Author of the publication

A Computational Model of Human-Robot Spatial Interactions Based on a Qualitative Trajectory Calculus.

, , , , and . Robotics, 4 (1): 63-102 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A software controlled voltage tuning system using multi-purpose ring oscillators., and . CoRR, (2015)An Assurance-based Approach to Verification and Validation of Human-Robot Teams., , , , , , and . CoRR, (2016)Lost in translation: Exposing hidden compiler optimization opportunities., , , , and . CoRR, (2019)Risk-Based Triggering of Bio-inspired Self-preservation to Protect Robots from Threats., , and . TAROS, volume 10454 of Lecture Notes in Computer Science, page 166-181. Springer, (2017)Towards Automating Simulation-Based Design Verification Using ILP., , and . ILP, volume 4455 of Lecture Notes in Computer Science, page 154-168. Springer, (2006)Inferring Parametric Energy Consumption Functions at Different Software Levels: ISA vs. LLVM IR., , , , , , and . FOPARA, volume 9964 of Lecture Notes in Computer Science, page 81-100. (2015)Introducing XCS to Coverage Directed test Generation., , and . HLDVT, page 57-64. IEEE Computer Society, (2011)Verification of control systems implemented in simulink with assertion checks and theorem proving: A case study., , and . ECC, page 2670-2675. IEEE, (2015)Run-Time Power Modelling in Embedded GPUs with Dynamic Voltage and Frequency Scaling., , , and . PARMA-DITAM@HiPEAC, page 2:1-2:6. ACM, (2020)Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices., , and . IACR Cryptology ePrint Archive, (2015)