Publications
Found 458 results
Author Title [ Type] Year Filters: First Letter Of Last Name is C [Clear All Filters]
A technique for image data hiding and reconstruction without host image. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 3657:386-396.
.
1999. Task Release Control for Decision Making Queues. Proceedings of the American Control Conference.
.
2011. Task re-encoding in vision-based control systems. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :48-53.
.
1997. On synchronous robotic networks Part II: Time complexity of rendezvous and deployment algorithms. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :8313-8318.
.
2005. On synchronous robotic networks Part I: Models, tasks and complexity notions. IEEE Conference on Decision and Control. :2847-2852.
.
2005. Synchronization Assessment in Power Networks and Coupled Oscillators. IEEE Conference on Decision and Control. :4998-5003.
.
2012. Steganalysis of spread spectrum data hiding exploiting cover memory. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 5681:38-46.
.
2005. Steganalysis of quantization index modulation data hiding. IEEE International Conference on Image Processing (ICIP). :1165-1168.
.
2004. Statistical restoration for robust and secure steganography. IEEE International Conference on Image Processing (ICIP). :2237-2240.
.
2005. STABLE PULL-IN ELECTRODES FOR NARROW GAP ACTUATION. :1281-1284.
.
2014. Stability of an Adaptive Switched Controller for Power System Oscillation Damping using Remote Synchrophasor Signals. :1695-1700.
.
2014. Speech coding for mobile ad hoc networks. CONFERENCE RECORD OF THE ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS. :280-284.
.
2003. Sparse and Optimal Wide-Area Damping Control in Power Networks. Proceedings of the American Control Conference. :4289-4294.
.
2013. .
2004. SMT-Based Observer Design for Cyber-Physical Systems Under Sensor Attacks. ACM-IEEE International Conference on Cyber-Physical Systems.
.
2016. Sensor networks and inverse scattering. :186-193.
.
2006. Secure steganography: Statistical restoration of the second order dependencies for improved security. International Conference on Acoustics Speech and Signal Processing ICASSP. :277-+.
.
2007. A second order accurate finite difference scheme for the heat equation on irregular domains and adaptive grids. MATERIALS RESEARCH SOCIETY SYMPOSIUM PROCEEDINGS. 910:123-128.
.
2007. Robust UAV Coordination for Target Tracking using Output-Feedback Model Predictive Control with Moving Horizon Estimation. Proceedings of the American Control Conference. :3758-3764.
.
2015. .
1992. A robust embedded data from wavelet coefficients. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS (SPIE). 3312:308-317.
.
1997. A robust data hiding technique using multidimensional lattices. PROCEEDINGS - IEEE INTERNATIONAL FORUM ON RESEARCH AND TECHNOLOGY ADVANCES IN DIGITAL LIBRARIES. :319-326.
.
1998. Results on relaxation theorems for hybrid systems. IEEE Conference on Decision and Control. :276-+.
.
2006. Results on Non-Linear Hybrid Output Regulation. IEEE Conference on Decision and Control. :2036-2041.
.
2013. Results on input-to-state stability for hybrid systems. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :5403-5408.
.
2005.