{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:44:02Z","timestamp":1751093042876,"version":"3.38.0"},"reference-count":24,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["The International Journal of Robotics Research"],"published-print":{"date-parts":[[2013,4]]},"abstract":"<jats:p> We develop a technique to automatically generate a control policy for a robot moving in an environment that includes elements with unknown, randomly changing behavior. The robot is required to achieve a surveillance mission, in which a certain request needs to be serviced repeatedly, while the expected time inbetween consecutive services is minimized and additional temporal logic constraints are satisfied. We define a fragment of linear temporal logic to describe such a mission and formulate the problem as a temporal logic game. Our approach is based on two main ideas. First, we extend results in automata learning to detect patterns of the unknown behavior of the elements in the environment. Second, we employ an automata\u2013theoretic method to generate the control policy. We show that the obtained control policy converges to an optimal one when the partially unknown behavior patterns are fully learned. In addition, we illustrate the method in an experimental setup, in which an unmanned ground vehicle, with the help of a cooperating unmanned aerial vehicle (UAV), satisfies a temporal logic requirement in a partitioned environment whose regions are controlled by barriers with unknown behavior. <\/jats:p>","DOI":"10.1177\/0278364912473168","type":"journal-article","created":{"date-parts":[[2013,5,17]],"date-time":"2013-05-17T15:08:23Z","timestamp":1368803303000},"page":"547-565","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["Temporal logic robot control based on automata learning of environmental dynamics"],"prefix":"10.1177","volume":"32","author":[{"given":"Yushan","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, USA"}]},{"given":"Jana","family":"T\u016fmov\u00e1","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Boston University, USA"},{"name":"Faculty of Informatics, Masaryk University, Czech Republic"}]},{"given":"Alphan","family":"Ulusoy","sequence":"additional","affiliation":[{"name":"Division of System Engineering, Boston University, USA"}]},{"given":"Calin","family":"Belta","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Boston University, USA"}]}],"member":"179","published-online":{"date-parts":[[2013,5,17]]},"reference":[{"key":"bibr1-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1145\/322326.322334"},{"key":"bibr2-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1995.525480"},{"volume-title":"Principles of Model Checking","year":"2008","author":"Baier C","key":"bibr3-0278364912473168"},{"key":"bibr4-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1007\/11872436_23"},{"key":"bibr5-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2010.5509503"},{"key":"bibr6-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973082.101"},{"key":"bibr7-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2012.6225075"},{"key":"bibr8-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2011.2163434"},{"key":"bibr9-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1145\/210332.210339"},{"key":"bibr10-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161122"},{"key":"bibr11-0278364912473168","first-page":"3515","volume-title":"18th IFAC world congress","volume":"8","author":"Ding XC","year":"2011"},{"key":"bibr12-0278364912473168","first-page":"325","volume-title":"workshop on algorithmic learning theory","author":"Garcia P","year":"1990"},{"key":"bibr13-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36387-4"},{"key":"bibr14-0278364912473168","first-page":"897","volume-title":"48th annual meeting of the association for computational linguistics","author":"Heinz J","year":"2010"},{"key":"bibr15-0278364912473168","unstructured":"Horning JJ (1969) A study of grammatical inference. PhD Thesis, Stanford University, USA."},{"key":"bibr16-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2008.4586787"},{"key":"bibr17-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.07.022"},{"key":"bibr18-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78929-1_21"},{"key":"bibr19-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2009.2035776"},{"key":"bibr20-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/M-RA.2007.914921"},{"key":"bibr21-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546877"},{"key":"bibr22-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2011.5983140"},{"key":"bibr23-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717316"},{"key":"bibr24-0278364912473168","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399536"}],"container-title":["The International Journal of Robotics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0278364912473168","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0278364912473168","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0278364912473168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T13:29:44Z","timestamp":1741008584000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0278364912473168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["10.1177\/0278364912473168"],"URL":"https:\/\/doi.org\/10.1177\/0278364912473168","relation":{},"ISSN":["0278-3649","1741-3176"],"issn-type":[{"type":"print","value":"0278-3649"},{"type":"electronic","value":"1741-3176"}],"subject":[],"published":{"date-parts":[[2013,4]]}}}