Skip to main content

Showing 1–5 of 5 results for author: Jakšić, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.02404  [pdf, other

    cs.AI cs.LO cs.RO

    Model-Free Reinforcement Learning for Symbolic Automata-encoded Objectives

    Authors: Anand Balakrishnan, Stefan Jakšić, Edgar A. Aguilar, Dejan Ničković, Jyotirmoy V. Deshmukh

    Abstract: Reinforcement learning (RL) is a popular approach for robotic path planning in uncertain environments. However, the control policies trained for an RL agent crucially depend on user-defined, state-based reward functions. Poorly designed rewards can lead to policies that do get maximal rewards but fail to satisfy desired task objectives or are unsafe. There are several examples of the use of formal… ▽ More

    Submitted 24 February, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

  2. arXiv:1802.03775  [pdf, other

    cs.LO

    An Algebraic Framework for Runtime Verification

    Authors: Stefan Jaksic, Ezio Bartocci, Radu Grosu, Dejan Nickovic

    Abstract: Runtime verification (RV) is a pragmatic and scalable, yet rigorous technique, to assess the correctness of complex systems, including cyber-physical systems (CPS). By measuring how robustly a CPS run satisfies a specification, RV allows in addition, to quantify the resiliency of a CPS to perturbations. In this paper we propose Algebraic Runtime Verification (ARV), a general, semantic framework fo… ▽ More

    Submitted 11 February, 2018; originally announced February 2018.

  3. A Typed Model for Dynamic Authorizations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the pi-calculus so as to e… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    Journal ref: EPTCS 203, 2016, pp. 73-84

  4. Precise subty** for synchronous multiparty sessions

    Authors: Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Nobuko Yoshida

    Abstract: The notion of subty** has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subty**, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with r… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    ACM Class: D.3.3; F.3.2

    Journal ref: EPTCS 203, 2016, pp. 29-43

  5. Dynamic Role Authorization in Multiparty Conversations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at ru… ▽ More

    Submitted 25 August, 2014; originally announced August 2014.

    Comments: In Proceedings BEAT 2014, arXiv:1408.5564

    ACM Class: D.3.1; F.3.2

    Journal ref: EPTCS 162, 2014, pp. 1-8