Saddle policies for secure routing in communication networks. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :1416-1421.. 2002.
SCALABLE COMPLEX GRAPH ANALYSIS WITH THE KNOWLEDGE DISCOVERY TOOLBOX. International Conference on Acoustics Speech and Signal Processing ICASSP. :5345-5348.. 2012.
Scalable spatial event representation. :A229-A232.. 2002.
Scalable Tracing of Electron Micrographs by Fusing Top Down and Bottom Up Cues Using Hypergraph Diffusion. Lecture Notes in Computer Science. 7512:321-328.. 2012.
A scaled feedback stabilization of power integrator triangular systems. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :1043-1048.. 2004.
Scaling of stochasticity in gene cascades. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :2780-2785.. 2008.
Scaling wideband distributed transmit beamforming via aggregate feedback. IEEE International Conference on Communications. :2356-2362.. 2015.
Scheduling heavy-tailed data traffic over the wireless Internet. IEEE VTS Vehicular Technology Conference Proceedings. :1158-1162.. 2002.
Scheduling Measurements and Controls over Networks - Part I: Rollout Strategies for Protocol Design. Proceedings of the American Control Conference. :2036-2041.. 2012.
Scheduling Measurements and Controls over Networks - Part II: Rollout Strategies for Simultaneous Protocol and Controller Design. Proceedings of the American Control Conference. :2042-2047.. 2012.
A second order accurate finite difference scheme for the heat equation on irregular domains and adaptive grids. MATERIALS RESEARCH SOCIETY SYMPOSIUM PROCEEDINGS. 910:123-128.. 2007.
Secure and Privacy-Preserving Database Services in the Cloud. IEEE International Conference on Data Engineering. :1268-1271.. 2013.
Secure Data Management in the Cloud. Lecture Notes in Computer Science. 7108:1-15.. 2011.
Secure Data Management Service on Cloud Computing Infrastructures. Lecture Notes in Business Information Processing. 74:57-+.. 2011.
Secure steganography: Statistical restoration of the second order dependencies for improved security. International Conference on Acoustics Speech and Signal Processing ICASSP. :277-+.. 2007.
On the Security of Linear Consensus Networks. IEEE Conference on Decision and Control. :4894-4901.. 2009.
Self-Triggered Set-Valued Observers. :3647-3652.. 2015.
Sensing limitations in the Lion and Man problem. Proceedings of the American Control Conference. :2041-2046.. 2007.
Sensor networks and inverse scattering. :186-193.. 2006.