<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Combining Deduction and Algebraic Constraints for Hybrid System Analysis?</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Oldenburg, Department of Computing Science</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>164</fpage>
      <lpage>178</lpage>
      <abstract>
        <p>We show how theorem proving and methods for handling real algebraic constraints can be combined for hybrid system verification. In particular, we highlight the interaction of deductive and algebraic reasoning that is used for handling the joint discrete and continuous behaviour of hybrid systems. We illustrate proof tasks that occur when verifying scenarios with cooperative traffic agents. From the experience with these examples, we analyse proof strategies for dealing with the practical challenges for integrated algebraic and deductive verification of hybrid systems, and we propose an iterative background closure strategy.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Safety-critical systems occurring in traffic scenarios [
        <xref ref-type="bibr" rid="ref27 ref9">9, 27</xref>
        ] often are hybrid
systems [
        <xref ref-type="bibr" rid="ref11 ref17">17, 11</xref>
        ], i.e., they combine discrete and continuous behaviour. Discrete
behaviour typically originates from a digital controller, which regulates driving
and switches to various modes in order to react to changes in the traffic
situation. Continuous behaviour is more inherent in the physical process dynamics
and results from continuous changes of quantities such as positions over time.
Models to describe interacting dynamics use differential equations for continuous
evolution and use discrete jumps for discrete state changes [
        <xref ref-type="bibr" rid="ref17 ref20 ref24">17, 24, 20</xref>
        ].
      </p>
      <p>
        Most verification tools for hybrid systems such as HyTech [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], CheckMate [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ],
or PHAVer [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], follow the model checking paradigm [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and work by successive
computation of images under hybrid transitions [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        Because of intricacies of complex continuous dynamics, numerical issues
during computations, and general limits of numerical approximation [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], hybrid
system model checkers are still much more successful in falsification than in
verification. In this work, we are primarily interested in verifying hybrid systems
rather than finding bugs. Consequently, we favour a fully symbolic technique,
and we follow a deductive approach. Further, unlike model checking, deductive
techniques support free parameters [
        <xref ref-type="bibr" rid="ref11 ref20">11, 20</xref>
        ], which occur in our applications.
      </p>
      <p>
        We have introduced a family of logics for deductive verification of hybrid
systems [
        <xref ref-type="bibr" rid="ref20 ref21 ref22">20, 22, 21</xref>
        ]. We have introduced [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] a dynamic logic dL and a calculus
? This research was supported by the German Research Council (DFG) as part of the Transregional
Collaborative Research Center (SFB/TR 14 AVACS, see www.avacs.org).
for verifying hybrid systems. We have also presented [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] an extension with
nominals to investigate compositionality. Moreover, we have introduced [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] a
temporal extension for verifying correct behaviour at intermediate states.
      </p>
      <p>
        While the theoretical background and technical details of our approach can
be found in [
        <xref ref-type="bibr" rid="ref20 ref21 ref22">20, 22, 21</xref>
        ], here we discuss the practical aspects of combining
deduction and algebraic constraints techniques. In particular, we highlight the
principles how both techniques interact for verifying hybrid systems. For this,
we analyse the degrees of freedom in implementing our calculus in terms of the
nondeterminisms of our proof procedure. We illustrate the impact that various
choices of proof strategies have on the overall performance. For hybrid system
verification, we observe that the nondeterminisms in the interaction between
deductive and real algebraic reasoning have considerable impact on the practical
feasibility. In this paper, we analyse and explain the causes and consequences of
this effect and propose a proof strategy that avoids these complexity pitfalls.
      </p>
      <p>In this paper, we study the modular combination in the dL calculus. Our
observations are of more general interest, though, and we conjecture that similar
results hold for other tableaux prover combinations of logics with interpreted
function symbols that are handled using background decision procedures for
computationally expensive theories including real arithmetic, approximations of
natural arithmetic, or arrays.</p>
      <p>
        Related Work. There are a selected number of logics dedicated to hybrid
systems [
        <xref ref-type="bibr" rid="ref11 ref24 ref28">24, 11, 28</xref>
        ]. They focus on other aspects like topological aspects [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] or
parallel composition [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], and they do not provide calculi with a constructive
integration of arithmetic reasoning that can be used easily for practical
verification. Our calculus, however, can be used for verifying actual operational hybrid
system models [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ], which is of considerable practical interest [
        <xref ref-type="bibr" rid="ref11 ref17 ref27 ref9">9, 27, 17, 11</xref>
        ].
      </p>
      <p>
        A few other approaches [
        <xref ref-type="bibr" rid="ref1 ref19">19, 1</xref>
        ] use deduction for verifying hybrid systems
and actually integrate arithmetic reasoning in STeP [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] or in PVS [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
respectively. Their working principle is, however, quite different from ours. Given a
hybrid automaton [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] and a global system invariant, they compile, in a single
step, a verification condition expressing that the invariant is preserved under all
transitions of the hybrid automaton. Hence, the hybrid aspects and transition
structure vanish completely before the deduction even start. All that remains
is a quantified mathematical formula. In contrast, our dynamic logic works by
symbolic decomposition and preserves the transition structure during the proof,
which simplifies traceability of results considerably. The structure in this
symbolic decomposition can be exploited for deriving invariants or parametric
constraints [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ]. Consequently, in dL, invariants do not necessarily need to be
given beforehand.
      </p>
      <p>
        Several other approaches combine deductive and arithmetic reasoning, e.g. [
        <xref ref-type="bibr" rid="ref2 ref6">6,
2</xref>
        ]. Their focus, however, is on general mathematical reasoning in classes of
higher-order logic and is not tailored to verify hybrid systems. Our work,
instead, is intended to make practical verification of hybrid systems possible. For
a discussion of work related to the logic dL itself, we refer to [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
Structure of this Paper. In Section 2, we summarise the syntax, semantics,
and calculus of the differential logic dL, that we introduced [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In Section 3,
we report on the kind of applications that we are interested in, and we illustrate
typical proof tasks. In Section 4, we analyse the principles how the dL calculus
combines deductive with algebraic reasoning and illustrate the consequences of
various proof strategies in our applications from Section 3. Finally, we draw
conclusions and discuss future work in Section 5.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Differential Logic</title>
      <p>
        In this section, we briefly recapitulate the differential logic dL that we have
introduced [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] and point out the characteristic traits of d . We only develop
L
the theory as far as necessary and refer to [
        <xref ref-type="bibr" rid="ref20 ref21 ref22">21, 20, 22</xref>
        ] for more background. The
logic dL is a dynamic logic [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] with programs extended to hybrid programs [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        The principle of dynamic logic [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] is to combine system operations and
correctness statements about system states within a single specification language.
By permitting system operations α as actions of a labelled multi-modal logic,
dynamic logic provides formulas of the form [α]φ and hαiφ, where [α]φ expresses
that all (terminating) runs of system α lead to states in which condition φ holds.
Likewise, hαiφ expresses that there is at least one (terminating) run of α after
which φ holds. In d , hybrid programs play the role of α.
      </p>
      <p>L</p>
      <p>Hybrid programs generalise discrete programs to hybrid change. In addition
to the operations of discrete while programs, they have continuous evolution
along differential equations as a fundamental operation. For example, the
evolution of a train with constant braking can be expressed with a system action
for the differential equation z¨ = −b with second time-derivative z¨ of z.
2.1</p>
      <sec id="sec-2-1">
        <title>Syntax of Differential Logic</title>
        <p>Terms and Formulas. The formulas of dL are built over a finite set V of
realvalued variables and a signature Σ containing the usual function and predicate
symbols for real arithmetic, such as 0, 1, +, ·, =, ≤, &lt;, ≥, &gt;. Observe that there
is no need to distinguish between discrete and continuous variables in d .
L</p>
        <p>
          The set Trm(V ) of terms is defined as in classical first-order logic
yielding polynomial expressions. The set Fml(V ) of formulas of dL is defined as in
first-order dynamic logic [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. That is, they are built using propositional
connectives ∧, ∨, →, ¬ and quantifiers ∀, ∃ (first-order part). In addition, if φ is a dL
formula and α a hybrid program, then [α]φ, hαiφ are formulas (dynamic part).
Hybrid Programs. In dL elementary discrete jumps and continuous evolutions
interact using regular control structure to form hybrid programs.
Definition 1 (Hybrid programs). The set HP(V ) of hybrid programs is
inductively defined as the smallest set such that
– If x ∈ V and θ ∈ Trm(V ), then (x := θ) ∈ HP(V ).
– If x ∈ V , θ ∈ Trm(V ), then (x˙ = θ) ∈ HP(V ).
– If χ ∈ Fml(V ) is a quantifier-free first-order formula, then (?χ) ∈ HP(V ).
– If α, β ∈ HP(V ) then (α; β) ∈ HP(V ).
– If α, β ∈ HP(V ) then (α ∪ β) ∈ HP(V ).
– If α ∈ HP(V ) then (α∗) ∈ HP(V ).
        </p>
        <p>
          The effect of x := θ is a discrete jump in state space by an instantaneous
assignment. That of x˙ = θ is an ongoing continuous evolution controlled by the
differential equation x˙ = θ. Systems of differential equations, higher-order derivatives,
and evolution invariant regions [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] are defined accordingly.
        </p>
        <p>
          The test action ?χ is used to define conditions. Its semantics is that of a
no-op if χ is true in the current state, and that of a failure divergence blocking
all further evolution, otherwise. The non-deterministic choice α ∪ β, sequential
composition α; β and non-deterministic repetition α∗ of hybrid programs are as
usual. They can be combined with ?χ to form other control structures, see [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Semantics of Differential Logic</title>
        <p>The interpretations of dL consist of states assigning real values to state
variables, which progress along a sequence of states. A potential behaviour of a
hybrid system corresponds to a sequence of states that contain the observable
values of system variables during its hybrid evolution. The semantics of a hybrid
program α is captured by the state transitions that are possible by running α.</p>
        <p>A state is a map ν : V → R; the set of all states is denoted by Sta(V ).
Further, we use ν[x 7→ d] to denote the modification of a state ν that is identical
to ν except for the interpretation of the symbol x, which is d ∈ R.</p>
        <p>For discrete operations, the semantics, ρ(α), of hybrid program α as a state
transition relation in dL is as customary in dynamic logic (Def. 3). For
continuous evolutions, the transition relation holds for pairs of states that can be
interconnected by a continuous system flow respecting the differential equation.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Definition 2 (Valuation of terms and formulas). For terms and formulas,</title>
        <p>
          the valuation val(ν, ·) with respect to state ν is defined as usual for first-order
modal logic (e.g. [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]), i.e., using the following definitions for modal operators
1. val(ν, [α]φ) = true :⇐⇒ val(ω, φ) = true for all ω with (ν, ω) ∈ ρ(α)
2. val(ν, hαiφ) = true :⇐⇒ val(ω, φ) = true for some ω with (ν, ω) ∈ ρ(α)
Definition 3 (Semantics of hybrid programs). The valuation, ρ(α), of a
hybrid program α, is a transition relation on states. It specifies which state ω is
reachable from a state ν by operations of the hybrid system α and is defined as
1. (ν, ω) ∈ ρ(x := θ) :⇐⇒ ω = ν[x 7→ val(ν, θ)]
2. (ν, ω) ∈ ρ(x˙ = θ) :⇐⇒ there is a function f : [0, r] → Sta(V ) with r ≥ 0 such
that f (0) = ν, f (r) = ω, and val(f (ζ), x) is continuous in ζ on [0, r] and
has a derivative of value val(f (ζ), θ) at each time ζ ∈ (0, r). For y 6= x
and ζ ∈ [0, r], val(f (ζ), y) = val(ν, y). Systems of differential equations are
defined accordingly.
3. ρ(?χ) = {(ν, ν) : val(ν, χ) = true}
4. ρ(α; β) = ρ(α)◦ρ(β) = {(ν, ω) : (ν, z) ∈ ρ(α), (z, ω) ∈ ρ(β) for some state z}
5. ρ(α ∪ β) = ρ(α) ∪ ρ(β)
6. (ν, ω) ∈ ρ(α∗) iff there are n ∈ N and ν=ν0, . . . , νn=ω with (νi, νi+1) ∈ ρ(α)
for all 0 ≤ i &lt; n.
2.3
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>A Calculus for Differential Logic</title>
        <p>
          In this section, we briefly review the dL sequent calculus that we introduced [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
It can be used for verifying hybrid systems in d . With the basic idea being to
L
perform a symbolic evaluation, it successively transforms hybrid programs into
logical formulas describing their effects.
        </p>
        <p>
          The dL calculus combines deduction and handling of real algebraic
constraints modularly. Simply speaking, the purely deductive part of the dL calculus
handles the discrete part, whereas the continuous part is tackled by real
algebraic constraint techniques. On this basis, hybrid system behaviour of interacting
discrete-continuous dynamics is handled by a modular calculus combination [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>The dL sequent calculus is summarised in Fig. 1. A sequent is of the form
Γ ` Δ, where Γ and Δ are finite sets of formulas. Its semantics is that of the
formula Vφ∈Γ φ → Wψ∈Δ ψ. Sequents will be treated as an abbreviation. As
usual in sequent calculus—although the direction of entailment is from premisses
(above rule bar) to conclusion (below)—the order of reasoning is goal-directed :
Rules are applied in tableau-style, that is, starting from the desired conclusion
at the bottom (goal) to the premisses (sub-goals).</p>
        <p>
          The rule schemata in Fig. 1 can be applied anywhere in the sequent, in
particular after adding an arbitrary context Γ, Δ, see [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] for details. Moreover,
the symmetric schemata D1–D10 can be applied on either side of the sequent.
Finally, in D7 and D8, the schematic modality h[·]i stands for either [·] or h·i.
        </p>
        <p>
          For propositional logic, standard rules P1–P9 are listed in Fig. 1. The other
rules transform hybrid programs into simpler logical formulas, thereby relating
the meaning of programs and formulas. Rules D1–D7 are as in discrete dynamic
logic [
          <xref ref-type="bibr" rid="ref16 ref5">16, 5</xref>
          ]. D8 uses generalised substitutions [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] for handling discrete change.
Unlike in uninterpreted first-order logic [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], quantifiers are dealt with using
Rule D8 is only applicable if the substitution of x by θ in φθx introduces no new bindings. In D9–D10, t
is a fresh variable, and, for any v, yv is the solution of the initial value problem (x˙ = θ, x(0) = v).
In F1–F4, x does not occur in Γ, Δ. Further, the Γi ` Δi are obtained from the resulting sub-goals of
a side deduction. The side deduction is started from the goal Γ ` Δ, φ at the bottom (or Γ, φ ` Δ for
F2 and F4). In the resulting sub-goals Γi ` Δi, variable x is assumed to occur in first-order formulas
only, as quantifier elimination (QE) is then applicable.
quantifier elimination [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] over the reals (QE in F1–F4) in a way that is compatible
with dynamic modalities. D9–D10 handle continuous evolution given a first-order
definable flow yx for the differential equation x˙ = θ with symbolic initial value x.
D11 is an induction schema with inductive invariant p.
        </p>
        <p>
          At this point, the full details of how F1–F4 use side deductions to lift
quantifier elimination to dynamic logic are not important (they can be found in [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]).
What is important to note, however, is that quantifier rules and rules for
handling modalities need to interact because the actual constraints on quantified
symbols depend on the effect of the hybrid programs within modalities [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
Thus, at some point, after a number of rule applications that handle the
dynamic part, rules F1–F4 will be used to discharge (or at least simplify) a proof
obligation over real algebraic or semialgebraic constraints by quantifier
elimination [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. The remaining sub-goals will be analysed further again using dynamic
rules. The rules F1–F4 constitute the modular interface that combines
deduction for handling dynamic reasoning with algebraic constraint techniques for
handling continuous reasoning about R. We discuss the consequences and
principles of this combination in Section 4 and analyse proof strategies.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Analysis of the European Train Control System</title>
      <p>
        In this section, we report on the applications in safety-critical system verification
that we verify in the dL calculus, see [
        <xref ref-type="bibr" rid="ref20 ref21">21, 20</xref>
        ]. We illustrate the typical kinds
of proof obligations that occur during our deductive analysis of such hybrid
systems. Our experience with verifying these applications forms the basis for our
analysis of prover combinations and will be used for illustration in Section 4.
Train Control Applications. In the European Train Control System (ETCS) [
        <xref ref-type="bibr" rid="ref20 ref9">9,
20</xref>
        ], trains are only allowed to move within their current movement authority
block (MA). When their MA is not extended before reaching its end, trains
always have to stop within the MA because there can be open gates or other trains
beyond. Here, we identify a single component which is most responsible for the
hybrid characteristics of safe driving. The speed supervision is responsible for
locally controlling the movement of a train such that it always remains within
its MA. Depending on the current driving situation, the speed supervision
determines a safety envelope s around the train, within which driving is safe, and
adjusts its acceleration a in accordance with s (called correction in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]).
      </p>
      <p>
        We assume that an MA has been granted up to track position m and the
train is located at position z, heading with initial speed v towards m. In this
situation, dL can verify safety properties of speed supervision of the form
ψ → [(corr ; drive)∗]z ≤ m
where corr ≡ (?m − z &lt; s; a := −b) ∪ (?m − z ≥ s; a := . . . )
drive ≡ τ := 0; (z˙ = v, v˙ = a, τ˙ = 1; ?v ≥ 0 ∧ τ ≤ ε)
ψ ≡ v2 ≤ 2b(m − z) ∧ b &gt; 0 ∧ &gt; 0 .
(1)
(2)
It expresses that a train will always remain within its MA m, assuming a
constraint ψ for the parameters. In corr , the train corrects its acceleration or brakes
with force b (as a failsafe recovery manoeuvre [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]) on the basis of the remaining
distance (m−z). Then, the train continues moving according to drive. There, the
position z of the train evolves according to the system z˙ = v, v˙ = a (i.e., z¨ = a).
The evolution stops when the speed v drops below zero (or earlier).
Simultaneously, clock τ measures the duration of the current drive phase before the
controllers react to situation changes (we model this to bridge the gap of
continuous-time models and discrete-time control design). Clock τ is reset to zero
when entering drive, constantly evolves along τ˙ = 1, and is bound by the
invariant region τ ≤ ε. The effect is that a drive phase is interrupted for reassessing
the driving situation after at most ε seconds, and the corr; drive loop repeats.
Parameter Constraint Discovery. In addition to proof tasks for safety
verification, the dL approach is also useful for parameter constraint discovery. That is,
Deductive
Prover
instead of starting with a concrete instantiation for ψ in formula (1), the dL
calculus can be used to identify the required constraints ψ on the free parameters
of (1) during the proof. In particular, the constraint ψ in (2) has been discovered
by a (semi)automatic discovery process with the dL calculus [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
Finding Inductive Invariants. As a related proof task, the dL calculus can be
useful for identifying inductive invariants that D11 needs during a proof [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] by
analysing partial proofs of individual cases.
4
4.1
      </p>
    </sec>
    <sec id="sec-4">
      <title>Combining Deduction and Algebraic Constraints</title>
      <sec id="sec-4-1">
        <title>Modular Combination of Provers</title>
        <p>
          The principle how the dL calculus in Fig. 1 combines deduction technology
with methods for handling real algebraic constraints complies with the general
background reasoning principles [
          <xref ref-type="bibr" rid="ref12 ref26 ref4">4, 26, 12</xref>
          ]. Unlike in the approaches of Dowek
et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] and Tinelli [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], the information given to the background prover is
not restricted to ground formulas [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] or to atomic formulas as in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. From an
abstract perspective, the dL calculus selects a set Φ of (quantified) formulas from
an open branch (Φ is called key) and hands it over to the quantifier elimination
procedure. The resulting formula obtained by applying QE to Φ is then returned
to the main sequent prover as a result, and the main proof continues, see Fig. 2.
        </p>
        <p>In this context, the propositional rules and D-rules (D1–D11) constitute the
foreground rules in the main prover (left box of Fig. 2) and the arithmetic rules
F1–F4 form the set of rules that invoke the background prover (right box).</p>
        <p>
          The tableaux procedure [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] for the dL calculus is presented in Fig. 3.
Observe that the tableaux procedure for our dL calculus has a modified set of
nondeterministic steps (indicated by B, M, and F , respectively in Fig. 4):
B: selectBranch, i.e., which open branch to choose for further rule applications.
M: selectMode, i.e., whether to apply foreground dL rules (P1–P9 and D1–D11)
or background arithmetic rules (F1–F4).
        </p>
        <p>F : selectFormula, i.e., which formula(s) to select for rule applications from the
current branch in the current mode.
while t a b l e a u x T has open branches do</p>
        <p>B := s e l e c t B r a n c h (T) (∗ B−nondeterminism ∗)
M := selectMode (B) (∗ M−nondeterminism ∗)
F := s e l e c t F o r m u l a s (B,M) (∗ F−nondeterminism ∗)
i f M = f o r e g r o u n d then</p>
        <p>B2 := r e s u l t o f a p p l y i n g a D−r u l e or P−r u l e to F i n B
r e p l a c e B by B2 i n T
else
send key F to background d e c i s i o n procedure QE
receive r e s u l t R from QE
apply a r u l e F1−F4 to T with QE−r e s u l t R
end i f
end while</p>
        <p>A further, but minor, nondeterminism is whether to expand loops using D6 or
to go for an induction by D11. The other dL rules do not produce any conflicts
once a formula has been selected as they apply to formulas of distinct structures.</p>
        <p>
          At this point, notice that, unlike the classical tableaux procedure [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], we
have three rather than four points of nondeterminism, since dL does not need
closing substitutions. The reason for this is that dL has an interpreted domain.
Rather than having to try out instantiations that have been determined by
unification as in uninterpreted first-order logic [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], we can make use of the
structure in the interpreted case of first-order logic over the reals. In particular,
arithmetic formulas can be reduced equivalently by QE to simpler formulas in the
sense that the quantified symbols no longer occur. As this transformation is an
equivalence, there is no loss of information and we do not need to backtrack [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]
or simultaneously keep track of multiple local closing instantiations [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          Despite this, the influence of nondeterminism on the practical prover
performance is remarkable. Even though the theory of real arithmetic is decidable
by quantifier elimination [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], its complexity is doubly exponential in the number
of quantifier alternations [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. While more efficient algorithms exist for linear
fragments [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], the practical performance is an issue in nonlinear cases. The
computational cost of individual rule applications is quite different from the
linear complexity of applying closing substitutions in uninterpreted tableaux.
        </p>
        <p>In principle, exhaustive fair application of background rules by the
nondeterminisms M and F remains complete for appropriate fragments of dL. In practice,
however, the complexity of real arithmetic quickly makes this na¨ıve approach
infeasible. In the remainder of this section, we discuss the consequences of the
nondeterminisms and sketch guidelines to overcome the combination problems.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Nondeterminisms in Branch Selection</title>
        <p>In classical uninterpreted tableaux, branch selection has no impact on
completeness but can have impact on the proving duration as closing substitutions can
sometimes be found much earlier on one branch than on the others. In the
interpreted case of dL, branch selection is even less important. As dL has no closing
substitutions, there is no direct interference among multiple branches. Branches
with (explicitly or implicitly) universally quantified variables have to be closed
independently, hence the branch order is not important. For instance, when x is
an implicitly universally quantified variable, the branches in the following proof
can be handled separately (branches are implicitly combined by conjunction and
universal quantifiers distribute over conjunctions):</p>
        <p>P5</p>
        <p>QE(∀x . . . ) QE(∀x . . . )
F1Γ, b &gt; 0 ` bx2 ≥ 0 F1Γ, b &gt; 0 ` bx4 + x2 ≥ 0</p>
        <p>Γ, b &gt; 0 ` (bx2 ≥ 0 ∧ bx4 + x2 ≥ 0)</p>
        <p>For existentially quantified variables, the situation is a bit more subtle as
multiple branches interfere indirectly in the sense that a simultaneous solution
needs to be found for all branches at once. In ∃v (v &gt; 0 ∧ v &lt; 0), for instance,
the two branches resulting from the cases v &gt; 0 and v &lt; 0 cannot be handled
separately as the existential quantifier claims the existence of a simultaneous
solution for v &gt; 0 and v &lt; 0, not two different solutions. Thus, when v is an
implicitly existentially quantified variable, the branches in the following proof
need to synchronise before quantifier elimination is applied:</p>
        <p>QE(∃v . . . )
b &gt; 2 ` b(v − 1) &gt; 0 b &gt; 2 ` (v + 1)2 + b (v + 1) &gt; 0
D8b &gt; 2 ` [v := v − 1]bv &gt; 0 D8b &gt; 2 ` [v := v + 1]v2 + b v &gt; 0
b &gt; 2 ` ([v := v − 1]bv &gt; 0 ∧ [v := v + 1]v2 + b v &gt; 0)
The order in which the intermediate steps at two branches are handled has no
impact on the proof. Branches like these synchronise on an existential variable v
in the sense that all occurrences of v need to be first-order for quantifier
elimination to work. Consequently, the only fairness assumption for B is that whenever
a formula of a branch is selected that is waiting for synchronisation with another
branch to become first-order, then it propagates its rule application to the other
branch. In the above case the left branch synchronises with the right branch
on v. Hence, rule F3 can only be applied to b(v − 1) &gt; 0 on the left branch after
D8 has been applied on the right branch to yield first-order occurrences of v.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Nondeterminisms in Formula Selection</title>
        <p>In background proving mode, it turns out that nondeterminism F is important
for the practical performance. When a branch closes or, at least, can be simplified
significantly by a quantifier elimination call, then the running time of a single
decision procedure call seems to depend strongly on the number of irrelevant
formulas that are selected in addition to the relevant ones by F .</p>
        <p>Clearly, when Φ is a set of formulas that yields a tautology such that
applying F1–F4 closes a branch, then selecting any superset Ψ ⊇ Φ of Φ from a
branch yields the same answer in the end (a sequent forms a disjunction of its
formulas hence it can be closed to true when any subset closes). However, the
running time until this result will be found in the larger Ψ is strongly disturbed
by the presence of complicated additional but irrelevant formulas. From our
experience with Mathematica, decision procedures for full real arithmetic seem to
be distracted considerably by such irrelevant additional information.</p>
        <p>Yet, such additional information accumulates in tableaux procedures quite
naturally, because the purpose of a proof branch in dL is to keep track of all
that is known about a particular (symbolic) case of the system behaviour.
Generally, not all of this knowledge finally turns out to be relevant for that case
but only plays a role in other branches. Nevertheless, throwing away part of this
knowledge light-heartedly would, of course, endanger completeness.</p>
        <p>
          For instance, the safety statement (1) in Section 3 depends on a constraint
on the safety envelope s that regulates braking versus acceleration by the
condition m − z ≥ s in corr . A maximal acceleration of a is permitted in case
m − z ≥ s, when adaptively choosing s depending on the current speed v,
maximum braking force b, and maximum controller response time in accordance
with the following constraint (which can be discovered by the dL calculus [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]):
This constraint is necessary for some but not for all cases of the safety analysis,
though. In the case where the braking behaviour of ETCS is analysed, for
instance, the constraint on s is irrelevant, because braking is the safest operation
that a train can do to avoid crashing into preceding trains. The unnecessary
presence of several quite complicated constraints like, for instance, (3), however,
can distract quantifier elimination procedures considerably.
        </p>
        <p>A possible solution for this is to iteratively consider more formulas of the
sequent and attempt decision procedure calls. There, only those additional
formulas need to be considered that share variables with any of the other selected
v2
s ≥ 2b +
a
b
+ 1
a ε2 + εv
2
.
(3)
formulas. Further, timeouts can be used to discontinue lengthy decision
procedure calls and continue along other choices of the nondeterminisms in Fig. 3. For
complicated cases with a prohibitive complexity, this heuristic process, which we
followed manually, worked well on our examples.
4.4</p>
      </sec>
      <sec id="sec-4-4">
        <title>Nondeterminisms in Mode Selection</title>
        <p>In its own right, nondeterminism M has less impact on the prover performance
than F . Every part of a branch could be responsible for closing it. In particular,
the foreground closing rule P9 of the main prover can only close branches for
comparatively trivial reasons like b &gt; 0, &gt; 0 ` &gt; 0. Hence, mode selection has
to give a chance to the background procedure every once in a while, following
some fair selection strategy. From the observation that some decision procedure
calls can run for hours without terminating, we can see, however, that M needs
to be devised with considerable care.</p>
        <p>As the reason for closing a branch can be hidden in any part of the sequent,
some expensive decision procedure calls can be superfluous if the branch can
be closed by continuing dL reasoning on the other parts. For instance, if F
is some complicated algebraic constraint, decision procedure calls triggered by
nondeterminism M can lead to nontermination within any feasible time for
. . . , &gt; 0, m − z ≥ s ` F, [drive] &gt; 0, . . .</p>
        <p>Instead, if M chooses foreground rules, then an analysis of [drive] &gt; 0 by dL
rules will quickly discover that the maximum reaction-time remains constant
while driving. Then, this part of the induction step closes without the need to
solve constraint F at all. For this reason, proof strategies that eagerly check for
closing branches by background procedure calls are not successful in practice.</p>
        <p>Unfortunately, converse strategies that strongly favour foreground dL rule
applications in M, are not appropriate either. There, splitting rules like P5
and P7 can eagerly split the problems onto multiple branches without necessarily
making them any easier to solve. If this happens, then slightly different but
similar arithmetic problems of about the same complexity need to be solved on
multiple branches rather than just one resulting in runtime blow-up.</p>
        <p>The reason why this can happen is that there is a syntactic redundancy in
the sequent encoding of formulas. For instance, the sets of sequents before and
after the following rule application are equivalent:</p>
        <p>P5
ψ ` v2 ≤ 2b(m − z)</p>
        <p>ψ `
ψ ` v2 ≤ 2b(m − z) ∧
&gt; 0 ψ ` (z ≥ 0 → v ≤ 0)
&gt; 0 ∧ (z ≥ 0 → v ≤ 0)
Yet, closing the three sequents above the bar by quantifier elimination is not
necessarily easier than the single sequent below (neither conversely). Even worse,
if the sequents close by applying rules to ψ, then similar reasoning has to be
repeated for three branches. This threefold reasoning may not be detected as
identical when ψ is again split differently on the three resulting branches.</p>
        <p>Further, the representational equivalence in sequents is purely syntactic, i.e.,
up to permutation, the representations share the same disjunctive normal form.
In the uninterpreted case, this syntactic redundancy is exploited by the rules P1–
P9 in order to transform sequents towards a canonical form with atomic
formulas, where partial closing situations are more readily identifiable. In the presence
of a background decision procedure, however, reduction to sequents with atomic
formulas is no longer necessary as it will be undone when handing the formulas
over to the background decision procedure.</p>
        <p>Even worse, algebraic constraint handling techniques as in Mathematica can
come up with a result that is only a restated version of the input when a
selected (open) formula cannot be simplified or closed. For instance, the
sequent z &lt; m ` v2 ≤ 2b(m − z) “reduces” to ` b ≥ v2/(2m − 2z) ∨ m ≤ z
without any progress. Such reformulation can easily lead to infinite proof loops when
the outcome is split by P8 and again handled by the background procedures.
4.5</p>
      </sec>
      <sec id="sec-4-5">
        <title>Iterative Background Closure Strategy</title>
        <p>As a strategy to solve the previously addressed issues, we propose the priorities
for rule applications in Fig. 5a (with rules at the top taking precedence over rules
at the bottom). In this strategy, algebraic constraints are left intact as opposed
to being split among multiple branches, because arithmetic rules have a higher
priority than propositional rules on first-order constraints. Further, the result of
the background procedure is only accepted when the number of variables has
decreased to avoid proof loops. Arithmetic background rules have priority 1 or 6.</p>
        <p>The effect of using priority 1 is that branches are checked eagerly for closing
conditions or variable reductions. If reasoning about algebraic constraints does
not yield any progress (no variables can be eliminated), then dL rules further
analyse the system. For this choice, it is important to work with timeouts to
prevent lengthy decision procedure calls from blocking dL proof progress.
1. arithmetic rules F1–F4 if variable eliminated
2. propositional rules P1–P4, P8–P9 on modalities
3. dynamic rules D1–D4, D7–D8
4. dynamic evolution rules D9–D10
5. splitting rules P5–P7 on modalities
6. arithmetic rules F1–F4 if variable eliminated
7. propositional rules P1–P9 on first-order formulas
16 16
8
2∗
4
1
8
2
16
∗4
5a: Proof strategy priorities.</p>
        <p>5b: Iterative background closure.</p>
        <p>This problem is reduced significantly when priority 6 is used for arithmetic
rules instead. The effect of priority 6 is that formulas containing modalities are
analysed as much as possible before arithmetic reasoning is applied to algebraic
constraint formulas. Then, however, the prover can again take too much time
analysing the effects of programs on branches which would already close due to
simple arithmetic facts like in &gt; 0, &lt; 0 ` [α]φ.</p>
        <p>
          A simple compromise is to use a combination of background rules with
priority 1 for quick linear arithmetic [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and to fall back to expensive quantifier
elimination calls for nonlinear arithmetic with priority 6.
        </p>
        <p>As a more sophisticated control strategy on top of the static priorities in
Fig. 5a, we propose iterative background closure (IBC). There, the idea is to
periodically apply arithmetic rules with a timeout T that increases by a factor
of 2 after background procedure runs have timed out, see Fig. 5b. Thus,
background rules interleave with other rule applications (triangles in Fig. 5b), and
the timeout for the sub-goals increases as indicated until the background
procedure successfully eliminated variables on a branch (marked by ∗). The effect is
that the prover avoids splitting in the average case but is still able to split cases
when combined handling turns out to be prohibitively expensive.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions and Future Work</title>
      <p>
        From the experience of using our dL calculus [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] for verifying parametric hybrid
systems in traffic applications, we have investigated combinations of deductive
and algebraic reasoning from a practical perspective. We have analysed the
principles of this prover combination, identified the nondeterminisms that remain in
the dL tableaux procedure, and analysed their impact. We have proposed proof
strategies that navigate among these nondeterminisms, including an iterative
background closure strategy. Similar to the huge importance of subsumption in
resolution, background-style tableaux proving requires quick techniques to rule
out branches closing for simple arithmetic reasons. In our preliminary
experiments with verifying cooperating traffic agents, our proof strategies significantly
reduced the number of interactions and the overall running time significantly.
      </p>
      <p>Future work includes validation of the IBC strategy by experiments in other
case studies using a full implementation in our verification tool. Further, we
will develop techniques that guide the selection of algebraic constraints by term
weight and variable occurrence to discharge simple cases quickly.
Acknowledgements. I thank the anonymous referees for their helpful comments.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>1. A´braha´m-</article-title>
          <string-name>
            <surname>Mumm</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steffen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hannemann</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Verification of hybrid systems: Formalization and proof rules in PVS</article-title>
          . In: ICECCS, IEEE Computer Society (
          <year>2001</year>
          )
          <fpage>48</fpage>
          -
          <lpage>57</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunstan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottliebsen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kelsey</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Owre</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Computer algebra meets automated theorem proving: Integrating Maple and PVS</article-title>
          . In Boulton,
          <string-name>
            <given-names>R.J.</given-names>
            ,
            <surname>Jackson</surname>
          </string-name>
          ,
          <string-name>
            <surname>P</surname>
          </string-name>
          .B., eds.:
          <source>TPHOLs</source>
          . Volume
          <volume>2152</volume>
          of LNCS., Springer (
          <year>2001</year>
          )
          <fpage>27</fpage>
          -
          <lpage>42</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alur</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henzinger</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ho</surname>
            ,
            <given-names>P.H.</given-names>
          </string-name>
          :
          <article-title>Automatic symbolic verification of embedded systems</article-title>
          .
          <source>IEEE Trans. Software Eng</source>
          .
          <volume>22</volume>
          (
          <issue>3</issue>
          ) (
          <year>1996</year>
          )
          <fpage>181</fpage>
          -
          <lpage>201</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Beckert</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Equality and other theories</article-title>
          . In D'Agostino,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Gabbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            , H¨ahnle, R.,
            <surname>Posegga</surname>
          </string-name>
          , J., eds.: Handbook of Tableau Methods. Kluwer, Dordrecht (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Beckert</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Platzer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Dynamic logic with non-rigid functions</article-title>
          . In Furbach, U.,
          <string-name>
            <surname>Shankar</surname>
          </string-name>
          , N., eds.
          <source>: IJCAR</source>
          . Volume
          <volume>4130</volume>
          of LNCS., Springer (
          <year>2006</year>
          )
          <fpage>266</fpage>
          -
          <lpage>280</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Buchberger</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jebelean</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kriftner</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tomuta</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasaru</surname>
            ,
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A survey of the Theorema project</article-title>
          .
          <source>In: ISSAC</source>
          . (
          <year>1997</year>
          )
          <fpage>384</fpage>
          -
          <lpage>391</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Clarke</surname>
            ,
            <given-names>E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grumberg</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peled</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          :
          <article-title>Model Checking</article-title>
          . MIT Press, Cambridge, USA (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Collins,
          <string-name>
            <given-names>G.E.</given-names>
            ,
            <surname>Hong</surname>
          </string-name>
          , H.:
          <article-title>Partial cylindrical algebraic decomposition for quantifier elimination</article-title>
          .
          <source>J. Symb. Comput</source>
          .
          <volume>12</volume>
          (
          <issue>3</issue>
          ) (
          <year>1991</year>
          )
          <fpage>299</fpage>
          -
          <lpage>328</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Damm</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hungar</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olderog</surname>
            ,
            <given-names>E.R.</given-names>
          </string-name>
          :
          <article-title>On the verification of cooperating traffic agents</article-title>
          . In de Boer,
          <string-name>
            <given-names>F.S.</given-names>
            ,
            <surname>Bonsangue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.M.</given-names>
            ,
            <surname>Graf</surname>
          </string-name>
          , S., de Roever, W.P., eds.
          <source>: FMCO</source>
          . Volume
          <volume>3188</volume>
          of LNCS., Springer (
          <year>2003</year>
          )
          <fpage>77</fpage>
          -
          <lpage>110</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Davenport</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heintz</surname>
          </string-name>
          , J.:
          <article-title>Real quantifier elimination is doubly exponential</article-title>
          .
          <source>J. Symb. Comput</source>
          .
          <volume>5</volume>
          (
          <issue>1</issue>
          /2) (
          <year>1988</year>
          )
          <fpage>29</fpage>
          -
          <lpage>35</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Davoren</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nerode</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Logics for hybrid systems</article-title>
          .
          <source>Proc. IEEE</source>
          <volume>88</volume>
          (
          <issue>7</issue>
          ) (
          <year>Jul 2000</year>
          )
          <fpage>985</fpage>
          -
          <lpage>1010</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dowek</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hardin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirchner</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Theorem proving modulo</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>31</volume>
          (
          <issue>1</issue>
          ) (
          <year>2003</year>
          )
          <fpage>33</fpage>
          -
          <lpage>72</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fitting</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>First-Order Logic</surname>
          </string-name>
          and Automated Theorem Proving. Second edn. Springer (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Frehse</surname>
          </string-name>
          , G.:
          <article-title>PHAVer: Algorithmic verification of hybrid systems past HyTech</article-title>
          . In Morari,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Thiele</surname>
          </string-name>
          , L., eds.
          <source>: HSCC</source>
          . Volume
          <volume>3414</volume>
          of LNCS., Springer (
          <year>2005</year>
          )
          <fpage>258</fpage>
          -
          <lpage>273</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Giese</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Incremental closure of free variable tableaux</article-title>
          . In Gor´e, R.,
          <string-name>
            <surname>Leitsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nipkow</surname>
          </string-name>
          , T., eds.
          <source>: IJCAR</source>
          .
          <article-title>Volume 2083 of LNCS</article-title>
          ., Springer (
          <year>2001</year>
          )
          <fpage>545</fpage>
          -
          <lpage>560</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Harel</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozen</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tiuryn</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Dynamic logic</article-title>
          . MIT Press (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Henzinger</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          :
          <article-title>The theory of hybrid automata</article-title>
          . In: LICS, IEEE Computer (
          <year>1996</year>
          )
          <fpage>278</fpage>
          -
          <lpage>292</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weispfenning</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Applying linear quantifier elimination</article-title>
          .
          <source>Comput. J</source>
          .
          <volume>36</volume>
          (
          <issue>5</issue>
          ) (
          <year>1993</year>
          )
          <fpage>450</fpage>
          -
          <lpage>462</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Manna</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sipma</surname>
          </string-name>
          , H.:
          <article-title>Deductive verification of hybrid systems using STeP</article-title>
          . In Henzinger, T.A.,
          <string-name>
            <surname>Sastry</surname>
          </string-name>
          , S., eds.
          <source>: HSCC</source>
          . Volume
          <volume>1386</volume>
          of LNCS., Springer (
          <year>1998</year>
          )
          <fpage>305</fpage>
          -
          <lpage>318</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Platzer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Differential dynamic logic for verifying parametric hybrid systems</article-title>
          . In Olivetti, N., ed.
          <source>: TABLEAUX</source>
          . Volume
          <volume>4548</volume>
          of LNCS., Springer (
          <year>2007</year>
          )
          <fpage>216</fpage>
          -
          <lpage>232</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Platzer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A temporal dynamic logic for verifying hybrid system invariants</article-title>
          . In Artemov, S.,
          <string-name>
            <surname>Nerode</surname>
          </string-name>
          , A., eds.
          <source>: LFCS</source>
          . Volume
          <volume>4514</volume>
          of LNCS., Springer (
          <year>2007</year>
          )
          <fpage>457</fpage>
          -
          <lpage>471</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Platzer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Towards a hybrid dynamic logic for hybrid dynamic systems</article-title>
          . In Blackburn, P.,
          <string-name>
            <surname>Bolander</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , Brau¨ner, T.,
          <string-name>
            <surname>de Paiva</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villadsen</surname>
          </string-name>
          , J., eds.
          <source>: Proc., LICS International Workshop on Hybrid Logic, HyLo</source>
          <year>2006</year>
          , Seattle, USA. Volume
          <volume>174</volume>
          <source>of ENTCS. (Jun</source>
          <year>2007</year>
          )
          <fpage>63</fpage>
          -
          <lpage>77</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Platzer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clarke</surname>
            ,
            <given-names>E.M.:</given-names>
          </string-name>
          <article-title>The image computation problem in hybrid systems model checking</article-title>
          . In Bemporad,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Bicchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Buttazzo</surname>
          </string-name>
          , G., eds.
          <source>: HSCC</source>
          . Volume
          <volume>4416</volume>
          of LNCS., Springer (
          <year>2007</year>
          )
          <fpage>473</fpage>
          -
          <lpage>486</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. R¨onkko¨,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ravn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.P.</given-names>
            ,
            <surname>Sere</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          :
          <article-title>Hybrid action systems</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>290</volume>
          (
          <issue>1</issue>
          ) (
          <year>2003</year>
          )
          <fpage>937</fpage>
          -
          <lpage>973</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>B.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richeson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krogh</surname>
            ,
            <given-names>B.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chutinan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Modeling and verification of hybrid dynamical system using CheckMate</article-title>
          .
          <source>In: ADPM</source>
          <year>2000</year>
          .
          <article-title>(</article-title>
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Tinelli</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Cooperation of background reasoners in theory reasoning by residue sharing</article-title>
          .
          <source>J. Autom. Reasoning</source>
          <volume>30</volume>
          (
          <issue>1</issue>
          ) (
          <year>2003</year>
          )
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Tomlin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pappas</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sastry</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Conflict resolution for air traffic management: a study in multi-agent hybrid systems</article-title>
          .
          <source>IEEE Transactions on Automatic Control</source>
          <volume>43</volume>
          (
          <issue>4</issue>
          ) (
          <year>April 1998</year>
          )
          <fpage>509</fpage>
          -
          <lpage>521</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ravn</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hansen</surname>
            ,
            <given-names>M.R.:</given-names>
          </string-name>
          <article-title>An extended duration calculus for hybrid real-time systems</article-title>
          . In Grossman, R.L.,
          <string-name>
            <surname>Nerode</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ravn</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rischel</surname>
          </string-name>
          , H., eds.
          <source>: Hybrid Systems. Volume 736 of LNCS</source>
          ., Springer (
          <year>1992</year>
          )
          <fpage>36</fpage>
          -
          <lpage>59</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>