Division of Computer Systems: Publications from 2013
-
All for the price of few: (Parameterized verification through view abstraction)
. In Verification, Model Checking, and Abstract Interpretation, volume 7737 of Lecture Notes in Computer Science, pp 476-495, Springer Berlin/Heidelberg, 2013. (DOI
, fulltext:postprint
).
-
An Integrated Specification and Verification Technique for Highly Concurrent Data Structures
. In Tools and Algorithms for the Construction and Analysis of Systems, 2013. (fulltext:postprint
).
-
Analysis of message passing programs using SMT-solvers
. In Automated Technology for Verification and Analysis: ATVA 2013, volume 8172 of Lecture Notes in Computer Science, pp 272-286, Springer Berlin/Heidelberg, 2013. (DOI
).
-
MEMORAX, a Precise and Sound Tool for Automatic Fence Insertion under TSO
. In Tools and Algorithms for the Construction and Analysis of Systems, volume 7795 of Lecture Notes in Computer Science, pp 530-536, Springer Berlin/Heidelberg, 2013. (DOI
, fulltext:postprint
).
-
Monotonic abstraction for programs with multiply-linked structures
. In International Journal of Foundations of Computer Science, volume 24, number 2, pp 187-210, 2013. (DOI
, fulltext:postprint
).
-
Priced timed Petri nets
. In Logical Methods in Computer Science, volume 9, number 4, pp 10:1-51, 2013. (DOI
).
-
Push-down automata with gap-order constraints
. In Fundamentals of Software Engineering: FSEN 2013, volume 8161 of Lecture Notes in Computer Science, pp 199-216, Springer Berlin/Heidelberg, 2013. (DOI
).
-
Solving parity games on integer vectors
. In CONCUR 2013 – Concurrency Theory, volume 8052 of Lecture Notes in Computer Science, pp 106-120, Springer Berlin/Heidelberg, 2013. (DOI
).
-
Tools for software verification: Introduction to the special section from the seventeenth international conference on tools and algorithms for the construction and analysis of systems
. In International Journal on Software Tools for Technology Transfer, volume 15, number 2, pp 85-88, 2013. (DOI
).
-
Veri?cation of heap manipulating programs with ordered data by extended forest automata
. In Automated Technology for Verification and Analysis: ATVA 2013, volume 8172 of Lecture Notes in Computer Science, pp 224-239, Springer Berlin/Heidelberg, 2013. (DOI
, fulltext:postprint
).
-
Verification of Directed Acyclic Ad Hoc Networks
. In Formal Techniques for Distributed Systems: FORTE 2013, volume 7892 of Lecture Notes in Computer Science, pp 193-208, Springer Berlin/Heidelberg, 2013. (DOI
, fulltext:postprint
).
-
Verifying safety and liveness for the FlexTM hybrid transactional memory
. In , pp 785-790, Grenoble, France, 2013.
-
Bounds on the Lifetime of WSNs
. In , 2013. (DOI
).
-
A theory for control-flow graph exploration
. In Automated Technology for Verification and Analysis: ATVA 2013, volume 8172 of Lecture Notes in Computer Science, pp 506-515, Springer Berlin/Heidelberg, 2013. (DOI
).
-
Adjacent ordered multi-pushdown systems
. In Developments in Language Theory: DLT 2013, volume 7907 of Lecture Notes in Computer Science, pp 58-69, Springer Berlin/Heidelberg, 2013. (DOI
).
-
Combined Secure Storage and Communication for the Internet of Things
. In IEEE International Conference on Sensing, Communication and Networking (IEEE SECON), 2013.
-
Automated Mediator Synthesis: Combining Behavioural and Ontological Reasoning
. In SEFM 2013, 11th Int. Conf. on Software Engineering and Formal Methods, volume 8137 of Lecture Notes in Computer Science, pp 274-288, Springer, 2013. (DOI
, External link
).
-
The Sino–Swedish Master Programme in Computer Science and Software Engineering: Chinese students' experiences
. In Collaborative Academic Programs as a Contribution to Developing Nations: FICAP-1 Proceedings, pp 37-45, BrownWalker Press, Boca Raton, Fl, USA, 2013. (External link
, fulltext:postprint
).
-
Flexible and High-Speed System-Level Performance Analysis using Hardware-Accelerated Simulation
. In , Design, Automation & Test in Europe (DATE), Grenoble, France, 2013. (fulltext:postprint
).
-
Resilience and Opportunistic Forwarding: Beyond Average Value Analysis
. In CHANTS '13 Proceedings of the 8th ACM MobiCom workshop on Challenged networks, 2013.
-
Hot Packets: A systematic evaluation of the effect of temperature on low power wireless transceivers
. In Proc. 5th Extreme Conference on Communication, pp 7-12, ACM Press, New York, 2013.
-
Computer science students’ perception of computer network security
. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 204-207, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI
, fulltext:postprint
).
-
Towards adaptive zero-knowledge protocols: A case study with Fiat–Shamir identification protocol
. In Proc. 9th Swedish National Computer Networking Workshop, pp 67-70, 2013.
-
Fördjupat lärande genom aktiverande examination
. In 4:e Utvecklingskonferensen för Sveriges ingenjörsutbildningar, pp 51-54, 2013.
-
Shared Resource Sensitivity in Task-Based Runtime Systems
. In Proc. 6th Swedish Workshop on Multi-Core Computing, Halmstad University Press, 2013. (fulltext:postprint
).
-
Efficient inter-core power and thermal balancing for multicore processors
. In Computing, volume 95, number 7, pp 537-566, 2013. (DOI
).
-
Assume-guarantee reasoning for safe component behaviours
. In Formal Aspects of Component Software: 9th International Symposium, FACS 2012, Mountain View, CA, USA, September 12-14, 2012. Revised Selected Papers, volume 7684 LNCS of Lecture Notes in Computer Science, pp 92-109, 2013. (DOI
).
-
An Algebraic Theory of Interface Automata
. University of Oxford, 2013. (External link
).
-
Ranking function synthesis for bit-vector relations
. In Formal methods in system design, volume 43, number 1, pp 93-120, 2013. (DOI
).
-
Using open-ended group projects in HCI courses
. In Challenges from the Future: Bridging the gaps through HCI education, University of Cape Town, South Africa, 2013.
-
System and method for data classification and efficient virtual cache coherence without reverse translation
. 2013.
-
Let the Tree Bloom: Scalable Opportunistic Routing with ORPL
. In , 2013.
-
Bandwidth Bandit: Quantitative Characterization of Memory Contention
. In Proc. 11th International Symposium on Code Generation and Optimization: CGO 2013, pp 99-108, IEEE Computer Society, 2013. (DOI
).
-
Scaffolding pedagogic excellence in higher education
. In Improving Student Learning through Research and Scholarship, pp 164-176, Oxford Brookes University, UK, 2013. (fulltext:print
).
-
Dynamic landscapes: A model of context and contingency in evolution
. In Journal of Theoretical Biology, volume 334, pp 162-172, 2013. (DOI
).
-
Improving OCBP-based scheduling for mixed-criticality sporadic task systems
. In Proc. 19th International Conference on Embedded and Real-Time Computing Systems and Applications, IEEE Computer Society, 2013.
-
FIFO cache analysis for WCET estimation: A quantitative approach
. In Proc. 16th Conference on Design, Automation and Test in Europe, pp 296-301, IEEE, Piscataway, NJ, 2013. (DOI
).
-
Finitary Real-Time Calculus: Efficient Performance Analysis of Distributed Embedded Systems
. In Proc. Real-Time Systems Symposium: RTSS 2013, IEEE Computer Society, 2013.
-
New Techniques for Building Timing-Predictable Embedded Systems
. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1094, Acta Universitatis Upsaliensis, Uppsala, 2013. (fulltext
, preview image
).
-
Optimising quality of information in data collection for mobile sensor networks
. In Proc. 21st International Symposium on Quality of Service, pp 163-172, IEEE Communications Society, 2013. (DOI
, Fulltext
).
-
Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks
. In , 2013.
-
SoNIC: Classifying interference in 802.15.4 sensor networks
. In Proc. 12th International Conference on Information Processing in Sensor Networks, pp 55-66, ACM Press, New York, 2013. (DOI
).
-
Towards TCP Communication with the Low Power Wireless Bus
. In , ACM SenSys, ACM, 2013. (DOI
, External link
).
-
Skitracker: Measuring skiing performance using a body-area network
. In Proc. 12th International Conference on Information Processing in Sensor Networks, pp 319-320, ACM Press, New York, 2013. (DOI
).
-
Experiences and attitudes of patients reading their medical records: Differences between readers and recurrent readers
. In Information: Interactions and Impact (i<sup>3</sup>) 2013, Robert Gordon University, Aberdeen, UK, 2013.
-
Comparing wireless flooding protocols using trace-based simulations
. In EURASIP Journal on Wireless Communications and Networking, pp 169:1-15, 2013. (DOI
, Fulltext
, fulltext:print
).
-
Detecting multiple aliases in social media
. In Proc. 5th International Conference on Advances in Social Networks Analysis and Mining, pp 1004-1011, ACM Press, New York, 2013. (DOI
).
-
A New Perspective for Efficient Virtual-Cache Coherence
. In Proceedings of the 40th Annual International Symposium on Computer Architecture, pp 535-546, 2013. (DOI
).
-
Towards Power Efficiency on Task-Based, Decoupled Access-Execute Models
. In PARMA 2013, 4th Workshop on Parallel Programming and Run-Time Management Techniques for Many-core Architectures, 2013. (Conference website
, fulltext:postprint
).
-
Towards more efficient execution: a decoupled access-execute approach
. In Proc. 27th ACM International Conference on Supercomputing, pp 253-262, ACM Press, New York, 2013. (DOI
, fulltext:print
).
-
A Symbolic Approach to the Analysis of Multi-Formalism Markov Reward Models
. In Theory and Application of Multi-Formalism Modeling, IGI Global, Pennsylvania, 2013. (External link
).
-
Component-based system design: analytic real-time interfaces for state-based component implementations
. In International Journal on Software Tools for Technology Transfer, volume 15, number 3, pp 155-170, Springer Berlin/Heidelberg, 2013. (DOI
).
-
With Real-time Performance Analysis and Monitoring to Timing Predictable Use of Multi-core Architectures
. In Runtime Verification, volume 8174 of Lecture Notes in Computer Science, pp 400-402, Springer Berlin/Heidelberg, 2013.
-
A Skiplist-based Concurrent Priority Queue with Minimal Memory Contention
. In OPODIS 2013: 17th International Conference On Principles Of DIstributed Systems, volume 8304 of Lecture Notes in Computer Science, pp 206-220, Springer Berlin/Heidelberg, Berlin, 2013. (DOI
, External link
).
-
A cellular-centric service architecture for machine-to-machine (M2M) communications
. In IEEE wireless communications, volume 20, number 5, pp 143-151, IEEE Communications Society, 2013. (DOI
).
-
A priori power estimation of linear solvers on multi-core processors
. Technical report / Department of Information Technology, Uppsala University nr 2013-020, 2013. (fulltext
).
-
Contemplations on results from investigating the personal epistemology of computing students
. In Proc. 43rd ASEE/IEEE Frontiers in Education Conference, pp 825-831, IEEE, Piscataway, NJ, 2013. (DOI
).
-
Investigation into the personal epistemology of Computer Science students
. In Proc. 18th Conference on Innovation and Technology in Computer Science Education, pp 231-236, ACM Press, New York, 2013. (DOI
).
-
Supporting cyber-physical systems with wireless sensor networks: An outlook of software and services
. In Journal of the Indian Institute of Science, volume 93, number 3, pp 463-486, 2013.
-
Electronically-switched Directional Antennas for Wireless Sensor Networks: A Full-stack Evaluation
. In IEEE SECON, 2013.
-
Multi-Mode Monitoring for Mixed-Criticality Real-time Systems
. In Proc. 11th International Conference on Hardware/Software Codesign and System Synthesis, ACM Press, New York, 2013.
-
On providing location privacy for mobile sinks in wireless sensor networks
. In Wireless networks, volume 19, number 1, pp 115-130, 2013. (DOI
).
-
On Packet Size and Error Correction Optimisations in Low-Power Wireless Networks
. In IEEE International Conference on Sensing, Communication and Networking (IEEE SECON), 2013.
-
Novice students' perception of learning in small groups
. In Enhancement and Innovation in Higher Education conference: 11 - 13 June 2013: conference materials, pp 123-131, 2013. (Post-conference publication
).
-
Professional communication skills for engineering professionals
. In Proc. 43rd ASEE/IEEE Frontiers in Education Conference, pp 257-263, IEEE, Piscataway, NJ, 2013. (DOI
).
-
What is feedback?: Connecting student perceptions to assessment practices
. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 106-113, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI
).
-
Engagement in Computer Science and IT — What!: A matter of identity?
. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 114-121, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI
, fulltext:postprint
).
-
Lithe: Lightweight Secure CoAP for the Internet of Things
. In IEEE Sensors Journal, volume 13, number 10, pp 3711-3720, 2013. (DOI
).
-
SVELTE: Real-time Intrusion Detection in the Internet of Things
. In Ad hoc networks, volume 11, number 8, pp 2661-2674, 2013. (DOI
).
-
Evaluating Battery Models in Wireless Sensor Networks
. In Wired/Wireless Internet Communication, volume 7889 of Lecture Notes in Computer Science, pp 29-42, Springer Berlin/Heidelberg, 2013. (DOI
).
-
Classifying and Solving Horn Clauses for Verification
. In Fifth Working Conference on Verified Software: Theories, Tools and Experiments (VSTTE), 2013.
-
Disjunctive Interpolants for Horn-Clause Verification
. In Computer Aided Verification: CAV 2013, volume 8044 of Lecture Notes in Computer Science, pp 347-363, Springer Berlin/Heidelberg, 2013. (DOI
).
-
Exploring Interpolants
. In Formal Methods in Computer-Aided Design (FMCAD), 2013.
-
Modeling performance variation due to cache sharing
. In Proc. 19th IEEE International Symposium on High Performance Computer Architecture, pp 155-166, IEEE Computer Society, 2013. (DOI
, fulltext:postprint
).
-
TLC: A tag-less cache for reducing dynamic first level cache energy
. In Proceedings of the 46th International Symposium on Microarchitecture, pp 49-61, ACM Press, New York, 2013. (DOI
, Conference website
).
-
Cloud Gaming: Architecture and Performance
. In IEEE Network, volume 27, number 4, pp 16-21, 2013. (DOI
).
-
A tool for visualizing and analyzing users on discussion boards
. In European Intelligence and Security Informatics Conference: 2013, pp 229-229, IEEE Computer Society, 2013. (DOI
, Fulltext
).
-
Author recognition in discussion boards
. In National Symposium on Technology and Methodology for Security and Crisis Management, 2013.
-
Introducing DVFS-Management in a Full-System Simulator
. In Proc. 21st International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, IEEE Computer Society, 2013.
-
Combinatorial Abstraction Refinement for Feasibility Analysis
. In IEEE 34TH REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2013), Real-Time Systems Symposium-Proceedings, pp 340-349, 2013. (DOI
).
-
The fork-join real-time task model
. In ACM SIGBED Review, volume 10, number 2, pp 20-20, 2013. (DOI
, fulltext:print
).
-
INDIGO: Secure CoAP for Smartphones- Enabling E2E Secure Communication in the 6Io
. In , 2013.
-
Directional transmissions and receptions for high throughput burst forwarding
. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, p 50, 2013. (DOI
, External link
).
-
Understanding link dynamics in wireless sensor networks with dynamically steerable directional antennas
. In Wireless Sensor Networks: EWSN 2013, volume 7772 of Lecture Notes in Computer Science, pp 115-130, Springer Berlin/Heidelberg, 2013. (DOI
, fulltext:postprint
).
-
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
. In International Journal of Distributed Sensor Networks, p 794326, 2013. (DOI
, fulltext:print
).
-
A Study of Packet Errors on Outdoor 802.15.4 Links
. In The 9th Swedish National Computer Networking Workshop 2013, 2013.
-
A long-term study of correlations between meteorological conditions and 802.15.4 link performance
. In Proc. 10th International Conference on Sensing, Communications, and Networking, pp 221-229, IEEE Communications Society, 2013. (DOI
).
-
Meteorological impact and transmission errors in outdoor wireless sensor networks
. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2013-007, Uppsala University, 2013. (fulltext
).
-
Transmission errors in a sensor network at the edge of the world
. In Proc. 5th Extreme Conference on Communication, ACM Press, New York, 2013.