Author of the publication

Tracking time-varying parameters in software systems with extended Kalman filters.

, , , , and . CASCON, page 334-345. IBM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A routing layer sleep scheme for data gathering in wireless sensor networks., , and . ICC, page 735-739. IEEE, (2012)On robustness of constrained non-linear H∞ predictive controllers with disturbances., , and . Int. J. Systems Science, 41 (2): 203-212 (2010)An Improved Recurrent Neural Network Language Model for Programming Language., , , and . IJCNN, page 1-7. IEEE, (2019)Joint communication and computing resource allocation in vehicular edge computing., , , , and . IJDSN, (2019)Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks., , , , , and . Comput. Networks, (2018)Research on Distance Transform and Neural Network Lidar Information Sampling Classification-Based Semantic Segmentation of 2D Indoor Room Maps., , , , , and . Sensors, 21 (4): 1365 (2021)Development of Nursing Informatics in Mainland China: A Bibliometric Analysis., , , and . Nursing Informatics, volume 284 of Studies in Health Technology and Informatics, page 56-58. IOS Press, (2021)Comprehensive Analysis on Heterogeneous Wireless Network in High-Speed Scenarios., , , , and . Wirel. Commun. Mob. Comput., (2018)A Semi-quantum Group Signature Scheme Based on Bell States., , , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 246-257. Springer, (2020)A dynamic detective method against ROP attack on ARM platform., , and . SEES@ICSE, page 51-57. IEEE, (2012)