{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T18:00:23Z","timestamp":1775844023544,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004359","name":"Vetenskapsr\u00e5det","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Control Syst. Lett."],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/lcsys.2019.2919832","type":"journal-article","created":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:01:33Z","timestamp":1559160093000},"page":"954-959","source":"Crossref","is-referenced-by-count":14,"title":["A Graph-Theoretic Approach to the ${\\mathcal{H}}_{\\infty}$  Performance of Leader\u2013Follower Consensus on Directed Networks"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2677-2140","authenticated-orcid":false,"given":"Mohammad","family":"Pirani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1835-2963","authenticated-orcid":false,"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9940-5929","authenticated-orcid":false,"given":"Karl Henrik","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2481978"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.01.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2016.2600026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.2872"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.09.034"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2014.04.014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2509782"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6859421"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/060674909"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.034"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2547982"},{"key":"ref27","author":"flannery","year":"1986","journal-title":"Numerical Recipes The Art of Scientific Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2205429"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2756346"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2010.5531506"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2366980"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2008.01.002"},{"key":"ref2","author":"dullerud","year":"2010","journal-title":"A Course in Robust Control Theory A Convex Approach"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2015.2481138"},{"key":"ref1","author":"zhou","year":"1996","journal-title":"Robust and Optimal Control"},{"key":"ref20","author":"williamson","year":"1985","journal-title":"Combinatorics for Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/9781118033029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26977-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.237"},{"key":"ref23","article-title":"A graph-theoretic approach to the \n$\\mathcal{H}_{\\infty}$\n performance of dynamical systems on directed and undirected networks","author":"pirani","year":"2018","journal-title":"arXiv preprint arXiv 1804 10204"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921681"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798672"}],"container-title":["IEEE Control Systems Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7782633\/8728288\/08725583.pdf?arnumber=8725583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:14:51Z","timestamp":1657746891000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8725583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":27,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/lcsys.2019.2919832","relation":{},"ISSN":["2475-1456"],"issn-type":[{"value":"2475-1456","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}