Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational complexity of determining resource loops in re-entrant flow lines., , and . IEEE Trans. Syst. Man Cybern. Part A, 30 (2): 222-229 (2000)Dynamical System Representation of Open Address Hash Functions., , , and . SODA, page 919-920. ACM/SIAM, (1999)Policy-based Security Provisioning and Performance Control in the Cloud., , , , , and . CLOSER, page 502-508. SciTePress, (2013)A learning algorithm for applying synthesized stable dynamics to system identification., , and . Neural Networks, 11 (1): 81-87 (1998)Deep transfer learning for system identification using long short-term memory neural networks., , , and . CoRR, (2022)A Model-free Tracking Controller Based on the Newton-Raphson Method and Feedforward Neural Networks., , , and . ACC, page 3254-3259. IEEE, (2022)H∞ filtering of networked systems with time-varying sampling rates., , , and . ACC, page 3372-3377. IEEE, (2009)Some remarks on the delay stabilizing effect in SISO systems., , and . ACC, page 2670-2675. IEEE, (2003)Jump Law of Co-State in Optimal Control for State-Dependent Switched Systems and Applications., , , and . ACC, page 3566-3571. IEEE, (2023)Model-based networked control for nonlinear systems with stochastic packet dropout., , and . ACC, page 2365-2370. IEEE, (2005)