Author of the publication

Perturbation bounds for root-clustering of linear systems in a specified second order subregion.

, , and . IEEE Trans. Autom. Control., 40 (3): 473-478 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The social organization of conspiracy: illegal networks in the heavy electrical equipment industry, and . Am. Social. Rev., (1993)Perturbation bounds for root-clustering of linear systems in a specified second order subregion., , and . IEEE Trans. Autom. Control., 40 (3): 473-478 (1995)New Results from the Search for Low-Mass Weakly Interacting Massive Particles with the CDMS Low Ionization Threshold Experiment, , , , , , , , , and 79 other author(s). Phys. Rev. Lett., 116 (7): 071301 (February 2016)Solving a 2D Knapsack Problem on an Associative Computer Augmented with a Linear Network., and . PDPTA, page 29-32. CSREA Press, (1996)An Extension of the ASC Language Compiler to Support Multiple Instruction Streams in the MASC Model using the Manager-Worker Paradigm., , and . PDPTA, page 521-527. CSREA Press, (2006)A Constant Time Algorithm for the Channel Assignment Problem Using the Reconfigurable Mesh., and . Parallel Algorithms Appl., 6 (4): 259-271 (1995)Student Adaptation to College Questionnaire (SACQ) Manual, and . (1999)A micropower envelope detector for audio applications., , and . ISCAS (5), page 1-4. IEEE, (2003)Performance Comparison of NVIDIA accelerators with SIMD, Associative, and Multi-core Processors for Air Traffic Management., , , and . ICPP Workshops, page 46:1-46:10. ACM, (2018)The Development of a Common Vulnerability Enumeration., , , and . Recent Advances in Intrusion Detection, (1999)