Presentations

file

Visible to the public Fundamental Limits of Cyber-Physical Systems Modeling

ABSTRACT

To model and design CPS systems, we must combine models for software, networks, and physical dynamics. Such combined models are fraught with subtlety because of the mixture of continuous dynamics and discrete behaviors. In this talk, I discuss some fundamental limits, which cannot be overcome by any modeling technique. Specifically, chaos, the inability to computationally model a continuum, and the incompleteness of determinism limit the predictive power of models.

file

Visible to the public Reflections on Model Integrated Computing and Cyber-Physical Systems

ABSTRACT

We review the development of model integrated computing (MIC) for cyber-physical systems. MIC provided a much higher level of abstraction than was used for real-time embedded computing systems. The introduction of MIC allowed for new types of analysis and synthesis to be performed, leading to improved CPS design methodologies.

file

Visible to the public Modeling Mode Transitions in Cyber-Physical Systems

ABSTRACT

Cyber-Physical Systems are often subject to strange behavior during state or mode transitions that complicate the modeling of the systems; These transient behaviors can frustrate mode estimation algorithms and can produce counter-intuitive, unwanted, and perhaps disastrous responses in autonomous systems. This talk will provide some examples of these transient cases and an approach to handling them from an autonomous systems viewpoint.

file

Visible to the public An Algebra for Cyber-Physical Systems

ABSTRACT

file

Visible to the public AI Technology for Protecting Cyber-Physical Systems

ABSTRACT

CPS are vulnerable to physical attacks, cyber attacks, and attacks that combine both modalities. The approaches that have been taken to ensure safety of CPS are generally insufficient to defend against intelligent adversaries. This talk looks at an Artificial Intelligence approach, based on Active Perception, to protecting CPS from intelligent adversaries using sophisticated cyber-physical attacks.