{"id":"https://openalex.org/W2980048546","doi":"https://doi.org/10.1145/3358214","title":"Aggregation Strategies in Reachable Set Computation of Hybrid Systems","display_name":"Aggregation Strategies in Reachable Set Computation of Hybrid Systems","publication_year":2019,"publication_date":"2019-10-08","ids":{"openalex":"https://openalex.org/W2980048546","doi":"https://doi.org/10.1145/3358214","mag":"2980048546"},"language":"en","primary_location":{"id":"doi:10.1145/3358214","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3358214","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065269963","display_name":"Parasara Sridhar Duggirala","orcid":"https://orcid.org/0000-0002-8871-0298"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Parasara Sridhar Duggirala","raw_affiliation_strings":["University of North Carolina at Chapel Hill"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033330108","display_name":"Stanley Bak","orcid":"https://orcid.org/0000-0003-4947-9553"},"institutions":[{"id":"https://openalex.org/I4210159403","display_name":"Substance Abuse Free Environment","ror":"https://ror.org/04c1jfd27","country_code":"US","type":"other","lineage":["https://openalex.org/I4210159403"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stanley Bak","raw_affiliation_strings":["Safe Sky Analytics LLC"],"affiliations":[{"raw_affiliation_string":"Safe Sky Analytics LLC","institution_ids":["https://openalex.org/I4210159403"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065269963"],"corresponding_institution_ids":["https://openalex.org/I114027177"],"apc_list":null,"apc_paid":null,"fwci":0.194,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5510102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"18","issue":"5s","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11010","display_name":"Logic, Reasoning, and Knowledge","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7858537435531616},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.7202368378639221},{"id":"https://openalex.org/keywords/convex-hull","display_name":"Convex hull","score":0.6103522777557373},{"id":"https://openalex.org/keywords/combinatorial-explosion","display_name":"Combinatorial explosion","score":0.5421674251556396},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5072981715202332},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4428517818450928},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3948196768760681},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.36125627160072327},{"id":"https://openalex.org/keywords/regular-polygon","display_name":"Regular polygon","score":0.261963427066803},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15507256984710693}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7858537435531616},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.7202368378639221},{"id":"https://openalex.org/C206194317","wikidata":"https://www.wikidata.org/wiki/Q1138624","display_name":"Convex hull","level":3,"score":0.6103522777557373},{"id":"https://openalex.org/C115908005","wikidata":"https://www.wikidata.org/wiki/Q2668364","display_name":"Combinatorial explosion","level":2,"score":0.5421674251556396},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5072981715202332},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4428517818450928},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3948196768760681},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.36125627160072327},{"id":"https://openalex.org/C112680207","wikidata":"https://www.wikidata.org/wiki/Q714886","display_name":"Regular polygon","level":2,"score":0.261963427066803},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15507256984710693},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3358214","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3358214","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W87504467","https://openalex.org/W300871591","https://openalex.org/W1511213320","https://openalex.org/W1516952899","https://openalex.org/W1522694098","https://openalex.org/W1532859487","https://openalex.org/W1606346370","https://openalex.org/W1970932506","https://openalex.org/W1990210124","https://openalex.org/W2024772987","https://openalex.org/W2130519480","https://openalex.org/W2132664947","https://openalex.org/W2152618686","https://openalex.org/W2176215692","https://openalex.org/W2501830452","https://openalex.org/W2573794469","https://openalex.org/W2603150469","https://openalex.org/W2606133973","https://openalex.org/W2797793517"],"related_works":["https://openalex.org/W109180904","https://openalex.org/W2354062721","https://openalex.org/W2561527288","https://openalex.org/W1534842550","https://openalex.org/W1966425280","https://openalex.org/W1572523360","https://openalex.org/W2892670408","https://openalex.org/W3175522226","https://openalex.org/W2980048546","https://openalex.org/W155534894"],"abstract_inverted_index":{"Computing":[0],"the":[1,59,65,72,120,137,140,197],"set":[2,82,89,146],"of":[3,26,32,56,67,74,88,123,139,200],"reachable":[4,81,145],"states":[5],"is":[6,183],"a":[7,14,41,97,125,171],"widely":[8],"used":[9],"technique":[10],"for":[11,91,135,144],"proving":[12],"that":[13,64],"hybrid":[15],"system":[16],"satisfies":[17],"its":[18],"safety":[19,126],"specification.":[20],"Flow-pipe":[21],"construction":[22],"methods":[23],"interleave":[24],"phases":[25,31],"computing":[27,33],"continuous":[28],"successors":[29],"and":[30,115,161,187,191,210],"discrete":[34,49,75,92],"successors.":[35],"Directly":[36],"doing":[37],"this":[38,78],"leads":[39],"to":[40,112],"combinatorial":[42],"explosion":[43],"problem,":[44],"though,":[45],"as":[46],"with":[47],"each":[48],"successor":[50],"there":[51],"may":[52],"be":[53,129],"an":[54],"interval":[55],"time":[57],"where":[58],"transition":[60],"can":[61,110],"occur,":[62],"so":[63],"number":[66,73],"paths":[68],"becomes":[69],"exponential":[70],"in":[71,108,116],"transitions.":[76],"For":[77],"reason,":[79],"most":[80],"computation":[83],"tools":[84],"implement":[85],"some":[86],"form":[87],"aggregation":[90,105,141,152,160],"transitions,":[93],"such":[94],"as,":[95],"performing":[96],"template-based":[98],"overapproximation":[99],"or":[100],"convex":[101,158],"hull":[102,159],"aggregation.":[103,164],"These":[104],"methods,":[106],"however,":[107],"theory":[109],"lead":[111],"unbounded":[113],"error,":[114],"practice":[117],"are":[118],"often":[119],"root":[121],"cause":[122],"why":[124],"specification":[127],"cannot":[128],"proven.":[130],"This":[131],"paper":[132],"proposes":[133],"techniques":[134],"improving":[136],"accuracy":[138],"operations":[142],"performed":[143],"computation.":[147],"First,":[148],"we":[149,166],"present":[150],"two":[151,204],"strategies":[153],"over":[154],"generalized":[155],"stars,":[156],"namely":[157],"template":[162],"based":[163],"Second,":[165],"perform":[167],"adaptive":[168],"deaggregation":[169,181],"using":[170],"data":[172],"structure":[173],"called":[174],"Aggregated":[175],"Directed":[176],"Acyclic":[177],"Graph":[178],"(AGGDAG).":[179],"Our":[180],"strategy":[182],"driven":[184],"by":[185],"counterexamples":[186],"hence":[188],"has":[189],"soundness":[190],"relative":[192],"completeness":[193],"guarantees.":[194],"We":[195],"demonstrate":[196],"computational":[198],"benefits":[199],"our":[201],"approach":[202],"through":[203],"case":[205],"studies":[206],"involving":[207],"satellite":[208],"rendezvous":[209],"gearbox":[211],"meshing.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
