Skip to main content

Publications

Link to the full list   in the KTH publication portal.

TCS Publications, 50 latest

[1]
J. Simonsson et al., "Observability and Chaos Engineering on System Calls for Containerized Applications in Docker," Future generations computer systems, vol. 122, pp. 117-129, 2021.
[2]
L. Zhang et al., "Maximizing Error Injection Realism for Chaos Engineering with System Calls," IEEE Transactions on Dependable and Secure Computing, 2021.
[3]
B. Danglot et al., "An approach and benchmark to detect behavioral changes of commits in continuous integration," Journal of Empirical Software Engineering, vol. 25, no. 4, pp. 2379-2415, 2020.
[4]
W. Oortwijn, D. Gurov and M. Huisman, "An Abstraction Technique for Verifying Shared-Memory Concurrency," Applied Sciences, vol. 10, no. 11, 2020.
[5]
J. van den Brand, "A Deterministic Linear Program Solver in Current Matrix Multiplication Time," in Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, SODA 2020, 2020, pp. 259-278.
[6]
X. Zhao and P. Haller, "Consistency types for replicated data in a higher-order distributed programming language," The Art, Science, and Engineering of Programming, vol. 5, no. 2, 2021.
[7]
M.-H. Le et al., "AnonFACES : Anonymizing Faces Adjusted to Constraints on Efficacy and Security," in Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020, pp. 87-100.
[8]
A. Coto, R. Guanciale and E. Tuosto, "Choreographic development of message-passing applications : a tutorial," in Lecture Notes in Computer Science book series, 2020, pp. 20-36.
[9]
H. Ye et al., "A comprehensive study of automatic program repair on the QuixBugs benchmark," Journal of Systems and Software, vol. 171, 2021.
[10]
M. Balliu et al., "Friendly Fire : Cross-App Interactions in IoT Platforms," ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 3, pp. 1-40, 2021.
[11]
M. Shcherbakov and M. Balliu, "SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web," in Proceedings of the Network and Distributed System Security Symposium (NDSS 2021), 2021.
[12]
R. Guanciale and E. Tuosto, "PomCho : Atool chain for choreographic design," Science of Computer Programming, vol. 202, 2021.
[13]
X. Zhao, "Language-based Approaches to Safe and Efficient Distributed Programming," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:6, 2021.
[14]
R. Glassey et al., "Addressing the double challenge of learning and teaching enterprise technologies through peer teaching," in Proceedings - International Conference on Software Engineering, 2020, pp. 130-138.
[15]
P. Rozenshtein, N. Tatti and A. Gionis, "The network-untangling problem : from interactions to activity timelines," Data mining and knowledge discovery, vol. 35, no. 1, pp. 213-247, 2021.
[16]
D. Gurov, P. Herber and I. Schaefer, "Automated Verification of Embedded Control Software : Track Introduction," in Leveraging Applications of Formal Methods, Verification and Validation : Applications, 2020, pp. 235-239.
[17]
J. Elffers and J. Nordström, "A cardinal improvement to pseudo-boolean solving," in AAAI 2020 - 34th AAAI Conference on Artificial Intelligence, 2020, pp. 1495-1503.
[21]
I. Vistbakka and E. Troubitsyna, "Analysing Privacy-Preserving Constraints in Microservices Architecture," in Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020, 2020, pp. 1089-1090.
[22]
A. Coto, R. Guanciale and E. Tuosto, "An abstract framework for choreographic testing," (Manuscript).
[23]
O. Bälter, R. Glassey and M. Wiggberg, "Reduced Learning Time with Maintained Learning Outcomes," in Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, 2021, pp. 660-665.
[24]
F. Adriaens et al., "Block-approximated exponential random graphs," in Proceedings - 2020 IEEE 7th International Conference on Data Science and Advanced Analytics, DSAA 2020, 2020, pp. 70-80.
[25]
H. Ye, M. Martinez and M. Monperrus, "Automated patch assessment for program repair at scale," Journal of Empirical Software Engineering, vol. 26, no. 2, 2021.
[26]
J. Cabrera Arteaga et al., "CROW: Code Diversification for WebAssembly," in MADWeb, NDSS 2021, 2021.
[27]
J. Chuzhoy et al., "A deterministic algorithm for balanced cut with applications to dynamic connectivity, flows, and beyond," in Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS, 2020, pp. 1158-1167.
[28]
C. Soto Valero et al., "A comprehensive study of bloated dependencies in the Maven ecosystem," Journal of Empirical Software Engineering, vol. 26, no. 3, 2021.
[29]
J. van den Brand et al., "Bipartite Matching in Nearly-linear Time on Moderately Dense Graphs," in 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020, Durham, NC, USA, November 16-19, 2020, 2020, pp. 919-930.
[30]
J. van den Brand, "Unifying Matrix Data Structures : Simplifying and Speeding up Iterative Algorithms," in 4th Symposium on Simplicity in Algorithms, SOSA 2021, Virtual Conference, January 11-12, 2021, 2021, pp. 1-13.
[31]
J. van den Brand et al., "Minimum Cost Flows, MDPs, and L1-Regression in Nearly Linear Time for Dense Instances," in Proccedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Rome, Italy, June 21-25, 2021, 2021.
[32]
S. Varga, J. Brynielsson and U. Franke, "Cyber-threat perception and risk management in the Swedish financial sector," Computers & security (Print), vol. 105, 2021.
[33]
V. Palmkvist et al., "Resolvable ambiguity : Principled resolution of syntactically ambiguous programs," in CC 2021 : Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction, 2021.
[34]
D. Helm et al., "A programming model for semi-implicit parallelization of static analyses," in Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020, pp. 428-439.
[35]
A. Oak et al., "Language Support for Secure Software Development with Enclaves," in IEEE Computer Security Foundations Symposium (CSF 2021), 2021.
[36]
C. $$$Muvva, M. Natarajan Arul and V. Subramanian, "Assessment of Amyloid Forming Tendency of Peptide Sequences from Amyloid Beta and Tau Proteins Using Force-Field, Semi-Empirical, and Density Functional Theory Calculations," International Journal of Molecular Sciences, vol. 22, no. 6, 2021.
[37]
J. van den Brand, "Dynamic Matrix Algorithms and Applications in Convex and Combinatorial Optimization," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2021:31, 2021.
[38]
M. M. Ahmadpanah et al., "SandTrap: Securing JavaScript-driven Trigger-Action Platforms," in USENIX Security Symposium (USENIX Security 2021), 2021.
[39]
Z. Yu et al., "Characterizing the Usage, Evolution and Impact of Java Annotations in Practice," IEEE Transactions on Software Engineering, vol. 47, no. 5, pp. 969-986, 2021.
[40]
C. Artho and P. C. Olveczky, "Formal Techniques for Safety-Critical Systems (FTSCS 2018) Preface," Science of Computer Programming, vol. 208, 2021.
[41]
E. Riese and V. Kann, "Computer Science Majors’ Experiences of Their Distance Education Caused by the COVID-19 Pandemic," in 2021 IEEE Global Engineering Education Conference (EDUCON), 2021, pp. 393-397.
[42]
R. Dutta et al., "Temporal and diurnal variation in social media posts to a suicide support forum," BMC Psychiatry, vol. 21, no. 1, 2021.
[43]
B. Baudry et al., "A Software-Repair Robot Based on Continual Learning," IEEE Software, vol. 38, no. 4, pp. 28-35, 2021.
[44]
K. Norrman, V. Sundararajan and A. Bruni, "Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices," in Proceedings of the 18th International Conference on Security and Cryptography, 2021.
[45]
E. Riese et al., "Challenges Faced by Teaching Assistants in Computer Science Education Across Europe," in ITiCSE 2021 : 26th ACM Conference on Innovation and Technology in Computer Science Education, 2021, pp. 547-553.
[46]
K. Meinke, "Active Machine Learning to Test Autonomous Driving," in 2021 Ieee International Conference On Software Testing, Verification And Validation Workshops (Icstw 2021), 2021, pp. 286-286.
[47]
M. Henzinger, S. Krinninger and D. Na Nongkai, "A deterministic almost-tight distributed algorithm for approximating single-source shortest paths," SIAM journal on computing (Print), vol. 50, no. 3, 2021.
[48]
B. Baudry and M. Monperrus, "Science-changing Code," Association for Computing Machinery (ACM), 2021.
[49]
A. Oak et al., "Enclave-Based Secure Programming with JE," in IEEE Secure Development Conference (SecDev'21), 2021.
[50]
R. M. Tsoupidi, M. Balliu and B. Baudry, "Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly," in IEEE Secure Development Conference (SecDev'21), 2021.
Page responsible:Web editors at EECS
Belongs to: Theoretical Computer Science
Last changed: Apr 22, 2021