Zobrazeno 1 - 10
of 2 048
pro vyhledávání: '"Satisfiability modulo theory"'
Autor:
Yang, Pengfei, Chi, Zhiming, Liu, Zongxin, Zhao, Mengyu, Huang, Cheng-Chao, Cai, Shaowei, Zhang, Lijun
Constraint solving is an elementary way for verification of deep neural networks (DNN). In the domain of AI safety, a DNN might be modified in its structure and parameters for its repair or attack. For such situations, we propose the incremental DNN
Externí odkaz:
http://arxiv.org/abs/2302.06455
Publikováno v:
Systems Science & Control Engineering, Vol 12, Iss 1 (2024)
This paper discusses a formal control design of a discrete-time unicycle model using Satisfiability Modulo Theory (SMT). Given a set of possible initial positions, a set of possible target positions, a lane and a time horizon, we develop a method to
Externí odkaz:
https://doaj.org/article/a6b6e25a9a6d4c0c88f1696630764c3a
Autor:
Guidotti, Dario1 (AUTHOR) dguidotti@uniss.it, Pandolfo, Laura1 (AUTHOR), Pulina, Luca1 (AUTHOR)
Publikováno v:
Information (2078-2489). Jul2023, Vol. 14 Issue 7, p397. 17p.
Publikováno v:
In Journal of Industrial Information Integration May 2022 27
This paper proposes a Satisfiability Modulo Theory based formulation for floorplanning in VLSI circuits. The proposed approach allows a number of fixed blocks to be placed within a layout region without overlapping and at the same time minimizing the
Externí odkaz:
http://arxiv.org/abs/1709.07241
Autor:
Monniaux, David
Satisfiability modulo theory (SMT) consists in testing the satisfiability of first-order formulas over linear integer or real arithmetic, or other theories. In this survey, we explain the combination of propositional satisfiability and decision proce
Externí odkaz:
http://arxiv.org/abs/1606.04786
Publikováno v:
Information, Vol 14, Iss 7, p 397 (2023)
Interest in machine learning and neural networks has increased significantly in recent years. However, their applications are limited in safety-critical domains due to the lack of formal guarantees on their reliability and behavior. This paper shows
Externí odkaz:
https://doaj.org/article/74c45f2ce2d9472fae8d8ab8d17ad8d7
Publikováno v:
In Computers and Operations Research January 2018 89:113-126
Autor:
Shoukry, Yasser, Nuzzo, Pierluigi, Bezzo, Nicola, Sangiovanni-Vincentelli, Alberto L., Seshia, Sanjit A., Tabuada, Paulo
We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system's sensors or manipulate t
Externí odkaz:
http://arxiv.org/abs/1509.03262