Publications
Saddle policies for secure routing in communication networks. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :1416-1421.
.
2002. .
2014. SCALABLE COMPLEX GRAPH ANALYSIS WITH THE KNOWLEDGE DISCOVERY TOOLBOX. International Conference on Acoustics Speech and Signal Processing ICASSP. :5345-5348.
.
2012. .
2005. .
2010. Scalable spatial event representation. :A229-A232.
.
2002. Scalable Tracing of Electron Micrographs by Fusing Top Down and Bottom Up Cues Using Hypergraph Diffusion. Lecture Notes in Computer Science. 7512:321-328.
.
2012. A scaled feedback stabilization of power integrator triangular systems. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :1043-1048.
.
2004. Scaling of stochasticity in gene cascades. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :2780-2785.
.
2008. Scaling wideband distributed transmit beamforming via aggregate feedback. IEEE International Conference on Communications. :2356-2362.
.
2015. Scheduling heavy-tailed data traffic over the wireless Internet. IEEE VTS Vehicular Technology Conference Proceedings. :1158-1162.
.
2002. Scheduling Measurements and Controls over Networks - Part I: Rollout Strategies for Protocol Design. Proceedings of the American Control Conference. :2036-2041.
.
2012. Scheduling Measurements and Controls over Networks - Part II: Rollout Strategies for Simultaneous Protocol and Controller Design. Proceedings of the American Control Conference. :2042-2047.
.
2012. A second order accurate finite difference scheme for the heat equation on irregular domains and adaptive grids. MATERIALS RESEARCH SOCIETY SYMPOSIUM PROCEEDINGS. 910:123-128.
.
2007. Secure and Privacy-Preserving Database Services in the Cloud. IEEE International Conference on Data Engineering. :1268-1271.
.
2013. Secure Data Management in the Cloud. Lecture Notes in Computer Science. 7108:1-15.
.
2011. Secure Data Management Service on Cloud Computing Infrastructures. Lecture Notes in Business Information Processing. 74:57-+.
.
2011. Secure steganography: Statistical restoration of the second order dependencies for improved security. International Conference on Acoustics Speech and Signal Processing ICASSP. :277-+.
.
2007. On the Security of Linear Consensus Networks. IEEE Conference on Decision and Control. :4894-4901.
.
2009. Self-Triggered Set-Valued Observers. :3647-3652.
.
2015. .
2003. Sensing limitations in the Lion and Man problem. Proceedings of the American Control Conference. :2041-2046.
.
2007. .
2016. Sensor networks and inverse scattering. :186-193.
.
2006. .
2015.