Author of the publication

Robustness and Consistency in Linear Quadratic Control with Untrusted Predictions.

, , , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 6 (1): 18:1-18:35 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unauthorized Cross-App Resource Access on MAC OS X and iOS., , , , , , , and . CoRR, (2015)Self-Organized Dynamic Caching Space Sharing in Virtualized Wireless Networks., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2016)Disentangling Observed Causal Effects from Latent Confounders using Method of Moments., , , , , and . CoRR, (2021)Anytime-Competitive Reinforcement Learning with Policy Prior., , , , and . CoRR, (2023)TENSILE: A Tensor granularity dynamic GPU memory scheduler method towards multiple dynamic workloads system., , , , , and . CoRR, (2021)Beyond Black-Box Advice: Learning-Augmented Algorithms for MDPs with Q-Value Predictions., , , and . CoRR, (2023)Optimal Bidding of Energy Storage: A Surrogate Method with Combined Spatial-Temporal Entropy., , , , , and . CoRR, (2021)Data assimilation of rotor flow at hovering state using ensemble Kalman filter., , , and . J. Vis., 26 (4): 815-839 (August 2023)WeChat use among family caregivers of people living with schizophrenia and its relationship to caregiving experiences., , , , , , and . Comput. Hum. Behav., (2021)Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS., , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)