PROGRAM
Days: Tuesday, April 16th Wednesday, April 17th Thursday, April 18th
Tuesday, April 16th
View this program: with abstractssession overviewtalk overview
10:00-10:30Coffee Break
10:30-12:30 Session 1: Reachability
Chair:
10:30 | Falsification of Hybrid Systems using Symbolic Reachability and Trajectory Splicing (abstract) |
11:00 | Inner and Outer Reachability for the Verification of Control Systems (abstract) |
11:30 | Numerical Verification of Affine Systems with up to a Billion Dimensions (abstract) |
12:00 | SReachTools: A MATLAB Stochastic Reachability Toolbox (abstract) |
12:15 | JuliaReach: a Toolbox for Set-Based Reachability (abstract) |
12:30-14:00Lunch Break
14:00-15:30 Session 2: Temporal logics
Chair:
14:00 | Revisiting Timed Logics with Automata Modalities (abstract) |
14:30 | Interface-Aware Signal Temporal Logic (abstract) |
15:00 | Temporal Logic Robustness for General Signal Classes (abstract) |
15:30-16:00Coffee Break
16:00-17:30 Session 3: Decidability and complexity
Chair:
16:00 | On the Decidability of Reachability in Linear Time-Invariant Systems (abstract) |
16:30 | On the Decidability of Linear Bounded Periodic Cyber-Physical Systems (abstract) |
17:00 | Facetal Abstraction for Non-Linear Dynamical Systems Based on delta-Decidable SMT (abstract) |
Wednesday, April 17th
View this program: with abstractssession overviewtalk overview
10:00-10:30Coffee Break
10:30-12:30 Session 4: Stability and invariance
Chair:
10:30 | Characterizations of Safety in Hybrid Inclusions via Barrier Functions (abstract) |
11:00 | On topological entropy and stability of switched linear systems (abstract) |
11:30 | Robust Invariant Sets Generation for State-Constrained Perturbed Polynomial Systems (abstract) |
12:00 | A complete characterization of the ordering of path-complete methods (abstract) |
12:30-14:00Lunch Break
14:00-15:30 Session 5: Special session on Safe autonomy, AI and ML for CPS I
Chair:
14:00 | Neural Network Verification via SMT Solving (abstract) |
15:00 | Formal Verification of Neural Network Controlled Autonomous Systems (abstract) |
15:30-16:00Coffee Break
16:00-17:30 Session 6: Special session on Safe autonomy, AI and ML for CPS II
Chair:
16:00 | Reachability Analysis for Neural Feedback Systems using Regressive Polynomial Rule Inference (abstract) |
16:30 | Verisig: verifying safety properties of hybrid systems with neural network controllers (abstract) |
17:00 | Gray-box Adversarial Testing for Control Systems with Machine Learning Components (abstract) |
17:15 | Discussion (abstract) |
Thursday, April 18th
View this program: with abstractssession overviewtalk overview
10:00-10:30Coffee Break
10:30-12:30 Session 7: Verification
Chair:
10:30 | A New Simulation Metric to Determine Safe Environments and Controllers for Systems with Unknown Dynamics (abstract) |
11:00 | Formal Verification of Weakly-Hard Systems (abstract) |
11:30 | Verification and synthesis of interconnected embedded control systems under timing contracts (abstract) |
12:00 | Evrostos: The rLTL Verifier (abstract) |
12:15 | TIRA: Toolbox for Interval Reachability Analysis (abstract) |
12:30-14:00Lunch Break
14:00-15:30 Session 8: Control synthesis
Chair:
14:00 | Mixed-Integer Formulations for Optimal Control of Piecewise-Affine Systems (abstract) |
14:30 | Efficiency through Uncertainty: Scalable Formal Synthesis for Stochastic Hybrid Systems (abstract) |
15:00 | pFaces: An Acceleration Ecosystem for Symbolic Control (abstract) |
15:15 | Business Meeting (abstract) |
15:30-16:00Coffee Break
16:00-19:00 Session 9: Oded Maler - Barbaric Science from a Captive Poet
Chair:
16:00 | Our Work with Oded Maler and his Impact (abstract) |
16:30 | Formal models of hybrid systems: the early years (abstract) |
17:00 | Reachability in hybrid systems: 25 years of optimism (abstract) |
17:30 | Why considering nonstandard semantics for hybrid systems and how to reconcile it with superdense time semantics? (abstract) |
18:00 | Simulation-based and Data-driven Reasoning for Cyber-Physical Systems (abstract) |
18:30 | Building trusted systems from untrusted components (abstract) |