Author of the publication

A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader.

, , , and . ICRA, page 2657-2664. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Phase Transition of Finding a Biclique in a larger Bipartite Graph., , and . CoRR, (2016)Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.. MICAI (1), volume 6437 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection., , , , , and . Mach. Vis. Appl., 30 (5): 959-974 (2019)Evader surveillance under incomplete information., , and . ICRA, page 5511-5518. IEEE, (2010)Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification., , and . CIARP, volume 11896 of Lecture Notes in Computer Science, page 230-240. Springer, (2019)An Approach Based on Contrast Patterns for Bot Detection on Web Log Files., , , , and . MICAI (1), volume 11288 of Lecture Notes in Computer Science, page 276-285. Springer, (2018)FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness., , , , and . IEEE Trans. Affect. Comput., 9 (3): 372-382 (2018)On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks., , , and . Sensors, 15 (4): 7619-7649 (2015)DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks., , , , , and . IEEE Access, (2019)Editorial.. Computación y Sistemas, (2012)