Author of the publication

Coherent Precision Pointing Control Design based on Hinf-Closed Loop Shaping

, , , and . Proceedings of the 8th International ESA Conference on Guidance, Navigation & Control Systems, Karlovy Vary, CZ, (June 2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coherent Precision Pointing Control Design based on Hinf-Closed Loop Shaping, , , and . Proceedings of the 8th International ESA Conference on Guidance, Navigation & Control Systems, Karlovy Vary, CZ, (June 2011)Precision Pointing H∞ Control Design for Absolute, Window-, and Stability-Time Errors, , , and . CEAS Space Journal, (2013)Precision pointing H∞ control design for absolute, window-, and stability-time errors, , , and . CEAS Space Journal, 4 (1): 13--30 (Jun 1, 2013)High-Precision Attitude Determination and Control of the EUCLID Spacecraft: Challenges and Solutions, , , , , and . Proceedings of the 8th International ESA Conference on Guidance, Navigation & Control Systems, (June 2011)Recognition of faxed documents., and . Document Recognition, volume 2181 of SPIE Proceedings, page 371-377. SPIE, (1994)HCI challenges in government contracting (abstract)., and . CHI 95 Conference Companion, page 434. ACM, (1995)Negative association in uniform forests and connected graphs., and . Random Struct. Algorithms, 24 (4): 444-460 (2004)Quantification of Annual Settlement Growth in Rural Mining Areas Using Machine Learning., , , and . Remote Sensing, 12 (2): 235 (2020)CAME Tools for an Efficient Software Maintenance., and . CSMR, page 74-81. IEEE Computer Society, (1997)Information Security Technology? Don't Rely on It. A Case Study in Social Engineering., and . USENIX Security Symposium, USENIX Association, (1995)