An algebraic temporal logic approach to the forbidden state problem in discrete event control
In this paper, we present an axiomatic approach to the forbidden state problem in discrete event control for a class of concurrent DES using temporal logic. A simple example illustrates the main ideas developed.
KeywordsTemporal Logic Discrete Event Discrete Event System Linear Time Temporal Logic Predicate Transformer
Unable to display preview. Download preview PDF.
- 1.J. S. Ostroff, “Appendix A: Formal overview of temporal logic and Appendix B: Temporal logic theorems and rules,” Temporal logic for Real Time Systems, pp. 155–171 and 172–183, New York: Research Studies Press Ltd. John Wiley & Sons Inc, 1989. Advanced Software Development Series.Google Scholar
- 2.J. G. Thistle and W. M. Wonham, “Control problems in a temporal logic framework,” International Journal of Control, vol. 44, no. 4, pp. 943–976, September 1986.Google Scholar
- 3.Jing-Yue Lin and Dan Ionescu, “Verifying a class of nondeterministic discrete event systems in a generalized temporal logic,” IEEE Transactions on Systems, Man and Cybernetics, vol. 22, no. 6, pp. 1461–1469, November/December 1992.Google Scholar
- 5.Ratnesh Kumar, Vijay K. Garg, and Steven I. Marcus, “Using predicate transformers for supervisory control,” Proceedings of the 30th IEEE International Conference on Decision and Control, (Brighton, England), pp. 98–103, December 1991.Google Scholar
- 6.E. W. Dijkstra, A Discipline of Programming. Prentice Hall, Inc. Englewood Cliffs, New Jersey, 1985.Google Scholar
- 8.Yong Li and W. M. Wonham, “Strict concurrency and nondeterministic control of discrete event systems,” Proceedings of the 28th IEEE International Conference on Decision and Control, (Tampa, Florida, U.S.A), pp. 2731–2736, December 1989.Google Scholar
- 9.K. A. Ross and C. R. B. Wright, Discrete Mathematics, ch. 2.2: Propositional Calculus. Prentice Hall, Inc. Englewood Cliffs, New Jersey, 2nd ed., 1988. Tables on Logical Equivalences, Logical implications and Rules of inference.Google Scholar
- 10.R. P. Trueblood and A. Sengupta, “Dynamic analysis of the effects access rule modifications have upon security,” IEEE Transactions on Software Engineering, vol. SE-12, no. 8, pp. 866–870, August 1986.Google Scholar