Author of the publication

Grounding Complex Natural Language Commands for Temporal Tasks in Unseen Environments.

, , , , , , and . CoRL, volume 229 of Proceedings of Machine Learning Research, page 1084-1110. PMLR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Appraisal of Statistical Practices in HRI vis-a-vis the T-Test for Likert Items/Scales., and . AAAI Fall Symposia, AAAI Press, (2016)VULCON: A System for Vulnerability Prioritization, Mitigation, and Management., , , , and . ACM Trans. Priv. Secur., 21 (4): 16:1-16:28 (2018)Imprecise Label Learning: A Unified Framework for Learning with Various Imprecise Label Configurations., , , , , , , , and . CoRR, (2023)Temporal Logic Imitation: Learning Plan-Satisficing Motion Policies from Demonstrations., , , , and . CoRL, volume 205 of Proceedings of Machine Learning Research, page 94-105. PMLR, (2022)Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS., , , , , and . DSC, page 1-8. IEEE, (2023)Silicon Proven Timing Signoff Methodology using Hazard-Free Robust Path Delay Tests., , and . VTS, page 1-6. IEEE, (2019)Bayesian Inference of Linear Temporal Logic Specifications for Contrastive Explanations., , , , and . IJCAI, page 5591-5598. ijcai.org, (2019)A Parallel Algorithm for Spectrum-based Short Read Error Correction., , and . IPDPS, page 60-70. IEEE Computer Society, (2012)Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework., , and . CoRR, (2022)Framework for evaluation of sound event detection in web videos., , , , and . CoRR, (2017)