Skip to main content

Showing 1–3 of 3 results for author: Garin, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:1912.10330  [pdf, other

    eess.SY cs.SI math.OC

    Graphon-based sensitivity analysis of SIS epidemics

    Authors: Renato Vizuete, Paolo Frasca, Federica Garin

    Abstract: In this work, we use the spectral properties of graphons to study stability and sensitivity to noise of deterministic SIS epidemics over large networks. We consider the presence of additive noise in a linearized SIS model and we derive a noise index to quantify the deviation from the disease-free state due to noise. For finite networks, we show that the index depends on the adjacency eigenvalues o… ▽ More

    Submitted 30 January, 2020; v1 submitted 21 December, 2019; originally announced December 2019.

    Comments: 6 pages, to appear in IEEE Control Systems Letters

  2. arXiv:1404.7711  [pdf, ps, other

    math.OC cs.MA

    Optimal one-dimensional coverage by unreliable sensors

    Authors: Paolo Frasca, Federica Garin, Balazs Gerencser, Julien M. Hendrickx

    Abstract: This paper regards the problem of optimally placing unreliable sensors in a one-dimensional environment. We assume that sensors can fail with a certain probability and we minimize the expected maximum distance from any point in the environment to the closest active sensor. We provide a computational method to find the optimal placement and we estimate the relative quality of equispaced and random… ▽ More

    Submitted 14 November, 2014; v1 submitted 30 April, 2014; originally announced April 2014.

    Comments: 21 pages 2 figures

    MSC Class: 60K30; 90B18; 68M10; 49N99; 68R01

  3. arXiv:1309.3151  [pdf, ps, other

    math.OC cs.DC eess.SY math.DS

    Distributed privacy-preserving network size computation: A system-identification based method

    Authors: Federica Garin, Ye Yuan

    Abstract: In this study, we propose an algorithm for computing the network size of communicating agents. The algorithm is distributed: a) it does not require a leader selection; b) it only requires local exchange of information, and; c) its design can be implemented using local information only, without any global information about the network. It is privacy-preserving, namely it does not require to propaga… ▽ More

    Submitted 10 September, 2013; originally announced September 2013.

    Comments: 52nd IEEE Conference on Decision and Control (CDC 2013) (2013)