Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Feedback Control for Navigation., and . IEEE Trans. Automat. Contr., 51 (6): 926-937 (2006)A Smartphone-Based Tool for Assessing Parkinsonian Hand Tremor., , , and . IEEE J. Biomed. Health Informatics, 19 (6): 1835-1842 (2015)Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols., , , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 227-238. Springer, (2007)A decision support model for tax revenue collection in Greece., , and . Decis. Support Syst., 53 (1): 76-96 (2012)Feedback control systems as users of a shared network: communication sequences that guarantee stability.. CDC, page 3631-3636. IEEE, (2001)Directed Graphs and Motion Description Languages for Robot Navigation., and . ICRA, page 2689-2694. IEEE, (2002)Observers in Language-Based Control., , and . Commun. Inf. Syst., 8 (2): 85-106 (2008)Short-Period Communication and the Role of Zero-Order Holding in Networked Control Systems.. IEEE Trans. Automat. Contr., 53 (5): 1285-1290 (2008)LQG control of networked control systems with access constraints and delays., and . Int. J. Control, 81 (8): 1266-1280 (2008)On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols., , , and . SECRYPT, page 222-228. INSTICC Press, (2007)