Skip to main content
Department of Information Technology

Division of Computer Systems: Publications from 2012

  1. Regular model checking for LTL(MSO). Parosh Abdulla, Bengt Jonsson, Marcus Nilsson, Julien d'Orso, and Mayank Saksena. In International Journal on Software Tools for Technology Transfer, volume 14, number 2, pp 223-241, Springer, 2012. (DOI).
  2. Adding time to pushdown automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jari Stenman. In Quantities in Formal Methods: QFM 2012, volume 103 of Electronic Proceedings in Theoretical Computer Science, pp 1-16, 2012. (DOI).
  3. Automatic fence insertion in integer programs via predicate abstraction. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Carl Leonardsson, and Ahmed Rezine. In Static Analysis, volume 7460 of Lecture Notes in Computer Science, pp 164-180, Springer-Verlag, Berlin, 2012. (DOI).
  4. Counter-Example Guided Fence Insertion under TSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Carl Leonardsson, and Ahmed Rezine. In Tools and Algorithms for the Construction and Analysis of Systems, volume 7214 of Lecture Notes in Computer Science, pp 204-219, Springer-Verlag, Berlin, 2012. (DOI, fulltext:preprint).
  5. Dense-Timed Pushdown Automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jari Stenman. In Proc. 27th ACM/IEEE Symposium on Logic in Computer Science, pp 35-44, IEEE Computer Society, 2012. (DOI).
  6. Multi-Pushdown Systems with Budgets. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Jari Stenman, and Othmane Rezine. In Formal Methods in Computer-Aided Design, pp 24-33, 2012. (External link).
  7. Petri Nets with Time and Cost. Parosh Aziz Abdulla and Mayr Richard. INFINITY 2012, 14th International Workshop on Verification of Infinite-State Systems, 2012.
  8. Regular model checking. Parosh Aziz Abdulla. In International Journal on Software Tools for Technology Transfer, volume 14, number 2, pp 109-118, 2012. (DOI).
  9. The minimal cost reachability problem in priced timed pushdown systems. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jari Stenman. In Language and Automata Theory and Applications: 6th International Conference, LATA 2012, A Coruña, Spain, March 5-9, 2012, volume 7183 of Lecture Notes in Computer Science, pp 58-69, Springer-Verlag, Berlin, 2012. (DOI).
  10. Timed lossy channel systems. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jonathan Cederberg. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science: FSTTCS 2012, volume 18 of Leibniz International Proceedings in Informatics, pp 374-386, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2012. (DOI).
  11. Constraint programming for air traffic management: a survey. Cyril Allignol, Nicolas Barnier, Pierre Flener, and Justin Pearson. In Knowledge engineering review (Print), volume 27, number 3, pp 361-392, 2012. (DOI).
  12. Detecting fair non-termination in multithreaded programs. Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi, and Akash Lal. In Computer Aided Verification, volume 7358 of Lecture Notes in Computer Science, pp 210-227, Springer-Verlag, Berlin, 2012. (fulltext).
  13. Linear-Time Model-Checking for Multithreaded Programs under Scope-Bounding. Mohamed Faouzi Atig, Ahmed Bouajjani, K. Narayan Kumar, and Prakash Saivasan. In Automated Technology for Verification and Analysis: ATVA 2012, volume 7561 of Lecture Notes in Computer Science, pp 152-166, Springer Berlin/Heidelberg, 2012. (DOI).
  14. Model-Checking of Ordered Multi-Pushdown Automata. Mohamed Faouzi Atig. In Logical Methods in Computer Science, volume 8, number 3, p 20, 2012. (DOI).
  15. What's decidable about weak memory models?. Mohamed Faouzi Atig, Ahmed Bouajjani, Sebastian Burckhardt, and Madanlal Musuvathi. In Programming Languages and Systems, volume 7211 of Lecture Notes in Computer Science, pp 26-46, Springer Berlin/Heidelberg, 2012. (DOI).
  16. A social node model for realising information dissemination strategies in delay tolerant networks. Saeed Bastani, Björn Landfeldt, Christian Rohner, and Per Gunningberg. In Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, pp 79-88, ACM Press, New york, 2012. (DOI, fulltext:postprint).
  17. Intercultural competence in global collaboration courses in computer engineering. Helena Bernáld, Åsa Cajander, Mats Daniels, Can Kultur, Anette Löfström, Roger McDermott, and Lori Russell Dag. In Advances in Design for Cross-Cultural Activities: Part I, pp 351-361, CRC Press, Boca Raton, FL, 2012.
  18. Measurements in opportunistic networks. Fredrik Bjurefors. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2012-002, Uppsala University, 2012. (fulltext).
  19. Categorizing how students use collaborative technologies in a globally distributed project. Åsa Cajander, Mats Daniels, Mats Cullhed, Tony Clear, Roger McDermott, and Cary Laxer. In Proc. 42nd ASEE/IEEE Frontiers in Education Conference, pp 1325-1330, IEEE, Piscataway, NJ, 2012. (DOI).
  20. Managing international student collaborations: An experience report. Åsa Cajander, Mats Daniels, Can Kultur, Lori Russell Dag, and Cary Laxer. In Proc. 42nd ASEE/IEEE Frontiers in Education Conference, pp 355-360, IEEE, Piscataway, NJ, 2012. (DOI).
  21. On valuing peers: theories of learning and intercultural competence. Åsa Cajander, Mats Daniels, and Roger McDermott. In Computer Science Education, volume 22, pp 319-342, 2012. (DOI).
  22. Professionella kompetenser i projektkurser. Åsa Cajander, Mats Daniels, Helena Bernáld, and Björn Victor. In Proc. 3:e Utvecklingskonferensen för Sveriges ingenjörsutbildningar, volume 75 of Linköping Electronic Conference Proceedings, pp 123-128, Linköping University Electronic Press, 2012. (External link).
  23. The impact of trace and adversary models on location privacy provided by K-anonymity. Volkan Cambazoglu, Christian Rohner, and Björn Victor. In Proc. 1st Workshop on Measurement, Privacy, and Mobility, ACM Press, New York, 2012. (DOI).
  24. Towards business processes orchestrating the physical enterprise with wireless sensor networks. Fabio Casati, Florian Daniel, Guenadi Dantchev, Joakim Eriksson, Niclas Finne, Stamatis Karnouskos, Patricio Moreno Montera, Luca Mottola, Felix Jonathan Oppermann, Gian Pietro Picco, Antonio Quartulli, Kay Römer, Patrik Spiess, Stefano Tranquillini, and Thiemo Voigt. In ICSE, pp 1357-1360, 2012.
  25. A succinct canonical register automaton model for data domains with binary relations. Sofia Cassel, Bengt Jonsson, F. Howar, and B. Steffen. In Automated Technology for Verification and Analysis: 10th International Symposium, ATVA 2012, Thiruvananthapuram, India, October 3-6, 2012. Proceedings, volume 7561 of Lecture Notes in Computer Science, pp 57-71, Springer, 2012. (DOI).
  26. A Compositional Specification Theory for Component Behaviours. Taolue Chen, Chris Chilton, Bengt Jonsson, and Marta Kwiatkowska. In Programming Languages and Systems - 21st European Symposium on Programming, ESOP 2012,, Lecture Notes in Computer Science, pp 148-168, 2012. (DOI).
  27. A Compositional Specification Theory for Component Behaviours. Taolue Chen, Chris Chilton, Bengt Jonsson, and Marta Kwiatkowska. 2012. (External link).
  28. Assume-Guarantee Reasoning for Safe Component Behaviours. Chris Chilton, Bengt Jonsson, and Marta Kwiatkowska. In Proc. FACS: Formal Aspects of Component Software, 9th Int. Symp., volume 7684 of Lecture Notes in Computer Science, pp 92-109, Springer, 2012. (DOI, External link).
  29. Models and methods for computing education research. Mats Daniels and Arnold Pears. In Australian Computer Science Communications, volume 34, number 2, pp 95-102, 2012. (External link).
  30. Bounding and shaping the demand of mixed-criticality sporadic tasks. Pontus Ekberg and Wang Yi. In Proc. 24th Euromicro Conference on Real-Time Systems, pp 135-144, IEEE Computer Society, 2012. (DOI).
  31. A Profiling Method for Analyzing Scalability Bottlenecks on Multicores. David Eklöv. 2012.
  32. Bandwidth bandit: Quantitative characterization of memory contention. David Eklöv, Nikkos Nikoleris, David Black-Schaffer, and Erik Hägersten. In Parallel Architectures and Compilation Techniques - Conference Proceedings, PACT, pp 457-458, 2012. (DOI).
  33. Profiling Methods for Memory Centric Software Performance Analysis. David Eklöv. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1000, Acta Universitatis Upsaliensis, Uppsala, 2012. (fulltext).
  34. Quantitative Characterization of Memory Contention. David Eklöv, Nikos Nikoleris, David Black-Schaffer, and Erik Hägersten. Technical report / Department of Information Technology, Uppsala University nr 2012-029, Uppsala universitet, Uppsala, 2012. (on department web, fulltext).
  35. Poster Abstract: A Testbed for Measuring Battery Discharge Behavior. Laura Marie Feeney, Lars Andersson, Anders Lindgren, Stina Starborg, and Annika Ahlberg Tidblad. In Proc. of 7th ACM Int’l Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH’12), 2012.
  36. Poster Abstract: Using batteries wisely. Laura Marie Feeney, Lars Andersson, Anders Lindgren, Stina Starborg, and Annika Ahlberg Tidblad. In , 2012.
  37. Towards trustworthy simulation of wireless MAC/PHY layers: A comparison framework. Laura Marie Feeney. In Proc. of 15th ACM Int’l Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’12), 2012.
  38. Constraint Programming for Air Traffic Management: Preface. Pierre Flener, Justin Pearson, and Marc Bourgois. In Knowledge engineering review (Print), volume 27, number 3, pp 287-289, 2012. (DOI).
  39. Timed Model Checking with Abstractions: Towards Worst-Case Response Time Analysis in Resource-Sharing Manycore Systems. Georgia Giannopoulou, Kai Lampka, Nikolay Stoimenov Nikolay Stoimenov, and Lothar Thiele. In Proc. International Conference on Embedded Software (EMSOFT), pp 63-72, ACM Press, 2012.
  40. Fixed-Priority Multiprocessor Scheduling: Critical Instant, Response Time and Utilization Bound. Nan Guan and Wang Yi. In 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum-IPDPSW, pp 2470-2473, 2012. (DOI).
  41. Parametric Utilization Bounds for Fixed-Priority Multiprocessor Scheduling. Nan Guan, Martin Stigge, Wang Yi, and Ge Yu. In 2012 IEEE 26th International Parallel and Distributed Processing Symposium (IPDPS), International Parallel and Distributed Processing Symposium IPDPS, pp 261-272, 2012. (DOI).
  42. WCET analysis with MRU caches: Challenging LRU for predictability. Nan Guan, Mingsong Lv, Wang Yi, and Ge Yu. In Proc. 18th Real-Time and Embedded Technology and Applications Symposium, pp 55-64, IEEE Computer Society, 2012. (DOI).
  43. Designing a flexible and low-cost testbed for Wireless Sensor Networks. Cheng Guo, Venkatesha Prasad, JiangJie He, Martin Jacobsson, and Ignas Niemegeers. In International Journal of Ad Hoc and Ubiquitous Computing, volume 9, number 2, pp 111-121, InderScience Publishers, 2012. (DOI).
  44. Forest automata for verification of heap manipulation. Peter Habermehl, Lukáš Holík, Adam Rogalewicz, Ji?í Šimá?ek, and Tomas Vojnar. In Formal methods in system design, volume 41, number 1, pp 83-106, 2012. (DOI).
  45. An optimisation-based approach for wireless sensor deployment in mobile sensing environments. Farshid Hassani Bijarbooneh, Pierre Flener, Edith C.-H. Ngai, and Justin Pearson. In Proc. Wireless Communications and Networking Conference 2012, pp 2108-2112, IEEE Communications Society, 2012. (DOI).
  46. Macroprogramming of Wireless Sensor Networks using Task Graphs and Constraint Solving. Farshid Hassani Bijarbooneh and Martin Jacobsson. 8th Swedish National Computer Networking Workshop (SNCNW), 7-8 June, 2012, Stockholm, Sweden, 2012.
  47. Do Sensor Networks need Mobile MAC Protocols. Navid Hassanzadeh, Thiemo Voigt, Olaf Landsiedel, Frederik Hermans, and Olof Rensfelt. In Proc. of Third International Workshop on Networks of Cooperating Objects (CONET 2012), held in conjunction with IPSN 2012, April 2012, Beijing, China., 2012.
  48. Ef?cient Mobile Data Collection with Mobile Collect. Navid Hassanzadeh, Olaf Landsiedel, Frederik Hermans, Olof Rensfelt, and Thiemo Voigt. In Proceedings of the 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp 25-32, IEEE Computer Society, 2012. (DOI).
  49. A Lightweight Approach to Online Detection and Classification of Interference in 802.15.4-based Sensor Networks. Frederik Hermans, Olof Rensfelt, Lars-Åke Larzon, and Per Gunningberg. In ACM SIGBED Review, volume 9, number 3, pp 11-20, 2012. (DOI).
  50. Global Source Mobility in the Content-Centric Networking Architecture. Frederik Hermans, Edith Ngai, and Per Gunningberg. In Proc. 1st ACM Workshop on Emerging Name-Oriented Mobile Networking Design: Architecture, Algorithms, and Applications, pp 13-18, ACM Press, New York, 2012. (DOI).
  51. Accelerating interpolants. H. Hojjat, R. Iosif, F. Kone?ný, V. Kuncak, and Phillipp Rümmer. In Automated Technology for Verification and Analysis: 10th International Symposium, ATVA 2012, Thiruvananthapuram, India, October 3-6, 2012. Proceedings, volume 7561 of Lecture Notes in Computer Science, pp 187-202, 2012. (DOI).
  52. A verification toolkit for numerical transition systems. Hossein Hojjat, Filip Konecný, Florent Garnier, Radu Iosif, Viktor Kuncak, and Philipp Rümmer. In FM 2012: Formal Methods, volume 7436 of Lecture Notes in Computer Science, pp 247-251, Springer Berlin/Heidelberg, 2012. (DOI).
  53. Inferring semantic interfaces of data structures. F. Howar, M. Isberner, B. Steffen, O. Bauer, and Bengt Jonsson. In Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change: 5th International Symposium, ISoLA 2012, Heraklion, Crete, Greece, October 15-18, 2012, Proceedings, Part I, volume 7609 of Lecture Notes in Computer Science, pp 554-571, 2012. (DOI).
  54. Inferring Canonical Register Automata. Falk Howar, Bernhard Steffen, Bengt Jonsson, and Sofia Cassel. In Verification, Model Checking, and Abstract Interpretation - 13th International Conference,, volume 7148 of Lecture Notes in Computer Science, pp 251-266, Springer, 2012. (DOI).
  55. A location-based publish/subscribe framework for wireless sensors and mobile phones. He Huang, Edith C.-H. Ngai, and Jiangchuan Liu. In Proc. Wireless Communications and Networking Conference 2012, pp 2173-2178, IEEE Communications Society, 2012. (DOI).
  56. Technological systems across contexts: Designing and exploring learning possibilities in Swedish compulsory technology education. Åke Ingerman, Maria Svensson, Anders Berglund, Shirley Booth, and Jonas Emanuelsson. In Proc. PATT 26 Conference: Technology Education in the 21st Century, volume 73 of Linköping Electronic Conference Proceedings, pp 232-238, Linköping University Electronic Press, 2012. (Free fulltext available).
  57. Using refinement calculus techniques to prove linearizability. Bengt Jonsson. In Formal Aspects of Computing, volume 24, number 4-6, pp 537-554, 2012. (DOI).
  58. Trace-based performance analysis of opportunistic forwarding under imperfect node cooperation. Merkourios Karaliopoulos and Christian Rohner. In Proceedings of the 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), IEEE Communications Society, Orlando, 2012.
  59. Low Overhead Instruction-Cache Modeling Using Instruction Reuse Profiles. Muneeb Khan, Andreas Sembrant, and Erik Hagersten. In International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD'12), Computer Architecture and High Performance Computing, pp 260-269, IEEE Computer Society, 2012. (DOI).
  60. Report on the Model Checking Contest at Petri Nets 2011. Fabrice Kordon, Alban Linard, Didier Buchs, Maximilien Colange, Sami Evangelista, Kai Lampka, Niels Lohmann, Emmanuel Paviot-Adet, Yann Thierry-Mieg, and Harro Wimmel. In Transactions on Petri Nets and Other Models of Concurrency: VI, volume 7400 of Lecture Notes in Computer Science, pp 169-196, Springer Berlin/Heidelberg, 2012. (DOI, fulltext:postprint).
  61. A Hybrid Approach to Cyber-Physical Systems Verification. Pratyush Kumar, Dip Goswami, Samarjit Chakraborty, Anuradha Annaswamy, Kai Lampka, and Lothar Thiele. In Proc. 49th Design Automation Conference, pp 688-696, Association for Computing Machinery (ACM), 2012. (fulltext:postprint).
  62. Seasonal Affective Disorder Monitoring System. Negar Makvandian and Edith Ngai. 8th Swedish National Computer Networking Workshop (SNCNW), Stockholm, Sweden, 2012.
  63. A glimpse of energy-efficient location-triggered mobile application design and implementation in data collection scenarios. Yemao Man, Edith C.-H. Ngai, and Liu Yang. In Proc. 8th International Conference on Mobile Ad Hoc and Sensor Networks, pp 108-115, IEEE, Piscataway, NJ, 2012. (DOI).
  64. Student reflections on collaborative technology in a globally distributed student project. Roger McDermott, Mats Daniels, Åsa Cajander, Mats Cullhed, Tony Clear, and Cary Laxer. In Proc. 42nd ASEE/IEEE Frontiers in Education Conference, pp 365-370, IEEE, Piscataway, NJ, 2012. (DOI).
  65. Mining Conversations of Geographically Changing Users. Liam McNamara and Christian Rohner. In Proceedings of the World Wide Web 2012 Workshop on Social Web for Disaster (SWDM2012), Lion, 2012.
  66. On Resilience in Opportunistic Networks. Maria Mehrparvar, Fredrik Bjurefors, Christian Rohner, and Paul Smith. In 8th Swedish National Computer Networking Workshop SNCNW 2012, 2012.
  67. Demonstrating Learning of Register Automata. Maik Merten, Falk Howar, Bernhard Steffen, Sofia Cassel, and Bengt Jonsson. In Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference,, volume 7214 of Lecture Notes in Computer Science, pp 466-471, Springer Berlin/Heidelberg, Berlin, 2012. (DOI, External link).
  68. Context-aware sensor data dissemination for mobile users in remote areas. Edith C.-H. Ngai, Mani B. Srivastava, and Jiangchuan Liu. In Proc. 31st International Conference on Computer Communications: Mini-Conference, pp 2711-2715, IEEE, Piscataway, NJ, 2012. (DOI).
  69. Quality-of-Information aware data collection for mobile sensor networks. Edith C.-H. Ngai and Per Gunningberg. In Proc. 10th International Conference on Pervasive Computing and Communications Workshops, pp 38-43, IEEE Communications Society, 2012. (DOI).
  70. Predicting the Cost of Lock Contention in Parallel Applications on Multicores using Analytic Modeling. Xiaoyue Pan, Jonatan Lindén, and Bengt Jonsson. In Proc. 5th Swedish Workshop on Multi-Core Computing, 2012.
  71. Challenges in Developing Global Collaborative Project Courses. Arnold Pears, Neena Thota, Henrik Forsberg, Jonny Gunnarsson, Anders Hedström, and David Skoglund. In Proc. 1st Forum on International Collaborative Academic Programs, BrownWalker Press, 2012.
  72. Harnessing theory in the service of engineering education research. Arnold Pears, Neena Thota, Päivi Kinnunen, and Anders Berglund. In Proc. 42nd ASEE/IEEE Frontiers in Education Conference, pp 391-395, IEEE, Piscataway, NJ, 2012. (DOI).
  73. Hur ser Teknisk-naturvetenskapliga fakultetens lärare på undervisning och lärande. Arnold Pears, Staffan Andersson, and Maja Elmgren. In Universitetspedagogisk utveckling och kvalitet - i praktiken!, pp 21-44, 2012.
  74. Investigating Swedish Teacher's Approaches to Their Teaching Practice. Arnold Pears and Judy Sheard. In , San Antonio, TX, 2012.
  75. Teachers' conceptions of teaching practice. Arnold Pears, Maja Elmgren, and Staffan Andersson. In Improving Student Learning through Research and Scholarship (ISL 2012), Lund University, Sweden, 2012. (Abstract).
  76. Students' experiences and attitudes towards learning Computer Science. Anne-Kathrin Peters and Arnold Pears. In Proc. 42nd ASEE/IEEE Frontiers in Education Conference, pp 88-93, IEEE, Piscataway, NJ, 2012. (DOI).
  77. Experimental Challenges in Wireless Sensor Networks — Environment, Mobility, and Interference. Olof Rensfelt. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 965, Acta Universitatis Upsaliensis, Uppsala, 2012. (fulltext).
  78. SoNIC: Classifying and Surviving Interference in 802.15.4-based Sensor Networks. Olof Rensfelt, Frederik Hermans, Thiemo Voigt, Edith Ngai, Lars-Åke Nordén, and Per Gunningberg. Technical report / Department of Information Technology, Uppsala University nr 2012-022, 2012. (fulltext).
  79. On location privacy and quality of information in participatory sensing. Ioana Rodhe, Christian Rohner, and Edith C.-H. Ngai. In Proc. 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp 55-62, ACM Press, New York, 2012. (DOI).
  80. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks. Ioana Rodhe. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 968, Acta Universitatis Upsaliensis, Uppsala, 2012. (fulltext).
  81. Making the Most of Your Contacts: Transfer Ordering in Data-Centric Opportunistic Networks. Christian Rohner, Fredrik Bjurefors, Per Gunningberg, Liam McNamara, and Erik Nordström. In Proceedings of the 2012 ACM MobiOpp Workshop on Mobile Opportunistic Networks, ACM Press, Zürich, 2012.
  82. Complexity-effective multicore coherence. Alberto Ros and Stefanos Kaxiras. In Proc. 21st International Conference on Parallel Architectures and Compilation Techniques, pp 241-251, ACM Press, New York, 2012. (DOI).
  83. E-matching with free variables. Philipp Rümmer. In Logic for Programming, Artificial Intelligence, and Reasoning, volume 7180 of Lecture Notes in Computer Science, pp 359-374, Springer Berlin/Heidelberg, 2012. (DOI).
  84. Efficient techniques for predicting cache sharing and throughput. Andreas Sandberg, David Black-Schaffer, and Erik Hagersten. In Proc. 21st International Conference on Parallel Architectures and Compilation Techniques, pp 305-314, ACM Press, New York, 2012. (DOI, fulltext:postprint).
  85. Topic 14: Mobile and Ubiquitous Computing. Paolo Santi, Sotiris E. Nikoletseas, Cecilia Mascolo, and Thiemo Voigt. In Euro-Par, 2012.
  86. Computer Science at School / CS Teacher Education: Koli working-group report on CS at school. Carsten Schulte, Malte Hornung, Sue Sentance, Valentina Dagiene, Tatjana Jevsikova, Neena Thota, Anna Eckerdal, and Anne-Kathrin Peters. In Proc. 12th International Conference on Computing Education Research: Koli Calling, pp 29-38, ACM Press, New York, 2012. (DOI).
  87. Efficient techniques for detecting and exploiting runtime phases. Andreas Sembrant. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2012-009, Uppsala University, 2012. (fulltext).
  88. Phase Behavior in Serial and Parallel Applications. Andreas Sembrant, David Black-Schaffer, and Erik Hagersten. In International Symposium on Workload Characterization (IISWC'12), IEEE Computer Society, 2012.
  89. Phase Guided Profiling for Fast Cache Modeling. Andreas Sembrant, David Black-Schaffer, and Erik Hagersten. In International Symposium on Code Generation and Optimization (CGO'12), pp 175-185, ACM Press, 2012. (DOI).
  90. Power-Sleuth: A Tool for Investigating your Program's Power Behavior. Vasileios Spiliopoulos, Andreas Sembrant, and Stefanos Kaxiras. In International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'12), pp 241-250, 2012. (DOI).
  91. Hardness Results for Static Priority Real-Time Scheduling. Martin Stigge and Wang Yi. In Proceedings Of The 24th Euromicro Conference On Real-Time Systems (Ecrts 2012), Euromicro Workshop on Real-Time Systems-Proceedings, pp 189-198, 2012. (DOI, External link).
  92. Illustration of paradigm pluralism in computing education research. Neena Thota, Anders Berglund, and Tony Clear. In Australian Computer Science Communications, volume 34, number 2, pp 103-112, 2012. (External link, fulltext:print).
  93. A ubiquitous publish/subscribe platform for wireless sensor networks with mobile mules. Xiaoyu Tong and Edith C.-H. Ngai. In Proc. 8th International Conference on Distributed Computing in Sensor Systems, pp 99-108, IEEE Computer Society, 2012. (DOI).
  94. An analytical energy consumption model for packet transfer over wireless links. Javad Vazifehdan, Venkatesha Prasad, Martin Jacobsson, and Ignas Niemegeers. In IEEE Communications Letters, volume 16, number 1, pp 30-33, 2012. (DOI).
  95. A Long-Term Study on the Effects of Meteorological Conditions on 802.15.4 Links. Hjalmar Wennerström, Frederik Hermans, Olof Rensfelt, Christian Rohner, and Lars-Åke Nordén. In 8th Swedish National Computer Networking Workshop, Stockholm, June 7-8, 2012.
  96. Conformance testing for cyber-physical systems. Matthias Woehrle, Kai Lampka, and Lothar Thiele. In ACM Transactions on Embedded Computing Systems, volume 11, number 4, pp 84:1-23, Association for Computing Machinery (ACM), New York, 2012. (DOI).
  97. An investigation of link quality assessment for mobile multi-hop and multi-rate wireless networks. Jinglong Zhou, Martin Jacobsson, Ertan Onur, and Ignas Niemegeers. In Wireless personal communications, volume 65, number 2, pp 405-423, 2012. (DOI).
  98. Bifurcation phenomena in an impulsive model of non-basal testosterone regulation. Zhanybai T. Zhusubaliyev, Alexander N. Churilov, and Alexander Medvedev. In Chaos, volume 22, number 1, p 013121, 2012. (DOI).

Updated  2016-12-09 16:27:12 by Peter Waites.