Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Competitive Perimeter Defense of Conical Environments., , , , , , and . CDC, page 6586-6593. IEEE, (2022)Pursuit-Evasion on a Sphere and When It Can Be Considered Flat., , , , , and . CoRR, (2024)Relational Maneuvering of Leader-Follower Unmanned Aerial Vehicles for Flexible Formation., , , , and . IEEE Trans. Cybern., 54 (10): 5598-5609 (October 2024)A Kinematic Rejoin Method for Active Defense of Non-Maneuverable Aircraft., , and . ACC, page 6533-6538. IEEE, (2018)Circular Rejoin in 3D Using Bézier Paths., , , , and . CCTA, page 600-605. IEEE, (2020)On Improving the Potential Field Method for Ring Formation., , , and . ACC, page 4727-4732. IEEE, (2022)Implementation of Split-Cycle Control for Micro Aerial Vehicles., , , and . RiTA, volume 274 of Advances in Intelligent Systems and Computing, page 859-876. Springer, (2013)The Synthesis of Optimal Control Laws Using Isaacs' Method for the Solution of Differential Games., and . J. Optim. Theory Appl., 202 (3): 1137-1157 (September 2024)Persistent Monitoring by Multiple Unmanned Aerial Vehicles Using Bernstein Polynomials., , , , and . J. Optim. Theory Appl., 191 (2): 899-916 (2021)Optimal Trajectories for Aircraft Avoidance of Multiple Weapon Engagement Zones., , , and . J. Aerosp. Inf. Syst., 20 (8): 520-525 (2023)