Division of Computer Systems: Publications from 2015
-
Generating models of infinite-state communication protocols using regular inference with abstraction
. In Formal methods in system design, volume 46, number 1, pp 1-41, 2015. (DOI
).
-
Well Structured Transition Systems with History
. In Electronic Proceedings in Theoretical Computer Science, number 193, pp 115-128, 2015. (DOI
).
-
MPass: An efficient tool for the analysis of message-passing programs
. In Formal Aspects of Component Software, volume 8997 of Lecture Notes in Computer Science, pp 198-206, Springer, 2015. (DOI
).
-
Norn: An SMT solver for string constraints
. In Computer Aided Verification: Part I, volume 9206 of Lecture Notes in Computer Science, pp 462-469, Springer, 2015. (DOI
).
-
Precise and sound automatic fence insertion procedure under PSO
. In Networked Systems: NETYS 2015, volume 9466 of Lecture Notes in Computer Science, pp 32-47, Springer, 2015. (DOI
).
-
Stateless model checking for TSO and PSO
. In Tools and Algorithms for the Construction and Analysis of Systems: TACAS 2015, volume 9035 of Lecture Notes in Computer Science, pp 353-367, Springer Berlin/Heidelberg, 2015. (DOI
).
-
The Best of Both Worlds: Trading efficiency and optimality in fence insertion for TSO
. In Programming Languages and Systems: ESOP 2015, volume 9032 of Lecture Notes in Computer Science, pp 308-332, Springer Berlin/Heidelberg, 2015. (DOI
, External link
).
-
Verification of Cache Coherence Protocols wrt. Trace Filters
. In Proc. 15th Conference on Formal Methods in Computer-Aided Design, pp 9-16, IEEE, Piscataway, NJ, 2015. (Article
).
-
Verification of buffered dynamic register automata
. In Networked Systems: NETYS 2015, volume 9466 of Lecture Notes in Computer Science, pp 15-31, Springer, 2015. (DOI
).
-
What's decidable about availability languages?
. In Proc. 35th IARCS Conference on Foundation of Software Technology and Theoretical Computer Science, volume 45 of LIPIcs, pp 192-205, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2015. (DOI
, Fulltext
).
-
A step towards detecting online grooming: Identifying adults pretending to be children
. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI
).
-
Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming
. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
-
Detecting jihadist messages on twitter
. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI
).
-
Efficient algorithms for bounded rigid <em>E</em>-unification
. In Automated Reasoning with Analytic Tableaux and Related Methods, volume 9323 of Lecture Notes in Computer Science, pp 70-85, Springer, 2015. (DOI
, fulltext:postprint
).
-
Free variables and theories: Revisiting rigid <em>E-</em>unification
. In Frontiers of Combining Systems, volume 9322 of Lecture Notes in Computer Science, pp 3-13, Springer, 2015. (DOI
, fulltext:postprint
).
-
Theorem proving with bounded rigid <em>E</em>-unification
. In Automated Deduction – CADE-25, volume 9195 of Lecture Notes in Computer Science, pp 572-587, Springer, 2015. (DOI
).
-
Optimizing transfers of control in the static pipeline architecture
. In Proc. 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp 7-16, ACM Press, New York, 2015. (DOI
).
-
Improving data access efficiency by using context-aware loads and stores
. In Proc. 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp 27-36, ACM Press, New York, 2015. (DOI
).
-
Efficient inter-process synchronization for parallel discrete event simulation on multicores
. In Proc. 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, pp 183-194, ACM Press, New York, 2015. (DOI
).
-
Learning from the experiences of international students
. In Conference for University Pedagogical Development, Uppsala University, Uppsala, Sweden, 2015. (External link
).
-
Learning practice and theory in programming education: Students’ lived experience
. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 180-186, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI
, fulltext:preprint
).
-
Learning to program: A discussion on the interplay of theory and practice
. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 16-18, 2015. (Proceedings
).
-
Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a staff development course
. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 1-6, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI
, fulltext:preprint
).
-
An automatable formal semantics for IEEE-754 floating-point arithmetic
. In Proc. 22nd Symposium on Computer Arithmetic, Proceedings Symposium on Computer Arithmetic, pp 160-167, IEEE Computer Society, 2015. (DOI
).
-
Vision seminars and administration of university education: A case study
. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 29-32, 2015. (Proceedings
).
-
Modelling and analysing a WSN secure aggregation protocol: A comparison of languages and tool support
. Technical report / Department of Information Technology, Uppsala University nr 2015-033, 2015. (fulltext
).
-
The Load Slice Core Microarchitecture
. In 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), pp 272-284, 2015. (DOI
).
-
A structured approach to training open-ended problem solving
. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 417-420, IEEE Press, Piscataway, NJ, 2015. (DOI
).
-
A succinct canonical register automaton model
. In Journal of Logical and Algebraic Methods in Programming, volume 84, number 1, pp 54-66, 2015. (DOI
).
-
Active Learning for Extended Finite State Machines
. Technical report / Department of Information Technology, Uppsala University nr 2015-032, 2015. (fulltext
).
-
Learning Component Behavior from Tests: Theory and Algorithms for Automata with Data
. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1311, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext
, preview image
).
-
Learning Extended Finite State Machines (extended version)
. Technical report / Department of Information Technology, Uppsala University nr 2015-004, Department of Information Technology, Uppsala University, 2015.
-
RALib: A LearnLib extension for inferring EFSMs
. In , 2015.
-
StatTask: Reuse distance analysis for task-based applications
. In Proc. 7th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, pp 1-7, ACM Press, New York, 2015. (DOI
).
-
Collaborative technologies in global engineering: New competencies and challenges
. In International journal of engineering education, volume 31, number 1, pp 267-281, 2015.
-
Competencies for paradigm shift "survival"
. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI
).
-
An efficient, self-contained, on-chip directory: DIR<sub>1</sub>-SISD
. In Proc. 24th International Conference on Parallel Architectures and Compilation Techniques, pp 317-330, IEEE Computer Society, 2015. (DOI
).
-
Effects of Granularity/Adaptivity on Private/Shared Classification for Coherence
. In , 2015.
-
The effects of granularity and adaptivity on private/shared classification for coherence
. In ACM Transactions on Architecture and Code Optimization (TACO), volume 12, number 3, 2015. (DOI
).
-
Scheduling instruction effects for a statically pipelined processor
. In Proc. International Conference on Compilers, Architectures, and Synthesis for Embedded Systems: CASES 2015, pp 167-176, IEEE Press, Piscataway, NJ, 2015. (DOI
).
-
An optimal resource sharing protocol for generalized multiframe tasks
. In The Journal of logical and algebraic methods in programming, volume 84, number 1, pp 92-105, 2015. (DOI
, fulltext:postprint
).
-
Models and Complexity Results in Real-Time Scheduling Theory
. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1324, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext
, preview image
).
-
Uniprocessor feasibility of sporadic tasks remains coNP-complete under bounded utilization
. In Proc. 36th Real-Time Systems Symposium, pp 87-95, IEEE Computer Society, 2015. (DOI
).
-
Uniprocessor feasibility of sporadic tasks with constrained deadlines is strongly coNP-complete
. In Proc. 27th Euromicro Conference on Real-Time Systems, pp 281-286, IEEE, Piscataway, NJ, 2015. (DOI
).
-
Enabling design of performance-controlled sensor network applications through task allocation and reallocation
. In Proc. 11th International Conference on Distributed Computing in Sensor Systems, pp 248-253, IEEE Computer Society, 2015. (DOI
, fulltext:postprint
).
-
ProFuN TG: A Tool Using Abstract Task Graphs to Facilitate the Development, Deployment and Maintenance of Wireless Sensor Network Applications
. In Proc. Poster/Demo Session: 12th European Conference on Wireless Sensor Networks, pp 19-20, 2015.
-
ProFuN TG: A tool for programming and managing performance-aware sensor network applications
. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp 751-759, IEEE Computer Society, 2015. (DOI
, fulltext:preprint
).
-
ProFuN TG: Programming Sensornets with Task Graphs for Increased Reliability and Energy-Efficiency
. In , IEEE Computer Society, 2015. (External link
, fulltext:postprint
).
-
Towards a sensor system to tame the human elephant conflict
. In Sensors Applications Symposium (SAS), pp 169-172, IEEE, 2015. (DOI
).
-
Energy-efficient fault-tolerant dynamic event region detection in wireless sensor networks
. In Proc. 81st IEEE Vehicular Technology Conference, IEEE Vehicular Technology Conference Proceedings, IEEE conference proceedings, 2015. (fulltext:postprint
).
-
Scalable point-to-multipoint communication for cloud networking using information-centric networking
. In Proc. 12th IEEE Consumer Communications and Networking Conference, pp 654-662, IEEE, Piscataway, NJ, 2015. (DOI
).
-
Energy-efficient medium access control for energy harvesting communications
. In IEEE transactions on consumer electronics, volume 61, number 4, pp 402-410, 2015. (DOI
).
-
Inter-network interactions in the internet-of-things: Protocol and architecture challenges
. In , 2015.
-
Modes of inter-network interaction in beacon-enabled IEEE 802.15.4 networks
. In Proc of the 14th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2015.
-
Automating regression verification
. In Software Engineering & Management 2015, volume 239 of Lecture Notes in Informatics, pp 75-76, Gesellschaft für Informatik, Germany, 2015.
-
Internet of Things and Future Threats Towards our Society
. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
-
Location and Density of Rain Gauges for the Estimation of Spatial Varying Precipitation
. In Geografiska Annaler. Series A, Physical Geography, volume 97, number 1, pp 167-179, 2015. (DOI
, Fulltext
).
-
Motivation and Grade Gap Related to Gender in a Programming Course
. In , 2015. (DOI
).
-
Perspectives on Volunteering for Initiatives for Women in Computing: a Case Study
. In , Frontiers in Education Conference, pp 927-930, 2015.
-
Bounding carry-in interference to improve fixed-priority global multiprocessor scheduling analysis
. In Proc. 21st International Conference on Embedded and Real-Time Computing Systems and Applications, pp 11-20, IEEE Computer Society, 2015. (DOI
).
-
Delay analysis of structural real-time workload
. In Proc. 18th Conference on Design, Automation and Test in Europe, pp 223-228, IEEE, Piscataway, NJ, 2015. (DOI
).
-
Modular performance analysis of energy-harvesting real-time networked systems
. In Proc. 36th Real-Time Systems Symposium, pp 65-74, IEEE Computer Society, 2015. (DOI
).
-
Scalable timing analysis with refinement
. In Tools and Algorithms for the Construction and Analysis of Systems, volume 9035 of Lecture Notes in Computer Science, pp 3-18, Springer, 2015. (DOI
).
-
A Quadcopter Controller to Maintain Radio Link Quality
. In The First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, pp 21-26, 2015. (DOI
, External link
).
-
Few is Just Enough!: Small Model Theorem for Parameterized Verification and Shape Analysis
. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1302, Acta Universitatis Upsaliensis, Uppsala, 2015. (fulltext
, preview image
).
-
Handover for a portable communication device between local and wide area wireless networks
. 2015. (External link
).
-
Scalable Visual Codes for Embedding Digital Data in the Physical World
. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 457-458, ACM, 2015. (DOI
).
-
An experimental study of attacks on the availability of Glossy
. In Computers & electrical engineering, volume 41, pp 115-125, 2015. (DOI
).
-
Enabling TCP in mobile cyber-physical systems
. In Proc. 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp 289-297, IEEE Computer Society, 2015. (DOI
).
-
Mediator synthesis in a component algebra with data
. In Correct System Design, volume 9360 of Lecture Notes in Computer Science, pp 238-259, Springer, 2015. (DOI
).
-
A survey on mobile social networks: Applications, platforms, system architectures, and future research directions
. In IEEE Communications Surveys and Tutorials, volume 17, number 3, pp 1557-1581, 2015. (DOI
).
-
Health Drive: Mobile healthcare onboard vehicles to promote safe driving
. In Proc. 48th Hawaii International Conference on System Sciences, International Conference on System Sciences, pp 3074-3083, IEEE Computer Society, 2015. (DOI
).
-
SAfeDJ: A crowd-cloud codesign approach to situation-aware music delivery for drivers
. In ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), volume 12, number 1s, pp 21:1-24, 2015. (DOI
, fulltext:print
).
-
Patients' perceptions of their medical records from different subject positions
. In Journal of the Association for Information Science and Technology, volume 66, number 12, pp 2456-2470, 2015. (DOI
).
-
Detecting and avoiding multiple sources of interference in the 2.4 GHz spectrum
. In Wireless Sensor Networks, volume 8965 of Lecture Notes in Computer Science, pp 35-51, Springer, 2015. (DOI
).
-
Estimating packet delivery ratio for arbitrary packet sizes over wireless links
. In IEEE Communications Letters, volume 19, number 4, pp 609-612, 2015. (DOI
).
-
Using software-defined networking principles for wireless sensor networks
. In Proc. 11th Swedish National Computer Networking Workshop, 2015. (External link
, fulltext:print
).
-
Analyzing multimode wireless sensor networks using the network calculus
. In Journal of Sensors, volume 2015, pp 851608:1-12, 2015. (DOI
, fulltext:print
).
-
Timeprints for identifying social media users with multiple aliases
. In Security Informatics, volume 4, pp 7:1-11, 2015. (DOI
, Fulltext
).
-
Detecting multipliers of jihadism on twitter
. In Proc. 15th ICDM Workshops, pp 954-960, IEEE Computer Society, 2015. (DOI
).
-
AREP: Adaptive Resource Efficient Prefetching for Maximizing Multicore Performance
. In Proc. 24th International Conference on Parallel Architectures and Compilation Techniques, pp 367-378, IEEE Computer Society, 2015. (DOI
, fulltext:postprint
).
-
Perf-Insight: A Simple, Scalable Approach to Optimal Data Prefetching in Multicores
. Technical report / Department of Information Technology, Uppsala University nr 2015-037, 2015. (fulltext
).
-
Scalable Analysis of Fault Trees with Dynamic Features
. In 2015 45Th Annual IEEE/IFIP International Conference On Dependable Systems And Networks, pp 89-100, 2015. (DOI
).
-
Facilities Collaboration in Cloud Manufacturing based on Generalized Collaboration Network
. In Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp 298-303, 2015. (DOI
).
-
Noninvasive and continuous blood pressure monitoring using wearable body sensor networks
. In IEEE Intelligent Systems, volume 30, number 6, pp 38-48, 2015. (DOI
).
-
PM2.5 Monitoring using Images from Smartphones in Participatory Sensing
. In , pp 630-635, 2015.
-
Quality assurance using international curricula and employer feedback
. In Conferences in Research and Practice in Information Technology, volume 160, pp 19-27, 2015. (External link
, fulltext:postprint
).
-
Property-Based Testing of Sensor Networks
. In Proc. 12th International Conference on Sensing, Communication, and Networking, pp 100-108, IEEE Communications Society, 2015.
-
Experiences From A Field Test Using Icn For Live Video Streaming
. In 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), IEEE International Conference on Multimedia and Expo Workshops, 2015.
-
Load-Balanced Data Collection through Opportunistic Routing
. In , pp 62-70, 2015.
-
Bixie: Finding and understanding inconsistent code
. In Proc. 37th IEEE/ACM International Conference on Software Engineering, pp 645-648, IEEE, Piscataway, NJ, 2015. (DOI
).
-
A comparative analysis of two globally distributed group projects: A perspective from CSCW/CSCL research
. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1964-1972, IEEE Press, Piscataway, NJ, 2015. (DOI
).
-
Perseverance measures and attainment in first year computing science students
. In Proc. 20th Conference on Innovation and Technology in Computer Science Education, pp 302-307, ACM Press, New York, 2015. (DOI
).
-
Mimer and Schedeval: Tools for Comparing Static Schedulers for Streaming Applications on Manycore Architectures
. In 2015 44Th International Conference On Parallel Processing Workshops, International Conference on Parallel Processing Workshops, pp 146-155, 2015. (DOI
).
-
Security Challenges in Indoor Location Sensing using Bluetooth LE Broadcast
. In Poster Proc. 12th European Conference on Wireless Sensor Networks, 2015.
-
Multidimensional analysis of creative coding MOOC forums: a methodological discussion
. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 137-141, ACM Press, New York, 2015. (DOI
).
-
Fault detection in WSNs: An energy efficiency perspective towards human-centric WSNs
. In Agent and Multi-Agent Systems: Technologies and Applications, volume 38 of Smart Innovation, Systems and Technologies, pp 285-300, Springer, 2015. (DOI
).
-
A Modeling Framework for Reuse Distance-based Estimation of Cache Performance
. In Performance Analysis of Systems and Software (ISPASS), 2015 IEEE International Symposium on, pp 62-71, IEEE, 2015. (DOI
).
-
Forecasting Lock Contention Before Adopting Another Lock Algorithm
. 2015. (fulltext
).
-
Assuring the Quality of Engineering Education
. In 2015 International Conference on Learning and Teaching in Computing and Engineering, pp 108-111, 2015. (DOI
).
-
Implications of anonymous assessment
. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 1404-1408, IEEE Press, Piscataway, NJ, 2015. (DOI
).
-
Cost-effective speculative scheduling in high performance processors
. In Proc. 42nd International Symposium on Computer Architecture, pp 247-259, ACM Press, New York, 2015. (DOI
).
-
Preparing the global software engineer
. In Proc. 10th International Conference on Global Software Engineering, pp 61-70, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI
).
-
Second year Computer Science and IT students' experience of participation in the discipline
. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 68-76, ACM Press, New York, 2015. (DOI
).
-
BSD-based Elliptic Curve Cryptography for the Open Internet of Things
. In 2015 7Th International Conference On New Technologies, Mobility And Security (NtTMS), International Conference on New Technologies Mobility and Security, 2015.
-
Bluetooth Smart: An Enabling Technology for the Internet of Things
. In , IEEE International Conference on Wireless and Mobile Computing Networking and Communications-WiMOB, pp 155-162, 2015.
-
Security and Privacy in the IPv6-Connected Internet of Things
. In Cyber-Physical Systems, CRC Press, 2015.
-
Security in Visible Light Communication: Novel Challenges and Opportunities
. In Sensors & Transducers Journal, volume 192, number 9, pp 9-15, 2015. (External link
, fulltext:print
).
-
A dual-consistency cache coherence protocol
. In Proc. 29th International Parallel and Distributed Processing Symposium, pp 1119-1128, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI
, fulltext:print
).
-
Callback: Efficient Synchronization without Invalidation with a Directory Just for Spin-Waiting
. In 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), pp 427-438, 2015. (DOI
).
-
Hierarchical private/shared classification: The key to simple and efficient coherence for clustered cache hierarchies
. In Proc. 21st International Symposium on High Performance Computer Architecture, pp 186-197, IEEE Computer Society Digital Library, 2015. (DOI
).
-
On recursion-free Horn clauses and Craig interpolation
. In Formal methods in system design, volume 47, number 1, pp 1-25, 2015. (DOI
).
-
Full speed ahead: Detailed architectural simulation at near-native speed
. In Proc. 18th International Symposium on Workload Characterization, pp 183-192, IEEE Computer Society, 2015. (DOI
).
-
Energy Efficiency as an Orchestration Service for Mobile Internet of Things
. In , pp 155-162, 2015. (DOI
).
-
Conflict-Directed Graph Coverage
. In NASA FORMAL METHODS (NFM 2015), volume 9058 of Lecture Notes in Computer Science, pp 327-342, 2015. (DOI
).
-
Long Term Parking (LTP): Criticality-aware Resource Allocation in OOO Processors
. In Proc. 48th International Symposium on Microarchitecture, pp 334-346, 2015. (DOI
).
-
Combinatorial abstraction refinement for feasibility analysis of static priorities
. In Real-time systems, volume 51, number 6, pp 639-674, 2015. (DOI
).
-
Graph-based models for real-time workload: a survey
. In Real-time systems, volume 51, number 5, pp 602-636, 2015. (DOI
).
-
Teaching and learning system thinking in technology
. In Plurality and Complementarity of Approaches in Design and Technology Education, pp 404-409, Presses Universitaires de Provence, Marseille, 2015. (External link
, fulltext:print
).
-
Sensor-based Breakage Detection for Electric Fences
. In Sensors Applications Symposium (SAS), pp 137-140, IEEE, 2015. (DOI
).
-
A structured approach to master thesis writing
. In Conference for University Pedagogical Development, Uppsala University, Uppsala, Sweden, 2015. (External link
).
-
Connectivism and the use of technology/media in collaborative teaching and learning
. In From the Confucian Way to Collaborative Knowledge Co-Construction, volume 142 of New Directions for Teaching and Learning, pp 81-96, John Wiley & Sons, Hoboken, NJ, 2015.
-
Engaging school students with tangible devices: Pilot project with .NET gadgeteer
. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 112-119, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI
).
-
Integrating international students into CS programs
. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 6-8, 2015. (Proceedings
).
-
Introducing Educational Technologies to Teachers: Experience Report
. In Journal of University Teaching and Learning Practice, volume 12, number 1, pp 5:1-13, 2015. (External link
).
-
Micro-Architecture Independent Analytical Processor Performance and Power Modeling
. In 2015 IEEE International Symposium on Performance Analysis and Software (ISPASS), IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 32-41, 2015.
-
Coordination of Wireless Sensor Networks using Visible Light
. In SenSys '15 Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 421-422, 2015. (DOI
, External link
).
-
Directional Transmissions and Receptions for High-throughput Bulk Forwarding in Wireless Sensor Networks
. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 351-364, 2015. (DOI
, Fulltext
, fulltext:print
).
-
The automatic detection and analysis of electrocardiogram based on Lorenz plot
. In Proc. 12th International Conference on Robotics and Biomimetics, pp 644-649, IEEE, Piscataway, NJ, 2015. (DOI
).
-
dRTI: Directional Radio Tomographic Imaging
. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks, IPSN ’15, pp 166-177, 2015. (DOI
).
-
Diffusion-based three-dimensional reconstruction of complex surface using monocular vision
. In Optics Express, volume 23, number 23, pp 30364-30378, 2015. (DOI
, Fulltext
).
-
Efficient shape reconstruction of microlens using optical microscopy
. In IEEE Transactions on Industrial Electronics, volume 62, number 12, pp 7655-7664, 2015. (DOI
).
-
A Game Theoretic Approach to Sensor Data Communications in an Opportunistic Network
. In Proc. International Conference on Communications: ICC 2015, IEEE International Conference on Communications, pp 6306-6311, IEEE, Piscataway, NJ, 2015. (DOI
).
-
Considering Multi-Contact Encounters in Opportunistic Networks
. In Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, ACM Digital Library, 2015. (DOI
).
-
Collaborative Localization in Participatory Sensing with Load Balancing
. In 2015 IEEE 23Rd International Symposium On Quality Of Service (IWQOS), pp 61-62, 2015.
-
Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks
. In 2015 IEEE Global Communications Conference (Globecom), 2015.
-
Vulnerable friend identification: Who should you beware of most in online social networks?
. In 2015 Ieee Global Communications Conference (Globecom), IEEE Global Communications Conference, IEEE, 2015. (DOI
).
-
Time-optimal convergecast with separated packet copying: Scheduling policies and performance
. In IEEE Transactions on Vehicular Technology, volume 64, number 2, pp 793-803, 2015. (DOI
).
-
Green Small Cell Planning in Smart Cities under Dynamic Traffic Demand
. In 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference on Computer Communications Workshops, pp 618-623, 2015.
-
Green Internet of Things for Smart World
. In IEEE Access, volume 3, pp 2151-2162, 2015. (DOI
, Fulltext
).
-
Pricing Models for Sensor-Cloud
. In 2015 IEEE 7Th International Conference On Cloud Computing Technology And Science (Cloudcom), pp 454-457, 2015. (DOI
).