Skip to main content
To KTH's start page

Publications

Link to the full list   in the KTH publication portal.

TCS Publications, 50 latest

[1]
G. Venturin, I. Sarpe and F. Vandin, "Efficient Approximate Temporal Triangle Counting in Streaming with Predictions," in Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 244-262.
[2]
E. Calikus, G. De Francisci Morales and A. Gionis, "Who is at Risk? Analyzing the Risk of Radicalization Among Reddit Users," in Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track and Demo Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 375-392.
[3]
M. Ciaperoni, A. Gionis and H. Mannila, "Sample and Expand: Discovering Low-Rank Submatrices With Quality Guarantees," in Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 78-95.
[4]
J. Spenger, P. Carbone and P. Haller, "Failure-Transparent Actors," in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[5]
G. Badkobeh et al., "Preface," in String Processing and Information Retrieval : 32nd International Symposium, SPIRE 2025, London, UK, September 8–11, 2025, Proceedings, Golnaz Badkobeh, Jakub Radoszewski, Nicola Tonellotto, Ricardo Baeza-Yates Ed., : Springer Science and Business Media Deutschland GmbH, 2026, pp. v-vii.
[6]
E. Ábrahám et al., "Why do women pursue a Ph.D. in Computer Science?," Journal of Systems and Software, vol. 231, 2026.
[7]
P. Austrin, J. Brown-Cohen and J. Håstad, "Optimal Inapproximability with Universal Factor Graphs," ACM Transactions on Algorithms, vol. 21, no. 3, pp. 1-39, 2025.
[8]
M. Sevenhuijsen et al., "Generating Safety-Critical Automotive C-programs using LLMs with Formal Verification," in Proceedings of Machine Learning Research - Conference on Neurosymbolic Learning and Reasoning, NeSy 2025, 2025, pp. 353-378.
[9]
D. Lundberg, "Formal Verification of Software-Defined Network Elements and Machine Code," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:103, 2025.
[10]
J. Spenger, "Programming Models for Failure-Transparent Distributed Systems," Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:102, 2025.
[12]
J. Yifei, "Generalizable Representation for Wireless Networks Optimization through Native Graph Topology," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:88, 2025.
[13]
A. Andreasson et al., "Cyber situation awareness during an emerging cyberthreat: a case study," International Journal of Information Security, vol. 24, no. 5, 2025.
[14]
S. Dalleiger and A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," in Thirty-Ninth Aaai Conference On Artificial Intelligence,  AAAI-25, VOL 39 NO 15, 2025, pp. 16135-16143.
[15]
S. Dalleiger, J. Vreeken and M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," in Thirty-Ninth Aaai Conference On Artificial Intelligence, Aaai-25, Vol 39 No 15, 2025, pp. 16144-16152.
[16]
N. Eslami, I. Bercea and N. Dayan, "Diva: Dynamic Range Filter for Var-Length Keys and Queries," in Proceedings of the VLDB Endowment, 2025, pp. 3923-3936.
[17]
J. Berengueres and T. Yu, "Flexible Ergonomics : Can a Flexible Mouse Fix That Wrist Pain?," interactions, vol. 32, no. 5, pp. 32-37, 2025.
[18]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[19]
S. Tu et al., "Optirefine : densest subgraphs and maximum cuts with k refinements," Data mining and knowledge discovery, vol. 39, no. 6, 2025.
[20]
S. Díaz-Aranda et al., "Error Bounds for the Network Scale-Up Method," in KDD 2025 - Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2025, pp. 498-509.
[21]
R. Liu et al., "Dirty-Waters: Detecting Software Supply Chain Smells," in FSE Companion 2025 - Companion Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025, pp. 1045-1049.
[22]
K. Etemadi et al., "Mokav: Execution-driven differential testing with LLMs," Journal of Systems and Software, vol. 230, 2025.
[23]
D. J. Bouvier et al., "GenAI Integration in Upper-Level Computing Courses," in ITiCSE 2025 - Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education, 2025, pp. 691-692.
[24]
J. Blikstad et al., "Global vs. s-t Vertex Connectivity Beyond Sequential : Almost-Perfect Reductions and Near-Optimal Separations," in STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025, pp. 2305-2316.
[25]
P. Austrin et al., "Algorithms for the Diverse-k-SAT Problem : The Geometry of Satisfying Assignments," in 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, 2025.
[26]
A. Silva, S. Fang and M. Monperrus, "RepairLLaMA : Efficient Representations and Fine-Tuned Adapters for Program Repair," IEEE Transactions on Software Engineering, vol. 51, no. 8, pp. 2366-2380, 2025.
[27]
A. Sharma, "Build and Runtime Integrity for Java," in Proceedings - 2025 IEEE/ACM 47th International Conference on Software Engineering, ICSE-Companion 2025, 2025, pp. 145-147.
[28]
P. Kamboj et al., "Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures," in Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings, 2025, pp. 219-241.
[29]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[30]
G. Preti et al., "POLARIS : Sampling from the Multigraph Configuration Model with Prescribed Color Assortativity," in Proceedings Of The Eighteenth Acm International Conference On Web Search And Data Mining, Wsdm 2025, 2025, pp. 30-39.
[31]
M. M. Ahmadpanah et al., "CodeX : Contextual Flow Tracking for Browser Extensions," in Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, 2025.
[32]
X. Liu et al., "ContractViz : Extending Eclipse Trace Compass for Smart Contract Transaction Analysis," in Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, pp. 819-823.
[33]
D. Lundberg, R. Guanciale and M. Dam, "Proof-Producing Symbolic Execution for P4," in Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers, 2025, pp. 70-83.
[34]
G. Zhang, I. Sarpe and A. Gionis, "Efficient and Practical Approximation Algorithms for Advertising in Content Feeds," in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 3193-3203.
[35]
A. Gadekar, A. Gionis and S. Thejaswi, "Fair Clustering for Data Summarization : Improved Approximation Algorithms and Complexity Insights," in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 4458-4469.
[36]
E. Riese et al., "Experiences, Impacts and Implications of a STINT Teaching Sabbatical," in KTH SoTL 2025, KTH Royal Institute of Technology, Sweden, May 20, 2025., 2025.
[38]
[39]
S. Dalleiger, J. Vreeken and M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16144-16152.
[40]
S. Tu, "Models and Algorithms for Addressing Challenges in Online Social Networks," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:57, 2025.
[41]
S. Dalleiger and A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16135-16143.
[42]
M. Ekerå and J. Gärtner, "A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography," IACR Communications in Cryptology, vol. 2, no. 1, 2025.
[43]
B. Baudry and M. Monperrus, "Humor for graduate training," ACM Inroads, 2025.
[45]
E. Poorhadi, "Formal Modelling of the Impact of Cyberattacks on Safety of Networked Control Systems," Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:39, 2025.
[46]
K. Vombatkere, A. Gionis and E. Terzi, "Forming coordinated teams that balance task coverage and expert workload," Data mining and knowledge discovery, vol. 39, no. 3, 2025.
[47]
C. Izu et al., "Introducing Code Quality at CS1 Level : Examples and Activities," in ITiCSE WGR 2024 - Publication of the 2024 Working Group Reports on Innovation and Technology in Computer Science Education, 2025, pp. 339-377.
[48]
J. Augustine and M. Mohit Daga, "Distributed Small Cuts using Semigroups," in ICDCN 2025 - Proceedings of the 26th International Conference on Distributed Computing and Networking, 2025, pp. 134-143.
[49]
A. de Almeida Borges et al., "Lessons for Interactive Theorem Proving Researchers from a Survey of Coq Users," Journal of automated reasoning, vol. 69, no. 1, 2025.
[50]
J. Amilon and D. Gurov, "Deductively Verified Program Models for Software Model Checking," in Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification - 12th International Symposium, ISoLA 2024, Proceedings, 2025, pp. 8-25.