Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Errore di sistema. Teorie e pratiche di Adbusters, , and . Nuova serie Feltrinelli Feltrinelli, (2003)Nonlinear control of a tethered UAV: The taut cable case., , and . Autom., (2017)Low-Complexity Fast Charging Strategies Based on Explicit Reference Governors for Li-Ion Battery Cells., , , , , and . IEEE Trans. Control. Syst. Technol., 29 (4): 1597-1608 (2021)A Feasibility Governor for Enlarging the Region of Attraction of Linear Model Predictive Controllers., , , , and . CoRR, (2020)Real-time constraint-based planning and control of robotic manipulators for safe human-robot collaboration., , , and . Robotics Comput. Integr. Manuf., (June 2024)Semi-automated wrapping of defenses (SAWD) for cyber command and control., , , and . MILCOM, page 19-24. IEEE, (2016)NextVC2 - A next generation virtual world command and control., and . MILCOM, page 1-6. IEEE, (2012)Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study., , , , , and . NCA, page 118-121. IEEE Computer Society, (2009)Nonlinear control of an actuated tethered airfoil., , , and . MED, page 1412-1417. IEEE, (2014)Using Ontologies to Quantify Attack Surfaces., , , , , and . STIDS, volume 1788 of CEUR Workshop Proceedings, page 10-18. CEUR-WS.org, (2016)