Visible to the public Biblio

Found 224 results

Filters: First Letter Of Last Name is W  [Clear All Filters]
2018-05-23
Ivanov, R., Weimer, J., Simpao, A., Rehman, M., Lee, I..  2015.  Early Detection of Critical Pulmonary Shunts in Infants. Proceedings of the 6th International Conference on Cyber-Physical Systems. :110-119.
Arney, D., Plourde, J., Schrenker, R., Mattegunta, P., Whitehead, S.F., Goldman, J.M..  2014.  Design Pillars for Medical Cyber-Physical System Middleware. Proceedings of the 5th Workshop on Medical Cyber-Physical Systems (MCPS 2014). :124–132.
Alur, Rajeev, Trivedi, Ashutosh, Wojtczak, Dominik.  2012.  Optimal Scheduling for Constant-rate Multi-mode Systems. Proceedings of the 15th ACM International Conference on Hybrid Systems: Computation and Control (HSCC '12). :75–84.
Wang, Shaohui, Ayoub, Anaheed, Sokolsky, Oleg, Lee, Insup.  2012.  Runtime Verification of Traces Under Recording Uncertainty. Proceedings of the Second International Conference on Runtime Verification (RV'11). :442–456.
2018-05-17
Huang, Jiamin, Mozafari, Barzan, Schoenebeck, Grant, Wenisch, Thomas F.  2017.  A top-down approach to achieving performance predictability in database systems. Proceedings of the ACM International Conference on Management of Data. :745–758.
Ozel, Omur, Weerakkody, Sean, Sinopoli, Bruno.  2017.  Physical Watermarking for Securing Cyber Physical Systems via Packet Drop Injections. 8th IEEE International Conference on Smart Grid Communications.
Weerakkody, Sean, Ozel, Omur, Sinopoli, Bruno.  2017.  A Bernoulli-Gaussian Physical Watermark for Detecting Integrity Attacks in Control Systems. 55th Annual Allerton Conference on Communication, Control, and Computing.
Weerakkody, Sean, Sinopoli, Bruno.  2016.  A moving target approach for identifying malicious sensors in control systems. 54th Annual Allerton Conference on Communication, Control, and Computing. :1149–1156.
Weerakkody, Sean, Ozel, Omur, Griffioen, Paul, Sinopoli, Bruno.  Submitted.  Active Detection for Exposing Intelligent Attacks in Control Systems. 1st IEEE Conference on Control Technology and Applications.
Weerakkody, Sean, Sinopoli, Bruno, Kar, Soummya, Datta, Anupam.  2016.  Information Flow for Security in Control Systems. 55th IEEE Conference on Decision and Control (CDC). :5065-5072.
Stern, R., Work, D., Cui, S., Pohlmann, H., Seibold, B., Delle Monache, M. L., Piccoli, B., Sprinkle, J..  2016.  Stabilizing traffic with a single autonomous vehicle: WiP abstract. Proceedings of the 7th International Conference on Cyber-Physical Systems. :9.
Hurd, Sam, Camp, Carmen, White, Jules.  2015.  Quality assurance in additive manufacturing through mobile computing. Mobile Computing, Applications, and Services: 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12–13, 2015, Revised Selected Papers. :203-220.
Kim, E., Wu, C.-J., Horowitz, R., Arcak, M..  2017.  Offset optimization of signalized intersections via the Burer-Monteiro method. Proceedings of the 2017 American Control Conference. :3554-3559.
2018-05-16