TCS / Research / Publications / 2008
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Publications in 2008

72Tomi Janhunen. Removing redundancy from answer set programs. In Enrico Pontelli and Maria Garcia de La Banda, editors, Proceedings of the 24th International Conference on Logic Programming, pages 729–733, Udine, Italy, December 2008. Springer-Verlag. LNCS 5366.
Info
See dx.doi.org ...
71Tomi Janhunen, Ilkka Niemelä, and Mark Sevalnev. Computing stable models via reductions to boolean circuits and difference logic. In Marc Denecker, editor, Proceedings of the 2nd International Workshop on Logic and Search, pages 16–30, Leuven, Belgium, November 2008.
Info
70Billy Bob Brumley and Jukka Valkonen. Attacks on message stream encryption. In Hanne Riis Nielson and Christian W. Probst, editors, Proceedings of the 13th Nordic Workshop on Secure IT Systems—NordSec '08, pages 163–173, October 2008.
PDF (192 kB)
Info
69Mikko Alava, John Ardelius, Erik Aurell, Petteri Kaski, Supriya Krishnamurthy, and Pekka Orponen. Circumspect descent prevails in solving random constraint satisfaction problems. Proceedings of the National Academy of Sciences (USA), 105(40):15253–15257, October 2008.
Info
See www.pnas.org ...
68Pekka Orponen, Satu Elisa Schaeffer, and Vanesa Avalos Gaytán. Locally computable approximations for spectral clustering and absorption times of random walks. Technical Report cs.DM/0810.4061, arXiv.org, October 2008.
Info
See arxiv.org ...
67Martin Gebser, Tomi Janhunen, Max Ostrowski, Torsten Schaub, and Sven Thiele. A versatile intermediate language for answer set programming. In Maurice Pagnucco and Michael Thielscher, editors, Proceedings of the 12th International Workshop on Nonmonotonic Reasoning, pages 150–159, Sydney, Australia, September 2008. University of New South Wales, School of Computer Science and Engineering, Techical Report, UNSW-CSE-TR-0819.
Info
See www.cse.unsw.edu.au ...
66Roland Axelsson, Keijo Heljanko, and Martin Lange. Analyzing context-free grammars using an incremental SAT solver. In Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, and Igor Walukiewicz, editors, Proceedings of the 35th International Colloquium on Automata, Languages, and Programming (ICALP'08), Part II, volume 5126 of Lecture Notes in Computer Science, pages 410–422, Reykjavik, Iceland, July 2008. Springer-Verlag.
Info
See www.tcs.hut.fi ...
65Tomi Janhunen. Modular equivalence in general. In Malik Ghallab, Constantine Spyropoulos, Nikos Fakotakis, and Nikos Avouris, editors, Proceedings of the 18th European Conference on Artificial Intelligence, pages 75–79, Patras, Greece, July 2008. IOS Press.
Info
64Matti Koskimies. Applying model checking to analysing safety instrumented systems. Research Report TKK-ICS-R5, Helsinki University of Technology, Department of Information and Computer Science, Espoo, Finland, June 2008.
NOTE: Reprint of Master's thesis
PostScript (11 MB)
GZipped PostScript (1 MB)
PDF (633 kB)
Info
63Jani Lampinen. Interface specification methods for software components. Research Report TKK-ICS-R4, Helsinki University of Technology, Department of Information and Computer Science, Espoo, Finland, June 2008.
NOTE: Reprint of Master's thesis
PostScript (961 kB)
GZipped PostScript (387 kB)
PDF (492 kB)
Info
62Jussi Lahtinen. Model checking timed safety instrumented systems. Research Report TKK-ICS-R3, Helsinki University of Technology, Department of Information and Computer Science, Espoo, Finland, June 2008.
NOTE: Reprint of Master's thesis
PostScript (855 kB)
GZipped PostScript (322 kB)
PDF (393 kB)
Info
61Janne Valkonen, Matti Koskimies, Ville Pettersson, Keijo Heljanko, Jan-Erik Holmberg, Ilkka Niemelä, and Jari J. Hämäläinen. Formal verification of safety I&C system designs: Two nuclear power plant related applications. In Enlarged Halden Programme Group Meeting – Proceedings of the Man-Technology-Organisation Sessions, page C4.2, Loen, Norway, May 2008. Institutt for Energiteknikk, Halden, Norway.
Info
See www.tcs.hut.fi ...
60Janne Valkonen, Ilkka Karanta, Matti Koskimies, Keijo Heljanko, Ilkka Niemelä, Dan Sheridan, and Robin E. Bloomfield. NPP safety automation systems analysis – State of the art. VTT Working Papers 94, VTT Technical Research Centre of Finland, Espoo, Finland, April 2008.
Info
See www.vtt.fi ...
59Javier Esparza and Keijo Heljanko. Unfoldings – A Partial-Order Approach to Model Checking. EATCS Monographs in Theoretical Computer Science. Springer-Verlag, March 2008.
Info
See www.springer.com ...
58Joo Yeon Cho. An improved estimate of the correlation of distinguisher for Dragon. In SASC 2008 - The State of the Art of Stream Ciphers, Lausanne, Switzerland, February 13-14, 2008, pages 11–20, February 2008.
PDF (142 kB)
Info
57Janne Valkonen, Ville Petterson, Kim Björkman, Jan-Erik Holmberg, Matti Koskimies, Keijo Heljanko, and Ilkka Niemelä. Model-based analysis of an arc protection and an emergency cooling system – MODSAFE 2007 working report. VTT Working Papers 93, VTT Technical Research Centre of Finland, Espoo, Finland, February 2008.
Info
See www.vtt.fi ...
56Antti E. J. Hyvärinen, Tommi Junttila, and Ilkka Niemelä. Strategies for solving SAT in Grids by randomized search. In Serge Autexier, John Campbell, Julio Rubio, Volker Sorge, Masakazu Suzuki, and Freek Wiedijk, editors, AISC 2008, volume 5144 of Lecture Notes in Artificial Intelligence, pages 125–140. Springer, 2008.
Info
55Mikko Juhani Pitkanen, Xin Zhou, Antti E. J. Hyvärinen, and Henning Müller. Using the Grid for enhancing the performance of a medical image search engine. In Proceedings of the The Tewnty-First IEEE International Symposium on Computer-Based Medical Systems, June 17-19, 2008, Jyväskylä, Finland, pages 367–372. IEEE, 2008.
Info
54Antti E. J. Hyvärinen, Tommi Junttila, and Ilkka Niemelä. Incorporating learning in grid-based randomized sat solving. In Daniel Dochev, Marco Pistore, and Paolo Traverso, editors, AIMSA 2008, volume 5253 of Lecture Notes in Artificial Intelligence, pages 247–261. Springer, 2008.
Info
53Andrea Röck. Entropy of the internal state of an FCSR in Galois representation. In Kaisa Nyberg, editor, Fast Software Encryption - FSE 2008, volume 5086 of Lecture Notes in Computer Science, pages 343–362. Springer, 2008.
Info
See dx.doi.org ...
52Andrea Röck. Stream ciphers using a random update function: Study of the entropy of the inner state. In Serge Vaudenay, editor, First International Conference on Cryptology in Africa - AFRICACRYPT 2008, volume 5023 of Lecture Notes in Computer Science, pages 258–275. Springer, 2008.
Info
See dx.doi.org ...
51Cédric Lauradoux and Andrea Röck. Parallel generation of l-sequences. In Solomon W. Golomb, Matthew G. Parker, Alexander Pott, and Arne Winterhof, editors, Sequences and Their Applications - SETA 2008, volume 5203 of Lecture Notes in Computer Science, pages 299–312. Springer, 2008.
Info
See dx.doi.org ...
50Billy Bob Brumley and Kimmo U. Järvinen. Fast point decompression for standard elliptic curves. In Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice—EuroPKI '08, volume 5057 of Lecture Notes in Computer Science, pages 134–149. Springer-Verlag, 2008.
Info
See dx.doi.org ...
49Billy Bob Brumley. Implementing cryptography for packet level authentication. In Proceedings of the 2008 International Conference on Security & Management—SAM '08, pages 475–480. CSREA Press, 2008. Special track on Applied Cryptology and Network Security.
PDF (182 kB)
Info
48Harri Haanpää, editor. Annual report for the year 2007. Technical report, Teknillinen korkeakoulu, Tietojenkäsittelyteorian laboratorio (Helsinki University of Technology, Laboratory for Theoretical Computer Science), Espoo, Finland, 2008.
PDF (238 kB)
Info
47Matti Järvisalo. Structure-Based Satisfiability Checking: Analyzing and Harnessing the Potential. Doctoral dissertation, TKK Dissertations in Information and Computer Science TKK-ICS-D10, Helsinki University of Technology, Faculty of Information and Natural Sciences, Department of Information and Computer Science, Espoo, Finland, 2008.
Info
See lib.tkk.fi ...
46Emilia Oikarinen. Modularity in Answer Set Programs. Doctoral dissertation, TKK Dissertations in Information and Computer Science TKK-ICS-D7, Helsinki University of Technology, Faculty of Information and Natural Sciences, Department of Information and Computer Science, Espoo, Finland, 2008.
Info
See lib.tkk.fi ...
45Sven Laur. Cryptographic Protocol Design. Doctoral dissertation, TKK Dissertations in Information and Computer Science TKK-ICS-D2, Helsinki University of Technology, Faculty of Information and Natural Sciences, Department of Information and Computer Science, Espoo, Finland, 2008.
Info
See lib.tkk.fi ...
44Dmitrij Lagutin. Redesigning Internet—The Packet Level Authentication Architecture. Licentiate's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
Info
43Vesa Ojala. Counterexample analysis for automated refinement of data abstracted state machine models. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
PostScript (1 MB)
GZipped PostScript (572 kB)
PDF (532 kB)
Info
42Kari Kähkönen. Automated dynamic test generation for sequential Java programs. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
PDF (1 MB)
Info
41Jussi Lahtinen. Model checking timed safety instrumented systems. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
Info
40Jani Lampinen. Interface specification methods for software components. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
Info
39Matti Koskimies. Applying model checking to analysing safety instrumented systems. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
Info
38Aleksi Hänninen. Boolean satisfiability problem and cryptography. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
Info
37Perttu Halonen. Tiedonlouhinnan käyttö tietoturvan tarkkailussa. Master's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2008.
Info
36Sven Laur and Sylvain Pasini. SAS-based group authentication and key agreement protocols. In Ronald Cramer, editor, Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, volume 4939 of Lecture Notes in Computer Science, pages 197–213. Springer, 2008.
Info
35Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell, and Seif Haridi. An analytical study of a structured overlay in the presence of dynamic membership. IEEE/ACM Transactions on Networking, 16:814–825, 2008.
Info
See ieeexplore.ieee.org ...
34Emilia Oikarinen and Tomi Janhunen. Implementing prioritized circumscription by computing disjunctive stable models. In Danail Dochev, Marco Pistore, and Paolo Traverso, editors, Artificial Intelligence: Methodology, Systems, and Applications, 13th International Conference, AIMSA 2008, Varna, Bulgaria, September 2008 Proceedings, volume 5223 of Lecture Notes in Artificial Intelligence, pages 167–180. Springer, 2008.
Info
See dx.doi.org ...
33Emilia Oikarinen and Tomi Janhunen. Achieving compositionality of the stable model semantics for smodels programs. Theory and Practice of Logic Programming, 8(5–6):717–761, 2008.
Info
See arxiv.org ...
32Harri Haanpää, Patric Östergård, and Sándor Szabó. Small -groups with full-rank factorization. International Journal of Algebra and Computation, 18(6):1019–1034, 2008.
PDF (221 kB)
Info
31Victor Marek, Ilkka Niemelä, and Mirosław Truszczyński. Programs with monotone abstract constraint atoms. Theory and Practice of Logic Programming, 8(2):167–199, 2008.
Info
See lanl.arxiv.org ...
30Gerhard Brewka, Ilkka Niemelä, and Mirosl aw Truszczyński. Nonmonotonic reasoning. In Frank van Harmelen, Vladimir Lifschitz, and Bruce Porter, editors, Handbook of Knowledge Representation, chapter 6, pages 239–284. Elsevier Science, Amsterdam, 2008.
Info
29Janne Valkonen, Ville Pettersson, Kim Björkman, Jan-Erik Holmberg, Matti Koskimies, Keijo Heljanko, and Ilkka Niemelä. Model-based analysis of an arc protection and an emergency cooling system. VTT Working Papers 93, VTT Technical Research Centre of Finland, Espoo, 2008.
Info
See www.vtt.fi ...
28Janne Valkonen, Ilkka Karanta, Matti Koskimies, Keijo Heljanko, Ilkka Niemelä, Dan Sheridan, and Robing E. Bloomfield. NPP safety automation systems analysis: State of the art. VTT Working Papers 94, VTT Technical Research Centre of Finland, Espoo, 2008.
Info
See www.vtt.fi ...
27Ilkka Niemelä. Answer set programming without unstratified negation. In Proceedings of the 24th International Conference on Logic Programming (ICLP 2008), volume 5366 of Lecture Notes in Computer Science, pages 88–92. Springer, 2008.
Info
26Ilkka Niemelä. Stable models and difference logic. In Proceedings of the Tenth International Symposium on Artificial Intelligence and Mathematics, page 5 p., 2008. The proceedings available at http://isaim2008.unl.edu/index.php?page=proceedings.
Info
25Gerd Brewka, Ilkka Niemelä, and Mirosław Truszczyński. Preferences and nonmonotonic reasoning. AI Magazine, 29(4):69–78, 2008.
Info
24Ilkka Niemelä. Stable models and difference logic. Annals of Mathematics and Artificial Intelligence, 53(1–4):313–329, 2008.
Info
See dx.doi.org ...
23Jukka Valkonen and Kaisa Nyberg. Uudet salausmenetelmät parantavat yksityisyydensuojaa. Tietosuoja, 4:24–27, 2008. In Finnish.
Info
22Joo Yeon Cho, Miia Hermelin, and Kaisa Nyberg. A new technique for multidimensional linear cryptanalysis with applications on reduced round Serpent. In The 11th International Conference on Information Security and Cryptology 2008, ICISC '08, Seoul, Korea, volume 5461 of Lecture Notes in Computer Science, pages 383 – 398, 2008.
PDF (307 kB)
Info
21Jori Dubrovin, Tommi Junttila, and Keijo Heljanko. Symbolic step encodings for object based communicating state machines. In Gilles Barthe and Frank S. de Boer, editors, Proceedings of the 10th IFIP International Conference on Formal Methods for Open Object-based Distributed Systems (FMOODS'08), volume 5051 of Lecture Notes in Computer Science, pages 96–112. Springer, 2008.
Info
See www.tcs.hut.fi ...
20Jori Dubrovin and Tommi Junttila. Symbolic model checking of hierarchical UML state machines. In Jonathan Billington, Zhenhua Duan, and Maciej Koutny, editors, Proceedings of the 8th International Conference on Application of Concurrency to System Design (ACSD'08), pages 108–117. IEEE Press, 2008.
Info
See ieeexplore.ieee.org ...
19Aleksi Saarela, Jan-Erik Ekberg, and Kaisa Nyberg. Random beacon for privacy and group security. In IEEE International Conference on Wireless and Mobile Computing, Networking and Communications WIMOB 08, pages 514–519. IEEE, 2008.
Info
18Kaisa Nyberg, editor. Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, volume 5086 of Lecture Notes in Computer Science. Springer, 2008.
Info
17Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional Linear Cryptanalysis of Reduced Round Serpent. In Yi Mu, Willy Susilo, and Jennifer Seberry, editors, Information Security and Privacy, 13th Australasian Conference, ACISP 2008 Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of LNCS, pages 203–215. Springer, 2008.
Info
16Matti Järvisalo and Emilia Oikarinen. Extended ASP tableaux and rule redundancy in normal logic programs. Theory and Practice of Logic Programming, 8(5–6):691–716, 2008.
Info
See www.tcs.tkk.fi ...
15Matti Järvisalo, Tommi Junttila, and Ilkka Niemelä. Justification-based local search with adaptive noise strategies. In Iliano Cervesato, Helmut Veith, and Andrei Voronkov, editors, Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR'08), volume 5330 of Lecture Notes in Computer Science, pages 31–46. Springer, 2008.
Info
See www.tcs.tkk.fi ...
14Matti Järvisalo, Tommi Junttila, and Ilkka Niemelä. Justification-based local search with adaptive noise strategies. In Proceedings of the 2nd International Workshop on Logic and Search: Computation of structures from declarative descriptions (LaSh'08), pages 111–125. KU Leuven, 2008.
Info
See www.tcs.tkk.fi ...
13Matti Järvisalo, Tommi Junttila, and Ilkka Niemelä. Justification-based non-clausal local search for SAT. In Malik Ghallab, Constantine D. Spyropoulos, Nikos Fanotakis, and Nikos Avoukis, editors, Proceedings of the 18th European Conference on Artificial Intelligence (ECAI 2008), volume 178 of Frontiers in Artificial Intelligence and Applications, pages 535–539. IOS Press, 2008.
Info
See www.tcs.tkk.fi ...
12Matti Järvisalo and Tommi Junttila. On the power of top-down branching heuristics. In Dieter Fox and Carla P. Gomes, editors, Proceedings of the 23rd AAAI Conference on Artificial Intelligence (AAAI-08), pages 304–309. AAAI Press, 2008.
Info
See www.tcs.tkk.fi ...
11Matti Järvisalo and Ilkka Niemelä. The effect of structural branching on the efficiency of clause learning SAT solving: An experimental study. Journal of Algorithms, 63(1–3):90–113, 2008.
Info
See www.tcs.tkk.fi ...
10Petteri Kaski, Patric R. J. Östergård, Svetlana Topalova, and Rosen Zlatarski. Steiner triple systems of order 19 and 21 with subsystems of order 7. Discrete Mathematics, 308(13):2732–2741, 2008.
Info
See www.tcs.hut.fi ...
9Risto Hakala and Kaisa Nyberg. Linear distinguishing attack on Shannon. In Yi Mu, Willy Susilo, and Jennifer Seberry, editors, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008, Proceedings, volume 5107 of Lecture Notes in Computer Science, pages 297–305. Springer, 2008.
Info
See dx.doi.org ...
8Miki Sirola, Jukka Parviainen, Jaakko Talonen, Golan Lampi, Tuomas Alhonnoro, and Risto Hakala. Early fault detection with SOM based methods and visualizations – new contents for wide monitoring screens. In EHPG-Meeting of OECD Halden Reactor Project, 2008.
Info
7Shreyas Prasad, André Schumacher, Harri Haanpää, and Pekka Orponen. Balanced multipath source routing. In T. Vazão, M.M. Freire, and I. Chong, editors, Proceedings of the 21st International Conference on Information Networking (ICOIN'07), volume 5200/2008 of Lecture Notes in Computer Science, pages 315–324, Berlin Heidelberg, 2008. Springer-Verlag.
Info
See dx.doi.org ...
6André Schumacher and Harri Haanpää. Distributed network utility maximization in wireless networks with a bounded number of paths. In Proceedings of The 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks (PMHWN 2008), pages 96–103, New York, NY, USA, 2008. ACM.
Info
See dx.doi.org ...
5André Schumacher, Pekka Orponen, Thorn Thaler, and Harri Haanpää. Lifetime maximization in wireless sensor networks by distributed binary search. In Roberto Verdone, editor, Proceedings of The 5th European Conference on Wireless Sensor Networks (EWSN 2008), volume 4913/2008 of Lecture Notes in Computer Science, pages 237–252, Berlin / Heidelberg, 2008. Springer-Verlag.
Info
See dx.doi.org ...
4Sven Laur and Sylvain Pasini. Sas-based group authentication and key agreement protocols. In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, volume 4939 of Lecture Notes in Computer Science, pages 197–213. Springer, 2008.
Info
3Sven Laur. Cryptographic Protocol Design. Doctoral dissertation, Helsinki University of Technology, 2008. TKK Dissertations in Information and Computer Science, TKK-ISC-D2.
PDF (2 MB)
Info
2Hans van Maaren and Siert Wieringa. Finding guaranteed MUSes fast. In Hans Kleine Büning and Xishun Zhao, editors, Theory and Applications of Satisfiability Testing - SAT 2008, 11th International Conference, SAT 2008, Guangzhou, China, May 12-15, 2008. Proceedings, volume 4996 of Lecture Notes in Computer Science, pages 291–304, 2008.
Info
1Tommi Junttila and Jori Dubrovin. Encoding queues in satisfiability modulo theories based bounded model checking. In Iliano Cervesato, Helmut Veith, and Andrei Voronkov, editors, Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), volume 5330 of Lecture Notes in Artificial Intelligence, pages 290–304. Springer, 2008.
Info
See dx.doi.org ...

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.