Difference between revisions of "EECI 2012: Deductive Verification of Hybrid Systems"

From Murray Wiki
Jump to navigationJump to search
Line 7: Line 7:
  
 
== Further Reading ==
 
== Further Reading ==
* <p> [http://robotics.eecs.berkeley.edu/~sastry/ee291e/lygeros.pdf Lecture Notes on Hybrid Systems] (by John Lygeros): A rough introduction to hybrid systems. Chapters 5 and 6 are on various analysis techniques relevant for this short course. </p>
 
 
* <p>[http://resolver.caltech.edu/CaltechETD:etd-05272005-144358 Stephen Prajna's dissertation] on verifying temporal properties for hybrid dynamical systems. </p>
 
* <p>[http://resolver.caltech.edu/CaltechETD:etd-05272005-144358 Stephen Prajna's dissertation] on verifying temporal properties for hybrid dynamical systems. </p>
 
* <p> [http://www.cds.caltech.edu/~utopcu/images//9/9b/TPSB-CSM-2010.pdf Help on SOS]: a paper on the very basics of sum-of-squares programming and their use in nonlinear system verification.</p>
 
* <p> [http://www.cds.caltech.edu/~utopcu/images//9/9b/TPSB-CSM-2010.pdf Help on SOS]: a paper on the very basics of sum-of-squares programming and their use in nonlinear system verification.</p>

Revision as of 08:10, 16 May 2012

Prev: Computer Session: Spin Course home Next: Algorithmic Verification

This lecture focuses on the verification of hybrid systems using deductive (theorem proving) methods. We describe hybrid systems that combine continuous and discrete states. We then describe two methods for deductive verification. First, we discuss a computational procedure for constructing Lyapunov-type functions (e.g., barrier certificates) that witness the fact that a hybrid system satisfies certain temporal specifications. Second, we consider control protocols for cooperation and decision making in multi-agent systems, as illustrated by the RoboFlag example introduced in the first lecture. We show how to implement a simple protocol for distributed target assignment in a simplified version of the problem (the "RoboFlag drill") and prove stability of the protocol.

Lecture Materials

Further Reading

Additional Materials