Author of the publication

Logic-Based Ethical Planning (short paper).

, , , and . CAKR@IJCAI, volume 3251 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logic-Based Ethical Planning., , , and . AI*IA, volume 13796 of Lecture Notes in Computer Science, page 198-211. Springer, (2022)Logic-Based Ethical Planning (short paper)., , , and . CAKR@IJCAI, volume 3251 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Anticipating Responsibility in Multiagent Planning., , and . ECAI, volume 372 of Frontiers in Artificial Intelligence and Applications, page 1859-1866. IOS Press, (2023)Ethical Planning with Multiple Temporal Values., , , , and . Robophilosophy, volume 366 of Frontiers in Artificial Intelligence and Applications, page 435-444. IOS Press, (2022)Moral Planning Agents with LTL Values., , and . IJCAI, page 418-426. ijcai.org, (2023)Extraterrestrial coastal geomorphology, and . Geomorphology, 37 (3-4): 303--328 (April 2001)High-Performance Electron Acceptor with Thienyl Side Chains for Organic Photovoltaics, , , , , , , , , and 3 other author(s). Journal of the American Chemical Society, 138 (14): 4955-4961 (2016)PMID: 27015115.Techniques for identifying dust devils in Mars Pathfinder images., , , , and . IEEE Trans. Geosci. Remote. Sens., 38 (2): 870-876 (2000)A Stochastic Model for Quantitative Security Analyses of Networked Systems., , and . IEEE Trans. Dependable Secur. Comput., 8 (1): 28-43 (2011)Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data., , , and . IEEE Trans. Inf. Forensics Secur., 6 (1): 39-52 (2011)