Author of the publication

Environment Characterization for Non-recontaminating Frontier-Based Robotic Exploration.

, , , and . PRIMA, volume 7047 of Lecture Notes in Computer Science, page 19-35. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying timing properties of concurrent algorithms., , , and . FORTE, volume 6 of IFIP Conference Proceedings, page 259-273. Chapman & Hall, (1994)Reliable Broadcast in Networks with Nonprogrammable Servers., , and . ICDCS, page 428-437. IEEE Computer Society, (1988)On the Borowsky-Gafni Simulation Algorithm., and . ISTCS, page 4-15. IEEE Computer Society, (1996)Safety Verification for Automated Platoon Maneuvers: A Case Study., and . HART, volume 1201 of Lecture Notes in Computer Science, page 154-170. Springer, (1997)Computer-Assisted Simulation Proofs., , , , and . CAV, volume 697 of Lecture Notes in Computer Science, page 305-319. Springer, (1993)Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service., , and . DISC, volume 1499 of Lecture Notes in Computer Science, page 258-272. Springer, (1998)Specifications and Proofs for Ensemble Layers., , and . TACAS, volume 1579 of Lecture Notes in Computer Science, page 119-133. Springer, (1999)A General Characterization of Indulgence., and . SSS, volume 4280 of Lecture Notes in Computer Science, page 16-34. Springer, (2006)Modeling Radio Networks., and . CONCUR, volume 5710 of Lecture Notes in Computer Science, page 481-495. Springer, (2009)Random Sketching, Clustering, and Short-Term Memory in Spiking Neural Networks., , , and . ITCS, volume 151 of LIPIcs, page 23:1-23:31. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)