From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems., , и . Ad Hoc Networks, 7 (8): 1434-1447 (2009)Escher: A New Technology Transitioning Model., , , , , , , и . Computer, 40 (3): 90-92 (2007)Complete characterization of mixing time for the continuous quantum walk on the hypercube with markovian decoherence model., , , и . Quantum Inf. Comput., 9 (9&10): 856-878 (2009)Security of interdependent and identical networked control systems., , и . Autom., 49 (1): 186-192 (2013)Aircraft conflict prediction in the presence of a spatially correlated wind field., , и . IEEE Trans. Intell. Transp. Syst., 6 (3): 326-340 (2005)Analysis of the Godunov-Based Hybrid Model for Ramp Metering and Robust Feedback Control Design., , и . IEEE Trans. Intell. Transp. Syst., 15 (5): 2132-2142 (2014)Probabilistic pursuit-evasion games: theory, implementation, and experimental evaluation., , , , и . IEEE Trans. Robotics Autom., 18 (5): 662-669 (2002)Cyber Security of Water SCADA Systems - Part I: Analysis and Experimentation of Stealthy Deception Attacks., , , и . IEEE Trans. Control. Syst. Technol., 21 (5): 1963-1970 (2013)Steering Three-Input Nonholonomic Systems: The Fire Truck Example., , и . Int. J. Robotics Res., 14 (4): 366-381 (1995)Multi-path Routing Metrics for Reliable Wireless Mesh Routing Topologies, , , , и . CoRR, (2011)