Skip to main content
Department of Information Technology

Division of Computer Systems: Publications from 2013

  1. All for the price of few: (Parameterized verification through view abstraction). Parosh Aziz Abdulla, Frédéric Haziza, and Lukáš Holík. In Verification, Model Checking, and Abstract Interpretation, volume 7737 of Lecture Notes in Computer Science, pp 476-495, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  2. An Integrated Specification and Verification Technique for Highly Concurrent Data Structures. Parosh Aziz Abdulla, Frédéric Haziza, Lukas Holik, Bengt Jonsson, and Ahmed Rezine. In Tools and Algorithms for the Construction and Analysis of Systems, 2013. (fulltext:postprint).
  3. Analysis of message passing programs using SMT-solvers. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jonathan Cederberg. In Automated Technology for Verification and Analysis: ATVA 2013, volume 8172 of Lecture Notes in Computer Science, pp 272-286, Springer Berlin/Heidelberg, 2013. (DOI).
  4. MEMORAX, a Precise and Sound Tool for Automatic Fence Insertion under TSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Carl Leonardsson, and Ahmed Rezine. In Tools and Algorithms for the Construction and Analysis of Systems, volume 7795 of Lecture Notes in Computer Science, pp 530-536, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  5. Monotonic abstraction for programs with multiply-linked structures. Parosh Aziz Abdulla, Jonathan Cederberg, and Tomás Vojnar. In International Journal of Foundations of Computer Science, volume 24, number 2, pp 187-210, 2013. (DOI, fulltext:postprint).
  6. Priced timed Petri nets. Parosh Aziz Abdulla and Richard Mayr. In Logical Methods in Computer Science, volume 9, number 4, pp 10:1-51, 2013. (DOI).
  7. Push-down automata with gap-order constraints. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Giorgio Delzanno, and Andreas Podelski. In Fundamentals of Software Engineering: FSEN 2013, volume 8161 of Lecture Notes in Computer Science, pp 199-216, Springer Berlin/Heidelberg, 2013. (DOI).
  8. Solving parity games on integer vectors. Parosh Aziz Abdulla, Richard Mayr, Arnaud Sangnier, and Jeremy Sproston. In CONCUR 2013 – Concurrency Theory, volume 8052 of Lecture Notes in Computer Science, pp 106-120, Springer Berlin/Heidelberg, 2013. (DOI).
  9. Tools for software verification: Introduction to the special section from the seventeenth international conference on tools and algorithms for the construction and analysis of systems. Parosh Aziz Abdulla and K. Rustan M. Leino. In International Journal on Software Tools for Technology Transfer, volume 15, number 2, pp 85-88, 2013. (DOI).
  10. Veri?cation of heap manipulating programs with ordered data by extended forest automata. Parosh Aziz Abdulla, Lukás Holík, Bengt Jonsson, Ondrej Lengál, Cong Quy Trinh, and Tomás Vojnar. In Automated Technology for Verification and Analysis: ATVA 2013, volume 8172 of Lecture Notes in Computer Science, pp 224-239, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  11. Verification of Directed Acyclic Ad Hoc Networks. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Othmane Rezine. In Formal Techniques for Distributed Systems: FORTE 2013, volume 7892 of Lecture Notes in Computer Science, pp 193-208, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  12. Verifying safety and liveness for the FlexTM hybrid transactional memory. Parosh Aziz Abdulla, Sandhya Dwarkadas, Ahmed Rezine, Arrvindh Shriraman, and Zhu Yunyun. In , pp 785-790, Grenoble, France, 2013.
  13. Bounds on the Lifetime of WSNs. Juan M. Alonso, Thiemo Voigt, and Ambuj Varshney. In , 2013. (DOI).
  14. A theory for control-flow graph exploration. Stephan Arlt, Philipp Rümmer, and Martin Schäf. In Automated Technology for Verification and Analysis: ATVA 2013, volume 8172 of Lecture Notes in Computer Science, pp 506-515, Springer Berlin/Heidelberg, 2013. (DOI).
  15. Adjacent ordered multi-pushdown systems. Mohamed Faouzi Atig, K. Narayan Kumar, and Prakash Saivasan. In Developments in Language Theory: DLT 2013, volume 7907 of Lecture Notes in Computer Science, pp 58-69, Springer Berlin/Heidelberg, 2013. (DOI).
  16. Combined Secure Storage and Communication for the Internet of Things. Ibrahim Bagci, Shahid Raza, Antony Chung, Utz Roedig, and Thiemo Voigt. In IEEE International Conference on Sensing, Communication and Networking (IEEE SECON), 2013.
  17. Automated Mediator Synthesis: Combining Behavioural and Ontological Reasoning. Amel Benaceur, Chris Chilton, Malte Isberner, and Bengt Jonsson. In SEFM 2013, 11th Int. Conf. on Software Engineering and Formal Methods, volume 8137 of Lecture Notes in Computer Science, pp 274-288, Springer, 2013. (DOI, External link).
  18. The Sino–Swedish Master Programme in Computer Science and Software Engineering: Chinese students' experiences. Anders Berglund, Neena Thota, and Yemao Man. In Collaborative Academic Programs as a Contribution to Developing Nations: FICAP-1 Proceedings, pp 37-45, BrownWalker Press, Boca Raton, Fl, USA, 2013. (External link, fulltext:postprint).
  19. Flexible and High-Speed System-Level Performance Analysis using Hardware-Accelerated Simulation. Sascha Bischoff, Andreas Sandberg, Andreas Hansson, Sunwoo Dam, Ali Saidi, Matthew Horsnell, and Bashir Al-Hashimi. In , Design, Automation & Test in Europe (DATE), Grenoble, France, 2013. (fulltext:postprint).
  20. Resilience and Opportunistic Forwarding: Beyond Average Value Analysis. Fredrik Bjurefors, Merkourios Karaliopoulos, Christian Rohner, Paul Smith, George Theodoropoulos, and Per Gunningberg. In CHANTS '13 Proceedings of the 8th ACM MobiCom workshop on Challenged networks, 2013.
  21. Hot Packets: A systematic evaluation of the effect of temperature on low power wireless transceivers. Carlo Alberto Boano, Hjalmar Wennerström, Marco Antonio Zúñiga, James Brown, Chamath Keppitiyagama, Felix Jonathan Oppermann, Utz Roedig, Lars-Åke Nordén, Thiemo Voigt, and Kay Römer. In Proc. 5th Extreme Conference on Communication, pp 7-12, ACM Press, New York, 2013.
  22. Computer science students’ perception of computer network security. Volkan Cambazoglu and Neena Thota. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 204-207, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI, fulltext:postprint).
  23. Towards adaptive zero-knowledge protocols: A case study with Fiat–Shamir identification protocol. Volkan Cambazoglu and Christian Rohner. In Proc. 9th Swedish National Computer Networking Workshop, pp 67-70, 2013.
  24. Fördjupat lärande genom aktiverande examination. Sofia Cassel and Björn Victor. In 4:e Utvecklingskonferensen för Sveriges ingenjörsutbildningar, pp 51-54, 2013.
  25. Shared Resource Sensitivity in Task-Based Runtime Systems. Germán Ceballos and David Black-Schaffer. In Proc. 6th Swedish Workshop on Multi-Core Computing, Halmstad University Press, 2013. (fulltext:postprint).
  26. Efficient inter-core power and thermal balancing for multicore processors. Juan M. Cebrian, Daniel Sanchez, Juan L. Aragon, and Stefanos Kaxiras. In Computing, volume 95, number 7, pp 537-566, 2013. (DOI).
  27. Assume-guarantee reasoning for safe component behaviours. C. Chilton, Bengt Jonsson, and M. Kwiatkowska. In Formal Aspects of Component Software: 9th International Symposium, FACS 2012, Mountain View, CA, USA, September 12-14, 2012. Revised Selected Papers, volume 7684 LNCS of Lecture Notes in Computer Science, pp 92-109, 2013. (DOI).
  28. An Algebraic Theory of Interface Automata. Chris Chilton, Bengt Jonsson, and Marta Kwiatkowska. University of Oxford, 2013. (External link).
  29. Ranking function synthesis for bit-vector relations. Byron Cook, Daniel Kroening, Philipp Rümmer, and Christoph M. Wintersteiger. In Formal methods in system design, volume 43, number 1, pp 93-120, 2013. (DOI).
  30. Using open-ended group projects in HCI courses. Mats Daniels, Åsa Cajander, and Roger McDermott. In Challenges from the Future: Bridging the gaps through HCI education, University of Cape Town, South Africa, 2013.
  31. System and method for data classification and efficient virtual cache coherence without reverse translation. Mahdad Davari, Alberto Ros, and Stefanos Kaxiras. 2013.
  32. Let the Tree Bloom: Scalable Opportunistic Routing with ORPL. Simon Duquennoy, Olaf Landsiedel, and Thiemo Voigt. In , 2013.
  33. Bandwidth Bandit: Quantitative Characterization of Memory Contention. David Eklöv, Nikos Nikoleris, David Black-Schaffer, and Erik Hagersten. In Proc. 11th International Symposium on Code Generation and Optimization: CGO 2013, pp 99-108, IEEE Computer Society, 2013. (DOI).
  34. Scaffolding pedagogic excellence in higher education. Maja Elmgren, Staffan Andersson, Arnold Pears, and Stefan Pålsson. In Improving Student Learning through Research and Scholarship, pp 164-176, Oxford Brookes University, UK, 2013. (fulltext:print).
  35. Dynamic landscapes: A model of context and contingency in evolution. David V. Foster, Mary M. Rorick, Tanja Gesell, Laura Marie Feeney, and Jacob G. Foster. In Journal of Theoretical Biology, volume 334, pp 162-172, 2013. (DOI).
  36. Improving OCBP-based scheduling for mixed-criticality sporadic task systems. Chuancai Gu, Nan Guan, Qingxu Deng, and Wang Yi. In Proc. 19th International Conference on Embedded and Real-Time Computing Systems and Applications, IEEE Computer Society, 2013.
  37. FIFO cache analysis for WCET estimation: A quantitative approach. Nan Guan, Xinping Yang, Mingsong Lv, and Wang Yi. In Proc. 16th Conference on Design, Automation and Test in Europe, pp 296-301, IEEE, Piscataway, NJ, 2013. (DOI).
  38. Finitary Real-Time Calculus: Efficient Performance Analysis of Distributed Embedded Systems. Nan Guan and Wang Yi. In Proc. Real-Time Systems Symposium: RTSS 2013, IEEE Computer Society, 2013.
  39. New Techniques for Building Timing-Predictable Embedded Systems. Nan Guan. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1094, Acta Universitatis Upsaliensis, Uppsala, 2013. (fulltext, preview image).
  40. Optimising quality of information in data collection for mobile sensor networks. Farshid Hassani Bijarbooneh, Pierre Flener, Edith Ngai, and Justin Pearson. In Proc. 21st International Symposium on Quality of Service, pp 163-172, IEEE Communications Society, 2013. (DOI, Fulltext).
  41. Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks. Zhitao He and Thiemo Voigt. In , 2013.
  42. SoNIC: Classifying interference in 802.15.4 sensor networks. Frederik Hermans, Olof Rensfelt, Thiemo Voigt, Edith Ngai, Lars-Åke Nordén, and Per Gunningberg. In Proc. 12th International Conference on Information Processing in Sensor Networks, pp 55-66, ACM Press, New York, 2013. (DOI).
  43. Towards TCP Communication with the Low Power Wireless Bus. Kasun Hewage and Thiemo Voigt. In , ACM SenSys, ACM, 2013. (DOI, External link).
  44. Skitracker: Measuring skiing performance using a body-area network. Thomas Homewood, Christer Norström, and Per Gunningberg. In Proc. 12th International Conference on Information Processing in Sensor Networks, pp 319-320, ACM Press, New York, 2013. (DOI).
  45. Experiences and attitudes of patients reading their medical records: Differences between readers and recurrent readers. Isto Huvila, Mats Daniels, Åsa Cajander, and Rose-Marie Åhlfeldt. In Information: Interactions and Impact (i<sup>3</sup>) 2013, Robert Gordon University, Aberdeen, UK, 2013.
  46. Comparing wireless flooding protocols using trace-based simulations. Martin Jacobsson and Christian Rohner. In EURASIP Journal on Wireless Communications and Networking, pp 169:1-15, 2013. (DOI, Fulltext, fulltext:print).
  47. Detecting multiple aliases in social media. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 5th International Conference on Advances in Social Networks Analysis and Mining, pp 1004-1011, ACM Press, New York, 2013. (DOI).
  48. A New Perspective for Efficient Virtual-Cache Coherence. Stefanos Kaxiras and Alberto Ros. In Proceedings of the 40th Annual International Symposium on Computer Architecture, pp 535-546, 2013. (DOI).
  49. Towards Power Efficiency on Task-Based, Decoupled Access-Execute Models. Konstantinos Koukos, David Black-Schaffer, Vasileios Spiliopoulos, and Stefanos Kaxiras. In PARMA 2013, 4th Workshop on Parallel Programming and Run-Time Management Techniques for Many-core Architectures, 2013. (Conference website, fulltext:postprint).
  50. Towards more efficient execution: a decoupled access-execute approach. Konstantinos Koukos, David Black-Schaffer, Vasileios Spiliopoulos, and Stefanos Kaxiras. In Proc. 27th ACM International Conference on Supercomputing, pp 253-262, ACM Press, New York, 2013. (DOI, fulltext:print).
  51. A Symbolic Approach to the Analysis of Multi-Formalism Markov Reward Models. Kai Lampka and Markus Siegle. In Theory and Application of Multi-Formalism Modeling, IGI Global, Pennsylvania, 2013. (External link).
  52. Component-based system design: analytic real-time interfaces for state-based component implementations. Kai Lampka, Simon Perathoner, and Lothar Thiele. In International Journal on Software Tools for Technology Transfer, volume 15, number 3, pp 155-170, Springer Berlin/Heidelberg, 2013. (DOI).
  53. With Real-time Performance Analysis and Monitoring to Timing Predictable Use of Multi-core Architectures. Kai Lampka. In Runtime Verification, volume 8174 of Lecture Notes in Computer Science, pp 400-402, Springer Berlin/Heidelberg, 2013.
  54. A Skiplist-based Concurrent Priority Queue with Minimal Memory Contention. Jonatan Lindén and Bengt Jonsson. In OPODIS 2013: 17th International Conference On Principles Of DIstributed Systems, volume 8304 of Lecture Notes in Computer Science, pp 206-220, Springer Berlin/Heidelberg, Berlin, 2013. (DOI, External link).
  55. A cellular-centric service architecture for machine-to-machine (M2M) communications. Anthony Lo, Yee Wei Law, and Martin Jacobsson. In IEEE wireless communications, volume 20, number 5, pp 143-151, IEEE Communications Society, 2013. (DOI).
  56. A priori power estimation of linear solvers on multi-core processors. Dimitar Lukarski and Tobias Skoglund. Technical report / Department of Information Technology, Uppsala University nr 2013-020, 2013. (fulltext).
  57. Contemplations on results from investigating the personal epistemology of computing students. Roger McDermott, Iain Pirie, Åsa Cajander, Mats Daniels, and Cary Laxer. In Proc. 43rd ASEE/IEEE Frontiers in Education Conference, pp 825-831, IEEE, Piscataway, NJ, 2013. (DOI).
  58. Investigation into the personal epistemology of Computer Science students. Roger McDermott, Iain Pirie, Åsa Cajander, Mats Daniels, and Cary Laxer. In Proc. 18th Conference on Innovation and Technology in Computer Science Education, pp 231-236, ACM Press, New York, 2013. (DOI).
  59. Supporting cyber-physical systems with wireless sensor networks: An outlook of software and services. Prasant Misra, Luca Mottola, Shahid Raza, Simon Duquennoy, Nicolas Tsiftes, Joel Höglund, and Thiemo Voigt. In Journal of the Indian Institute of Science, volume 93, number 3, pp 463-486, 2013.
  60. Electronically-switched Directional Antennas for Wireless Sensor Networks: A Full-stack Evaluation. Luca Mottola, Thiemo Voigt, and G. P. Picco. In IEEE SECON, 2013.
  61. Multi-Mode Monitoring for Mixed-Criticality Real-time Systems. Moritz Neukirchner, Kai Lampka, Sophie Quinton, and Rolf Ernst. In Proc. 11th International Conference on Hardware/Software Codesign and System Synthesis, ACM Press, New York, 2013.
  62. On providing location privacy for mobile sinks in wireless sensor networks. Edith C.-H. Ngai and Ioana Rodhe. In Wireless networks, volume 19, number 1, pp 115-130, 2013. (DOI).
  63. On Packet Size and Error Correction Optimisations in Low-Power Wireless Networks. Claro Noda, Shashi Prabh, Mario Alves, and Thiemo Voigt. In IEEE International Conference on Sensing, Communication and Networking (IEEE SECON), 2013.
  64. Novice students' perception of learning in small groups. Aletta Nylén and Karl Marklund. In Enhancement and Innovation in Higher Education conference: 11 - 13 June 2013: conference materials, pp 123-131, 2013. (Post-conference publication).
  65. Professional communication skills for engineering professionals. Aletta Nylén and Arnold Pears. In Proc. 43rd ASEE/IEEE Frontiers in Education Conference, pp 257-263, IEEE, Piscataway, NJ, 2013. (DOI).
  66. What is feedback?: Connecting student perceptions to assessment practices. Arnold Pears, James Harland, Margaret Hamilton, and Roger Hadgraft. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 106-113, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI).
  67. Engagement in Computer Science and IT — What!: A matter of identity?. Anne-Kathrin Peters and Arnold Pears. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 114-121, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI, fulltext:postprint).
  68. Lithe: Lightweight Secure CoAP for the Internet of Things. Shahid Raza, Hossein Shafagh, Kasun Hewage, René Hummen, and Thiemo Voigt. In IEEE Sensors Journal, volume 13, number 10, pp 3711-3720, 2013. (DOI).
  69. SVELTE: Real-time Intrusion Detection in the Internet of Things. Shahid Raza, Linus Wallgren, and Thiemo Voigt. In Ad hoc networks, volume 11, number 8, pp 2661-2674, 2013. (DOI).
  70. Evaluating Battery Models in Wireless Sensor Networks. Christian Rohner, Laura Marie Feeney, and Per Gunningberg. In Wired/Wireless Internet Communication, volume 7889 of Lecture Notes in Computer Science, pp 29-42, Springer Berlin/Heidelberg, 2013. (DOI).
  71. Classifying and Solving Horn Clauses for Verification. Philipp Rümmer, Hossein Hojjat, and Viktor Kuncak. In Fifth Working Conference on Verified Software: Theories, Tools and Experiments (VSTTE), 2013.
  72. Disjunctive Interpolants for Horn-Clause Verification. Philipp Rümmer, Hossein Hojjat, and Viktor Kuncak. In Computer Aided Verification: CAV 2013, volume 8044 of Lecture Notes in Computer Science, pp 347-363, Springer Berlin/Heidelberg, 2013. (DOI).
  73. Exploring Interpolants. Philipp Rümmer and Pavle Subotic. In Formal Methods in Computer-Aided Design (FMCAD), 2013.
  74. Modeling performance variation due to cache sharing. Andreas Sandberg, Andreas Sembrant, Erik Hagersten, and David Black-Schaffer. In Proc. 19th IEEE International Symposium on High Performance Computer Architecture, pp 155-166, IEEE Computer Society, 2013. (DOI, fulltext:postprint).
  75. TLC: A tag-less cache for reducing dynamic first level cache energy. Andreas Sembrant, Erik Hagersten, and David Black-Schaffer. In Proceedings of the 46th International Symposium on Microarchitecture, pp 49-61, ACM Press, New York, 2013. (DOI, Conference website).
  76. Cloud Gaming: Architecture and Performance. Ryan Shea, Jiangchuan Liu, Edith C.-H. Ngai, and Yong Cui. In IEEE Network, volume 27, number 4, pp 16-21, 2013. (DOI).
  77. A tool for visualizing and analyzing users on discussion boards. Amendra Shrestha. In European Intelligence and Security Informatics Conference: 2013, pp 229-229, IEEE Computer Society, 2013. (DOI, Fulltext).
  78. Author recognition in discussion boards. Amendra Shrestha, Lisa Kaati, Sofia Cassel, and Mohamed Faouzi Atig. In National Symposium on Technology and Methodology for Security and Crisis Management, 2013.
  79. Introducing DVFS-Management in a Full-System Simulator. Vasileios Spiliopoulos, Akash Bagdia, Andreas Hansson, Peter Aldworth, and Stefanos Kaxiras. In Proc. 21st International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, IEEE Computer Society, 2013.
  80. Combinatorial Abstraction Refinement for Feasibility Analysis. Martin Stigge and Wang Yi. In IEEE 34TH REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2013), Real-Time Systems Symposium-Proceedings, pp 340-349, 2013. (DOI).
  81. The fork-join real-time task model. Martin Stigge, Pontus Ekberg, and Wang Yi. In ACM SIGBED Review, volume 10, number 2, pp 20-20, 2013. (DOI, fulltext:print).
  82. INDIGO: Secure CoAP for Smartphones- Enabling E2E Secure Communication in the 6Io. Daniele Trabalza, Shahid Raza, and Thiemo Voigt. In , 2013.
  83. Directional transmissions and receptions for high throughput burst forwarding. Ambuj Varshney, Thiemo Voigt, and Luca Mottola. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, p 50, 2013. (DOI, External link).
  84. Understanding link dynamics in wireless sensor networks with dynamically steerable directional antennas. Thiemo Voigt, Luca Mottola, and Kasun Hewage. In Wireless Sensor Networks: EWSN 2013, volume 7772 of Lecture Notes in Computer Science, pp 115-130, Springer Berlin/Heidelberg, 2013. (DOI, fulltext:postprint).
  85. Routing Attacks and Countermeasures in the RPL-Based Internet of Things. Linus Wallgren, Shahid Raza, and Thiemo Voigt. In International Journal of Distributed Sensor Networks, p 794326, 2013. (DOI, fulltext:print).
  86. A Study of Packet Errors on Outdoor 802.15.4 Links. Hjalmar Wennerström, Liam McNamara, Christian Rohner, and Lars-Åke Nordén. In The 9th Swedish National Computer Networking Workshop 2013, 2013.
  87. A long-term study of correlations between meteorological conditions and 802.15.4 link performance. Hjalmar Wennerström, Frederik Hermans, Olof Rensfelt, Christian Rohner, and Lars-Åke Nordén. In Proc. 10th International Conference on Sensing, Communications, and Networking, pp 221-229, IEEE Communications Society, 2013. (DOI).
  88. Meteorological impact and transmission errors in outdoor wireless sensor networks. Hjalmar Wennerström. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2013-007, Uppsala University, 2013. (fulltext).
  89. Transmission errors in a sensor network at the edge of the world. Hjalmar Wennerström, Liam McNamara, Christian Rohner, and Lars-Åke Nordén. In Proc. 5th Extreme Conference on Communication, ACM Press, New York, 2013.

Updated  2016-12-09 16:27:22 by Peter Waites.