Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service
Published:
Published in 2020 IEEE International Conference on Smart Computing (SMARTCOMP), 2020
Recommended citation: Ayman, A., Wilbur, M., Sivagnanam, A., Pugliese, P., Dubey, A., & Laszka, A. (2020, September). Data-driven prediction of route-level energy use for mixed-vehicle transit fleets. In 2020 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 41-48). IEEE.
Published in Proceedings of the AAAI Conference on Artificial Intelligence (AAAI-21), 2021
Recommended citation: Sivagnanam, A., Ayman, A., Wilbur, M., Pugliese, P., Dubey, A., & Laszka, A. (2021, May). Minimizing energy use of mixed-fleet public transit for fixed-route service. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 35, No. 17, pp. 14930-14938).
Published in ACM Transactions on Internet Technology, 2021
Recommended citation: Ayman, A., Sivagnanam, A., Wilbur, M., Pugliese, P., Dubey, A., & Laszka, A. (2021). Data-driven prediction and optimization of energy use for transit fleets of electric and ICE vehicles. ACM Transactions on Internet Technology (TOIT), 22(1), 1-29.
Published in Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence (IJCAI-22), 2022
Published in International World Wide Web Conference 2023, 2023
Published:
Recommended citation: Sivagnanam, A., Ayman, A., Wilbur, M., Pugliese, P., Dubey, A., & Laszka, A. (2021, May). Minimizing energy use of mixed-fleet public transit for fixed-route service. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 35, No. 17, pp. 14930-14938).
Published:
Recommended citation: Sivagnanam, A., Atefi, S., Ayman, A., Grossklags, J., & Laszka, A. (2021). On the Benefits of Bug Bounty Programs: A Study of Chromium Vulnerabilities. In Workshop on the Economics of Information Security (WEIS) (Vol. 10).
Published:
Recommended citation: Sivagnanam, A., Atefi, S., Ayman, A., Grossklags, J., & Laszka, A. (2021). On the Benefits of Bug Bounty Programs: A Study of Chromium Vulnerabilities. In Workshop on the Economics of Information Security (WEIS) (Vol. 10).