Author of the publication

A collaborative-shared control system with safe obstacle avoidance capability.

, , , and . RAM, page 119-123. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Functional Verification of the Equator MAP1000 Microprocessor., , , , , , , and . DAC, page 169-174. ACM Press, (1999)New Upper Bounds For The Bondage Number Of A Graph In Terms Of Its Maximum Degree And Euler Characteristic., and . Ars Comb., (2018)Location-Aware Routing Protocol for Underwater Sensor Networks., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 609-617. Springer, (2013)Discrete Branch Length Representations for Genetic Algorithms in Phylogenetic Search., and . EvoWorkshops, volume 3005 of Lecture Notes in Computer Science, page 94-103. Springer, (2004)Written Texts as Statistical Mechanical Problem., , and . ICTIR, volume 5766 of Lecture Notes in Computer Science, page 241-248. Springer, (2009)Outsourced data tagging via authority and delegable auditing for cloud storage., , , and . ICCST, page 131-134. IEEE, (2015)A RFID Based Localization Algorithm for Wireless Sensor Networks., , , , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 275-285. (2016)A new lower bound on error probability for nonuniform signals over AWGN channels., , and . WCNC, page 3005-3009. IEEE, (2013)Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things., , , and . Wirel. Pers. Commun., 96 (4): 5253-5266 (2017)Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder., , and . IEEE Trans. Inf. Forensics Secur., (2024)