Author of the publication

Cooperative Multi-agent Systems for the Multi-target $$$$-Coverage Problem.

, , and . ICAART (Revised Selected Papers), volume 12613 of Lecture Notes in Computer Science, page 106-131. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PEAS: A Performance Evaluation Framework for Auto-Scaling Strategies in Cloud Applications., , , , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 1 (4): 15:1-15:31 (2016)Methodological Principles for Reproducible Performance Evaluation in Cloud Computing, , , , , , , , , and . IEEE Transactions on Software Engineering, 47 (8): 1528-1543 (July 2019)Ethics of Autonomous Collective Decision-Making: The Caesar Framework., , , and . Sci. Eng. Ethics, 28 (6): 61 (2022)A control-theoretical approach to thread scheduling for multicore processors., , , and . CCA, page 1103-1110. IEEE, (2015)Fogification of industrial robotic systems: research challenges., , , , and . IoT-Fog@IoTDI, page 41-45. ACM, (2019)Classification of PROFINET I/O Configurations utilizing Neural Networks., , , , and . ETFA, page 1321-1324. IEEE, (2019)Towards a Framework for Safe and Secure Adaptive Collaborative Systems., , and . COMPSAC (2), page 165-170. IEEE, (2019)Control-theoretical load-balancing for cloud applications with brownout., , , , , , , and . CDC, page 5320-5327. IEEE, (2014)Real-Time Containers: A Survey., , , and . Fog-IoT, volume 80 of OASIcs, page 7:1-7:9. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Optimization-based attack against control systems with CUSUM-based anomaly detection., , and . MED, page 896-901. IEEE, (2022)