Author of the publication

An off-line reference management technique for a class of nonlinear systems.

, , and . CDC, page 560-565. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kogiso, Kiminao
add a person with the name Kogiso, Kiminao
 

Other publications of authors with the same name

Constrained remote control of construction machine with time-varying delay and packet loss., , , , , and . Adv. Robotics, 37 (1-2): 46-60 (January 2023)Cyber-Secure Teleoperation With Encrypted Four-Channel Bilateral Control., , , , , and . CoRR, (2023)Gray-box identification of McKibben pneumatic artificial muscle using interpolation of load-dependent parameters., , and . AIM, page 1228-1234. IEEE, (2013)Reference Governor for Constrained Systems with Time-varying References., and . MFI, page 359-364. IEEE, (2006)Dynamic Quantizer for Encrypted Observer-based Control., and . CDC, page 5477-5482. IEEE, (2020)An off-line reference management technique for a class of nonlinear systems., , and . CDC, page 560-565. IEEE, (2007)Simultaneous Estimation of Contraction Ratio and Parameter of McKibben Pneumatic Artificial Muscle Model Using Log-Normalized Unscented Kalman Filter., , and . CPSNA, page 44-48. IEEE Computer Society, (2016)Secure Observer-based Motion Control based on Controller Encryption., , , , and . ACC, page 2978-2983. IEEE, (2019)Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks., , and . IEEE Access, (2024)Detection and Cancellation of Multiplicative FDI Attack on Bilateral Encrypted Control System., , , , and . IEEE Access, (2024)