SIMULATION TO PROOFS IN C2E2
Parasara Sridhar Duggirala
1
SIMULATION TO PROOFS IN C2E2 Parasara Sridhar Duggirala 1 A simple - - PowerPoint PPT Presentation
SIMULATION TO PROOFS IN C2E2 Parasara Sridhar Duggirala 1 A simple (often the only) strategy Given start and target S Compute finite cover of initial set Simulate from the center 0 of each cover Bloat
1
2
S
π¦0
π
[Girard et al 2006], [Donze et al 2008],... (obviously incomplete)
βπ π¦1, π’ βπ π π¦1, π’ , π π¦2, π’ βπΎ π¦1, π¦2, π’
3
π¦ β 0 invariant π¦ β€ 10 until π¦ β₯ 10 do π¦ β π¦ + 1
4
5
2 β€
ππππππππππ(ππ , π, π, πΌ) of gives a sequence S0, β¦ , ππ: πππ ππ β€ π & at any time π’ β [πβ, π + 1 β], solution π π¦0, π’ β ππ. ππππ πππππ π», π, πΌ of π¦ = π π¦ is a sequence π0, β¦ , ππ such that πππ(ππ) β€ π and from any π¦0 β π, for each time π’ β [πβ, (π + 1)β], π π¦0, π’ β ππ. π0, β¦ , ππ, π1 β π€πππππ(π¦0, π, π) For each π β [π] π2 β sup
π’βππ,π¦,π¦β²βπΆπ(π¦0)
πΎ π¦1, π¦2, π’ ππ β πΆπ2 ππ
6
Track & propagate πππ§ and ππ£π‘π’ fragments of reachtube ππππΊπππππ πΊ, πΈ = ππ£π‘π’ π β π πππ§ π β© π β β πππ’ π β© π = β ππππππππππΈπππππ(π, π») = β©π0, π’ππ0, β¦ , ππ, π’πππβͺ , such that either π’πππ = ππ£π‘π’ if all the π
π β²π‘ before it are must
π’πππ = πππ§ if all the π
π β²π‘ before it are at least may
and at least one of them is not must
7
πππππΊππππππ(π) returns a set of tagged regions N. πβ², π’ππβ² β π iff β π, ππ such that πβ² = πππ‘ππ’π ππ and: ππ β π»π£ππ ππ , π’πππ = π’ππβ² = ππ£π‘π’ ππ β© π»π£ππ ππ β β , ππ β π»π£ππ ππ , π’πππ = ππ£π‘π’, π’ππβ² = πππ§ ππ β© π»π£ππ ππ β β , π’πππ = π’ππβ² = πππ§
8
unsafe. Definition Given HA π΅ = β©π, πππ, π΅, πΈ, π βͺ, an π-perturbation of A is a new HA π΅β² that is identical except, Ξβ² = πΆπ(Ξ), β β β πππ, π½ππ€β² = πΆπ(π½ππ€) (b) a β A, π»π£ππ ππ = πΆπ(π»π£ππ ππ). A is robustly safe iff βπ > 0, such that Aβ is safe for ππ upto time bound T, and transition bound N. Robustly unsafe iff β π < 0 such that π΅β² is safe for ππ.
the A is either robustly safe or robustly unsafe.
9
10
Part II
11
Duggirala β Wang β Mitra β Munoz β Viswanathan (FM 2014) Huang β Fan β Meracre β Mitra β Kiwatkowska (CAV 2014)
Ownship and Intruder approaching parallel runways with small separation ALAS (at ownship) protocol is supposed to raise an alarm if within T time units the Intruder can violate safe separation based on 3 different projections Verify AlertβΌπUnsafe for different runway and aircraft scenarios Scenario 1. With xsep [.11,.12] Nm ysep [.1,.21] Nm, π = 30π ππππ¦ = 45o vyo= 136 Nmph, vyi = 155 Nmph
12
ππΆ
π§π‘ππ π¦π‘ππ
ππΌ ππΊ
Duggirala, Wang, Mitra, Munoz, Viswanathan FM 2014
ππΆ
π§π‘ππ π¦π‘ππ
ππΌ ππΊ
π΅πππ π’π = π¦ β π’ β 0, π , ππ πππ π¦, π’ β πππ‘πππ}, where ππ πππ defined as solution of ODE π¦ = ππ(π¦, π’) Use simulations and annotations of ππ to compute ππ£π‘π’ intervals when π¦ β π΅πππ π’π π΅πππ π’ βΊπ π2 is satisfied by Reachtube π if β π½2 β ππ£π‘π’ π2 βͺ πππ§ π2 there exists π½1 β ππ£π‘π’ π΅πππ π’ such that π½1 < π½2 β π π΅πππ π’ βΊπ π2 is violated by Reachtube π if β π½2 β ππ£π‘π’ π2 for all π½1 β ππ£π‘π’ π΅πππ π’ βͺ πππ§ π΅πππ π’ such that π½1 > π½2 β π
13
Duggirala, Wang, Mitra, Munoz, Viswanathan FM 2013
Scenario Alert βΌ4 Unsafe Running time (mins:sec) Alert βΌ? Unsafe
6 False 3:27 2.16 7 True 1:13 β 8 True 2:21 β 6.1 False 7:18 1.54 7.1 True 2:34 β 8.1 True 4:55 β 9 False 2:18 1.8 10 False 3:04 2.4 9.1 False 4:30 1.8 10.1 False 6:11 2.4
14
15
π¦1 = π
π(π¦1, π¦2, π¦3)
π¦2 = π
π(π¦2, π¦1, π¦3)
π¦3 = π
π(π¦3, π¦1, π¦2)
ππ ππ ππ
Module 1 Module 2 Module 3 Module 1 Module 2 Module 3 Module 4 Module 5
|π(π¦, π£, π’) β π π¦β², π£β², π’ | β€ πΎ(π¦, π¦β², π’) +
π’
πΏ |π£ π‘ β π£β² π‘ | ππ‘ πΎ β 0 as π¦ β π¦β², and πΏ β 0 as π£ β π£β²
16
π¦ = π(π¦, π£)
π£
time π¦
π(π¦, π£, π’)
π¦β²
π(π¦β², π£β², π’)
π’ time
π£(π’) π£β²(π’)
17
18
The bloated tube contains all trajectories start from the π-ball of π¦. The over-approximation can be computed arbitrarily precise.
time
π(π’) π¦
π2 = πΎ2 π, π’ +πΏ2(π1, π3) π1 = πΎ1 π, π’ +πΏ1(π2, π3) π3 = πΎ3 π, π’ +πΏ3(π1, π2)
time
π(π’) π
π(π’)
π¦1 = π
1(π¦1, π£1)
π¦2 = π
2(π¦2, π£2)
π¦3 = π
3(π¦3, π£3)
1, π 2βͺ and π
π
π
1, π 2).
19
Huang & Mitra, HSCC 2013
20
Nodes Thresh Sims Run time (s) Property 3 2 16 104.8 TRUE 3 1.65 16 103.8 TRUE 5 2 3 208 TRUE 5 1.65 5 281.6 TRUE 5 1.5 NA 63.4 FALSE 8 2 3 240.1 TRUE 8 1.65 73 2376.5 TRUE
β Theory to support nondeterministic models using decomposition into deterministic part and state-dependent uncertainty:
β Compositional inference of annotations of large models from known annotations of smaller blocks
β Abstraction refinement-based algorithm for synthesis
β Connect synthesis engine with a specific complex hardware platform, for example, a quadcopter or a bipedal robotic system
22