Skip to main content
To KTH's start page

Publications

Link to the full list   in the KTH publication portal.

TCS Publications, 50 latest

[1]
A. M. Ahmadian, M. Soloviev and M. Balliu, "Disjunctive Policies for Database-Backed Programs," in 2024 IEEE 37TH Computer Security Foundations Symposium, CSF 2024, 2024, pp. 388-402.
[2]
E. Poorhadi and E. Troubitsyna, "Automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety," in Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops, 2024, pp. 61-73.
[3]
D. Tiwari, M. Monperrus and B. Baudry, "Mimicking Production Behavior with Generated Mocks," IEEE Transactions on Software Engineering, pp. 1-26, 2024.
[4]
R.-C. Tzeng, "Efficient Learning in Graphs and in Combinatorial Multi-Armed Bandits," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:77, 2024.
[5]
J. Blikstad, "Matchings, Maxflows, Matroids : The Power of Augmenting Paths and Computational Models," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:84, 2024.
[6]
A. Bernstein et al., "Maximum Flow by Augmenting Paths in n2+o(1) Time," in 2024 IEEE 65rd Annual Symposium on Foundations of Computer Science (FOCS), 2024.
[7]
J. Berengueres and D. Drozdzewski, "Mobile mapping, User Journeys & Collaborative Interviews with QualNotes App: Make your own Map!," in Live � Uniting HCI for a Hyperlocal and Global Experience: Adjunct Proceedings of the 13th Nordic Conference on Human-Computer Interaction, NordiCHI 2024, 2024.
[8]
B. Baudry et al., "Generative AI to Generate Test Data Generators," IEEE Software, vol. 41, no. 6, pp. 55-64, 2024.
[9]
M. A. Kuhail et al., "Designing a Haptic Boot for Space With Prompt Engineering : Process, Insights, and Implications," IEEE Access, vol. 12, pp. 134235-134255, 2024.
[10]
K. Etemadi, "Efficient Exploration and Analysis of Program Repair Search Spaces," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:76, 2024.
[11]
M. Abrahamsen et al., "Online Sorting and Online TSP: Randomized, Stochastic, and High-Dimensional," in 32nd Annual European Symposium on Algorithms, ESA 2024, 2024.
[12]
E. Cornelissen, M. Shcherbakov and M. Balliu, "GHunter : Universal Prototype Pollution Gadgets in JavaScript Runtimes," in Proceedings of the 33rd USENIX Security Symposium, 2024, pp. 3693-3710.
[13]
M. Shcherbakov, "Code-Reuse Attacks in Managed Programming Languages and Runtimes," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:75, 2024.
[14]
E. Troubitsyna, "Formal Analysis of Interactions Between Safety and Security Requirements," in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), : Springer Science and Business Media Deutschland GmbH, 2024, pp. 141-161.
[15]
N. Dayan, I.-O. Bercea and R. Pagh, "Aleph Filter: To Infinity in Constant Time," Proceedings of the VLDB Endowment, vol. 17, no. 11, pp. 3644-3656, 2024.
[16]
M. Ekerå, "On factoring integers, and computing discrete logarithms and orders, quantumly," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:71, 2024.
[18]
H. A. Karlsson, "Minimal partitioning kernel with time protection and predictability," in Proceedings - 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, 2024, pp. 234-241.
[19]
H. Fu et al., "In industrial embedded software, are some compilation errors easier to localize and fix than others?," in Proceedings - 2024 IEEE Conference on Software Testing, Verification and Validation, ICST 2024, 2024, pp. 383-394.
[20]
M. Aghvamipanah et al., "Activity Recognition Protection for IoT Trigger-Action Platforms," in Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 2024, pp. 600-616.
[21]
M. Ciaperoni, H. Xiao and A. Gionis, "Efficient Exploration of the Rashomon Set of Rule-Set Models," in KDD 2024 - Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024, pp. 478-489.
[22]
E. Troubitsyna, "Goal-Oriented Modeling in Fault Tolerant Service-Oriented Multi-Agent Systems," in Proceedings - 2024 IEEE 48th Annual Computers, Software, and Applications Conference, COMPSAC 2024, 2024, pp. 1568-1569.
[23]
M. Eshghie, M. Jafari and C. Artho, "From Creation to Exploitation: The Oracle Lifecycle," in Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024, 2024, pp. 23-34.
[24]
G. Ung et al., "Post-Hoc Formal Verification of Automotive Software with Informal Requirements : An Experience Report," in Proceedings - 32nd IEEE International Requirements Engineering Conference, RE 2024, 2024, pp. 287-298.
[25]
P. Haller, "Lightweight Affine Types for Safe Concurrency in Scala (Keynote)," in Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming, Programming Companion 2024, 2024, pp. 133-133.
[26]
W. Zhong et al., "MemoryBank : Enhancing Large Language Models with Long -Term Memory," in THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 17, 2024, pp. 19724-19731.
[27]
A. Silva, N. Saavedra and M. Monperrus, "GitBug-Java : A Reproducible Benchmark of Recent Java Bugs," in 2024 IEEE/ACM 21St International Conference On Mining Software Repositories, Msr, 2024, pp. 118-122.
[28]
T. Marinaro et al., "Beyond Over-Protection : A Targeted Approach to Spectre Mitigation and Performance Optimization," in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024, pp. 203-216.
[29]
F. Reyes García et al., "BUMP : A Benchmark of Reproducible Breaking Dependency Updates," in Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024, 2024, pp. 159-170.
[30]
C. Izu et al., "Introducing Code Quality in the CS1 Classroom," in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, pp. 773-774.
[31]
R. Glassey and A. Baltatzis, "Active Repos : Integrating Generative AI Workflows into GitHub," in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, pp. 777-778.
[32]
U. Alam et al., "Entropy and Memory Aware Active Transfer Learning in Smart Sensing Systems," IEEE Access, vol. 12, pp. 88841-88861, 2024.
[33]
S. Fowler et al., "Behavioural Types for Heterogeneous Systems (Position Paper)," in Proceedings - 15th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2024, 2024, pp. 37-48.
[34]
J. Blikstad et al., "Online Edge Coloring Is (Nearly) as Easy as Offline," in STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024, pp. 36-46.
[35]
Y. Tian et al., "Driving Intention Recognition and Speed Prediction at Complex Urban Intersections Considering Traffic Environment," IEEE transactions on intelligent transportation systems (Print), vol. 25, no. 5, pp. 4470-4488, 2024.
[36]
M. Abrahamsen et al., "Minimum Star Partitions of Simple Polygons in Polynomial Time," in STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024, pp. 904-910.
[37]
R.-C. Tzeng, N. Ohsaka and K. Ariu, "Matroid Semi-Bandits in Sublinear Time," in Proceedings of the 41 st International Conference on Machine Learning,, 2024.
[38]
I. Bercea, J. B. Tejs Houen and R. Pagh, "Daisy Bloom Filters," in 19th Scandinavian Symposium on Algorithm Theory, SWAT 2024, 2024.
[39]
A. Alshnakat et al., "HOL4P4: Mechanized Small-Step Semantics for P4," Proceedings of the ACM on Programming Languages, vol. 8, no. OOPSLA1, 2024.
[40]
N. Saavedra, A. Silva and M. Monperrus, "GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions," in Proceedings - 2024 ACM/IEEE 46th International Conference on Software Engineering: Companion, ICSE-Companion 2024, 2024, pp. 1-5.
[41]
T. Zhou et al., "Modeling the Impact of Timeline Algorithms on Opinion Dynamics Using Low-rank Updates," in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 2694-2702.
[42]
L. Oettershagen, H. Wang and A. Gionis, "Finding Densest Subgraphs with Edge-Color Constraints," in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 936-947.
[43]
A. Gionis, L. Oettershagen and I. Sarpe, "Mining Temporal Networks," in WWW 2024 Companion - Companion Proceedings of the ACM Web Conference, 2024, pp. 1260-1263.
[44]
T. Lanciano et al., "A Survey on the Densest Subgraph Problem and its Variants," ACM Computing Surveys, vol. 56, no. 8, 2024.
[45]
C. Artho et al., "JPF: From 2003 to 2023," in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings, 2024, pp. 3-22.
[46]
L. Garcia-Pueyo et al., "Integrity 2024: Integrity in Social Networks and Media," in WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024, pp. 1212-1213.
[47]
W. Zhong et al., "MemoryBank: Enhancing Large Language Models with Long-Term Memory," in Proceedings Of The Aaai Conference On Artificial Intelligence, 2024, pp. 19724-19731.
[48]
H. Ye and M. Monperrus, "ITER : Iterative Neural Repair for Multi-Location Patches," in ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.
[49]
C. Lidström, "Automated Deductive Verification of Safety-Critical Embedded Software," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:17, 2024.
[50]
J. Amilon et al., "An Exercise in Mind Reading: Automatic Contract Inference for Frama-C," in Guide to Software Verification with Frama-C: Core Components, Usages, and Applications, : Springer Nature, 2024.