Author of the publication

Security Games in the Field: Deployments on a Transit System.

, , , , , , , and . EMAS@AAMAS, volume 8758 of Lecture Notes in Computer Science, page 103-126. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quick, unconstrained, approximate l-shape method., , , , and . SIGGRAPH Posters, page 85:1-85:2. ACM, (2016)A nonlinear feedback controller for aerial self-righting by a tailed robot., , , , and . ICRA, page 32-39. IEEE, (2013)Dense Nonrigid Ground Truth for Optical Flow in Real-World Scenes., , , and . CoRR, (2016)Deep Reinforcement Learning for Dexterous Manipulation with Concept Networks., , , , , , and . CoRR, (2017)Neural network vehicle models for high-performance automated driving., , , , and . Sci. Robotics, (2019)Whole-genome sequencing of patients with rare diseases in a national health system., , , , , , , , , and 439 other author(s). Nat., 583 (7814): 96-102 (2020)Robust Stabilization and Collision Avoidance through Minimizing Open-Loop Velocity Uncertainty., and . IV, page 259-264. IEEE, (2020)A lab by any other name: integrating traditional labs and computer-supported collaborative investigations in science classrooms., and . CSCL, page 8. International Society of the Learning Sciences, (1999)Comment on "The Geometry of Musical Chords", and . Science, 315 (5810): 330b- (2007)Multi-objective optimization for security games., , , , and . AAMAS, page 863-870. IFAAMAS, (2012)