Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Counterexample-Guided Synthesis of Perception Models and Control., , and . CoRR, (2019)Enforcing Almost-Sure Reachability in POMDPs., , and . CoRR, (2020)Gradient Descent over Metagrammars for Syntax-Guided Synthesis., , and . CoRR, (2020)An introductory capstone design course on embedded systems., , and . ISCAS, page 1199-1202. IEEE, (2011)Towards trustworthy automation: User interfaces that convey internal and external awareness., , , , , and . ITSC, page 682-688. IEEE, (2016)Generating Semantic Adversarial Examples with Differentiable Rendering., , , , , , and . CoRR, (2019)Learning Task Specifications from Demonstrations via the Principle of Maximum Causal Entropy., and . CoRR, (2019)Deciding Separation Formulas with SAT., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 209-222. Springer, (2002)Modeling and Verifying Systems Using a Logic of Counter Arithmetic with Lambda Expressions and Uninterpreted Functions., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 78-92. Springer, (2002)Verifying High-Confidence Interactive Systems: Electronic Voting and Beyond.. ICDCN, volume 7730 of Lecture Notes in Computer Science, page 1-10. Springer, (2013)