Biblio
Filters: First Letter Of Title is V [Clear All Filters]
Vacuity Aware Falsification for MTL Request-Response Specifications. IEEE International Conference on Automation Science and Engineering.
.
2017.
Validation of cognitive models for collaborative hybrid systems with discrete human input. {IEEE/RSJ} International Conference on Intelligent Robots and Systems. :3339–3346.
.
2016.
Variance-Based Digital Logic for Energy Harvesting Internet-of-Things. IEEE Symposium on Circuits and Systems.
.
2017.
Vehicle Modeling and Parameter Estimation Using Adaptive Limited Memory Joint-State UKF. American Control Conference.
.
2017.
Vehicle routing problem with time windows: A deterministic annealing approach. American Control Conference (ACC), 2016. :790–795.
.
2016.
Vehicle trajectory collection and processing methodology and its implementation. Transportation Research Board 87th Annual Meeting.
.
2008.
Vehicle-Type Specific Headway Distribution in Freeway Work Zones: A Nonparametric Approach. Transportation Research Board 93rd Annual Meeting.
.
2014.
Velocity Field Generation for Density Control of Swarms using Heat Equation and Smooth Kernels. {IFAC} World Congress. :9815–9821.
.
2017.
Verena: End-to-End Integrity Protection for Web Applications. IEEE Symposium of Security and Privacy (Oakland).
.
2016.
Verification of interactive software for medical devices: PCA infusion pumps and FDA regulation as an example. Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems. :81–90.
.
2013.
Viable set approximation for linear-Gaussian systems with unknown, bounded variance. {IEEE} Conference on Decision and Control. :7049–7055.
.
2016.
Video anomaly detection based on local statistical aggregates. 2012 {IEEE} Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012. :2112–2119.
.
2012.
Video Anomaly Identification. {IEEE} Signal Process. Mag.. 27:18–33.
.
2010.
Ving: Bootstrapping the Desktop Area Network with a Vibratory Ping. 2015 ACM Workshop on Hot Topics in Wireless.
.
2015.
Visual Attention Guided Deep Imitation Learning. Under review by AAAI 2018.
.
2018.
Visualization-aware sampling for very large databases. Proceedings of 32nd IEEE International Conference on Data Engineering (ICDE). :755–766.
.
2016.
Vulnerability Assessment of Power Systems to False Data Injection Attacks. IEEE Transactions on Smart Grid.
.
2017. under review