Author of the publication

Optimal control of networked control systems with limited communication and delays.

, and . Int. J. Model. Identif. Control., 17 (1): 55-60 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling and optimal control of networked systems with stochastic communication protocols., , and . Kybernetika, 56 (2): 239-260 (2020)Set-membership filtering for two-dimensional shift-varying systems with stochastic communication protocol and uniform quantization., , and . Trans. Inst. Meas. Control, 46 (3): 538-554 (2024)MMWD: An efficient mobile malicious webpage detection framework based on deep learning and edge cloud., , , , and . Concurr. Comput. Pract. Exp., (2021)An efficient malicious webpage static detection framework based on optimized Bayesian and hybrid machine learning., , , , and . Concurr. Comput. Pract. Exp., (2022)Stabilization of Linear Systems Over Networks With Limited Communication Capacity., , , and . IEEE Access, (2019)Event-Based Pinning Synchronization Control for Discrete-Time Delayed Complex Cyber-Physical Networks Under All-Around Attacks., and . Inf. Technol. Control., 52 (1): 155-168 (March 2023)Event-Triggered Ultimately Bounded Filtering for Two-Dimensional Discrete-Time Systems under Hybrid Cyber Attacks., , , , and . J. Frankl. Inst., 361 (2): 683-711 (2024)Optimal control of networked control systems with limited communication and delays., and . Int. J. Model. Identif. Control., 17 (1): 55-60 (2012)Recursive filtering for time-varying systems with mixed time-delays subject to stochastic communication protocol and dynamic quantization effects., , , , and . J. Syst. Control. Eng., 238 (1): 112-129 (January 2024)Dynamic Output Feedback Control of Cyber-Physical Systems Under DoS Attacks., , , , and . IEEE Access, (2019)