<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop on Artificial Intelligence and Formal Verification, Logics, Automata and Synthesis (OVERLAY),
Rende, Italy, November</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Automated Verification of Noisy Nonlinear Cyber-Physical Systems with Ariadne ∗</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Davide Bresolin</string-name>
          <email>1davide.bresolin@unipd.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Geretti</string-name>
          <email>2luca.geretti@univr.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tiziano Villa</string-name>
          <email>3tiziano.villa@univr.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Padova</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Verona</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <volume>1</volume>
      <fpage>9</fpage>
      <lpage>20</lpage>
      <abstract>
        <p>A cyber-physical system (CPS) consists of a collection of computing devices communicating with each other and interacting with the physical world using sensors and actuators. Such systems are usually represented as a discrete control part that operates in a continuous environment, and are used in many application domains, like automotive, robotics, avionics, autonomous vehicles, process control, real-time and mobile computing systems [28]. The interplay between the discrete and the continuous dynamics causes difficulties in their analysis that are not present in discrete-only or continuous-only systems. This motivates the need for rigorous mathematical models and algorithms to describe and analyse them. Hybrid automata are a convenient model for CPSs suitable for formal verification [3]. Intuitively, a hybrid automaton is a “finite-state automaton” with continuous variables that evolve according to dynamics characterising each discrete state (called a location). An execution of a hybrid automaton alternates continuous and discrete evolution. In the former, the location does not change, time passes and the evolution of the state variables follows some flow predicate associated to the current location. A discrete evolution step consists of the activation of a discrete transition that can change the current location and the value of the state variables, in accordance with the reset function associated to the transition. The interleaving of continuous and discrete evolution is regulated by invariants, which must be true for the continuous evolution to continue, while guards enable the discrete transitions. Formal verification aims to identify system properties that are guaranteed to hold for every possible behaviour of the system. Such guarantee is based on the rigorous methodology underlying the computation or deduction of the desired properties. As a consequence, formal verification represents a powerful tool for evaluation of a system that has became standard practice for the development of HW/SW systems, and is becoming a vital aspect in the design of safety-critical CPSs, including robotics and automation systems [23, 24, 28]. More recently, some fruitful connections between AI and formal verification of hybrid systems has emerged. [27] proposes an approach for mining hybrid automata models from execution traces of embedded control systems. [19] uses Bayesian inference and reachability analysis to compute the confidence that a dynamical system with partly unknown dynamics verifies a given property. Both approaches allow formal verification techniques to be applied to black-box systems where the actual model</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        is unknown or only partially specified. The work in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] shows how to transform a sigmoid-based neural
network into an equivalent hybrid automaton, allowing state-of-the-art reachability tools to be used to
verify safety properties of closed-loop systems where the controller is a neural network.
      </p>
      <p>
        The computation of the reachable set, i.e., the set of all states that can be reached under the dynamical
evolution starting from a given initial state set, is thus of particular importance in the formal verification
of hybrid automata. Many approximation techniques and tools to estimate the reachable set have been
proposed in the literature (see [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] for a comprehensive analysis). We recently proposed a development
environment for the verification of nonlinear compositional hybrid systems, called Ariadne [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which
differs from existing tools by being based on the theory of computable analysis [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Such theory provides a
rigorous mathematical semantics for the numerical analysis of dynamical systems, suitable for implementing
formal verification algorithms. The tool has been applied mainly to the safety verification of robotic
surgery tasks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. It also has been successfully used for dominance checking of controllers [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and even for
correct-by-construction code generation [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        This paper discusses the ongoing work aimed at extending the dynamical model used in Ariadne to
differential inclusions, based on the work of [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], in order to perform reachability analysis in the presence
of noisy inputs. While the most straightforward application of differential inclusions is for modeling
system uncertainty, it is worth remarking that they can be used also to support contract-based design [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]:
given a complex system, we can replace the actual input of a component with an input having partially
defined behaviour. The resulting decoupling of components ultimately allows to analyse subsystems in
isolation, thus trading-off system complexity for precision.
      </p>
      <p>Unfortunately, the introduction of differential inclusions into a nonlinear system represents a challenge
in terms of controlling the quality of the computed reachable sets. Such control can be exercised using a
number of precision parameters, which should be tuned dynamically for maximum effectiveness. In other
words, the successful verification of a noisy system cannot disregard a thorough analysis of such precision
parameters and the identification of a proper set of policies for their automated control.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Formal verification in the Ariadne framework</title>
      <p>
        In this Section some insight on the approach used in Ariadne is provided, in order to understand the
impact of the introduction of differential inclusions. Detailed technical information on the framework can
be found in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] about functional calculus and [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] regarding the reachability routines.
      </p>
      <p>
        Suppose we wish to verify that a safety property ϕ holds for a hybrid automaton H; i.e., that ϕ remains
true for all possible executions starting from a set X0 of initial states, allowing to answer if a system
operates within safe operating conditions expressed as a set. If this objective is cast as a reachability
analysis problem, then it is necessary to prove that ReachSetH (X0) ⊆ Sat(ϕ), where ReachSetH (X0) is
the set of states reached by H (also called the reachable set) and Sat(ϕ) is the set of states where ϕ is true.
Unfortunately, the reachability problem is not decidable in general [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Nevertheless, formal verification
methods can be applied to hybrid automata: suppose we can compute an outer approximation S¯ such that
S ⊇ ReachSetH (X0). If S¯ ⊆ Sat(ϕ) holds, then also ReachSetH (X0) ⊆ Sat(ϕ) holds, i.e., the automaton
¯
H respects the property, or in other terms we proved the property. Conversely, if we can compute an
inner approximation S such that S ⊆ ReachSetH (X0) that turns out to contain at least one point outside
Sat(ϕ), we have proved that H does not respect the safety property ϕ, i.e., we disproved the property.
      </p>
      <p>Clearly, any approximation to the reachable set is bound to the numerical precision used, hence a
given quality of approximation may not allow to prove or disprove the property. Computable analysis
defines the conditions to construct approximations such that if the precision is progressively increased, a
sequence of approximations converging to the reachable set is obtained.</p>
      <p>For a given precision, an approximation is obtained by identifying the reached region resulting from
the evolution of the system over time. Such evolution is obtained through a sequence of continuous and
discrete steps. A continuous step represents time advancement and relies on the integration of a vector
field x˙ = f (x) for a chosen step size h, where f is nonlinear in general. A discrete step represents a
transition, which changes the hybrid state, i.e., the pairing of the continuous state and the discrete state,
without any time advancement.</p>
      <p>
        Does evolution return results similar to those of simulative tools like MathWorks Simulink R ? No,
because Ariadne is designed to include all the possible behaviours that result from evolving sets rather
than single points. The underlying engine relies on results from interval analysis, which supports the
definition of constants over intervals (among other things). Analysing a system in this case is equivalent to
the simultaneous analysis of the set of singleton instances of the system, each corresponding to a distinct
valuation of all constants. In particular, if a given constant represents a design parameter, parametric
analysis [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] is able to identify subintervals where the constant yields optimal behaviour of the system
with respect to some metrics.
      </p>
      <p>Since intervals only model a set of constant behaviours, differential inclusions represent the most
natural extension of the tool: by using them it is possible to analyse a system in which arbitrary variations
of quantities within bounded intervals occur. The resulting over-approximation of behaviours covered by
the noisy model can consequently compensate for an inaccurate system definition, which is a common
problem when modelling real systems.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Differential inclusions</title>
      <p>
        Differential inclusions (DIs) are dynamic systems of the form x˙ ∈ F (x), where F (·) is a function that
gives the set of possible values for the derivatives of x. DIs generalise differential equations by having
multivalued right-hand sides [
        <xref ref-type="bibr" rid="ref32 ref4">4, 32</xref>
        ]. They model systems with (bounded, non-stochastic) uncertainties.
DIs can be viewed as systems with input (control or noise) in the form x˙ = f (x, v), v ∈ V ⊂ Rm, where v(·)
is a measurable function [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. If the set V of inputs is compact and separable, and f (x, V ) is continuous
in x and convex for all x, the solution sets of the two systems are equivalent [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        DIs arise in applications in engineering (e.g., robotics), physical and biological sciences in a variety
of ways. They are used to model differential equations with discontinuities, by taking the closed convex
hull of the right-hand side [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. They can also be used to model systems with uncertain time-varying
parameters, by replacing them with the whole set to which they could belong, as in [
        <xref ref-type="bibr" rid="ref10 ref30">10, 30</xref>
        ]. However,
the most important use cases arise from the analysis of complex systems. One approach to analysis is to
apply model-reduction techniques to replace a high-order system of differential equations x˙ = f (x) by a
low-order system of the form z˙ = g(z) + e, where |e| ≤ represents the error introduced in simplifying
the model (see [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]). Another way to analyse complex systems is to analyse separately their components.
When the components depend on one another, we can decouple them by replacing an input from another
component by noise varying over the range of possible values, again resulting in smaller but uncertain
systems (see [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]). Note that stochastic models are not appropriate in these cases since inputs are not
random.
      </p>
      <p>
        To analyse reliably the behaviour and properties of a system, notably safety, uncertainties in the
system must be taken into account when modelling, and rigorous numerical methods are necessary in order
to provide guaranteed correct solutions. Designing numerical algorithms for computing solutions of DIs
rigorously, efficiently and with high precision remains a point of current research. Different techniques and
various types of numerical methods have been proposed in the literature. Some of the recent algorithms
include ellipsoidal methods in [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], an interval Taylor-model approach in [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], Lohner-type
algorithms in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], optimal control in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], set-based approximations to the Peano-Baker series in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], hybrid
bounding methods in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], and a set-oriented method in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. However, none of these algorithms give both
validated enclosures and guaranteed convergence with high-order precision for nonlinear DIs and thus
are not of direct interest for comparison. We mention some closely related algorithms implemented by
publicly available tools: [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] implemented within the tool Flow*, [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] implemented on top of CORA
2015, [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] implemented on top of CVODE and finally CORA 2018 (see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]).
      </p>
      <p>
        Our algorithm, whose initial version was presented in [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], considers a system with dynamics
x˙ (t) = f (x(t), v(t)) , x(t) ∈ Rn , v(t) ∈ V ⊂ Rm
(1)
where f : Rn × Rm → Rn is a smooth function, V is a compact set and v(t) is a measurable function
known as the disturbance input. In particular, [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] discusses how to compute the reachable set for
nonlinear control systems which are input-affine, i.e., affine with respect to noisy inputs. Also, a reasonable
assumption in practice is that noisy inputs are elements of a box whose vector components are intervals.
      </p>
      <p>The numerical approach focuses on (a) using an auxiliary function system to account for the input
during a continuous step of evolution, then (b) adding the high-order theoretical error between the given
system and the auxiliary one. Such approach is formally correct since it yields an over-approximation of
the reachable set. However, the higher the order desired, the greater the number of parameters for the
auxiliary system required for each continuous step, which clearly affects the efficiency of the algorithm.
The question remains if the auxiliary system approach yields the best trade-off between precision and
efficiency for computing reachable sets. The answer is not straightforward and most likely depends on the
system itself.</p>
      <p>
        The work presented in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] illustrates how we implemented the algorithm from [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] in Ariadne,
by analysing a benchmark of ten systems, whose results are then compared with Flow* and CORA
2018. The paper shows the importance of higher-order methods as more accuracy was achieved with
two-parameter approximations on nine out of ten systems considered. Moreover, we found that Ariadne
yields tighter set bounds, as the nonlinearity increases, compared with the other tools. Although no
analysis of the order of the method is given in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we believe that Flow* has a local error O(h2), where
h is the integration step size, so the global error is intrinsically first-order. Hence a higher quality is to be
expected from Ariadne, since the proposed methodology is able to achieve third-order local errors. On
the other hand, our approach introduces extra parameters at each step in the representation of the evolved
set, causing a growth in complexity, whereas Flow* and CORA have a fixed complexity. As a result, the
computational cost increases with both the noise level and the total number of steps taken. A comparison
with the state-of-the-art using a common time budget indeed suggests that Ariadne currently provides
better bounds for highly nonlinear systems.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Open issues and current work</title>
      <p>The presence of differential inclusions introduces additional issues and opportunities in the analysis of
continuous and hybrid systems, for which we are working on several improvements and extensions to the
framework:
• Improve reconditioning of the set. The addition of parameters on each continuous step
ultimately requires to simplify the set in order to keep the computation time reasonable. This
operation necessarily introduces an additional over-approximation error which should be controlled
in order to return a trajectory with acceptable quality. At the same time, adding new parameters
from the uniform error allows to improve the computation of the flow set. Therefore an interesting
open problem in the literature is the identification of the conditions that guarantee a given order of
convergence with respect to the reconditioning policy.
• Automation of accuracy parameter. A manual, fixed tuning phase at the beginning of the
reachability routine has a very limited capability to identify a (sub)optimal strategy for evolution.
Instead, we are exploring a reasonable approach relying on a pre-analysis of the system by point-based
simulation. In this case, we drop the guarantees given by set-based evolution, in order to gain valuable
local information on the system evolution in a significantly shorter verification time vs. manual
refinement through multiple analyses varying the accuracy parameters. The resulting information
necessarily comes with no guarantees of correctness, meaning that the obtained evolution may
include spurious transitions or miss some transitions. Still, for sufficiently well-behaved dynamics
this approach is able to identify reached regions where evolution is numerically critical. Given
such pre-analysis of the system, preemptive policies can be enacted that tune locally numerical
parameters, with the goal to trade-off precision vs. verification time.
• Extension to non-input-affine inclusions and more expressive input bounds. The ability
to decompose a system into several subsystems implies that we should be able to replace any variable
of a differential equation with an input. Such operation may return a non-input-affine inclusion,
which needs to be handled on an ad-hoc basis under our theoretical framework. Additionally, when
a set of inputs represents the reachable set from another subsystem, its representation using a box
introduces an excessive over-approximation. To address this issue, we are exploring the extension to
polytope/zonotope bounds with nonlinear constraints.</p>
      <p>Summarising, dealing with noisy nonlinear systems requires both local and global strategies in order to
allow evolution to progress with bounded over-approximation error and reasonable efficiency of computation.
Future work will focus on improving such strategies and on extending the tool to handle more general
differential inclusions, with the overall objective of providing an automated way of analysing large-scale
hybrid systems.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Althoff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Grebenyuk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Kochdumper</surname>
          </string-name>
          .
          <article-title>Implementation of Taylor Models in CORA 2018</article-title>
          .
          <source>In Proc. of the 5th International Workshop on Applied Verification for Continuous and Hybrid Systems</source>
          , pages
          <fpage>145</fpage>
          -
          <lpage>173</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Althoff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. L.</given-names>
            <surname>Guernic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B. H.</given-names>
            <surname>Krogh</surname>
          </string-name>
          .
          <article-title>Reachable set computation for uncertain time-varying linear systems</article-title>
          .
          <source>In Hybrid Systems: Computation and Control</source>
          , pages
          <fpage>93</fpage>
          -
          <lpage>102</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Courcoubetis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Henzinger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. H.</given-names>
            <surname>Ho</surname>
          </string-name>
          .
          <article-title>Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems</article-title>
          .
          <source>In Hybrid Systems</source>
          , volume
          <volume>736</volume>
          <source>of LNCS</source>
          , pages
          <fpage>209</fpage>
          -
          <lpage>229</lpage>
          , Lyngby,
          <string-name>
            <surname>DK</surname>
          </string-name>
          ,
          <year>1993</year>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Aubin</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Cellina.</surname>
          </string-name>
          <article-title>Differential inclusions</article-title>
          , volume
          <volume>264</volume>
          <source>of Fundamental Principles of Mathematical Sciences. Springer</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baier</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Gerdts</surname>
          </string-name>
          .
          <article-title>A computational method for non-convex reachable sets using optimal control</article-title>
          .
          <source>In Proceedings of the European Control Conference</source>
          <year>2009</year>
          , pages
          <fpage>97</fpage>
          -
          <lpage>102</lpage>
          , Budapest, HU,
          <year>2009</year>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Benvenuti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          , P. Collins,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          . Ariadne:
          <article-title>Dominance checking of nonlinear hybrid automata using reachability analysis</article-title>
          .
          <source>In Reachability Problems</source>
          , volume
          <volume>7550</volume>
          <source>of LNCS</source>
          , pages
          <fpage>79</fpage>
          -
          <lpage>91</lpage>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Benvenuti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          , P. Collins,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>Assume-guarantee verification of nonlinear hybrid systems with Ariadne</article-title>
          .
          <source>Int. J. Robust. Nonlinear Control</source>
          ,
          <volume>24</volume>
          (
          <issue>4</issue>
          ):
          <fpage>699</fpage>
          -
          <lpage>724</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Guglielmo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Muradore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fiorini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>Open problems in verification and refinement of autonomous robotic systems</article-title>
          .
          <source>In 15th Euromicro Conf. on Digital System Design (DSD)</source>
          , pages
          <fpage>469</fpage>
          -
          <lpage>476</lpage>
          ,
          <year>Sept 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Guglielmo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>Correct-by-construction code generation from hybrid automata specification</article-title>
          .
          <source>In 7th Int. Wireless Communications and Mobile Computing Conf. (IWCMC)</source>
          , pages
          <fpage>1660</fpage>
          -
          <lpage>1665</lpage>
          ,
          <year>July 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Reachability Analysis of Non-Linear Hybrid Systems Using Taylor Models</article-title>
          .
          <source>PhD thesis</source>
          , Aachen University,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Sankaranarayanan</surname>
          </string-name>
          .
          <article-title>Decomposed reachability analysis for nonlinear systems</article-title>
          .
          <source>In 2016 IEEE Real-Time Systems Symposium (RTSS)</source>
          , pages
          <fpage>13</fpage>
          -
          <lpage>24</lpage>
          ,
          <year>Nov 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Collins</surname>
          </string-name>
          .
          <article-title>Semantics and computability of the evolution of hybrid systems</article-title>
          .
          <source>SIAM J. Control Optim</source>
          .,
          <volume>49</volume>
          :
          <fpage>890</fpage>
          -
          <lpage>925</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Collins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>Computing the evolution of hybrid systems using rigorous function calculus</article-title>
          .
          <source>In Proc. of the 4th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS12)</source>
          , pages
          <fpage>284</fpage>
          -
          <lpage>290</lpage>
          , Eindhoven, The Netherlands,
          <year>June 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dellnitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Klus</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Ziessler</surname>
          </string-name>
          .
          <article-title>A set-oriented numerical approach for dynamical systems with parameter uncertainty</article-title>
          .
          <source>SIAM J. on Applied Dynamical Systems</source>
          ,
          <volume>16</volume>
          (
          <issue>1</issue>
          ):
          <fpage>120</fpage>
          -
          <lpage>138</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Filippov.</surname>
          </string-name>
          <article-title>Differential Equations with Discontinuous Right-Hand Sides</article-title>
          , volume
          <volume>18</volume>
          <source>of Mathematics and its Applications</source>
          . Kluwer,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Fortuna</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Nunnari, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gallo</surname>
          </string-name>
          .
          <article-title>Model Order Reduction Techniques with Applications in Electrical Engineering</article-title>
          . Springer,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Muradore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fiorini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>Parametric formal verification: the robotic paint spraying case study</article-title>
          .
          <source>In Proceedings of the 20th IFAC World Congress</source>
          , pages
          <fpage>9248</fpage>
          -
          <lpage>9253</lpage>
          ,
          <year>July 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Živanović</given-names>
            <surname>Gonzalez</surname>
          </string-name>
          , P. Collins,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>Rigorous continuous evolution of uncertain systems</article-title>
          .
          <source>In Proc. 12th International Workshop on Numerical Software Verification (NSV2019)</source>
          , volume
          <volume>11652</volume>
          <source>of LNCS</source>
          , pages
          <fpage>60</fpage>
          -
          <lpage>75</lpage>
          . Springer,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Haesaert</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. M.</surname>
          </string-name>
          <article-title>V. den Hof, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Abate</surname>
          </string-name>
          .
          <article-title>Data-driven and model-based verification via Bayesian identification and reachability analysis</article-title>
          .
          <source>Automatica</source>
          ,
          <volume>79</volume>
          :
          <fpage>115</fpage>
          -
          <lpage>126</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Cai</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          .
          <source>Theory of Control Systems Described by Differential Inclusions</source>
          . Springer Tracts in Mechanical Engineering. Springer-Verlag,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Harwood</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Barton</surname>
          </string-name>
          .
          <article-title>Efficient polyhedral enclosures for the reachable set of nonlinear control systems</article-title>
          .
          <source>Mathematics of Control, Signals, and Systems</source>
          ,
          <volume>28</volume>
          (
          <issue>8</issue>
          ),
          <year>March 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ivanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Weimer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. J.</given-names>
            <surname>Pappas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I.</given-names>
            <surname>Lee</surname>
          </string-name>
          . Verisig:
          <article-title>Verifying safety properties of hybrid systems with neural network controllers</article-title>
          .
          <source>In 22nd ACM International Conference on Hybrid Systems: Computation and Control</source>
          , pages
          <fpage>169</fpage>
          -
          <lpage>178</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T. L.</given-names>
            <surname>Johnson</surname>
          </string-name>
          .
          <article-title>Improving automation software dependability: A role for formal methods</article-title>
          ?
          <source>Control Engineering Practice</source>
          ,
          <volume>15</volume>
          (
          <issue>11</issue>
          ):
          <fpage>1403</fpage>
          -
          <lpage>1415</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>H.</given-names>
            <surname>Kress-Gazit</surname>
          </string-name>
          .
          <article-title>Robot challenges: Toward development of verification and synthesis techniques [from the guest editors]</article-title>
          .
          <source>Robotics Automation Magazine</source>
          , IEEE,
          <volume>18</volume>
          (
          <issue>3</issue>
          ):
          <fpage>22</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>Sept 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kurzhanski</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Valyi.</surname>
          </string-name>
          <article-title>Ellipsoidal calculus for estimation and control</article-title>
          .
          <source>Systems and Control: Foundations and Applications</source>
          . Birkhäuser,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Stadtherr</surname>
          </string-name>
          .
          <article-title>Validated solutions of initial value problems for parametric ODEs</article-title>
          . Applied Numerical Mathematics,
          <volume>57</volume>
          (
          <issue>10</issue>
          ):
          <fpage>1145</fpage>
          -
          <lpage>1162</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>R.</given-names>
            <surname>Medhat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ramesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bonakdarpour</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Fischmeister</surname>
          </string-name>
          .
          <article-title>A framework for mining hybrid automata from input/output traces</article-title>
          .
          <source>In 2015 International Conference on Embedded Software (EMSOFT)</source>
          , pages
          <fpage>177</fpage>
          -
          <lpage>186</lpage>
          ,
          <year>Oct 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>P.</given-names>
            <surname>Nuzzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Sangiovanni-Vincentelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bresolin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Geretti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Villa</surname>
          </string-name>
          .
          <article-title>A platform-based design methodology with contracts and related tools for the design of cyber-physical systems</article-title>
          .
          <source>Proceedings of the IEEE</source>
          ,
          <volume>103</volume>
          (
          <issue>11</issue>
          ):
          <fpage>2104</fpage>
          -
          <lpage>2132</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ramdani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Meslem</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Candau</surname>
          </string-name>
          .
          <article-title>A hybrid bounding method for computing an overapproximation for the reachable set of uncertain nonlinear systems</article-title>
          .
          <source>IEEE Transactions on Automatic Control</source>
          ,
          <volume>54</volume>
          (
          <issue>10</issue>
          ):
          <fpage>2352</fpage>
          -
          <lpage>2364</lpage>
          ,
          <year>October 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rungger</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Reissig</surname>
          </string-name>
          .
          <article-title>Arbitrarily precise abstractions for optimal controller synthesis</article-title>
          .
          <source>In 2017 IEEE 56th Annual Conference on Decision and Control (CDC)</source>
          , pages
          <fpage>1761</fpage>
          -
          <lpage>1768</lpage>
          ,
          <year>Dec 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rungger</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zamani</surname>
          </string-name>
          .
          <article-title>Accurate reachability analysis of uncertain nonlinear systems</article-title>
          .
          <source>In Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week)</source>
          ,
          <source>HSCC</source>
          <year>2018</year>
          , Porto, Portugal,
          <source>April 11-13</source>
          ,
          <year>2018</year>
          , pages
          <fpage>61</fpage>
          -
          <lpage>70</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Smirnov</surname>
          </string-name>
          .
          <article-title>Introduction to the theory of differential inclusions</article-title>
          , volume
          <volume>41</volume>
          of Graduate Studies in Mathematics.
          <source>American Mathematical Society</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zivanovic</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Collins</surname>
          </string-name>
          .
          <article-title>Numerical solutions to noisy systems</article-title>
          .
          <source>In IEEE Conf. on Decision and Control (CDC)</source>
          , pages
          <fpage>798</fpage>
          -
          <lpage>803</lpage>
          ,
          <year>Dec 2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>