Tao Zou

According to our database1, Tao Zou authored at least 35 papers between 2004 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


A Framework for Adaptive Predictive Control System Based on Zone Control.
IEEE Access, 2018

An Offline Optimization and Online Table Look-Up Strategy of Two-Layer Model Predictive Control.
IEEE Access, 2018

Optimal layout and deployment for RFID system using a novel hybrid artificial bee colony optimizer based on bee life-cycle model.
Soft Comput., 2017

Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers.
Ad Hoc Networks, 2017

Building a Hybrid Warehouse: Efficient Joins between Data Stored in HDFS and Enterprise Warehouse.
ACM Trans. Database Syst., 2016

Analysis and correction of ill-conditioned model in multivariable model predictive control.
IJMIC, 2016

A SVR Learning Based Sensor Placement Approach for Nonlinear Spatially Distributed Systems.
Applied Comp. Int. Soft Computing, 2016

State estimation of wastewater treatment processes using distributed extended Kalman filters.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

ClouDiA: a deployment advisor for public clouds.
VLDB J., 2015

Hilbert marginal spectrum analysis for automatic seizure detection in EEG signals.
Biomed. Signal Proc. and Control, 2015

Analysis and Correction of Ill-Conditioned Model in Multivariable Model Predictive Control.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Joins for Hybrid Warehouses: Exploiting Massive Parallelism in Hadoop and Enterprise Data Warehouses.
Proceedings of the 18th International Conference on Extending Database Technology, 2015

Asymptotically necessary and sufficient stability conditions for discrete-time Takagi-Sugeno model: Extended applications of Polya's theorem and homogeneous polynomials.
J. Franklin Institute, 2014

Uniform Stability of a Class of Fractional-Order Nonautonomous Systems with Multiple Time Delays.
J. Applied Mathematics, 2014

Mathematical Approaches in Advanced Control Theories 2013.
J. Applied Mathematics, 2014

A Network Forensics System for Information Leak Events.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

An Online Trend Analysis Method for Measuring Data Based on Historical Data Clustering.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

Tango: distributed data structures over a shared log.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

ClouDiA: A Deployment Advisor for Public Clouds.
PVLDB, 2012

Offset-Free Strategy by Double-Layered Linear Model Predictive Control.
J. Applied Mathematics, 2012

A finite-time approach to formation control of multiple mobile robots with terminal sliding mode.
Int. J. Systems Science, 2012

Stabilization via extended nonquadratic boundedness for constrained nonlinear systems in Takagi-Sugeno's form.
J. Franklin Institute, 2011

Geometric characterization of multi-input lower-triangular forms.
SCIENCE CHINA Information Sciences, 2011

Data-driven based 3-D fuzzy logic controller design using nearest neighborhood clustering and linear support vector regression.
Proceedings of the FUZZ-IEEE 2011, 2011

Making time-stepped applications tick in the cloud.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

CRBT customer churn prediction: can data mining techniques work?
IJNVO, 2010

Energy-Efficient Sensor Data Acquisition Based on Periodic Patterns.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Asymptotically necessary and sufficient stability with respect to nonquadratic Lyapunov function for Takagi-Sugeno model.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Improving performance of intrusion detection system by applying a new machine learning strategy.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

Network security simulation and evaluation.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

A modified direct data domain method in spacetime adaptive processing.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

A Trusted Third Party Based Secure Authentication Scheme of E-Commerce.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Improved Key Management Scheme for WEP.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection.
Proceedings of the Networking, 2005

Finding the fuzzy satisfying solutions to constrained optimal control systems and application to robot path planning.
Int. J. General Systems, 2004