The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
We study a model of observational learning in social networks in the presence of uncertainty about agents' type distributions. Each individual receives a private noisy signal ...
Daron Acemoglu, Munther A. Dahleh, Asuman E. Ozdag...
Moment computation is essential to the analysis of stochastic kinetic models of biochemical reaction networks. It is often the case that the moment evolution, usually the first and...
This paper deals with hierarchical model predictive control (MPC) of distributed systems. A threelevel hierarchical approach is proposed, consisting of a high level MPC controller,...
Jan Dimon Bendtsen, Klaus Trangbaek, Jakob Stoustr...
The integration of renewable energy generation, such as wind power, into the electric grid is difficult because of the source intermittency and the large distance between generatio...
K. Mani Chandy, Steven H. Low, Ufuk Topcu, Huan Xu