721 results on '"Shames, Iman"'
Search Results
202. Early Termination of NMPC Interior Point Solvers: Relating the Duality Gap to Stability
203. Uncertainty Intervals for Robust Bottleneck Assignment
204. Corrigendum to “On eigenvalues of Laplacian matrix for a class of directed signed graphs” [Linear Algebra Appl. 523 (2017) 281–306]
205. Information-Theoretic Privacy through Chaos Synchronization and Optimal Additive Noise
206. Predictive Online Convex Optimization
207. Implementing Homomorphic Encryption Based Secure Feedback Control for Physical Systems
208. Chapter 12: Secure Networked Control Systems Design Using Semi-homomorphic Encryption.
209. Source Localisation Using Binary Measurements
210. Bounded Error Tracking Control for Contouring Systems with End Effector Measurements
211. Optimal contract design for effort-averse sensors.
212. On reconstructability of quadratic utility functions from the iterations in gradient methods
213. Secure Control of Nonlinear Systems Using Semi-Homomorphic Encryption
214. Bilateral Trade Under Information Asymmetry and Quantized Measurements
215. On Privacy of Quantized Sensor Measurements through Additive Noise
216. Gaussian Processes with Monotonicity Constraints for Preference Learning from Pairwise Comparisons
217. Numerical Optimisation of Time-Varying Strongly Convex Functions Subject to Time-Varying Constraints
218. A Machine Learning Approach for Tuning Model Predictive Controllers
219. Optimal contract design for effort-averse sensors
220. Compressive Sensing in Fault Detection
221. Towards Encrypted MPC for Linear Constrained Systems
222. Polynomial‐Based Methods for Localization in Multiagent Systems
223. Analysis of Model and Iteration Dependencies in Distributed Feasible-Point Algorithms for Optimal Control Computation
224. Towards encrypted MPC for linear constrained systems
225. Security Analysis of Quantized Bayesian Estimators
226. Numerical Optimisation of Time-Varying Strongly Convex Functions Subject to Time-Varying Constraints
227. Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption
228. Detection and Mitigation of Biasing Attacks on Distributed Estimation Networks
229. On Privacy of Quantized Sensor Measurements through Additive Noise
230. Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint)
231. Private and Secure Coordination of Match-Making for Heavy-Duty Vehicle Platooning
232. Scalable computation for optimal control of cascade systems with constraints
233. Task allocation and motion control for threat-seduction decoys
234. Co-operative estimation for source localisation using binary sensors
235. Structured computation of optimal controls for constrained cascade systems
236. Adaptive Source Localization Based Station Keeping of Autonomous Vehicles
237. Security analysis of cyber‐physical systems using norm
238. Private and Secure Coordination of Match-Making for Heavy-Duty Vehicle Platooning * *The work of F. Farokhi and I. Shames was supported by a McKen-zie Fellowship and a grant (MyIP: ID6874) from Defence Science and Technology Group (DSTG). The work of K.H. Johansson was supported by Knut och Alice Wallenbergs Foundation (KAW), Swedish Foundation for Strategic Research (SSF), and Swedish Research Council (VR)
239. Preserving Privacy of Finite Impulse Response Systems
240. On eigenvalues of Laplacian matrix for a class of directed signed graphs
241. Structured computation of optimal controls for constrained cascade systems.
242. Co-operative Estimation for Source Localisation using Binary Sensors
243. Preserving Privacy of Finite Impulse Response Systems
244. Budget-Constrained Contract Design for Effort-Averse Sensors in Averaging Based Estimation
245. The ADMM Algorithm for Distributed Quadratic Problems : Parameter Selection and Constraint Preconditioning
246. The Effect of Sensor Modality on Posterior Cramer-Rao Bounds for Simultaneous Localisation and Mapping
247. Detection of Biasing Attacks on Distributed Estimation Networks
248. Preserving Privacy of Agents in Participatory-Sensing Schemes for Traffic Estimation
249. Ensuring communication connectivity in multi-agent systems in the presence of uncooperative clients
250. Guaranteed maximum power point tracking by scalar iterations with quadratic convergence rate
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.