Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low rank tensor completion with sparse regularization in a transformed domain., , and . CoRR, (2019)Data association combined with the probability hypothesis density filter for multi-target tracking., , , , and . WCSP, page 1-6. IEEE, (2015)Effects of body-weight support locomotion training (BWSLT) on EMG activation in healthy and spinal cord injury (SCI) subjects., , and . ROBIO, page 271-276. IEEE, (2010)Robust H∞ consensus control of uncertain multi-agent systems with nonlinear dynamics and time-varying delays., , , and . ACC, page 2587-2592. IEEE, (2014)Assimilating IT Innovation: The Longitudinal Effects of Institutionalization and Resource Dependence.. ICIS, page 21. Association for Information Systems, (2008)A reputation scheme with witness reasoning for service selection., , , and . SOCA, page 1-8. IEEE Computer Society, (2009)A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management., , and . ICEBE, page 337-344. IEEE Computer Society, (2013)Enhanced QoS Provisioning in Distributed Wireless Access., , and . ICC, page 5111-5116. IEEE, (2006)On the Expected Complexity Analysis of a Generalized Sphere Decoding Algorithm for Underdetermined Linear Communication Systems., and . ICC, page 2665-2670. IEEE, (2007)Trust and probability analysis in p2p network., and . FSKD, page 2645-2649. IEEE, (2011)