Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authors' reply to comments on 'Risk-sensitive adaptive trackers for strict-feedback systems with output-measurements'., and . IEEE Trans. Automat. Contr., (2006)Auctions for Divisible Resources: Price Functions, Nash Equilibrium, and Decentralized Update Schemes., and . AMEC, volume 2531 of Lecture Notes in Computer Science, page 87-102. Springer, (2002)The Role of Information Update in Flow Control., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 562-573. Springer, (2004)Multi-agent Networked Systems with Adversarial Elements.. QEST, volume 8657 of Lecture Notes in Computer Science, page 5-8. Springer, (2014)Evolution of Social Power in Social Networks With Dynamic Topology., , , , and . IEEE Trans. Automat. Contr., 63 (11): 3793-3808 (2018)Information spread in networks: Control, games, and equilibria., and . ITA, page 1-10. IEEE, (2014)Stochastic Subgradient Algorithms for Strongly Convex Optimization Over Distributed Networks., , , and . IEEE Trans. Network Science and Engineering, 4 (4): 248-260 (2017)A game-theoretic formulation of multi-agent resource allocation., , , , , and . Agents, page 349-356. ACM, (2000)Scalar Quadratic-Gaussian Soft Watermarking Games., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 215-234. Springer, (2016)Bayesian decision aggregation in collaborative intrusion detection networks., , , and . NOMS, page 349-356. IEEE, (2010)