Securing multiagent systems against a sequence of intruder attacks
暂无分享,去创建一个
[1] JH van Vuuren,et al. Infinite Order Domination in Graphs , 2003 .
[2] Michael P. Baldado. Eternal 1-Security Number of the Corona and Cartesian Product of Graphs , 2011 .
[3] Lynne E. Parker,et al. Cooperative Robotics for Multi-Target Observation , 1999, Intell. Autom. Soft Comput..
[4] Jason I. Brown,et al. Independence polynomials of circulants with an application to music , 2009, Discret. Math..
[5] Camillo J. Taylor,et al. Dynamic Sensor Planning and Control for Optimally Tracking Targets , 2003, Int. J. Robotics Res..
[6] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[7] David A. Anisi,et al. Cooperative Minimum Time Surveillance With Multiple Ground Vehicles , 2010, IEEE Transactions on Automatic Control.
[8] F. Bullo,et al. Distributed deployment of asynchronous guards in art galleries , 2006, 2006 American Control Conference.
[9] Antonio Bicchi,et al. Dynamic distributed intrusion detection for secure multi-robot systems , 2009, 2009 IEEE International Conference on Robotics and Automation.
[10] Peter J. Slater,et al. Fundamentals of domination in graphs , 1998, Pure and applied mathematics.
[11] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[12] Antonio Bicchi,et al. Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.
[13] Dimitrios M. Thilikos,et al. An annotated bibliography on guaranteed graph searching , 2008, Theor. Comput. Sci..
[14] Joanna Raczek. Distance paired domination numbers of graphs , 2008, Discret. Math..
[15] H. Fleischner. The square of every two-connected graph is Hamiltonian , 1974 .
[16] Lynne E. Parker,et al. Cooperative multi-robot observation of multiple moving targets , 1997, Proceedings of International Conference on Robotics and Automation.
[17] Antonio Bicchi,et al. Decentralized intrusion detection for secure cooperative multi-agent systems , 2007, 2007 46th IEEE Conference on Decision and Control.
[18] J. Gross,et al. Graph Theory and Its Applications , 1998 .