Sciweavers

CDC
2015
IEEE
8 years 1 months ago
Distributed information gathering policies under temporal logic constraints
Abstract— In this work, we present an algorithm for synthesizing distributed control policies for networks of mobile robots such that they gather the maximum amount of informatio...
Kevin Leahy, Austin Jones, Mac Schwager, Calin Bel...
CDC
2015
IEEE
8 years 1 months ago
Unconstrained nonlinear MPC: Performance estimates for sampled-data systems with zero order hold
— In this paper, model predictive control (MPC) schemes without stabilizing terminal constraints and/or costs are considered for continuous time systems governed by ordinary diff...
Karl Worthmann, Marcus Reble, Lars Grüne, Fra...
CDC
2015
IEEE
8 years 1 months ago
Converse control-Lyapunov function theorems for continuous-time switched linear systems
Abstract— This paper studies switching stabilization problems for continuous-time switched linear systems (SLSs). We consider the most general switching stabilizability defined ...
Yueyun Lu, Wei Zhang
CDC
2015
IEEE
8 years 1 months ago
Single photon inverting pulse for an atom in a cavity
— This paper considers the model where a two-level atom is placed in an open cavity. We show that the atom-cavity system can be taken as a linear quantum system under the driving...
Yu Pan, Guofeng Zhang, Wei Cui, Matthew R. James
CDC
2015
IEEE
8 years 1 months ago
Fast-convergent learning-aided control in energy harvesting networks
— In this paper, we present a novel learning-aided energy management scheme (LEM) for multihop energy harvesting networks. Different from prior works on this problem, our algorit...
Longbo Huang
CCS
2015
ACM
8 years 1 months ago
Hybrid User-level Sandboxing of Third-party Android Apps
Users of Android phones increasingly entrust personal information to third-party apps. However, recent studies reveal that many apps, even benign ones, could leak sensitive inform...
Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian ...
CCS
2015
ACM
8 years 1 months ago
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic “fairy-ring dance” construction that transforms any secure two-party...
Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahan...
CCS
2015
ACM
8 years 1 months ago
Adaptive Just-In-Time Code Diversification
We present a method to regenerate diversified code dynamically in a Java bytecode JIT compiler, and to update the diversification frequently during the execution of the program. T...
Abhinav Jangda, Mohit Mishra, Bjorn De Sutter
CCS
2015
ACM
8 years 1 months ago
Constant Communication ORAM with Small Blocksize
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, w...
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
CCS
2015
ACM
8 years 1 months ago
POSTER: Computations on Encrypted Data in the Internet of Things Applications
We identify and address two primary challenges for computing on encrypted data in Internet of Things applications: synchronizing encrypted data across devices and selecting an app...
Laurynas Riliskis, Hossein Shafagh, Philip Levis