Calculated based on number of publications stored in Pure and citations from Scopus
20022022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    OpenFHE: Open-Source Fully Homomorphic Encryption Library

    Al Badawi, A., Bates, J., Bergamaschi, F., Cousins, D. B., Erabelli, S., Genise, N., Halevi, S., Hunt, H., Kim, A., Lee, Y., Liu, Z., Micciancio, D., Quah, I., Polyakov, Y., R.v, S., Rohloff, K., Saylor, J., Suponitsky, D., Triplett, M., Vaikuntanathan, V., & 1 othersZucca, V., Nov 7 2022, WAHC 2022 - Proceedings of the 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2022. Association for Computing Machinery, Inc, p. 53-63 11 p. (WAHC 2022 - Proceedings of the 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection

    Yakupoglu, C. & Rohloff, K., Aug 23 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery, 136. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography

    Brenner, M., Costache, A. & Rohloff, K., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3531-3532 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Encrypted-Input Obfuscation of Image Classifiers

    Di Crescenzo, G., Bahler, L., Coan, B. A., Rohloff, K., Cousins, D. B. & Polyakov, Y., 2021, Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Proceedings. Barker, K. & Ghazinour, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 136-156 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12840 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    Accelerating lattice based proxy re-encryption schemes on GPUs

    Sahu, G. & Rohloff, K., 2020, Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 613-632 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12579 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2019

    Homomorphic encryption for privacy-preserving genome sequences search

    Yamada, Y., Rohloff, K. & Oguchi, M., Jun 2019, Proceedings - 2019 IEEE International Conference on Smart Computing, SMARTCOMP 2019. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 8784009. (Proceedings - 2019 IEEE International Conference on Smart Computing, SMARTCOMP 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Ramparts: A programmer-friendly system for building homomorphic encryption applications

    Archer, D. W., Calderón Trilla, J. M., Dagit, J., Malozemoff, A. J., Polyakov, Y., Rohloff, K. & Ryan, G., Nov 11 2019, WAHC 2019 - Proceedings of the 7th ACM Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Association for Computing Machinery, p. 57-68 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Secure Proxy-Reencryption-Based Inter-Network Key Exchange

    Greenwald, L., Rohloff, K. & Stott, D., Jan 2 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 780-785 6 p. 8599794. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • WAHC'19: 7th workshop on encrypted computing & applied homomorphic cryptography

    Brenner, M., Lepoint, T. & Rohloff, K., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2703-2704 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Implementation and evaluation of improved Gaussian sampling for latice trapdoors

    Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W. & Savaş, E., Oct 15 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. Association for Computing Machinery, p. 61-71 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Implementing Conjunction Obfuscation under Entropic Ring LWE

    Cousins, D. B., Di Crescenzo, G., Gur, K. D., King, K., Polyakov, Y., Rohloff, K., Ryan, G. W. & Savas, E., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 354-371 18 p. 8418613. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership

    Di Crescenzo, G., Bahler, L., Coan, B., Rohloff, K. & Polyakov, Y., Sep 5 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1885-1890 6 p. 8456154. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • LID-Fingerprint: A Local Intrinsic Dimensionality-Based Fingerprinting Method

    Houle, M. E., Oria, V., Rohloff, K. R. & Wali, A. M., 2018, Similarity Search and Applications - 11th International Conference, SISAP 2018, Proceedings. Marchand-Maillet, S., Silva, Y. N. & Chávez, E. (eds.). Springer Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • WAHC’18: 6th workshop on encrypted computing and applied homomorphic cryptography

    Brenner, M. & Rohloff, K., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2183-2184 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    Practical implementation of lattice-based program obfuscators for point functions

    Bahler, L., Crescenzo, G. D., Polyakov, Y., Rohloff, K. & Cousins, D. B., Sep 12 2017, Proceedings - 2017 International Conference on High Performance Computing and Simulation, HPCS 2017. Smari, W. W. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 761-768 8 p. 8035154. (Proceedings - 2017 International Conference on High Performance Computing and Simulation, HPCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Workshop on multimedia privacy and security

    Hallman, R., Rohloff, K. & Chang, V., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2645-2646 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2016

    Practical implementations of program obfuscators for point functions

    Di Crescenzo, G., Bahler, L., Coan, B., Polyakov, Y., Rohloff, K. & Cousins, D. B., Sep 13 2016, 2016 International Conference on High Performance Computing and Simulation, HPCS 2016. Zeljkovic, V. & Smari, W. W. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 460-467 8 p. 7568371. (2016 International Conference on High Performance Computing and Simulation, HPCS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption

    Rohloff, K., Jan 4 2016, Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015. Zhang, T., Das, S. K., Zhang, T. & Qiu, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 48-53 6 p. 7371458. (Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure access delegation of encrypted medical information

    Deb Gupta, A., Polyakov, Y. & Rohloff, K., Jun 23 2016, 2016 10th International Symposium on Medical Information and Communication Technology, ISMICT 2016. IEEE Computer Society, 7498900. (International Symposium on Medical Information and Communication Technology, ISMICT; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Securely Sharing Encrypted Medical Information

    Gupta, A. D., Polyakov, Y., Rohloff, K. & Ryan, G., Aug 16 2016, Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016. Institute of Electrical and Electronics Engineers Inc., p. 330-331 2 p. 7545851

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • WAHC 2016: 4th workshop on encrypted computing and applied homomorphic cryptography

    Brenner, M. & Rohloff, K., 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer Verlag, p. IX-X (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    An end-to-end security architecture to collect, process and share wearable medical device data

    Rohloff, K. & Polyakov, Y., 2015, 2015 17th International Conference on E-Health Networking, Application and Services, HealthCom 2015. Institute of Electrical and Electronics Engineers Inc., p. 615-620 6 p. 7454578. (2015 17th International Conference on E-Health Networking, Application and Services, HealthCom 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • WAHC 2015: Third workshop on encrypted computing and applied homomorphic cryptography

    Brenner, M. & Rohloff, K., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Christin, N., Rohloff, K., Brenner, M., Christin, N., Brenner, M., Johnson, B., Johnson, B. & Rohloff, K. (eds.). Springer Verlag, p. VII (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    An FPGA co-processor implementation of Homomorphic Encryption

    Cousins, D. B., Golusky, J., Rohloff, K. & Sumorok, D., Feb 11 2014, 2014 IEEE High Performance Extreme Computing Conference, HPEC 2014. Institute of Electrical and Electronics Engineers Inc., 7040950. (2014 IEEE High Performance Extreme Computing Conference, HPEC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • A scalable implementation of fully homomorphic encryption built on NTRU

    Rohloff, K. & Cousins, D. B., 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 221-234 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • 2013

    GAMETE: General Adaptable Metric Execution Tool and Environment (WIP)

    Rohloff, K., Usbeck, K. & Loyall, J., May 3 2013, Proceedings of the 2013 Spring Simulation Multiconference, SpringSim 2013 - Symposium on Theory of Modeling and Simulation - DEVS Integrative M and S Symposium, DEVS 2013. 4 ed. p. 147-152 6 p. (Simulation Series; vol. 45, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SCIMITAR: Scalable stream-processing for sensor information brokering

    Rohloff, K., Cleveland, J., Loyall, J. & Blocher, T., 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 1856-1861 6 p. 6735895. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink

    Cousins, D. B., Rohloff, K., Peikert, C. & Schantz, R., 2012, 2012 IEEE Conference on High Performance Extreme Computing, HPEC 2012. 6408672. (2012 IEEE Conference on High Performance Extreme Computing, HPEC 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Bounded sensor failure tolerant supervisory control

    Rohloff, K., 2012, WODES 2012 - 11th International Workshop on Discrete Event Systems, Proceedings. 29 ed. IFAC Secretariat, p. 272-277 6 p. (IFAC Proceedings Volumes (IFAC-PapersOnline); vol. 45, no. 29).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • 2011

    An ontology for resource sharing

    Rohloff, K. & Loyall, J., Nov 21 2011, Proceedings - 5th IEEE International Conference on Semantic Computing, ICSC 2011. p. 530-537 8 p. 6061368. (Proceedings - 5th IEEE International Conference on Semantic Computing, ICSC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • A survey of security concepts for common operating environments

    Loyall, J., Rohloff, K., Pal, P. & Atighetchi, M., Jun 9 2011, Proceedings - 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, ISORCW 2011. p. 244-253 10 p. 5753534. (Proceedings - 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, ISORCW 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Clause-Iteration with MapReduce to scalably query data graphs in the SHARD graph-store

    Rohloff, K. & Schantz, R. E., 2011, DIDC'11 - Proceedings of the 4th International Workshop on Data-Intensive Distributed Computing. p. 35-44 10 p. (DIDC'11 - Proceedings of the 4th International Workshop on Data-Intensive Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Scopus citations
  • 2010

    High-performance, massively scalable distributed systems using the MapReduce software framework: The SHARD Triple-Store

    Rohloff, K. & Schantz, R. E., 2010, Workshop on Programming Support Innovations for Emerging Distributed Applications, PSI EtA - PsiH 2010. 3. (Workshop on Programming Support Innovations for Emerging Distributed Applications, PSI EtA - PsiH 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    132 Scopus citations
  • Managed mission assurance - Concept, methodology and runtime support

    Pal, P., Rohloff, K., Atighetchi, M. & Schantz, R., Nov 29 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 1159-1164 6 p. 5591913. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2009

    Computational methods to discover sets of patterns of behaviors that precede political events of interest

    Rohloff, K. & Asal, V., Nov 5 2009, Technosocial Predictive Analytics - Papers from the AAAI Spring Symposium. p. 126-129 4 p. (AAAI Spring Symposium - Technical Report; vol. SS-09-09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    An evaluation of triple-store technologies for large data stores

    Rohloff, K., Dean, M., Emmons, I., Ryder, D. & Sumner, J., 2007, On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops - OTM Confederated International Workshops and Posters AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerS. PART 2 ed. Springer Verlag, p. 1105-1114 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4806 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Scopus citations
  • High-assurance distributed, adaptive software for dynamic systems

    Rohloff, K., Loyall, J., Pal, P. & Schantz, R., Dec 1 2007, Proceedings - 10th IEEE International Symposium on High Assurance Systems Engineering, HASE 2007. p. 385-386 2 p. 4404768. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • High-level Dynamic Resource Management for Distributed, Real-Time Embedded systems

    Rohloff, K., Schantz, R. & Gabay, Y., Dec 1 2007, Summer Computer Simulation Conference 2007, SCSC'07, Part of the 2007 Summer Simulation Multiconference, SummerSim'07. Vol. 2. p. 749-756 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Scalable, adaptive, time-bounded node failure detection

    Gillen, M., Rohloff, K., Manghwani, P. & Schantz, R., Dec 1 2007, Proceedings - 10th IEEE International Symposium on High Assurance Systems Engineering, HASE 2007. p. 179-186 8 p. 4404740

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Scalable, distributed, dynamic resource management for the ARMS distributed real-time embedded system

    Rohloff, K., Gabay, Y., Ye, J. & Schantz, R., 2007, Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS 2007; Abstracts and CD-ROM. 4228076. (Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS 2007; Abstracts and CD-ROM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Software certification for distributed, adaptable medical systems: Position paper on challenges and paths forward

    Rohloff, K., Schantz, R., Pal, P. & Loyall, J., Dec 1 2007, Proceedings - 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability, HCMDSS/MDPnP 2007. p. 173-175 3 p. 4438185

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A discrete-event systems model for congestion control1

    Rohloff, K. R., Alpcan, T. & Başar, T., 2005, Proceedings of the 16th IFAC World Congress, IFAC 2005. IFAC Secretariat, p. 79-84 6 p. (IFAC Proceedings Volumes (IFAC-PapersOnline); vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Approximating minimal communicated event sets for decentralized supervisory control

    Rohloff, K. R. & Van Schuppen, J. H., 2005, Proceedings of the 16th IFAC World Congress, IFAC 2005. p. 151-156 6 p. (IFAC Proceedings Volumes (IFAC-PapersOnline); vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Sensor failure tolerant supervisory control

    Rohloff, K. R., Dec 1 2005, Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference, CDC-ECC '05. p. 3493-3498 6 p. 1582703. (Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference, CDC-ECC '05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Stochastic behavior of random constant scanning worms

    Rohloff, K. & Başar, T., Dec 1 2005, Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005. p. 339-344 6 p. 1523881. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Scopus citations
  • The detection of RCS worm epidemics

    Rohloff, K. & Başar, T., 2005, WORM'05 - Proceedings of the 2005 ACM Workshop on Rapid Malcode. Keromytis, A. D. (ed.). p. 81-86 6 p. (WORM'05 - Proceedings of the 2005 ACM Workshop on Rapid Malcode).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • The diagnosis of failures via the combination of distributed observations

    Rohloff, K. R., Dec 1 2005, Proceedings of the 20th IEEE International Symposium on Intelligent Control, ISIC '05 and the 13th Mediterranean Conference on Control and Automation, MED '05. p. 883-888 6 p. 1467131. (Proceedings of the 20th IEEE International Symposium on Intelligent Control, ISIC '05 and the 13th Mediterranean Conference on Control and Automation, MED '05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution