Decentralized multi-vehicle path coordination under communication constraints." In Intelligent Robots and Systems (IROS), 2011 IEEE/RSJ International Conference on, 2306-2313., 2011."
Multi-vehicle path coordination under communication constraints." In Proceedings of the American Control Conference, 650-656., 2008."
Mathematical programming for multi-vehicle motion planning under communication constraints. Drexel University, 2011.
Mathematical programming for Multi-Vehicle Motion Planning problems." In Robotics and Automation (ICRA), 2012 IEEE International Conference on, 3315-3322., 2012."
Multi-vehicle path coordination in support of communication." In Robotics and Automation, 2009. ICRA '09. IEEE International Conference on, 3237-3244., 2009."
Symbolic Scientific Software Skills for Engineering Students." In Transforming Engineering Education: Creating Interdisciplinary Skills for Complex Global Environments, 2010 IEEE, 1-26., 2010."
Pulse oximeter signal modeling and fusion for hypoxia monitoring." In Information Fusion (FUSION), 2014 17th International Conference on, 1-8., 2014."
Evidence combination for hard and soft sensor data fusion." In Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, 1-8., 2011."
Representation and fusion of Conditionally Refined opinions using evidence trees." In Information Fusion (FUSION), 2012 15th International Conference on, 939-946., 2012."
Distributed decision fusion using the Neyman-Pearson criterion." In Information Fusion (FUSION), 2014 17th International Conference on, 1-7., 2014."
User authentication through biometric sensors and decision fusion." In Information Sciences and Systems (CISS), 2013 47th Annual Conference on, 1-6., 2013."
Identifying regions of difference in flow cytometric data. Drexel University, 2005.
Identifying regions of difference in flow cytometric data. Drexel University, 2006.
Secure email system for Microsoft Outlook and Eudora. Drexel University, 2002.
Computational complexity of linear-programming based design for the hopefield neural network. Drexel University, 1992.
Adaptive control algorithm for networked multimedia applications." In Information Sciences and Systems (CISS), 2013 47th Annual Conference on, 1-5., 2013."
User revocation in secure groups. Drexel University, 2004.
Demonstration of the secure wireless agent testbed (SWAT)." In Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004. Proceedings of the Third International Joint Conference on, 1214-1215. Washington, DC, USA: IEEE Computer Society, 2004."
Bit-error-rate and capacity estimation in wireless networks. Drexel University, 2011.
A secure wireless agent-based testbed." In Information Assurance Workshop, 2004. Proceedings. Second IEEE International, 19-32., 2004."
Adaptive Control for Networked Multimedia Applications." In Proceedings of the 47th Annual Conference on Information Sciences and Systems., 2012."
Distributed detection with memory In American Control Conference, 1993. Drexel University, 1993.
Engineering multi-agent systems." In Multi-Agent Security and Survivability, 2004 IEEE First Symposium on, 100-107., 2004."
Distributed decision-making with learning threshold elements." In Decision and Control, 1988., Proceedings of the 27th IEEE Conference on, 804-805 vol.1., 1988."
Distributed detection using the memoryless grouped data sequential test. Drexel University, 1998.
Optimal Updating Time Using Theory of Reliability." In Parallel and Distributed Systems, 2008. ICPADS '08. 14th IEEE International Conference on., 2008."
Secure electronic mail. Drexel University, 2001.
Access revocation and prevention of false repudiation in secure email exchanges." In Autonomous Decentralized Systems, 2001. Proceedings. 5th International Symposium on, 419-425., 2001."
Failure Detection and Isolation for Condition-Based Maintenance. Drexel University, 1997.
Fusion Techniques Using Distributed Kalman Filtering for Detecting Changes in Systems." In American Control Conference, 1991, 2296-2298., 1991."
Application of Adaptive OFDM Bit Loading for High Data Rate Through-Metal Communication." In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 1-5., 2011."
Bit-Loaded PAPR Reduction for High-Data-Rate Through-Metal Control Network Applications." Industrial Electronics, IEEE Transactions on 61 (2014): 2362-2369."
Centralized data acquisition and automation for a control laboratory with application to DC motor experiments. Drexel University, 1991.
Primal-Dual Characterizations of Jointly Optimal Transmission Rate and Scheme for Distributed Sources." In Data Compression Conf. (DCC)., 2014."
Distributed Scalar Quantizers for Subband Allocation." In Conf. Information Sciences and Systems (CISS)., 2014."
Channel Dependent Adaptive Modulation and Coding without Channel State Information at the Transmitter [Poster]." In 38th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)., 2013."
Channel Dependent Adaptive Modulation and Coding Without Channel State Information at the Transmitter." In IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)., 2013."
The case for technology in developing regions." Computer 38 (2005): 25-38."
A Pressure Controlled, Hand-Assistive Exoskeleton for Actuated Pinch and Grasp." In Trenton Computer Festival, IEEE GOLD Region 9 Paper Competition, 1-4., 2009."
Performance of probability transformations using simulated human opinions." In Information Fusion (FUSION), 2014 17th International Conference on, 1-8., 2014."
A two-bit binary control system for an orthotic, hand-assistive exoskeleton." In 35th North Eastern Biomedical Engineering Conference, 1-2., 2009."
Assessing the Performance of Data Fusion Algorithms Using Human Response Models. Drexel University, 2015.
Performance of M-ary soft fusion systems using simulated human responses." In Information Fusion (FUSION), 2014 17th International Conference on, 1-8., 2014."
Subjective confidence and source reliability in soft data fusion." In Information Sciences and Systems (CISS), 2014 48th Annual Conference on, 1-6., 2014."
Simulating human decision making for testing soft and hard/soft fusion algorithms." In Information Sciences and Systems (CISS), 2013 47th Annual Conference on, 1-6., 2013."
A guide to the design and implementation of the ATR 6000 Mobile Robot. Drexel University, 1995.
System Call-based Detection of Malicious Processes." In International conference on quality, reliability, and security. IEEE, 2015."
Inoculation against malware infection using kernel-level software sensors." In Proceedings of the 8th ACM international conference on Autonomic computing, 101-110. ICAC '11. New York, NY, USA: ACM, 2011."
A survey of reverse engineering tools for the 32-bit Microsoft Windows environment." Unpublished (2005)."
Multi-Channel Change-Point Malware Detection." In Seventh International Conference on Sofware Security and Reliability (SERE 2013), 70-79., 2013."
Toward an Automatic, Online Behavioral Malware Classification System." In Seventh IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO)., 2013."
Detection and Classification of Malicious Processes Using System Call Analysis. Drexel University, 2015.
Using an Emulation Testbed to Measure OSPF Routing Overhead due to Mobility in Wireless Ad Hoc Networks." In Military Communications Conference, 2008. MILCOM 2008. IEEE., 2008."
Speaker identification using higher order statistics. Drexel University, 1997.
Distributed Detection with Memory." In Proceedings of the American Control Conference, 161-165., 1993."
Systems of Random Iterative Continuous Mappings with a Common Fixed Point. Drexel University, 1989.
Asynchronous distributed detection." Aerospace and Electronic Systems, IEEE Transactions on 30 (1994): 818-826."
A Class Of Distributed Multi-sensor Systems." In OCEANS '92. Mastering the Oceans Through Technology. Proceedings., 218-223. Vol. 1., 1992."
Distributed detection with limited computational resources. Drexel University, 1992.
Asynchronous distributed detection." In Decision and Control, 1992., Proceedings of the 31st IEEE Conference on, 3498-3503 vol.4., 1992."
Optimal Sliding-Window Detector for Disruptions in Random Sequences." In American Control Conference, 1992, 2121-2122., 1992."
Pharmacokinetic and pharmacodynamic modeling of erythropoiesis stimulating agents in rats. Drexel University, 2010.
The credibilistic fuzzy c means clustering algorithm." In Systems, Man, and Cybernetics, 1998. 1998 IEEE International Conference on, 2034-2039 vol.2. Vol. 2., 1998."
A noise-resistant fuzzy c means algorithm for clustering." In Fuzzy Systems Proceedings, 1998. IEEE World Congress on Computational Intelligence., The 1998 IEEE International Conference on, 1458-1463 vol.2. Vol. 2., 1998."
Design of a decision fusion rule for power system security assessment." Power Systems, IEEE Transactions on 8 (1993): 858-864."
An improved Hopfield model for power system contingency classification." In Circuits and Systems, 1990., IEEE International Symposium on, 2925-2928 vol.4., 1990."
Simulation of waveform interactions for interference analysis of military networks." In Military Communications Conference, 2009. MILCOM 2009. IEEE, 1-7., 2009."
Designing dependable agent systems for mobile wireless networks." Intelligent Systems, IEEE 19 (2004): 39-45."
Partitioning a sample using binary-type questions with ternary feedback." Systems, Man and Cybernetics, IEEE Transactions on 25 (1995): 1405-1408."
Short-term optimization for traffic control in multiaccess communications. Drexel University, 1994.
Robot motion planning on N-dimensional star worlds among moving obstacles." Robotics and Automation, IEEE Transactions on 14 (1998): 320-325."
On the moving-obstacle path-planning algorithm of Shih, Lee, and Gruver." Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 27 (1997): 136-138."
Blind equalization in digital communications over fading channels. Drexel University, 1992.
How to Compute a Path Through a Field of Obstacles Efficiently (and how not to). Drexel University, 1995.
A counterexample to the Alexopoulos-Griffin path planning algorithm." Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 27 (1997): 721-723."
On the controllability and observability of intelligent infrastructure systems." In American Control Conference, 2000. Proceedings of the 2000, 24-28 vol.1. Vol. 1., 2000."
Accelerated convergence of the error back-propagation training algorithm using univariate search. Drexel University, 1991.
Facsimile intrusion systems over IP networks. Drexel University, 2008.
Proficiency tests for forensic document examiners. Drexel University, 2006.
Determination of an interior point of a convex set in Rn. Drexel University, 1994.
Deployment and replenishment of sensors in wireless monitoring networks. Drexel University, 2009.
Non-uniform deployment of nodes in clustered wireless sensor networks." In Information Sciences and Systems, 2009. CISS 2009. 43rd Annual Conference on, 823-828., 2009."
Robust Deployment and Control of Sensors in Wireless Monitoring Networks. Drexel University, 2014.
Optimal deployment and replenishment of monitoring wireless sensor networks." In MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, 136-141., 2010."
Self-Adaptive Dissemination of Data in Dynamic Sensor Networks." In Self-Adaptive and Self-Organizing Systems, 2008. SASO '08. Second IEEE International Conference on, 380-389., 2008."
System for Controlled Testing of Sensor Networks." In 44th Annual Conference on Information Sciences and Systems (CISS), 2010., 2010."
Landmark navigation for an autonomous mobile robot. Drexel University, 1996.
Algorithms for stereo vision. Drexel University, 1996.
Applying the Hungarian method to stereo matching." In Decision and Control, 1997., Proceedings of the 36th IEEE Conference on, 1928-1933 vol.2. Vol. 2., 1997."
Matching in dynamic stereo image sequences. Drexel University, 1999.
On the design of decision support system for power system operation using sensor fusion techniques." In Decision and Control, 1990., Proceedings of the 29th IEEE Conference on, 3073-3074 vol.6., 1990."
Screening power system contingencies using a back-propagation trained multiperceptron." In Circuits and Systems, 1989., IEEE International Symposium on, 486-489 vol.1., 1989."
Crawling and rolling gaits for a coupled-mobility snake robot." In Advanced Robotics (ICAR), 2011 15th International Conference on, 556-562., 2011."
Observations on Sum User Rate for Cellular Downlink." In The 8th International ICST Conference on Cognitive Radio Oriented Wireless Networks., 2013."
Visualization of Resource Allocation in Large-scale Mobile Ad Hoc Networks." In Proceedings of the 3rd International Conference on Advances in Visual Computing - Volume Part I. Berlin, Heidelberg: Springer-Verlag, 2007."
Distributed Path Planning for Connectivity Under Uncertainty by Ant Colony Optimization." In Proceedings of the American Control Conference, 1952-1958., 2008."
Robust optimal power control for ad hoc networks." In Information Sciences and Systems, 2006 40th Annual Conference on, 729-733., 2006."
Path Planning for Network Performance." In Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE, 1258-1262., 2007."
Decision Fusion for Multi-Modal Active Authentication." IT Professional (2013): 29-33."
Decision Fusion for Multimodal Active Authentication." IT Professional 15 (2013): 29-33."