Author of the publication

Counter-Example Guided Imitation Learning of Feedback Controllers from Temporal Logic Specifications.

, , , , and . CDC, page 5339-5344. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Algorithm of Fault Recovery for Stateful Failover., and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 738-749. Springer, (2007)A reinforcement model for collaborative security and Its formal analysis., and . NSPW, page 101-114. ACM, (2009)Location Verification Based Defense Against Sybil Attack in Sensor Networks., and . ICDCN, volume 4308 of Lecture Notes in Computer Science, page 509-521. Springer, (2006)A Finite State Modeling of AFDX Frame Management Using Spin., and . FMICS/PDMC, volume 4346 of Lecture Notes in Computer Science, page 227-243. Springer, (2006)An Online Planning Framework for Multi-Robot Systems with LTL Specification., and . ICCPS, page 180-191. IEEE, (2024)Automatic Dimensional Analysis of Cyber-Physical Systems., , and . FM, volume 7436 of Lecture Notes in Computer Science, page 356-371. Springer, (2012)Antlab: A Multi-Robot Task Server., , and . ACM Trans. Embed. Comput. Syst., 16 (5s): 190:1-190:19 (2017)Automated composition of motion primitives for multi-robot systems from safe LTL specifications., , , , and . IROS, page 1525-1532. IEEE, (2014)Safe Self-Triggered Control Based on Precomputed Reachability Sequences., , and . HSCC, page 7:1-7:12. ACM, (2023)Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 292-300. Springer, (2009)