Author of the publication

Variance-Constrained Filter Design With Sensor Resolution Under Round-Robin Communication Protocol: An Outlier-Resistant Mechanism.

, , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (6): 3762-3773 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lower Bound of the L2 Norm Error Estimate for the Adini Element of the Biharmonic Equation., and . SIAM J. Numerical Analysis, 51 (5): 2651-2659 (2013)StoryML: Enabling Distributed Interfaces for Interactive Media.. WWW (Posters), (2003)A Privilege Separation Method for Security Commercial Transactions., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-192. Springer, (2010)AdMoVeo: An Educational Robotic Platform For Learning Behavior Programming, and . DeSForM 2009: Design and Semantics of Form and Movement, page 218--219. (2009)Generating test cases from UML activity diagram based on Gray-box method, , , , , and . Software Engineering Conference, 2004. 11th Asia-Pacific, page 284- 291. (2004)A computationally efficient associative memory model of hippocampus CA3 by spiking neurons., , , and . IJCNN, page 1-8. IEEE, (2013)Web structure model based on granular computing., and . GrC, page 245-250. IEEE Computer Society, (2009)Graph-Based Detector for BLAST Architecture., and . ICC, page 1018-1023. IEEE, (2007)Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, and . CoRR, (2013)First-principles studies of the electronic properties of native and substitutional anionic defects in bulk iron pyrite, , , and . Phys. Rev. B, 85 (8): 085203 (February 2012)