• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 105
Next 10 →

Verification of analog and mixed-signal circuits using hybrid systems techniques

by Thao Dang, Alexandre Donzé, Oded Maler - IN FMCAD, LNCS , 2004
"... In this paper we demonstrate a potential extension of formal verification methodology in order to deal with time-domain properties of analog and mixed-signal circuits whose dynamic behavior is described by differential algebraic equations. To model and analyze such circuits under all possible inpu ..."
Abstract - Cited by 49 (6 self) - Add to MetaCart
) and apply it to a biquad low-pass filter. To analyze more complex circuits, we resort to bounded horizon verification. We use optimal control techniques to check whether a ∆-Σ modulator, modeled as a discrete-time hybrid automaton, admits an input sequence of bounded length that drives it to saturation. 1

Design, Verification

by Ufuk Topcu, Richard M. Murray
"... In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications suffi-cient to describe a wide range of properties including safety, stability, progress, obligation, response and guarantee. The resulting embedded control software consists of a goal ..."
Abstract - Add to MetaCart
In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications suffi-cient to describe a wide range of properties including safety, stability, progress, obligation, response and guarantee. The resulting embedded control software consists of a

Algorithms, Verification

by Sadegh Esmaeil, Zadeh Soudjani, Alessandro Abate
"... This work is concerned with the computation of probabilis-tic invariance (or safety) over a finite horizon for mixed deterministic-stochastic, discrete-time processes over a con-tinuous state space. The models of interest are made up of two sets of (possibly coupled) variables: the first set of vari ..."
Abstract - Add to MetaCart
This work is concerned with the computation of probabilis-tic invariance (or safety) over a finite horizon for mixed deterministic-stochastic, discrete-time processes over a con-tinuous state space. The models of interest are made up of two sets of (possibly coupled) variables: the first set

COMMENT On horizons and the cosmic landscape

by George F R Ellis, Cape Town, South Africa , 2006
"... Susskind claims in his recent book The Cosmic Landscape that evidence for the existence and nature of ‘pocket universes ’ in a multiverse would be available in the detailed nature of the Cosmic Blackbody Background Radiation that constantly bathes all parts of our observable universe. I point out th ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
that acceptance of the complex chain of argument involved does not imply possible experimental verification of multiverses at the present time. Rather this claim relates only to theoretically possible observations in the very far future of the universe. A recent book by Susskind [1] presents interesting arguments

Applet Verification Strategies for

by Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen, Gemplus Card International
"... 1 Introduction The Java Card architecture for smart cards [2] allows new applications, called applets, to be downloaded into smart-cards. While bringing considerable flexibility and extending the horizons of smart-card usage this post issuance feature raises major security issues. Upon their loading ..."
Abstract - Add to MetaCart
1 Introduction The Java Card architecture for smart cards [2] allows new applications, called applets, to be downloaded into smart-cards. While bringing considerable flexibility and extending the horizons of smart-card usage this post issuance feature raises major security issues. Upon

Pseudospectral Methods for InfiniteHorizon Nonlinear Optimal

by Fariba Fahroo, I. Michael Ross - Control Problems,” AIAA Guidance, Navigation, and Control Conference, AIAA , 2005
"... A central computational issue in solving infinite-horizon nonlinear optimal control problems is the treatment of the horizon. In this paper, we directly address this issue by a domain transformation technique that maps the infinite horizon to a finite horizon. The transformed finite horizon serves a ..."
Abstract - Cited by 20 (6 self) - Add to MetaCart
A central computational issue in solving infinite-horizon nonlinear optimal control problems is the treatment of the horizon. In this paper, we directly address this issue by a domain transformation technique that maps the infinite horizon to a finite horizon. The transformed finite horizon serves

Safety Verification for Linear Systems

by Parasara Sridhar Duggirala, Ashish Tiwari
"... An embedded software controller is safe if the composition of the controller and the plant does not reach any unsafe state starting from legal initial states (in an unbounded time hori-zon). Linear systems – specified using linear ordinary differ-ential or difference equations – form an important cl ..."
Abstract - Add to MetaCart
An embedded software controller is safe if the composition of the controller and the plant does not reach any unsafe state starting from legal initial states (in an unbounded time hori-zon). Linear systems – specified using linear ordinary differ-ential or difference equations – form an important

Applet Verification Strategies for RAM-Constrained Devices

by Gemplus Card International, Nils Maltesson, Nils Maltesson, David Naccache, David Naccache, Elena Trichina, Elena Trichina, Christophe Tymen, Christophe Tymen - In Pil Joong Lee and Chae Hoon Lim, editors, Lecture Notes in Computer Science, volume 77 2587 , 2003
"... While bringing considerable flexibility and extending the horizons of mobile computing, mobile code raises major security issues. ..."
Abstract - Add to MetaCart
While bringing considerable flexibility and extending the horizons of mobile computing, mobile code raises major security issues.

Optimal Multi-Modes Switching Problem in Infinite Horizon

by Brahim El Asri , 2009
"... This paper studies the problem of the deterministic version of the Verification Theorem for the optimal m-states switching in infinite horizon under Markovian framework with arbitrary switching cost functions. The problem is formulated as an extended impulse control problem and solved by means of pr ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
This paper studies the problem of the deterministic version of the Verification Theorem for the optimal m-states switching in infinite horizon under Markovian framework with arbitrary switching cost functions. The problem is formulated as an extended impulse control problem and solved by means

Applet Verification Strategies for RAM-Constrained Devices

by Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen , 2003
"... While bringing considerable exibility and extending the horizons of mobile computing, mobile code raises major security issues. Hence, mobile code, such as Jave applets... ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
While bringing considerable exibility and extending the horizons of mobile computing, mobile code raises major security issues. Hence, mobile code, such as Jave applets...
Next 10 →
Results 1 - 10 of 105
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University