Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving liability in anonymous communication: Auditing and tracing., , , , , and . Comput. Commun., (2019)Continuous estimation of finger joint angles under different static wrist motions from surface EMG signals., , , , and . Biomed. Signal Process. Control., (2014)Fault-tolerant anti-windup control for hypersonic vehicles in reentry based on ISMDO., , , and . J. Frankl. Inst., 355 (5): 2067-2090 (2018)The asymptotic connectivity of random cognitive radio networks., , , , and . WCNC, page 1685-1690. IEEE, (2013)Secure quantum network coding for controlled repeater networks., , and . Quantum Inf. Process., 15 (7): 2937-2953 (2016)Multi-view representation learning in multi-task scene., , , and . Neural Comput. Appl., 32 (14): 10403-10422 (2020)Design and Analysis of e-Government Control: the Green Corridor between Finland and Russia., , , and . Bled eConference, page 18. (2007)Towards a Methodology for Designing E-Government Control Procedures., , and . EGOV, volume 4656 of Lecture Notes in Computer Science, page 56-67. Springer, (2007)Towards zero training for myoelectric control based on a wearable wireless sEMG armband., , , , , and . AIM, page 196-201. IEEE, (2015)Design and stability analysis of networked control system with random delay and data dropout using a novel proactive strategy., , and . ICCA, page 843-850. IEEE, (2014)