Hide menu

Publications by Group Members

Books and proceedings

  • Proceedings of the Seventh GreenMetrics '16 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS/Performance. Niklas Carlsson, Zhenhua Liu, Thu Ngyuen, Catherine Rosenberg, and Adam Wierman (co-chairs). ACM Performance Evaluation Review (PER), Special Issue on the 2016 GreenMetrics Workshop, Vol. 44, No. 3, (Oct. 2016).
  • Proceedings of the Sixth GreenMetrics '14 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS/Performance. Niklas Carlsson, Nidhi Hegde, Thu Ngyuen and Adam Wierman (co-chairs). ACM Performance Evaluation Review (PER), Special Issue on the 2014 GreenMetrics Workshop, Vol. 42, No. 3, (Dec. 2014).
  • Proceedings of the Fifth GreenMetrics '13 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS. Martin Arlitt, Niklas Carlsson, Nidhi Hegde, and Adam Wierman (co-chairs). ACM Performance Evaluation Review (PER), Special Issue on the 2013 GreenMetrics Workshop, Vol. 41, No. 3, (Dec. 2013).
  • Martin Arlitt, Niklas Carlsson, Nidhi Hegde, and Adam Wierman (co-chairs). Proceedings of the Fourth GreenMetrics '12 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS/Performance. ACM Performance Evaluation Review (PER), Special Issue on the 2012 GreenMetrics Workshop, Vol. 40, No. 3, (Dec. 2012).
  • Martin Arlitt, Niklas Carlsson, and Jerry Rolia (co-chairs). Proceedings of the Third GreenMetrics '11 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS. ACM Performance Evaluation Review (PER), Special Issue on the 2011 GreenMetrics Workshop, Vol. 39, No. 3, (Dec. 2011).
  • Martin Arlitt, Niklas Carlsson, and Jerry Rolia (co-chairs). Proceedings of the Second GreenMetrics '10 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS. ACM Performance Evaluation Review (PER), Special Issue on the 2010 GreenMetrics Workshop Vol. 38, No. 3 (Dec. 2010).
  • Martin Arlitt, Niklas Carlsson, and Jerry Rolia (co-chairs). Proceedings of the First GreenMetrics '09 Workshop, in conjunction with (and sponsored by) ACM SIGMETRICS/Performance. ACM Performance Evaluation Review (PER), Special Issue on the 2009 GreenMetrics Workshop, Vol. 38, No. 4 (Mar. 2010).
  • Hauswirth M., Montresor A., Shahmehri N., Wehrle K. and Wierzbicki A., (eds), Proceedings of the Seventh International Conference on Peer-to-Peer Computing, IEEE Computer society. September 2-5, 2007, Galway, Ireland. IEEE Computer Society, 2007. ISBN 0-7695-2986-0.
  • Montresor A., Wierzbicki A., Shahmehri N., (eds), Proceedings of the Sixth International Conference on Peer-to-Peer Computing, IEEE Computer society. September 6-8, 2006, Cambridge, UK. IEEE Computer Society, 2006. ISBN 0-7695-2679-9.
  • Caronni G., Weiler N., Waldvogel M., Shahmehri N. (eds). Proceedings of the Fifth International Conference on Peer-to-Peer Computing, IEEE Computer society. August 31- September 2, 2005, Konstanz, Germany. IEEE Computer Society, 2005. ISBN 0-7695-2376-5.
  • Caronni G., Weiler N., Shahmehri N. (eds). Proceedings of the Fourth International Conference on Peer-to-Peer Computing, IEEE Computer society. August 25-27, 2004, Zurich, Switzerland. IEEE Computer Society, 2004. ISBN 0-7695-2156-8.
  • Shahmehri N., Graham, R.L., Caronni G. (eds.) Proceedings of the Third International Conference on Peer-to-Peer Computing, IEEE Computer society. September 1-3, 2003, Linköping, Sweden. IEEE Computer Society, 2003. ISBN 0-7695-2023-5.
  • Graham R.L., Shahmehri N. (eds). Proceedings of the Second International Conference on Peer-to-Peer Computing: Use of Computers at the Edge of Networks (P2P, Grid, Clusters), P2P2002. Linköping, Sweden, September 5-7, 2002. IEEE Computer Society. ISBN 0-7695-1810-9.
  • Graham R.L., Shahmehri N., (eds). Proceedings of the First International Conference on Peer-to-Peer Computing, P2P2001. Linköping, Sweden, August 27-29, 2001. IEEE Computer Society, ISBN 0-7695-1503-7.
  • Shahmehri N., (ed), Proceedings of the Conferences on Computer Science and Systems Engineering, CCSSE '04. Ph.D. student conferences. 1998, 1999, 2001, 2002, 2004.

Journal publications

2016

  • Anna Vapen, Niklas Carlsson, Anirban Mahanti, and Nahid Shahmehri, A Look at the Third-Party Identity Management Landscape, IEEE Internet Computing, Vol. 20, No. 2, Mar/Apr. 2016, pp. 18--25. (doi)

2014

  • Raoufehsadat Hashemian, Diwakar Krishnamurthy, Martin Arlitt, and Niklas Carlsson, Characterizing the Scalability of a Web Application on a Multi-core Server, Concurrency and Computation Practice and Experience (CCPE), Wiley, Volume 26, Issue 12, Aug. 2014, pp. 2027--2052. (doi)

2013

2012

  • Niklas Carlsson, Carey Williamson, Andreas Hirt, and Michael Jacobson, Performance Modeling of Anonymity Protocols, Performance Evaluation, Vol. 69, No. 12 (Dec. 2012), pp. 643--661. (pdf, doi)
  • Nadim Parvez, Carey Williamson, Anirban Mahanti, and Niklas Carlsson, Insights on Media Streaming Progress using BitTorrent-like Protocols for On-Demand Streaming, IEEE/ACM Transactions on Networking (IEEE/ACM ToN), Vol. 20, No. 3 (June 2012), pp. 637--650. (doi)

2011

  • Phillipa Gill, Martin Arlitt, Niklas Carlsson, Anirban Mahanti, Carey Williamson, Characterizing Organizational Use of Web-based Services: Methodology, Challenges, Observations, and Insights, ACM Transactions on the Web (ACM TWEB), Vol. 5, No. 4 (Oct. 2011), pp. 19:1--19:23. (doi)
  • Martin Arlitt, Niklas Carlsson, Phillipa Gill, Aniket Mahanti, Carey Williamson, Characterizing Intelligence Gathering and Control on an Edge Network, ACM Transactions on Internet Technology (ACM TOIT), Vol. 11, No. 1 (July 2011), pp. 2:1--2:26. (doi)
  • Siddharth Mitra, Mayank Agrawal, Amit Yadav, Niklas Carlsson, Derek Eager, and Anirban Mahanti, Characterizing Web-based Video Sharing Workloads, ACM Transactions on the Web (ACM TWEB), Vol. 5, No. 2 (May 2011), pp. 8:1-8:27. (doi)
  • Vapen A., Shahmehri N., '2-clickAuth - optical challenge-response authentication using mobile handsets' in International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3 (Issue 2), pp 1 -- 18, IGI Global, ISSN: 1937-9412, 2011.

2010

  • Niklas Carlsson and Derek L. Eager, Server Selection in Large-scale Video-on-Demand Systems, ACM Transactions on Multimedia Computing, Communications, and Applications (ACM TOMCAPP), Vol. 6, No. 1 (Feb. 2010), pp. 1:1-1:26. (pdf doi)

2009

2008

  • Byers D., Shahmehri N., 'Contagious errors: understanding and avoiding issues with imaging drives containing faulty sectors', Digital Investigation, 2008. Journal page.

2007

  • Chisalita I., Shahmehri N., `On the design of safety communication systems for vehicles', IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 37(6): 933-945, 2007.
  • Herzog A., Shahmehri N., `Usable Set-up of Runtime Security Policies'. International Journal of Information Security and Privacy.15(5): 394-407, 2007.
  • Herzog A., Shahmehri N., Duma C., `An Ontology of Information Security'. International Journal of Information Security and Privacy.1(4): 1-23, 2007.

2005

  • Herzog, A., Shahmehri N., `Performance of the Java Security Manager'. Computers & Security, 24(3):192-207, 2005.

2004

  • Shahmehri N., Aberg, J., Maciuszek, D., Chisalita I., `Linköping University's Virtual Companion project'. IEEE Pervasive Computing, 3(2):50, 2004.

2000

  • Aberg J., Shahmehri N. 'The Role of Human Web Assistants in Ecommerce: An analysis and a usability study'. Journal of Internet Research: Electronic Networking Applications and Policy, vol 10, number 2, 2000.
  • Lambrix P, Shahmehri N, Querying Documents using Content, Structure and Properties, Journal of Intelligent Information Systems, 15(3):287-307, 2000. journal page.

earlier than 2000

  • Takkinen J., Shahmehri N. 'Are You Busy, Cool, or just Curious? -- CAFE: A Model with Three Different States of Mind for a User to Manage Information in Electronic Mail', in P. A. Lundgren (Ed.) Human IT, No. 1/98, March 1998. ISSN 1402-1501.
  • Shahmehri N., Kamkar M., Fritzson P., 'Usability Criteria for Automated Debugging Systems', in the Journal of Systems and Software, pp 55-70; October 1995.
  • Fritzson P., Auguston M., Shahmehri N., 'Using Assertions in Declarative and Operational Models for Automated Debugging', in the Journal of Systems and Software, Vol 25, pp 223-239, 1994.
  • Fritzson P., Shahmehri N., Kamkar M., Gyimothy T.,' Generalized Algorithmic Debugging and Testing', in ACM LOPLAS - Letters of Programming Languages and Systems, Vol 1, No 4, Dec 1992.

Book chapters

  • Carlsson N, Broadening the Audience: Popularity Dynamics and Scalable Content Delivery Techniques in Lambrix, (ed), Advances in Secure and Networked Information Systems - The ADIT Perspective, 139-144, LiU Tryck / LiU Electronic Press, 2012. publisher's book page.
  • Martucci LA, Contributions of LiU/ADIT to Informational Privacy in Lambrix, (ed), Advances in Secure and Networked Information Systems - The ADIT Perspective, 145-155, LiU Tryck / LiU Electronic Press, 2012. publisher's book page.
  • Herzog A, Shahmehri N, Duma C, An Ontology of Information Security, ed Nemadi H, Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, 278-301, Information Science Reference, 2009. ISBN: 978-1-60566-210-7
  • Shahmehri N., Aberg J., Maciuszek D., Virtual Companions, Book chapter, Chapter 35 in The Engineering Handbook of Smart Technology for Aging, Disability and Independence (eds. Helal A., Mokhtari M., Abdulrazak B.), Wiley, ISBN: 978-0-471-71155-1, October 2008.
  • Shahmehri N., Chisalita I., Aberg J., People with Special Needs and Traffic Safety, Book chapter, Chapter 24 in The Engineering Handbook of Smart Technology for Aging, Disability and Independence (eds. Helal A., Mokhtari M., Abdulrazak B.), Wiley, ISBN: 978-0-471-71155-1, October 2008.
  • Aberg J., Shahmehri N., 'Live Help Systems', in Julie Ratner (ed.), Human Factors and Web Development, chapter 15, Lawrence Erlbaum Associates, second edition, 2002. ISBN 0-8058-4221-7.

Conference and workshop publications

2016

  • Joel Purra and Niklas Carlsson, Third-party Tracking on the Web: A Swedish Perspective, Proc. IEEE Conference on Local Computer Networks (IEEE LCN), Dubai, Nov. 2016.
  • Georgios Rizothanasis, Niklas Carlsson, and Aniket Mahanti, Identifying User Actions From HTTP(S) Traffic, Proc. IEEE Conference on Local Computer Networks (IEEE LCN), Dubai, Nov. 2016.
  • Rahul Hiran, Niklas Carlsson, and Nahid Shahmehri, Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms, Proc. IFIP Networking, Vienna, Austria, May 2016, pp. 261--269.
  • Niklas Carlsson, Optimized eeeBond: Energy Efficiency with non-Proportional Router Network Interfaces, Proc. ACM/SPEC International Conference on Performance Engineering (ACM/SPEC ICPE), Delft, the Netherlands, Mar. 2016, pp. 215--223. (doi)
  • Anna Vapen, Niklas Carlsson, and Nahid Shahmehri, Longitudinal Analysis of the Third-party Authentication Landscape, Proc. NDSS Workshop on Understanding and Enhancing Online Privacy (UEOP@NDSS), San Diego, CA, Feb. 2016.
  • Ajay Gopinathan, Niklas Carlsson, Zongpeng Li, and Chuan Wu, Revenue-maximizing and Truthful Online Auctions for Dynamic Spectrum Access, Proc. IEEE/IFIP Wireless On-demand Network Systems and Services Conference (IEEE/IFIP WONS), Cortina d'Ampezzo, Italy, Jan. 2016.
  • Tova Linder, Pontus Persson, Anton Forsberg, Jakob Danielsson, and Niklas Carlsson, On Using Crowd-sourced Network Measurements for Performance Prediction, Proc. IEEE/IFIP Wireless On-demand Network Systems and Services Conference (IEEE/IFIP WONS), Cortina d'Ampezzo, Italy, Jan. 2016.

2015

  • Vengatanathan Krishnamoorthi, Niklas Carlsson, Derek Eager, Anirban Mahanti, and Nahid Shahmehri, Bandwidth-aware Prefetching for Proactive Multi-video Preloading and Improved HAS Performance, Proc. ACM International Conference on Multimedia (ACM Multimedia), Brisbane, Australia, Oct. 2015. (doi)
  • Rahul Hiran, Niklas Carlsson, and Nahid Shahmehri, Crowd-based Detection of Routing Anomalies on the Internet, Proc. IEEE Conference on Communications and Network Security (IEEE CNS), Florence, Italy, Sept. 2015, pp. 388--396. (doi)
  • Anna Vapen, Niklas Carlsson, Anirban Mahanti, and Nahid Shahmehri, 'Information Sharing and User Privacy in the Third-party Identity Management Landscape', in 'ICT Systems Security and Privacy Protection', in Proc. IFIP International Information Security and Privacy Conference (IFIP SEC), Hamburg, Germany, May 2015, pp. 174-188.
  • Anna Vapen, Niklas Carlsson, Anirban Mahanti, and Nahid Shahmehri, 'Information Sharing and User Privacy in the Third-party Identity Management Landscape', Proc. ACM Conference on Data and Application Security and Privacy (ACM CODASPY), San Antonio, TX, Mar. 2015. Outstanding poster award (3rd place in the best poster competition at CODASPY'15)
  • Cyriac James and Niklas Carlsson, Green Domino Incentives: Impact of Energy-aware Adaptive Link Rate Policies in Routers, Proc. ACM/SPEC International Conference on Performance Engineering (ACM/SPEC ICPE), Austin, TX, Jan/Feb. 2015, pp. 211--221.

2014

  • Vengatanathan Krishnamoorthi, Niklas Carlsson, Derek Eager, Anirban Mahanti, and Nahid Shahmehri, Quality-adaptive Prefetching for Interactive Branched Video using HTTP-based Adaptive Streaming, Proc. ACM International Conference on Multimedia (ACM Multimedia), Orlando, FL, Nov. 2014, pp. 317--326. (doi)
  • Rahul Hiran, Niklas Carlsson, and Nahid Shahmehri, PrefiSec: A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security, Proc. ACM CCS Workshop on Information Sharing and Collaborative Security (ACM WISCS @CCS), Scottsdale, AZ, Nov. 2014, pp. 3--12. (doi)
  • Benoy Varghese, Niklas Carlsson, Guillaume Jourjon, Anirban Mahanti, and Prashant Shenoy, Greening Web Servers: A Case for Ultra Low-power Web Servers, Proc. International Green Computing Conference (IGCC), Dallas, TX, Nov. 2014.
  • Niklas Carlsson, Derek Eager, Ajay Gopinathan, and Zongpeng Li, Caching and Optimized Request Routing in Cloud-based Content Delivery Systems, Proc. IFIP International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP Performance), Turin, Italy, Oct. 2014. (Special issue Performance Evaluation, Vol. 79 (Sept. 2014), pp. 38--55.) (doi)
  • György Dán and Niklas Carlsson, Dynamic Content Allocation for Cloud-assisted Service of Periodic Workloads, Proc. IEEE International Conference on Computer Communications (IEEE INFOCOM), Toronto, Canada, Apr/May 2014, pp. 853--861. (doi
  • Alberto García Estévez and Niklas Carlsson, Geo-location-aware Emulations for Performance Evaluation of Mobile Applications, Proc. IEEE/IFIP Conference on Wireless On-demand Network Systems and Services (IEEE/IFIP WONS), Obergurgl, Austria, Apr. 2014, pp. 73--76.
  • Anna Vapen, Niklas Carlsson, Anirban Mahanti, and Nahid Shahmehri, 'Third-party Identity Management Usage on the Web', Proc. Passive and Active Measurement Conference (PAM), Los Angeles, CA, Mar. 2014, pp. 151-262.

2013

  • Vengatanathan Krishnamoorthi, Patrik Bergström, Niklas Carlsson, Derek Eager, Anirban Mahanti, and Nahid Shahmehri, Empowering the Creative User: Personalized HTTP-based Adaptive Streaming of Multi-path Nonlinear Video, Proc. ACM SIGCOMM Workshop on Future Human-Centric Multimedia Networking (FhMN), Hong Kong, Aug. 2013, pp. 53--58. (This paper also appeared in ACM SIGCOMM Computer Communication Review (ACM CCR), Volume 43, Issue 4, Oct. 2013, pp. 591--596.) (doi, ** Best Paper Award **)
  • Vengatanathan Krishnamoorthi, Niklas Carlsson, Derek Eager, Anirban Mahanti, and Nahid Shahmehri, Helping Hand or Hidden Hurdle: Proxy-assisted HTTP-based Adaptive Streaming Performance, Proc. IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (IEEE MASCOTS), San Francisco, CA, Aug. 2013, pp. 182--191. (doi)
  • Carey Williamson and Niklas Carlsson, On Zipf Models for Probabilistic Piece Selection in P2P Stored Media Streaming, Proc. IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (IEEE MASCOTS), San Francisco, CA, Aug. 2013, pp. 161--171.
  • M. Aminul Islam, Derek Eager, Niklas Carlsson, and Anirban Mahanti, Revisiting Popularity Characterization and Modeling for User-generated Videos, Proc. IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (IEEE MASCOTS), San Francisco, CA, Aug. 2013, pp. 350--354.
  • Klara Stokes and Niklas Carlsson, A Peer-to-Peer Agent Community for Digital Oblivion in Online Social Networks, Proc. International Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 2013, pp. 103--110.
  • Raoufehsadat Hashemian, Diwakar Krishnamurthy, Martin Arlitt, and Niklas Carlsson, Improving the Scalability of a Multi-core Web Server, Proc. ACM/SPEC International Conference on Performance Engineering (ICPE), Prague, Czech Republic, Apr. 2013, pp. 161--172. (pdf, slides, doi)
  • Rahul Hiran, Niklas Carlsson, and Phillipa Gill, Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident, Proc. Passive and Active Measurement Conference (PAM), Hong Kong, China, Mar. 2013, pp. 229--238. (pdf, slides, data, doi)

2012

  • Song Zhang, Niklas Carlsson, Derek Eager, Zongpeng Li, and Anirban Mahanti, Dynamic File Bundling for Large-scale Content Distribution, IEEE Conference on Local Computer Networks (IEEE LCN), Clearwater, FL, Oct. 2012, pp. 601--609.
  • Niklas Carlsson, György Dan, Derek Eager, Anirban Mahanti, Tradeoffs in Cloud and Peer-assisted Content Delivery Systems, Proc. IEEE International Conference on Peer-to-Peer Computing (IEEE P2P), Tarragona, Spain, Sept. 2012, pp. 249--260.
  • Youmna Borghol, Sebastien Ardon, Niklas Carlsson, Derek Eager, and Anirban Mahanti, The Untold Story of the Clones: Content-agnostic Factors that Impact YouTube Video Popularity, Proc. ACM SIGKDD Conference on Knowledge Discovery and Data Mining (ACM KDD), Beijing, China, Aug. 2012, pp. 1186--1194. (doi)
  • Aniket Mahanti, Niklas Carlsson, and Carey Williamson, Content Sharing Dynamics in the Global File Hosting Landscape, Proc. IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (IEEE MASCOTS), Arlington, VA, Aug. 2012, pp. 219--228.
  • Martin Arlitt, Niklas Carlsson, Carey Williamson, and Jerry Rolia, Passive Crowd-based Monitoring of World Wide Web Infrastructure and its Performance, Proc. IEEE International Conference on Communications (IEEE ICC), Ottawa, Canada, June 2012, pp. 2689--2694.
  • Niklas Carlsson, György Dán, Martin Arlitt, Anirban Mahanti, A Longitudinal Characterization of Local and Global BitTorrent Workload Dynamics, Proc. Passive and Active Measurement Conference (PAM), Vienna, Austria, Mar. 2012, pp. 252--262.

2011

  • Aniket Mahanti, Carey Williamson, Niklas Carlsson, Martin Arlitt, Anirban Mahanti, Characterizing the File Hosting Ecosystem: A View from the Edge, Proc. IFIP International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP Performance), Amsterdam, Netherlands, Oct. 2011. (Special issue Performance Evaluation, Vol. 68, No. 11 (Nov. 2011), pp. 1085--1102.) (doi)
  • Youmna Borghol, Siddharth Mitra, Sebastien Ardon, Niklas Carlsson, Derek Eager, and Anirban Mahanti, Characterizing and Modeling Popularity of User-generated Videos, Proc. IFIP International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP Performance), Amsterdam, Netherlands, Oct. 2011. (Special issue Performance Evaluation, Vol. 68, No. 11 (Nov. 2011), pp. 1037--1055.) (doi)
  • György Dán, Niklas Carlsson, and Ilias Chatzidrossos, Efficient and Highly Available Peer Discovery: A Case for Independent Trackers and Gossiping, Proc. IEEE International Conference on Peer-to-Peer Computing (IEEE P2P), Kyoto, Japan, Aug/Sept. 2011, pp. 290--299.
  • Byers D., Shahmehri N., 'Modeling Security Goals and Software Vulnerabilities', in Dependability and Computer Engineering: Concepts for Software-Intensive Systems Petre L., Sere K., and Troubitsyna E. (Eds). IGI Global, pp 171 -- 198,2011. ISBN 10:1609607473, EISNB 13: 9781609607487.
  • Shahmehri N., Byers D., Hiran R., 'TRAP: An Open Decentralized Distributed Spam Filtering'. The 8th International Conference on Trust, Privacy and Security in Digital Businees, TRUSTBUS 2011. LNCS, Springer, Vol 6863. pp 86 -- 97, August 29 - September 2, 2011, Toulouse, France. DOI.
  • Vapen A., Shahmehri N., 'Security levels for web authentication using mobile phones'. Privacy and Identity Management for Life. Fischer-H¨bner S., Duquenoy P., Hansen M., Leenes R., and Zhang G. (eds.), Vol 352, pp 130 -- 143, Springer, 2011, ISBN 978-3-642-20768-6.
  • Song Zhang, Niklas Carlsson, Derek Eager, Zongpeng Li, and Anirban Mahanti, Towards a Dynamic File Bundling System for Large-scale Content Distribution, IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (IEEE/ACM MASCOTS), Singapore, July 2011.
  • Niklas Carlsson and Martin Arlitt, Towards More Effective Utilization of Computer Systems, Proc. ACM/SPEC International Conference on Performance Engineering (ACM/SPEC ICPE), Karlsruhe, Germany, Mar. 2011, pp. 235--246.

2010

  • Aniket Mahanti, Carey Williamson, and Niklas Carlsson, Characterizing the File Hosting Service Ecosystem, Proc. ACM CoNEXT Student Workshop (ACM CoNEXT), Philadelphia, PA, Nov/Dec. 2010.
  • Niklas Carlsson, and Derek Eager, Content Delivery using Replicated Digital Fountains, Proc. IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (IEEE/ACM MASCOTS), Miami Beach, FL, August 2010, pp. 338--348.
  • Niklas Carlsson, and Martin Arlitt, Leveraging Organizational Etiquette to Improve Internet Security, Proc. IEEE International Conference on Computer Communication Networks (IEEE ICCCN), Zurich, Switzerland, August 2010.
  • Nissan Lev-tov, Niklas Carlsson, Zongpeng Li, Carey Williamson, and Song Zhang, Dynamic File-selection Policies for Bundling in BitTorrent-like Systems, Proc. IEEE International Workshop on Quality of Service (IEEE IWQoS), Beijing, China, June 2010, pp. 1--9.
  • Niklas Carlsson, Derek L. Eager, and Anirban Mahanti, Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-assisted Content Delivery Systems, Proc. IFIP/TC6 Networking (Lecture Notes in Computer Science 6091, edited by M. Crovella et al., Springer), Chennai, India, May 2010, pp. 1--14.
  • Aniket Mahanti, Niklas Carlsson, Carey Williamson, and Martin Arlitt, Ambient Interference Effects in Wi-Fi Networks, Proc. IFIP/TC6 Networking (Lecture Notes in Computer Science 6091, edited by M. Crovella et al., Springer), Chennai, India, May 2010, pp. 160--173.
  • Youmna Borghol, Sebastien Ardon, Niklas Carlsson, and Anirban Mahanti, Toward Efficient On-demand Streaming with BitTorrent, Proc. IFIP/TC6 Networking (Lecture Notes in Computer Science 6091, edited by M. Crovella et al., Springer), Chennai, India, May 2010, pp. 53--66.
  • Byers D., Shahmehri, N.,'Unified modeling of attacks, vulnerabilities and security activities' (position paper), Proceedings of the 2010 Workshop on Software Engineering for Secure Systems (SESS10), in conjunction with the 32nd International Conference on Software Engineering (ICSE 2010), pp. 36-42, May 2-8, 2010, Cape Town, South Africa. DOI: http://dx.doi.org/10.1145/1809100.1809106
  • Vapen A., Shahmehri N., 'Security levels for web authentication using mobile phones'. PrimeLife/IFIP Summer School, 2010. Electronic pre-proceedings, distributed to summer school participants. Accepted papers, Link to the paper.
  • Vapen A., Byers D., Shahmehri N., '2-clickAuth - Optical Challenge/Response Authentication', Fifth International Conference on Availability, Reliability and Security, ARES 2010 (IEEE Computer Society ed.), pp.79-86, 15-18 Feb. 2010, Krakow, Poland, February 2010

2009

  • Shanai Ardi, Nahid Shahmehri, 'A post-mortem incident modeling method', Accepted for Publication in the Proceedings of the Second International Workshop on Digital Forensics (WSDF), (ARES2009, IEEE Computer Society ed.) , Fukuoka, Japan, March 2009.
  • Byers D., Shahmehri N., 'Prioritisation and Selection of Software Security Activities', Fourth International Conference on Availability, Reliability and Security, ARES 2009 ( IEEE Computer Society ed.), Fukuoka, Japan, March 2009.
  • Meland P.H., Ardi S., Jensen J., Rios E., Sanchez T., Shahmehri N., Tondel I.A., 'An architectural foundation for security model sharing and reuse', Proceedings of the Third International Workshop on Secure Software Engineering (SecSE), 823-828, (ARES2009, IEEE Computer Society ed.) , Fukuoka, Japan, March 2009.
  • Sanchit Garg, Trinabh Gupta, Niklas Carlsson, and Anirban Mahanti, Evolution of an Online Social Aggregation Network: An Empirical Study, Proc. ACM Internet Measurement Conference (ACM IMC), Chicago, IL, Nov. 2009, pp. 315--321. (doi)
  • Niklas Carlsson, Derek L. Eager, and Anirban Mahanti, Peer-assisted On-demand Video Streaming with Selfish Peers, Proc. IFIP/TC6 Networking (Lecture Notes in Computer Science 5550, edited by L. Fratta et al., Springer), Aachen, Germany, May 2009, pp. 586--599.
  • Trinabh Gupta, Sanchit Garg, Anirban Mahanti, Niklas Carlsson, and Martin Arlitt, Characterization of FriendFeed - A Web-based Social Aggregation Service, Proc. AAAI International Conference on Weblogs and Social Media (AAAI ICWSM), San Jose, CA, May 2009.
  • György Dan and Niklas Carlsson, Dynamic Swarm Management for Improved BitTorrent Performance, Proc. International Workshop on Peer-to-Peer Systems (IPTPS), Boston, MA, Apr. 2009.
  • Siddharth Mitra, Mayank Agrawal, Amit Yadav, Niklas Carlsson, Derek Eager, and Anirban Mahanti, Characterizing Web-based Video Sharing Workloads, Proc. International World Wide Web Conference (WWW), Madrid, Spain, Apr. 2009.
  • Amit Dvir and Niklas Carlsson, Power-aware Recovery for Geographic Routing, Proc. IEEE Wireless Communications and Networking Conference (IEEE WCNC), Budapest, Hungary, Apr. 2009, pp. 1--6.

2008

  • Ardi S., Shahmehri N., 'Integrating a security plug-in with the OpenUP/Basic development process', Proceedings of the Third International Conference on Availability, Reliability and Security, ARES2008 (IEEE Computer Society ed.), Pages 284-291, Barcelona, Spain, March 2008.
  • Byers D., Shahmehri N., 'A Cause-Based Approach to Preventing Software Vulnerabilities', Proceedings of the Third International Conference on Availability, Reliability and Security, ARES2008 (IEEE Computer Society ed.), Pages 276-283, Barcelona, Spain, March 2008. Best Paper Award.
  • Karresand M., Shahmehri N., 'Reassembly of Fragmented JPEG Images Containing Restart Markers', European Conference on Computer Network Defense in cooperation with ENISA (EC2ND'08), December 11-12, 2008, Dublin, Ireland.

2007

  • Ardi S., Byers D., Shahmehri N., `How can the developer benefit from security modeling?', Workshop on Secure Software Engineering (SecSE 2007), in conjunction with the ARES 2007 conference, organized by Dexa Ascociation in cooperation with ENISA (European Network and Information Security Agency), 1017-1025, April 10-13, Vienna, 2007. IEEE CS.
  • Byers D., Shahmehri N., `Design of a Process for Security Model', ARES 2007(the dependability conference), International Conference on Availability, Reliability, and Security: Bridging theory and practice, organized by Dexa Ascociation in cooperation with ENISA (European Network and Information Security Agency), April 10-13, Vienna, 2007. IEEE CS.
  • Duma C., Herzog A., Shahmehri N., `Privacy in the Semantic Web: What Policy Languages Have to Offer'. IEEE Workshop on Policies for Distributed Systems and Networks, June 13-15, Bologna, Italy, 2007.
  • Herzog A., Shahmehri N., `Usable Set-up of Runtime Security Policies'. Proceedings of the International Symposium on Human Aspects of Information Security and Assurance. July 2007. Pages 99-113. July 2007.
  • Herzog A., Shahmehri N., ` Usability and Security of Personal Firewalls', Proceedings of the International Information Security Conference (IFIP TC-11) (SEC'07) Springer-Verlag. May 2007.
  • Herzog A., Shahmehri N., `User Help Techniques for Usable Security', Proceedings of the 1st Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT'07) ACM Press. South Africa, March 2007.

2006

  • Aberg C, Aberg J, Lambrix P, Shahmehri N, `A Platform to Evaluate the Technology for Service Discovery in the Semantic Web', Proceedings of the Twenty-First National Conference on Artificial Intelligence - AAAI-2006, pp 1253-1258, Boston, MA, USA, 2006. © AAAI.
  • Ardi S., Byers D., Shahmehri N., `Towards a Structured Unified Process for Software Security', Proceedings of the Software Engineering for Secure Systems (SESS06), in conjunction with the 28th International Conference on Software Engineering (ICSE 2006), 3-10, May 20-28, 2006, Shanghai, China.
  • Byers D., Ardi, S., Shahmehri N., Duma C., `Modeling Software Vulnerabilities With Vulnerability Cause Graphs', Proceedings of the International Conference on Software Maintenance (ICSM), 411-422, Pennsylvania, September 24-27, 2006.
  • Bonatti P.A., Duma C., Fuchs N., Nejdl W., Olmedilla D., Peer J., Shahmehri N., `Semantic Web Policies - A Discussion of Requirements and Research Issues', 3rd European Semantic Web Conference (ESWC), Volume 4011 LNCS, 2006, Pages 712-724, Budva, Montenegro, June 2006. Journal page.
  • Chisalita I., Shahmehri N., `Adaptive dissemination of safety data among moving vehicles', Proceedings of the 17th IEEE Personal, Indoor and Mobile Radio Communication Symposium (PIMRC), Helsinki, Finland, September 11-14, 2006.
  • Chisalita I., Shahmehri N., `Performance evaluation of safety communication for vehicles', Proceedings of the 3rd International Symposium on Wireless Information Systems, Valencia, Spain, September 2006.
  • Chisalita I., Shahmehri N., `Emergency information dissemination in mobile networks for vehicles International Conference on Wireless Information Networks and Systems (WINSYS), part of the 3rd International Joint Conference on e-Business and Telecommunications, Setubal, Portugal, August 7-10, 2006.
  • Duma C., Karresand M., Shahmehri N., Caronni G., `A Trust-Aware, P2P-based Overlay for Intrusion Detection', 3nd International Workshop on P2P Data Management, Security and Trust (PDMST'06), in conjunction with the 17th International Conference on Database and Expert Systems Applications (DEXA'2006), Krakow, Poland, 4 - 8 September 2006.
  • Herzog A., Shahmehri N., `A Usability Study of Security Policy Management', Proceedings of IFIP International Information Security Conference: Security and Privacy in Dynamic Environments (SEC2006), Springer, ISBN 0-387-33405-x, pp 296-306, May 22 - 24, Karlstad, Sweden. Journal page.
  • Karresand M., Shahmehri N., `Oscar - File Type and Camera Identification Using the Structure of Binary Data Fragments', 1st Conference on Advances in Computer Security and Forensics (ACSF) July 13-14, Published by The School of Computing and Mathematical Sciences, John Moores University, pp 11-20, Liverpool, UK.
  • Karresand M., Shahmehri N., `File Type Identification of Data Fragments by Their Binary Structure', Proceedings of the 7th Annual IEEE Information Assurance Workshop, "The West Point Workshop", Pages 140-147, United States Military Academy, West Point, 21-23 June 2006, New York.
  • Karresand M., Shahmehri N., `Oscar: File Type Identification of Binary Data in Disk Clusters and RAM Pages', Proceedings of IFIP International Information Security Conference: Security and Privacy in Dynamic Environments (SEC2006), Springer, ISBN 0-387-33405-x, pp 413-424, May 22 - 24, Karlstad, Sweden. Journal page.

2005

  • Aberg, C., Lambrix, P., Shahmehri, N., `An Agent-based Framework for Integrating Workflows and Web Services', Proceedings of the IEEE WETICE Workshop on Agent-based Computing for Enterprise Collaboration, pp 27-32, Linköping, Sweden, 2005. Best paper award.
  • Aberg, C., Lambrix, P., Takkinen, J., Shahmehri N., `sButler: A Mediator between Organizations' Workflows and the Semantic Web', Proceedings of the WWW 2005 Workshop on Web Service Semantics: Towards Dynamic Business Integration, Chiba, Japan, May 2005.
  • Aberg, J., Shahmehri N., Äldre och framtidens teknik - ett datavetenskapligt perspektiv (Elderly and future technology - a computer science perspective)'. In Gosta Blucher and Goran Graninger (eds), Den omvända Ã¥lderspyramiden, pp. 253-265, Linkoping University Interdisciplinary Studies, Linkoping, Sweden, 2005. (Essay in Swedish)
  • Bonatti P.A., Antoniou G., Baldoni M., Baroglio C., Duma C., Fuchs N., Martelli A., Nejdl W., Olmedilla D., Peer J., Patti V., Shamheri N., `The REWERSE View on Policies', Semantic Web and Policy Workshop (in conjunction with 4th International Semantic Web Conference), Galway, Ireland, November 2005.
  • Bonatti P.A., Duma C., Olmedilla D., Shahmehri N., `An Integration of Reputation-based and Policy-based Trust Management', Semantic Web and Policy Workshop (in conjunction with 4th International Semantic Web Conference), Galway, Ireland, November 2005.
  • Duma C., Shahmehri N., Caronni G., `Dynamic Trust Metrics for Peer-to-Peer Systems', 2nd International Workshop on P2P Data Management, Security and Trust (PDMST'05), in conjunction with the 16th International Conference on Database and Expert Systems Applications (DEXA'2005), pp 776-781, Copenhagen, Denmark, August 2005.
  • Herzog A., Shahmehri N., `An Evaluation of Java Application Containers according to Security Requirements', Proceedings of the IEEE WETICE Workshop on Security Technologies for Collaborative Architectures, pages 175-183, Linköping, Sweden, June 13-15, 2005.
  • Maciuszek, D., Aberg, J., Shahmehri N., `What Help Do Older People Need? Constructing a Functional Design Space of Electronic Assistive Technology Applications', The Seventh International ACM SIGACCESS Conference on Computers and Accessibility - ASSETS 2005, October 9-12, 2005, Baltimore, USA. Journal page.
  • Maciuszek, D., Aberg, J., Shahmehri N., `Evaluation and Refinement of a Design Framework for Generating Dependable Virtual Companions for Later Life', 3rd International Conference On Smart homes and health Telematic - ICOST 2005, July 4-6, Sherbrooke, Canada, 2005.

2004

  • Bonatti, P., Shahmehri N., Duma, C., Olmedilla, D., Nejdl, W., Baldoni, M., Baroglio, C., Martelli, A., Patti, V., Coraggio, P., Antoniou, G., Peer, J., Fuchs, N., `Rule-based Policy Specification: State of the Art and Future Work', REWERSE Deliverable I2-D1, 2004.
  • Chisalita, I., Shahmehri N., `A context-based vehicular communication protocol', Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication Conference (PIMRC 2004), pp 2820-2824, Barcelona, Spain, September 5-8, 2004.
  • Chisalita, I., Shahmehri N., `Vehicular communication - A candidate technology for traffic safety', Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, pp 3903-3908, Hague, The Netherlands, October 10-13, 2004.
  • Chisalita, I., Shahmehri N., Lambrix P., `Traffic Accidents Modeling and Analysis using Temporal Reasoning', Proceedings of the IEEE Conference on Intelligent Transportation Systems, pp 378-383, Washington, D.C., USA, 2004.
  • Duma, C, Shahmehri N., Lambrix, P., `Efficient Storage for Category-Based Group Key Management', Fifth Ph.D. Student Conference on Computer Science and Systems Engineering, pp 139-146, Norrköping, Sweden, 2004.
  • Duma, C, Shahmehri N., Turcan, E., `Resilient Trust for Peer-to-Peer Based Critical Information Infrastructures', 2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France, October 2004.
  • Herzog, A., Shahmehri N., `Problems Running Untrusted Services as Java Threads', Nardelli, E., Talamo, M. (eds) Certification and Security in Inter-Organizational E-Services - Proceedings of CSES'04 (Toulouse, France, August 26-27, 2004), pp 19-32, Springer Verlag, 2005. ISBN 0-387-25087-5.
  • Maciuszek, D., Shahmehri N., Aberg, J., `Dependability requirements to aid the design of virtual companions for later life', Proceedings of the First The Home and Electronic Assistive Technology Workshop (HEAT), pp 51-60, York, UK, March 16-17, 2004.
  • Maciuszek, D., Shahmehri N., Aberg, J., `User involvement in the design of software to assist people with dementia: Creating a personalised virtual kitchen companion', Poster at the ENABLE Final Conference: Challenges in Dementia Care, pp 23, Oslo, Norway, June 21-23, 2004.
  • Shahmehri N., Chisalita, I., Aberg, J., Maciuszek, D., Hellqvist, M., `Using Vehicular Communication to Support Older Drivers at Road Intersections: A Feasibility Study', Proceedings of 2nd International Conference On Smart homes and health Telematics (ICOST2004), pp 33-40, Singapore, September 15-17, 2004.

2003

  • Duma C., Shahmehri N. and Lambrix P., `A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements', Proceedings of the IEEE WETICE Workshop on Enterprise Security, pp 208-213, Linz, Austria, 2003.
  • Duma C., Shahmehri N. and Lambrix P., 'A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast'. Proceedings of the 18th IFIP International Information Security Conference , pp 133-144, Athens, Greece, May 2003.
  • Shahmehri N., Takkinen J., Aberg C., `Towards Creating Workflows On-the-Fly and Maintaining Them Using the Semantic Web: The sButler Project at Linköping University', poster. Proceedings of The 12th International World Wide Web Conference - WWW 2003.

2002

  • Aberg C., Shahmehri N., 'A Framework for Generating Task Specific Information Extraction Systems'. Proceedings of the 13th International Symposium on Methodologies for Intelligent Systems - ISMIS 2002. LNAI 2366, pp 491-502, Lyon, France, June 2002.
  • Chisalita I., Shahmehri N. `An in-vehicle approach for improving traffic safety through GIS utilization'. 2002 IEEE International Conference on Systems, Man and Cybernetics (SMC02), pp 9-11, Hammamet, Tunisia, Oct. 6-9, 2002.
  • Chisalita I., Shahmehri N., 'A peer-to-peer approach to vehicular communication for the support of traffic safety applications'. Proceedings of the 5th IEEE Conference on Intelligent Transportation Systems, pp. 336-341, Singapore, Sep. 3-6, 2002.
  • Chisalita I., Shahmehri N., 'A novel architecture for supporting vehicular communication'. Proceedings of IEEE 56th Vehicular Technology Conference , pp. 1002-1006, Vancouver, Canada, 24-28 Sep. 2002.
  • Herzog A., Shahmehri N., 'Using the Java Sandbox for Resource Control'. Proceedings of the 7th Nordic Workshop on Secure IT Systems (NordSec), Karlstad, Sweden. pp. 135-147. November, 2002.
  • Turcan E., Shahmehri N. and Graham R.L., 'Intelligent Software Delivery using P2P'. Proceedings of the Second IEEE International Conference on Peer-to-Peer Computing - P2P2002, pp 136-143. Linköping, Sweden, Sep. 5-7 2002.

2001

  • Aberg J., Shahmehri N., 'User Modelling as an Aid for Human Web Assistants', Proceedings of the 8th International Conference on User Modeling, Sonthofen, Germany, July 13-17, 2001. Springer-Verlag.
  • Aberg J., Shahmehri N., 'An Empirical Study of Human Web Assistants: Implications for User Support in Web Information Systems'. In the proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, pp. 404-411, Seatle, Wahsington, March 31-April 5, 2001.
  • Aberg J., Shahmehri N., 'Collection and Exploitation of Expert Knowledge in Web Assistant Systems'. Proceedings of the 34th Hawaii International Conference on System Sciences, Maui, Hawaii, January 3-6, 2001.
  • Chisalita I., Shahmehri N.,'Issues in Image Utilization within Mobile E-Services'. In proceedings of the IEEE 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET-ICE), pp 62-67, June 20-22, MIT, Cambridge, USA, 2001.
  • Chisalita I., Shahmehri N., 'An Adaptive Approach in Providing E-services for Mobile Devices'. Proceedings of the Third Conference on Computer Science and Systems Engineering, CCSSE '01, Norrköping, ProNova, Linköping, Sweden 2001.
  • Herzog A., Shahmehri N., 'Towards Secure E-Services: Risk Analysis of a Home Automation Service'. Proceedings of the 6th Nordic Workshop on Secure IT-Systems (Nordsec), pp 18-26, Technical University of Denmark, Lungby, Denmark, Nov. 1-2, 2001.
  • Herzog A., Shahmehri N., Bednarski A., Chisalita I., Nordqvist U., Saldamli L., Szentivanyi D., Östring M., 'Security Issues in E-Home Network and Software Infrastructures', Short paper. Proceedings of the Third Conference on Computer Science and Systems Engineering, CCSSE '01, pp 155-161, Norrköping, ProNova, Linköping, Sweden 2001.
  • Lambrix P., Shahmehri N., 'Querying Document Bases using Content, Structure and Properties', Ontologies and Search - Proceedings of the 2nd OntoQuery Workshop, pp 15-21, Copenhagen, Denmark, 2001. Invited contribution.

2000

  • Boisson C., Shahmehri N., `Template Generation for Identifying Text Patterns'. Proceedings of the Twelfth International Symposium on Methodologies for Intelligent Systems - ISMIS 2000,. LNAI 1932, pp 463-473, Charlotte, NC, USA, October 11-14, 2000.
  • Duma C., Herzog A., Shahmehri N., 'Towards Secure e-Services'. In the proceedings of the IEEE 9th International Workshops on Enabling Technologies: Enterprise Security, pp 221-222, June 14-16, NIST, Gaithursburg, Maryland, USA, 2000.
  • Han L., Shahmehri N., 'Secure Multicast Software Delivery'. In the proceedings of the IEEE 9th International Workshops on Enabling Technologies: Enterprise Security, pp 207-212, June 14-16, NIST, Gaithursburg, Maryland, USA, 2000.
  • Shahmehri N.,Aberg A., Lambrix P., 'Projects as a means for subject learning and personal development under student responsibility'. Proceedings of Second International Conference on Problem-based Learning in Higher Education, Linköping, Sweden, 2000.

1999

  • Aberg J., Shahmehri N., 'Web Assistants: Towards an Intelligent and Personal Web Shop'. Proceedings of the Second Workshop on Adaptive Systems and User Modeling on the World Wide Web, pp 5-12, Toronto and Banff, Canada, 1999.
  • Han L., Shahmehri N., 'Establishing a Secure Multicast Group for Remote Software Delivery', Proceedings of the IEEE 8th International Workshops on Enabling Technologies: Enterprise Security, pp 194-195, June 16-18, Palo Alto, CA, USA, 1999.
  • Han L., Shahmehri N., 'Towards Remote Software Delivery Using Secure Multicast Group Establishment', Proceedings of the Second Conference on Computer Science and Systems Engineering in Linköping (CCSSE'99), pp 85-91, Norrköping, Sweden, 1999.
  • Kindborg M., Aberg J., Shahmehri N., 'A Lightweight Agent Framework for Interactive Multi-Agent Applications'. Proceedings of the Fourth International Conference and Exhibition on The Practical Application of Intelligent Agents and Multi-Agents - PAAM, April 19-21, (London, UK), 1999.
  • Lambrix P., Shahmehri N. and Svend Jacobsen. 'Querying Document Bases by Content, Structure and Properties'. Proceedings of the Eleventh International Symposium on Methodologies for Intelligent Systems - ISMIS 99, (Warsaw, Poland), 1999.
  • Takkinen J., Shahmehri N., 'Task-Oriented Restructuring of an Application Domain: A Multi-Agent Architecture for Doing Things in Internet E-Mail', in Proceedings of 32nd Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA.

1998

  • Lambrix P., Shahmehri N., 'TRIFU: The Right Information For yoU'. In Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS-31), Volume IV - Internet and the Digital Economy Track, pp. 505-512, (Hawaii), January 6-9, 1998.
  • Lambrix P., Shahmehri N. and Niclas Wahllöf. 'A default extension to description logics for use in an intelligent search engine', in Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS-31), Volume V - Modeling Technologies and Intelligent Systems Track, pp. 28-35, (Hawaii), January 6-9, 1998.
  • Shahmehri N., Gustafsson M., 'Security Issues in Distributed Information Systems'. The Second European RISI Conference, The ISES project conference track, November 27-28, 1998, Graz, Styria, Austria.
  • Takkinen J., Shahmehri N., 'Coordination in Message-Based Environments: Restructuring E-Mail to Accomplish Tasks'. In the International Workshop on Coordination Technologies for Information Systems (CTIS'98), August 25, 1998, Vienna. IEEE Press.
  • Takkinen J., Shahmehri N., 'Delegation of Tasks and Dissemination of Information in Organizations: Restructuring Internet E-Mail for Doing Things', in Proceedings of American Information Society 1998 Americas Conference (AIS-98), the Group Supported Collaboration mini-track, August 14-16, 1998, Baltimore, Maryland, USA.
  • Takkinen J., Shahmehri N., 'CAFE: A Conceptual Model for Managing Information in Electronic Mail', in Proceedings of the 31st Hawaii International Conference on System Sciences (HICCS-31), Volume V - Modeling Technologies and Intelligent Systems Track, pp. 44-53, (Hawaii), January 6-9, 1998. Nominated for Best Paper.

1997

  • Biglari N., Shahmehri N., 'Intelligent Interactive Services (IIS)', in Proceedings of the Conference on Distribution Automation & Demand Side Management (DA/DSM'97), (Amsterdam, The Netherlands), October 14-16, 1997.
  • Gustafsson M., Deligny B., Shahmehri N., 'Using NFS to implement role-based access control', in Proceedings of the IEEE Sixth WET-ICE, International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises(WET-ICE'97), Enterprise Security, pp. 299-304, (Cambridge, MA, USA), 1997.
  • Lambrix P., Shahmehri N., Aberg J., 'Towards Creating a Knowledge Base for World-Wide Documents', in Proceedings of the International Conference on Intelligent Information Systems, IEEE Press, (Grand Bahama Island, the Bahamas), December 8-10, 1997.
  • Lambrix P., Shahmehri N., Wahllöf N., A default extension to description logics for use in an intelligent search engine, in Proceedings of Tenth International Symposium on Methodologies for Intelligent Systems - Poster Session, (Charlotte, North Carolina, USA), 1997.
  • Lambrix P., Shahmehri N., Wahllöf N., 'Dwebic: An Intelligent Search Engine based on Default Description Logics', Proceedings of the International Workshop on Description Logics, (Gif sur Yvette, France), 1997.

1996

  • Gustafsson M., Shahmehri N., 'A Role-Description Framework and its Applications to Role-Based Access Control', Presented at the IEEE Fifth WET-ICE, International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Enterprise Security., March, 1996. A revised version of this paper is presented at NORDSEC, Nordic Workshop on Secure Computer Systems, (Göteborg), November 7-8, 1996.
  • Hall T., Shahmehri N., 'An Intelligent Multi.Agent Architecture for Support of Process Reuse in a Workflow Management System', in Proceedings of the First International Conference on the Practical Applications of Intelligent Agents and Multi-Agent Technology, (London, UK), April, 1996.

until 1995

  • Lennartsson B., Shahmehri N., Bonnier S., 'On Exploiting Declarative Programming and Parallel Execution in Computer Based Real-time Systems', in Proceedings of the Tutorial and Workshop on Computer-Based Systems, ECBS'94, In IEEE Computer Society Press, (Sockholm), 24-27 May, 1994.
  • Kamkar M., Shahmehri N., Fritzson F., 'Three Approaches to Interprocedural Dynamic Slicing', in Proceedings of EUROMICRO'93, the Journal of Microprocessing and Microprogramming, North-Holland, Vol 38, No 1-5, September 1993.
  • Kamkar M., Fritzson P., Shahmehri N., 'Interprocedural Dynamic Slicing with Applications to Interprocedural Data Flow Testing', in Proceedings of the IEEE Conference on Software Maintenance, CSM-93, (San Diego, CA), September 1993.
  • Shahmehri N. Kamkar M., Fritzson P., 'Usability Criteria for Automated Debugging Systems', in Proceedings of AADEBUG'93 -1st Int. Workshop on Automated and Algorithmic Debugging, LNCS 749, Springer Verlag, May 1993.
  • Fritzson P., Auguston M., Shahmehri N., 'Using Assertions in Declarative and Operational Models for Automated Debugging', in Proceedings of Tolouse'92 - The fifth International Conference in Software Engineering and its Applications, (Tolouse, France), December 7-11, 1992.
  • Kamkar M., Shahmehri N., Fritzson P., 'Interprocedural Dynamic Slicing', in Proceedings of PLILP'92 - Symposium on Programming Language Implementation and Logic Programming, LNCS 631, Springer Verlag, (Leuven, Belgium), August 1992.
  • Fritzson P., Gyimothy T., Kamkar M., and Shahmehri N., 'Generalized Algorithmic Debugging and Testing', in Proceedings of SIGPLAN'91 Conference on Programming Language Design and Implementation, SIGPLAN Notices 26:6, (Toronto, Ontario, Canada), June 1991.
  • Shahmehri N. Kamkar M., Fritzson P., 'Semi-Automatic Bug Localization in Software Maintenance', in Proceedings of the IEEE Conference on Software Maintenance, CSM-90, (San Diego, CA), November, 1990.
  • Shahmehri N., Fritzson P., 'Algorithmic Debugging for Imperative Languages with Side-effects', in Proceedings of CC'90 - The 3rd International Workshop on Compiler Compilers, (Schwerin, Germany), 22-24 October, 1990. Extended abstract in LNCS 477, Springer-Verlag.
  • Kamkar M.,, Shahmehri N., Fritzson P., 'Bug Localization by Algorithmic Debugging and Program Slicing', in Proceedings of the International Conference on Programming Language Implementation and Logic Programming, August 1990, LNCS 456, Springer-Verlag, 1990.
  • Kamkar M., Shahmehri N., Fritzson P., 'Affect-Chaining and Dependency Oriented Flow Analysis Applied to Queries of Programs', in Proceedings of the ACM Symposium on Personal and Small Computers, (Cannes, France), May 1988.
  • Kamkar M., Shahmehri N., 'Runtime Dependent Program Flow Analysis'. In Proceedings of the Nordic Workshop at Roskilde University Center, (Roskilde, Denmark), October 1986.

Page responsible: Nahid Shahmehri
Last updated: 2016-08-26