{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:59:15Z","timestamp":1777388355904,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T00:00:00Z","timestamp":1523404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS-1723995"],"award-info":[{"award-number":["IIS-1723995"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,11]]},"DOI":"10.1145\/3178126.3178145","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T12:12:32Z","timestamp":1522671152000},"page":"147-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Formal Guarantees in Data-Driven Model Identification and Control Synthesis"],"prefix":"10.1145","author":[{"given":"Sadra","family":"Sadraddini","sequence":"first","affiliation":[{"name":"Boston University, Boston, MA"}]},{"given":"Calin","family":"Belta","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7799279"},{"key":"e_1_3_2_1_2_1","unstructured":"Mohammed Alshiekh Roderick Bloem Ruediger Ehlers Bettina K\u00f6nighofer Scott Niekum and Ufuk Topcu. 2017. Safe Reinforcement Learning via Shielding. arXiv preprint arXiv.1708.08611 (2017).  Mohammed Alshiekh Roderick Bloem Ruediger Ehlers Bettina K\u00f6nighofer Scott Niekum and Ufuk Topcu. 2017. Safe Reinforcement Learning via Shielding. arXiv preprint arXiv.1708.08611 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656045.2656064"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.02.003"},{"key":"e_1_3_2_1_5_1","unstructured":"Christel Baier and Joost-Pieter Katoen. 2008. Principles of model checking. Vol. 26202649. MIT press Cambridge.  Christel Baier and Joost-Pieter Katoen. 2008. Principles of model checking. Vol. 26202649. MIT press Cambridge."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm362"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Calin Belta Boyan Yordanov and Ebru Aydin Gol. 2016. Formal Methods for Discrete-Time Dynamical Systems. Springer.  Calin Belta Boyan Yordanov and Ebru Aydin Gol. 2016. Formal Methods for Discrete-Time Dynamical Systems. Springer.","DOI":"10.1007\/978-3-319-50763-7"},{"key":"e_1_3_2_1_8_1","first-page":"10","article-title":"A bounded-error approach to piecewise affine system identification","volume":"50","author":"Bemporad A.","year":"2005","journal-title":"IEEE Trans. Automat. Control"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(98)00178-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(99)00113-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963430"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2015.2428471"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.11.195"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Timothy S Gardner Charles R Cantor and James J Collins. 2000. Construction of a genetic toggle switch in Escherichia coli. Nature 403 6767 (2000) 339.  Timothy S Gardner Charles R Cantor and James J Collins. 2000. Construction of a genetic toggle switch in Escherichia coli. Nature 403 6767 (2000) 339.","DOI":"10.1038\/35002131"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2017.04.007"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2008.4739370"},{"key":"e_1_3_2_1_17_1","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"Maler Oded"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2004.08.019"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2004.02.002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11691372_27"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Simone Paoletti Aleksandar Lj Juloski Giancarlo Ferrari-Trecate and Ren\u00e9 Vidal. 2007. Identification of hybrid systems a tutorial. European journal of control 13 2-3 (2007) 242--260.  Simone Paoletti Aleksandar Lj Juloski Giancarlo Ferrari-Trecate and Ren\u00e9 Vidal. 2007. Identification of hybrid systems a tutorial. European journal of control 13 2-3 (2007) 242--260.","DOI":"10.3166\/ejc.13.242-260"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.11.006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1430242"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039363"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2728606.2728628"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461328.2461378"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA623517"},{"key":"e_1_3_2_1_28_1","volume-title":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton). 772--779","author":"Sadraddini S."},{"key":"e_1_3_2_1_29_1","volume-title":"Formal Methods for Adaptive Control of Dynamical Systems. In 56th IEEE Conference on Decision and Control (CDC). IEEE, 1782--1787","author":"Sadraddini Sadra","year":"2017"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"P Tabuada. 2008. Verification and Control of Hybrid Systems. Springer Science & Business Media.   P Tabuada. 2008. Verification and Control of Hybrid Systems. Springer Science & Business Media.","DOI":"10.1007\/978-1-4419-0224-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.886494"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.664154"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2015.7318397"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2176409"}],"event":{"name":"HSCC '18: 21st International Conference on Hybrid Systems: Computation and Control","location":"Porto Portugal","acronym":"HSCC '18","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178126.3178145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3178126.3178145","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3178126.3178145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:56Z","timestamp":1750215776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178126.3178145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,11]]},"references-count":34,"alternative-id":["10.1145\/3178126.3178145","10.1145\/3178126"],"URL":"https:\/\/doi.org\/10.1145\/3178126.3178145","relation":{},"subject":[],"published":{"date-parts":[[2018,4,11]]},"assertion":[{"value":"2018-04-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}