“…The methods of the first category try to approximate reachable sets as accurately as possible by tracking their evolution under the continuous flows using some set represention (such as polyhedra, ellipsoids, level sets). This results in a variety of approximation schemes (such as [6,13,15,17,19,27,28,36,39,44,57]), and implemented by a number of tools such as Coho [28], CheckMate [15], d/dt [7], VeriShift [13], HYSDEL [58], MPT [45], HJB toolbox [44]. Since accurate reachable set approximations are computationally expensive, the methods of the second category seek approximations that are sufficiently good to prove the property of interest (such as barrier certificates [46], polynomial invariants [56]).…”