Hide menu

TDDD65 6 hp /Introduction to the Theory of Computation

Articles used for the Written Assignments


You will use one article for the summary, and one article for the critical review, differnt for different groups (see below).

Group A: Eva Blomqvist

Group members: See group members in Webreg

E-mail address for draft and final submissions: evabl45.liu@analys.urkund.se

Article for summary
Bizer, T. Heath, and T. Berners-Lee (2009) Linked Data - The Story So Far in Int. J. Semantic Web Inf. Syst., vol. 5, no. 3, pp. 1-22. (Available here.)

Article for critical review
H. Halpin, P. J. Hayes, J. P. McCusker, D. L. McGuinness and H. S. Thompson. (2010) When owl:sameAs Isn’t the Same: An Analysis of Identity in Linked Data in The Semantic Web – ISWC 2010, 9th International Semantic Web Conference, ISWC 2010, Shanghai, China, November 7-11, 2010, Revised Selected Papers, Part I. LNCS, vol. 6496, Springer Berlin/Heidelberg, pp.305-320. (Available here.)>

Group B: Ahmed Rezine

Group members: See group members in Webreg

E-mail address for draft and final submissions: ahmed.rezine.liu@analys.urkund.se

Article for summary
V. D'Silva, D. Kroening, G. Weissenbacher. A Survey of Automated Techniques for Formal Software Verification in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2008, Vol 27, No. 7, pp. 1165--1178. (Available here.)

Article for critical review
A. Donaldson, A. Kaiser, D. Kroening, T. Wahl. Symmetry-Aware Predicate Abstraction for Shared-Variable Concurrent Programs. Proceedings of the 23rd international conference on Computer aided verification, 2011, p.356-371. (Available here).

Group C: Oleg Sysoev

Group members: See group members in Webreg

E-mail address for draft and final submissions: olesy12.liu@analys.urkund.se

Article for summary
N. Memon, D. L. Hicks, and H. L. Larsen. 2007. How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. In Advanced Data Mining and Applications, pp. 430-441. Springer: Berlin Heidelberg. (Available here.)

Article for critical review
M. DeRosa. (2004). Data Mining and Data Analysis for Counterterrorism, Center for Strategic and International Studies. (Available here.)


Page responsible: Christer Bäckström
Last updated: 2015-08-17