From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A formal verification approach to revealing stealth attacks on networked control systems., , , и . HiCoNS, стр. 67-76. ACM, (2014)Incentivizing Collaboration in Heterogeneous Teams via Common-Pool Resource Games., , и . IEEE Trans. Autom. Control., 68 (3): 1902-1909 (марта 2023)A Multi-Fidelity Bayesian Approach to Safe Controller Design., , и . CoRR, (2023)Competitive Perimeter Defense of Conical Environments., , , , , , и . CoRR, (2021)Achieving Efficient Collaboration in Decentralized Heterogeneous Teams using Common-Pool Resource Games., , и . CDC, стр. 6924-6929. IEEE, (2019)A Scenario Approach to Robust Simulation-based Path Planning., и . ACC, стр. 5024-5029. IEEE, (2022)Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks., и . ACC, стр. 489-496. IEEE, (2019)Sequential randomized matrix factorization for Gaussian processes., и . IEEE BigData, стр. 3957-3959. IEEE Computer Society, (2016)Perimeter Defense Using a Turret with Finite Range and Startup Time., , , , и . ACC, стр. 3350-3355. IEEE, (2023)Shortest Trajectory of a Dubins Vehicle with a Controllable Laser., , , , и . CoRR, (2024)