Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence Analysis of Iterated Best Response for a Trusted Computation Game., , and . CoRR, (2016)Networked estimation-privacy games., , and . GlobalSIP, page 507-510. IEEE, (2017)On the role of side information in strategic communication., , and . ISIT, page 1626-1630. IEEE, (2016)On incremental approximate saddle-point computation in zero-sum matrix games., and . Autom., (2016)Protecting Consumers Against Personalized Pricing: A Stopping Time Approach., , and . CoRR, (2020)Distributed control design with robustness to small time delays., , and . Syst. Control. Lett., 58 (4): 296-303 (2009)Multi-UAV Velocity and Trajectory Scheduling Strategies for Target Classification by a Single Human Operator., , and . J. Intell. Robotic Syst., 70 (1-4): 255-274 (2013)Scalar Quadratic-Gaussian Soft Watermarking Games., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 215-234. Springer, (2016)The Bounded Real Lemma for Internally Positive Systems and H-Infinity Structured Static State Feedback., and . IEEE Trans. Automat. Contr., 56 (9): 2218-2223 (2011)Scheduling Multiple Uninhabited Aerial Vehicles for Target Classification by Single Human Operator., and . J. Aerosp. Comput. Inf. Commun., 8 (12): 328-345 (2011)