Linda Bushnell

Learn More
Gregory C. Walsh and Hong Ye and Linda Bushnell1 Department of Mechanical Engineering University of Maryland at College Park, MD 20742 gwalsh@eng.umd.edu, hongye@eng.umd.edu Abstract In this paper we introduce a novel control network protocol, Try-Once-Discard (TOD), for networked control systems (NCS), and provide, for the rst time, an analytic proof of(More)
– The deÞning characteristic of a networked control system (NCS) is having a feedback loop that passes through a local area computer network. Our two-step design approach includes using standard control methodologies and choosing the network protocol and bandwidth in order to ensure important closed-loop properties are preserved when a computer network is(More)
In this paper we develop and analyze spiking neural network (SNN) versions of resilient propagation (RProp) and QuickProp, both training methods used to speed up training in artificial neural networks (ANNs) by making certain assumptions about the data and the error surface. Modifications are made to both algorithms to adapt them to SNNs. Results generated(More)
In many applications of multi-agent systems (MAS), a set of leader agents acts as control inputs to the remaining follower agents. In this paper, we introduce an analytical approach to selecting leader agents in order to minimize the total mean-square error of the follower agent states from their desired value in steady-state in the presence of noisy(More)
The title of this special section updates a common juxtaposition in control circles. The scale of applications of interest is no longer captured simply by “systems and control”; it is increasingly the networked nature of systems that is drawing attention. This special section presents five articles that can be classified into two distinct areas of “networks(More)
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned node detection and revocation of compromised nodes. By combining probabilistic analysis of logical key graphs and linear control theory, we derive a dynamical model that(More)
A networked control system is characterized by having a feedback loop closed through a local area network. This paper considers methods for scheduling the use of the network to guarantee both stability and controller performance. We propose and validate algorithms for choosing message identiÞers for dynamically scheduled networked control systems. Two(More)