Skip to main content
To KTH's start page To KTH's start page

Publications

Link to the full list   in the KTH publication portal.

TCS Publications, 50 latest

[1]
C. Izu et al., "Introducing Code Quality in the CS1 Classroom," in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, pp. 773-774.
[2]
C. Björn and V. Kann, "Students’ Understanding of Programming Fluency," in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, p. 810.
[3]
R. Glassey and A. Baltatzis, "Active Repos : Integrating Generative AI Workflows into GitHub," in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, pp. 777-778.
[4]
U. Alam et al., "Entropy and Memory Aware Active Transfer Learning in Smart Sensing Systems," IEEE Access, vol. 12, pp. 88841-88861, 2024.
[5]
B. Baudry and M. Monperrus, "Programming Art With Drawing Machines," Computer, vol. 57, no. 7, pp. 104-108, 2024.
[6]
S. Fowler et al., "Behavioural Types for Heterogeneous Systems (Position Paper)," in Proceedings - 15th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2024, 2024, pp. 37-48.
[7]
J. Blikstad et al., "Online Edge Coloring Is (Nearly) as Easy as Offline," in STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024, pp. 36-46.
[8]
D. Tiwari et al., "With Great Humor Comes Great Developer Engagement," in Proceedings - 2024 ACM/IEEE 46th International Conference on Software Engineering: Software Engineering in Society, ICSE-SEIS 2024, 2024, pp. 1-11.
[9]
Y. Tian et al., "Driving Intention Recognition and Speed Prediction at Complex Urban Intersections Considering Traffic Environment," IEEE transactions on intelligent transportation systems (Print), vol. 25, no. 5, pp. 4470-4488, 2024.
[10]
M. Abrahamsen et al., "Minimum Star Partitions of Simple Polygons in Polynomial Time," in STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024, pp. 904-910.
[11]
R.-C. Tzeng, N. Ohsaka and K. Ariu, "Matroid Semi-Bandits in Sublinear Time," in Proceedings of the 41 st International Conference on Machine Learning,, 2024.
[12]
I. Bercea, J. B. Tejs Houen and R. Pagh, "Daisy Bloom Filters," in 19th Scandinavian Symposium on Algorithm Theory, SWAT 2024, 2024.
[13]
A. Alshnakat et al., "HOL4P4: Mechanized Small-Step Semantics for P4," Proceedings of the ACM on Programming Languages, vol. 8, no. OOPSLA1, 2024.
[14]
S. Neumann, Y. Dong and P. Peng, "Sublinear-Time Opinion Estimation in the Friedkin - Johnsen Model," in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 2563-2571.
[15]
C. Artho and P. C. Ölveczky, "Preface Formal Techniques for Safety-Critical Systems (FTSCS 2022)," Science of Computer Programming, vol. 237, 2024.
[16]
N. Saavedra, A. Silva and M. Monperrus, "GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions," in Proceedings - 2024 ACM/IEEE 46th International Conference on Software Engineering: Companion, ICSE-Companion 2024, 2024, pp. 1-5.
[17]
T. Zhou et al., "Modeling the Impact of Timeline Algorithms on Opinion Dynamics Using Low-rank Updates," in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 2694-2702.
[18]
L. Oettershagen, H. Wang and A. Gionis, "Finding Densest Subgraphs with Edge-Color Constraints," in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 936-947.
[19]
A. Gionis, L. Oettershagen and I. Sarpe, "Mining Temporal Networks," in WWW 2024 Companion - Companion Proceedings of the ACM Web Conference, 2024, pp. 1260-1263.
[20]
M. Shcherbakov, P. Moosbrugger and M. Balliu, "Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis," in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 1800-1811.
[21]
J. Blikstad et al., "Simple and Asymptotically Optimal Online Bipartite Edge Coloring," in 2024 Symposium on Simplicity in Algorithms, SOSA 2024, 2024, pp. 331-336.
[22]
T. Lanciano et al., "A Survey on the Densest Subgraph Problem and its Variants," ACM Computing Surveys, vol. 56, no. 8, 2024.
[23]
C. Artho et al., "JPF: From 2003 to 2023," in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings, 2024, pp. 3-22.
[24]
L. Garcia-Pueyo et al., "Integrity 2024: Integrity in Social Networks and Media," in WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024, pp. 1212-1213.
[25]
W. Zhong et al., "MemoryBank: Enhancing Large Language Models with Long-Term Memory," in Proceedings Of The Aaai Conference On Artificial Intelligence, 2024, pp. 19724-19731.
[26]
S. Bobadilla et al., "SOBO : A Feedback Bot to Nudge Code Quality in Programming Courses," IEEE Software, vol. 41, no. 2, pp. 68-76, 2024.
[27]
H. Ye and M. Monperrus, "ITER : Iterative Neural Repair for Multi-Location Patches," in ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.
[28]
C. Lidström, "Automated Deductive Verification of Safety-Critical Embedded Software," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:17, 2024.
[29]
J. Amilon et al., "An Exercise in Mind Reading: Automatic Contract Inference for Frama-C," in Guide to Software Verification with Frama-C: Core Components, Usages, and Applications, : Springer Nature, 2024.
[30]
J. Cabrera-Arteaga et al., "Wasm-Mutate : Fast and effective binary diversification for WebAssembly," Computers & security (Print), vol. 139, pp. 103731-103731, 2024.
[31]
N. Dong, "Towards a Trustworthy Stack: Formal Verification of Low-Level Hardware and Software," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:3, 2024.
[32]
R.-C. Tzeng et al., "Closing the Computational-Statistical Gap in Best Arm Identification for Combinatorial Semi-bandits," in Advances in Neural Information Processing Systems 36 - 37th Conference on Neural Information Processing Systems, NeurIPS 2023, 2023.
[33]
A. Carp, J. Brynielsson and A. Tegen, "Active Learning for Improvement of Classification of Cyberthreat Actors in Text Fragments," in Proceedings - 22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023, 2023, pp. 1279-1286.
[34]
P.-A. Wang, R.-C. Tzeng and A. Proutiere, "Best Arm Identification with Fixed Budget : A Large Deviation Perspective," in Advances in Neural Information Processing Systems 36 - 37th Conference on Neural Information Processing Systems, NeurIPS 2023, 2023.
[35]
K. Etemadi et al., "Augmenting Diffs With Runtime Information," IEEE Transactions on Software Engineering, vol. 49, no. 11, pp. 4988-5007, 2023.
[36]
P.-A. Wang, R.-C. Tzeng and A. Proutiere, "Best Arm Identification with Fixed Budget: A Large Deviation Perspective," in Advances in Neural Information Processing Systems 36 - 37th Conference on Neural Information Processing Systems, NeurIPS 2023, 2023.
[37]
J. Brynielsson et al., "Comparison of Strategies for Honeypot Deployment," in Proceedings Of The 2023 Ieee/Acm International Conference On Advances In Social Networks Analysis And Mining, Asonam 2023, 2023, pp. 612-619.
[38]
C. Kolb, E. Björnson and E. Troubitsyna, "2nd International Workshop on Safety-Security Interaction (SENSEI 2023)," in COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS, 2023, pp. 162-163.
[39]
M. Balliu et al., "Challenges of Producing Software Bill of Materials for Java," IEEE Security and Privacy, vol. 21, no. 6, pp. 12-23, 2023.
[40]
M. Andersson et al., "Admission to master programmes : What are the indicators for successful study performance?," in Bidrag från den 9:e utvecklingskonferensen för Sveriges ingenjörsutbildningar, 2023, pp. 9-18.
[41]
U. Sehar et al., "A hybrid dependency-based approach for Urdu sentiment analysis," Scientific Reports, vol. 13, no. 1, 2023.
[42]
M. Eshghie et al., "Capturing Smart Contract Design with DCR Graphs," in Software Engineering and Formal Methods : 21st International Conference, SEFM 2023, Proceedings, 2023, pp. 106-125.
[43]
M. Ciaperoni, H. Xiao and A. Gionis, "Concise and interpretable multi-label rule sets," Knowledge and Information Systems, vol. 65, no. 12, pp. 5657-5694, 2023.
[44]
E. Poorhadi and E. Troubitsyna, "Automating an Analysis of Safety-Security Interactions for Railway Systems," in Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification - 5th International Conference, RSSRail 2023, Proceedings, 2023, pp. 3-21.
[45]
L. Oettershagen, N. M. Kriege and P. Mutzel, "A Higher-Order Temporal H-Index for Evolving Networks," in KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 1770-1782.
[46]
S. Tu, S. Neumann and A. Gionis, "Adversaries with Limited Information in the Friedkin-Johnsen Model," in KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 2201-2210.
[47]
J. Amilon et al., "Automatic Program Instrumentation for Automatic Verification," in Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, 2023, pp. 281-304.
[48]
J. Spoerhase et al., "A Constant-Factor Approximation Algorithm for Reconciliation k-Median," in Proceedings of the 26th International Conference on Artificial Intelligence and Statistics, AISTATS 2023, 2023, pp. 1719-1746.
[49]
C. Lidström and D. Gurov, "Contract Based Embedded Software Design," in Theoretical Aspects of Software Engineering - 17th International Symposium, TASE 2023, Proceedings, 2023, pp. 77-94.
[50]
K. T. Foerster et al., "Analyzing the Communication Clusters in Datacenters," in ACM Web Conference 2023 : Proceedings of the World Wide Web Conference, WWW 2023, 2023, pp. 3022-3032.