Author of the publication

General framework for group robotics with applications in mining.

, , , , , and . Mobile Robots / Telemanipulator and Telepresence Technologies, volume 4195 of SPIE Proceedings, page 48-56. SPIE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control of mobile robots in unstructured environments using discrete event modeling., , and . Mobile Robots, volume 3838 of SPIE Proceedings, page 275-283. SPIE, (1999)A Guide for Building the Knowledgebase for Software Entrepreneurs, Firms, and Professional Students., , , , , and . SERA, page 165-171. IEEE Computer Society, (2018)Enhancing Product Market Payoff in Small and Medium Internet-Based Firms: A Survey-Based Analysis of Innovation and Competition Factors., , and . ICSBT, page 154-161. SCITEPRESS, (2023)Green Computing Adoption: Understanding the Role of Individual, Social, and Organizational Factors., , , , and . ENASE, page 529-536. SCITEPRESS, (2024)General framework for group robotics with applications in mining., , , , , and . Mobile Robots / Telemanipulator and Telepresence Technologies, volume 4195 of SPIE Proceedings, page 48-56. SPIE, (2000)A New Process Model of Incremental Asset Building for Software Project Management., , , and . SERA, page 86-90. IEEE, (2021)Discrete event modeling of coordinated navigation of multiple mobile robots., , and . Mobile Robots, volume 3838 of SPIE Proceedings, page 190-199. SPIE, (1999)Influential Factors of Software Firms' Performance in the Industry of Developing Countries., , , , , , and . ENASE, page 547-554. SCITEPRESS, (2024)Market Analysis as a Possible Activity of Software Project Management., , , , and . SERA, page 180-183. IEEE Computer Society, (2018)Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy., , , , and . ICCTA, page 38-45. ACM, (2021)