2015 American Control Conference (ACC) 2015
DOI: 10.1109/acc.2015.7170816
|View full text |Cite
|
Sign up to set email alerts
|

Dependency graph: An algorithm for analysis of generalized parameterized networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…In this paper, we characterize dependencies between subprocesses of any instances of a PCN by means of a single, finite dependency graph. In a preliminary form, the dependency graph was introduced in [11], where it was conjectured it can be used to detect reachable partial deadlocks of a PCN. Here we prove that specific subgraphs of the dependency graph represent reachable generalized circular waits of instances of the PCN.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we characterize dependencies between subprocesses of any instances of a PCN by means of a single, finite dependency graph. In a preliminary form, the dependency graph was introduced in [11], where it was conjectured it can be used to detect reachable partial deadlocks of a PCN. Here we prove that specific subgraphs of the dependency graph represent reachable generalized circular waits of instances of the PCN.…”
Section: Introductionmentioning
confidence: 99%
“…is fired at state q γ , then CE returns to the initial state q wait , waiting to receive a new control command; if an unobservable event σ ∈ Σ uo ∩ (γ ∪ Σ uc ) is fired at q γ instead, the command execution automaton self-loops at state q γ as the same control command γ is to be used for the next event execution. This is reflected in Rule ( 5) and Rule (6), respectively. In particular, if an unobservable event σ is fired at state q γ , the control commands received within the next time step will be thrown away, as reflected in Rule ( 4) and Rule (6) combined.…”
Section: Network Control Architecturementioning
confidence: 99%
“…The cases of controllability and observability are specially treated, as any plant event is assumed to consume one time step, in our model of time, following [6]. Similar analysis can be applied to the case when num c ≥ 1 and OC CC A m CE G S m+1 S f is the networked closed-loop system.…”
Section: Gmentioning
confidence: 99%
See 1 more Smart Citation
“…The theory of supervisory control of discrete-event systems was originally initiated in the 1980s by Ramadge and Wonham [14], [15], [16], [17] and has been under active development for more than 30 years (see the textbooks and monographs [13], [18], [19]). The main domains of applications for supervisory control theory are the coordination of complex man-made systems such as manufacturing systems [13], [20], [21], telecommunication and network protocols [22], [23], database management sytems [24] and transportation [13], [25], e.t.c., where coordination and conflict resolution [26], [27], [28] are usually needed to ensure certain safety and liveness properties. A brief list of some of the more important developments and those developments that are more closely related to ours is provided below.…”
Section: Control Of Discrete-event Systemsmentioning
confidence: 99%