Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating and Automating the Free Energy Perturbation Absolute Binding Free Energy Calculation with the RED-E Function., , , , , and . J. Chem. Inf. Model., 63 (24): 7755-7767 (December 2023)Cross-Layer Adaptation with Safety-Assured Proactive Task Job Skipping., , , , and . ACM Trans. Embed. Comput. Syst., 20 (5s): 100:1-100:25 (2021)REGLO: Provable Neural Network Repair for Global Robustness Properties., , , , , , , , and . AAAI, page 12061-12071. AAAI Press, (2024)Programmatic Reward Design by Example., and . AAAI, page 9233-9241. AAAI Press, (2022)GeoCamera: Telling Stories in Geographic Visualizations with Camera Movements., , , , , , , and . CHI, page 170:1-170:15. ACM, (2023)A Data Representation and Resource Allocation Approach for Intelligent Network Architecture., , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1976-1983. IEEE, (2022)Opportunistic Communication with Latency Guarantees for Intermittently-Powered Devices., , , , , and . DATE, page 1093-1098. IEEE, (2022)A Hierarchical Bayesian Approach to Inverse Reinforcement Learning with Symbolic Reward Machines., and . ICML, volume 162 of Proceedings of Machine Learning Research, page 27159-27178. PMLR, (2022)Towards Verification-Aware Knowledge Distillation for Neural-Network Controlled Systems: Invited Paper., , , , and . ICCAD, page 1-8. ACM, (2019)Masquerade Attack Detection Through Observation Planning for Multi-Robot Systems., , and . AAMAS, page 2262-2264. International Foundation for Autonomous Agents and Multiagent Systems, (2019)