Search

Your search keyword '"Poovendran, Radha"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Poovendran, Radha" Remove constraint Author: "Poovendran, Radha"
25 results on '"Poovendran, Radha"'

Search Results

1. E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels.

2. Detection of mobile targets on the plane and in space using heterogeneous sensor networks.

3. Disenrollment With Perfect Forward Secrecy in Threshold Schemes.

4. Protecting patient privacy against unauthorized release of medical images in a group communication environment

5. An Information-Theoretic Approach for Design and Analysis of Rooted-Tree-Based Multicast Key Management Schemes.

6. Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments.

7. Securing low-cost RFID systems: An unconditionally secure approach.

8. The power of primes: security of authentication based on a universal hash-function family.

9. Group Event Detection With a Varying Number of Group Members for Video Surveillance.

10. Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance.

11. A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.

12. Secure Control in Partially Observable Environments to Satisfy LTL Specifications.

13. A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.

14. On the Structure and Computation of Random Walk Times in Finite Graphs.

15. Controlled Islanding via Weak Submodularity.

16. Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.

17. Submodular Optimization for Voltage Control.

18. Minimal Input and Output Selection for Stability of Systems With Uncertainties.

19. INPUT SELECTION FOR PERFORMANCE AND CONTROLLABILITY OF STRUCTURED LINEAR DESCRIPTOR SYSTEMS.

20. Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.

21. Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.

22. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.

23. Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.

24. Security in cognitive radio networks [Guest Editorial].

25. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.

Catalog

Books, media, physical & digital resources