From post

Decentralized Safe Control for Multi-Robot Navigation in Dynamic Environments with Limited Sensing.

, , и . AAMAS, стр. 2330-2332. International Foundation for Autonomous Agents and Multiagent Systems / ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A selective parameter-based evolutionary technique for network intrusion detection., , , и . ISDA, стр. 65-71. IEEE, (2011)Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children., , , , и . ICAPS, стр. 500-508. AAAI Press, (2023)Experiential learning in computing accessibility education., , , , , и . ICSE (Companion Volume), стр. 250-251. ACM, (2020)Decentralized Safe Control for Multi-Robot Navigation in Dynamic Environments with Limited Sensing., , и . AAMAS, стр. 2330-2332. International Foundation for Autonomous Agents and Multiagent Systems / ACM, (2024)Fog computing security: a review of current applications and security solutions., , и . J. Cloud Comput., (2017)OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories., , и . Int. J. Pattern Recognit. Artif. Intell., 35 (5): 2150017:1-2150017:31 (2021)Energy Savings under Performance Constraints via Carrier Shutdown with Bayesian Learning., , , , , , , , , и 2 other автор(ы). EuCNC/6G Summit, стр. 1-6. IEEE, (2023)An Application of Causal Bandit to Content Optimization., , , , , , , , , и 5 other автор(ы). ORSUM@RecSys, том 3303 из CEUR Workshop Proceedings, CEUR-WS.org, (2022)Causal Connections Mining Within Security Event Logs., и . K-CAP, стр. 38:1-38:4. ACM, (2017)Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network., , , и . UbiSec, том 1768 из Communications in Computer and Information Science, стр. 534-544. Springer, (2022)