2018.000-3.
- [2] Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham, and Yaron Velner. Some complexity results for stateful network verification. Formal Methods in System Design, 54:191–231, 2019. doi:10.1007/s10703-018-00330-9.
- [3] Rutherford Aris. Prolegomena to the rational analysis of systems of chemical reactions. Archive for Rational Mechanics and Analysis, 19(2):81–99, 1965. doi:10.1007/BF00282276.
- [4] Rutherford Aris. Prolegomena to the rational analysis of systems of chemical reactions II. Some addenda. Archive for Rational Mechanics and Analysis, 27(5):356–364, 1968. doi:10.1007/BF00251438.
- [5] Paolo Baldan, Nicoletta Cocco, Andrea Marin, and Marta Simeoni. Petri nets for modelling metabolic pathways: A survey. Natural Computing, 9(4):955–989, 2010. doi:10.1007/S11047-010-9180-6.
- [6] Pascal Baumann, Rupak Majumdar, Ramanathan S. Thinniyam, and Georg Zetzsche. Context-bounded verification of thread pools. In Proceedings of POPL 2012, volume 6 of Proceedings of the ACM on Programming Languages. ACM, 2022. doi:10.1145/3498678.
- [7] Michael Blondin, Alain Finkel, Stefan Göller, Christoph Haase, and Pierre McKenzie. Reachability in two-dimensional vector addition systems with states is -complete. In Proceedings of LICS 2015, pages 32–43. IEEE Computer Society, 2015. doi:10.1109/LICS.2015.14.
- [8] Michael Blondin, Alain Finkel, Christoph Haase, and Serge Haddad. Approaching the coverability problem continuously. In Proceedings of TACAS 2016, volume 9636 of Lecture Notes in Computer Science, pages 480–496. Springer, 2016. doi:10.1007/978-3-662-49674-9_28.
- [9] Laura Bozzelli and Pierre Ganty. Complexity analysis of the backward coverability algorithm for VASS. In Proceedings of RP 2011, volume 6945 of Lecture Notes in Computer Science, pages 96–109. Springer, 2011. doi:10.1007/978-3-642-24288-5_10.
- [10] Jin-Yi Cai and D. Sivakumar. Resolution of Hartmanis’ conjecture for -hard sparse sets. Theoretical Computer Science, 240(2):257–269, 2000. doi:10.1016/S0304-3975(99)00234-0.
- [11] Yijia Chen, Jörg Flum, and Martin Grohe. Bounded nondeterminism and alternation in parameterized complexity theory. In Proceedings of CCC 2003, pages 13–29. IEEE Computer Society, 2003. doi:10.1109/CCC.2003.1214407.
- [12] Wojciech Czerwiński. Open problems in infinite-states systems, 2024. Webpage accessed on 2024-12-07. URL: https://www.mimuw.edu.pl/˜wczerwin/research.html.
- [13] Wojciech Czerwiński and Łukasz Orlikowski. Reachability in vector addition systems is -complete. In Proceedings of FOCS 2021, pages 1229–1240. IEEE Computer Society, 2022. doi:10.1109/FOCS52979.2021.00120.
- [14] Ronald de Haan and Stefan Szeider. A compendium of parameterized problems at higher levels of the polynomial hierarchy. Algorithms, 12(9):188, 2019. doi:10.3390/A12090188.
- [15] Normann Decker, Peter Habermehl, Martin Leucker, and Daniel Thoma. Ordered navigation on multi-attributed data words. In Proceedings of CONCUR 2014, volume 8704 of Lecture Notes in Computer Science, pages 497–511. Springer, 2014. doi:10.1007/978-3-662-44584-6_34.
- [16] Roberto Di Cosmo, Jacopo Mauro, Stefano Zacchiroli, and Gianluigi Zavattaro. Component reconfiguration in the presence of conflicts. In Proceedings of ICALP 2013, volume 7966 of Lecture Notes in Computer Science, pages 187–198. Springer, 2013. doi:10.1007/978-3-642-39212-2_19.
- [17] Andrei Draghici, Christoph Haase, and Andrew Ryzhikov. Reachability in fixed VASS: expressiveness and lower bounds. In Proceedings of FoSSaCS 2024, volume 14575 of Lecture Notes in Computer Science, pages 185–205. Springer, 2024. doi:10.1007/978-3-031-57231-9_9.
- [18] Javier Esparza. Keeping a crowd safe: On the complexity of parameterized verification. In Proceedings of STACS 2014, volume 25 of Leibniz International Proceedings in Informatics, pages 1–10. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2014. doi:10.4230/LIPIcs.STACS.2014.1.
- [19] Javier Esparza, Ruslán Ledesma-Garza, Rupak Majumdar, Philipp Meyer, and Filip Niksic. An SMT-based approach to coverability analysis. In Proceedings of CAV 2014, volume 8559 of Lecture Notes in Computer Science, pages 603–619. Springer, 2014. doi:10.1007/978-3-319-08867-9_40.
- [20] John Fearnley and Marcin Jurdziński. Reachability in two-clock timed automata is -complete. Information and Computation, 243:26–36, 2015. doi:10.1016/j.ic.2014.12.004.
- [21] Jörg Flum and Martin Grohe. Parameterized Complexity Theory. Texts in Theoretical Computer Science. Springer, 2006. doi:10.1007/3-540-29953-X.
- [22] Pierre Ganty and Rupak Majumdar. Algorithmic verification of asynchronous programs. ACM Transactions on Programming Languages and Systems, 34(1), 2012. doi:10.1145/2160910.2160915.
- [23] Gilles Geeraerts, Alexander Heußner, and Jean-François Raskin. On the verification of concurrent, asynchronous programs with waiting queues. ACM Transactions on Embedded Computing Systems, 14(3), 2015. doi:10.1145/2700072.
- [24] Thomas Geffroy, Jérôme Leroux, and Grégoire Sutre. Occam’s Razor applied to the Petri net coverability problem. Theoretical Computer Science, 750:38–52, 2018. doi:10.1016/j.tcs.2018.04.014.
- [25] Radu Grigore and Nikos Tzevelekos. History-register automata. Logical Methods in Computer Science, 12(1), 2016. doi:10.2168/LMCS-12(1:7)2016.
- [26] Michel Hack. Decidability questions for Petri Nets. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 1976. URL: https://hdl.handle.net/1721.1/27441.
- [27] John Hopcroft and Jean-Jacques Pansiot. On the reachability problem for 5-dimensional vector addition systems. Theoretical Computer Science, 8(2):135–159, 1979. doi:10.1016/0304-3975(79)90041-0.
- [28] Ismaël Jecker. Open problems in automata theory: 22.1 Complexity of fixed VAS reachability, 2022. Webpage accessed on 2025-05-13. URL: https://automata.exchange/22.01-complexity-fixed-vas-reachability/.
- [29] Alexander Kaiser, Daniel Kroening, and Thomas Wahl. Dynamic cutoff detection in parameterized concurrent programs. In Proceedings of CAV 2010, volume 6174 of Lecture Notes in Computer Science, pages 645–659. Springer, 2010. doi:10.1007/978-3-642-14295-6_55.
- [30] Max Kanovich, Paul Rowe, and Andre Scedrov. Policy compliance in collaborative systems. In Proceedings of CSF 2009, pages 218–233. IEEE Computer Society, 2009. doi:10.1109/CSF.2009.19.
- [31] Richard M. Karp and Raymond E. Miller. Parallel program schemata. Journal of Computer and System Sciences, 3(2):147–195, 1969. doi:10.1016/S0022-0000(69)80011-5.
- [32] Marvin Künnemann, Filip Mazowiecki, Lia Schütze, Henry Sinclair-Banks, and Karol Węgrzycki. Coverability in VASS revisited: Improving Rackoff’s bound to obtain conditional optimality. In Proceedings of ICALP 2023, volume 261 of Leibniz International Proceedings in Informatics. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPIcs.ICALP.2023.131.
- [33] Ranko Lazić and Sylvain Schmitz. The ideal view on Rackoff’s coverability technique. Information and Computation, 277:104582, 2021. doi:10.1016/j.ic.2020.104582.
- [34] Jérôme Leroux. The reachability problem for Petri nets is not primitive recursive. In Proceedings of FOCS 2021, pages 1241–1252. IEEE Computer Society, 2022. doi:10.1109/FOCS52979.2021.00121.
- [35] Jérôme Leroux and Sylvain Schmitz. Reachability in vector addition systems is primitive-recursive in fixed dimension. In Proceedings of LICS 2019, pages 1–13. IEEE Computer Society, 2019. doi:10.1109/LICS.2019.8785796.
- [36] Richard J. Lipton. The reachability problem requires exponential space. Technical Report 62, Department of Computer Science, Yale University, January 1976. URL: http://www.cs.yale.edu/publications/techreports/tr63.pdf.
- [37] Stephen R. Mahaney. Sparse complete sets for : Solution of a conjecture of Berman and Hartmanis. Journal of Computer and System Sciences, 25(2):130–143, 1982. doi:10.1016/0022-0000(82)90002-2.
- [38] Carl A. Petri. Kommunikation mit Automaten. PhD thesis, Universität Bonn, 1962. URL: http://edoc.sub.uni-hamburg.de/informatik/volltexte/2011/160/.
- [39] M. Praveen. Small vertex cover makes Petri net coverability and boundedness easier. Algorithmica, 65(4):713–753, 2013. doi:10.1007/S00453-012-9687-6.
- [40] Charles Rackoff. The covering and boundedness problems for vector addition systems. Theoretical Computer Science, 6:223–231, 1978. doi:10.1016/0304-3975(78)90036-1.
- [41] Louis E. Rosier and Hsu-Chun Yen. A multiparameter analysis of the boundedness problem for vector addition systems. Journal of Computer and System Sciences, 32(1):105–135, 1986. doi:10.1016/0022-0000(86)90006-1.
- [42] Sylvain Schmitz. Automata column: The complexity of reachability in vector addition systems. ACM SIGLOG News, 3(1):3–21, 2016. doi:10.1145/2893582.2893585.
- [43] Sylvain Schmitz. Complexity hierarchies beyond . ACM Transactions on Computation Theory, 8(1), 2016. doi:10.1145/2858784.
- [44] Sylvain Schmitz and Lia Schütze. On the length of strongly monotone descending chains over . In Proceedings of ICALP 2024, volume 297 of Leibniz International Proceedings in Informatics. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPIcs.ICALP.2024.153.
- [45] Dimitri Watel, Marc-Antoine Weisser, and Dominique Barth. Parameterized complexity and approximability of coverability problems in weighted Petri nets. In Proceedings of Petri Nets 2017, volume 10258 of Lecture Notes in Computer Science, pages 330–349. Springer, 2017. doi:10.1007/978-3-319-57861-3_19.
- [46] Michael Wehar. On the Complexity of Intersection Non-Emptiness Problems. PhD thesis, University at Buffalo, State University of New York, USA, 2016. URL: http://www.michaelwehar.com/documents/mwehar_dissertation.pdf.
Appendix A Details for Section 3
A.1 Proof of ˜3.4
We give here a formal verification of the correctness of the reduction; that is, we prove ˜3.4, recalled below for convenience.
Claim 3.4. [Restated, see original statement.]
The following conditions are equivalent.
-
There exists a word over that is accepted by all the automata .
-
There is run of from configuration to some configuration with state .
Proof.
We verify the two implications in order.
First direction.
We first argue that if there is a word in accepted all the automata , then there exists a run in from to for some . In fact, we will show that there is a run from to .
Suppose is a word that is accepted by for every . We shall use vector-indexing notation () to refer to the letters that comprise . We construct a run of starting from as follows. First, for each consecutive , the run proceed through the -section as follows. Suppose that after the first letters have been read, the current state of is (for some ). Since is accepted by every automaton , there is some -transition in that is taken; suppose it is the transition . Then when the run traverses the -section from back to by using the pair of transitions that go through the intermediate state , for each . It is possible to indeed take these transitions because if was in state , then and . Then, after is taken in , the current state becomes which is reflected in the run in since, after the second transition in the pair is taken, and is achieved.
Lastly, once every letter has been read, we know that the current state of is a final state, for every . Precisely, suppose that the current state of each automaton is , for some . Thus, in , the configuration that is reached has the vector of counter values for which and . This means that in each of the parts of the checking section, a transition can be taken to subtract from and from . Thus, the constructed run can traverse the checking section and at the end reach configuration , as required.
Second direction.
We now prove that if there is a run in from to for some , then there exists a word that is accepted by each automaton , for .
Let be a path such that . We may split into subpaths such that for every , is a path from back to that only visits at the start and the end, and is a path from to . Due to the overall structure of (see Figure 3), we know that for all , is a path inside a -section, for some , whereas traverses the checking section. We will argue that the word
is accepted by every automaton , for .
For every , let be the intermediate configuration between and . That is, we have:
Initially, in , we know that for all , the invariant and holds, and thus contains the index of a state of . By the design of , we deduce that this invariant holds true also for all intermediate configurations .
Now, consider the sub-run . In order to leave state , go through the -section, and return to , it must be the case that each part is successfully passed. Suppose that at in , it is true that (and, due to the invariant, we know that ). In order to pass the -th part, it must be true that there must be a transition, say , that subtracts from and from . This is true because all transitions in the -th part subtract from and from for some . Inside the -th part of the -section, after is taken, there is a following transition, say , that adds to and to for some . Now since and are present in -th part of the -section, then we know there is a transition in . Indeed, the run taking is simulating using (and so has now read the -th letter of the word). A straightforward induction now shows that for each , vector encodes, in its counters, the states in which the automata are after reading the first letters of .
We conclude by analysing the final sub-run , and arguing that the state in which each automaton is after reading must be a final state. This holds for the same reason used before: the transition that subtracts from and from in the -th part of the checking section is only present when is a final state of . Thus, in order to reach , one transition from each part of the checking section must be taken, which can only be true when the current state of automaton is a final state. Thus, the word is accepted by all the automata .
