Author of the publication

An Exact Solution to the Power Networks Security Index Problem and its Generalized Min Cut Formulation

, , , , and . CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Critical $k$-tuples in Power Networks, , and . CoRR, (2012)Convex relaxation approach to the identification of the Wiener-Hammerstein model., , and . CDC, page 1375-1382. IEEE, (2008)Quantifying Cyber-Security for Networked Control Systems., , , and . CPSW@CISS, volume 449 of Lecture Notes in Control and Information Sciences, page 123-142. Springer, (2013)Exact LASSO Solutions for a Class of Constrained Cardinality Minimization Problems, , and . CoRR, (2012)A Fenchel dual gradient method enabling regularization for nonsmooth distributed optimization over time-varying networks., , and . Optim. Methods Softw., 38 (4): 813-836 (July 2023)Distributed Fenchel Dual Gradient Methods Enabling a Smoothing Technique for Nonsmooth Optimization., , and . CDC, page 1757-1762. IEEE, (2018)Convex optimization methods for model reduction.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2008)ndltd.org (oai:dspace.mit.edu:1721.1/45872).Detection and identification of data attacks in power system., , and . ACC, page 3651-3656. IEEE, (2012)Nonserial dynamic programming with applications in smart home appliances scheduling - Part II: Nonserial dynamic programming., , and . ECC, page 1663-1668. IEEE, (2014)Energy and CO2 efficient scheduling of smart home appliances., , , , and . ECC, page 4051-4058. IEEE, (2013)