default search action
James Kapinski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j3]Cumhur Erkan Tuncali, Georgios Fainekos, Danil V. Prokhorov, Hisahiro Ito, James Kapinski:
Requirements-Driven Test Generation for Autonomous Vehicles With Machine Learning Components. IEEE Trans. Intell. Veh. 5(2): 265-280 (2020) - [c32]Benoît Barbot, Nicolas Basset, Thao Dang, Alexandre Donzé, James Kapinski, Tomoya Yamaguchi:
Falsification of Cyber-Physical Systems with Constrained Signal Spaces. NFM 2020: 420-439
2010 – 2019
- 2019
- [c31]Sicun Gao, James Kapinski, Jyotirmoy V. Deshmukh, Nima Roohi, Armando Solar-Lezama, Nikos Aréchiga, Soonho Kong:
Numerically-Robust Inductive Proof Rules for Continuous Dynamical Systems. CAV (2) 2019: 137-154 - [c30]Thomas Ferrère, Dejan Nickovic, Alexandre Donzé, Hisahiro Ito, James Kapinski:
Interface-aware signal temporal logic. HSCC 2019: 57-66 - [c29]Jyotirmoy V. Deshmukh, James Kapinski, Tomoya Yamaguchi, Danil V. Prokhorov:
Learning Deep Neural Network Controllers for Dynamical Systems with Safety Guarantees: Invited Paper. ICCAD 2019: 1-7 - [i6]Cumhur Erkan Tuncali, Georgios Fainekos, Danil V. Prokhorov, Hisahiro Ito, James Kapinski:
Requirements-driven Test Generation for Autonomous Vehicles with Machine Learning Components. CoRR abs/1908.01094 (2019) - 2018
- [j2]Ayca Balkan, Paulo Tabuada, Jyotirmoy V. Deshmukh, Xiaoqing Jin, James Kapinski:
Underminer: A Framework for Automatically Identifying Nonconverging Behaviors in Black-Box System Models. ACM Trans. Embed. Comput. Syst. 17(1): 20:1-20:28 (2018) - [j1]Chuchu Fan, James Kapinski, Xiaoqing Jin, Sayan Mitra:
Simulation-Driven Reachability Using Matrix Measures. ACM Trans. Embed. Comput. Syst. 17(1): 21:1-21:28 (2018) - [c28]Cumhur Erkan Tuncali, James Kapinski, Hisahiro Ito, Jyotirmoy V. Deshmukh:
Reasoning about safety of learning-enabled components in autonomous cyber-physical systems. DAC 2018: 30:1-30:6 - [c27]Cumhur Erkan Tuncali, Georgios Fainekos, Hisahiro Ito, James Kapinski:
Sim-ATAV: Simulation-Based Adversarial Testing Framework for Autonomous Vehicles. HSCC 2018: 283-284 - [c26]Cumhur Erkan Tuncali, Georgios Fainekos, Hisahiro Ito, James Kapinski:
Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components. Intelligent Vehicles Symposium 2018: 1555-1562 - [c25]Pavithra Prabhakar, Ratan Lal, James Kapinski:
Automatic Trace Generation for Signal Temporal Logic. RTSS 2018: 208-217 - [i5]Cumhur Erkan Tuncali, James Kapinski, Hisahiro Ito, Jyotirmoy V. Deshmukh:
Reasoning about Safety of Learning-Enabled Components in Autonomous Cyber-physical Systems. CoRR abs/1804.03973 (2018) - [i4]Cumhur Erkan Tuncali, Georgios Fainekos, Hisahiro Ito, James Kapinski:
Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components. CoRR abs/1804.06760 (2018) - 2017
- [c24]Arvind S. Adimoolam, Thao Dang, Alexandre Donzé, James Kapinski, Xiaoqing Jin:
Classification and Coverage-Based Falsification for Embedded Control Systems. CAV (1) 2017: 483-503 - [c23]Luan Viet Nguyen, James Kapinski, Xiaoqing Jin, Jyotirmoy V. Deshmukh, Ken Butts, Taylor T. Johnson:
Abnormal Data Classification Using Time-Frequency Temporal Logic. HSCC 2017: 237-242 - [c22]Luan Viet Nguyen, James Kapinski, Xiaoqing Jin, Jyotirmoy V. Deshmukh, Taylor T. Johnson:
Hyperproperties of real-valued signals. MEMOCODE 2017: 104-113 - 2016
- [c21]Chuchu Fan, James Kapinski, Xiaoqing Jin, Sayan Mitra:
Locally optimal reach set over-approximation for nonlinear systems. EMSOFT 2016: 6:1-6:10 - [c20]Ayca Balkan, Paulo Tabuada, Jyotirmoy V. Deshmukh, Xiaoqing Jin, James Kapinski:
Underminer: a framework for automatically identifying non-converging behaviors in black box system models. EMSOFT 2016: 7:1-7:10 - [i3]Martin Fränzle, James Kapinski, Pavithra Prabhakar:
Robustness in Cyber-Physical Systems (Dagstuhl Seminar 16362). Dagstuhl Reports 6(9): 29-45 (2016) - 2015
- [c19]James Kapinski, Jyotirmoy V. Deshmukh, Xiaoqing Jin, Hisahiro Ito, Kenneth R. Butts:
Simulation-guided approaches for verification of automotive powertrain control systems. ACC 2015: 4086-4095 - [c18]Jyotirmoy V. Deshmukh, Georgios Fainekos, James Kapinski, Sriram Sankaranarayanan, Aditya Zutshi, Xiaoqing Jin:
Beyond single shooting: Iterative approaches to falsification. ACC 2015: 4098 - [c17]Jyotirmoy V. Deshmukh, Xiaoqing Jin, James Kapinski, Oded Maler:
Stochastic Local Search for Falsification of Hybrid Systems. ATVA 2015: 500-517 - [c16]Jyotirmoy V. Deshmukh, Hisahiro Ito, Xiaoqing Jin, James Kapinski, Kenneth R. Butts, Jürgen Gerhard, Behzad Samadi, Kevin Walker, Yuzhen Xie:
Piecewise-Affine Approximations for a Powertrain Control Verification Benchmark. ARCH@CPSWeek 2015: 98-112 - [c15]Nikos Aréchiga, James Kapinski, Jyotirmoy V. Deshmukh, André Platzer, Bruce H. Krogh:
Forward invariant cuts to simplify proofs of safety. EMSOFT 2015: 227-236 - [c14]Aditya Zutshi, Sriram Sankaranarayanan, Jyotirmoy V. Deshmukh, James Kapinski, Xiaoqing Jin:
Falsification of safety properties for closed loop control systems. HSCC 2015: 299-300 - [c13]Tommaso Dreossi, Thao Dang, Alexandre Donzé, James Kapinski, Xiaoqing Jin, Jyotirmoy V. Deshmukh:
Efficient Guiding Strategies for Testing of Temporal Properties of Hybrid Systems. NFM 2015: 127-142 - [i2]Nikos Aréchiga, James Kapinski, Jyotirmoy V. Deshmukh, André Platzer, Bruce H. Krogh:
Forward Invariant Cuts to Simplify Proofs of Safety. CoRR abs/1507.05133 (2015) - 2014
- [c12]Aditya Zutshi, Jyotirmoy V. Deshmukh, Sriram Sankaranarayanan, James Kapinski:
Multiple shooting, CEGAR-based falsification for hybrid systems. EMSOFT 2014: 5:1-5:10 - [c11]James Kapinski, Jyotirmoy V. Deshmukh, Sriram Sankaranarayanan, Nikos Aréchiga:
Simulation-guided lyapunov analysis for hybrid dynamical systems. HSCC 2014: 133-142 - [c10]Xiaoqing Jin, Jyotirmoy V. Deshmukh, James Kapinski, Koichi Ueda, Kenneth R. Butts:
Powertrain control verification benchmark. HSCC 2014: 253-262 - [c9]Houssam Abbas, Bardh Hoxha, Georgios Fainekos, Jyotirmoy V. Deshmukh, James Kapinski, Koichi Ueda:
WiP abstract: Conformance testing as falsification for cyber-physical systems. ICCPS 2014: 211 - [c8]Nikos Aréchiga, James Kapinski, Jyotirmoy V. Deshmukh, André Platzer, Bruce H. Krogh:
Numerically-aided Deductive Safety Proof for a Powertrain Control System. NSV 2014: 19-25 - [i1]Houssam Abbas, Bardh Hoxha, Georgios Fainekos, Jyotirmoy V. Deshmukh, James Kapinski, Koichi Ueda:
Conformance Testing as Falsification for Cyber-Physical Systems. CoRR abs/1401.5200 (2014) - 2013
- [c7]Aditya Zutshi, Sriram Sankaranarayanan, Jyotirmoy V. Deshmukh, James Kapinski:
A trajectory splicing approach to concretizing counterexamples for hybrid systems. CDC 2013: 3918-3925 - 2010
- [c6]James Kapinski, Bruce H. Krogh:
On incrementally bounded systems. ACC 2010: 6348-6350
2000 – 2009
- 2008
- [c5]Flavio Lerda, James Kapinski, Hitashyam Maka, Edmund M. Clarke, Bruce H. Krogh:
Model checking in-the-loop: Finding counterexamples by systematic simulation. ACC 2008: 2734-2740 - [c4]James Kapinski, Alexandre Donzé, Flavio Lerda, Hitashyam Maka, Silke Wagner, Bruce H. Krogh:
Control software model checking using bisimulation functions for nonlinear systems. CDC 2008: 4024-4029 - [c3]Flavio Lerda, James Kapinski, Edmund M. Clarke, Bruce H. Krogh:
Verification of Supervisory Control Software Using State Proximity and Merging. HSCC 2008: 344-357 - 2004
- [c2]James Kapinski, Bruce H. Krogh:
Verifying asymptotic bounds for discrete-time sliding mode systems with disturbance inputs. ACC 2004: 2852-2857 - 2003
- [c1]James Kapinski, Bruce H. Krogh, Oded Maler, Olaf Stursberg:
On Systematic Simulation of Open Continuous Systems. HSCC 2003: 283-297
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint