1. Characterizing heterogeneity in cooperative networks from a resource distribution view-point
2. W. Abbas , M. Egerstedt , C.-H. Liu , R. Thomas , and P. Whalen . Deploying robots with two sensors in k_ 1, 6-free graphs. arXiv preprint arXiv:1308.5450 , 2014 . W. Abbas, M. Egerstedt, C.-H. Liu, R. Thomas, and P. Whalen. Deploying robots with two sensors in k_ 1, 6-free graphs. arXiv preprint arXiv:1308.5450, 2014.
3. M. Abrams and J. Weiss. Malicious control system cyber security attack case study -- Maroochy Water Services Australia. http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf Jul 2008. M. Abrams and J. Weiss. Malicious control system cyber security attack case study -- Maroochy Water Services Australia. http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf Jul 2008.
4. N. Ahn and S. Park . A new mathematical formulation and a heuristic for the maximum disjoint set covers problem to improve the lifetime of the wireless sensor network. Ad Hoc & Sensor Wireless Networks, 13(3--4):209--225 , 2011 . N. Ahn and S. Park. A new mathematical formulation and a heuristic for the maximum disjoint set covers problem to improve the lifetime of the wireless sensor network. Ad Hoc & Sensor Wireless Networks, 13(3--4):209--225, 2011.
5. G. Arslan , J. R. Marden , and J. S. Shamma . Autonomous vehicle-target assignment: A game-theoretical formulation. Journal of Dynamic Systems, Measurement, and Control, 129(5):584--596 , 2007 . G. Arslan, J. R. Marden, and J. S. Shamma. Autonomous vehicle-target assignment: A game-theoretical formulation. Journal of Dynamic Systems, Measurement, and Control, 129(5):584--596, 2007.