Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios., , , , and . IEEE Trans. Smart Grid, 10 (2): 1704-1712 (2019)Constraining LDPC degree distributions for improved error floor performance., and . IEEE Communications Letters, 10 (2): 103-105 (2006)A family of irregular LDPC codes with low encoding complexity., and . IEEE Communications Letters, 7 (2): 79-81 (2003)On the Relation Between Turnpike Properties for Finite and Infinite Horizon Optimal Control Problems., , and . J. Optimization Theory and Applications, 173 (3): 727-745 (2017)Bifurcations and EXIT charts for the Binary Erasure Channel., and . ISIT, page 2559-2563. IEEE, (2006)An optimised parallel tree search for multiuser detection with VLSI implementation strategy., , , and . GLOBECOM, page 2440-2444. IEEE, (2004)Towards price-based predictive control of a small-scale electricity network., , , , and . Int. J. Control, 93 (1): 40-61 (2020)Combinatorial Interleavers for Systematic Regular Repeat-Accumulate Codes Transactions Letters., and . IEEE Trans. Commun., 56 (8): 1201-1206 (2008)Cooperation-Driven Distributed Model Predictive Control for Energy Storage Systems., , , and . IEEE Trans. Smart Grid, 6 (6): 2583-2585 (2015)Limiting zeros of decouplable MIMO systems.. IEEE Trans. Automat. Contr., 44 (1): 129-134 (1999)