{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:23Z","timestamp":1750220903830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T00:00:00Z","timestamp":1578787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National first class discipline program of light industry technology engineering","award":["LITE 2018-17"],"award-info":[{"award-number":["LITE 2018-17"]}]},{"name":"natioanl nature science foundation of china","award":["61773011"],"award-info":[{"award-number":["61773011"]}]},{"name":"the Ministry of Education of China under the 111 Project","award":["B12018"],"award-info":[{"award-number":["B12018"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,12]]},"DOI":"10.1145\/3378936.3378975","type":"proceedings-article","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T12:09:51Z","timestamp":1583582991000},"page":"32-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Anti-disturbance Control Based On Uncertain Data"],"prefix":"10.1145","author":[{"given":"Peng","family":"Cheng","sequence":"first","affiliation":[{"name":"Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), School of Internet of Things, Jiangnan University, Wuxi, China"}]},{"given":"Feng","family":"Pan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), School of Internet of Things, Jiangnan University, Wuxi, China"}]},{"given":"Yanyan","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, Western Australia"}]},{"given":"Lingshuang","family":"Kong","sequence":"additional","affiliation":[{"name":"College of Electrical and Information Engineering, Hunan University of Technology, Zhuzhou China"}]},{"given":"Song","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, Western Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0207-6","volume-title":"Robust control: the parameter space approach","author":"Ackermann J.","year":"2002","unstructured":"J. Ackermann , Robust control: the parameter space approach , Springer-Verlag , London , 2002 . J. Ackermann, Robust control: the parameter space approach, Springer-Verlag, London, 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/3516.588624"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.906187"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/87.748147"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2409951"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2358680"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4097"},{"issue":"17","key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"3937","DOI":"10.1002\/rnc.3774","article-title":"Constrained control of uncertain nonhomogeneous Markovian jump systems","volume":"27","author":"Yin Y.","year":"2017","unstructured":"Y. Yin and Z. Lin , Constrained control of uncertain nonhomogeneous Markovian jump systems , International Journal of Robust and Nonlinear Control , vol. 27 , no. 17 , pp. 3937 -- 3950 , 2017 . Y. Yin and Z. Lin, Constrained control of uncertain nonhomogeneous Markovian jump systems, International Journal of Robust and Nonlinear Control, vol. 27, no. 17, pp. 3937--3950, 2017.","journal-title":"International Journal of Robust and Nonlinear Control"},{"key":"e_1_3_2_1_9_1","volume-title":"New tools for robustness of linear systems","author":"Barmish B. R.","year":"1994","unstructured":"B. R. Barmish , New tools for robustness of linear systems , New York , MacMillan , 1994 . B. R. Barmish, New tools for robustness of linear systems, New York, MacMillan, 1994."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970777","volume-title":"Linear Matrix Inequalities in System and Control Theory","author":"Boyd S.","year":"1994","unstructured":"S. Boyd , L. E. Ghaoui , E. Feron , and V. Balakrishnan , Linear Matrix Inequalities in System and Control Theory . Philadelphia, PA : SIAM , vol. 15 , Studies in Applied Mathematics, 1994 . S. Boyd, L. E. Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory. Philadelphia, PA: SIAM, vol. 15, Studies in Applied Mathematics, 1994."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(96)00033-7"},{"key":"e_1_3_2_1_12_1","volume-title":"A Unified Algebraic Approach to Linear Control Design","author":"Skelton R. E.","year":"1998","unstructured":"R. E. Skelton , T. Iwasaki , and K. Grigoriadis , A Unified Algebraic Approach to Linear Control Design . London, U.K. : Taylor and Francis , 1998 . R. E. Skelton, T. Iwasaki, and K. Grigoriadis, A Unified Algebraic Approach to Linear Control Design. London, U.K.: Taylor and Francis, 1998."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.05.039"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4447"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2019.9.5.857"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2019.9.5.848"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/050622328"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.11.004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2009.07.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.978"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2511450"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2529238"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.875041"}],"event":{"name":"ICSIM '20: The 3rd International Conference on Software Engineering and Information Management","sponsor":["University of Science and Technology of China University of Science and Technology of China"],"location":"Sydney NSW Australia","acronym":"ICSIM '20"},"container-title":["Proceedings of the 3rd International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378936.3378975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:48Z","timestamp":1750203888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,12]]},"references-count":23,"alternative-id":["10.1145\/3378936.3378975","10.1145\/3378936"],"URL":"https:\/\/doi.org\/10.1145\/3378936.3378975","relation":{},"subject":[],"published":{"date-parts":[[2020,1,12]]},"assertion":[{"value":"2020-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}