Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Differential Privacy for Symbolic Systems., , and . CoRR, (2018)Persistent surveillance for unmanned aerial vehicles subject to charging and temporal logic constraints., , , , , and . Auton. Robots, 40 (8): 1363-1378 (2016)Safety-Aware Task Composition for Discrete and Continuous Reinforcement Learning., , and . CoRR, (2023)Robust Multi-Agent Coordination from CaTL+ Specifications., , , and . ACC, page 3529-3534. IEEE, (2023)Learning Minimally-Violating Continuous Control for Infeasible Linear Temporal Logic Specifications., , , , and . ACC, page 1446-1452. IEEE, (2023)Privacy in Feedback: The Differentially Private LQG., , and . ACC, page 3386-3391. IEEE, (2018)Control in belief space with Temporal Logic specifications., , , , , and . CDC, page 7419-7424. IEEE, (2016)Data analytics for fault prediction and diagnosis in wind turbines.. University College Cork, Republic of Ireland, (2018)base-search.net (ftunivcollcork:oai:cora.ucc.ie:10468/7375).Rewrite-Based Decomposition of Signal Temporal Logic Specifications., , and . NFM, volume 13903 of Lecture Notes in Computer Science, page 224-240. Springer, (2023)Centralized Multi-agent Synthesis with Spatial Constraints via Mixed-Integer Quadratic Programming., , and . NFM, volume 13903 of Lecture Notes in Computer Science, page 191-206. Springer, (2023)