Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accepting the inevitable: factoring the user into home computer security., , , , and . CODASPY, page 325-332. ACM, (2013)Guidelines for a Human-Robot Interaction Specification Language., , and . RO-MAN, page 1-8. IEEE, (2023)Learning from planner performance., and . Artif. Intell., 173 (5-6): 536-561 (2009)Understanding Algorithm Performance on an Oversubscribed Scheduling Application, , , and . CoRR, (2011)Understanding Algorithm Performance on an Oversubscribed Scheduling Application., , , and . J. Artif. Intell. Res., (2006)ActorSim, A Toolkit for Studying Cross-Disciplinary Challenges in Autonomy., , , , , and . AAAI Fall Symposia, AAAI Press, (2016)A Hierarchical Goal-Biased Curriculum for Training Reinforcement Learning., , , , , , and . FLAIRS, (2022)Improving the Scalability of Parallel Jobs by adding Parallel Awareness to the Operating System., , , , , , , , , and 1 other author(s). SC, page 10. ACM, (2003)A Unification of Models of Tethered Satellites., , and . SIAM J. Appl. Dyn. Syst., 10 (3): 1042-1069 (2011)Models of Intervention: Helping Agents and Human Users Avoid Undesirable Outcomes., , and . Frontiers Artif. Intell., (2021)