Skip to main content

Showing 1–31 of 31 results for author: Stoller, S D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.15878  [pdf, ps, other

    cs.PL cs.LO cs.PF

    Benchmarking for Integrating Logic Rules with Everything Else

    Authors: Yanhong A. Liu, Scott D. Stoller, Yi Tong, K. Tuncay Tekle

    Abstract: Integrating logic rules with other language features is increasingly sought after for advanced applications that require knowledge-base capabilities. To address this demand, increasingly more languages and extensions for such integration have been developed. How to evaluate such languages? This paper describes a set of programming and performance benchmarks for evaluating languages supporting… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: In Proceedings ICLP 2023, arXiv:2308.14898. arXiv admin note: substantial text overlap with arXiv:2205.15204

    Journal ref: EPTCS 385, 2023, pp. 12-26

  2. arXiv:2305.19202  [pdf, ps, other

    cs.PL

    Integrating Logic Rules with Everything Else, Seamlessly

    Authors: Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin

    Abstract: This paper presents a language, Alda, that supports all of logic rules, sets, functions, updates, and objects as seamlessly integrated built-ins. The key idea is to support predicates in rules as set-valued variables that can be used and updated in any scope, and support queries using rules as either explicit or implicit automatic calls to an inference function. We have defined a formal semantic… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: To be published in Theory and Practice of Logic Programming, Special issue for selected papers from 39nd International Conference on Logic Programming. arXiv admin note: substantial text overlap with arXiv:2205.15204

  3. arXiv:2205.15204  [pdf, ps, other

    cs.PL

    Programming with rules and everything else, seamlessly

    Authors: Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin, K. Tuncay Tekle

    Abstract: Logic rules are powerful for expressing complex reasoning and analysis problems. At the same time, they are inconvenient or impossible to use for many other aspects of applications. Integrating rules in a language with sets and functions, and furthermore with updates to objects, has been a subject of significant study. What's lacking is a language that integrates all constructs seamlessly. This… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  4. arXiv:2203.16960  [pdf, other

    cs.MA cs.RO

    Multi-Agent Spatial Predictive Control with Application to Drone Flocking (Extended Version)

    Authors: Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu

    Abstract: We introduce the novel concept of Spatial Predictive Control (SPC) to solve the following problem: given a collection of agents (e.g., drones) with positional low-level controllers (LLCs) and a mission-specific distributed cost function, how can a distributed controller achieve and maintain cost-function minimization without a plant model and only positional observations of the environment? Our fu… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

  5. arXiv:2202.09710  [pdf, other

    eess.SY cs.AI cs.LG

    A Barrier Certificate-based Simplex Architecture with Application to Microgrids

    Authors: Amol Damare, Shouvik Roy, Scott A. Smolka, Scott D. Stoller

    Abstract: We present Barrier Certificate-based Simplex (BC-Simplex), a new, provably correct design for runtime assurance of continuous dynamical systems. BC-Simplex is centered around the Simplex Control Architecture, which consists of a high-performance advanced controller which is not guaranteed to maintain safety of the plant, a verified-safe baseline controller, and a decision module that switches cont… ▽ More

    Submitted 2 June, 2022; v1 submitted 19 February, 2022; originally announced February 2022.

  6. The Black-Box Simplex Architecture for Runtime Assurance of Autonomous CPS

    Authors: Usama Mehmood, Sanaz Sheikhi, Stanley Bak, Scott A. Smolka, Scott D. Stoller

    Abstract: The Simplex Architecture is a runtime assurance framework where control authority may switch from an unverified and potentially unsafe advanced controller to a backup baseline controller in order to maintain the safety of an autonomous cyber-physical system. In this work, we show that runtime checks can replace the requirement to statically verify safety of the baseline controller. This is importa… ▽ More

    Submitted 31 May, 2022; v1 submitted 24 February, 2021; originally announced February 2021.

    Journal ref: NASA Formal Methods (2022) 231-250

  7. arXiv:2012.10153  [pdf, other

    cs.MA

    A Distributed Simplex Architecture for Multi-Agent Systems

    Authors: Usama Mehmood, Scott D. Stoller, Radu Grosu, Shouvik Roy, Amol Damare, Scott A. Smolka

    Abstract: We present Distributed Simplex Architecture (DSA), a new runtime assurance technique that provides safety guarantees for multi-agent systems (MASs). DSA is inspired by the Simplex control architecture of Sha et al., but with some significant differences. The traditional Simplex approach is limited to single-agent systems or a MAS with a centralized control scheme. DSA addresses this limitation by… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

  8. Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: This paper presents a general framework and methods for complete programming and checking of distributed algorithms at a high-level, as in pseudocode languages, but precisely specified and directly executable, as in formal specification languages and practical programming languages, respectively. The checking framework, as well as the writing of distributed algorithms and specification of their sa… ▽ More

    Submitted 23 December, 2020; v1 submitted 21 August, 2020; originally announced August 2020.

    Comments: Small fixes to improve property specifications, including improvements not in the RV 2020 final version

    Journal ref: RV 2020: Proceedings of the 20th International Conference on Runtime Verification. LNCS 12399. Pages 47-66. Springer

  9. arXiv:2008.08444  [pdf, other

    cs.CR cs.AI

    Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values

    Authors: Thang Bui, Scott D. Stoller

    Abstract: Attribute-Based Access Control (ABAC) and Relationship-based access control (ReBAC) provide a high level of expressiveness and flexibility that promote security and information sharing, by allowing policies to be expressed in terms of attributes of and chains of relationships between entities. Algorithms for learning ABAC and ReBAC policies from legacy access control information have the potential… ▽ More

    Submitted 23 November, 2020; v1 submitted 19 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1909.12095

  10. arXiv:2007.13053  [pdf, ps, other

    cs.DB cs.AI cs.LO

    Recursive Rules with Aggregation: A Simple Unified Semantics

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: Complex reasoning problems are most clearly and easily specified using logical rules, but require recursive rules with aggregation such as count and sum for practical applications. Unfortunately, the meaning of such rules has been a significant challenge, leading to many disagreeing semantics. This paper describes a unified semantics for recursive rules with aggregation, extending the unified fo… ▽ More

    Submitted 21 September, 2022; v1 submitted 26 July, 2020; originally announced July 2020.

    Journal ref: Journal of Logic and Computation, 32(8):1659--1693, December 2022

  11. arXiv:2006.00680  [pdf, other

    cs.MA

    Learning Distributed Controllers for V-Formation

    Authors: Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari

    Abstract: We show how a high-performing, fully distributed and symmetric neural V-formation controller can be synthesized from a Centralized MPC (Model Predictive Control) controller using Deep Learning. This result is significant as we also establish that under very reasonable conditions, it is impossible to achieve V-formation using a deterministic, distributed, and symmetric controller. The learning proc… ▽ More

    Submitted 31 May, 2020; originally announced June 2020.

  12. arXiv:1910.10346  [pdf, ps, other

    cs.LO cs.AI cs.PL

    Knowledge of Uncertain Worlds: Programming with Logical Constraints

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: Programming with logic for sophisticated applications must deal with recursion and negation, which together have created significant challenges in logic, leading to many different, conflicting semantics of rules. This paper describes a unified language, DA logic, for design and analysis logic, based on the unifying founded semantics and constraint semantics, that support the power and ease of prog… ▽ More

    Submitted 10 December, 2020; v1 submitted 23 October, 2019; originally announced October 2019.

    Journal ref: Journal of Logic and Computation, 31(1):193-212, Jan. 2021, Oxford University Press

  13. arXiv:1909.12095  [pdf, other

    cs.CR

    A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies

    Authors: Thang Bui, Scott D. Stoller

    Abstract: Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing, by allowing policies to be expressed in terms of chains of relationships between entities. ReBAC policy mining algorithms have the potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automatin… ▽ More

    Submitted 12 May, 2020; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.07530, arXiv:1708.04749

  14. arXiv:1908.09813  [pdf, other

    cs.MA

    Neural Flocking: MPC-based Supervised Learning of Flocking Controllers

    Authors: Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari

    Abstract: We show how a distributed flocking controller can be synthesized using deep learning from a centralized controller which generates the trajectories of the flock. Our approach is based on supervised learning, with the centralized controller providing the training data to the learning agent, i.e., the synthesized distributed controller. We use Model Predictive Control (MPC) for the centralized contr… ▽ More

    Submitted 17 January, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: This is an updated version of our previous submission. The updated version includes an additional section of experiments using quadrotors

  15. arXiv:1908.00528  [pdf, other

    cs.AI eess.SY

    Neural Simplex Architecture

    Authors: Dung T. Phan, Radu Grosu, Nils Jansen, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller

    Abstract: We present the Neural Simplex Architecture (NSA), a new approach to runtime assurance that provides safety guarantees for neural controllers (obtained e.g. using reinforcement learning) of autonomous and other complex systems without unduly sacrificing performance. NSA is inspired by the Simplex control architecture of Sha et al., but with some significant differences. In the traditional approach,… ▽ More

    Submitted 24 March, 2020; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 12th NASA Formal Methods Symposium (NFM 2020)

  16. Algorithm Diversity for Resilient Systems

    Authors: Scott D. Stoller, Yanhong A. Liu

    Abstract: Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit. Work on software diversity for security typically creates variants of a program using low-level code transformations. This paper is the first to study algorithm diversity for resilience. We first describe how a method based on high-level… ▽ More

    Submitted 28 April, 2019; originally announced April 2019.

    Journal ref: In Proceedings of the 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2019), volume 11559 of Lecture Notes in Computer Science. Springer-Verlag, 2019

  17. Efficient and Extensible Policy Mining for Relationship-Based Access Control

    Authors: Thang Bui, Scott D. Stoller, Hieu Le

    Abstract: Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy mining algorithms have a potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC polic… ▽ More

    Submitted 8 August, 2019; v1 submitted 18 March, 2019; originally announced March 2019.

    Journal ref: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019), pages 161-172

  18. High-level Cryptographic Abstractions

    Authors: Christopher Kane, Bo Lin, Saksham Chand, Scott D. Stoller, Yanhong A. Liu

    Abstract: The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while also allowing maximum control when needed. This paper proposes such high-level abstractions consisting of simple cryptographic primitives and full… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 October, 2018; originally announced October 2018.

    Journal ref: PLAS 2019: Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security. November 2019. Pages 31-43

  19. Neural State Classification for Hybrid Systems

    Authors: Dung Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller

    Abstract: We introduce the State Classification Problem (SCP) for hybrid systems, and present Neural State Classification (NSC) as an efficient solution technique. SCP generalizes the model checking problem as it entails classifying each state $s$ of a hybrid automaton as either positive or negative, depending on whether or not $s$ satisfies a given time-bounded reachability specification. This is an intere… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Comments: ATVA2018 extended version

  20. arXiv:1712.01935  [pdf, other

    cs.LG

    How to Learn a Model Checker

    Authors: Dung Phan, Radu Grosu, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller

    Abstract: We show how machine-learning techniques, particularly neural networks, offer a very effective and highly efficient solution to the approximate model-checking problem for continuous and hybrid systems, a solution where the general-purpose model checker is replaced by a model-specific classifier trained by sampling model trajectories. To the best of our knowledge, we are the first to establish this… ▽ More

    Submitted 5 December, 2017; originally announced December 2017.

    Comments: 16 pages, 13 figures, short version submitted to HSCC2018

  21. arXiv:1710.10013  [pdf, other

    cs.MA eess.SY

    Declarative vs Rule-based Control for Flocking Dynamics

    Authors: Usama Mehmood, Nicola Paoletti, Dung Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka

    Abstract: The popularity of rule-based flocking models, such as Reynolds' classic flocking model, raises the question of whether more declarative flocking models are possible. This question is motivated by the observation that declarative models are generally simpler and easier to design, understand, and analyze than operational models. We introduce a very simple control law for flocking based on a cost fun… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

    Comments: 7 Pages

  22. arXiv:1708.04749  [pdf, other

    cs.CR

    Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies

    Authors: Thang Bui, Scott D. Stoller, Jiajie Li

    Abstract: Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing. We formulate ReBAC as an object-oriented extension of attribute-based access control (ABAC) in which relationships are expressed using fields that refer to other objects, and path expressions are used to follow chains of relationships between objects.… ▽ More

    Submitted 21 August, 2018; v1 submitted 15 August, 2017; originally announced August 2017.

  23. Moderately Complex Paxos Made Simple: High-Level Executable Specification of Distributed Algorithms

    Authors: Yanhong A. Liu, Saksham Chand, Scott D. Stoller

    Abstract: This paper describes the application of a high-level language and method in develo** simpler specifications of more complex variants of the Paxos algorithm for distributed consensus. The specifications are for Multi-Paxos with preemption, replicated state machine, and reconfiguration and optimized with state reduction and failure detection. The language is DistAlgo. The key is to express complex… ▽ More

    Submitted 12 August, 2019; v1 submitted 31 March, 2017; originally announced April 2017.

    Journal ref: PPDP 2019: Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming. October 2019. Article No. 15. Pages 1-15. ACM Press

  24. arXiv:1606.06269  [pdf, ps, other

    cs.LO cs.AI cs.DB cs.PL

    Founded Semantics and Constraint Semantics of Logic Rules

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: Logic rules and inference are fundamental in computer science and have been studied extensively. However, prior semantics of logic languages can have subtle implications and can disagree significantly, on even very simple programs, including in attempting to solve the well-known Russell's paradox. These semantics are often non-intuitive and hard-to-understand when unrestricted negation is used in… ▽ More

    Submitted 26 March, 2020; v1 submitted 20 June, 2016; originally announced June 2016.

    Journal ref: Journal of Logic and Computation, 30(8):1609-1668, Dec. 2020, Oxford University Press

  25. Formal Verification of Multi-Paxos for Distributed Consensus

    Authors: Saksham Chand, Yanhong A. Liu, Scott D. Stoller

    Abstract: Paxos is an important algorithm for a set of distributed processes to agree on a single value or a sequence of values, for which it is called Basic Paxos or Multi-Paxos, respectively. Consensus is critical when distributed services are replicated for fault-tolerance, because non-faulty replicas must agree on the state of the system or the sequence of operations that have been performed. Unfortunat… ▽ More

    Submitted 11 November, 2019; v1 submitted 4 June, 2016; originally announced June 2016.

    Journal ref: FM 2016: Proceedings of the 21st International Symposium on Formal Methods. LNCS 9995. Pages 119-136. Springer,

  26. arXiv:1603.02640  [pdf, other

    cs.CR

    Mining Hierarchical Temporal Roles with Multiple Metrics

    Authors: Scott D. Stoller, Thang Bui

    Abstract: Temporal role-based access control (TRBAC) extends role-based access control to limit the times at which roles are enabled. This paper presents a new algorithm for mining high-quality TRBAC policies from timed ACLs (i.e., ACLs with time limits in the entries) and optionally user attribute information. Such algorithms have potential to significantly reduce the cost of migration from timed ACLs to T… ▽ More

    Submitted 15 October, 2017; v1 submitted 8 March, 2016; originally announced March 2016.

  27. arXiv:1511.04583  [pdf, other

    cs.PL cs.AI cs.DB

    Demand-Driven Incremental Object Queries

    Authors: Yanhong A. Liu, Jon Brandvein, Scott D. Stoller, Bo Lin

    Abstract: Object queries are essential in information seeking and decision making in vast areas of applications. However, a query may involve complex conditions on objects and sets, which can be arbitrarily nested and aliased. The objects and sets involved as well as the demand---the given parameter values of interest---can change arbitrarily. How to implement object queries efficiently under all possible u… ▽ More

    Submitted 15 July, 2016; v1 submitted 14 November, 2015; originally announced November 2015.

    Journal ref: PPDP 2016: Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, September 2016, Pages 228-241. ACM Press

  28. arXiv:1508.07723  [pdf

    eess.SY cs.RO

    A survey on unmanned aerial vehicle collision avoidance systems

    Authors: Hung Pham, Scott A. Smolka, Scott D. Stoller, Dung Phan, Junxing Yang

    Abstract: Collision avoidance is a key factor in enabling the integration of unmanned aerial vehicle into real life use, whether it is in military or civil application. For a long time there have been a large number of works to address this problem; therefore a comparative summary of them would be desirable. This paper presents a survey on the major collision avoidance systems developed in up to date public… ▽ More

    Submitted 31 August, 2015; originally announced August 2015.

    Comments: This is only a draft

  29. arXiv:1412.8461  [pdf, ps, other

    cs.PL cs.DC

    From Clarity to Efficiency for Distributed Algorithms

    Authors: Yanhong A. Liu, Scott D. Stoller, Bo Lin

    Abstract: This article describes a very high-level language for clear description of distributed algorithms and optimizations necessary for generating efficient implementations. The language supports high-level control flows where complex synchronization conditions can be expressed using high-level queries, especially logic quantifications, over message history sequences. Unfortunately, the programs would b… ▽ More

    Submitted 11 March, 2017; v1 submitted 29 December, 2014; originally announced December 2014.

    Journal ref: ACM Transactions on Programming Languages and Systems (TOPLAS), 39(3), pages 12:1-12:41, July 2017, ACM Press

  30. arXiv:1403.5715  [pdf, other

    cs.CR cs.DB

    Mining Attribute-Based Access Control Policies from Logs

    Authors: Zhongyuan Xu, Scott D. Stoller

    Abstract: Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mini… ▽ More

    Submitted 12 February, 2018; v1 submitted 22 March, 2014; originally announced March 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1306.2401

  31. arXiv:1306.2401  [pdf, other

    cs.CR

    Mining Attribute-based Access Control Policies

    Authors: Zhongyuan Xu, Scott D. Stoller

    Abstract: Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from an access control list (ACL) policy or role-based access control (RBAC) policy with accompanying attribute data. T… ▽ More

    Submitted 7 August, 2014; v1 submitted 10 June, 2013; originally announced June 2013.