Publications
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are
retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and
constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission
of the copyright holder.
Publication year:
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
[2003]
[2002]
[2001]
[2000]
[1999]
2024
- J. Wilson, M. Asplund, N. Johansson, and F. Boeira,
Provably Secure Communication Protocols for Remote Attestation, in
the Proceedings of the 19th International Conference on Availability,
Reliability and Security (ARES), 2024.
doi:10.1145/3664476.3664485.
- N. Mutua, S. Nadjm-Tehrani, and P. Matousek,
Penetrating the Power Grid: Realistic Adversarial Attacks on Smart Grid
Intrusion Detection, in the Proceedings of the 19th International
conference on Critical Information Infrastructures (CRITIS), September
2024.
Available as
PDF.
- N. Sivaraman, S. Nadjm-Tehrani, and T. Johansson,
Formal Analysis of Julia Key Agreement Protocol, in the Proceedings
of the 26th International Conference on Information and Communication
Security (ICICS), September 2024.
Available as
PDF.
- R. S. de Moraes and S. Nadjm-Tehrani, NeuralGAP:
Deep Learning Evaluation of Networked IMA Architectures, in the
Proceedings of the European Dependable Computing Conference (EDCC), IEEE,
April 2024.
Available as
PDF.
- R. S. de Moraes and S. Nadjm-Tehrani, NetGAP: A
Graph-Grammar approach for the concept design of networked platforms with
extra-functional requirements, Engineering Applications of Artificial
Intelligence, February 2024.
doi:10.1016/j.engappai.2024.108089.
- K. Toczé and S. Nadjm-Tehrani, The
Necessary Shift: Towards a Sufficient Edge Computing, IEEE Pervasive
Computing, April 2024.
doi:10.1109/MPRV.2024.3386337.
Available as
PDF.
2023
- R. Plaka, M. Asplund, and S. Nadjm-Tehrani,
Vulnerability Analysis of an Electric Vehicle Charging Ecosystem, in
the Proceedings of the 18th International conference on Critical
Information Infrastructures (CRITIS), 2023.
doi:10.1007/978-3-031-62139-0_9.
Available as
PDF.
- M. Barocsai, J. Can, M. Karresand, and S.
Nadjm-Tehrani, Mapping and Analysis of Common Vulnerabilities in Popular
Web Servers, in the Proceedings of the 18th International conference
on Critical Information Infrastructures (CRITIS), 2023.
doi:10.1007/978-3-031-62139-0_1.
Available as
PDF.
- C.-Y. Lin and S. Nadjm-Tehrani, Protocol Study and
Anomaly Detection for Server-driven Traffic in SCADA Networks,
International Journal of Critical Infrastructure Protection
(Elsevier), June 2023.
doi:10.1016/j.ijcip.2023.100612.
- N. Sivaraman and S. Nadjm-Tehrani, 5G Handover:
When Forward Security Breaks, in the 20th International Conference on
Security and Cryptography (SECRYPT), 2023.
doi:10.5220/0012128400003555.
Available as
PDF.
- M. Eckhart, A. Ekelhart, D. Allison, M. Almgren, K.
Ceesay-Seitz, H. Janicke, S. Nadjm-Tehrani, A. Rashid, and M. Yampolskiy,
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future
Perspectives, IEEE Security and Privacy, June 2023.
doi:10.1109/msec.2023.3271225.
- J. Wilson, M. Asplund, and N. Johansson, Extending
the Authentication Hierarchy with One-Way Agreement, in the 36th IEEE
Computer Security Foundations Symposium (CSF), 2023.
Available as
PDF.
- A. B. Usman, N. Cole, M. Asplund, F. Boeira, and C.
Vestlund, Remote Attestation Assurance Arguments for Trusted Execution
Environments, in the 3rd ACM Workshop on Secure and Trustworthy
Cyber-physical Systems (Sat-CPS), 2023.
doi:10.1145/3579988.3585056.
Available as
PDF.
- F. Boeira, M. Asplund, and M. Barcellos, Provable
Non-Frameability for 5G Lawful Interception, in the 16th ACM
Conference on Security and Privacy in Wireless and Mobile Networks
(WiSec), 2023.
Available as
PDF.
- K. Toczé, A. J. Fahs, G. Pierre, and S.
Nadjm-Tehrani, VioLinn: Proximity-Aware Edge Placement with Dynamic and
Elastic Resource Provisioning, ACM Transactions on Internet of
Things, 2023.
doi:10.1145/3573125.
- V. Colaco and S. Nadjm-Tehrani, Formal
Verification of Tree Ensembles against Real-World Composite Geometric
Perturbations, in the AAAI-23 Workshop on Artificial Intelligence
Safety (SafeAI 2023), CEUR-WS.org/Vol-3381, urn:nbn:de:0074-3381-7.
Available as
PDF.
- M. Eidenskog, J. Sefyrin, E. Johnson, O. Leifler,
and M. Asplund, Changing the world one engineer at a time - unmaking the
traditional engineering education when introducing sustainability
subjects, International Journal of Sustainability in Higher
Education, 2023.
2022
- R. S. de Moraes and S. Nadjm-Tehrani, Concept Level
Exploration of IMA-Based Networked Platforms With Mixed Time-Sensitive
Communication Requirements, in The 33rd Congress of the International
Council of Aeronautical Sciences (ICAS), 2022.
Available as
PDF.
- D. Lantz, F. Boeira, and M. Asplund, Towards
Self-Monitoring Enclaves: Side-Channel Detection using Performance
Counters, in The 27th Nordic Conference on Secure IT Systems
(Nordsec), 2022.
- F. G. R. de Souza, C. M. Hirata, and S.
Nadjm-Tehrani, Synthesis of a Controller Algorithm for Safety-Critical
Systems, IEEE Access, 2022.
doi:10.1109/ACCESS.2022.3192436.
- F. Boeira and M. Asplund, Exploiting Partial Order of
Keys to Verify Security of a Vehicular Group Protocol, in 35th IEEE
Computer Security Foundations Symposium (CSF), 2022.
Available as
PDF.
- F. Boeira, M. Asplund, and M. Barcellos, No
Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial
Scenarios (Poster paper), in Proceedings of the 15th ACM Conference on
Security and Privacy in Wireless and Mobile Networks (WiSec22), (New
York, NY, USA), ACM, 2022.
doi:10.1145/3507657.3529651.
Available as
PDF.
- A. Hölscher, M. Asplund, and F. Boeira, Evaluation of
an SDN-based Microservice Architecture, in 4th International Workshop
on Performance Evaluation of Next Generation Virtualized Environments and
Software-Defined Networks, 2022.
Available as
PDF.
- K. Toczé, M. Madon, M. Garcia, and P. Lago, The
Dark Side of Cloud and Edge Computing: An Exploratory Study, in LIMITS
'22: Workshop on Computing within Limits, 2022.
doi:10.21428/bf6fb269.9422c084.
Available as
PDF.
- Y. Cherdantseva, P. Burnap, S. Nadjm-Tehrani, and
K. Jones, A Configurable Dependency Model of a SCADA System for
Goal-Oriented Risk Assessment, Journal of Applied Sciences, 2022.
doi:10.3390/app12104880.
- K. Toczé, N. Schmitt, U. Kargén, A. Aral, and I.
Brandic, Edge Workload Trace Gathering and Analysis for Benchmarking,
in 6th IEEE International Conference on Fog and Edge Computing 2022 (ICFEC
2022), IEEE, 2022.
doi:10.1109/ICFEC54809.2022.00012.
Available as
PDF.
2021
- C. F. E. de Melo, T. Dapper e Silva, F. Boeira, J. M.
Stocchero, A. Vinel, M. Asplund, and E. P. de Freitas, UAVouch: A Secure
Identity and Location Validation Scheme for UAV-Networks, IEEE
Access, 2021.
doi:10.1109/ACCESS.2021.3087084.
- C.-Y. Lin, A. Fundin, E. Westring, T. Gustafsson, and
S. Nadjm-Tehrani, RICSel21 Data Collection: Attacks in a Virtual Power
Network, in 12th International Conference on Smart Grid Communications
(SmartGridComm 2021), IEEE, 2021.
doi:10.1109/SmartGridComm51999.2021.9632328.
Available as
PDF.
- E. Westring, A. Fundin, C.-Y. Lin, T. Gustafsson, and
S. Nadjm-Tehrani, RICSel21: A dataset with network attacks targeting
IEC-60870-5-104 in SCADA systems, in Presented in the industry session
at the 16th International Conference on Critical Information Infrastructure
Security (CRITIS), 2021.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani(eds.), Proceedings
of 25th Nordic Conference on Secure IT Systems (NordSec 2020), Lecture
Notes in Computer Science 12556, 2021.
doi:10.1007/978-3-030-70852-8.
- C. G. Cordero, E. Vasilomanolakis, A. Wainakh,
M. Mühlhäuser, and S. Nadjm-Tehrani, On Generating Network Traffic
Datasets with Synthetic Attacks for Intrusion Detection, ACM
Transactions on Privacy and Security, vol. 24(2), 2021.
doi:10.1145/3424155.
- C.-Y. Lin and S. Nadjm-Tehrani, A Comparative
Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System
Networks, in First international workshop on Cyber-Physical Security
for Critical Infrastructures Protection (CPS4CIP 2020), Lecture Notes in
Computer Science 12618, Springer, 2021.
doi:10.1007/978-3-030-69781-5_14.
- R. Moraes, S. Bernardi, and S. Nadjm-Tehrani, A
model-based approach for analysing network communication timeliness in IMA
systems at concept level, in 29th International Conference on
Real-Time Networks and Systems (RTNS), ACM, 2021.
doi:10.1145/3453417.3453427.
Available as
PDF.
- R. Moraes and S. Nadjm-Tehrani, Abstraction
Models for Verifying Resource Adequacy of IMA Systems at Concept Level,
Science of Computer Programming, vol. 208, 2021.
doi:10.1016/j.scico.2021.102654.
- C. E. de Melo, T. D. e Silva, F. Boeira, J. Stocchero, A.
Vinel, M. Asplund, and E. de Freitas, UAVouch: A Secure Identity and
Location Validation Scheme for UAV-networks, IEEE Access, 2021.
doi:10.1109/ACCESS.2021.3087084.
2020
- S. Nadjm-Tehrani(Ed.), Proceedings of the 14th
International Conference on Critical Information Infrastructures Security
(CRITIS 2019), Lecture Notes in Computer Science 11777, 2020.
doi:10.1007/978-3-030-37670-3.
- A. Rawat, M. Khodari, M. Asplund, and A. Gurtov,
Decentralized Firmware Attestation for In-Vehicle Networks, ACM
Transactionson Cyber-Physical Systems, 2020.
doi:10.1145/3418685.
- K. Toczé, J. Lindqvist, and S. Nadjm-Tehrani,
Characterization and Modeling of an Edge Computing Mixed Reality
Workload, Journal of Cloud Computing, vol. 9, no. 46, 2020.
doi:10.1186/s13677-020-00190-x.
Available as
PDF.
- J. Törnblom and S. Nadjm-Tehrani, Formal
Verification of Input-Output Mappings of Tree Ensembles, Science of
Computer Programming, Special issue on Formal Techniques in Safety-critical
Systems, 2020.
doi:10.1016/j.scico.2020.102450.
Available as
PDF.
- T. Sund, C. Lööf, S. Nadjm-Tehrani, and M.
Asplund, Blockchain-based Event Processing in Supply Chains - A Case Study
at IKEA, Robotics and Computer-Integrated Manufacturing, 2020.
doi:10.1016/j.rcim.2020.101971.
2019
- G. Grimsdal, P. Lundgren, C. Vestlund, F. Boeira, and
M. Asplund, Can Microkernels Mitigate Microarchitectural Attacks?, in
Secure IT Systems (A. Askarov, R. R. Hansen, and W. Rafnsson, eds.),
Springer International Publishing, 2019.
doi:10.1007/978-3-030-35055-0_15.
Available as
PDF.
- R. S. de Moraes and S. Nadjm-Tehrani, Verifying
Resource Adequacy of Networked IMA Systems at Concept Level, in
International Workshop on Formal Techniques for Safety-Critical Systems
(FTSCS), 2019.
Available as
PDF.
- R. S. de Moraes and E. P. de Freitas, Multi-UAV
Based Crowd Monitoring System, IEEE Transactions on Aerospace and
Electronic Systems, 2019.
doi:10.1109/TAES.2019.2952420.
Available as
PDF.
- K. Toczé, J. Lindqvist, and S. Nadjm-Tehrani,
Performance Study of Mixed Reality for Edge Computing, in
Proceedings of the 12th IEEE/ACM International Conference on Utility and
Cloud Computing (UCC2019), 2019.
doi:10.1145/3344341.3368816.
Available as
PDF.
- F. Boeira, M. Asplund, and M. Barcellos,
Decentralized Proof of Location in Vehicular Ad Hoc Networks,
Computer Communications, 2019.
doi:10.1016/j.comcom.2019.07.024.
- F. Strömbäck, L. Mannila, M. Asplund, and M. Kamkar,
A Student's View of Concurrency - A Study of Common Mistakes in
Introductory Courses on Concurrency, in Proceedings of the 2019 ACM
Conference on International Computing Education Research (ICER), ACM,
2019.
doi:10.1145/3291279.3339415.
- M. Khodari, A. Rawat, A. Gurtov, and M. Asplund,
Decentralized Firmware Attestation for In-Vehicle Networks, in 5th
ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2019.
doi:10.1145/3327961.3329529.
Available as
PDF.
- C.-Y. Lin and S. Nadjm-Tehrani, Timing Patterns and
Correlations in Spontaneous SCADA Traffic for Anomaly Detection, in
Proceedings of the of 22nd International Symposium on Research on Attacks,
Intrusions, and Defenses (RAID), Springer, 2019.
Available as
PDF.
- C. Hirata and S. Nadjm-Tehrani, Combining GSN and
STPA for Safety Arguments, in Proceedings of the 7th International
workshop on Assurance Cases for Software-intensive Systems (ASSURE), held in
conjunction with SAFECOMP, Springer, 2019.
doi:10.1007/978-3-030-26250-1_1,
Post-proceedings version including correction for typos.
Available as
PDF.
- J. Törnblom and S. Nadjm-Tehrani, An
Abstraction-Refinement Approach to Formal Verification of Tree Ensembles,
in Proceedings of the 2nd International workshop on Artificial
Intelligence Safety Engineering, held in conjunction with SAFECOMP,
Springer, 2019.
doi:10.1007/978-3-030-26250-1_24.
Available as
PDF.
- D. Pereira, C. Hirata, and S. Nadjm-Tehrani, A
STAMP-based ontology approach to support Safety and Security,
Journal of Information Security and Applications Analyses, 2019.
doi:doi.org/10.1016/j.jisa.2019.05.014.
Available as
PDF.
- R. S. de Moraes and E. P. de Freitas, Experimental
analysis of heuristic solutions for the moving target traveling salesman
problem applied to a moving targets monitoring system, Expert Systems
with Applications, vol. 136, pp. 392 -- 409, 2019.
doi:https://doi.org/10.1016/j.eswa.2019.04.023.
Available as
PDF.
- A. A. da Fontoura, F. A. M. do Nascimento, S.
Nadjm-Tehrani, and E. P. de Freitas, Timing Assurance of Avionic
Reconfiguration Schemes using Formal Analysis, IEEE Transactions on
Aerospace and Electronic Systems, 2019.
doi:10.1109/TAES.2019.2915406.
Available as
PDF.
- K. Toczé, N. Schmitt, I. Brandic, A. Aral, and
S. Nadjm-Tehrani, Towards Edge Benchmarking: A Methodology for
Characterizing Edge Workloads, in Proceedings of the 2019 IEEE 4th
International Workshops on Foundations and Applications of Self* Systems
(FAS*W), 2019.
doi:10.1109/FAS-W.2019.00030.
Available as
PDF.
- K. Toczé and S. Nadjm-Tehrani, ORCH: Distributed
Orchestration Framework using Mobile Edge Devices, in Proceedings of
the 3rd IEEE International Conference on Fog and Edge Computing (ICFEC
2019), 2019.
doi:10.1109/CFEC.2019.8733152.
Available as
PDF.
- M. Asplund, Combining Detection and Verification for
Secure Vehicular Cooperation Groups, ACM Transactions on
Cyber-Physical Systems, 2019.
doi:10.1145/3322129.
Available as
PDF.
- F. G. Souza, D. P. Pereira, R. M. Pagliares, S.
Nadjm-Tehrani, and C. M. Hirata, WebSTAMP: a Web Application for STPA &
STPA-Sec, in Proceedings of the International Cross-industry Safety
Conference (ICSC) - European STAMP Workshop & Conference (ESWC) (ICSC-ESWC
2018), 2019.
doi:10.1051/matecconf/201927302010.
- S. Bergman, M. Asplund, and S. Nadjm-Tehrani,
Permissioned Blockchains and Distributed Databases: A Performance
Study, Concurrency and Computation, Practice and Experience, 2019.
doi:10.1002/cpe.5227, A
preprint version is available as PDF.
2018
- S. Mohan, M. Asplund, G. Bloom, A. Sadeghi, A.
Ibrahim, N. Salajageh, P. Griffioen, and B. Sinopoli, Special Session: The
Future of IoT Security, in Embedded Systems Week, IEEE, 2018.
doi:10.1109/EMSOFT.2018.8537206.
- F. Boeira, M. Asplund, and M. P. Barcellos, Vouch: A
Secure Proof-of-Location Scheme for VANETs, in International
Conference on Modeling, Analysis and Simulation of Wireless and Mobile
Systems (MSWiM), ACM, 2018.
doi:10.1145/3242102.3242125.
Available as
PDF.
- F. Boeira, M. Asplund, and M. P. Barcellos, Mitigating
Position Falsification Attacks in Vehicular Platooning, in Vehicular
Networking Conference (VNC), IEEE, 2018.
doi:10.1109/VNC.2018.8628427.
Available as
PDF.
- J. Törnblom and S. Nadjm-Tehrani, Formal
Verification of Random Forests in Safety-Critical Applications, in
International Workshop on Formal Techniques for Safety-Critical Systems
(FTSCS), Springer, 2018.
doi:10.1007/978-3-030-12988-0_4,
(Published 2019).
Available as
PDF.
- M. Almgren, P. Andersson, G. Björkman, M. Ekstedt, J.
Hallberg, S. Nadjm-Tehrani, and E. Westring, RICS-el: Building a
National Testbed for Research and Training on SCADA Security, in
13th International Conference on Critical Information Infrastructures
Security (CRITIS), Springer, 2018.
Available as
PDF.
- K. Toczé and S. Nadjm-Tehrani, A Taxonomy for
Management and Optimization of Multiple Resources in Edge Computing,
Wireless Communications and Mobile Computing, 2018.
doi:10.1155/2018/7476201.
Available as
PDF.
- A. Löfwenmark and S. Nadjm-Tehrani, Fault and Timing
Analysis in Critical Multi-Core Systems - A survey with an Avionics
Perspective, Journal of Systems Architecture: Embedded systems
software (JSA), 2018.
doi:10.1016/j.sysarc.2018.04.001.
Available as
PDF.
- C.-Y. Lin and S. Nadjm-Tehrani, Understanding
IEC-60870-5-104 Traffic Patterns in SCADA Networks, in Proceedings of
the 4th ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2018.
doi:10.1145/3198458.3198460.
Available as
PDF.
- M. Asplund, Automatically Proving Correctness of
Vehicle Coordination, ICT Express, 2018.
doi:10.1016/j.icte.2018.01.013.
Available as
PDF.
- M. Asplund, J. Lövhall, and S. Nadjm-Tehrani,
In-store payments using Bitcoin, in Blockchains and Smart Contracts
workshop (BSC), IEEE, 2018.
doi:10.1109/NTMS.2018.8328738.
Available as
PDF.
2017
- F. Boeira, M. P. Barcellos, E. P. de Freitas, A. Vinel,
and M. Asplund, Effects of Colluding Sybil Nodes in Message Falsification
Attacks for Vehicular Platooning, in Vehicular Networking Conference
(VNC), IEEE, 2017.
doi:10.1109/VNC.2017.8275641.
Available as
PDF.
- C.-Y. Lin, S. Nadjm-Tehrani, and M. Asplund,
Timing-based Anomaly Detection in SCADA networks, in Proceesings of
12th International Conference on Critical Information Infrastructures
Security (CRITIS), Springer, 2017.
doi:10.1007/978-3-319-99843-5_5.
Available as
PDF.
- K. Toczé and S. Nadjm-Tehrani, Where Resources
meet at the Edge, in Proceedings of IEEE International Workshop on
Secure and Resource-Efficient Edge Computing 2017, IEEE, 2017.
doi:10.1109/CIT.2017.60.
Available as
PDF.
- D. Pereira, C. Hirata, R. Pagliares, and S.
Nadjm-Tehrani, Towards Combined Safety and Security Constraints
Analysis, in Proceedings of the 5th International Workshop on
Assurance Cases for Software-Intensive Systems (SAFECOMP workshops),
Springer, 2017.
Available as
PDF.
- J. Boudjadar and S. Nadjm-Tehrani, Schedulability and
Memory Interference Analysis of Multicore Preemptive Real-time Systems,
in the 8th ACM/SPEC International Conference on Performance Engineering
(ICPE), ACM, 2017.
Available as
PDF.
- M. Asplund, J. Lövhall, and E. Villani,
Specification, Implementation and Verification of Dynamic Group Membership
for Vehicle Coordination, in Proceedings of the 22nd IEEE Pacific Rim
International Symposium on Dependable Computing (PRDC), IEEE, 2017.
doi:10.1109/PRDC.2017.57.
Available as
PDF.
- F. Boeira, M. P. Barcellos, E. P. de Freitas, A. Vinel,
and M. Asplund, On the impact of sybil attacks in cooperative driving
scenarios, in 2017 IFIP Networking Conference (IFIP Networking) and
Workshops, 2017.
doi:10.23919/IFIPNetworking.2017.8264890.
2016
- E. Vergara, S. Nadjm-Tehrani, and M. Asplund,
Fairness and Incentive Considerations in Energy Apportionment
Policies, ACM Transactions on Modelling and Performance Evaluation of
Computer Systems (TOMPECS) 2(1), 2016.
doi:10.1145/2970816.
Available as
PDF.
- J. Boudjadar, J. H. Kim, and S. Nadjm-Tehrani,
Performance-aware Scheduling of Multicore Time-critical Systems, in
the 14th ACM-IEEE International Conference on Formal Methods and Models
for System Design (MEMOCODE), 2016.
Available as
PDF.
- J. Boudjadar, B. Madzar, J. Dingel, T. Fuhrman, and R. S,
Formal Analysis of Predictable Data Flow in Fault-Tolerant Multicore
Systems, in Accepted in the 13th International Symposium on Formal
Aspects of Component Software (FACS), 2016.
Available as
PDF.
- G. Kalns, S. Nadjm-Tehrani, and M. Vasilevskaya,
Trading off Latency against Security in Open Energy Metering
Infrastructures, in Proceedings of The 4th International Symposium for
Industrial Control Systems and SCADA Cyber Security (ICS-CSR), eWICS,
2016.
doi:10.14236/ewic/ICS2016.17.
Available as
PDF.
- A. Löfwenmark and S. Nadjm-Tehrani,
Understanding Shared Memory Bank Access Interference in Multi-Core
Avionics, in 16th International Workshop on Worst-Case Execution Time
Analysis (WCET 2016), vol. 55 of OpenAccess Series in Informatics
(OASIcs), (Dagstuhl, Germany), pp. 1--11, Schloss
Dagstuhl--Leibniz-Zentrum fuer Informatik, 2016.
doi:10.4230/OASIcs.WCET.2016.12.
Available as
PDF.
- A. Alesand, E. Vergara, and S. Nadjm-Tehrani,
Communication Energy Evaluation for Mobile Applications: Emulating 3G over
WiFi, in Proceedings of the 2nd E-Energy Workshop on Energy-aware
Simulation (ENERGY-SIM), ACM, 2016.
doi:10.1145/2939948.2939951.
- O. Somarriba, U. Zurutuza, R.
Uribeetxeberria, L. Delosiéres, and S. Nadjm-Tehrani, Detection and
Visualization of Android Malware Behavior, Journal of Electrical and
Computer Engineering, 2016.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani, Attitudes and
perceptions of IoT security in critical societal services, IEEE
Access, 2016.
doi:10.1109/ACCESS.2016.2560919.
Available as
PDF.
- A. Boudjadar, A. David, J. H.
Kim, K. G. Larsen, M. Mikucionis, U. Nyman, and A. Skou, Statistical and
Exact Schedulability Analysis of Hierarchical Scheduling Systems,
Journal of Science of Computer Programming, Elsevier, 2016.
doi:10.1016/j.scico.2016.05.008.
- J. H. Kim, I. Kang, S. Kang, and A.
Boudjadar, A Process Algebraic Approach to Resource-Parameterized Timing
Analysis of Automotive Software Architectures, Journal:IEEE
Transaction on Industrial Informatics, vol. 12, no. 2, pp. 655--671,
2016.
doi:10.1109/TII.2016.2527624.
Available as
PDF.
- R. Udd, M. Asplund, S. Nadjm-Tehrani, M. Kazemtabrizi,
and M. Ekstedt, Exploiting Bro for Intrusion Detection in a SCADA
System, in Proceedings of the 2nd ACM Cyber-Physical System Security
Workshop (CPSS), ACM, 2016.
Available as
PDF.
- T. Hultman, A. Boudjadar, and M. Asplund,
Connectivity-optimal Shortest Paths Using Crowdsourced Data, in
Proceedings of the 3rd International Workshop on Crowd Assisted Sensing,
Pervasive Systems and Communications (CASPer 2016), IEEE, 2016.
Available as
PDF.
- K. Toczé, M. Vasilevskaya, P.
Sandahl, and S. Nadjm-Tehrani, Maintainability of Functional Reactive
Programs in a Telecom Server Software, in Proceedings of the 31st ACM
Symposium On Applied Computing (SAC). Poster session, ACM, April
2016.
Available as
PDF.
2015
- V. Bernardo, T. Braun, M. Curado, M. Fiedler,
T. Hossmann, K.-A. Hummel, P. Hurni, S. Ickin, A. Jamakovic-Kapic, S.
Nadjm-Tehrani, T. A. Trinh, E. Vergara, F. Wamser, and T. Zinner,
Large-scale Distributed Systems and Energy Efficiency: a Holistic
View, ch. Green Wireless: Energy Efficiency in Wireless Networks.
Wiley, 2015.
- E. J. Vergara, S. Nadjm-Tehrani,
and M. Asplund, Sharing the Cost of Lunch: Energy Apportionment
Policies, in Proceedings of the 11th ACM Symposium on QoS and Security
for Wireless and Mobile Networks, Q2SWinet '15, (New York, NY, USA), pp.
91--97, ACM, 2015.
doi:10.1145/2815317.2815338.
- V. Bernardo, T. Braun, M. Curado, M. Fiedler, D.
Hock, T. Hossmann, K. A. Hummel, P. Hurni, S. Ickin, A. Jamakovic-Kapic, S.
Nadjm-Tehrani, T. A. Trinh, E. J. Vergara, F. Wamser, and T. Zinner, Green
Wireless-Energy Efficiency in Wireless Networks, pp. 81--130.
John Wiley & Sons, Inc, 2015.
doi:10.1002/9781118981122.ch4.
- A. Boudjadar, A. David, J. H.
Kim, K. G. Larsen, M. Mikucionis, U. Nyman, and A. Skou, A reconfigurable
framework for compositional schedulability and power analysis of hierarchical
scheduling systems with frequency scaling, Journal of Science of
Computer Programming, Elsevier, vol. 113, pp. 236--260, 2015.
doi:10.1016/j.scico.2015.10.003.
- J. H. Kim, A. Legay, A. Boudjadar, U. Nyman, K. G.
Larsen, I. Lee, and J.-Y. Choi, Optimizing the Resource Requirements of
Hierarchical Scheduling Systems, in 8th International Workshop on
Compositional Theory and Technology for Real-Time Embedded Systems (CRTS
2015), {ACM SIGBED}, ACM, 2015.
- A. Boudjadar, J. Dingel, B.
Madzar, and J. H. Kim, Compositional Predictability Analysis of Mixed
Critical Real Time Systems, in Formal Techniques for Safety-Critical
Systems - Fourth International Workshop, FTSCS 2015., vol. 596 of
Communications in Computer and Information Science, pp. 69--84,
Springer, 2015.
doi:10.1007/978-3-319-29510-7_4.
Available as
PDF.
- A. Löfwenmark and S. Nadjm-Tehrani,
Experience Report: Memory Accesses for Avionic Applications and Operating
Systems on a Multi-core Platform, in Proceedings of the 26th IEEE
International Symposium on Software Reliability Engineering, ISSRE, pp.
153--160, IEEE, Nov 2015.
doi:10.1109/ISSRE.2015.7381809.
Available as
PDF.
- M. Vasilevskaya and S. Nadjm-Tehrani, Quantifying
Risks to Data Assets Using Formal Metrics in Embedded System Design, in
International Conference on Computer Safety, Reliability and Security
(SAFECOMP), Springer, September 2015.
doi:10.1007/978-3-319-24255-2_25.
Available as
PDF.
- M. Asplund, Model-based Membership Verification in
Vehicular Platoons, in Dependable Systems and Networks Workshop
(DSN-W), on Safety and Security of Intelligent Vehicles (SSIV 2015),
IEEE.
doi:10.1109/DSN-W.2015.21.
Available as
PDF.
- M. Almquist, V. Almquist, E. J. Vergara, and S.
Nadjm-Tehrani, Communication Energy Overhead of Mobile Games, in
Proceedings of the Second ACM International Workshop on Mobile Gaming,
MobiGames, ACM, May 2015.
doi:10.1145/2751496.2751498.
Available as
PDF.
- M. Vasilevskaya and S. Nadjm-Tehrani, Support for
Cross- domain Composition of Embedded Systems Using MARTE Models, ACM
SIGBED Review, vol. 12, no. 1, pp. 37--45, 2015.
doi:10.1145/2752801.2752806,
An adaptation of an earlier version presented in the CRTS workshop at RTSS,
2013.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani, Advances in
delay-tolerant networks (DTNs), Architecture and Enhanced Performance,
ch. Rapid selection and dissemination of urgent messages over delay-tolerant
networks (DTNs).
Woodhead Publishing Series in Electronic and Optical Materials, Elsevier,
2015.
doi:10.1533/9780857098467.2.187.
Available as
PDF.
2014
- M. Vasilevskaya, L. A. Gunawan, S.
Nadjm-Tehrani, and P. Herrmann, Integrating security mechanisms into
embedded systems by domain-specific modelling, Journal of Security and
Communication Networks, vol. 7, no. 12, pp. 2815--2832, 2014.
doi:10.1002/sec.819.
Available as
PDF.
- A. P. Biazino, M. Asplund, E. J. Vergara, and S.
Nadjm-Tehrani, Cooperative Proxies: Optimally Trading Energy and Quality
of Service in Mobile Devices, Computer Networks, Elsevier, vol.
75, 2014.
doi:10.1016/j.comnet.2014.10.013.
Available as
PDF.
- M. Asplund, Poster: Securing Vehicular Platoon
Membership, in Proceedings of IEEE Vehicular Networking Conference
(VNC), IEEE, 2014.
doi:10.1109/VNC.2014.7013324.
- A. Löfwenmark and S. Nadjm-Tehrani,
Challenges in Future Avionic Systems on Multi-core Platforms, in
Proceedings of the 25th IEEE International Symposium on Software
Reliability Engineering, ISSRE, pp. 115--119, IEEE, Nov 2014.
doi:10.1109/ISSREW.2014.70.
Available as
PDF.
- J. M. Santos, S. Nadjm-Tehrani, and A. P. Bianzino,
Monkey Gamer: Automatic Profiling of Android Games, in Sixth
International Conference on Mobile Computing, Applications, and Services,
(MobiCase), EAI/IEEE, 2014.
doi:10.4108/icst.mobicase.2014.257771.
Available as
PDF.
- M. Vasilevskaya and S. Nadjm-Tehrani,
Model-based Security Risk Analysis for Networked Embedded Systems, in
Proceedings of the 9th International Conference on Critical Information
Infrastructures Security, CRITIS '14, 2014.
Available as
PDF.
- J. Lundberg, E. Törnqvist, and S.
Nadjm-Tehrani, Establishing conversation spaces in hastily formed
networks: the worst fire in modern Swedish history, Disasters journal,
Wiley, 2014.
doi:10.1111/disa.12076,
Preprint.
Available as
PDF.
- E. J. Vergara, S. Nadjm-Tehrani, and M.
Prihodko, EnergyBox: Disclosing the Wireless Transmission Energy Cost for
Mobile Devices, Sustainable Computing: Informatics and Systems.
Elsevier, 2014.
doi:10.1016/j.suscom.2014.03.008.
Available as
PDF.
- E. J. Vergara, S. Andersson, and S.
Nadjm-Tehrani, When Mice Consume Like Elephants: Instant Messaging
Applications, in Proceedings of the 5th International Conference on
Future Energy Systems: Where Energy, Computing and Communication Meet,
e-Energy '14, ACM, 2014.
doi:10.1145/2602044.2602054.
Available as
PDF.
- B. Viel and M. Asplund, Why is indoor localization
still so hard?, in The 6th International Workshop on Information
Quality and Quality of Service for Pervasive Computing, 2014.
doi:10.1109/PerComW.2014.6815247.
Available as
PDF.
- A. P. Bianzino, J.-L. Rougier, C. Chaudet, and D. Rossi,
The Green-Game: Accounting for Device Criticality in Resource
Consolidation for Backbone IP Networks, Strategic Behavior and the
Environment, vol. 4, no. 2, pp. 131--153, 2014.
doi:10.1561/102.00000038.
2013
- M. Vasilevskaya and S.
Nadjm-Tehrani, Support for Cross-domain Composition of Embedded Systems
Using MARTE Models, in Proceedings of the 6th International Workshop
on Compositional Theory and Technology for Real-Time Embedded Systems (CRTS
2013), 2013.
Available as
PDF.
- E. J. Vergara and S. Nadjm-Tehrani, Watts2Share: Energy-Aware
Traffic Consolidation, in In Proceedings of the International
Conference on Green Computing and Communications (GreenCom), 2013, IEEE,
August 2013.
Available as
PDF.
- A. P. Bianzino and D. R. Jean-Louis Rougier,
Claude Chaudet, The Green-Game: Accounting for Device Criticality in
Resource Consolidation for Backbone IP Networks, Strategic Behavior
and the Environment, SI on ICT-based strategies for environmental
conflicts, 2013.
- M. Ciarrocchi, A. P. Bianzino, M. Mellia, P.
Donadio, and G. Parladori, Energy-Aware Weight Assignment Framework for
Circuit Oriented GMPLS Networks, in 25th International Teletraffic
Congress (ITC 25), (Shanghai, China), September 2013.
Available as
PDF.
- E. J. Vergara, J. Sanjuan, and S. Nadjm-Tehrani,
Kernel Level Energy-Efficient 3G Background Traffic Shaper for Android
Smartphones, in Proceedings of the 9th International Wireless
Communications and Mobile Computing Conference (IWCMC), 2013, IEEE,
2013.
Available as
PDF.
- E. J. Vergara, M. Prihodko, and S.
Nadjm-Tehrani, Mobile Location Sharing: An Energy Consumption Study,
in Proceedings of the 4th International Conference on Future Energy
Systems: Where Energy, Computing and Communication Meet. Poster session,
e-Energy '13, ACM, 2013.
Available as
PDF.
- E. J. Vergara and S. Nadjm-Tehrani,
EnergyBox: A Trace-driven Tool for Data Transmission Energy Consumption
Studies, in Proceedings of the International Conference on Energy
Efficiency in Large Scale Distributed Systems (EE-LSDS 2013), Lecture
Notes in Computer Science, Springer, April 2013.
Available as
PDF.
- J. Lundberg, E. Törnqvist, and S.
Nadjm-Tehrani, Challenges to the formation of conversation spaces in
hastily formed networks: The most extensive Swedish fire in modern times,
Disaster, 2013.
2012
- M. Vasilevskaya, L. A. Gunawan, S.
Nadjm-Tehrani, and P. Herrmann, Security Asset Elicitation for
Collaborative Models, in Model-Driven Security Workshop (MDSec) in
conjunction with MoDELS (ACM, ed.), (Innsbruck, Austria), 2012.
doi:10.1145/2422498.2422505.
Available as
PDF.
- M. Raciti and S. Nadjm-Tehrani, Embedded
Cyber-Physical Anomaly Detection in Smart Meters, in Proceedings of
the 7th International Conference on Critical Information Infrastructures
Security (CRITIS'12), 2012.
Available as
PDF.
- J. Cucurull, M. Asplund, S. Nadjm-Tehrani, and T.
Santoro, Surviving Attacks in Challenged Networks, IEEE
Transactions on Dependable and Secure Computing, vol. 9, pp. 917--929,
nov.-dec. 2012.
doi:10.1109/TDSC.2012.67.
Available as
PDF.
- J. Sigholm and M. Raciti, Best-Effort Data
Leakage Prevention in Inter-Organizational Tactical MANETs, in
Military Communications Conference 2012 - MILCOM 2012, IEEE, October
2012.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani, Worst-case
Latency of Broadcast in Intermittently Connected Networks,
International Journal of Ad Hoc and Ubiquitous Computing, vol. 11, pp.
125--138, Dec. 2012.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani,
Analysing Delay-tolerant Networks with Correlated Mobility, in in
Proceedings of the 11th International Conference on Ad-Hoc Networks and
Wireless (ADHOC-NOW), Springer, July 2012.
Available as
PDF.
- E. J. Vergara and S. Nadjm-Tehrani,
Energy-aware Cross-layer Burst Buffering for Wireless Communication,
in Third International Conference on Future Energy Systems: Where Energy,
Computing and Communication Meet (e-Energy 2012), (Madrid, Spain), May
2012.
Available as
PDF.
- L. Delosieres and S. Nadjm-Tehrani, BATMAN
Store-and-Forward: the Best of the Two Worlds, in Second International
Workshop on Pervasive Networks for Emergency Management (PerNEM 2012),
(Lugano, Switzerland), IEEE, Mar. 2012.
Available as
PDF.
- G. Sandulescu, P. Schaffer, and S.
Nadjm-Tehrani, Exploiting Resource Heterogeneity in Delay-tolerant
Networks, Wireless Communications and Mobile Computing, January
2012.
doi:10.1002/wcm.2195.
Available as
PDF.
- M. Raciti, J. Cucurull, and S.
Nadjm-Tehrani, Anomaly Detection in Water Management Systems, in
Advances in Critical Infrastructure Protection: Information Infrastructure
Models, Analysis, and Defense (J. Lopez, R. Setola, and S. Wolthusen,
eds.), vol. 7130 of Lecture Notes in Computer Science, pp. 98--119,
Springer Berlin / Heidelberg, 2012.
Available as
PDF.
- E. Kuiper, S. Nadjm-Tehrani, and D. Yuan, A
Framework for Performance Analysis of Geographic Delay-tolerant Routing,
EURASIP Journal of Wireless Communications and Networking, vol. 2012,
no. 1, p. 184, 2012.
- J. Lundberg, E. Törnqvist, and S.
Nadjm-Tehrani, Resilience in Sensemaking and Control of Emergency
Response, International Journal of Emergency Management, vol. 8,
no. 2, 2012.
2011
- S. Nadjm-Tehrani and M. Vasilevskaya, Towards a Security
Domain Model for Embedded Systems, in The 13th IEEE International
Symposium on High Assurance Systems Engineering (HASE) poster session,
IEEE, November 2011.
doi:10.1109/HASE.2011.19.
Available as
PDF.
- M. Asplund, A. Thomasson, E. J. Vergara, and S.
Nadjm-Tehrani, Software-related Energy Footprint of a Wireless Broadband
Module, in The 9th ACM International Symposium on Mobility Management
and Wireless Access (MobiWac), ACM, November 2011.
Available as
PDF.
- E. Kuiper and S. Nadjm-Tehrani, Predicting the
Performance of Geographic Delay-Tolerant Routing, in Military
Communications Conference 2011 - MILCOM 2011, IEEE, November 2011.
Available as
PDF.
- J. Cucurull, S. Nadjm-Tehrani, and M.
Raciti, Modular anomaly detection for smartphone ad hoc communication,
in 16th Nordic Conference on Secure IT Systems, NordSec 2011, LNCS,
Springer Verlag, October 2011.
Available as
PDF.
- I. Burguera, U. Zurutuza, and S.
Nadjm-Tehrani, Crowdroid: Behavior-Based Malware Detection System for
Android, in Workshop on Security and Privacy in Smartphones and Mobile
Devices 2011 - SPSM 2011, ACM, October 2011.
Available as
PDF.
- H. Eriksson, M. Raciti, M. Basile, A. Cunsolo,
A. Fröberg, O. Leifler, J. Ekberg, and T. Timpka, A Cloud-Based Simulation
Architecture for Pandemic Influenza Simulation, in AMIA Annual
Symposium Proceedings 2011, AMIA Symposium, AMIA, October 2011.
- M. Raciti, J. Cucurull, and S. Nadjm-Tehrani,
Energy-based Adaptation in Simulations of Survivability of Adhoc
Communication, in Wireless Days (WD), 2011 IFIP, IEEE, October
2011.
Available as
PDF.
- E. J. Vergara, S. Nadjm-Tehrani, M. Asplund,
and U. Zurutuza, Resource Footprint of a Manycast Protocol Implementation
on Multiple Mobile Platforms, in The Fifth IEEE International
Conference on Next Generation Mobile Applications, Services and Technologies,
2011. NGMAST '11., IEEE, Sept. 2011.
Available as
PDF.
- M. Goldszmidt, M. Malek, S. Nadjm-Tehrani, P. Narasimhan, F.
Salfner, P. A. S. Ward, and J. Wilkes, Towards a Holistic Approach to
Fault Management: Wheels Within a Wheel, Book chapter, in
Dependability and Computer Engineering: Concepts for Software-Intensive
Systems (K. S. L. Petre and E. Troubitsyna, eds.), pp. 1--10, IGI Global
publishers, July 2011.
Available as
PDF.
- J. Lundberg and M. Asplund, Communication Problems
in Crisis Response, in Proceedings of the 8th International Conference
on Information Systems for Crisis Response and Management (ISCRAM),
ISCRAM, 2011.
Available as
PDF.
- E. Kuiper and S. Nadjm-Tehrani, Geographical
routing with location service in intermittently connected MANETs, IEEE
Transactions on Vehicular Technology, vol. 60, February 2011.
Available as
PDF.
2010
- J. Cucurull, R. Marti, G. Navarro-Arribas, S.
Robles, J. Borrell, and G. Suades, Fragment Transfer Protocol: An
IEEE-FIPA based efficient transfer protocol for mobile agents,
Computer Communications, vol. 33, no. 18, pp. 2203 -- 2214, 2010.
doi:10.1016/j.comcom.2010.08.005.
- G. Sandulescu, P. Schaffer, and S.
Nadjm-Tehrani, Vicinity Resource Cartography for Delay-Tolerant Networks:
a Holistic Perspective, in Proceedings of the 3rd IFIP Wireless Days
(WD'10) Conference, IEEE, October 2010.
Available as
PDF.
- S. Nadjm-Tehrani, SecFutur: Security Engineering
Process for Networked Embedded Devices, in Proceedings of the 12th
Biennial Baltic Electronic Conference (BEC2010), IEEE, October 2010.
Available as
PDF.
- S. Guergens, C. Rudolf, A. Mana, and S.
Nadjm-Tehrani, Security engineering for embedded systems: The SecFutur
vision, in Proceedings of the International workshop on Security and
Dependability for Resource Constrained Embedded Systems (S&D4RCES) in
conjunction with SAFECOMP conference, ACM, September 2010.
Available as
PDF.
- J. Cucurull, M. Asplund, and S. Nadjm-Tehrani,
Anomaly detection and mitigation for disaster area networks, in
13th International Symposium on Recent Advances in Intrusion
Detection, vol. 6307, pp. 339--359, Springer Verlag, September 2010.
Available as
PDF.
- G. Sandulescu and S. Nadjm-Tehrani,
Optimising Replication versus Redundancy in Window-aware Opportunistic
Routing, in Proceedings of International Conference on Communication
Theory, Reliability, and Quality of Service, (part of NexCOMM 2010),
IEEE, June 2010.
Available as
PDF.
- M. Asplund, T. de Lanerolle, C. Fei, P. Gautam, R.
Morelli, S. Nadjm-Tehrani, and G. Nykvist, Wireless Ad Hoc Dissemination
for Search and Rescue, in 7th International Conference on Information
Systems for Crisis Response and Management, ISCRAM, May 2010.
Available as
PDF.
- J. Cucurull, G. Navarro, R. Marti, S. Robles, and J.
Borrell, An Efficient and Secure Agent Code Distribution Service,
Software: Practice and Experience, vol. 40, pp. 363--386, April
2010.
- G. Sandulescu and S. Nadjm-Tehrani,
Adding Redundancy to Replication in Window-aware Delay-tolerant
Routing, Journal Of Communications, Special Issue in Delay Tolerant
Networks, Architecture, and Applications, vol. 5, February 2010.
Available as
PDF.
2009
- M. Asplund and S. Nadjm-Tehrani, A
Partition-tolerant Manycast Algorithm for Disaster Area Networks, in
28th International Symposium on Reliable Distributed Systems, IEEE,
Sept. 2009.
Available as
PDF.
- M. Asplund, S. Nadjm-Tehrani, and K. Zagar,
Middleware Extensions that Trade Consistency for Availability,
Concurrency and Computation: Practice and Experience, vol. 21, pp.
1181--1203, June 2009.
Available as
PDF.
- E. Törnqvist, J. Sigholm, and S.
Nadjm-Tehrani, Hastily Formed Networks for Disaster Response: Technical
Heterogeneity and Virtual Pockets of Local Order, in Proceedings of
the 6th International Conference on Information Systems for Crisis Response
and Management (ISCRAM), ISCRAM, May 2009.
Available as
PDF.
2008
- J. Elmqvist, S. Nadjm-Tehrani, K. Forsberg, and S.
Nordenbro, Demonstration of a Formal Method for Incremental Qualification
of IMA Systems, in Proceedings of the 27th International Conference on
Digital Avionics Systems (DASC), IEEE, October 2008.
Available as
PDF.
- G. Sandulescu and S. Nadjm-Tehrani, Opportunistic
DTN Routing with Window-aware Adaptive Replication, in Proceedings of
the ACM/SIGCOMM Asian Internet Engineering Conference (AINTEC'08),
2008.
Available as
PDF.
- M. Asplund, S. Nadjm-Tehrani, and J. Sigholm,
Emerging Information Infrastructures: Cooperation in Disasters, in
Proceedings of the 3rd International Workshop on Critical Information
Infrastructures Security (CRITIS'08), Oct. 2008.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani, Random walk
gossip-based manycast with partition detection (fast abstract), in
Proceedings of the 2008 International Conference on Dependable Systems and
Networks (DSN'08), IEEE Computer Society, June 2008.
Available as
PDF.
- C. Curescu and S. Nadjm-Tehrani, A Bidding
Algorithm for Optimized Utility-Based Resource Allocation in Ad Hoc
Networks, IEEE Transactions on Mobile Computing, vol. 7, pp.
1397--1414, December 2008.
doi:10.1109/TMC.2008.54.
Available as
PDF.
- J. Elmqvist and S. Nadjm-Tehrani, Tool
Support for Incremental Failure Mode and Effects Analysis of Component-Based
Systems, in Design, Automation, and Test in Europe (DATE)
Conference, EDA/ACM/SIGDA, March 2008.
Available as
PDF.
- J. Elmqvist and S. Nadjm-Tehrani,
Formal Support for Quantitative Analysis of Residual Risks in
Safety-Critical Systems, in High Assurance Systems Engineering
Symposium (HASE'08), IEEE, December 2008.
Available as
PDF.
- E. Kuiper and S. Nadjm-Tehrani, Geographical Routing
in Intermittently Connected Ad Hoc Networks, in The First IEEE
International Workshop on Opportunistic Networking (WON-08), IEEE, March
2008.
Available as
PDF.
- M. Amirijoo, J. Hansson, S. Gunnarsson,
and S. H. Son, Quantifying and Suppressing the Measurement Disturbance in
Feedback Controlled Real-Time Systems, Real-Time Systems Journal,
vol. 40, pp. 44--76, October 2008.
Available as
PDF.
- W. Kang, S. H. Son, J. A. Stankovic, and M.
Amirijoo, I/O-Aware Deadline Miss Ratio Management in Real-Time Embedded
Databases, in 28th IEEE International Real-Time Systems Symposium,
pp. 277--287, IEEE, December 2007.
Available as
PDF.
2007
- J. Sigholm and S. Nadjm-Tehrani, Enterprise network
Node Discovery and Topology Analysis: An experience Report, in
Pre-proceedings of the 2nd Benelux Workshop on Information and System
Security (WISSEC07), University of Luxembourg, September 2007.
- T. Gustafsson and J. Hansson, Performance
Evaluations and Estimations of Workload of On-Demand Updates in Soft
Real-Time Systems, in Proceedings of the 13th IEEE International
Conference on Embedded and Real-Time Computing Systems and Applications
(RTCSA07), 2007.
- T. Gustafsson, A. Tesanovic, Y. Du, and J.
Hansson, Engineering Active Behavior of Embedded Software to Improve
Evolution and Performance: an Aspect-Oriented Approach, in Proceedings
of the 2007 ACM symposium on Applied computing, pp. 673--679, ACM Press,
2007.
- M. Amirijoo, J. Hansson, S. H. Son, and S.
Gunnarsson, Experimental Evaluation of Linear Time-Invariant Models for
Feedback Performance Control in Real-Time Systems, Real-Time
Systems, vol. 35, Apr. 2007.
Available as
PDF.
- M. Amirijoo, S. H. Son, and J. Hansson, QoD
Adaptation for Achieving Lifetime Predictability of WSN Nodes Communicating
over Satellite Links, in International Conference of Networked Sensing
Systems (INSS), 2007.
- M. Asplund, S. Nadjm-Tehrani, S. Beyer, and P.
Galdamez, Measuring Availability in Optimistic Partition-tolerant Systems
with Data Constraints, in Proceedings of the 2007 International
Conference on Dependable Systems and Networks (DSN'07), June 2007.
Available as
PDF.
- K. Burbeck and S. Nadjm-Tehrani, Adaptive Real-time
Anomaly Detection with Incremental Clustering, Information Security
Technical Report, vol. 12, no. 1, 2007.
Available as
PDF.
2006
- T. Gustafsson and J. Hansson, Data Freshness
and Overload Handling in Embedded Systems, in Proceedings of the 12th
IEEE International Conference on Embedded and Real-Time Computing Systems and
Applications (RTCSA06), pp. 173--182, IEEE Computer Society Press,
2006.
Available as
PDF.
- T. Gustafsson, J. Hansson, A. Göras, J.
Gäddevik, and D. Holmberg, 2006-01-0305: Database Functionality in
Engine Management System, in Proceedings of Software/Hardware Systems
SAE World Congress 2006, 2006.
Available as
PDF.
- A. Tesanovic, M. Amirijoo, and J. Hansson,
Providing Configurable QoS Management in Real-Time Systems with QoS Aspect
Packages, Transactions on Aspect-Oriented Software Development
(TOASD). Special Isssue on Aspect-Oriented Programming for Systems Software
and Middleware, vol. 4242, pp. 256--288, 2006.
Lecture Notes in Computer Science, Springer Verlag.
- M. Amirijoo, T. Tesanovic, T. Andersson, J.
Hansson, and S. H. Son, Finite Horizon QoS Prediction of Reconfigurable
Firm Real-Time Systems, in IEEE International Conference on Embedded
and Real-Time Computing Systems and Applications (RTCSA), 2006.
- M. Amirijoo, J. Hansson, and S. H. Son,
Specification and Management of QoS in Real-Time Databases Supporting
Imprecise Computations, IEEE Transactions on Computers, vol. 55,
Mar. 2006.
- E. Kuiper and S. Nadjm-Tehrani, Mobility
Models for Group Reconnaissance Applications, in Proceedings of
International Conference on Wireless and Mobile Communications, IEEE
Computer Society, July 2006.
Available as
PDF.
- J. Elmqvist and S. Nadjm-Tehrani,
Safety-Oriented Design of Component Assemblies using Safety
Interfaces, in Proceedings of the International Workshop on Formal
Aspects of Component Software (FACS'06), Elsevier, Sept. 2006.
Available as
PDF.
- A. Tesanovic, T. Gustafsson, and J. Hansson,
Separating Active and On-demand Behavior of Embedded Systems into
Aspects, in Proceedings of the International Workshop on
Non-functional Properties of Embedded Systems (NFPES'06), VDE Verlag,
Mar. 2006.
Available as
PDF.
- M. Luethi, S. Nadjm-Tehrani, and C. Curescu,
Comparative Study of Price-based Resource Allocation Algorithms for Ad Hoc
Networks, in Proceedings of the 20th IEEE International Parallel and
Distributed Processing Symposium, IEEE Computer Society, April 2006.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani, Post-Partition
Reconciliation Protocols for Maintaining Consistency, in Proceedings
of the 21st ACM/SIGAPP symposium on Applied computing, April 2006.
Available as
PDF.
- M. Asplund and S. Nadjm-Tehrani, Rigorous
Development of Complex Fault-Tolerant Systems, vol. 4157 of Lecture
Notes in Computer Science, ch. Formalising Reconciliation in
Partitionable Networks with Distributed Services, pp. 37--58.
Springer-Verlag, 2006.
Available as
PDF.
2005
- A. Tesanovic, M. Amirijoo, D. Nilsson, H.
Norin, and J. Hansson, Ensuring Real-Time Perfomance Guarantees in
Dynamically Reconfigurable Embedded Systems, in Proceedings of the
IFIP International Conference on Embedded and Ubiquitous Computing,
Springer-Verlag, Dec. 2005.
Available as
PDF.
- A. Tesanovic, S. Nadjm-Tehrani, and J. Hansson,
Modular Verification of Reconfigurable Components, in
Component-Based Software Development for Embedded Systems-An Overview on
Current Research Trends (C. Atkinson, C. Bunse, H.-G. Gross, and C.
Peper, eds.), no. 3778 in Lecture Notes in Computer Science, pp. 59--81,
Springer-Verlag, 2005.
- A. Tesanovic, P. Mu, and J. Hansson, Development
Environment for Configuration and Analysis of Embedded Real-Time Systems,
in Proceedings of the 4th International Workshop on Aspects, Components,
and Patterns for Infrastructure Software (ACP4IS'05), Mar. 2005.
Available as
PDF.
- A. Tesanovic, M. Amirijoo, M. Björk, and J.
Hansson, Empowering Configurable QoS Management in Real-Time Systems,
in Proceedings of the 4th ACM SIG International Conference on
Aspect-Oriented Software Development (AOSD.05), ACM Press, Mar. 2005.
Available as
PDF.
- D. Szentivanyi, S. Nadjm-Tehrani, and J. M.
Noble, Optimal Choice of Checkpointing Interval for High Availability,
in Proceedings of the 11th Pacific Rim Dependable Computing
Conference, IEEE Computer Society, Dec. 2005.
Available as
PDF.
- D. Szentivanyi, S. Nadjm-Tehrani, and
J. M. Noble, Configuring Fault-Tolerant Servers for Best Performance,
in Proceedings of the 1st IEEE International Workshop on High Availability
of Distributed Systems (HADIS), August 2005.
Available as
PDF.
- C. Curescu and S. Nadjm-Tehrani, Time-aware
Utility-based Resource Allocation in Wireless Networks, IEEE
Transactions on Parallel and Distributed Systems, vol. 16, no. 7, pp.
624--636, 2005.
Available as
PDF.
- T. Gustafsson, H. Hallqvist, and J.
Hansson, A similarity-aware multiversion concurrency control and updating
algorithm for up-to-date snapshots of data, in Proceedings of the 17th
Euromicro Conference on Real-Time Systems, IEEE Computer Society Press,
July 2005.
Available as
PDF.
- K. Forsberg, S. Nadjm-Tehrani, and J. Torin,
Fault Analysis of a Distributed Flight Control System, in
Fault-Tolerant and Dependable Distributed Systems Minitrack of the
Software Technology Track 38th IEEE Hawaii International Conference on System
Sciences, Electronic archives:www.hicss.hawaii.edu/diglib.htm, January
2005.
- J. Hammarberg and S. Nadjm-Tehrani, Formal
Verification of Fault Tolerance in Safety-critical Configurable Modules,
International Journal of Software Tools for Technology Transfer, Copyright
Springer Verlag, vol. 7, June 2005.
Available as
PDF.
- J. Elmqvist, S. Nadjm-Tehrani, and M.
Minea, Safety Interfaces for Component-Based Systems, in
Proceedings of the 24th International Conference on Computer Safety,
Reliability and Security (SAFECOMP), September 2005.
Available as
PDF.
- J. Elmqvist and S. Nadjm-Tehrani, Intents
and Upgrades in Component-Based High-Assurance Systems, in
Model-driven Software Development, Volume II of Research and Practice in
Software Engineering (S. Beyeda, M. Book, and V. Gruhn, eds.),
Springer-Verlag, Aug. 2005.
Available as
PDF.
- C. Curescu and S. Nadjm-Tehrani,
Price/Utility-based optimized resource allocation in wireless ad hoc
networks, in Proceedings of the 2nd Conference on Sensor and Ad Hoc
Communications and Networks (Secon), IEEE Communications Society, Sept.
2005.
Available as
PDF.
- C. Curescu, S. Nadjm-Tehrani, B. Cao, and T. A.
Dahlberg, Utility-based Adaptive Resource Allocation in Hybrid Wireless
Networks, in Proceedings of the 2nd International Conference on
Quality of Service in Heterogeneous Wired/Wireless Networks (Qshine),
IEEE Computer Society, Aug. 2005.
Available as
PDF.
- K. Burbeck and S. Nadjm-Tehrani, Adaptive
Real-Time Anomaly Detection with Improved Index and Ability to Forget, in
Proceedings of the 25th IEEE International Conference on Distributed
Computing Systems Workshops, June 2005.
Available as
PDF.
- M. Amirijoo, N. Chaufette, J. Hansson,
S. H. Son, and S. Gunnarsson, Generalized Performance Management of
Multi-Class Real-Time Imprecise Data Services, in Proceedings of the
IEEE Real-Time Systems Symposium (RTSS), Dec. 2005.
- M. Amirijoo, J. Hansson, S. Gunnarsson, and
S. H. Son, Enhancing Feedback Control Scheduling Performance by On-line
Quantification and Suppression of Measurement Noise, in Proceedings of
the IEEE Real-Time and Embedded Technology and Applications Symposium
(RTAS), Mar. 2005.
Available as
PDF.
2004
- A. Tesanovic, D. Nyström, J. Hansson, and C.
Norström, Aspects and Components in Real-Time System Development:
Towards Reconfigurable and Reusable Software, Journal of Embedded
Computing, vol. 1, Oct. 2004.
Available as
PDF.
- A. Tesanovic and J. Hansson, Structuring Criteria
for the Design of Component-Based Real-Time Systems, in Proceedings of
the IADIS International Conference on Applied Computing 2004 (N.
Guimaraes and P. Isaias, eds.), (Lisbon, Portugal), pp. I401--I411, IADIS
Press, Mar. 2004.
Available as
PDF.
- A. Tesanovic, K. Sheng, and J. Hansson,
Application-Tailored Database Systems: a Case of Aspects in an Embedded
Database, in Proceedings of the 8th International Database Engineering
and Applications Symposium (IDEAS'04), (Coimbra, Portugal), IEEE Computer
Society, July 2004.
Available as
PDF.
- D. Nyström, A. Tesanovic, M. Nolin, C.
Norström, and J. Hansson, COMET: A Component-Based Real-Time Database
for Automotive Systems, in Proceedings of the Workshop on Software
Engineering for Automotive Systems at 26th International Conference on
Software engineering (ICSE'04), (Edinburgh, Scotland), IEEE Computer
Society Press, May 2004.
Available as
PDF.
- D. Nyström, M. Nolin, A. Tesanovic, C.
Norström, and J. Hansson, Pessimistic Concurrency-Control and
Versioning to Support Database Pointers in Real-Time Databases, in
Proceedings of the 16th Euromicro Conference on Real-Time Systems
(ECRTS04), (Sicily, Italy), IEEE Computer Society Press, June 2004.
Available as
PDF.
- D. Gamez, S. Nadjm-Tehrani, J. Bigham, C. Balducelli, T.
Chyssler, and K. Burbeck, Dependable Computing Systems: Paradigms,
Performance Issues and Applications, ch. Safeguarding Critical
Infrastructures.
John Wiley & Sons, Inc., 2004.
Available as
PDF.
- D. Szentivanyi and S. Nadjm-Tehrani, Aspects
for Improvement of Performance in Fault-Tolerant Software, in
Proceedings of the 10th Pacific Rim Dependable Computing Conference
(PRDC), pp. 283--291, IEEE Computer Society, March 2004.
Available as
PDF.
- D. Szentivanyi and S. Nadjm-Tehrani,
Middleware for Communications, ch. Middleware Support for Fault
Tolerance.
John Wiley & Sons, 2004.
- J. Elmqvist and S. Nadjm-Tehrani, Intents,
Upgrades and Assurance in Model-Based Development, in 2nd Real-Time
and Embedded Technology and Applications Symposium Workshop on Model-Driven
Embedded Systems, May 2004.
Available as
PDF.
- K. Burbeck, D. Garpe, and S. Nadjm-Tehrani,
Scale-up and Performance Studies of Three Agent Platforms, in
Proceedings of International Performance, Communication and Computing
Conference, Middleware Performance workshop., pp. 857--863, IEEE Computer
Society, April 2004.
Available as
PDF.
- K. Burbeck and S. Nadjm-Tehrani, ADWICE:
Anomaly Detection with Real-time Incremental Clustering, in
Proceedings of 7th International Conference on Information Security and
Cryptology (ICISC 04), Springer Verlag, December 2004.
Available as
PDF.
- K. Forsberg, S. Nadjm-Tehrani, J. Torin,
and R. Johansson, Maintaining Consistency among Distributed Control
Nodes, in Proceedings of the 23rd Digital Avionics Systems
Conference, vol. 2, pp. 6.D.1--12, IEEE, October 2004.
Available as
PDF.
- M. Amirijoo, A. Tesanovic, and S. Nadjm-Tehrani,
Raising Motivation in Real-time Laboratories: The Soccer Scenario, in
Proceedings of the ACM Technical Symposium on Computer Science Education
(SIGCSE), pp. 265--269, Mar. 2004.
Available as
PDF.
- M. Amirijoo, J. Hansson, S. H. Son, and S.
Gunnarsson, Robust Quality Management for Differentiated Imprecise Data
Services, in Proceedings of the IEEE International Real-Time Systems
Symposium (RTSS), pp. 265--275, Dec. 2004.
Available as
PDF.
- T. Gustafsson and J. Hansson, Dynamic
On-Demand Updating of Data in Real-Time Database Systems, in 19th
Annual ACM Symposium on Applied Computing Special track on Embedded Systems
(SAC04), March 2004.
Available as
PDF.
- T. Gustafsson and J. Hansson, Data
Management in Real-Time Systems: a Case of On -Demand Updates in Vehicle
Control Systems, in Proceedings of 10th IEEE Real-Time and Embedded Te
chnology and Applications Symposium, IEEE Computer, May 2004.
Available as
PDF.
- T. Chyssler, S. Nadjm-Tehrani, S. Burschka, and K.
Burbeck, Alarm Reduction and Correlation in Defence of IP Networks, in
Proceedings of the 13th International Workshops on Enabling Technologies:
Infrastructures for Collaborative Enterprises (WETICE04), pp. 229--234,
IEEE Computer Society, June 2004.
Available as
PDF.
- T. Chyssler, S. Burschka, M. Semling, T. Lingvall,
and K. Burbeck, Alarm Reduction and Correlation in Intrusion Detection
Systems, in Proceedings of Detection of Intrusions and Malware &
Vulnarability Assessment workshop (DIMVA), pp. 9--24, Gesellschaft f r
Informatik, June 2004.
Available as
PDF.
2003
- A. Tesanovic, D. Nyström, J. Hansson, and C.
Norström, Towards Aspectual Component-Based Development of Real-Time
Systems, in Proceeding of the 9th International Conference on
Real-Time and Embedded Computing Systems and Applications (RTCSA 2003),
Springer-Verlag, Feb. 2003.
Available as
PDF.
- D. Szentivanyi, I. Ravot, S. Nadjm-Tehrani,
and R. Guerraoui, Dependable Distributed Middleware: Pay Now or Pay
Later!, in Poster Session at the ACM/IFIP/USENIX International
Middleware Conference, Middleware 2003 Companion, p. 331,
ACM/IFIP/USENIX, June 2003.
- A. Tesanovic, D. Nyström, J. Hansson, and C.
Norström, Aspect-Level Worst-Case Execution Time Analysis of Real-Time
Systems Compositioned Using Aspects and Components, in Proceedings of
the 27th IFAC/IFIP/IEEE Workshop on Real-Time Programming (WRTP'03),
(Poland), Elsevier, May 2003.
- A. Tesanovic, J. Hansson, D. Nyström, C.
Norström, and P. Uhlin, Aspect-Level WCET Analyzer: a Tool for
Automated WCET Analysis of a Real-Time Software Composed Using Aspects and
Components, in Proceedings of the 3rd International Workshop on
Worst-Case Execution Time Analysis (WCET 2003), (Porto, Portugal), July
2003.
Available as
PDF.
- C. Curescu and S. Nadjm-Tehrani, Time-aware
Utility-based QoS Optimisation, in Proceedings of the 15th Euromicro
Conference on Real-time Systems, (Porto, Portugal), pp. 83--92, July
2003.
Available as
PDF.
- D. Nyström, A. Tesanovic, C. Norström, and J.
Hansson, Database Pointers: a Predictable Way of Manipulating Hot Data in
Hard Real-Time Systems, in Proceedings of the 9th International
Conference on Real-Time and Embedded Computing Systems and Applications
(RTCSA 2003), Springer-Verlag, Feb. 2003.
- J. Hammarberg and S. Nadjm-Tehrani, Development
of Safety-Critical Reconfigurable Hardware with Esterel, in
Proceedings of the 8th Internation Workshop on Formal Methods for
Industrial Critical Systems (FMICS'03), (Norway), Elsevier, 2003.
- M. Amirijoo, J. Hansson, and S. H. Son,
Algorithms for Managing QoS for Real-Time Data Services Using Imprecise
Computation, in Proceedings of the International Conference on
Real-Time and Embedded Computing Systems and Application (RTCSA), pp.
136--157, Feb. 2003.
Available as
PDF.
- K. Burbeck, S. G. Andres, S. Nadjm-Tehrani, M.
Semling, and T. Dagonnier, Time as a Metric for Defence in Survivable
Networks, in Proceedings of the Work in Progress session of 24th IEEE
Real-Time Systems Symposium (RTSS 2003), 2003.
Available as
PDF.
- M. Amirijoo, J. Hansson, and S. H. Son,
Error-Driven QoS Management in Imprecise Real-Time Databases, in
Proceedings of the IEEE Euromicro Conference on Real-Time Systems
(ECRTS), pp. 63--72, July 2003.
Available as
PDF.
- M. Amirijoo, J. Hansson, and S. H. Son,
Specification and Management of QoS in Imprecise Real-Time Databases,
in Proceedings of the IEEE International Database Engineering and
Applications Symposium (IDEAS), pp. 192--201, July 2003.
Available as
PDF.
2002
- D. Aganovic and A. Pandikow, Towards
Enabling Innovation Processes for Dynamic Extended Manufacturing
Enterprises, in Proceedings of the Digital Enterprise Technology
Conference 2002, 2002.
- M. Amirijoo, J. Hansson, and S. H. Son,
Error-Driven QoS Management in Imprecise Real-Time Databases, tech.
rep., Department of Computer and Information Science, Linköpings
Universitet, 2002.
Available as
PDF.
- S. Nadjm-Tehrani, K. Najarian, C. Curescu, T.
Lingvall, and T. A. Dahlberg, Adaptive Load Control Algorithms for 3rd
Generation Mobile Networks, in Proceedings of the 5th ACM
International Workshop on Modeling, Analysis and Simulation of Wireless and
Mobile Systems, (Atlanta, Georgia, USA), pp. 104--111, ACM CS-press,
Sept. 2002.
Available as
PDF.
- D. Nyström, A. Tesanovic, C. Norström, J.
Hansson, and N.-E. Bånkestad, Data Management Issues in Vehicle
Control Systems: A Case Study, in Proceedings of the 14th Euromicro
Conference on Real Time Systems, pp. 249--256, IEEE Computer Society,
June 2002.
- D. Szentivanyi and S. Nadjm-Tehrani, Building
and Evaluating a Fault-Tolerant CORBA Infrastructure, in Proceedings
of the Workshop on Dependable Middleware-Based Systems (WDMS'02) - part of
the International Conference on Dependable Systems and Networks (DSN),
pp. G31 -- G38, IEEE, June 2002.
Available as
PDF.
- A. Tesanovic, D. Nyström, J. Hansson, and C.
Norström, Integrating Symbolic Worst-Case Execution Time Analysis with
Aspect-Oriented System Development, in OOPSLA 2002 Workshop on Tools
for Aspect-Oriented Software Development, (Seattle, WA), Nov. 2002.
Available as
PDF.
- A. Tesanovic, D. Nyström, J. Hansson, and C.
Norström, Embedded Databases for Embedded Real-Time Systems: A
Component-Based Approach, tech. rep., Department of Computer Science,
Linköping University and Department of Computer Engineering,
Mälardalen University, Jan. 2002.
Available as
PDF.
2001
- K. S. Barber, C. E. Martin, N. E. Reed, and D.
Kortenkamp, Dimensions of Adjustable Autonomy, in Advances in
Artificial Intelligence: PRICAI 2000 Workshop Reader (R. Kowalczyk, S. W.
Loke, N. Reed, and G. Williams, eds.), vol. 2112, pp. 353--361, Berlin:
Springer Verlag, 2001.
Available as
PDF.
- J. Bäckström and S. Nadjm-Tehrani, Design
of a Contact Service in a Jini-based Spontaneous Network, in
proceedings of ITCOM, Java-Jini tecchnologies track, SPIE, 2001.
Available as
PDF.
- F. Heinz, J. Kummeneje, and P. Scerri, Using Simulated
RoboCup to Teach AI in Undergraduate Education, in Proceedings of
Scandinavian Conference on AI, 2001.
- E. Herzog and A. Törne, Information Modelling
for System Specification Representation and Data Exchange, in
Proceedings of the 8th IEEE International Conference and Workshop on the
Engineering of Computer-based Systems (F. Titsworth, ed.), pp. 136 --
143, IEEE Computer Society, 2001.
- E. Herzog and A. Törne, Investigating Risks
in Systems Engineering Tool Data Exchange, in Proceedings of the 11th
annual International Symposium of the International Council on Systems
Engineering, INCOSE, 2001.
- E. Herzog, P. Loborg, and S. Nadjm-Tehrani, Real-time
lab Exercises: A teacher's Dilemma, in Proceedings of the 32nd SIGCSE
Technical Symposium on Computer Science Education, pp. 273 --277, Feb.
2001.
Available as
PDF.
- J. Johnson, E. Herzog, and M. Giblin, The
technical data coverage of the emerging AP-233 STEP Standard and its use in
virtual enterprises, in proceedings of PDT Europe 2001, pp. 203 --
212, 2001.
- J. Johnson and E. Herzog, The Data Standard
AP-233: An Invigorator for Global Systems Engineering, in Proceedings
of the 11th International Symposium of the International Council on Systems
Engineering, 2001.
- A. Pandikow and A. Törne, Support for
Object-Orientation in AP-233, in Proceedings of the 11th Annual
International Symposium of the International Council on Systems
Engineering, vol. 1, INCOSE, June 2001.
Available as
PDF.
- A. Pandikow and A. Törne, Software
Engineering at System Level, in Proceedings of the 1st Swedish
Conference on Software Engineering Research and Practice (SERP'01) (P.-O.
Bengtsson, ed.), BTH Research Report 2001:10, pp. 24--31, Blekinge Tekniska
Högskola, Oct. 2001.
- A. Pandikow and A. Törne, Integrating Modern
Software Engineering and Systems Engineering Specification Techniques, in
Proceedings of the 14th International Conference on Software and Systems
Engineering and their Applications (ICSSEA 2001), vol. 2, CNAM, Dec.
2001.
- D. Pynadath, P. Scerri, and M. Tambe, MDPs for
Adjustable autonomy in a real-world multi-agent environment, in AAAI
Spring Symposium on decision theoretic and game theoretic agents, pp.
107--116, 2001.
- T. Reed, N. E. Reed, and P. Fritzson, The Analysis of
Heart Sounds for Symptom Detection and Machine-Aided Diagnosis, in
Proceedings of the 4th Internationa EuroSIMS Congress (E uroSIM 2001),
pp. 038:1--7, Technical University of Delft, June 2001.
Available as
PDF.
- N. E. Reed, Teamwork and Adjustable Autonomy in
Autonomous Agents, in Advances in Artificial Intelligence: PRICAI 2000
Workshop Reader (R. Kowalczyk, S. W. Loke, N. Reed, and G. Williams,
eds.), vol. 2112, pp. 301--302, Berlin: Springer Verlag, 2001.
Available as
PDF.
- P. Scerri, D. Pynadath, and M. Tambe, Adjustable
Autonomy in real-world multi-agent environments, in Proceedings of the
Fifth international conference on autonomous agents (Agents'01), pp.
300--307, 2001.
- P. Scerri, N. Reed, T. Wiren, M. Lönneberg, and P.
Nilsson, Headless Chickens IV, in RoboCup-2000: Robot Soccer
World Cup IV (P. Stone, T. Balch, and G. Kraetszchmar, eds.), vol.
2019, pp. 493--496, Berlin: Springer Verlag, 2001.
Available as
PDF.
- P. Scerri and N. E. Reed, Designing Agents for
Systems with Adjustable Autonomy, in Workshop on Autonomy, Delegation
and Control: Interacting with Autonomous Agents, Seventeenth International
Joint Conference on Artificial Intelligence (IJCAI 2001), pp. 97--102,
Aug. 2001.
- P. Scerri and N. Reed, Making Adjustable Autonomy
Easier with Teamwork, in Advances in Artificial Intelligence: PRICAI
2000 Workshop Reader (R. Kowalczyk, S. W. Loke, N. Reed, and G. Williams,
eds.), vol. 2112, pp. 339--352, Berlin: Springer Verlag, 2001.
Available as
PDF.
- P. Stone, M. Asada, T. Balch, R. D'Andrea, M. Fujita, B.
Hengst, G. Kraetzschmar, P. Lima, N. Lau, H. Lund, D. Polani, P. Scerri, S.
Tadokoro, T. Weigel, and G. Wyeth, RoboCup-2000: The Fourth Robotic Soccer
World Championships, AI Magazine, vol. 22, pp. 11--38, 2001.
- M. Tambe, D. Pynadath, and P. Scerri, Adjustable
Autonomy: A Response, in Intelligent Agents VII Proceedings of the
International workshop on Agents, theories, architectures and languages,
2001.
2000
- J. Hansson and S. Andler, System Framework for
Active Real-Time Database Systems, in Real-Time Database Systems:
Issues and Design (K.-y. Lam and T.-w. Kuo, eds.), Kluwer Academics,
2000.
- S. Tudoret, S. Nadjm-Tehrani, A. Benveniste, and
J.-E. Strömberg, Co-Simulationof Hybrid Systems: SIGNAL-SIMULINK,,
in proceedings of the 6th international conference on Formal Techniques in
Real-Time and Fault-Tolerant Systems, (FTRTFT'00), LNCS 1926, pp.
134--151, Springer Verlag, September 2000.
Available as
PDF.
- S. Nadjm-Tehrani, Formal Methods for Analysis of
Heterogeneous Models of Embedded Systems, in proceedings of
International Symposium on Computer-Aided Control Systems Design (CACSD),
September 2000.
Available as
PDF.
- J. Hansson and S. Son, Overload Management in
Real-Time Database Systems, in Real-Time Database Systems: Issues and
Design (K.-y. Lam and T.-w. Kuo, eds.), Kluwer Academics, 2000.
- A. Pandikow, E. Herzog, and A. Törne,
Integrating Systems and Software Engineering Concepts in AP-233, in
Proceedings of the 10th Annual International Symposium of the
International Council on Systems Engineering (E. Arnold, K. Blanshan, L.
Brezinski, J. Jakoubek, C. Jones, P. Kar, C. Kowalski, K. Rawlinson, D.
Walden, and S. Wolf, eds.), vol. 1, pp. 831--837, INCOSE, June 2000.
Available as
PDF.
- J. Johnson, E. Herzog, S. Barbeau, and M. Giblin,
The Maturing Systems Engineering Data Exchange Standard and Your Role,
in Proceedings of the 10th Annual International Symposium of the
International Council on Systems Engineering, pp. 823 -- 830, 2000.
- E. Herzog and J. Johnson, AP-233, the Systems
Engineering STEP-based Data Exhcange Standard, Technical Tutorial
documentation INCOSE 2000 H09, INCOSE, 2000.
- K. Heimannsfeld, E. Herzog, C. Dusing, and J.
Johnson, Beyond Tool Exchanges - The current Status and Future
Implications of the Emerging ISO Standard AP-233 for the exchange of System
Engineering Data, in To appear in the Proceeding the 2nd European
Conference on Systems Engineering, Sept. 2000.
- E. Herzog and A. Törne, Support for Exchange
of Functional Behaviour Specifications in AP-233, in Proceedings 7th
IEEE International Conference and Workshop on the Engineering of
Computer-Based Systems, pp. 351 -- 358, 2000.
- E. Herzog and A. Törne, AP-233
Architecture, in Proceedings of the 10th Annual International
Symposium of the International Council on Systems Engineering, pp. 815 --
822, INCOSE, 2000.
- T. Reed, N. E. Reed, and P. Fritzson, Model based
heart sound analysis for the detection of diagnostically relevant
symptoms, in Proceedings of the 41st SIMS simulation Conference (SIMS
2000), pp. 73--86, Technical University of Denmark, 2000.
- P. Scerri and N. E. Reed, Engineering
Characteristics of Autonomous Agent Architectures, Journal of
Experimental and Theoretical Artificial Intelligence, vol. 12, pp.
191--212, April 2000.
Available as
.
- P. Scerri and N. E. Reed, Creating Complex Actors
with EASE, in Fourth International Conference on Autonomous Agents
(Agents 2000) (C. Sierra, M. Gini, and J. S. Rosenschein, eds.), pp.
142--143, ACM Press, June 2000.
Available as
PDF.
- P. Scerri and N. E. Reed, Real-time Control of
Intelligent Agents, in Technical Summaries of the Software
Demonstration Sessions, Fourth International Conference on Autonomous Agents
(Agents 2000) (J. Puyol-Gruart, ed.), pp. 28--29, June 2000.
Available as
PDF.
- P. Scerri, J. Ydrén, and N. E. Reed, Layered
Specification of Intelligent Agents, in Sixth Pacific Rim
International Conference on Artificial Intelligence (PRICAI 2000), pp.
565--575, Aug. 2000.
Available as
PDF.
- P. Scerri and N. E. Reed, On-line Control of Actors
using EASE: Implementing Adjustable Autonomy Using Teams, in Workshop
on Teams with Adjustable Autonomy, Sixth Pacific Rim International Conference
on Artificial Intelligence (PRICAI 2000) (N. E. Reed, ed.), pp. 25--34,
Aug. 2000.
- S. Son, B. Zimmerman, and J. Hansson, An Adaptable
Security Manager for Real-Time Transactions, in Proceedings of the
12th EuroMicro Conference on Real-Time Systems (ECRTS'00), IEEE Computer
Press, 2000.
- J. Stankovic, S. Son, and J. Hansson,
Misconceptions about Real-Time Databases, in Real-Time Database
Systems: Issues and Design (K.-y. Lam and T.-w. Kuo, eds.), Kluwer
Academics, 2000.
1999
- O. Åkerlund, S. Nadjm-Tehrani, and G.
Stålmarck, Integration of Formal Methods into System Safety and
Reliability Analysis, in proceedings of 17th International Systems
Safety Conference, ISSC'99, (Orlondo, USA), pp. 326--336, August
1999.
Available as
PDF.
- C. Foglietta, Assured Selection - A Relaxed
Concurrency Control Mechanism, Master's thesis, Linköping University,
Dec. 1999.
LiTH-IDA-Ex-99/100.
Available as
gzipped postscript and
PDF.
- E. Herzog and A. Törne, A Seed for a STEP
Application Protocol for Systems Engineering, in Proceedings 12th
International Conference and Workshop on the Engineering of Computer Based
Systems, pp. 174--180, IEEE Press, Mar. 1999.
- E. Herzog and A. Törne, Towards a Standardised
Systems Engineering Information model, in Proceedings of the 9th
Annual International Symposium of the International Council on Systems
Engineering (A. Fairbairn, ed.), vol. 2, pp. 909--916, INCOSE, June
1999.
- E. Falkenroth, Real-Time Database System for
Meteorological, Hydrological, and Oceanographic Data, in Proceedings
of the 7th European Workshop on Meteorological Operational Systems,
ECMWF, European Center for Medium-Range Forecasts, November 1999.
- E. Falkenroth and A. Törne, How to Construct
Predictable Rule Sets, in Advance Proceedings of the Joint 24th
IFAC/IFIP Workshop on Real Time Programming and 3rd International Workshop on
Active and Real-Time Database Systems, pp. 33--40, June 1999.
- J. Hansson, S. F. Andler, and S. H. Son,
Value-Driven Multi-Class Overload Management, in Proceedings of the
6th Conference on Real-Time Computing Systems and Applications
(RTCSA'99), IEEE Computer Press, 1999.
- J. Hansson, Value-Driven Multi-Class Overload
Management in Real-Time Database Systems.
PhD thesis, Department of Computer Science, Linköping University,
1999.
- L. Besnard, P. Bournai, T. Gautier, N. Halbwachs, S.
Nadjm-Tehrani, and A. Ressouche, Design of a Multi-formalism Application
and Distribution in a Data-flow Context: An Example, in Proceedings of
the 12th international Symposium on Languages for Intentional programming,
Athens, June 1999, pp. 8--30, World Scientific, June 1999.
- L. Man, J. Malec, and S. Nadjm-Tehrani, On Semantics and
Correctness of Reactive Rule-based Systems, in proceedings of Andrei
Ershov Third international Conference, Perspectives of System Informatics,
PSI'99, LNCS 1755, pp. 235--246, Springer Verlag, 2000.
Available as
PDF.
- P. Scerri, S. Coradeschi, and A. Törne, A User
Oriented System for Developing Behavior Based Agents, in RoboCup-98 :
Robot Soccer World Cup II, vol. 1604 of Lecture Notes in Artificial
Intelligence, pp. 173--186, Springer Verlag, 1999.
- N. E. Reed and P. Scerri, Adjustable Autonomy in
Simulated Pilots, in International Joint Conference on Artificial
Intelligence, Adjustable Autonomy Systems Workshop, pp. 56--59, Aug.
1999.
Available as
PDF.
- S. Nadjm-Tehrani, Integration of Analog and Discrete
Synchronous Design, in Hybrid Systems: Computation and Control,
Proceedings of the second international workshop, March 1999, LNCS 1569,
pp. 193--208, Springer Verlag, March 1999.
- S. Nadjm-Tehrani, Time-Deterministic Hybrid Transition
Systems, in Hybrid Systems V, Proceedings of the fifth international
workshop on hybrid systems, LNCS 1567, pp. 238--250, Springer Verlag,
1999.
Available as
PDF.
- S. Nadjm-Tehrani and J.-E. Strömberg,
Verification of Dynamic Properties in an Aerospace application,
Formal Methods in System Design, vol. 14, pp. 135--169, March
1999.
- S. Nadjm-Tehrani and O. Åkerlund, Combining
Theorem Proving and Continuous Models in Synchronous Design, in
Proceedings of the World Congress on Formal Methods, Volume II, LNCS
1709, pp. 1384--1399, Springer Verlag, September 1999.
- P. Scerri, N. E. Reed, and A. Törne, An Approach
to Directing Intelligent Agents in Real-time, in Proceedings of the
AAAI Spring Symposium on Agents with Adjustable Autonomy, (Stanford
University), pp. 114--115, American Association for Artificial Intelligence,
Mar. 1999.
- P. Scerri and N. E. Reed, Adapting an Agent to a
Similar Environment, in Third International Conference on Autonomous
Agents (Agents 99), pp. 420--421, ACM Press, May 1999.
- P. Scerri and N. E. Reed, Requirements for a General
Agent Architecture for Agent-Based Simulation Environments, in
Autonomous Agents 99 Autonomy Control Software Workshop, pp. 102--108,
May 1999.
- P. Scerri and J. Ydrén, End User Specification
of RoboCup Teams, in Workshop on Robocup, Sixteenth International
Joint Conference on Artificial Intelligence, pp. 187--192, August
1999.
- J. Ydrén and P. Scerri, RoboCup '99 Team
Descriptions, Simulation League, Team Headless Chickens, in
Linköping University, Electronic Press, vol. 7, pp. 45--48,
October 1999.
Available as
postscript.
- P. Scerri and N. Reed, The EASE Actor Development
Environment, Technical Report TACSIM-99-01, Computer and Information
Science Department, Linköping University, October 1999.
Available as
PDF.
- J. Stankovic, S. Son, and J. Hansson,
Misconceptions About Real-Time Database Systems, IEEE Computer,
vol. 32, pp. 29--36, June 1999.
- P. Scerri and J. Ydrén, End User Specification for
Simulation of Teams of Soccer Playing Robots, in Proceedings of
{SIMS'99} : 1999 Conference of the Scandinavian Simulation Society,
(Linköping, Sweden), pp. 168--173, 1999.