Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Safety Constraints for Learned High Relative Degree System Dynamics., , , and . CoRR, (2019)Distributed computation of symmetric functions with binary inputs., , and . ITW, page 76-80. IEEE, (2009)Event-triggering stabilization of complex linear systems with disturbances over digital channels., , , and . CDC, page 152-157. IEEE, (2018)Covering Algorithms, Continuum Percolation and the Geometry of Wireless Networks, , , and . The Annals of Applied Probability, 13 (2): 722--741 (2003)Information theoretic bounds on the throughput scaling of wireless relay networks., , and . INFOCOM, page 2670-2678. IEEE, (2005)Towards a Non-Stochastic Information Theory., and . ISIT, page 997-1001. IEEE, (2019)On Outage Capacity of MIMO Poisson Fading Channels., , and . ISIT, page 2421-2425. IEEE, (2007)Detection of Man in the Middle Attacks in Model-Free Reinforcement Learning for the Linear Quadratic Regulator., and . ACC, page 4038-4043. IEEE, (2024)Analytical Performance Bounds for Radio Map Estimation., , , and . VTC Spring, page 1-6. IEEE, (2024)Shape of diffusion and size of monochromatic region of a two-dimensional spin system., and . STOC, page 100-113. ACM, (2018)