Skip to main content
Department of Information Technology

Publications by the Computing Science Division

2024

  1. Optimal Content Caching and Recommendation With Age of Information. Ghafour Ahani and Di Yuan. In IEEE Transactions on Mobile Computing, volume 23, number 1, pp 689-704, IEEE Computer Society, 2024. (DOI).
  2. Mental Health Professionals' Insights on Digital Health Solutions for Anxiety in the UAE. Mariam Al Meqbaali, Sofia Ouhbi, Reem K. Jan, Leena Amiri, Fadwa Al Mugaddam, Mohamed Adel Serhani, and Nazar Zaki. In 2024 IEEE 32nd International Requirements Engineering Conference Workshops (REW), IEEE International Requirements Engineering Conference Workshops, pp 362-369, Institute of Electrical and Electronics Engineers (IEEE), 2024. (DOI).
  3. Impact of Noise and Deviation Size on Deep Neural Network Performance in Photomask Classification. Vladislav Bertilsson. Student thesis, supervisor: Fredrik Jonsson, examiner: Roland Bol, Sven-Olof Nyström, UPTEC IT nr 24047, 2024. (fulltext).
  4. Empirisk Modellering av Trafikflöden: En spatio-temporal prediktiv modellering av trafikflo?den i Stockholms stad med hja?lp av neurala na?tverkEmpirical Modeling of Traffic Flow: A spatio-temporal prediction model of the traffic flow in Stockholm city using neural networks. Niclas Björkqvist and Viktor Evestam. Student thesis, supervisor: Beatrice Fritz, examiner: Elísabet Andrésdóttir, Justin Pearson, UPTEC STS nr 24040, 2024. (fulltext).
  5. Design Methods in Connected Health. Åsa Cajander, Sofia Ouhbi, Shweta Premanandan, and Awais Ahmad. In NordiCHI Adjunct 2024: Adjunct Proceedings of the 2024 Nordic Conference on Human-Computer Interaction, 2024.
  6. Adapting and Evaluating Buddy Allocators for Use Within ZGC: ZGC's New Best Friend. Norrbin Casper. Student thesis, supervisor: Erik Österlund, examiner: Roland Bol, Tobias Wrigstad, UPTEC IT nr 24022, 2024. (fulltext).
  7. Trieste: A C++ DSL for Flexible Tree Rewriting. Sylvan Clebsch, Matilda Blomqvist, Elias Castegren, Matthew A. Johnson, and Matthew J. Parkinson. In SLE '24: Proceedings of the 17th ACM SIGPLAN International Conference on Software Language Engineering, pp 184-189, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext, fulltext:print).
  8. Efficient Resource Management: A Comparison of Predictive Scaling Algorithms in Cloud-Based Applications. Johanna Dahl and Elsa Strömbäck. Student thesis, supervisor: Fredrik Hörnqvist, Simon Pettersson, examiner: Elísabet Andrésdóttir, Justin Pearson, UPTEC STS nr 24025, 2024. (fulltext).
  9. Task offloading optimization in mobile edge computing under uncertain processing cycles and intermittent communications. Tao Deng, Zhanwei Yu, and Di Yuan. In Computer Networks, volume 245, Elsevier, 2024. (DOI).
  10. Scalable Tree-based Register Automata Learning. Simon Dierl, Paul Fiterau-Brostean, Falk Howar, Bengt Jonsson, Konstantinos Sagonas, and Fredrik Tåquist. In Tools and Algorithms for the Construction and Analysis of Systems: 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6–11, 2024, Proceedings, Part II, volume 14571 of Lecture Notes in Computer Science, pp 87-108, Springer, Cham, 2024. (DOI, Fulltext, fulltext:print).
  11. Enhancing Ferry Terminal Operations: Evaluating Quality-In-Use and User Experience to Develop a Self-Service Truck Check-in System Prototype. Alexander Eriksson. Student thesis, supervisor: Jennie Hinz, examiner: Lars-Åke Nordén, Roland Bol, Jennifer Gros, UPTEC IT nr 24037, 2024. (fulltext).
  12. Maximizing Value Yield in Wood Industry through Flexible Sawing and Product Grading Based on Wane and Log Shape. Kamran Forghani, Mats Carlsson, Pierre Flener, Magnus Fredriksson, Justin Pearson, and Di Yuan. In Computers and Electronics in Agriculture, volume 216, Elsevier, 2024. (DOI).
  13. Reinforcement Learning for Dynamic Job Scheduling: Advancing Dynamic Job Scheduling on the Factory Floor using Reinforcement Learning. Rickard Forsberg. Student thesis, supervisor: Ayca Özcelikkale, examiner: Lars-Åke Nordén, Eva Darulova Bruggisser, UPTEC IT nr 24057, 2024. (fulltext).
  14. Sustainability and Usability Evaluation of E-Commerce Portals. Jose A. Garcia-Berna, Sofia Ouhbi, Juan M. Carrillo de Gea, Joaquin Nicolas, and Jose L. Fernandez-Aleman. In Good Practices and New Perspectives in Information Systems and Technologies, Vol 1, WorldCIST 2024, volume 985 of Lecture Notes in Networks and Systems, pp 204-213, Springer, 2024. (DOI).
  15. Exploring Empathy in Human - Chatbot interactions: Addressing, Verbal Abuse, and Gender Dynamics. Rutha Tesfazghi Gilazghi. Student thesis, supervisor: Virginia Grande, examiner: Mats Daniels, Didem Gürdür, IT nr IT mDV 24 001, 2024. (fulltext).
  16. Structure and dynamics of growing networks of Reddit threads. Diletta Goglia and Davide Vega D'Aurelio. In Applied Network Science, volume 9, number 1, Springer Nature, 2024. (DOI, Fulltext, fulltext:print).
  17. Student Perspectives on Using a Large Language Model (LLM) for an Assignment on Professional Ethics. Virginia Grande, Natalie Kiesler, and María Andreína Francisco Rodríguez. In Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, vol 1, ITICSE 2024, pp 478-484, Association for Computing Machinery (ACM), 2024. (DOI, fulltext:print).
  18. Persuading others using language online. Karolina Hagerman. Student thesis, supervisor: Diletta Goglia, examiner: Elísabet Andrésdóttir, Victoria Yantseva, UPTEC STS nr 24002, 2024. (fulltext).
  19. Nominal Types for Erlang. Isabell Huang, John Högberg, Kiko Fernandez-Reyes, and Tobias Wrigstad. In Erlang 2024: Proceedings of the 23rd ACM SIGPLAN International Workshop on Erlang, pp 24-32, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext, fulltext:print).
  20. Evaluating the expressiveness of specification languages: for stochastic safety-critical systems. Fahad Rami Jamil. Student thesis, supervisor: Anton Hampus, examiner: Lars-Åke Nordén, Lars-Henrik Eriksson, UPTEC IT nr 24038, 2024. (fulltext).
  21. A Strongly Typed Shell with Static Sandboxing of Side Effects. Tage Johansson. Student thesis, supervisor: Elias Castegren, examiner: Johannes Borgström, IT nr kDV 24 006, 2024. (fulltext).
  22. An introduction to data-driven modelling of the Water-Energy-Food-Ecosystem nexus. Elise Jonsson, Andrijana Todorovi?, Malgorzata Blicharska, María Andreína Francisco Rodríguez, Thomas Grabs, Janez Sušnik, and Claudia Teutschbein. In Environmental Modelling & Software, volume 181, Elsevier, 2024. (DOI, Fulltext, fulltext:print).
  23. Impact of Attack Variations and Topology on IoT Intrusion Detection Model Generalizability. Amin Kaveh, Christian Rohner, and Andreas Johnsson. In 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS), volume 21 of IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp 364-370, Institute of Electrical and Electronics Engineers (IEEE), 2024. (DOI).
  24. Ensemble Machine Learning Techniques for LoRa-based Wireless Indoor Localization Systems. Vidumini Saumya Kulathunga Hettiarachchige. Student thesis, supervisor: Madduma Wellalage Pasan Maduranga, examiner: Mats Daniels, José Mairton Barros da Silva Jr., IT nr mDV 24 005, 2024. (fulltext).
  25. Supplement - Capital in Computing Education: Investigating Factors Underlying Participation. Thom Kunkeler and Aletta Nylén. Technical report / Department of Information Technology, Uppsala University nr 2024-001, Uppsala University, Uppsala, 2024. (fulltext).
  26. Development and Evaluation of an AI-Powered Virtual Coach for an E-Health Tool for Fall Prevention: Open-Source vs Closed-Source LLMs in E-Health Applications. Johannes Liljedahl. Student thesis, supervisor: Karl Öhman, examiner: Lars-Åke Nordén, Eva Darulova, UPTEC IT nr 24045, 2024. (fulltext).
  27. From Data to Decision: Data Analysis for Optimal Office Development. Josefine Mattsson. Student thesis, supervisor: Henrik Svensson, examiner: Elísabet Andrésdóttir, Justin Pearson, UPTEC STS nr 24020, 2024. (fulltext).
  28. Dafny vs. Dala: Experience with Mechanising Language Design. James Noble, Julian Mackay, Tobias Wrigstad, Andrew Fawcet, and Michael Homer. In FTfJP 2024: Proceedings of the 26th ACM International Workshop on Formal Techniques for Java-like Programs, pp 37-43, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext).
  29. Mutator-Driven Object Placement using Load Barriers. Jonas Norlinder, Albert Mingkun Yang, David Black-Schaffer, and Tobias Wrigstad. In MPLR 2024: Proceedings of the 21st ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext).
  30. Breaking Barriers: The Challenges of Accessibility in Mobile Application Development. Madelene Olsson and Viktoria Zubenko. Student thesis, supervisor: Fanny Ljungman, examiner: Elísabet Andrésdóttir, Davide Vega D'Aurelio, UPTEC STS nr 24044, 2024. (fulltext).
  31. "Hybrid Work Provides the Best of both Worlds" Software Engineering Students' Perception of Group Work in Different Work Settings. Sofia Ouhbi and Nuno Pombo. In Towards a Hybrid, Flexible and Socially Engaged Higher Education, vol 2, ICL2023, Lecture Notes in Networks and Systems, pp 455-466, Springer, 2024. (DOI).
  32. Bridging the Theory-Practice Gap in a Maintenance Programming Course: An Experience Report. Sofia Ouhbi. In ICSE-SEET '24: Proceedings of the 46th International Conference on Software Engineering, pp 359-367, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext, fulltext:print).
  33. Reference Counting Deeply Immutable Data Structures with Cycles: An Intellectual Abstract. Matthew J. Parkinson, Sylvan Clebsch, and Tobias Wrigstad. In Proceedings of the 2024 ACM Sigplan International Symposium on Memory Management, ISMM 2024, pp 131-141, Association for Computing Machinery (ACM), 2024. (DOI, fulltext:print).
  34. Predicting Spot Prices in Cloud with ARIMA-based and NeuralNetwork-based Forecasting Methods. Nils Risberg. Student thesis, supervisor: Viktor Svensson, examiner: Elísabet Andrésdóttir, Justin Pearson, UPTEC STS nr 24048, 2024. (fulltext).
  35. Scheduling Garbage Collection for Energy Efficiency on Asymmetric Multicore Processors. Marina Shimchenko, Erik Österlund, and Tobias Wrigstad. In The Art, Science, and Engineering of Programming, volume 8, number 3, Aspect-Oriented Software Association, 2024. (DOI, Fulltext, fulltext:print).
  36. Addressing Fragmentation in ZGC through Custom Allocators: Leveraging a Lean, Mean, Free-List Machine. Joel Sikström. Student thesis, supervisor: Erik Österlund, examiner: Roland Bol, Tobias Wrigstad, UPTEC IT nr 24020, 2024. (fulltext).
  37. A Constraint Solving Approach to Parikh Images of Regular Languages. Amanda Stjerna and Philipp Rümmer. In Proceedings of the ACM on Programming Languages, volume 8, number OOPSLA1, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext, fulltext:print).
  38. What Do I Need To Learn? Computing Competence Described by Novice Students. Caroline Uppsäll, Aletta Nylén, and Gordana Dodig-Crnkovic. In Proc. 2024 IEEE Frontiers in Education Conference (FIE), Washington DC, 2024.
  39. An analysis of authentication models in cloud computing and on-premise Windows environments.. Samuel Viktorsson. Student thesis, supervisor: Mathieu Vannoorenberghe, examiner: Roland Bol, Frej Knutar Lewander, UPTEC IT nr 24007, 2024. (fulltext).
  40. A Case Study of a Code Club's Inclusion Policy and How It Is Implemented Online and in the Classroom. Tina Vrieler. In 2024 IEEE Global Engineering Education Conference (EDUCON) Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2024. (DOI, fulltext:postprint).
  41. Applying the Computer Science Capital Framework to Understand Factors Facilitating Children's Decision to Participate in Code Clubs. Tina Vrieler. In Koli Calling '24: Proceedings of the 24th Koli Calling International Conference on Computing Education Research, pp 1-13, Association for Computing Machinery (ACM), 2024. (DOI, Fulltext, fulltext:print).
  42. Applications of Constraint Programming in Railway Maintenance. Carl Willman. Student thesis, supervisor: Andreína Francisco, examiner: Lars-Åke Nordén, Justin Pearson, UPTEC IT nr 24029, 2024. (fulltext).
  43. Exploring the Potential Use of Generative AI in Software Engineering Education. Mounika Yabaku, Nuno Pombo, and Sofia Ouhbi. In 2024 IEEE 18th International Conference on Application of Information and Communication Technologies (AICT), 2024 IEEE 18th International Conference on Application of Information and Communication Technologies (AICT), pp 1-7, IEEE, 2024. (DOI).
  44. University Students' Perception and Expectations of Generative AI Tools for Software Engineering. Mounika Yabaku and Sofia Ouhbi. In 2024 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING, CSEE & T 2024, Conference on Software Engineering Education and Training, Institute of Electrical and Electronics Engineers (IEEE), 2024. (DOI).
  45. Learn to Stay Cool: Online Load Management for Passively Cooled Base Stations. Zhanwei Yu, Yi Zhao, Lei You, and Di Yuan. In 2024 IEEE Wireless Communications and Networking Conference, WCNC 2024, IEEE Wireless Communications and Networking Conference, pp 1-6, Institute of Electrical and Electronics Engineers (IEEE), 2024. (DOI).
  46. Multi-cell content caching: Optimization for cost and information freshness. Zhanwei Yu, Tao Deng, Yi Zhao, and Di Yuan. In Computer Networks, volume 247, Elsevier, 2024. (DOI, Fulltext, fulltext:print).
  47. Data management of scientific applications in a reinforcement learning-based hierarchical storage system. Tianru Zhang, Ankit Gupta, María Andreína Francisco Rodríguez, Ola Spjuth, Andreas Hellander, and Salman Toor. In Expert systems with applications, volume 237, Elsevier, 2024. (DOI, Fulltext, fulltext:print).
  48. Caching With Personalized and Incumbent-Aware Recommendation: Modeling and Optimization. Yi Zhao, Zhanwei Yu, and Di Yuan. In IEEE Transactions on Mobile Computing, volume 23, number 10, pp 9595-9613, Institute of Electrical and Electronics Engineers (IEEE), 2024. (DOI).
  49. On optimization formulations for radio resource allocation subject to common transmission rate. Yi Zhao and Di Yuan. In Computers & Operations Research, volume 161, Elsevier, 2024. (DOI, Fulltext, fulltext:print).
  50. Arrays in Practice: An Empirical Study of Array Access Patterns on the JVM. Beatrice Åkerblom and Elias Castegren. In The Art, Science, and Engineering of Programming, volume 8, number 3, Aspect-Oriented Software Association, 2024. (DOI, Fulltext, fulltext:print).

2023

  1. Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY. Rosa Abbasi, Jonas Schiffl, Eva Darulova, Mattias Ulbrich, and Wolfgang Ahrendt. In International Journal on Software Tools for Technology Transfer, volume 25, pp 185-204, Springer, 2023. (DOI, Fulltext, fulltext:print).
  2. Modular Optimization-Based Roundoff Error Analysis of Floating-Point Programs. Rosa Abbasi and Eva Darulova. In Static Analysis: 30th International Symposium, SAS 2023, 2023.
  3. Tailoring Stateless Model Checking for Event-Driven Multi-Threaded Programs. Parosh Abdulla, Mohamed Faouzi Atig, Frederik Meyer Bonneland, Sarbojit Das, Bengt Jonsson, Magnus Lång, and Konstantinos Sagonas. In Automated Technology for Verification and Analysis, 21st International Symposium, ATVA 2023, Singapore, Oct. 2023. Proceedings., 2023.
  4. User Preference-Based Evaluation of Counterfactual Explanation Methods. Muhammad Zain Akram. Student thesis, supervisor: Kristijonas Cyras, Vandita Singh, examiner: Lars-Åke Nordén, Maria Andreina Francisco Rodriguez, UPTEC IT nr 23037, 2023. (fulltext).
  5. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols. Sabor Amini. Student thesis, supervisor: Hooman Asadian, Paul Fiter?u-Bro?tean, Bengt Jonsson, examiner: Lars-Åke Nordén, Sagonas Konstantinos, UPTEC IT nr 23027, 2023. (fulltext).
  6. Reference Capabilities for Flexible Memory Management. Ellen Arvidsson, Elias Castegren, Sylvan Clebsch, Sophia Drossopoulou, James Noble, Matthew J. Parkinson, and Tobias Wrigstad. In Proceedings of the ACM on Programming Languages, volume 7, number OOPSLA2, pp 1363-1393, Association for Computing Machinery (ACM), 2023. (DOI, Fulltext, fulltext:print).
  7. Encore: Coda. Elias Castegren and Tobias Wrigstad. In Active Object Languages: Current Research Trends, Lecture Notes in Computer Science, Springer Nature, 2023. (DOI).
  8. When Concurrency Matters: Behaviour-Oriented Concurrency. Luke Cheeseman, Matthew J. Parkinson, Sylvan Clebsch, Marios Kogias, Sophia Drossopoulou, David Chisnall, Tobias Wrigstad, and Paul Liétar. In Proceedings of the ACM on Programming Languages, volume 7, number OOPSLA2, pp 1531-1560, Association for Computing Machinery (ACM), 2023. (DOI, Fulltext, fulltext:print).
  9. Route Planning of Battery Electric Heavy-Duty Commercial Vehicles: Using Contraction Hierarchies and Mixed Integer Programming. Olle Delborg and Elias Insulander. Student thesis, supervisor: Viktor Leek, examiner: Lars-Åke Nordén, Justin Pearson, UPTEC IT nr 23018, 2023. (fulltext).
  10. Scheduling for Multi-Cell Caching: Hit Maximization Subject to Age of Information. Tao Deng, Zhanwei Yu, and Di Yuan. In IEEE Transactions on Vehicular Technology, volume 72, number 9, pp 12441-12446, Institute of Electrical and Electronics Engineers (IEEE), 2023. (DOI).
  11. Black Ostrich: Web Application Scanning with String Solvers. Benjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, and Andrei Sabelfeld. In CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp 549-563, Association for Computing Machinery (ACM), 2023. (DOI, Fulltext, fulltext:print).
  12. Proportionality on Spatial Data with Context. Georgios J Fakas and Georgios Kalamatianos. In ACM Transactions on Database Systems, volume 48, number 2, pp 1-37, Association for Computing Machinery (ACM), 2023. (DOI, Fulltext, fulltext:print).
  13. A multi-period sustainable hydrogen supply chain model considering pipeline routing and carbon emissions: The case study of Oman. Kamran Forghani, Reza Kia, and Yousef Nejatbakhsh. In Renewable & sustainable energy reviews, volume 173, Elsevier, 2023. (DOI, Fulltext, fulltext:print).
  14. A Quantitative Framework for Constructing a Multi-Asset CTA with a Momentum-Based Approach. Rebecca Fällström. Student thesis, supervisor: Alexander Wojt, examiner: Elisabet Andresdottir, Justin Pearson, UPTEC STS nr 23010, 2023. (fulltext).
  15. Robustness and Sensitivity of Network-Based Topic Detection. Carla Galluccio, Matteo Magnani, Davide Vega, Giancarlo Ragozini, and Alessandra Petrucci. In Complex Networks and their Applications XI: Proceedings of the Eleventh International Conference on Complex Networks and their Applications: COMPLEX NETWORKS 2022, Volume 2, volume 1078 of Studies in Computational Intelligence, pp 259-270, Springer, Cham, 2023. (DOI).
  16. An Active Learning Approach to Synthesizing Program Contracts. Sandip Ghosal, Bengt Jonsson, and Philipp Rümmer. In Software Engineering and Formal Methods, SEFM 2023, volume 14323 of Lecture Notes in Computer Science, pp 126-144, Springer, 2023. (DOI).
  17. Proteome deconvolution of liver biopsies reveals hepatic cell composition as an important marker of fibrosis. Niklas Handin, Di Yuan, Magnus Olander, Christine Wegler, Cecilia Karlsson, Rasmus Jansson-Lofmark, Joran Hjelmesaeth, Anders Asberg, Volker M. Lauschke, and Per Artursson. In Computational and Structural Biotechnology Journal, volume 21, pp 4361-4369, Elsevier, 2023. (DOI, Fulltext, fulltext:print).
  18. Natural Language Processing for Improving Search Query Results: Applied on The Swedish Armed Force's Profession Guide. Andreas Harju Schnee. Student thesis, supervisor: Magnus Lundstedt, examiner: Lars-Åke Nordén, Justin Pearson, UPTEC IT nr 23038, 2023. (fulltext).
  19. Automated Extraction of Insurance Policy Information: Natural Language Processing techniques to automate the process of extracting information about the insurance coverage from unstructured insurance policy documents.. Jacob Hedberg and Erik Furberg. Student thesis, supervisor: Frank Kody, examiner: Elísabet Andrésdóttir, Davide Vega D'Aurelio, UPTEC STS nr 23023, 2023. (fulltext).
  20. Lights, Camera, BERT!: Autonomizing the Process of Reading andInterpreting Swedish Film Scripts. Leon Henzel. Student thesis, supervisor: Björn Mosten, examiner: Elísabet Andrésdóttir, Maria Andreina Francisco Rodriguez, UPTEC STS nr 23043, 2023. (fulltext).
  21. Scaling up Roundoff Analysis of Functional Data Structure Programs. Anastasia Isychev and Eva Darulova. In Static Analysis: 30th International Symposium, SAS 2023, 2023.
  22. A Comparison Between KeyFrame Extraction Methods for Clothing Recognition. Gabriel Lindgren. Student thesis, supervisor: Moa Andersson, examiner: Lars-Åke Nordén, Matteo Magnani, UPTEC IT nr 23023, 2023. (fulltext).
  23. Sound Mixed Fixed-Point Quantization of Neural Networks. Debasmita Lohar, Clothilde Jeangoudoux, Anastasia Volkova, and Eva Darulova. In ACM Transactions on Embedded Computing Systems, 2023. Publication status: Accepted
  24. Sound Mixed Fixed-Point Quantization of Neural Networks. Debasmita Lohar, Clothilde Jeangoudoux, Anastasia Volkova, and Eva Darulova. In ACM Transactions on Embedded Computing Systems, volume 22, number 5, pp 1-26, Association for Computing Machinery (ACM), 2023. (DOI, fulltext:print).
  25. The Allure of Automated Machine Learning Services: How SMEs and non-expert users can benefit from AutoML frameworks. Felix Lux Dryselius. Student thesis, supervisor: Anton Ijäs, examiner: Elísabet Andrésdóttir, Davide Vega D'Aurelio, UPTEC STS nr 23047, 2023. (fulltext).
  26. Can Developer Data Predict Vulnerabilities?: Examining Developer and Vulnerability Correlation in the Kibana Project. Johan Lövgren. Student thesis, supervisor: Pontus Johnson, examiner: Lars-Åke Nordén, Elias Castegren, UPTEC IT nr 23021, 2023. (fulltext).
  27. Evaluating the Ownership of Personal data in the Cloud by Optimizing the IT Architecture: Applying a reference architecture to make the ownership of personal data more clear within an organization. Tilda Myrsell and Sofie Hulteberg. Student thesis, supervisor: Yasith Wickramasinghe, examiner: Elísabet Andrésdottir, Davide Vega D’Aurelio, UPTEC STS nr 23022, 2023. (fulltext).
  28. Machine learning for risk ranking of component failure: A comparative study of traditional- and survival machine learning approaches applied to historical data. Fredrik Nilsson and Fanny Fristedt. Student thesis, supervisor: Martin Carlberg, examiner: Elísabet Andrésdóttir, Justin Pearson, UPTEC STS nr 23035, 2023. (fulltext).
  29. Dynamic Warning Signals and Time Lag Analysis for Seepage Prediction in Hydropower Dams: A Case Study of a Swedish Hydropower Plant. Lovisa Olsson and Julia Hellström. Student thesis, supervisor: Jonathan Jan, Mia Zdybek, examiner: Elísabet Andrésdóttir, Maria Andreina Francisco Rodriguez, UPTEC STS nr 23032, 2023. (fulltext).
  30. Statically Resolvable Ambiguity. Viktor Palmkvist, Elias Castegren, Philipp Haller, and David Broman. In Proceedings of the ACM on Programming Languages, volume 7, number POPL, pp 1686-1712, ACM Digital Library, 2023. (DOI, Fulltext, fulltext:print).
  31. Generic Requirements for Inclusive Healthcare Software: Supporting Older Adults and People with Intellectual and Developmental Disability. Ita Richardson, Bilal Ahmad, Shweta Premanandan, Owen Doody, Sarah Beecham, Sofia Ouhbi, Muneef Alshammari, and Åsa Cajander. In 2023 IEEE 31st international requirements engineering conference workshops, REW, IEEE International Requirements Engineering Conference Workshops, pp 423-431, Institute of Electrical and Electronics Engineers (IEEE), 2023. (DOI).
  32. EDHOC-Fuzzer: An EDHOC Protocol State Fuzzer. Konstantinos Sagonas and Thanasis Typaldos. In Proceedings of the 32nd ACM Sigsoft International Symposium on Software Testing and Analysis, ISSTA 2023, pp 1495-1498, Association for Computing Machinery (ACM), 2023. (DOI, Fulltext, fulltext:print).
  33. Compressing Pointers for the Z Garbage Collector: Runtime compression of pointers in a concurrent setting. Linus Shoravi. Student thesis, supervisor: Erik Österlund, examiner: Lars-Åke Nordén, Tobias Wrigstad, UPTEC IT nr 23011, 2023. (fulltext).
  34. Comparing performance and developer experience for a serverless application integrated with a serverless database. Leonora Stiernborg. Student thesis, supervisor: Leonard Grolleman, examiner: Lars-Åke Nordén, Eva Darulova, UPTEC IT nr 23042, 2023. (fulltext).
  35. Heap Size Adjustment with CPU Control. Sanaz Tavakolisomeh, Marina Shimchenko, Erik Osterlund, Rodrigo Bruno, Paulo Ferreira, and Tobias Wrigstad. In PROCEEDINGS OF THE 20TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON MANAGED PROGRAMMING LANGUAGES AND RUNTIMES, MPLR 2023, pp 114-128, ASSOC COMPUTING MACHINERY, 2023. (DOI, Fulltext, fulltext:print).
  36. Hammering Floating-Point Arithmetic. Olle Torstensson and Tjark Weber. In FRONTIERS OF COMBINING SYSTEMS, FROCOS 2023, volume 14279 of Lecture Notes in Artificial Intelligence, pp 217-235, Springer Nature, 2023. (DOI, Fulltext, fulltext:print).
  37. A constraint programming model for the scheduling and workspace layout design of a dual-arm multi-tool assembly robot. Johan Wessén, Mats Carlsson, Christian Schulte, Pierre Flener, Federico Pecora, and Mihhail Matskin. In Constraints, volume 28, number 2, pp 71-104, Springer, 2023. (DOI, Fulltext, fulltext:print).
  38. Understanding the Impact of OS Background Noise with a Custom Performance Evaluation Tool. Daniel Westberg. Student thesis, supervisor: Jonathan Karlsson, examiner: Lars-Åke Nordén, Elias Castegren, UPTEC IT nr 23029, 2023. (fulltext).
  39. Hop on Board the Open-Source Bus: The Possibilities of an Open-Source Trip Planner for Public Transport. Billie Westerlund and Alexander Wiklund. Student thesis, supervisor: Jerry Löfvenhaft, examiner: Elísabet Andrésdóttir, Andreina Francisco, UPTEC STS nr 23007, 2023. (fulltext).
  40. Assessing the User Experienceof Hype Energy Drinks’ New Website: A study in UX development comparing the userexperience of two versions of the website Hype.com. Vera Widmalm. Student thesis, supervisor: Antonio Marquez, examiner: Elísabet Andrésdóttir, Johannes Borgström, UPTEC STS nr 23050, 2023. (fulltext).
  41. Immigrant-critical alternative media in online conversations. Victoria Yantseva, Davide Vega D'Aurelio, and Matteo Magnani. In PLOS ONE, volume 18, number 11, Public Library of Science (PLoS), 2023. (DOI, Fulltext, fulltext:print).
  42. Robust Divergence Angle for Inter-satellite Laser Communications under Target Deviation Uncertainty. Zhanwei Yu, Yi Zhao, and Di Yuan. In 2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, IEEE Vehicular Technology Conference Proceedings, IEEE, 2023. (DOI).

2022

  1. Optimal Scheduling of Age-centric Caching: Tractability and Computation. Ghafour Ahani, Di Yuan, and Sumei Sun. In IEEE Transactions on Mobile Computing, volume 21, pp 2939-2954, IEEE, 2022. (DOI).
  2. Applying Symbolic Execution to Test Implementations of a Network Protocol Against its Specification. Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, and Konstantinos Sagonas. In 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2022), IEEE International Conference on Software Testing Verification and Validation, pp 70-81, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI).
  3. Dandelion: Certified Approximations of Elementary Functions. Heiko Becker, Mohit Tekriwal, Eva Darulova, Anastasia Volkova, and Jean-Baptiste Jeannin. In 13th International Conference on Interactive Theorem Proving (ITP 2022), volume 237 of Leibniz International Proceedings in Informatics (LIPIcs), pp 6:1-6:19, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022. (DOI, Fulltext, fulltext:print).
  4. Verified Compilation and Optimization of Floating-Point Programs in CakeML. Heiko Becker, Robert Rabe, Eva Darulova, Magnus O. Myreen, Zachary Tatlock, Ramana Kumar, Yong Kiam Tan, and Anthony Fox. In 36th European Conference on Object-Oriented Programming (ECOOP 2022), volume 222 of Leibniz International Proceedings in Informatics (LIPIcs), pp 1:1-1:28, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022. (DOI, Fulltext, fulltext:print).
  5. DTLS-Fuzzer: A DTLS Protocol State Fuzzer. Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas, and Fredrik Tåquist. In 2022 IEEE 15th International Conference on Software Testing, Verification and Validation (ICST 2022), IEEE International Conference on Software Testing Verification and Validation, pp 456-458, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI).
  6. REST: Integrating Term Rewriting with Program Verification. Zachary Grannan, Niki Vazou, Eva Darulova, and Alexander J. Summers. In 36th European Conference on Object-Oriented Programming (ECOOP 2022), volume 222 of Leibniz International Proceedings in Informatics (LIPIcs), pp 13:1-13:29, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022. (DOI, Fulltext, fulltext:print).
  7. Energy-Efficient Joint Task Assignment and Power Control in Energy-Harvesting D2D Offloading Communications. Monia Hamdi, Aws Ben Hamed, Di Yuan, and Mourad Zaied. In IEEE Internet of Things Journal, volume 9, number 8, pp 6018-6031, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI).
  8. Awaiting for Godot: Stateless Model Checking that Avoids Executions where Nothing Happens. Bengt Jonsson, Magnus Lång, and Konstantinos Sagonas. In 2022 Formal Methods in Computer-Aided Design (FMCAD), volume 3 of Formal Methods in Computer-Aided Design, pp 284-293, TU Wien Academic Press, 2022. (DOI, Fulltext, fulltext:print).
  9. Invoice Line Item Extraction using Machine Learning SaaS Models. Avin Kadir. Student thesis, supervisor: Pernilla de-Wall Larsson, examiner: Lars-Åke Nordén, Georgios Fakas, UPTEC IT nr 23008, 2022. (fulltext).
  10. Diversified Retrieval of Spatial Data with Context. Georgios Kalamatianos. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 2209, Acta Universitatis Upsaliensis, Uppsala, 2022. (fulltext, preview image).
  11. Modelling and Analysis of Probabilistic Networks. Amin Kaveh. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 2117, Acta Universitatis Upsaliensis, Uppsala, 2022. (fulltext, preview image).
  12. Overlapping Clustering of Probabilistic Networks. Amin Kaveh, Matteo Magnani, and Christian Rohner. 2022.
  13. Inferring Interval-Valued Floating-Point Preconditions. Jonas Kramer, Lionel Blatter, Eva Darulova, and Mattias Ulbrich. In Tools and algorithms for the construction and analysis of systems, TACAS 2022, pt I, Lecture Notes in Computer Science, pp 303-321, Springer Nature, 2022. (DOI, fulltext:print).
  14. Supporting Shared Responsibility for Integrating Ethics into Science and Technology Education. Mikael Laaksoharju, Thomas Taro Lennerfors, Björn Victor, and Maja Elmgren. In 2022 IEEE Frontiers in Education Conference (FIE), IEEE Frontiers in Education Conference, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI, fulltext:postprint).
  15. When bounds consistency implies domain consistency for regular counting constraints. Barnaby Martin and Justin Pearson. In Constraints, volume 27, number 3, pp 161-167, Springer Nature, 2022. (DOI).
  16. Visualisation of Numerical Query Results on Industrial Data Streams. Miran Ismaiel Nadir and Kjell Orsborn. In New Trends in Database and Information Systems, ADBIS 2022, volume 1652 of Communications in Computer and Information Science, pp 34-42, Springer, 2022. (DOI).
  17. Compressed Forwarding Tables Reconsidered. Jonas Norlinder, Erik Österlund, and Tobias Wrigstad. In MPLR '22: Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, pp 45-63, Association for Computing Machinery (ACM), New York, 2022. (DOI, Fulltext, fulltext:print).
  18. So Many Fuzzers, So Little Time: Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack. Clément Poncelet, Konstantinos Sagonas, and Nicolas Tsiftes. In ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, volume 37 of IEEE ACM International Conference on Automated Software Engineering, Association for Computing Machinery (ACM), 2022. (DOI, Fulltext, fulltext:print).
  19. Analysing and Predicting Energy Consumption of Garbage Collectors in OpenJDK. Marina Shimchenko, Mihail Popov, and Tobias Wrigstad. In MPLR '22: Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, pp 3-15, Association for Computing Machinery (ACM), New York, 2022. (DOI, Fulltext, fulltext:print).
  20. Automatic Validation of LOD Reductions through Deep Learning. Matilda Tamm. Student thesis, supervisor: Gisslén Linus, examiner: Lars-Åke Nordén, Justin Pearson, UPTEC IT nr 22027, 2022. (fulltext).
  21. QoS Aware Robot Trajectory Optimization With IRS-Assisted Millimeter-Wave Communications. Cristian Tatino, Nikolaos Pappas, and Di Yuan. In IEEE Open Journal of the Communications Society, volume 3, pp 1323-1336, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI, Fulltext, fulltext:print).
  22. A Sociocultural Perspective on Computer Science Capital and its Pedagogical Implications in Computer Science Education. Tina Vrieler and Minna Salminen-Karlsson. In ACM Transactions on Computing Education, volume 22, number 4, Association for Computing Machinery (ACM), 2022. (DOI, Fulltext).
  23. Deep Dive into ZGC: A Modern Garbage Collector in OpenJDK. Albert Mingkun Yang and Tobias Wrigstad. In ACM Transactions on Programming Languages and Systems, volume 44, number 4, Association for Computing Machinery (ACM), New York, 2022. (DOI, Fulltext).
  24. Stance Classification of Social Media Texts for Under-Resourced Scenarios in Social Sciences. Victoria Yantseva and Kostiantyn Kucher. In DATA, volume 7, number 11, MDPI, 2022. (DOI, Fulltext, fulltext:print).
  25. Multi-cell Caching: Fresh Information with Minimum Cost. Zhanwei Yu, Tao Deng, Yi Zhao, and Di Yuan. In 2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), IEEE Wireless Communications and Networking Conference, pp 327-332, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI).
  26. Resource Optimization With Interference Coupling in Multi-RIS-Assisted Multi-Cell Systems. Zhanwei Yu and Di Yuan. In IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, volume 3, pp 98-110, Institute of Electrical and Electronics Engineers (IEEE), 2022. (DOI, Fulltext, fulltext:print).
  27. Content Caching with Personalized and Incumbent-aware Recommendation: An Optimization Approach. Yi Zhao, Zhanwei Yu, Qing He, and Di Yuan. In 20th International Symposium on Modeling and Optimization in Mobile, ad hoc, and Wireless Networks (WIOPT 2022), pp 97-104, IEEE, 2022. (DOI).

2021

  1. Age-Optimal UAV Scheduling for Data Collection With Battery Recharging. Ghafour Ahani, Di Yuan, and Yixin Zhao. In IEEE Communications Letters, volume 25, number 4, pp 1254-1258, Institute of Electrical and Electronics Engineers (IEEE), 2021. (DOI).
  2. From Declarative Models to Local Search. Gustav Björdal. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 2022, Acta Universitatis Upsaliensis, Uppsala, 2021. (Online Defence, fulltext, preview image).
  3. TSOPER: Efficient Coherence-Based Strict Persistency. Per Ekemark, Yuan Yao, Alberto Ros, Konstantinos Sagonas, and Stefanos Kaxiras. In 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA), International Symposium on High-Performance Computer Architecture : Proceedings, pp 125-138, Institute of Electrical and Electronics Engineers (IEEE), 2021. (DOI).
  4. Dala: a simple capability-based dynamic language design for data race-freedom. Kiko Fernandez-Reyes, Isaac Oscar Gariano, James Noble, Erin Greenwood-Thessman, Michael Homer, and Tobias Wrigstad. In Onward! 2021: Proceedings of the 2021 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, pp 1-17, 2021. (DOI).
  5. Abstractions to Control the Future. Francisco Ramón Fernández Reyes. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1986, Acta Universitatis Upsaliensis, Uppsala, 2021. (Online defence, fulltext, preview image).
  6. Conservative Definitions for Higher-order Logic with Ad-hoc Overloading. Arve Gengelbach. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 2021, Acta Universitatis Upsaliensis, Uppsala, 2021. (Online defence, fulltext, preview image).
  7. Mechanisation of Model-theoretic Conservative Extension for HOL with Ad-hoc Overloading. Arve Gengelbach, Johannes Åman Pohjola, and Tjark Weber. In Proceedings Fifteenth Workshop on Logical Frameworks and Meta-Languages: Theory and Practice, volume 332 of Electronic Proceedings in Theoretical Computer Science (EPTCS), pp 1-17, Open Publishing Association, 2021. (DOI, Fulltext, fulltext:print).
  8. Generic Quality Assurance in Software Projects. Daniel Jansson. Student thesis, supervisor: Alfred Yrelin, examiner: Lars-Åke Nordén, Aletta Nylén, UPTEC IT nr 21040, 2021. (fulltext).
  9. Proportionality in Spatial Keyword Search. Georgios Kalamatianos, Georgios J Fakas, and Nikos Mamoulis. In Proceedings of the 2021 International Conference on Management of Data, pp 885-897, Association for Computing Machinery (ACM), 2021. (DOI).
  10. Defining and measuring probabilistic ego networks. Amin Kaveh, Matteo Magnani, and Christian Rohner. In Social Network Analysis and Mining, volume 11, 2021. (DOI, Fulltext).
  11. Probabilistic network sparsification with ego betweenness. Amin Kaveh, Matteo Magnani, and Christian Rohner. In Applied Network Science, volume 6, Springer Nature, 2021. (DOI, Fulltext, fulltext:print).
  12. Probabilistic Programming for Birth-Death Models of Evolution. Jan Kudlicka. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 2006, Acta Universitatis Upsaliensis, Uppsala, 2021. (Online defence, fulltext, preview image).
  13. Jupyter Notebooks on GitHub: Characteristics and Code Clones. Malin Källén and Tobias Wrigstad. In The Art, Science, and Engineering of Programming, volume 5, number 3, 2021. (DOI, Fulltext, fulltext:print).
  14. Correctness of Sequential Monte Carlo Inference for Probabilistic Programming Languages. Daniel Lunden, Johannes Borgström, and David Broman. In Programming Languages And Systems, ESOP 2021, Lecture Notes in Computer Science, pp 404-431, Springer Nature, 2021. (DOI, Fulltext, fulltext:print).
  15. Analysis of Multiplex Social Networks with R. Matteo Magnani, Luca Rossi, and Davide Vega. In Journal of Statistical Software, volume 98, number 8, pp 1-30, Foundation for Open Access Statistic, 2021. (DOI, Fulltext, fulltext:print).
  16. Community Detection in Multiplex Networks. Matteo Magnani, Obaida Hanteer, Roberto Interdonato, Luca Rossi, and Andrea Tagarelli. In ACM Computing Surveys, volume 54, number 3, Association for Computing Machinery (ACM), 2021. (DOI).
  17. Deep neural networks for social visuals: studying climate communication on YouTube. Matteo Magnani and Alexandra Segerberg. In Selected Papers of Internet Research, SPIR, Association of Internet Researchers, 2021. (DOI).
  18. On the conditions for integrating deep learning into the study of visual politics. Matteo Magnani and Alexandra Segerberg. In WebSci '21: Proceedings of the 13th ACM Web Science Conference 2021, pp 56-64, Association for Computing Machinery (ACM), 2021. (DOI, fulltext:postprint).
  19. Analytics of IIoT Data Using a NoSQL Datastore. Khalid Mahmood, Tore Risch, and Kjell Orsborn. In 2021 IEEE International Conference on Smart Computing (SMARTCOMP), International Conference on Smart Computing (SMARTCOMP), pp 97-104, Institute of Electrical and Electronics Engineers (IEEE), 2021. (DOI).
  20. Scalable Data Management for Internet of Things. Khalid Mahmood. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 2095, Acta Universitatis Upsaliensis, Uppsala, 2021. (fulltext, preview image).
  21. Scalable Real-Time Analytics for IoT Applications. Khalid Mahmood and Tore Risch. In 2021 IEEE International Conference on Smart Computing (SMARTCOMP), International Conference on Smart Computing (SMARTCOMP), pp 404-406, Institute of Electrical and Electronics Engineers (IEEE), 2021. (DOI).
  22. Second-hand goods classification with CNNs: A proposal for a step towards a more sustainable fashion industry. Torsten Malmgård. Student thesis, supervisor: Muntazir Mehdi, examiner: Matteo Magnani, Tomas Nyberg, UPTEC F nr 21032, 2021. (fulltext).
  23. Modal Logics for Nominal Transition Systems. Joachim Parrow, Johannes Borgström, Lars-Henrik Eriksson, Ramunas Forsberg Gutkovas, and Tjark Weber. In Logical Methods in Computer Science, volume 17, number 1, 2021. (DOI, Fulltext, External link, External link, fulltext:preprint, fulltext:print).
  24. Universal probabilistic programming offers a powerful approach to statistical phylogenetics. Fredrik Ronquist, Jan Kudlicka, Viktor Senderov, Johannes Borgström, Nicolas Lartillot, Daniel Lundén, Lawrence M. Murray, Thomas B. Schön, and David Broman. In Communications Biology, volume 4, Springer Nature, 2021. (DOI, Fulltext, fulltext:print).
  25. Fifteen Years of Successfully Dialyzing Erlang and Elixir Code: Abstract. Konstantinos Sagonas. In Erlang '21: Proceedings of the 20th ACM SIGPLAN international workshop on Erlang, pp 1-1, Association for Computing Machinery (ACM), 2021. (DOI).
  26. Kravanalys av digitala medel och tjänster vid popup-butiker: En studie av den digitala utvecklingen i relationen mellan fastighetsägare och detaljhandeln. Sofia Skoghagen and Malin Sjöberg. Student thesis, supervisor: Johan Svenungsson, Björn Clemensson, examiner: Elísabet Andrésdóttir, Björn Victor, UPTEC STS nr 20003, 2021. (fulltext).
  27. Lock-free Contention Adapting Search Trees. Kjell Winblad, Konstantinos Sagonas, and Bengt Jonsson. In ACM TRANSACTIONS ON PARALLEL COMPUTING, volume 8, number 2, Association for Computing Machinery (ACM), 2021. (DOI).
  28. A Note on Decoding Order in User Grouping and Power Optimization for Multi-Cell NOMA With Load Coupling. Lei You and Di Yuan. In IEEE Transactions on Wireless Communications, volume 20, number 1, pp 495-505, Institute of Electrical and Electronics Engineers (IEEE), 2021. (DOI).
  29. On Resource Optimization in Multi-IRS-assisted and Interference-coupled Multi-cell Systems. Zhanwei Yu and Di Yuan. In 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp 1408-1412, Institute of Electrical and Electronics Engineers (IEEE), 2021. (DOI).
  30. Delivering more to cell edge via joint multi-cell non-orthogonal multiple access and traffic offloading. Yi Zhao, Di Yuan, and Lei You. In IET Networks, volume 10, number 6, pp 265-277, Institution of Engineering and Technology, 2021. (DOI, Fulltext, fulltext:print).

2020

  1. Accounting for Information Freshness in Scheduling of Content Caching. Ghafour Ahani and Di Yuan. In ICC 2020: 2020 IEEE International Conference on Communications (ICC), IEEE International Conference on Communications, 2020. (DOI).
  2. Optimal scheduling of content caching subject to deadline. Ghafour Ahani and Di Yuan. In IEEE Open Journal of the Communications Society, volume 1, pp 293-307, IEEE, 2020. (DOI, Fulltext, fulltext:print).
  3. Routing and scheduling of network flows with deadlines and discrete capacity allocation. Ghafour Ahani, Pawel Wiatr, and Di Yuan. In Networks, volume 76, number 1, pp 54-74, WILEY, 2020. (DOI).
  4. Dimensions of Professionalism: A Study of Computer Science Teaching in Saudi Arabia. Fayiq Alghamdi. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1965, Acta Universitatis Upsaliensis, Uppsala, 2020. (Online defence, fulltext, preview image).
  5. Strategies for array data retrieval from a relational back-end based on access patterns. Andrej Andrejev, Kjell Orsborn, and Tore Risch. In Computing, volume 102, number 5, pp 1139-1158, 2020. (DOI, Fulltext, fulltext:print).
  6. Solving Satisfaction Problems using Large-Neighbourhood Search. Gustav Björdal, Pierre Flener, Justin Pearson, Peter J. Stuckey, and Guido Tack. In Principles and Practice of Constraint Programming, volume 12333 of Lecture Notes in Computer Science, pp 55-71, 2020. (DOI).
  7. Diversified spatial keyword search on RDF data. Zhi Cai, Georgios Kalamatianos, Georgios J. Fakas, Nikos Mamoulis, and Dimitris Papadias. In The VLDB journal, volume 29, number 5, pp 1171-1189, 2020. (DOI, Fulltext, fulltext:print).
  8. Modeling and Optimization of Mobility-Aware Dynamic Caching With Time-Varying Content Popularity. Tao Deng, Pingzhi Fan, and Di Yuan. In IEEE Transactions on Vehicular Technology, volume 69, number 1, pp 1157-1162, 2020. (DOI).
  9. Analysis of DTLS Implementations Using Protocol State Fuzzing. Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, and Juraj Somorovsky. In Proceedings of the 29th USENIX Security Symposium, pp 2523-2540, 2020. (Proceedings paper fulltext, fulltext:print).
  10. Towards Explainable, Compliant and Adaptive Human-Automation Interaction. Barbara Gallina, Görkem Paçac?, David Johnson, Steve McKeever, Andreas Hamfelt, Stefania Costantini, Pierangelo Dell'Acqua, and Gloria-Cerasela Crisan. In Proceedings of the 3rd EXplainable AI in Law Workshop (XAILA 2020), volume 2891 of CEUR Workshop Proceedings, 2020. (External link, fulltext:print).
  11. Proof-theoretic Conservativity for HOL with Ad-hoc Overloading. Arve Gengelbach and Tjark Weber. In Theoretical Aspects of Computing - ICTAC 2020 - 17th International Colloquium, Macau, China, November 30 - December 4, 2020, Lecture Notes in Computer Science, pp 23-42, Springer, 2020. (DOI, External link).
  12. Unspoken Assumptions in Multi-layer Modularity maximization. Obaida Hanteer and Matteo Magnani. In Scientific Reports, volume 10, number 1, NATURE PUBLISHING GROUP, 2020. (DOI, Fulltext, fulltext:print).
  13. Multilayer network simplification: Approaches, models and methods. Roberto Interdonato, Matteo Magnani, Diego Perna, Andrea Tagarelli, and Davide Vega. In Computer Science Review, volume 36, 2020. (DOI).
  14. A structured approach to selecting the most suitable log management system for an organization. Lucas Kristiansson Herrera. Student thesis, supervisor: Isak Isacsson, examiner: Lars-Åke Nordén, Karl Marklund, UPTEC IT nr 20017, 2020. (fulltext).
  15. Particle Filter with Rejection Control and Unbiased Estimator of the Marginal Likelihood. Jan Kudlicka, Lawrence M. Murray, Thomas B. Schön, and Fredrik Lindsten. In ICASSP 2020: 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), International Conference on Acoustics Speech and Signal Processing (ICASSP), pp 5860-5864, 2020. (DOI).
  16. Probabilistic programming for birth-death models of evolution using an alive particle filter with delayed sampling. Jan Kudlicka, Lawrence M. Murray, Fredrik Ronquist, and Thomas B. Schön. In The 35th Uncertainty in Artificial Intelligence Conference (UAI), Proceedings of Machine Learning Research, pp 679-689, JOURNAL MACHINE LEARNING RESEARCH, San Diego, 2020.
  17. Parallel Graph-Based Stateless Model Checking. Magnus Lång and Konstantinos Sagonas. In Automated Technology for Verification and Analysis: 18th International Symposium, ATVA 2020, Hanoi, Vietnam, October 19–23, 2020, Proceedings, volume 12302 of Lecture Notes in Computer Science (LNCS), pp 377-393, 2020. (DOI).
  18. Wrapping a NoSQL Datastore for Stream Analytics. Khalid Mahmood, Kjell Orsborn, and Tore Risch. In 2020 IEEE 21st International Conference On Information Reuse And Integration For Data Science (IRI 2020), pp 301-305, Institute of Electrical and Electronics Engineers (IEEE), 2020. (DOI).
  19. Functional and Logic Programming: 15th International Symposium, FLOPS 2020, Akita, Japan, September 14–16, 2020, Proceedings. Keisuke Nakano and Konstantinos Sagonas (eds). Volume 12073 of Lecture Notes in Computer Science, Springer, Cham, 2020. (DOI).
  20. Reshape your layouts, not your programs: A safe language extension for better cache locality. Alexandros Tasos, Juliana Franco, Sophia Drossopoulou, Tobias Wrigstad, and Susan Eisenbach. In Science of Computer Programming, volume 197, 2020. (DOI).
  21. Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design. Kim-Anh Tran, Christos Sakalis, Magnus Själander, Alberto Ros, Stefanos Kaxiras, and Alexandra Jimborean. In PACT ’20: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques, International Conference on Parallel Architectures and Compilation Techniques, pp 241-254, Association for Computing Machinery (ACM), 2020. (DOI, External link).
  22. A Twitter-Based Study of the European Internet of Things. Funda Ustek-Spilda, Davide Vega, Matteo Magnani, Luca Rossi, Irina Shklovski, Sebastian Lehuede, and Alison Powell. In Information Systems Frontiers, volume 23, number 1, pp 135-149, 2020. (DOI, Fulltext, fulltext:print).
  23. Graph-theoretic approaches and tools for quantitatively assessing curricula coherence. Damiano Varagnolo, Steffi Knorn, Kjell Staffas, Eva Fjällström, and Tobias Wrigstad. In European Journal of Engineering Education, volume 46, number 3, pp 344-363, 2020. (DOI).
  24. Reformulations of Constraint Satisfaction Problems: A Survey. Huu-Phuc Vo. 2020. (fulltext).
  25. Improving Program Locality in the GC using Hotness. Albert Mingkun Yang, Erik Österlund, and Tobias Wrigstad. In PLDI 2020: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, pp 301-313, ASSOC COMPUTING MACHINERY, 2020. (DOI).
  26. ThinGC: complete isolation with marginal overhead. Albert Mingkun Yang, Eric Österlund, Jesper Wilhelmsson, Hanna Nyblom, and Tobias Wrigstad. In ISMM 2020: Proceedings of the 2020 ACM SIGPLAN International Symposium on Memory Management, pp 74-86, Association for Computing Machinery (ACM), 2020. (DOI).
  27. User-centric Performance Optimization with Remote Radio Head Cooperation in C-RAN. Lei You and Di Yuan. In IEEE Transactions on Wireless Communications, volume 19, number 1, pp 340-353, 2020. (DOI, External link).
  28. Leveraging Muiti-cell NOMA for Cell Edge. Zhanwei Yu, Lei You, and Di Yuan. In 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems  (IEEE ANTS), IEEE International Conference on Advanced Networks and Telecommunication Systems, Institute of Electrical and Electronics Engineers (IEEE), 2020. (DOI).
  29. Towards Pricing for Sensor-Cloud. Chunsheng Zhu, Xiuhua Li, Victor C. M. Leung, Laurence T. Yang, Edith C.-H. Ngai, and Lei Shu. In IEEE Transactions on Cloud Computing, volume 8, number 4, pp 1018-1029, 2020. (DOI).
  30. Grammar-Based Testing for Little Languages: An Experience Report with Student Compilers. Phillip van Heerden, Moeketsi Raselimo, Konstantinos Sagonas, and Bernd Fischer. In Proceedings of the 13th ACM SIGPLAN International Conference on Software Language Engineering, pp 253-269, Association for Computing Machinery (ACM), 2020. (DOI, Fulltext).
  31. A Mechanised Semantics for HOL with Ad-hoc  Overloading. Johannes Åman Pohjola and Arve Gengelbach. In , EPiC Series in Computing, pp 498-515, 2020. (DOI, Fulltext, External link).
  32. Automating regression testing on fat clientsAutomatiska regressionstester av feta klienter. Emil Österberg. Student thesis, supervisor: Ingemar Wararak, examiner: Lars-Åke Nordén, Lars-Henrik Eriksson, UPTEC IT nr 20010, 2020. (fulltext).

2019

  1. Optimal stateless model checking for reads-from equivalence under sequential consistency. Parosh Abdulla, Mohamed Faouzi Atig, Bengt Jonsson, Magnus Lång, Tuan-Phong Ngo, and Konstantinos Sagonas. In Proceedings of the ACM on Programming Languages, Association for Computing Machinery (ACM), 2019. (DOI, Fulltext, External link, fulltext:print).
  2. BS-assisted Task Offloading for D2D Networks with Presence of User Mobility. Ghafour Ahani and Di Yuan. In 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), IEEE Vehicular Technology Conference Proceedings, IEEE, 2019. (DOI).
  3. Teachers’ Awards: an Incentive for Pedagogical Development in Saudi Arabia. Fayiq Alghamdi, Aletta Nylén, and Arnold Pears. In 2019 IEEE Frontiers in Education Conference (FIE), Frontiers in Education Conference, 2019. (DOI).
  4. Molecular Drivers of Crystallization Kinetics for Drugs in Supersaturated Aqueous Solutions. Amjad Alhalaweh, Ahmad Alzghoul, and Christel A. S. Bergström. In Journal of Pharmaceutical Sciences, volume 108, number 1, pp 252-259, ELSEVIER SCIENCE INC, 2019. (DOI, fulltext:print).
  5. TOOLympics 2019: An overview of competitions in formal methods. Ezio Bartocci, Dirk Beyer, Paul E. Black, Grigory Fedyukovich, Hubert Garavel, Arnd Hartmanns, Marieke Huisman, Fabrice Kordon, Julian Nagele, Mihaela Sighireanu, Bernhard Steffen, Martin Suda, Geoff Sutcliffe, Tjark Weber, and Akihisa Yamada. In Tools and Algorithms for the Construction and Analysis of Systems: 25 years of TACAS, Part III, volume 11429 of Lecture Notes in Computer Science, pp 3-24, Springer, 2019. (DOI, Fulltext, fulltext:print).
  6. Exploring declarative local-search neighbourhoods with constraint programming. Gustav Björdal, Pierre Flener, Justin Pearson, and Peter J. Stuckey. In Principles and Practice of Constraint Programming, volume 11802 of Lecture Notes in Computer Science, pp 37-53, Springer, Switzerland, 2019. (DOI).
  7. Generating compound moves in local search by hybridisation with complete search. Gustav Björdal, Pierre Flener, and Justin Pearson. In Integration of Constraint Programming, Artificial Intelligence, and Operations Research, volume 11494 of Lecture Notes in Computer Science, pp 95-111, Springer, 2019. (DOI).
  8. Run, Actor, Run: Towards Cross-Actor Language Benchmarking. Sebastian Blessing, Kiko Fernandez-Reyes, Albert Mingkun Yang, Sophia Drossopoulou, and Tobias Wrigstad. In AGERE 2019 Proceedings of the 9th ACM SIGPLAN International Workshop on Programming Based on Actors, Agents, and Decentralized Control, pp 41-50, Association for Computing Machinery (ACM), 2019. (DOI, fulltext:postprint).
  9. The MaRiQ model: A quantitative approach to risk management. Elin Carlsson and Moa Mattsson. Student thesis, supervisor: Emelie Eriksson Thörnell, Martin Bergling, examiner: Elísabet Andrésdóttir, Björn Victor, UPTEC STS nr 19017, 2019. (fulltext).
  10. Developing a Monadic Type Checker for an Object-Oriented Language: An Experience Report. Elias Castegren and Kiko Fernandez-Reyes. In , pp 184-196, Association for Computing Machinery (ACM), 2019. (DOI, External link).
  11. Resource Optimization for Joint LWA and LTE-U in Load-Coupled and Multi-Cell Networks. Bolin Chen, Lei You, Di Yuan, Nikolaos Pappas, and Jie Zhang. In IEEE Communications Letters, volume 23, number 2, pp 330-333, 2019. (DOI).
  12. Optimizing Retention-Aware Caching in Vehicular Networks. Tao Deng, Pingzhi Fan, and Di Yuan. In IEEE Transactions on Communications, volume 67, number 9, pp 6139-6152, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019. (DOI).
  13. Accurate optimization models for interference constrained bandwith allocation in cellular networks. Grit Ecker, Di Yuan, Arie M. C. A. Koster, and Anke Schmeink. In Computers & Operations Research, volume 101, pp 1-12, 2019. (DOI).
  14. Godot: All the Benefits of Implicit and Explicit Futures. Kiko Fernandez-Reyes, Dave Clarke, Ludovic Henrio, Einar Broch Johnsen, and Tobias Wrigstad. In 33rd European Conference on Object-Oriented Programming (ECOOP 2019), volume 134 of Leibniz International Proceedings in Informatics (LIPIcs), 2019. (DOI, Fulltext, External link, fulltext:print).
  15. Courses-Concepts-Graphs as a Tool to Measure the Importance of Concepts in University Programmes. Eva Fjällstrom, Christoffer Forsberg, Felix Trulsson, Steffi Knorn, Kjell Staffas, Damiano Varagnolo, and Tobias Wrigstad. In 2019 18th European Control Conference (ECC), pp 3076-3083, IEEE, 2019. (DOI).
  16. Multiple Authentic Project-Based Experiences and Persistent Learning?. Ville Isomöttönen and Aletta Nylén. In 2019 IEEE Frontiers in Education Conference (FIE 2019), Frontiers in Education Conference, IEEE, 2019. (DOI).
  17. Finding mislabeled data in datasets: A study on finding mislabeled data in datasetsby studying loss function. Salam Jadari. Student thesis, supervisor: Johan Nyberg, examiner: Elísabet Andrésdóttir, Michael Ashcroft, UPTEC STS nr 19028, 2019. (fulltext).
  18. Comparing node degrees in probabilistic networks. Amin Kaveh, Matteo Magnani, and Christian Rohner. In Journal of Complex Networks, volume 7, number 5, pp 749-763, 2019. (DOI).
  19. Local measures for probabilistic networks. Amin Kaveh. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2019-004, Uppsala University, 2019. (fulltext).
  20. Reasoning about knowledge and messages in asynchronous multi-agent systems. Sophia Knight, Bastien Maubert, and François Schwarzentruber. In Mathematical Structures in Computer Science, volume 29, number 1, pp 127-168, 2019. (DOI).
  21. Quantitative analysis of curricula coherence using directed graphs. Steffi Knorn, Damiano Varagnolo, Kjell Staffas, Tobias Wrigstad, and Eva Fjällstrom. In IFAC-PapersOnLine, volume 52, number 9, pp 318-323, ELSEVIER, 2019. (DOI).
  22. Stateless model checking of the Linux kernel's read-copy update (RCU). Michalis Kokologiannakis and Konstantinos Sagonas. In International Journal on Software Tools for Technology Transfer, volume 21, number 3, pp 287-306, SPRINGER HEIDELBERG, 2019. (DOI, Fulltext, fulltext:print).
  23. An Analysis of the Consequences of the General Data Protection Regulation on Social Network Research. Andreas Kotsios, Matteo Magnani, Davide Vega, Luca Rossi, and Irina Shklovski. In ACM Transactions on Social Computing, volume 2, number 3, Association for Computing Machinery (ACM), 2019. (DOI, fulltext:postprint).
  24. Performance of an OO compute kernel on the JVM: Revisiting Java as a language for scientific computing applications. Malin Källén and Tobias Wrigstad. In Proc. 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, pp 144-156, ACM Press, New York, 2019. (DOI).
  25. Performance of an OO compute kernel on the JVM: Revisiting Java as a language for scientific computing applications (extended version). Malin Källén and Tobias Wrigstad. Technical report / Department of Information Technology, Uppsala University nr 2019-007, 2019. (External link, fulltext).
  26. Load Coupling and Energy Optimization in Multi-Cell and Multi-Carrier NOMA Networks. Lei Lei, Lei You, Yang Yang, Di Yuan, Symeon Chatzinotas, and Bjoern Ottersten. In IEEE Transactions on Vehicular Technology, volume 68, number 11, pp 11323-11337, 2019. (DOI).
  27. Comparison of NoSQL Datastores for Large Scale Data Stream Log Analytics. Khalid Mahmood, Kjell Orsborn, and Tore Risch. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp 478-480, IEEE, 2019. (DOI).
  28. Formal Approaches to Secure Compilation: A Survey of Fully Abstract Compilation and Related Work. Marco Patrignani, Amal Ahmed, and Dave Clarke. In ACM Computing Surveys, volume 51, number 6, 2019. (DOI).
  29. Observing the tech, using meetup data to observe the evolution of the discourse around IoT. Luca Rossi, Matteo Magnani, Davide Vega D'Aurelio, and Obaida Hanteer. In Selected Papers of Internet Research, SPIR, Annual Conference of the Association of Internet Researchers, 2019. (DOI).
  30. Concolic Testing of Higher-order Functional Languages. Konstantinos Sagonas. In Electronic Proceedings in Theoretical Computer Science, pp 2-2, Open Publishing Association, 2019. (Abstrakt).
  31. Metrics for Temporal Text Networks. Davide Vega and Matteo Magnani. In Temporal Network Theory, pp 147-160, Springer, 2019. (DOI, fulltext:preprint).
  32. Machine-Assisted Reformulation for MiniZinc. Huu-Phuc Vo. In , 2019. (fulltext:postprint).
  33. Towards Efficient Algorithms for Constraint Satisfaction Problems. Huu-Phuc Vo. In , 2019. (fulltext:postprint).
  34. Towards Efficient Solvers for Optimisation Problems. Huu-Phuc Vo. In Proc. 19th International Symposium on Cluster, Cloud and Grid Computing, IEEE-ACM International Symposium on Cluster Cloud and Grid Computing, pp 169-172, 2019. (DOI).
  35. Routing and wavelength assignment vs EDFA reliability performance in optical backbone networks: An operational cost perspective. Pawel Wiatr, Jiajia Chen, Paolo Monti, Lena Wosinska, and Di Yuan. In Optical Switching and Networkning Journal, volume 31, pp 211-217, 2019. (DOI).
  36. Network Optimization of Evolving Mobile Systems with Presence of Interference Coupling. Lei You. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1843, Acta Universitatis Upsaliensis, Uppsala, 2019. (fulltext, preview image).
  37. Joint Resource Allocation for Latency-Sensitive Services Over Mobile Edge Computing Networks With Caching. Jiao Zhang, Xiping Hu, Zhaolong Ning, Edith Ngai, Li Zhou, Jibo Wei, Jun Cheng, Bin Hu, and Victor C. M. Leung. In IEEE Internet of Things Journal, volume 6, number 3, pp 4283-4294, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019. (DOI).
  38. Announcement as effort on topological spaces. Hans van Ditmarsch, Sophia Knight, and Aybüke Özgün. In Synthese, volume 196, number 7, pp 2927-2969, 2019. (DOI, Fulltext).
  39. Progress Report: Exploring API Design for Capabilities for Programming with Arrays. Beatrice Åkerblom, Elias Castegren, and Tobias Wrigstad. In Proceedings Of The 12Th Workshop On Implementation, Compilation And Optimization Of Object-Oriented Languages, Programs And Systems (ICOOOLPS' 19), Association for Computing Machinery (ACM), New York, 2019. (DOI).

2018

  1. Optimal Stateless Model Checking under the Release-Acquire Semantics. Parosh Abdulla, Mohamed Faouzi Atig, Bengt Jonsson, and Tuan-Phong Ngo. In Proceedings of the ACM on Programming Languages, volume 2, number OOPSLA, pp 1-29, Association for Computing Machinery (ACM), 2018. (DOI, Fulltext, fulltext:print).
  2. On optimal proactive and retention-aware caching with user mobility. Ghafour Ahani and Di Yuan. In 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), IEEE Vehicular Technology Conference Proceedings, IEEE, 2018. (DOI).
  3. Changing the Educational Epistemologies of Computer Science Teachers: A Case Study of the Kingdom of Saudi Arabia. Fayiq Alghamdi, Aletta Nylén, and Arnold Pears. In 2018 IEEE Frontiers in Education Conference (FIE), Frontiers in Education Conference, IEEE, Piscataway, NJ, 2018. (DOI).
  4. Computer science teachers perspectives on competencies: A case study in the Kingdom of Saudi Arabia. Fayiq Alghamdi, Arnold Pears, and Aletta Nylén. In Informatics in Schools. Fundamentals of Computer Science and Software Engineering, volume 11169 of Lecture Notes in Computer Science, pp 129-140, Springer, 2018. (DOI).
  5. Effective Techniques for Stateless Model Checking. Stavros Aronis. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1602, Acta Universitatis Upsaliensis, Uppsala, 2018. (fulltext, preview image).
  6. Optimal dynamic partial order reduction with observers. Stavros Aronis, Bengt Jonsson, Magnus Lång, and Konstantinos Sagonas. In Tools and Algorithms for the Construction and Analysis of Systems: Part II, volume 10806 of Lecture Notes in Computer Science, pp 229-248, Springer, 2018. (DOI, Fulltext, Förlagets fulltext - Bok, fulltext:print).
  7. International Workshop on Mining Attributed Networks (MATNET 2018) Chairs' Welcome. Martin Atzmueller, Sabrina Gaito, Roberto Interdonato, Rushed Kanawati, Christine Largeron, Matteo Magnani, and Alessandra Sala. In WWW '18: Companion Proceedings of the Web Conference 2018, pp 1231-1233, Association for Computing Machinery (ACM), 2018. (DOI).
  8. Preface for the special issue on Interaction and Concurrency Experience 2016. Massimo Bartoletti, Ludovic Henrio, Sophia Knight, and Hugo Torres Vieira. In The Journal of logical and algebraic methods in programming, volume 98, pp 26-26, 2018. (DOI).
  9. Declarative local-search neighbourhoods in MiniZinc. Gustav Björdal, Pierre Flener, Justin Pearson, Peter J. Stuckey, and Guido Tack. In PROCEEDINGS OF THE 2018 IEEE 30TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), pp 98-105, IEEE Computer Society, 2018. (DOI).
  10. Using XGBoost to classify theBeihang Keystroke Dynamics Database. Johanna Blomqvist. Student thesis, supervisor: David Strömberg, Daniel Lindberg, examiner: Tomas Nyberg, Michael Ashcroft, UPTEC F nr 18049, 2018. (fulltext).
  11. C?: A New Modular Approach to Implementing Efficient and Tunable Collections. Stephan Brandauer, Elias Castegren, and Tobias Wrigstad. In Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward! 2018), pp 57-71, ACM, 2018. (DOI).
  12. Structured Data. Stephan Brandauer. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1749, Acta Universitatis Upsaliensis, Uppsala, 2018. (fulltext, preview image).
  13. Quantifying layer similarity in multiplex networks: a systematic study. Piotr Brodka, Anna Chmiel, Matteo Magnani, and Giancarlo Ragozini. In Royal Society Open Science, volume 5, number 8, ROYAL SOC, 2018. (DOI, Fulltext, fulltext:print).
  14. Attached and Detached Closures in Actors. Elias Castegren, Dave Clarke, Kiko Fernandez-Reyes, Tobias Wrigstad, and Albert Mingkun Yang. In Proceedings of the 8th ACM SIGPLAN International Workshop on Programming Based on Actors, Agents, and Decentralized Control, pp 54-61, ACM Digital Library, 2018. (DOI).
  15. Bestow and Atomic: Concurrent programming using isolation, delegation and grouping. Elias Castegren, Joel Wallin, and Tobias Wrigstad. In The Journal of logical and algebraic methods in programming, volume 100, pp 130-151, 2018. (DOI).
  16. Capability-Based Type Systems for Concurrency Control. Elias Castegren. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1611, Acta Universitatis Upsaliensis, Uppsala, 2018. (fulltext, preview image).
  17. OOlong: An Extensible Concurrent Object Calculus. Elias Castegren and Tobias Wrigstad. In SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, pp 1022-1029, 2018. (DOI, fulltext:postprint).
  18. OOlong: A Concurrent Object Calculus for Extensibility and Reuse. Elias Castegren and Tobias Wrigstad. In ACM SIGAPP Applied Computing Review, volume 18, number 4, pp 47-60, Association for Computing Machinery, 2018. (DOI).
  19. Cost-optimal caching for D2D networks with user mobility: Modeling, analysis, and computational approaches. Tao Deng, Ghafour Ahani, Pingzhi Fan, and Di Yuan. In IEEE Transactions on Wireless Communications, volume 17, number 5, pp 3082-3094, 2018. (DOI).
  20. Device caching for network offloading: Delay minimization with presence of user mobility. Tao Deng, Lei You, Pingzhi Fan, and Di Yuan. In IEEE Wireless Communications Letters, volume 7, number 4, pp 558-561, 2018. (DOI).
  21. Exploring properties of a telecommunication protocol with message delay using interactive theorem prover. Catherine Dubois, Olga Grinchtein, Justin Pearson, and Mats Carlsson. In Software Engineering and Formal Methods, volume 10886 of Lecture Notes in Computer Science, pp 239-253, Springer, 2018. (DOI).
  22. Thematic ranking of object summaries for keyword search. Georgios J. Fakas, Yilun Cai, Zhi Cai, and Nikos Mamoulis. In Data & Knowledge Engineering, volume 113, pp 1-17, 2018. (DOI).
  23. A generalized force-directed layout for multiplex sociograms. Zahra Fatemi, Matteo Magnani, and Mostafa Salehi. In Social Informatics: 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018, Proceedings, Part I, volume 0302-9743 of Lecture Notes in Computer Science, pp 212-227, Springer, 2018. (DOI).
  24. Forward to a Promising Future. Kiko Fernandez-Reyes, Dave Clarke, Elias Castegren, and Huu-Phuc Vo. In Conference proceedings COORDINATION 2018, 2018. (fulltext:preprint).
  25. The impact of opt-in gamification on students' grades in a software design course. Kiko Fernandez-Reyes, Dave Clarke, and Janina Hornbach. In Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, pp -97, ACM Publications, New York, NY, USA, 2018. (DOI).
  26. Correctness of a concurrent object collector for actor languages. Juliana Franco, Sylvan Clebsch, Sophia Drossopoulou, Jan Vitek, and Tobias Wrigstad. In Programming Languages and Systems, volume 10801 of Lecture Notes in Computer Science, pp 885-911, Springer, 2018. (DOI, Fulltext).
  27. Safely Abstracting Memory Layouts. Juliana Franco, Alexandros Tasos, Sophia Drossopoulou, Tobias Wrigstad, and Susan Eisenbach. In 20th Workshop on Formal Techniques for Java-like Programs, 2018. (External link).
  28. Model-theoretic Conservative Extension of Definitional Theories. Arve Gengelbach and Tjark Weber. In Electronic Notes in Theoretical Computer Science, volume 338, pp 133-145, 2018. (DOI, Fulltext, fulltext:print).
  29. From Interaction to Participation: The Role of the Imagined Audience in Social Media Community Detection and an Application to Political Communication on Twitter. Obaida Hanteer, Luca Rossi, Davide Vega, and Matteo Magnani. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 531-534, IEEE Computer Society, 2018. (DOI).
  30. How students get going: Triggers for students' learning in project-based education. Ville Isomöttönen and Aletta Nylén. In Proc. 23rd Conference on Innovation and Technology in Computer Science Education, pp 117-122, ACM Press, New York, 2018. (DOI).
  31. HiPErJiT: A Profile-Driven Just-in-Time Compiler for Erlang. Konstantinos Kallas and Konstantinos Sagonas. In Proceedings of the 30th Symposium on Implementation and Application ff Functional Languages (IFL 2018), pp 25-36, Association for Computing Machinery (ACM), 2018. (DOI).
  32. Understanding initial undergraduate expectations and identity in computing studies. Päivi Kinnunen, Matthew Butler, Michael Morgan, Aletta Nylén, Anne-Kathrin Peters, Jane Sinclair, Sara Kalvala, and Erkki Pesonen. In European Journal of Engineering Education, volume 43, number 2, pp 201-218, 2018. (DOI).
  33. Queue Delegation Locking. David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. In IEEE Transactions on Parallel and Distributed Systems, volume 29, number 3, pp 687-704, IEEE COMPUTER SOC, 2018. (DOI).
  34. Effective Stateless Model Checking for C/C++ Concurrency. Michalis Kokologiannakis, Ori Lahav, Konstantinos Sagonas, and Viktor Vafeiadis. In Proceedings of the ACM on Programming Languages, volume 2, number POPL, pp 1-32, ACM Press, 2018. (DOI, Fulltext, fulltext:print).
  35. Efficient minimum-energy scheduling with machine-learning based predictions for multiuser MISO systems. Lei Lei, Thang X. Vu, Lei You, Scott Fowler, and Di Yuan. In Proc. International Conference on Communications: ICC 2018, IEEE Communications Society, 2018. (DOI).
  36. Power and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks. Lei Lei, Lei You, Yang Yang, Di Yuan, Symeon Chatzinotas, and Bjorn Ottersten. In 2018 IEEE Global Communications Conference (GLOBECOM), IEEE Global Communications Conference, IEEE, 2018. (DOI).
  37. A Skiplist-Based Concurrent Priority Queue with Minimal Memory Contention. Jonatan Lindén and Bengt Jonsson. Technical report / Department of Information Technology, Uppsala University nr 2018-003, 2018. (fulltext).
  38. A Skiplist-Based Concurrent Priority Queue with Minimal Memory Contention. Jonatan Lindén and Bengt Jonsson. Technical report / Department of Information Technology, Uppsala University nr 2013-025, 2018. (fulltext).
  39. Automating Targeted Property-Based Testing. Andreas Löscher and Konstantinos Sagonas. In IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), IEEE International Conference on Software Testing Verification and Validation, pp 70-80, IEEE, 2018. (DOI).
  40. Delayed sampling and automatic Rao-Blackwellization of probabilistic programs. Lawrence Murray, Daniel Lundén, Jan Kudlicka, David Broman, and Thomas B. Schön. In Proceedings of the 21st International Conference on Artificial Intelligence and Statistics (AISTATS), Lanzarote, Spain, April, 2018, Proceedings of Machine Learning Research, 2018. (External link).
  41. Why are we here?: The educational value model (EVM) as a framework to investigate the role of students’ professional identity development. Aletta Nylén, Mats Daniels, Arnold Pears, Åsa Cajander, Roger McDermott, and Ville Isomöttönen. In 2018 IEEE Frontiers in Education Conference (FIE), Frontiers in Education Conference, IEEE, Piscataway, NJ, 2018. (DOI).
  42. Application of the German Traffic Sign Recognition Benchmark on the VGG16 network using transfer learning and bottleneck features in Keras. Siri Persson. Student thesis, supervisor: Magnus Lundstedt, examiner: Tomas Nyberg, Michael Ashcroft, UPTEC F nr 18 003, 2018. (fulltext).
  43. A contention adapting approach to concurrent ordered sets. Konstantinos Sagonas and Kjell Winblad. In Journal of Parallel and Distributed Computing, volume 115, pp 1-19, ACADEMIC PRESS INC ELSEVIER SCIENCE, 2018. (DOI).
  44. Progress on Algorithms for Stateless Model Checking. Konstantinos Sagonas. In Proceedings of the Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation, OPEN PUBL ASSOC, 2018. (DOI, External link).
  45. Extending SHAPES for SIMD Architectures –: An approach to native support for Struct of Arrays in languages. Alexandros Tasos, Juliana Franco, Tobias Wrigstad, Sophia Drossopoulou, and Susan Eisenbach. In 13th Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems Workshop, 2018. (External link).
  46. Partial and Overlapping Community Detection in Multiplex Social Networks. Nazanin Afsarmanesh Tehrani and Matteo Magnani. In 10th International Conference on Social Informatics (SocInfo2018 ), volume 11186 of Lecture Notes in Computer Science, pp 15-28, Springer, 2018. (DOI).
  47. Foundations of Temporal Text Networks. Davide Vega and Matteo Magnani. In Applied Network Science, volume 3, number 25, 2018. (DOI, Fulltext, fulltext:print).
  48. Optical Interconnect Architectures for Datacenters. Pawel Wiatr, Di Yuan, Lena Wosinska, and Jiajia Chen. In 2018 IEEE Photonics Conference (IPC), IEEE Photonics Conference, IEEE, 2018. (DOI).
  49. Reliability performance aware routing. Pawel Wiatr and Di Yuan. In Proc. 10th International Workshop on Resilient Networks Design and Modeling, IEEE, 2018. (DOI).
  50. Dynamic Adaptations of Synchronization Granularity in Concurrent Data Structures. Kjell Winblad. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1684, Acta Universitatis Upsaliensis, Uppsala, 2018. (fulltext, preview image).
  51. Lock-free Contention Adapting Search Trees. Kjell Winblad, Konstantinos Sagonas, and Bengt Jonsson. In The 30th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2018, New York, NY, USA, 2018. (DOI).
  52. Resource Optimization With Flexible Numerology and Frame Structure for Heterogeneous Services. Lei You, Qi Liao, Nikolaos Pappas, and Di Yuan. In IEEE Communications Letters, volume 22, number 12, pp 2579-2582, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2018. (DOI).
  53. Resource optimization with load coupling in multi-cell NOMA. Lei You, Di Yuan, Lei Lei, Sumei Sun, Symeon Chatzinotas, and Björn Ottersten. In IEEE Transactions on Wireless Communications, volume 17, number 7, pp 4735-4749, 2018. (DOI).
  54. Private announcements on topological spaces. Hans van Ditmarsch, Sophia Knight, and Aybüke Özgün. In Studia Logica: An International Journal for Symbolic Logic, volume 106, number 3, pp 481-513, 2018. (DOI, Fulltext).
  55. Parallel Programming With Arrays in Kappa. Beatrice Åkerblom, Elias Castegren, and Tobias Wrigstad. In 5th ACM SIGPLAN International Workshop on Libraries, Languages and Compilers for Array Programming, 2018. (External link).

2017

  1. Comparing source sets and persistent sets for partial order reduction. Parosh Abdulla, Stavros Aronis, Bengt Jonsson, and Konstantinos Sagonas. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pp 516-536, Springer, 2017. (DOI).
  2. Source Sets: A Foundation for Optimal Dynamic Partial Order Reduction. Parosh Abdulla, Stavros Aronis, Bengt Jonsson, and Konstantinos Sagonas. In Journal of the ACM, volume 64, number 4, Association for Computing Machinery (ACM), 2017. (DOI).
  3. Stateless model checking for TSO and PSO. Parosh Aziz Abdulla, Stavros Aronis, Mohamed Faouzi Atig, Bengt Jonsson, Carl Leonardsson, and Konstantinos Sagonas. In Acta Informatica, volume 54, number 8, pp 789-818, 2017. (DOI).
  4. Why do female students choose to study CS in the Kingdom of Saudi Arabia?. Fayiq Alghamdi. In Proc. 5th International Conference on Learning and Teaching in Computing and Engineering, International Conference on Teaching and Learning in Computing and Engineering, pp 49-53, IEEE Computer Society, 2017. (DOI, fulltext:postprint).
  5. MiniZinc with strings. Roberto Amadini, Pierre Flener, Justin Pearson, Joseph D. Scott, Peter J. Stuckey, and Guido Tack. In Logic-Based Program Synthesis and Transformation, volume 10184 of Lecture Notes in Computer Science, pp 59-75, Springer, 2017. (DOI).
  6. Testing And Verifying Chain Repair Methods For CORFU Using Stateless Model Checking. Stavros Aronis, Konstantinos Sagonas, and Scott Lystig Fritchie. In , volume 10510 of Lecture Notes in Computer Science, pp 227-242, Springer, Cham, 2017. (DOI, fulltext:postprint).
  7. The shared-memory interferences of Erlang/OTP built-ins. Stavros Aronis and Konstantinos Sagonas. In Proceedings Of The 16Th Acm Sigplan International Workshop On Erlang (Erlang '17), pp 43-54, Association for Computing Machinery (ACM), New York, 2017. (DOI, fulltext:postprint).
  8. Selected and extended papers from Partial Evaluation and Program Manipulation 2015 (PEPM ' 15). Kenichi Asai and Konstantinos Sagonas. In Science of Computer Programming, volume 137, pp 1-1, ELSEVIER SCIENCE BV, 2017. (DOI).
  9. Proc. 10th Interaction and Concurrency Experience. Massimo Bartoletti, Laura Bocchi, Ludovic Henrio, and Sophia Knight (eds). Volume 261 of Electronic Proceedings in Theoretical Computer Science, Open Publishing Association, 2017. (DOI, Fulltext).
  10. A Join Operator for Property Graphs. Giacomo Bergami, Matteo Magnani, and Danilo Montesi. In EDBT/ICDT Workshops, 2017.
  11. Deriving Probability Density Functions from Probabilistic Functional Programs. Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, and Claudio Russo. In Logical Methods in Computer Science, volume 13, number 2, 2017. (DOI, Fulltext).
  12. Mining for Safety using Interactive Trace Analysis. Stephan Brandauer and Tobias Wrigstad. In Pre-Proceedings - Fifteenth International Workshop on Quantitative Aspects of Programming Languages and Systems, 2017. (Pre-Proceedings, fulltext:print).
  13. Spencer: Interactive Heap Analysis for the Masses. Stephan Brandauer and Tobias Wrigstad. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), IEEE International Working Conference on Mining Software Repositories, pp 113-123, IEEE, 2017. (DOI, External link, fulltext:postprint).
  14. Multiple time-series forecasting on mobile network data using an RNN-RBM model. Arvid Bäärnhielm. Student thesis, supervisor: Tor Kvernvik, examiner: Tomas Nyberg, Justin Pearson, UPTEC F nr 17005, 2017. (fulltext).
  15. Unexpected student behaviour and learning opportunities: Using the theory of planned behaviour to analyse a critical incident. Åsa Cajander, Mats Daniels, Diane Golay, Jonas Moll, Aletta Nylén, Arnold Pears, Anne-Kathrin Peters, and Roger McDermott. In Proc. 47th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2017. (DOI).
  16. Modelling and verification of user interactions using constraint programming. Mats Carlsson, Olga Grinchtein, and Justin Pearson. In Proc. 3rd International Conference on Software Quality, Reliability and Security, pp 541-547, IEEE Computer Society, 2017. (DOI).
  17. Actors without Borders: Amnesty for Imprisoned State. Elias Castegren and Tobias Wrigstad. In , pp 10-20, 2017. (DOI, Fulltext, Fulltext, fulltext:postprint).
  18. Reference Capabilities for Concurrency & Scalability: an Experience Report. Elias Castegren and Tobias Wrigstad. In , 2017. (fulltext:preprint).
  19. Relaxed Linear References for Lock-free Data Structures. Elias Castegren and Tobias Wrigstad. In , pp 47:1-47:31, 2017. (DOI, Fulltext, External link, fulltext:postprint).
  20. Types for CAS: Relaxed Linearity with Ownership Transfer. Elias Castegren and Tobias Wrigstad. 2017.
  21. Orca: GC and Type System Co-design for Actor Languages. Sylvan Clebsch, Juliana Franco, Sophia Drossopoulou, Albert Mingkun Yang, Tobias Wrigstad, and Jan Vitek. In Proceedings of the ACM on Programming Languages, volume 1, number OOPSLA, pp 1-28, ACM, 2017. (DOI, Fulltext, External link, fulltext:print).
  22. A survey of active object languages. Frank De Boer, Vlad Serbanescu, Reiner Hähnle, Ludovic Henrio, Justine Rochas, Crystal Chang Din, Einar Broch Johnsen, Marjan Sirjani, Ehsan Khamespanah, Kiko Fernández-Reyes, and Albert Mingkun Yang. In ACM Computing Surveys, volume 50, number 5, Association for Computing Machinery (ACM), 2017. (DOI).
  23. Auto-tabling for subproblem presolving in MiniZinc. Jip J. Dekker, Gustav Björdal, Mats Carlsson, Pierre Flener, and Jean-Noël Monette. In Constraints, volume 22, number 4, pp 512-529, 2017. (DOI, Fulltext).
  24. Cost-Optimal Caching for D2D Networks with Presence of User Mobility. Tao Deng, Ghafour Ahani, Pingzhi Fan, and Di Yuan. In GLOBECOM 2017 - 2017 IEEE Global Communications Conference, IEEE Global Communications Conference, IEEE, 2017. (DOI).
  25. Affine killing: Semantics for stopping the ParT. Kiko Fernandez-Reyes and Dave Clarke. In Proc. 2nd International Workshop on Type-Driven Development, ACM Press, New York, 2017. (fulltext:postprint).
  26. Analysis, synthesis and application of automaton-based constraint descriptions. María Andreína Francisco Rodríguez. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1591, Acta Universitatis Upsaliensis, Uppsala, 2017. (fulltext, preview image, errata).
  27. Automatic generation of descriptions of time-series constraints. María Andreína Francisco Rodríguez, Pierre Flener, and Justin Pearson. In IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), Proceedings-International Conference on Tools With Artificial Intelligence, pp 102-109, IEEE Computer Society, 2017. (DOI).
  28. You can have it all: abstraction and good cache performance. Juliana Franco, Martin Hagelin, Tobias Wrigstad, Sophia Drossopoulou, and Susan Eisenbach. In Onward! 2017: Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, pp 148-167, Association for Computing Machinery (ACM), 2017. (DOI, fulltext:print).
  29. Shortest Paths in Multiplex Networks. Saeed Ghariblou, Mostafa Salehi, Matteo Magnani, and Mahdi Jalili. In Scientific Reports, volume 7, 2017. (DOI, Fulltext, fulltext:print).
  30. Concolic testing for functional languages. Aggelos Giantsios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Science of Computer Programming, volume 147, pp 109-134, 2017. (DOI).
  31. Stateless model checking of the Linux kernel's hierarchical read-copy-update (tree RCU). Michalis Kokologiannakis and Konstantinos Sagonas. In Proc. 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, pp 172-181, ACM Press, New York, 2017. (DOI).
  32. A deep learning approach for optimizing content delivering in cache-enabled HetNet. Lei Lei, Lei You, Gaoyang Dai, Thang Xuan Vu, Di Yuan, and Symeon Chatzinotas. In Proc. 14th International Symposium on Wireless Communication Systems, pp 449-453, IEEE, 2017. (DOI).
  33. Blockchain technology in Scania Services: An investigative study of how blockchain technology can be utilized by Scania. Jim Lindberg. Student thesis, supervisor: Susan Miller Tiedemann, examiner: Elísabet Andrésdóttir, Björn Victor, UPTEC STS nr 17031, 2017. (fulltext).
  34. Targeted property-based testing. Andreas Löscher and Konstantinos Sagonas. In Proc. 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 46-56, ACM Press, New York, 2017. (DOI).
  35. Introduction to the special issue on multilayer networks. Matteo Magnani and Stanley Wasserman. In NETWORK SCIENCE, volume 5, number 2, pp 141-143, CAMBRIDGE UNIV PRESS, 2017. (DOI).
  36. The authenticity of 'authentic' assessment: Some faculty perceptions. Roger McDermott, Mark Zarb, Mats Daniels, Aletta Nylén, Arnold Pears, Ville Isomöttönen, and Michael Caspersen. In Proc. 47th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2017. (DOI).
  37. VisDM-A Data Stream Visualization Platform. Lars Melander, Kjell Orsborn, Tore Risch, and Daniel Wedlund. In Database Systems For Advanced Applications (DASFAA 2017), Proceedings Pt II, volume 10178 of Lecture Notes in Computer Science, pp 677-680, SPRINGER INTERNATIONAL PUBLISHING AG, 2017. (DOI).
  38. Examining manual and semi-automated methods of analysing MOOC data for computing education. Michael Morgan, Matthew Butler, Neena Thota, Aletta Nylén, Anna Eckerdal, and Päivi Kinnunen. In Proc. 17th International Conference on Computing Education Research: Koli Calling, pp 153-157, ACM Press, New York, 2017. (DOI).
  39. Exploring the critical incident technique to encourage reflection during project-based learning. Aletta Nylén and Ville Isomöttönen. In Proc. 17th International Conference on Computing Education: Koli Calling, pp 88-97, ACM Press, New York, 2017. (DOI).
  40. Open-ended projects opened up – aspects of openness. Aletta Nylén, Mats Daniels, Ville Isomöttönen, and Roger McDermott. In Proc. 47th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2017. (DOI).
  41. Why are we here?: Student perspectives on the goal of STEM higher education. Aletta Nylén, Åsa Cajander, Mats Daniels, Arnold Pears, and Roger McDermott. In Proc. 47th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2017. (DOI).
  42. Weak Nominal Modal Logic. Joachim Parrow, Tjark Weber, Johannes Borgström, and Lars-Henrik Eriksson. In Formal Techniques for Distributed Objects, Components, and Systems, volume 10321 of Lecture Notes in Computer Science, pp 179-193, Springer, 2017. (DOI).
  43. Typed connector families and their semantics. Jose Proenca and Dave Clarke. In Science of Computer Programming, volume 146, pp 28-49, 2017. (DOI).
  44. The Contention Avoiding Concurrent Priority Queue. Konstantinos Sagonas and Kjell Winblad. In Languages and Compilers for Parallel Computing, volume 10136 of Lecture Notes in Computer Science, pp 314-330, Springer, 2017. (DOI).
  45. Design and implementation of bounded-length sequence variables. Joseph D. Scott, Pierre Flener, Justin Pearson, and Christian Schulte. In Integration of AI and OR Techniques in Constraint Programming, volume 10335 of Lecture Notes in Computer Science, pp 51-67, 2017. (DOI).
  46. Scaling Reliably: Improving the scalability of the Erlang distributed actor platform. Phil Trinder, Natalia Chechina, Nikolaos Papaspyrou, Konstantinos Sagonas, Simon Thompson, Stephen Adams, Stavros Aronis, Robert Baker, Eva Bihari, Olivier Boudeville, Francesco Cesarini, Maurizio Di Stefano, Sverker Eriksson, Viktória Förd?s, Amir Ghaffari, Aggelos Giantsios, Rickard Green, Csaba Hoch, David Klaftenegger, Huiqing Li, Kenneth Lundin, Kenneth Mackenzie, Katerina Roukounaki, Yiannis Tsiouris, and Kjell Winblad. In ACM Transactions on Programming Languages and Systems, volume 39, number 4, 2017. (DOI).
  47. A Radar Signal Processing Case Study for Dataflow Programming of Manycores. Zain Ul-Abdin and Albert Mingkun Yang. In Journal of Signal Processing Systems, volume 87, number 1, pp 49-62, 2017. (DOI).
  48. A perspective from Vietnamese students on teaching of soft skills. Huu-Phuc Vo, Anders Berglund, and Mats Daniels. In Proc. 5th International Conference on Learning and Teaching in Computing and Engineering, International Conference on Teaching and Learning in Computing and Engineering, pp 23-24, IEEE Computer Society, 2017. (DOI).
  49. Digital Capital: A platform for developing computational thinking. Tina Vrieler. In Proc. 17th International Conference on Computing Education Research: Koli Calling, pp 205-206, ACM Press, New York, 2017. (DOI).
  50. What computing instructors did last summer: Experiences and lessons learned. Tina Vrieler, Aletta Nylén, and Åsa Cajander. In Proc. 47th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2017. (DOI).
  51. Device Reliability Performance Awareness: Impact of RWA on EDFA Failure Reparation Cost in Optical Networks. Pawel Wiatr, Jiajia Chen, Paolo Monti, Lena Wosinska, and Di Yuan. In Proceedings of 2017 9Th International Workshop On Resilient Networks Design And Modeling (Rndm), IEEE, 2017.
  52. Mastery Learning-Like Teaching with Achievements. Tobias Wrigstad and Elias Castegren. In , 2017. (fulltext:postprint).
  53. Scalable validation of industrial equipment using a functional DSMS. Cheng Xu, Elisabeth Källström, Tore Risch, John Lindström, Lars Håkansson, and Jonas Larsson. In Journal of Intelligent Information Systems, volume 48, number 3, pp 553-577, 2017. (DOI, Fulltext, fulltext:print).
  54. Type-assisted automatic garbage collection for lock-free data structures. Albert Mingkun Yang and Tobias Wrigstad. In SIGPLAN notices, volume 52, number 9, pp 14-24, ACM Press, New York, 2017. (DOI).
  55. A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource. Lei You, Lei Lei, Di Yuan, Sumei Sun, Symeon Chatzinotas, and Bjoern Ottersten. In GLOBECOM 2017 - 2017 IEEE Global Communications Conference, IEEE Global Communications Conference, IEEE, 2017. (DOI).
  56. Energy-Aware Wireless Relay Selection in Load-Coupled OFDMA Cellular Networks. Lei You, Di Yuan, Nikolaos Pappas, and Peter Varbrand. In IEEE Communications Letters, volume 21, number 1, pp 144-147, Institute of Electrical and Electronics Engineers (IEEE), 2017. (DOI).
  57. Joint CoMP-Cell Selection and Resource Allocation in Fronthaul-Constrained C-RAN. Lei You and Di Yuan. In Proc. 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, IEEE, 2017. (DOI).
  58. From Machine Arithmetic to Approximations and back again: Improved SMT Methods for Numeric Data Types. Aleksandar Zeljic. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1603, Acta Universitatis Upsaliensis, Uppsala, 2017. (fulltext, preview image).

2016

  1. Recency-Bounded Verification of Dynamic Database-Driven Systems. Parosh Aziz Abdulla, Aiswarya Cyriac, Mohamed Faouzi Atig, Marco Montali, and Othmane Rezine. In PODS'16: PROCEEDINGS OF THE 35TH ACM SIGMOD-SIGACT-SIGAI SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, pp 195-210, 2016. (DOI).
  2. Women in computing in Saudi Arabia. Fayiq Alghamdi. In Proc. 3rd ACM-W Europe Celebration of Women in Computing, pp 1-3, 2016. (fulltext:print).
  3. Semantic Web Queries over Scientific Data. Andrej Andrejev. Ph.D. thesis, Uppsala Dissertations from the Faculty of Science and Technology nr 121, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  4. Global Constraint Catalog: Volume II, time-series constraints. Ekaterina Arafailova, Nicolas Beldiceanu, Rémi Douence, Mats Carlsson, Pierre Flener, María Andreína Francisco Rodríguez, Justin Pearson, and Helmut Simonis. Computing Research Repository nr 1609.08925, 2016. (External link).
  5. Systematic derivation of bounds and glue constraints for time-series constraints. Ekaterina Arafailova, Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, María Andreína Francisco Rodríguez, Justin Pearson, and Helmut Simonis. In Principles and Practice of Constraint Programming: CP 2016, volume 9892 of Lecture Notes in Computer Science, pp 13-29, Springer, 2016. (DOI).
  6. Time-series constraints: Improvements and application in CP and MIP contexts. Ekaterina Arafailova, Nicolas Beldiceanu, Rémi Douence, Pierre Flener, María Andreína Francisco Rodríguez, Justin Pearson, and Helmut Simonis. In Integration of AI and OR Techniques in Constraint Programming, volume 9676 of Lecture Notes in Computer Science, pp 18-34, Springer, 2016. (DOI).
  7. Multi-domain alias matching using machine learning. Michael Ashcroft, Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 3rd European Network Intelligence Conference, pp 77-84, IEEE, 2016. (DOI, fulltext:postprint).
  8. Multilayer Analysis of Online Illicit Marketplaces. Michael Ashcroft, Matteo Magnani, Davide Vega, Danilo Montesi, and Luca Rossi. In 2016 European Intelligence And Security Informatics Conference (EISIC), European Intelligence and Security Informatics Conference, pp 199-199, IEEE, 2016. (DOI).
  9. Framework for real-time clustering over sliding windows. Sobhan Badiozamany, Kjell Orsborn, and Tore Risch. In Proc. 28th International Conference on Scientific and Statistical Database Management, pp 1-13, ACM Press, New York, 2016. (DOI).
  10. Real-time data stream clustering over sliding windows. Sobhan Badiozamany. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1431, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  11. Preface. Massimo Bartoletti, Ludovic Henrio, Sophia Knight, Hugo Torres Vieira, Alexandra Silva, Youssef Arbach, David S. Karcher, Kirstin Peters, and Uwe Nestmann. In Electronic Proceedings in Theoretical Computer Science, number 223, OPEN PUBL ASSOC, 2016.
  12. Proc. 9th Interaction and Concurrency Experience. Massimo Bartoletti, Ludovic Henrio, Sophia Knight, and Hugo Torres Vieira (eds). Volume 223 of Electronic Proceedings in Theoretical Computer Science, Open Publishing Association, 2016. (DOI, Fulltext).
  13. Psi-Calculi in Isabelle. Jesper Bengtson, Joachim Parrow, and Tjark Weber. In Journal of automated reasoning, volume 56, number 1, pp 1-47, 2016. (DOI).
  14. Industrial Evaluation of Test Suite Generation Strategies for Model-Based Testing. Johan Blom, Bengt Jonsson, and Sven-Olof Nyström. In , 2016. (DOI).
  15. A Lambda-Calculus Foundation for Universal Probabilistic Programming. Johannes Borgström, Ugo Dal Lago, Andrew D. Gordon, and Marcin Szymczak. In SIGPLAN notices, volume 51, number 9, pp 33-46, 2016. (DOI, fulltext:postprint).
  16. A Sorted Semantic Framework for Applied Process Calculi. Johannes Borgström, Ramunas Gutkovas, Joachim Parrow, Björn Victor, and Johannes Åman Pohjola. In Logical Methods in Computer Science, volume 12, number 1, pp 1-49, 2016. (DOI, Fulltext, fulltext:postprint).
  17. Fabular: Regression formulas as probabilistic programming. Johannes Borgström, Andrew D. Gordon, Long Ouyang, Claudio Russo, Adam Scibior, and Marcin Szymczak. In Proc. 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, volume 51(1) of ACM SIGPLAN Notices, pp 271-283, ACM Press, New York, 2016. (DOI, fulltext:postprint).
  18. A formal model of service-oriented dynamic object groups. Einar Broch Johnsen, Olaf Owe, Dave Clarke, and Joakim Bjørk. In Science of Computer Programming, volume 115–116, pp 3-22, 2016. (DOI).
  19. Extended versions of papers presented at WS-FM 2014 and Beat 2014. Marco Carbone, Thomas Hildebrandt, Joachim Parrow, and Matthias Weidlich. In Formal Aspects of Computing, volume 28, number 4, pp 529-530, 2016. (DOI).
  20. Active learning for extended finite state machines. Sofia Cassel, Falk Howar, Bengt Jonsson, and Bernhard Steffen. In Formal Aspects of Computing, volume 28, number 2, pp 233-263, 2016. (DOI).
  21. Determining progress in writing competency by assessing students’ argumentation. Sofia Cassel and Aletta Nylén. In Proc. 46th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2016. (DOI).
  22. Kappa: Insights, Current Status and Future Work. Elias Castegren and Tobias Wrigstad. In , 2016. (Extended abstract, fulltext:postprint).
  23. LOLCAT: Relaxed Linear References for Lock-free Programming. Elias Castegren and Tobias Wrigstad. Technical report / Department of Information Technology, Uppsala University nr 2016-013, 2016. (fulltext).
  24. Reference Capabilities for Concurrency Control. Elias Castegren and Tobias Wrigstad. In ECOOP 2016 — Object-Oriented Programming, 2016. (fulltext:postprint).
  25. Reference Capabilities for Trait Based Reuse and Concurrency Control. Elias Castegren and Tobias Wrigstad. Technical report / Department of Information Technology, Uppsala University nr 2016-007, 2016. (fulltext).
  26. Types for CAS: Relaxed Linearity with Ownership Transfer. Elias Castegren and Tobias Wrigstad. In , 2016. (fulltext:postprint).
  27. Vats: A safe, reactive storage abstraction. Dave Clarke and Tobias Wrigstad. In Theory and Practice of Formal Methods: Essays Dedicated to Frank de Boer on the Occasion of His 60th Birthday, volume 9660 of Lecture Notes in Computer Science, pp 140-154, Springer, 2016. (DOI).
  28. Multilayer Social Networks. Mark E. Dickison, Matteo Magnani, and Luca Rossi. Cambridge University Press, 2016.
  29. ParT: An asynchronous parallel abstraction for speculative pipeline computations. Kiko Fernandez-Reyes, Dave Clarke, and Daniel S. McCain. In Coordination Models and Languages, volume 9686 of Lecture Notes in Computer Science, pp 101-120, Springer, 2016. (DOI).
  30. Towards Enabling Low-Level Memory Optimisations at the High-Level with Ownership Annotations. Juliana Franco, Tobias Wrigstad, and Sophia Drossopoulou. In , 2016. (Fulltext, fulltext:postprint).
  31. Kleene Algebras with Domain. Victor B. F. Gomes, Walter Guttmann, Peter Höfner, Georg Struth, and Tjark Weber. In Archive of Formal Proofs, 2016. (External link).
  32. Languages, Logics, Types and Tools for Concurrent System Modelling. Ram?nas Gutkovas. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1392, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext).
  33. Cloud-assisted data fusion and sensor selection for Internet of Things. Farshid Hassani Bijarbooneh, Wei Du, Edith C.-H. Ngai, Xiaoming Fu, and Jiangchuan Liu. In IEEE Internet of Things Journal, volume 3, number 3, pp 257-268, 2016. (DOI).
  34. Writing to learn programming?: A single case pilot study. Ville Isomöttönen, Aletta Nylén, and Ville Tirronen. In Proc. 16th International Conference on Computing Education Research: Koli Calling, pp 140-144, ACM Press, New York, 2016. (DOI).
  35. A procedure for splitting data-aware processes and its application to coordination. Sung-Shik T. Q. Jongmans, Dave Clarke, and José Proença. In Science of Computer Programming, volume 115–116, pp 47-78, 2016. (DOI).
  36. Implementing a secure abstract machine. Adriaan Larmuseau, Marco Patrignani, and Dave Clarke. In Proc. 31st ACM Symposium on Applied Computing, pp 2041-2048, ACM Press, New York, 2016. (DOI).
  37. Protecting Functional Programs From Low-Level Attackers. Adriaan Larmuseau. Ph.D. thesis, Uppsala Dissertations from the Faculty of Science and Technology nr 124, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  38. UrbanSense: An Urban-Scale Sensing Platform for the Internet of Things. Yunior Luis, Pedro M. Santos, Tiago Lourenco, Carlos Pérez-Penichet, Tania Calcada, and Ana Aguiar. In IEEE Second International Smart Cities Conference (ISC2 2016), pp 763-768, 2016.
  39. The Nifty way to call hell from heaven. Andreas Löscher and Konstantinos Sagonas. In Proc. 15th International Workshop on Erlang, pp 1-11, ACM Press, New York, 2016. (DOI).
  40. Using indirect blockmodeling for monitoring students roles in collaborative learning networks. Esunly Medina, Davide Vega, Roc Meseguer, Humberto Medina, Sergio F. Ochoa, and Matteo Magnani. In 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD), International Conference on Computer Supported Cooperative Work in Design, pp 164-169, 2016.
  41. Integrating Visual Data Flow Programming with Data Stream Management. Lars Melander. Ph.D. thesis, Uppsala Dissertations from the Faculty of Science and Technology nr 128, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  42. A parametric propagator for pairs of SUM constraints with a discrete convexity property. Jean-Noël Monette, Nicolas Beldiceanu, Pierre Flener, and Justin Pearson. In Artificial Intelligence, volume 241, pp 170-190, 2016. (DOI).
  43. Feature Nets: Behavioural modelling of software product lines. Radu Muschevici, José Proença, and Dave Clarke. In Software and Systems Modeling, volume 15, number 4, pp 1181-1206, 2016. (DOI).
  44. Social Network Analysis in Applications. Katarzyna Musial, Piotr Brodka, and Matteo Magnani. In AI Communications, volume 29, number 1, pp 55-56, 2016. (DOI).
  45. Personalized Mobile-Assisted Smart Transportation. Edith C.-H. Ngai, Stephan Brandauer, Amendra Shrestha, and Konstantinos Vandikas. In 2016 Digital Media Industry And Academic Forum (DMIAF), pp 158-160, 2016.
  46. General conditions for full abstraction. Joachim Parrow. In Mathematical Structures in Computer Science, volume 26, number 4, pp 655-657, 2016. (DOI).
  47. The largest respectful function. Joachim Parrow and Tjark Weber. In Logical Methods in Computer Science, volume 12, number 2, 2016. (DOI, Fulltext, fulltext:print).
  48. A critical analysis of trends in student-centric engineering education and their implications for learning. Arnold Pears, Aletta Nylén, and Mats Daniels. In Proc. 46th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2016. (DOI).
  49. Typed Connector Families. Jose Proenca and Dave Clarke. In Formal Aspects Of Component Software, volume 9539 of Lecture Notes in Computer Science, pp 294-311, Springer, 2016. (DOI).
  50. Proceedings från 5:e utvecklingskonferensen för Sveriges ingenjörsutbildningar. Stefan Pålsson and Björn Victor (eds). Volume 2016-002 of Technical report / Department of Information Technology, Uppsala University, 2016. (External link).
  51. Predictive analysis at Krononfogden: Classifying first-time debtors with an uplift model. Måns Rantzer. Student thesis, supervisor: Mårten Janerud, examiner: Elísabet Andrésdóttir, Michael Ashcroft, UPTEC STS nr 16036, 2016. (fulltext).
  52. Other Things Besides Number: Abstraction, Constraint Propagation, and String Variable Types. Joseph Scott. Ph.D. thesis, Uppsala Dissertations from the Faculty of Science and Technology nr 120, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  53. Effects of missing data in multilayer networks. Rajesh Sharma, Matteo Magnani, and Danilo Montesi. In Social Network Analysis and Mining, volume 6, number 1, 2016. (DOI).
  54. Scalable long-term preservation of relational data through SPARQL queries. Silvia Stefanova and Tore Risch. In Semantic Web, volume 7, number 2, pp 117-137, 2016. (DOI).
  55. Main-Memory Query Processing Utilizing External Indexes. Thanh Truong. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1352, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  56. Efficient filtering for the unary resource with family-based transition times. Sascha Van Cauwelaert, Cyrille Dejemeppe, Jean-Noël Monette, and Pierre Schaus. In Principles and Practice of Constraint Programming: CP 2016, volume 9892 of Lecture Notes in Computer Science, pp 520-535, Springer, 2016. (DOI).
  57. A new approach to role and position detection in networks. Davide Vega, Matteo Magnani, Danilo Montesi, Roc Meseguer, and Felix Freitag. In SOCIAL NETWORK ANALYSIS AND MINING, volume 6, number 1, 2016. (DOI).
  58. Modelling of patterns between operational data, diagnostic trouble codes and workshop history using big data and machine learning. Linda Virkkala and Johanna Haglund. Student thesis, supervisor: Jonas Bitéus, examiner: Elisabet Andrésdóttir, Michael Ashcroft, UPTEC STS nr 16002, 2016. (fulltext).
  59. Modal Logics for Nominal Transition Systems. Tjark Weber, Lars-Henrik Eriksson, Joachim Parrow, Johannes Borgström, and Ram?nas Gutkovas. In Archive of Formal Proofs, 2016. (External link).
  60. Scrambling and descrambling SMT-LIB benchmarks. Tjark Weber. In Satisfiability Modulo Theories: SMT 2016, volume 1617 of CEUR Workshop Proceedings, pp 31-40, RWTH Aachen University, 2016. (Fulltext).
  61. The 2014 SMT Competition. Tjark Weber, David R. Cok, and David Deharbe. In Journal on Satisfiability, Boolean Modeling and Computation, 2016.
  62. Scalable Validation of Data Streams. Cheng Xu. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1384, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  63. Scalable Queries over Log Database Collections. Minpeng Zhu. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1343, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  64. Bisimulation up-to techniques for psi-calculi. Johannes Åman Pohjola and Joachim Parrow. In Proc. 5th ACM SIGPLAN Conference on Certified Programs and Proofs, pp 142-153, ACM Press, New York, 2016. (DOI).
  65. Culling Concurrency Theory: Reusable and trustworthy meta-theory, proof techniques and separation results. Johannes Åman Pohjola. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1397, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  66. The Expressive Power of Monotonic Parallel Composition. Johannes Åman Pohjola and Joachim Parrow. In Programming Languages and Systems, volume 9632 of Lecture Notes in Computer Science, pp 780-803, Springer, Berlin, 2016. (DOI).
  67. Language Constructs for Safe Parallel Programming on Multi-Cores. Johan Östlund. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1319, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).

2015

  1. Stateless model checking for TSO and PSO. Parosh Aziz Abdulla, Stavros Aronis, Mohamed Faouzi Atig, Bengt Jonsson, Carl Leonardsson, and Konstantinos Sagonas. In Tools and Algorithms for the Construction and Analysis of Systems: TACAS 2015, volume 9035 of Lecture Notes in Computer Science, pp 353-367, Springer Berlin/Heidelberg, 2015. (DOI).
  2. Physical stability of drugs after storage above and below the glass transition temperature: Relationship to glass-forming ability. Amjad Alhalaweh, Ahmad Alzghoul, Denny Mahlin, and Christel A. S. Bergström. In International Journal of Pharmaceutics, volume 495, number 1, pp 312-317, 2015. (DOI, fulltext:print).
  3. Addressing concept drift to improve system availability by updating one-class data-driven models. Ahmad Alzghoul and Magnus Löfstrand. In Evolving Systems, volume 6, number 3, pp 187-198, 2015. (DOI).
  4. Spatio-Temporal Gridded Data Processing on the Semantic Web. Andrej Andrejev, Dimitar Misev, Peter Baumann, and Tore Risch. In 2015 IEEE International Conference On Data Science And Data Intensive Systems, pp 38-45, 2015. (DOI).
  5. A step towards detecting online grooming: Identifying adults pretending to be children. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI).
  6. Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
  7. Detecting jihadist messages on twitter. Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI).
  8. A modelling pearl with sortedness constraints. Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, Xavier Lorca, Justin Pearson, Thierry Petit, and Charles Prud'homme. In Global Conference on Artificial Intelligence: GCAI 2015, volume 36 of EasyChair Proceedings in Computing, pp 27-41, Cool Press, Manchester, UK, 2015. (Abstract).
  9. On the Reification of Global Constraints (Abstract). Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, and Justin Pearson. In Principles and practice of constraint programming, CP 2015, volume 9255 of Lecture Notes in Computer Science, pp 733-733, SPRINGER-VERLAG BERLIN, 2015.
  10. Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a staff development course. Anders Berglund, Arnold Pears, Aletta Nylén, Farooq Ahmad, Bader Alghamdi, Khalid Alghamdi, Ahmed Alhabish, Abdullah Aljoufi, Eidah Alzahrani, Rami Alzahrani, Ismat Aldmour, Areej Athama, Hamada Shihad AlSadoon, Rahmat Budiarto, Abdul Hafeez, Nadeem Hassan Daupota, Dhafer Faiz, Lubna Abdel Kareim Gabralla, Mohammad Gamar, Abdul Hannan, Bedine Kerim, F. A. Mazarbhuiya, Ahmed Rabea, Muhammad Qaiser Saleem, Nimir Saleh, and Mohamed Shenify. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 1-6, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  11. A constraint-based local search backend for MiniZinc. Gustav Björdal, Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Constraints, volume 20, number 3, pp 325-345, 2015. (DOI).
  12. Anomaly detection with Machine learning: Quality assurance of statistical data in the Aid community. Hanna Blomquist and Johanna Möller. Student thesis, supervisor: Franck Rasmussen, examiner: Elisabet Andrésdóttir, Michael Ashcroft, UPTEC STS nr 15014, 2015. (fulltext).
  13. Broadcast psi-calculi with an application to wireless protocols. Johannes Borgström, Shuqin Huang, Magnus Johansson, Palle Raabjerg, Björn Victor, Johannes Åman Pohjola, and Joachim Parrow. In Software and Systems Modeling, volume 14, number 1, pp 201-216, Springer, 2015. (DOI, fulltext:postprint).
  14. The Psi-Calculi Workbench: A Generic Tool for Applied Process Calculi. Johannes Borgström, Ramunas Gutkovas, Ioana Rodhe, and Björn Victor. In ACM Transactions on Embedded Computing Systems, volume 14, number 1, 2015. (DOI, fulltext:postprint).
  15. Clustering attributed graphs: models, measures and methods. Cecile Bothorel, Juan David Cruz, Matteo Magnani, and Barbora Micenkova. In Network Science, volume 3, number 3, pp 408-444, 2015. (DOI, fulltext:postprint).
  16. Disjointness Domains for Fine-Grained Aliasing. Stephan Brandauer, Dave Clarke, and Tobias Wrigstad. In , ACM SIGPLAN NOTICES, pp 989-916, 2015. (DOI).
  17. Parallel Objects for Multicores: A Glimpse at the Parallel Language ENCORE. Stephan Brandauer, Elias Castegren, Dave Clarke, Kiko Fernandez-Reyes, Einar Broch Johnsen, Ka I. Pun, S. Lizeth Tapia Tarifa, Tobias Wrigstad, and Albert Mingkun Yang. In Formal Methods for Multicore Programming, volume 9104 of Lecture Notes in Computer Science, pp 1-56, 2015. (DOI).
  18. Modelling and analysing a WSN secure aggregation protocol: A comparison of languages and tool support. Volkan Cambazoglu, Ramunas Gutkovas, Johannes Åman Pohjola, and Björn Victor. Technical report / Department of Information Technology, Uppsala University nr 2015-033, 2015. (fulltext).
  19. A structured approach to training open-ended problem solving. Sofia Cassel and Björn Victor. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 417-420, IEEE Press, Piscataway, NJ, 2015. (DOI).
  20. Refined Ownership: Fine-grained controlled internal sharing. Elias Castegren, Johan Östlund, and Tobias Wrigstad. In Formal Methods for Multicore Programming, volume 9104 of Lecture Notes in Computer Science, pp 179-210, 2015. (DOI).
  21. Abstract Delta Modelling. Dave Clarke, Michiel Helvensteijn, and Ina Schaefer. In Mathematical Structures in Computer Science, volume 25, number 3, pp 482-527, Cambridge University Press, 2015.
  22. The 2013 Evaluation of SMT-COMP and SMT-LIB. David R. Cok, Aaron Stump, and Tjark Weber. In Journal of automated reasoning, volume 55, number 1, pp 61-90, 2015. (DOI).
  23. Competencies for paradigm shift "survival". Mats Daniels, Åsa Cajander, Anna Eckerdal, Mats Lind, Aletta Nylén, Tony Clear, and Roger McDermott. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI).
  24. Refraction: Low-cost management of reflective meta-data in pervasive component-based applications. Wilfried Daniels, José Proença, Dave Clarke, Wouter Joosen, and Danny Hughes. In Proc. 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering, pp 27-36, ACM Press, New York, 2015. (DOI).
  25. Enabling design of performance-controlled sensor network applications through task allocation and reallocation. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. 11th International Conference on Distributed Computing in Sensor Systems, pp 248-253, IEEE Computer Society, 2015. (DOI, fulltext:postprint).
  26. Optimal Task Allocation in Sensor and Actuator Networks. Atis Elsts. In Proc. 11th Swedish National Computer Networking Workshop, 2015.
  27. ProFuN TG: A Tool Using Abstract Task Graphs to Facilitate the Development, Deployment and Maintenance of Wireless Sensor Network Applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. Poster/Demo Session: 12th European Conference on Wireless Sensor Networks, pp 19-20, 2015.
  28. ProFuN TG: A tool for programming and managing performance-aware sensor network applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp 751-759, IEEE Computer Society, 2015. (DOI, fulltext:preprint).
  29. ProFuN TG: Programming Sensornets with Task Graphs for Increased Reliability and Energy-Efficiency. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In , IEEE Computer Society, 2015. (External link, fulltext:postprint).
  30. Automatic irony- and sarcasm detection in Social media. Erik Forslid and Niklas Wikén. Student thesis, supervisor: Magnus Sahlgren, examiner: Tomas Nyberg, Michael Ashcroft, UPTEC F nr 15045, 2015. (fulltext).
  31. Implied constraints for AUTOMATON constraints. María Andreína Francisco Rodríguez, Pierre Flener, and Justin Pearson. In Global Conference on Artificial Intelligence: GCAI 2015, volume 36 of EasyChair Proceedings in Computing, pp 113-126, Cool Press, Manchester, UK, 2015. (Abstract).
  32. Concolic Testing for Functional Languages. Aggelos Giantsios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Proceedings of the 17th international symposium on principles and practice of declarative programming (PPDP 2015), pp 137-148, Association for Computing Machinery (ACM), 2015. (DOI).
  33. Probabilistic programs as spreadsheet queries. Andrew D. Gordon, Claudio Russo, Marcin Szymczak, Johannes Borgström, Nicolas Rolland, Thore Graepel, and Daniel Tarlow. In Programming Languages and Systems, volume 9032 of Lecture Notes in Computer Science, pp 1-25, Springer Berlin/Heidelberg, 2015. (DOI, fulltext:postprint).
  34. Motivation and Grade Gap Related to Gender in a Programming Course. Virginia Grande and Joachim Parrow. In , 2015. (DOI).
  35. A constraint optimisation model for analysis of telecommunication protocol logs. Olga Grinchtein, Mats Carlsson, and Justin Pearson. In Tests and Proofs: TAP 2015, volume 9154 of Lecture Notes in Computer Science, pp 137-154, Springer, 2015. (DOI).
  36. Testing of a telecommunication protocol using constraint programming. Olga Grinchtein, Mats Carlsson, and Justin Pearson. In 2015 IEEE Eighth International Conference On Software Testing, Verification And Validation Workshops (ICSTW), IEEE International Conference on Software Testing Verification and Validation Workshops, 2015.
  37. Constraint Programming for Wireless Sensor Networks. Farshid Hassani Bijarbooneh. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1219, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext, preview image).
  38. A Quadratic Extended Edge-Finding Filtering Algorithm for Cumulative Resource Constraints. Roger Kameugne, Laure Pauline Fotso, and Joseph Scott. In Principles and practice of constraint programming, CP 2015, volume 9255 of Lecture Notes in Computer Science, pp 738-739, SPRINGER-VERLAG BERLIN, 2015.
  39. A high-level model for an assembly language attacker by means of reflection. Adriaan Larmuseau, Marco Patrignani, and Dave Clarke. In Dependable Software Engineering: Theories, Tools, and Applications, volume 9409 of Lecture Notes in Computer Science, pp 168-182, Springer, 2015. (DOI, fulltext:preprint).
  40. A secure compiler for ML modules. Adriaan Larmuseau, Marco Patrignani, and Dave Clarke. In Programming Languages and Systems: APLAS 2015, volume 9458 of Lecture Notes in Computer Science, pp 29-48, Springer, 2015. (DOI).
  41. Formalizing a secure foreign function interface. Adriaan Larmuseau and Dave Clarke. In Software Engineering and Formal Methods, volume 9276 of Lecture Notes in Computer Science, pp 215-230, Springer, 2015. (DOI, fulltext:postprint).
  42. Defining 'Functional Products' through their constituents. John Lindström, Daria Sas, Håkan Lideskog, Magnus Löfstrand, and Lennart Karlsson. In International Journal of Product Development, volume 20, number 1, pp 1-24, 2015. (DOI).
  43. Property-Based Testing of Sensor Networks. Andreas Löscher, Konstantinos Sagonas, and Thiemo Voigt. In Proc. 12th International Conference on Sensing, Communication, and Networking, pp 100-108, IEEE Communications Society, 2015.
  44. NoSQL approach to large scale analysis of persisted streams. Khalid Mahmood, Thanh Truong, and Tore Risch. In Data Science, volume 9147 of Lecture Notes in Computer Science, pp 152-156, Springer, 2015. (DOI).
  45. Utilizing a NoSQL Data Store for Scalable Log Analysis. Khalid Mahmood, Tore Risch, and Minpeng Zhu. In , pp 49-55, 2015. (DOI).
  46. Automated auxiliary variable elimination through on-the-fly propagator generation. Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Principles and Practice of Constraint Programming: CP 2015, volume 9255 of Lecture Notes in Computer Science, pp 313-329, Springer, 2015. (DOI).
  47. Efficient caching for constrained skyline queries. Michael Mortensen, Sean Chester, Ira Assent, and Matteo Magnani. In Extending Database Technology (EDBT), 2015.
  48. Multidimensional analysis of creative coding MOOC forums: a methodological discussion. Aletta Nylén, Neena Thota, Anna Eckerdal, Päivi Kinnunen, Matthew Butler, and Michael Morgan. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 137-141, ACM Press, New York, 2015. (DOI).
  49. Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education. Aletta Nylén and Mohamed Shenify (eds). Volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, 2015. (Abstract).
  50. Forecasting Lock Contention Before Adopting Another Lock Algorithm. Xiaoyue Pan, David Klaftenegger, and Bengt Jonsson. 2015. (fulltext).
  51. Modal Logics for Nominal Transition Systems. Joachim Parrow, Johannes Borgström, Lars-Henrik Eriksson, Ramunas Gutkovas, and Tjark Weber. In 26th International Conference on Concurrency Theory: CONCUR 2015, volume 42 of Leibniz International Proceedings in Informatics (LIPIcs), pp 198-211, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2015. (DOI, Fulltext).
  52. Fully abstract trace semantics for protected module architectures. Marco Patrignani and Dave Clarke. In Computer languages, systems & structures, volume 42, pp 22-45, 2015. (DOI).
  53. Secure compilation to protected module architectures. Marco Patrignani, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke, and Frank Piessens. In ACM Transactions on Programming Languages and Systems, volume 37, number 2, 2015. (DOI).
  54. Implications of anonymous assessment. Arnold Pears and Aletta Nylén. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 1404-1408, IEEE Press, Piscataway, NJ, 2015. (DOI).
  55. Diffusion of Innovations over Multiplex Social Networks. Rasoul Ramezanian, Mostafa Salehi, Matteo Magnani, and Danilo Montesi. In International Symposium on Artificial Intelligence and Signal Processing (AISP), pp 1-5, 2015. (DOI, ArXiv).
  56. Towards effective visual analytics on multiplex and multilayer networks. Luca Rossi and Matteo Magnani. In Chaos, Solitons & Fractals, volume 72, pp 68-76, 2015. (DOI, fulltext:postprint).
  57. Contention adapting search trees. Konstantinos Sagonas and Kjell Winblad. In Proc. 14th International Symposium on Parallel and Distributed Computing, pp 215-224, IEEE conference proceedings, 2015. (DOI).
  58. Multidimensional epidemic thresholds in diffusion processes over interdependent networks. Mostafa Salehi, Payam Siyari, Matteo Magnani, and Danilo Montesi. In Chaos, Solitons & Fractals, volume 72, pp 59-67, 2015. (DOI).
  59. Spreading processes in Multilayer Networks. Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Matteo Magnani, Payam Siyari, and Danilo Montesi. In IEEE Transactions on Network Science and Engineering, volume 2, number 2, pp 65-83, IEEE Computer Society, 2015. (DOI, Fulltext, fulltext:postprint).
  60. Contextual Healing: Privacy through Interpretation Management. Rula Sayaf, Soren Preibusch, and Dave Clarke. In 2015 Ieee International Conference On Smart City/Socialcom/Sustaincom (Smartcity), pp 360-365, IEEE, 2015. (DOI).
  61. The Other Side of Privacy: Surveillance in Data Control. Rula Sayaf, Dave Clarke, and James B. Rule. In British HCI 2015, pp 184-192, 2015. (DOI).
  62. Constraint solving on bounded string variables. Joseph D. Scott, Pierre Flener, and Justin Pearson. In Integration of AI and OR Techniques in Constraint Programming, volume 9075 of Lecture Notes in Computer Science, pp 375-392, Springer, 2015. (DOI).
  63. Investigating the types and effects of missing data in multilayer networks. Rajesh Sharma, Matteo Magnani, and Danilo Montesi. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 392-399, 2015.
  64. Understanding community patterns in large attributed social networks. Rajesh Sharma, Matteo Magnani, and Danilo Montesi. In Proceedings Of The 2015 IEEE/ACM International Conference On Advances In Social Networks Analysis And Mining (Asonam 2015), pp 1503-1508, 2015. (DOI).
  65. System components of a general theory of software engineering. Anca-Juliana Stoica, Kristiaan Pelckmans, and William Rowe. In Science of Computer Programming, volume 101, pp 42-65, 2015. (DOI).
  66. Transparent inclusion, utilization, and validation of main memory domain indexes. Thanh Truong and Tore Risch. In Proc. 27th International Conference on Scientific and Statistical Database Management, ACM Press, New York, 2015. (DOI).
  67. Role and position detection in networks: reloaded. Davide Vega, Roc Meseguer, Felix Freitag, and Matteo Magnani. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 320-325, 2015.
  68. Scalable queries over log database collections. Minpeng Zhu, Khalid Mahmood, and Tore Risch. In Data Science, volume 9147 of Lecture Notes in Computer Science, pp 173-185, Springer, 2015. (DOI).
  69. Editorial preface for the JLAMP Special Issue on Formal Methods for Software Product Line Engineering. Maurice ter Beek, Dave Clarke, and Ina Schafer. In The Journal of logical and algebraic methods in programming, volume 85, number 1, pp 123-124, 2015. (DOI).
  70. Measuring Polymorphism in Python Programs. Beatrice Åkerblom and Tobias Wrigstad. In DLS 2015: Proceedings of the 11th Symposium on Dynamic Languages, volume 51:2 2016 of ACM SIGPLAN Notices, pp 114-128, ACM Press, New York, 2015. (DOI).

2014

  1. Optimal dynamic partial order reduction. Parosh Abdulla, Stavros Aronis, Bengt Jonsson, and Konstantinos Sagonas. In Proc. 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, volume 49:1 of ACM SIGPLAN NOTICES, pp 373-384, ACM Press, New York, 2014. (DOI).
  2. Impact of cultural and language background on learning Computer Science concepts. Ismat Aldmour and Aletta Nylén. In Proc. 2nd International Conference on Learning and Teaching in Computing and Engineering, International Conference on Teaching and Learning in Computing and Engineering, pp 37-40, IEEE Computer Society, Los Alamitos, CA, 2014. (DOI).
  3. Computational predictions of glass-forming ability and crystallization tendency of drug molecules. Amjad Alhalaweh, Ahmad Alzghoul, Waseem Kaialy, Denny Mahlin, and Christel A. S. Bergström. In Molecular Pharmaceutics, volume 11, number 9, pp 3123-3132, 2014. (DOI).
  4. Comparing a knowledge-based and a data-driven method in querying data streams for system fault detection: A hydraulic drive system application. Ahmad Alzghoul, Björn Backe, Magnus Löfstrand, Arne Byström, and Bengt Liljedahl. In Computers in industry (Print), volume 65, number 8, pp 1126-1135, 2014. (DOI).
  5. Experimental and Computational Prediction of Glass Transition Temperature of Drugs. Ahmad Alzghoul, Amjad Alhalaweh, Denny Mahlin, and Christel A. S. Bergström. In JOURNAL OF CHEMICAL INFORMATION AND MODELING, volume 54, number 12, pp 3396-3403, 2014. (DOI).
  6. Scientific data as RDF with arrays: Tight integration of SciSPARQL queries into MATLAB. Andrej Andrejev, Xueming He, and Tore Risch. In Proc. ISWC 2014 Posters & Demonstrations Track, volume 1272 of CEUR Workshop Proceedings, pp 221-224, RWTH Aachen University, 2014. (Fulltext).
  7. Programming and automating mathematics in the Tarski-Kleene hierarchy. Alasdair Armstrong, Georg Struth, and Tjark Weber. In Journal of Logical and Algebraic Methods in Programming, volume 83, number 2, pp 87-102, 2014. (DOI).
  8. Distributed multi-query optimization of continuous clustering queries. Sobhan Badiozamany. In Proc. VLDB 2014 PhD Workshop, 2014. (fulltext:print).
  9. Model-based protocol log generation for testing a telecommunication test harness using CLP. Kenneth Balck, Olga Grinchtein, and Justin Pearson. In Proc. 17th Conference on Design, Automation and Test in Europe, IEEE, Piscataway, NJ, 2014. (DOI).
  10. Model-based protocol log generation for testing a telecommunication test harness using CLP. Kenneth Balck, Olga Grinchtein, and Justin Pearson. In 2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), Design Automation and Test in Europe Conference and Expo, 2014.
  11. Linking prefixes and suffixes for constraints encoded using automata with accumulators. Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, María Andreína Francisco Rodríguez, and Justin Pearson. In Principles and Practice of Constraint Programming: CP 2014, volume 8656 of Lecture Notes in Computer Science, pp 142-157, Springer, 2014. (DOI).
  12. Propagating regular counting constraints. Nicolas Beldiceanu, Pierre Flener, Justin Pearson, and Pascal Van Hentenryck. In Proc. 28th AAAI Conference on Artificial Intelligence: Volume 4, pp 2616-2622, AAAI Press, Palo Alto, CA, 2014. (External link).
  13. Toward sustainable development in constraint programming. Nicolas Beldiceanu, Pierre Flener, Jean-Noël Monette, Justin Pearson, and Helmut Simonis. In Constraints, volume 19, number 2, pp 139-149, 2014. (DOI).
  14. A Sorted Semantic Framework for Applied Process Calculi (extended abstract). Johannes Borgström, Ramunas Gutkovas, Joachim Parrow, Björn Victor, and Johannes Åman Pohjola. In Trustworthy Global Computing: TGC 2013, volume 8358 of Lecture Notes in Computer Science, pp 103-118, Springer Berlin/Heidelberg, 2014. (DOI).
  15. Proc. Combined 21st International Workshop on Expressiveness in Concurrency (EXPRESS 2014) and 11th Workshop on Structural Operational Semantics (SOS 2014). Johannes Borgström and Silvia Crafa (eds). Volume 160 of Electronic Proceedings in Theoretical Computer Science, Open Publishing Association, 2014. (DOI).
  16. Protocol log analysis with constraint programming: Work in progress. Mats Carlsson, Olga Grinchtein, and Justin Pearson. In Satisfiability Modulo Theories: SMT 2014, volume 1163 of CEUR Workshop Proceedings, pp 17-26, RWTH Aachen University, 2014. (Fulltext).
  17. Enhanced learning by promoting engineering competencies. Sofia Cassel, Aletta Nylén, and Björn Victor. In Proc. 44th ASEE/IEEE Frontiers in Education Conference, pp 2044-2049, IEEE Press, Piscataway, NJ, 2014. (DOI, Proceedings).
  18. Teaching and learning with MOOCs: Computing academics' perspectives and engagement. Anna Eckerdal, Päivi Kinnunen, Neena Thota, Aletta Nylén, Judy Sheard, and Lauri Malmi. In Proc. 19th Conference on Innovation and Technology in Computer Science Education, pp 9-14, ACM Press, New York, 2014. (DOI).
  19. A Case for Node-Local Runtime Parameter Adaptation in Wireless Sensor Networks. Atis Elsts and Edith C.-H. Ngai. In Proc. 10th Swedish National Computer Networking Workshop, 2014.
  20. Propagators and violation functions for geometric and workload constraints arising in airspace sectorisation. Pierre Flener and Justin Pearson. Computing Research Repository nr 1401.7463, 2014. (External link).
  21. Static safety guarantees for a low-level multithreaded language with regions. Prodromos Gerakios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Science of Computer Programming, volume 80, number Part B, pp 223-263, 2014. (DOI).
  22. Tabular: a schema-driven probabilistic programming language. Andrew D. Gordon, Thore Graepel, Nicolas Rolland, Claudio Russo, Johannes Borgström, and John Guiver. In Proc. 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, volume 49:1 of ACM SIGPLAN NOTICES, pp 321-334, ACM Press, New York, 2014. (DOI, fulltext:print).
  23. Advancing concurrent system verification: Type based approach and tools. Ramunas Gutkovas. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2014-007, Uppsala University, 2014. (fulltext).
  24. A constraint programming approach for managing end-to-end requirements in sensor network macroprogramming. Farshid Hassani Bijarbooneh, Animesh Pathak, Justin Pearson, Valérie Issarny, and Bengt Jonsson. In Proc. 3rd International Conference on Sensor Networks, pp 28-40, SciTePress, Setúbal, Portugal, 2014. (DOI).
  25. Energy-efficient sensor selection for data quality and load balancing in wireless sensor networks. Farshid Hassani Bijarbooneh, Wei Du, Edith Ngai, and Xiaoming Fu. In Proc. 22nd International Symposium on Quality of Service, pp 338-343, IEEE Communications Society, 2014. (DOI).
  26. Dynamic and speculative polyhedral parallelization using compiler-generated skeletons. Alexandra Jimborean, Philippe Clauss, Jean-François Dollinger, Vincent Loechner, and Juan Manuel Martinez Caamaño. In International journal of parallel programming, volume 42, number 4, pp 529-545, 2014. (DOI).
  27. Fix the code. Don't tweak the hardware: A new compiler approach to Voltage–Frequency scaling. Alexandra Jimborean, Konstantinos Koukos, Vasileios Spiliopoulos, David Black-Schaffer, and Stefanos Kaxiras. In Proc. 12th International Symposium on Code Generation and Optimization, pp 262-272, ACM Press, New York, 2014. (URL, fulltext:postprint).
  28. A quadratic edge-finding filtering algorithm for cumulative resource constraints. Roger Kameugne, Laure Pauline Fotso, Joseph Scott, and Youcheu Ngo-Kateu. In Constraints, volume 19, number 3, pp 243-269, 2014. (DOI).
  29. Brief announcement: queue delegation locking. David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. In Proc. 26th ACM Symposium on Parallelism in Algorithms and Architectures, pp 70-72, ACM Press, New York, 2014. (DOI, fulltext:print).
  30. Delegation locking libraries for improved performance of multithreaded programs. David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. In Euro-Par 2014: Parallel Processing, volume 8632 of Lecture Notes in Computer Science, pp 572-583, Springer Berlin/Heidelberg, 2014. (DOI).
  31. Session types for broadcasting. Dimitrios Kouzapas, Ramunas Gutkovas, and Simon J. Gay. In Proc. 7th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, volume 155 of Electronic Proceedings in Theoretical Computer Science, pp 25-31, 2014. (DOI, fulltext:print).
  32. Large-Scale Social Network Analysis. Mattia Lambertini, Matteo Magnani, Moreno Marzolla, Danilo Montesi, and Carmine Paolino. In Large-Scale Data Analytics, pp 155-187, Springer, 2014. (DOI).
  33. Operational Semantics for Secure Interoperation. Adriaan Larmuseau, Marco Patrignani, and Dave Clarke. In Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, 2014.
  34. Use of cloud services in functional products: Availability implications. John Lindström, Magnus Löfstrand, Sean Reed, and Ahmad Alzghoul. In Procedia CIRP, volume 16, pp 368-372, 2014. (DOI).
  35. Evaluating availability of functional products through simulation. Magnus Löfstrand, Petter Kyösti, Sean Reed, and Björn Backe. In Simulation Modelling Practice and Theory, volume 47, pp 196-209, 2014. (DOI).
  36. Efficient and Flexible Sensornet Checkpointing. Andreas Löscher, Nicolas Tsiftes, Thiemo Voigt, and Vlado Handziski. In Wireless Sensor Networks, volume 8354, pp -65, 2014. (DOI, Conference website).
  37. Multiple social networks, data models and measures for. Matteo Magnani and Luca Rossi. In Encyclopedia of Social Network Analysis and Mining, Springer, Berlin, 2014.
  38. Path-based and Whole Network Measures. Matteo Magnani and Moreno Marzolla. In Encyclopedia of Social Network Analysis and Mining, Springer, Berlin, 2014.
  39. Taking the Big Picture: Representative Skylines based on Significance and Diversity. Matteo Magnani, Ira Assent, and Michael L. Mortensen. In The VLDB journal, volume 23, number 5, pp 795-815, Springer Berlin/Heidelberg, 2014. (DOI).
  40. A propagator design framework for constraints over sequences. Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Proc. 28th AAAI Conference on Artificial Intelligence: Volume 4, pp 2710-2716, AAAI Press, Palo Alto, CA, 2014. (External link).
  41. Higher-order psi-calculi. Joachim Parrow, Johannes Borgström, Palle Raabjerg, and Johannes Åman Pohjola. In Mathematical Structures in Computer Science, volume 24, number 2, Cambridge University Press, 2014. (DOI, fulltext:postprint).
  42. Fully abstract trace semantics for low-level isolation mechanisms. Marco Patrignani and Dave Clarke. In Symposium on Applied Computing, SAC 2014., pp 1562-1569, ACM Press, 2014. (DOI).
  43. AccAB – Processes and Roles for Accreditation of Computing Degrees at Al Baha University in Saudi Arabia. Arnold Pears, Anders Berglund, Aletta Nylén, Nimir Saleh, and Mohammed Gamar. In Proc. World Engineering Education Forum, pp 969-970, 2014.
  44. More scalable ordered set for ETS using adaptation. Konstantinos Sagonas and Kjell Winblad. In Proc. 13th ACM SIGPLAN Workshop on Erlang, pp 3-11, ACM Press, New York, 2014. (DOI).
  45. CPS2: a Contextual Privacy Framework for Social Software. Rula Sayaf, Dave Clarke, and Richard Harper. In 10th International Conference on Security and Privacy in Communication Networks (SECURECOMM2014), Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, pp 25-32, 2014. (DOI).
  46. Missing data in multiplex networks: a preliminary study. Rajesh Sharma, Matteo Magnani, and Danilo Montesi. In , IEEE Computer Society, 2014.
  47. MOOCs and their impact on academics. Judy Sheard, Anna Eckerdal, Päivi Kinnunen, Lauri Malmi, Aletta Nylén, and Neena Thota. In Proc. 14th International Conference on Computing Education Research: Koli Calling, pp 137-145, ACM Press, New York, 2014. (DOI).
  48. Scalable Numerical Queries by Algebraic Inequality Transformations. Thanh Truong and Tore Risch. In Database Systems for Advanced Applications, Dasfaa 2014, PT I, volume 8421 of Lecture Notes in Computer Science, pp 95-109, 2014.
  49. Scaling Future Software: The Manycore Challenge. Frank de Boer, Einar Broch Johnsen, Dave Clarke, Sophia Drossopoulou, Nobuko Yoshida, and Tobias Wrigstad. 2014. (External link).
  50. Priorities Without Priorities: Representing Preemption in Psi-Calculi. Johannes Åman Pohjola and Joachim Parrow. In Proc. 21st International Workshop on Expressiveness in Concurrency, and 11th Workshop on Structural Operational Semantics, volume 160 of Electronic Proceedings in Theoretical Computer Science, pp 2-15, 2014. (DOI).

2013

  1. Scientific analysis by queries in extended SPARQL over a scalable e-Science data store. Andrej Andrejev, Salman Toor, Andreas Hellander, Sverker Holmgren, and Tore Risch. In Proc. 9th International Conference on e-Science, pp 98-106, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI).
  2. Kleene Algebra. Alasdair Armstrong, Georg Struth, and Tjark Weber. In Archive of Formal Proofs, 2013. (External link).
  3. Program Analysis and Verification Based on Kleene Algebra in Isabelle/HOL. Alasdair Armstrong, Georg Struth, and Tjark Weber. In Interactive Theorem Proving: ITP 2013, volume 7998 of Lecture Notes in Computer Science, pp 197-212, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  4. On using Erlang for parallelization: Experience from parallelizing Dialyzer. Stavros Aronis and Konstantinos Sagonas. In Trends in Functional Programming, volume 7829 of Lecture Notes in Computer Science, pp 295-310, Springer Berlin/Heidelberg, 2013. (DOI).
  5. Performing Decision-Theoretic Inference in Bayesian Network Ensemble Models. Michael Ashcroft. In Twelfth Scandinavian Conference on Artificial Intelligence, volume 257 of Frontiers in Artificial Intelligence and Applications, pp 25-34, 2013. (DOI).
  6. Grand challenge: Implementation by frequently emitting parallel windows and user-defined aggregate functions. Sobhan Badiozamany, Lars Melander, Thanh Truong, Cheng Xu, and Tore Risch. In Proc. 7th ACM International Conference on Distributed Event-Based Systems, pp 325-330, ACM Press, New York, 2013. (DOI).
  7. On matrices, automata, and double counting in constraint programming. Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, and Justin Pearson. In Constraints, volume 18, number 1, pp 108-140, 2013. (DOI).
  8. On the reification of global constraints. Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, and Justin Pearson. In Constraints, volume 18, number 1, pp 1-6, 2013. (DOI).
  9. Deriving Probability Density Functions from Probabilistic Functional Programs. Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, and Claudio Russo. In Tools and Algorithms for the Construction and Analysis of Systems: 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, volume 7795 of Lecture Notes in Computer Science, pp 508-522, Springer Berlin/Heidelberg, Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  10. A Parametric Tool for Applied Process Calculi. Johannes Borgström, Ramunas Gutkovas, Ioana Rodhe, and Björn Victor. In 13th International Conference on Application of Concurrency to System Design (ACSD 2013), International Conference on Application of Concurrency to System Design, pp 180-185, IEEE Computer Society, 2013. (DOI).
  11. Measure transformer semantics for Bayesian machine learning. Johannes Borgström, Andrew D. Gordon, Michael Greenberg, James Margetson, and Jurgen van Gael. In Logical Methods in Computer Science, volume 9, number 3, p 11, 2013. (DOI, arXiv page).
  12. Proceedings Combined 20th International Workshop on Expressiveness in Concurrency and 10th Workshop on Structural Operational Semantics. Johannes Borgström and Bas Luttik (eds). Volume 120 of Electronic Proceedings in Theoretical Computer Science, Open Publishing Association, 2013. (DOI, Fulltext).
  13. RELEASE: A high-level paradigm for reliable large-scale server software. Olivier Boudeville, Francesco Cesarini, Natalia Chechina, Kenneth Lundin, Nikolaos Papaspyrou, Konstantinos Sagonas, Simon Thompson, Phil Trinder, and Ulf Wiger. In Trends in Functional Programming, volume 7829 of Lecture Notes in Computer Science, pp 263-278, Springer Berlin/Heidelberg, 2013. (DOI).
  14. Efficient GPU-based skyline computation. Kenneth S Bøgh, Ira Assent, and Matteo Magnani. In Proceedings of the Ninth International Workshop on Data Management on New Hardware (DaMoN @ SIGMOD), 2013. (DOI, External link).
  15. Fördjupat lärande genom aktiverande examination. Sofia Cassel and Björn Victor. In 4:e Utvecklingskonferensen för Sveriges ingenjörsutbildningar, pp 51-54, 2013.
  16. Systematic testing for detecting concurrency errors in Erlang programs. Maria Christakis, Alkis Gotovos, and Konstantinos Sagonas. In Proc. 6th International Conference on Software Testing, Verification and Validation, pp 154-163, IEEE Computer Society, 2013. (DOI).
  17. Bayesian Inference Using Data Flow Analysis. Guillaume Claret, Sriram Rajamani, Aditya Nori, Andrew D. Gordon, and Johannes Borgström. In ESEC/FSE '13: Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp 92-102, ACM Press, New York, NY, USA, 2013. (DOI).
  18. Beyond the Geneva Convention on the Treatment of Object Aliasing. Dave Clarke, James Noble, and Tobias Wrigstad. In Aliasing in Object-Oriented Programming: Types, Analysis, and Verification, volume 7850 of Lecture Notes in Computer Science, pp 1-6, Springer Berlin/Heidelberg, 2013. (DOI).
  19. Ownership Types: A Survey. Dave Clarke, Johan Östlund, Ilya Sergey, and Tobias Wrigstad. In Aliasing in Object-Oriented Programming: Types, Analysis, and Verification, volume 7850 of Lecture Notes in Computer Science, pp 15-58, Springer Berlin/Heidelberg, 2013. (DOI).
  20. Spatio-Temporal Keyword Queries in Social Networks. Vittoria Cozza, Antonio Messina, Danilo Montesi, Luca Arietta, and Matteo Magnani. In 17th East-European Conference on Advances in Databases and Information Systems (ADBIS), pp 70-83, 2013. (DOI, External link).
  21. Automatic airspace sectorisation: A survey. Pierre Flener and Justin Pearson. Computing Research Repository nr 1311.0653, 2013. (External link).
  22. Generation of implied constraints for automaton-induced decompositions. María Andreína Francisco Rodríguez, Pierre Flener, and Justin Pearson. In Proc. 25th International Conference on Tools with Artificial Intelligence, pp 1076-1083, IEEE Computer Society, 2013. (DOI).
  23. A Model-Learner Pattern for Bayesian Reasoning. Andrew D. Gordon, Mihhail Aizatulin, Johannes Borgström, Guillaume Claret, Thore Graepel, Aditya Nori, Sriram Rajamani, and Claudio Russo. In Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, volume 48 of ACM SIGPLAN NOTICES, pp 403-416, Association for Computing Machinery (ACM), New York, NY, 2013. (DOI).
  24. Optimising quality of information in data collection for mobile sensor networks. Farshid Hassani Bijarbooneh, Pierre Flener, Edith Ngai, and Justin Pearson. In Proc. 21st International Symposium on Quality of Service, pp 163-172, IEEE Communications Society, 2013. (DOI, Fulltext).
  25. Constraints for Membership in Formal Languages under Systematic Search and Stochastic Local Search. Jun He. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1027, Acta Universitatis Upsaliensis, Uppsala, 2013. (fulltext).
  26. Solving string constraints: The case for constraint programming. Jun He, Pierre Flener, Justin Pearson, and Wei Ming Zhang. In Principles and Practice of Constraint Programming: CP 2013, volume 8124 of Lecture Notes in Computer Science, pp 381-397, Springer Berlin/Heidelberg, 2013. (DOI).
  27. Underestimating the cost of a soft constraint is dangerous: Revisiting the edit-distance based soft regular constraint. Jun He, Pierre Flener, and Justin Pearson. In Journal of Heuristics, volume 19, number 5, pp 729-756, 2013. (DOI).
  28. Dynamic and speculative polyhedral parallelization of loop nests using binary code patterns. Alexandra Jimborean, Philippe Clauss, Jean-François Dollinger, Vincent Loechner, and Juan Manuel Martinez Caamaño. In ICCS 2013, volume 18 of Procedia Computer Science, pp 2575-2578, 2013. (DOI, fulltext:postprint).
  29. Online dynamic dependence analysis for speculative polyhedral parallelization. Alexandra Jimborean, Philippe Clauss, Juan Manuel Martinez Caamaño, and Aravind Sukumaran-Rajam. In Euro-Par 2013 Parallel Processing, volume 8097 of Lecture Notes in Computer Science, pp 191-202, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  30. Airspace sectorisation using constraint-based local search. Peter Jägare, Pierre Flener, and Justin Pearson. In Proc. 10th USA/Europe Air Traffic Management Research and Development Seminar, Federal Aviation Administration, 2013. (fulltext:postprint).
  31. A quadratic extended edge-finding filtering algorithm for cumulative resource constraints. Roger Kameugne, Laure Pauline Fotso, and Joseph Scott. In International Journal of Planning and Scheduling, volume 1, number 4, pp 264-284, 2013. (DOI).
  32. On the scalability of the Erlang term storage. David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. In Proc. 12th ACM SIGPLAN Workshop on Erlang, pp 15-26, ACM Press, New York, 2013. (DOI).
  33. Network-Wide Sensornet Checkpointing Made Practical. Andreas Löscher, Nicolas Tsiftes, Thiemo Voigt, and Vlado Handziski. In 10th European Conference on Wireless Sensor Networks, 2013.
  34. Factors Enabling Information Propagation in a Social Network Site. Matteo Magnani, Danilo Montesi, and Luca Rossi. In The Influence of Technology on Social Network Analysis and Mining, pp 411-426, Springer Vienna, 2013. (DOI, External link).
  35. Formation of multiple networks. Matteo Magnani and Luca Rossi. In Social Computing, Behavioral-Cultural Modeling and Prediction, pp 257-264, Springer Berlin Heidelberg, 2013. (DOI, External link).
  36. From stars to galaxies: skyline queries on aggregate data. Matteo Magnani and Ira Assent. In Proceedings of the 16th International Conference on Extending Database Technology, pp 477-488, 2013. (DOI, External link).
  37. On multidimensional network measures. Matteo Magnani, Anna Monreale, Giulio Rossetti, and Fosca Giannotti. In Italian Conference on Sistemi Evoluti per le Basi di Dati (SEBD), 2013.
  38. Pareto Distance for Multi-layer Network Analysis. Matteo Magnani and Luca Rossi. In Social Computing, Behavioral-Cultural Modeling and Prediction, volume 7812 of Lecture Notes in Computer Science, pp 249-256, 2013. (DOI, External link).
  39. SkyView: a user evaluation of the skyline operator. Matteo Magnani, Ira Assent, Kasper Hornbæ k, Mikkel R. Jakobsen, and Ken Friis Larsen. In Proceedings of the ACM Conference on Information and Knowledge Management (CIKM), pp 2249-2254, 2013. (DOI, External link).
  40. A parametric propagator for discretely convex pairs of sum constraints. Jean-Noël Monette, Nicolas Beldiceanu, Pierre Flener, and Justin Pearson. In Principles and Practice of Constraint Programming: CP 2013, volume 8124 of Lecture Notes in Computer Science, pp 529-544, Springer Berlin/Heidelberg, 2013. (DOI).
  41. Des propagateurs indépendants des solveurs. Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Actes des Neuvièmes Journées Francophones de Programmation par Contraintes, pp 227-236, Aix-Marseille Université, France, 2013.
  42. Executable modelling of dynamic software product lines in the ABS language. Radu Muschevici, Dave Clarke, and José Proenca. In Proc. 5th International Workshop on Feature-Oriented Software Development, pp 17-24, ACM Press, New York, 2013. (DOI, fulltext:postprint).
  43. On providing location privacy for mobile sinks in wireless sensor networks. Edith C.-H. Ngai and Ioana Rodhe. In Wireless networks, volume 19, number 1, pp 115-130, 2013. (DOI).
  44. Novice students' perception of learning in small groups. Aletta Nylén and Karl Marklund. In Enhancement and Innovation in Higher Education conference: 11 - 13 June 2013: conference materials, pp 123-131, 2013. (Post-conference publication).
  45. Professional communication skills for engineering professionals. Aletta Nylén and Arnold Pears. In Proc. 43rd ASEE/IEEE Frontiers in Education Conference, pp 257-263, IEEE, Piscataway, NJ, 2013. (DOI).
  46. Using Competencies to Structure Scientific Writing Education. Aletta Nylén and Christina Dörge. In HDI 2012 – Informatik für eine nachhaltige Zukunft, volume 5 of Commentarii informaticae didacticae (CID), pp 33-44, Universitätsverlag Potsdam, Potsdam, 2013. (External link).
  47. Secure compilation of Object-Oriented components to protected module architectures. Marco Patrignani, Dave Clarke, and Frank Piessens. In Programming Languages and Systems, volume 8301 of Lecture Notes in Computer Science, pp 176-191, Springer Berlin/Heidelberg, 2013. (fulltext:postprint).
  48. Service support system modelling language for simulation-driven development of functional products. Sean Reed, Magnus Löfstrand, Lennart Karlsson, and John Andrews. In Procedia CIRP, volume 11, pp 420-424, 2013. (DOI).
  49. Precise explanation of success typing errors. Konstantinos Sagonas, Josep Silva, and Salvador Tamarit. In Proc. ACM SIGPLAN 2013 Workshop on Partial Evaluation and Program Manipulation, pp 33-42, ACM Press, New York, 2013. (DOI).
  50. Can users control their data in social software?: An ethical analysis of control systems. Rula Sayaf, James B. Rule, and Dave Clarke. In Proc. Security and Privacy Workshops 2013, IEEE Computer Society, 2013. (DOI).
  51. Bounded strings for constraint programming. Joseph D. Scott, Pierre Flener, and Justin Pearson. In Proc. 25th International Conference on Tools with Artificial Intelligence, pp 1036-1043, IEEE Computer Society, 2013. (DOI).
  52. Scalable Preservation, Reconstruction, and Querying of Databases in terms of Semantic Web Representations. Silvia Stefanova. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1052, Acta Universitatis Upsaliensis, Uppsala, 2013. (fulltext).
  53. Scalable reconstruction of RDF-archived relational databases. Silvia Stefanova and Tore Risch. In Proc. 5th International Workshop on Semantic Web Information Management, pp 5:1-4, ACM Press, New York, 2013. (DOI).
  54. Integrative educational approach oriented towards software and system development. Anca-Juliana Stoica and Shareeful Islam. In International Journal of Engineering Pedagogy, volume 3, number 1, pp 36-43, 2013.
  55. Teaching information and software security courses in regular and distance learning programs: Education theory and practice, framework, and examples. Anca-Juliana Stoica and Shareeful Islam. In Proc. 4th Global Engineering Education Conference, pp 44-49, IEEE, Piscataway, NJ, 2013. (DOI).
  56. Structured Aliasing. Tobias Wrigstad. In Aliasing in Object-Oriented Programming: Types, Analysis, and Verification, volume 7850 of Lecture Notes in Computer Science, pp 512-513, Springer Berlin/Heidelberg, 2013. (DOI).
  57. Model-based validation of streaming data. Cheng Xu, Daniel Wedlund, Martin Helgoson, and Tore Risch. In Proc. 7th ACM International Conference on Distributed Event-Based Systems, pp 107-113, ACM Press, New York, 2013. (DOI).
  58. Bells and Whistles: Advanced language features in psi-calculi. Johannes Åman Pohjola. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2013-004, Uppsala University, 2013. (fulltext).
  59. Negative premises in applied process calculi. Johannes Åman Pohjola, Johannes Borgström, Joachim Parrow, Palle Raabjerg, and Ioana Rodhe. Technical report / Department of Information Technology, Uppsala University nr 2013-014, 2013. (fulltext).

2012

  1. Constraint programming for air traffic management: a survey. Cyril Allignol, Nicolas Barnier, Pierre Flener, and Justin Pearson. In Knowledge engineering review (Print), volume 27, number 3, pp 361-392, 2012. (DOI).
  2. Scientific SPARQL: Semantic web queries over scientific data. Andrej Andrejev and Tore Risch. In Proc. 28th International Conference on Data Engineering Workshops, pp 5-10, IEEE Computer Society, 2012. (DOI).
  3. A scalability benchmark suite for Erlang/OTP. Stavros Aronis, Nikolaos Papaspyrou, Katerina Roukounaki, Konstantinos Sagonas, Yiannis Tsiouris, and Ioannis E. Venetis. In Proc. 11th ACM SIGPLAN Workshop on Erlang, pp 33-42, ACM Press, New York, 2012. (DOI).
  4. An Introduction To Bayesian Networks in Systems and Control. Michael Ashcroft. 2012 18th International Conference on Automation and Computing (ICAC), 2012.
  5. Bayesian Networks in Business Analytics. Michael Ashcroft. In 2012 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), pp 955-961, 2012.
  6. Using Bayesian networks in business analytics: Overview and short case study. Michael Ashcroft. In Business Informatics, volume 3, number 25, 2012.
  7. Scalable ordered indexing of streaming data. Sobhan Badiozamany and Tore Risch. In 3rd International Workshop on Accelerating Data Management Systems using Modern Processor and Storage Architectures, p 11, 2012. (Fulltext).
  8. Professionella kompetenser i projektkurser. Åsa Cajander, Mats Daniels, Helena Bernáld, and Björn Victor. In Proc. 3:e Utvecklingskonferensen för Sveriges ingenjörsutbildningar, volume 75 of Linköping Electronic Conference Proceedings, pp 123-128, Linköping University Electronic Press, 2012. (External link).
  9. The impact of trace and adversary models on location privacy provided by K-anonymity. Volkan Cambazoglu, Christian Rohner, and Björn Victor. In Proc. 1st Workshop on Measurement, Privacy, and Mobility, ACM Press, New York, 2012. (DOI).
  10. Privacy preserving data publishing for recommender system. Xiaoqiang Chen and Vincent Huang. In Proc. 36th International Computer Software and Applications Conference Workshops, pp 128-133, IEEE Computer Society, 2012. (DOI).
  11. Constraint Programming for Air Traffic Management: Preface. Pierre Flener, Justin Pearson, and Marc Bourgois. In Knowledge engineering review (Print), volume 27, number 3, pp 287-289, 2012. (DOI).
  12. An optimisation-based approach for wireless sensor deployment in mobile sensing environments. Farshid Hassani Bijarbooneh, Pierre Flener, Edith C.-H. Ngai, and Justin Pearson. In Proc. Wireless Communications and Networking Conference 2012, pp 2108-2112, IEEE Communications Society, 2012. (DOI).
  13. Macroprogramming of Wireless Sensor Networks using Task Graphs and Constraint Solving. Farshid Hassani Bijarbooneh and Martin Jacobsson. 8th Swedish National Computer Networking Workshop (SNCNW), 7-8 June, 2012, Stockholm, Sweden, 2012.
  14. Solution neighbourhoods for constraint-directed local search. Jun He, Pierre Flener, and Justin Pearson. In Proc. 27th ACM Symposium on Applied Computing, pp 74-79, ACM Press, New York, 2012. (DOI).
  15. Software risk management modeling using goal-driven approach from early requirements engineering. Shareeful Islam and Anca-Juliana Stoica. In Risk Assessment and Management, pp 385-401, Publishing Services LLC, Cheyenne, WY, 2012. (External link).
  16. Computing Strong and Weak Bisimulations for Psi-Calculi. Magnus Johansson, Björn Victor, and Joachim Parrow. In Journal of Logic and Algebraic Programming, volume 81, number 3, pp 162-180, Elsevier, 2012. (DOI).
  17. Combinatorial problem solving over relational databases: View synthesis through constraint-based local search. Toni Mancini, Pierre Flener, and Justin K. Pearson. In Proc. 27th ACM Symposium on Applied Computing, pp 80-87, ACM Press, New York, 2012. (DOI).
  18. Towards solver-independent propagators. Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Principles and Practice of Constraint Programming: CP 2012, volume 7514 of Lecture Notes in Computer Science, pp 544-560, Springer Berlin/Heidelberg, 2012. (DOI, fulltext:postprint).
  19. Progression i skrivfärdigheter hos studenter i datavetenskap. Aletta Nylén. In Proc. NU 2012: Gränslöst lärande, Chalmers University of Technology, Göteborg, Sweden, 2012. (Abstract).
  20. On preserving term sharing in the Erlang virtual machine. Nikolaos Papaspyrou and Konstantinos Sagonas. In Proc. 11th ACM SIGPLAN Workshop on Erlang, pp 11-20, ACM Press, New York, 2012. (DOI).
  21. Proof Exchange for Theorem Proving: PxTP 2012. David Pichardie and Tjark Weber (eds). Volume 878 of CEUR Workshop Proceedings, 2012. (Proceedings).
  22. Extending psi-calculi and their formal proofs. Palle Raabjerg. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2012-008, Uppsala University, 2012. (fulltext).
  23. Adaptive Parallelization of Queries to Data Providing Web Service Operations. Manivasakan Sabesan and Tore Risch. In Transactions on Large-Scale Data- and Knowledge-Centered Systems V, volume 7100 of Lecture Notes in Computer Science, pp 49-69, Springer, 2012. (DOI).
  24. ErLLVM: An LLVM backend for Erlang. Konstantinos Sagonas, Chris Stavrakakis, and Yiannis Tsiouris. In Proc. 11th ACM SIGPLAN Workshop on Erlang, pp 21-32, ACM Press, New York, 2012. (DOI).
  25. Logics and Algorithms for Verification of Concurrent Systems. Rafa? Somla. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 964, Acta Universitatis Upsaliensis, Uppsala, 2012. (fulltext).
  26. Concurrent view modeling for software risk management at early development stage. Anca-Juliana Stoica and Shareeful Islam. In Proc. 1st International Conference on Theory and Practice in Modern Computing, pp 35-44, IADIS Press, 2012.
  27. Educational methods for software and systems development. Anca-Juliana Stoica and Shareeful Islam. In Proc. 15th International Conference on Interactive Collaborative Learning, p 8, IEEE, Piscataway, NJ, 2012. (DOI).
  28. Contingency plans for air traffic flow and capacity management using constraint programming. Karl Sundequist Blomdahl, Pierre Flener, and Justin Pearson. In Journal of Aerospace Operations, volume 1, pp 249-266, 2012. (DOI).
  29. On the use of underspecified data-type semantics for type safety in low-level code. Hendrik Tews, Marcus Völp, and Tjark Weber. In Proc. 7th Conference on Systems Software Verification: SSV 2012, volume 102 of Electronic Proceedings in Theoretical Computer Science, pp 73-87, 2012. (DOI).
  30. Structured Aliasing. Tobias Wrigstad. In ECOOP 2012 – Object-Oriented Programming, volume 7313 of Lecture Notes in Computer Science, pp 232-232, Springer Berlin/Heidelberg, 2012. (DOI).
  31. Multiple Aggregate Entry Points for Ownership Types. Johan Östlund and Tobias Wrigstad. In ECOOP 2012 – Object-Oriented Programming, volume 7313 of Lecture Notes in Computer Science, pp 156-180, Springer Berlin/Heidelberg, 2012. (DOI).
  32. The Joelle Programming Language: Evolving Java Programs Along Two Axes of Parallel Eval. Johan Östlund, Stephan Brandauer, and Tobias Wrigstad. 2012 International Workshop on Languages for the Multi-core Era, 2012.

2011

  1. Maintaining Database Integrity with Refinement Types. Ioannis G. Baltopoulos, Johannes Borgström, and Andrew D. Gordon. In ECOOP 2011 – Object-Oriented Programming, volume 6813 of Lecture Notes in Computer Science, pp 484-509, Springer-Verlag, Berlin, 2011. (DOI).
  2. Psi-calculi: a framework for mobile processes with nominal data and logic. Jesper Bengtson, Magnus Johansson, Joachim Parrow, and Björn Victor. In Logical Methods in Computer Science, volume 7, number 1, p 11, 2011. (DOI).
  3. Refinement types for secure implementations. Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. In ACM Transactions on Programming Languages and Systems, volume 33, number 2, pp 8:1-45, 2011. (DOI).
  4. Broadcast Psi-calculi with an Application to Wireless Protocols. Johannes Borgström, Shuqin Huang, Magnus Johansson, Palle Raabjerg, Björn Victor, Johannes Åman Pohjola, and Joachim Parrow. In Software Engineering and Formal Methods: SEFM 2011, volume 7041 of Lecture Notes in Computer Science, pp 74-89, Springer Berlin/Heidelberg, 2011. (DOI, fulltext:postprint).
  5. Verified Stateful Programs with Substructural State and Hoare Types. Johannes Borgström, Juan Chen, and Nikhil Swamy. In Proc. 5th ACM Workshop on Programming Languages Meets Program Verification, pp 15-26, ACM Press, New York, 2011. (DOI).
  6. Detection of asynchronous message passing errors using static analysis. Maria Christakis and Konstantinos Sagonas. In Practical Aspects of Declarative Languages, volume 6539 of Lecture Notes in Computer Science, pp 5-18, Springer Berlin/Heidelberg, 2011. (DOI).
  7. Consistency of constraint networks induced by automaton-based constraint specifications. María Andreína Francisco Rodríguez, Pierre Flener, and Justin Pearson. In Proc. 10th International Workshop on Constraint Modelling and Reformulation, pp 117-131, Department of Mathematics and Informatics, University of Perugia, Italy, 2011. (Proceedings).
  8. A type and effect system for deadlock avoidance in low-level languages. Prodromos Gerakios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Proc. 6th International Workshop on Types in Language Design and Implementation, pp 15-28, ACM Press, New York, 2011. (DOI).
  9. Energy-efficient task mapping for data-driven sensor network macroprogramming using constraint programming. Farshid Hassani Bijarbooneh, Pierre Flener, Edith Ngai, and Justin Pearson. In Operations Research, Computing, and Homeland Defense, pp 199-209, Institute for Operations Research and the Management Sciences, Hanover, MD, 2011. (DOI).
  10. An <em>automaton</em> constraint for local search. Jun He, Pierre Flener, and Justin Pearson. In Fundamenta Informaticae, volume 107, pp 223-248, 2011. (DOI).
  11. A quadratic edge-finding filtering algorithm for cumulative resource constraints. Roger Kameugne, Laure Pauline Fotso, Joseph Scott, and Youcheu Ngo-Kateu. In Principles and Practice of Constraint Programming – CP 2011, volume 6876 of Lecture Notes in Computer Science, pp 478-492, Springer-Verlag, Berlin, 2011. (DOI).
  12. Framtidsoptimerad livscykeloch hantering av versioner: för Scanias Fleet ManagementavdelningOptimizing Scanias Fleet Management softwarelifecycle and version management for the future. Markus Karlsson and David Åhman. Student thesis, supervisor: Mats Axelsson, examiner: Elísabet Andrésdóttir, Roland Bol, UPTEC STS nr 11040, 2011. (fulltext).
  13. Adaptive parallelization of queries calling dependent data providing web services. Manivasakan Sabesan and Tore Risch. In New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud, volume 74 of Lecture Notes in Business Information Processing, pp 132-154, Springer-Verlag, Berlin, 2011. (DOI).
  14. Optimizing Unbound-property Queries to RDF Views of RelationalDatabases. Silvia Stefanova and Tore Risch. In , pp 43-58, Bonn, Germany, 2011. (External link).
  15. Demonstrating early value in software system projects using software and system cost models. Anca-Juliana Stoica. In Proc. 26th International Forum on Systems/Software Cost Modeling, University of Southern California, Los Angeles, CA, 2011.
  16. Quantitative framework for managing software life cycle. Anca-Juliana Stoica, Prabhu Babu, and Peter Stoica. In The Open Software Engineering Journal, volume 5, pp 1-18, 2011. (DOI).
  17. Lower trees with fixed degrees: a recipe for efficient secure hierarchical aggregation in WSNs. Davor Sutic, Ioana Rodhe, Christian Rohner, and Björn Victor. In 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), pp 659-664, IEEE Computer Society, 2011. (DOI).
  18. A scalable architecture for e-Science data management. Salman Toor, Manivasakan Sabesan, Sverker Holmgren, and Tore Risch. In Proc. 7th International Conference on e-Science, pp 210-217, IEEE Computer Society, Los Alamitos, CA, 2011. (DOI).
  19. Is the World Ready for Ownership Types? Is Ownership Types Ready for the World?. Tobias Wrigstad and Dave Clarke. International Workshop on Aliasing, Confinement and Ownership in object-oriented programming: IWACO at ECOOP (Vetenskapsrådet), 2011.
  20. Owners as Ombudsmen: Multiple Aggregate Entry Points for Ownership Types. Tobias Wrigstad and Johan Östlund. International Workshop on Aliasing, Confinement and Ownership in object-oriented programming: IWACO at ECOOP (Vetenskapsrådet), 2011.
  21. Massive scale-out of expensive continuous queries. Erik Zeitler and Tore Risch. In 36th International Conference on Very Large Data Bases: VLDB 2010, 2011.
  22. Scalable Parallelization of Expensive Continuous Queries over Massive Data Streams. Erik Zeitler. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 836, Acta Universitatis Upsaliensis, Uppsala, 2011. (fulltext).
  23. Regions as Owners: A Discussion on Ownership-based Effects in Practice. Johan Östlund and Tobias Wrigstad. International Workshop on Aliasing, Confinement and Ownership in object-oriented programming: IWACO at ECOOP, 2011.

2010

  1. On matrices, automata, and double counting. Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, and Justin Pearson. In Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, volume 6140 of Lecture Notes in Computer Science, pp 10-24, Springer-Verlag, Berlin, 2010. (DOI).
  2. Tribal ownership. Nicholas Cameron, James Noble, and Tobias Wrigstad. In Proc. 1st International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, volume 45:10 of ACM SIGPLAN Notices, pp 618-633, ACM Press, New York, 2010. (DOI).
  3. Static detection of race conditions in Erlang. Maria Christakis and Konstantinos Sagonas. In Practical Aspects of Declarative Languages: PADL 2010, volume 5937 of Lecture Notes in Computer Science, pp 119-133, Springer-Verlag, Berlin, 2010. (DOI).
  4. Inductive programming. Pierre Flener and Ute Schmid. In Encyclopedia of Machine Learning, pp 537-544, Springer, New York, 2010. (DOI).
  5. Proc. 10th International Workshop on Symmetry in Constraint Satisfaction Problems. Pierre Flener and Justin Pearson (eds). Department of Information Technology, Uppsala University, Uppsala, Sweden, 2010. (Proceedings).
  6. Programming by demonstration. Pierre Flener and Ute Schmid. In Encyclopedia of Machine Learning, pp 805-805, Springer, New York, 2010. (DOI).
  7. Trace-based programming. Pierre Flener and Ute Schmid. In Encyclopedia of Machine Learning, pp 989-989, Springer, New York, 2010. (DOI).
  8. A concurrent language with a uniform treatment of regions and locks. Prodromos Gerakios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Proc. 2nd Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software: PLACES 2009, volume 17 of Electronic Proceedings in Theoretical Computer Science, pp 79-93, 2010. (DOI).
  9. Race-free and memory-safe multithreading: Design and implementation in Cyclone. Prodromos Gerakios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Proc. 5th International Workshop on Types in Language Design and Implementation, pp 15-26, ACM Press, New York, 2010. (DOI).
  10. Energy-efficient task-mapping for data-driven sensor network macroprogramming using constraint programming. Farshid Hassani Bijarbooneh, Pierre Flener, Edith Ngai, and Justin Pearson. In Proc. 9th International Workshop on Constraint Modelling and Reformulation, p 13, Department of Information Technology, Uppsala University, Uppsala, Sweden, 2010. (fulltext).
  11. A Fully Abstract Symbolic Semantics for Psi-Calculi. Magnus Johansson, Björn Victor, and Joachim Parrow. In Proc. 6th Workshop on Structural Operational Semantics: SOS 2009, volume 18 of Electronic Proceedings in Theoretical Computer Science, pp 17-31, 2010. (DOI).
  12. Weak Equivalences in Psi-calculi. Magnus Johansson, Jesper Bengtson, Joachim Parrow, and Björn Victor. In Proc. 25th Symposium on Logic in Computer Science: LICS 2010, pp 322-331, IEEE, Piscataway, NJ, 2010. (DOI).
  13. Local search over relational databases. Toni Mancini, Pierre Flener, and Justin Pearson. In Proc. 7th International Workshop on Local Search Techniques in Constraint Satisfaction, p 15, Department of Computing Science and Engineering, Université catholique de Louvain, Belgium, 2010. (Fulltext).
  14. Automated Web Service Query Service. Manivasakan Sabesan, Tore Risch, and Feng Luan. In International Journal of Web and Grid Services (IJWGS), volume 6, number 4, pp 400-423, 2010. (DOI).
  15. Querying Data Providing Web Services. Manivasakan Sabesan. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 755, Acta Universitatis Upsaliensis, Uppsala, 2010. (fulltext).
  16. Using static analysis to detect type errors and concurrency defects in Erlang programs. Konstantinos Sagonas. In Functional and Logic Programming: FLOPS 2010, volume 6009 of Lecture Notes in Computer Science, pp 13-18, Springer-Verlag, Berlin, 2010. (DOI).
  17. SPARQL queries to RDFS views of Topic Maps. Silvia Stefanova and Tore Risch. In International Journal of Metadata, Semantics and Ontologies (IJMSO), volume 5, number 1, pp 1-16, Inderscience, 2010. (DOI).
  18. Agile software development and ISO-IEC software quality standards: Measuring economic benefits and calculating quantitative yields. Anca-Juliana Stoica and Margus Nael. In Proc. 25th International Forum on Systems/Software Cost Modeling, University of Southern California, Los Angeles, CA, 2010.
  19. Contingency plans for air traffic flow and capacity management. Karl Sundequist Blomdahl, Pierre Flener, and Justin Pearson. In Proc. 9th Innovative Research Workshop and Exhibition, pp 119-126, EUROCONTROL Experimental Centre, Brétigny sur Orge, France, 2010. (fulltext).
  20. Contingency plans for air traffic management. Karl Sundequist Blomdahl, Pierre Flener, and Justin Pearson. In Principles and Practice of Constraint Programming – CP 2010, volume 6308 of Lecture Notes in Computer Science, pp 643-657, Springer-Verlag, Berlin, 2010. (DOI).
  21. Scalable Splitting of Massive Data Streams. Erik Zeitler and Tore Risch. In Database Systems for Advanced Applications: Part II, volume 5982 of Lecture Notes in Computer Science, pp 184-198, Springer-Verlag, Berlin, 2010. (DOI, fulltext).
  22. Welterweight Java. Johan Östlund and Tobias Wrigstad. In Objects, Models, Components, Patterns, volume 6141 of Lecture Notes in Computer Science, pp 97-116, Springer-Verlag, Berlin, 2010. (DOI).

Updated  2024-04-25 13:17:07 by Pierre Flener.