{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T02:47:04Z","timestamp":1778122024662,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ECCS-2015403"],"award-info":[{"award-number":["ECCS-2015403"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["GRK 2428"],"award-info":[{"award-number":["GRK 2428"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.1145\/3501710.3519532","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T14:28:32Z","timestamp":1651156112000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["k-Inductive Barrier Certificates for Stochastic Systems"],"prefix":"10.1145","author":[{"given":"Mahathi","family":"Anand","sequence":"first","affiliation":[{"name":"LMU Munich, Germany"}]},{"given":"Vishnu","family":"Murali","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, USA"}]},{"given":"Ashutosh","family":"Trivedi","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, United States"}]},{"given":"Majid","family":"Zamani","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, United States and LMU Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,5,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.03.027"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9682889"},{"key":"e_1_3_2_1_4_1","volume-title":"Principles of Model Checking","author":"Baier C.","unstructured":"C. Baier and J.-P. Katoen . 2008. Principles of Model Checking . MIT press . C. Baier and J.-P. Katoen. 2008. Principles of Model Checking. MIT press."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.025"},{"key":"e_1_3_2_1_6_1","volume-title":"Real Algebraic Geometry","author":"Bochnak Jacek","unstructured":"Jacek Bochnak , Michel Coste , and Marie-Francoise Roy . 1998. Real Algebraic Geometry . Springer . Jacek Bochnak, Michel Coste, and Marie-Francoise Roy. 1998. Real Algebraic Geometry. Springer."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Martin Brain Saurabh Joshi Daniel Kroening and Peter Schrammel. 2015. Safety verification and refutation by k-Invariants and k-Induction. In Static Analysis(LNCS). 145\u2013161.  Martin Brain Saurabh Joshi Daniel Kroening and Peter Schrammel. 2015. Safety verification and refutation by k-Invariants and k-Induction. In Static Analysis(LNCS). 145\u2013161.","DOI":"10.1007\/978-3-662-48288-9_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10936-7_6"},{"key":"e_1_3_2_1_10_1","volume-title":"Introduction to algorithms","author":"Cormen H.","unstructured":"Thomas\u00a0 H. Cormen , Charles\u00a0 E. Leiserson , Ronald\u00a0 L. Rivest , and Clifford Stein . 2009. Introduction to algorithms ( 3 rd edition ed.). The MIT Press . Thomas\u00a0H. Cormen, Charles\u00a0E. Leiserson, Ronald\u00a0L. Rivest, and Clifford Stein. 2009. Introduction to algorithms(3rd edition ed.). The MIT Press.","edition":"3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_3_2_1_12_1","volume-title":"Static Analysis(LNCS)","author":"Donaldson F.","unstructured":"Alastair\u00a0 F. Donaldson , Leopold Haller , Daniel Kroening , and Philipp R\u00fcmmer . 2011. Software verification using k-induction . In Static Analysis(LNCS) . Springer , 351\u2013368. Alastair\u00a0F. Donaldson, Leopold Haller, Daniel Kroening, and Philipp R\u00fcmmer. 2011. Software verification using k-induction. In Static Analysis(LNCS). Springer, 351\u2013368."},{"key":"e_1_3_2_1_13_1","volume-title":"Stochastic Processes","author":"Doob L.","unstructured":"Joseph\u00a0 L. Doob . 1953. Stochastic Processes . John Wiley and Sons . Joseph\u00a0L. Doob. 1953. Stochastic Processes. John Wiley and Sons."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-011-0211-0"},{"key":"e_1_3_2_1_15_1","volume-title":"Computer Aided Verification(LNCS)","author":"Gao Sicun","unstructured":"Sicun Gao , James Kapinski , Jyotirmoy Deshmukh , Nima Roohi , Armando Solar-Lezama , Nikos Arechiga , and Soonho Kong . 2019. Numerically-robust inductive proof rules for continuous dynamical systems . In Computer Aided Verification(LNCS) . Springer , 137\u2013154. Sicun Gao, James Kapinski, Jyotirmoy Deshmukh, Nima Roohi, Armando Solar-Lezama, Nikos Arechiga, and Soonho Kong. 2019. Numerically-robust inductive proof rules for continuous dynamical systems. In Computer Aided Verification(LNCS). Springer, 137\u2013154."},{"key":"e_1_3_2_1_16_1","volume-title":"Eighth International Conference on Quantitative Evaluation of SysTems. Springer, 69\u201378","author":"Hahn E.M.","unstructured":"E.M. Hahn , G. Norman , D. Parker , B. Wachter , and L. Zhang . 2011. Game-based abstraction and controller synthesis for probabilistic hybrid systems . In Eighth International Conference on Quantitative Evaluation of SysTems. Springer, 69\u201378 . E.M. Hahn, G. Norman, D. Parker, B. Wachter, and L. Zhang. 2011. Game-based abstraction and controller synthesis for probabilistic hybrid systems. In Eighth International Conference on Quantitative Evaluation of SysTems. Springer, 69\u201378."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2014.09.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126508"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Symposium on Automated Technology for Verification and Analysis. Springer, 177\u2013193","author":"Jagtap P.","unstructured":"P. Jagtap , S. Soudjani , and M. Zamani . 2018. Temporal logic verification of stochastic systems using barrier certificates . In Proceedings of the International Symposium on Automated Technology for Verification and Analysis. Springer, 177\u2013193 . P. Jagtap, S. Soudjani, and M. Zamani. 2018. Temporal logic verification of stochastic systems using barrier certificates. In Proceedings of the International Symposium on Automated Technology for Verification and Analysis. Springer, 177\u2013193."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-010-0097-6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029718"},{"key":"e_1_3_2_1_22_1","volume-title":"Stochastic Stability and Control","author":"Kushner J.","unstructured":"H.\u00a0 J. Kushner . 1967. Stochastic Stability and Control . Elsevier Science . H.\u00a0J. Kushner. 1967. Stochastic Stability and Control. Elsevier Science."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2398883"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CACSD.2004.1393890"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-003-0387-5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2005.08.007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.902736"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/050645178"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364912444146"},{"key":"e_1_3_2_1_31_1","volume-title":"Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization methods and software 11","author":"Sturm F.","year":"1999","unstructured":"J.\u00a0 F. Sturm . 1999. Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization methods and software 11 ( 1999 ), 625\u2013653. J.\u00a0F. Sturm. 1999. Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization methods and software 11 (1999), 625\u2013653."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/646485.694471"},{"key":"e_1_3_2_1_33_1","volume-title":"Reach-avoid Analysis for Stochastic Discrete-time Systems. In American Control Conference. IEEE, 4879\u20134885","author":"Xue Bai","year":"2021","unstructured":"Bai Xue , Renjue Li , Naijun Zhan , and Martin Fr\u00e4nzle . 2021 . Reach-avoid Analysis for Stochastic Discrete-time Systems. In American Control Conference. IEEE, 4879\u20134885 . Bai Xue, Renjue Li, Naijun Zhan, and Martin Fr\u00e4nzle. 2021. Reach-avoid Analysis for Stochastic Discrete-time Systems. In American Control Conference. IEEE, 4879\u20134885."},{"key":"e_1_3_2_1_34_1","volume-title":"Inner-approximating Reach-avoid Sets for Discrete-time Polynomial Systems. In IEEE Conference on Decision and Control. IEEE, 867\u2013873","author":"Xue Bai","year":"2020","unstructured":"Bai Xue , Naijun Zhan , and Martin Fr\u00e4nzle . 2020 . Inner-approximating Reach-avoid Sets for Discrete-time Polynomial Systems. In IEEE Conference on Decision and Control. IEEE, 867\u2013873 . Bai Xue, Naijun Zhan, and Martin Fr\u00e4nzle. 2020. Inner-approximating Reach-avoid Sets for Discrete-time Polynomial Systems. In IEEE Conference on Decision and Control. IEEE, 867\u2013873."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3043287"}],"event":{"name":"HSCC '22: 25th ACM International Conference on Hybrid Systems: Computation and Control","location":"Milan Italy","acronym":"HSCC '22","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["25th ACM International Conference on Hybrid Systems: Computation and Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501710.3519532","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3501710.3519532","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501710.3519532","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501710.3519532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:11Z","timestamp":1750183811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501710.3519532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,4]]},"references-count":32,"alternative-id":["10.1145\/3501710.3519532","10.1145\/3501710"],"URL":"https:\/\/doi.org\/10.1145\/3501710.3519532","relation":{},"subject":[],"published":{"date-parts":[[2022,5,4]]},"assertion":[{"value":"2022-05-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}