Skip to main content
To KTH's start page

Publications

Link to the full list   in the KTH publication portal.

TCS Publications, 50 latest

[1]
M. Lecart and E. Troubitsyna, "Formal Modelling of Fault Tolerant Robotic Missions," in Formal Methods and Software Engineering - 26th International Conference on Formal Engineering Methods, ICFEM 2025, Proceedings, 2026, pp. 373-390.
[2]
E. Kamburjan and D. Gurov, "Multi-perspective Correctness of Programs," in Theoretical Aspects of Computing – ICTAC 2025 - 22nd International Colloquium, Proceedings, 2026, pp. 69-86.
[3]
G. Venturin, I. Sarpe and F. Vandin, "Efficient Approximate Temporal Triangle Counting in Streaming with Predictions," in Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 244-262.
[4]
E. Calikus, G. De Francisci Morales and A. Gionis, "Who is at Risk? Analyzing the Risk of Radicalization Among Reddit Users," in Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track and Demo Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 375-392.
[5]
M. Ciaperoni, A. Gionis and H. Mannila, "Sample and Expand: Discovering Low-Rank Submatrices With Quality Guarantees," in Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 78-95.
[6]
J. Spenger, P. Carbone and P. Haller, "Failure-Transparent Actors," in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[7]
G. Badkobeh et al., "Preface," in String Processing and Information Retrieval : 32nd International Symposium, SPIRE 2025, London, UK, September 8–11, 2025, Proceedings, Golnaz Badkobeh, Jakub Radoszewski, Nicola Tonellotto, Ricardo Baeza-Yates Ed., : Springer Science and Business Media Deutschland GmbH, 2026, pp. v-vii.
[8]
E. Ábrahám et al., "Why do women pursue a Ph.D. in Computer Science?," Journal of Systems and Software, vol. 231, 2026.
[9]
I. Kumpulainen et al., "From Your Block to Our Block : How to Find Shared Structure Between Stochastic Block Models over Multiple Graphs," in Thirty-Ninth Aaai Conference On Artificial Intelligence, AAAI-25, VOL 39 NO 11, 2025, pp. 11987-11994.
[10]
J. Brynielsson, A. Carp and A. Tegen, "Detection of Emerging Cyberthreats Through Active Learning," in Recent Advances in Deep Learning Applications : New Techniques and Practical Examples, Uche Onyekpe, Vasile Palade, M. Arif Wani Ed., : Informa UK Limited, 2025, pp. 123-144.
[11]
T. Zhou et al., "Calibrated and Diverse News Coverage," in CIKM 2025 - Proceedings of the 34th ACM International Conference on Information and Knowledge Management, 2025, pp. 4509-4518.
[12]
A. Fayaz, R. Glassey and A. Baltatzis, "Generating Personalized Assignments with Students in the Loop," in PROCEEDINGS OF THE 30TH ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION VOL 1, ITICSE 2025, 2025, pp. 305-311.
[13]
L. Kann and V. Kann, "15 Years of Experience with Programme Integrating Courses in CS Programmes," in CompEd 2025 - Proceedings of the ACM Global Computing Education Conference 2025, 2025, pp. 218-224.
[14]
I. Sarpe and A. Gionis, "Efficient and Adaptive Estimation of Local Triadic Coefficients," Proceedings of the VLDB Endowment, vol. 18, no. 8, pp. 2561-2574, 2025.
[15]
M. Sevenhuijsen et al., "Generating Safety-Critical Automotive C-programs using LLMs with Formal Verification," in Proceedings of Machine Learning Research - Conference on Neurosymbolic Learning and Reasoning, NeSy 2025, 2025, pp. 353-378.
[16]
D. Lundberg, "Formal Verification of Software-Defined Network Elements and Machine Code," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:103, 2025.
[18]
J. Yifei, "Generalizable Representation for Wireless Networks Optimization through Native Graph Topology," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:88, 2025.
[19]
A. Andreasson et al., "Cyber situation awareness during an emerging cyberthreat: a case study," International Journal of Information Security, vol. 24, no. 5, 2025.
[20]
S. Dalleiger and A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," in Thirty-Ninth Aaai Conference On Artificial Intelligence,  AAAI-25, VOL 39 NO 15, 2025, pp. 16135-16143.
[21]
S. Dalleiger, J. Vreeken and M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," in Thirty-Ninth Aaai Conference On Artificial Intelligence, Aaai-25, Vol 39 No 15, 2025, pp. 16144-16152.
[22]
N. Eslami, I. Bercea and N. Dayan, "Diva: Dynamic Range Filter for Var-Length Keys and Queries," in Proceedings of the VLDB Endowment, 2025, pp. 3923-3936.
[23]
J. Berengueres and T. Yu, "Flexible Ergonomics : Can a Flexible Mouse Fix That Wrist Pain?," interactions, vol. 32, no. 5, pp. 32-37, 2025.
[24]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[25]
S. Díaz-Aranda et al., "Error Bounds for the Network Scale-Up Method," in KDD 2025 - Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2025, pp. 498-509.
[26]
R. Liu et al., "Dirty-Waters: Detecting Software Supply Chain Smells," in FSE Companion 2025 - Companion Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025, pp. 1045-1049.
[27]
D. J. Bouvier et al., "GenAI Integration in Upper-Level Computing Courses," in ITiCSE 2025 - Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education, 2025, pp. 691-692.
[28]
J. Blikstad et al., "Global vs. s-t Vertex Connectivity Beyond Sequential : Almost-Perfect Reductions and Near-Optimal Separations," in STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025, pp. 2305-2316.
[29]
P. Austrin et al., "Algorithms for the Diverse-k-SAT Problem : The Geometry of Satisfying Assignments," in 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, 2025.
[30]
A. Sharma, "Build and Runtime Integrity for Java," in Proceedings - 2025 IEEE/ACM 47th International Conference on Software Engineering, ICSE-Companion 2025, 2025, pp. 145-147.
[31]
P. Kamboj et al., "Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures," in Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings, 2025, pp. 219-241.
[32]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[33]
M. M. Ahmadpanah et al., "CodeX : Contextual Flow Tracking for Browser Extensions," in Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, 2025.
[34]
X. Liu et al., "ContractViz : Extending Eclipse Trace Compass for Smart Contract Transaction Analysis," in Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, pp. 819-823.
[35]
G. Zhang, I. Sarpe and A. Gionis, "Efficient and Practical Approximation Algorithms for Advertising in Content Feeds," in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 3193-3203.
[36]
A. Gadekar, A. Gionis and S. Thejaswi, "Fair Clustering for Data Summarization : Improved Approximation Algorithms and Complexity Insights," in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 4458-4469.
[37]
E. Riese et al., "Experiences, Impacts and Implications of a STINT Teaching Sabbatical," in KTH SoTL 2025, KTH Royal Institute of Technology, Sweden, May 20, 2025., 2025.
[39]
[40]
S. Dalleiger, J. Vreeken and M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16144-16152.
[41]
S. Tu, "Models and Algorithms for Addressing Challenges in Online Social Networks," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:57, 2025.
[42]
S. Dalleiger and A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16135-16143.
[43]
M. Ekerå and J. Gärtner, "A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography," IACR Communications in Cryptology, vol. 2, no. 1, 2025.
[44]
B. Baudry and M. Monperrus, "Humor for graduate training," ACM Inroads, 2025.
[45]
E. Poorhadi, "Formal Modelling of the Impact of Cyberattacks on Safety of Networked Control Systems," Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:39, 2025.
[46]
K. Vombatkere, A. Gionis and E. Terzi, "Forming coordinated teams that balance task coverage and expert workload," Data mining and knowledge discovery, vol. 39, no. 3, 2025.
[47]
C. Izu et al., "Introducing Code Quality at CS1 Level : Examples and Activities," in ITiCSE WGR 2024 - Publication of the 2024 Working Group Reports on Innovation and Technology in Computer Science Education, 2025, pp. 339-377.
[48]
J. Augustine and M. Mohit Daga, "Distributed Small Cuts using Semigroups," in ICDCN 2025 - Proceedings of the 26th International Conference on Distributed Computing and Networking, 2025, pp. 134-143.
[49]
A. de Almeida Borges et al., "Lessons for Interactive Theorem Proving Researchers from a Survey of Coq Users," Journal of automated reasoning, vol. 69, no. 1, 2025.
[50]
J. Amilon and D. Gurov, "Deductively Verified Program Models for Software Model Checking," in Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification - 12th International Symposium, ISoLA 2024, Proceedings, 2025, pp. 8-25.