Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 19 results in range #1 to #19.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Security and Infiltration of Networks: A Structural Controllability and Observability Perspective: Label: en
  2. Quantifying Cyber-Security for Networked Control Systems: Label: en
  3. LQ Control under Security Constraints: Label: en
  4. Formulating Cyber-Security as Convex Optimization Problems: Label: en
  5. Cyber-Attack Forecast Modeling and Complexity Reduction Using a Game-Theoretic Framework: Label: en
  6. Cloud Conveyors System: A Versatile Application for Exploring Cyber-Physical Systems: Label: en
  7. CPS Modeling Integration Hub and Design Space Exploration with Application to Microrobotics: Label: en
  8. Robust Global Almost Sure Synchronization on a Circle via Stochastic Hybrid Control: Label: en
  9. Mean Square Limitations of Spatially Invariant Networked Systems: Label: en
  10. Arbitrated Network Control Systems: A Co-Design of Control and Platform for Cyber-Physical Systems: Label: en
  11. Robust Team-Triggered Coordination of Networked Cyberphysical Systems: Label: en
  12. Resilient Distributed Control of Multi-agent Cyber-Physical Systems: Label: en
  13. Optimal Control of Multi-agent Persistent Monitoring Systems with Performance Constraints: Label: en
  14. A Distributed Feedback Control Approach to the Optimal Reactive Power Flow Problem: Label: en
  15. Distributed Multiparty DC Power Flow Algorithm with Secure Exchange of Information: Label: en
  16. Towards the Unification of Locomotion and Manipulation through Control Lyapunov Functions and Quadratic Programs: Label: en
  17. Resilient Parameter-Invariant Control with Application to Vehicle Cruise Control: Label: en
  18. Parameter-Invariant Actuator Fault Diagnostics in Cyber-Physical Systems with Application to Building Automation: Label: en
  19. Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)