Author of the publication

Vulnerability-Aware Architecture for a Tactical, Mobile Cloud.

, , , , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 57-65. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A solution to simultaneous arrival of multiple UAVs using Pythagorean hodograph curves., , , , , and . ACC, page 1-6. IEEE, (2006)A nonlinear discrete-time observer for inverter control., , , and . ACC, page 162-167. IEEE, (2004)Practical techniques for optimal dual-rate digital redesign., , and . ACC, page 3496-3501. IEEE, (2004)Synthesis and Experimental Validation of Two-Step Variable-Structure Control of a Micro-Actuated Flow Effector., , , and . ACC, page 3210-3215. IEEE, (2007)Energy-Efficient Monitor Deployment in Collaborative Distributed Setting., , , , and . IEEE Trans. Ind. Informatics, 12 (1): 112-123 (2016)A class of dual-rate sampled-data models for continuous-time systems., , and . ACC, page 4959-4964. IEEE, (2005)Information broadcasting algorithm for Finite-Time Reaching-at-Risk Consensus with application to weapon-target assignment., , and . ACC, page 3286-3291. IEEE, (2009)Stable Morphing of Unicycle Formations in Translational Motion., , and . ACC, page 4231-4236. IEEE, (2006)PSS design for passivity-aimed control of turboalternators: a LMI approach., , and . ACC, page 130-134. IEEE, (2000)A dual-network health state estimator and decision policy for unmanned combat teams., , and . ACC, page 3163-3168. IEEE, (2008)