• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,075
Next 10 →

UPPAAL in a Nutshell

by Kim G. Larsen, Paul Pettersson, Wang Yi , 1997
"... . This paper presents the overall structure, the design criteria, and the main features of the tool box Uppaal. It gives a detailed user guide which describes how to use the various tools of Uppaal version 2.02 to construct abstract models of a real-time system, to simulate its dynamical behavior, ..."
Abstract - Cited by 662 (51 self) - Add to MetaCart
, to specify and verify its safety and bounded liveness properties in terms of its model. In addition, the paper also provides a short review on case-studies where Uppaal is applied, as well as references to its theoretical foundation. 1 Introduction Uppaal is a tool box for modeling, simulation

On optimal control of Markov chains with safety constraint

by Shun-pin Hsu, Ari Arapostathis, Ratnesh Kumar - In Proc. of American Control Conference , 2006
"... Abstract — We study the control of completely observed Markov chains with safety bounds as introduced in [3], but with more general safety constraints and the added requirement of optimality. In [3], the safety bounds were specified as unit-interval valued vector pairs (lower and upper bounds for ea ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — We study the control of completely observed Markov chains with safety bounds as introduced in [3], but with more general safety constraints and the added requirement of optimality. In [3], the safety bounds were specified as unit-interval valued vector pairs (lower and upper bounds

Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements

by Donald Firesmith - Swiss Federal Institute of Technology (ETH , 2004
"... As software-intensive systems become more pervasive, more and more safety-critical systems are being developed. In this column, I will use the concept of a quality model to define safety as a quality factor. Thus, safety (like security and survivability) is a kind of defensibility, which is a kind o ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
of dependability, which is a kind of quality. Next, I discuss the structure of quality requirements and show how safety requirements can be engineered based on safety’s numerous quality subfactors. Then, I define and discuss safety constraints (i.e., mandated safeguards) and safety-critical requirements (i

GROUP-BASED SAFETY CONSTRAINTS DESCRIPTION OF AN INTERSECTION

by Boillot Florence
"... Traffic lights have been existing for around 100 years. The first signals were installed for safety reasons for avoiding accident between opposed traffic flows at an intersection. Due to a continually increasing traffic, the traffic lights became a powerful tool for controlling the flows: the stake ..."
Abstract - Add to MetaCart
Traffic lights have been existing for around 100 years. The first signals were installed for safety reasons for avoiding accident between opposed traffic flows at an intersection. Due to a continually increasing traffic, the traffic lights became a powerful tool for controlling the flows: the stake

Dynamic Safety Constraints by Scenario Based Economic Model Predictive Control?

by unknown authors
"... Abstract: This paper studies use of scenario based model predictive control (MPC) to control a plant into a fault-tolerant state set. For some systems it is not always sucient that the controller is recongured after a fault, it is also necessary that the system is in a given state set when the fault ..."
Abstract - Add to MetaCart
the fault occurs in order to guarantee that the constraints are not violated. This is often achieved by using static safety constraints. However, it may be hard to nd such constraints, and they may be conservative. This article presents a method for implementing dynamic safety constraints based on fault

Exploiting Safety Constraints in Fuzzy Self-Organising Maps for Safety Critical Applications

by Zeshan Kurd, Tim P. Kelly, Jim Austin - in 5th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'04 , 2004
"... Abstract. This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon the Fuzzy Self-Organising Map (FSOM) and enables behaviour to be described qualitatively and quantitatively. By ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
. By harnessing these desirable features, behaviour is bounded through incorporation of safety constraints – derived from safety requirements and hazard analysis. The constrained FSOM has been termed a ‘Safety Critical Artificial Neural Network’ (SCANN) and preserves valuable performance characteristics

Inferring and Applying Safety Constraints to Guide an Ensemble of Planners for Airspace Deconfliction

by Antons Rebguns, Derek Green, Geoffrey Levine, Ugur Kuter, Diana Spears
"... This paper presents a Bayesian approach to learning flexible safety constraints in a coordinated, multi-planner ensemble, along with stochastic and active experimentation approaches for assigning degrees of blame when these constraints are violated. The blame is subsequently translated and conveyed ..."
Abstract - Cited by 4 (4 self) - Add to MetaCart
This paper presents a Bayesian approach to learning flexible safety constraints in a coordinated, multi-planner ensemble, along with stochastic and active experimentation approaches for assigning degrees of blame when these constraints are violated. The blame is subsequently translated and conveyed

Software approach to hazard detection using on-line analysis of safety constraints

by Beth Schroeder, Sudhir Aggarwal, Karsten Schwan - In Proceedings 16th Symposium on Reliable and Distributed Systems SRDS97 , 1997
"... Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper addresses the problem of hazard detection through the development of an on-line analysis tool. The approach allows the user ..."
Abstract - Cited by 14 (5 self) - Add to MetaCart
Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper addresses the problem of hazard detection through the development of an on-line analysis tool. The approach allows the user

Optimization of a semi-batch reaction system under safety constraints

by O. Ubrich, B. Srinivasan, F. Stoessel, D. Bonvin - In: European Control Conference , 1999
"... Process optimization, Safety considerations. Maximizing the yield of a second-order reaction by manipulating the inlet flow rate is considered in both the isoperibolic and isothermal modes. For safety considerations, constraints on (i) the amount of heat produced, and (ii) the temperature under cool ..."
Abstract - Cited by 7 (5 self) - Add to MetaCart
Process optimization, Safety considerations. Maximizing the yield of a second-order reaction by manipulating the inlet flow rate is considered in both the isoperibolic and isothermal modes. For safety considerations, constraints on (i) the amount of heat produced, and (ii) the temperature under

Memoryless control design for persistent surveillance under safety constraints

by Eduardo Arvelo, Eric Kim, Nuno C. Martins , 2012
"... This paper deals with the design of time-invariant memoryless control policies for robots that move in a finite two-dimensional lattice and are tasked with persistent surveillance of an area in which there are forbidden regions. We model each robot as a controlled Markov chain whose state comprises ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
This paper deals with the design of time-invariant memoryless control policies for robots that move in a finite two-dimensional lattice and are tasked with persistent surveillance of an area in which there are forbidden regions. We model each robot as a controlled Markov chain whose state comprises its position in the lattice and the direction of motion. The goal is to find the minimum number of robots and an associated time-invariant memoryless control policy that guarantees that the largest number of states are persistently surveilled without ever visiting a forbidden state. We propose a design method that relies on a finitely parametrized convex program inspired by entropy maximization principles. Numerical examples are provided.
Next 10 →
Results 1 - 10 of 2,075
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University