3,939 research outputs found
Sciduction: Combining Induction, Deduction, and Structure for Verification and Synthesis
Even with impressive advances in automated formal methods, certain problems
in system verification and synthesis remain challenging. Examples include the
verification of quantitative properties of software involving constraints on
timing and energy consumption, and the automatic synthesis of systems from
specifications. The major challenges include environment modeling,
incompleteness in specifications, and the complexity of underlying decision
problems.
This position paper proposes sciduction, an approach to tackle these
challenges by integrating inductive inference, deductive reasoning, and
structure hypotheses. Deductive reasoning, which leads from general rules or
concepts to conclusions about specific problem instances, includes techniques
such as logical inference and constraint solving. Inductive inference, which
generalizes from specific instances to yield a concept, includes algorithmic
learning from examples. Structure hypotheses are used to define the class of
artifacts, such as invariants or program fragments, generated during
verification or synthesis. Sciduction constrains inductive and deductive
reasoning using structure hypotheses, and actively combines inductive and
deductive reasoning: for instance, deductive techniques generate examples for
learning, and inductive reasoning is used to guide the deductive engines.
We illustrate this approach with three applications: (i) timing analysis of
software; (ii) synthesis of loop-free programs, and (iii) controller synthesis
for hybrid systems. Some future applications are also discussed
A Novel SAT-Based Approach to the Task Graph Cost-Optimal Scheduling Problem
The Task Graph Cost-Optimal Scheduling Problem consists in scheduling a certain number of interdependent tasks onto a set of heterogeneous processors (characterized by idle and running rates per time unit), minimizing the cost of the entire process. This paper provides a novel formulation for this scheduling puzzle, in which an optimal solution is computed through a sequence of Binate Covering Problems, hinged within a Bounded Model Checking paradigm. In this approach, each covering instance, providing a min-cost trace for a given schedule depth, can be solved with several strategies, resorting to Minimum-Cost Satisfiability solvers or Pseudo-Boolean Optimization tools. Unfortunately, all direct resolution methods show very low efficiency and scalability. As a consequence, we introduce a specialized method to solve the same sequence of problems, based on a traditional all-solution SAT solver. This approach follows the "circuit cofactoring" strategy, as it exploits a powerful technique to capture a large set of solutions for any new SAT counter-example. The overall method is completed with a branch-and-bound heuristic which evaluates lower and upper bounds of the schedule length, to reduce the state space that has to be visited. Our results show that the proposed strategy significantly improves the blind binate covering schema, and it outperforms general purpose state-of-the-art tool
Progress in AI Planning Research and Applications
Planning has made significant progress since its inception in the 1970s, in terms both of the efficiency and sophistication of its algorithms and representations and its potential for application to real problems. In this paper we sketch the foundations of planning as a sub-field of Artificial Intelligence and the history of its development over the past three decades. Then some of the recent achievements within the field are discussed and provided some experimental data demonstrating the progress that has been made in the application of general planners to realistic and complex problems. The paper concludes by identifying some of the open issues that remain as important challenges for future research in planning
Determination of the adjoint state evolution for the efficient operation of a hybrid electric vehicle
To minimize the fuel consumption in hybrid electric vehicles, it is necessary to define a strategy for the management of the power flows within the vehicle. Under the assumption that the velocity to be developed by the vehicle is known a priori, this problem may be posed as a nonlinear optimal control problem with control and state constraints. We find the solution to this problem using the optimality conditions given by the Pontryagin Maximum Principle. This leads to boundary value problems that we solve using a software tool named PASVA4. On real time operation, the velocity to be developed by the vehicle is not known in advance. We show how the adjoint state obtained from the former problem may be used as a weighing factor, called ‘‘equivalent consumption’’. This weighing factor may be used to design suboptimal real time algorithms for power management.Fil: Perez, Laura Virginia. Universidad Nacional de Rio Cuarto. Facultad de Ingeniería. Grupo de Electronica Aplicada; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: de Angelo, Cristian Hernan. Universidad Nacional de Rio Cuarto. Facultad de Ingeniería. Grupo de Electronica Aplicada; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Pereyra, Víctor. San Diego State University; Estados Unido
Controller Synthesis for Linear Time-varying Systems with Adversaries
We present a controller synthesis algorithm for a discrete time reach-avoid
problem in the presence of adversaries. Our model of the adversary captures
typical malicious attacks envisioned on cyber-physical systems such as sensor
spoofing, controller corruption, and actuator intrusion. After formulating the
problem in a general setting, we present a sound and complete algorithm for the
case with linear dynamics and an adversary with a budget on the total L2-norm
of its actions. The algorithm relies on a result from linear control theory
that enables us to decompose and precisely compute the reachable states of the
system in terms of a symbolic simulation of the adversary-free dynamics and the
total uncertainty induced by the adversary. With this decomposition, the
synthesis problem eliminates the universal quantifier on the adversary's
choices and the symbolic controller actions can be effectively solved using an
SMT solver. The constraints induced by the adversary are computed by solving
second-order cone programmings. The algorithm is later extended to synthesize
state-dependent controller and to generate attacks for the adversary. We
present preliminary experimental results that show the effectiveness of this
approach on several example problems.Comment: 10 pages 4 figures; under submission for revie
Affine Multiplexing Networks: System Analysis, Learning, and Computation
We introduce a novel architecture and computational framework for formal,
automated analysis of systems with a broad set of nonlinearities in the
feedback loop, such as neural networks, vision controllers, switched systems,
and even simple programs. We call this computational structure an affine
multiplexing network (AMN). The architecture is based on interconnections of
two basic conceptual building blocks: multiplexers (), and affine
transformations (). When attached together appropriately, these
building blocks translate to conjunctions and disjunctions of affine
statements, resulting in an encoding of the network into satisfiability modulo
theory (SMT), mixed integer programming, and sequential convex optimization
solvers. We show how to formulate and verify system properties like stability
and robustness, how to compute margins, and how to verify performance through a
sequence of SMT queries. As illustration, we use the framework to verify closed
loop, possibly nonlinear dynamical systems that contain neural networks in the
loop, and hint at a number of extensions that can make AMNs a potent playground
for interfacing between machine learning, control, convex and nonconvex
optimization, and formal methods.Comment: 30 pages, 12 figure
Reasoning about Safety of Learning-Enabled Components in Autonomous Cyber-physical Systems
We present a simulation-based approach for generating barrier certificate
functions for safety verification of cyber-physical systems (CPS) that contain
neural network-based controllers. A linear programming solver is utilized to
find a candidate generator function from a set of simulation traces obtained by
randomly selecting initial states for the CPS model. A level set of the
generator function is then selected to act as a barrier certificate for the
system, meaning it demonstrates that no unsafe system states are reachable from
a given set of initial states. The barrier certificate properties are verified
with an SMT solver. This approach is demonstrated on a case study in which a
Dubins car model of an autonomous vehicle is controlled by a neural network to
follow a given path.Comment: Invited paper in conference: Design Automation Conference (DAC) 201
Evaluating Ising Processing Units with Integer Programming
The recent emergence of novel computational devices, such as adiabatic
quantum computers, CMOS annealers, and optical parametric oscillators, present
new opportunities for hybrid-optimization algorithms that are hardware
accelerated by these devices. In this work, we propose the idea of an Ising
processing unit as a computational abstraction for reasoning about these
emerging devices. The challenges involved in using and benchmarking these
devices are presented and commercial mixed integer programming solvers are
proposed as a valuable tool for the validation of these disparate hardware
platforms. The proposed validation methodology is demonstrated on a D-Wave 2X
adiabatic quantum computer, one example of an Ising processing unit. The
computational results demonstrate that the D-Wave hardware consistently
produces high-quality solutions and suggests that as IPU technology matures it
could become a valuable co-processor in hybrid-optimization algorithms
Counterexample Guided Inductive Optimization
This paper describes three variants of a counterexample guided inductive
optimization (CEGIO) approach based on Satisfiability Modulo Theories (SMT)
solvers. In particular, CEGIO relies on iterative executions to constrain a
verification procedure, in order to perform inductive generalization, based on
counterexamples extracted from SMT solvers. CEGIO is able to successfully
optimize a wide range of functions, including non-linear and non-convex
optimization problems based on SMT solvers, in which data provided by
counterexamples are employed to guide the verification engine, thus reducing
the optimization domain. The present algorithms are evaluated using a large set
of benchmarks typically employed for evaluating optimization techniques.
Experimental results show the efficiency and effectiveness of the proposed
algorithms, which find the optimal solution in all evaluated benchmarks, while
traditional techniques are usually trapped by local minima
Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems (extended version)
We present an alternative approach to solve the hardware (HW) and software
(SW) partitioning problem, which uses Bounded Model Checking (BMC) based on
Satisfiability Modulo Theories (SMT) in conjunction with a multi-core support
using Open Multi-Processing. The multi-core SMT-based BMC approach allows
initializing many verification instances based on processors cores numbers
available to the model checker. Each instance checks for a different optimum
value until the optimization problem is satisfied. The goal is to show that
multi-core model-checking techniques can be effective, in particular cases, to
find the optimal solution of the HW-SW partitioning problem using an SMT-based
BMC approach. We compare the experimental results of our proposed approach with
Integer Linear Programming and the Genetic Algorithm.Comment: extended version of paper published at SBESC'1
- …