Skip to main content

Publications

Here is the 50 latest publications at Department of Computer Science.

Below you will find the 50 latest publications at Department of Computer Science,
for a complete list use the link to DiVA .

Publications CS

[1]
L. Zhang et al., "Maximizing Error Injection Realism for Chaos Engineering with System Calls," IEEE Transactions on Dependable and Secure Computing, 2021.
[2]
J. M. Barros da Silva Jr. et al., "Smart Antenna Assignment is Essential in Full-Duplex Communications," IEEE Transactions on Communications, 2021.
[3]
T. Lindeberg, "Scale selection," in Computer Vision, 2nd ed. : Springer, 2021.
[4]
K. Zhang and P. Papadimitratos, "Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers," IEEE Open Journal of the Communications Society, vol. 2, pp. 217-234, 2021.
[5]
G. Chen et al., "NeuroAED : Towards Efficient Abnormal Event Detection in Visual Surveillance With Neuromorphic Vision Sensor," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 923-936, 2021.
[6]
X. Zhao and P. Haller, "Consistency types for replicated data in a higher-order distributed programming language," The Art, Science, and Engineering of Programming, vol. 5, no. 2, 2021.
[7]
N. Jansson, "Spectral Element Simulations on the NEC SX-Aurora TSUBASA," in HPC Asia 2021: The International Conference on High Performance Computing in Asia-Pacific Region, 2021.
[8]
H. Ye et al., "A comprehensive study of automatic program repair on the QuixBugs benchmark," Journal of Systems and Software, vol. 171, 2021.
[9]
T. Lindeberg, "Normative theory of visual receptive fields," Heliyon, vol. 7, no. 1, pp. e05897-1-e05897-20, 2021.
[10]
M. Shcherbakov and M. Balliu, "SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web," in Proceedings of the Network and Distributed System Security Symposium (NDSS 2021), 2021.
[11]
Y. Jansson and T. Lindeberg, "Exploring the ability of CNNs to generalise to previously unseen scales over wide scale ranges," in 2020 25th International Conference on Pattern Recognition (ICPR), 2021, pp. 1181-1188.
[12]
Z. T. Kefato et al., "Dynamic Embeddings for Interaction Prediction," in The Web Conference 2021, 2021.
[13]
R. Guanciale and E. Tuosto, "PomCho : Atool chain for choreographic design," Science of Computer Programming, vol. 202, 2021.
[14]
O. T. Demir and E. Björnson, "The Bussgang Decomposition of Nonlinear Systems : Basic Theory and MIMO Extensions [Lecture Notes]," IEEE signal processing magazine (Print), vol. 38, no. 1, pp. 131-136, 2021.
[15]
X. Zhao, "Language-based Approaches to Safe and Efficient Distributed Programming," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:6, 2021.
[16]
A. Farshin et al., "PacketMill: Toward Per-Core 100-Gbps Networking," in Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS ’21), April 19–23, 2021, Virtual, USA., 2021.
[17]
W.-H. Lee, J.-H. Lee and K. W. Sung, "Geometric Sequence Decomposition With k-Simplexes Transform," IEEE Transactions on Communications, vol. 69, no. 1, pp. 94-107, 2021.
[18]
P. Rozenshtein, N. Tatti and A. Gionis, "The network-untangling problem : from interactions to activity timelines," Data mining and knowledge discovery, vol. 35, no. 1, pp. 213-247, 2021.
[22]
T. Lindeberg, "Scale-covariant and scale-invariant Gaussian derivative networks," in Scale Space and Variational Methods in Computer Vision, 2021, pp. 3-14.
[24]
J. M. Barros da Silva Jr. et al., "Full-Duplex and Dynamic-TDD: Pushing the Limits of Spectrum Reuse in Multi-Cell Communications," IEEE wireless communications, vol. 28, no. 1, pp. 44-50, 2021.
[25]
[27]
P. Zhao, "Resilient Resource Allocation for Service Placement in Mobile Edge Clouds," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:20, 2021.
[28]
W.-H. Lee, M. Ozger and U. Challita, "Geometric Sequential Learning Dynamics," IEEE Communications Letters, vol. 25, no. 2, pp. 542-545, 2021.
[29]
J. Kang et al., "Optimizing the mmWave Channel Estimation Duration by Rate Prediction," IEEE Communications Letters, vol. 25, no. 2, pp. 555-559, 2021.
[30]
A. Yala et al., "Toward robust mammography-based models for breast cancer risk," Science Translational Medicine, vol. 13, no. 578, 2021.
[31]
M. Khodaei and P. Papadimitratos, "Cooperative Location Privacy in Vehicular Networks : Why Simple Mix-zones are not Enough," IEEE Internet of Things Journal, pp. 1-1, 2021.
[32]
D. Lundén, J. Borgström and D. Broman, "Correctness of Sequential Monte Carlo Inference for Probabilistic Programming Languages," in Programming Languages and Systems, 2021, pp. 404-431.
[33]
O. Bälter, R. Glassey and M. Wiggberg, "Reduced Learning Time with Maintained Learning Outcomes," in Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, 2021, pp. 660-665.
[34]
L. Giaretta et al., "PDS2: A user-centered decentralized marketplace for privacy preserving data processing," in Third International Workshop on Blockchain and Data Management (BlockDM 2021), in conjunction with the 37th IEEE International Conference on Data Engineering (ICDE), April 19, 2021, Chania, Crete, Greece, 2021.
[35]
H. Ye, M. Martinez and M. Monperrus, "Automated patch assessment for program repair at scale," Journal of Empirical Software Engineering, vol. 26, no. 2, 2021.
[36]
S. Khosravi, "Seamless Millimeter-wave Connectivity via Efficient Beamforming and Handover," Licentiate thesis Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:24, 2021.
[37]
J. Cabrera Arteaga et al., "CROW: Code Diversification for WebAssembly," in MADWeb, NDSS 2021, 2021.
[38]
A. A. Alkathiri et al., "Decentralized Word2Vec Using Gossip Learning," in Proceedings of the 23rd Nordic Conference on Computational Linguistics (NoDaLiDa 2021), 2021.
[39]
I. Zaitsev et al., "Cold ion energization at separatrices during magnetic reconnection," Physics of Plasmas, vol. 28, no. 3, 2021.
[42]
P. Söderman et al., "A Comparative Analysis of Buffer Management Algorithms for Delay Tolerant Wireless Sensor Networks," IEEE Sensors Journal, vol. 21, no. 7, pp. 9612-9619, 2021.
[43]
H. Chen et al., "Coded Stochastic ADMM for Decentralized Consensus Optimization With Edge Computing," IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5360-5373, 2021.
[44]
C. Soto Valero et al., "A comprehensive study of bloated dependencies in the Maven ecosystem," Journal of Empirical Software Engineering, vol. 26, no. 3, 2021.
[45]
W. Xiong, S. Hacks and R. Lagerström, "A Method for Assigning Probability Distributions in Attack Simulation Languages," Complex Systems Informatics and Modeling Quarterly, pp. 55-77, 2021.
[47]
E. Rencelj Ling and M. Ekstedt, "Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language," in Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2021.
[48]
H. Ghasemirahni, "Packet Order Matters! : Improving Application Performance by Deliberately Delaying Packets," Licentiate thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:30, 2021.
[49]
J. van den Brand et al., "Minimum Cost Flows, MDPs, and L1-Regression in Nearly Linear Time for Dense Instances," in Proccedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Rome, Italy, June 21-25, 2021, 2021.
[50]
S. Natarajan, "Programming Language Primitives and Tools for Integrated Real-Time Systems Development," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:32, 2021.
Page responsible:Web editors at EECS
Belongs to: Department of Computer Science
Last changed: Dec 08, 2020