Results 1 - 10
of
105
Verification of analog and mixed-signal circuits using hybrid systems techniques
- IN FMCAD, LNCS
, 2004
"... In this paper we demonstrate a potential extension of formal verification methodology in order to deal with time-domain properties of analog and mixed-signal circuits whose dynamic behavior is described by differential algebraic equations. To model and analyze such circuits under all possible inpu ..."
Abstract
-
Cited by 49 (6 self)
- Add to MetaCart
) and apply it to a biquad low-pass filter. To analyze more complex circuits, we resort to bounded horizon verification. We use optimal control techniques to check whether a ∆-Σ modulator, modeled as a discrete-time hybrid automaton, admits an input sequence of bounded length that drives it to saturation. 1
Design, Verification
"... In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications suffi-cient to describe a wide range of properties including safety, stability, progress, obligation, response and guarantee. The resulting embedded control software consists of a goal ..."
Abstract
- Add to MetaCart
In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications suffi-cient to describe a wide range of properties including safety, stability, progress, obligation, response and guarantee. The resulting embedded control software consists of a
Algorithms, Verification
"... This work is concerned with the computation of probabilis-tic invariance (or safety) over a finite horizon for mixed deterministic-stochastic, discrete-time processes over a con-tinuous state space. The models of interest are made up of two sets of (possibly coupled) variables: the first set of vari ..."
Abstract
- Add to MetaCart
This work is concerned with the computation of probabilis-tic invariance (or safety) over a finite horizon for mixed deterministic-stochastic, discrete-time processes over a con-tinuous state space. The models of interest are made up of two sets of (possibly coupled) variables: the first set
COMMENT On horizons and the cosmic landscape
, 2006
"... Susskind claims in his recent book The Cosmic Landscape that evidence for the existence and nature of ‘pocket universes ’ in a multiverse would be available in the detailed nature of the Cosmic Blackbody Background Radiation that constantly bathes all parts of our observable universe. I point out th ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
that acceptance of the complex chain of argument involved does not imply possible experimental verification of multiverses at the present time. Rather this claim relates only to theoretically possible observations in the very far future of the universe. A recent book by Susskind [1] presents interesting arguments
Applet Verification Strategies for
"... 1 Introduction The Java Card architecture for smart cards [2] allows new applications, called applets, to be downloaded into smart-cards. While bringing considerable flexibility and extending the horizons of smart-card usage this post issuance feature raises major security issues. Upon their loading ..."
Abstract
- Add to MetaCart
1 Introduction The Java Card architecture for smart cards [2] allows new applications, called applets, to be downloaded into smart-cards. While bringing considerable flexibility and extending the horizons of smart-card usage this post issuance feature raises major security issues. Upon
Pseudospectral Methods for InfiniteHorizon Nonlinear Optimal
- Control Problems,” AIAA Guidance, Navigation, and Control Conference, AIAA
, 2005
"... A central computational issue in solving infinite-horizon nonlinear optimal control problems is the treatment of the horizon. In this paper, we directly address this issue by a domain transformation technique that maps the infinite horizon to a finite horizon. The transformed finite horizon serves a ..."
Abstract
-
Cited by 20 (6 self)
- Add to MetaCart
A central computational issue in solving infinite-horizon nonlinear optimal control problems is the treatment of the horizon. In this paper, we directly address this issue by a domain transformation technique that maps the infinite horizon to a finite horizon. The transformed finite horizon serves
Safety Verification for Linear Systems
"... An embedded software controller is safe if the composition of the controller and the plant does not reach any unsafe state starting from legal initial states (in an unbounded time hori-zon). Linear systems – specified using linear ordinary differ-ential or difference equations – form an important cl ..."
Abstract
- Add to MetaCart
An embedded software controller is safe if the composition of the controller and the plant does not reach any unsafe state starting from legal initial states (in an unbounded time hori-zon). Linear systems – specified using linear ordinary differ-ential or difference equations – form an important
Applet Verification Strategies for RAM-Constrained Devices
- In Pil Joong Lee and Chae Hoon Lim, editors, Lecture Notes in Computer Science, volume 77 2587
, 2003
"... While bringing considerable flexibility and extending the horizons of mobile computing, mobile code raises major security issues. ..."
Abstract
- Add to MetaCart
While bringing considerable flexibility and extending the horizons of mobile computing, mobile code raises major security issues.
Optimal Multi-Modes Switching Problem in Infinite Horizon
, 2009
"... This paper studies the problem of the deterministic version of the Verification Theorem for the optimal m-states switching in infinite horizon under Markovian framework with arbitrary switching cost functions. The problem is formulated as an extended impulse control problem and solved by means of pr ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
This paper studies the problem of the deterministic version of the Verification Theorem for the optimal m-states switching in infinite horizon under Markovian framework with arbitrary switching cost functions. The problem is formulated as an extended impulse control problem and solved by means
Applet Verification Strategies for RAM-Constrained Devices
, 2003
"... While bringing considerable exibility and extending the horizons of mobile computing, mobile code raises major security issues. Hence, mobile code, such as Jave applets... ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
While bringing considerable exibility and extending the horizons of mobile computing, mobile code raises major security issues. Hence, mobile code, such as Jave applets...
Results 1 - 10
of
105