Author of the publication

A Constrained Control Problem with Degenerate Coefficients and Degenerate Backward SPDEs with Singular Terminal Condition.

, , and . SIAM J. Control and Optimization, 54 (2): 946-963 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three-dimensional graphene foam as a biocompatible and conductive scaffold for neural stem cells, , , , , , , , , and . Sci. Rep., (April 2013)A CAE-based approach for an automatic identification of lightweight design strucures in entire systems, , , , and . NAFEMS Seminar "The Role of CAE in System Simulation", NAFEMS, (2011)Joint Time Switching and Power Allocation for Multicarrier Decode-and-Forward Relay Networks with SWIPT., , and . IEEE Signal Process. Lett., 22 (12): 2284-2288 (2015)Integrability and generalized center problem of resonant singular point., and . Appl. Math. Lett., (2015)Speckle suppression of ultrasonic images using non-local means and McIlhagga-based anisotropic diffusion., , , , and . BMEI, page 242-247. IEEE, (2014)Graphics hardware based volumetric medical dataset visualization and classification., , and . Medical Imaging: Image-Guided Procedures, volume 6141 of SPIE Proceedings, page 61412T. SPIE, (2006)Symmetric Magnetic Anomaly Objects' Orientation Recognition Based on Local Binary Pattern and Support Vector Machine., , , and . Symmetry, 11 (1): 97 (2019)Object tracking using particle filter in the wavelet subspace., , , and . Neurocomputing, (2013)A Software Platform for Real-Time Visualization and Manipulation of 4D Cardiac Images., , and . FIMH, volume 5528 of Lecture Notes in Computer Science, page 396-406. Springer, (2009)Detecting Targets in SAR Images: A Machine Learning Approach., , and . ACCV (1), volume 1351 of Lecture Notes in Computer Science, page 305-312. Springer, (1998)