Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formation control of networked multi-agent systems based on a novel event-triggered transmission strategy., , and . Int. J. Autom. Control., 11 (4): 447-461 (2017)Parameter k search strategy in outlier detection., , , and . Pattern Recognit. Lett., (2018)Co-design of dynamic scheduling and H-infinity control for networked control systems., , and . Appl. Math. Comput., 218 (21): 10767-10775 (2012)Two-dimensional occluded object matching using petri nets., and . Int. J. Intell. Syst., 17 (3): 303-320 (2002)Numerical Study of Local Scour around a Submarine Pipeline with a Spoiler Using a Symmetry Boundary Condition., , , and . Symmetry, 13 (10): 1847 (2021)Gradient based image completion by solving the Poisson equation., , , and . Comput. Graph., 31 (1): 119-126 (2007)Research Paper: Forecasting Emergency Department Crowding: A Prospective, Real-time Evaluation., , , , , , and . JAMIA, 16 (3): 338-345 (2009)A high-precision binocular method for model-based pose estimation., , and . ICARCV, page 1067-1071. IEEE, (2004)On the Upper Bounds of Spread for Greedy Algorithms in Social Network Influence Maximization., , , and . IEEE Trans. Knowl. Data Eng., 27 (10): 2770-2783 (2015)Facial expressional image synthesis controlled by emotional parameters., and . Pattern Recognit. Lett., 26 (16): 2611-2627 (2005)