Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized synchronization protocols with nearest neighbor communication., and . SenSys, page 62-68. ACM, (2004)Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints., and . CDC, page 1109-1114. IEEE, (2008)JHUAPL TAC-KBP2013 Slot Filler Validation System., , , and . TAC, NIST, (2013)Local distance metric learning for efficient conformal predictors., , and . MLSP, page 1-6. IEEE, (2012)A Risk-Sensitive Approach to Policy Optimization., , , , and . AAAI, page 15019-15027. AAAI Press, (2023)Deep CPT-RL: Imparting Human-Like Risk Sensitivity to Artificial Agents., , and . SafeAI@AAAI, volume 2808 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Automatic recognition and assignment of missile pieces in clutter., , and . IJCNN, page 3177-3181. IEEE, (1999)Stochastic optimisation with inequality constraints using simultaneous perturbations and penalty functions., and . Int. J. Control, 81 (8): 1232-1238 (2008)Out-of-Distribution Robustness with Deep Recursive Filters., , and . ICRA, page 14134-14140. IEEE, (2021)Jacks of All Trades, Masters of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks., , , , and . ECCV Workshops (1), volume 12535 of Lecture Notes in Computer Science, page 105-119. Springer, (2020)