Petri Nets With Fuzzy Logic (PNFL) : Reverse Engineering and Parametrization
Petri Nets With Fuzzy Logic (PNFL) : Reverse Engineering and Parametrization
net/publication/46404249
Petri Nets with Fuzzy Logic (PNFL): Reverse Engineering and Parametrization
CITATIONS READS
25 1,657
4 authors, including:
Ralf Zimmer
Ludwig-Maximilians-University of Munich
373 PUBLICATIONS 7,580 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ralf Zimmer on 10 August 2014.
Abstract
Background: The recent DREAM4 blind assessment provided a particularly realistic and challenging setting for network
reverse engineering methods. The in silico part of DREAM4 solicited the inference of cycle-rich gene regulatory networks
from heterogeneous, noisy expression data including time courses as well as knockout, knockdown and multifactorial
perturbations.
Methodology and Principal Findings: We inferred and parametrized simulation models based on Petri Nets with Fuzzy
Logic (PNFL). This completely automated approach correctly reconstructed networks with cycles as well as oscillating
network motifs. PNFL was evaluated as the best performer on DREAM4 in silico networks of size 10 with an area under the
precision-recall curve (AUPR) of 81%. Besides topology, we inferred a range of additional mechanistic details with good
reliability, e.g. distinguishing activation from inhibition as well as dependent from independent regulation. Our models also
performed well on new experimental conditions such as double knockout mutations that were not included in the provided
datasets.
Conclusions: The inference of biological networks substantially benefits from methods that are expressive enough to deal
with diverse datasets in a unified way. At the same time, overly complex approaches could generate multiple different
models that explain the data equally well. PNFL appears to strike the balance between expressive power and complexity.
This also applies to the intuitive representation of PNFL models combining a straightforward graphical notation with
colloquial fuzzy parameters.
Citation: Küffner R, Petri T, Windhager L, Zimmer R (2010) Petri Nets with Fuzzy Logic (PNFL): Reverse Engineering and Parametrization. PLoS ONE 5(9): e12807.
doi:10.1371/journal.pone.0012807
Editor: Mark Isalan, Center for Genomic Regulation, Spain
Received March 31, 2010; Accepted June 18, 2010; Published September 20, 2010
Copyright: ß 2010 Küffner et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits
unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Funding: This work was supported by Helmholtz Alliance on Systems Biology, Project CoReNe (http://www.helmholtz.de/en/joint_initiative_for_innovation_
and_research/initiating_and_networking/helmholtz_alliances/systembiologie/helmholtz_alliance_on_systems_biology/networks_in_detail/corene_control_
of_regulatory_networks_with_focus_on_non_coding_rna/). The funders had no role in study design, data collection and analysis, decision to publish, or
preparation of the manuscript.
Competing Interests: The authors have declared that no competing interests exist.
* E-mail: [email protected]
Petri Nets
The application of Petri net theory for modeling and analysis of Figure 1. Petri Nets with Fuzzy Logic (PNFL). In Petri nets, states
biological networks is well established in the field of systems such as effector (e) or target (t) gene levels are represented by places
and are depicted as circles. State changes are represented by transitions
biology [21–24]. Petri nets are graph representations of networks
and are depicted as boxes. Effect arcs (i.e. effector place-transition arcs)
consisting of two types of nodes: places, representing entities like define the effectors influencing a target gene via the transition. Firing
proteins, genes, metabolites etc, and transitions, representing transitions leaves the marking of the effector places unchanged (test
reactions or, in general, state changes of entities. The state of an arcs, dashed). After the application of rule tables re,t to effector gene
entity is defined by the tokens that represent the marking of the levels le (function c, eq. 1–3), the target gene levels lt are updated by the
according place and the overall system state by the marking of the output function o (eq. 4–6). In Fig. 6, Fig. 8 and Fig. 10, we represent a
transition and its output place as a simplified hexagonal node. The
Petri net. Directed edges (arcs) connect places to transitions (input reconstruction determines the topology ( = effect arcs) and the
arcs) or transitions to places (output arcs). These arcs not only parametrization ( = rule tables and combination operators) of PNFL
depict which entities influence reactions or are influenced by them, models.
but they also exactly define the effects of a reaction, e.g. by doi:10.1371/journal.pone.0012807.g001
Figure 3. Rule tables. Given fuzzy effector gene levels, we describe the behavior of the targets by rule tables. Rule tables define sign and strength
of effects. Fully active strong (222, A) or medium (22, B) inhibitors result in low target activity, which is in contrast to weak inhibitors (2, C). The
corresponding strong (+++), medium (++) and weak (+) activator rule tables are constructed by exchanging high by low and low by high in the target
column.
doi:10.1371/journal.pone.0012807.g003
Figure 4. Fuzzy effect calculation example. In this example, the gene level of effector e is le = 0.125. It is transformed (fuzzified, panel A) into the
fuzzy gene level L by application of eq. 1. In panel B, the rule table re,t (Fig. 3C) is applied to describe the influence of e onto its target gene t by the
rule consequent C. C is derived by eq. 2, yielding the fuzzy value ,0, 0.25, 0.75. (panel B). The real valued influence of e onto t, c(le, re,t) = 0.875, is
calculated by defuzzification (panel C). Such a calculation is performed for all effectors of the target gene t individually. The influences are combined
by eq. 4 or eq. 6 (not shown here, see text).
doi:10.1371/journal.pone.0012807.g004
The scaling parameter a (Table 1) aligns the PNFL generated time A perturbation is represented as an additional (hidden, i.e.
courses to the provided time courses. The transcription rate unobserved) node in the network. During reconstruction, we infer
parameter bt tunes the transcription rate of gene t, with bt = 1 for perturbation targets together with effector targets, as both were not
the wild type transcription rate. disclosed in the challenge. Initially, we use eq. 6 instead of eq. 4 for
Knockout, knockdown and double knockout data. Gene all genes t directly affected by the perturbation. For a time course i,
perturbations are simulated by reducing the transcription rate bt. eq. 6 includes the perturbation term c(lpi ,rpi ,t ) with lpi :1, where pi
In case of a knockout or knockdown simulation, bt of the is an additional perturbation effector with corresponding rules rpi ,t .
perturbed gene t is set to 0 or 0.5, respectively. Similarly, double The perturbation is disabled halfway through the time course via
knockout simulations can be performed. switching back to eq. 4 thereby allowing the network to return to its
Time course data. Time course datasets were provided by wild type state. The reconstructed networks thus consist of 15
DREAM4 to show the impact of strong gene perturbations variables: 10 genes and 5 perturbation variables for the 5 different
(about a third of all genes) on a network as well as the relaxa- time courses.
tion to the wild type equilibrium state after removing the
perturbations. (
c(lpi ,rpi ,t ), if (n~0)
ui (c1 ,:::,cn ,c(lpi ,rpi ,t ))~ ð6Þ
op(c1 ,:::,cn ,c(lpi ,rpi ,t )), otherwise
Table 1. Parameters used for PNFL based reconstruction. agreement between the DREAM4 provided and PNFL simu-
lated datasets.
Note that the networks discussed here always include 10 genes
Parameter descriptions Equation Values/Lists of valuesa and the PNFL models always contain one place and one transition
for each gene. Topological changes of the PNFL models only
Rule tables r: effect strength 2 (M), (W, S), (W, M, S)b
involve attachment or detachment of input arcs.
Combination operators 4, 6 (MEAN), (OR, AND), (OR, AND, MEAN) Move set and move probabilities. Starting from a
Update ratio a 5 0.4, 0.5, 0.6 population of randomly initialized networks, the reconstruction
Regularization parameter reg 7 0.005, 0.002, 0.001, 0.0005, 0.0002 proceeds one network modifying move at a time. Each move
Weight time course wTC 7 1
modifies a single target gene. After a move, data is generated by
PNFL and compared against the DREAM data (Fig. 6). We
Weight knockout wKO 7 8
implemented moves on individual networks that add or remove
Weight knockdown wKD 7 6 effects (i.e. effect arcs), switch the effect combination logic op M
Weight multifactorial wMF 7 4 {AND, OR, MEAN} and increase or decrease the effector
Simulated annealing 8 0.02 strength via selecting the corresponding rule tables r M {+++, ++,
parameter k +, 2, 22, 222}. Each network in the population evolves both
a
independently by the moves mentioned before but also by a set of
Parameters from lists are randomly selected for ensemble predictions (see
Submission).
crossover moves. The crossover moves copy effect strength,
b
Degrees of effect strength, W = weak = (+,2), M = medium = (++,22) and combination logic or effects between two individuals.
S = strong = (+++,222). During reconstruction, particular moves are selected from the
doi:10.1371/journal.pone.0012807.t001 move set with a move probability that is proportional to the past
move acceptance probability for that move.
Reconstruction Objective function. The quality of the reconstructed
Overview. We construct PNFL models by inferring and networks is evaluated by an objective function dist. It is based on
parametrizing relationships between genes via appropriate rule the Pearson correlation coefficients rt of the target genes t and a
tables. Starting from a randomly initialized PNFL model our regularization term. Lower values of dist indicate a better
reconstruction approach (Fig. 6) proceeds via four steps: (1) agreement between the DREAM dataset vectors xt and the
The topology and parametrization of the initial network are PNFL dataset vectors yt and thus better PNFL models. The
modified by the application of moves. (2) After each move, data is vectors xt and yt are formed by the concatenation of all four
simulated by PNFL and (3) compared to the original data via an kinds of datasets (10 knockout, 10 knockdown, 100 time course,
objective function. Finally, (4) we use a simulated annealing 10 multifactorial values per gene). An additional vector w =
protocol to decide if a given move should be accepted or rejected. (wKO,…,wKO, wKD,…,wKD, wTC,…,wTC, wMF,…,wMF) weights the
The network optimization thus targets at the best possible data points with dataset specific weights (Table 1). All three vectors
Figure 6. Overview network reconstruction. To reconstruct the original network (A) we mimic the DREAM4 data generation process (ARB). The
knockout (KO) of gene 1 is depicted as an example data set in the lower panels. Our reconstruction starts from a randomly initialized population (C)
and proceeds through network changing moves. After each move, data is generated by PNFL (D) and compared against the DREAM data (B). We
implemented moves on single networks in the population and crossover moves that copy features between pairs of networks. Thereby, favourable
features are propagated throughout the population, which eventually leads to improved networks (E) and corresponding datasets (F). Note that - in
contrast to the PNFL simulation (D,F) - only equilibrium values were given for knockout experiments in DREAM4 (B). Edges denote effect strength
(thickness) and sign (activation = red, inhibition = blue).
doi:10.1371/journal.pone.0012807.g006
are of length 130. The weighted rt is calculated based on the the objective function dist. We accept inferior networks with a
weighted covariance and the weighted mean (not shown). A model probability p calculated from the Boltzmann distribution
coefficient r is calculated as the average of the gene coefficients rt. parametrized by k (Table 1). Essentially, moves that only slightly
In addition, we introduced a regularization parameter reg. It allows increase dist are accepted more frequently, especially if the
us to control |Network|, i.e. the number of edges ( = effect arcs) in temperature T is high. T decreases linearly during the
the models.
reconstruction run from one to zero. a single processor core. During the run, the individuals in the
population usually converge to a single network with only minor
{k:Df =T variations (data not shown).
p~e ,T[½1::0 ð8Þ
Relative contribution of the different datasets
The contribution of the different datasets to the prediction of
Submission. The DREAM4 submission format required to networks is given by dataset specific weights. The weights were
rank effects by their prediction confidence. We therefore chose a
derived manually based on randomly generated PNFL models.
consensus approach to predict an ensemble of networks.
The relative contributions of the individual datasets amount to
Consensus prediction approaches have been successfully applied
KO = 29% (wKO*10 data points = 80; compare eq. 7 and Table 1),
to network reconstruction before [31]. We carry out 100
KD = 21% (wKD*10 = 60), TC = 36% (wTC*100 = 100) and
reconstruction runs with different parameter settings (Table 1)
MF = 14% (wMF*10 = 40). While the combination of KO+KD
and random seeds. Ranking is based on the effect prediction
accounts for half of the total dataset weights, the largest individual
confidence calculated as the fraction of networks that included the
portion stems from the TC data.
given effect. This automated approach was the same for each of
the submitted nets. No manual processing was performed. For the
visualization and description of effects or networks, we assume an DREAM4 evaluation results
effect to be predicted if the prediction confidence is 50% or above. The overall results of the in silico size ten challenge as reported
by the DREAM organizers are depicted in Fig. 7. The network
topology was predicted by 29 different teams. In terms of the
Results
AUPR, our PNFL based reconstruction approach (81% AUPR
Size of the model space averaged over 5 networks) outperformed the second best team by
The number of possible models m depends on the number of 20 percentage points. Our approach performed best on four of the
genes g = 10, the number of time courses tc = 5, the number of rule five networks and second best on the remaining network. In an
tables r = 6 (Fig. 3) and the number of combination operators additional challenge, steady state gene levels in response to double
|op| = 3 (eq. 4). The number of models m depends on the number knockout mutations were predicted. This evaluated the ability to
of time courses tc because each time course introduces an predict the behavior of networks under previously unseen
additional perturbation variable. As we do not restrict the number experimental conditions. Only 7 teams participated in the double
of effectors, a gene can be affected by zero, one or up to knockout predictions (Fig. 7B) where PNFL also was the top
n = g21+tc = 14 variables, i.e. 9 other genes (as self interactions performer.
were not allowed) and 5 perturbation variables (eq. 6).
Reconstruction of network 5
" #g
n
Our reconstruction of network 5 (Fig. 8A) achieved an AUPR of
X n :k
m~ 1zn:rzDopD: r ð9Þ 76%. The panels B and C in Fig. 8 compare the provided data
k~2
k (DREAM) to the PNFL simulation for the knockout of gene 8.
Genes up (e.g. gene 7) or down regulated (e.g. gene 1) are captured
In the given setting, the size of the model space is 1.2*10123. Thus, correctly in the PNFL simulation. To simplify the representation
a heuristic search strategy is necessary to detect high scoring of networks, transitions and the corresponding output places
networks. (compare Fig. 1) are merged into single nodes depicted as
hexagons.
Reconstruction run time Network 5 demonstrates the utility of the multifactorial data
The most time expensive steps are the simulations needed to (Fig. 9) for network reconstruction. According to personal
calculate the objective function after each move. Each move communication at the joint RECOMB/DREAM conference
requires 35 simulations, i.e. 5 time courses, 10 knockouts, 10 2009, several participants neglected to utilize this kind of data.
knockdowns and 10 multifactorials. A typical reconstruction run The four-gene cycle (genes 5R6R8R7R5, Fig. 8A) in network 5
consists of 2500 moves (1ms per move and network) on a is an example for a difficult network motif that our approach
population of 25 individual networks and takes about a minute on predicts correctly only if the multifactorial data is included.
Figure 9. Generation of multifactorial (MF) data for an effect in network 5. In network 5, gene 6 is the only effector for gene 8 (see Fig. 8).
Effectors are initialized by the provided MF gene levels (A). Subsequently, individual PNFL transitions are applied to compute the MF gene levels for
the targets (C). The objective function compares the target gene levels of the provided MF data (B) to the PNFL outputs (C).
doi:10.1371/journal.pone.0012807.g009
Incorrect predictions were more likely when the effector gene surplus effect (here: 5R9). Such a missing observation can for
levels were low in the wild type (e.g. genes 4, 5, 6 and 9 in network instance be due to knockouts or knockdowns exhibiting no
5). Here, predictions frequently contain shortcuts with respect to substantial effect because of low wild type gene levels.
the true topology (Fig. 8, correct: 5R6R9, predicted 6r5R9;
correct: 9R1R2, predicted: 1r9R2; see also Fig. 10, correct: Reconstruction of network 1
9R10R3, predicted: 10r9R3). This leads to two errors: As the The reconstruction of network 1 (Fig. 10A) achieved a very high
effect 6R9 can not be directly observed in the given data it is AUPR of 92%. Here, we predicted 14 out of 15 effects correctly.
missed as it is already ‘explained’ by an incorrectly predicted For a correct reproduction of time course data (e.g. time course 2
in Fig. 10, compare panels B and C) we also infer perturbation
target genes. According to our reconstruction, the perturbation p2
in time course 2 affects genes 3 and 7.
Network 1 was selected to demonstrate the capability of PNFL
to represent oscillating network motifs. Oscillations require cycles
that seem to pose no particular difficulty for the PNFL based
reconstruction. Each of the three nested cycles contained in
network 1 (genes 3«4, 3«7, 3R7R4R3) was resolved correctly.
In addition, genes 3, 4 and 7 were recognized as an oscillation
generating network motif. The removal of the perturbation
triggers oscillations for instance in gene 7, which was picked up
clearly in the PNFL simulation (Fig. 10, panels B and C).
time courses thus required the prediction of the targets of a low wild type expression, over-expression instead of knockout
perturbation (see Time course data). The evaluation of our experiments should be performed.
prediction performance on inferring the time course perturbation Several of the participating teams focused on the knockout (KO)
targets resulted in an AUPR of 73%. The performance difference datasets and neglected to exploit the time course (TC),
to the prediction of effector targets (AUPR of 81%) is due to the multifactorial (MF) and knockdown (KD) data in their recon-
fact that each perturbation corresponds to a single time course. struction (personal communication at the joint RECOMB/
The remaining four time courses (and all of the KO, KD and MF DREAM conference 2009). We found that only the combination
datasets) do not provide any information with regard to the targets of all provided datasets enabled us to predict particularly difficult
of a selected perturbation. network motifs. An example is the unusual four-node cycle in
Fig. 8A that is predicted correctly only when using the MF data
Discussion (Fig. 9). In general, cycles and nested cycles pose no particular
difficulty to our PNFL based approach (e.g. Fig. 10A). The time
We presented a method for network reconstruction that uses
course shown in Fig. 10 demonstrates that our reconstruction also
Petri Nets with Fuzzy Logic (PNFL) for modeling and simulation.
resolves and recognizes oscillating network motifs.
This approach was the best performer (Fig. 7) in the in silico size ten
challenge of the 2009 DREAM4 assessment of reverse engineering The reconstruction of PNFL models reliably determines a range
methods. Why did it work so well? of mechanistic details that go beyond the graph topology evaluated
Our approach optimizes models to achieve the best possible in DREAM. Our models distinguish activation from inhibition,
agreement between PNFL generated datasets and the datasets dependent from independent regulation as well as strong, medium
provided in the DREAM4 challenges. To get the most out of the and weak degrees of effect strength. Such intuitive assertions are
data, we employ specific simulation approaches for each of the sufficient to specify, visualize and thus comprehend executable
available datasets. This allows us to exploit and score heteroge- models and their parameters. This is a characteristic feature of
neous datasets in a unified way. We further reduce the model fuzzy logic modeling [18]. Similarly intuitive notions are more
complexity severely to avoid the risk of overfitting. Ideally, only a difficult if not impossible to obtain from ODE, mutual information
single network should be able to reproduce the data. The model or Bayesian models. Nevertheless, both PNFL and ODE enable
space is still huge, requiring a heuristic, population based search the detailed simulation of models. Simulation models can facilitate
strategy. It avoids local minima traps and thus improves the an iterative cycle of model improvements based on the comparison
convergence of networks and also the agreement between PNFL between in silico and laboratory experiments.
and DREAM datasets. The resulting PNFL models accurately
predict the network behavior even under new experimental Acknowledgments
conditions not seen during model building. This was demonstrated
We acknowledge Florian Erhard for the stimulating discussions on the
in the double knockout challenge (Fig. 7B). PNFL system. We thank all reviewers for their suggestions, which
Incorrect predictions might result when the effector gene levels substantially improved the manuscript.
are low in the wild type. Knockout experiments, for instance,
provide only little topological information in such cases. This is
Author Contributions
particularly frequent in network 2 (data not shown) where different
network topologies generate similar data and our reconstruction Conceived and designed the experiments: RK TP LW RZ. Performed the
does not converge to a single network. Indeed, no team achieved a experiments: RK. Analyzed the data: RK TP LW RZ. Wrote the paper:
good prediction performance for network 2. In case of genes with RK. Implemented the software: RK.
References
1. de Jong H (2002) Modeling and simulation of genetic regulatory systems: a 14. Hache H, Lehrach H, Herwig R (2009) Reverse Engineering of Gene
literature review. J Comput Biol 9(1): 67–103. Regulatory Networks: A Comparative Study. EURASIP J Bioinform Syst Biol
2. Brazhnik P, de la Fuente A, Mendes P (2002) Gene networks: how to put the 2009: 617281.
function in genomics. Trends Biotechnol 20(11): 467–72. 15. Michoel T, De Smet R, Joshi A, Van de Peer Y, Marchal K (2009) Comparative
3. Bansal M, Belcastro V, Ambesi-Impiombato A, di Bernardo D (2007) How to analysis of module-based versus direct methods for reverse-engineering
infer gene networks from expression profiles. Mol Syst Biol 3: 78. transcriptional regulatory networks. BMC Syst Biol 3: 49.
4. Markowetz F, Spang R (2007) Inferring cellular networks–a review. BMC 16. Zou C, Denby KJ, Feng J (2009) Granger causality vs. dynamic Bayesian
Bioinformatics 8 Suppl 6: S5. network inference: a comparative study. BMC Bioinformatics 10: 122.
5. Li H, Xuan J, Wang Y, Zhan M (2008) Inferring regulatory networks. Front 17. Marbach D, Prill RJ, Schaffter T, Mattiussi C, Floreano D, et al. (2010)
Biosci 13: 263–75. Revealing strengths and weaknesses of methods for gene network inference. Proc
6. Hecker M, Lambeck S, Toepfer S, van Someren E, Guthke R (2008) Gene Natl Acad Sci U S A 107(14): 6286–91.
regulatory network inference: data integration in dynamic models-a review. 18. Windhager L, Zimmer R (2008) Intuitive Modeling of Dynamic Systems with
Biosystems 96(1): 86–103. Petri Nets and Fuzzy Logic. German Conference on Bioinformatics, Lecture
7. Sima C, Hua J, Jung S (2009) Inference of gene regulatory networks using time- Notes in Informatics P-136: 106–115.
series data: a survey. Curr Genomics 10(6): 416–29. 19. Prill RJ, Marbach D, Saez-Rodriguez J, Sorger PK, Alexopoulos LG, et al.
8. de la Fuente A, Brazhnik P, Mendes P (2002) Linking the genes: inferring (2010) Towards a rigorous assessment of systems biology models: the DREAM3
quantitative gene networks from microarray data. Trends Genet 18(8): 395–8. challenges. PLoS One 5(2): e9202.
9. Gardner TS, di Bernardo D, Lorenz D, Collins JJ (2003) Inferring genetic 20. Marbach D, Schaffter T, Mattiussi C, Floreano D (2009) Generating realistic in
networks and identifying compound mode of action via expression profiling. silico gene networks for performance assessment of reverse engineering methods.
Science 301(5629): 102–5. J Comput Biol 16(2): 229–39.
10. Nachman I, Regev A, Friedman N (2004) Inferring quantitative models of 21. Sackmann A, Heiner M, Koch I (2006) Application of Petri net based analysis
regulatory networks from expression data. Bioinformatics 20 Suppl 1: i248–56. techniques to signal transduction pathways. BMC Bioinformatics 7: 482.
11. Margolin A, Nemenman I, Basso K, Wiggins C, Stolovitzky G, et al. (2006) 22. Heiner M, Koch I, Will J (2004) Model validation of biological pathways using
ARACNE: An Algorithm for the Reconstruction of Gene Regulatory Networks Petri nets–demonstrated for apoptosis. Biosystems 75(1–3): 15–28.
in a Mammalian Cellular Context. BMC Bioinformatics 7(Suppl 1): S7. 23. Chen L, Qi-Wei G, Nakata M, Matsuno H, Miyano S (2007) Modelling and
12. Friedman N, Linial M, Nachman I, Pe’er D (2000) Using Bayesian networks to simulation of signal transductions in an apoptosis pathway by using timed Petri
analyze expression data. Journal of Computational Biology 7(3): 601–620. nets. Journal of Biosciences 32(1): 113–127.
13. Soranzo N, Bianconi G, Altafini C (2007) Comparing association network 24. Marwan W, Wagler A, Weismantel R (2008) A mathematical approach to solve
algorithms for reverse engineering of large-scale gene regulatory networks: the network reconstruction problem. Mathematical Methods of Operations
synthetic versus real data. Bioinformatics 23(13): 1640–7. Research 67(1): 117–132.
25. Murata T (1989) Petri nets: Properties, analysis and applications. Proceedings of 29. Mendel LM (1995) Fuzzy logic systems for engineering: a tutorial. Proceedings
the IEEE 77(4): 541–580. of the IEEE 83(3): 345–377.
26. Chaouiya C (2007) Petri net modelling of biological networks. Brief Bioinfor- 30. Istrail S, Davidson EH (2005) Logic functions of the genomic cis-regulatory
matics 8(4): 210–219. code. Proc Natl Acad Sci U S A 102(14): 4954–9.
27. Matsuno H, Tanaka Y, Aoshima H, Doi A, Matsui M, et al. (2003) Biopathways 31. Marbach D, Mattiussi C, Floreano D (2009) Combining multiple results of a
representation and simulation on hybrid functional Petri net. In Silico Biol 3(3): reverse-engineering algorithm: application to the DREAM five-gene network
389–404. challenge. Ann N Y Acad Sci 1158: 102–13.
28. Zadeh LA (1965) Fuzzy sets. Information and Control 8: 338–353.