Results 1 -
8 of
8
Trajectory Optimization in Convex Underapproximations of Safe Regions
"... Abstract — This paper discusses a computationally efficient method for optimizing aircraft trajectories in a two-aircraft conflict scenario, under a noncooperative setting. It is assumed that the future trajectory of the uncontrolled aircraft is unknown, but that deterministic input bounds are given ..."
Abstract
- Add to MetaCart
are given. Unsafe reachable sets are computed in a game theoretic framework to account for worst case behaviors. Overapproximations of the reachable sets are used as constraints in a convex trajectory optimization program at each time step. We prove the safety property of the optimization program
Using underapproximations for sparse nonnegative matrix factorization
- Pattern Recognition
, 2010
"... Nonnegative Matrix Factorization (NMF) has gathered a lot of attention in the last decade and has been successfully applied in numerous applications. It consists in the factorization of a nonnegative matrix by the product of two low-rank nonnegative matrices: M ≈ V W. In this paper, we attempt to so ..."
Abstract
-
Cited by 16 (5 self)
- Add to MetaCart
to solve NMF problems in a recursive way. In order to do that, we introduce a new variant called Nonnegative Matrix Underapproximation (NMU) by adding the upper bound constraint V W ≤ M. Besides enabling a recursive procedure for NMF, these inequalities make NMU particularly well-suited to achieve a sparse
Donut domains: Efficient non-convex domains for abstract interpretation
- VMCAI 2012
, 2012
"... Program analysis using abstract interpretation has been successfully applied in practice to find runtime bugs or prove software correct. Most abstract domains that are used widely rely on convexity for their scalability. However, the ability to express non-convex properties is sometimes required i ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
Program analysis using abstract interpretation has been successfully applied in practice to find runtime bugs or prove software correct. Most abstract domains that are used widely rely on convexity for their scalability. However, the ability to express non-convex properties is sometimes required
Generating and Analyzing Symbolic Traces of Simulink/Stateflow Models
"... Abstract. We present a methodology and a toolkit for improving simulation coverage of Simulink/Stateflow models of hybrid systems using symbolic analysis of simulation traces. We propose a novel instrumentation scheme that allows the simulation engine of Simulink/Stateflow to output, along with the ..."
Abstract
-
Cited by 18 (3 self)
- Add to MetaCart
. Such an analysis relies critically on the use of convex polyhedra to represent sets of states. However, the exponential complexity of the polyhedral operations implies that the performance of the analysis would degrade rapidly with the increasing size of the model and the simulation traces. We propose a new
A Case for Strongly Polynomial Time SubPolyhedral Scheduling Using Two-Variable-Per-Inequality Polyhedra
- In Second International Workshop on Polyhedral Compilation Techniques (IMPACT’12), in conjunction with HiPEAC’12
, 2012
"... We make a case for sub-polyhedral scheduling using (Unit-)Two-Variable-Per-Inequality or (U)TVPI Polyhedra. We empirically show that using general convex polyhedra leads to a scalability problem in a widely used polyhedral scheduler. We propose meth-ods in which polyhedral schedulers can beat the sc ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
We make a case for sub-polyhedral scheduling using (Unit-)Two-Variable-Per-Inequality or (U)TVPI Polyhedra. We empirically show that using general convex polyhedra leads to a scalability problem in a widely used polyhedral scheduler. We propose meth-ods in which polyhedral schedulers can beat
Fixed-Complexity Piecewise Ellipsoidal Representation of the Continual Reachability Set Based on Ellipsoidal Techniques
"... Abstract—In a previous paper we showed how the continual reachability set can be numerically computed using efficient max-imal reachability tools. The resulting set is in general arbitrarily shaped and in practice possibly non-convex. Here, we present a fixed-complexity piecewise ellipsoidal under-a ..."
Abstract
- Add to MetaCart
Abstract—In a previous paper we showed how the continual reachability set can be numerically computed using efficient max-imal reachability tools. The resulting set is in general arbitrarily shaped and in practice possibly non-convex. Here, we present a fixed-complexity piecewise ellipsoidal under-approximation
Specification-guided controller synthesis for linear systems and safe linear-time temporal logic
- Proceedings of the 16th international conference on Hybrid systems: computation and control
, 2013
"... In this paper we present and analyze a novel algorithm to synthesize controllers enforcing linear temporal logic speci-fications on discrete-time linear systems. The central step within this approach is the computation of the maximal con-trolled invariant set contained in a possibly non-convex safe ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
In this paper we present and analyze a novel algorithm to synthesize controllers enforcing linear temporal logic speci-fications on discrete-time linear systems. The central step within this approach is the computation of the maximal con-trolled invariant set contained in a possibly non-convex safe
Integer-Complete Synthesis for Bounded Parametric Timed Automata?
"... Abstract. Ensuring the correctness of critical real-time systems, involv-ing concurrent behaviors and timing requirements, is crucial. Parameter synthesis aims at computing dense sets of valuations for the timing re-quirements, guaranteeing a good behavior. However, in most cases, the emptiness prob ..."
Abstract
- Add to MetaCart
us to derive an underapproxima-tion in the form of linear constraints containing all the integer points ensuring reachability or unavoidability, and all the (non-necessarily inte-ger) convex combinations of these integer points, for general PTA with a bounded parameter domain. Our algorithms