Author of the publication

Event-Based PI controller with adaptive thresholds

, , , , , and . IV International Congress on Ultra Modern Telecommunications and Control Systems 2012, page 219--226. St. Petersburg, IEEE, (October 2012)
DOI: 10.1109/ICUMT.2012.6459668

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event-Based PI controller with adaptive thresholds, , , , , and . IV International Congress on Ultra Modern Telecommunications and Control Systems 2012, page 219--226. St. Petersburg, IEEE, (October 2012)The Scientometrics and Reciprocality Underlying Co-Authorship Panels in Google Scholar Profiles., , and . CoRR, (2023)Enforcing Privacy in Web Applications., and . PST, (2005)HAADS: A Hebrew Aramaic abbreviation disambiguation system., , and . J. Assoc. Inf. Sci. Technol., 61 (9): 1923-1932 (2010)The Academic Midas Touch: An Unconventional Scientometric for Evaluating Academic Excellence., , , and . CoRR, (2023)WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace., , , , and . CoRR, (2020)Abbreviation Disambiguation: Experiments with Various Variants of the One Sense per Discourse Hypothesis., , and . NLDB, volume 5039 of Lecture Notes in Computer Science, page 27-39. Springer, (2008)The Trade-Off between Airborne Pandemic Control and Energy Consumption Using Air Ventilation Solutions., , and . Sensors, 22 (22): 8594 (2022)The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms., , and . WOOT, USENIX Association, (2007)Advanced Software Protection Now, , , , and . CoRR, (2010)