1 On Generating Safe Controllers for Discrete-Time Linear Systems By Adam Cataldo EE 290N Project UC Berkeley December 10, 2004 unsafe state disable this.

Slides:



Advertisements
Similar presentations
The Quest for Correctness Joseph Sifakis VERIMAG Laboratory 2nd Sogeti Testing Academy April 29th 2009.
Advertisements

Modeling Software Systems Lecture 2 Book: Chapter 4.
1 October 16 th, 2009 Meaning to motion: Transforming specifications to provably-correct control Hadas Kress-Gazit Cornell University George Pappas University.
Translation-Based Compositional Reasoning for Software Systems Fei Xie and James C. Browne Robert P. Kurshan Cadence Design Systems.
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
Temporal Logic and the NuSMV Model Checker CS 680 Formal Methods Jeremy Johnson.
Hybrid Systems Presented by: Arnab De Anand S. An Intuitive Introduction to Hybrid Systems Discrete program with an analog environment. What does it mean?
Supervisory Control of Hybrid Systems Written by X. D. Koutsoukos et al. Presented by Wu, Jian 04/16/2002.
Model Checker In-The-Loop Flavio Lerda, Edmund M. Clarke Computer Science Department Jim Kapinski, Bruce H. Krogh Electrical & Computer Engineering MURI.
Model Checking Genetic Regulatory Networks with Parameter Uncertainty Grégory Batt, Calin Belta, Ron Weiss HSCC 2007 Presented by Spring Berman ESE :
Verification of Hybrid Systems An Assessment of Current Techniques Holly Bowen.
ECE 720T5 Fall 2012 Cyber-Physical Systems Rodolfo Pellizzoni.
August Moscow meeting1August Moscow meeting1August Moscow meeting11 Deductive tools in insertion modeling verification A.Letichevsky.
Possibilistic and probabilistic abstraction-based model checking Michael Huth Computing Imperial College London, United Kingdom.
EECS 20 Lecture 38 (April 27, 2001) Tom Henzinger Review.
Discrete Abstractions of Hybrid Systems Rajeev Alur, Thomas A. Henzinger, Gerardo Lafferriere and George J. Pappas.
Constraint Logic Programming Ryan Kinworthy. Overview Introduction Logic Programming LP as a constraint programming language Constraint Logic Programming.
Programming Language Semantics Denotational Semantics Chapter 5 Based on a lecture by Martin Abadi.
A denotational framework for comparing models of computation Daniele Gasperini.
1 8. Safe Query Languages Safe program – its semantics can be at least partially computed on any valid database input. Safety is tied to program verification,
Model Checking. Used in studying behaviors of reactive systems Typically involves three steps: Create a finite state model (FSM) of the system design.
Lecture 4&5: Model Checking: A quick introduction Professor Aditya Ghose Director, Decision Systems Lab School of IT and Computer Science University of.
Modeling Software Systems Lecture 2 Book: Chapter 4.
Temporal Logic of Actions (TLA) Leslie Lamport
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Embedded Systems Laboratory Department of Computer and Information Science Linköping University Sweden Formal Verification and Model Checking Traian Pop.
Interfaces for Control Components Rajeev Alur University of Pennsylvania Joint work with Gera Weiss (and many others)
1 Collision Avoidance Systems: Computing Controllers which Prevent Collisions By Adam Cataldo Advisor: Edward Lee Committee: Shankar Sastry, Pravin Varaiya,
ESE601: Hybrid Systems Introduction to verification Spring 2006.
Rosetta Functional Specification Domains Perry Alexander EECS Department / ITTC The University of Kanasas.
Automata and Formal Lanugages Büchi Automata and Model Checking Ralf Möller based on slides by Chang-Beom Choi Provable Software Lab, KAIST.
1 Formal Engineering of Reliable Software LASER 2004 school Tutorial, Lecture1 Natasha Sharygina Carnegie Mellon University.
Programming Language Semantics Denotational Semantics Chapter 5 Part III Based on a lecture by Martin Abadi.
MOBIES Project Progress Report Engine Throttle Controller Design Using Multiple Models of Computation Edward Lee Haiyang Zheng with thanks to Ptolemy Group.
Mahapatra-Texas A&M-Fall'001 Codesign Framework Parts of this lecture are borrowed from lectures of Johan Lilius of TUCS and ASV/LL of UC Berkeley available.
EECS 20 Lecture 36 (April 23, 2001) Tom Henzinger Safety Control.
Real-Time System Requirements & Design Specs Shaw - Chapters 3 & 4 Homework #2: 3.3.1, 3.4.1, Add Error states to Fig 4.1 Lecture 4/17.
The Model Checker SPIN Written by Gerard J. Holzmann Presented by Chris Jensen.
Abstract Verification is traditionally done by determining the truth of a temporal formula (the specification) with respect to a timed transition system.
Model Checking LTL over (discrete time) Controllable Linear System is Decidable P. Tabuada and G. J. Pappas Michael, Roozbeh Ph.D. Course November 2005.
Antoine Girard VAL-AMS Project Meeting April 2007 Behavioral Metrics for Simulation-based Circuit Validation.
Approximation Metrics for Discrete and Continuous Systems Antoine Girard and George J. Pappas VERIMAG Workshop.
02/06/05 “Investigating a Finite–State Machine Notation for Discrete–Event Systems” Nikolay Stoimenov.
Verification technique on SA applications using Incremental Model Checking 컴퓨터학과 신영주.
Cheng/Dillon-Software Engineering: Formal Methods Model Checking.
A Decidable Recursive Logic for Weighted Transition Systems Bingtian Xue Aalborg University, DENMARK ICTAC, Sep 18, 2014 Joint work with Kim G. Larsen.
ECE 720T5 Winter 2014 Cyber-Physical Systems Rodolfo Pellizzoni.
Model-based Analysis and Implementation of Embedded Systems
Testing Theory cont. Introduction Categories of Metrics Review of several OO metrics Format of Presentation CEN 5076 Class 6 – 10/10.
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
Pattern-directed inference systems
Handling Mixed-Criticality in SoC- based Real-Time Embedded Systems Rodolfo Pellizzoni, Patrick Meredith, Min-Young Nam, Mu Sun, Marco Caccamo, Lui Sha.
CS 395T Game-Based Verification of Contract Signing Protocols.
1 CSEP590 – Model Checking and Automated Verification Lecture outline for August 6, 2003.
Recognizing safety and liveness Presented by Qian Huang.
Verification & Validation By: Amir Masoud Gharehbaghi
Constraints Assisted Modeling and Validation Presented in CS294-5 (Spring 2007) Thomas Huining Feng Based on: [1]Constraints Assisted Modeling and Validation.
BART VANLUYTEN, JAN C. WILLEMS, BART DE MOOR 44 th IEEE Conference on Decision and Control December 2005 Model Reduction of Systems with Symmetries.
Symbolic Algorithms for Infinite-state Systems Rupak Majumdar (UC Berkeley) Joint work with Luca de Alfaro (UC Santa Cruz) Thomas A. Henzinger (UC Berkeley)
1 CSEP590 – Model Checking and Automated Verification Lecture outline for July 9, 2003.
1 Temporal logic. 2 Prop. logic: model and reason about static situations. Example: Are there truth values that can be assigned to x,y simultaneously.
Model Checking Lecture 1. Model checking, narrowly interpreted: Decision procedures for checking if a given Kripke structure is a model for a given formula.
Presented by: Belgi Amir Seminar in Distributed Algorithms Designing correct concurrent algorithms Spring 2013.
Today’s Agenda  Quiz 4  Temporal Logic Formal Methods in Software Engineering1.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures Krishnendu Chatterjee Pallab Dasgupta P.P. Chakrabarti IWDC 2004,
Deadlock Freedom by Construction
Modeling Mutual Exclusion Algorithms
Introduction to verification
2.3 Properties of Linear Time-Invariant Systems
Presentation transcript:

1 On Generating Safe Controllers for Discrete-Time Linear Systems By Adam Cataldo EE 290N Project UC Berkeley December 10, 2004 unsafe state disable this transition

Cataldo 2 Talk Outline Research Question Background –Transition Systems –Discrete-Time Systems Relation Between Models of Computation Future Directions/Conclusions

Cataldo 3 The Question For what discrete-time linear systems can I compute a controller which will guarantee a safety constraint? –Safety constraint specified as a linear temporal logic constraint over the state space –I must have a method to compute the desired controller or know that no such controller exits

Transition Systems: A Concurrent Model of Computation The set of tags is T = {0, 1, 2, …}

Cataldo 5 Behavior Initialized runs: Language (Behavior):

Cataldo 6 Fixed-Point Computation of the Language Computing the set of all initialized runs: F is monotonic and Knowing the set of all initialized runs gives us the language

Cataldo 7 Composing Transition Systems

Cataldo 8 Simulation If there are simulation relations from P 2 to P 1 and P 1 to P 2, then P 1 and P 2 are bisimilar and L(P 1 ) = L(P 2 )

Cataldo 9 Linear Temporal Logic Given a set of predicates P over the set of values, we are interested in enforcing certain time-dependent safety properties Example: w always satisfies predicate p We can use linear temporal logic express these properties When we have finite number of states, we can compute a “controller” whose composition with our system enforces these constraints

A Discrete-Time, Real-Valued Concurrent Model of Computation This is actually a special class of discrete- time, real-valued systems (LTI)

Cataldo 11 Feedback Composition Feedback composition holds if (I – BH) and (I – FD) are invertible

Cataldo 12 Feedback Composition Equivalent system: We can start with initial values to compute fixed-point behavior

Cataldo 13 Another Feedback Composition The following feedback system also makes a valid composition: Our problem is to design f to make x satisfy a safety property

Cataldo 14 Discrete-Time Systems as Transition Systems We will be interested in the case where V is finite

A Nice Result (Tabuada, Pappas) V is a finite partition of W

A Nice Result (Tabuada, Pappas) There exists a bisimilar transition system to P with a finite number of states We can compute c by first computing a controller for the finite-state system