Skip to main content
Department of Information Technology

Division of Computer Systems: Publications from 2014

  1. Optimal dynamic partial order reduction. Parosh Abdulla, Stavros Aronis, Bengt Jonsson, and Konstantinos Sagonas. In Proc. 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, volume 49:1 of ACM SIGPLAN NOTICES, pp 373-384, ACM Press, New York, 2014. (DOI).
  2. Block me if you can!: Context-sensitive parameterized verification. Parosh Aziz Abdulla, Frédéric Haziza, and Lukás Holík. In Static Analysis: SAS 2014, volume 8723 of Lecture Notes in Computer Science, pp 1-17, Springer, 2014. (DOI, fulltext:postprint).
  3. Budget-bounded model-checking pushdown systems. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Othmane Rezine, and Jari Stenman. In Formal methods in system design, volume 45, number 2, pp 273-301, 2014. (DOI).
  4. Computing optimal reachability costs in priced dense-timed pushdown automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jari Stenman. In Language and Automata Theory and Applications: LATA 2014, volume 8370 of Lecture Notes in Computer Science, pp 62-75, Springer Berlin/Heidelberg, 2014. (DOI).
  5. Infinite-state energy games. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Piotr Hofman, Richard Mayr, K. Narayan Kumar, and Patrick Totzke. In Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), CSL-LICS '14, Vienna, Austria, July 14 - 18, 2014, ACM Press, New York, 2014. (DOI).
  6. Mediating for reduction (on minimizing alternating Buchi automata). Parosh Aziz Abdulla, Yu-Fang Chen, Lukag Holik, and Tomas Vojnar. In Theoretical Computer Science, volume 552, pp 26-43, 2014. (DOI).
  7. Stochastic Parity Games on Lossy Channel Systems. Parosh Aziz Abdulla, Lorenzo Clemente, Richard Mayr, and Sven Sandberg. In Logical Methods in Computer Science, volume 10, number 4, 2014. (DOI, fulltext:print).
  8. String Constraints for Verification. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Lukas Holik, Ahmed Rezine, and Philipp Rümmer. In Computer Aided Verification - 26th International Conference, {CAV} 2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna, Austria, July 18-22, 2014. Proceedings, pp 150-166, Springer, 2014. (DOI).
  9. Verification of Dynamic Register Automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, and Othmane Rezine. In Leibniz International Proceedings in Informatics: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2014), 2014. (fulltext:postprint).
  10. Zenoness for Timed Pushdown Automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Jari Stenman. In Proceedings 15th International Workshop on Verification of Infinite-State Systems, {INFINITY} 2013, Hanoi, Vietnam, 14th October 2013., pp -47, 2014. (DOI).
  11. Low-Power Listening Goes Multi-Channel. Beshr Al Nahas, Simon Duquennoy, Venkatraman Iyer, and Thiemo Voigt. In 2014 IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS 2014), IEEE International Conference on Distributed Computing in Sensor Systems, pp 2-9, 2014. (DOI).
  12. Ämnesdidaktisk forskning: Ett stöd för utbildningsexcellens. Staffan Andersson and Arnold Pears. In I stort och smått – med studenten i fokus, volume 1 of Rapportserie från Enheten för kvalitetsutveckling och universitetspedagogik, pp 241-249, Uppsala universitet, 2014.
  13. The Gradual Verifier. Stephan Arlt, Cindy Rubio-Gonzalez, Philipp Rümmer, Martin Schäf, and Natarajan Shankar. In NASA Formal Methods: 6th International Symposium, NFM 2014, Houston, TX, USA, April 29 – May 1, 2014. Proceedings, volume 8430 of Lecture Notes in Computer Science, pp 313-327, Switzerland, 2014. (DOI, fulltext:postprint).
  14. Activity profiles in online social media. Mohamed Faouzi Atig, Sofia Cassel, Lisa Kaati, and Amendra Shrestha. In Proc. 6th International Conference on Advances in Social Networks Analysis and Mining, pp 850-855, IEEE Computer Society, 2014. (DOI).
  15. Adjacent Ordered Multi-Pushdown Systems. Mohamed Faouzi Atig, K. Narayan Kumar, and Prakash Shivasan. In International Journal of Foundations of Computer Science, volume 25, number 8, pp 1083-1096, 2014. (DOI).
  16. Context-Bounded Analysis of TSO Systems. Mohamed Faouzi Atig, Ahmed Bouajjani, and Gennaro Parlato. In From Programs to Systems: The Systems perspective in Computing, volume 8415 of Lecture Notes in Computer Science, pp 21-38, Springer, 2014. (DOI).
  17. On Bounded Reachability Analysis of Shared Memory Systems. Mohamed Faouzi Atig, Ahmed Bouajjani, K. Narayan Kumar, and Prakash Saivasan. In {IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2014, December 15-17, 2014, New Delhi, India, 2014.
  18. Building timing predictable embedded systems. Philip Axer, Rolf Ernst, Heiko Falk, Alain Girault, Daniel Grund, Nan Guan, Bengt Jonsson, Peter Marwedel, Jan Reineke, Christine Rochange, Maurice Sebastian, Reinhard von Hanxleden, Reinhard Wilhelm, and Wang Yi. In ACM Transactions on Embedded Computing Systems, volume 13, number 4, pp 82:1-37, 2014. (DOI).
  19. A glimpse into the cultural situatedness of computer science: Some insights from a pilot study. Anders Berglund and Neena Thota. In Proc. 2nd International Conference on Learning and Teaching in Computing and Engineering, International Conference on Teaching and Learning in Computing and Engineering, pp 92-99, IEEE Computer Society, Los Alamitos, CA, 2014. (DOI, fulltext:postprint).
  20. Learning to develop learning and teaching of CS: a collaborative example. Anders Berglund, Arnold Pears, Ali Alagla, Nimir Salih, and Mohamed Shenify. In Proc. 2nd International Conference on Learning and Teaching in Computing and Engineering, International Conference on Teaching and Learning in Computing and Engineering, pp 147-148, IEEE Computer Society, Los Alamitos, CA, 2014. (DOI, fulltext:preprint).
  21. Opportunistic Networking: Congestion, Transfer Ordering and Resilience. Fredrik Bjurefors. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1148, Acta Universitatis Upsaliensis, Uppsala, 2014. (fulltext, preview image).
  22. Resilience and Opportunistic Forwarding: Beyond Average Value Analysis. Fredrik Bjurefors, Markourios Karaliopoulos, Christian Rohner, Paul Smith, George Theodoropoulos, and Per Gunningberg. In Computer Communications, volume 48, number SI, pp 111-120, 2014. (DOI).
  23. Temporal logics for concurrent recursive programs: Satisfiability and model checking. Benedikt Bollig, Aiswarya Cyriac, Paul Gastin, and Marc Zeitoun. In Journal of Applied Logic, volume 12, number 4, pp 395-416, 2014. (DOI).
  24. Critical thinking, peer-writing, and the importance of feedback. Åsa Cajander, Mats Daniels, Anne-Kathrin Peters, and Roger McDermott. In Proc. 44th ASEE/IEEE Frontiers in Education Conference, pp 1501-1507, IEEE Press, Piscataway, NJ, 2014. (DOI).
  25. Enhanced learning by promoting engineering competencies. Sofia Cassel, Aletta Nylén, and Björn Victor. In Proc. 44th ASEE/IEEE Frontiers in Education Conference, pp 2044-2049, IEEE Press, Piscataway, NJ, 2014. (DOI, Proceedings).
  26. Learning Extended Finite State Machines. Sofia Cassel, Falk Howar, Bengt Jonsson, and Bernhard Steffen. In Software Engineering and Formal Methods.  12th International Conference, SEFM 2014, volume 8702 of Lecture Notes in Computer Science, pp 250-264, Springer International Publishing, 2014. (DOI, External link).
  27. Managing power constraints in a single-core scenario through power tokens. Juan M. Cebrian, Daniel Sanchez, Juan L. Aragon, and Stefanos Kaxiras. In Journal of Supercomputing, volume 68, number 1, pp 414-442, 2014. (DOI).
  28. An algebraic theory of interface automata. Chris Chilton, Bengt Jonsson, and Marta Kwiatkowska. In Theoretical Computer Science, volume 549, pp 146-174, 2014. (DOI).
  29. Compositional assume–guarantee reasoning for input/output component theories. Chris Chilton, Bengt Jonsson, and Marta Kwiatkowska. In Science of Computer Programming, volume 91, pp 115-137, 2014. (DOI).
  30. Software-controlled processor stalls for time and energy efficient data locality optimization. Philippe Clauss, Imen Fassi, and Alexandra Jimborean. In Proc. International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), pp 199-206, IEEE, Piscataway, NJ, 2014. (DOI, fulltext:postprint).
  31. Controllers for the Verification of Communicating Multi-Pushdown Systems. Aiswarya Cyriac, Paul Gastin, and K. Narayan Kumar. In , Lecture Notes in Computer Science, pp 297-311, 2014.
  32. Reasoning about distributed systems: WYSIWYG. Aiswarya Cyriac and Paul Gastin. In , Leibniz International Proceedings in Informatics, 2014.
  33. Verifying Communicating Multi-pushdown Systems via Split-Width. Aiswarya Cyriac, Paul Gastin, and K. Narayan Kumar. In Automated Technology for Verification and Analysis, volume 8837 of Lecture Notes in Computer Science, pp 1-17, 2014. (DOI).
  34. The Effects of Granularity and Adaptivity on Private/Shared Classification for Coherence. Mahdad Davari, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In , 2014.
  35. An Emulation-based Method for Lifetime Estimation of Wireless Sensor Networks. Wilfried Dron, Simon Duquennoy, Thiemo Voigt, Khalil Hachicha, and Patrick Garda. In , pp 241-248, 2014. (DOI).
  36. Bounding and shaping the demand of generalized mixed-criticality sporadic task systems. Pontus Ekberg and Wang Yi. In Real-time systems, volume 50, number 1, pp 48-86, 2014. (DOI, fulltext:postprint).
  37. A software based profiling method for obtaining speedup stacks on commodity multi-cores. David Eklöv, Nikos Nikoleris, and Erik Hagersten. In 2014 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS): ISPASS 2014, IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 148-157, IEEE Computer Society, 2014. (DOI).
  38. A Case for Node-Local Runtime Parameter Adaptation in Wireless Sensor Networks. Atis Elsts and Edith C.-H. Ngai. In Proc. 10th Swedish National Computer Networking Workshop, 2014.
  39. How do the dynamics of battery discharge affect sensor lifetime?. Laura Marie Feeney, Christian Rohner, Per Gunningberg, Anders Lindgren, and Lars Andersson. In 2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp 49-56, IEEE, Piscataway, NJ, 2014. (DOI).
  40. Automating regression verification. Dennis Felsing, Sarah Grebing, Vladimir Klebanov, Philipp Rümmer, and Mattias Ulbrich. In ASE '14 Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, pp 349-360, ACM Press, New York, 2014. (DOI).
  41. Dynamic budgeting for settling DRAM contention of co-running hard and soft real-time tasks. Jonas Flodin, Kai Lampka, and Wang Yi. In Proc. 9th International Symposium on Industrial Embedded Systems, pp 151-159, IEEE, Piscataway, NJ, 2014. (DOI).
  42. Partitioned mixed-criticality scheduling on multiprocessor platforms. Chuancai Gu, Nan Guan, Qingxu Deng, and Wang Yi. In Proc. 17th Conference on Design, Automation and Test in Europe, IEEE, Piscataway, NJ, 2014. (DOI).
  43. General and Efficient Response Time Analysis for EDF Scheduling. Nan Guan and Wang Yi. In Proc. 17th Conference on Design, Automation and Test in Europe, IEEE, Piscataway, NJ, 2014. (DOI).
  44. WCET Analysis with MRU Cache: Challenging LRU for Predictability. Nan Guan, Mingsong Lv, Wang Yi, and Ge Yu. In ACM Transactions on Embedded Computing Systems, volume 13, number 4s, 2014. (DOI).
  45. A constraint programming approach for managing end-to-end requirements in sensor network macroprogramming. Farshid Hassani Bijarbooneh, Animesh Pathak, Justin Pearson, Valérie Issarny, and Bengt Jonsson. In Proc. 3rd International Conference on Sensor Networks, pp 28-40, SciTePress, Setúbal, Portugal, 2014. (DOI).
  46. Energy-efficient sensor selection for data quality and load balancing in wireless sensor networks. Farshid Hassani Bijarbooneh, Wei Du, Edith Ngai, and Xiaoming Fu. In Proc. 22nd International Symposium on Quality of Service, pp 338-343, IEEE Communications Society, 2014. (DOI).
  47. All is not lost: Understanding and exploiting packet corruption in outdoor sensor networks. Frederik Hermans, Hjalmar Wennerström, Liam McNamara, Christian Rohner, and Per Gunningberg. In Wireless Sensor Networks: EWSN 2014, volume 8354 of Lecture Notes in Computer Science, pp 116-132, Springer Berlin/Heidelberg, 2014. (DOI).
  48. Sensor Networks and Their Radio Environment: On Testbeds, Interference, and Broken Packets. Frederik Hermans. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1171, Acta Universitatis Upsaliensis, Uppsala, 2014. (fulltext, preview image).
  49. Supporting Heterogeneous LCD/Camera Links. Frederik Hermans, Liam McNamara, Thiemo Voigt, Christian Rohner, Edith Ngai, and Per Gunningberg. In Proc. 13th International Symposium on Information Processing in Sensor Networks, pp 289-290, IEEE Press, Piscataway, NJ, 2014. (DOI).
  50. Poster Abstract: An Experimental Study of Attacks on the Availability of Glossy. Kasun Hewage and Thiemo Voigt. In Real-World Wireless Sensor Networks, volume 281 of Lecture Notes in Electrical Engineering, pp 103-107, 2014. (DOI).
  51. Horn Clauses for Communicating Timed Systems. Hossein Hojjat, Philipp Rümmer, Pavle Subotic, and Yi Wang. In Proceedings First Workshop on Horn Clauses for Verification and Synthesis, volume 169 of Electronic Proceedings in Theoretical Computer Science, pp 39-52, 2014. (DOI, fulltext:postprint).
  52. Mood-Fatigue Analyzer: Towards context-aware mobile sensing applications for safe driving. Wenyan Hu, Xiping Hu, Jun-qi Deng, Chunsheng Zhu, Georgios Fotopoulos, Edith C.-H. Ngai, and Victor C. M. Leung. In Proc. 1st ACM Workshop on Middleware for Context-Aware Applications in the IoT, pp 19-24, ACM Press, New York, 2014. (DOI).
  53. Multidimensional context-aware social network architecture for mobile crowdsensing. Xiping Hu, Xitong Li, Edith C.-H. Ngai, Victor C. M. Leung, and Philippe Kruchten. In IEEE Communications Magazine, volume 52, number 6, pp 78-87, 2014. (DOI).
  54. SAfeDJ Community: Situation-aware in-car music delivery for safe driving. Xiping Hu, Jun-qi Deng, Wenyan Hu, Georgios Fotopoulos, Edith C.-H. Ngai, Zhengguo Sheng, Min Liang, Xitong Li, Victor C. M. Leung, and Sidney Fels. In Proc. 20th International Conference on Mobile Computing and Networking, pp 363-365, ACM Press, New York, 2014. (DOI).
  55. Delegation-based Authentication and Authorization for the IP-based Internet of Things. Rene Hummen, Shafagh Hossein, Shahid Raza, Thiemo Voigt, and Klaus Wehrle. In , 2014.
  56. Fix the code. Don't tweak the hardware: A new compiler approach to Voltage–Frequency scaling. Alexandra Jimborean, Konstantinos Koukos, Vasileios Spiliopoulos, David Black-Schaffer, and Stefanos Kaxiras. In Proc. 12th International Symposium on Code Generation and Optimization, pp 262-272, ACM Press, New York, 2014. (URL, fulltext:postprint).
  57. Performance isolation for real-time systems with Xen hypervisor on multi-cores. Wei Jing, Nan Guan, and Wang Yi. In Proc. 20th International Conference on Embedded and Real-Time Computing Systems and Applications, IEEE, Piscataway, NJ, 2014. (DOI).
  58. Time profiles for identifying users in online environments. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 1st Joint Intelligence and Security Informatics Conference, pp 83-90, IEEE Computer Society, 2014. (DOI).
  59. Analysis and mining of tags, (micro)blogs, and virtual communities. Lisa Kaati. In Encyclopedia of Social Network Analysis and Mining, pp 19-25, Springer, 2014. (DOI).
  60. A case for resource efficient prefetching in multicores. Muneeb Khan, Andreas Sandberg, and Erik Hagersten. In Proc. International Symposium on Performance Analysis of Systems and Software: ISPASS 2014, pp 137-138, IEEE Computer Society, 2014. (DOI).
  61. A case for resource efficient prefetching in multicores. Muneeb Khan, Andreas Sandberg, and Erik Hagersten. In Proc. 43rd International Conference on Parallel Processing, pp 101-110, IEEE Computer Society, 2014. (DOI).
  62. Resource conscious prefetching for irregular applications in multicores. Muneeb Khan and Erik Hagersten. In Proc. International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), pp 34-43, IEEE, Piscataway, NJ, 2014. (DOI).
  63. A formal approach to the WCRT analysis of multicore systems with memory contention under phase-structured task sets. Kai Lampka, Georgia Giannopolou, Rodolfo Pellizzoni, Zheng Wu, and Nikolay Stoimenov. In Real-time systems, volume 50, number 5-6, pp 736-773, 2014. (DOI, fulltext:postprint).
  64. Efficient and Flexible Sensornet Checkpointing. Andreas Löscher, Nicolas Tsiftes, Thiemo Voigt, and Vlado Handziski. In Wireless Sensor Networks, volume 8354, pp -65, 2014. (DOI, Conference website).
  65. Energy-efficient automatic location-triggered applications on smartphones. Yemao Man and Edith C.-H. Ngai. In Computer Communications, volume 50, pp 29-40, 2014. (DOI).
  66. Subject-Level Quality Assurance in Computing: Experiences from three national perspectives. Roger McDermott, Mats Daniels, and Marta Lárusdóttir. In Proc. 44th ASEE/IEEE Frontiers in Education Conference, pp 1189-1196, IEEE Press, Piscataway, NJ, 2014. (DOI, fulltext:postprint).
  67. Demo Abstract: SicsthSense - Dispersing the Cloud. Liam McNamara, Beshr Al Nahas, Simon Duquennoy, Joakim Eriksson, and Thiemo Voigt. 2014.
  68. Energy Efficient GPS Acquisition with Sparse-GPS. Prasant Misra, Wen Hu, Yuzhe Jin, Jie Liu, Amanda Souza de Paula, Niklas Wirström, and Thiemo Voigt. In , 2014.
  69. Ubiquitous sensor data collection with mobile users. Brendan Mumey, Gang Xu, and Edith C.-H. Ngai. In Proc. 3rd International Conference on Computing, Networking and Communications, pp 561-566, IEEE Press, Piscataway, NJ, 2014. (DOI).
  70. Quality-of-information-aware data collection for mobile sensor networks. Edith C.-H. Ngai and Per Gunningberg. In Pervasive and Mobile Computing, volume 11, pp 203-215, 2014. (DOI).
  71. Extending statistical cache models to support detailed pipeline simulators. Nikos Nikoleris, David Eklöv, and Erik Hagersten. In 2014 IEEE International Symposium On Performance Analysis Of Systems And Software (Ispass), IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 86-95, IEEE Computer Society, 2014. (DOI).
  72. SADSense: Personalized Mobile Sensing for Seasonal Effects on Health. Kamyar Niroumand, Liam McNamara, Kiril Goguev, and Edith Ngai. In Proc. 13th International Symposium on Information Processing in Sensor Networks, pp 295-296, IEEE Press, Piscataway, NJ, 2014. (DOI).
  73. Haggle: Opportunistic mobile content sharing using search. Erik Nordström, Christian Rohner, and Per Gunningberg. In Computer Communications, volume 48, pp 121-132, 2014. (DOI).
  74. Modeling cache coherence misses on multicores. Xiaoyue Pan and Bengt Jonsson. In 2014 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS), IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 96-105, IEEE, 2014. (DOI).
  75. AccAB – Processes and Roles for Accreditation of Computing Degrees at Al Baha University in Saudi Arabia. Arnold Pears, Anders Berglund, Aletta Nylén, Nimir Saleh, and Mohammed Gamar. In Proc. World Engineering Education Forum, pp 969-970, 2014.
  76. Four feed-forward principles enhance students' perception of feedback as meaningful. Arnold Pears, James Harland, Margaret Hamilton, and Roger Hadgraft. In Proc. 2nd International Conference on Learning and Teaching in Computing and Engineering, International Conference on Teaching and Learning in Computing and Engineering, pp 272-277, IEEE Computer Society, Los Alamitos, CA, 2014. (DOI).
  77. Integrating global systems development skills into the engineering curriculum. Arnold Pears, Mats Daniels, and Åsa Cajander. In Proc. 3rd ASEE International Forum, pp 11088:1-8, American Society for Engineering Education, 2014.
  78. First year Computer Science and IT students' experience of participation in the discipline. Anne-Kathrin Peters, Anders Berglund, Anna Eckerdal, and Arnold Pears. In Proc. 2nd International Conference on Learning and Teaching in Computing and Engineering, pp 1-8, IEEE Computer Society, Los Alamitos, CA, 2014. (DOI, fulltext:preprint).
  79. Identity development in computing education: Theoretical perspectives and an implementation in the classroom. Anne-Kathrin Peters and Detlef Rick. In Proc. 9th Workshop in Primary and Secondary Computing Education, pp 70-79, ACM Press, New York, 2014. (DOI).
  80. Full Speed Ahead: Detailed Architectural Simulation at Near-Native Speed. Andreas Sandberg, Erik Hagersten, and David Black-Schaffer. Technical report / Department of Information Technology, Uppsala University nr 2014-005, 2014. (External link, fulltext).
  81. Understanding Multicore Performance: Efficient Memory System Modeling and Simulation. Andreas Sandberg. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1136, Acta Universitatis Upsaliensis, Uppsala, 2014. (preview image, fulltext).
  82. The Direct-to-Data (D2D) Cache: Navigating the cache hierarchy with a single lookup. Andreas Sembrant, Erik Hagersten, and David Black-Schaffer. In Proc. 41st International Symposium on Computer Architecture, pp 133-144, IEEE Press, Piscataway, NJ, 2014. (DOI).
  83. A tunable cache for approximate computing. Magnus Själander, Nina Shariati Nilsson, and Stefanos Kaxiras. In Proc. 10th International Symposium on Nanoscale Architectures, IEEE International Symposium on Nanoscale Architectures, pp 88-89, IEEE, Piscataway, NJ, 2014. (DOI).
  84. Power-Efficient Computer Architectures: Recent Advances. Magnus Själander, Margaret Martonosi, and Stefanos Kaxiras. Morgan & Claypool Publishers, 2014. (DOI).
  85. Investigating population history using temporal genetic differentiation. Pontus Skoglund, Per Sjödin, Tobias Skoglund, Martin Lascoux, and Mattias Jakobsson. In Molecular biology and evolution, volume 31, number 9, pp 2516-2527, 2014. (DOI).
  86. A novel incentive negotiation mechanism for participatory sensing under budget constraints. Zheng Song, Edith Ngai, Jian Ma, and Wendong Wang. In Proc. 22nd International Symposium on Quality of Service, pp 326-331, IEEE Communications Society, 2014. (DOI).
  87. Incentive mechanism for participatory sensing under budget constraints. Zheng Song, Edith Ngai, Jian Ma, Xiangyang Gong, Yazhi Liu, and Wendong Wang. In Proc. Wireless Communications and Networking Conference 2014, pp 3361-3366, IEEE Communications Society, 2014. (DOI).
  88. Real-Time Workload Models: Expressiveness vs. Analysis Efficiency. Martin Stigge. Ph.D. thesis, Uppsala Dissertations from the Faculty of Science and Technology nr 103, Acta Universitatis Upsaliensis, Uppsala, 2014. (fulltext, preview image).
  89. Refinement-based Exact Response-Time Analysis. Martin Stigge, Nan Guan, and Wang Yi. In 2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), Euromicro Workshop on Real-Time Systems-Proceedings, pp 143-152, 2014. (DOI).
  90. Service guarantee exploration for mixed-criticality systems. Hang Su, Nan Guan, and Dakai Zhu. In Proc. 20th International Conference on Embedded and Real-Time Computing Systems and Applications, IEEE, Piscataway, NJ, 2014. (DOI).
  91. Speculative program parallelization with scalable and decentralized runtime verification. Aravind Sukumaran-Rajam, Juan Manuel Martinez Caamaño, Willy Wolff, Alexandra Jimborean, and Philippe Clauss. In Runtime Verification, volume 8734 of Lecture Notes in Computer Science, pp 124-139, Springer Berlin/Heidelberg, 2014. (DOI, fulltext:postprint).
  92. Improving the response time analysis of global fixed-priority multiprocessor scheduling. Youcheng Sun, Giuseppe Lipari, Nan Guan, and Wang Yi. In Proc. 20th International Conference on Embedded and Real-Time Computing Systems and Applications, IEEE, Piscataway, NJ, 2014. (DOI).
  93. Programming course design: Phenomenographic approach to learning and teaching. Neena Thota. In Proc. 2nd International Conference on Learning and Teaching in Computing and Engineering, pp 125-132, IEEE Computer Society, Los Alamitos, CA, 2014. (DOI, fulltext:postprint).
  94. Repertory grid interviews: Insights into personal constructs of novice programmers. Neena Thota. In SAGE Research Methods Cases, Sage Publications, 2014. (DOI).
  95. Directional Transmissions and Receptions for Burst Forwarding using Disjoint Paths. Ambuj Varshney, Thiemo Voigt, and Luca Mottola. In Proc. 13th International Symposium on Information Processing in Sensor Networks, pp 307-308, IEEE Press, Piscataway, NJ, 2014.
  96. Using Directional Transmissions and Receptions to Reduce Contention in Wireless Sensor Networks. Ambuj Varshney, Thiemo Voigt, and Luca Mottola. In Real-World Wireless Sensor Networks, volume 281 of Lecture Notes in Electrical Engineering, pp 205-213, 2014. (DOI, External link).
  97. Smartphone Support for Persons Who Stutter. Thiemo Voigt, Kasun Hewage, and Per Alm. In Proc. 13th International Symposium on Information Processing in Sensor Networks, pp 293-294, IEEE Press, Piscataway, NJ, 2014.
  98. Spray: A Multi-Modal Localization System for Stationary Sensor Network Deployment. Niklas Wirström, Prasant Misra, and Thiemo Voigt. In 2014 11TH IEEE/IFIP ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (IEEE/IFIP WONS 2014), pp 25-32, IEEE, 2014.
  99. Information-centric collaborative data collection for mobile devices in wireless sensor networks. Gang Xu, Edith C.-H. Ngai, and Jiangchuan Liu. In Proc. International Conference on Communications: ICC 2014, pp 36-41, IEEE Communications Society, 2014. (DOI).
  100. Approximations for Model Construction. Aleksandar Zeljic, Christoph M. Wintersteiger, and Philipp Rümmer. In Automated Reasoning, volume 8562 of Lecture Notes in Computer Science, pp 344-359, Springer, 2014. (DOI, fulltext:postprint).
  101. Understanding the Dynamic Caches on Intel Processors: Methods and Applications. Yi Zhang, Nan Guan, and Wang Yi. In 2014 12th IEEE International Conference on Embedded and Ubiquitous Computing, pp 58-64, 2014. (DOI).

Updated  2016-12-09 16:27:33 by Peter Waites.