Probabilistic verification techniques have been applied to the formal modelling and analysis of a wide range of systems, from communication protocols such as Bluetooth, to nanosca...
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
We present an empirical investigation of video-mediated free play between 13 pairs of friends (ages 7 and 8). The pairs spent 10 minutes playing with each of four different protot...
Svetlana Yarosh, Kori M. Inkpen, A. J. Bernheim Br...
Abstract— We present an approach for smooth and collisionfree navigation of multiple mobile robots amongst each other. Each robot senses its surroundings and acts independently w...
Jamie Snape, Jur P. van den Berg, Stephen J. Guy, ...
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...