Research Article

Deadlock Prevention Policy with Behavioral Optimality or Suboptimality Achieved by the Redundancy Identification of Constraints and the Rearrangement of Monitors

Table 3

Performance comparison of policies applied to the example in Figure 5.

Policy referred toNumber of statesNumber of monitorsNumber of arcs Complete siphonComplete stateComputational complexity

Piroddi et al. [45]215811382Exponential
Ezpeleta et al. [12]628718106Exponential
Huang et al. [39]126561688NP-hard
Huang [47]16425734Exponential
Li and Zhou [14]6287632Exponential
Li et al. [32]6331527NP-hard
Li and Zhou [15]15999629NP-hard
Park and Reveliotis [16]2480738Polynomial
Tricas et al. [17]14850840NP-hard
Uzam and Zhou [46]2156219112Exponential
Xing and Hu [48]15098417Exponential
The proposed policy 20444945NP-hard