Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Frequency Control with Operational Constraints, Part I: Per-Node Power Balance., , , , and . CoRR, (2017)Anonymous Credit Cards., , and . ACM Conference on Computer and Communications Security, page 108-117. ACM, (1994)Document Marking and Identification Using Both Line and Word Shifting., , , and . INFOCOM, page 853-860. IEEE Computer Society, (1995)Optimal load-side control for frequency regulation in smart grids., , and . Allerton, page 731-738. IEEE, (2014)Network equilibrium of heterogeneous congestion control protocols., , , and . INFOCOM, page 1338-1349. IEEE, (2005)Design of AQM in supporting TCP based on the well-known AIMD model., , and . GLOBECOM, page 3226-3230. IEEE, (2003)Nonnegative Matrix Inequalities and their Application to Nonconvex Power Control Optimization., , and . SIAM J. Matrix Anal. Appl., 32 (3): 1030-1055 (2011)Combining Model-Based and Model-Free Methods for Nonlinear Control: A Provably Convergent Policy Gradient Approach., , , and . CoRR, (2020)Price Computation in Random Early Marking (REM)., and . ICC (1), page 485-489. IEEE, (2000)Marking and detection of text documents using transform-domain techniques., , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 317-328. SPIE, (1999)