Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust but Verify: Cryptographic Data Privacy for Mobility Management., , , and . CoRR, (2021)Control-Aware Trajectory Predictions for Communication-Efficient Drone Swarm Coordination in Cluttered Environments., , and . CoRR, (2024)Time-to-Green predictions for fully-actuated signal control systems with supervised learning., , , , , and . CoRR, (2022)Time-to-Green predictions: A framework to enhance SPaT messages using machine learning., , , , and . ITSC, page 1-6. IEEE, (2020)A Transit Signal Priority Algorithm under Connected Vehicle Environment., , and . ITSC, page 66-70. IEEE, (2015)Planning and Operations of Mixed Fleets in Mobility-on-Demand Systems., , , and . CoRR, (2020)Graph Neural Network Reinforcement Learning for Autonomous Mobility-on-Demand Systems., , , , , and . CDC, page 2996-3003. IEEE, (2021)Differentially Private Stochastic Convex Optimization for Network Routing Applications., , , and . CoRR, (2022)Private and Decentralized Location Sharing for Congestion-Aware Routing., , , and . CoRR, (2022)Private Location Sharing for Decentralized Routing Services., , , and . ITSC, page 2479-2486. IEEE, (2022)