Grant number: MKF20130067 | Funding period: 2013 - 2016
Completed
F Farokhi, I Shames, MG Rabbat, M Johansson
2016-04-01
In this paper, we consider a scenario where an eavesdropper can read the content of messages transmitted over a network. The nodes..
A Teixeira, E Ghadimi, I Shames, H Sandberg, M Johansson
2016-01-15
This paper presents optimal parameter selection and preconditioning of the alternating direction method of multipliers (ADMM) algo..
DD Selvaratnam, I Shames, B Ristic, J MANTON
2016-01-01
This paper applies Posterior Cramer-Rao Bound theory to the SLAM problem to measure the information supplied by different sensor m..
AR Neshastehriz, M Cantoni, I Shames
2015-12-16
In this paper, a two step reparameterisation is proposed to reduce the computational cost of an online constraint tightening model..
T Summers, I Shames, J Lygeros, F Dorfler
2015-11-16
We consider a network topology design problem in which an initial undirected graph underlying the network is given and the objecti..
T Alpcan, I Shames
2015-11-01
Dual control aims to concurrently learn and control an unknown system. However, actively learning the system conflicts directly wi..
F Farokhi, I Shames, M Cantoni
2015-10-01
In this letter, the interplay between a class of nonlinear estimators and strategic sensors is studied in several participatory-se..
M Deghat, I Shames, BDO Anderson
2015-09-01
In this paper, we consider the problem of flocking and shape-orientation control of multi-agent systems with inter-agent and obsta..
I Shames, TH Summers
2015-07-01
We consider the problem of constructing networks that exhibit desirable algebraic rigidity properties, which can provide significa..
E Ghadimi, A Teixeira, I Shames, M Johansson
2015-03-01
The alternating direction method of multipliers (ADMM) has emerged as a powerful technique for large-scale structured optimization..
A Teixeira, I Shames, H Sandberg, KH Johansson
2015-01-01
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space defined by the ..
I Shames, TH Summers, F FAROKHI, RC Shekhar
In this paper, we use the rigidity theory to address two problems encountered in cooperative localization and mapping. First, we c..
F FAROKHI, H Sandberg, I Shames, M Cantoni
A game-theoretic model for analysing the effects of privacy on strategic communication between agents is devised. In the model, a ..
RC Shekhar, M Kearney, I Shames
This paper introduces a new formulation of model predictive control for robust trajectory guidance of unmanned aerial vehicles. It..
F FAROKHI, M Cantoni, I Shames
We consider load scheduling on constrained continuous-time linear dynamical systems, such as automated irrigation and other distri..
RC Shekhar, MP Kearney, I Shames, C Manzie
This paper presents a new robust path planning and execution methodology for constrained linear systems, using reachable sequences..
JO Swartling, I Shames, KH Johansson, DV Dimarogonas
2014-07-01
This paper considers the problem of localization and circumnavigation of a slowly drifting target with an unknown speed by a group..
I Shames, S Dasgupta, B Fidan, BDO Anderson
2014-03-26
Consider a stationary agent A at an unknown location and a mobile agent B that must move to the vicinity of and then circumnavigat..
I Shames, BDO Anderson, X Wang, B Fidan
In this paper we propose a method for enhancing synchronizability using convex optimization. This method is based on adding new ed..
R Soukieh, I Shames, B Fidan
This paper is concerned with obstacle avoidance of robots moving on a plane, based on a fluid mechanical principle known as the Ci..
This paper is on obstacle avoidance of swarms of robots moving in certain geometric planar formations. Focus is given to a particu..
I Shames, M CANTONI
2014-01-01
The ability to maintain state awareness in the face of unexpected and unmodeled errors and threats is a defining feature of a resi..
M Deghat, I Shames, BDO Anderson, C Yu
The problem of localization and circumnavigation of a slowly moving target with unknown speed has been considered. The agent only ..
I Shames, TH Summers, M CANTONI
M Zamani, I Shames, V Ugrinovskii
This paper presents a consensus algorithm for a multi-agent system where each agent has access to its imperfect own state and neig..
I Shames, T Summers
We consider the problem of selecting anchors for sensor network localization to optimize a metric of the error covariance of the p..
A NESHASTEHRIZ, M Cantoni, I Shames
In a water-level reference planning problem for automated irrigation channels, the object is to steer the system along trajectorie..
E Ghadimi, I Shames, M Johansson
2013-10-14
We develop multi-step gradient methods for network-constrained optimization of strongly convex functions with Lipschitz-continuous..