Skip to main content

Showing 1–31 of 31 results for author: Rueß, H

.
  1. arXiv:2404.17834  [pdf, other

    cs.LO

    Efficient Reactive Synthesis

    Authors: Xin Ye, Harald Ruess

    Abstract: Our main result is a polynomial time algorithm for deciding realizability for the GXU sublogic of linear temporal logic. This logic is particularly suitable for the specification of embedded control systems, and it is more expressive than GR(1). Reactive control programs for GXU specifications are represented as Mealy machines, which are extended by the monitoring of input events. Now, realizabili… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  2. arXiv:2404.16663  [pdf, other

    cs.LG cs.AI cs.CY cs.LO cs.SE

    Formal Specification, Assessment, and Enforcement of Fairness for Generative AIs

    Authors: Chih-Hong Cheng, Changshun Wu, Harald Ruess, Xingyu Zhao, Saddek Bensalem

    Abstract: Reinforcing or even exacerbating societal biases and inequalities will increase significantly as generative AI increasingly produces useful artifacts, from text to images and beyond, for the real world. We address these issues by formally characterizing the notion of fairness for generative AI as a basis for monitoring and enforcing fairness. We define two levels of fairness using the notion of in… ▽ More

    Submitted 6 May, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

  3. arXiv:2401.02239  [pdf, ps, other

    cs.LO

    A Decision Method for Elementary Stream Calculus

    Authors: Harald Ruess

    Abstract: The main result is a doubly exponential decision procedure for the first-order equality theory of streams with both arithmetic and control-oriented stream operations. This stream logic is expressive for elementary problems of stream calculus.

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: 19 pages

    MSC Class: I.1; J.6; F.4

  4. arXiv:2401.00164  [pdf, ps, other

    cs.LO

    Solving Causal Stream Inclusions

    Authors: Harald Ruess

    Abstract: We study solutions to systems of stream inclusions of the form 'f in T(f)', where the nondeterministic transformer 'T' on omega-infinite streams is assumed to be causal in the sense that elements in output streams are determined by a finite prefix of inputs. We first establish a correspondence between logic-based causality and metric-based contraction. Based on this causality-contraction connectio… ▽ More

    Submitted 24 June, 2024; v1 submitted 30 December, 2023; originally announced January 2024.

    MSC Class: D.2; F.2

  5. arXiv:2307.12716  [pdf, other

    cs.LG cs.SE

    Safety Performance of Neural Networks in the Presence of Covariate Shift

    Authors: Chih-Hong Cheng, Harald Ruess, Konstantinos Theodorou

    Abstract: Covariate shift may impact the operational safety performance of neural networks. A re-evaluation of the safety performance, however, requires collecting new operational data and creating corresponding ground truth labels, which often is not possible during operation. We are therefore proposing to reshape the initial test set, as used for the safety performance evaluation prior to deployment, base… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

  6. arXiv:2306.08447  [pdf, other

    cs.LG

    Towards Rigorous Design of OoD Detectors

    Authors: Chih-Hong Cheng, Changshun Wu, Harald Ruess, Saddek Bensalem

    Abstract: Out-of-distribution (OoD) detection techniques are instrumental for safety-related neural networks. We are arguing, however, that current performance-oriented OoD detection techniques geared towards matching metrics such as expected calibration error, are not sufficient for establishing safety claims. What is missing is a rigorous design approach for develo**, verifying, and validating OoD detec… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  7. arXiv:2304.00060  [pdf, other

    cs.CR cs.AI cs.LO

    Evidential Transactions with Cyberlogic

    Authors: Harald Ruess, Natarajan Shankar

    Abstract: Cyberlogic is an enabling logical foundation for building and analyzing digital transactions that involve the exchange of digital forms of evidence. It is based on an extension of (first-order) intuitionistic predicate logic with an attestation and a knowledge modality. The key ideas underlying Cyberlogic are extremely simple, as (1) public keys correspond to authorizations, (2) transactions are s… ▽ More

    Submitted 20 March, 2023; originally announced April 2023.

    Comments: 41 pages

    Report number: SRI International, CSL Technical Report SRI-CSL-2023-01 MSC Class: 68M11

  8. arXiv:2201.10436  [pdf

    cs.AI

    Safe AI -- How is this Possible?

    Authors: Harald Rueß, Simon Burton

    Abstract: Ttraditional safety engineering is coming to a turning point moving from deterministic, non-evolving systems operating in well-defined contexts to increasingly autonomous and learning-enabled AI systems which are acting in largely unpredictable operating contexts. We outline some of underlying challenges of safe AI and suggest a rigorous engineering framework for minimizing uncertainty, thereby in… ▽ More

    Submitted 11 May, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: 42 pages, 4 figures, 1 table

  9. arXiv:2201.03413  [pdf

    cs.AI cs.CY

    Systems Challenges for Trustworthy Embodied Systems

    Authors: Harald Rueß

    Abstract: A new generation of increasingly autonomous and self-learning embodied systems is about to be developed. When deploying embodied systems into a real-life context we face various engineering challenges, as it is crucial to coordinate the behavior of embodied systems in a beneficial manner, ensure their compatibility with our human-centered social values, and design verifiably safe and reliable huma… ▽ More

    Submitted 26 April, 2022; v1 submitted 10 January, 2022; originally announced January 2022.

    Comments: 57 pages, 7 figures, 3 tables. Public project deliverable, fortiss whitepaper

  10. arXiv:2012.15080  [pdf, other

    cs.CR cs.LO

    Security Engineering for ISO 21434

    Authors: Yuri Gil Dantas, Vivek Nigam, Harald Ruess

    Abstract: The ISO 21434 is a new standard that has been proposed to address the future challenges of automotive cybersecurity. This white paper takes a closer look at the ISO 21434 hel** engineers to understand the ISO 21434 parts, the key activities to be carried out and the main artefacts that shall be produced. As any certification, obtaining the ISO 21434 certification can be daunting at first sight.… ▽ More

    Submitted 17 January, 2021; v1 submitted 30 December, 2020; originally announced December 2020.

    Comments: This is a White Paper. This is a preliminary version. Its figures and template are to be finalized by our marketing department. V3 corrects a number of typos

    ACM Class: I.2.4; I.2.5

  11. arXiv:2012.11406  [pdf, other

    cs.LG

    Knowledge as Invariance -- History and Perspectives of Knowledge-augmented Machine Learning

    Authors: Alexander Sagel, Amit Sahu, Stefan Matthes, Holger Pfeifer, Tianming Qiu, Harald Rueß, Hao Shen, Julian Wörmann

    Abstract: Research in machine learning is at a turning point. While supervised deep learning has conquered the field at a breathtaking pace and demonstrated the ability to solve inference problems with unprecedented accuracy, it still does not quite live up to its name if we think of learning as the process of acquiring knowledge about a subject or problem. Major weaknesses of present-day deep learning mode… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

  12. arXiv:1810.04866  [pdf, other

    cs.LO cs.SE

    Model-Based Safety and Security Engineering

    Authors: Vivek Nigam, Alexander Pretschner, Harald Ruess

    Abstract: By exploiting the increasing surface attack of systems, cyber-attacks can cause catastrophic events, such as, remotely disable safety mechanisms. This means that in order to avoid hazards, safety and security need to be integrated, exchanging information, such as, key hazards/threats, risk evaluations, mechanisms used. This white paper describes some steps towards this integration by using models.… ▽ More

    Submitted 2 January, 2019; v1 submitted 11 October, 2018; originally announced October 2018.

    Comments: White paper on Safety and Security Engineering using Models

  13. arXiv:1806.02338  [pdf, other

    cs.LG stat.ML

    Towards Dependability Metrics for Neural Networks

    Authors: Chih-Hong Cheng, Georg Nührenberg, Chung-Hao Huang, Harald Ruess, Hirotoshi Yasuoka

    Abstract: Artificial neural networks (NN) are instrumental in realizing highly-automated driving functionality. An overarching challenge is to identify best safety engineering practices for NN and other learning-enabled components. In particular, there is an urgent need for an adequate set of metrics for measuring all-important NN dependability attributes. We address this challenge by proposing a number of… ▽ More

    Submitted 8 June, 2018; v1 submitted 6 June, 2018; originally announced June 2018.

  14. arXiv:1710.03107  [pdf, other

    cs.SE cs.LG cs.LO

    Verification of Binarized Neural Networks via Inter-Neuron Factoring

    Authors: Chih-Hong Cheng, Georg Nührenberg, Chung-Hao Huang, Harald Ruess

    Abstract: We study the problem of formal verification of Binarized Neural Networks (BNN), which have recently been proposed as a energy-efficient alternative to traditional learning networks. The verification of BNNs, using the reduction to hardware verification, can be even more scalable by factoring computations among neurons within the same layer. By proving the NP-hardness of finding optimal factoring a… ▽ More

    Submitted 19 January, 2018; v1 submitted 9 October, 2017; originally announced October 2017.

    Comments: Version 2: add proofs for hardness of PTAS approximability, remove experiments on randomized examples and some not-so-important optimizations

  15. arXiv:1709.00911  [pdf, other

    cs.SE cs.LG

    Neural Networks for Safety-Critical Applications - Challenges, Experiments and Perspectives

    Authors: Chih-Hong Cheng, Frederik Diehl, Yassine Hamza, Gereon Hinz, Georg Nührenberg, Markus Rickert, Harald Ruess, Michael Troung-Le

    Abstract: We propose a methodology for designing dependable Artificial Neural Networks (ANN) by extending the concepts of understandability, correctness, and validity that are crucial ingredients in existing certification standards. We apply the concept in a concrete case study in designing a high-way ANN-based motion predictor to guarantee safety properties such as impossibility for the ego vehicle to sugg… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: Summary for activities conducted in the fortiss Eigenforschungsprojekt "TdpSW - Towards dependable and predictable SW for ML-based autonomous systems". All ANN-based motion predictors being formally analyzed are available in the source file

  16. arXiv:1705.01040  [pdf, other

    cs.LG cs.AI cs.LO cs.SE

    Maximum Resilience of Artificial Neural Networks

    Authors: Chih-Hong Cheng, Georg Nührenberg, Harald Ruess

    Abstract: The deployment of Artificial Neural Networks (ANNs) in safety-critical applications poses a number of new verification and certification challenges. In particular, for ANN-enabled self-driving vehicles it is important to establish properties about the resilience of ANNs to noisy or even maliciously manipulated sensory input. We are addressing these challenges by defining resilience properties of A… ▽ More

    Submitted 5 July, 2017; v1 submitted 28 April, 2017; originally announced May 2017.

    Comments: Timestamp research work conducted in the project. version 2: fix some typos, rephrase the definition, and add some more existing work

  17. arXiv:1704.07097  [pdf, other

    cs.SE cs.LO

    Automated Analysis of Multi-View Software Architectures

    Authors: Chih-Hong Cheng, Yassine Hamza, Harald Ruess

    Abstract: Software architectures usually are comprised of different views for capturing static, runtime, and deployment aspects. What is currently missing, however, are formal validation and verification techniques of multi-view architecture in very early phases of the software development lifecycle. The main contribution of this paper therefore is the construction of a single formal model (in Promela) for… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

    Comments: Timestam** research work conducted under the fortiss Eigenforschung project

  18. arXiv:1605.01153  [pdf, other

    cs.LO cs.SE

    Structural Synthesis for GXW Specifications

    Authors: Chih-Hong Cheng, Yassine Hamza, Harald Ruess

    Abstract: We define the GXW fragment of linear temporal logic (LTL) as the basis for synthesizing embedded control software for safety-critical applications. Since GXW includes the use of a weak-until operator we are able to specify a number of diverse programmable logic control (PLC) problems, which we have compiled from industrial training sets. For GXW controller specifications, we develop a novel approa… ▽ More

    Submitted 6 July, 2016; v1 submitted 4 May, 2016; originally announced May 2016.

    Comments: The long (including appendix) version being reviewed by CAV'16 program committee. Compared to the submitted version, one author (out of her wish) is moved to the Acknowledgement. (v2) Corrected typos. (v3) Add an additional remark over environment assumption and easy corner cases

  19. arXiv:1510.04376  [pdf

    cond-mat.mes-hall

    Time-resolved magnetophotoluminescence studies of magnetic polaron dynamics in type-II quantum dots

    Authors: B. Barman, R. Oszwałdowski, L. Schweidenback, A. H. Russ, J. M. Pientka, Y. Tsai, W-C. Chou, W. C. Fan, J. R. Murphy, A. N. Cartwright, I. R. Sellers, A. G. Petukhov, I. Žutić, B. D. McCombe, A. Petrou

    Abstract: We used continuous wave photoluminescence (cw-PL) and time resolved photoluminescence (TR-PL) spectroscopy to compare the properties of magnetic polarons (MP) in two related spatially indirect II-VI epitaxially grown quantum dot systems. In the ZnTe/(Zn,Mn)Se system the holes are confined in the non-magnetic ZnTe quantum dots (QDs), and the electrons reside in the magnetic (Zn,Mn)Se matrix. On the… ▽ More

    Submitted 14 October, 2015; originally announced October 2015.

    Comments: 27 pages, 12 figures

    Journal ref: PhysRevB.92.035430(2015)

  20. arXiv:1504.05513  [pdf, other

    cs.FL cs.LO cs.SC

    Timed Orchestration for Component-based Systems

    Authors: Chih-Hong Cheng, Lacramioara Astefanoaei, Harald Ruess, Souha Ben Rayana, Saddek Bensalem

    Abstract: Individual machines in flexible production lines explicitly expose capabilities at their interfaces by means of parametric skills. Given such a set of configurable machines, a line integrator is faced with the problem of finding and tuning parameters for each machine such that the overall production line implements given safety and temporal requirements in an optimized and robust fashion. We forma… ▽ More

    Submitted 20 May, 2016; v1 submitted 21 April, 2015; originally announced April 2015.

    Comments: Timestamp of the work, with evaluation added by creating MES orchestration examples. (v3): typo fix and bring back definition and citation in en^t as in v1

  21. arXiv:1405.2409  [pdf, other

    cs.LO

    G4LTL-ST: Automatic Generation of PLC Programs

    Authors: Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann

    Abstract: G4LTL-ST automatically synthesizes control code for industrial Programmable Logic Controls (PLC) from timed behavioral specifications of input-output signals. These specifications are expressed in a linear temporal logic (LTL) extended with non-linear arithmetic constraints and timing constraints on signals. G4LTL-ST generates code in IEC 61131-3-compatible Structured Text, which is compiled into… ▽ More

    Submitted 15 May, 2014; v1 submitted 10 May, 2014; originally announced May 2014.

    Comments: This is the full version of the CAV'14 paper. Research concepts developed this paper are mainly from the technical report "Numerical LTL synthesis for cyber-physical systems", coauthored by Chih-Hong Cheng (ABB Research) and Edward A. Lee (UC Berkeley)

  22. arXiv:1401.1693  [pdf, other

    cs.LO

    Certification for mu-calculus with winning strategies

    Authors: Martin Hofmann, Harald Ruess

    Abstract: We define memory-efficient certificates for $μ$-calculus model checking problems based on the well-known correspondence of the $μ$-calculus model checking with winning certain parity games. Winning strategies can independently checked, in low polynomial time, by observing that there is no reachable strongly connected component in the graph of the parity game whose largest priority is odd. Winning… ▽ More

    Submitted 8 January, 2014; originally announced January 2014.

    Comments: Presented at the VeriSure workshop associated with CAV'13 in St. Petersburg in July 2013

  23. arXiv:1310.3723  [pdf, ps, other

    cs.CR cs.DC

    Security policies for distributed systems

    Authors: Jean Quilbeuf, Georgeta Igna, Denis Bytschkow, Harald Ruess

    Abstract: A security policy specifies a security property as the maximal information flow. A distributed system composed of interacting processes implicitly defines an intransitive security policy by repudiating direct information flow between processes that do not exchange messages directly. We show that implicitly defined security policies in distributed systems are enforced, provided that processes run i… ▽ More

    Submitted 14 October, 2013; originally announced October 2013.

    Comments: Submitted to POST14

  24. arXiv:1306.6115  [pdf, other

    cs.SE

    On Behavioral Types for OSGi: From Theory to Implementation

    Authors: Jan Olaf Blech, Harald Rueß, Bernhard Schätz

    Abstract: This report presents our work on behavioral types for OSGi component systems. It extends previously published work and presents features and details that have not yet been published. In particular, we cover a discussion on behavioral types in general, and Eclipse based implementation work on behavioral types . The implementation work covers: editors, means for comparing types at development and ru… ▽ More

    Submitted 25 June, 2013; originally announced June 2013.

    Comments: arXiv admin note: text overlap with arXiv:1302.5175

  25. arXiv:1306.3456  [pdf, other

    cs.LO

    EFSMT: A Logical Framework for Cyber-Physical Systems

    Authors: Chih-Hong Cheng, Natarajan Shankar, Harald Ruess, Saddek Bensalem

    Abstract: The design of cyber-physical systems is challenging in that it includes the analysis and synthesis of distributed and embedded real-time systems for controlling, often in a nonlinear way, the environment. We address this challenge with EFSMT, the exists-forall quantified first-order fragment of propositional combinations over constraints (including nonlinear arithmetic), as the logical framework a… ▽ More

    Submitted 14 June, 2013; originally announced June 2013.

  26. arXiv:1211.6189  [pdf, other

    eess.SY cs.LO

    Distributed Priority Synthesis

    Authors: Chih-Hong Cheng, Rongjie Yan, Saddek Bensalem, Harald Ruess

    Abstract: Given a set of interacting components with non-deterministic variable update and given safety requirements, the goal of priority synthesis is to restrict, by means of priorities, the set of possible interactions in such a way as to guarantee the given safety conditions for all possible runs. In distributed priority synthesis we are interested in obtaining local sets of priorities, which are de… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    Comments: In Proceedings SSV 2012, arXiv:1211.5873

    Journal ref: EPTCS 102, 2012, pp. 57-72

  27. arXiv:1112.1783  [pdf, other

    cs.LO cs.GT

    Distributed Priority Synthesis and its Applications

    Authors: Chih-Hong Cheng, Saddek Bensalem, Rongjie Yan, Harald Ruess, Christian Buckl, Alois Knoll

    Abstract: Given a set of interacting components with non-deterministic variable update and given safety requirements, the goal of priority synthesis is to restrict, by means of priorities, the set of possible interactions in such a way as to guarantee the given safety conditions for all possible runs. In distributed priority synthesis we are interested in obtaining local sets of priorities, which are deploy… ▽ More

    Submitted 27 January, 2012; v1 submitted 8 December, 2011; originally announced December 2011.

    Comments: 1. Timestamp the joint work "Distributed Priority Synthesis" from four institutes (Verimag, TUM, ISCAS, fortiss). 2. This version (v.2) updates related work in distributed synthesis

  28. arXiv:1107.1383  [pdf, other

    cs.LO eess.SY

    Algorithms for Synthesizing Priorities in Component-based Systems

    Authors: Chih-Hong Cheng, Saddek Bensalem, Yu-Fang Chen, Rongjie Yan, Barbara Jobstmann, Harald Ruess, Christian Buckl, Alois Knoll

    Abstract: We present algorithms to synthesize component-based systems that are safe and deadlock-free using priorities, which define stateless-precedence between enabled actions. Our core method combines the concept of fault-localization (using safety-game) and fault-repair (using SAT for conflict resolution). For complex systems, we propose three complementary methods as preprocessing steps for priority sy… ▽ More

    Submitted 7 October, 2011; v1 submitted 6 July, 2011; originally announced July 2011.

    Comments: Full version of the ATVA'11 paper (compared to the 1st arXiv version, we add one additional sentence to avoid confusion)

  29. arXiv:1011.0268  [pdf, other

    cs.GT cs.DC cs.SE

    A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems

    Authors: Chih-Hong Cheng, Harald Ruess, Alois Knoll, Christian Buckl

    Abstract: In this paper, we present an approach for fault-tolerant synthesis by combining predefined patterns for fault-tolerance with algorithmic game solving. A non-fault-tolerant system, together with the relevant fault hypothesis and fault-tolerant mechanism templates in a pool are translated into a distributed game, and we perform an incomplete search of strategies to cope with undecidability. The resu… ▽ More

    Submitted 1 November, 2010; originally announced November 2010.

    Comments: The extended version of the paper "Synthesis of Fault-Tolerant Embedded Systems using Games: from Theory to Practice" in VMCAI'11

  30. Age of the Universe: Influence of the Inhomogeneities on the global Expansion-Factor

    Authors: H. Russ, M. H. Soffel, M. Kasai, G. Börner

    Abstract: For the first time we calculate quantitatively the influence of inhomogeneities on the global expansion factor by averaging the Friedmann equation. In the framework of the relativistic second-order Zel'dovich-approximation scheme for irrotational dust we use observational results in form of the normalisation constant fixed by the COBE results and we check different power spectra, namely for adia… ▽ More

    Submitted 27 May, 1997; v1 submitted 23 December, 1996; originally announced December 1996.

    Comments: 10 pages, version accepted by Phys. Rev. D

    Journal ref: Phys.Rev. D56 (1997) 2044-2050

  31. The Zel'dovich-type approximation for an inhomogeneous universe in general relativity: second-order solutions

    Authors: H. Russ, M. Morita, M. Kasai, G. Boerner

    Abstract: The gravitational instability of inhomogeneities in the expanding universe is studied by the relativistic second-order approximation. Using the tetrad formalism we consider irrotational dust universes and get equations very similar to those given in the Lagrangian perturbation theory in Newtonian cosmology. Neglecting the cosmological constant and assuming a flat background model we give the sol… ▽ More

    Submitted 12 December, 1995; originally announced December 1995.

    Comments: 20 pages, LaTeX, no figures

    Report number: DM5647

    Journal ref: Phys.Rev. D53 (1996) 6881-6888