Author of the publication

Iterative Reweighted DOA Estimation for Impulsive Noise Processing Based on Off-Grid Variational Bayesian Learning.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Robin Rainer Herkert University of Stuttgart

Replication Code for: Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data. Software, (2024)Related to: R. Herkert, P. Buchfink, T. Wenzel, B. Haasdonk, P. Toktaliev, O. Iliev (2024), "Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data". arXiv: 2405.19170.
 

Other publications of authors with the same name

Scheduling two parallel machines with machine-dependent availabilities., , and . Computers & OR, (2016)Dual-channel pricing strategies for small and medium-sized enterprises., , and . IJSTM, 20 (1/2/3): 47-70 (2014)RSS Assisted TOA-Based Indoor Geolocation., , and . IJWIN, 20 (2): 157-165 (2013)Enhancing User Loyalty through Network Externality: An Empirical Study on B2B Platform., , , and . WHICEB, page 59. Association for Information Systems, (2014)Collaborative Geolocation Based on Imprecise Initial Coordinates for Internet of Things., , , , , and . IEEE Access, (2018)Neutrosophic Soft Sets Forecasting Model for Multi-Attribute Time Series., , , and . IEEE Access, (2019)Online clustering for trajectory data stream of moving objects., , , , and . Comput. Sci. Inf. Syst., 10 (3): 1293-1317 (2013)Performance Analysis of Distributed OSTBC-MIMO Systems Using Adaptive M-QAM Transmission over i.n.i.d. Generalized-K Fading Channels., and . IEICE Transactions, 100-B (5): 843-851 (2017)Edge Computing-Based ID and nID Combined Identification and Resolution Scheme in IoT., , , , , and . IEEE Internet of Things Journal, 6 (4): 6811-6821 (2019)Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks., , , and . Wireless Communications and Mobile Computing, (2018)