<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Automatic synthesis of switching controllers for linear hybrid systems: Reachability control</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Massimo</forename><surname>Benerecetti</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università di Napoli &quot;Federico II&quot;</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marco</forename><surname>Faella</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università di Napoli &quot;Federico II&quot;</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Automatic synthesis of switching controllers for linear hybrid systems: Reachability control</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C015629C3D24F9CF9C149AE9DFC6F244</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We consider the problem of computing the controllable region of a Linear Hybrid Automaton with controllable and uncontrollable transitions, w.r.t. a reachability objective. We provide an algorithm for the finite-horizon version of the problem, based on computing the set of states that must reach a given non-convex polyhedron while avoiding another one, subject to a polyhedral constraint on the slope of the trajectory.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Hybrid systems are non-linear dynamic systems, characterized by the presence of continuous and discrete variables. Hybrid automata <ref type="bibr" target="#b4">[5]</ref> are the most common syntactic variety of hybrid system: a finite set of locations, similar to the states of a finite automaton, represents the value of the discrete variables. The current location, together with the current value of the (continuous) variables, form the instantaneous description of the system. Change of location happens via discrete transitions, and the evolution of the variables is governed by differential inclusions attached to each location. In a Linear Hybrid Automaton (LHA), the allowed differential inclusions are of the type ẋ ∈ P , where ẋ is the vector of the first derivatives of all variables and P ⊆ R n is a convex polyhedron. Notice that differential inclusions are non-deterministic, allowing for infinitely many solutions with the same starting conditions.</p><p>We study LHAs whose discrete transitions are partitioned into controllable and uncontrollable ones, giving rise to a 2-player model called Linear Hybrid Game (LHG): on one side the controller, which can only issue controllable transitions; on the other side the environment, which can choose the trajectory of the variables and can take uncontrollable transitions whenever they are enabled.</p><p>As control goal, we consider reachability, i.e., the objective of reaching a given set of target states. It is easy to show that the reachability control problem is undecidable, being harder than the standard reachability verification (i.e., 1player reachability) for LHAs <ref type="bibr" target="#b5">[6]</ref> . We present the first exact algorithm for 1-step controllability under a reachability objective, namely reaching the target region with at most one discrete transition. In turn, this provides an exact algorithm for bounded-horizon reachability control (i.e., reaching the target within a fixed number of discrete steps), and a semi-algorithm<ref type="foot" target="#foot_0">1</ref> for the infinite-horizon case. This extended abstract summarizes the results of <ref type="bibr" target="#b1">[2]</ref>.</p><p>Although the control goal we examine, as a language of infinite traces, is the dual of safety, the corresponding synthesis problem is not, because our game model is asymmetric: choice of continuous-time trajectories is uncontrollable. Hence, it is not possible to solve the control problem with reachability goal T by exchanging the roles of the two players and then solving the safety control problem with goal T (i.e., the complement of T ).</p><p>On the one hand, the 1-step safety control problem can be solved by computing the may-reach-while-avoiding operator RWA m <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>. Given two sets of states U and V , RWA m (U, V ) collects the states from which there exists a system trajectory that reaches U while avoiding V at all times. On the other hand, the 1-step reachability control problem requires a different operator, called mustreach-while-avoiding and denoted by RWA M (U, V ). As suggested by its name, such operator computes the set of states from which all system trajectories reach U while avoiding V . The main technical result of this paper is that the first operator can be used to compute the latter, once a suitable over-approximation of RWA M (U, V ) is available (Theorem 2). Moreover, we present an effective way to obtain such an over-approximation.</p><p>To the best of our knowledge, the reachability control goal was never considered for LHGs. In the full paper <ref type="bibr" target="#b1">[2]</ref>, we present the proofs for all results and an experimental evaluation based on an extension to the tool SpaceEx.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The model: Linear hybrid games</head><p>A convex polyhedron is a subset of R n that is the intersection of a finite number of strict and non-strict affine half-spaces. A polyhedron is the union of a finite number of convex polyhedra. Given an ordered set X = {x 1 , . . . , x n } of variables, a valuation is a function v : X → R. Let Val (X) denote the set of valuations over X. There is an obvious bijection between Val (X) and R n , allowing us to extend the notion of (convex) polyhedron to sets of valuations. We denote by CPoly(X) (resp., Poly(X)) the set of convex polyhedra (resp., polyhedra) on X. Let A be a set of valuations, states or points in R n , we denote by A its complement.</p><p>We use Ẋ to denote the set { ẋ1 , . . . , ẋn } of dotted variables, used to represent the first derivatives, and X to denote the set {x 1 , . . . , x n } of primed variables, used to represent the new values of variables after a transition. A trajectory over X is a function f : R ≥0 → Val (X) that is differentiable but for a finite subset of R ≥0 . A state is a pair l, v of a location l and a valuation v ∈ Val (X). Transitions describe instantaneous changes of location, in the course of which the variables may change their value. Each transition (l, J, l ) ∈ Edg c ∪ Edg u consists of a source location l, a target location l , and a jump relation J ∈ Poly(X ∪ X ), that specifies how the variables may change their value during the transition. The projection of J on X contains the valuations for which the transition is enabled, a.k.a. a guard. The flow constraint attributes to each location a set of valuations over the first derivatives of the variables, which determines how variables can change over time. We let InvS = l∈Loc {l} × Inv (l) and InitS = l∈Loc {l} × Init(l). Notice that InvS and InitS are sets of states. Given a set of states A and a location l, we denote by A l the projection of A on l.</p><formula xml:id="formula_0">Definition 1. A Linear Hybrid Game (LHG) (Loc, X, Edg c , Edg u , Flow , Inv , Init) consists of the following components: (i) a finite set Loc of locations; (ii) a fi- nite set X = {x 1 , . . . , x n } of real-valued variables; (iii) two sets Edg c , Edg u ⊆ Loc × Poly(X ∪ X ) × Loc of</formula><p>The behavior of an LHG is based on two types of steps: discrete steps correspond to the Edg component, and produce an instantaneous change in both the location and the variable valuation; timed steps describe the change of the variables over time in accordance with the Flow component. A joint step is either a timed step of infinite duration, or a timed step of finite duration followed by a discrete step. The controller influences the system through a strategy. Strategies assign to each controllable transition a possibly non-convex polyhedron, which is contained in the jump relation of the transition. The intended meaning is that the strategy restricts controllable transitions so that they can be taken from a given subset of their original guard and they lead to a given subset of their original set of destinations. Formal definitions are included in the full paper <ref type="bibr" target="#b1">[2]</ref>.</p><p>Reachability control problem. Given an LHG and a set of states T ⊆ InvS , the reachability control problem asks whether there exists a strategy σ such that, for all initial states s ∈ InitS , all runs that start from s and are consistent with σ reach some state in T . We call the above σ a winning strategy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Solving the reachability control problem</head><p>The following theorem states the general procedure for solving the reachability control problem, based on the controllable predecessor operator for reachability CPre R . For a set of states A, the set CPre R (A) contains all states from which the controller can ensure that the system reaches A within the next joint step. In discrete games, the CPre operator used for solving reachability games is the same as the one used for the safety goal <ref type="bibr" target="#b6">[7]</ref>. In both cases, when the operator is applied to a set of states T , it returns the set of states from which Player 1 can force the game into T in one step. In hybrid games, the situation is different: a joint step represents a complex behavior, extending over a (possibly) non-zero time interval. While the CPre for reachability only requires T to be visited once during such interval, CPre for safety requires that the entire behavior constantly remains in T . Hence, we present a novel algorithm for computing CPre R .</p><p>The following theorem states that the least fixpoint of the operator τ (X) T ∪CPre R (X) provides a solution of the reachability control problem. Intuitively, each application of τ extends (backward), by adding a single joint step, all the runs compatible with some winning strategy for the controller.</p><p>Theorem 1. Let T be a polyhedron and W * = µW . T ∪ CPre R (W ), where µ denotes the least fixpoint. If the fixpoint is obtained in a finite number of iterations then the answer to the reachability control problem for target set T is positive if and only if InitS ⊆ W * .</p><p>Computing the predecessor operator. In order to compute the predecessor operator, we introduce the Must Reach While Avoiding operator, denoted by RWA M . Given a location l and two sets of variable valuations U and V , RWA M l (U, V ) contains the set of valuations from which all continuous trajectories of the system reach U while avoiding V<ref type="foot" target="#foot_1">2</ref> .</p><p>We can now reformulate CPre R by means of the operator RWA M l . Let B l be the set of states of location l, where the environment can take a discrete transition leading outside A and, similarly, l be the set of states of l, where the controller can take a discrete transition leading to A. A state s of location l belongs to CPre R (A) if the controller can force the system into A within one joint step, no matter what the environment does. This occurs if, for every possible trajectory chosen by the environment, one of the following conditions holds: (i) the system reaches A l while avoiding B l \ A l , thus without giving the environment any chance to take an action leading outside A; (ii) the system reaches a point in C l \ B l , from where the controller can force the system into A, while avoiding B l \A l ; or (iii) the trajectory exits from the invariant Inv (l) meanwhile avoiding B l \ A l . In this last case, the semantics ensures that, before the trajectory exits from the invariant, the environment will take some discrete transition, which can only lead to A (see well-formedness in the full paper).</p><p>The following lemma formalizes the above intuition. We say that a set of states A is polyhedral if for all l ∈ Loc, the projection A l is a polyhedron. Lemma 1. If A ⊆ InvS is polyhedral, the following holds:</p><formula xml:id="formula_1">CPre R (A) = InvS ∩ l∈Loc {l} × RWA M l A l ∪ C l \ B l ∪ Inv (l), B l \ A l .</formula><p>Computing RWA M . We show how to compute RWA M based on the operator which is used to solve safety control problems: the May Reach While Avoiding operator RWA m l (U, V ), returning the set of states from which there exists a trajectory that reaches U while avoiding V . In safety control problems, RWA m is used to compute the states from which the environment may reach an unsafe state (in U ) while avoiding the states from which the controller can take a transition to a safe state (in V ). Notice that RWA m is a classical operator, known as Reach <ref type="bibr" target="#b7">[8]</ref>, Unavoid Pre <ref type="bibr" target="#b0">[1]</ref>, and flow avoid <ref type="bibr" target="#b8">[9]</ref>. We recently gave the first sound and complete algorithm for computing it on LHGs <ref type="bibr" target="#b3">[4]</ref>.</p><p>In the rest of this section, we consider a fixed location l ∈ Loc and we omit the l subscript whenever possible. For a polyhedron G and p ∈ G, we say that p is t-bounded in G if all admissible trajectories starting from p eventually exit from G. We denote by t-bnd (G) the set of points of G that are t-bounded in it, and we say that G is t-bounded if all points p ∈ G are t-bounded in G.</p><p>We now show how to relate RWA M and RWA m , by exploiting the following idea. First, notice that all points in U belong to RWA M (U, V ) by definition. Now, the content of RWA M (U, V ) can be partitioned into two regions: the first region is U ; the second region must be t-bounded, because each point in the second region must eventually reach U . If we can find a polyhedron Over that over-approximates RWA M (U, V ) and such that Over \ U is t-bounded, we can use RWA m to refine it. Precisely, we can use RWA m to identify and remove the points of Over that may leave Over without hitting U first.</p><p>If Over \ U is not t-bounded, the above technique does not work, because RWA m cannot identify (and remove) the points that may remain forever in Over without ever reaching U . This idea is formalized by the following result.</p><p>Theorem 2. For all disjoint polyhedra U and V , such that V is convex, let Over be a polyhedron such that: (i) RWA M (U, V ) ⊆ Over ⊆ V and (ii) Over \ U is t-bounded. Then, RWA M (U, V ) = Over \ RWA m (Over , U ).</p><p>It can be proved that the set Over U ∪ t-bnd (U ∩ V ) is computable and satisfies the conditions of Theorem 2. The full paper <ref type="bibr" target="#b1">[2]</ref> also provides an alternative, more efficient, version for Over . In conclusion, the results sketched above provide an effective solution to the bounded-horizon reachability control problem and a semi-algorithm for the infinite-horizon version.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>controllable and uncontrollable transitions, respectively; (iv) a mapping Flow : Loc → CPoly( Ẋ), called the flow constraint; (v) a mapping Inv : Loc → Poly(X), called the invariant; (vi) a mapping Init : Loc → Poly(X), contained in the invariant, defining the initial states of the automaton.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">In other words, a procedure that may or may not terminate, and that provides the correct answer whenever it terminates.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">In the temporal logic Ctl, we haveRWA M (U, V ) ≡ ∀ V U (U ∧ V ).</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Controller synthesis for hybrid systems with a lower bound on event separation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Balluchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Benvenuti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Villa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wong-Toi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sangiovanni-Vincentelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. of Control</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="1171" to="1200" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Automatic synthesis of switching controllers for linear hybrid systems: Reachability control</title>
		<author>
			<persName><forename type="first">M</forename><surname>Benerecetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Faella</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. on Embedded Computing Systems</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Revisiting synthesis of switching controllers for linear hybrid systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Benerecetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Faella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Minopoli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 50th IEEE Conf. on Decision and Control. IEEE</title>
				<meeting>of the 50th IEEE Conf. on Decision and Control. IEEE</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Automatic synthesis of switching controllers for linear hybrid systems: Safety control</title>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">493</biblScope>
			<biblScope unit="page" from="116" to="138" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">The theory of hybrid automata</title>
		<author>
			<persName><forename type="first">T</forename><surname>Henzinger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">11th IEEE Symp. Logic in Comp. Sci</title>
				<imprint>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="278" to="292" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">What&apos;s decidable about hybrid automata?</title>
		<author>
			<persName><forename type="first">T</forename><surname>Henzinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kopke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Puri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Varaiya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Computer and System Sciences</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="94" to="124" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Control from computer science</title>
		<author>
			<persName><forename type="first">O</forename><surname>Maler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annual Reviews in Control</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="175" to="187" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A game theoretic approach to controller design for hybrid systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Tomlin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lygeros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Shankar</forename><surname>Sastry</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the IEEE</title>
				<meeting>of the IEEE</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="page" from="949" to="970" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The synthesis of controllers for linear hybrid automata</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wong-Toi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">36th IEEE Conf. on Decision and Control</title>
				<meeting><address><addrLine>San Diego, CA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="4607" to="4612" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
