Abstract— In this work, we present an algorithm for synthesizing distributed control policies for networks of mobile robots such that they gather the maximum amount of informatio...
Kevin Leahy, Austin Jones, Mac Schwager, Calin Bel...
— In this paper, model predictive control (MPC) schemes without stabilizing terminal constraints and/or costs are considered for continuous time systems governed by ordinary diff...
Abstract— This paper studies switching stabilization problems for continuous-time switched linear systems (SLSs). We consider the most general switching stabilizability defined ...
— This paper considers the model where a two-level atom is placed in an open cavity. We show that the atom-cavity system can be taken as a linear quantum system under the driving...
— In this paper, we present a novel learning-aided energy management scheme (LEM) for multihop energy harvesting networks. Different from prior works on this problem, our algorit...
Users of Android phones increasingly entrust personal information to third-party apps. However, recent studies reveal that many apps, even benign ones, could leak sensitive inform...
Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian ...
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic “fairy-ring dance” construction that transforms any secure two-party...
We present a method to regenerate diversified code dynamically in a Java bytecode JIT compiler, and to update the diversification frequently during the execution of the program. T...
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, w...
We identify and address two primary challenges for computing on encrypted data in Internet of Things applications: synchronizing encrypted data across devices and selecting an app...