Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model., , and . JoWUA, 7 (1): 97-117 (2016)The Temporal Logic of Causal Structures, and . CoRR, (2012)Reevaluating Assembly Evaluations with Feature Response Curves: GAGE and Assemblathons, , and . CoRR, (2012)Descrete Events Models + Temporal Logic = Supervisory Controller: Automatic Synthesis of Locomotion Controllers., and . ICRA, page 1441-1446. IEEE Computer Society, (1995)Decidability of Robot Manipulation Planning: Three Disks in the Plane., , and . WAFR, volume 107 of Springer Tracts in Advanced Robotics, page 641-657. Springer, (2014)Cyber Security via Minority Games with Epistatic Signaling., , , , , and . BICT, ICST, (2014)Cyber Security via Signaling Games: Toward a Science of Cyber Security., , , , , , , and . ICDCIT, volume 8337 of Lecture Notes in Computer Science, page 34-42. Springer, (2014)Composing Semi-algebraic O-Minimal Automata., , , and . HSCC, volume 4416 of Lecture Notes in Computer Science, page 668-671. Springer, (2007)False Positives in Genomic Map Assembly and Sequence Validation., and . WABI, volume 2149 of Lecture Notes in Computer Science, page 27-40. Springer, (2001)Simultaneously Segmenting Multiple Gene Expression Time Courses by Analyzing Cluster Dynamics., , , , and . J. Bioinformatics and Computational Biology, 7 (2): 339-356 (2009)