We study the problem of characterizing the behavior of lossy and data corrupting communication channels in a networked control setting, where the channel\u27s behavior exhibits temporal correlation. We propose a behavior characterization mechanism based on a hidden Markov model (HMM). The use of a HMM in this regard presents multiple challenges including dealing with incomplete observation sequences (due to data losses and corruptions) and the lack of a priori information about the model complexity (number of states in the model). We address the first challenges by using the plant state information and history of received/applied control inputs to fill in the gaps in the observation sequences, and by enhancing the HMM learning algorithm to ...
In this paper, the theory of hidden Markov models (HMM) is applied to the problem of blind (without ...
In this paper, a novel data-driven approach to monitoring of systems operating under variable operat...
Abstract-Performance of real-time applications on end-toend packet channels are strongly related to ...
We study the problem of characterizing the behavior of lossy and data corrupting communication chann...
We study the problem of characterizing the behavior of lossy and data corrupting communication chann...
In this paper we perform the statistical analysis of an Internet communication channel. Our study is...
Performance of real-time applications on network communication channels is strongly related to loss...
Performance of real-time applications on network communication channels is strongly related to loss...
Recent control trends are increasingly relying on communication networks and wireless channels to cl...
In this paper, a novel data-driven approach to monitoring of systems operating under variable operat...
Models of human behaviors have been built using many different frameworks. In this paper, we make us...
Models of human behaviors have been built using many different frameworks. In this paper, we make us...
Part 3: ModelingInternational audienceThe use of hidden Markov models (HMMs) has found widespread us...
a b s t r a c t Modern society depends on the smooth functioning of critical infrastructures which p...
Part 3: ModelingInternational audienceThe use of hidden Markov models (HMMs) has found widespread us...
In this paper, the theory of hidden Markov models (HMM) is applied to the problem of blind (without ...
In this paper, a novel data-driven approach to monitoring of systems operating under variable operat...
Abstract-Performance of real-time applications on end-toend packet channels are strongly related to ...
We study the problem of characterizing the behavior of lossy and data corrupting communication chann...
We study the problem of characterizing the behavior of lossy and data corrupting communication chann...
In this paper we perform the statistical analysis of an Internet communication channel. Our study is...
Performance of real-time applications on network communication channels is strongly related to loss...
Performance of real-time applications on network communication channels is strongly related to loss...
Recent control trends are increasingly relying on communication networks and wireless channels to cl...
In this paper, a novel data-driven approach to monitoring of systems operating under variable operat...
Models of human behaviors have been built using many different frameworks. In this paper, we make us...
Models of human behaviors have been built using many different frameworks. In this paper, we make us...
Part 3: ModelingInternational audienceThe use of hidden Markov models (HMMs) has found widespread us...
a b s t r a c t Modern society depends on the smooth functioning of critical infrastructures which p...
Part 3: ModelingInternational audienceThe use of hidden Markov models (HMMs) has found widespread us...
In this paper, the theory of hidden Markov models (HMM) is applied to the problem of blind (without ...
In this paper, a novel data-driven approach to monitoring of systems operating under variable operat...
Abstract-Performance of real-time applications on end-toend packet channels are strongly related to ...