Special Sessions

2018 2018 IEEE Conference on Decision and Control (CDC)  
Building on the success of the past several events, the 2018 CDC will also feature the "Meet the Faculty Candidate" poster session. This poster session provides a great opportunity for faculty, search committee members, and recruiters to speak directly with current graduate students and postdoctoral researchers who are seeking faculty positions. Registered faculty candidates are invited to this poster session. Space will be available on a first-come first-serve basis. Presenters are asked to
more » ... ng a poster no larger than 4ft x 6ft along with pushpins to attach the poster. Presenters will likely be more successful providing high-level discussions of their work such as motivation, strategies, unique insights, rather than narrow mathematical detailed discussions, unless asked specifically for those details. Presenters are also encouraged to bring copies of their CV for distribution. Abstract: In this talk we will present an overview of research activities at MERL, including fundamental controls research and the application of state-of-the-art control techniques to a variety of products. We will focus on fundamental research topics including model predictive control and the control of constrained systems, estimation and motion planning for autonomous systems, and modeling of complex and nonlinear systems. In addition, we will describe how these fundamental research areas have impacted applications such as autonomous vehicles, energy-efficient HVAC systems, high-precision manufacturing, and communication spacecraft guidance and control. There will be six special sessions at the conference on the following topics: techniques. The workshop includes presentations from a diverse group of renowned and pioneer researchers in the field of PDE-based traffic flow control, covering both theoretical and practical aspects. In particular, state-ofthe-art control design methodologies for PDEs are presented, such as, for example, backstepping, Lyapunov-based methods, and methods originally developed for PDE-ODE interconnections, which are applied to traffic, addressing significant traffic flow control problems, such as, for example, mitigation of traffic waves and traffic congestion as well as travel time and fuel consumption minimization. We expect the audience to become acquainted with the state-of-the-art of the methodologies for control and estimation of distributed parameter systems as well as for traffic flow control. We also envision that the workshop is useful in promoting new collaborations, which may pave the way for the future advancements. Our goal is to attract both researchers interested in control of distributed parameter systems as well as researchers interested in control of traffic systems, including researchers from academia (at various seniority levels) and control practitioners from industry. Abstract: This workshop is being organized to celebrate Professor Sean Meyn's 60th birthday and honor his multiple long-lasting contributions in stochastic systems, Markov processes, networks, and control theory. This workshop brings together 13 of his colleagues who will present a broad range of contemporary topics in different areas of systems and control theory. One other main goal of this workshop is to inspire a future generation of researchers in this vibrant field. Abstract: Modern control systems are characterized by tight integration of cyber (computation and communication) components with physical systems. This paradigm is expected to transform critical sectors of society including energy, health care, and transportation. The integration of cyber systems, however, creates new entry points for cyber attacks, which degrade the availability of the physical system, disrupt the communication protocols needed for coordinated control, and compromise the safety and performance of physical components. Security of control systems poses an inherently multi-disciplinary research challenge. Network and systems security is needed to discover possible cyber vulnerabilities and develop secure protocols. The incentives, capabilities, and goals of adversary must be understood and modeled, through techniques including game theory. The control actions should be robust to the impact
doi:10.1109/cdc.2018.8619769 fatcat:r7taw5o5w5cavjnyigokr2h5hu