Skip to main content
Department of Information Technology

Refereed publications from the IT research programs 2015

Automatic Control (Reglerteknik)

  1. Load transients in pooled cellular core network nodes. Åke Arvidsson and Tobias Rydén. In Performance evaluation (Print), volume 90, pp 18-35, 2015. (DOI).
  2. Delay-induced Dynamical Phenomena in Impulsive Goodwin's Oscillator: What We Know So Far. Alexander N. Churilov, Alexander Medvedev, and Zhanybai T. Zhusubaliyev. In 2015 54Th Ieee Conference On Decision And Control (CDC), pp 590-595, 2015.
  3. Electric field modeling and spatial control in Deep Brain Stimulation. Rubén Cubo, Mattias Åström, and Alexander Medvedev. In Proc. 54th Conference on Decision and Control, pp 3846-3851, IEEE, Piscataway, NJ, 2015. (DOI).
  4. Model-based optimization of lead configurations in Deep Brain Stimulation. Rubén Cubo, Mattias Åström, and Alexander Medvedev. In Proc. 1st International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems, pp 14-19, International Academy, Research and Industry Association (IARIA), 2015.
  5. Particle Metropolis–Hastings using gradient and Hessian information. Johan Dahlin, Fredrik Lindsten, and Thomas B. Schön. In Statistics and computing, volume 25, number 1, pp 81-92, 2015. (DOI).
  6. A new structure exploiting derivation of recursive direct weight optimization. Liang Dai and Thomas B. Schön. In IEEE Transactions on Automatic Control, volume 60, number 6, pp 1683-1685, 2015. (DOI).
  7. Identifiability and convergence analysis of the MINLIP estimator. Liang Dai, Kristiaan Pelckmans, and Er-Wei Bai. In Automatica, volume 51, pp 104-110, 2015. (DOI).
  8. On the exponential convergence of the Kaczmarz algorithm. Liang Dai and Thomas B. Schön. In IEEE Signal Processing Letters, volume 22, number 10, pp 1571-1574, 2015. (DOI).
  9. On the nuclear norm heuristic for a Hankel matrix completion problem. Liang Dai and Kristiaan Pelckmans. In Automatica, volume 51, pp 268-272, 2015. (DOI).
  10. Joint ranging and clock parameter estimation by wireless round trip time measurements. Satyam Dwivedi, Alessio De Angelis, Dave Zachariah, and Peter Händel. In IEEE Journal on Selected Areas in Communications, volume 33, number 11, pp 2379-2390, 2015. (DOI).
  11. Trunk Muscle Activation at the Initiation and Braking of Bilateral Shoulder Flexion Movements of Different Amplitudes. Martin Eriksson Crommert, Kjartan Halvorsen, and Maria M. Ekblom. In PLOS ONE, volume 10, number 11, 2015. (DOI, fulltext:print).
  12. Coherent mimo radar and waveform diversity. Christopher Gianelli, Jian Li, and Peter Stoica. In Wiley Encyclopedia of Electrical and Electronics Engineering, pp 1-19, John Wiley & Sons, Hoboken, NJ, 2015. (DOI).
  13. Identification of the Reichardt elementary motion detector model. Egi Hidayat, Alexander Medvedev, and Karin Nordström. In Signal and Image Analysis for Biomedical and Life Sciences, volume 823 of Advances in Experimental Medicine and Biology, pp 83-105, Springer, 2015. (DOI).
  14. Joint vehicle trajectory and model parameter estimation using road side sensors. Roland Hostettler, Wolfgang Birk, and Magnus Lundberg Nordenvaad. In IEEE Sensors Journal, volume 15, number 9, pp 5075-5086, 2015. (DOI).
  15. Robust tuning of bending-points detection algorithms in batch-operated processes: Application to autothermal thermophilic aerobic digesters. Ion Irizar, Jesús Zambrano, Bengt Carlsson, Mikel Morrás, and Enrique Aymerich. In Environmental Modelling & Software, volume 71, pp 148-158, 2015. (DOI).
  16. Parametric and nonparametric analysis of eye-tracking data by anomaly detection. Daniel Jansson, Olov Rosén, and Alexander Medvedev. In IEEE Transactions on Control Systems Technology, volume 23, number 4, pp 1578-1586, 2015. (DOI).
  17. Stochastic anomaly detection in eye-tracking data for quantification of motor symptoms in Parkinson's disease. Daniel Jansson, Alexander Medvedev, Hans Axelson, and Dag Nyholm. In Signal and Image Analysis for Biomedical and Life Sciences, volume 823 of Advances in Experimental Medicine and Biology, pp 63-82, Springer, 2015. (DOI).
  18. Indoor positioning using ultrawideband and inertial measurements. Manon Kok, Jeroen D. Hol, and Thomas B. Schön. In IEEE Transactions on Vehicular Technology, volume 64, number 4, pp 1293-1303, 2015. (DOI).
  19. Modeling the effect of intravenous anesthetics: A path toward individualization. Margarida Martins da Silva, Alexander Medvedev, Torbjörn Wigren, and Teresa Mendonça. In IEEE Design & Test, volume 32, number 5, pp 17-26, 2015. (DOI).
  20. Performance of an adaptive controller for the neuromuscular blockade based on inversion of a Wiener model. Margarida Martins da Silva, Luis Paz, Torbjörn Wigren, and Teresa Mendonça. In Asian Journal of Control, volume 17, number 4, pp 1136-1147, 2015. (DOI).
  21. Modeling of testosterone regulation by pulse-modulated feedback. Per Mattsson and Alexander Medvedev. In Signal and Image Analysis for Biomedical and Life Sciences, volume 823 of Advances in Experimental Medicine and Biology, pp 23-40, Springer, 2015. (DOI).
  22. Particle filtering based identification for autonomous nonlinear ODE models. Jerker Nordh, Torbjörn Wigren, Thomas B. Schön, and Bo Bernhardsson. In Proc. 17th IFAC Symposium on System Identification, volume 48:28 of IFAC-PapersOnLine, pp 415-420, International Federation of Automatic Control, 2015. (DOI).
  23. A closed loop stability condition of switched systems applied to NCSs with packet loss. Johannes Nygren and Kristiaan Pelckmans. In Proc. 5th IFAC Workshop on Distributed Estimation and Control in Networked Systems, International Federation of Automatic Control, 2015.
  24. Conditions for input-output stability of discrete-time Luré systems with time-varying delays. Johannes Nygren and Kristiaan Pelckmans. In Proc. 54th Conference on Decision and Control, pp 7707-7714, IEEE, Piscataway, NJ, 2015.
  25. Stability analysis of an adaptively sampled controller for SISO systems with nonlinear feedback. Johannes Nygren and Kristiaan Pelckmans. In Proc. American Control Conference: ACC 2015, pp 5353-5358, American Automatic Control Council, 2015. (DOI, fulltext:postprint).
  26. ATAD control goals through the analysis of process variables and evaluation of quality, production and cost. Silvano Nájera, Montserrat Gil-Martínez, and Jesús A. Zambrano. In Water Science and Technology, volume 71, number 5, pp 717-724, 2015. (DOI).
  27. High-resolution imaging for impulse-based forward-looking ground penetrating radar. Ode Ojowu, Luzhou Xu, Jian Li, John Anderson, Lam Nguyen, and Peter Stoica. In International Journal of Remote Sensing Applications, volume 5, pp 11-24, 2015. (DOI).
  28. Nuclear Norms for System Identification: a direct input-output approach. Kristiaan Pelckmans and Rubén Cubo. In Proc. 17th IFAC Symposium on System Identification, volume 48:28 of IFAC-PapersOnLine, pp 644-649, International Federation of Automatic Control, 2015. (DOI).
  29. Parallel recursive estimation using Monte Carlo and orthogonal series expansions. Olov Rosén and Alexander Medvedev. In Proc. American Control Conference: ACC 2015, pp 3905-3910, American Automatic Control Council, 2015. (DOI).
  30. Detecting anomalous air flow-ammonia load ratios, using Gaussian process regression. Oscar Samuelsson, Jesús Zambrano, Anders Björk, Tatiana Chistiakova, and Bengt Carlsson. In Proc. 9th IWA Symposium on Systems Analysis and Integrated Assessment, 2015.
  31. Multi-rate uplink channel prediction and enhanced link adaptation for VoLTE. David Sandberg and Torbjörn Wigren. In Proc. 82nd Vehicular Technology Conference, IEEE, Piscataway, NJ, 2015. (DOI).
  32. Frequency domain EIV identification combiningthe Frisch scheme and Yule-Walker equations. Umberto Soverini and Torsten Söderström. In European Control Conference, Linz, Austria, 2015.
  33. System components of a general theory of software engineering. Anca-Juliana Stoica, Kristiaan Pelckmans, and William Rowe. In Science of Computer Programming, volume 101, pp 42-65, 2015. (DOI).
  34. Marginalizing Gaussian process hyperparameters using sequential Monte Carlo. Andreas Svensson, Johan Dahlin, and Thomas B. Schön. In Proc. 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, pp 477-480, IEEE, Piscataway, NJ, 2015. (DOI, fulltext:postprint).
  35. Nonlinear state space model identification using a regularized basis function expansion. Andreas Svensson, Thomas B. Schön, Arno Solin, and Simo Särkkä. In Proc. 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, pp 481-484, IEEE, Piscataway, NJ, 2015. (DOI).
  36. Nonlinear state space smoothing using the conditional particle filter. Andreas Svensson, Thomas B. Schön, and Manon Kok. In Proc. 17th IFAC Symposium on System Identification, volume 48:28 of IFAC-PapersOnLine, pp 975-980, International Federation of Automatic Control, 2015. (DOI).
  37. Model-based temperature control of a selective catalytic reduction system. Soma Tayamon, Anders Larsson, and Björn Westerberg. In IET Control Theory & Applications, volume 9, number 2, pp 211-221, 2015. (DOI).
  38. On Identification via EM with Latent Disturbances and Lagrangian Relaxation. Jack Umenberger, Johan Wågberg, Ian R. Manchester, and Thomas B. Schön. In , pp 69-74, 2015. (DOI, External link).
  39. Implication of RF EMF exposure limitations on 5G data rates above 6 GHz. Torbjörn Wigren, Davide Colombi, Björn Thors, and Jan-Erik Berg. In Proc. 82nd Vehicular Technology Conference, IEEE, Piscataway, NJ, 2015. (DOI).
  40. Low-frequency limitations in saturated and delayed networked control. Torbjörn Wigren. In Proc. International Conference on Control Applications: CCA 2015, pp 569-576, IEEE, Piscataway, NJ, 2015. (DOI).
  41. Model order and identifiability of non-linear biological systems in stable oscillation. Torbjörn Wigren. In IEEE/ACM Transactions on Computational Biology & Bioinformatics, volume 12, number 6, pp 1479-1484, 2015. (DOI).
  42. Nonlinear identification of biological clock dynamics. Torbjörn Wigren and Per Lötstedt. In Proc. 54th Conference on Decision and Control, pp 602-608, IEEE, Piscataway, NJ, 2015. (DOI).
  43. Nonlinear identification of neuron models. Torbjörn Wigren. In Proc. International Conference on Control Applications: CCA 2015, pp 1340-1346, IEEE, Piscataway, NJ, 2015. (DOI).
  44. Wireless interference power estimation for inter-cell interference coordination. Torbjörn Wigren. In IET Communications, volume 9, number 12, pp 1539-1546, 2015. (DOI).
  45. Bayesian nonparametric identification of piecewise affine ARX systems. Johan Wågberg, Fredrik Lindsten, and Thomas B. Schön. In , pp 709-714, 2015. (DOI, External link).
  46. Design degrees of freedom in a hybrid observer for a continuous plant under an intrinsic pulse-modulated feedback. Diana Yamalova, Alexander Churilov, and Alexander Medvedev. In , volume 48:11 of IFAC-PapersOnLine, pp 1080-1085, 2015. (DOI).
  47. Finite-dimensional hybrid observer for delayed impulsive model of testosterone regulation. Diana Yamalova, Alexander Churilov, and Alexander Medvedev. In Mathematical problems in engineering (Print), volume 2015, pp 190463:1-12, 2015. (DOI, Fulltext).
  48. State estimation in a delayed impulsive model of testosterone regulation by a finite-dimensional hybrid observer. Diana Yamalova, Alexander Churilov, and Alexander Medvedev. In Proc. 14th European Control Conference, pp 1450-1455, IEEE, 2015. (DOI).
  49. Generalized Vandermonde decomposition and its use for multi-dimensional super-resolution. Zai Yang, Lihua Xie, and Peter Stoica. In Proc. International Symposium on Information Theory: ISIT 2015, pp 2011-2015, Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, 2015. (DOI).
  50. Cramér–Rao bound analog of Bayes' rule. Dave Zachariah and Peter Stoica. In IEEE signal processing magazine (Print), volume 32, number 2, pp 164-168, 2015. (DOI).
  51. Online hyperparameter-free sparse estimation method. Dave Zachariah and Peter Stoica. In IEEE Transactions on Signal Processing, volume 63, number 13, pp 3348-3359, 2015. (DOI).
  52. Optimal steady-state design of zone volumes of bioreactors with Monod growth kinetics. Jesús Zambrano, Bengt Carlsson, and Stefan Diehl. In Biochemical engineering journal, volume 100, pp 59-66, 2015. (DOI).
  53. Bifurcation analysis of PID-controlled neuromuscular blockade in closed-loop anesthesia. Zhanybai T. Zhusubaliyev, Alexander Medvedev, and Margarida Martins da Silva. In Journal of Process Control, volume 25, pp 152-163, 2015. (DOI).
  54. Multistability and hidden attractors in an impulsive Goodwin oscillator with time delay. Zhanybai T. Zhusubaliyev, Erik Mosekilde, Alexander N. Churilov, and Alexander Medvedev. In The European Physical Journal Special Topics, volume 224, number 8, pp 1519-1539, 2015. (DOI).

Numerical Analysis (Numerisk analys)

  1. Classical iterative methods. Owe Axelsson. In Encyclopedia of Applied and Computational Mathematics, pp 205-224, Springer, 2015. (DOI).
  2. Numerical solution of the time-dependent Navier–Stokes equation for variable density–variable viscosity: Part I. Owe Axelsson, Xin He, and Maya Neytcheva. In Mathematical Modelling and Analysis, volume 20, pp 232-260, 2015. (DOI, fulltext:postprint).
  3. Iterated fractional Tikhonov regularization. Davide Bianchi, Alessandro Buccini, Marco Donatelli, and Stefano Serra-Capizzano. In Inverse Problems, volume 31, pp 055005:1-34, 2015. (DOI).
  4. Applications for ultrascale computing. Lars Ailo Bongo, Raimondas Ciegis, Neki Frasheri, Jing Gong, Dragi Kimovski, Peter Kropf, Svetozar Margenov, Milan Mihajlovic, Maya Neytcheva, Thomas Rauber, Gudula Rünger, Roman Trobec, Roel Wuyts, and Roman Wyrzykowski. In Supercomputing Frontiers and Innovations, volume 2, number 1, pp 19-48, 2015. (DOI, Fulltext).
  5. Simulation of the Taylor–Green vortex using high­-order flux reconstruction schemes. Jonathan R. Bull and Antony Jameson. In AIAA Journal, volume 53, number 9, pp 2750-2761, 2015. (DOI, fulltext:postprint).
  6. Goal-oriented adaptive finite element methods for elliptic problems revisited. Markus Bürg and Murtazo Nazarov. In Journal of Computational and Applied Mathematics, volume 287, pp 125-147, 2015. (DOI).
  7. Accelerated multigrid for graph Laplacian operators. Pietro Dell'Acqua, Antonio Frangioni, and Stefano Serra-Capizzano. In Applied Mathematics and Computation, volume 270, pp 193-215, 2015. (DOI).
  8. Computational evaluation of multi-iterative approaches for solving graph-structured large linear systems. Pietro Dell'Acqua, Antonio Frangioni, and Stefano Serra-Capizzano. In Calcolo, volume 52, pp 425-444, 2015. (DOI).
  9. Robust and optimal multi-iterative techniques for IgA Galerkin linear systems. Marco Donatelli, Carlo Garoni, Carla Manni, Stefano Serra-Capizzano, and Hendrik Speleers. In Computer Methods in Applied Mechanics and Engineering, volume 284, pp 230-264, 2015. (DOI).
  10. Robust and optimal multi-iterative techniques for IgA collocation linear systems. Marco Donatelli, Carlo Garoni, Carla Manni, Stefano Serra-Capizzano, and Hendrik Speleers. In Computer Methods in Applied Mechanics and Engineering, volume 284, pp 1120-1146, 2015. (DOI).
  11. Two-grid optimality for Galerkin linear systems based on B-splines. Marco Donatelli, Carlo Garoni, Carla Manni, Stefano Serra-Capizzano, and Hendrik Speleers. In Computing and Visualization in Science, volume 17, pp 119-133, 2015. (DOI).
  12. Numerical and computational aspects of some block-preconditioners for saddle point systems. Ali Dorostkar, Maya Neytcheva, and Björn Lund. In Parallel Computing, volume 49, pp 164-178, 2015. (DOI).
  13. Schur complement matrix and its (elementwise) approximation: A spectral analysis based on GLT sequences. Ali Dorostkar, Maya Neytcheva, and Stefano Serra-Capizzano. In Large-Scale Scientific Computing, volume 9374 of Lecture Notes in Computer Science, pp 419-426, Springer, 2015. (DOI).
  14. Boundary conditions and stability of a perfectly matched layer for the elastic wave equation in first order form. Kenneth Duru, Jeremy E. Kozdon, and Gunilla Kreiss. In Journal of Computational Physics, volume 303, pp 372-395, 2015. (DOI).
  15. On multiscale methods in Petrov–Galerkin formulation. Daniel Elfverson, Victor Ginting, and Patrick Henning. In Numerische Mathematik, volume 131, pp 643-682, 2015. (DOI).
  16. A general tool for determining the asymptotic spectral distribution of Hermitian matrix-sequences. Carlo Garoni, Stefano Serra-Capizzano, and Paris Vassalos. In Operators and Matrices, volume 9, pp 549-561, 2015. (Article).
  17. Spectral analysis and spectral symbol of <em>d</em>-variate Q<em><sub>p</sub></em> Lagrangian FEM stiffness matrices. Carlo Garoni, Stefano Serra-Capizzano, and Debora Sesana. In SIAM Journal on Matrix Analysis and Applications, volume 36, pp 1100-1128, 2015. (DOI).
  18. Tools for determining the asymptotic spectral distribution of non-Hermitian perturbations of Hemitian matrix-sequences and applications. Carlo Garoni, Stefano Serra-Capizzano, and Debora Sesana. In Integral equations and operator theory, volume 81, pp 213-225, 2015. (DOI).
  19. Unsteady simulations of rotor stator interactions using SBP-SAT schemes: Status and challenges. Giorgio Giangaspero, Martin Almquist, Ken Mattsson, and Edwin van der Weide. In Spectral and High Order Methods for Partial Differential Equations: ICOSAHOM 2014, volume 106 of Lecture Notes in Computational Science and Engineering, pp 247-255, Springer, 2015. (DOI).
  20. Diffusion equation: Computation. Bertil Gustafsson. In Encyclopedia of Applied and Computational Mathematics, pp 353-356, Springer, 2015. (DOI).
  21. On preconditioning of incompressible non-Newtonian flow problems. Xin He, Maya Neytcheva, and Cornelis Vuik. In Journal of Computational Mathematics, volume 33, pp 33-58, 2015. (DOI).
  22. Error control and adaptivity for heterogeneous multiscale approximations of nonlinear monotone problems. Patrick Henning and Mario Ohlberger. In Discrete and Continuous Dynamical Systems. Series S, volume 8, pp 119-150, 2015. (DOI).
  23. On the bimodality in an introductory programming course: An analysis of student performance factors. Lars Josef Höök and Anna Eckerdal. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 79-86, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  24. Coupling of Gaussian beam and finite difference solvers for semiclassical Schrödinger equations. Emil Kieri, Gunilla Kreiss, and Olof Runborg. In Advances in Applied Mathematics and Mechanics, volume 7, pp 687-714, 2015. (DOI, fulltext:postprint).
  25. Finite difference methods. Gunilla Kreiss. In Encyclopedia of Applied and Computational Mathematics, pp 516-521, Springer, 2015. (DOI).
  26. Fokker–Planck equation: Computation. Per Lötstedt. In Encyclopedia of Applied and Computational Mathematics, pp 556-559, Springer, 2015. (DOI).
  27. Numerical option pricing without oscillations using flux limiters. Per Lötstedt and Lina von Sydow. In Computers and Mathematics with Applications, volume 70, pp 1-10, 2015. (DOI, fulltext:postprint).
  28. Simulation of stochastic diffusion via first exit times. Per Lötstedt and Lina Meinecke. In Journal of Computational Physics, volume 300, pp 862-886, 2015. (DOI, fulltext:postprint).
  29. Stabilized high-order Galerkin methods based on a parameter-free dynamic SGS model for LES. Simone Marras, Murtazo Nazarov, and Francis X. Giraldo. In Journal of Computational Physics, volume 301, pp 77-101, 2015. (DOI).
  30. High-fidelity numerical simulation of the dynamic beam equation. Ken Mattsson and Vidar Stiernström. In Journal of Computational Physics, volume 286, pp 194-213, 2015. (DOI, fulltext:postprint).
  31. Optimal bounds for a Lagrange interpolation inequality for piecewise linear continuous finite elements in two space dimensions. Èrgash Muhamadiev and Murtazo Nazarov. In Journal of Mathematical Analysis and Applications, volume 423, pp 940-955, 2015. (DOI).
  32. Stable difference methods for block-oriented adaptive grids. Anna Nissen, Katharina Kormann, Magnus Grandin, and Kristoffer Virta. In Journal of Scientific Computing, volume 65, pp 486-511, 2015. (DOI).
  33. Quasi-optimal preconditioners for finite element approximations of diffusion dominated convection–diffusion equations on (nearly) equilateral triangle meshes. Alessandro Russo, Stefano Serra-Capizzano, and Cristina Tablino-Possio. In Numerical Linear Algebra with Applications, volume 22, pp 123-144, 2015. (DOI).
  34. A radial basis function partition of unity collocation method for convection–diffusion equations arising in financial applications. Ali Safdari-Vaighani, Alfa Heryudono, and Elisabeth Larsson. In Journal of Scientific Computing, volume 64, pp 341-367, 2015. (DOI, fulltext:postprint).
  35. Realization of adiabatic Aharonov–Bohm scattering with neutrons. Erik Sjöqvist, Martin Almquist, Ken Mattsson, Zeynep Nilhan Gürkan, and Björn Hessmo. In Physical Review A. Atomic, Molecular, and Optical Physics, volume 92, number 5, pp 052108:1-5, 2015. (DOI).
  36. A scalable RBF–FD method for atmospheric flow. Martin Tillenius, Elisabeth Larsson, Erik Lehto, and Natasha Flyer. In Journal of Computational Physics, volume 298, pp 406-422, 2015. (DOI, fulltext:postprint).
  37. Interface waves in almost incompressible elastic materials. Kristoffer Virta and Gunilla Kreiss. In Journal of Computational Physics, volume 303, pp 313-330, 2015. (DOI, fulltext:postprint).
  38. Nonlinear identification of biological clock dynamics. Torbjörn Wigren and Per Lötstedt. In Proc. 54th Conference on Decision and Control, pp 602-608, IEEE, Piscataway, NJ, 2015. (DOI).
  39. An efficient multi-step iterative method for computing the numerical solution of systems of nonlinear equations associated with ODEs. Malik Zaka Ullah, Stefano Serra-Capizzano, and Fayyaz Ahmad. In Applied Mathematics and Computation, volume 250, pp 249-259, 2015. (DOI).
  40. Higher order multi-step iterative method for computing the numerical solution of systems of nonlinear equations: Application to nonlinear PDEs and ODEs. Malik Zaka Ullah, Stefano Serra-Capizzano, Fayyaz Ahmad, and Eman S. Al-Aidarous. In Applied Mathematics and Computation, volume 269, pp 972-987, 2015. (DOI).
  41. Adaptive finite differences and IMEX time-stepping to price options under Bates model. Lina von Sydow, Jari Toivanen, and Chi Zhang. In International Journal of Computer Mathematics, volume 92, pp 2515-2529, 2015. (DOI, fulltext:postprint).
  42. BENCHOP—The BENCHmarking project in Option Pricing. Lina von Sydow, Lars Josef Höök, Elisabeth Larsson, Erik Lindström, Slobodan Milovanovi?, Jonas Persson, Victor Shcherbakov, Yuri Shpolyanskiy, Samuel Sirén, Jari Toivanen, Johan Waldén, Magnus Wiktorsson, Jeremy Levesley, Juxi Li, Cornelis W. Oosterlee, Maria J. Ruijter, Alexander Toropov, and Yangzhang Zhao. In International Journal of Computer Mathematics, volume 92, pp 2361-2379, 2015. (DOI, fulltext:postprint).

Computational Science (Tillämpad beräkningsvetenskap)

  1. Self-adaptive multiprecision preconditioners on multicore and manycore architectures. Hartwig Anzt, Dimitar Lukarski, Stanimire Tomov, and Jack Dongarra. In High Performance Computing for Computational Science – VECPAR 2014, volume 8969 of Lecture Notes in Computer Science, pp 115-123, Springer, 2015. (DOI).
  2. Efficient inter-process synchronization for parallel discrete event simulation on multicores. Pavol Bauer, Jonatan Lindén, Stefan Engblom, and Bengt Jonsson. In Proc. 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, pp 183-194, ACM Press, New York, 2015. (DOI).
  3. Sensitivity estimation and inverse problems in spatial stochastic models of chemical kinetics. Pavol Bauer and Stefan Engblom. In Numerical Mathematics and Advanced Applications: ENUMATH 2013, volume 103 of Lecture Notes in Computational Science and Engineering, pp 519-527, Springer, 2015. (DOI).
  4. Learning practice and theory in programming education: Students’ lived experience. Anders Berglund and Anna Eckerdal. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 180-186, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  5. Learning to program: A discussion on the interplay of theory and practice. Anders Berglund and Anna Eckerdal. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 16-18, 2015. (Proceedings).
  6. Conformal prediction in Spark: Large-scale machine learning with confidence. Marco Capuccini, Lars Carlsson, Ulf Norinder, and Ola Spjuth. In Proc. 2nd International Symposium on Big Data Computing, pp 61-67, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  7. Competencies for paradigm shift "survival". Mats Daniels, Åsa Cajander, Anna Eckerdal, Mats Lind, Aletta Nylén, Tony Clear, and Roger McDermott. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI).
  8. Relating theory and practice in laboratory work: a variation theoretical study. Anna Eckerdal. In Studies in Higher Education, volume 40, pp 867-880, 2015. (DOI).
  9. Machine learning for ultrafast X-ray diffraction patterns on large-scale GPU clusters. Tomas Ekeberg, Stefan Engblom, and Jing Liu. In The international journal of high performance computing applications, volume 29, pp 233-243, 2015. (DOI, fulltext:postprint).
  10. Strong convergence for split-step methods in stochastic jump kinetics. Stefan Engblom. In SIAM Journal on Numerical Analysis, volume 53, pp 2655-2676, 2015. (DOI, fulltext:print).
  11. Data structures and algorithms for high-dimensional structured adaptive mesh refinement. Magnus Grandin. In Advances in Engineering Software, volume 82, pp 75-86, 2015. (DOI).
  12. Reaction rates for mesoscopic reaction-diffusion kinetics. Stefan Hellander, Andreas Hellander, and Linda Petzold. In Physical Review E. Statistical, Nonlinear, and Soft Matter Physics, volume 91, pp 023312:1-12, 2015. (DOI, fulltext:print).
  13. Imputation of single nucleotide polymorphism genotypes in biparental, backcross, and topcross populations with a hidden Markov model. John M. Hickey, Gregor Gorjanc, Rajeev K. Varshney, and Carl Nettelblad. In Crop science, volume 55, pp 1934-1946, 2015. (DOI, Fulltext).
  14. On the bimodality in an introductory programming course: An analysis of student performance factors. Lars Josef Höök and Anna Eckerdal. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 79-86, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  15. Coupling of Gaussian beam and finite difference solvers for semiclassical Schrödinger equations. Emil Kieri, Gunilla Kreiss, and Olof Runborg. In Advances in Applied Mathematics and Mechanics, volume 7, pp 687-714, 2015. (DOI, fulltext:postprint).
  16. Stiff convergence of force-gradient operator splitting methods. Emil Kieri. In Applied Numerical Mathematics, volume 94, pp 33-45, 2015. (DOI, fulltext:postprint).
  17. Accuracy of the Michaelis–Menten approximation when analysing effects of molecular noise. Michael J. Lawson, Linda Petzold, and Andreas Hellander. In Journal of the Royal Society Interface, volume 12, number 106, pp 20150054:1-10, 2015. (DOI, fulltext:postprint).
  18. Stochastic focusing coupled with negative feedback enables robust regulation in biochemical reaction networks. Andreas Milias-Argeitis, Stefan Engblom, Pavol Bauer, and Mustafa Khammash. In Journal of the Royal Society Interface, volume 12, number 113, pp 20150831:1-10, 2015. (DOI, fulltext:postprint).
  19. Canonical density matrix perturbation theory. Anders M. N. Niklasson, Marc J. Cawkwell, Emanuel H. Rubensson, and Elias Rudberg. In Physical Review E. Statistical, Nonlinear, and Soft Matter Physics, volume 92, pp 063301:1-8, 2015. (DOI, fulltext:print).
  20. Stable difference methods for block-oriented adaptive grids. Anna Nissen, Katharina Kormann, Magnus Grandin, and Kristoffer Virta. In Journal of Scientific Computing, volume 65, pp 486-511, 2015. (DOI).
  21. Multidimensional analysis of creative coding MOOC forums: a methodological discussion. Aletta Nylén, Neena Thota, Anna Eckerdal, Päivi Kinnunen, Matthew Butler, and Michael Morgan. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 137-141, ACM Press, New York, 2015. (DOI).
  22. Second year Computer Science and IT students' experience of participation in the discipline. Anne-Kathrin Peters, Anders Berglund, Anna Eckerdal, and Arnold Pears. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 68-76, ACM Press, New York, 2015. (DOI).
  23. Wave packet simulations of antiproton scattering on molecular hydrogen. Henrik Stegeby, Markus Kowalewski, Konrad Piszczatowski, and Hans O. Karlsson. In Journal of Physics B: Atomic, Molecular and Optical Physics, volume 48, number 19, pp 195204:1-7, 2015. (DOI).
  24. A scalable RBF–FD method for atmospheric flow. Martin Tillenius, Elisabeth Larsson, Erik Lehto, and Natasha Flyer. In Journal of Computational Physics, volume 298, pp 406-422, 2015. (DOI, fulltext:postprint).
  25. Resource-aware task scheduling. Martin Tillenius, Elisabeth Larsson, Rosa M. Badia, and Xavier Martorell. In ACM Transactions on Embedded Computing Systems, volume 14, number 1, pp 5:1-25, 2015. (DOI, Fulltext).
  26. SuperGlue: A shared memory framework using data versioning for dependency-aware task-based parallelization. Martin Tillenius. In SIAM Journal on Scientific Computing, volume 37, pp C617-C642, 2015. (DOI, fulltext:print).
  27. Scaling predictive modeling in drug development with cloud computing. Behrooz Torabi Moghadam, Jonathan Alvarsson, Marcus Holm, Martin Eklund, Lars Carlsson, and Ola Spjuth. In Journal of Chemical Information and Modeling, volume 55, pp 19-25, 2015. (DOI).
  28. Accelerating COBAYA3 on multi-core CPU and GPU systems using PARALUTION. Nico Trost, Javier Jiménez, Dimitar Lukarski, and Victor Sanchez. In Annals of Nuclear Energy, volume 82, pp 252-259, 2015. (DOI).

Computer Systems (Datorteknik)

  1. Generating models of infinite-state communication protocols using regular inference with abstraction. Fides Aarts, Bengt Jonsson, Johan Uijen, and Frits Vaandrager. In Formal methods in system design, volume 46, number 1, pp 1-41, 2015. (DOI).
  2. Well Structured Transition Systems with History. Parosh A. Abdulla, Giorgio Delzanno, and Marco Montali. In Electronic Proceedings in Theoretical Computer Science, number 193, pp 115-128, 2015. (DOI).
  3. MPass: An efficient tool for the analysis of message-passing programs. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Jonathan Cederberg, Subham Modi, Othmane Rezine, and Gaurav Saini. In Formal Aspects of Component Software, volume 8997 of Lecture Notes in Computer Science, pp 198-206, Springer, 2015. (DOI).
  4. Norn: An SMT solver for string constraints. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Lukás Holík, Ahmed Rezine, Philipp Rümmer, and Jari Stenman. In Computer Aided Verification: Part I, volume 9206 of Lecture Notes in Computer Science, pp 462-469, Springer, 2015. (DOI).
  5. Precise and sound automatic fence insertion procedure under PSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång, and Tuan Phong Ngo. In Networked Systems: NETYS 2015, volume 9466 of Lecture Notes in Computer Science, pp 32-47, Springer, 2015. (DOI).
  6. Stateless model checking for TSO and PSO. Parosh Aziz Abdulla, Stavros Aronis, Mohamed Faouzi Atig, Bengt Jonsson, Carl Leonardsson, and Konstantinos Sagonas. In Tools and Algorithms for the Construction and Analysis of Systems: TACAS 2015, volume 9035 of Lecture Notes in Computer Science, pp 353-367, Springer Berlin/Heidelberg, 2015. (DOI).
  7. The Best of Both Worlds: Trading efficiency and optimality in fence insertion for TSO. Parosh Aziz Abdulla, Mohamed Faouzi Atig, and Tuan-Phong Ngo. In Programming Languages and Systems: ESOP 2015, volume 9032 of Lecture Notes in Computer Science, pp 308-332, Springer Berlin/Heidelberg, 2015. (DOI, External link).
  8. Verification of Cache Coherence Protocols wrt. Trace Filters. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Zeinab Ganjei, Ahmed Rezine, and Yunyun Zhu. In Proc. 15th Conference on Formal Methods in Computer-Aided Design, pp 9-16, IEEE, Piscataway, NJ, 2015. (Article).
  9. Verification of buffered dynamic register automata. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, and Othmane Rezine. In Networked Systems: NETYS 2015, volume 9466 of Lecture Notes in Computer Science, pp 15-31, Springer, 2015. (DOI).
  10. What's decidable about availability languages?. Parosh Aziz Abdulla, Mohamed Faouzi Atig, Roland Meyer, and Mehdi Seyed Salehi. In Proc. 35th IARCS Conference on Foundation of Software Technology and Theoretical Computer Science, volume 45 of LIPIcs, pp 192-205, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2015. (DOI, Fulltext).
  11. A step towards detecting online grooming: Identifying adults pretending to be children. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI).
  12. Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
  13. Detecting jihadist messages on twitter. Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI).
  14. Efficient algorithms for bounded rigid <em>E</em>-unification. Peter Backeman and Philipp Rümmer. In Automated Reasoning with Analytic Tableaux and Related Methods, volume 9323 of Lecture Notes in Computer Science, pp 70-85, Springer, 2015. (DOI, fulltext:postprint).
  15. Free variables and theories: Revisiting rigid <em>E-</em>unification. Peter Backeman and Philipp Rümmer. In Frontiers of Combining Systems, volume 9322 of Lecture Notes in Computer Science, pp 3-13, Springer, 2015. (DOI, fulltext:postprint).
  16. Theorem proving with bounded rigid <em>E</em>-unification. Peter Backeman and Philipp Rümmer. In Automated Deduction – CADE-25, volume 9195 of Lecture Notes in Computer Science, pp 572-587, Springer, 2015. (DOI).
  17. Efficient inter-process synchronization for parallel discrete event simulation on multicores. Pavol Bauer, Jonatan Lindén, Stefan Engblom, and Bengt Jonsson. In Proc. 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, pp 183-194, ACM Press, New York, 2015. (DOI).
  18. Learning practice and theory in programming education: Students’ lived experience. Anders Berglund and Anna Eckerdal. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 180-186, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  19. Learning to program: A discussion on the interplay of theory and practice. Anders Berglund and Anna Eckerdal. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 16-18, 2015. (Proceedings).
  20. Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a staff development course. Anders Berglund, Arnold Pears, Aletta Nylén, Farooq Ahmad, Bader Alghamdi, Khalid Alghamdi, Ahmed Alhabish, Abdullah Aljoufi, Eidah Alzahrani, Rami Alzahrani, Ismat Aldmour, Areej Athama, Hamada Shihad AlSadoon, Rahmat Budiarto, Abdul Hafeez, Nadeem Hassan Daupota, Dhafer Faiz, Lubna Abdel Kareim Gabralla, Mohammad Gamar, Abdul Hannan, Bedine Kerim, F. A. Mazarbhuiya, Ahmed Rabea, Muhammad Qaiser Saleem, Nimir Saleh, and Mohamed Shenify. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 1-6, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  21. An automatable formal semantics for IEEE-754 floating-point arithmetic. Martin Brain, Cesare Tinelli, Philipp Rümmer, and Thomas Wahl. In Proc. 22nd Symposium on Computer Arithmetic, Proceedings Symposium on Computer Arithmetic, pp 160-167, IEEE Computer Society, 2015. (DOI).
  22. Vision seminars and administration of university education: A case study. Åsa Cajander, Bengt Sandblad, Thomas Lind, Roger McDermott, and Mats Daniels. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 29-32, 2015. (Proceedings).
  23. A structured approach to training open-ended problem solving. Sofia Cassel and Björn Victor. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 417-420, IEEE Press, Piscataway, NJ, 2015. (DOI).
  24. A succinct canonical register automaton model. Sofia Cassel, Falk Howar, Bengt Jonsson, Maik Merten, and Bernhard Steffen. In Journal of Logical and Algebraic Methods in Programming, volume 84, number 1, pp 54-66, 2015. (DOI).
  25. RALib: A LearnLib extension for inferring EFSMs. Sofia Cassel, Howar Falk, and Bengt Jonsson. In , 2015.
  26. Collaborative technologies in global engineering: New competencies and challenges. Mats Daniels, Åsa Cajander, Tony Clear, and Roger McDermott. In International journal of engineering education, volume 31, number 1, pp 267-281, 2015.
  27. Competencies for paradigm shift "survival". Mats Daniels, Åsa Cajander, Anna Eckerdal, Mats Lind, Aletta Nylén, Tony Clear, and Roger McDermott. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI).
  28. An optimal resource sharing protocol for generalized multiframe tasks. Pontus Ekberg, Nan Guan, Martin Stigge, and Wang Yi. In The Journal of logical and algebraic methods in programming, volume 84, number 1, pp 92-105, 2015. (DOI, fulltext:postprint).
  29. Uniprocessor feasibility of sporadic tasks remains coNP-complete under bounded utilization. Pontus Ekberg and Wang Yi. In Proc. 36th Real-Time Systems Symposium, pp 87-95, IEEE Computer Society, 2015. (DOI).
  30. Uniprocessor feasibility of sporadic tasks with constrained deadlines is strongly coNP-complete. Pontus Ekberg and Wang Yi. In Proc. 27th Euromicro Conference on Real-Time Systems, pp 281-286, IEEE, Piscataway, NJ, 2015. (DOI).
  31. Scalable point-to-multipoint communication for cloud networking using information-centric networking. Anders E. Eriksson, Börje Ohlman, Karl-Åke Persson, Adeel Mohammad Malik, Marcus Ihlar, and Linus Sunde. In Proc. 12th IEEE Consumer Communications and Networking Conference, pp 654-662, IEEE, Piscataway, NJ, 2015. (DOI).
  32. Automating regression verification. Dennis Felsing, Sarah Grebing, Vladimir Klebanov, Philipp Rümmer, and Mattias Ulbrich. In Software Engineering &amp; Management 2015, volume 239 of Lecture Notes in Informatics, pp 75-76, Gesellschaft für Informatik, Germany, 2015.
  33. Internet of Things and Future Threats Towards our Society. Torbjörn Fängström and Lisa Kaati. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
  34. Motivation and Grade Gap Related to Gender in a Programming Course. Virginia Grande and Joachim Parrow. In , 2015. (DOI).
  35. Perspectives on Volunteering for Initiatives for Women in Computing: a Case Study. Virginia Grande. In , Frontiers in Education Conference, pp 927-930, 2015.
  36. Bounding carry-in interference to improve fixed-priority global multiprocessor scheduling analysis. Nan Guan, Meiling Han, Chuancai Gu, Qingxu Deng, and Wang Yi. In Proc. 21st International Conference on Embedded and Real-Time Computing Systems and Applications, pp 11-20, IEEE Computer Society, 2015. (DOI).
  37. Delay analysis of structural real-time workload. Nan Guan, Yue Tang, Yang Wang, and Wang Yi. In Proc. 18th Conference on Design, Automation and Test in Europe, pp 223-228, IEEE, Piscataway, NJ, 2015. (DOI).
  38. Modular performance analysis of energy-harvesting real-time networked systems. Nan Guan, Mengying Zhao, Chun Jason Xue, Yongpan Liu, and Wang Yi. In Proc. 36th Real-Time Systems Symposium, pp 65-74, IEEE Computer Society, 2015. (DOI).
  39. Scalable timing analysis with refinement. Nan Guan, Yue Tang, Jakaria Abdullah, Martin Stigge, and Wang Yi. In Tools and Algorithms for the Construction and Analysis of Systems, volume 9035 of Lecture Notes in Computer Science, pp 3-18, Springer, 2015. (DOI).
  40. Mediator synthesis in a component algebra with data. Lukás Holik, Malte Isberner, and Bengt Jonsson. In Correct System Design, volume 9360 of Lecture Notes in Computer Science, pp 238-259, Springer, 2015. (DOI).
  41. A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. Xiping Hu, Terry H. S. Chu, Victor C. M. Leung, Edith C.-H. Ngai, Philippe Kruchten, and Henry C. B. Chan. In IEEE Communications Surveys and Tutorials, volume 17, number 3, pp 1557-1581, 2015. (DOI).
  42. Health Drive: Mobile healthcare onboard vehicles to promote safe driving. Xiping Hu, Xitong Li, Edith C.-H. Ngai, Jidi Zhao, Victor C. M. Leung, and Panos Nasiopoulos. In Proc. 48th Hawaii International Conference on System Sciences, International Conference on System Sciences, pp 3074-3083, IEEE Computer Society, 2015. (DOI).
  43. SAfeDJ: A crowd-cloud codesign approach to situation-aware music delivery for drivers. Xiping Hu, Junqi Deng, Jidi Zhao, Wenyan Hu, Edith C.-H. Ngai, Renfei Wang, Johnny Shen, Min Liang, Xitong Li, Victor C. M. Leung, and Yu-Kwong Kwok. In ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), volume 12, number 1s, pp 21:1-24, 2015. (DOI, fulltext:print).
  44. Patients' perceptions of their medical records from different subject positions. Isto Huvila, Åsa Cajander, Mats Daniels, and Rose-Mharie Åhlfeldt. In Journal of the Association for Information Science and Technology, volume 66, number 12, pp 2456-2470, 2015. (DOI).
  45. Analyzing multimode wireless sensor networks using the network calculus. Xi Jin, Nan Guan, Jintao Wang, and Peng Zeng. In Journal of Sensors, volume 2015, pp 851608:1-12, 2015. (DOI, fulltext:print).
  46. Timeprints for identifying social media users with multiple aliases. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Security Informatics, volume 4, pp 7:1-11, 2015. (DOI, Fulltext).
  47. Detecting multipliers of jihadism on twitter. Lisa Kaati, Enghin Omer, Nico Prucha, and Amendra Shrestha. In Proc. 15th ICDM Workshops, pp 954-960, IEEE Computer Society, 2015. (DOI).
  48. Scalable Analysis of Fault Trees with Dynamic Features. Jan Krcal and Pavel Krcal. In 2015 45Th Annual IEEE/IFIP International Conference On Dependable Systems And Networks, pp 89-100, 2015. (DOI).
  49. Facilities Collaboration in Cloud Manufacturing based on Generalized Collaboration Network. Wenxiang Li, Chunsheng Zhu, Edith C. -H. Ngai, Laurence T. Yang, Lei Shu, and Yuxia Sheng. In Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp 298-303, 2015. (DOI).
  50. Noninvasive and continuous blood pressure monitoring using wearable body sensor networks. Hao Lin, Wenyao Xu, Nan Guan, Dong Ji, Yangjie Wei, and Wang Yi. In IEEE Intelligent Systems, volume 30, number 6, pp 38-48, 2015. (DOI).
  51. PM2.5 Monitoring using Images from Smartphones in Participatory Sensing. Xiaoyang Liu, Zheng Song, Edith Ngai, Jian Ma, and Wendong Wang. In , pp 630-635, 2015.
  52. Quality assurance using international curricula and employer feedback. Marta Lárusdóttir, Mats Daniels, and Roger McDermott. In Conferences in Research and Practice in Information Technology, volume 160, pp 19-27, 2015. (External link, fulltext:postprint).
  53. Experiences From A Field Test Using Icn For Live Video Streaming. Adeel Mohammad Malik, Bengt Ahlgren, Börje Ohlman, Anders Lindgren, Edith Ngai, Lukas Klingsbo, and Magnus Lång. In 2015 IEEE International Conference on Multimedia &amp; Expo Workshops (ICMEW), IEEE International Conference on Multimedia and Expo Workshops, 2015.
  54. Bixie: Finding and understanding inconsistent code. Tim McCarthy, Philipp Rümmer, and Martin Schäf. In Proc. 37th IEEE/ACM International Conference on Software Engineering, pp 645-648, IEEE, Piscataway, NJ, 2015. (DOI).
  55. A comparative analysis of two globally distributed group projects: A perspective from CSCW/CSCL research. Roger McDermott, Mats Daniels, Åsa Cajander, Julian Bass, and JayPrakash Lalchandani. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1964-1972, IEEE Press, Piscataway, NJ, 2015. (DOI).
  56. Perseverance measures and attainment in first year computing science students. Roger McDermott, Mats Daniels, and Åsa Cajander. In Proc. 20th Conference on Innovation and Technology in Computer Science Education, pp 302-307, ACM Press, New York, 2015. (DOI).
  57. Mimer and Schedeval: Tools for Comparing Static Schedulers for Streaming Applications on Manycore Architectures. Nicolas Melot, Johan Janzén, and Christoph Kessler. In 2015 44Th International Conference On Parallel Processing Workshops, International Conference on Parallel Processing Workshops, pp 146-155, 2015. (DOI).
  58. Multidimensional analysis of creative coding MOOC forums: a methodological discussion. Aletta Nylén, Neena Thota, Anna Eckerdal, Päivi Kinnunen, Matthew Butler, and Michael Morgan. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 137-141, ACM Press, New York, 2015. (DOI).
  59. A Modeling Framework for Reuse Distance-based Estimation of Cache Performance. Xiaoyue Pan and Bengt Jonsson. In Performance Analysis of Systems and Software (ISPASS), 2015 IEEE International Symposium on, pp 62-71, IEEE, 2015. (DOI).
  60. Assuring the Quality of Engineering Education. Arnold Pears. In 2015 International Conference on Learning and Teaching in Computing and Engineering, pp 108-111, 2015. (DOI).
  61. Implications of anonymous assessment. Arnold Pears and Aletta Nylén. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 1404-1408, IEEE Press, Piscataway, NJ, 2015. (DOI).
  62. Preparing the global software engineer. Anne-Kathrin Peters, Waqar Hussain, Åsa Cajander, Tony Clear, and Mats Daniels. In Proc. 10th International Conference on Global Software Engineering, pp 61-70, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  63. Second year Computer Science and IT students' experience of participation in the discipline. Anne-Kathrin Peters, Anders Berglund, Anna Eckerdal, and Arnold Pears. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 68-76, ACM Press, New York, 2015. (DOI).
  64. BSD-based Elliptic Curve Cryptography for the Open Internet of Things. Oriol Pinol Pinol, Shahid Raza, Joakim Eriksson, and Thiemo Voigt. In 2015 7Th International Conference On New Technologies, Mobility And Security (NtTMS), International Conference on New Technologies Mobility and Security, 2015.
  65. On recursion-free Horn clauses and Craig interpolation. Philipp Rümmer, Hossein Hojjat, and Viktor Kuncak. In Formal methods in system design, volume 47, number 1, pp 1-25, 2015. (DOI).
  66. Energy Efficiency as an Orchestration Service for Mobile Internet of Things. Peramanathan Sathyamoorthy, Edith Ngai, Xiping Hu, and Victor Leung. In , pp 155-162, 2015. (DOI).
  67. Conflict-Directed Graph Coverage. Daniel Schwartz-Narbonne, Martin Schaef, Dejan Jovanovic, Philipp Rümmer, and Thomas Wies. In NASA FORMAL METHODS (NFM 2015), volume 9058 of Lecture Notes in Computer Science, pp 327-342, 2015. (DOI).
  68. Combinatorial abstraction refinement for feasibility analysis of static priorities. Martin Stigge and Wang Yi. In Real-time systems, volume 51, number 6, pp 639-674, 2015. (DOI).
  69. Graph-based models for real-time workload: a survey. Martin Stigge and Wang Yi. In Real-time systems, volume 51, number 5, pp 602-636, 2015. (DOI).
  70. Teaching and learning system thinking in technology. Maria Svensson, Åke Ingerman, and Anders Berglund. In Plurality and Complementarity of Approaches in Design and Technology Education, pp 404-409, Presses Universitaires de Provence, Marseille, 2015. (External link, fulltext:print).
  71. Connectivism and the use of technology/media in collaborative teaching and learning. Neena Thota. In From the Confucian Way to Collaborative Knowledge Co-Construction, volume 142 of New Directions for Teaching and Learning, pp 81-96, John Wiley & Sons, Hoboken, NJ, 2015.
  72. Engaging school students with tangible devices: Pilot project with .NET gadgeteer. Neena Thota, Gerald Estadieu, Antonio Ferrao, and Kai Meng Wong. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 112-119, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  73. Integrating international students into CS programs. Neena Thota and Anders Berglund. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 6-8, 2015. (Proceedings).
  74. Introducing Educational Technologies to Teachers: Experience Report. Neena Thota and João G. M. Negreiros. In Journal of University Teaching and Learning Practice, volume 12, number 1, pp 5:1-13, 2015. (External link).
  75. Micro-Architecture Independent Analytical Processor Performance and Power Modeling. Sam Van den Steen, Sander De Pestel, Moncef Mechri, Stijn Eyerman, Trevor Carlson, David Black-Schaffer, Erik Hagersten, and Lieven Eeckhout. In 2015 IEEE International Symposium on Performance Analysis and Software (ISPASS), IEEE International Symposium on Performance Analysis of Systems and Software-ISPASS, pp 32-41, 2015.
  76. The automatic detection and analysis of electrocardiogram based on Lorenz plot. Wenqi Wang, Yangjie Wei, Nan Guan, and Wang Yi. In Proc. 12th International Conference on Robotics and Biomimetics, pp 644-649, IEEE, Piscataway, NJ, 2015. (DOI).
  77. Diffusion-based three-dimensional reconstruction of complex surface using monocular vision. Yangjie Wei, Chengdong Wu, Wang Yi, and Wenxue Wang. In Optics Express, volume 23, number 23, pp 30364-30378, 2015. (DOI, Fulltext).
  78. Efficient shape reconstruction of microlens using optical microscopy. Yangjie Wei, Chengdong Wu, Wang Yi, and Zaili Dong. In IEEE Transactions on Industrial Electronics, volume 62, number 12, pp 7655-7664, 2015. (DOI).
  79. Collaborative Localization in Participatory Sensing with Load Balancing. Teng Xi, Edith Ngai, Zheng Song, Ye Tian, Xiangyang Gong, and Wendong Wang. In 2015 IEEE 23Rd International Symposium On Quality Of Service (IWQOS), pp 61-62, 2015.
  80. Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks. Y. Yang, Y. Tian, Edith Ngai, L. Zhang, Y. Teng, and W. Wang. In 2015 IEEE Global Communications Conference (Globecom), 2015.
  81. Vulnerable friend identification: Who should you beware of most in online social networks?. Yunjuan Yang, Ye Tian, Edith Ngai, Lanshan Zhang, Yining Teng, and Wendong Wang. In 2015 Ieee Global Communications Conference (Globecom), IEEE Global Communications Conference, IEEE, 2015. (DOI).
  82. Green Small Cell Planning in Smart Cities under Dynamic Traffic Demand. Li Zhou, Xiping Hu, Chunsheng Zhu, Edith C. -H. Ngai, Shan Wang, Jibo Wei, and Victor C. M. Leung. In 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference on Computer Communications Workshops, pp 618-623, 2015.
  83. Green Internet of Things for Smart World. Chunsheng Zhu, Victor C. M. Leung, Lei Shu, and Edith C.-H. Ngai. In IEEE Access, volume 3, pp 2151-2162, 2015. (DOI, Fulltext).
  84. Pricing Models for Sensor-Cloud. Chunsheng Zhu, Victor C. M. Leung, Edith C. -H. Ngai, Laurence T. Yang, Lei Shu, and Xiuhua Li. In 2015 IEEE 7Th International Conference On Cloud Computing Technology And Science (Cloudcom), pp 454-457, 2015. (DOI).

Computer Architecture and Computer Communication

(Datorarkitektur och datorkommunikation)

  1. Optimizing transfers of control in the static pipeline architecture. Ryan Baird, Peter Gavin, Magnus Själander, David Whalley, and Gang-Ryung Uh. In Proc. 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp 7-16, ACM Press, New York, 2015. (DOI).
  2. Improving data access efficiency by using context-aware loads and stores. Alen Bardizbanyan, Magnus Själander, David Whalley, and Per Larsson-Edefors. In Proc. 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp 27-36, ACM Press, New York, 2015. (DOI).
  3. The Load Slice Core Microarchitecture. Trevor E. Carlson, Wim Heirman, Osman Allam, Stefanos Kaxiras, and Lieven Eeckhout. In 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), pp 272-284, 2015. (DOI).
  4. StatTask: Reuse distance analysis for task-based applications. Germán Ceballos, Erik Hagersten, and David Black-Schaffer. In Proc. 7th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, pp 1-7, ACM Press, New York, 2015. (DOI).
  5. An efficient, self-contained, on-chip directory: DIR<sub>1</sub>-SISD. Mahdad Davari, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In Proc. 24th International Conference on Parallel Architectures and Compilation Techniques, pp 317-330, IEEE Computer Society, 2015. (DOI).
  6. The effects of granularity and adaptivity on private/shared classification for coherence. Mahdad Davari, Alberto Ros, Erik Hagersten, and Stefanos Kaxiras. In ACM Transactions on Architecture and Code Optimization (TACO), volume 12, number 3, 2015. (DOI).
  7. Scheduling instruction effects for a statically pipelined processor. Brandon Davis, Ryan Baird, Peter Gavin, Magnus Själander, Ian Finlayson, Farhad Rasapour, Gregory Cook, Gang-Ryung Uh, David Whalley, and Gary Tyson. In Proc. International Conference on Compilers, Architectures, and Synthesis for Embedded Systems: CASES 2015, pp 167-176, IEEE Press, Piscataway, NJ, 2015. (DOI).
  8. Enabling design of performance-controlled sensor network applications through task allocation and reallocation. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. 11th International Conference on Distributed Computing in Sensor Systems, pp 248-253, IEEE Computer Society, 2015. (DOI, fulltext:postprint).
  9. ProFuN TG: A Tool Using Abstract Task Graphs to Facilitate the Development, Deployment and Maintenance of Wireless Sensor Network Applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. Poster/Demo Session: 12th European Conference on Wireless Sensor Networks, pp 19-20, 2015.
  10. ProFuN TG: A tool for programming and managing performance-aware sensor network applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp 751-759, IEEE Computer Society, 2015. (DOI, fulltext:preprint).
  11. ProFuN TG: Programming Sensornets with Task Graphs for Increased Reliability and Energy-Efficiency. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In , IEEE Computer Society, 2015. (External link, fulltext:postprint).
  12. Towards a sensor system to tame the human elephant conflict. Charitha Elvitigala, Eranda Tennakoon, Ayyoob Hamza, Yasith Lokuge, Kasun De Zoysa, Chamath Keppitiyagama, Venkat Iyer, Kasun Hewage, and Thiemo Voigt. In Sensors Applications Symposium (SAS), pp 169-172, IEEE, 2015. (DOI).
  13. Energy-efficient fault-tolerant dynamic event region detection in wireless sensor networks. Hans-Jacob Enemark, Yue Zhang, Nicola Dragoni, and Charalampos Orfanidis. In Proc. 81st IEEE Vehicular Technology Conference, IEEE Vehicular Technology Conference Proceedings, IEEE conference proceedings, 2015. (fulltext:postprint).
  14. Energy-efficient medium access control for energy harvesting communications. Xenofon Fafoutis, Alessio Di Mauro, Charalampos Orfanidis, and Nicola Dragoni. In IEEE transactions on consumer electronics, volume 61, number 4, pp 402-410, 2015. (DOI).
  15. Inter-network interactions in the internet-of-things: Protocol and architecture challenges. Laura Marie Feeney. In , 2015.
  16. Modes of inter-network interaction in beacon-enabled IEEE 802.15.4 networks. Laura Marie Feeney, Michael Frey, Viktoria Fodor, and Mesut Günes. In Proc of the 14th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2015.
  17. Location and Density of Rain Gauges for the Estimation of Spatial Varying Precipitation. Marc Girons Lopez, Hjalmar Wennerström, Lars-Åke Nordén, and Jan Seibert. In Geografiska Annaler. Series A, Physical Geography, volume 97, number 1, pp 167-179, 2015. (DOI, Fulltext).
  18. A Quadcopter Controller to Maintain Radio Link Quality. Ayyoob Hamza, Chamath Keppitiyagama, Kasun De Zoysa, Venkat Iyer, Kasun Hewage, and Thiemo Voigt. In The First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, pp 21-26, 2015. (DOI, External link).
  19. Scalable Visual Codes for Embedding Digital Data in the Physical World. Frederik Hermans, Liam McNamara, and Thiemo Voigt. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 457-458, ACM, 2015. (DOI).
  20. An experimental study of attacks on the availability of Glossy. Kasun Hewage, Shahid Raza, and Thiemo Voigt. In Computers & electrical engineering, volume 41, pp 115-125, 2015. (DOI).
  21. Enabling TCP in mobile cyber-physical systems. Kasun Hewage, Simon Duquennoy, Venkatraman Iyer, and Thiemo Voigt. In Proc. 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp 289-297, IEEE Computer Society, 2015. (DOI).
  22. Detecting and avoiding multiple sources of interference in the 2.4 GHz spectrum. Venkatraman Iyer, Frederik Hermans, and Thiemo Voigt. In Wireless Sensor Networks, volume 8965 of Lecture Notes in Computer Science, pp 35-51, Springer, 2015. (DOI).
  23. Estimating packet delivery ratio for arbitrary packet sizes over wireless links. Martin Jacobsson and Christian Rohner. In IEEE Communications Letters, volume 19, number 4, pp 609-612, 2015. (DOI).
  24. Using software-defined networking principles for wireless sensor networks. Martin Jacobsson and Charalampos Orfanidis. In Proc. 11th Swedish National Computer Networking Workshop, 2015. (External link, fulltext:print).
  25. AREP: Adaptive Resource Efficient Prefetching for Maximizing Multicore Performance. Muneeb Khan, Michael A. Laurenzano, Jason Mars, Erik Hagersten, and David Black-Schaffer. In Proc. 24th International Conference on Parallel Architectures and Compilation Techniques, pp 367-378, IEEE Computer Society, 2015. (DOI, fulltext:postprint).
  26. Property-Based Testing of Sensor Networks. Andreas Löscher, Konstantinos Sagonas, and Thiemo Voigt. In Proc. 12th International Conference on Sensing, Communication, and Networking, pp 100-108, IEEE Communications Society, 2015.
  27. Load-Balanced Data Collection through Opportunistic Routing. Michel Mathieu, Simon Duquennoy, Bruno Quoitin, and Thiemo Voigt. In , pp 62-70, 2015.
  28. Security Challenges in Indoor Location Sensing using Bluetooth LE Broadcast. Prasant Misra, Shahid Raza, Vasanth Rajaraman, Jay Warrior, and Thiemo Voigt. In Poster Proc. 12th European Conference on Wireless Sensor Networks, 2015.
  29. Fault detection in WSNs: An energy efficiency perspective towards human-centric WSNs. Charalampos Orfanidis, Yue Zhang, and Nicola Dragoni. In Agent and Multi-Agent Systems: Technologies and Applications, volume 38 of Smart Innovation, Systems and Technologies, pp 285-300, Springer, 2015. (DOI).
  30. Cost-effective speculative scheduling in high performance processors. Arthur Perais, André Seznec, Pierre Michaud, Andreas Sembrant, and Erik Hagersten. In Proc. 42nd International Symposium on Computer Architecture, pp 247-259, ACM Press, New York, 2015. (DOI).
  31. Bluetooth Smart: An Enabling Technology for the Internet of Things. Shahid Raza, Prasant Misra, Zhitao He, and Thiemo Voigt. In , IEEE International Conference on Wireless and Mobile Computing Networking and Communications-WiMOB, pp 155-162, 2015.
  32. Security and Privacy in the IPv6-Connected Internet of Things. Shahid Raza, Chamath Keppitiyagama, and Thiemo Voigt. In Cyber-Physical Systems, CRC Press, 2015.
  33. Security in Visible Light Communication: Novel Challenges and Opportunities. Christian Rohner, Shahid Raza, Daniele Puccinelli, and Thiemo Voigt. In Sensors & Transducers Journal, volume 192, number 9, pp 9-15, 2015. (External link, fulltext:print).
  34. A dual-consistency cache coherence protocol. Alberto Ros and Alexandra Jimborean. In Proc. 29th International Parallel and Distributed Processing Symposium, pp 1119-1128, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:print).
  35. Callback: Efficient Synchronization without Invalidation with a Directory Just for Spin-Waiting. Alberto Ros and Stefanos Kaxiras. In 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), pp 427-438, 2015. (DOI).
  36. Hierarchical private/shared classification: The key to simple and efficient coherence for clustered cache hierarchies. Alberto Ros, Mahdad Davari, and Stefanos Kaxiras. In Proc. 21st International Symposium on High Performance Computer Architecture, pp 186-197, IEEE Computer Society Digital Library, 2015. (DOI).
  37. Full speed ahead: Detailed architectural simulation at near-native speed. Andreas Sandberg, Nikos Nikoleris, Trevor E. Carlson, Erik Hagersten, Stefanos Kaxiras, and David Black-Schaffer. In Proc. 18th International Symposium on Workload Characterization, pp 183-192, IEEE Computer Society, 2015. (DOI).
  38. Long Term Parking (LTP): Criticality-aware Resource Allocation in OOO Processors. Andreas Sembrant, Trevor E. Carlson, Erik Hagersten, David Black-Schaffer, Arthur Perais, André Seznec, and Pierre Michaud. In Proc. 48th International Symposium on Microarchitecture, pp 334-346, 2015. (DOI).
  39. Sensor-based Breakage Detection for Electric Fences. Eranda Tennakoon, Charith Madusanka, Kasun De Zoysa, Chamath Keppitiyagama, Venkat Iyer, Kasun Hewage, and Thiemo Voigt. In Sensors Applications Symposium (SAS), pp 137-140, IEEE, 2015. (DOI).
  40. Coordination of Wireless Sensor Networks using Visible Light. Ambuj Varshney, Luca Mottola, and Thiemo Voigt. In SenSys '15 Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 421-422, 2015. (DOI, External link).
  41. Directional Transmissions and Receptions for High-throughput Bulk Forwarding in Wireless Sensor Networks. Ambuj Varshney, Luca Mottola, Mats Carlsson, and Thiemo Voigt. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pp 351-364, 2015. (DOI, Fulltext, fulltext:print).
  42. dRTI: Directional Radio Tomographic Imaging. Bo Wei, Ambuj Varshney, Neal Patwari, Wen Hu, Thiemo Voigt, and Chun Tung Chou. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks, IPSN ’15, pp 166-177, 2015. (DOI).
  43. A Game Theoretic Approach to Sensor Data Communications in an Opportunistic Network. Hjalmar Wennerström and David Smith. In Proc. International Conference on Communications: ICC 2015, IEEE International Conference on Communications, pp 6306-6311, IEEE, Piscataway, NJ, 2015. (DOI).
  44. Considering Multi-Contact Encounters in Opportunistic Networks. Hjalmar Wennerström, Christian Rohner, and David Smith. In Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, ACM Digital Library, 2015. (DOI).
  45. Time-optimal convergecast with separated packet copying: Scheduling policies and performance. Haibo Zhang, Fredrik Österlind, Pablo Soldati, Thiemo Voigt, and Mikael Johansson. In IEEE Transactions on Vehicular Technology, volume 64, number 2, pp 793-803, 2015. (DOI).

Computing Science (Datalogi)

  1. Stateless model checking for TSO and PSO. Parosh Aziz Abdulla, Stavros Aronis, Mohamed Faouzi Atig, Bengt Jonsson, Carl Leonardsson, and Konstantinos Sagonas. In Tools and Algorithms for the Construction and Analysis of Systems: TACAS 2015, volume 9035 of Lecture Notes in Computer Science, pp 353-367, Springer Berlin/Heidelberg, 2015. (DOI).
  2. Physical stability of drugs after storage above and below the glass transition temperature: Relationship to glass-forming ability. Amjad Alhalaweh, Ahmad Alzghoul, Denny Mahlin, and Christel A. S. Bergström. In International Journal of Pharmaceutics, volume 495, number 1, pp 312-317, 2015. (DOI, fulltext:print).
  3. Addressing concept drift to improve system availability by updating one-class data-driven models. Ahmad Alzghoul and Magnus Löfstrand. In Evolving Systems, volume 6, number 3, pp 187-198, 2015. (DOI).
  4. Spatio-Temporal Gridded Data Processing on the Semantic Web. Andrej Andrejev, Dimitar Misev, Peter Baumann, and Tore Risch. In 2015 IEEE International Conference On Data Science And Data Intensive Systems, pp 38-45, 2015. (DOI).
  5. A step towards detecting online grooming: Identifying adults pretending to be children. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI).
  6. Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
  7. Detecting jihadist messages on twitter. Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI).
  8. A modelling pearl with sortedness constraints. Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, Xavier Lorca, Justin Pearson, Thierry Petit, and Charles Prud'homme. In Global Conference on Artificial Intelligence: GCAI 2015, volume 36 of EasyChair Proceedings in Computing, pp 27-41, Cool Press, Manchester, UK, 2015. (Abstract).
  9. On the Reification of Global Constraints (Abstract). Nicolas Beldiceanu, Mats Carlsson, Pierre Flener, and Justin Pearson. In Principles and practice of constraint programming, CP 2015, volume 9255 of Lecture Notes in Computer Science, pp 733-733, SPRINGER-VERLAG BERLIN, 2015.
  10. Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a staff development course. Anders Berglund, Arnold Pears, Aletta Nylén, Farooq Ahmad, Bader Alghamdi, Khalid Alghamdi, Ahmed Alhabish, Abdullah Aljoufi, Eidah Alzahrani, Rami Alzahrani, Ismat Aldmour, Areej Athama, Hamada Shihad AlSadoon, Rahmat Budiarto, Abdul Hafeez, Nadeem Hassan Daupota, Dhafer Faiz, Lubna Abdel Kareim Gabralla, Mohammad Gamar, Abdul Hannan, Bedine Kerim, F. A. Mazarbhuiya, Ahmed Rabea, Muhammad Qaiser Saleem, Nimir Saleh, and Mohamed Shenify. In Proc. 3rd International Conference on Learning and Teaching in Computing and Engineering, pp 1-6, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI, fulltext:preprint).
  11. A constraint-based local search backend for MiniZinc. Gustav Björdal, Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Constraints, volume 20, number 3, pp 325-345, 2015. (DOI).
  12. Broadcast psi-calculi with an application to wireless protocols. Johannes Borgström, Shuqin Huang, Magnus Johansson, Palle Raabjerg, Björn Victor, Johannes Åman Pohjola, and Joachim Parrow. In Software and Systems Modeling, volume 14, number 1, pp 201-216, Springer, 2015. (DOI, fulltext:postprint).
  13. The Psi-Calculi Workbench: A Generic Tool for Applied Process Calculi. Johannes Borgström, Ramunas Gutkovas, Ioana Rodhe, and Björn Victor. In ACM Transactions on Embedded Computing Systems, volume 14, number 1, 2015. (DOI, fulltext:postprint).
  14. Clustering attributed graphs: models, measures and methods. Cecile Bothorel, Juan David Cruz, Matteo Magnani, and Barbora Micenkova. In Network Science, volume 3, number 3, pp 408-444, 2015. (DOI, fulltext:postprint).
  15. Disjointness Domains for Fine-Grained Aliasing. Stephan Brandauer, Dave Clarke, and Tobias Wrigstad. In , ACM SIGPLAN NOTICES, pp 989-916, 2015. (DOI).
  16. Parallel Objects for Multicores: A Glimpse at the Parallel Language ENCORE. Stephan Brandauer, Elias Castegren, Dave Clarke, Kiko Fernandez-Reyes, Einar Broch Johnsen, Ka I. Pun, S. Lizeth Tapia Tarifa, Tobias Wrigstad, and Albert Mingkun Yang. In Formal Methods for Multicore Programming, volume 9104 of Lecture Notes in Computer Science, pp 1-56, 2015. (DOI).
  17. A structured approach to training open-ended problem solving. Sofia Cassel and Björn Victor. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 417-420, IEEE Press, Piscataway, NJ, 2015. (DOI).
  18. Refined Ownership: Fine-grained controlled internal sharing. Elias Castegren, Johan Östlund, and Tobias Wrigstad. In Formal Methods for Multicore Programming, volume 9104 of Lecture Notes in Computer Science, pp 179-210, 2015. (DOI).
  19. Abstract Delta Modelling. Dave Clarke, Michiel Helvensteijn, and Ina Schaefer. In Mathematical Structures in Computer Science, volume 25, number 3, pp 482-527, Cambridge University Press, 2015.
  20. The 2013 Evaluation of SMT-COMP and SMT-LIB. David R. Cok, Aaron Stump, and Tjark Weber. In Journal of automated reasoning, volume 55, number 1, pp 61-90, 2015. (DOI).
  21. Competencies for paradigm shift "survival". Mats Daniels, Åsa Cajander, Anna Eckerdal, Mats Lind, Aletta Nylén, Tony Clear, and Roger McDermott. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI).
  22. Refraction: Low-cost management of reflective meta-data in pervasive component-based applications. Wilfried Daniels, José Proença, Dave Clarke, Wouter Joosen, and Danny Hughes. In Proc. 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering, pp 27-36, ACM Press, New York, 2015. (DOI).
  23. Enabling design of performance-controlled sensor network applications through task allocation and reallocation. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. 11th International Conference on Distributed Computing in Sensor Systems, pp 248-253, IEEE Computer Society, 2015. (DOI, fulltext:postprint).
  24. Optimal Task Allocation in Sensor and Actuator Networks. Atis Elsts. In Proc. 11th Swedish National Computer Networking Workshop, 2015.
  25. ProFuN TG: A Tool Using Abstract Task Graphs to Facilitate the Development, Deployment and Maintenance of Wireless Sensor Network Applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In Proc. Poster/Demo Session: 12th European Conference on Wireless Sensor Networks, pp 19-20, 2015.
  26. ProFuN TG: A tool for programming and managing performance-aware sensor network applications. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp 751-759, IEEE Computer Society, 2015. (DOI, fulltext:preprint).
  27. ProFuN TG: Programming Sensornets with Task Graphs for Increased Reliability and Energy-Efficiency. Atis Elsts, Farshid Hassani Bijarbooneh, Martin Jacobsson, and Konstantinos Sagonas. In , IEEE Computer Society, 2015. (External link, fulltext:postprint).
  28. Implied constraints for AUTOMATON constraints. María Andreína Francisco Rodríguez, Pierre Flener, and Justin Pearson. In Global Conference on Artificial Intelligence: GCAI 2015, volume 36 of EasyChair Proceedings in Computing, pp 113-126, Cool Press, Manchester, UK, 2015. (Abstract).
  29. Concolic Testing for Functional Languages. Aggelos Giantsios, Nikolaos Papaspyrou, and Konstantinos Sagonas. In Proceedings of the 17th international symposium on principles and practice of declarative programming (PPDP 2015), pp 137-148, Association for Computing Machinery (ACM), 2015. (DOI).
  30. Probabilistic programs as spreadsheet queries. Andrew D. Gordon, Claudio Russo, Marcin Szymczak, Johannes Borgström, Nicolas Rolland, Thore Graepel, and Daniel Tarlow. In Programming Languages and Systems, volume 9032 of Lecture Notes in Computer Science, pp 1-25, Springer Berlin/Heidelberg, 2015. (DOI, fulltext:postprint).
  31. Motivation and Grade Gap Related to Gender in a Programming Course. Virginia Grande and Joachim Parrow. In , 2015. (DOI).
  32. A constraint optimisation model for analysis of telecommunication protocol logs. Olga Grinchtein, Mats Carlsson, and Justin Pearson. In Tests and Proofs: TAP 2015, volume 9154 of Lecture Notes in Computer Science, pp 137-154, Springer, 2015. (DOI).
  33. Testing of a telecommunication protocol using constraint programming. Olga Grinchtein, Mats Carlsson, and Justin Pearson. In 2015 IEEE Eighth International Conference On Software Testing, Verification And Validation Workshops (ICSTW), IEEE International Conference on Software Testing Verification and Validation Workshops, 2015.
  34. A Quadratic Extended Edge-Finding Filtering Algorithm for Cumulative Resource Constraints. Roger Kameugne, Laure Pauline Fotso, and Joseph Scott. In Principles and practice of constraint programming, CP 2015, volume 9255 of Lecture Notes in Computer Science, pp 738-739, SPRINGER-VERLAG BERLIN, 2015.
  35. A high-level model for an assembly language attacker by means of reflection. Adriaan Larmuseau, Marco Patrignani, and Dave Clarke. In Dependable Software Engineering: Theories, Tools, and Applications, volume 9409 of Lecture Notes in Computer Science, pp 168-182, Springer, 2015. (DOI, fulltext:preprint).
  36. A secure compiler for ML modules. Adriaan Larmuseau, Marco Patrignani, and Dave Clarke. In Programming Languages and Systems: APLAS 2015, volume 9458 of Lecture Notes in Computer Science, pp 29-48, Springer, 2015. (DOI).
  37. Formalizing a secure foreign function interface. Adriaan Larmuseau and Dave Clarke. In Software Engineering and Formal Methods, volume 9276 of Lecture Notes in Computer Science, pp 215-230, Springer, 2015. (DOI, fulltext:postprint).
  38. Defining 'Functional Products' through their constituents. John Lindström, Daria Sas, Håkan Lideskog, Magnus Löfstrand, and Lennart Karlsson. In International Journal of Product Development, volume 20, number 1, pp 1-24, 2015. (DOI).
  39. Property-Based Testing of Sensor Networks. Andreas Löscher, Konstantinos Sagonas, and Thiemo Voigt. In Proc. 12th International Conference on Sensing, Communication, and Networking, pp 100-108, IEEE Communications Society, 2015.
  40. NoSQL approach to large scale analysis of persisted streams. Khalid Mahmood, Thanh Truong, and Tore Risch. In Data Science, volume 9147 of Lecture Notes in Computer Science, pp 152-156, Springer, 2015. (DOI).
  41. Utilizing a NoSQL Data Store for Scalable Log Analysis. Khalid Mahmood, Tore Risch, and Minpeng Zhu. In , pp 49-55, 2015. (DOI).
  42. Automated auxiliary variable elimination through on-the-fly propagator generation. Jean-Noël Monette, Pierre Flener, and Justin Pearson. In Principles and Practice of Constraint Programming: CP 2015, volume 9255 of Lecture Notes in Computer Science, pp 313-329, Springer, 2015. (DOI).
  43. Efficient caching for constrained skyline queries. Michael Mortensen, Sean Chester, Ira Assent, and Matteo Magnani. In Extending Database Technology (EDBT), 2015.
  44. Multidimensional analysis of creative coding MOOC forums: a methodological discussion. Aletta Nylén, Neena Thota, Anna Eckerdal, Päivi Kinnunen, Matthew Butler, and Michael Morgan. In Proc. 15th International Conference on Computing Education Research: Koli Calling, pp 137-141, ACM Press, New York, 2015. (DOI).
  45. Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education. Aletta Nylén and Mohamed Shenify (eds). Volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, 2015. (Abstract).
  46. Modal Logics for Nominal Transition Systems. Joachim Parrow, Johannes Borgström, Lars-Henrik Eriksson, Ramunas Gutkovas, and Tjark Weber. In 26th International Conference on Concurrency Theory: CONCUR 2015, volume 42 of Leibniz International Proceedings in Informatics (LIPIcs), pp 198-211, Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2015. (DOI, Fulltext).
  47. Fully abstract trace semantics for protected module architectures. Marco Patrignani and Dave Clarke. In Computer languages, systems & structures, volume 42, pp 22-45, 2015. (DOI).
  48. Secure compilation to protected module architectures. Marco Patrignani, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke, and Frank Piessens. In ACM Transactions on Programming Languages and Systems, volume 37, number 2, 2015. (DOI).
  49. Implications of anonymous assessment. Arnold Pears and Aletta Nylén. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, Frontiers in Education Conference, pp 1404-1408, IEEE Press, Piscataway, NJ, 2015. (DOI).
  50. Diffusion of Innovations over Multiplex Social Networks. Rasoul Ramezanian, Mostafa Salehi, Matteo Magnani, and Danilo Montesi. In International Symposium on Artificial Intelligence and Signal Processing (AISP), pp 1-5, 2015. (DOI, ArXiv).
  51. Towards effective visual analytics on multiplex and multilayer networks. Luca Rossi and Matteo Magnani. In Chaos, Solitons & Fractals, volume 72, pp 68-76, 2015. (DOI, fulltext:postprint).
  52. Contention adapting search trees. Konstantinos Sagonas and Kjell Winblad. In Proc. 14th International Symposium on Parallel and Distributed Computing, pp 215-224, IEEE conference proceedings, 2015. (DOI).
  53. Multidimensional epidemic thresholds in diffusion processes over interdependent networks. Mostafa Salehi, Payam Siyari, Matteo Magnani, and Danilo Montesi. In Chaos, Solitons & Fractals, volume 72, pp 59-67, 2015. (DOI).
  54. Spreading processes in Multilayer Networks. Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Matteo Magnani, Payam Siyari, and Danilo Montesi. In IEEE Transactions on Network Science and Engineering, volume 2, number 2, pp 65-83, IEEE Computer Society, 2015. (DOI, Fulltext, fulltext:postprint).
  55. Contextual Healing: Privacy through Interpretation Management. Rula Sayaf, Soren Preibusch, and Dave Clarke. In 2015 Ieee International Conference On Smart City/Socialcom/Sustaincom (Smartcity), pp 360-365, IEEE, 2015. (DOI).
  56. The Other Side of Privacy: Surveillance in Data Control. Rula Sayaf, Dave Clarke, and James B. Rule. In British HCI 2015, pp 184-192, 2015. (DOI).
  57. Constraint solving on bounded string variables. Joseph D. Scott, Pierre Flener, and Justin Pearson. In Integration of AI and OR Techniques in Constraint Programming, volume 9075 of Lecture Notes in Computer Science, pp 375-392, Springer, 2015. (DOI).
  58. Investigating the types and effects of missing data in multilayer networks. Rajesh Sharma, Matteo Magnani, and Danilo Montesi. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 392-399, 2015.
  59. Understanding community patterns in large attributed social networks. Rajesh Sharma, Matteo Magnani, and Danilo Montesi. In Proceedings Of The 2015 IEEE/ACM International Conference On Advances In Social Networks Analysis And Mining (Asonam 2015), pp 1503-1508, 2015. (DOI).
  60. System components of a general theory of software engineering. Anca-Juliana Stoica, Kristiaan Pelckmans, and William Rowe. In Science of Computer Programming, volume 101, pp 42-65, 2015. (DOI).
  61. Transparent inclusion, utilization, and validation of main memory domain indexes. Thanh Truong and Tore Risch. In Proc. 27th International Conference on Scientific and Statistical Database Management, ACM Press, New York, 2015. (DOI).
  62. Role and position detection in networks: reloaded. Davide Vega, Roc Meseguer, Felix Freitag, and Matteo Magnani. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 320-325, 2015.
  63. Scalable queries over log database collections. Minpeng Zhu, Khalid Mahmood, and Tore Risch. In Data Science, volume 9147 of Lecture Notes in Computer Science, pp 173-185, Springer, 2015. (DOI).
  64. Measuring Polymorphism in Python Programs. Beatrice Åkerblom and Tobias Wrigstad. In DLS 2015: Proceedings of the 11th Symposium on Dynamic Languages, volume 51:2 2016 of ACM SIGPLAN Notices, pp 114-128, ACM Press, New York, 2015. (DOI).

Computerized Image Analysis and Human-Computer Interaction

(Bildanalys och människa-datorinteraktion)

  1. Calving events detection and quantification from time-lapse images in Tunabreen glacier. Sigit Adinugroho, Dorothée Vallot, Pontus Westrin, and Robin Strand. In Proc. 9th International Conference on Information &amp; Communication Technology and Systems, pp 61-65, IEEE, Piscataway, NJ, 2015. (DOI).
  2. Comparing and visualizing titanium implant integration in rat bone using 2D and 3D techniques. Anna Arvidsson, Hamid Sarve, and Carina B. Johansson. In Journal of Biomedical Materials Research. Part B - Applied biomaterials, volume 103, number 1, pp 12-20, 2015. (DOI).
  3. Between Insanity and Love. Ryoko Asai. In Computers &amp; Society: The Newsletter of the ACM Special Interest Group on Computers and Society Special Issue on 20 Years of ETHICOMP, pp 154-158, 2015. (External link).
  4. Ethical Competence and Social Responsibility in Scientific Research using ICT Tools. Ryoko Asai and Iordanis Kavathatzopoulos. In Computers &amp; Society: The Newsletter of the ACM Special Interest Group on Computers and Society Special Issue on 20 Years of ETHICOMP, ACM SIGCAS Computers and Society Newsletter, pp 345-347, ACM Digital Library, 2015. (DOI, External link, External link, External link, External link).
  5. The holding function of robots in highly technological society. Ryoko Asai and Kiyoshi Murata. In Proceedings of Japan Society for Infomation and Management 70th Annual Conference, pp 65-68, 2015.
  6. Blur detection and visualization in histological whole slide images. Christophe Avenel and Ingrid Carlbom. In Proc. 10th International Conference on Mass Data Analysis of Images and Signals, IBaI, Leipzig, Germany, 2015.
  7. Automated Classification of Glandular Tissue by Statistical Proximity Sampling. Jimmy Azar, Martin Simonsson, Ewert Bengtsson, and Anders Hast. In International Journal of Biomedical Imaging, 2015. (DOI, Fulltext, fulltext:print).
  8. Automated classification of glandular tissue by statistical proximity sampling.. Jimmy C Azar, Martin Simonsson, Ewert Bengtsson, and Anders Hast. In International Journal of Biomedical Imaging, volume 2015, 2015. (DOI).
  9. Robots, ethics and language. Ingrid Björk and Iordanis Kavathatzopoulos. In Computers &amp; Society: The Newsletter of the ACM Special Interest Group on Computers and Society Special Issue on 20 Years of ETHICOMP, ACM SIGCAS Computers and Society Newsletter, pp 268-273, ACM Digital Library, 2015. (DOI, External link, External link, External link, External link).
  10. Supporting industrial uptake of cognitive work analysis. Ida Bodin and Stas Krupenia. In Proc. Human Factors and Ergonomics Society 59th Annual Meeting, pp 170-174, Sage Publications, Thousand Oaks, CA, 2015.
  11. Challenges for action research on HWID in activity based workplaces. Åsa Cajander, Gerolf Nauwerck, Thomas Lind, and Marta Lárusdóttir. In INTERACT 2015 Adjunct Proceedings, pp 161-170, University of Bamberg Press, 2015.
  12. Contextual personas as a method for understanding digital work environments. Åsa Cajander, Marta Lárusdóttir, Elina Eriksson, and Gerolf Nauwerck. In Human Work Interaction Design: Work Analysis and Interaction Design Methods for Pervasive and Smart Workplaces, volume 468 of IFIP Advances in Information and Communication Technology, pp 141-152, Springer, 2015. (DOI).
  13. Things take time: Establishing usability work in a university context. Åsa Cajander, Gerolf Nauwerck, and Thomas Lind. In European Journal of Higher Education IT, volume 2, number 1, 2015. (Fulltext).
  14. Vision seminars and administration of university education: A case study. Åsa Cajander, Bengt Sandblad, Thomas Lind, Roger McDermott, and Mats Daniels. In Proc. 1st Al Baha University and Uppsala University Symposium on Quality in Computing Education, volume 2015-007 of Technical report / Department of Information Technology, Uppsala University, pp 29-32, 2015. (Proceedings).
  15. Worlds Apart: Doctors' technological frames and online medical records. Åsa Cajander, Christiane Grünloh, and Hanife Rexhepi. In INTERACT 2015 Adjunct Proceedings, pp 357-367, University of Bamberg Press, 2015.
  16. Compaction of rolling circle amplification products increases signal integrity and signal–to–noise ratio. Carl-Magnus Clausson, Linda Arngården, Omer Ishaq, Axel Klaesson, Malte Kühnemund, Karin Grannas, Björn Koos, Xiaoyan Qian, Petter Ranefall, Tomasz Krzywkowski, Hjalmar Brismar, Mats Nilsson, Carolina Wählby, and Ola Söderberg. In Scientific Reports, volume 5, pp 12317:1-10, 2015. (DOI, Fulltext).
  17. Brain – Endocast relationship in the Australian lungfish, <em>Neoceratodus forsteri</em>, elucidated from tomographic data (Sarcopterygii: Dipnoi). Alice M. Clement, Johan Nysjö, Robin Strand, and Per E. Ahlberg. In PLOS ONE, volume 10, number 10, 2015. (DOI, Fulltext).
  18. Adaptive hit or miss transform. Vladimir Curic, Sébastien Lefèvre, and Cris L. Luengo Hendriks. In Mathematical Morphology and Its Applications to Signal and Image Processing, volume 9082 of Lecture Notes in Computer Science, pp 741-752, Springer, 2015. (DOI).
  19. Collaborative technologies in global engineering: New competencies and challenges. Mats Daniels, Åsa Cajander, Tony Clear, and Roger McDermott. In International journal of engineering education, volume 31, number 1, pp 267-281, 2015.
  20. Competencies for paradigm shift "survival". Mats Daniels, Åsa Cajander, Anna Eckerdal, Mats Lind, Aletta Nylén, Tony Clear, and Roger McDermott. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1424-1429, IEEE Press, Piscataway, NJ, 2015. (DOI).
  21. Computer Assisted Pap Smear Analyser for Cervical Cancer Screening using Quantitative Microscopy. Rajasekharan Usha Deepak, Ramakrishnan Rajesh Kumar, Neendoorthalackal Balakrishnan Byju, Pundluvalu Nataraju Sharathkumar, Chandran Pournami, Salam Sibi, Ewert Bengtsson, and Kunjuraman Sujathan. In Journal of Cytology & Histology, volume 6, number S3, 2015. (DOI, Fulltext).
  22. ?LBP – a novel member of the Local Binary Pattern family based on ?-cutting. Marija Delic, Joakim Lindblad, and Natasa Sladoje. In Proc. 9th International Symposium on Image and Signal Processing and Analysis, pp 13-18, IEEE, 2015. (DOI).
  23. An Empathic Robotic Tutor in a Map Application. Amol Deshmukh, Aidan Jones, Srinivasan Janarthanam, Helen Hastie, Tiago Ribeiro, Ruth Aylett, Ana Paiva, and Ginevra Castellano. In Proceedings of the 2015 international conference on autonomous agents &amp; multiagent systems (AAMAS'15), pp 1923-1924, Association for Computing Machinery (ACM), New York, 2015.
  24. Recreating with photogrammetric techniques a submerged megalithic landscape: the case of the salas reservoir. B. Estevez, M. Pazos, J. M. Franco, and Anders Hast. In 3 Encontro Internacional de Arqueoloxia de Vilalba, pp 9-16, 2015.
  25. Acrosome integrity assessment of boar spermatozoa images using an early fusion of texture and contour descriptors. Oscar García-Olalla, Enrique Alegre, Laura Fernández-Robles, Patrik Malm, and Ewert Bengtsson. In Computer Methods and Programs in Biomedicine, volume 120, number 1, pp 49-64, 2015. (DOI).
  26. Scaffolding mentalizing via a play-&amp;-learn game for preschoolers. Magnus Haake, Anton Axelsson, Mette Clausen-Bruun, and Agneta Gulz. In Computers and education, volume 90, pp 13-23, 2015. (DOI).
  27. A Simple and Efficient Feature Descriptor for Fast Matching. Anders Hast, Victoria Sablina, Gustav Kylberg, and Ida-Maria Sintorn. In WSCG, pp 135-142, 2015.
  28. Clustering in 2D as a Fast Deterministic Alternative to RANSAC. Anders Hast and Gustav Kylberg. In , 2015.
  29. Interest Point Detection Based on the Extended Structure Tensor with a Scale Space Parameter. Anders Hast. In International Conference on Computer Vision Theory and Applications, pp 1-8, 2015.
  30. Mathematics + Computer Science = True. Anders Hast. In , pp 85-93, 2015.
  31. Stereo Visualisation of Historical Aerial Photos as a Valuable Tool for Archeological Research. Anders Hast and Andrea Marchetti. In Computer Applications and Quantitative Methods in Archaeology, CAA, pp 1-3, 2015.
  32. Stereo Visualisation of Historical Aerial Photos – a Valuable Digital Heritage Research Tool. Anders Hast and Andrea Marchetti. In 2015 Digital Heritage International Congress, Vol 2: Analysis &amp; Interpretation Theory, Methodologies, Preservation &amp; Standards Digital Heritage Projects &amp; Applications, pp 663-666, 2015.
  33. Swedish eScience Education – a Graduate School in eScience. Anders Hast, Michael Hanke, and Hans O. Karlsson. In Proc. 11th International Conference on e-Science, pp 31-35, IEEE Computer Society, 2015. (DOI).
  34. Patients' perceptions of their medical records from different subject positions. Isto Huvila, Åsa Cajander, Mats Daniels, and Rose-Mharie Åhlfeldt. In Journal of the Association for Information Science and Technology, volume 66, number 12, pp 2456-2470, 2015. (DOI).
  35. Precise Euclidean distance transforms in 3D from voxel coverage representation. Vladimir Ilic, Joakim Lindblad, and Natasa Sladoje. In Pattern Recognition Letters, volume 65, pp 184-191, 2015. (DOI).
  36. Collegial verbalisation — the value of an independent observer: an ecological approach. Anders Jansson, Mikael Erlandsson, and Anton Axelsson. In Theoretical Issues in Ergonomics Science, volume 16, number 5, pp 474-494, 2015. (DOI).
  37. Empathic robotic tutors for personalised learning: A multidisciplinary approach. Aidan Jones, Dennis Küster, Christina Anne Basedow, Patrícia Alves-Oliveira, Sofia Serholt, Helen Hastie, Lee J. Corrigan, Wolmet Barendregt, Arvid Kappas, Ana Paiva, and Ginevra Castellano. In Social Robotics, volume 9388 of Lecture Notes in Computer Science, pp 285-295, Springer, 2015. (DOI).
  38. Etik och medicinteknik. Iordanis Kavathatzopoulos and Mikael Laaksoharju. In Medicinteknikdagarna 2015, pp 94-94, Svensk Förening för Medicinsk Teknik och Fysik (MTF), Akademiska sjukhuset, Uppsala universitet, Uppsala, 2015. (External link, Proceedings).
  39. Etikutbildning för ingenjörer: Övningar, verktyg, metoder. Iordanis Kavathatzopoulos, Thomas Lennerfors, Mikael Laaksoharju, Ryoko Asai, and Ingrid Björk. In 5:e utvecklingskonferensen för Sveriges Ingenjörsutbildningar, pp 30-31, Uppsala universitet, 2015. (External link, Proceedings).
  40. How ethical robots process information, communicate and act. Iordanis Kavathatzopoulos and Ingrid Björk. In 1st TRANSOR Workshop: Methodological Problems of Social Robotics, 2015. (External link).
  41. ICT and sustainability: skills and methods for dialogue and policy making. Iordanis Kavathatzopoulos. In Journal of Information, Communication and Ethics in Society, volume 13, number 1, pp 13-18, Emerald Group Publishing Limited, 2015. (DOI).
  42. Judging the complexity of privacy, openness and loyalty issues. Iordanis Kavathatzopoulos and Ryoko Asai. In Computers &amp; Society: The Newsletter of the ACM Special Interest Group on Computers and Society Special Issue on 20 Years of ETHICOMP, ACM SIGCAS Computers and Society Newsletter, pp 416-419, ACM Digital Library, 2015. (DOI, External link, External link, External link, External link).
  43. De esperanta korpuso ?is islanda lingvopolitiko: Aktoj de la 36-a Esperantologia Konferenco en la 98-a Universala Kongreso de Esperanto, Rejkjaviko 2013. Christer O. Kiselman and José Antonio Vergara (eds). Universala Esperanto-Asocio, Rotterdam, 2015.
  44. Esperantologio / Esperanto Studies. Christer O. Kiselman (ed). Dobrichovice, 2015.
  45. Estimates for solutions to discrete convolution equations. Christer O. Kiselman. In Mathematika, volume 61, number 2, pp 295-308, 2015. (DOI).
  46. Euclid's straight lines. Christer O. Kiselman. In Normat, volume 60, number 4, pp 145-169, 2015. (fulltext:postprint).
  47. Kombineblo de vortelementoj en esperanto – rigardoj malanta?en kaj anta?en. Christer O. Kiselman. In Esperantologio / Esperanto Studies, volume 7, pp 73-125, Dobrichovice, 2015.
  48. Next-Generation Pathology: Surveillance of Tumor Microecology. Björn Koos, Masood Kamali-Moghaddam, Leonor David, Manuel Sobrinho-Simoes, Anna Dimberg, Mats Nilsson, Carolina Wählby, and Ola Söderberg. In Journal of Molecular Biology, volume 427, number 11, pp 2013-2022, 2015. (DOI, Fulltext).
  49. A histopathological tool for quantification of biomarkers with sub-cellular resolution. Andreas Kårsnäs, Robin Strand, Johan Doré, Thomas Ebstrup, Michael Lippert, and Kim Bjerrum. In Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, volume 3, number 1, pp 25-46, 2015. (DOI).
  50. Multimodal histological image registration using locally rigid transforms. Andreas Kårsnäs and Robin Strand. In Proc. Interactive Medical Image Computing Workshop, 2015.
  51. Coverage segmentation of 3D thin structures. Kristína Lidayová, Joakim Lindblad, Nataša Sladoje, Hans Frimmel, Chunliang Wang, and Örjan Smedby. In Proc. 5th International Conference on Image Processing Theory, Tools and Applications, pp 23-28, IEEE, Piscataway, NJ, 2015. (DOI).
  52. Exact linear time Euclidean distance transforms of grid line sampled shapes. Joakim Lindblad and Natasa Sladoje. In Mathematical Morphology and its Applications to Signal and Image Processing, volume 9082 of Lecture Notes in Computer Science, pp 645-656, Springer, 2015. (DOI).
  53. High-resolution reconstruction by feature distance minimization from multiple views of an object. Joakim Lindblad, Natasa Sladoje, Amit Suveer, Anca Dragomir, and Ida-Maria Sintorn. In Proc. 5th International Conference on Image Processing Theory, Tools and Applications, pp 29-34, IEEE, Piscataway, NJ, 2015. (DOI).
  54. Microscopy image enhancement for cost-effective cervical cancer screening. Joakim Lindblad, Ewert Bengtsson, and Nataša Sladoje. In Image Analysis, volume 9127 of Lecture Notes in Computer Science, pp 440-451, Springer, 2015. (DOI).
  55. Infrared-visible image registration for augmented reality-based thermographic building diagnostics. Fei Liu and Stefan Seipel. In Visualization in Engineering, volume 3, pp 16:1-15, Springer, 2015. (DOI, Fulltext).
  56. Magnetic resonance imaging cooling–reheating protocol indicates decreased fat fraction via lipid consumption in suspected brown adipose tissue. Elin Lundström, Robin Strand, Lars Johansson, Peter Bergsten, Håkan Ahlström, and Joel Kullberg. In PLOS ONE, volume 10, number 4, 2015. (DOI, Fulltext).
  57. User and client satisfaction in agile development. Marta Lárusdóttir, Effie Law, and Åsa Cajander. In INTERACT 2015 Adjunct Proceedings, pp 249-257, University of Bamberg Press, 2015.
  58. Automatic 3DS Conversion of Historical Aerial Photographs. Francesco Malapelle, Anders Hast, Andrea Fusiello, B. Rossi, P. Fragneto, and Andrea Marchetti. In IC3D 2015, International Conference on 3D Imaging, 2015.
  59. Simulation of bright-field microscopy images depicting pap-smear specimen. Patrik Malm, Anders Brun, and Ewert Bengtsson. In Cytometry Part A, volume 87, number 3, pp 212-226, 2015. (DOI, fulltext:print).
  60. Interactive Deformation of Volume Images for Image Registration. Filip Malmberg, Robin Strand, and Joel Kullberg. In Proc. Interactive Medical Image Computing Workshop, 2015. (External link).
  61. A comparative analysis of two globally distributed group projects: A perspective from CSCW/CSCL research. Roger McDermott, Mats Daniels, Åsa Cajander, Julian Bass, and JayPrakash Lalchandani. In Proc. 45th ASEE/IEEE Frontiers in Education Conference, pp 1964-1972, IEEE Press, Piscataway, NJ, 2015. (DOI).
  62. Perseverance measures and attainment in first year computing science students. Roger McDermott, Mats Daniels, and Åsa Cajander. In Proc. 20th Conference on Innovation and Technology in Computer Science Education, pp 302-307, ACM Press, New York, 2015. (DOI).
  63. Intracranial volume normalization methods: Considerations when investigating gender differences in regional brain volume. Richard Nordenskjöld, Filip Malmberg, Elna-Marie Larsson, Andrew Simmons, Håkan Ahlström, Lars Johansson, and Joel Kullberg. In Psychiatry Research, volume 231, number 3, pp 227-235, 2015. (DOI).
  64. BoneSplit - A 3D Texture Painting Tool for Interactive Bone Separation in CT Images. Johan Nysjö, Filip Malmberg, Ida-Maria Sintorn, and Ingela Nyström. In Journal of WSCG, volume 23, number 2, pp 157-166, 2015.
  65. Teaching OpenGL and Computer Graphics with Programmable Shaders. Johan Nysjö and Anders Hast. In SIGRAD, pp 1-3, 2015.
  66. Haptics-assisted Virtual Planning of Bone, Soft Tissue, and Vessels in Fibula Osteocutaneous Free Flaps. Pontus Olsson, Fredrik Nysjö, Andrés Rodríguez-Lorenzo, Andreas Thor, Jan-Michaél Hirsch, and Ingrid B. Carlbom. In Plastic and Reconstructive Surgery - Global Open, volume 3, number 8, Wolters Kluwer, 2015. (DOI).
  67. Visuohaptic bone saw simulator: Combining vibrotactile and kinesthetic feedback. Pontus Olsson, Fredrik Nysjö, Neeru Singh, Andreas Thor, and Ingrid Carlbom. In Proc. 8th ACM SIGGRAPH Asia Technical Briefs, pp 10:1-4, ACM Press, New York, 2015. (DOI).
  68. Cloud Computing: The Ultimate Step Towards the Virtual Enterprise?. Norberto Patrignani and Iordanis Kavathatzopoulos. In Computers &amp; Society: The Newsletter of the ACM Special Interest Group on Computers and Society Special Issue on 20 Years of ETHICOMP, ACM SIGCAS Computers and Society Newsletter, pp 68-72, ACM Digital Library, 2015. (DOI, External link, External link, External link, External link).
  69. Preparing the global software engineer. Anne-Kathrin Peters, Waqar Hussain, Åsa Cajander, Tony Clear, and Mats Daniels. In Proc. 10th International Conference on Global Software Engineering, pp 61-70, IEEE Computer Society, Los Alamitos, CA, 2015. (DOI).
  70. Triangulation Painting. Max Pihlström, Anders Hast, and Anders Brun. In SIGRAD, pp 1-4, 2015.
  71. Cancer patients' attitudes and experiences of online medical records. Hanife Rexhepi, Rose-Mharie Åhlfeldt, Åsa Cajander, and Isto Huvila. In Proc. 17th International Symposium on Health Information Management Research, pp 19-25, University of Sheffield, UK, 2015.
  72. Digital topology and geometry in medical image processing: A survey. Punam K. Saha, Robin Strand, and Gunilla Borgefors. In IEEE Transactions on Medical Imaging, volume 34, number 9, pp 1940-1964, 2015. (DOI).
  73. Information systems for cooperation in operational train traffic control. Bengt Sandblad, Arne W. Andersson, and Simon Tschirner. In Procedia Manufacturing, volume 3, pp 2882-2888, 2015. (DOI, Fulltext).
  74. Digital Contact Tools in Professional Life: What Governs the Choice?. Håkan Selg. In Selected Papers of Internet Research 16, 2015. (External link, fulltext:print).
  75. Fast evaluation of the robust stochastic watershed. Bettina Selig, Filip Malmberg, and Cris L. Luengo Hendriks. In Mathematical Morphology and Its Applications to Signal and Image Processing, volume 9082 of Lecture Notes in Computer Science, pp 705-716, Springer, 2015. (DOI).
  76. Fully automatic evaluation of the corneal endothelium from in vivo confocal microscopy. Bettina Selig, Koenraad A. Vermeer, Bernd Rieger, Toine Hillenaar, and Cris L. Luengo Hendriks. In BMC Medical Imaging, volume 15, 2015. (DOI, Fulltext).
  77. Automated Image Acquisition and Particle Size Distribution in the MiniTEM Instrument. Ida-Maria Sintorn, Gustaf Kylberg, Lars Haag, and Rickard Nordström. In , 2015.
  78. Three-Dimensional Eyeball and Orbit Volume Modification After LeFort III Midface Distraction. Tomasz Smektala, Johan Nysjö, Andreas Thor, Aleksandra Homik, Katarzyna Sporniak-Tutak, Krzysztof Safranow, Krzysztof Dowgierd, and Raphael Olszewski. In The Journal of craniofacial surgery (Print), volume 26, number 5, pp 1652-1655, 2015. (DOI).
  79. Effect of pre-fixation delay and freezing on mink testicular endpoints for environmental research. Ellinor Spörndly-Nees, Elisabeth Ekstedt, Ulf Magnusson, Azadeh Fakhrzadeh, Cris L. Luengo Hendriks, and Lena Holm. In PLOS ONE, volume 10, number 5, 2015. (DOI, fulltext:print).
  80. Asymmetric supercapacitors based on carbon nanofibre and polypyrrole/nanocellulose composite electrodes. Petter Tammela, Zhaohui Wang, Sara Frykstrand, Peng Zhang, Ida-Maria Sintorn, Leif Nyholm, and Maria Strömme. In RSC Advances, volume 5, number 21, pp 16405-16413, 2015. (DOI).
  81. Estimation of linear deformations of 2D and 3D fuzzy objects. Attila Tanács, Joakim Lindblad, Nataša Sladoje, and Zoltan Kato. In Pattern Recognition, volume 48, number 4, pp 1391-1403, 2015. (DOI).
  82. Large scale style based dating of medieval manuscripts. Fredrik Wahlberg, Lasse Mårtensson, and Anders Brun. In Proc. 3rd International Workshop on Historical Document Imaging and Processing, pp 107-114, ACM Press, New York, 2015. (DOI, fulltext:postprint).
  83. How mobile phones affect the sustainability of the work/life balance of their users. Edward Peter Greenwood White and Andrew Thatcher. In Foundations of Augmented Cognition, volume 9183 of Lecture Notes in Computer Science, pp 393-400, Springer, 2015. (DOI).
  84. A novel word segmentation method based on object detection and deep learning. Tomas Wilkinson and Anders Brun. In Advances in Visual Computing: 11th International Symposium, ISVC 2015, Las Vegas, NV, USA, December 14-16, 2015, Proceedings, Part I, volume 9474 of Lecture Notes in Computer Science, pp 231-240, Springer, 2015. (DOI, fulltext:postprint).
  85. Visualizing document image collections using image-based word clouds. Tomas Wilkinson and Anders Brun. In Advances in Visual Computing: 11th International Symposium, ISVC 2015, Las Vegas, NV, USA, December 14-16, 2015, Proceedings, Part I, volume 9474 of Lecture Notes in Computer Science, pp 297-306, Springer, 2015. (DOI, fulltext:postprint).
  86. Automatic Water Body Extraction From Remote Sensing Images Using Entropy. Julia Åhlén and Stefan Seipel. In SGEM2015 Conference Proceedings, International Multidisciplinary Scientific GeoConference-SGEM, pp 517-524, 2015. (DOI).

Updated  2016-04-11 10:30:52 by Kurt Otto.