Till innehåll på sidan
Till KTH:s startsida

Publikationer

Nedan listas avdelningens 50 senaste publikationer. En hel förteckning i DiVA kan nås via länken längst ner på sidan.

Senaste publikationer

[1]
S. Lavebrink et al., "Strategic Steering of Large Language Models via Game-Theoretic Action Space Optimization," i Social Networks Analysis and Mining : 17th International Conference, ASONAM 2025, Niagara Falls, ON, Canada, August 25–28, 2025, Proceedings, Part III, 2026, s. 508-528.
[2]
K. Palmskog, M. Nyberg och D. Gurov, "Machine-Checked Compositional Specification and Proofs for Embedded Systems," i Theoretical Aspects Of Software Engineering, TASE 2025, 2026, s. 67-82.
[3]
C. Kolb, M. Lopuhaa-Zwakenberg och E. Troubitsyna, "4th International Workshop on Safety-Security Interaction (SENSEI 2025)," i Computer Safety, Reliability, And Security. Safecomp 2025 Workshops, Coc3Cps, Decsos, Sassur, Sensei, Srtoits, And Waise, 2026, s. 296-297.
[4]
M. Lecart och E. Troubitsyna, "Formal Modelling of Fault Tolerant Robotic Missions," i Formal Methods and Software Engineering - 26th International Conference on Formal Engineering Methods, ICFEM 2025, Proceedings, 2026, s. 373-390.
[5]
E. Kamburjan och D. Gurov, "Multi-perspective Correctness of Programs," i Theoretical Aspects of Computing – ICTAC 2025 - 22nd International Colloquium, Proceedings, 2026, s. 69-86.
[6]
G. Venturin, I. Sarpe och F. Vandin, "Efficient Approximate Temporal Triangle Counting in Streaming with Predictions," i Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, s. 244-262.
[7]
E. Calikus, G. De Francisci Morales och A. Gionis, "Who is at Risk? Analyzing the Risk of Radicalization Among Reddit Users," i Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track and Demo Track - European Conference, ECML PKDD 2025, Proceedings, 2026, s. 375-392.
[8]
M. Ciaperoni, A. Gionis och H. Mannila, "Sample and Expand: Discovering Low-Rank Submatrices With Quality Guarantees," i Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, s. 78-95.
[9]
J. Spenger, P. Carbone och P. Haller, "Failure-Transparent Actors," i Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, s. 81-113.
[10]
G. Badkobeh et al., "Preface," i String Processing and Information Retrieval : 32nd International Symposium, SPIRE 2025, London, UK, September 8–11, 2025, Proceedings, Golnaz Badkobeh, Jakub Radoszewski, Nicola Tonellotto, Ricardo Baeza-Yates red., : Springer Science and Business Media Deutschland GmbH, 2026, s. v-vii.
[11]
E. Ábrahám et al., "Why do women pursue a Ph.D. in Computer Science?," Journal of Systems and Software, vol. 231, 2026.
[12]
D. Gurov och R. Haehnle, "An Expressive Trace Logic for Recursive Programs," i 10Th International Conference On Formal Structures For Computation And Deduction, Fscd 2025, 2025.
[13]
I. Kumpulainen et al., "From Your Block to Our Block : How to Find Shared Structure Between Stochastic Block Models over Multiple Graphs," i Thirty-Ninth Aaai Conference On Artificial Intelligence, AAAI-25, VOL 39 NO 11, 2025, s. 11987-11994.
[14]
J. Brynielsson, A. Carp och A. Tegen, "Detection of Emerging Cyberthreats Through Active Learning," i Recent Advances in Deep Learning Applications : New Techniques and Practical Examples, Uche Onyekpe, Vasile Palade, M. Arif Wani red., : Informa UK Limited, 2025, s. 123-144.
[15]
T. Zhou et al., "Calibrated and Diverse News Coverage," i CIKM 2025 - Proceedings of the 34th ACM International Conference on Information and Knowledge Management, 2025, s. 4509-4518.
[16]
A. Fayaz, R. Glassey och A. Baltatzis, "Generating Personalized Assignments with Students in the Loop," i PROCEEDINGS OF THE 30TH ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION VOL 1, ITICSE 2025, 2025, s. 305-311.
[17]
L. Kann och V. Kann, "15 Years of Experience with Programme Integrating Courses in CS Programmes," i CompEd 2025 - Proceedings of the ACM Global Computing Education Conference 2025, 2025, s. 218-224.
[18]
I. Sarpe och A. Gionis, "Efficient and Adaptive Estimation of Local Triadic Coefficients," Proceedings of the VLDB Endowment, vol. 18, no. 8, s. 2561-2574, 2025.
[19]
M. Sevenhuijsen et al., "Generating Safety-Critical Automotive C-programs using LLMs with Formal Verification," i Proceedings of Machine Learning Research - Conference on Neurosymbolic Learning and Reasoning, NeSy 2025, 2025, s. 353-378.
[20]
D. Lundberg, "Formal Verification of Software-Defined Network Elements and Machine Code," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:103, 2025.
[22]
J. Yifei, "Generalizable Representation for Wireless Networks Optimization through Native Graph Topology," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:88, 2025.
[23]
A. Andreasson et al., "Cyber situation awareness during an emerging cyberthreat: a case study," International Journal of Information Security, vol. 24, no. 5, 2025.
[24]
S. Dalleiger och A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," i Thirty-Ninth Aaai Conference On Artificial Intelligence,  AAAI-25, VOL 39 NO 15, 2025, s. 16135-16143.
[25]
S. Dalleiger, J. Vreeken och M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," i Thirty-Ninth Aaai Conference On Artificial Intelligence, Aaai-25, Vol 39 No 15, 2025, s. 16144-16152.
[26]
N. Eslami, I. Bercea och N. Dayan, "Diva: Dynamic Range Filter for Var-Length Keys and Queries," i Proceedings of the VLDB Endowment, 2025, s. 3923-3936.
[27]
J. Berengueres och T. Yu, "Flexible Ergonomics : Can a Flexible Mouse Fix That Wrist Pain?," interactions, vol. 32, no. 5, s. 32-37, 2025.
[28]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," i Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, s. 1650-1663.
[29]
S. Díaz-Aranda et al., "Error Bounds for the Network Scale-Up Method," i KDD 2025 - Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2025, s. 498-509.
[30]
R. Liu et al., "Dirty-Waters: Detecting Software Supply Chain Smells," i FSE Companion 2025 - Companion Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025, s. 1045-1049.
[31]
D. J. Bouvier et al., "GenAI Integration in Upper-Level Computing Courses," i ITiCSE 2025 - Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education, 2025, s. 691-692.
[32]
J. Blikstad et al., "Global vs. s-t Vertex Connectivity Beyond Sequential : Almost-Perfect Reductions and Near-Optimal Separations," i STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025, s. 2305-2316.
[33]
P. Austrin et al., "Algorithms for the Diverse-k-SAT Problem : The Geometry of Satisfying Assignments," i 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, 2025.
[34]
A. Sharma, "Build and Runtime Integrity for Java," i Proceedings - 2025 IEEE/ACM 47th International Conference on Software Engineering, ICSE-Companion 2025, 2025, s. 145-147.
[35]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[36]
M. M. Ahmadpanah et al., "CodeX : Contextual Flow Tracking for Browser Extensions," i Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, 2025.
[37]
X. Liu et al., "ContractViz : Extending Eclipse Trace Compass for Smart Contract Transaction Analysis," i Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, s. 819-823.
[38]
G. Zhang, I. Sarpe och A. Gionis, "Efficient and Practical Approximation Algorithms for Advertising in Content Feeds," i WWW 2025 - Proceedings of the ACM Web Conference, 2025, s. 3193-3203.
[39]
A. Gadekar, A. Gionis och S. Thejaswi, "Fair Clustering for Data Summarization : Improved Approximation Algorithms and Complexity Insights," i WWW 2025 - Proceedings of the ACM Web Conference, 2025, s. 4458-4469.
[40]
E. Riese et al., "Experiences, Impacts and Implications of a STINT Teaching Sabbatical," i KTH SoTL 2025, KTH Royal Institute of Technology, Sweden, May 20, 2025., 2025.
[42]
[43]
S. Dalleiger, J. Vreeken och M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," i 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, s. 16144-16152.
[44]
M. Ekerå och J. Gärtner, "A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography," IACR Communications in Cryptology, vol. 2, no. 1, 2025.
[45]
B. Baudry och M. Monperrus, "Humor for graduate training," ACM Inroads, 2025.
[46]
E. Poorhadi, "Formal Modelling of the Impact of Cyberattacks on Safety of Networked Control Systems," Doktorsavhandling Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:39, 2025.
[47]
K. Vombatkere, A. Gionis och E. Terzi, "Forming coordinated teams that balance task coverage and expert workload," Data mining and knowledge discovery, vol. 39, no. 3, 2025.
[48]
C. Izu et al., "Introducing Code Quality at CS1 Level : Examples and Activities," i ITiCSE WGR 2024 - Publication of the 2024 Working Group Reports on Innovation and Technology in Computer Science Education, 2025, s. 339-377.
[49]
J. Augustine och M. Mohit Daga, "Distributed Small Cuts using Semigroups," i ICDCN 2025 - Proceedings of the 26th International Conference on Distributed Computing and Networking, 2025, s. 134-143.
[50]
J. Amilon och D. Gurov, "Deductively Verified Program Models for Software Model Checking," i Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification - 12th International Symposium, ISoLA 2024, Proceedings, 2025, s. 8-25.
Fullständig lista i KTH:s publikationsportal