Hide menu

TDDD65 6 hp /Introduction to the Theory of Computation

Articles used for the Written Assignments


You will use one article for the summary, and one article for the critical review, differnt for different groups (see below).

Group A: Eva Blomqvist

Group members: See group members in Webreg

E-mail address for draft and final submissions: evabl45.liu@analys.urkund.se

Article for summary
Bizer, T. Heath, and T. Berners-Lee (2009) Linked Data - The Story So Far in Int. J. Semantic Web Inf. Syst., vol. 5, no. 3, pp. 1-22. (Available here.)

Article for critical review
H. Halpin, P. J. Hayes, J. P. McCusker, D. L. McGuinness and H. S. Thompson. (2010) When owl:sameAs Isn’t the Same: An Analysis of Identity in Linked Data in The Semantic Web – ISWC 2010, 9th International Semantic Web Conference, ISWC 2010, Shanghai, China, November 7-11, 2010, Revised Selected Papers, Part I. LNCS, vol. 6496, Springer Berlin/Heidelberg, pp.305-320. (Available here.)>

Group B: Ahmed Rezine

Group members: See group members in Webreg

E-mail address for draft and final submissions: ahmed.rezine.liu@analys.urkund.se

Article for summary
V. D'Silva, D. Kroening, G. Weissenbacher. A Survey of Automated Techniques for Formal Software Verification in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2008, Vol 27, No. 7, pp. 1165--1178. (Available here.)

Article for critical review
A. Donaldson, A. Kaiser, D. Kroening, T. Wahl. Symmetry-Aware Predicate Abstraction for Shared-Variable Concurrent Programs. Proceedings of the 23rd international conference on Computer aided verification, 2011, p.356-371. (Available here).

Group C: Unmesh Bordoloi

Group members: See group members in Webreg

E-mail address for draft and final submissions: unmdu17.liu@analys.urkund.se

Article for summary
L. Lo Bello. 2011. The case for ethernet in automotive communications. ACM SIGBED Review - Special Issue on the 10th International Workshop on Real-time Networks (RTN 2011), vol. 8, no. 4, pp. 7-15. Dec 2011. (Available here).

Article for critical review
J. Diemer, D. Thiele, R. Ernst. Formal worst-case timing analysis of Ethernet topologies with strict-priority and AVB switching. In Proceedings of 7th IEEE International Symposium on Industrial Embedded Systems (SIES 2012). June 2012, pp. 1-10. DOI: 10.1109/SIES.2012.6356564 (Available here).

Group D: Oleg Sysoev

Group members: See group members in Webreg

E-mail address for draft and final submissions: olesy12.liu@analys.urkund.se

Article for summary
N. Memon, D. L. Hicks, and H. L. Larsen. 2007. How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. In Advanced Data Mining and Applications, pp. 430-441. Springer: Berlin Heidelberg. (Available here.)

Article for critical review
M. DeRosa. (2004). Data Mining and Data Analysis for Counterterrorism, Center for Strategic and International Studies. (Available here.)


Page responsible: Christer Bäckström
Last updated: 2014-09-22