Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explainable Abusive Language Classification Leveraging User and Network Data., , , , and . ECML/PKDD (5), volume 12979 of Lecture Notes in Computer Science, page 481-496. Springer, (2021)Predictive PI-control of linear plants under positional and incremental input saturations., , and . Autom., 36 (10): 1505-1516 (2000)Recursive Solutions to Indirect Sensing Measurement Problems by a Generalized Innovations Approach.. Optimization Techniques, volume 27 of Lecture Notes in Computer Science, page 86-97. Springer, (1974)Formation flying control of a pair of nano-satellites based on switching predictive control., , and . CDC, page 3603-3608. IEEE, (2003)Closed-loop performance inference for controller selection in switching supervisory control., and . ECC, page 2084-2089. IEEE, (1999)Cost Estimation for Configurable Model-Driven SoC Designs Using Machine Learning., , , , , and . ACM Great Lakes Symposium on VLSI, page 405-410. ACM, (2020)Monitoring a feedback-loop for incipient divergence detection., and . ACC, page 3165-3170. IEEE, (2001)Optimal hankel-norm approximation of IIR by FIR systems., , , and . EUSIPCO, page 1-4. IEEE, (2005)"That Is a Suspicious Reaction!": Interpreting Logits Variation to Detect NLP Adversarial Attacks., , , and . ACL (1), page 7806-7816. Association for Computational Linguistics, (2022)MMSE deconvolution via polynomial methods and its dual LQG regulation., and . Autom., 30 (7): 1197-1201 (1994)