2018
DOI: 10.1007/978-3-319-95582-7_7
|View full text |Cite
|
Sign up to set email alerts
|

A Weakness Measure for GR(1) Formulae

Abstract: In spite of the theoretical and algorithmic developments for system synthesis in recent years, little effort has been dedicated to quantifying the quality of the specifications used for synthesis. When dealing with unrealizable specifications, finding the weakest environment assumptions that would ensure realizability is typically a desirable property; in such context the weakness of the assumptions is a major quality parameter. The question of whether one assumption is weaker than another is commonly interpre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 43 publications
0
10
0
Order By: Relevance
“…A solution to this problem is called a sufficient refinement. A typical criterion for finding a sufficient refinement is selecting the weakest candidates in the space of candidate solutions, i.e., the most permissive [10,24,32]. This way any controller synthesized is guaranteed to meet the (refined) specification in the widest possible set of environments.…”
Section: Counterstrategy-guided Assumptions Refinementmentioning
confidence: 99%
See 2 more Smart Citations
“…A solution to this problem is called a sufficient refinement. A typical criterion for finding a sufficient refinement is selecting the weakest candidates in the space of candidate solutions, i.e., the most permissive [10,24,32]. This way any controller synthesized is guaranteed to meet the (refined) specification in the widest possible set of environments.…”
Section: Counterstrategy-guided Assumptions Refinementmentioning
confidence: 99%
“…7 foreach ∈ C do constructs the set ′ = { ∈ C ∪ { ′ } | ̸ |= ′ }; by construction ′ ∈ ′ (see line 1). The second block (5)(6)(7)(8)(9)(10)(11)(12)(13)(14) analyzes the bipartite graph and identifies the redundant assumptions. First, it builds the new refinement = ∧ ′ to be minimized and the collection of counterstrategy sets C by extending C accordingly with ′ (lines 5-6).…”
Section: The Function Minimalrefinementmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, implication requires more computation time than weakness to provide an ordering of the entire set of refinements generated during the search process. This part of the evaluation follows a similar methodology to the evaluation presented in [CAG18]. The main difference is that in [CAG18] we used refinements which were generated in [CA17] using an approach that applies breadth-first search and was automated only in part.…”
mentioning
confidence: 99%
“…This part of the evaluation follows a similar methodology to the evaluation presented in [CAG18]. The main difference is that in [CAG18] we used refinements which were generated in [CA17] using an approach that applies breadth-first search and was automated only in part. This in effect slowed down the tree generation process and resulted in smaller trees.…”
mentioning
confidence: 99%