Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Threshold Policies for Robust Data Center Control., , , , and . CoRR, (2017)Modeling Dynamical Phenomena in the Era of Big Data., and . Principles of Modeling, volume 10760 of Lecture Notes in Computer Science, page 162-181. Springer, (2018)Detecting Integrity Attacks on SCADA Systems., , and . IEEE Trans. Contr. Sys. Techn., 22 (4): 1396-1407 (2014)A kernel-based learning approach to ad hoc sensor network localization., , and . ACM Trans. Sens. Networks, 1 (1): 134-152 (2005)Foundations of Control and Estimation Over Lossy Networks., , , , and . Proc. IEEE, 95 (1): 163-187 (2007)Large Deviations Performance of Consensus+Innovations Distributed Detection With Non-Gaussian Observations., , , , and . IEEE Trans. Signal Process., 60 (11): 5987-6002 (2012)Network observability for source localization in graphs with unobserved edges., , , and . GlobalSIP, page 857-861. IEEE, (2014)Stochastic Event-Triggered Sensor Schedule for Remote State Estimation., , , , , and . IEEE Trans. Autom. Control., 60 (10): 2661-2675 (2015)A Linear Programming Approach to Computing Safe Sets for Software Rejuvenation., , , , and . IEEE Control. Syst. Lett., (2022)Optimal Active Fault Detection in Inverter-Based Grids., , , and . IEEE Trans. Control. Syst. Technol., 31 (3): 1411-1417 (May 2023)