HERE Division of Computer Systems: Publications from 2015 - Department of Information Technology - Uppsala University
Skip to main content
Department of Information Technology

Division of Computer Systems: Publications from 2015

  1. Generating models of infinite-state communication protocols using regular inference with abstraction. Fides Aarts, Bengt Jonsson, Johan Uijen, and Frits Vaandrager. In Formal methods in system design, volume 46, number 1, pp 1-41, 2015. (DOI).
  2. Well Structured Transition Systems with History. Parosh A. Abdulla, Giorgio Delzanno, and Marco Montali. In Electronic Proceedings in Theoretical Computer Science, number 193, pp 115-128, 2015. (DOI).
  3. MPass: An efficient tool for the analysis of message-passing programs. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Jonathan Cederberg, Subham Modi, Othmane Rezine, and Gaurav Saini. In Formal Aspects of Component Software, volume 8997 of Lecture Notes in Computer Science, pp 198-206, Springer, 2015. (DOI).
  4. Norn: An SMT solver for string constraints. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Lukás Holík, Ahmed Rezine, Philipp Rümmer, and Jari Stenman. In Computer Aided Verification: Part I, volume 9206 of Lecture Notes in Computer Science, pp 462-469, Springer, 2015. (DOI).
  5. Precise and sound automatic fence insertion procedure under PSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång, and Tuan Phong Ngo. In Networked Systems: NETYS 2015, volume 9466 of Lecture Notes in Computer Science, pp 32-47, Springer, 2015. (DOI).
  6. Stateless model checking for TSO and PSO. Parosh Aziz Abdulla, Stavros Aronis, Mohamed Faouzi Atig, Bengt Jonsson, Carl Leonardsson, and Konstantinos Sagonas. In Tools and Algorithms for the Construction and Analysis of Systems: TACAS 2015, volume 9035 of Lecture Notes in Computer Science, pp 353-367, Springer Berlin/Heidelberg, 2015. (DOI).
  7. The Best of Both Worlds: Trading efficiency and optimality in fence insertion for TSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Tuan-Phong Ngo. In Programming Languages and Systems: ESOP 2015, volume 9032 of Lecture Notes in Computer Science, pp 308-332, Springer Berlin/Heidelberg, 2015. (DOI, External link).
  8. Verification of Cache Coherence Protocols wrt. Trace Filters. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Zeinab Ganjei, Ahmed Rezine, and Yunyun Zhu. In Proc. 15th Conference on Formal Methods in Computer-Aided Design, pp 9-16, IEEE, Piscataway, NJ, 2015. (Article).
  9. Verification of buffered dynamic register automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, and Othmane Rezine. In Networked Systems: NETYS 2015, volume 9466 of Lecture Notes in Computer Science, pp 15-31, Springer, 2015. (DOI).
  10. What's decidable about availability languages?. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Roland Meyer, and Mehdi Seyed Salehi. In Proc. 35th IARCS Conference on Foundation of Software Technology and Theoretical Computer Science, volume 45 of LIPIcs, pp 192-205, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2015. (DOI, Fulltext).
  11. A step towards detecting online grooming: Identifying adults pretending to be children. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI).
  12. Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
  13. Detecting jihadist messages on twitter. Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI).
  14. Efficient algorithms for bounded rigid <em>E</em>-unification. Peter Backeman and Philipp Rümmer. In Automated Reasoning with Analytic Tableaux and Related Methods, volume 9323 of Lecture Notes in Computer Science, pp 70-85, Springer, 2015. (DOI, fulltext:postprint).
  15. Free variables and theories: Revisiting rigid <em>E-</em>unification. Peter Backeman and Philipp Rümmer. In Frontiers of Combining Systems, volume 9322 of Lecture Notes in Computer Science, pp 3-13, Springer, 2015. (DOI, fulltext:postprint).
  16. Theorem proving with bounded rigid <em>E</em>-unification. Peter Backeman and Philipp Rümmer. In Automated Deduction – CADE-25, volume 9195 of Lecture Notes in Computer Science, pp 572-587, Springer, 2015. (DOI).
  17. Optimizing transfers of control in the static pipeline architecture. Ryan Baird, Peter Gavin, Magnus Själander, David Whalley, and Gang-Ryung Uh. In Proc. 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp 7-16, ACM Press, New York, 2015. (DOI).
  18. Improving data access efficiency by using context-aware loads and stores. Alen Bardizbanyan, Magnus Själander, David Whalley, and Per Larsson-Edefors. In Proc. 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp 27-36, ACM Press, New York, 2015. (DOI).
  19. Efficient inter-process synchronization for parallel discrete event simulation on multicores. Pavol Bauer, Jonatan Lindén, Stefan Engblom, and Bengt Jonsson. In Proc. 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, pp 183-194, ACM Press, New York, 2015. (DOI).
  20. Learning from the experiences of international students. Anders Berglund and Neena Thota. In Conference for University Pedagogical Development, Uppsala University, Uppsala, Sweden, 2015. (External link).
  21. Learning practice and theory in programming education: Students’ lived experience. Anders Berglund and Anna Eckerdal. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 180-186, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  22. Learning to program: A discussion on the interplay of theory and practice. Anders Berglund and Anna Eckerdal. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 16-18, 2015. (Proceedings).
  23. Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a staff development course. Anders Berglund, Arnold Pears, Aletta Nylén, Farooq Ahmad, Bader Alghamdi, Khalid Alghamdi, Ahmed Alhabish, Abdullah Aljoufi, Eidah Alzahrani, Rami Alzahrani, Ismat Aldmour, Areej Athama, Hamada Shihad AlSadoon, Rahmat Budiarto, Abdul Hafeez, Nadeem Hassan Daupota, Dhafer Faiz, Lubna Abdel Kareim Gabralla, Mohammad Gamar, Abdul Hannan, Bedine Kerim, F. A. Mazarbhuiya, Ahmed Rabea, Muhammad Qaiser Saleem, Nimir Saleh, and Mohamed Shenify. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 1-6, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  24. An automatable formal semantics for IEEE-754 floating-point arithmetic. Martin Brain, Cesare Tinelli, Philipp Rümmer, and Thomas Wahl. In Proc. 22nd Symposium on Computer Arithmetic, Proceedings Symposium on Computer Arithmetic, pp 160-167, IEEE Computer Society, 2015. (DOI).
  25. Vision seminars and administration of university education: A case study. Åsa Cajander, Bengt Sandblad, Thomas Lind, Roger McDermott, and Mats Daniels. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 29-32, 2015. (Proceedings).
  26. Modelling and analysing a WSN secure aggregation protocol: A comparison of languages and tool support. Volkan Cambazoglu, Ramunas Gutkovas, Johannes Åman Pohjola, and Björn Victor. Technical report / Department of Information Technology, Uppsala University nr 2015-033, 2015. (fulltext).
  27. The Load Slice Core Microarchitecture. Trevor E. Carlson, Wim Heirman, Osman Allam, Stefanos Kaxiras, and Lieven Eeckhout. In 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), pp 272-284, 2015. (DOI).
  28. A structured approach to training open-ended problem solving. Sofia Cassel and Björn Victor. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 417-420, IEEE Press, Piscataway, NJ, 2015. (DOI).
  29. A succinct canonical register automaton model. Sofia Cassel, Falk Howar, Bengt Jonsson, Maik Merten, and Bernhard Steffen. In Journal of Logical and Algebraic Methods in Programming, volume 84, number 1, pp 54-66, 2015. (DOI).
  30. Active Learning for Extended Finite State Machines. Sofia Cassel, Falk Howar, Bengt Jonsson, and Bernhard Steffen. Technical report / Department of Information Technology, Uppsala University nr 2015-032, 2015. (fulltext).
  31. Learning Component Behavior from Tests: Theory and Algorithms for Automata with Data. Sofia Cassel. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1311, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext, preview image).
  32. Learning Extended Finite State Machines (extended version). Sofia Cassel, Falk Howar, Bengt Jonsson, and Bernhard Steffen. Technical report / Department of Information Technology, Uppsala University nr 2015-004, Department of Information Technology, Uppsala University, 2015.
  33. RALib: A LearnLib extension for inferring EFSMs. Sofia Cassel, Howar Falk, and Bengt Jonsson. In , 2015.
  34. StatTask: Reuse distance analysis for task-based applications. Germán Ceballos, Erik Hagersten, and David Black-Schaffer. In Proc. 7th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, pp 1-7, ACM Press, New York, 2015. (DOI).
  35. Collaborative technologies in global engineering: New competencies and challenges. Mats Daniels, Åsa Cajander, Tony Clear, and Roger McDermott. In International journal of engineering education, volume 31, number 1, pp 267-281, 2015.
  36. Competencies for paradigm shift "survival". Mats Daniels, Åsa Cajander, Anna Eckerdal, Mats Lind, Aletta Nylén, Tony Clear, and Roger McDermott. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI).
  37. An efficient, self-contained, on-chip directory: DIR<sub>1</sub>-SISD. Mahdad Davari, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In Proc. 24th International Conference on Parallel Architectures and Compilation Techniques, pp 317-330, IEEE Computer Society, 2015. (DOI).
  38. Effects of Granularity/Adaptivity on Private/Shared Classification for Coherence. Mahdad Davari, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In , 2015.
  39. The effects of granularity and adaptivity on private/shared classification for coherence. Mahdad Davari, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In ACM Transactions on Architecture and Code Optimization (TACO), volume 12, number 3, 2015. (DOI).
  40. Scheduling instruction effects for a statically pipelined processor. Brandon Davis, Ryan Baird, Peter Gavin, Magnus Själander, Ian Finlayson, Farhad Rasapour, Gregory Cook, Gang-Ryung Uh, David Whalley, and Gary Tyson. In Proc. International Conference on Compilers, Architectures, and Synthesis for Embedded Systems: CASES 2015, pp 167-176, IEEE Press, Piscataway, NJ, 2015. (DOI).
  41. An optimal resource sharing protocol for generalized multiframe tasks. Pontus Ekberg, Nan Guan, Martin Stigge, and Wang Yi. In The Journal of logical and algebraic methods in programming, volume 84, number 1, pp 92-105, 2015. (DOI, fulltext:postprint).
  42. Models and Complexity Results in Real-Time Scheduling Theory. Pontus Ekberg. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1324, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext, preview image).
  43. Uniprocessor feasibility of sporadic tasks remains coNP-complete under bounded utilization. Pontus Ekberg and Wang Yi. In Proc. 36th Real-Time Systems Symposium, pp 87-95, IEEE Computer Society, 2015. (DOI).
  44. Uniprocessor feasibility of sporadic tasks with constrained deadlines is strongly coNP-complete. Pontus Ekberg and Wang Yi. In Proc. 27th Euromicro Conference on Real-Time Systems, pp 281-286, IEEE, Piscataway, NJ, 2015. (DOI).
  45. Enabling design of performance-controlled sensor network applications through task allocation and reallocation. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. 11th International Conference on Distributed Computing in Sensor Systems, pp 248-253, IEEE Computer Society, 2015. (DOI, fulltext:postprint).
  46. ProFuN TG: A Tool Using Abstract Task Graphs to Facilitate the Development, Deployment and Maintenance of Wireless Sensor Network Applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. Poster/Demo Session: 12th European Conference on Wireless Sensor Networks, pp 19-20, 2015.
  47. ProFuN TG: A tool for programming and managing performance-aware sensor network applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp 751-759, IEEE Computer Society, 2015. (DOI, fulltext:preprint).
  48. ProFuN TG: Programming Sensornets with Task Graphs for Increased Reliability and Energy-Efficiency. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In , IEEE Computer Society, 2015. (External link, fulltext:postprint).
  49. Towards a sensor system to tame the human elephant conflict. Charitha Elvitigala, Eranda Tennakoon, Ayyoob Hamza, Yasith Lokuge, Kasun De Zoysa, Chamath Keppitiyagama, Venkat Iyer, Kasun Hewage, and Thiemo Voigt. In Sensors Applications Symposium (SAS), pp 169-172, IEEE, 2015. (DOI).
  50. Energy-efficient fault-tolerant dynamic event region detection in wireless sensor networks. Hans-Jacob Enemark, Yue Zhang, Nicola Dragoni, and Charalampos Orfanidis. In Proc. 81st IEEE Vehicular Technology Conference, IEEE Vehicular Technology Conference Proceedings, IEEE conference proceedings, 2015. (fulltext:postprint).
  51. Scalable point-to-multipoint communication for cloud networking using information-centric networking. Anders E. Eriksson, Börje Ohlman, Karl-Åke Persson, Adeel Mohammad Malik, Marcus Ihlar, and Linus Sunde. In Proc. 12th IEEE Consumer Communications and Networking Conference, pp 654-662, IEEE, Piscataway, NJ, 2015. (DOI).
  52. Energy-efficient medium access control for energy harvesting communications. Xenofon Fafoutis, Alessio Di Mauro, Charalampos Orfanidis, and Nicola Dragoni. In IEEE transactions on consumer electronics, volume 61, number 4, pp 402-410, 2015. (DOI).
  53. Inter-network interactions in the internet-of-things: Protocol and architecture challenges. Laura Marie Feeney. In , 2015.
  54. Modes of inter-network interaction in beacon-enabled IEEE 802.15.4 networks. Laura Marie Feeney, Michael Frey, Viktoria Fodor, and Mesut Günes. In Proc of the 14th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2015.
  55. Automating regression verification. Dennis Felsing, Sarah Grebing, Vladimir Klebanov, Philipp Rümmer, and Mattias Ulbrich. In Software Engineering &amp; Management 2015, volume 239 of Lecture Notes in Informatics, pp 75-76, Gesellschaft für Informatik, Germany, 2015.
  56. Internet of Things and Future Threats Towards our Society. Torbjörn Fängström and Lisa Kaati. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
  57. Location and Density of Rain Gauges for the Estimation of Spatial Varying Precipitation. Marc Girons Lopez, Hjalmar Wennerström, Lars-Åke Nordén, and Jan Seibert. In Geografiska Annaler. Series A, Physical Geography, volume 97, number 1, pp 167-179, 2015. (DOI, Fulltext).
  58. Motivation and Grade Gap Related to Gender in a Programming Course. Virginia Grande and Joachim Parrow. In , 2015. (DOI).
  59. Perspectives on Volunteering for Initiatives for Women in Computing: a Case Study. Virginia Grande. In , Frontiers in Education Conference, pp 927-930, 2015.
  60. Bounding carry-in interference to improve fixed-priority global multiprocessor scheduling analysis. Nan Guan, Meiling Han, Chuancai Gu, Qingxu Deng, and Wang Yi. In Proc. 21st International Conference on Embedded and Real-Time Computing Systems and Applications, pp 11-20, IEEE Computer Society, 2015. (DOI).
  61. Delay analysis of structural real-time workload. Nan Guan, Yue Tang, Yang Wang, and Wang Yi. In Proc. 18th Conference on Design, Automation and Test in Europe, pp 223-228, IEEE, Piscataway, NJ, 2015. (DOI).
  62. Modular performance analysis of energy-harvesting real-time networked systems. Nan Guan, Mengying Zhao, Chun Jason Xue, Yongpan Liu, and Wang Yi. In Proc. 36th Real-Time Systems Symposium, pp 65-74, IEEE Computer Society, 2015. (DOI).
  63. Scalable timing analysis with refinement. Nan Guan, Yue Tang, Jakaria Abdullah, Martin Stigge, and Wang Yi. In Tools and Algorithms for the Construction and Analysis of Systems, volume 9035 of Lecture Notes in Computer Science, pp 3-18, Springer, 2015. (DOI).
  64. A Quadcopter Controller to Maintain Radio Link Quality. Ayyoob Hamza, Chamath Keppitiyagama, Kasun De Zoysa, Venkat Iyer, Kasun Hewage, and Thiemo Voigt. In The First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, pp 21-26, 2015. (DOI, External link).
  65. Few is Just Enough!: Small Model Theorem for Parameterized Verification and Shape Analysis. Frédéric Haziza. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1302, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext, preview image).
  66. Handover for a portable communication device between local and wide area wireless networks. Pekka Hedqvist, Per Gunningberg, Mattias Hansson, Esbjörn Köhler, and Jonne Kodu. 2015. (External link).
  67. Scalable Visual Codes for Embedding Digital Data in the Physical World. Frederik Hermans, Liam McNamara, and Thiemo Voigt. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 457-458, ACM, 2015. (DOI).
  68. An experimental study of attacks on the availability of Glossy. Kasun Hewage, Shahid Raza, and Thiemo Voigt. In Computers & electrical engineering, volume 41, pp 115-125, 2015. (DOI).
  69. Enabling TCP in mobile cyber-physical systems. Kasun Hewage, Simon Duquennoy, Venkatraman Iyer, and Thiemo Voigt. In Proc. 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp 289-297, IEEE Computer Society, 2015. (DOI).
  70. Mediator synthesis in a component algebra with data. Lukás Holik, Malte Isberner, and Bengt Jonsson. In Correct System Design, volume 9360 of Lecture Notes in Computer Science, pp 238-259, Springer, 2015. (DOI).
  71. A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. Xiping Hu, Terry H. S. Chu, Victor C. M. Leung, Edith C.-H. Ngai, Philippe Kruchten, and Henry C. B. Chan. In IEEE Communications Surveys and Tutorials, volume 17, number 3, pp 1557-1581, 2015. (DOI).
  72. Health Drive: Mobile healthcare onboard vehicles to promote safe driving. Xiping Hu, Xitong Li, Edith C.-H. Ngai, Jidi Zhao, Victor C. M. Leung, and Panos Nasiopoulos. In Proc. 48th Hawaii International Conference on System Sciences, International Conference on System Sciences, pp 3074-3083, IEEE Computer Society, 2015. (DOI).
  73. SAfeDJ: A crowd-cloud codesign approach to situation-aware music delivery for drivers. Xiping Hu, Junqi Deng, Jidi Zhao, Wenyan Hu, Edith C.-H. Ngai, Renfei Wang, Johnny Shen, Min Liang, Xitong Li, Victor C. M. Leung, and Yu-Kwong Kwok. In ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), volume 12, number 1s, pp 21:1-24, 2015. (DOI, fulltext:print).
  74. Patients' perceptions of their medical records from different subject positions. Isto Huvila, Åsa Cajander, Mats Daniels, and Rose-Mharie Åhlfeldt. In Journal of the Association for Information Science and Technology, volume 66, number 12, pp 2456-2470, 2015. (DOI).
  75. Detecting and avoiding multiple sources of interference in the 2.4 GHz spectrum. Venkatraman Iyer, Frederik Hermans, and Thiemo Voigt. In Wireless Sensor Networks, volume 8965 of Lecture Notes in Computer Science, pp 35-51, Springer, 2015. (DOI).
  76. Estimating packet delivery ratio for arbitrary packet sizes over wireless links. Martin Jacobsson and Christian Rohner. In IEEE Communications Letters, volume 19, number 4, pp 609-612, 2015. (DOI).
  77. Using software-defined networking principles for wireless sensor networks. Martin Jacobsson and Charalampos Orfanidis. In Proc. 11th Swedish National Computer Networking Workshop, 2015. (External link, fulltext:print).
  78. Analyzing multimode wireless sensor networks using the network calculus. Xi Jin, Nan Guan, Jintao Wang, and Peng Zeng. In Journal of Sensors, volume 2015, pp 851608:1-12, 2015. (DOI, fulltext:print).
  79. Timeprints for identifying social media users with multiple aliases. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Security Informatics, volume 4, pp 7:1-11, 2015. (DOI, Fulltext).
  80. Detecting multipliers of jihadism on twitter. Lisa Kaati, Enghin Omer, Nico Prucha, and Amendra Shrestha. In Proc. 15th ICDM Workshops, pp 954-960, IEEE Computer Society, 2015. (DOI).
  81. AREP: Adaptive Resource Efficient Prefetching for Maximizing Multicore Performance. Muneeb Khan, Michael A. Laurenzano, Jason Mars, Erik Hagersten, and David Black-Schaffer. In Proc. 24th International Conference on Parallel Architectures and Compilation Techniques, pp 367-378, IEEE Computer Society, 2015. (DOI, fulltext:postprint).
  82. Perf-Insight: A Simple, Scalable Approach to Optimal Data Prefetching in Multicores. Muneeb Khan, David Black-Schaffer, and Erik Hagersten. Technical report / Department of Information Technology, Uppsala University nr 2015-037, 2015. (fulltext).
  83. Scalable Analysis of Fault Trees with Dynamic Features. Jan Krcal and Pavel Krcal. In 2015 45Th Annual IEEE/IFIP International Conference On Dependable Systems And Networks, pp 89-100, 2015. (DOI).
  84. Facilities Collaboration in Cloud Manufacturing based on Generalized Collaboration Network. Wenxiang Li, Chunsheng Zhu, Edith C. -H. Ngai, Laurence T. Yang, Lei Shu, and Yuxia Sheng. In Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp 298-303, 2015. (DOI).
  85. Noninvasive and continuous blood pressure monitoring using wearable body sensor networks. Hao Lin, Wenyao Xu, Nan Guan, Dong Ji, Yangjie Wei, and Wang Yi. In IEEE Intelligent Systems, volume 30, number 6, pp 38-48, 2015. (DOI).
  86. PM2.5 Monitoring using Images from Smartphones in Participatory Sensing. Xiaoyang Liu, Zheng Song, Edith Ngai, Jian Ma, and Wendong Wang. In , pp 630-635, 2015.
  87. Quality assurance using international curricula and employer feedback. Marta Lárusdóttir, Mats Daniels, and Roger McDermott. In Conferences in Research and Practice in Information Technology, volume 160, pp 19-27, 2015. (External link, fulltext:postprint).
  88. Property-Based Testing of Sensor Networks. Andreas Löscher, Konstantinos Sagonas, and Thiemo Voigt. In Proc. 12th International Conference on Sensing, Communication, and Networking, pp 100-108, IEEE Communications Society, 2015.
  89. Experiences From A Field Test Using Icn For Live Video Streaming. Adeel Mohammad Malik, Bengt Ahlgren, Börje Ohlman, Anders Lindgren, Edith Ngai, Lukas Klingsbo, and Magnus Lång. In 2015 IEEE International Conference on Multimedia &amp; Expo Workshops (ICMEW), IEEE International Conference on Multimedia and Expo Workshops, 2015.
  90. Load-Balanced Data Collection through Opportunistic Routing. Michel Mathieu, Simon Duquennoy, Bruno Quoitin, and Thiemo Voigt. In , pp 62-70, 2015.
  91. Bixie: Finding and understanding inconsistent code. Tim McCarthy, Philipp Rümmer, and Martin Schäf. In Proc. 37th IEEE/ACM International Conference on Software Engineering, pp 645-648, IEEE, Piscataway, NJ, 2015. (DOI).
  92. A comparative analysis of two globally distributed group projects: A perspective from CSCW/CSCL research. Roger McDermott, Mats Daniels, Åsa Cajander, Julian Bass, and JayPrakash Lalchandani. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1964-1972, IEEE Press, Piscataway, NJ, 2015. (DOI).
  93. Perseverance measures and attainment in first year computing science students. Roger McDermott, Mats Daniels, and Åsa Cajander. In Proc. 20th Conference on Innovation and Technology in Computer Science Education, pp 302-307, ACM Press, New York, 2015. (DOI).
  94. Mimer and Schedeval: Tools for Comparing Static Schedulers for Streaming Applications on Manycore Architectures. Nicolas Melot, Johan Janzén, and Christoph Kessler. In 2015 44Th International Conference On Parallel Processing Workshops, International Conference on Parallel Processing Workshops, pp 146-155, 2015. (DOI).
  95. Security Challenges in Indoor Location Sensing using Bluetooth LE Broadcast. Prasant Misra, Shahid Raza, Vasanth Rajaraman, Jay Warrior, and Thiemo Voigt. In Poster Proc. 12th European Conference on Wireless Sensor Networks, 2015.
  96. Multidimensional analysis of creative coding MOOC forums: a methodological discussion. Aletta Nylén, Neena Thota, Anna Eckerdal, Päivi Kinnunen, Matthew Butler, and Michael Morgan. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 137-141, ACM Press, New York, 2015. (DOI).
  97. Fault detection in WSNs: An energy efficiency perspective towards human-centric WSNs. Charalampos Orfanidis, Yue Zhang, and Nicola Dragoni. In Agent and Multi-Agent Systems: Technologies and Applications, volume 38 of Smart Innovation, Systems and Technologies, pp 285-300, Springer, 2015. (DOI).
  98. A Modeling Framework for Reuse Distance-based Estimation of Cache Performance. Xiaoyue Pan and Bengt Jonsson. In Performance Analysis of Systems and Software (ISPASS), 2015 IEEE International Symposium on, pp 62-71, IEEE, 2015. (DOI).
  99. Forecasting Lock Contention Before Adopting Another Lock Algorithm. Xiaoyue Pan, David Klaftenegger, and Bengt Jonsson. 2015. (fulltext).
  100. Assuring the Quality of Engineering Education. Arnold Pears. In 2015 International Conference on Learning and Teaching in Computing and Engineering, pp 108-111, 2015. (DOI).
  101. Implications of anonymous assessment. Arnold Pears and Aletta Nylén. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 1404-1408, IEEE Press, Piscataway, NJ, 2015. (DOI).
  102. Cost-effective speculative scheduling in high performance processors. Arthur Perais, André Seznec, Pierre Michaud, Andreas Sembrant, and Erik Hagersten. In Proc. 42nd International Symposium on Computer Architecture, pp 247-259, ACM Press, New York, 2015. (DOI).
  103. Preparing the global software engineer. Anne-Kathrin Peters, Waqar Hussain, Åsa Cajander, Tony Clear, and Mats Daniels. In Proc. 10th International Conference on Global Software Engineering, pp 61-70, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  104. Second year Computer Science and IT students' experience of participation in the discipline. Anne-Kathrin Peters, Anders Berglund, Anna Eckerdal, and Arnold Pears. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 68-76, ACM Press, New York, 2015. (DOI).
  105. BSD-based Elliptic Curve Cryptography for the Open Internet of Things. Oriol Pinol Pinol, Shahid Raza, Joakim Eriksson, and Thiemo Voigt. In 2015 7Th International Conference On New Technologies, Mobility And Security (NtTMS), International Conference on New Technologies Mobility and Security, 2015.
  106. Bluetooth Smart: An Enabling Technology for the Internet of Things. Shahid Raza, Prasant Misra, Zhitao He, and Thiemo Voigt. In , IEEE International Conference on Wireless and Mobile Computing Networking and Communications-WiMOB, pp 155-162, 2015.
  107. Security and Privacy in the IPv6-Connected Internet of Things. Shahid Raza, Chamath Keppitiyagama, and Thiemo Voigt. In Cyber-Physical Systems, CRC Press, 2015.
  108. Security in Visible Light Communication: Novel Challenges and Opportunities. Christian Rohner, Shahid Raza, Daniele Puccinelli, and Thiemo Voigt. In Sensors & Transducers Journal, volume 192, number 9, pp 9-15, 2015. (External link, fulltext:print).
  109. A dual-consistency cache coherence protocol. Alberto Ros and Alexandra Jimborean. In Proc. 29th International Parallel and Distributed Processing Symposium, pp 1119-1128, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:print).
  110. Callback: Efficient Synchronization without Invalidation with a Directory Just for Spin-Waiting. Alberto Ros and Stefanos Kaxiras. In 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), pp 427-438, 2015. (DOI).
  111. Hierarchical private/shared classification: The key to simple and efficient coherence for clustered cache hierarchies. Alberto Ros, Mahdad Davari, and Stefanos Kaxiras. In Proc. 21st International Symposium on High Performance Computer Architecture, pp 186-197, IEEE Computer Society Digital Library, 2015. (DOI).
  112. On recursion-free Horn clauses and Craig interpolation. Philipp Rümmer, Hossein Hojjat, and Viktor Kuncak. In Formal methods in system design, volume 47, number 1, pp 1-25, 2015. (DOI).
  113. Full speed ahead: Detailed architectural simulation at near-native speed. Andreas Sandberg, Nikos Nikoleris, Trevor E. Carlson, Erik Hagersten, Stefanos Kaxiras, and David Black-Schaffer. In Proc. 18th International Symposium on Workload Characterization, pp 183-192, IEEE Computer Society, 2015. (DOI).
  114. Energy Efficiency as an Orchestration Service for Mobile Internet of Things. Peramanathan Sathyamoorthy, Edith Ngai, Xiping Hu, and Victor Leung. In , pp 155-162, 2015. (DOI).
  115. Conflict-Directed Graph Coverage. Daniel Schwartz-Narbonne, Martin Schaef, Dejan Jovanovic, Philipp Rümmer, and Thomas Wies. In NASA FORMAL METHODS (NFM 2015), volume 9058 of Lecture Notes in Computer Science, pp 327-342, 2015. (DOI).
  116. Long Term Parking (LTP): Criticality-aware Resource Allocation in OOO Processors. Andreas Sembrant, Trevor E. Carlson, Erik Hagersten, David Black-Schaffer, Arthur Perais, André Seznec, and Pierre Michaud. In Proc. 48th International Symposium on Microarchitecture, pp 334-346, 2015. (DOI).
  117. Combinatorial abstraction refinement for feasibility analysis of static priorities. Martin Stigge and Wang Yi. In Real-time systems, volume 51, number 6, pp 639-674, 2015. (DOI).
  118. Graph-based models for real-time workload: a survey. Martin Stigge and Wang Yi. In Real-time systems, volume 51, number 5, pp 602-636, 2015. (DOI).
  119. Teaching and learning system thinking in technology. Maria Svensson, Åke Ingerman, and Anders Berglund. In Plurality and Complementarity of Approaches in Design and Technology Education, pp 404-409, Presses Universitaires de Provence, Marseille, 2015. (External link, fulltext:print).
  120. Sensor-based Breakage Detection for Electric Fences. Eranda Tennakoon, Charith Madusanka, Kasun De Zoysa, Chamath Keppitiyagama, Venkat Iyer, Kasun Hewage, and Thiemo Voigt. In Sensors Applications Symposium (SAS), pp 137-140, IEEE, 2015. (DOI).
  121. A structured approach to master thesis writing. Neena Thota and Anders Berglund. In Conference for University Pedagogical Development, Uppsala University, Uppsala, Sweden, 2015. (External link).
  122. Connectivism and the use of technology/media in collaborative teaching and learning. Neena Thota. In From the Confucian Way to Collaborative Knowledge Co-Construction, volume 142 of New Directions for Teaching and Learning, pp 81-96, John Wiley & Sons, Hoboken, NJ, 2015.
  123. Engaging school students with tangible devices: Pilot project with .NET gadgeteer. Neena Thota, Gerald Estadieu, Antonio Ferrao, and Kai Meng Wong. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 112-119, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  124. Integrating international students into CS programs. Neena Thota and Anders Berglund. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 6-8, 2015. (Proceedings).
  125. Introducing Educational Technologies to Teachers: Experience Report. Neena Thota and João G. M. Negreiros. In Journal of University Teaching and Learning Practice, volume 12, number 1, pp 5:1-13, 2015. (External link).
  126. Micro-Architecture Independent Analytical Processor Performance and Power Modeling. Sam Van den Steen, Sander De Pestel, Moncef Mechri, Stijn Eyerman, Trevor Carlson, David Black-Schaffer, Erik Hagersten, and Lieven Eeckhout. In 2015 IEEE International Symposium on Performance Analysis and Software (ISPASS), IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 32-41, 2015.
  127. Coordination of Wireless Sensor Networks using Visible Light. Ambuj Varshney, Luca Mottola, and Thiemo Voigt. In SenSys '15 Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 421-422, 2015. (DOI, External link).
  128. Directional Transmissions and Receptions for High-throughput Bulk Forwarding in Wireless Sensor Networks. Ambuj Varshney, Luca Mottola, Mats Carlsson, and Thiemo Voigt. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 351-364, 2015. (DOI, Fulltext, fulltext:print).
  129. The automatic detection and analysis of electrocardiogram based on Lorenz plot. Wenqi Wang, Yangjie Wei, Nan Guan, and Wang Yi. In Proc. 12th International Conference on Robotics and Biomimetics, pp 644-649, IEEE, Piscataway, NJ, 2015. (DOI).
  130. dRTI: Directional Radio Tomographic Imaging. Bo Wei, Ambuj Varshney, Neal Patwari, Wen Hu, Thiemo Voigt, and Chun Tung Chou. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks, IPSN ’15, pp 166-177, 2015. (DOI).
  131. Diffusion-based three-dimensional reconstruction of complex surface using monocular vision. Yangjie Wei, Chengdong Wu, Wang Yi, and Wenxue Wang. In Optics Express, volume 23, number 23, pp 30364-30378, 2015. (DOI, Fulltext).
  132. Efficient shape reconstruction of microlens using optical microscopy. Yangjie Wei, Chengdong Wu, Wang Yi, and Zaili Dong. In IEEE Transactions on Industrial Electronics, volume 62, number 12, pp 7655-7664, 2015. (DOI).
  133. A Game Theoretic Approach to Sensor Data Communications in an Opportunistic Network. Hjalmar Wennerström and David Smith. In Proc. International Conference on Communications: ICC 2015, IEEE International Conference on Communications, pp 6306-6311, IEEE, Piscataway, NJ, 2015. (DOI).
  134. Considering Multi-Contact Encounters in Opportunistic Networks. Hjalmar Wennerström, Christian Rohner, and David Smith. In Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, ACM Digital Library, 2015. (DOI).
  135. Collaborative Localization in Participatory Sensing with Load Balancing. Teng Xi, Edith Ngai, Zheng Song, Ye Tian, Xiangyang Gong, and Wendong Wang. In 2015 IEEE 23Rd International Symposium On Quality Of Service (IWQOS), pp 61-62, 2015.
  136. Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks. Y. Yang, Y. Tian, Edith Ngai, L. Zhang, Y. Teng, and W. Wang. In 2015 IEEE Global Communications Conference (Globecom), 2015.
  137. Vulnerable friend identification: Who should you beware of most in online social networks?. Yunjuan Yang, Ye Tian, Edith Ngai, Lanshan Zhang, Yining Teng, and Wendong Wang. In 2015 Ieee Global Communications Conference (Globecom), IEEE Global Communications Conference, IEEE, 2015. (DOI).
  138. Time-optimal convergecast with separated packet copying: Scheduling policies and performance. Haibo Zhang, Fredrik Österlind, Pablo Soldati, Thiemo Voigt, and Mikael Johansson. In IEEE Transactions on Vehicular Technology, volume 64, number 2, pp 793-803, 2015. (DOI).
  139. Green Small Cell Planning in Smart Cities under Dynamic Traffic Demand. Li Zhou, Xiping Hu, Chunsheng Zhu, Edith C. -H. Ngai, Shan Wang, Jibo Wei, and Victor C. M. Leung. In 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference on Computer Communications Workshops, pp 618-623, 2015.
  140. Green Internet of Things for Smart World. Chunsheng Zhu, Victor C. M. Leung, Lei Shu, and Edith C.-H. Ngai. In IEEE Access, volume 3, pp 2151-2162, 2015. (DOI, Fulltext).
  141. Pricing Models for Sensor-Cloud. Chunsheng Zhu, Victor C. M. Leung, Edith C. -H. Ngai, Laurence T. Yang, Lei Shu, and Xiuhua Li. In 2015 IEEE 7Th International Conference On Cloud Computing Technology And Science (Cloudcom), pp 454-457, 2015. (DOI).

Updated  2016-12-09 16:27:42 by Peter Waites.