{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:36:06Z","timestamp":1729625766249,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/acc.2014.6859284","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T17:01:49Z","timestamp":1406653309000},"page":"1761-1768","source":"Crossref","is-referenced-by-count":5,"title":["Incremental minimum-violation control synthesis for robots interacting with external agents"],"prefix":"10.1109","author":[{"given":"Pratik","family":"Chaudhari","sequence":"first","affiliation":[]},{"given":"Tichakorn","family":"Wongpiromsarny","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Frazzoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MEMCOD.2004.1459815"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45931-6_19"},{"journal-title":"Introduction to the Theory of Computation","year":"2012","author":"sipser","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1177\/0278364911406761"},{"key":"16","article-title":"Incremental sampling-based algorithm for minimum-violation motion planning","author":"castro","year":"2013","journal-title":"Proc of IEEE International Conference on Decision and Control (CDC)"},{"key":"13","first-page":"71","article-title":"Incremental sampling-based algorithms for a class of pursuit-evasion games","author":"karaman","year":"2011","journal-title":"Algorithmic Foundations of Robotics IX"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6315419"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.886494"},{"key":"12","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1755952.1755968","article-title":"Receding horizon control for temporal logic specifications","author":"wongpiromsarn","year":"2010","journal-title":"Proc of ACM Int Conf on Hybrid Systems Computation and Control"},{"key":"21","first-page":"1","article-title":"Least-violating control strategy synthesis with safety rules","author":"tumova","year":"2013","journal-title":"Proc of Conference on Hybrid Systems Computation and Control"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46002-0_30"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1972.1100179"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2000.912736"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2007.4434966"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.2307\/2372560"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2013.6631297"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25591-5_21"},{"journal-title":"Differential Games A Mathematical Theory With Applications to Warfare and Pursuit Control and Optimization","year":"1999","author":"isaacs","key":"3"},{"key":"2","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-642-36279-8_29","article-title":"Intention-aware motion planning","author":"bandyopadhyay","year":"2013","journal-title":"Algorithmic Foundations of Robotics X"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161122"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.20262"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2514\/2.4832"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195999000273"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.851439"},{"key":"4","volume":"200","author":"basar","year":"1995","journal-title":"Dynamic Noncooperative Game Theory"},{"key":"9","volume":"3","author":"sethian","year":"1999","journal-title":"Level Set Methods and Fast Marching Methods"},{"key":"8","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/BF00939877","article-title":"Complex differential games of pursuit-evasion type with state constraints, Part 2: Numerical computation of optimal open-loop strategies","volume":"78","author":"breitner","year":"1993","journal-title":"Journal of Optimization Theory and Applications"}],"event":{"name":"2014 American Control Conference - ACC 2014","start":{"date-parts":[[2014,6,4]]},"location":"Portland, OR, USA","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 American Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849600\/6858556\/06859284.pdf?arnumber=6859284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T12:02:11Z","timestamp":1689422531000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/acc.2014.6859284","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}