Professional Documents
Culture Documents
9, SEPTEMBER 2012
Abstract—The paper characterizes the invariant filtering mea- a much weaker condition than moment stability, and, as shown
sures resulting from Kalman filtering with intermittent observa- in [2], convergence to a unique attracting invariant distribution
tions in which the observation arrival is modeled as a Bernoulli is possible under a packet arrival probability for which sta-
process with packet arrival probability . Our prior work showed
that, for 0, the sequence of random conditional error co- bility in mean does not hold. Moreover, it was shown that for
variance matrices converges weakly to a unique invariant distri- observable and controllable systems , and, hence,
bution . This paper shows that, as approaches one, the family exists and is unique for every for such systems.1 Further,
0 satisfies a moderate deviations principle with good rate [2] provides a sample-path analysis of the RRE, in contrast
function ( ): 1) as 1, the family converges weakly to to moment stability analysis, as is done conventionally in the
the Dirac measure concentrated on the fixed point of the asso- literature (e.g., [3]–[11], see also [2] for a detailed review of
ciated discrete time Riccati operator; 2) the probability of a rare
event (an event bounded away from ) under decays to zero
the literature.) Finally, apart from its relevance to the area of
as a power law of (1 ) as 1; and, 3) the best power law networked control systems, our study is intimately connected
decay exponent is obtained by solving a deterministic variational to the design and analysis of robust and risk-sensitive linear
problem involving the rate function ( ). For specific scenarios, the filtering approaches (e.g., [12], [13], and [14], in the context
paper develops computationally tractable methods that lead to ef- of missing measurement data,) and more generally to pathwise
ficient estimates of rare event probabilities under . stability results in robust filtering (e.g., [15]–[17]).
Index Terms—Intermittent observations, Kalman filtering, mod- This paper characterizes the invariant measures in the non-
erate deviation principle (MDP), random Riccati equation (RRE). classical information case, the counterpart of the fixed point
of the Riccati equation in the classical case. For observable and
controllable systems, we establish as :
I. INTRODUCTION 1) Moderate deviation principle (MDP). For , let
be the unique attracting measure of the ergodic conditional
Background and Motivation: error covariance process (Theorem 9 in [2]). We show that,
OTIVATED by problems in networked sensing and as , satisfies an MDP with good rate func-
M control, Kalman filtering with non-classical informa-
tion patterns has received renewed attention. Networked control
tion and converges weakly to the Dirac measure
where is the unique fixed point of the associated de-
,
the probability measures induced on the space of random func- be an extended valued lower semicontinuous function and
tion compositions (strings) and develops their topological prop- be non-decreasing on (0, 1) with
erties. Several intermediate results are of independent interest
and are applicable to the analysis of more complex networked
control systems (e.g., [21]) and hybrid or switched systems.
We summarize the paper. The next paragraph presents nota- Definition 1.1: The family is said to satisfy a moderate
tion and preliminaries. Section II sets up the problem and re- deviations principle (MDP) with MDP rate function at scale
views briefly prior work. Key approximation results are in Sec- as if the following hold for each open set
tion III, whereas the main results are stated and discussed in and closed set , respectively:
Section IV. The MDP for finite dimensional distributions of
(2)
the RRE sequence is in Section V, whereas Sections VI and
VII carry out the steps to obtain the main results on MDP for
stationary distributions. Section VIII presents efficient ways to (3)
solve the variational problems involving the rate function. Nu-
merical studies justifying theoretical results for a scalar system Lower semicontinuity implies that the level sets of ,
are presented in Section IX. Section X concludes the paper. , are closed . If the level sets are also
Notation and Preliminaries: Denote by: , the reals; , compact , is said to be a good rate function. It can be
the non-negative reals; , the -dimensional Euclidean shown that, for every measurable set , the MDP, as stated in
space; , the identity matrix of appropriate dimension; , (2) and (3), is equivalent to
the integers; , the non-negative integers; , the natural
numbers; and , a generic space. For a subset ,
is the indicator function, which is 1 when
the argument is in and zero otherwise; and is the identity (4)
function on . A metric space with metric is denoted
by the pair . The corresponding Borel algebra is de- The above MDP notion is similar to that of the large deviations
noted by . For a set , we denote by and its principle (LDP). In fact, if the scale function is polynomial
interior and closure respectively. For , the open ball of in , is said to satisfy an LDP (e.g., [18], [23]).
radius centered at is denoted by . For any set Definition 1.2 (Rare Event): A set is said to be a
, the open and closed -neighborhoods of are given by rare event with respect to the family , if .
and , respectively. The To see the implications of an MDP on the probabilities of a
space of symmetric matrices is denoted by , whereas rare event, assume that is an -continuity set, i.e.,
and denote the subsets of positive semidefinite and . Then the limit in (4) exists and we have
positive definite matrices, respectively. For , we
write to denote ; to (5)
denote and ; to denote
. where denotes a functional of that decays to zero as .
Limit Notations: Let be measurable. The We will use the following as a short form of (5):
notation implies that for (6)
every sequence in with and
, we have . If is a rare event, by the lower bound in (5), , en-
Probability Measures on Metric Spaces: Let be a suring that the probabilities decay to zero. In turn, by the upper
complete separable metric space and the set of probability bound in (5), as long as an MDP holds in the sense of Defini-
measures on . For tion 1.1, the probability of a rare event not only goes to zero, but
does so exponentially at scale , with being the
best exponent (or rate) of decay.
The m.m.s.e. predictor of given is given where and correspond to the Lyapunov and Riccati up-
by the Kalman filter with the conditional prediction error co- dates in (7) and (8). The length of a string is denoted by
variances, , given by the algebraic Riccati equation. . The set of all possible strings is denoted by .
Under controllability of and observability of , Remark 3.1: A string can be of length 0, then it is repre-
the deterministic converges to the unique fixed point sented as a 1-tuple, consisting only of the initial condition.
of the algebraic Riccati equation for all . We introduce notation. Let
With intermittent observations, packets are dropped and the and for , , such that, for all
estimator receives observations at random times. In [1], the , , . Let be a string of length
channel randomness is modeled by a sequence of i.i.d.
Bernoulli random variables with mean (the arrival proba-
bility), where corresponds to arrival of the packet at
time to the estimator and to a packet drop. Let the pair
. Under the TCP packet acknowledgement For brevity, we will write as
protocol in [1] (the estimator knows whether packets arrived or
not), the m.m.s.e. predictor of may be implemented through
a modified Kalman filter [1] in which , updated by RRE
e.g, the string is .
Definition 3.2 (Numerical Value of a String): To every string
we associate its numerical value, , the numerical eval-
uation of the function composition2 on the initial state , i.e.,
for
Let the Lyapunov and Riccati operators and be
(7)
(8) Thus, the numerical value can be viewed as a function
from the space of strings to . Denote the set of numerical
These operators are defined on . We then have for all values attainable by
Note the difference between a string and its numerical value.
Two strings are equal iff they are of the same order of function
composition applied to the same initial state.
Unlike the classical case, for each , is now random
Definition 3.3 (Concatenated Strings): Let ,
in . We let be its distribution, and and the
. If , choose .
probability and expectation, respectively, with the superscripts Then, a concatenated string of block length with initial 3
, emphasizing their dependence on the packet arrival proba-
and its numerical value
bility and the initial condition. The next result, [2], characterizes
the RRE convergence.
Theorem 2.1 (Theorems 9,10 in [2]): Under (E.1), for each
, there exists a unique invariant distribution , such that
the sequence (or the sequence of measures) con-
verges weakly to from any initial . Let
with its topological closure. Then, the support of is For fixed , , , denote the set of con-
catenated strings by and the set of numerical values
by . For , the set
consists of all strings with numerical value , i.e.
III. SOME APPROXIMATION RESULTS
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on June 05,2023 at 21:30:18 UTC from IEEE Xplore. Restrictions apply.
KAR AND MOURA: MODERATE DEVIATIONS OF A RANDOM RICCATI EQUATION 2253
(see Theorem 2.1) for shrinks to the point at mating numerically the invariant distributions. A naive numer-
. An immediate consequence of Theorem 4.1 is ical approach of simulating the distributions as be-
comes infeasible since the rare events become increasingly dif-
ficult to simulate as . Even techniques such as importance
sampling require characterization of the distributions in ques-
Thus, with respect to , every event , such that , is a tion, the issue we addressed in this paper.
rare event (see Definition 1.2). This is intuitively clear, because
as , the measures become concentrated on arbitrarily V. MODERATE DEVIATIONS (MD) FOR FINITE-
small neighborhoods of , making such an event very diffi- DIMENSIONAL DISTRIBUTIONS
cult to observe. We establish MD for finite dimensional distributions of the
The second assertion estimates the convergence rate of the process as . We start with notation.
measures to and relates to the loss in performance Fix and and recall the sets
when . Essentially, Theorem 4.1 states that, for every and for .
, the probability of staying away from the -neighborhood By Proposition 3.1, the random object takes
of decreases at least as when , i.e.,4 only a finite number of values and, for all
Since this holds , the probability of any rare event van- We generalize (see (9)) to count the number of
ishes at least as . A complete characterization of the in the string by
family requires the exact decay rate of rare events as ,
and this is achieved next by establishing an MDP for the family if
as . otherwise.
Theorem 4.2: The family of invariant distributions sat-
isfies an MDP at scale as with a good rate Also, for , define
function , i.e., for every open and closed sets (11)
tionary measures arising from general stabilizable iterated func- Proof: Let be an arbitrary initial state and
tion systems. The MDP for finite dimensional distributions pre- be the sequence generated by the RRE for
sented in the last Section suggests a rate function for the MDP
. From the weak convergence in Theorem 2.1
for the family of invariant distributions, as a suitable “limit”
as of the finite time marginal rate functions . How-
ever, even if such a limit exists, it is not a priori obvious whether
such an is lower semicontinuous and hence qualifies as a
rate function. In the following, we introduce such an and
its lower semicontinuous regularization as a candidate rate
function (Section VI-A).
(12)
(15)
The following proposition states some readily verifiable prop-
erties of ; the proof is in Appendix D.
It then follows from (14) and (15) that for any such that
Proposition 6.1:
and any string of the form:
• is a good rate function on .
• For every , we have
where , we have
where the last step follows from the fact that, by (15)
iterative construction of the sequence , it follows Lemma 6.2: Let be a closed set. Define the set of
that, for : strings and quantity as
(20)
(21)
(17)
Finally, from the fact, that, for , Proof: For , is the open -neighborhood of
and its closure. Since is open, we have by the weak
convergence of the sequence to
(19)
The Lemma follows from Proposition 6.1 (third assertion), since which in turn implies
is an open set, by showing the R.H.S. of (19) satisfies
(22)
In other words, the set consists of all strings of length PROOFS OF THEOREMS
, such that there are at least occurrences of in the Theorem 4.2: The MDP lower and upper bounds obtained in
truncated string . For , the following iholds: Lemma 6.1 and Lemma 6.5 respectively show that the family
(24) satisfies an MDP at scale as with a
good rate function . To complete the proof of Theorem 4.2
By the Markovian dynamics of the RRE, clearly, for it suffices to show that
(29)
Again, taking the limit on both sides as we conclude Recall the set of strings
(26)
We then have
From Lemma 6.1 (third assertion), we have for all
Finally, taking the limit and from Lemma 6.1 (fourth assertion) Since is closed, by Lemma 6.2, there exists ,
such that, for with , we have
(27)
(30)
The Lemma then follows from (26) and (27). By the existence of , there exists a sequence of
The following tightness result extends the upper bound from strings in , such that
compact sets to arbitrary closed sets (proof in Appendix D).
(31)
Lemma 6.4: The family of invariant distributions sat-
isfies the following tightness property: For every , there Note that, without loss of generality, we can assume that
exists a compact set , such that for all . Indeed, if , we can
(28) modify by appending the requisite number of at
the right end, still satisfying (31). On the other hand, if
, we note that must be of the form
We now complete the proof of the MDP upper bound for
arbitrary closed sets by the upper bound for compact sets and
the tightness estimate obtained in Lemma 6.4. This is achieved
in Lemma 6.5 and has parallels in the theory of large devia- where the truncated string
tions. The tightness analogue of Lemma 6.4 is called exponen- (32)
tial tightness in the context of LDP. It can be shown that the
LDP upper bound for closed sets follows from that of compact satisfies
sets and exponential tightness, see, for example, [18]. Since the
(33)
proof approaches are closely related (with obvious modifica-
tions due to a different MDP scale function), we omit the proof The second inequality in (33) follows from (30), whereas (32)
of Lemma 6.5 in the following. follows from the fact that implying
Lemma 6.5: Let be a closed set. Then the fol- . Thus the right end of does not contain any , ex-
lowing upper bound holds: plaining the form in (32). The key conclusion of the above dis-
cussion is that, if , we may instead consider the
truncated string , which also satisfies (31).
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on June 05,2023 at 21:30:18 UTC from IEEE Xplore. Restrictions apply.
2258 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 57, NO. 9, SEPTEMBER 2012
We thus assume that the sequence with the properties claim in (10) then follows from the MDP upper bound for closed
in (31) further satisfy for all . The number of sets (Lemma 6.5.)
distinct strings in the sequence is at most (in fact,
lesser than that, because of the constraint ) VII. COMPUTATIONS WITH THE RATE FUNCTION
and hence at least one pattern is repeated infinitely often in the A complete characterization of probabilities under the in-
sequence , i.e., there exists a string , such that variant distributions are obtained in Theorem 4.2, which shows
that the probability of rare events decay as powers of
as . The best exponent of this power law decay is charac-
and a subsequence of , such that, terized by the MDP rate function . As Theorem 4.2 shows,
for all . The corresponding subsequence of nu- the best decay exponent of such a rare event can be computed as
merical values then satisfy the infimum of the over that set. This reduces the problem
of estimating probabilities under the invariant distributions to
solutions of a related variational problem, namely, minimizing
over Borel sets in . From a numerical analysis point of
and, hence view, one may simulate the function and use a look-up table
to numerically solve the associated variational problems. In this
section we show that for a class of events of interest, the vari-
ational problem of computing the best decay exponent can be
Thus the string and we obtain simplified to a great extent. In particular, we are interested in es-
(34) timating probabilities of the form for every .
Theorem 4.1 shows that such probabilities decay to zero at least
as , i.e., for every , we have
The other inequality is obvious and hence we
conclude from (34) that , which completes the (36)
proof of Theorem 4.2.
Theorem 4.1: Define the class of sets However, this upper bound becomes loose as increases and the
best exponent of decay, i.e., the best power of in (36)
can be computed precisely by solving the variational problem
in Theorem 4.2. The main result of this section shows that for a
Then the following equivalence may be readily verified: particular class of systems, this computation can be extremely
simplified and for general systems we present bounds on the
(35)
decay exponent which are simple to obtain in contrast to solving
where the Prohorov metric is defined in (1). Consider the full-fledged variational problem.
, small enough. Then , such that for every To this end, define the function by
, we have . (Note that the constant can be
chosen independently of , but depends on .) The string
belongs to and hence by Corollary 6.1, there exists Also, define by
an integer , such that
Lemma 8.1: Let be a class system. Then we . The following proposition outlines a simple algorithm for
have for all solving the variational problems of interest leading to the decay
exponents of rare events for general systems:
Proposition 8.2: Let and define
(41)
To prove the Lemma, we need to transform the above uniform We then have
convergence over compact sets to uniform convergence over the
entire space . To this end, we note that for a observable and
controllable system, the following uniform boundedness of Ric-
cati iterates holds from arbitrary initial state (see, for
example, Lemma 7.1 in [26]):
(51)
where we have used the fact, that, for all
. It then follows from the above and (55), that
where is a sufficiently large number. Now consider
the compact set . From (51) (57)
(52)
We now estimate the probability . To this end,
Now from (50) choose , such that first consider the case . On the event , it is not hard
to see that the following events are equal:
(53)
(54)
(55)
We thus have the upper bound
where and . Since is unstable
, it follows that as . To estimate
the probability for , define by
(56) (58)
APPENDIX C APPENDIX D
PROOF OF THEOREM 5.1 PROOFS OF RESULTS IN SECTION VI
Proof: For , we have Proof of Proposition 6.1: That is lower semicontin-
uous follows from its definition (e.g., [27].) For , con-
sider the level set . By lower
semicontinuity, is closed. We show that is bounded and
(59) hence compact. Note that for all
(62)
which follows from the Markov property. From the above
for a constant , which can be chosen independent of
. Indeed, implies that is non-empty and
Also, if , from (59), simple manipulations, Since is integer valued, this infimum is attained and there
and the independence of the packet dropouts exists with . Then, by Proposition 3.1,
there exists (depending on only)
(60)
This verifies the claim in (62).
Let . For , the sequence is
non-decreasing w.r.t. ; hence implies
By manipulating each term on the R.H.S. above, we have
It then follows from Proposition 3.2 and (60) and (61) that:
The goodness of follows from the level sets of being
closed and bounded, , as is bounded:
(the case is absorbed above by using the For the second assertion, we note that, for arbitrary
convention, that, the minimum of an empty set is .) Now con-
sider . If , then the
claim is obvious. Hence, assume (this
intersection is necessarily finite) and note that
The assertion follows by passing to the limit as .
For the third assertion, in general, for arbitrary , we
have ; passing to the limit
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on June 05,2023 at 21:30:18 UTC from IEEE Xplore. Restrictions apply.
KAR AND MOURA: MODERATE DEVIATIONS OF A RANDOM RICCATI EQUATION 2263
This immediately gives for any set and, hence, as . It then follows from the
lower semicontinuity of and (65) that:
(63)
Thus, , . Taking the in- Start with . Assume on the contrary, that there is no such
fimum over on the left hand side gives the desired . Since is non-empty, by Proposition 3.1 (first
. The result follows. assertion), there exists , such that
We prove the fourth assertion. For limits involving continuous (67)
arguments, it suffices to show that with
Thus the non-existence of , implies, that, for every ,
there exists a string , with , such that,
.7 Such a string is then necessarily of the form
we have
(64)
where . Thus denoting
satisfying (66) for . Since (66) holds for , there Thus in converges to as .
exists , such that for all with , Hence, as is closed and is a limit point
we have . The non-existence of and (67) im- of . This implies . Since , this contra-
plies that, for every , there exists a string , dicts the hypothesis and the claim in (66) holds for
with , such that all , establishing the Lemma.
Proof of Lemma 6.4: Let be arbitrary and be
(69) such that . From Proposition 3.1 (third assertion), there
exists , such that, for all
We now study the structure of the strings for sufficiently
. Define such that and
large . To this end, define . Then by the ex-
istence of and (69) it follows that for . consider the compact set . Also
Hence for , is necessarily of the form define the closed set, , by . As
per Lemma 6.2, define the set by
Since the cardinality of is finite and is countably infinite, Since is closed, by Lemma 6.2
there exists , such that, the set is
countably infinite. This implies, that we can extract a subse-
quence from , such that To estimate , follow a similar set of arguments as in
Lemma 6.3. By weak convergence
Noting that is continuous (com- Thus for every there exists a compact set such that
position of continuous functions), conclude (28) is satisfied and the Lemma follows.
APPENDIX E
PROOF OF LEMMA 8.1
Proof: By Theorem 4.2 it suffices to show
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on June 05,2023 at 21:30:18 UTC from IEEE Xplore. Restrictions apply.
KAR AND MOURA: MODERATE DEVIATIONS OF A RANDOM RICCATI EQUATION 2265
We prove the left assertion; the second is similar. Since [11] L. Xie and L. Xie, “Stability of a random Riccati equation with
, the sequence is Markovian binary switching,” in Proc. IEEE CDC, Dec. 2007, pp.
1565–1570.
non-decreasing. Then, for class systems, the following holds: [12] A. H. Sayed, “A framework for state-space estimation with uncertain
models,” IEEE Trans. Autom. Control, vol. 46, no. 7, pp. 998–1013,
Jul. 2001.
[13] R. K. Boel, M. R. James, and I. R. Petersen, “Robustness and risk-sensi-
tive filtering,” IEEE Trans. Autom. Control, vol. 47, no. 3, pp. 451–461,
Mar. 2002.
[14] H. Y. Liang and T. Zhou, “Robust state estimation for uncertain
for any positive integer . Then an inductive argument that re- discrete-time stochastic systems with missing measurements,” Auto-
peatedly uses the definition of class systems and the mono- matica, vol. 47, no. 7, pp. 1520–1524, 2011.
tonicity of the Riccati operator yields the following: [15] J. M. C. Clark and D. Crisan, “On a robust version of the integral repre-
sentation formula of nonlinear filtering,” Prob. Theory Related Fields,
(72) vol. 133, no. 1, pp. 43–56, Sep. 1996.
[16] N. J. Newton, “Observations sampling and quantisation for continuous-
time estimators,” Stoch. Processes Appl., vol. 87, pp. 311–337, 2000.
By definition it follows that and hence [17] S. Kar, J. M. F. Moura, and K. Ramanan, “Sample path large devia-
tions for the randomly sampled continuous-discrete Kalman filter,” in
(73) Proc. 49th IEEE Conf. Decision Control, Atlanta, GA, Dec. 2010, pp.
7375–7382.
[18] J. Deuschel and D. Stroock, Large Deviations. New York: Academic,
Now assume on the contrary strict inequality in (73). Then there 1984.
exists with , such that, [19] M. I. Freidlin and A. D. Wentzell, Random Perturbations of Dynamical
Systems, 2nd ed. New York: Springer-Verlag, 1998.
. Then, from (72) [20] P. Diaconis and D. Freedman, “Iterated random functions,” SIAM Rev.,
vol. 41, no. 1, pp. 45–76, 1999.
[21] S. Kar, B. Sinopoli, and J. M. F. Moura, “A random dynamical systems
approach to filtering in large-scale networks,” in Proc. Amer. Control
which implies Conf., Jun. 2010, pp. 1027–1034.
[22] J. Jacod and A. Shiryaev, Limit Theorems for Stochastic Processes.
Berlin, Germany: Springer-Verlag, 1987.
[23] A. Dembo and O. Zeitouni, Large Deviations Techniques and Applica-
tions. Boston, MA: Jones and Barlett, 1993.
This contradicts the definition of that it is the smallest [24] R. S. Bucy, “Apriori bounds for the Riccati equation,” in Proc. 6th
non-negative integer , such that, . We Berkeley Symp. Math. Stat. Prob., 1972, vol. 3, pp. 645–656.
[25] B. D. O. Anderson and J. Moore, Optimal Filtering. Englewood
thus conclude that the left assertion and the claim holds. Cliffs, NJ: Prentice-Hall, 1979.
[26] A. Jazwinski, Stochastic Processes and Filtering Theory. New York:
ACKNOWLEDGMENT Dover, 1970.
[27] J. Feng and T. G. Kurtz, Large Deviations for Stochastic Processes.
The authors wish to thank K. Ramanan for general discus- Providence, RI: American Mathematical Society, 2006.
sions on large deviations of Markov processes, the associate ed-
itor and the anonymous reviewers for insightful comments and Soummya Kar (S’05–M’10) received the B.Tech.
degree in electronics and electrical communication
suggestions that significantly improved the clarity of the paper. engineering from the Indian Institute of Technology,
Kharagpur, in May 2005 and the Ph.D. degree in
REFERENCES electrical and computer engineering from Carnegie
Mellon University, Pittsburgh, PA, in 2010.
[1] B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. Jordan, and S. From June 2010 to May 2011 he was with the
Sastry, “Kalman filtering with intermittent observations,” IEEE Trans.
Electrical Engineering Department, Princeton Uni-
Autom. Control, vol. 49, no. 9, pp. 1453–1464, Sep. 2004.
[2] S. Kar, B. Sinopoli, and J. M. F. Moura, “Kalman filtering with inter- versity, Princeton, NJ, as a Postdoctoral Research
mittent observations: Weak convergence to a stationary distribution,” Associate. He is currently an Assistant Research
IEEE Trans. Autom. Control, vol. 57, no. 2, pp. 405–420, Feb. 2012. Professor of electrical and computer engineering
[3] H. Chen, P. Kumar, and J. van Schuppen, “On Kalman filtering for at Carnegie Mellon University, Pittsburgh, PA. His research interests include
conditionally Gaussian systems with random matrices,” Syst. Control performance analysis and inference in large-scale networked systems, adaptive
Lett., vol. 13, pp. 397–404, 1989. stochastic systems, stochastic approximation, and large deviations.
[4] Y. Wang and L. Guo, “On stability of random Riccati equations,” Sci.
China Series E: Technol. Sci., vol. 42, no. 2, pp. 136–148, Apr. 1999.
[5] X. Liu and A. Goldsmith, “Kalman filtering with partial observation
losses,” in Proc. IEEE Conf. Decision Control, Paradise, The Bahamas, José M. F. Moura (S’71–M’75–SM’90–F’94)
Dec. 2004, vol. 4, pp. 4180–4186. received the E.E. degree from the Instituto Superior
[6] V. Gupta, T. Chung, B. Hassibi, and R. M. Murray, “On a stochastic Técnico (IST), Portugal, and the Ph.D. degree from
sensor selection algorithm with applications in sensor scheduling and the Massachusetts Institute of Technology (MIT),
sensor coverage,” Automatica, vol. 42, no. 2, pp. 251–260, 2006.
Cambridge, MA.
[7] Y. Xu and J. Hespanha, “Estimation under controlled and uncontrolled
communications in networked control systems,” in Proc. IEEE Conf. He is a University Professor at Carnegie Mellon
Decision Control, Sevilla, Spain, Dec. 2005, pp. 842–847. University (CMU), Pittsburgh, PA, was on the faculty
[8] M. Huang and S. Dey, “Stability of Kalman filtering with Markovian at IST and has been Visiting Professor at MIT, Cam-
packet losses,” Automatica, vol. 43, no. 4, pp. 598–607, 2007. bridge, MA. In 2010, he was elected University Pro-
[9] K. Plarre and F. Bullo, “On Kalman filtering for detectable systems fessor at CMU. His interests include statistical and
with intermittent observations,” IEEE Trans. Autom. Control, vol. 54, algebraic signal and image processing.
no. 3, pp. 386–390, Feb. 2009. Dr. Moura is Division IX Director of The IEEE, was President of the
[10] C. Robinson and P. R. Kumar, “Sending the most recent observation is IEEE Signal Processing Society (SPS), and Editor-in-Chief of the IEEE
not optimal in networked control: Linear temporal coding and towards TRANSACTIONS ON SIGNAL PROCESSING. He is a Fellow of the AAAS and
the design of a control specific transport protocol,” in Proc. IEEE CDC, a Member of the Academy of Sciences of Portugal. He received the SPS
Dec. 2007, pp. 334–339. Technical Achievement Award.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on June 05,2023 at 21:30:18 UTC from IEEE Xplore. Restrictions apply.