Skip to main content

Showing 1–3 of 3 results for author: Mandal, U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14058  [pdf, other

    cs.AI cs.LG eess.SY

    Formally Verifying Deep Reinforcement Learning Controllers with Lyapunov Barrier Certificates

    Authors: Udayan Mandal, Guy Amir, Haoze Wu, Ieva Daukantas, Fletcher Lee Newell, Umberto J. Ravaioli, Baoluo Meng, Michael Durling, Milan Ganai, Tobey Shim, Guy Katz, Clark Barrett

    Abstract: Deep reinforcement learning (DRL) is a powerful machine learning paradigm for generating agents that control autonomous systems. However, the "black box" nature of DRL agents limits their deployment in real-world safety-critical applications. A promising approach for providing strong guarantees on an agent's behavior is to use Neural Lyapunov Barrier (NLB) certificates, which are learned functions… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  2. arXiv:2207.04520  [pdf, other

    math.OC cs.AI

    Local Area Routes for Vehicle Routing Problems

    Authors: Udayan Mandal, Amelia Regan, Julian Yarkony

    Abstract: We consider an approach for improving the efficiency of column generation (CG) methods for solving vehicle routing problems. We introduce Local Area (LA) route relaxations, an alternative/complement to the commonly used ng-route relaxations and Decremental State Space Relaxations (DSSR) inside of CG formulations. LA routes are a subset of ng-routes and a super-set of elementary routes. Normally, t… ▽ More

    Submitted 10 July, 2022; originally announced July 2022.

  3. On Service-Chaining Strategies using Virtual Network Functions in Operator Networks

    Authors: Abhishek Gupta, M. Farhan Habib, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore, Biswanath Mukherjee

    Abstract: Network functions (e.g., firewalls, load balancers, etc.) have been traditionally provided through proprietary hardware appliances. Often, hardware appliances need to be hardwired back to back to form a service chain providing chained network functions. Hardware appliances cannot be provisioned on demand since they are statically embedded in the network topology, making creation, insertion, modifi… ▽ More

    Submitted 10 November, 2016; originally announced November 2016.

    Journal ref: https://doi.org/10.1016/j.comnet.2018.01.028