— This research identifies a strategy called compliant formation control, which may be used to coordinate the navigational structure of a team of autonomous vehicles. This techni...
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
A new imaging approach has been identified and studied in a preliminary way by simulation. The new approach is prompt gamma-ray imaging (PGI) and it is suggested for use on small ...
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...