TCS / Research / Publications / 2006
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Publications in 2006

68Emilia Oikarinen. Modular answer set programming. Research Report A106, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, December 2006.
NOTE: Reprint of Licentiate's thesis; see URL below.
PostScript (1 MB)
GZipped PostScript (561 kB)
PDF (681 kB)
Info
See www.tcs.hut.fi ...
67Misa Keinänen. Techniques for solving boolean equation systems. Research Report A105, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, November 2006. Doctoral dissertation.
PostScript (1 MB)
GZipped PostScript (436 kB)
PDF (693 kB)
Info
See lib.tkk.fi ...
66Billy Bob Brumley. Efficient three-term simultaneous elliptic scalar multiplication with applications. In Viiveke Fåk, editor, Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec '06, pages 105–116, Linköping, Sweden, October 2006.
PDF (187 kB)
Info
65Harri Haanpää, editor. Annual report for the year 2005. Technical report, Teknillinen korkeakoulu, Tietojenkäsittelyteorian laboratorio (Helsinki University of Technology, Laboratory for Theoretical Computer Science), Espoo, Finland, October 2006.
PostScript (865 kB)
GZipped PostScript (268 kB)
PDF (306 kB)
Info
64Marco Bozzano, Roberto Bruttomesso, Alessandro Cimatti, Tommi Junttila, Silvio Ranise, Peter van Rossum, and Roberto Sebastiani. Efficient theory combination via boolean search. Information and Computation, 204(10):1493–1525, October 2006.
Info
See dx.doi.org ...
63Heikki Tauriainen. Automata and linear temporal logic: Translations with transition-based acceptance. Research Report A104, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, September 2006. Doctoral dissertation.
PostScript (4 MB)
GZipped PostScript (1 MB)
PDF (2 MB)
Info
See lib.tkk.fi ...
62Emilia Oikarinen and Tomi Janhunen. Modular equivalence for normal logic programs. In Gerhard Brewka, Silvia Coradeschi, Anna Perini, and Paolo Traverso, editors, Proceedings of the 17th European Conference on Artificial Intelligence, pages 412–416, Riva del Garda, Italy, August 2006. IOS Press.
Info
61Keijo Heljanko, Tommi Junttila, Misa Keinänen, Martin Lange, and Timo Latvala. Bounded model checking for weak alternating Büchi automata. In Thomas Ball and Robert B. Jones, editors, Proceedings of the 18th International Conference on Computer Aided Verification (CAV'2006), volume 4144 of Lecture Notes in Computer Science, pages 95–108, Seattle, WA, USA, August 2006. Springer-Verlag.
Info
See www.tcs.hut.fi ...
60Jean Gressmann, Tomi Janhunen, Robert Mercer, Torsten Schaub, Sven Thiele, and Richard Tichy. On probing and multi-threading in platypus. In Gerhard Brewka, Silvia Coradeschi, Anna Perini, and Paolo Traverso, editors, Proceedings of the 17th European Conference on Artificial Intelligence, pages 392–396, Riva del Garda, Italy, August 2006. IOS Press.
Info
59Christian Anger, Martin Gebser, Tomi Janhunen, and Torsten Schaub. What's a head without a body?. In Gerhard Brewka, Silvia Coradeschi, Anna Perini, and Paolo Traverso, editors, Proceedings of the 17th European Conference on Artificial Intelligence, pages 769–770, Riva del Garda, Italy, August 2006. IOS Press.
Info
58Mikko Särelä. Multi-homed internet access in ad hoc networks using host identity protocol. In Proceedings of the MiNEMA'06 workshop, Lisbon, Portugal, Jul 2006. MiNEMA.
Info
57Antti E. J. Hyvärinen. Satu (sat ubiquitous), June 2006. Computer program.
Info
See www.tcs.hut.fi ...
56Teemu Koponen, Pasi Eronen, and Mikko Särelä. Resilient connections for SSH and TLS. In Proceedings of the 2006 Usenix Annual Technical Conference, Boston, MA, USA, Jun 2006. Usenix.
Info
55Tomi Janhunen. Some (in)translatability results for normal logic programs and propositional theories. Journal of Applied Non-Classical Logics, 16(1–2):35–86, June 2006. Special issue on implementation of logics.
Info
See jancl.e-revues.com ...
54Janne Lundberg. A wireless multicast delivery architecture for mobile terminals. Research Report A103, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, May 2006. Doctoral dissertation.
PostScript (2 MB)
GZipped PostScript (549 kB)
PDF (914 kB)
Info
See lib.tkk.fi ...
53Emilia Oikarinen and Tomi Janhunen. Modular equivalence for normal logic programs. In Jüergen Dix and Anthony Hunter, editors, Proceedings of the 11th International Workshop on Nonmonotonic Reasoning, pages 10–18, Lake District, UK, May 2006. University of Clausthal, Department of Informatics, Technical Report, IfI-06-04.
Info
See cig.in.tu-clausthal.de ...
52Malcolm Greig, Harri Haanpää, and Petteri Kaski. On the coexistence of conference matrices and near resolvable 2-(2k+1, k, k-1) designs. Journal of Combinatorial Theory, Series A, 113(4):703–711, May 2006.
PDF (147 kB)
Info
51Tommi Syrjänen. Debugging inconsistent answer set programs. In Proceedings of the 11th International Workshop on Non-Monotonic Reasoning, pages 77–84, Lake District, UK, May 2006.
PDF (146 kB)
Info
50Jean Gressmann, Tomi Janhunen, Robert Mercer, Torsten Schaub, Sven Thiele, and Richard Tichy. On probing and multi-threading in platypus. In Jüergen Dix and Anthony Hunter, editors, Proceedings of the 11th International Workshop on Nonmonotonic Reasoning, pages 30–38, Lake District, UK, May 2006. University of Clausthal, Department of Informatics, Techical Report, IfI-06-04.
Info
See www.in.tu-clausthal.de ...
49Satu Elisa Schaeffer. Algorithms for nonuniform networks. Research Report A102, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, April 2006. Doctoral dissertation.
PostScript (26 MB)
GZipped PostScript (3 MB)
PDF (4 MB)
Info
See lib.tkk.fi ...
48Stefano Marinoni and Hannu H. Kari. Ad hoc routing protocol performance in a realistic environment. In Proceedings of the Fifth IEEE International Conference on Networking (ICN 2006), Le Morne, Mauritius, April 2006. IEEE Press.
Info
47Satu Elisa Schaeffer. Algorithms for nonuniform networks. PhD thesis, Helsinki University of Technology, Department of Computer Science and Engineering, April 2006.
Info
46Jori Dubrovin. Jumbala — an action language for UML state machines. Research Report A101, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, March 2006.
NOTE: Reprint of Master's thesis; see URL below.
PostScript (809 kB)
GZipped PostScript (307 kB)
PDF (499 kB)
Info
See www.tcs.hut.fi ...
45Antti E. J. Hyvärinen. SATU: A system for distributed propositional satisfiability checking in computational grids. Research Report A100, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland, February 2006.
NOTE: Reprint of Master's thesis; see URL below.
PostScript (2 MB)
GZipped PostScript (602 kB)
PDF (685 kB)
Info
See www.tcs.hut.fi ...
44Matti Järvisalo. drgen — regular -XORSAT generator, February 2006. Computer program.
Info
See www.tcs.hut.fi ...
43Antti E. J. Hyvärinen. Lauselogiikan toteutuvuusongelman ratkaiseminen laskennallisessa gridissä. In Lea Kutvonen and Päivi Kuuppelomäki, editors, Tietojenkäsittelytieteen päivät 2006, volume B-2006-3 of Tietojenkäsittelytieteen laitoksen julkaisjua sarja B, pages 37 – 43. Tietojenkäsittelytieteen laitos, 2006.
Info
42Antti E. J. Hyvärinen, Tommi Junttila, and Ilkka Niemelä. A distribution method for solving SAT in grids. In Armin Biere and Carla P. Gomes, editors, SAT 2006, volume 4121 of Lecture Notes in Computer Science, pages 430–435. Springer, 2006.
Info
See dx.doi.org ...
41Andrea Röck and Ray Kresman. On petri nets and predicate-transition nets. In Hamid R. Arabnia and Hassan Reza, editors, Software Engineering Research and Practice - SERP 2006, volume 2, pages 903–909. CSREA Press, 2006.
Info
See ww1.ucmss.com ...
40Billy Bob Brumley. Left-to-right signed-bit -adic representations of integers (short paper). In Information and Communications Security, 8th International Conference—ICICS '06, volume 4307 of Lecture Notes in Computer Science, pages 469–478. Springer-Verlag, 2006.
Info
See dx.doi.org ...
39Emilia Oikarinen. Modular Answer Set Programming. Licentiate's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006.
Info
See www.tcs.hut.fi ...
38Janne Nykopp. Stratum—yleiskäyttöinen automaattinen koneisharjoitusjärjestelmä. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006.
Info
37Jukka Valkonen. Ad-Hoc Security Associations for Wireless Devices. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006.
Info
36Billy Bob Brumley. Efficient elliptic curve algorithms for compact digital signatures. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006.
PDF (467 kB)
Info
35Amir Houshang Taheri. An application programming interface for vertical handover enabled applications. Master's thesis, Helsinki University of Technology, Department of Electrical and Communications Engineering, 2006.
Info
34Antti Ahonen. Radio network optimisation with spatial database tools. Master's thesis, Helsinki University of Technology, Department of Electrical and Communications Engineering, 2006.
Info
33Jukka Honkola. Modeling the SpaceWire network architecture with the Lyra method. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006.
Info
32Jori Dubrovin. Jumbala — an action language for UML state machines. Master's thesis, Helsinki University of Technology, Department of Engineering Physics and Mathematics, 2006.
Info
See www.tcs.hut.fi ...
31Stefano Marinoni and Hannu H. Kari. Ad hoc routing protocol performance: a realistic simulation based study. Telecommunication Systems, 33(1-3):269–289, 2006.
Info
30Satu Elisa Schaeffer, Stefano Marinoni, Mikko Särelä, and Pekka Nikander. Dynamic local clustering for hierarchical ad hoc networks. In Proceedings of the Third IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'06), International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN'06) subtrack, New York, NY, USA, 2006. IEEE Communications Society.
Info
29Kaisa Nyberg and Johan Wallén. Improved linear distinguishers for SNOW 2.0. In Fast Software Encryption 2006, Lecture Notes in Computer Science. Springer-Verlag, 2006.
Info
28Harri Haanpää and Patric R. J. Östergård. Steinerin kolmikkojärjestelmistä sudokuun. Arkhimedes, 2006(2):18–21, 2006. In Finnish.
PDF (87 kB)
Info
27Ilkka Niemelä. Answer set programming: A declarative approach to solving search problems. In Proceedings of the 10th European Conference on Logics in Artificial Intelligence, volume 4160 of Lecture Notes in Computer Science, pages 15–18. Springer, 2006.
Info
26Ilkka Niemelä. Bounded model checking, answer set programming, and fixed points. In Proceedings of the CAV'06 Workshop on Bounded Model Checking (BMC06), page 9, 2006. Abstract of an invited talk.
Info
25Ilkka Niemelä. Answer set programming: Foundations, implementation techniques, and applications. In Proceedings of the ICLP 2006 Workshop on Search and Logic: Answer Set Programming and SAT, page 35, 2006. Abstract of an invited talk.
Info
24Jukka Valkonen, N. Asokan, and Kaisa Nyberg. Ad-Hoc Security Associations for Groups. In Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, number 4357 in Lecture Notes in Computer Science, 2006.
Info
See dx.doi.org ...
23Armin Biere, Keijo Heljanko, Tommi Junttila, Timo Latvala, and Viktor Schuppan. Linear encodings of bounded LTL model checking. Logical Methods in Computer Science, 2(5:5), 2006. (doi: 10.2168/LMCS-2(5:5)2006).
Info
See www.tcs.hut.fi ...
22Jussi Rintanen, Keijo Heljanko, and Ilkka Niemelä. Planning as satisfiability: parallel plans and algorithms for plan search. Artificial Intelligence, 170(12-13):1031–1080, 2006.
Info
See www.tcs.hut.fi ...
21Kaisa Nyberg. Connect Now to MitM. In Crypto 2006 Rump Session, 2006.
PDF (49 kB)
Info
20Matti Järvisalo. Further investigations into regular XORSAT. In Proceedings of the Twenty-First National Conference on Artificial Intelligence (AAAI-06), pages 1873–1874. AAAI Press, 2006. Poster.
Info
See www.tcs.hut.fi ...
19Harri Haanpää, Matti Järvisalo, Petteri Kaski, and Ilkka Niemelä. Hard satisfiable clause sets for benchmarking equivalence reasoning techniques. Journal on Satisfiability, Boolean Modeling and Computation, 2(1-4):27–46, 2006.
PostScript (604 kB)
GZipped PostScript (193 kB)
PDF (334 kB)
Info
See jsat.ewi.tudelft.nl ...
18Matti Järvisalo. Opinions, hopes, and expectations of CS&E students, a case study in academic skills and hidden curriculum. In Tapio Salakoski, Tomi Mäntylä, and Mikko Laakso, editors, Koli Calling 2005 – Proceedings of the Fifth Finnish / Baltic Sea Conference on Computer Science Education, volume 41 of TUCS General Publications, pages 157–161. Turku Centre for Computer Science, 2006. ISBN 951-29-3006-4.
Info
See www.tucs.fi ...
17Petteri Kaski and Patric R. J. Östergård. Classification Algorithms for Codes and Designs. Number 15 in Algorithms and Computation in Mathematics. Springer-Verlag, Berlin Heidelberg, 2006.
Info
See users.tkk.fi ...
16Risto Hakala, Timo Similä, Miki Sirola, and Jukka Parviainen. Process state and progress visualization using self-organizing map. In Emilio Corchado, Hujun Yin, Vicente J. Botti, and Colin Fyfe, editors, Intelligent Data Engineering and Automated Learning – IDEAL 2006, 7th International Conference, Burgos, Spain, September 20–23, 2006, Proceedings, volume 4224 of Lecture Notes in Computer Science. Springer, 2006.
Info
See dx.doi.org ...
15Jiří Šíma and Satu Elisa Schaeffer. On the NP-completeness of some graph cluster measures. In Jiří Wiedermann, Gerard Tel, Jarslav Pokorný, Mária Bieliková, and Július Štuller, editors, Proceedings of the Thirty-second International Conference on Current Trends in Theory and Practice of Computer Science (Sofsem 06), volume 3831 of Lecture Notes in Computer Science, pages 530–537, BerlinHeidelberg, Germany, 2006. Springer-Verlag GmbH.
Info
14André Schumacher, Harri Haanpää, Satu Elisa Schaeffer, and Pekka Orponen. Load balancing by distributed optimisation in ad hoc networks. In J. Cao, I. Stojmenovic, X. Jia, and S. K. Das, editors, Proceedings of The 2nd International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2006), volume 4325/2006 of Lecture Notes in Computer Science, pages 873–884, Berlin / Heidelberg, 2006. Springer-Verlag.
Info
See dx.doi.org ...
13Sven Laur and Helger Lipmaa. Consistent adaptive two-party computations. Cryptology ePrint Archive, Report 2006/088, 2006. Techical report.
Info
See eprint.iacr.org ...
12Ahto Buldas and Sven Laur. Do broken hash functions affect the security of time-stamping schemes?. In Jianying Zhou, Moti Yung, and Feng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, volume 3989 of Lecture Notes in Computer Science, pages 50–65. Springer, 2006.
Info
See dx.doi.org ...
11Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. Cryptographically private support vector machines. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 618–624, New York, NY, USA, 2006. ACM Press.
Info
See doi.acm.org ...
10Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. In The 5th International Conference on Cryptology and Network Security, CANS 2006, Suzhou, Dec. 8 - 10, 2006, volume 4301 of Lecture Notes in Computer Science, pages 90–107. Springer, 2006. A shortened version of ePrint Report 2005/424.
Info
9Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings: Extended version. Cryptology ePrint Archive, Report 2005/424, 2006. A shorter more compact version was published at CANS 2006.
PostScript (436 kB)
GZipped PostScript (182 kB)
PDF (422 kB)
Info
See eprint.iacr.org ...
8Timo Latvala and Tommi Junttila. Nusmv-2.3.99-cav2006. Computer program, 2006.
Info
See www.tcs.hut.fi ...
7Toni Jussila, Jori Dubrovin, Tommi Junttila, Timo Latvala, and Ivan Porres. Model checking dynamic and hierarchical UML state machines. In MoDeVa: Model Development, Validation and Verification; 3rd International Workshop, Genova, Italy, October 2006, pages 94–110, 2006.
Info
See modeva.itee.uq.edu.au ...
6Tomi Janhunen, Ilkka Niemelä, Dietmar Seipel, Patrik Simons, and Jia-Huai You. Unfolding partiality and disjunctions in stable model semantics. ACM Transactions on Computational Logic, 7(1):1–37, January 2006.
Info
See doi.acm.org ...
5Tomi Janhunen. lp2sat 1.10 — A tool for translating normal logic programs into SAT. http://www.tcs.hut.fi/Software/lp2sat/, 2006. Computer Program.
Info
See www.tcs.hut.fi ...
4Ville Nuorvala and Antti Tuominen. MIPL Mobile IPv6 for Linux, version 2.0.2, 2006.
Info
See www.mobile-ipv6.org ...
3Ville Nuorvala and Antti Tuominen. MIPL Mobile IPv6 for Linux, version 2.0.1, 2006.
Info
See www.mobile-ipv6.org ...
2Ville Nuorvala. NEPL NEmo Platform for Linux, version 0.2, 2006.
Info
See www.mobile-ipv6.org ...
1Ville Nuorvala and Antti Tuominen. MIPL Mobile IPv6 for Linux, version 2.0, 2006.
Info
See www.mobile-ipv6.org ...

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.