CaltechAUTHORS
  A Caltech Library Service

Simultaneous model identification and task satisfaction in the presence of temporal logic constraints

Chinchali, Sandeep P. and Livingston, Scott C. and Pavone, Marco and Burdick, Joel W. (2016) Simultaneous model identification and task satisfaction in the presence of temporal logic constraints. In: 2016 IEEE International Conference on Robotics and Automation (ICRA). IEEE , Piscataway, NJ, pp. 3682-3689. ISBN 978-1-4673-8026-3. http://resolver.caltech.edu/CaltechAUTHORS:20170111-152319486

Full text is not posted in this repository. Consult Related URLs below.

Use this Persistent URL to link to this item: http://resolver.caltech.edu/CaltechAUTHORS:20170111-152319486

Abstract

Recent proliferation of cyber-physical systems, ranging from autonomous cars to nuclear hazard inspection robots, has exposed several challenging research problems on automated fault detection and recovery. This paper considers how recently developed formal synthesis and model verification techniques may be used to automatically generate information-seeking trajectories for anomaly detection. In particular, we consider the problem of how a robot could select its actions so as to maximally disambiguate between different model hypotheses that govern the environment it operates in or its interaction with other agents whose prime motivation is a priori unknown. The identification problem is posed as selection of the most likely model from a set of candidates, where each candidate is an adversarial Markov decision process (MDP) together with a linear temporal logic (LTL) formula that constrains robot-environment interaction. An adversarial MDP is an MDP in which transitions depend on both a (controlled) robot action and an (uncontrolled) adversary action. States are labeled, thus allowing interpretation of satisfaction of LTL formulae, which have a special form admitting satisfaction decisions in bounded time. An example where a robotic car must discern whether neighboring vehicles are following its trajectory for a surveillance operation is used to demonstrate our approach.


Item Type:Book Section
Related URLs:
URLURL TypeDescription
http://dx.doi.org/10.1109/ICRA.2016.7487553DOIArticle
http://ieeexplore.ieee.org/document/7487553/PublisherArticle
http://resolver.caltech.edu/CaltechCDSTR:2016.002Related ItemTechnical Report
Additional Information:© 2016 IEEE. This work was partially supported by United Technologies Corporation and IBM, through the industrial cyberphysical systems (iCyPhy) consortium, and by NASA under the Space Technology Research Grants Program, Grant NNX12AQ43G. S.P Chinchali is supported by a Stanford Graduate Fellowship and National Science Foundation Fellowship. The authors thank Richard M. Murray for comments on an early draft.
Funders:
Funding AgencyGrant Number
United Technologies CorporationUNSPECIFIED
IBMUNSPECIFIED
NASANNX12AQ43G
Stanford Graduate FellowshipUNSPECIFIED
NSFUNSPECIFIED
Record Number:CaltechAUTHORS:20170111-152319486
Persistent URL:http://resolver.caltech.edu/CaltechAUTHORS:20170111-152319486
Usage Policy:No commercial reproduction, distribution, display or performance rights in this work are provided.
ID Code:73454
Collection:CaltechAUTHORS
Deposited By: Kristin Buxton
Deposited On:20 Jan 2017 00:36
Last Modified:20 Jan 2017 00:38

Repository Staff Only: item control page