Found 611 resultsAuthor Title [ Type] Year
Filters: First Letter Of Last Name is P [Clear All Filters]
An algorithm for simulation of electrochemical systems with surface-bulk coupling strategies. :296-302.. 2009.
Analysis of the Impact of Release Area on the Quality Factor of Contour-Mode Resonators by Laser Doppler Vibrometry. IEEE International Frequency Control Symposium. :709-712.. 2015.
Application of repetitive controllers to nonlinear plants.. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :2692-2697.. 1998.
On assigning the derivative of a disturbance attenuation clf. IEEE CONFERENCE ON DECISION AND CONTROL - PROCEEDINGS. :2497-2502.. 1998.
Automated tracking and modeling of microtubule dynamics. IEEE International Symposium on Biomedical Imaging. :1032-+.. 2006.
BULK TITANIUM MICRONEEDLES WITH EMBEDDED MICROFLUIDIC NETWORKS FOR TRANSDERMAL DRUG DELIVERY. Proceedings IEEE Micro Electro Mechanical Systems. :498-501.. 2006.
Brief announcement: Convergence analysis of scalable gossip protocols. LECTURE NOTES IN COMPUTER SCIENCE. 4167:540-542.. 2006.
Conditioning Moments of Singular Measures for Entropy Maximization II: Numerical Examples. Contemporary Mathematics. 661:283-297.. 2016.
Control system architecture for mechanical cardiac assist devices.. PROCEEDINGS OF THE AMERICAN CONTROL CONFERENCE. :3478-3482.. 2000.
Control with Minimum Communication Cost per Symbol. :6050-6055.. 2014.
Convergence Rates of Consensus Algorithms in Stochastic Networks. IEEE Conference on Decision and Control. :6608-6613.. 2010.
Coordinated path-following control of multiple underactuated autonomous vehicles in the presence of communication failures. IEEE Conference on Decision and Control. :4346-+.. 2006.
A Cure Time Model for Joint Prediction of Outcome and Time-to-Outcome. IEEE International Conference on Data Mining. :1117-1122.. 2015.
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design. :2195-2201.. 2011.
Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks. IEEE Conference on Decision and Control. :3418-3425.. 2012.
Cyclic allocation of two-dimensional data. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING (SERIES). :94-101.. 1998.
Data-Driven Modeling and Analysis of Online Social Networks. Lecture Notes in Computer Science. 6897:3-+.. 2011.
Decentralized algorithms for stochastic and dynamic vehicle routing with general demand distribution. IEEE Conference on Decision and Control. :6018-+.. 2007.
Deriving user interface requirements from densely interleaved scientific computing applications. :22-28.. 2003.