Search

Your search keyword '"Sinopoli, Bruno"' showing total 482 results

Search Constraints

Start Over You searched for: Author "Sinopoli, Bruno" Remove constraint Author: "Sinopoli, Bruno"
482 results on '"Sinopoli, Bruno"'

Search Results

1. An Adaptive Method for Non-Stationary Stochastic Multi-armed Bandits with Rewards Generated by a Linear Dynamical System

2. Restless Bandit Problem with Rewards Generated by a Linear Gaussian Dynamical System

3. Gram-Schmidt Methods for Unsupervised Feature Extraction and Selection

4. Towards Hyperparameter-Agnostic DNN Training via Dynamical System Insights

5. An Equivalent Circuit Workflow for Unconstrained Optimization

6. Model-Free Learning and Optimal Policy Design in Multi-Agent MDPs Under Probabilistic Agent Dropout

7. Corrected: On Confident Policy Evaluation for Factored Markov Decision Processes with Node Dropouts

8. CANE: A Cascade-Control Approach for Network-Assisted Video QoE Management

9. ECCO: Equivalent Circuit Controlled Optimization

10. Optimal Active Fault Detection in Inverter-Based Grids

11. Reducing Attack Opportunities Through Decentralized Event-Triggered Control

12. Cluster-Based Control of Transition-Independent MDPs

13. Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems

14. MPC-Based Emergency Vehicle-Centered Multi-Intersection Traffic Control

15. Stochastic Multi-armed Bandits with Non-stationary Rewards Generated by a Linear Dynamical System

16. Implementing Optimization-Based Control Tasks in Cyber-Physical Systems With Limited Computing Capacity

17. Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems

18. ROTEC: Robust to Early Termination Command Governor for Systems with Limited Computing Capacity

19. Assessing Risks and Modeling Threats in the Internet of Things

20. Reference Governor-Based Fault-Tolerant Constrained Control

21. Physical Watermarking for Replay Attack Detection in Continuous-time Systems

22. Toward Safe and Efficient Human-Robot Interaction via Behavior-Driven Danger Signaling

23. Active Attack Detection and Control in Constrained Cyber-Physical Systems Under Prevented Actuation Attack

24. Attack Resilient Interconnected Second Order Systems: A Game-Theoretic Approach

25. A Moving Target Defense for Securing Cyber-Physical Systems

26. Optimizing Robustness against Cascading Failures under Max-Load Targeted Attack

27. Design of Software Rejuvenation for CPS Security Using Invariant Sets

28. Software Rejuvenation for Secure Tracking Control

29. Distributed Estimation Via a Roaming Token

30. Robustness of flow networks against cascading failures under partial load redistribution

32. A Bernoulli-Gaussian Physical Watermark for Detecting Integrity Attacks in Control Systems

33. Optimal Threshold Policies for Robust Data Center Control

34. Detecting Integrity Attacks on Control Systems using a Moving Target Approach

35. Joint attack detection and secure state estimation of cyber-physical systems

36. A Moving Target Approach for Identifying Malicious Sensors in Control Systems

37. On the Efficiency and Fairness of Multiplayer HTTP-based Adaptive Video Streaming

38. Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach

39. Information Flow for Security in Control Systems

41. Reducing Attack Opportunities Through Decentralized Event-Triggered Control

42. Robot Action Planning in the Presence of Careless Humans

43. A Graph Theoretic Characterization of Perfect Attackability and Detection in Distributed Control Systems

44. Minimum Sensor Placement for Robust Observability of Structured Complex Networks

45. Analyzing TCP Throughput Stability and Predictability with Implications for Adaptive Video Streaming

46. Distributed inference over directed networks: Performance limits and optimal design

47. Multi-Sensor Scheduling for State Estimation with Event-Based, Stochastic Triggers

Catalog

Books, media, physical & digital resources