Skip to main content
Department of Information Technology

Division of Computer Systems: Publications from 2016

  1. Automated Verification of Linearization Policies. Parosh Abdulla, Bengt Jonsson, and Cong Quy Trinh. In Automated Verification of Linearization Policies: 23rd International Symposium, SAS 2016, Edinburgh, UK, September 8-10, 2016, Proceedings, 2016. (DOI).
  2. Qualitative Analysis of VASS-Induced MDPs. Parosh Abdulla, Radu Ciobanu, Richard Mayr, Arnaud Sangnier, and Jeremy Sproston. In Foundations Of Software Science And Computation Structures (FOSSACS 2016), volume 9634 of Lecture Notes in Computer Science, pp 319-334, 2016. (DOI).
  3. Data Communicating Processes with Unreliable Channels. Parosh Aziz Abdulla, Aiswarya Cyriac, and Mohamed Faouzi Atig. In Proceedings Of The 31St Annual ACM-IEEE Symposium On Logic In Computer Science (LICS 2016), pp 166-175, 2016. (DOI).
  4. Parameterized verification. Parosh A. Abdulla and Giorgio Delzanno. In International Journal on Software Tools for Technology Transfer, volume 18, number 5, pp 469-473, 2016. (DOI).
  5. Counter-Example Guided Program Verification. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Phi Diep Bui. In FM 2016: Formal Methods, volume 9995 of Lecture Notes in Computer Science, pp 25-42, Springer, 2016. (DOI).
  6. Fencing programs with self-invalidation and self-downgrade. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Stefanos Kaxiras, Carl Leonardsson, Alberto Ros, and Yunyun Zhu. In Formal Techniques for Distributed Objects, Components, and Systems, volume 9688 of Lecture Notes in Computer Science, pp 19-35, Springer, 2016. (DOI).
  7. Parameterized verification of time-sensitive models of ad hoc network protocols. Parosh Aziz Abdulla, Giorgio Delzanno, Othmane Rezine, Arnaud Sangnier, and Riccardo Traverso. In Theoretical Computer Science, volume 612, pp 1-22, 2016. (DOI).
  8. Parameterized verification through view abstraction. Parosh Aziz Abdulla, Frédéric Haziza, and Lukás Holík. In International Journal on Software Tools for Technology Transfer, volume 18, number 5, pp 495-516, 2016. (DOI).
  9. Recency-Bounded Verification of Dynamic Database-Driven Systems. Parosh Aziz Abdulla, Aiswarya Cyriac, Mohamed Faouzi Atig, Marco Montali, and Othmane Rezine. In PODS'16: PROCEEDINGS OF THE 35TH ACM SIGMOD-SIGACT-SIGAI SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, pp 195-210, 2016. (DOI).
  10. Stateless model checking for POWER. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Bengt Jonsson, and Carl Leonardsson. In Computer Aided Verification: Part II, volume 9780 of Lecture Notes in Computer Science, pp 134-156, Springer, 2016. (DOI).
  11. The benefits of duality in verifying concurrent programs under TSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmed Bouajjani, and Tuan Phong Ngo. In 27th International Conference on Concurrency Theory: CONCUR 2016, volume 59 of Leibniz International Proceedings in Informatics (LIPIcs), pp 5:1-15, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2016. (DOI, Fulltext, External link).
  12. Verification of heap manipulating programs with ordered data by extended forest automata. Parosh Aziz Abdulla, Lukás Holík, Bengt Jonsson, Ondrej Lengál, Cong Quy Trinh, and Tomás Vojnar. In Acta Informatica, volume 53, number 4, pp 357-385, 2016. (DOI).
  13. Improving performance by monitoring while maintaining worst-case guarantees. Syed Md Jakaria Abdullah, Kai Lampka, and Wang Yi. In Proc. 19th Conference on Design, Automation and Test in Europe, pp 257-260, IEEE, Piscataway, NJ, 2016.
  14. Internet of Things for smart cities: Interoperability and open data. Bengt Ahlgren, Markus Hidell, and Edith C.-H. Ngai. In IEEE Internet Computing, volume 20, number 6, pp 52-56, 2016. (DOI).
  15. Bounds on the lifetime of wireless sensor networks with lossy links and directional antennas. Juan M. Alonso, Amanda Nordhamn, Simon Olofsson, and Thiemo Voigt. In Wireless Network Performance Enhancement via Directional Antennas: Models, Protocols, and Systems, pp 329-361, CRC Press, Boca Raton, FL, 2016. (DOI).
  16. Design and implementation of a demonstrator for a Bluetooth Low Energy based fleet service system for hand-held gardening and forestry products. Nordhamn Amanda. Student thesis, supervisor: Anders Mattsson, examiner: Tomas Nyberg, Thiemo Voigt, UPTEC F nr 16057, 2016. (fulltext).
  17. Multi-domain alias matching using machine learning. Michael Ashcroft, Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 3rd European Network Intelligence Conference, pp 77-84, IEEE, 2016. (DOI, fulltext:postprint).
  18. Acceleration in Multi-PushDown Systems. Mohamed Faouzi Atig, K. Narayan Kumar, and Prakash Saivasan. In Tools and Algorithms for the Construction and Analysis of Systems, volume 9636 of Lecture Notes in Computer Science, pp 698-714, Springer, 2016. (DOI).
  19. The complexity of regular abstractions of one-counter languages. Mohamed Faouzi Atig, Dmitry Chistikov, Piotr Hofman, K. Narayan Kumar, Prakash Saivasan, and Georg Zetzsche. In Proceedings Of The 31St Annual ACM-IEEE Symposium On Logic In Computer Science (LICS 2016), pp 207-216, 2016. (DOI).
  20. Algebraic polynomial-based synthesis for abstract Boolean network analysis. Peter Backeman, Sara-Jane Dunn, Boyan Yordanov, and Christoph M. Wintersteiger. In Satisfiability Modulo Theories: SMT 2016, volume 1617 of CEUR Workshop Proceedings, pp 41-50, RWTH Aachen University, 2016. (Fulltext).
  21. New techniques for handling quantifiers in Boolean and first-order logic. Peter Backeman. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2016-012, Uppsala University, 2016. (fulltext).
  22. Fusion: Coalesced Confidential Storage and Communication Framework for the IoT. Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig, and Thiemo Voigt. In Security and Communication Networks, volume 9, number 15, pp 2656-2673, 2016. (DOI).
  23. AutoDietary: A wearable acoustic sensor system for food intake recognition in daily life. Yin Bi, Mingsong Lv, Chen Song, Wenyao Xu, Nan Guan, and Wang Yi. In IEEE Sensors Journal, volume 16, number 3, pp 806-816, 2016. (DOI, Fulltext).
  24. Multi-feature fusion for thermal face recognition. Yin Bi, Mingsong Lv, Yangjie Wei, Nan Guan, and Wang Yi. In Infrared physics & technology, volume 77, pp 366-374, 2016. (DOI).
  25. Industrial Evaluation of Test Suite Generation Strategies for Model-Based Testing. Johan Blom, Bengt Jonsson, and Sven-Olof Nyström. In , 2016. (DOI).
  26. Model-Based Protocol Testing in an Erlang Environment. Johan Blom. Ph.D. thesis, Uppsala Dissertations from the Faculty of Science and Technology nr 122, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  27. Do LoRa Low-Power Wide-Area Networks Scale?. Martin Bor, Utz Roedig, Thiemo Voigt, and Juan Alonso. In , 2016. (fulltext:print).
  28. Protocol, mobility and adversary models for the verification of security. Volkan Cambazoglu. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2016-007, Uppsala University, 2016. (fulltext).
  29. Augmenting IoT networks with backscatter-enabled passive sensor tags. Perez Penichet Carlos, Frederik Hermans, Ambuj Varshney, and Thiemo Voigt. In Proceedings of the 3rd Workshop on Hot Topics in Wireless, pp 23-27, 2016. (DOI, fulltext:postprint).
  30. Active learning for extended finite state machines. Sofia Cassel, Falk Howar, Bengt Jonsson, and Bernhard Steffen. In Formal Aspects of Computing, volume 28, number 2, pp 233-263, 2016. (DOI).
  31. Characterizing Task Scheduling Performance Based on Data Reuse. Germán Ceballos, Thomas Grass, David Black-Schaffer, and Andra Hugo. In Proc. 9th Nordic Workshop on Multi-Core Computing, 2016. (fulltext:print).
  32. Formalizing data locality in task parallel applications. Germán Ceballos, Erik Hagersten, and David Black-Schaffer. In Algorithms and Architectures for Parallel Processing, volume 10049 of Lecture Notes in Computer Science, pp 43-61, Springer, 2016. (DOI).
  33. Spatial and Temporal Cache Sharing Analysis in Tasks. Germán Ceballos and David Black-Schaffer. In , Timisoara, Romania, 2016. (Proceedings, fulltext:print).
  34. A framework for writing learning agreements. Tony Clear, Roger McDermott, Elin Parsjö, Åsa Cajander, Mats Daniels, and Nanna Lagerqvist. In Proc. 46th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2016. (DOI).
  35. Challenges and recommendations for the design and conduct of global software engineering courses: A systematic review. Tony Clear, Sarah Beecham, John Barr, Mats Daniels, Roger McDermott, Michael Oudshoorn, Airina Savickaite, and John Noll. In Proceedings of The 2015 Iticse Conference on Working Group Reports (Iticse-Wgp'15), pp 1-39, ACM Press, New York, 2016. (DOI).
  36. Developments in Global Software Engineering Education. Tony Clear, Sarah Beecham, John Barr, Mats Daniels, Michael Oudshoorn, and John Noll. In 2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), Frontiers in Education Conference, 2016. (DOI).
  37. Professional Competencies for Real?: A Question about Identity!. Mats Daniels. In ITiCSE '16 Proceedings of the 2016 ACM Conference in Innovation and Technology in Computer Science Education, ACM Digital Library, 2016. (DOI).
  38. Poster Abstract: LocaLight - A Battery-free PassiveLocalization System Using Visible Light. Elena Di Lascio, Ambuj Varshney, Voigt Thiemo, and Carlos Pérez-Penichet. In , 2016.
  39. Schedulability analysis of a graph-based task model for mixed-criticality systems. Pontus Ekberg and Wang Yi. In Real-time systems, volume 52, number 1, pp 1-37, 2016. (DOI).
  40. Reliability in co-located 802.15.4 personal area networks. Laura Marie Feeney and Viktoria Fodor. In , pp 5-10, ACM Press, New York, 2016. (DOI).
  41. Towards a better battery model for INET. Laura Marie Feeney. In , 2016.
  42. Measuring online affects in a white supremacy forum. Léo Figea, Lisa Kaati, and Ryan Scrivens. In Proc. 14th International Conference on Intelligence and Security Informatics, pp 85-90, IEEE, 2016. (DOI).
  43. An Online Overclocking Scheme for Bursty Real-time Tasks and an Evaluation of its Thermal Impact. Bjoern Forsberg, Kai Lampka, and Vasileios Spiliopoulos. In 14Th ACM/IEEE Symposium On Embedded Systems For Real-Time Multimedia (ESTIMEDIA 2016), pp 104-113, 2016. (DOI).
  44. Preface, Electronic Proceedings in Theoretical Computer Science. Vol 219. John Gallagher and Philipp Rümmer. In Electronic Proceedings in Theoretical Computer Science, number 219, OPEN PUBL ASSOC, 2016.
  45. Transforming real-time task graphs to improve schedulability. Chuancai Gu, Nan Guan, Zhiwei Feng, Qingxu Deng, Xiaobo Sharon Hu, and Wang Yi. In Proc. 22nd International Conference on Embedded and Real-Time Computing Systems and Applications, pp 29-38, IEEE Computer Society, 2016. (DOI).
  46. Cloud-assisted data fusion and sensor selection for Internet of Things. Farshid Hassani Bijarbooneh, Wei Du, Edith C.-H. Ngai, Xiaoming Fu, and Jiangchuan Liu. In IEEE Internet of Things Journal, volume 3, number 3, pp 257-268, 2016. (DOI).
  47. Pointer Race Freedom. Frédéric Haziza, Lukás Holík, Roland Meyer, and Sebastian Wolff. In Verification, Model Checking, And Abstract Interpretation, VMCAI 2016, volume 9583 of Lecture Notes in Computer Science, pp 393-412, Springer, 2016. (DOI).
  48. Arpeggio: a penetration attack on glossy networks. Zhitao He, Kasun Hewage, and Thiemo Voigt. In Proc. 13th International Conference on Sensing, Communication, and Networking, pp 37-45, IEEE, 2016. (DOI).
  49. FOCUS: Robust visual codes for everyone. Frederik Hermans, Liam McNamara, Gábor Sörös, Christian Rohner, Thiemo Voigt, and Edith Ngai. In Proc. 14th International Conference on Mobile Systems, Applications, and Services, pp 319-332, ACM Press, New York, 2016. (DOI).
  50. Towards a secure synchronous communication architecture for low-power wireless networks. Kasun Hewage. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2016-004, Uppsala University, 2016. (fulltext).
  51. modBulb: a modular light bulb for visible light communication. Kasun Hewage, Ambuj Varshney, Abdalah Hilmia, and Thiemo Voigt. In , pp 13-18, ACM Digital Library, New York, 2016. (DOI).
  52. Poster Abstract:BouKey: Location-Based Key Sharing Using Visible LightCommunication. Abdalah Hilmia, Kasun Hewage, Ambuj Varshney, Christian Rohner, and Thiemo Voigt. In , 2016.
  53. Optimizing Horn Solvers for Network Repair. Hossein Hojjat, Philipp Rümmer, Jedidiah McClurg, Pavol Cerny, and Nate Foster. In Proceedings of the 2016 16Th Conference on Formal Methods In Computer-Aided Design (FMCAD 2016), pp 73-80, IEEE, 2016.
  54. Patients reading their medical records: Differences in experiences and attitudes between regular and inexperienced readers. Isto Huvila, Mats Daniels, Åsa Cajander, and Rose-Mharie Åhlfeldt. In Information research, volume 21, number 1, 2016. (Article).
  55. Concise Loads and Stores: The Case for an Asymmetric Compute-Memory Architecture for Approximation. Animesh Jain, Parker Hill, Shih-Chieh Lin, Muneeb Khan, Md E. Haque, Michael A. Laurenzano, Scott Mahlke, Lingjia Tang, and Jason Mars. In 2016 49Th Annual IEEE/ACM International Symposium On Microarchitecture (MICRO), International Symposium on Microarchitecture Proceedings, 2016.
  56. Partitioning GPUs for Improved Scalability. Johan Janzén, David Black-Schaffer, and Andra Hugo. In Proc. 28th International Symposium on Computer Architecture and High Performance Computing, International Symposium on Computer Architecture and High Performance Computing, pp 42-49, IEEE Computer Society, 2016. (DOI).
  57. Aligning quality assurance at the course unit and educational program levels. Björn Þór Jónsson, Marta Kristín Lárusdóttir, Mats Daniels, Alison Clear, Tony Clear, and Roger McDermott. In Proc. 46th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2016. (DOI).
  58. Automatic detection of xenophobic narratives: A case study on Swedish alternative media. Lisa Kaati, Amendra Shrestha, Katie Cohen, and Sinna Lindquist. In Proc. 14th International Conference on Intelligence and Security Informatics, pp 121-126, IEEE, 2016. (DOI).
  59. Countering lone actor terrorism: Weak signals and online activities. Lisa Kaati and Fredrik Johansson. In Understanding Lone Actor Terrorism: Past experience, future outlook, and response strategies, pp 266-279, Routledge, Abingdon, UK, 2016. (DOI).
  60. Identifying Warning Behaviors of Violent Lone Offenders in Written Communication. Lisa Kaati, Amendra Shrestha, and Tony Sardella. In 2016 IEEE 16Th International Conference On Data Mining Workshops (ICDMW), International Conference on Data Mining Workshops, pp 1053-1060, IEEE, New York, 2016. (DOI).
  61. Identifying warning behaviors of violent lone offenders in written communication. Lisa Kaati, Amendra Shrestha, and Tony Sardella. In Proc. 16th ICDM Workshops, pp 1053-1060, IEEE Computer Society, 2016. (DOI, fulltext:postprint).
  62. Linguistic analysis of lone offender manifestos. Lisa Kaati, Amendra Shrestha, and Katie Cohen. In Proc. 4th International Conference on Cybercrime and Computer Forensics, IEEE, 2016. (DOI).
  63. Semantic technologies for detecting names of new drugs on darknets. Lisa Kaati, Fredrik Johansson, and Elinor Forsman. In Proc. 4th International Conference on Cybercrime and Computer Forensics, IEEE, 2016. (DOI).
  64. JayHorn: A framework for verifying Java programs. Temesghen Kahsai, Philipp Rümmer, Huascar Sanchez, and Martin Schäf. In Computer Aided Verification: Part I, volume 9779 of Lecture Notes in Computer Science, pp 352-358, Springer, 2016. (DOI, fulltext:postprint).
  65. Optimizing Performance in Highly Utilized Multicores with Intelligent Prefetching. Muneeb Khan. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1335, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  66. Building Heterogeneous Unified Virtual Memories (UVMs) without the Overhead. Konstantinos Koukos, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In ACM Transactions on Architecture and Code Optimization (TACO), volume 13, number 1, 2016. (DOI, fulltext:preprint).
  67. Efficient Execution Paradigms for Parallel Heterogeneous Architectures. Konstantinos Koukos. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1405, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  68. Multiversioned decoupled access-execute: The key to energy-efficient compilation of general-purpose programs. Konstantinos Koukos, Per Ekemark, Georgios Zacharopoulos, Vasileios Spiliopoulos, Stefanos Kaxiras, and Alexandra Jimborean. In Proc. 25th International Conference on Compiler Construction, pp 121-131, ACM Press, New York, 2016. (DOI, fulltext:print).
  69. Achieving Efficiency Without Sacrificing Model Accuracy: Network Calculus on Compact Domains. Kai Lampka, Steffen Bondorf, and Jens Schmitt. In 2016 IEEE 24Th International Symposium On Modeling, Analysis And Simulation Of Computer And Telecommunication Systems (MASCOTS), International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems Proceedings, pp 313-318, 2016. (DOI).
  70. Keep it cool and in time: With runtime monitoring to thermal-aware execution speeds for deadline constrained systems. Kai Lampka, Björn Forsberg, and Vasileios Spiliopoulos. In Journal of Parallel and Distributed Computing, volume 95, pp 79-91, 2016. (DOI).
  71. Keep it slow and in time: Online DVFS with hard real-time workloads. Kai Lampka and Björn Forsberg. In Proc. 19th Conference on Design, Automation and Test in Europe, Design, Automation, and Test in Europe Conference and Exhibition, pp 385-390, IEEE, Piscataway, NJ, 2016.
  72. Resolving contention for networks-on-chips: Combining time-triggered application scheduling with dynamic budgeting of memory bus use. Kai Lampka and Adam Lackorzynski. In Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, volume 9629 of Lecture Notes in Computer Science, pp 137-152, Springer, 2016. (DOI).
  73. Verification of Software under Relaxed Memory. Carl Leonardsson. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1387, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  74. Guiding Craig interpolation with domain-specific abstractions. Jérôme Leroux, Philipp Rümmer, and Pavle Subotic. In Acta Informatica, volume 53, number 4, pp 387-424, 2016. (DOI, fulltext:postprint).
  75. Editorial for QShine 2014 Special Issue. Victor C. M. Leung, Jiangchuan Liu, Edith Ngai, Jianping Pan, and Thanos Stouraitis. In Mobile Networks and Applications, volume 21, number 3, pp 387-389, 2016. (DOI).
  76. Modeling and verification of dynamic command scheduling for real-time memory controllers. Yonghui Li, Benny Åkesson, Kai Lampka, and Kees Goossens. In 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), IEEE Real-Time and Embedded Technology and Applications Symposium, IEEE Computer Society, 2016.
  77. Liveness of randomised parameterised systems under arbitrary schedulers. Anthony W. Lin and Philipp Rümmer. In Computer Aided Verification: Part II, volume 9780 of Lecture Notes in Computer Science, pp 112-133, Springer, 2016. (DOI, fulltext:postprint).
  78. Regular Symmetry Patterns. Anthony W. Lin, Truong Khanh Nguyen, Philipp Rümmer, and Jun Sun. In Verification, Model Checking, and Abstract Interpretation, volume 9583 of Lecture Notes in Computer Science, pp 455-475, Springer Berlin/Heidelberg, 2016. (DOI, fulltext:postprint).
  79. Special Issue on Cloud Computing for IoT. Chuang Lin, Kadangode K. Ramakrishnan, Jiangchuan Liu, and Edith Ngai. In IEEE Internet of Things Journal, volume 3, number 3, pp 254-256, 2016. (DOI).
  80. Students envisioning the future. Thomas Lind, Åsa Cajander, Bengt Sandblad, Mats Daniels, Marta Lárusdóttir, Roger McDermott, and Tony Clear. In Proc. 46th ASEE/IEEE Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2016. (DOI).
  81. EDF-VD scheduling of mixed-criticality systems with degraded quality guarantees. Di Liu, Jelena Spasic, Nan Guan, Gang Chen, Songran Liu, Todor Stefanov, and Wang Yi. In Proc. 37th Real-Time Systems Symposium, pp 35-46, IEEE Computer Society, 2016. (DOI).
  82. A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard. Qiang Liu, Xiping Hu, Edith Ngai, Min Liang, Victor C. M. Leung, Zhiping Cai, and Jianping Yin. In IEEE Network, volume 30, number 5, pp 26-34, 2016. (DOI).
  83. Data modelling with Gaussian process in sensor networks for urban environmental monitoring. Xiuming Liu, Teng Xi, and Edith Ngai. In Proc. 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp 457-462, IEEE Computer Society, 2016. (DOI).
  84. UrbanSense: An Urban-Scale Sensing Platform for the Internet of Things. Yunior Luis, Pedro M. Santos, Tiago Lourenco, Carlos Pérez-Penichet, Tania Calcada, and Ana Aguiar. In IEEE Second International Smart Cities Conference (ISC2 2016), pp 763-768, 2016.
  85. A survey on static cache analysis for real-time systems. Mingsong Lv, Nan Guan, Jan Reineke, Reinhard Wilhelm, and Wang Yi. In Leibniz Transactions on Embedded Systems, volume 3, number 1, pp 05:1-48, 2016. (DOI, Fulltext).
  86. Speed planning for solar-powered electric vehicles. Mingsong Lv, Nan Guan, Ye Ma, Dong Ji, Erwin Knippel, Xue Liu, and Wang Yi. In Proc. 17th International Conference on Future Energy Systems, ACM Press, New York, 2016. (DOI).
  87. Motivation, optimal experience and flow in first year computing science. Roger McDermott, Mark Zarb, Mats Daniels, Åsa Cajander, and Tony Clear. In Proc. 21st Conference on Innovation and Technology in Computer Science Education, pp 206-211, ACM Press, New York, 2016. (DOI).
  88. Predictable MAC-level Performance in Low-power Wireless under Interference. Mathieu Michel, Thiemo Voigt, Nicolas Tsiftes, Luca Mottola, and Bruno Quoitin. In , 2016. (fulltext:print).
  89. Modeling and analysis of data flow graphs using the digraph real-time task model. Morteza Mohaqeqi, Jakaria Abdullah, and Wang Yi. In Reliable Software Technologies — Ada-Europe 2016, volume 9695 of Lecture Notes in Computer Science, pp 15-29, Springer, 2016. (DOI).
  90. On fixed-priority schedulability analysis of sporadic tasks with self-suspension. Morteza Mohaqeqi, Pontus Ekberg, and Wang Yi. In Proc. 24th International Conference on Real-Time Networks and Systems, pp 109-118, ACM Press, New York, 2016. (DOI).
  91. On the problem of finding optimal harmonic periods. Morteza Mohaqeqi, Mitra Nasri, Yang Xu, Anton Cervin, and Karl-Erik Årzén. In Proc. 24th International Conference on Real-Time Networks and Systems, pp 171-180, ACM Press, New York, 2016. (DOI).
  92. Schedulability analysis of synchronous digraph real-time tasks. Morteza Mohaqeqi, Jakaria Abdullah, Nan Guan, and Wang Yi. In Proc. 28th Euromicro Conference on Real-Time Systems, pp 176-186, IEEE Computer Society, 2016. (DOI).
  93. Sound test-suites for cyber-physical systems. Morteza Mohaqeqi and Mohammad Reza Mousavi. In Proc. 10th International Symposium on Theoretical Aspects of Software Engineering, pp 42-48, IEEE Computer Society, 2016. (DOI).
  94. Towards an approximate conformance relation for hybrid I/O automata. Morteza Mohaqeqi and Mohammad Reza Mousavi. In Proc. 1st Workshop on Verification and Validation of Cyber-Physical Systems, volume 232 of Electronic Proceedings in Theoretical Computer Science, pp 53-64, Open Publishing Association, 2016. (DOI, Fulltext).
  95. Practical way halting by speculatively accessing halt tags. Daniel Moreau, Alen Bardizbanyan, Magnus Själander, David Whalley, and Per Larsson-Edefors. In Proc. 19th Conference on Design, Automation and Test in Europe, pp 1375-1380, IEEE, Piscataway, NJ, 2016.
  96. Quantifying the effect of period ratios on schedulability of rate monotonic. Mitra Nasri, Morteza Mohaqeqi, and Gerhard Fohler. In Proc. 24th International Conference on Real-Time Networks and Systems, pp 161-170, ACM Press, New York, 2016. (DOI).
  97. Multiprocessor Real-Time Locking Protocols for Replicated Resources. Catherine E. Nemitz, Kecheng Yang, Ming Yang, Pontus Ekberg, and James H. Anderson. In Proc. 28th Euromicro Conference on Real-Time Systems (ECRTS), Proceedings of the Euromicro Conference on Real-time Systems, pp 50-60, 2016. (DOI).
  98. On providing sink anonymity for wireless sensor networks. Edith C.-H. Ngai. In Security and Communication Networks, volume 9, number 2, pp 77-86, 2016. (DOI).
  99. Personalized Mobile-Assisted Smart Transportation. Edith C.-H. Ngai, Stephan Brandauer, Amendra Shrestha, and Konstantinos Vandikas. In 2016 Digital Media Industry And Academic Forum (DMIAF), pp 158-160, 2016.
  100. CoolSim: Statistical Techniques to Replace Cache Warming with Efficient, Virtualized Profiling. Nikos Nikoleris, Andreas Sandberg, Erik Hagersten, and Trevor E. Carlson. In Proceedings Of 2016 International Conference On Embedded Computer Systems: Architectures, Modeling And Simulation (Samos), pp 106-115, IEEE, 2016.
  101. CoolSim: Eliminating Traditional Cache Warming with Fast, Virtualized Profiling. Nikos Nikoleris, Andreas Sandberg, Erik Hagersten, and Trevor E. Carlson. In 2016 IEEE International Symposium On Performance Analysis Of Systems And Software ISPASS 2016, IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 149-150, 2016.
  102. Ph.D. Forum Abstract: Increasing Robustness in WSN using Software Defined Network Architecture. Charalampos Orfanidis. In 2016 15Th ACM/IEEE International Conference On Information Processing In Sensor Networks (IPSN), 2016.
  103. Performance Modeling of Multi-core Systems: Caches and Locks. Xiaoyue Pan. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1336, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  104. A Comparative Study of GPUVerify and GKLEE. Anmol Panda, Philipp Rümmer, and Neena Goveas. In 2016 Fourth International Conference On Parallel, Distributed And Grid Computing (PDGC), pp 112-117, IEEE, 2016. (DOI).
  105. A critical analysis of trends in student-centric engineering education and their implications for learning. Arnold Pears, Aletta Nylén, and Mats Daniels. In Proc. 46th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, IEEE Press, Piscataway, NJ, 2016. (DOI).
  106. Demo: Passive Sensor Tags. Carlos Perez Penichet, Frederik Hermans, Ambuj Varshney, and Thiemo Voigt. In Mobicom'16: Proceedings Of The 22Nd Annual International Conference On Mobile Computing And Networking, pp 477-478, 2016. (DOI, fulltext:postprint).
  107. BLE and IEEE 802.15.4 in the IoT: Evaluation and Interoperability Considerations. Narenda PrithviRaj, Simon Duquennoy, and Thiemo Voigt. In Internet Of Things: IOT Infrastructures, IOT 360, Pt II, Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, pp 427-438, 2016. (DOI).
  108. Do Multiple Bits per Symbol Increase the Throughput of Ambient Backscatter Communications?. Carlos Pérez-Penichet, Ambuj Varshney, Frederik Hermans, Christian Rohner, and Thiemo Voigt. In EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, pp 355-360, 2016. (fulltext:postprint).
  109. Ph.D. Forum Abstract: Ambient Backscatter Communication. Carlos Pérez-Penichet. In 2016 15Th ACM/IEEE International Conference On Information Processing In Sensor Networks (IPSN), 2016.
  110. 3DinSAR: Object 3D Localization for Indoor RFID Applications. Lanxin Qiu, Zhuangqin Huang, Niklas Wirström, and Thiemo Voigt. In IEEE RFID, pp 191-198, 2016.
  111. A hybrid static–dynamic classification for dual-consistency cache coherence. Alberto Ros and Alexandra Jimborean. In IEEE Transactions on Parallel and Distributed Systems, volume 27, number 11, pp 3101-3115, 2016. (DOI).
  112. Efficient Self-Invalidation/Self-Downgrade for Critical Sections with Relaxed Semantics. Alberto Ros, Carl Leonardsson, Christos Sakalis, and Stefanos Kaxiras. In Proc. International Conference on Parallel Architectures and Compilation: PACT 2016, pp 433-434, ACM Press, New York, 2016. (DOI).
  113. Racer: TSO Consistency via Race Detection. Alberto Ros and Stefanos Kaxiras. In 2016 49Th Annual IEEE/ACM International Symposium On Microarchitecture (MICRO), International Symposium on Microarchitecture Proceedings, 2016.
  114. Characterization of simulation by probabilistic testing. Philipp Rümmer and Wang Yi. In Theory and Practice of Formal Methods, volume 9660 of Lecture Notes in Computer Science, pp 360-372, Springer, 2016. (DOI).
  115. Splash-3: A properly synchronized benchmark suite for contemporary research. Christos Sakalis, Carl Leonardsson, Stefanos Kaxiras, and Alberto Ros. In Proc. International Symposium on Performance Analysis of Systems and Software: ISPASS 2016, pp 101-111, IEEE Computer Society, 2016. (DOI).
  116. Redesigning a tagless access buffer to require minimal ISA changes. Carlos Sanchez, Peter Gavin, Daniel Moreau, Magnus Själander, David Whalley, Per Larsson-Edefors, and Sally A. McKee. In Proc. 19th International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 2016. (DOI).
  117. Data placement across the cache hierarchy: Minimizing data movement with reuse-aware placement. Andreas Sembrant, Erik Hagersten, and David Black-Schaffer. In Proc. 34th International Conference on Computer Design, Proceedings IEEE International Conference on Computer Design, pp 117-124, IEEE, Piscataway, NJ, 2016. (DOI).
  118. Hiding and Reducing Memory Latency: Energy-Efficient Pipeline and Memory System Techniques. Andreas Sembrant. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1450, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  119. Techniques for modulating error resilience in emerging multi-value technologies. Magnus Själander, Gustaf Borgström, Mykhailo V. Klymenko, Françoise Remacle, and Stefanos Kaxiras. In Proc. 13th International Conference on Computing Frontiers, pp 55-63, ACM Press, New York, 2016. (DOI, fulltext:postprint).
  120. A unified DVFS-cache resizing framework. Vasileios Spiliopoulos, Andreas Sembrant, Georgios Keramidas, Erik Hagersten, and Stefanos Kaxiras. Technical report / Department of Information Technology, Uppsala University nr 2016-014, 2016. (fulltext).
  121. Improving Energy-Efficiency of Multicores using First-Order Modeling. Vasileios Spiliopoulos. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1404, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  122. Feasibility of fork-join real-time task graph models: Hardness and algorithms. Jinghao Sun, Nan Guan, Yang Wang, Qingxu Deng, Peng Zeng, and Wang Yi. In ACM Transactions on Embedded Computing Systems, volume 15, number 1, 2016. (DOI).
  123. Learning Computer Science: Dimensions of variation within <em>what</em> Chinese students learn. Neena Thota and Anders Berglund. In ACM Transactions on Computing Education, volume 16, number 3, 2016. (DOI).
  124. Software Out-of-Order Execution for In-Order Architectures. Kim-Anh Tran. In Proc. 25th International Conference on Parallel Architectures and Compilation Techniques, pp 458-458, ACM Press, New York, 2016. (DOI, fulltext:print).
  125. Storage-Centric System Architectures for Networked, Resource-Constrained Devices. Nicolas Tsiftes. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1331, SICS Dissertation Series nr 74, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  126. A Survey on Mobile Sensing Based Mood-Fatigue Detection for Drivers. Wei Tu, Lei Wei, Wenyan Hu, Zhengguo Sheng, Hasen Nicanfar, Xiping Hu, Edith C.-H. Ngai, and Victor C. M. Leung. In SMART CITY 360, volume 166 of Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, pp 3-15, SPRINGER INT PUBLISHING AG, 2016. (DOI).
  127. Analytical Processor Performance and Power Modeling Using Micro-Architecture Independent Characteristics. Sam Van den Steen, Stijn Eyerman, Sander De Pestel, Moncef Mechri, Trevor E. Carlson, David Black-Schaffer, Erik Hagersten, and Lieven Eeckhout. In IEEE Transactions on Computers, volume 65, number 12, pp 3537-3551, 2016. (DOI).
  128. Approximation: A New Paradigm also for Wireless Sensing. Thiemo Voigt, Magnus Själander, Frederik Hermans, Alexandra Jimborean, Erik Hagersten, Per Gunningberg, and Stefanos Kaxiras. In , 2016.
  129. Academics' Experience of Teaching Open Ended Group Projects A phenomenographic study. Marianne Voogt, Chuan Sheng Chen, and Neena Thota. In 2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), Frontiers in Education Conference, 2016. (DOI).
  130. Profiling-Assisted Decoupled Access-Execute. Jonatan Waern, Per Ekemark, Konstantinos Koukos, Stefanos Kaxiras, and Alexandra Jimborean. In Proc. 4th International Workshop on High Performance Energy Efficient Embedded Systems, 2016. (External link).
  131. Energy-efficient collaborative outdoor localization for participatory sensing. Wendong Wang, Teng Xi, Edith C.-H. Ngai, and Zheng Song. In Sensors, volume 16, number 6, 2016. (DOI, Fulltext, fulltext:print).
  132. Dynamic blind source separation based on source-direction prediction. Yangjie Wei and Wang Yi. In Neurocomputing, volume 185, pp 73-81, 2016. (DOI).
  133. A Node-Link Perspective on the Impact of Local Conditions in Sensor Networks. Hjalmar Wennerström. Ph.D. thesis, Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology nr 1398, Acta Universitatis Upsaliensis, Uppsala, 2016. (fulltext, preview image).
  134. Towards even coverage monitoring with opportunistic sensor networks. Hjalmar Wennerström and Christian Rohner. In Proc. 11th ACM MobiCom Workshop on Challenged Networks, pp 81-86, ACM Press, New York, 2016. (DOI).
  135. Approximations and abstractions for reasoning about machine arithmetic. Aleksandar Zeljic. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2016-010, Uppsala University, 2016. (fulltext).
  136. Deciding bit-vector formulas with mcSAT. Aleksandar Zeljic, Christoph M. Wintersteiger, and Philipp Rümmer. In Theory and Applications of Satisfiability Testing: SAT 2016, volume 9710 of Lecture Notes in Computer Science, pp 249-266, Springer, 2016. (DOI).
  137. Dependency-Aware Caching for HTTP Adaptive Streaming. Cong Zhang, Jiangchuan Liu, Fei Chen, Yong Cui, and Edith C.-H. Ngai. In 2016 Digital Media Industry And Academic Forum (DMIAF), pp 89-93, 2016.
  138. Start time configuration for strictly periodic real-time task systems. Tianyu Zhang, Nan Guan, Qingxu Deng, and Wang Yi. In Journal of systems architecture, volume 66–67, pp 61-68, 2016. (DOI).
  139. A dynamic graph-based scheduling and interference coordination approach in heterogeneous cellular networks. Li Zhou, Xiping Hu, Edith C.-H. Ngai, Haitao Zhao, Shan Wang, Jibo Wei, and Victor C. M. Leung. In IEEE Transactions on Vehicular Technology, volume 65, number 5, pp 3735-3748, 2016. (DOI).

Updated  2016-12-09 16:36:40 by Peter Waites.