{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:30:10Z","timestamp":1729611010195,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cdc.2011.6160779","type":"proceedings-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T16:18:31Z","timestamp":1331137111000},"page":"2693-2698","source":"Crossref","is-referenced-by-count":0,"title":["Compositionally analyzing a proportional-integral controller family"],"prefix":"10.1109","author":[{"given":"Ashish","family":"Tiwari","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-008-9103-8"},{"journal-title":"Frequency Domain Criteria for Absolute Stability","year":"1973","author":"narendra","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31954-2_3"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.2001.0472"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/36.5.450"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1997.0119"},{"key":"14","first-page":"347","article-title":"On ellipsoidal techniques for reachability analysis","volume":"9","author":"kurzhanski","year":"2002","journal-title":"Dynamics of Continuous Discrete and Impulsive Systems Series B Applications and Algorithms"},{"key":"11","first-page":"190","article-title":"Constraint-based approach for analysis of hybrid systems","author":"gulwani","year":"2008","journal-title":"Proc 20th CAV Volume 5123 of LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050008"},{"journal-title":"SOSTOOLS Sum of Square Optimization Toolbox","year":"2002","author":"prajna","key":"21"},{"key":"20","first-page":"477","article-title":"Safety verification of hybrid systems using barrier certificates","author":"prajna","year":"2004","journal-title":"Proc 7th HSCC Volume 2993 of LNCS"},{"key":"22","first-page":"539","article-title":"Constructing invariants for hybrid systems","author":"sankaranarayanan","year":"2004","journal-title":"HSCC Volume 2993 of LNCS"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1993886.1993935"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.886494"},{"key":"25","first-page":"514","article-title":"Approximate reachability for linear systems","author":"tiwari","year":"2003","journal-title":"Proc 6th HSCC Volume 2623 of LNCS"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78929-1_58"},{"journal-title":"Certificate-based Verification Tools and Benchmarks","year":"2011","author":"tiwari","key":"27"},{"key":"28","first-page":"465","article-title":"Series of abstractions for hybrid automata","author":"tiwari","year":"2002","journal-title":"HSCC Volume 2289 of LNCS"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814621"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970777"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2005.851359"},{"key":"10","first-page":"258","article-title":"PHAVer: Algorithmic verification of hybrid systems past hytech","author":"frehse","year":"2005","journal-title":"HSCC Volume 3414 of LNCS"},{"key":"1","article-title":"Reachability analysis of hybrid systems via predicate abstraction","author":"alur","year":"2002","journal-title":"HSCC Volume 2289 of LNCS"},{"journal-title":"Nonlinear Systems Analysis","year":"1993","author":"vidyasagar","key":"30"},{"key":"7","first-page":"192","article-title":"Verification of hybrid systems based on counterexample-guided abstraction refinement","author":"clarke","year":"2003","journal-title":"9th Intl TACAS Volume 2619 of LNCS"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1109\/CDC.1998.758642","article-title":"Computing polyhedral approximations to flow pipes for dynamic systems","author":"chutinan","year":"1998","journal-title":"35th IEEE Conf on Decision and Control"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s002000050055"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/968708.968710"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(88)80003-8"},{"journal-title":"Slfq Simplifying Large Formulas with Qepcad 2009","year":"0","author":"brown","key":"4"},{"key":"9","first-page":"96","article-title":"Reachability analysis via face lifting","author":"dang","year":"1998","journal-title":"HSCC Volume 1386 of LNCS"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1086837.1086852"}],"event":{"name":"2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)","start":{"date-parts":[[2011,12,12]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2011,12,15]]}},"container-title":["IEEE Conference on Decision and Control and European Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6149620\/6159299\/06160779.pdf?arnumber=6160779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:20:31Z","timestamp":1497957631000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6160779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cdc.2011.6160779","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}