Abstract 1 Introduction 2 Preliminaries 3 Unary Encoding 4 Binary Encoding 5 Discussion and Open Problems References Appendix A Details for Section 3

A Note on the Parameterised Complexity
of Coverability in Vector Addition Systems

Michał Pilipczuk ORCID Institute of Informatics, University of Warsaw, Poland Sylvain Schmitz ORCID Université Paris Cité, CNRS, IRIF, France Henry Sinclair-Banks ORCID Institute of Informatics, University of Warsaw, Poland
Abstract

We investigate the parameterised complexity of the classic coverability problem for vector addition systems (VAS): given a finite set of vectors 𝑽d, an initial configuration 𝒔d, and a target configuration 𝒕d, decide whether starting from 𝒔, one can iteratively add vectors from 𝑽 to ultimately arrive at a configuration that is larger than or equal to 𝒕 on every coordinate, while not observing any negative value on any coordinate along the way. We consider two natural parameters for the problem: the dimension d and the size of 𝑽, defined as the total bitsize of its encoding. We present several results charting the complexity of those two parameterisations, among which the highlight is that coverability for VAS parameterised by the dimension and with all the numbers in the input encoded in unary is complete for the class 𝖷𝖭𝖫 under PL-reductions. We also discuss open problems in the topic, most notably the question about fixed-parameter tractability for the parameterisation by the size of 𝑽.

Keywords and phrases:
vector addition system, Petri net, parameterised complexity, coverability
Funding:
Michał Pilipczuk: margin: [Uncaptioned image] margin: [Uncaptioned image] This work is a part of project BOBR that has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 948057).
Henry Sinclair-Banks: This work is a part of project INFSYS that has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 950398).
Copyright and License:
[Uncaptioned image] © Michał Pilipczuk, Sylvain Schmitz, and Henry Sinclair-Banks; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
; Software and its engineering Model checking ; Theory of computation Concurrency
Related Version:
Full Version: https://arxiv.org/abs/2511.19212
Acknowledgements:
This research was initiated during the InfAut 2024 workshop in Warlity Wielkie, Poland. The authors thank the organisers for launching such a fruitful event. They also thank an anonymous reviewer for pointing them to a relevant discussion in Hack’s PhD thesis [26].
Editors:
Akanksha Agrawal and Erik Jan van Leeuwen

1 Introduction

Vector Addition Systems.

Vector addition systems are a well-established model with a very simple definition: a d-dimensional vector addition system (VAS) [31] is a finite set 𝑽 of vectors in d, which defines a step relation between configurations in d: 𝒖𝑽𝒖+𝒗 for all 𝒖 in d and 𝒗 in 𝑽, provided that 𝒖+𝒗 is in d. One usually interprets the d coordinates of a configuration 𝒖d as d counters that may take non-negative integer values; then 𝑽 represents a set of allowed updates to the counter values, which can be applied only if none of the counters becomes negative.

In spite of this apparent simplicity, vector addition systems can exhibit highly complex behaviours. Famously, their reachability problem is 𝖠𝖢𝖪𝖤𝖱𝖬𝖠𝖭𝖭-complete [35, 34, 13]: given as input a d-dimensional VAS 𝑽, an initial configuration 𝒔d, and a target configuration 𝒕d, the reachability problem asks whether 𝒕 is reachable from 𝒔d in 𝑽, i.e., whether 𝒔𝑽𝒕. This combination of a simple definition with rich behaviours makes vector addition systems – along with the equivalent model of Petri nets – well-suited whenever one needs to model systems managing multiple discrete resources, e.g., threads in concurrent computations, molecules in chemical reactions [3, 4], organisms in biological processes [5], etc., but also as a theoretical tool involved in establishing decidability and complexity statements for a variety of decision problems in logic, formal languages, verification, etc. [42, Section 5].

The Coverability Problem.

In this note, we are interested in a decision problem with a less extreme complexity: given the same input, the coverability problem asks whether there exists a coordinate-wise larger or equal configuration 𝒕𝒕 such that 𝒔𝑽𝒕. This relaxation of the reachability problem was first shown decidable by Karp and Miller [31], before being proven 𝖤𝖷𝖯𝖲𝖯𝖠𝖢𝖤-hard by Lipton [36] and to belong to 𝖤𝖷𝖯𝖲𝖯𝖠𝖢𝖤 by Rackoff [40].

Like reachability, coverability in vector addition systems inter-reduces with numerous decision problems, notably in relation to the automated verification of safety properties in concurrent or distributed systems [30, 29, 22, 16, 18, 23, 2, 6], as well as reasoning on data-aware logics or systems [15, 25, 1]. These applications have motivated a thorough investigation of the problem [31, 36, 40, 9, 33, 32, 44] and the development of several tools specifically targeted at solving it [19, 8, 24].

Towards Parameterised Complexity.

Rosier and Yen [41] refined Rackoff’s analysis to identify the contribution of several parameters to the final complexity of the coverability problem. Among those, the main parameter driving the complexity is the dimension, i.e., the number of counters of the system. Indeed, Rackoff obtains his result by showing a bound on the length of the shortest covering runs from the source to the target configuration, which is in n2𝒪(dlogd) when parameterised by the dimension d, where n is the size of the input encoded in unary. (While 𝖤𝖷𝖯𝖲𝖯𝖠𝖢𝖤-completeness holds with both a unary and a binary encoding, the complexity landscape changes as soon as one isolates the dimension as a parameter).

This upper bound on the length of shortest covering runs in unary-encoded VAS was recently improved to n2𝒪(d) by Künnemann, Mazowiecki, Schütze, Sinclair-Banks, and Węgrzycki [32, Theorem 3.3], and this matches the n2Ω(d) lower bound in the family of systems constructed by Lipton [36]. In turn, this upper bound on the length of the shortest covering runs entails that the coverability problem with a unary encoding can be solved either in non-deterministic space 2𝒪(d)logn or in deterministic time n2𝒪(d) [32, Corollary 3.4]; moreover, the latter time bound is also achieved by the classical backward coverability algorithm [44, Corollary 4.5]. Finally, as also shown by Künnemann et al. through a parameterised reduction from the parameterised clique problem 𝗉-𝖢𝖫𝖨𝖰𝖴𝖤, this time bound is optimal if one assumes the Exponential Time Hypothesis: under the ETH, no algorithm running in deterministic time no(2d) for coverability may exist [32, Theorem 4.2].

Surprisingly, in spite of this long line of results focusing on coverability in vector addition systems, and in particular when isolating the dimension as a key parameter, the question of the parameterised complexity of the problem has not been considered (see Section 2.4 for literature on other parameterisations on Petri nets, which are not directly comparable).

Problem (p-dim-COVERABILITY(VAS))
  input

a d-dimensional VAS 𝑽, an initial configuration 𝒔d, and a target configuration 𝒕d

  parameter

d

  question

does 𝒔 cover 𝒕 in 𝑽, i.e., does there exist 𝒕𝒕 such that 𝒔𝑽𝒕?

From the viewpoint of parameterised complexity, when using a unary encoding, the n2𝒪(d) deterministic time bounds from [32, 44] immediately yield that 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) is in 𝖷𝖯, while the parameterised reduction from 𝗉-𝖢𝖫𝖨𝖰𝖴𝖤 in [32] shows 𝖶[1]-hardness (see Figure 1 for an overview of the parameterised complexity classes discussed in this note).

Fixed Systems and Parameterisation by Size.

A long-standing open question on decision problems for VAS, already raised by Hack [26, page 172] and revived in recent years [28, 17, 12], is whether any meaningful statements can be made about the complexity for a fixed VAS. In this direction, Draghici, Haase, and Ryzhikov [17] have recently shown that there exists a fixed 𝑽 such that the coverability problem (and thus also the reachability problem) for 𝑽 with a binary encoding of the initial/target configurations is already 𝖯𝖲𝖯𝖠𝖢𝖤-hard. This complexity of coverability in a fixed VAS is also related to a question on the length of shortest covering runs by Czerwiński [12]. A natural way to approach these questions within the framework of parameterised complexity is to ask about the complexity of coverability when parameterised by the size of the encoding of the system, which we denote by 𝑽.

Problem (p-size-COVERABILITY(VAS))
  input

a d-dimensional VAS 𝑽, an input configuration 𝒔d, and a target configuration 𝒕d

  parameter

𝑽

  question

does 𝒔 cover 𝒕 in 𝑽, i.e., does there exist 𝒕𝒕 such that 𝒔𝑽𝒕?

This is an a priori easier problem than the one parameterised by the dimension, as there is a straightforward parameterised reduction from this problem to the one of coverability parameterised by dimension (see Remark 2.1).

Contributions.

Our main contribution in this note is to refine the bounds and pinpoint the exact parameterised complexity of 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲): the problem is 𝖷𝖭𝖫-complete under PL reductions with a unary encoding (see Section 3), and 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-complete under FPT reductions with a binary encoding (see Section 4). These results are mainly applications of the rich literature dedicated to the coverability problem in vector addition systems: the upper bounds stem from the 2𝒪(d)logn non-deterministic space bounds from Rackoff’s and subsequent works [40, 41, 32], while 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-hardness with a binary encoding follows from the 𝖯𝖲𝖯𝖠𝖢𝖤-hardness of coverability in a fixed VAS [17, Corollary 2]. The 𝖷𝖭𝖫 lower bound is a new proof, which relies on a result of Wehar [46] on the intersection non-emptiness problem for finite automata. Importantly given the dearth of “natural” complete problems for these two parameterised complexity classes and in particular for 𝖷𝖭𝖫, these results significantly enrich the library of known complete problems, as most of the inter-reducible problems we mentioned earlier also have natural parameters that correspond to the dimension.

As a consequence of these results, we also conclude that 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) is 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-complete when using a binary encoding (see Section 4), and in 𝖷𝖭𝖫 when using a unary encoding (see Section 3). Our motivation here is to restate the questions about the complexity of coverability and reachability in fixed VAS [28, 17, 12] within the framework of parameterised complexity, which we discuss more extensively in Section 5.

2 Preliminaries

2.1 Parameterised Problems, Classes, and Reductions

Let Σ be a finite alphabet. While a decision problem is just a language LΣ, a parameterised problem is a set PΣ×. If the pair (x,k)Σ× is an instance of a parameterised problem, we refer to x as the input to the problem and we refer to k as the parameter. We use the shorthand n=def|x| for the length of x, whenever this does not create confusion.

The framework of parameterised complexity has led to rich hierarchies of complexity classes, notably refining the distinction between 𝖯 and 𝖭𝖯 in the presence of parameters through the class 𝖥𝖯𝖳 of fixed-parameter tractable problems, along with classes of intractable parameterised problems: the 𝖶- and 𝖠-hierarchies, and the complexity classes 𝗉𝖺𝗋𝖺-𝖭𝖯 and 𝖷𝖯; see Figure 1 for a depiction of these classes. A broad introduction to parameterised complexity theory can be found in the book of Flum and Grohe [21], see also the survey of de Haan and Szeider [14] for a comprehensive overview of parameterised classes of high complexity. We provide below a basic recollection of material that will be relevant to us, based on these two sources.

Parameterised Reductions.

An FPT reduction (respectively a PL reduction, which stands for parameterised logspace) from the parameterised problem P1Σ1× to the parameterised problem P2Σ2× is a mapping R:Σ1×Σ2× such that

  1. (1)

    for all (x,k)Σ1×, we have (x,k)P1 if and only if R(x,k)P2;

  2. (2)

    there is a computable function f: and a constant c such that R is computable in time f(k)nc (respectively computable in space f(k)+clog(n)); and

  3. (3)

    there is a computable function g: such that for all (x,k)Σ1×, say with R(x,k)=(x,k), we have kg(k).

Figure 1: The parameterised complexity classes considered in this note and their known relations to the 𝖶- and 𝖠-hierarchies. Arrows denote inclusions 𝖢𝖣; an arrow denotes an inclusion 𝖢[𝖣]𝖿𝗉𝗍 into the closure of 𝖣 under FPT reductions.

Parameterised Space Complexity Classes.

Although these classes are perhaps less well-known, the parameterised paradigm can be also applied to space complexity.

Regarding nondeterministic logarithmic space complexity, a parameterised problem PΣ× is in (uniform) 𝖷𝖭𝖫 [11, Proposition 18] if there is a computable function f: and a non-deterministic algorithm that, given a pair (x,k)Σ×, decides whether (x,k)P in space at most f(k)log(n). In particular, 𝖠𝖶[𝖲𝖠𝖳] is included in the closure of 𝖷𝖭𝖫 under FPT reductions by [11, Proposition 23]. When working with parameterised complexity classes like 𝖥𝖯𝖳, 𝖷𝖯, 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤, etc., FPT reductions suffice, but for 𝖷𝖭𝖫, one needs to work with PL reductions. When stating completeness results, we always specify what type of reductions we have in mind.

Regarding polynomial space complexity, a parameterised problem PΣ× is in 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 if there is a computable function f:Σ and a problem LΣ such that L𝖯𝖲𝖯𝖠𝖢𝖤 and for all instances (x,k)Σ×, we have (x,k)P if and only if (x,f(k))L. Thus, 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 consists of all problems that can be decided using at most polynomial space after some precomputation that only involves the parameter. One can also view 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 as the space complexity-concerned analogue of 𝖥𝖯𝖳. In fact, it is easy to prove (see [21, Exercise 8.40]) that a parameterised problem P is in 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 if and only if it can be solved in FPT space; that is, in space bounded by f(k)nc for some computable function f: and c. In order to establish 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-hardness under FPT reductions, it suffices to prove that there exists some fixed value of the parameter k for which the problem is 𝖯𝖲𝖯𝖠𝖢𝖤-hard under polynomial-time reductions (see [21, Corollary 2.16]).

2.2 Vector Addition Systems and Related Models

As explained in the introduction, vector addition systems are equivalent to a number of models; in particular, vector addition systems with states are more convenient in order to prove complexity lower bounds, while Petri nets are better suited for modelling concurrent systems. This section succinctly introduces vector addition systems with states and Petri nets and here we argue that the usual reduction between their versions of the coverability problem holds also in the parameterised setting.

Basic Notation.

We use bold font for vectors. We index the i-th component of a vector 𝒗 with square brackets by writing 𝒗[i]. Given two vectors 𝒖,𝒗d, we write 𝒖𝒗 if 𝒖[i]𝒗[i] for all i{1,,d}. Given a vector 𝒗d, we define 𝒗1=def|𝒗[1]|++|𝒗[d]| and 𝒗=defmax{|𝒗[1]|,,|𝒗[d]|}. When working with unary encodings, we define the size of a vector 𝒗d as 𝑠𝑖𝑧𝑒(𝒗)=def𝒗1, and when using a binary encoding, as 𝑏𝑖𝑡𝑠𝑖𝑧𝑒(𝒗)=defd(log2(𝒗+1)). We write 𝒗 when the encoding is implicit. Then the size of a vector addition system 𝑽 in either encoding is 𝑽=def𝒗𝑽𝒗, thus defining 𝑠𝑖𝑧𝑒(𝑽) when encoded in unary and 𝑏𝑖𝑡𝑠𝑖𝑧𝑒(𝑽) when encoded in binary. Note that in both cases, we have 𝑽d in a non-trivial VAS 𝑽 of dimension d.

 Remark 2.1.

For an input VAS 𝐕 of some dimension d, an initial configuration 𝐬, and a target configuration 𝐭, the map from (𝐕,𝐬,𝐭,𝐕) to (𝐕,𝐬,𝐭,d) is a PL reduction (and thus also an FPT reduction) from the 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) problem to the 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) problem in both a unary and a binary encoding.

Vector Addition Systems with States.

A d-dimensional vector addition system with states (d-VASS) [27] is a pair 𝒱=(Q,T) consisting of a finite set of states Q and a finite set of transitions TQ×d×Q. To discuss the complexity of decision problems for VASS, we define the size of a VASS 𝒱=(Q,T) as 𝒱=def|Q|+(p,𝒙,q)T𝒙.

Each index i{1,,d} can be seen as a counter with a valuation in : a configuration of a d-VASS is a pair (q,𝒗)Q×d consisting of the current state q and the current counter values 𝒗; we use the notation q(𝒗) for configurations. Given two configurations p(𝒖) and q(𝒗), there is a step p(𝒖)q(𝒗) if there exists a transition t=(p,𝒙,q)T such that 𝒖+𝒙=𝒗; we may refer to 𝒙 as the update of the transition t=(p,𝒙,q), and will also write p(𝒖)𝑡q(𝒗) to emphasise that transition t was taken from p(𝒖) to q(𝒗).

A path in a VASS is a sequence of transitions ((p1,𝒙𝟏,q1),,(pm,𝒙𝒎,qm)) such that pi+1=qi for every i{1,,m1}; then its length |π|=defm is its number of transitions. A run in a VASS is a sequence of configurations (q0(𝒗𝟎),,qm(𝒗𝒎)) such that, for every i{1,,m}, qi1(𝒗𝒊𝟏)qi(𝒗𝒊); in other words, (qi1,𝒗𝒊𝒗𝒊𝟏,qi)T. Let π=(t1,,tm) be a path and let (q0(𝒗𝟎),,qm(𝒗𝒎)) be a run such that, for every i{1,,m}, qi1(𝒗𝒊𝟏)tiqi(𝒗𝒊). Then we write q0(𝒗𝟎)𝜋qm(𝒗𝒎) to denote that the run is performed along the path π, and q0(𝒗𝟎)qm(𝒗𝒎) if the precise path is not relevant.

{|p|}𝑡{|p,p|}
(a) A Petri net with a single place and a run.
q0(1)qt(0)q0(2)
(b) A 1-VASS simulating the Petri net of Figure 2(a).
𝑽 =def{𝒗0,𝒗0,𝒗(0,1,t),𝒗t,𝒗t,𝒗(t,2,0)}
where
𝒗0 =def(0,1,4,3)
𝒗0 =def(0,6,2,2)
𝒗(0,1,t) =def(1,4,3,1)
𝒗t =def(0,2,2,6)
𝒗t =def(0,3,1,4)
𝒗(t,2,0) =def(2,2,6,2)
(1,1,6,0) 𝒗0𝒗0𝒗(0,1,t)(0,2,3,0)
𝒗t𝒗t𝒗(t,2,0)(2,1,6,0)
(c) A 4-VAS simulating the VASS of Figure 2(b).
Figure 2: A Petri net, its representation as a VASS, and its representation as a VAS, along with a run in all three systems.

The coverability problem for VASS takes as input a VASS 𝒱, an initial configuration p(𝒖), and a target configuration q(𝒗), and asks whether there exists 𝒗𝒗 such that there is a run p(𝒖)q(𝒗). We denote the parameterisations of this decision problem by 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲𝖲) and 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲𝖲).

A VAS can therefore be seen as a VASS with a single state, which is dropped entirely from the definition. Conversely, by a well-known result from the seventies by Hopcroft and Pansiot, one can simulate the states of a VASS at the cost of three extra dimensions in a VAS [27, Lemma 2.1]. For clarity, the obtained VAS has an equivalent reachability relation between configurations; a configuration q(𝒙) in the original VASS corresponds to configurations of the form (𝒙,aq,bq,cq) in the VAS, where aq, bq, and cq are values bounded by (|Q|+1)2 that represent the state q, and such that (ap,bp,cp)(aq,bq,cq) for pq throughout the computation. Each transition of the VASS is simulated by a sequence of three transitions of the VAS, the first two checking the current state and the last one performing the update. See Figure 2 for an illustration of this construction.

Fact 2.2 (c.f. [27, Lemma 2.1]).

The parameterised problems 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) and 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲𝖲) are equivalent up to PL reductions, and so are the parameterised problems 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) and 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲𝖲), all this both with a unary and with a binary encoding.

Petri nets.

A Petri net [38] is a tuple 𝒩=(P,T,W) where P is a finite set of places, T is a finite set of transitions, and W:(P×T)(T×P) is a (weighted) flow function. It defines a transition system with configurations in P, i.e. multisets of places (aka markings) that can equivalently be seen as vectors in |P|, and steps 𝒎𝑡𝒩𝒎 whenever 𝒎(p)W(p,t) and 𝒎(p)=𝒎(p)W(p,t)+W(t,p) for all p in P. We write 𝒎𝒩𝒎 if the marking 𝒎 is reachable from the marking 𝒎 by a finite sequence of such steps. The dimension of a Petri net is |P|, its number of places; its size is 𝒩=def|P|+|T|+pP,tT(W(p,t)+W(t,p)). The coverability problem for Petri nets takes as input a Petri net 𝒩, an initial marking 𝒎P, and a target marking 𝒎, and asks whether there exists 𝒎′′𝒎 such that 𝒎𝒩𝒎′′. We denote the parameterisations of this decision problem by 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖯𝖭) and 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖯𝖭).

See Figure 2(a) on Figure 2(a) for a depiction of a Petri net ({p},{t},W) with W(p,t)=1 and W(t,p)=2 as a directed bipartite graph, with places represented by circles, transitions by rectangles, and arcs from places to transitions representing the input flow W(p,t) and arcs from transitions to places representing the output flows W(t,p); the absence of an arc denotes a flow of 0, and an arc without weight denotes a flow of 1.

As is well-known, a Petri net (P,T,W) can be encoded as an equivalent |P|-dimensional VASS with |T|+1 states (see Figure 2(b) on Figure 2(b)), and conversely a d-dimensional VAS 𝑽 can be encoded as an equivalent Petri net with d places and one transition per vector 𝒗𝑽, with input flow the absolute values of the negative values in 𝒗 and output flow the positive values in 𝒗. Thus we have the following equivalence in terms of parameterised problems.

Fact 2.3.

The problems 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) and 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖯𝖭) are equivalent up to PL reductions, and so are the problems 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) and 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖯𝖭), all this both with a unary and with a binary encoding.

2.3 The Complexity of Coverability

Upper Bounds.

Regarding the complexity upper bounds, consider an input of the coverability problem for a d-dimensional VAS 𝑽 with initial configuration 𝒔 and target configuration 𝒕, encoded in unary with size n=𝑠𝑖𝑧𝑒(𝑽)+𝒔1+𝒕1. The approach pioneered by Rackoff [40] to establish the 𝖤𝖷𝖯𝖲𝖯𝖠𝖢𝖤 upper bound is the following, and will also be pertinent for the discussion in Section 5. A finite sequence of steps 𝒔𝑽𝒕 for some 𝒕𝒕 is a covering run or coverability witness; its length is its number of steps. What Rackoff showed is that, if there is a covering run, then there exists one of length bounded by n2𝒪(dlogd). The best known (and actually optimal) upper bound for this length is the following.

Fact 2.4 ([32, Theorem 3.3]).

Shortest covering witnesses for an instance of coverability encoded in unary have length bounded by n2𝒪(d).

As a direct corollary, using algorithms that exhaustively explore the space of bounded configurations, one can determine the complexity of coverability in VAS.

Corollary 2.5 (cf. [32, Corollary 3.4]).

There exists both a deterministic n2𝒪(d)-time algorithm and a non-deterministic 2𝒪(d)log(n)-space algorithm for coverability, where n is the size of the input encoded in unary.

In the multi-parameter analysis of the complexity, one usually focuses on the deterministic algorithm, which yields that coverability can be solved in pseudo-polynomial deterministic time when the dimension is fixed. In the parameterised setting, this also yields that 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) with a unary encoding is in 𝖷𝖯.

In this paper however, we are more interested in the other, non-deterministic algorithm, which we repeat from [32, Corollary 3.4] for the sake of completeness. The algorithm starts with the initial configuration and iteratively guesses the consecutive transitions in a run while keeping track of the current configuration and the total number of transitions applied so far (all the numbers are encoded in binary). If during this iteration, it encounters a configuration covering the target configuration, then it accepts, and if the bound on the length of n2𝒪(d) provided by ˜2.4 is exceeded without encountering a covering configuration, it rejects. The correctness of the algorithm follows directly from ˜2.4. As for the space complexity, observe that every configuration encountered during the run will have all the counters bounded by n2𝒪(d), and the same can be also said about the length counter. Hence, the space needed to store all the relevant information is bounded by 𝒪(dlogn2𝒪(d))2𝒪(d)logn.

Lower Bounds.

Regarding the lower bounds, Lipton [36] was the first to show the 𝖤𝖷𝖯𝖲𝖯𝖠𝖢𝖤-hardness of the reachability problem, with a proof that also applies to coverability. The idea of the construction is to define by induction over d a family of VAS 𝑽d of dimension 𝒪(d) that builds up counter values bounded by 22d, allowing to simulate zero tests on those counters. This leads to a simulation of a 3-counter machine with counter values bounded by 22d, thereby proving 𝖤𝖷𝖯𝖲𝖯𝖠𝖢𝖤-hardness. By a slight modification of the construction, one also obtains the following counterpart to ˜2.4.

Fact 2.6 (c.f. [9, Theorem 3]).

Shortest covering witnesses for an instance of coverability encoded in unary may have length as large as n2Ω(d).

Lipton’s construction was exploited as part of a parameterised reduction from 𝗉-𝖢𝖫𝖨𝖰𝖴𝖤 to 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) [32, Theorem 4.2], showing the 𝖶[1]-hardness of the problem.

2.4 Further Related Work

Watel, Weisser, and Barth [45] investigate an optimisation variant of the coverability problem in weighted Petri nets: each transition has a non-negative weight in 0, and the goal is to find a covering witness where the sum of weights is minimal. The parameters they consider are maxpP,tTW(p,t), maxpP,tTW(t,p) the maximal input and output flow weights, 𝒎 the size of the target marking, and the number of steps in the sought covering witness, none of which is comparable to our parameterisations by dimension or size of the Petri net.

Praveen [39] defines a graph associated with a Petri net 𝒩 whose vertex set is P – the set of places – and edges {p,p} whenever there exists a transition t with W(p,t)>0 and W(t,p)>0. Praveen then shows that the coverability problem parameterised by both the size of a vertex cover and by the maximal flow weight max{W(p,t),W(t,p)pP,tT} is in 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 [39, Theorem 4.5]. While this is in essence a refinement of the parameterisation by the dimension |P| of the Petri net (which bounds the size of a vertex cover), the added flow weight parameter makes this result not directly comparable.

3 Unary Encoding

This section is dedicated to proving the following theorem pinpointing the exact complexity of the coverability problem in vector addition systems, when parameterised by the dimension and using a unary encoding. This is a significant improvement over the 𝖷𝖯 upper bound and 𝖶[1]-hardness mentioned in [32].

Theorem 3.1.

𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) is 𝖷𝖭𝖫-complete under PL reductions when using a unary encoding.

Using the reduction from Remark 2.1, this shows that the same upper bound also applies to the parameterisation by size.

Corollary 3.2.

𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) is in 𝖷𝖭𝖫 when using a unary encoding.

The membership to 𝖷𝖭𝖫 follows from Rackoff’s upper bound, that is, ˜2.4. The 𝖷𝖭𝖫 lower bound, however, requires some attention. We prove it using a reduction from the intersection non-emptiness problem for deterministic finite automata, which is presented in Lemma 3.3 below. To state it, we first need to establish terminology related to automata.

Finite Automata.

A deterministic finite automaton (DFA) 𝒟=(Σ,Q,T,qinit,F) over a finite alphabet Σ, consists of a finite set Q of states, a set TQ×Σ×Q of transitions, an initial state qinitQ, and a set FQ of final states, with the restriction that, for every state pQ and letter σΣ, there is at most one state qQ such that (p,σ,q)T. For a transition t=(p,σ,q); for a word w=σ1σ2σn is a sequence (q0,σ1,q1),(q1,σ2,q2)(an1,σn,qn); it is accepting if qnF is final. The language L(𝒟)Σ recognised by 𝒟 is the set of words for which there exists some accepting run. We shall assume that a DFA is specified by its adjacency matrix, and therefore that the size of a given DFA 𝒟=(Σ,Q,T,qinit,F) is |𝒟|=def|Q||Σ|.

Our interest for DFAs stems from their intersection non-emptiness problem, a well-known 𝖯𝖲𝖯𝖠𝖢𝖤-complete problem, which when parameterised by the number of DFAs is one the very few known 𝖷𝖭𝖫-complete problems in the literature [46, Corollary 3.5].

Problem (p-INTERSECTION-NONEMPTINESS(DFA))
  input

k DFAs 𝒟1, …, 𝒟k over the same alphabet Σ

  parameter

k

  question

is 1ikL(𝒟i), i.e., does there exist a word wΣ with an accepting run in each 𝒟i?

Reduction to Coverability.

The lower bound in Theorem 3.1 follows from the PL reduction from 𝗉-𝖨𝖭𝖳𝖤𝖱𝖲𝖤𝖢𝖳𝖨𝖮𝖭-𝖭𝖮𝖭𝖤𝖬𝖯𝖳𝖨𝖭𝖤𝖲𝖲(𝖣𝖥𝖠) to 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲𝖲) captured by the following statement.

Lemma 3.3.

Let 𝒟1,,𝒟k be DFAs over a common alphabet Σ. One can compute a 2k-VASS 𝒱, an initial configuration p(𝐮), and a target configuration q(𝐯) in space 𝒪(log(k)+log(|𝒟1|++|𝒟k|)) such that 1ikL(𝒟i) if and only if there exists 𝐯𝐯 and a run from p(𝐮) to q(𝐯) in 𝒱.

Proof.

Suppose 𝒟i=(Σ,Qi,Ti,qiinit,Fi) for every 1ik. Without loss of generality, we shall assume that s=|Q1|==|Qk|. It will also be convenient for us to number the states; Qi={qi,1,,qi,s} and we may also assume without loss of generality that qiinit=qi,1.

Overview.

We construct a VASS 𝒱 with 2k counters that come in k pairs: for each i{1,,k}, there are counters 𝗑𝗂 and 𝗒𝗂 used to store the current state of automaton 𝒟i. Precisely, that the current state of 𝒟i is qi,j, for some 1js, is reflected by counter values 𝗑𝗂=j and 𝗒𝗂=sj. The construction of 𝒱 ensures that, except for some intermediate configurations, the following invariant is maintained: for each i{1,,k}, we have 𝗑𝗂+𝗒𝗂=s and 𝗑𝗂1.

With this way of encoding of a selection of states of 𝒟1,,𝒟k, we emulate applying a transition of any 𝒟i through a pair of transitions in 𝒱 as follows. Suppose we would like to apply a transition of 𝒟i that goes from qi,a to qi,b, for some a,b{1,,s}: then, we may apply two transitions in 𝒱

  • first, one that subtracts a from 𝗑𝗂 and sa from 𝗒𝗂, and

  • then, one that adds b to xi and sb to 𝗒𝗂.

Thanks to the invariant, the first transition can be fired only if we indeed have 𝗑𝗂=a and 𝗒𝗂=sa (and the state encoded by those counters is qi,a), and firing it brings both counters to 0. Then the second transition sets 𝗑𝗂=b and 𝗒𝗂=sb. Thus, firing the two transitions in 𝒱 both verifies that the current state is qi,a, and updates this state to qi,b.

With this basic gadget understood, we may explain the overall construction of 𝒱, depicted in Figure 3. We create two special states: the starting state p and the ending state q. The initial configuration is p(𝒖) where 𝒖=def(1,s1,,1,s1), which corresponds to setting every automaton 𝒟i to its initial state. Next, for each σΣ we construct a σ-section, which is essentially a loop that goes from p back to p, and a checking section, which is essentially a path from p to q. Thus, any run from p to q first loops some number of times through the σ-sections, and finally proceed through the checking section to q. The intention is that the effect of performing a loop through the σ-section, for some σΣ, is an update of the values of the counters of 𝒱 that corresponds to performing a σ-transition in each of the automata 𝒟1,,𝒟k. This is done within k consecutive parts of the σ-section, each responsible for updating the state of a different 𝒟i using the gadgets described in the previous paragraph. Thus, choosing consecutive loops through the σ-sections corresponds to choosing consecutive letters of a word w over Σ, and simulating the runs of all the automata 𝒟1,,𝒟k on w. Finally, we construct the checking section using a similar method so that it can be traversed if and only if each automaton 𝒟i is in a final state; this verifies that w is in the intersection of the languages of 𝒟1,,𝒟k. Again, the checking section consist of k parts, each responsible for checking the state of a different 𝒟i. See Section 3.1 for an illustration of this construction.

Figure 3: Overall structure of 𝒱 in the proof of Lemma 3.3.

Formal Construction.

We start by constructing the two special states p and q. Next, for every σΣ we construct the σ-section. It contains one part for each i{1,,k} defined as follows. Let mσ,i be the number of σ-transitions in 𝒟i. Then we introduce mσ,i+2 many states: one starting state, one ending state, and one intermediate state for each σ-transition in 𝒟i. Furthermore, for every σ-transition t=(qi,a,σ,qi,b) in 𝒟i, we construct two transitions in 𝒱: the first transition from the starting state to the intermediate state qt that updates the counters by subtracting a from 𝗑𝗂 and sa from 𝗒𝗂 (and does not update the other counters); the second transition from the intermediate state qt to the ending state that updates the counters similarly by adding b to 𝗑𝗂 and sb to 𝗒𝗂 (and does not update the other counters). Finally, we connect all the parts of the σ-section into a path as follows by adding for each i{1,,k1}, a counter-neutral (not changing the values of the counters) transition from the ending state of the i-th part to the starting state of the (i+1)-st part. The section is connected to the rest of the VASS by counter-neutral transitions from p to the starting state of the first part, and from the ending state of the last part to p.

Next, we present the construction of the checking section, which amounts to constructing the i-th part, for each i{1,,k}, each with two states: one starting state and one ending state. Further, we construct |Fi| many transitions: one for each final state of 𝒟i. Precisely, for each final state qi,f of 𝒟i (for some f{1,,s}), we construct a transition in 𝒱 from the starting state to the ending state that subtracts f from 𝗑𝗂 and sf from 𝗒𝗂 (and does not update the other counters). It is important to note that this is only possible if 𝗑𝗂=f and 𝗒𝗂=sf (i.e., when 𝒟i is currently at f). Accordingly, the only possible way to go is through the i-th part of the checking section is if 𝒟i is currently in a final state. We connect again all the parts of the checking section into a path by adding counter-neutral transitions from p to the starting state of the first part, from the ending state of the last part to q, and from the ending state of the i-th part to the starting state of the (i+1)-st part, for each i{1,,k1}.

Finally, we set the initial configuration of 𝒱 to p(𝒖), where 𝒖 sets 𝗑𝗂=1 and 𝗒𝗂=s1 for every i{1,,k}, and the target configuration to q(𝟎) (so 𝒗=𝟎). The following claim verifies the correctness of the reduction.

Claim 3.4.

The following conditions are equivalent.

  • There exists a word over Σ that is accepted by all the automata 𝒟1,,𝒟k.

  • There is run of 𝒱 from configuration p(𝒖) to some configuration with state q.

The proof of ˜3.4 follows easily from the construction along the lines sketched at the beginning of the proof; we give a more formal explanation in Section A.1.

Space Complexity.

Let us finally observe that the VASS 𝒱 can be constructed in space 𝒪(log(k)+log(|𝒟1|++|𝒟k|)), because the states and transitions of 𝒱 can be computed using three pointers

  • i{1,,k} for the current automaton 𝒟i,

  • σΣ for the current letter, and

  • qi,aQi, which together with σ determines the transition (qi,a,σ,qi,b) in the deterministic automaton 𝒟i.

This sums up to 𝒪(log(k(|Σ||Q1|++|Σ||Qk|)) space for the reduction; as furthermore |𝒟i|=|Σ||Qi| for each i, this is indeed the same as 𝒪(log(k)+log(|𝒟1|++|𝒟k|)) space.

We may now conclude this section by proving Theorem 3.1.

Proof of Theorem 3.1.

Membership in 𝖷𝖭𝖫 follows from the algorithm in nondeterministic space 2𝒪(d)logn from Corollary 2.5 (c.f. [32, Corollary 3.4]). The 𝖷𝖭𝖫-hardness follows from ˜2.2 and the PL reduction described by Lemma 3.3 along with the 𝖷𝖭𝖫-hardness of 𝗉-𝖨𝖭𝖳𝖤𝖱𝖲𝖤𝖢𝖳𝖨𝖮𝖭-𝖭𝖮𝖭𝖤𝖬𝖯𝖳𝖨𝖭𝖤𝖲𝖲(𝖣𝖥𝖠) proven by Wehar [46, Corollary 3.5].

3.1 Example

Let us illustrate the construction on the three DFAs over the alphabet {a,b} of Figure 4, and construct a 6-VASS for which coverability between two specified configurations holds if and only if the intersection of the languages of the three DFAs is non-empty.

The languages of the three DFAs are the following.

  • 𝒟1 accepts all words of even length.

  • 𝒟2 accepts all words that contain at least one “a” and at least one “b”.

  • 𝒟3 accepts all non-empty words where the first and second letter is not “b”.

The intersection of these languages is not empty; the shortest words in the intersection of their languages are “aaab” and “aaba”.

Figure 4: Three DFAs 𝒟1, 𝒟2, and 𝒟3.

The resulting 6-VASS 𝒱 is presented in Figure 5. We set s=4 to be the greatest number of states of any of the DFAs. The VASS has three sections: the a-section (the top row of the figure), the b-section (the middle row of the figure), and the checking section (the bottom row of the figure). There are three parts in each section, one for each of the three DFAs.

First, let us consider the second part in the a-section; here there is one pair of transitions for each a-transition in 𝒟2. For example, consider the transitions coloured in red in Figure 4 and Figure 5. The red pair of transitions in 𝒱 corresponds to the red a-transition from the first state (top left) to the second state (top right) in 𝒟2. The two transitions in 𝒱 have the updates (0,0,1,3,0,0) and (0,0,2,2,0,0), respectively. The first red transition in 𝒱 checks if the current state of 𝒟2 is the first state (𝗑𝟤=1 and 𝗒𝟤=s1=3). The second red transition in 𝒱 then updates the counters so that the current state of 𝒟2 is the second state (𝗑𝟤=2 and 𝗒𝟤=s2=2).

Second, let us consider the third part of the checking section; here there are two transitions, one for each of the two final states of 𝒟3. If the current counter values have 𝗑𝟥=2 and 𝗒𝟥=s2=2 or the counter values have 𝗑𝟥=4 and 𝗒𝟥=s4=0, then it is would be possible to pass through this part. Indeed, when the counter values of 𝒱 contain 𝗑𝟥=2 and 𝗒𝟥=2, then the current state of 𝒟3 is the second state (top right) which is a final state. Similarly, when the counter values of 𝒱 contain 𝗑𝟥=4 and 𝗒𝟥=0, then the current state of 𝒟3 is the fourth state (bottom right) which is also a final state.

As the intersection of the languages recognised by the DFAs is non-empty, we know by ˜3.4 that there is a run from p(1,3,1,3,1,3) to q(0,0,0,0,0,0). The run corresponding to the word aaab follows a path of over 50 transitions; listing every intermediate configuration of the run is impractical, so we list below the main features of the run.

  1. 1.

    From p(1,3,1,3,1,3), pass through the a-section to reach p(2,2,2,2,2,2).

  2. 2.

    From p(2,2,2,2,2,2), pass through the a-section to reach p(1,3,2,2,4,0).

  3. 3.

    From p(1,3,2,2,4,0), pass through the a-section to reach p(2,2,2,2,4,0).

  4. 4.

    From p(2,2,2,2,4,0), pass through the b-section to reach p(1,3,4,0,4,0).

  5. 5.

    From p(1,3,4,0,4,0), pass through the checking section to finally reach q(0,0,0,0,0,0).

Figure 5: The 6-VASS 𝒱 constructed from the DFAs of Figure 4.

4 Binary Encoding

In this section, we show the 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-completeness of the coverability problem parameterised either by dimension or size, when the input is encoded in binary. As in the case of a unary encoding, the upper bound follows from the 2O(d)logn non-deterministic space bounds from Rackoff’s and subsequent works [40, 41, 32]. Regarding the lower bound, we rely on the 𝖯𝖲𝖯𝖠𝖢𝖤-hardness of coverability in a fixed VAS shown by Draghici, Haase, and Ryzhikov [17].

Theorem 4.1.

​The problems 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) and 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) are 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-complete under FPT reductions when using a binary encoding.

Proof.

Regarding the upper bound, recall that the coverability problem can be solved in non-deterministic space 2𝒪(d)logn where d is the dimension and n=𝑠𝑖𝑧𝑒(𝑽)+𝒔1+𝒕1 is the size of the input in unary [32, Corollary 3.4]. This in turn provides an algorithm working in non-deterministic space 2𝒪(d)N where N=𝑏𝑖𝑡𝑠𝑖𝑧𝑒(𝑽)+d(log2(𝒔+1)+log2(𝒕+1)) is the size of the input in binary, showing that 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) is in 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤. By the parameterised reduction from Remark 2.1, this also shows that 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) is in 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤.

Regarding the lower bound, [17, Corollary 2] shows that there exists a fixed VASS 𝒱0 (thus of fixed size, and actually of dimension 6) such that the coverability problem for 𝒱0 is 𝖯𝖲𝖯𝖠𝖢𝖤-hard under the assumption that the starting and the target configuration are encoded in binary. By ˜2.2, there is a fixed VAS 𝑽0 (of dimension 9) with the same property, thus showing that 𝗉-𝗌𝗂𝗓𝖾-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) and 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) are 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-hard under FPT reductions.111The 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-hardness of 𝗉-𝖽𝗂𝗆-𝖢𝖮𝖵𝖤𝖱𝖠𝖡𝖨𝖫𝖨𝖳𝖸(𝖵𝖠𝖲) also follows from the fact that coverability in binary-encoded 2-VASS is 𝖯𝖲𝖯𝖠𝖢𝖤-hard [20, 7], which implies that coverability in binary-encoded 5-VAS is 𝖯𝖲𝖯𝖠𝖢𝖤-hard.

A consequence is that, while coverability with either parameterisation is in 𝖷𝖯 when encoded in unary, if the problem with a binary encoding were to belong to 𝖷𝖯, then 𝖯=𝖯𝖲𝖯𝖠𝖢𝖤. Indeed, if this were the case, then coverability in the fixed VAS 𝑽0 provided by [17, Corollary 2] would be in 𝖯.

5 Discussion and Open Problems

Our results shed some light on the broader landscape of the parameterised complexity of decision problems related to vector addition systems. Let us consider the coverability problem and the reachability problem; both have meaningful parameterisations either by dimension or by size. A first set of questions is simply whether the parameterised problem is in 𝖥𝖯𝖳 or not. A second set of questions concerns bounding the length of witness runs, and is motivated by the discussion in Section 2.3, where we saw that this approach has been instrumental in the understanding of the complexity of coverability. Given an initial configuration 𝒔 and a target configuration 𝒕 in a VAS 𝑽, a shortest witness is a run 𝒔𝑽𝒕 for some 𝒕𝒕 in the case of coverability or a run 𝒔𝑽𝒕 in the case of reachability, such that the number of steps in the run is minimal. For a parameter k (the dimension or the size of 𝑽), we will say that shortest witnesses have fixed-parameter length (FPT length) if there is a computable function f and constant c such that shortest witnesses have length at most f(k)nc.

This setup leads to four questions, that can each be asked with a parameterisation by dimension or by size, and using a unary or a binary encoding.

(CP)

Is the parameterised coverability problem in 𝖥𝖯𝖳?

(RP)

Is the parameterised reachability problem in 𝖥𝖯𝖳?

(CL)

Are shortest coverability witnesses of FPT length?

(RL)

Are shortest reachability witnesses of FPT length?

Negative Cases.

Quite a few of these questions have negative answers. In the case of parameterisation by dimension, we have the following:

  • A positive answer to (CP) would entail 𝖷𝖭𝖫𝖥𝖯𝖳 in the case of a unary encoding by Theorem 3.1, which would bring in particular a collapse of the 𝖶- and 𝖠-hierarchies down to 𝖥𝖯𝖳, because 𝖠𝖶[𝖲𝖠𝖳][𝖷𝖭𝖫]𝖿𝗉𝗍 by [11, Proposition 23] (recall Figure 1). It would entail 𝖥𝖯𝖳=𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 in the case of a binary encoding by Theorem 4.1, which is if and only if 𝖯=𝖯𝖲𝖯𝖠𝖢𝖤.

  • (CL) has an unconditional negative answer regardless of the choice of encoding by ˜2.6: Lipton’s construction [36] yields a family of inputs to the coverability problem in dimension 𝒪(d) where the shortest witnesses have length at least n2d.

  • (RP) and (RL) have a negative answer regardless of the choice of encoding since the reachability problem in dimension 𝒪(d) is hard for the fast-growing complexity class 𝐅d [34, 13], and the shortest witnesses in their instances have length at least Fd(n) where Fd is the dth fast-growing function (see [43] for a reference on fast-growing complexity).

Turning our attention to parameterisation by size and a binary encoding, we have:

  • A positive answer to either (CP) or (RP) would again entail 𝖯=𝖯𝖲𝖯𝖠𝖢𝖤 by Theorem 4.1.

  • Finally, (CL) and (RL) have a negative answer, since with a binary encoding and a fixed VAS of constant size, one can easily ensure that shortest witnesses have length exponential in the size of the input.

Open Questions.

Our questions are therefore only relevant in the case of a unary encoding and a parameterisation by size. In that setting, (CL) is essentially Question 3 by Czerwiński [12]222Hack observed [26, page 171] that shortest coverability witnesses were of linear length if, in addition to the VAS, the initial configuration was fixed (thanks to the coverability tree construction [31]). On a similar note, Rackoff’s analysis [40] even yields a constant bound on the length of shortest coverability witnesses if we fix both the VAS and the target configuration. and (RL) is essentially a conjecture due Hack [26, page 172] that has recently been restated by Jecker [28]. Both of these questions were originally phrased in terms of an 𝒪(n) upper bound in a fixed VAS; here we cast them in the terminology of parameterised complexity.

Those two questions are connected to (CP) and (RP): an FPT length on shortest witnesses implies the existence of a nondeterministic algorithm that guesses and checks this witness. With a unary encoding, this entails that the problem is in 𝗉𝖺𝗋𝖺-𝖭𝖯, while with a binary encoding, this entails that the problem is in 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤. Recall that all we know at the moment are 𝖷𝖭𝖫 and 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤 upper bounds for coverability with unary and binary encoding, and no reasonable upper bounds for reachability. Thus (CL) and (RL) provide an original angle of attack on (CP) and (RP), respectively, and a positive answer would yield

  • the 𝗉𝖺𝗋𝖺-𝖯𝖲𝖯𝖠𝖢𝖤-completeness of reachability parameterised by size with a binary encoding, and

  • an indication that the complexity of the problems parameterised by size with a unary encoding is likely lower than 𝖷𝖭𝖫 or 𝗉𝖺𝗋𝖺-𝖭𝖯.

In summary, we believe that (CP) and (RP) are excellent open questions in parameterised complexity that deserve further investigation, whereas (CL) and (RL) are auxiliary conjectures whose resolution might be very insightful for (CP) and (RP).

As a further indication on the easiness of coverability and reachability parameterised by size with a unary encoding, note that in a fixed VAS 𝑽0, the coverability problem and the reachability problem are sparse languages, meaning that there exists a polynomial p such that, for all n, the number of instances x of the language of length |x|=n is bounded by p(n). Indeed, as 𝑽0 and thus its dimension d are fixed, there are at most (n2d)n2d possible pairs of initial and target configurations such that 𝒔1+𝒕1=n. This tells us that if there exists a fixed 𝑽0 such that either coverability or reachability for 𝑽0 with unary encoding is 𝖭𝖯-hard, then 𝖯=𝖭𝖯 by Mahaney’s Theorem [37, Theorem 3.1]. Similarly, 𝖭𝖫-hardness entails 𝖫=𝖭𝖫 [10, Corollary 3].

References

  • [1] Parosh Aziz Abdulla, C. Aiswarya, Mohamed Faouzi Atig, Marco Montali, and Othmane Rezine. Complexity of reachability for data-aware dynamic systems. In Proceedings of ACSD 2018, pages 11–20. IEEE Computer Society, 2018. doi:10.1109/ACSD.2018.000-3.
  • [2] Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham, and Yaron Velner. Some complexity results for stateful network verification. Formal Methods in System Design, 54:191–231, 2019. doi:10.1007/s10703-018-00330-9.
  • [3] Rutherford Aris. Prolegomena to the rational analysis of systems of chemical reactions. Archive for Rational Mechanics and Analysis, 19(2):81–99, 1965. doi:10.1007/BF00282276.
  • [4] Rutherford Aris. Prolegomena to the rational analysis of systems of chemical reactions II. Some addenda. Archive for Rational Mechanics and Analysis, 27(5):356–364, 1968. doi:10.1007/BF00251438.
  • [5] Paolo Baldan, Nicoletta Cocco, Andrea Marin, and Marta Simeoni. Petri nets for modelling metabolic pathways: A survey. Natural Computing, 9(4):955–989, 2010. doi:10.1007/S11047-010-9180-6.
  • [6] Pascal Baumann, Rupak Majumdar, Ramanathan S. Thinniyam, and Georg Zetzsche. Context-bounded verification of thread pools. In Proceedings of POPL 2012, volume 6 of Proceedings of the ACM on Programming Languages. ACM, 2022. doi:10.1145/3498678.
  • [7] Michael Blondin, Alain Finkel, Stefan Göller, Christoph Haase, and Pierre McKenzie. Reachability in two-dimensional vector addition systems with states is 𝖯𝖲𝖯𝖠𝖢𝖤-complete. In Proceedings of LICS 2015, pages 32–43. IEEE Computer Society, 2015. doi:10.1109/LICS.2015.14.
  • [8] Michael Blondin, Alain Finkel, Christoph Haase, and Serge Haddad. Approaching the coverability problem continuously. In Proceedings of TACAS 2016, volume 9636 of Lecture Notes in Computer Science, pages 480–496. Springer, 2016. doi:10.1007/978-3-662-49674-9_28.
  • [9] Laura Bozzelli and Pierre Ganty. Complexity analysis of the backward coverability algorithm for VASS. In Proceedings of RP 2011, volume 6945 of Lecture Notes in Computer Science, pages 96–109. Springer, 2011. doi:10.1007/978-3-642-24288-5_10.
  • [10] Jin-Yi Cai and D. Sivakumar. Resolution of Hartmanis’ conjecture for 𝖭𝖫-hard sparse sets. Theoretical Computer Science, 240(2):257–269, 2000. doi:10.1016/S0304-3975(99)00234-0.
  • [11] Yijia Chen, Jörg Flum, and Martin Grohe. Bounded nondeterminism and alternation in parameterized complexity theory. In Proceedings of CCC 2003, pages 13–29. IEEE Computer Society, 2003. doi:10.1109/CCC.2003.1214407.
  • [12] Wojciech Czerwiński. Open problems in infinite-states systems, 2024. Webpage accessed on 2024-12-07. URL: https://www.mimuw.edu.pl/˜wczerwin/research.html.
  • [13] Wojciech Czerwiński and Łukasz Orlikowski. Reachability in vector addition systems is 𝖠𝖢𝖪𝖤𝖱𝖬𝖠𝖭𝖭-complete. In Proceedings of FOCS 2021, pages 1229–1240. IEEE Computer Society, 2022. doi:10.1109/FOCS52979.2021.00120.
  • [14] Ronald de Haan and Stefan Szeider. A compendium of parameterized problems at higher levels of the polynomial hierarchy. Algorithms, 12(9):188, 2019. doi:10.3390/A12090188.
  • [15] Normann Decker, Peter Habermehl, Martin Leucker, and Daniel Thoma. Ordered navigation on multi-attributed data words. In Proceedings of CONCUR 2014, volume 8704 of Lecture Notes in Computer Science, pages 497–511. Springer, 2014. doi:10.1007/978-3-662-44584-6_34.
  • [16] Roberto Di Cosmo, Jacopo Mauro, Stefano Zacchiroli, and Gianluigi Zavattaro. Component reconfiguration in the presence of conflicts. In Proceedings of ICALP 2013, volume 7966 of Lecture Notes in Computer Science, pages 187–198. Springer, 2013. doi:10.1007/978-3-642-39212-2_19.
  • [17] Andrei Draghici, Christoph Haase, and Andrew Ryzhikov. Reachability in fixed VASS: expressiveness and lower bounds. In Proceedings of FoSSaCS 2024, volume 14575 of Lecture Notes in Computer Science, pages 185–205. Springer, 2024. doi:10.1007/978-3-031-57231-9_9.
  • [18] Javier Esparza. Keeping a crowd safe: On the complexity of parameterized verification. In Proceedings of STACS 2014, volume 25 of Leibniz International Proceedings in Informatics, pages 1–10. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2014. doi:10.4230/LIPIcs.STACS.2014.1.
  • [19] Javier Esparza, Ruslán Ledesma-Garza, Rupak Majumdar, Philipp Meyer, and Filip Niksic. An SMT-based approach to coverability analysis. In Proceedings of CAV 2014, volume 8559 of Lecture Notes in Computer Science, pages 603–619. Springer, 2014. doi:10.1007/978-3-319-08867-9_40.
  • [20] John Fearnley and Marcin Jurdziński. Reachability in two-clock timed automata is 𝖯𝖲𝖯𝖠𝖢𝖤-complete. Information and Computation, 243:26–36, 2015. doi:10.1016/j.ic.2014.12.004.
  • [21] Jörg Flum and Martin Grohe. Parameterized Complexity Theory. Texts in Theoretical Computer Science. Springer, 2006. doi:10.1007/3-540-29953-X.
  • [22] Pierre Ganty and Rupak Majumdar. Algorithmic verification of asynchronous programs. ACM Transactions on Programming Languages and Systems, 34(1), 2012. doi:10.1145/2160910.2160915.
  • [23] Gilles Geeraerts, Alexander Heußner, and Jean-François Raskin. On the verification of concurrent, asynchronous programs with waiting queues. ACM Transactions on Embedded Computing Systems, 14(3), 2015. doi:10.1145/2700072.
  • [24] Thomas Geffroy, Jérôme Leroux, and Grégoire Sutre. Occam’s Razor applied to the Petri net coverability problem. Theoretical Computer Science, 750:38–52, 2018. doi:10.1016/j.tcs.2018.04.014.
  • [25] Radu Grigore and Nikos Tzevelekos. History-register automata. Logical Methods in Computer Science, 12(1), 2016. doi:10.2168/LMCS-12(1:7)2016.
  • [26] Michel Hack. Decidability questions for Petri Nets. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 1976. URL: https://hdl.handle.net/1721.1/27441.
  • [27] John Hopcroft and Jean-Jacques Pansiot. On the reachability problem for 5-dimensional vector addition systems. Theoretical Computer Science, 8(2):135–159, 1979. doi:10.1016/0304-3975(79)90041-0.
  • [28] Ismaël Jecker. Open problems in automata theory: 22.1 Complexity of fixed VAS reachability, 2022. Webpage accessed on 2025-05-13. URL: https://automata.exchange/22.01-complexity-fixed-vas-reachability/.
  • [29] Alexander Kaiser, Daniel Kroening, and Thomas Wahl. Dynamic cutoff detection in parameterized concurrent programs. In Proceedings of CAV 2010, volume 6174 of Lecture Notes in Computer Science, pages 645–659. Springer, 2010. doi:10.1007/978-3-642-14295-6_55.
  • [30] Max Kanovich, Paul Rowe, and Andre Scedrov. Policy compliance in collaborative systems. In Proceedings of CSF 2009, pages 218–233. IEEE Computer Society, 2009. doi:10.1109/CSF.2009.19.
  • [31] Richard M. Karp and Raymond E. Miller. Parallel program schemata. Journal of Computer and System Sciences, 3(2):147–195, 1969. doi:10.1016/S0022-0000(69)80011-5.
  • [32] Marvin Künnemann, Filip Mazowiecki, Lia Schütze, Henry Sinclair-Banks, and Karol Węgrzycki. Coverability in VASS revisited: Improving Rackoff’s bound to obtain conditional optimality. In Proceedings of ICALP 2023, volume 261 of Leibniz International Proceedings in Informatics. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPIcs.ICALP.2023.131.
  • [33] Ranko Lazić and Sylvain Schmitz. The ideal view on Rackoff’s coverability technique. Information and Computation, 277:104582, 2021. doi:10.1016/j.ic.2020.104582.
  • [34] Jérôme Leroux. The reachability problem for Petri nets is not primitive recursive. In Proceedings of FOCS 2021, pages 1241–1252. IEEE Computer Society, 2022. doi:10.1109/FOCS52979.2021.00121.
  • [35] Jérôme Leroux and Sylvain Schmitz. Reachability in vector addition systems is primitive-recursive in fixed dimension. In Proceedings of LICS 2019, pages 1–13. IEEE Computer Society, 2019. doi:10.1109/LICS.2019.8785796.
  • [36] Richard J. Lipton. The reachability problem requires exponential space. Technical Report 62, Department of Computer Science, Yale University, January 1976. URL: http://www.cs.yale.edu/publications/techreports/tr63.pdf.
  • [37] Stephen R. Mahaney. Sparse complete sets for 𝖭𝖯: Solution of a conjecture of Berman and Hartmanis. Journal of Computer and System Sciences, 25(2):130–143, 1982. doi:10.1016/0022-0000(82)90002-2.
  • [38] Carl A. Petri. Kommunikation mit Automaten. PhD thesis, Universität Bonn, 1962. URL: http://edoc.sub.uni-hamburg.de/informatik/volltexte/2011/160/.
  • [39] M. Praveen. Small vertex cover makes Petri net coverability and boundedness easier. Algorithmica, 65(4):713–753, 2013. doi:10.1007/S00453-012-9687-6.
  • [40] Charles Rackoff. The covering and boundedness problems for vector addition systems. Theoretical Computer Science, 6:223–231, 1978. doi:10.1016/0304-3975(78)90036-1.
  • [41] Louis E. Rosier and Hsu-Chun Yen. A multiparameter analysis of the boundedness problem for vector addition systems. Journal of Computer and System Sciences, 32(1):105–135, 1986. doi:10.1016/0022-0000(86)90006-1.
  • [42] Sylvain Schmitz. Automata column: The complexity of reachability in vector addition systems. ACM SIGLOG News, 3(1):3–21, 2016. doi:10.1145/2893582.2893585.
  • [43] Sylvain Schmitz. Complexity hierarchies beyond 𝖤𝖫𝖤𝖬𝖤𝖭𝖳𝖠𝖱𝖸. ACM Transactions on Computation Theory, 8(1), 2016. doi:10.1145/2858784.
  • [44] Sylvain Schmitz and Lia Schütze. On the length of strongly monotone descending chains over d. In Proceedings of ICALP 2024, volume 297 of Leibniz International Proceedings in Informatics. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPIcs.ICALP.2024.153.
  • [45] Dimitri Watel, Marc-Antoine Weisser, and Dominique Barth. Parameterized complexity and approximability of coverability problems in weighted Petri nets. In Proceedings of Petri Nets 2017, volume 10258 of Lecture Notes in Computer Science, pages 330–349. Springer, 2017. doi:10.1007/978-3-319-57861-3_19.
  • [46] Michael Wehar. On the Complexity of Intersection Non-Emptiness Problems. PhD thesis, University at Buffalo, State University of New York, USA, 2016. URL: http://www.michaelwehar.com/documents/mwehar_dissertation.pdf.

Appendix A Details for Section 3

A.1 Proof of ˜3.4

We give here a formal verification of the correctness of the reduction; that is, we prove ˜3.4, recalled below for convenience.

Claim 3.4. [Restated, see original statement.]

The following conditions are equivalent.

  • There exists a word over Σ that is accepted by all the automata 𝒟1,,𝒟k.

  • There is run of 𝒱 from configuration p(𝒖) to some configuration with state q.

Proof.

We verify the two implications in order.

First direction.

We first argue that if there is a word in accepted all the automata 𝒟1,,𝒟k, then there exists a run in 𝒱 from p(𝒖) to q(𝒗) for some 𝒗𝟎. In fact, we will show that there is a run from p(𝒖) to q(𝟎).

Suppose wΣ is a word that is accepted by 𝒟i for every i{1,,k}. We shall use vector-indexing notation (w[1],w[2],) to refer to the letters that comprise w. We construct a run of 𝒱 starting from p(𝒖) as follows. First, for each consecutive j{1,,|w|}, the run proceed through the w[j]-section as follows. Suppose that after the first j1 letters have been read, the current state of 𝒟i is qi,a (for some 1as). Since w is accepted by every automaton 𝒟i, there is some w[j]-transition in 𝒟i that is taken; suppose it is the transition ti=(qi,a,w[j],qi,b). Then when the run traverses the w[j]-section from p back to p by using the pair of transitions that go through the intermediate state qti, for each i{1,,k}. It is possible to indeed take these transitions because if 𝒟i was in state qi,a, then 𝗑𝗂=a and 𝗒𝗂=sa. Then, after ti is taken in 𝒟i, the current state becomes qi,b which is reflected in the run in 𝒱 since, after the second transition in the pair is taken, 𝗑𝗂=b and 𝗒𝗂=sb is achieved.

Lastly, once every letter w[1],,w[|w|] has been read, we know that the current state of 𝒟i is a final state, for every i. Precisely, suppose that the current state of each automaton 𝒟i is qi,fi, for some 1fis. Thus, in 𝒱, the configuration p(𝒛) that is reached has the vector of counter values 𝒛 for which 𝗑𝗂=fi and 𝗑𝗂=sfi. This means that in each of the parts of the checking section, a transition can be taken to subtract fi from 𝗑𝗂 and sfi from 𝗒𝗂. Thus, the constructed run can traverse the checking section and at the end reach configuration q(𝟎), as required.

Second direction.

We now prove that if there is a run in 𝒱 from p(𝒖) to q(𝒗) for some 𝒗𝟎, then there exists a word that is accepted by each automaton 𝒟i, for i{1,,k}.

Let π be a path such that p(𝒖)𝜋q(𝒗). We may split π into subpaths π1,,πm,πm+1 such that for every j{1,,m}, πj is a path from p back to p that only visits p at the start and the end, and πm+1 is a path from p to q. Due to the overall structure of 𝒱 (see Figure 3), we know that for all j{1,,m}, πj is a path inside a σj-section, for some σjΣ, whereas πm+1 traverses the checking section. We will argue that the word

w=defσ1σ2σm

is accepted by every automaton 𝒟i, for i{1,,k}.

For every j{1,,m}, let p(𝒖𝒋) be the intermediate configuration between πj and πj+1. That is, we have:

p(𝒖)π1p(𝒖𝟏)π2p(𝒖𝟐)p(𝒖𝒎𝟏)πmp(𝒖𝒎)πm+1q(𝒗).

Initially, in 𝒖, we know that for all i{1,,k}, the invariant 𝗑𝗂+𝗒𝗂=s and 𝗑𝗂1 holds, and thus 𝗑𝗂 contains the index of a state of 𝒟i. By the design of 𝒱, we deduce that this invariant holds true also for all intermediate configurations p(𝒖𝟏),p(𝒖𝟐),,p(𝒖𝒎).

Now, consider the sub-run p(𝒖𝒋)πjp(𝒖𝒋+𝟏). In order to leave state p, go through the σj-section, and return to p, it must be the case that each part is successfully passed. Suppose that at in 𝒖𝒋, it is true that 𝗑𝗂=a (and, due to the invariant, we know that 𝗒𝗂=sa). In order to pass the i-th part, it must be true that there must be a transition, say t, that subtracts a from 𝗑𝗂 and sa from 𝗒𝗂. This is true because all transitions in the i-th part subtract x from 𝗑𝗂 and sx from 𝗒𝗂 for some 1xs. Inside the i-th part of the σj-section, after t is taken, there is a following transition, say t, that adds b to 𝗑𝗂 and sb to 𝗒𝗂 for some 1bs. Now since t and t are present in i-th part of the σf(j)-section, then we know there is a transition (qi,a,σf(j),qi,b) in 𝒟i. Indeed, the run taking t,t is simulating 𝒟i using (qi,a,σj,qi,b) (and so 𝒟i has now read the j-th letter of the word). A straightforward induction now shows that for each j{1,,m}, vector 𝒖j encodes, in its counters, the states in which the automata 𝒟1,,𝒟k are after reading the first j letters of w.

We conclude by analysing the final sub-run p(𝒖𝒎)πmq(𝒗), and arguing that the state in which each automaton 𝒟i is after reading w must be a final state. This holds for the same reason used before: the transition that subtracts a from 𝗑𝗂 and sa from 𝗒𝗂 in the i-th part of the checking section is only present when qi,a is a final state of 𝒟i. Thus, in order to reach q, one transition from each part of the checking section must be taken, which can only be true when the current state of automaton 𝒟i is a final state. Thus, the word w=σ1σ2σm is accepted by all the automata 𝒟1,,𝒟k.