document.write("« Constraining Attacker Capabilities Through Actuator Saturation. (arXiv:1710.02576v1 [cs.SY])");document.write(" | ");document.write("Contour methods for Dyson models: weakening nearest-neighbor interactions and adding decaying fields. (arXiv:1710.02986v1 [math-ph]) »");