Publications

Found 2855 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Morse AS, Hespanha JP.  1999.  Scale-independent hysteresis switching. HYBRID SYSTEMS: COMPUTATION AND CONTROL. 1569:117-122.
Mallarino R., Abzhanov A., Herrel A., Campas O., Brenner M.P.  2010.  Scaling and shear transformations capture beak shape variation in Darwin's finches. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA. 107:3356-3360.
Merchant GE, BIRNIR B, Smith TR.  2001.  The scaling of fluvial landscapes. COMPUTERS & GEOSCIENCES. 27:1189-1216.
Singh A, Hespanha JPedro.  2008.  Scaling of stochasticity in gene cascades. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :2780-2785.
Bonvin D, MELLICHAMP DA.  1987.  A SCALING PROCEDURE FOR THE STRUCTURAL AND INTERACTION ANALYSIS OF DYNAMIC-MODELS. AICHE JOURNAL. 33:250-257.
Gencel MFaruk, Madhow U, Rasekh MEslami.  2015.  Scaling wideband distributed transmit beamforming via aggregate feedback. IEEE International Conference on Communications. :2356-2362.
Shao ZW, Madhow U.  2002.  Scheduling heavy-tailed data traffic over the wireless Internet. IEEE VTS Vehicular Technology Conference Proceedings. :1158-1162.
Antunes D.J, Hespanha J.P, Silvestre C.J, Heemels W.PMH.  2012.  Scheduling Measurements and Controls over Networks - Part I: Rollout Strategies for Protocol Design. Proceedings of the American Control Conference. :2036-2041.
Antunes D.J, Hespanha J.P, Silvestre C.J, Heemels W.PMH.  2012.  Scheduling Measurements and Controls over Networks - Part II: Rollout Strategies for Simultaneous Protocol and Controller Design. Proceedings of the American Control Conference. :2042-2047.
Bency AJohn, Karthikeyan S., De Leo C, Manjunath B.S, Sunderrajan S.  2017.  Search Tracker: Human-Derived Object Tracking in the Wild Through Large-Scale Search and Retrieval. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY. 27:1803-1814.
Mezic I, Mohr R.  2015.  Searching for Targets of Nonuniform Size Using Mixing Transformations: Constructive Upper Bounds and Limit Laws. JOURNAL OF NONLINEAR SCIENCE. 25:741-777.
Chen H, Min C, Gibou F.  2007.  A second order accurate finite difference scheme for the heat equation on irregular domains and adaptive grids. MATERIALS RESEARCH SOCIETY SYMPOSIUM PROCEEDINGS. 910:123-128.
Min C, Gibou F.  2007.  A second order accurate level set method on non-graded adaptive Cartesian grids. JOURNAL OF COMPUTATIONAL PHYSICS. 225:300-321.
Min C, Gibou F.  2006.  A second order accurate projection method for the incompressible Navier-Stokes equations on non-graded adaptive grids. JOURNAL OF COMPUTATIONAL PHYSICS. 219:912-929.
Doerfler F, Simpson-Porco JW, Shafiee Q, Bullo F, Vasquez JC, Guerrero JM.  2015.  Secondary Frequency and Voltage Control of Islanded Microgrids via Distributed Averaging. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS. 62:7025-7038.
Chene Adu, Min C, Gibou F.  2008.  Second-order accurate computation of curvatures in a level set framework using novel high-order reinitialization schemes. JOURNAL OF SCIENTIFIC COMPUTING. 35:114-131.
Mirzadeh M, Theillard M, Gibou F.  2011.  A second-order discretization of the nonlinear Poisson-Boltzmann equation over irregular geometries using non-graded adaptive Cartesian grids. JOURNAL OF COMPUTATIONAL PHYSICS. 230:2125-2140.
Theillard M, Vie J-L, Djodom LFokoua, Gibou F.  2013.  A second-order sharp numerical method for solving the linear elasticity equations on irregular domains and adaptive grids - Application to shape optimization. JOURNAL OF COMPUTATIONAL PHYSICS. 233:430-448.
Agrawal D, Abbadi AEl, Wang S.  2013.  Secure and Privacy-Preserving Database Services in the Cloud. IEEE International Conference on Data Engineering. :1268-1271.
Agrawal D, Abbadi AEl, Wang S.  2011.  Secure Data Management in the Cloud. Lecture Notes in Computer Science. 7108:1-15.
Agrawal D, Emekci F, Abbadi AEl, Metwally A, Wang S.  2011.  Secure Data Management Service on Cloud Computing Infrastructures. Lecture Notes in Business Information Processing. 74:57-+.
Madhow U., Sarkar A., Chandrasekaran S., Manjunath B.S, Solanki K..  2007.  Secure steganography: Statistical restoration of the second order dependencies for improved security. International Conference on Acoustics Speech and Signal Processing ICASSP. :277-+.
Bullo F, Bicchi A, Pasqualetti F.  2009.  On the Security of Linear Consensus Networks. IEEE Conference on Decision and Control. :4894-4901.
Veeman M, Manjunath B.S, Obara B, Smith W, Choi JHyeok.  2011.  Segmentation of Ascidian Notochord Cells in DIC Timelapse Images. MICROSCOPY RESEARCH AND TECHNIQUE. 74:727-734.
Petzold L, Bales B, Pollock T.  2017.  Segmentation-free image processing and analysis of precipitate shapes in 2D and 3D. MODELLING AND SIMULATION IN MATERIALS SCIENCE AND ENGINEERING. 25

Pages