Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spectral multiscale coverage with the feature aided CPHD tracker., , , , and . ACSSC, page 904-908. IEEE, (2014)Convergence rate for distributed optimization methods: Novel bounds and distributed step size computation., , and . ACC, page 3712-3717. IEEE, (2012)On some communication schemes for distributed pursuit-evasion games., and . CDC, page 1023-1028. IEEE, (2003)Hierarchical Strategy Synthesis for Pursuit-Evasion Problems., , , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 1370-1378. IOS Press, (2016)A perspective on multi-agent communication for information fusion., , , and . ViGIL@NeurIPS, (2019)Convergence analysis of Iterated Best Response for a trusted computation game., , and . Autom., (2017)Communication constraints in coordinated consensus problems., , , and . ACC, page 1-6. IEEE, (2006)Trusted computation with an adversarial cloud., , and . ACC, page 2445-2452. IEEE, (2015)Adaptive distributed estimation over wireless sensor networks with packet losses., , , and . CDC, page 5472-5477. IEEE, (2007)A formal verification approach to revealing stealth attacks on networked control systems., , , and . HiCoNS, page 67-76. ACM, (2014)