1. Springer Tracts in Advanced Robotics;JJ Abbot,2007
2. Aneja, Y.P., Parlar, M.: Algorithms for weber facility location in the presence of forbidden regions and/or barriers to travel. Transp. Sci. 28(1), 70–76 (1994). doi:
10.1287/trsc.28.1.70
3. Brooks, F.P.: The Mythical Man-Month - Essays in Software Engineering – Anniversary. Addison-Wesley, Boston (1995)
4. Devadas, V., Aydin, H.: Real-time dynamic power management through device forbidden regions. In: Proceeding IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 34–44 (2008). doi:
10.1109/RTAS.2008.21
5. Exman, I.: Linear software models, extended abstract. In: Jacobson, I., Goedicke, M., Johnson, P. (eds.) Proceeding. GTSE 2012, SEMAT Workshop on a General Theory of Software Engineering, pp. 23–24. KTH Royal Institute of Technology, Stockholm (2012)