default search action
John Lygeros
- > Home > Persons > John Lygeros
Publications
- 2019
- [j86]Tobias Sutter, David Sutter, Peyman Mohajerin Esfahani, John Lygeros:
Generalized Maximum Entropy Estimation. J. Mach. Learn. Res. 20: 138:1-138:29 (2019) - 2018
- [j76]Peyman Mohajerin Esfahani, Tobias Sutter, Daniel Kuhn, John Lygeros:
From Infinite to Finite Programs: Explicit Error Bounds with Applications to Approximate Dynamic Programming. SIAM J. Optim. 28(3): 1968-1998 (2018) - 2017
- [j70]Angeliki Kamoutsi, Tobias Sutter, Peyman Mohajerin Esfahani, John Lygeros:
On Infinite Linear Programming and the Moment Approach to Deterministic Infinite Horizon Discounted Optimal Control Problems. IEEE Control. Syst. Lett. 1(1): 134-139 (2017) - [c171]Tobias Sutter, Angeliki Kamoutsi, Peyman Mohajerin Esfahani, John Lygeros:
Data-driven approximate dynamic programming: A linear programming approach. CDC 2017: 5174-5179 - [i40]Peyman Mohajerin Esfahani, Tobias Sutter, Daniel Kuhn, John Lygeros:
From Infinite to Finite Programs: Explicit Error Bounds with Applications to Approximate Dynamic Programming. CoRR abs/1701.06379 (2017) - [i36]Angeliki Kamoutsi, Tobias Sutter, Peyman Mohajerin Esfahani, John Lygeros:
On Infinite Linear Programming and the Moment Approach to Deterministic Infinite Horizon Discounted Optimal Control Problems. CoRR abs/1703.09005 (2017) - [i32]Tobias Sutter, David Sutter, Peyman Mohajerin Esfahani, John Lygeros:
Generalized maximum entropy estimation. CoRR abs/1708.07311 (2017) - 2016
- [j66]Peyman Mohajerin Esfahani, Debasish Chatterjee, John Lygeros:
The stochastic reach-avoid problem and set characterization for diffusions. Autom. 70: 43-56 (2016) - [j61]Peyman Mohajerin Esfahani, John Lygeros:
A Tractable Fault Detection and Isolation Approach for Nonlinear Systems With Probabilistic Performance. IEEE Trans. Autom. Control. 61(3): 633-647 (2016) - [j60]Peyman Mohajerin Esfahani, Debasish Chatterjee, John Lygeros:
Motion Planning for Continuous-Time Stochastic Processes: A Dynamic Programming Approach. IEEE Trans. Autom. Control. 61(8): 2155-2170 (2016) - 2015
- [j54]Peyman Mohajerin Esfahani, Tobias Sutter, John Lygeros:
Performance Bounds for the Scenario Approach and an Extension to a Class of Non-Convex Programs. IEEE Trans. Autom. Control. 60(1): 46-58 (2015) - [j50]Tobias Sutter, David Sutter, Peyman Mohajerin Esfahani, John Lygeros:
Efficient Approximation of Channel Capacities. IEEE Trans. Inf. Theory 61(4): 1649-1666 (2015) - 2014
- [j47]Majid Zamani, Peyman Mohajerin Esfahani, Rupak Majumdar, Alessandro Abate, John Lygeros:
Symbolic Control of Stochastic Systems via Approximately Bisimilar Finite Abstractions. IEEE Trans. Autom. Control. 59(12): 3135-3150 (2014) - [c137]Tobias Sutter, Peyman Mohajerin Esfahani, John Lygeros:
Approximation of constrained average cost Marks. CDC 2014: 6597-6602 - [c135]Flavio Heer, Peyman Mohajerin Esfahani, Maryam Kamgarpour, John Lygeros:
Model based power optimisation of wind farms. ECC 2014: 1145-1150 - [c132]David Sutter, Peyman Mohajerin Esfahani, Tobias Sutter, John Lygeros:
Efficient approximation of discrete memoryless channel capacities. ISIT 2014: 2904-2908 - [c131]Tobias Sutter, Peyman Mohajerin Esfahani, David Sutter, John Lygeros:
Capacity approximation of memoryless channels with countable output alphabets. ISIT 2014: 2909-2913 - [i17]Tobias Sutter, David Sutter, Peyman Mohajerin Esfahani, John Lygeros:
Efficient Approximation of Channel Capacities. CoRR abs/1407.7629 (2014) - [i16]Peyman Mohajerin Esfahani, John Lygeros:
A Tractable Fault Detection and Isolation Approach for Nonlinear Systems with Probabilistic Performance. CoRR abs/1408.1767 (2014) - 2013
- [c129]Bratislav Svetozarevic, Peyman Mohajerin Esfahani, Maryam Kamgarpour, John Lygeros:
A robust fault detection and isolation filter for a horizontal axis variable speed wind turbine. ACC 2013: 4453-4458 - [c128]Frauke Oldewurtel, David Sturzenegger, Peyman Mohajerin Esfahani, Göran Andersson, Manfred Morari, John Lygeros:
Adaptively constrained Stochastic Model Predictive Control for closed-loop constraint satisfaction. ACC 2013: 4674-4681 - [c127]Erasmia Evangelia Tiniou, Peyman Mohajerin Esfahani, John Lygeros:
Fault detection with discrete-time measurements: An application for the cyber security of power networks. CDC 2013: 194-199 - [c123]Majid Zamani, Peyman Mohajerin Esfahani, Rupak Majumdar, Alessandro Abate, John Lygeros:
Bisimilar finite abstractions of stochastic control systems. CDC 2013: 3926-3931 - [c111]Majid Zamani, Peyman Mohajerin Esfahani, Alessandro Abate, John Lygeros:
Symbolic models for stochastic control systems without stability assumptions. ECC 2013: 4257-4262 - [i11]Majid Zamani, Peyman Mohajerin Esfahani, Rupak Majumdar, Alessandro Abate, John Lygeros:
Symbolic control of stochastic systems via approximately bisimilar finite abstractions. CoRR abs/1302.3868 (2013) - [i8]Peyman Mohajerin Esfahani, Tobias Sutter, John Lygeros:
Performance Bounds for the Scenario Approach and an Extension to a Class of Non-convex Programs. CoRR abs/1307.0345 (2013) - 2012
- [c107]Tony A. Wood, Peyman Mohajerin Esfahani, John Lygeros:
Hybrid Modelling and Reachability on Autonomous RC-Cars. ADHS 2012: 430-435 - [c102]Peyman Mohajerin Esfahani, Maria Vrakopoulou, Göran Andersson, John Lygeros:
A tractable nonlinear fault detection and isolation technique with application to the cyber-physical security of power systems. CDC 2012: 3433-3438 - [c98]Göran Andersson, Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros, André Teixeira, György Dán, Henrik Sandberg, Karl Henrik Johansson:
Cyber-security of SCADA systems. ISGT 2012: 1-2 - [i6]Peyman Mohajerin Esfahani, Debasish Chatterjee, John Lygeros:
On Stochastic Reach-Avoid Problem and Set Characterization for Diffusions. CoRR abs/1202.4375 (2012) - [i5]Peyman Mohajerin Esfahani, Debasish Chatterjee, John Lygeros:
Motion Planning via Optimal Control for Stochastic Processes. CoRR abs/1211.1138 (2012) - 2011
- [c92]Peyman Mohajerin Esfahani, Debasish Chatterjee, John Lygeros:
On a problem of stochastic reach-avoid set characterization. CDC/ECC 2011: 7069-7074 - 2010
- [c89]Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros, Göran Andersson:
Cyber attack in a two-area power system: Impact identification using reachability. ACC 2010: 962-967 - [c83]Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros, Göran Andersson:
A robust policy for Automatic Generation Control cyber attack in two area power network. CDC 2010: 5973-5978
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 01:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint