Author of the publication

Generating Dominant Strategies for Continuous Two-Player Zero-Sum Games.

, , , , and . ADHS, volume 51 of IFAC-PapersOnLine, page 7-12. Elsevier, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards trustworthy automation: User interfaces that convey internal and external awareness., , , , , and . ITSC, page 682-688. IEEE, (2016)An introductory capstone design course on embedded systems., , and . ISCAS, page 1199-1202. IEEE, (2011)User interface design and verification for semi-autonomous driving., , , , and . HiCoNS, page 63-64. ACM, (2014)A Graphical Environment for the Specification and Verification of Reactive Systems., , , and . SAFECOMP, volume 1698 of Lecture Notes in Computer Science, page 431-444. Springer, (1999)Verifying High-Confidence Interactive Systems: Electronic Voting and Beyond.. ICDCN, volume 7730 of Lecture Notes in Computer Science, page 1-10. Springer, (2013)Deciding Separation Formulas with SAT., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 209-222. Springer, (2002)Modeling and Verifying Systems Using a Logic of Counter Arithmetic with Lambda Expressions and Uninterpreted Functions., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 78-92. Springer, (2002)Understanding and Extending Incremental Determinization for 2QBF., , , and . CoRR, (2019)Maximum Model Counting., , and . AAAI, page 3885-3892. AAAI Press, (2017)Robust strategy synthesis for probabilistic systems applied to risk-limiting renewable-energy pricing., , and . EMSOFT, page 13:1-13:10. ACM, (2014)