lu.se

Elektro- och informationsteknik

Lunds Tekniska Högskola | Lunds universitet

Publikationer



Books

  1. K. Holmqvist, M. Nyström, R. Andersson, R. Dewhurst, J. Halszka, J. van de Weijer:
    Eye Tracking : A Comprehensive Guide to Methods and Measures
    ISBN 9780199697083, Oxford University Press, 2011. (BibTeX) (More info)
  2. M. Pioro, D. Medhi:
    Routing, flow, and capacity design in communication and computer networks
    The Morgan Kaufmann Series in Networking, ISBN 0-12-557189-5, Morgan Kaufmann Publishers, 2004. (BibTeX) (More info)
  3. U. Körner:
    Köteori
    ISBN 91-44-03103-3, Studentlitteratur, 2003. (BibTeX) (More info)
  4. U. Körner:
    Köteori och tillförlitlighetsteori : applicerat på telekommunikations- och datorsystem
    ISBN 91-44-00480-X, Studentlitteratur, 1997. (BibTeX) (More info)

Book Chapters

  1. J. Holsanova, M. Nyström, K. Holmqvist:
    Visualisering av ögonrörelser som stöd för motivation, metakognition och lärande
    Vetenskapliga perspektiv på lärande, undervisning och utbildning i olika institutionella sammanhang : utbildningsvetenskaplig forskning vid Lunds universitet, pp. 369-380, ISBN 978-91-7473-862-9, Lunds universitet, Institutionen för utbildningsvetenskap, 2014. (BibTeX) (More info)
  2. P. Blignaut, K. Holmqvist, M. Nyström, R. Dewhurst:
    Improving the Accuracy of Video-Based Eye-Tracking in Real-Time through Post-Calibration Regression
    Current Trends in Eye Tracking Research, ISBN 978-3-319-02867-5, Springer, 2014. (BibTeX) (More info)
  3. M. Hell, T. Johansson:
    Linear Attacks on Stream Ciphers
    Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series, pp. 55-85, ISBN 978-1-60750-843-4, IOS Press, 2011. (BibTeX) (More info)
  4. M. Pioro:
    Network optimization techniques
    Mathematical Foundations for Signal Processing, Communications, and Networking, pp. 627-690, ISBN 978-1-4398-5513-3, CRC Press, 2011. (BibTeX) (More info)
  5. A. Bley, B. Fortz, E. Gourdin, K. Holmberg, O. Klopfenstein, M. Pioro, A. Tomaszewski, H. Ümit:
    Optimization of OSPF routing in IP networks
    Graphs and algorithms in communication networks ? studies in broadband, optical, wireless, and Ad Hoc networks, pp. 199-240, ISBN 978-3-642-02249-4, Springer, 2009. (BibTeX) (More info)
  6. M. Klinkowski, M. Marciniak, M. Pioro:
    Routing optimization in optical burst switching networks: a multi-path routing approach
    Graphs and algorithms in communication networks ? studies in broadband, optical, wireless, and Ad Hoc networks, pp. 163-178, ISBN 978-3-642-02249-4, Springer, 2009. (BibTeX) (More info)
  7. M. Hell, T. Johansson, A. Maximov, W. Meier:
    The Grain family of stream ciphers
    New Stream Cipher Designs - The eSTREAM Finalists, pp. 179-190, ISSN 0302-9743, Springer, 2008. (BibTeX) (More info)
  8. M. Dzida, M. Zagozdzon, M. Pioro, T. Sliwinski, W. W.Ogryczak:
    A column generation technique in the design of resilient networks (in Polish)
    Control and automation: current problems and their solutions, pp. 285-294, ISBN 978-83-60434-42-0, Exit, the Publishing House of Polish Academy of Sciences, 2008. (BibTeX) (More info)
  9. T. Johansson:
    Authentication codes
    Encyclopedia of Telecommunications, 2005. (BibTeX) (More info)
  10. R. Wakikawa, H. Matsutani, R. Koodli, A. Nilsson Plymoth, J. Murai:
    Mobile gateways for mobile ad-hoc networks with network mobility support
    Networking - ICN 2005 (Lecture Notes in Computer Science), Vol. 3421, pp. 361-368, ISSN 0302-9743, Springer, 2005. (BibTeX) (More info)
  11. W. Ogryczak, M. Pioro, T. Sliwinski:
    Column generation technique in fair allocation problems in the MMF sense
    Badania operacyjne i systemowe 2004: Podejmowanie decyzji --- podstawy matematyczne i zastosowania, pp. 31-41, ISBN 83-87674-73-7, Akademicka Opficyna Wydawnicza EXIT, Warszawa, Poland, 2004. (BibTeX) (More info)
  12. U. Körner:
    Future infocom systems
    European telecommunications liberalisation, ISBN 0-415-18781-8, Routledge, 1999. (BibTeX) (More info)

Journal Articles

    2019

  1. V. Angelakis, I. Avgouleas, N. Pappas, E. Fitzgerald, D. Yuan:
    Allocation of Heterogeneous Resources of an IoT Device to Flexible Services
    IEEE Internet of Things Journal, 2016. (In press) (BibTeX) (More info)
  2. A. Strukelj, T. Foulsham, M. Nyström:
    Social context modulates basic properties of oculomotor control
    Journal of Eye Movement Research, 2016. (In press) (BibTeX) (More info)
  3. A. Kiik, M. Nyström, L. Harrie:
    Cartographic Design Matters : A Comparison of Thematic Polygon Design
    The Cartographic Journal, 2016. (In press) (BibTeX) (More info)
  4. E. Fitzgerald, B. Landfeldt:
    Increasing Road Traffic Throughput Through Dynamic Traffic Accident Risk Mitigation
    Journal of Transportation Technologies, 2015. (In press) (BibTeX) (More info)
  5. M. O. Demir, M. Karaca, G. K. Kurt:
    On Reducing Power Consumption of Transmitting Stations in 802.11 MIMO Networks
    IEEE Communications Letters, 2015. (In press) (BibTeX) (More info)
  6. J. Pihel, Å. Sang, C. Hägerhäll, M. Nyström:
    Expert novice differences in eye movements when assessing biodiversity of harvested forest
    Forest Policy and Economics, 2015. (In press) (BibTeX) (More info)
  7. A. Strukelj, K. Scheiter, M. Nyström, K. Holmqvist:
    Exploring the Lack of a Disfluency Effect : Evidence from Eye Movements
    Metacognition and Learning, 2015. (In press) (BibTeX) (More info)
  8. M. Caglar, M. Iftikhar, B. Landfeldt:
    Interarrival Distribution of a Long-Range Dependent Workload Process
    Applied Mathematics and Information Sciences, 2012. (In press) (BibTeX) (More info)
  9. M. Iftikhar, N. Al Zaben, W. Al-Saleed, I. Shoukat, M. Uddin, M. Talha, B. Landfeldt, A. Zomaya:
    On the Provisioning of QoS Mapping in Cellular and IP Networks Using a Translation (Function) Matrix
    Journal of Information, 2012. (In press) (BibTeX) (More info)
  10. W. Ben-Ameur, M. Pioro, M. ?otkiewicz:
    Fractional routing using pairs of failure-disjoint paths
    Discrete Applied Mathematics, 2012. (In press) (BibTeX) (More info)
  11. 2016

  12. M. Nyström, D. Witzner Hansen, R. Andersson, I. Hooge:
    Why have microsaccades become larger? Investigating eye deformations and detection algorithms
    Vision Research, Vol. 118, pp. 17-24, 2016. (BibTeX) (More info)
  13. M. Nyström, I. Hooge, R. Andersson:
    Pupil size influences the eye-tracker signal during saccades
    Vision Research, Vol. 121, pp. 95-103, 2016. (BibTeX) (More info)
  14. 2015

  15. Y. Li, M. Pioro, B. Landfeldt:
    Fair Flow Rate Optimization by Effective Placement of Directional Antennas in Wireless Mesh Networks
    Performance Evaluation, Vol. 87, pp. 92-106, 2015. (BibTeX) (More info)
  16. H. Wang, P. Stankovski, T. Johansson:
    A generalized birthday approach for efficiently finding linear relations in l-sequences
    Designs, Codes and Cryptography, Vol. 74, No. 1, pp. 41-57, 2015. (BibTeX) (More info)
  17. Q. Guo, T. Johansson, C. Löndahl:
    A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
    IEEE Transactions on Information Theory, Vol. 61, No. 11, pp. 6204-6212, 2015. (BibTeX) (More info)
  18. Y. Li, N. Pappas, V. Angelakis, M. Pioro, D. Yuan:
    Optimization of Free Space Optical Wireless Network for Cellular Backhauling
    IEEE Journal on Selected Areas in Communicaitons, Vol. 33, No. 9, pp. 1841-1854, 2015. (BibTeX) (More info)
  19. Y. Li, M. Pioro, D. Yuan, J. Su:
    Optimizing Link Rate Assignment and Transmission Scheduling in WMN through Compatible Set Generation
    Telecommunications Systems, 2015. (BibTeX) (More info)
  20. D. Adjiashvili, S. Bosio, Y. Li, D. Yuan:
    Exact and Approximation Algorithms for Optimal Equipment Selection in Deploying In-Building Distributed Antenna Systems
    IEEE Transactions on Mobile Computing, Vol. 14, No. 4, pp. 702-713, 2015. (BibTeX) (More info)
  21. E. Dubrova, M. Hell:
    Espresso: A stream cipher for 5G wireless communication systems
    Cryptography and Communications, 2015. (BibTeX) (More info)
  22. I. Hooge, M. Nyström, T. Cornelissen, K. Holmqvist:
    The art of braking : post saccadic oscillations in the eye tracker signal decrease with increasing saccade size
    Vision Research, Vol. 112, pp. 55-67, 2015. (BibTeX) (More info)
  23. J. Pihel, Å. Sang, C. Hagerhall, M. Nyström:
    Expert and novice group differences in eye movements when assessing biodiversity of harvested forests
    Forest Policy and Economics, Vol. 56, pp. 20-26, 2015. (BibTeX) (More info)
  24. C. Scholes, P. McGraw, M. Nyström, N. Roach:
    Fixational eye movements predict visual sensitivity
    Proceedings of the Royal Society B: Biological Sciences, Vol. 282, No. 1817, pp. 20151568-, 2015. (BibTeX) (More info)
  25. R. Hessels, R. Andersson, I. Hooge, M. Nyström, C. Kemner:
    Consequences of eye color, positioning, and head movement for eye-tracking data quality in infant research
    Infancy, Vol. 20, No. 6, pp. 601-633, 2015. (BibTeX) (More info)
  26. M. Nyström, R. Andersson, M. Magnusson, T. Pansell, I. Hooge:
    The influence of crystalline lens accommodation on post-saccadic oscillations in pupil-based eye trackers
    Vision Research, Vol. 107, pp. 1-14, 2015. (BibTeX) (More info)
  27. M. Nyström, R. Andersson, M. Magnusson, T. Pansell, I. Hooge:
    The influence of crystalline lens accommodation on post-saccadic oscillations in pupil-based eye trackers
    Vision Research, Vol. 107, pp. 1-14, 2015. (BibTeX) (More info)
  28. L. Larsson, M. Nyström, R. Andersson, M. Stridh:
    Detection of fixations and smooth pursuit movements in high-speed eye-tracking data
    Biomedical Signal Processing and Control, Vol. 18, pp. 145-152, 2015. (BibTeX) (More info)
  29. M. Zotkiewicz, M. Ruiz, M. Klinkowski, M. Pioro, L. Velasco:
    Reoptimization of Dynamic Flexgrid Optical Networks After Link Failure Repairs
    Journal of Optical Communications and Networking, Vol. 7, No. 1, 2015. (BibTeX) (More info)
  30. Y. Fouquet, D. Nace, M. Pioro, M. Poss, M. Zotkiewicz:
    Generalized Elastic Flow Rerouting Scheme
    Networks, Vol. 66, No. 4, pp. 267-281, 2015. (BibTeX) (More info)
  31. 2014

  32. M. Caglar, M. Iftikhar, B. Landfeldt:
    Interarrival Distribution of a Long-Range Dependent Workload Process
    Applied Mathematics & Information Sciences, Vol. 8, No. 1L, pp. 15-26, 2014. (BibTeX) (More info)
  33. C. Löndahl, T. Johansson:
    Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
    Designs, Codes and Cryptography, Vol. 73, No. 2, pp. 625-640, 2014. (BibTeX) (More info)
  34. P. Stankovski, M. Hell, T. Johansson:
    An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
    Journal of Cryptology, Vol. 27, No. 1, pp. 1-22, 2014. (BibTeX) (More info)
  35. W. Ogryczak, H. Luss, D. Nace, M. Pioro:
    Fair Optimization and Networks: Models, Algorithms, and Applications
    Journal of Applied Mathematics, pp. 340913-, 2014. (BibTeX) (More info)
  36. W. Ogryczak, H. Luss, M. Pioro, D. Nace, A. Tomaszewski:
    Fair Optimization and Networks: A Survey
    Journal of Applied Mathematics, pp. 612018-, 2014. (BibTeX) (More info)
  37. M. Pioro, M. Zotkiewicz, B. Staehle, D. Staehle, D. Yuan:
    On max-min fair flow optimization in wireless mesh networks
    Ad Hoc Networks, Vol. 13, pp. 134-152, 2014. (BibTeX) (More info)
  38. W. Ben-Ameur, M. Pioro, M. Zotkiewicz:
    Fractional Routing on Pairs of Failure-disjoint Paths
    Discrete Applied Mathematics, Vol. 164, pp. 47-60, 2014. (BibTeX) (More info)
  39. M. Zotkiewicz, M. Pioro:
    Exact Approach to Reliability of Wireless Mesh Networks with Directional Antennas
    Telecommunications Systems, Vol. 56, No. 1, pp. 201-211, 2014. (BibTeX) (More info)
  40. I. Fajjari, N. Aitsaadi, M. Pioro, G. Pujolle:
    A new virtual network static embedding strategy within the Cloud's private backbone network
    Computer Networks, Vol. 62, pp. 69-88, 2014. (BibTeX) (More info)
  41. M. Ruiz, L. Velasco, A. Lord, D. Fonseca, M. Pioro, R. Wessaly, J. P. Fernandez-Palacios:
    Planning Fixed to Flexgrid Gradual Migration: Drivers and Open Issues
    IEEE Communications Magazine, Vol. 52, No. 1, pp. 70-76, 2014. (BibTeX) (More info)
  42. 2013

  43. H. Wang, M. Hell, T. Johansson, M. Ågren:
    Improved Key Recovery Attack on the BEAN Stream Cipher
    IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, Vol. E96A, No. 6, pp. 1437-1444, 2013. (BibTeX) (More info)
  44. Y. Li, M. Pioro, D. Yuan, J. Su:
    Optimizing compatible sets in wireless networks through integer programming
    Euro Journal on Computational Optimization, 2013. (BibTeX) (More info)
  45. Y. Li, M. Pioro:
    Integer programming models for maximizing parallel transmissions in wireless networks
    Electronic Notes in Discrete Mathematics, Vol. 41, pp. 197-204, 2013. (BibTeX) (More info)
  46. M. Nyström, I. Hooge, K. Holmqvist:
    Post-saccadic oscillations in eye movement data recorded with pupil-based eye trackers reflect motion of the pupil inside the iris
    Vision Research, Vol. 92, pp. 59-66, 2013. (BibTeX) (More info)
  47. A. Eitel, K. Scheiter, A. Schüler, M. Nyström, K. Holmqvist:
    How a picture facilitates the process of learning from text: Evidence for scaffolding
    Learning and Instruction, Vol. 28, pp. 48-63, 2013. (BibTeX) (More info)
  48. C. Ahlström, M. Nyström, K. Holmqvist, C. Fors, D. Sandberg, A. Anund, G. Kecklund, T. Åkerstedt:
    Fit-for-duty test for estimation of drivers? sleepiness level: Eye movements improve the sleep/wake predictor
    Transportation Research. Part C: Emerging Technologies, Vol. 26, pp. 20-32, 2013. (BibTeX) (More info)
  49. M. Nyström, R. Andersson, K. Holmqvist, J. van de Weijer:
    The influence of calibration method and eye physiology on eyetracking data quality
    Behavior Research Methods, Vol. 45, No. 1, pp. 272-288, 2013. (BibTeX) (More info)
  50. P. Timberg, K. Lång, M. Nyström, K. Holmqvist, P. Wagner, D. Förnvik, A. Tingberg, S. Zackrisson:
    Investigation of viewing procedures for interpretation of breast tomosynthesis image volumes: a detection-task study with eye tracking.
    European Radiology, Vol. 23, No. 4, pp. 997-1005, 2013. (BibTeX) (More info)
  51. E. Wennås Brante, M. Holmqvist Olander, M. Nyström:
    Exploring the impact of contrasting cases in text and picture processing
    Journal of Visual Literacy, Vol. 32, No. 2, pp. 15-38, 2013. (BibTeX) (More info)
  52. L. Larsson, M. Nyström, M. Stridh:
    Detection of Saccades and Postsaccadic Oscillations in the Presence of Smooth Pursuit
    IEEE Transactions on Biomedical Engineering, Vol. 60, No. 9, pp. 2484-2493, 2013. (BibTeX) (More info)
  53. D. Santos, A. de Sousa, F. Alvelos, M. Pioro:
    Optimizing network load balancing: an hybridization approach of metaheuristics with column generation
    Telecommunications Systems, Vol. 52, No. 2, pp. 959-968, 2013. (BibTeX) (More info)
  54. F. Solano, M. Pioro:
    WDM network re-optimization avoiding costly traffic disruptions
    Telecommunications Systems, Vol. 52, No. 2, pp. 907-918, 2013. (BibTeX) (More info)
  55. D. Hock, M. Hartmann, M. Menth, M. Pioro, A. Tomaszewski, C. ?ukowski:
    Comparison of IP-based and explicit paths for one-to-one fast reroute in MPLS networks
    Telecommunications Systems, Vol. 52, No. 2, pp. 947-958, 2013. (BibTeX) (More info)
  56. D. Nace, M. Pioro, A. Tomaszewski, M. Zotkiewicz:
    Complexity of a classical flow restoration problem
    Networks, Vol. 62, No. 2, pp. 149-160, 2013. (BibTeX) (More info)
  57. M. Pioro, J. Rak, K. Szczypiorski:
    Networks for the e-society
    Telecommunication Systems, Vol. 52, No. 2, pp. 931-933, 2013. (BibTeX) (More info)
  58. M. Ruiz, M. Pioro, M. ?otkiewicz, M. Klinkowski, L. Velasco:
    Column Generation Algorithm for RSA Problems in Flexgrid Optical Networks
    Photonic Network Communications, Vol. 26, No. 2-3, pp. 53-64, 2013. (BibTeX) (More info)
  59. F. Matera, M. Mayer, M. Listanti, M. Pioro, J. Rak:
    Networks 2012 Conference in Rome, Italy
    IEEE Communications Magazine, Vol. 51, No. 11, pp. 3-4, 2013. (BibTeX) (More info)
  60. X. H. You, U. Körner:
    Special Issue on Future Wireless and Mobile Communication Preface
    Science in China, Series F: Information Sciences, Vol. 56, No. 2, pp. 020300-, 2013. (BibTeX) (More info)
  61. 2012

  62. B. Landfeldt, L. Bononi:
    Special section on wireless network behaviour and design
    Computer Communications, Vol. 35, No. 18, pp. 2173-2174, 2012. (BibTeX) (More info)
  63. M. Ågren, C. Löndahl, M. Hell, T. Johansson:
    A Survey on Fast Correlation Attacks
    Cryptography and Communications, Vol. 4, No. 3-4, pp. 173-202, 2012. (BibTeX) (More info)
  64. M. Ågren, M. Hell, T. Johansson:
    On Hardware-Oriented Message Authentication
    IET Information Security, Vol. 6, No. 4, pp. 329-336, 2012. (BibTeX) (More info)
  65. P. Stankovski, S. Ruj, M. Hell, T. Johansson:
    Improved distinguishers for HC-128
    Designs, Codes and Cryptography, Vol. 63, No. 2, pp. 225-240, 2012. (BibTeX) (More info)
  66. M. Hell, T. Johansson, L. Brynielsson, H. Englund:
    Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
    IEEE Transactions on Information Theory, Vol. 58, No. 9, pp. 6183-6193, 2012. (BibTeX) (More info)
  67. T. Foulsham, R. Dewhurst, M. Nyström, H. Jarodzka, R. Johansson, G. Underwood, K. Holmqvist:
    Comparing scanpaths during scene encoding and recognition: A multi-dimensional approach
    Journal of Eye Movement Research, Vol. 5, No. 4:3, pp. 1-14, 2012. (BibTeX) (More info)
  68. P. Timberg, K. Lång, M. Nyström, K. Holmqvist, P. Wagner, D. Förnvik, A. Tingberg, S. Zackrisson:
    Investigation of viewing procedures for interpretation of breast tomosynthesis image volumes: a detection-task study with eye tracking
    European Radiology, pp. 1-9, 2012. (BibTeX) (More info)
  69. R. Dewhurst, M. Nyström, H. Jarodzka, T. Foulsham, R. Johansson, K. Holmqvist:
    It depends on how you look at it: Scanpath comparison in multiple dimensions with MultiMatch, a vector-based approach
    Behavior Research Methods, 2012. (BibTeX) (More info)
  70. H. Jarodzka, T. Baltsev, K. Holmqvist, M. Nyström, K. Scheiter, P. Gerjets, B. Eika:
    Conveying clinical reasoning based on visual observation via eye-movement modelling examples
    Instructional Science, Vol. 40, No. 5, pp. 813-827, 2012. (BibTeX) (More info)
  71. Q. Wang, T. Johansson, H. Kan:
    Some results on fast algebraic attacks and higher-order non-linearities
    IET Information Security, Vol. 6, No. 1, pp. 41-46, 2012. (BibTeX) (More info)
  72. M. Jönsson, L. Ranåker, A. Nilsson Plymoth, C. Brönmark:
    Prey-type-dependent foraging of young-of-the-year fish in turbid and humic environments
    Ecology of Freshwater Fish, Vol. 21, No. 3, pp. 461-468, 2012. (BibTeX) (More info)
  73. S. Orlowski, M. Pioro:
    Complexity of column generation in network design with path-based survivability mechanisms
    Networks, Vol. 59, No. 1, pp. 132-147, 2012. (BibTeX) (More info)
  74. 2011

  75. M. Ågren, M. Hell, T. Johansson, W. Meier:
    Grain-128a: a new version of Grain-128 with optional authentication
    International Journal of Wireless and Mobile Computing, Vol. 5, No. 1, pp. 48-59, 2011. (BibTeX) (More info)
  76. M. Hell, T. Johansson:
    Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
    Journal of Cryptology, Vol. 24, No. 3, pp. 427-445, 2011. (BibTeX) (More info)
  77. D. Johnsson, F. Bjärkeson, M. Hell, F. Hug:
    Searching for new convolutional codes using the cell broadband engine architecture
    IEEE Communications Letters, Vol. 15, No. 5, pp. 560-562, 2011. (BibTeX) (More info)
  78. U. Körner, A. Hamidian, M. Pioro, C. Nyberg:
    A distributed MAC scheme to achieve QoS in ad hoc networks
    Annales des Télécommunications, Vol. 66, No. 9-10, pp. 491-500, 2011. (BibTeX) (More info)
  79. M. Pioro, J. Rak, K. Szczypiorski:
    Networks 2010 Conference in Warsaw, Poland
    IEEE Communications Magazine, Vol. 49, No. 5, pp. 3-3, 2011. (BibTeX) (More info)
  80. C. ?ukowski, A. Tomaszewski, M. Pioro, D. Hock, M. Hartmann, M. Menth:
    Compact Node-Link Formulations for the Optimal Single-Path MPLS Fact Reroute Layout
    Advances in Electronics and Telecommunications, Vol. 2, No. 3, pp. 55-60, 2011. (BibTeX) (More info)
  81. P. Pavon-Marino, M. Pioro:
    On total traffic domination in non-complete graphs
    Operations Research Letters, Vol. 39, pp. 40-43, 2011. (BibTeX) (More info)
  82. D. Santos, A. de Sousa, F. Alvelos, M. Dzida, M. Pioro:
    Optimization of link load balancing in multiple spanning tree routing networks
    Telecommunications Systems, Vol. 48, No. 1-2, pp. 109-124, 2011. (BibTeX) (More info)
  83. M. Klinkowski, P. Pedroso, D. Careglio, M. Pioro, J. Sole-Pareta:
    Joint routing and wavelength allocation subject to absolute QoS constraints in OBS networks
    Journal of Lightwave Technology, Vol. 29, No. 22, pp. 3433-3444, 2011. (BibTeX) (More info)
  84. M. Pioro, J. Rak, K. Szczypiorski:
    Networks for the e-society
    Telecommunication Systems, No. Online September 2011, 2011. (BibTeX) (More info)
  85. 2010

  86. M. Nyström, K. Holmqvist:
    An adaptive algorithm for fixation, saccade, and glissade detection in eyetracking data.
    Behavior Research Methods, Vol. 42, No. 1, pp. 188-204, 2010. (BibTeX) (More info)
  87. M. Nyström, K. Holmqvist:
    Effect of Compressed Offline Foveated Video on Viewing Behavior and Subjective Quality
    ACM Transactions on Multimedia Computing, Communications, and Applications, Vol. 6, No. 1, pp. 4:1-4:14, 2010. (BibTeX) (More info)
  88. R. Andersson, M. Nyström, K. Holmqvist:
    Sampling frequency and eye-tracking measures: how speed affects durations, latencies, and more
    Journal of Eye Movement Research, Vol. 3, No. 3:6, pp. 1-12, 2010. (BibTeX) (More info)
  89. A. Hamidian, C. Palazzi, T. Y. Chong, M. Gerla, U. Körner:
    Exploring wireless mesh networks for collaborative augmented reality environments
    The International Journal of Virtual Reality, Vol. 9, No. 2, pp. 21-30, 2010. (BibTeX) (More info)
  90. A. Tomaszewski, M. Pioro, M. Zotkiewicz:
    On the complexity of resilient network design
    Networks, Vol. 55, No. 2, pp. 108-118, 2010. (BibTeX) (More info)
  91. M. Klinkowski, J. Pedro, D. Careglio, M. Pioro, J. Pires, P. Monteiro, J. Sole-Pareta:
    An overview of routing methods in optical burst switching networks
    Optical Switching and Networkning Journal, Vol. 7, No. 2, pp. 41-53, 2010. (BibTeX) (More info)
  92. M. Zotkiewicz, W. Ben-Ameur, M. Pioro:
    Finding failure-disjoint paths for path diversity protection in communication networks
    IEEE Communications Letters, Vol. 14, No. 8, pp. 776-778, 2010. (BibTeX) (More info)
  93. M. Dzida, M. Zagozdzon, M. Zotkiewicz, M. Pioro:
    Flow optimization in IP networks with fast proactive recovery
    Infocommunications Journal, Vol. 65, No. 2, pp. 35-44, 2010. (BibTeX) (More info)
  94. M. Zotkiewicz, W. Ben-Ameur, M. Pioro:
    Failure disjoint paths
    Electronic Notes in Discrete Mathematics, Vol. 36, pp. 1105-1112, 2010. (BibTeX) (More info)
  95. F. Solano, M. Pioro:
    Lightpath reconfiguration in WDM networks
    Journal of Optical Communications and Networking, Vol. 2, No. 12, pp. 1010-1021, 2010. (BibTeX) (More info)
  96. 2009

  97. M. Hell, T. Johansson, L. Brynielsson:
    An overview of distinguishing attacks on stream ciphers
    Cryptography and Communications, Vol. 1, No. 1, pp. 71-94, 2009. (BibTeX) (More info)
  98. S. Orlowski, M. Pioro, A. Tomaszewski, R. Wessäly:
    SNDlib 1.0 - survivable network design library
    Networks, Vol. 55, No. 3, pp. 276-286, 2009. (BibTeX) (More info)
  99. M. Dzida, T. Sliwinski, M. Zagozdzon, W. Ogryczak, M. Pioro:
    Path diversity protection in two-layer networks
    Journal of Telecommunications and Information Technology, No. 3, pp. 14-19, 2009. (BibTeX) (More info)
  100. P. J. Kuehn, M. Pioro:
    Special Issue on Teletraffic and Network Engineering
    European Transactions on Telecommunications, Vol. 20, No. 7, pp. 631-632, 2009. (BibTeX) (More info)
  101. M. Zotkiewicz, M. Pioro, A. Tomaszewski:
    Complexity of resilient network optimisation
    European Transactions on Telecommunications, Vol. 20, No. 7, pp. 701-709, 2009. (BibTeX) (More info)
  102. 2008

  103. M. Nyström, K. Holmqvist:
    Semantic override of low-level features in image viewing - both initially and overall
    Journal of Eye-Movement Research, Vol. 2, No. 2, pp. 2:1-2:11, 2008. (BibTeX) (More info)
  104. A. Hamidian, U. Körner:
    Extending EDCA with Distributed Resource Reservation for QoS Guarantees
    Telecommunications Systems, Vol. 39, No. 3-4, pp. 187-194, 2008. (BibTeX) (More info)
  105. A. Nilsson Plymoth, U. Körner, P. Johansson:
    Urban mesh ad hoc networks
    International Journal of Network Management, Vol. 18, pp. 107-127, 2008. (BibTeX) (More info)
  106. J. Cao, C. Nyberg:
    Linear programming relaxations and marginal productivity index policies for the buffer sharing problem
    Queueing Systems, Vol. 60, No. 3-4, pp. 247-269, 2008. (BibTeX) (More info)
  107. A. Tomaszewski, M. Pioro, M. Mycek:
    A distributed scheme for optimization of interdomain routing between collaborating domains
    Annales des Télécommunications, Vol. 63, pp. 631-638, 2008. (BibTeX) (More info)
  108. N. Dritan, M. Pioro:
    Max-min fairness and its applications to routing and load-balancing in communication networks - a tutorial
    IEEE Communications Surveys and Tutorials, Vol. 10, No. 4, pp. 5-17, 2008. (BibTeX) (More info)
  109. U. Körner, G. Pujolle:
    Protocols and control schemes in the NGN
    International Journal of Network Management, 2008. (BibTeX) (More info)
  110. 2007

  111. M. Hell, T. Johansson, W. Meier:
    Grain - A stream cipher for constrained environments
    International Journal of Wireless and Mobile Computing, Vol. 2, No. 1, pp. 86-93, 2007. (BibTeX) (More info)
  112. M. Hell, T. Johansson:
    Cryptanalysis of Achterbahn-128/80
    IET Information Security, Vol. 1, No. 2, pp. 47-52, 2007. (BibTeX) (More info)
  113. M. Nyström, K. Holmqvist:
    Deriving and evaluating eye-tracking controlled volumes of interest for variable-resolution video compression
    Journal of Electronic Imaging, Vol. 16, No. 1, 2007. (BibTeX) (More info)
  114. T. Johansson, A. Maximov:
    A linear distinguishing attack on SCREAM
    IEEE Transactions on Information Theory, Vol. 53, No. 9, pp. 3127-3144, 2007. (BibTeX) (More info)
  115. Y. Brehon, D. Kofman, M. Pioro, M. Diallo:
    Optimal virtual topology design using bus-label switched paths
    IEEE Journal on Selected Areas in Communications, Vol. 25, No. 5, pp. 1001-1010, 2007. (BibTeX) (More info)
  116. M. Klinkowski, M. Pioro, D. Careglio, M. Marciniak:
    Non-linear Optimization for Multi-Path Source Routing in OBS Networks
    IEEE Communications Letters, Vol. 11, No. 12, pp. 1016-1018, 2007. (BibTeX) (More info)
  117. 2006

  118. M. Hell, T. Johansson:
    Two new attacks on the self-shrinking generator
    IEEE Transactions on Information Theory, Vol. 52, No. 8, pp. 3837-3843, 2006. (BibTeX) (More info)
  119. C. Cid, H. Gilbert, T. Johansson:
    Cryptanalysis of pomaranch
    IET Proc. Information Security, Vol. 153, No. 2, pp. 51-53, 2006. (BibTeX) (More info)
  120. H. Englund, T. Johansson:
    Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
    International Journal of Security and Networks, Vol. 1, No. 1/2, pp. 95-102, 2006. (BibTeX) (More info)
  121. A. Hamidian, U. Körner:
    An Enhancement to the IEEE 802.11e EDCA Providing QoS Guarantees
    Telecommunications Systems, Vol. 31, No. 2-3, pp. 195-212, 2006. (BibTeX) (More info)
  122. E. Kubilinskas, F. Aslam, M. Dzida, M. Pioro:
    Network protection by single and failure-dependent backup paths - modelling and efficiency comparison
    Systems Science, Vol. 32, No. 3, pp. 5-14, 2006. (BibTeX) (More info)
  123. M. Dzida, M. Zagozdzon, M. Pioro, A. Tomaszewski:
    Design of mixed MPLS/OSPF routing in IP networks
    Systems Science, Vol. 32, No. 3, pp. 55-59, 2006. (BibTeX) (More info)
  124. 2005

  125. A. Maximov, T. Johansson:
    Fast computation of large distributions and its cryptographic applications
    Lecture Notes in Computer Science, Vol. 3788, pp. 313-332, 2005. (BibTeX) (More info)
  126. H. Englund, T. Johansson:
    A new distinguisher for clock controlled stream ciphers
    Lecture Notes in Computer Science, Vol. 3557, pp. 181-195, 2005. (BibTeX) (More info)
  127. M. Pioro, E. Kubilinskas, P. Nilsson:
    Robust dimensioning of proportionally fair networks
    European Transactions on Telecommunications, Vol. 16, No. 3, pp. 241-251, 2005. (BibTeX) (More info)
  128. E. Kubilinskas, P. Nilsson, M. Pioro:
    Design models for robust multi-layer next generation Internet core networks carrying elastic traffic
    Journal of Network and Systems Management, Vol. 13, No. 1, pp. 57-76, 2005. (BibTeX) (More info)
  129. P. Kuhn, R. Lehnert, M. Pioro, J. Wozniak, U. Killat:
    Special Issue - Proceedings PGTS 2002
    European Transactions on Telecommunications, Vol. 16, No. 3, pp. 203-204, 2005. (BibTeX) (More info)
  130. W. Ogryczak, M. Pioro, A. Tomaszewski:
    Telecommunications network design and max-min optimization problems
    Journal of Telecommunications and Information Technology, Vol. 4, pp. 43-53, 2005. (BibTeX) (More info)
  131. S. Srivastava, G. Agrawal, M. Pioro, D. Medhi:
    Determining link weight system under various objectives for OSPF networks using a Lagrangian relaxation-based approach
    IEEE Transactions on Network and Service Management, Vol. 2, No. 1, pp. 9-18, 2005. (BibTeX) (More info)
  132. 2004

  133. A. Trofimov, T. Johansson:
    A memory-efficient optimal APP symbol-elecoding algorithm for linear block codes
    IEEE Transactions on Communications, Vol. 52, No. 9, pp. 1429-1434, 2004. (BibTeX) (More info)
  134. E. Pasalic, T. Johansson, S. Maitra, P. Sarkar:
    New constructions of resilient and correlation immune Boolean functions achieving the upper bound on nonlinearity
    Journal of the Indian Statistical Association, Vol. 42, No. 2, pp. 287-307, 2004. (BibTeX) (More info)
  135. 2003

  136. T. Johansson, E. Pasalic:
    A construction of resilient functions with high nonlinearity
    IEEE Transactions on Information Theory, Vol. 49, No. 2, pp. 494-501, 2003. (BibTeX) (More info)
  137. P. Ekdahl, T. Johansson:
    Another attack on A5/1
    IEEE Transactions on Information Theory, Vol. 49, No. 1, pp. 284-289, 2003. (BibTeX) (More info)
  138. G. Pujolle, U. Körner, H. Perros:
    Resource allocation in the new fixed and mobile Internet generation
    International Journal of Network Management, Vol. 13, No. 4, 2003. (BibTeX) (More info)
  139. 2002

  140. T. Johansson, F. Jönsson:
    On the complexity of some cryptographic problems based on the general decoding problem
    IEEE Transactions on Information Theory, Vol. 48, No. 10, pp. 2669-2678, 2002. (BibTeX) (More info)
  141. T. Johansson, F. Jönsson:
    Theoretical analysis of a correlation attack based on convolutional codes
    IEEE Transactions on Information Theory, Vol. 48, No. 8, pp. 2173-2181, 2002. (BibTeX) (More info)
  142. F. Jönsson, T. Johansson:
    A fast correlation attack on LILI-128
    Information Processing Letters, Vol. 81, No. 3, pp. 127-132, 2002. (BibTeX) (More info)
  143. A. Ourivski, T. Johansson:
    New techniques for decoding codes in rank metric and its cryptographic applications
    Problems of Information Transmission, Vol. 38, No. 3, pp. 237-246, 2002. (BibTeX) (More info)
  144. C. Perkins, J. Malinen, R. Wakikawa, A. Nilsson Plymoth, A. Tuominen:
    Internet connectivity for mobile ad hoc networks
    Wireless Communications & Mobile Computing, Vol. 2, No. 5, pp. 465-482, 2002. (BibTeX) (More info)
  145. M. Pioro, A. Szentesi, J. Harmatos, A. Juttner, P. Gajowniczek, S. Kozdrowski:
    On open shortest path first related network optimisation problems
    Performance Evaluation, Vol. 48, No. 1-4, pp. 201-223, 2002. (BibTeX) (More info)
  146. P. Nilsson, M. Pioro:
    Solving dimensioning tasks for proportionally fair networks carrying elastic traffic
    Performance Evaluation, Vol. 49, No. 2002, pp. 371-386, 2002. (BibTeX) (More info)
  147. P. Nilsson, M. Pioro:
    Optimal link capacity dimensioning in proportionally fair networks
    Performance Evaluation, Vol. 49, No. 1-4, pp. 371-386, 2002. (BibTeX) (More info)
  148. 2001 and earlier

  149. K. K., T. Johansson, S. D.:
    Almost k-wise independent sample spaces and their cryptologic applications
    Journal of Cryptology, Vol. 14, No. 4, pp. 231-254, 2001. (BibTeX) (More info)
  150. M. Höst, B. Regnell, J. Natt och Dag, J. Nedstam, C. Nyberg:
    Exploring Bottlenecks in Market-Driven Requirements Management Processes with Discrete Event Simulation
    Journal of Systems and Software, Vol. 59, No. 3, pp. 323-332, 2001. (BibTeX) (More info)
  151. T. Johansson:
    Further results on asymmetric authentication schemes
    Information and Computation, Vol. 151, No. 1-2, pp. 100-133, 1999. (BibTeX) (More info)
  152. S. Y, T. Johansson, B. Smeets:
    On key and message equivocations in secrecy systems
    Problems of Information Transmission, Vol. 34, No. 2, pp. 197-206, 1998. (BibTeX) (More info)
  153. T. Johansson, K. Zigangirov:
    A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
    IEEE Transactions on Information Theory, Vol. 44, No. 7, pp. 3124-3129, 1998. (BibTeX) (More info)
  154. M. Kihl, C. Nyberg:
    Investigation of overload control algorithms for SCPs in the Intelligent Network
    IEE Proceedings, Vol. 144, No. 6, 1997. (BibTeX) (More info)
  155. T. Johansson, B. Smeets, K. Grigory:
    On the cardinality of systematic authentication codes via error-correcting codes
    IEEE Transactions on Information Theory, Vol. 42, No. 2, pp. 566-578, 1996. (BibTeX) (More info)
  156. T. Johansson:
    Authentication codes for non-trusting parties obtained from rank metric codes
    Designs, Codes and Cryptography, Vol. 6, No. 3, pp. 205-218, 1995. (BibTeX) (More info)
  157. U. Körner:
    On overload control of SPC systems
    Telektronikk, 1995. (BibTeX) (More info)
  158. T. Johansson:
    A shift register construction of unconditionally secure authentication codes
    Designs, Codes and Cryptography, Vol. 4, No. 1, pp. 69-81, 1994. (BibTeX) (More info)
  159. T. Johansson:
    Lower bounds on the probability of deception in authentication with arbitration
    IEEE Transactions on Information Theory, Vol. 40, No. 5, pp. 1573-1585, 1994. (BibTeX) (More info)
  160. C. Wohlin, U. Körner:
    Software faults: spreading, detection and costs
    Software Engineering Journal, Vol. 5, No. 1, pp. 33-42, 1990. (BibTeX) (More info)
  161. M. Pioro, J. Lubacz, U. Körner:
    Traffic engineering problems in multiservice circuit switched networks
    Computer Networks and Isdn Systems, Vol. 20, No. 1-5, pp. 127-136, 1990. (BibTeX) (More info)
  162. G. Shapiro, U. Körner, S. Fdida, H. Perros:
    End to end delays in a catenet environment
    SIGMETRICS Performance Evaluation Review, Vol. 15, No. 3-4, pp. 20-28, 1988. (BibTeX) (More info)

Patents

  1. F. Gabor, M. L. Gabor, M. Pioro:
    Method and apparatus for optimizing elastic flows in a multi-path network for a traffic demand
    US7317684 2008. (BibTeX) (More info)

Conference Papers (Peer reviewed)

    2016

  1. A. Franco, E. Fitzgerald, B. Landfeldt, N. Pappas, V. Angelakis:
    LUPMAC: A cross-layer MAC technique to improve the age of information over dense WLANs
    2016 23rd International Conference on Telecommunications (ICT) (ICT 2016), Thessaloniki, pp. 724-729, 2016-05-15. (In press) (BibTeX) (More info)
  2. D. Åkerman, A. Jönsson, E. Fitzgerald, C. Nyberg, B. Priyanto, K. Agardh:
    Modeling, Implementation and Evaluation of IEEE 802.11ac in NS3 for Enterprise Networks
    Wireless Days, Toulouse, France, 2016-03-23/2016-03-25. (In press) (BibTeX) (More info)
  3. E. Fitzgerald, M. Pioro:
    Performance Evaluation of an Intention Sharing MAC Scheme in Wireless LANs with Hidden Nodes
    17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 2016-06-21/2016-06-24. (In press) (BibTeX) (More info)
  4. 2015

  5. A. Franco, S. Bastani, E. Fitzgerald, B. Landfeldt:
    OMAC: An Opportunistic Medium Access Control Protocol for IEEE 802.11 Wireless Networks
    Prooceedings of IEEE Globecom 2015, IEEE GC 2015 Workshop on Enabling Technologies in Future Wireless Local Area Network (ETFWLALN), San Diego, Vol. 2015 IEEE Globecom Workshops (GC Wkshps), 2015-12-06. (BibTeX) (More info)
  6. E. Fitzgerald, B. Landfeldt:
    The Effect of Emerging Traffic Patterns on High Speed Wireless LANs
    The 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM), Cancun, Mexico, 2015-11-02. (In press) (BibTeX) (More info)
  7. M. Karaca, Z. Zhang, B. Landfeldt:
    An Opportunistic Backoff Scheme for Dense IEEE 802.11 WLANs
    Proc. of the IEEE GLOBECOM'15 WS Enabling Technologies in Future Wireless Local Area Network (ETFWLALN), IEEE Globecom, San Diego, 2015-12-06/2015-12-10. (In press) (BibTeX) (More info)
  8. E. Fitzgerald, S. Bastani, B. Landfeldt:
    Intention Sharing for Medium Access Control in Wireless LANs
    MOBIWAC 2015: The 13th ACM* International Symposium on Mobility Management and Wireless Access, Cancun, Mexico, 2015-11-2. (In press) (BibTeX) (More info)
  9. P. Amani, S. Bastani, B. Landfeldt:
    Towards optimal content replication and request routing in content delivery networks
    International Conference on Communications (ICC), London, United Kingdom, pp. 5733-5739, 2015-06-08/2015-06-12. (BibTeX) (More info)
  10. M. Safavi, M. A. Shafieian:
    Thwarting the probabilistic selfish behaviours in packet forwarding of multihop ad hoc networks
    The 2nd World Symposium On Computer Networks and Information Security, Hammamet, Tunisia, 2015-09-19. (BibTeX) (More info)
  11. M. Safavi, M. A. Shafieian:
    Management of Utilization and Accuracy of Positioning Approaches in Wireless Sensor Networks
    The 2nd World Symposium On Computer Networks and Information Security, Hammamet, Tunisia, 2015-09-19. (BibTeX) (More info)
  12. Q. Guo, T. Johansson, P. Stankovski:
    Coded-BKW: Solving LWE Using Lattice Codes.
    Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science, 35th Annual Cryptology Conference, Santa Barbara, CA, USA,, Vol. 9215, pp. 23-42, 2015-08-16/2015-08-20. (BibTeX) (More info)
  13. P. Lantz, B. Johansson:
    Towards Bridging the Gap Between Dalvik Bytecode and Native Code During Static Analysis of Android Applications
    International Wireless Communications and Mobile Computing Conference 2015, Dubrovnik, Croatia, 2015-08-24. (BibTeX) (More info)
  14. P. Lantz, B. Johansson, M. Hell, B. Smeets:
    Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
    Lecture Notes in Computer Science, 1st Workshop on Wearable Security and Privacy, Financial Crypto, San Juan, Puerto Rico, Vol. 8976, No. Financial Cryptography and Data Security, pp. 261-273, 2015-01-30. (BibTeX) (More info)
  15. A. Capone, M. Pioro, Y. Li, D. Yuan:
    On packet transmission scheduling for min-max delay and energy consumption in wireless mesh sensor networks
    INOC 2015, 7th International Network Optimization Conference, Warsaw, Poland, 2015-05-18/2015-05-20. (In press) (BibTeX) (More info)
  16. Y. Li, A. Capone, D. Yuan:
    On end-to-end delay minimization in wireless network under physical interference model
    IEEE INFOCOM (accept ratio: 19% 316/1640), Hongkong, 2015-04-27. (BibTeX) (More info)
  17. R. Alvizu, G. Maier, M. Tornatore, M. Pioro:
    Differential delay constrained multipath routing for SDN and optical networks
    INOC 2015, 7th International Network Optimzation Conference, Warsaw, Poland, 2015-05-18/2015-05-20. (In press) (BibTeX) (More info)
  18. D. Medhi, M. Mycek, M. Pioro:
    A note on the number of paths required in optical solutions of a classical multicommodity flow problem for an arbitrary cost function
    INOC 2015, 7th International Network Optimzation Conference, Warsaw, Poland, 2015-05-18/2015-05-20. (In press) (BibTeX) (More info)
  19. Y. Fouquet, D. Nace, M. Pioro, M. Poss:
    Elastic Flow Rerouting: a novel rerouting strategy resilient to multiple partial link failures
    INOC 2015, 7th International Network Optimzation Conference, Warsaw, Poland, 2015-05-18/2015-05-20. (In press) (BibTeX) (More info)
  20. 2014

  21. E. Fitzgerald, B. Landfeldt:
    The failure of CSMA in emerging wireless network scenarios
    Wireless Days (WD), 2014 IFIP, Rio de Janeiro, Brazil, pp. 1-4, 2014-11-12. (BibTeX) (More info)
  22. C. Jämthagen, L. Karlsson, P. Stankovski, M. Hell:
    eavesROP: Listening for ROP Payloads in Data Streams
    Information Security/Lecture Notes in Computer Science, ISC 2014, Hong Kong, Vol. 8783, pp. 413-424, 2014-10-12/2014-10-14. (BibTeX) (More info)
  23. Q. Guo, T. Johansson, C. Löndahl:
    Solving LPN Using Covering Codes
    Advances in Cryptology - Asiacrypt 2014, 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), Kaohsiung, Taiwan, Vol. 8873, pp. 1-20, Dec 07-11, 2014. (BibTeX) (More info)
  24. M. Hell, L. Karlsson, B. Smeets, J. Mirosavljevic:
    Using TPM Secure Storage in Trusted High Availability Systems
    Trusted Systems/Lecture Notes in Computer Science, INTRUST 2014, Beijing, China, Vol. 9473, pp. 243-258, 2014-12-16/2014-12-17. (BibTeX) (More info)
  25. N. Paladi, A. Michalas:
    "One of Our Hosts in Another Country": Challenges of Data Geolocation in Cloud Storage
    2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), Aalborg, Denmark, pp. 1-6, MAY 11-14, 2014. (BibTeX) (More info)
  26. P. Stankovski, L. Brynielsson, M. Hell:
    The Efficiency of Optimal Sampling in the Random S-box Model
    ISIT 2014, Honolulu, Hawaii, U.S.A., pp. 1712-1716, 2014-06-29/2014-07-04. (BibTeX) (More info)
  27. L. Libman, S. Bastani, S. T. Waller:
    Real-Time Traffic Monitoring using Wireless Beacons with the Cell Transmission Model
    2014 Ieee 17th International Conference on Intelligent Transportation Systems (Itsc), IEEE 17th International Conference on Intelligent Transportation Systems (ITSC), Qingdao, PEOPLES R CHINA, pp. 1079-1084, 2014-10-08 / 2014-10-11. (BibTeX) (More info)
  28. Y. Li, M. Pioro, V. Angelakisi, D. Yuan, A. Fragkiadakis:
    Mathematical modelling of metric-driven routing and resource allocation in wireless mesh networks
    16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), Funchal, Madeira Island, Portugal, 2014-09-17. (BibTeX) (More info)
  29. Y. Li, N. Pappas, V. Angelakis, M. Pioro, D. Yuan:
    Resilient Topology Design for Free Space Optical Cellular Backhaul Networking
    the Globecom 2014 Workshop - Optical Wireless Communications, Austin, TX, USA, 2014-12-08. (BibTeX) (More info)
  30. M. Holmqvist Olander, E. Wennås Brante, M. Nyström:
    The Image of Images as an Aid to Improve Learning : An Eye-tracking Experiment Studying the Effect of Contrasts in Computer-based Learning Material
    CSEDU 2014 : 6th International Conference on Computer Supported Education ; Barcelona, April 2 - 4, 2014, Barcelona, Spain, pp. 309-316, 2014-04-01/2014-04-03. (BibTeX) (More info)
  31. J. Pihel, Å. Sang, C. Hägerhäll, M. Nyström:
    Assessments and Eye Movements Compared between Photographs and Visualizations of Logged Forest Vistas : For What Kind of Assessments are Visualisations a Good Representation of Photographs?
    Peer Reviewed Proceedings of Digital Landscape Architecture 2014 at ETH Zurich, Digital Landscape Architecture DLA 2014, ETH Zurich, pp. 344-351, 2014-05-21/2014-05-23. (BibTeX) (More info)
  32. L. Larsson, M. Nyström, M. Stridh:
    Discrimination of fixations and smooth pursuit movements in high-speed eye-tracking data
    Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE, Chicago, Illinois, USA, pp. 3797-3800, 2014-08-26/2014-08-30. (BibTeX) (More info)
  33. L. Larsson, A. Schwaller, K. Holmqvist, M. Nyström, M. Stridh:
    Compensation of Head Movements in Mobile Eye-Tracking Data Using an Inertial Measurement Unit
    Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, Seattle, Washington, USA, pp. 1161-1167, 2014-09-13/2014-09-17. (BibTeX) (More info)
  34. W. Ben-Ameur, M. ?otkiewicz, M. Pioro:
    Failure disjoint paths
    2014 INFORMS Telecommunications Conference, Lisbon, Portugal, 2014-03-02/2014-03-04. (BibTeX) (More info)
  35. M. Klinkowski, M. Pioro, M. ?otkiewicz, M. Ruiz, L. Velasco:
    Valid Inequalities for the Routing and Spectrum Allocation Problem in Elastic Optical Networks
    16th International Conference on Transparent Optical Networks (ICTON), Graz, Austria, 2014-07-06/2014-07-10. (BibTeX) (More info)
  36. Y. Fouquet, D. Nace, M. Pioro, M. Poss, M. ?otkiewicz:
    Flow adjustment methods for survivable networks
    16th International Telecommunications Network Strategy and Planning Symposium (Networks), 2014, Funchal, Portugal, 2014-09-17/2014-09-19. (BibTeX) (More info)
  37. X. Liu, S. Mohanraj, M. Pioro, D. Medhi:
    Multipath Routing From a Traffic Engineering Perspective: How Beneficial is It?
    IEEE 22nd International Conference on Network Protocols (ICNP), Raleigh, NC, USA, pp. 143-154, 2014-10-21/2014-10-24. (BibTeX) (More info)
  38. M. Pioro, A. Tomaszewski, M. ?otkiewicz, M. Klinkowski, M. Jaworski, M. Gunkel:
    Elastic Multi-Layer Resilient IP-over-Flexgrid Networking: Detailed Cost Analysis with Bandwidth-Variable Transponders
    16th International Conference on Transparent Optical Networks (ICTON), Graz, Austria, 2014-07-06/2014-07-10. (BibTeX) (More info)
  39. Y. Fouquet, D. Nace, M. Pioro, M. Poss, M. ?otkiewicz:
    Elastic Rerouting - models and resolution methods
    2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM), Barcelona, Spain, pp. 47-53, 2014-11-17/2014-11-19. (BibTeX) (More info)
  40. R. Kaddah, D. Kofman, M. Pioro:
    Advanced demand response solutions based on fine-grained load control
    IEEE International Workshop on Intelligent Energy Systems (IWIES), San Diego, CA, USA, pp. 38-45, 2014-10-08. (BibTeX) (More info)
  41. M. Pioro, S. Mohanraj, D. Medhi, X. Liu:
    New Results on Multipath Routing
    2014 INFORMS Telecommunications Conference, Lisbon, Portugal, 2014-03-02/2014-03-04. (BibTeX) (More info)
  42. Y. Fouquet, M. Pioro, D. Nace, M. Poss, M. Zotkiewicz:
    An optimization model for communication networks resilient to partial multiple link failures
    2014 INFORMS Telecommunications Conference, Lisbon, Portugal, 2014-03-02/2014-03-04. (BibTeX) (More info)
  43. Y. Fouquet, D. Nace, M. Pioro, M. Poss:
    Flow Adjustment - a Flexible Routing Strategy for Demand Protection Against Multiple Partial Link Failures
    The Fourth International Conference on Advanced Communications and Computation, INFOCOMP 2014, Paris, France, 2014-07-20/2014-07-24. (BibTeX) (More info)
  44. M. Ruiz, M. ?otkiewicz, A. Castro, M. Klinkowski, L. Velasco, M. Pioro:
    After failure repair optimization in dynamic flexgrid optical networks
    Optical Fiber Communication Conference and Exposition (OFC 2014), San Francisco, USA, 2014-03-09/2014-09-13. (BibTeX) (More info)
  45. M. S. R. Sakib, M. A. Quyum, K. Andersson, K. Synnes, U. Körner:
    Improving Wi-Fi based Indoor Positioning using Particle Filter based on Signal Strength
    2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 9th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, pp. 1-6, April 21-24, 2014. (BibTeX) (More info)
  46. 2013

  47. Y. Li, M. Pioro, B. Landfeldt:
    Improving minimum flow rate in wireless mesh networks by effective placement of directional antennas
    The 16th ACM/IEEE International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2013, accept ratio: 26%), Barcelona, Spain, pp. 15-22, 2013-11-03. (BibTeX) (More info)
  48. E. Fitzgerald, B. Landfeldt:
    On Road Network Utility Based on Risk-Aware Link Choice
    International IEEE Conference on Intelligent Transportation Systems, The Hague, Netherlands, 2013-10-06. (BibTeX) (More info)
  49. E. Fitzgerald, B. Landfeldt:
    Trading Accuracy and Resource Usage in Highly Dynamic Vehicular Networks
    International IEEE Conference on Intelligent Transportation Systems, The Hague, Netherlands, 2013-10-06. (BibTeX) (More info)
  50. A. Vahidi, C. Jämthagen:
    Secure RPC in embedded system - Evaluation of some GlobalPlatform implementation alternatives
    WESS, Montreal, Canada, 2013-09-29. (BibTeX) (More info)
  51. C. Jämthagen, P. Lantz, M. Hell:
    A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
    Workshop on Anti-malware Testing Research (WATeR), Montreal, Canada, pp. 25-33, 2013-10-30. (BibTeX) (More info)
  52. T. Johansson, C. Löndahl:
    A new algorithm for finding low-weight polynomial multiples and its application to TCHo
    Preproceedings The International Workshop on Coding and Cryptography WCC 2013, International Workshop on Coding and Cryptography, WCC 2013, Bergen, Norway, 2013-04-15/2013-04-19. (BibTeX) (More info)
  53. X. Gao, O. Edfors, J. Liu, F. Tufvesson:
    Antenna selection in measured massive MIMO channels using convex optimization
    IEEE GLOBECOM 2013 Workshop on Emerging Technologies for LTE-Advanced and Beyond-4G, Atlanta, Georgia, USA, 2013-12-13. (BibTeX) (More info)
  54. Y. Li, M. Pioro:
    Integer programming models for maximizing parallel transmissions in wireless networks
    International Network Optimization Conference, Tenerife, Spain, 2013-05-20. (BibTeX) (More info)
  55. Y. Li, M. Pioro, V. Angelakis:
    Design of Cellular Backhaul Topology Using the FSO Technology
    International Workshop on Optical Wireless Communications, Newcastle Upon Tyne, UK, 2013-10-21. (BibTeX) (More info)
  56. A. Strukelj, M. Nyström, C. Paradis:
    Reading What You Think You See. Good Enough Representations and Lingering Effects of Error Correction: Evidence from Antonymic Pairs
    Scandianavian Association for Language and Cognition, Joensuu, Finland, 2013-06-12. (BibTeX) (More info)
  57. M. Pioro, D. Nace, M. Poss:
    Traffic Performance of Affine Flow Thinning
    2nd European Teletraffic Seminar (ETS 2013), Karlskrona, Sweden, 2013-09-30/2013-10-02. (BibTeX) (More info)
  58. Y. Fouquet, D. Nace, M. Pioro, I. Shinko:
    Elastic routing: A distributed variant, implementation issues and numerical results
    Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Compiegne , France, pp. 98-104, 2013-10-28/2013-10-30. (BibTeX) (More info)
  59. M. Pioro, D. Nace, Y. Fouquet:
    An optimization model for communication networks with partial multiple failures
    5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Almaty, Kazakhstan, pp. 171-178, 2013-09-10/2013-09-13. (BibTeX) (More info)
  60. M. Zotkiewicz, M. Pioro, M. Ruiz, M. Klinkowski, L. Velasco:
    Optimization models for flexgrid elastic optical networks
    15th International Conference on Transparent Optical Networks (ICTON), Cartagena, Spain, 2013-06-23/2013-06-27. (BibTeX) (More info)
  61. M. Mycek, M. Pioro:
    A distributed scheme for resolution of the single-path routing problem
    9th International Conference on the Design of Reliable Communication Networks (DRCN), 2013, Budapest, Hungary, pp. 210-217, 2013-03-04/2013-03-07. (BibTeX) (More info)
  62. M. Pioro, D. Nace, Y. Fouquet:
    On protected traffic routing in wireless networks with partial multiple link failures
    8th IEEE International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), Compiegne, FRANCE, pp. 22-28, 2013-10-28/2013-10-30. (BibTeX) (More info)
  63. 2012

  64. S. Bastani, B. Landfeldt, C. Rohner, P. Gunningberg:
    A social node model for realising information dissemination strategies in delay tolerant networks
    Modeling, analysis and simulation of wireless and mobile systems, Cyprus, pp. 79-78, 2012-10-21/2012-10-25. (BibTeX) (More info)
  65. E. Fitzgerald, B. Landfeldt:
    A System for Coupled Road Traffic Utility Maximisation and Risk Management Using VANET
    International IEEE Conference on Intelligent Transportation Systems (ITSC 2012), Anchorage, AL, 2012-09-16/2012-09-19. (BibTeX) (More info)
  66. S. Bastani, B. Landfeldt, C. Rohner, P. Gunningberg:
    A Social Node Model for Realising Information Dissemination Strategies in Delay Tolerant Networks
    MSWIM, ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Paphos, Cyprus, 2012-10-21. (In press) (BibTeX) (More info)
  67. Q. Tse, B. Landfeldt:
    Interference-Aware Geocasting for VANET
    WoWMoM, VANET from Theory to Practice, San Francisco, CA, 2012-06-25. (BibTeX) (More info)
  68. M. Iftikhar, M. Zuair, A. Malik, B. Rahhal, M. Rahal, J. Taheri, A. Zomaya, B. Landfeldt:
    The Implementation of Novel Idea of Translation Matrix to Maintain QoS for a Roaming User Between Heterogeneous 4G Wireless Networks
    IEEE Performance and Management of Mobile and Wireless Networks, Clearwater, FL, 2012-10-22. (BibTeX) (More info)
  69. M. Ågren, M. Hell, T. Johansson, C. Löndahl:
    Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
    7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012, 7th International Symposium on Turbo Codes & Iterative Information Processing, Gothenburg, pp. 260-264, 2012-08-27/2012-08-31. (BibTeX) (More info)
  70. C. Löndahl, T. Johansson:
    A new version of McEliece PKC based on convolutional codes
    LNCS, International Conference on Information and Communications Security, Hong Kong, 2012-10-29. (In press) (BibTeX) (More info)
  71. M. A. Abdelraheem, M. Ågren, P. Beelen, G. Leander:
    On The Distribution of Linear Biases: Three Instructive Examples
    Lecture Notes in Computer Science, CRYPTO, Santa Barbara, CA, 2012-08-19/2012-08-23. (In press) (BibTeX) (More info)
  72. M. Ågren:
    Some instant- and practical-time related-key attacks on KTANTAN32/48/64
    LNCS, Selected Areas in Cryptography, Toronto, Canada, 2011-08-10 /2011-08-12. (In press) (BibTeX) (More info)
  73. P. Stankovski, M. Hell:
    An Optimal Sampling Technique for Distinguishing Random S-boxes
    Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, ISIT 2012, Cambridge, MA, U.S.A., pp. 846-850, 2012-07-01/2012-07-06. (BibTeX) (More info)
  74. P. Stankovski, M. Hell, T. Johansson:
    Analysis of Xorrotation With Application to an HC-128 Variant
    LNCS, ACISP 2012, Wollongong, Australia, Vol. 7372, pp. 419-425, 2012-07-09. (BibTeX) (More info)
  75. Y. Li, M. Pioro, D. Yuan, J. Su:
    On Joint Optimization of Link Rate Assignment and Transmission Scheduling in Wireless Mesh Networks
    The 15th International Telecommunications Network Strategy and Planning Symposium, Rome, Italy, 2012-10-15/2012-10-18. (BibTeX) (More info)
  76. M. Leonardo A, Z. Albin, B. Smeets, H. Sheikh M., T. Johansson, S. Nahid:
    Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
    The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012), Fukuoka, Japan, 2012-09-04/2012-09-07. (BibTeX) (More info)
  77. P. Blignaut, K. Holmqvist, M. Nyström, R. Dewhurst:
    Improving the accuracy of video-based eye-tracking in real-time through post-calibration regression
    Proceedings of the 2012 Eye Track Australia Conference, The 2012 Eye Track Australia Conference, Noosaville, QLD, Australia, 2012-05-31. (BibTeX) (More info)
  78. M. Nyström, M. Ögren:
    A pilot study of problem solving in vector calculus using eye-tracking
    Lunds universitets utvecklingskonferens 2011, Lund, Sweden, pp. 118-123, 2011-10-13. (BibTeX) (More info)
  79. K. Holmqvist, M. Nyström, F. Mulvey:
    Eye tracker data quality : what it is and how to measure it
    ETRA '12 Proceedings of the Symposium on Eye Tracking Research and Applications, Santa Barbara, CA, pp. 45-52, 2012-03-27. (BibTeX) (More info)
  80. M. Nyström, M. Ögren:
    How illustrations influence performance and eye movement behaviour when solving problems in vector calculus
    LTHs 7:e Pedagogiska Inspirationskonferens, Lund, Sweden, 2012-08-30. (BibTeX) (More info)
  81. M. Pioro:
    Max-Min Fair Optimization Models in Network Design
    Eleventh INFORMS Telecommunications Conference, Boca Raton, FL, 2012-03-15/2012-03-17. (BibTeX) (More info)
  82. M. Zotkiewicz, M. Pioro:
    Mixed Integer Programming Model of MCCA-aware Acknowledging in Wireless Mesh Networks
    Polish Teletraffic Symposium 2012 (PTS 2012), Zakopane, Poland, pp. 17-22, 2012-12-05. (BibTeX) (More info)
  83. 2011

  84. C. Jämthagen, M. Hell, B. Smeets:
    A Technique for Remote Detection of Certain Virtual Machine Monitors
    Lecture Notes in Computer Science, The Third International Conference on Trusted Systems, INTRUST 2011, Beijing, Vol. 7222, 2011-11-27/2011-11-29. (In press) (BibTeX) (More info)
  85. M. Ågren, M. Hell, T. Johansson, W. Meier:
    A New Version of Grain-128 with Authentication
    Symmetric Key Encryption Workshop 2011, Lyngby, Denmark, 2011-02-16/2011-02-17. (BibTeX) (More info)
  86. M. Ågren, M. Hell:
    Cryptanalysis of the Stream cipher BEAN
    The 4th International Conference on Security of Information and Networks, Sydney, Australia, pp. 21-28, 2011-11-14 /2011-11-19. (BibTeX) (More info)
  87. M. Ågren, M. Hell, T. Johansson:
    On Hardware-Oriented Message Authentication with Applications Towards RFID
    2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, LightSec 2011, Istanbul, Turkey, pp. 26-33, 2011-03-14/2011-03-15. (BibTeX) (More info)
  88. K. Lång, S. Zackrisson, K. Holmqvist, M. Nyström, I. Andersson, D. Förnvik, A. Tingberg, P. Timberg:
    Can horizontally oriented breast tomosynthesis image volumes or the use of a systematic search strategy improve interpretation? An eye tracking and free response human observer study
    Proc. SPIE, Medical Imaging 2011: Image Perception, Observer Performance, and Technology Assessment, Lake Buena Vista, Florida, USA, Vol. 7966, No. 796606, 2011-02-16. (BibTeX) (More info)
  89. K. Lång, S. Zackrisson, K. Holmqvist, M. Nyström, I. Andersson, D. Förnvik, A. Tingberg, P. Timberg:
    Optimizing viewing procedures of breast tomosynthesis image volumes using eye tracking combined with a free response human observer study
    Medical Imaging 2011: Image Perception, Observer Performance, and Technology Assessment / SPIE Proceedings, Vol. 7966, No. 796602, 2011. (BibTeX) (More info)
  90. Q. Wang, T. Johansson:
    A note on fast algebraic attacks and higher order nonlinearities
    Lecture Notes in Computer Science, INSCRYPT 2010, Shanghai, China, 2010-10-20/2010-10-24. (In press) (BibTeX) (More info)
  91. Q. Wang, T. Johansson:
    On equivalence classes of Boolean functions
    Lecture Notes in Computer Science, ICISC 2010, Seoul, Korea, 2010-12-01/2010-12-03. (In press) (BibTeX) (More info)
  92. M. ?otkiewicz, M. Pioro:
    Reliability of Wireless Mesh Networks with directional antennas
    3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011, 3rd International Workshop on Reliable Networks Design and Modeling (RNDM 2011), Budapest, Hungary, 2011-10-05/2011-10-07. (BibTeX) (More info)
  93. D. Nace, M. Pioro, A. Tomaszewski, M. ?otkiewicz:
    A polynomial multicommodity flow problem with difficult path generation
    3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011, 3rd International Workshop on Reliable Networks Design and Modeling (RNDM 2011), Budapest, Hungary, 2011-10-05/2011-10-07. (BibTeX) (More info)
  94. M. Pioro, U. Körner, D. Yuan:
    On Max-min Fair Flow Optimization in Wireless Mesh Networks
    SNOW 2011 : The Second Nordic Workshop on System and Network Optimization for Wireless, Sälen, Sweden, 2011-03-24/2011-03-26. (BibTeX) (More info)
  95. M. Zotkiewicz, M. Pioro:
    Modeling wireless mesh networks with directional antennas
    1st European Traffic Seminar, Pozna?, Poland, 2011-02-06/2011-02-14. (BibTeX) (More info)
  96. 2010

  97. A. Dey, M. Hell, C. C. Rolf, P. Stankovski, M. Ågren:
    Laboratory instructions as a cause of student dissonance
    LTHs 6:e Pedagogiska Inspirationskonferens, Lund, Sweden, 2010-12-15. (BibTeX) (More info)
  98. P. Stankovski:
    Greedy distinguishers and nonrandomness detectors
    Progress in Cryptology - INDOCRYPT 2010 / Lecture Notes in Computer Science, INDOCRYPT 2010, 11th International Conference on Cryptology in India, Hyderabad, India, Vol. 6498, pp. 210-226, 2010-12-12/2010-12-15. (BibTeX) (More info)
  99. M. Hell:
    Using Coding Techniques to Analyze Weak Feedback Polynomials
    Proceedings, IEEE International Symposium on Information Theory, Austin, Texas, pp. 2523-2527, 2010-06-13/2010-06-18. (BibTeX) (More info)
  100. H. Jarodzka, K. Holmqvist, M. Nyström:
    A Vector-based, Multidimensional Scanpath Similarity Measure
    Eye Tracking Research & Applications, Austin, TX, pp. 211-218, 2010. (BibTeX) (More info)
  101. H. Jarodzka, T. Balslev, K. Holmqvist, M. Nyström, K. Scheiter, P. Gerjets, B. Eika:
    Learning perceptual aspects of diagnosis in medicine via eye movement modeling examples on patient video cases
    Cognition in Flux : Proceedings of the 32nd Annual Meeting of the Cognitive Science Society, 32nd Annual Conference of the Cognitive Science Society, Portland, Oregon, pp. 1703-1708, 2010-08-11/2010-08-14. (BibTeX) (More info)
  102. H. Jarodzka, B. Thomas, K. Holmqvist, M. Nyström, G. Peter, E. Berit:
    Fostering Perceptual Skills in Medical Diagnosis
    Meeting of the EARLI SIG6/7 Instructional Design and Learning and Instruction with Computers, Ulm, Germany, 2010-08-30/2010-09-01. (BibTeX) (More info)
  103. U. Körner, M. Pioro, C. Nyberg, A. Hamidian:
    Routing and QoS in mesh networks - dynamic and static algorithms
    Advanced Reliability Modelling, pp. 365-372, 2010. (BibTeX) (More info)
  104. D. Santos, A. Sousa, F. Alvelos, M. Pioro:
    Link Load Balancing Optimization of Telecommunication Networks: a Column Generation based Approach
    14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), Warsaw , Poland, 2010-09-27/2010-09-30. (BibTeX) (More info)
  105. M. Klinkowski, P. Pedroso, M. Pioro, D. Careglio, J. Solé-Pareta:
    Virtual Topology Design in OBS Networks
    12th International Conference on Transparent Optical Networks (ICTON), Munich, Germany, 2010-06-27/2010-07-01. (BibTeX) (More info)
  106. M. Zotkiewicz, W. Ben-Ameur, M. Pioro:
    Failure disjoint paths
    International Symposium on Combinatorial Optimization, Hammamet, Tunesia, 2010-03-24/2010-03-26. (BibTeX) (More info)
  107. W. Ben-Ameur, P. Pavon-Marino, M. Pioro:
    On traffic domination in communication networks (invited paper)
    Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges/Lecture notes in computer science, Performance evaluation of computer and communication systems: milestones and future challenges, Vienna, Austria, Vol. 6821, pp. 191-202, 2010-10-14/2010-10-20. (BibTeX) (More info)
  108. F. Solano, M. Pioro:
    WDM network re-optimization avoiding costly traffic disruptions
    2nd International Workshop on Reliable Network Design and Modeling, Moscow, Russia, 2010-10-18/2010-10-20. (In press) (BibTeX) (More info)
  109. M. Pioro, A. Tomaszewski, C. Zukowski, D. Hock, M. Hartmann, M. Menth:
    Optimized IP-based vs. explicit paths for one-to-one backup in MPLS fast reroute
    14th International Telecommunications Network Strategy and Planning Symposium NETWORKS 2010, Warsaw, Poland, 2010-09-27/2010-09-30. (BibTeX) (More info)
  110. 2009

  111. M. Ågren, T. Johansson, M. Hell:
    Improving the rainbow attack by reusing colours
    Cryptology and Network Security/Lecture Notes in Computer Science, 8th International Conference, CANS 2009, Kanazawa, Japan, Vol. 5888, pp. 362-378, 2009-12-12/2009-12-14. (BibTeX) (More info)
  112. P. Stankovski, M. Hell, T. Johansson:
    An efficient state recovery attack on X-FCSR-256
    Fast Software Encryption/Lecture Notes in Computer Science, 16th International Workshop, FSE 2009, Leuven, Belgium, Vol. 5665, pp. 23-37, 2009-02-22/2009-02-25. (BibTeX) (More info)
  113. M. Hell, L. Brynielsson:
    Another look at weak feedback polynomials in the nonlinear combiner
    IEEE International Symposium on Information Theory, Seoul, South Korea, pp. 1115-1119, 2009-06-28/2009-07-03. (BibTeX) (More info)
  114. A. Hamidian, C. E. Palazzi, T. Y. Chong, J. M. Navarro, U. Körner, M. Gerla:
    Deployment and Evaluation of a Wireless Mesh Network
    The Second International Conference on Advances in Mesh Networks (MESH 2009), Athens, Greece, pp. 66-72, June 2009. (BibTeX) (More info)
  115. A. Hamidian, U. Körner:
    Distributed reservation-based QoS in Ad Hoc networks with internet access connectivity
    2009 21ST INTERNATIONAL TELETRAFFIC CONGRESS (ITC 21), 21st International Teletraffic Congress (ITC 21), Paris, France, pp. 33-40, September 2009. (BibTeX) (More info)
  116. H. Persson, J. M. Karlsson:
    Evaluation of Inter-System Handover Frequency in a Hierarchical Structure
    2009 Global Mobile Congress, Global Mobile Congress 2009, Shanghai, China, pp. 441-445, Oct 12-14, 2009. (BibTeX) (More info)
  117. M. Mycek, S. Secci, M. Pioro, J. L. Rougier, A. Tomaszewski, A. Pattavina:
    Cooperative Multi-Provider Routing Optimization and Income Distribution
    7th International Workshop on Design of Reliable Communication Networks, DRCN 2009., Washington, DC, pp. 281-288, 2009-10-25/2009-10-28. (BibTeX) (More info)
  118. S. Orlowski, M. Pioro:
    On the complexity of column generation in survivable network design with path-based survivability mechanisms
    International Network Optimization Conference INOC?2009, Pisa, Italy, 2009-04-26/2009-04-29. (BibTeX) (More info)
  119. D. Santos, A. de sousa, F. Alvelos, M. Dzida, M. Pioro, M. Zagozdzon:
    Traffic engineering of multiple spanning tree routing networks: the load balancing case
    5th Euro-NGI on next generation internet networks, NGI 2009, Eveiro, Portugal, 2009-07-01/2009-07-03. (BibTeX) (More info)
  120. M. Dzida, T. Sliwinski, M. Zagozdzon, W. Ogryczak, M. Pioro:
    An optimization model for path diversity protection in IP-over-WDM networks
    International network optimization conference, INOC 2009, Pisa, Italy, 2009-04-26/2009-04-29. (BibTeX) (More info)
  121. A. Tomaszewski, M. Pioro:
    Minimization of label usage in (G) MPLS network
    43rd annual Asilomar conference on signals, systems and computers, Pacific Groove, CA, pp. 1053-1057, 2009-11-01/2009-11-04. (BibTeX) (More info)
  122. F. Solano, M. Zotkiewicz, M. Pioro:
    Online impairments-aware routing within a path computation element
    43rd Asilomar conference on signals, systems and computers, Pacific Grove, CA, pp. 1048-1052, 2009-11-01/2009-11-04. (BibTeX) (More info)
  123. F. Solano Donado, M. Pioro, J. L. Marzo, R. Fabregat:
    Self-protection: a novel protection scheme for all-optical packet switching networks
    ICUMT 2009 - International Conference on Ultra Modern Telecommunications, Saint Petersburg, Russia, 2009-10-12/2009-10-14. (BibTeX) (More info)
  124. F. Solano Donado, M. Pioro:
    Optimizing maximum disruption during reconfiguration of lightpaths
    16th Polish Teletraffic Symposium (PTS), Lodz, Poland, 2009-09-24/2009-09-25. (BibTeX) (More info)
  125. F. Solano Donado, M. Pioro:
    A mixed-integer programming formulation for the LIGHPATH RECONFIGURATION problem
    WGN8 - VIII Workshop in G/MPLS Networks, Girona, Spain, 2009-06-29. (BibTeX) (More info)
  126. S. Secci, J. L. Rougier, A. Pattavina, M. Mycek, M. Pioro, A. Tomaszewski:
    Connection-oriented service management in provider alliances: a Shapley value perspective
    Euro-NF 5th Int. Workshop on Traffic Management and Engineering for the Future Internet, Paris, France, pp. 3-4, 2009-12-07/2009-12-08. (BibTeX) (More info)
  127. M. Mycek, S. Secci, M. Pioro, J. L. Rougier, A. Tomaszewski, A. Pattavina:
    Cooperative multi-provider eouting optimization and income distribution
    7th International Workshop on Design of Reliable Communication Networks, DRCN 2009, Washington DC, pp. 281-288, 2009-10-25/2009-10-28. (BibTeX) (More info)
  128. M. Mycek, M. Pioro, S. Secci, J. L. Rougier, A. A. Pattavina:
    A Shapley value-based incentive scheme for cooperative traffic management
    Proceedings of the 16th Polish Teletraffic Symposium (PTS), ?odz, Poland, 2009-09-24/2009-09-25. (BibTeX) (More info)
  129. 2008

  130. M. Hell, T. Johansson:
    Breaking the F-FCSR-H stream cipher in real time
    Advances in Cryptology / Lecture Notes in Computer Science, ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, Vol. 5350, pp. 557-569, 2008-12-07/2008-12-11. (BibTeX) (More info)
  131. T. Johansson, A. Trofimov:
    One-sweep APP decoding algorithm for binary block codes with reduced trellis memory
    Proceedings of coding theory days in St.Petersburg, pp. 88-93, 2008-10-06/2008-10-10. (BibTeX) (More info)
  132. H. Persson, R. Zander, J. M. Karlsson:
    Inter-system handover on a cellular level in a hierarchical structure
    ICOIN 2008: International Conference on Information Networking, Busan, South Korea, pp. 297-301, Jan 23-25, 2008. (BibTeX) (More info)
  133. J. M. Karlsson, H. Persson:
    Hierarchical Structure of Wireless Systems - an Analytical Performance Study
    2008 Ieee 19Th International Symposium On Personal, Indoor And Mobile Radio Communications, 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Cannes, FRANCE, pp. 2509-2514, SEP 15-18, 2008. (BibTeX) (More info)
  134. M. Mycek, A. Tomaszewski, M. Pioro:
    A Scheme for Cooperative Optimization of Flows on Inter-Domain Links
    5th Polish-German Teletraffic Symposium (PGTS 2008), Berlin; Germany, 2008-10-06. (BibTeX) (More info)
  135. M. Pioro, T. ?liwi?ski, M. Zago?d?on, M. Dzida, W. Ogryczak:
    Path generation issues for survivable network design
    Computational Science and Its Applications /Lecture Notes in Computer Science, ICCSA 2008, Perugia, Italy, Vol. 5073, pp. 820-835, 2008-06-30/2008-07-03. (BibTeX) (More info)
  136. M. Dzida, T. Sliwinski, M. Zagozdzon, W. Ogryszak, M. Pioro:
    Path generation for a class of survivable network design problems
    3rd Euro NGI Conference on Next Generation Internet Networks 2008 (NGI 2008), Cracow, Poland, pp. 31-38, 2008-04-28/2008-04-30. (BibTeX) (More info)
  137. M. Zotkiewicz, M. Pioro, A. Tomaszewski:
    Complexity of resilient network optimization
    5th Polish-German Teletraffic Symposium (PGTS'08), Berlin, Germany, pp. 99-106, 2008-10-06/2008-10-07. (BibTeX) (More info)
  138. M. Dzida, M. Zagozdzon, M. Zotkiewicz, M. Pioro:
    Flow optimization in IP networks with fast proactive recovery
    Proceedings of NETWORKS 2008, 13th International Telecommunications Network Strategy and Planning Symposium, Networks 2008., Budapest, Hungary, 2008-09-28/2008-10-02. (BibTeX) (More info)
  139. M. Dzida, M. Zagozdzon, M. Zotkiewicz, M. P. Wallander, M. Pioro, M. Duelli, M. Menth:
    Three methods for optimizing single-shortest path routing
    The 3rd Euro NGI Conference on Next Generation Internet Networks 2008 (NGI 2008), Cracow, Poland, pp. 61-68, 2008-04-28/2008-04-30. (BibTeX) (More info)
  140. M. Mycek, A. Tomaszewski, M. Pioro:
    A scheme for cooperative optmization of flows on inter-domain links
    5th Polish-German Teletraffic Symposium (PGTS'08), Berlin, Germany, pp. 83-94, 2008-10-06/2008-10-07. (BibTeX) (More info)
  141. I. Margasinski, M. Pioro:
    On traffic performance measures for anonymous P2P networks
    5th Polish-German Teletraffic Symposium (PGTS'08), Berlin, Germany, pp. 139-147, 2008-10-06/2008-10-07. (BibTeX) (More info)
  142. I. Margasinski, M. Pioro:
    A concept of an anonymous direct P2P distribution overlay system
    22nd International Conference on Advanced Information Networking and Applications, 2008. AINA 2008, Ginowan, Okinawa, Japan, pp. 590-597, 2008-03-25/2008-03-28. (BibTeX) (More info)
  143. M. Klinkowski, M. Pioro, D. Careglio, M. ?otkiewicz, F. Solano, J. Solé-Pareta::
    Physical Layer Impairment Aware Routing and Wavelength Assignment in Optical Networks
    COST 293 GRAAL Workshop (co-located with DISC 2008), Arcachon, France, 2008-09-24. (BibTeX) (More info)
  144. I. Margasinski, M. Pioro:
    Low-latency parallel transport in anonymous peer-to-peer overlays
    IP operations and management / Lecture notes in computer science, 8th IEEE international workshop, IPOM 2008, Samos Island, Greece, Vol. 5275, pp. 127-141, 2008-09-22/2008-09-26. (BibTeX) (More info)
  145. 2007

  146. M. Hell, T. Johansson:
    Cryptanalysis of Achterbahn-Version 2
    Selected Areas in Cryptography / Lecture notes in computer science), 13th International Workshop, SAC 2006, Montreal, Canada, Vol. 4356, pp. 45-55, 2006-08-17/2006-08-18. (BibTeX) (More info)
  147. M. Hell, T. Johansson:
    On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
    Selected Areas in Cryptography/Lecture notes in computer science), 13th International Workshop, SAC 2006, Montreal, Canada, Vol. 4356, pp. 220-233, 2006-08-17/2006-08-18. (BibTeX) (More info)
  148. M. Hell, T. Johansson:
    A key recovery attack on Edon80
    Advances in Cryptology / Lecture Notes in Computer Science, ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, Vol. 4833, pp. 568-581, 2007-12-02/2007-12-06. (BibTeX) (More info)
  149. H. Englund, T. Johansson, M. Hell:
    Two General Attacks on Pomaranch-like Keystream Generators
    Fast Software Encryption / Lecture Notes in Computer Science, 14th International Workshop, FSE 2007, Luxembourg, March 26-28, 2007, Vol. 4593, pp. 274-289, 2007-03-26/2007-03-28. (BibTeX) (More info)
  150. H. Englund, M. Hell, T. Johansson:
    A note on distinguishing attacks
    IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, pp. 87-90, 2007-07-01/2007-07-06. (BibTeX) (More info)
  151. M. Nyström, K. Holmqvist:
    Variable resolution images and their effects on eye-movements during free-viewing
    Proceedings of SPIE - The International Society for Optical Engineering, Human Vision and Electronic Imaging XII, San Jose, CA, United States, Vol. 6492, pp. 49216-49216, 2007-01-29/2007-02-01. (BibTeX) (More info)
  152. M. Nyström, J. D. Gibson, J. B. Anderson:
    Multiple description image coding using regions of interest
    Proceedings, 41st Asilomar Conference on Signals, Systems, and Computers, November 4-7, 2007, the 41st Annual Asilomar Conference on Signals, Systems, and Computers, November 4-7, 2007, Pacific Grove, CA, pp. 925-929, 2007-11-04/2007-11-07. (BibTeX) (More info)
  153. H. Englund, T. Johansson, M. Sönmez Turan:
    A framework for chosen IV statistical analysis of stream ciphers
    Progress in Cryptology / Lecture Notes in Computer Science, 8th International Conference on Cryptology in India INDOCRYPT 2007, Chennai, India, Vol. 4859, pp. 268-281, 2007-12-09/2007-12-13. (BibTeX) (More info)
  154. A. Hamidian, U. Körner:
    Providing QoS in Ad Hoc Networks with Distributed Resource Reservation
    20th International Teletraffic Congress (ITC 20), Ottawa, Canada, Vol. 4516, pp. 309-320, June 2007. (BibTeX) (More info)
  155. A. Nilsson Plymoth, P. Johansson, U. Körner:
    Cross layer routing and media access control with channel dependant forwarding in wireless ad-hoc networks
    Wireless Systems and Mobility in Next Generation Internet / Lecture Notes in Computer Science, Third International Workshop of the EURO-NGI Network of Excellence, Sitges, Spain, Vol. 4396, pp. 73-86, 2006-06-06/2006-06-09. (BibTeX) (More info)
  156. E. Kubilinskas, F. Aslam, M. Pioro, M. Dzida:
    Recovery, routing and load balancing strategy for an IP/MPLS network
    Managing Traffic Performance in Converged Networks / Lecture notes in computer science, 20th International Teletraffic Congress, ITC20 2007, Ottawa, Ont., Canada, Vol. 4516, pp. 65-76, 2007-07-17/2007-07-21. (BibTeX) (More info)
  157. U. Ahlfors, O. Carlqvist, F. Nilsson, M. Sandsten:
    Civilingenjörsutbildningen - till nytta för vem?
    Utvecklingskonferens LU 2007, Lund, 2007-09-27. (BibTeX) (More info)
  158. O. Carlqvist, F. Nilsson, U. Ahlfors, M. Sandsten:
    Motivationsskapande undervisning och lärande
    Lunds universitets pedagogiska konferens, Lund, Sweden, 2007-09-21. (BibTeX) (More info)
  159. U. Ahlfors, O. Carlqvist, F. Nilsson, M. Sandsten:
    Motivationsskapande undervisning och lärande
    Utvecklingskonferens LU 2007, Lund, pp. 1-11, 2007. (BibTeX) (More info)
  160. A. Tomaszewski, M. Pioro, M. Mycek:
    A distributed scheme for inter-domain routing optimization
    6th International Workshop on the Design of Reliable Commuication Networks DRCN 2007, La Rochelle, France, 2007-10-07/2007-10-10. (BibTeX) (More info)
  161. F. Aslam, Z. Uzmi, A. Farrel, M. Pioro:
    Inter-domain path computation using improved crankback signaling in label switched networks
    IEEE ICC Proceedings, IEEE International Conference on Communications ICC 2007, Glasgow, pp. 2023-2029, 2007-06-24/2007-06-28. (BibTeX) (More info)
  162. A. Tomaszewski, M. Pioro, M. Mycek:
    Distributed inter-domain link capacity optimization for inter-domain IP/MPLS routing
    IEEE GLOBECOM Proceedings, IEEE Global Telecommunications Conference GLOBECOM 2007, Washington D.C., pp. 1872-1877, 2007-11-26/2007-11-30. (BibTeX) (More info)
  163. M. Pioro, A. Tomaszewski, M. Dzida, M. Mycek:
    A subgradient optimization approach to inter-domain routing in IP/MPLS networks
    NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet / Lecture Notes in Computer Science, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, Vol. 4479, pp. 1241-1244, 2007-05-14/2007-05-18. (BibTeX) (More info)
  164. C. Tran, Z. Dziong, M. Pioro:
    SLA adaptation for service overlay networks
    NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Intern / Lecture Notes in Computer Science, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, Vol. 4479, pp. 691-702, 2007-05-14/2007-05-18. (BibTeX) (More info)
  165. M. Pioro, A. Tomaszewski:
    Feasibility issues in shortest-path routing with traffic flow split
    International Network Optimization Conference INOC 2007, Spa, Belgium, 2007-04-11. (BibTeX) (More info)
  166. A. Tomaszewski, M. Pioro, M. Dzida, M. Mycek, M. Zagozdzon:
    Valid inequalities for a shortest-path routing optimization problem
    International Network Optimization Conference INOC 2007, Spa, Belgium, 2007-04-22/2007-04-25. (BibTeX) (More info)
  167. S. Orlowski, M. Pioro, A. Tomaszewski, R. Wessaely:
    SNDlib 1.0 - survivable network design library
    International Network Optimization Conference INOC 2007, Spa, Belgium, 2007-04-22/2007-04-25. (BibTeX) (More info)
  168. M. Dzida, M. Zagozdzon, M. Pioro:
    Optimization of resilient IP networks with shortest path routing
    6th International Workshop on the Design of Reliable Communication Networks DRCN 2007, La Rochelle, France, 2007-10-07/2007-10-10. (BibTeX) (More info)
  169. M. Zagozdzon, M. Dzida, M. Pioro:
    Traffic flow optimization in networks with combined OSPF/MPLS routing
    15th International Conference on Advanced Computing and Communications ADCOM 2007, Guwahati, India, pp. 131-137, 2007-12-18/2007-12-21. (BibTeX) (More info)
  170. M. Pioro:
    Fair routing and related optimization problems - invited talk
    15th International Conference on Advanced Computing and Communications ADCOM 2007, Guwahati, India, pp. xxxi-xxxii, 2007-12-18/2007-12-21. (BibTeX) (More info)
  171. M. Kilnkowski, M. Pioro, D. Careglio, M. Marciniak, J. Sole-Pareta:
    Routing optimization in optical burst switching networks
    Optical Network Design and Modeling / Lecture Notes in Computer Science, 11th International IFIP TC6 Conference, ONDM 2007, Athens, Greece, Vol. 4534, pp. 201-210, 2007-05-29/2007-05-31. (BibTeX) (More info)
  172. 2006

  173. M. Hell, T. Johansson, A. Maximov, W. Meier:
    A stream cipher proposal: Grain-128
    2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, pp. 1614-1618, 9-14 July 2006. (BibTeX) (More info)
  174. T. Johansson, W. Meier, F. Muller:
    Cryptanalysis of Achterbahn
    Fast Software Encryption (Lecture Notes in Computer Science), 13th International Workshop, FSE 2006, Graz, Austria, Vol. 4047, pp. 1-14, March 15-17, 2006. (BibTeX) (More info)
  175. P. O. Börjesson, A. Hamidian, E. Kubilinskas, U. Richter, K. Weyns, P. Ödling:
    Free-riding in Group Work - Mechanisms and Countermeasures
    4:e pedagogiska inspirationskonferensen, Lund, Sweden, June 2006. (BibTeX) (More info)
  176. E. Kubilinskas, M. Pioro:
    Iterative design of two layer networks to achieve throughput maximization
    The Eighth INFORMS Telecommunications Conference, Dallas, Texas, USA, 2006-03-30/2006-04-01. (BibTeX) (More info)
  177. M. Andersson, M. Höst, J. Cao, C. Nyberg, M. Kihl:
    Design and evaluation of an overload control system for crisis-related Web server systems
    2006 International Conference on Internet Surveillance and Protection, Cote d'Azur, France, 2006-08-26/2006-08-29. (BibTeX) (More info)
  178. J. Andersson, C. Nyberg, M. Kihl:
    Traffic shaping and dimensioning of an external overload controller in service architectures
    Proceedings. 2006 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, pp. 553-554, 14-16 Nov. 2006. (BibTeX) (More info)
  179. R. Zander, J. M. Karlsson:
    Analysis of dynamic reservation schemes for cellular networks
    7th World Wireless Congress, WWC, San Francisco, CA, United States, Vol. 2006, pp. 349-354, May 23-25 2006. (BibTeX) (More info)
  180. R. Zander, J. M. Karlsson:
    Analysis of prediction-oriented features in dynamic bandwidth reservation schemes
    IEEE Vehicular Technology Conference, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall, Montreal, QC, Canada, pp. 2439-2443, 2006-09-25/2006-09-28. (BibTeX) (More info)
  181. J. M. Karlsson:
    Kontinuerliga självvalda kontroller under kursgång
    LTHs 4:e pedagogiska inspirationskonferens, Lund, 20060601. (BibTeX) (More info)
  182. P. Nilsson, M. Pioro:
    Max-min fair distribution of modular network flows on fixed paths
    Networking 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. Proceedings / Lecture Notes in Computer Science, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, Vol. 3976, pp. 916-927, 2006-05-15/2006-05-19. (BibTeX) (More info)
  183. M. Dzida, M. Zagozdzon, M. Pioro, A. Tomaszewski:
    Design of mixed MPLS/OSPF routing in IP networks
    Proc. 4th Polish-German Teletraffic Symposium, Wroclaw, Poland, Wroclaw, Poland, 2006. (BibTeX) (More info)
  184. M. Dzida, M. Zagozdzon, M. Pioro, A. Tomaszewski:
    Optimization of the shortest-path routing with equal-cost multi-path load balancing
    2006 International Conference on Transparent Optical Networks, Nottingham, UK, Vol. 3, pp. 9-12, 2006-06-18/2006-06-22. (BibTeX) (More info)
  185. 2005

  186. G. Gong, K. C. Gupta, M. Hell, Y. Nawaz:
    Towards a general RC4-like keystream generator
    Information Security and Cryptology / Lecture notes in computer science, Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, Vol. 3822, pp. 162-174, 2005-12-15/2005-12-17. (BibTeX) (More info)
  187. M. Hell, T. Johansson:
    Some attacks on the Bit-search generator
    Fast Software Encryption / Lecture Notes in Computer Science, Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, Vol. 3557, pp. 215-227, 2005-02-21/2005-02-23. (BibTeX) (More info)
  188. A. Maximov, M. Hell, S. Maitra:
    Plateaued rotation symmetric boolean functions on odd number of variables
    First Workshop on Boolean Functions : Cryptography and Applications, Rouen, France, 2005-03-07/2005-03-08. (BibTeX) (More info)
  189. W. H. Fang, T. Johansson, L. Spaanenburg:
    Balancing BlockRAM and distributed RAM
    Proceedings SSoCC 2005, Swedish System-on-Chip Conference (SSoCC), Tammsvik, 2005. (BibTeX) (More info)
  190. W. H. Fang, T. Johansson, L. Spaanenburg:
    Snow 2.0 IP core for trusted hardware
    Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL, 2005 International Conference on Field Programmable Logic and Applications (FPL), Tampere, Finland, Vol. 2005, pp. 281-286, Aug 24-26 2005. (BibTeX) (More info)
  191. A. Hamidian, U. Körner:
    Towards a solution providing QoS in ad hoc networks
    19th International Teletraffic Congress (ITC 19), Beijing, China, Vol. 6A-6C, pp. 791-800, Aug 29-Sep 02, 2005. (BibTeX) (More info)
  192. A. Nilsson Plymoth:
    Performance and implementation of routing and wireless transport layer connections in micro mobility Ad hoc networks
    Proceedings - 6th World Wireless Congress, WWC, San Francisco, CA, United States, pp. 295-300, May 25-27 2005. (BibTeX) (More info)
  193. M. Pioro, M. Dzida, A. Tomaszewski, M. Zagozdzon, E. Kubilinskas, P. Nilsson, W. Ogryczak:
    Application of the max-min fairness principle in telecommunication network design
    Next Generation Internet Networks, 2005, 1st Euro-NGI Conference on Next Generation Internet Networks, Rome, Italy, pp. 219-225, 2005-04-18/2005-04-20. (BibTeX) (More info)
  194. E. Kubilinskas, M. Pioro:
    Two design problems for the IP/MPLS over WDM networks
    5th International Workshop on Design of Reliable Communication Networks, Naples, Italy, pp. 241-248, 2005-10-16/2005-10-19. (BibTeX) (More info)
  195. E. Kubilinskas, M. Pioro:
    An IP/MPLS over WDM network design problem
    Proceedings INOC, International Network Optimization Conference INOC 2005, Lisbon, Portugal, March 2005. (BibTeX) (More info)
  196. M. Andersson, J. Cao, M. Kihl, C. Nyberg:
    Admission control with service level agreements for a web server
    Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2005 : February 21 - 23, 2005, Grindelwald, Switzerland, 2005. (BibTeX) (More info)
  197. J. Cao, C. Nyberg:
    Linear programming relaxations and a heuristic for the buffer sharing model - Discounted case
    Performance Challenges for Efficient Next Generation Networks, Vols 6A-6C, 19th International Teletraffic Congress (ITC 19), Beijing, China, Vol. 6A-6C, pp. 939-948, Aug 29-Sep 02, 2005. (BibTeX) (More info)
  198. R. Zander, J. M. Karlsson:
    Performance analysis of cell zone partitioning in bandwidth reservation schemes
    Proceedings - 6th World Wireless Congress, WWC, San Francisco, CA, United States, pp. 272-277, May 25-27 2005. (BibTeX) (More info)
  199. A. Tomaszewski, M. Pioro, M. Dzida, M. Zagozdzon:
    Optimization of administrative weights in IP networks using branch-and-cut approach
    Proceedings of 2nd International Network Optimization Conference (INOC 2005), International Network Optimization Conference INOC 2005, Lisbon, Portugal, 2005-03-20/2005-03-23. (BibTeX) (More info)
  200. M. Zagozdzon, M. Dzida, M. Pioro, A. Tomaszewski:
    Optimization of administrative weights in single path networks with OSPF routing
    12th Polish Teletraffic Symposium (PSRT 2005), Poznan, Poland, 2005-09-19/2005-09-20. (BibTeX) (More info)
  201. P. Nilsson, M. Pioro:
    Unsplittable max-min demand allocation - a routing problem
    HET-NETs '05 Third International working conference, ILkley, UK, 2005-07-18/2005-07-20. (BibTeX) (More info)
  202. 2004

  203. H. Englund, M. Hell, T. Johansson:
    Correlation attacks using a new class of weak feedback polynomials
    Fast Software Encryption. Revised Papers / Lecture Notes in Computer Science, 11th International Workshop, FSE 2004, Delhi, India, Vol. 3017, pp. 127-142, February 5-7, 2004. (BibTeX) (More info)
  204. M. Hell, A. Maximov, S. Maitra:
    On Efficient Implementation of a Search Strategy for Rotation Symmetric Boolean Functions
    9th International Workshop on Algebraic and Combinatorial Coding Theory - ACCT 2004, Kranevo, Bulgaria, pp. 214-222, 2004-06-19/2006-06-25. (BibTeX) (More info)
  205. M. Nyström, M. Novak, K. Holmqvist:
    A novel approach to image coding using off-line foveation controlled by multiple eye-tracking measurement
    Picture Coding Symposium 2004, San Francisco, CA, United States, pp. 267-272, Dec 15-17 2004. (BibTeX) (More info)
  206. A. Maximov, T. Johansson, S. Babbage:
    An improved correlation attack on A5/1
    Selected Areas in Cryptography / Lecture Notes in Computer Science, Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers, Waterloo, Ont., Canada, Vol. 3357, pp. 1-18, 9-10 Aug. 2004. (BibTeX) (More info)
  207. H. Englund, T. Johansson:
    A new simple technique to attack filter generators and related ciphers
    Selected Areas in Cryptography / Lecture Notes in Computer Science, 11th International Workshop, SAC 2004., Waterloo, Ont., Canada, Vol. 3357, pp. 39-53, 9-10 Aug. 2004. (BibTeX) (More info)
  208. A. Hamidian, U. Körner, A. Nilsson Plymoth:
    Performance of Internet Access Solutions in Mobile Ad Hoc Networks
    Lecture Notes in Computer Science (LNCS), Vol. 3427, pp. 189-201, June 2004. (BibTeX) (More info)
  209. A. Nilsson Plymoth, A. Hamidian, U. Körner:
    Micro mobility and internet access performance for TCP connections in Ad Hoc networks
    17th Nordic Teletraffic Seminar (NTS-17), Oslo, Norway, August 2004. (BibTeX) (More info)
  210. N. Widell, C. Nyberg:
    Cross entropy based module alocation for distributed systems
    Proceedings of the 16th IASTED International Conference on Parallel and Distributed Computing and Systems : November 9 - 11, 2004, MIT, Cambridge, USA, 2004. (BibTeX) (More info)
  211. R. Zander, J. M. Karlsson:
    A layer assignment and resource reservation scheme for hierarchical cell structures
    NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Proceedings (Lecture Notes in Computer Science), Third International IFIP-TC6 Networking Conference, Athens, Greece, Vol. 3042, pp. 1508-1513, May 9-14, 2004. (BibTeX) (More info)
  212. R. Zander, J. M. Karlsson:
    A zone-based bandwidth reservation scheme for UMTS
    IEEE Vehicular Technology Conference, 2004 IEEE 59th Vehicular Technology Conference, VTC2004-Spring: Towards a Global Wireless World, Milan, Italy, Vol. 59, No. 4, pp. 1993-1998, May 17-19 2004. (BibTeX) (More info)
  213. R. Zander, J. M. Karlsson:
    A rate-based bandwidth borrowing and reservation scheme for cellular networks
    IEEE Vehicular Technology Conference, 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security, Los Angeles, CA, United States, Vol. 60, No. 2, pp. 1123-1128, Sep 26-29 2004. (BibTeX) (More info)
  214. H. Persson, J. M. Karlsson:
    Evaluating the effects on enhanced intersystem connectivity
    Proceedings - 5th World Wireless Congress, San Francisco, CA, United States, pp. 247-252, May 25-28 2004. (BibTeX) (More info)
  215. M. Pioro:
    Telecommunication network design problems related to the notion of max-min fairness
    AIRO 2004, Lecce, Italy, 2004-09-07/2004-09-10. (BibTeX) (More info)
  216. M. Pioro:
    Design problems and optimization methods for core NGI - keynote speech
    Euro-NGI Workshop on Traffic Engineering, Protection and Restoration for NGI, Lund, Sweden, May 2004. (BibTeX) (More info)
  217. W. Ogryczak, M. Pioro, A. Tomaszewski:
    Telecommunications network design and max-min optimization problem
    4th International Conference on Decision Support for Telecommunication and Information Society DSTIS-2004, Miedzeszyn Warsaw, Poland, pp. 99-124, September 2004. (BibTeX) (More info)
  218. M. Dzida, M. Pioro, M. Zagozdzon:
    The application of max-min fairness to bandwidth allocation in telecommunication networks
    Proceedings PGTS, 3th Polish-German Teletraffic Symposium PGTS 2004, Dresden, Germany, Vol. 3, pp. 45-54, 2004-09-12/2004-09-15. (BibTeX) (More info)
  219. A. Nilsson, U. Körner:
    Micro mobility and internet access performance in Ad Hoc networks
    Proceedings - 5th World Wireless Congress, San Francisco, CA, United States, pp. 352-357, May 25-28 2004. (BibTeX) (More info)
  220. 2003

  221. T. Johansson:
    Analysis and design of modern stream ciphers
    Cryptography and Coding / Lecture Notes in Computer Science, 9th IMA International Conference, Cirencester, UK, Vol. 2898, pp. 66-66, 2003-12-16/2003-12-18. (BibTeX) (More info)
  222. P. Ekdahl, W. Meier, T. Johansson:
    Predicting the shrinking generator with fixed connections
    Advances in Cryptology / Lecture Notes in Computer Science, EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, Vol. 2656, pp. 330-344, May 4-8, 2003. (BibTeX) (More info)
  223. P. Ekdahl, T. Johansson:
    A new version of the stream cipher SNOW
    Lecture Notes in Computer Science (Selected Areas in Cryptography. Revised Papers), Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, Vol. 2595, pp. 47-61, August 15-16, 2002. (BibTeX) (More info)
  224. P. Ekdahl, T. Johansson, W. Meier:
    A note on the selfshrinking generator
    IEEE International Symposium on Information Theory - Proceedings, Proceedings 2003 IEEE International Symposium on Information Theory (ISIT), Yokohama, Japan, pp. 166-166, Jun 29-Jul 4 2003. (BibTeX) (More info)
  225. T. Johansson, A. Maximov:
    A linear distinguishing attack on Scream
    Proceedings 2003 IEEE International Symposium on Information Theory. ISIT 2003 (Cat. No.03CH37432), Yokohama, Japan, pp. 164-164, 29 June-4 July 2003. (BibTeX) (More info)
  226. T. Johansson:
    Analysis and design of modern stream ciphers (invited paper)
    Ninth IMA International Conference on Cryptography and Coding (Lecture Notes in Comput. Sci. Vol.2898), Cirencester, UK, pp. 66-66, 16-18 Dec. 2003. (BibTeX) (More info)
  227. A. Nilsson Plymoth, J. J. Garcia-Luna-Aceves, M. Sphon:
    Routing in hybrid ad hoc networks using service points
    2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), Orlando, FL, USA, Vol. 58, No. 3, pp. 2078-2082, 6-9 Oct. 2003. (BibTeX) (More info)
  228. M. Pioro, P. Nilsson, E. Kubilinskas, G. Fodor:
    On efficient max-min fair routing algorithms
    Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, International Symposium on Computers and Communications ISCC 2003, Kemer-Antalya, Turkey, pp. 365-372, 2003-06-30/2003-07-03. (BibTeX) (More info)
  229. E. Kubilinskas, M. Pioro, P. Nilsson:
    Design models for robust multilayer next generation Internet core networks, carrying elastic traffic
    Proceedings. 4th International Workshop on the Design of Reliable Communication Networks (DRCN 2003) (IEEE Cat. No.03EX735), Banff, Alberta, Canada, pp. 61-68, 2003-10-19/2003-10-22. (BibTeX) (More info)
  230. J. Cao, C. Nyberg:
    An approximate analysis of load balancing using stale state information for servers in parallel
    Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology : November 17 - 19, 2003, Scottsdale, AZ, USA, 2003. (BibTeX) (More info)
  231. J. Cao, M. Andersson, C. Nyberg, M. Kihl:
    Web Server Performance Modeling using an M/G/1/K*PS Queue
    ICT'2003 : 10th international conference on telecommunications. Volume 2, 10th International Conference on Telecommunications, pp. 1501-1506, 2003. (BibTeX) (More info)
  232. M. Andersson, J. Cao, M. Kihl, C. Nyberg:
    Performance modeling of an Apache web server with bursty arrival traffic
    IC'03 : proceedings of the international conference on internet computing, 4th International Conference on Internet Computing, pp. 508-511, 2003. (BibTeX) (More info)
  233. T. Berling, C. Andersson, M. Höst, C. Nyberg:
    Adaptation of a System Dynamics Model Template for Code Development and Testing to an Industrial Project
    ProSim03 - Software Process Simulation Modeling workshop, Co-located with ICSE 03, Portland, USA, 2003-05-03/2003-05-04. (BibTeX) (More info)
  234. J. K. Andersson, C. Nyberg, M. Kihl:
    Performance analysis and modelling of an OSA gateway
    Personal Wireless Communications / Lecture Notes in Computer Science, IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, Vol. 2775, pp. 511-517, 2003-09-23/2003-09-25. (BibTeX) (More info)
  235. J. K. Andersson, C. Nyberg, M. Kihl:
    Performance analysis and overload control of an open service access (OSA) architecture
    Performance and control of next-generation communication networks : [ITCom's Conference on Performance and Control of Next-Generation Communication Networks] ; 9 - 10 September 2003, Orlando, Florida, USA (SPIE proceedings series), SPIE Conference on Performance and Control of Next-Generation Communication Networks, Vol. 5244, pp. 176-186, 2003. (BibTeX) (More info)
  236. J. K. Andersson, M. Kihl, C. Nyberg:
    Priorities and overload control in OSA
    Fourth International Conference on 3G Mobile Communication Technologies (3G 2003) : 25 - 27 June 2003, Savoy Place, London, UK (IEE Conference Publications ; vol. 494), Fourth IEE International Conference on 3G Mobile Communication Technologies, pp. 139-143, 2003. (BibTeX) (More info)
  237. H. Persson, J. M. Karlsson:
    Maintaining QoS by utilizing hierarchical wireless systems
    9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732), Penang, Malaysia, pp. 292-296, 21-24 Sept. 2003. (BibTeX) (More info)
  238. T. Holmberg, J. M. Karlsson:
    Scheduling deadline driven packet flows in HiperAccess
    Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, ISCC 2003 - International Symposium on Computers and Communications, Kemer-Antalya, Turkey, pp. 108-113, 30 June-3 July 2003. (BibTeX) (More info)
  239. T. Holmberg, J. M. Karlsson:
    Fair scheduling of uplink traffic in HiperAccess
    9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732), Penang, Malaysia, pp. 1198-1204, 21-24 Sept. 2003. (BibTeX) (More info)
  240. H. Persson, J. M. Karlsson:
    Performance analysis of hierarchical wireless systems
    2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), Orlando, FL, USA, pp. 2217-2221, 6-9 Oct. 2003. (BibTeX) (More info)
  241. R. Zander, J. M. Karlsson:
    Introducing Handover Prioritization in Channel Borrowing Without Locking (CBWL)
    Proceedings of the IASTED International Conference on Wireless and Optical Communications, Proceedings of the Third IASTED International Conference on Wireless and Optical Communications, Banff, Canada, Vol. 3, pp. 429-434, Jul 2-4 2003. (BibTeX) (More info)
  242. B. Krithikaivasan, S. Srivastava, M. Pioro, D. Medhi:
    Design of wide-area communication networks with backup path restoration using path generation technique
    Proceedings. 4th International Workshop on the Design of Reliable Communication Networks (DRCN 2003), 4th International Workshop on the Design of Reliable Commuication Networks DRCN 2007, Banff, Alberta, Canada, pp. 77-84, 2003-10-19/2003-10-22. (BibTeX) (More info)
  243. S. Srivastava, D. Medhi, M. Pioro:
    Traffic engineering in the presence of tunneling and diversity constraints
    Teletraffic Science and Engineering, 18th International Teletraffic Congress ITC-18, Berlin, Germany, Vol. 5a, pp. 461-480, 2003-08-31/2003-09-05. (BibTeX) (More info)
  244. P. Nilsson, M. Pioro, Z. Dziong:
    Link protection within existing backbone network
    International Network Optimization Conference INOC 2003, Paris, France, 2003-10-27/2003-10-29. (BibTeX) (More info)
  245. M. Pioro, S. Srivastava, B. Krithikaivasan, D. Medhi:
    Path generation technique for robust design of wide area communication networks
    10th Polish Teletraffic Symposium, Cracow, Poland, 2003-09-18/2003-09-19. (BibTeX) (More info)
  246. U. Körner, N. Johansson:
    Bandwidth allocation in Bluetooth scatternets
    Proceedings of the 17th International Symposium on Computer and Information Sciences, Orlando, Fl, United States, pp. 367-371, Oct 28-30, 2002. (BibTeX) (More info)
  247. 2002

  248. P. Ekdahl, T. Johansson:
    Distinguishing attacks on SOBER-t16 and t32
    Fast Software Encryption (Revised Papers)/Lecture Notes in Computer Science, 9th International Workshop, FSE 2002, Leuven, Belgium, Vol. 2365, pp. 210-224, February 4-6, 2002. (BibTeX) (More info)
  249. S. Maity, T. Johansson:
    Construction of cryptographically important Boolean functions
    Progress in Cryptology / Lecture Notes in Computer Science, INDOCRYPT 2002: Third International Conference on Cryptology, India Hyderabad, India, Vol. 2551, pp. 234-245, December 16-18, 2002. (BibTeX) (More info)
  250. M. Pioro, E. Kubilinskas, P. Nilsson:
    Robust dimensioning of proportionally fair networks
    2nd Polish-German teletraffic symposium, Gdansk 2002, PGTS 2002, Gdansk, Poland, 2002-09-23/2002-09-24. (BibTeX) (More info)
  251. M. Kihl, N. Widell, C. Nyberg:
    An investigation of overload control schemes for distributed e-commerce sites
    Proceedings of 16th Nordic Teletraffic Seminar, 2002. (BibTeX) (More info)
  252. R. Zander, J. M. Karlsson:
    A measurement-based dynamic guard channel scheme for handover prioritization in cellular networks
    NETWORKING 2002. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Second International IFIP-TC6 Networking Conference. Proceedings (Lecture Notes in Computer Science Vol.2345), Proceedings of Networking 2002 - Second IFIP TC6 Networking Conference, Pisa, Italy, pp. 1245-1251, 19-24 May 2002. (BibTeX) (More info)
  253. H. Persson, J. M. Karlsson:
    Real and potential handover problems in future wireless networks
    Wireless 2002. Fourteenth International Conference on Wireless Communications, Proceedings of WIRELESS 2002, Calgary, Alta., Canada, pp. 347-355, 8-10 July 2002. (BibTeX) (More info)
  254. P. Nilsson, M. Pioro:
    Solving dimensioning tasks for proportionally fair networks carrying elastic traffic
    Proceedings 22nd IFIP Working Group 7.3 International Symposium on Computer Performance Modeling, Measurement and Evaluation. PERFORMANCE 2002, Rome, Italy, Vol. 49, pp. 371-386, 23-27 Sept. 2002. (BibTeX) (More info)
  255. M. Pioro, G. Malicsko, G. Fodor:
    Optimal link capacity dimensioning in proportionally fair networks
    NETWORKING 2002. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Second International IFIP-TC6 Networking Conference. Proceedings / Lecture Notes in Computer Science, Second International IFIP-TC6 Networking Conference , May 19?24, 2002, Pisa, Italy, Vol. 2345, pp. 277-288, 2002-05-19/2002-05-24. (BibTeX) (More info)
  256. G. Malicsko, G. Fodor, M. Pioro:
    Link capacity dimensioning and path optimization for networks supporting elastic services
    IEEE ICC Proceedings, IEEE International Conference on Communications, New York, pp. 2304-2311, 2002-04-28/2002-05-02. (BibTeX) (More info)
  257. T. Cinkler, M. Pioro:
    Impact of shared protection strategies on network design
    International Network Planning Symposium NETWORKS 2002, Munich, 2002-09-23. (BibTeX) (More info)
  258. P. Nilsson, M. Pioro:
    Fair bandwidth allocation and links dimensioning in elastic traffic networks
    16th Nordic Teletraffic Seminar (NTS 16), Espoo, Finland, 2002-08-21/2002-08-23. (BibTeX) (More info)
  259. T. Cinkler, P. Laborczi, M. Pioro, G. Malicsko, G. Fodor, A. Szentesi:
    Algorithms for path and band-width allocation for elastic traffic under various fairness constraints
    Proceedings of the 2nd Polish German Teletraffic Symposium, PGTS 2002, Gdansk, Poland, 2002-09-23/2002-09-24. (BibTeX) (More info)
  260. U. Körner, N. Johansson:
    On ad hoc networking in a Bluetooth environment
    ISCIS XVII Seventh International Symposium on Computer and Information Sciences, Orlando, Florida, 2002-10-28/2002-10-30. (BibTeX) (More info)
  261. U. Körner:
    On Ad Hoc networking in a Bluetooth Environment
    2nd Polish-German Teletraffic Symposium, PGTS 2002, pp. 1-10, 2002. (BibTeX) (More info)
  262. 2001 and earlier

  263. E. Pasalic, S. Maitra, T. Johansson, P. Sarkar:
    Results related to the upper bound on nonlinearity for resilient and correlation immune Boolean functions
    Workshop on Coding and Cryptography 2001, Paris, pp. 425-434, 2001. (BibTeX) (More info)
  264. F. Jönsson, T. Johansson:
    Correlation attacks on stream ciphers over GF(2^n)
    2001 IEEE International Symposium on Information Theory, Washington, DC, pp. 140-, 2001-06-24/2001-06-29. (BibTeX) (More info)
  265. P. Ekdahl, T. Johansson:
    Another attack on A5/1
    2001 IEEE International Symposium on Information Theory, Washington, DC, pp. 160-, 2001-06-24/2001-06-29. (BibTeX) (More info)
  266. M. Pioro, A. Myslek, A. Juttner, J. Harmatos:
    Topological design of MPLS networks
    IEEE GLOBECOM Proceedings, IEEE GLOBECOM 2001, San Antonio, Tx, USA, 2002-11-25/2002-11-29. (BibTeX) (More info)
  267. N. Johansson, U. Körner, L. Tassiulas:
    A Distributed Scheduling Algorithm for a Bluetooth Scatternet
    International Teletraffic Congress, Salvador de Bahia, Brazil, 2001-09-24/2001-09-28. (BibTeX) (More info)
  268. V. Chepyshov, T. Johansson, B. Smeets:
    A simple algorithm for fast correlation attacks on stream ciphers
    Fast Software Encryption / Lecture Notes in Computer Science, 7th International Workshop, FSE 2000, New York, NY, Vol. 1978, pp. 181-195, 2000-04-10/2000-04-12. (BibTeX) (More info)
  269. T. Johansson, F. Jönsson:
    Fast correlation attacks through reconstruction of linear polynomials
    Advances in Cryptology / Lecture Notes in Computer Science, 20th Annual International Cryptology Conference CRYPTO 2000, Santa Barbara, California, Vol. 1880, pp. 300-315, 2000-08-20/2000-08-24. (BibTeX) (More info)
  270. T. Johansson, F. Jönsson:
    Theoretical analysis of a correlation attack based on convolutional codes
    2000 IEEE International Symposium on Information Theory, Sorrento, pp. 212-, 2000-06-25/2000-06-30. (BibTeX) (More info)
  271. T. Johansson, E. Pasalic:
    A construction of resilient functions with high nonlinearity
    2000 IEEE International Symposium on Information Theory, Sorrento, pp. 184-, 2000-06-25/2000-06-30. (BibTeX) (More info)
  272. P. Ekdahl, T. Johansson:
    Some results on correlations in the Bluetooth stream cipher
    10th Joint Conference on Communications and Coding, Obertauern, Austria, pp. 16-, 2000. (BibTeX) (More info)
  273. T. Johansson, E. Pasalic:
    A construction of resilient functions with high nonlinearity
    10th Joint Conference on Communications and Coding, Obertauern, Austria, pp. 14-, 2000. (BibTeX) (More info)
  274. P. Ekdahl, T. Johansson:
    SNOW - A new stream cipher
    First open Nessie Workshop, Heverlee, Belgium, 2000. (BibTeX) (More info)
  275. C. McArdle, N. Widell, C. Nyberg, E. Lilja, J. Nyström, T. Curran:
    Simulation of a distributed CORBA-based SCP
    Telecommunications and IT convergence : towards service evolution : proceedings (Lecture notes in computer science), Vol. 1774, pp. 33-48?, 2000. (BibTeX) (More info)
  276. N. Johansson, M. Kihl, U. Körner:
    Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network
    Proc. of ITC Specialist Seminar on Mobile Systems and Mobility, 2000. (BibTeX) (More info)
  277. N. Johansson, M. Kihl, U. Körner:
    TCP/IP over the Bluetooth wireless ad-hoc network
    NETWORKING 2000. Broadband Communications, High Performance Networking, and Performance of Communication Networks / Lecture Notes in Computer Science, IFIP-TC6/European Commission international conference, Paris, France, Vol. 1815, pp. 799-810, 2000-05-14/2000-05-19. (BibTeX) (More info)
  278. T. Johansson, F. Jönsson:
    Improved fast correlation attacks on stream ciphers via convolutional codes
    Advances in Cryptology / Lecture Notes in Computer Science, International Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ?99, Prague, Czech Republic, Vol. 1592, pp. 347-362, 1999-05-02/1999-05-06. (BibTeX) (More info)
  279. T. Johansson, F. Jönsson:
    Fast correlation attacks based on turbo code techniques
    Advances in Cryptology / Lecture Notes in Computer Science, 19th Annual International Cryptology Conference CRYPTO? 99, Santa Barbara, California, Vol. 1666, pp. 181-197, 1999-08-15/1999-08-19. (BibTeX) (More info)
  280. E. Pasalic, T. Johansson:
    Further results on the relation between nonlinearity and resiliency of Boolean functions
    Cryptography and Coding / Lecture Notes in Computer Science, 7th IMA International Conference, Cirencester, UK, Vol. 1746, pp. 35-44, 1999-12-20/1999-12-22. (BibTeX) (More info)
  281. T. Johansson, F. Jönsson:
    Correlation attacks, convolutional codes, and iterative decoding
    1999 IEEE Information Theory and Communications Workshop, Kruger National Park, South Africa, pp. 58-60, 1999-06-20/1999-06-25. (BibTeX) (More info)
  282. U. Ahlfors, M. Pioro, U. Körner:
    On Admission Control Criterion for State-Dependent Routing in Multirate Networks
    Proceedings of the 6th Polish Teletraffic Seminar, Szklarska Poreba, April 1999., Szklarska Poreba, Poland, 1999-04-09. (BibTeX) (More info)
  283. U. Ahlfors, M. Pioro, U. Körner, L. Reneby:
    Design and Routing Problems in ATM Networks
    Proc. RadioVetenskap och Kommunikation RVK?99, Karlskrona, Sweden, 1999, 1999. (BibTeX) (More info)
  284. U. Ahlfors, U. Körner, M. Pioro:
    Towards Efficient Call Admission Control Criterion for State-Dependent Routing in Multirate Networks
    Proceedings of the 1999 IEEE International Conference on Control Applications, (2):1607-1613, Hawaii, USA, August 1999, IEEE International Conference on Control ApplicationsHawaii, Hawaii, USA, Vol. 2, pp. 1607-1613, 1999-08-22/1999-08-27. (BibTeX) (More info)
  285. M. Kihl, C. Nyberg, N. Widell:
    Load balancing strategies for TINA networks
    Teletraffic engineering in a competitive world : proceedings of the International Teletraffic Congress - ITC-16, Edinburgh International Conference Centre, United Kingdom, 7-11 June, 1999, 16th International Teletraffic Congress, 1999. (BibTeX) (More info)
  286. N. Widell, M. Kihl, C. Nyberg:
    Measuring real-time performance in distributed object-oriented systems
    Proceedings of SPIE's Symposium on Voice, Video and Data Communications, 1999. (BibTeX) (More info)
  287. N. Johansson, U. Körner, P. Johansson:
    Performance evaluation of scheduling algorithms for Bluetooth
    Fifth International Conference on Broadband Communications, pp. 139-150, 1999-11. (BibTeX) (More info)
  288. T. Johansson:
    Reduced complexity correlation attacks on two clock-controlled generators
    Advances in Cryptology / Lecture Notes in Computer Science, International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT?98, Beijing, China, Vol. 1514, pp. 342-356, 1998-10-18/1998-10-22. (BibTeX) (More info)
  289. T. Johansson:
    Correlation attacks on stream ciphers and related decoding problems
    1998 IEEE Information Theory Workshop, Killarney, pp. 156-157, 1998-06-22/1998-06-26. (BibTeX) (More info)
  290. T. Johansson, F. Jönsson:
    On some cryptographic problems based on the general decoding problem
    1998 IEEE International Symposium on Information Theory, Cambridge, MA, pp. 442-, 1998-08-16/1998-08-21. (BibTeX) (More info)
  291. T. Johansson:
    A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
    1998 IEEE International Symposium on Information Theory, Cambridge, MA, pp. 231-, 1998-08-16/1998-08-21. (BibTeX) (More info)
  292. M. Kihl, C. Nyberg:
    Analysis of a feedback queue that is controlled by a modified PD controller
    Proc. of International Conference on Telecommunications, 1998. (BibTeX) (More info)
  293. K. Kurosawa, T. Johansson, D. Stinson:
    Almost k-wise independent sample spaces and their cryptologic applications
    Advances in Cryptology / Lecture Notes in Computer Science, International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97, Konstanz, Germany, Vol. 1233, pp. 409-421, 1997-05-11/1997-05-15. (BibTeX) (More info)
  294. T. Johansson:
    Bucket hashing with a small key size'
    Advances in Cryptology / Lecture Notes in Computer Science, nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ?97, Konstanz, Germany, Vol. 1233, pp. 149-162, 1997-05-11/1997-05-15. (BibTeX) (More info)
  295. T. Johansson:
    Codes combining error detection and authentication
    IEEE International Symposium on Information Theory, Ulm, pp. 173-, 1997-06-29/1997-07-04. (BibTeX) (More info)
  296. G. R. Blakley, T. Johansson, G. Kabatianskii:
    Coding problems of cryptography or codesets vs. codewords
    1997 IEEE Information Theory Workshop, pp. 43-45, 1997. (BibTeX) (More info)
  297. U. Ahlfors, C. Nyberg:
    Near-Optimal Load Control of a Message-Passing Multiprocessor System: A Decentralized Markov Decision Approach
    Proceedings of the 15th International Teletraffic Congress ? ITC-15, Washington DC, USA, June 1997, 1997. (BibTeX) (More info)
  298. M. Kihl, C. Nyberg, H. Warne, P. Wollinger:
    Performance simulation investigation of TINA networks
    Proceedings of IEEE Intelligent Network Workshop, Colorado Springs, Vol. 3, 1997-05-04/1997-05-07. (BibTeX) (More info)
  299. M. Kihl, C. Nyberg, H. Warne, P. Wollinger:
    Performance simulation of a TINA network
    Proc. of IEEE Globecom 1997, 1997. (BibTeX) (More info)
  300. T. Helleseth, T. Johansson:
    Universal hash functions from exponential sums over finite fields and Galois rings
    Advances in Cryptology / Lecture Notes in Computer Science, 16th Annual International Cryptology Conference CRYPTO ?96, Santa Barbara, California, Vol. 1109, pp. 31-44, 1996-08-12/1996-08-18. (BibTeX) (More info)
  301. M. Kihl, C. Nyberg:
    Transient and stationary investigations of overload control in Intelligent Networks
    Proceedings of 12th International Conference on Computer Communications, pp. 602-607, 1996. (BibTeX) (More info)
  302. T. Johansson, B. Smeets:
    On A2-codes including arbiter's attacks
    Advances in Cryptology / Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94, Perugia, Italy, Vol. 950, pp. 456-461, 1994-05-09/1994-05-12. (BibTeX) (More info)
  303. T. Johansson:
    Authentication codes protecting against collusion attacks
    Proceedings of the Seventh Joint Swedish-Russian Workshop on Information Theory, pp. 137-141, 1995. (BibTeX) (More info)
  304. T. Johansson:
    Constructions of asymmetric authentication systems
    IEEE International Symposium on Information Theory, Whistler, BC, pp. 354-, 1995-09-17/1995-09-22. (BibTeX) (More info)
  305. U. Ahlfors, C. Nyberg:
    Modeling Optimal Overload Control in Distributed Control Systems
    Proceedings of the 12th International Conference on Computer Communications, Seoul, Korea, August 1995, 1995. (BibTeX) (More info)
  306. U. Ahlfors, C. Nyberg:
    On Overload Control in Distributed Control System
    Proceedings of the ITC Sponsored Regional International Teletraffic Seminar, St. Petersburg, Russia, June 1995, St. Petersburg, Russia, 1995-06. (BibTeX) (More info)
  307. U. Ahlfors, C. Nyberg:
    Overload Control Performance in Distributed Control Systems Based on Multicomputer Architectures
    Proceedings of the 2nd IEEE Malaysia International Conference on Communications, Langkawi Island, Malaysia, Nov. 1995, 1995. (BibTeX) (More info)
  308. U. Ahlfors, U. Körner, C. Nyberg:
    Overload control strategies in a multiprocessor system with distributed data
    Proceedings of the 5th IEE Conference on Telecommunications, Brighton, UK, March 1995, Brighton, UK, pp. 145-149, 1995-03-25/1995-03-29. (BibTeX) (More info)
  309. C. Nyberg, U. Ahlfors, M. Kihl:
    Modified PD controller applied to overload control of a multi-processor system
    Proceedings of 12th Nordic Teletraffic Seminar, 1995. (BibTeX) (More info)
  310. M. Kihl, C. Nyberg:
    A study of methods for protecting an SCP from overload
    Proceedings of 5th IEE Conference on Telecommunications, Brighton, UK, pp. 125-129, 1995-03-26 - 1995-03-29. (BibTeX) (More info)
  311. M. Kihl, C. Nyberg:
    Application of modified PID controllers to overload control in Intelligent networks
    Proceedings of International Teletraffic Seminar, 1995. (BibTeX) (More info)
  312. C. Nyberg, M. Kihl:
    Overload control strategies for an SCP with several services
    Proceedings of 2nd IEEE Malaysia International Conference on Communications, 1995. (BibTeX) (More info)
  313. L. Falk, U. Körner:
    DQDB - some new characteristics
    Third International Conference on Local and Metropolitan Communications Systems, Kyoto, Japan, Vol. 3, pp. 342-354, 1994-12. (BibTeX) (More info)
  314. T. Johansson:
    A2-codes and codes for the rank metric
    IEEE International Symposium on Information Theory, Trondheim, Norway, pp. 492-, 1994-06-27/1994-07-01. (BibTeX) (More info)
  315. T. Johansson:
    Secrecy codes for source messages of finite length
    EIDMA Winter Meeting on Coding and Information Theory and Cryptology, pp. 46-, 1994. (BibTeX) (More info)
  316. U. Körner, C. Nyberg, B. Wallström:
    The impact of new services and new control architectures on overload conrol
    Teletraffic Science and Engineering, 14th International Teletraffic Congress - ITC 14, Antibes Juan-les-Pins, France, Vol. 1, pp. 275-284, 1994-06-06/1994-06-10. (BibTeX) (More info)
  317. T. Johansson, G. Kabatianskii, B. Smeets:
    On the relation between A-codes and codes correcting independent errors
    Advances in Cryptology / Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT ?93, Lofthus, Norway, Vol. 765, pp. 1-11, 1993-05-23/1993-05-27. (BibTeX) (More info)
  318. J. Bierbrauer, T. Johansson, G. Kabatianskii, B. Smeets:
    On the construction of universal families of hash functions via geometric codes and concatenation
    Advances in Cryptology / Lecture Notes in Computer Science, 13th Annual International Cryptology Conference CRYPTO? 93, Santa Barbara, California, Vol. 773, pp. 331-342, 1993-08-22/1993-08-26. (BibTeX) (More info)
  319. T. Johansson:
    On the construction of perfect authentication codes that permit arbitration
    Advances in Cryptology / Lecture Notes in Computer Science, 13th Annual International Cryptology Conference CRYPTO? 93, Santa Barbara, California, Vol. 773, pp. 343-354, 1993-08-22/1993-08-26. (BibTeX) (More info)
  320. T. Johansson:
    Lower bounds on the probability of deception in authentication
    IEEE International Symposium on Information Theory, pp. 231-, 1993-01-17/1993-01-22. (BibTeX) (More info)
  321. T. Johansson:
    Relations between authentication codes and error-correcting codes
    2nd International Winter Meeting on Coding and Information Theory, pp. 29-, 1993. (BibTeX) (More info)
  322. U. Körner, C. Nyberg:
    Load control procedures for intelligent networks
    Proceedings of the IFIP TC6 Task Group/WG6.4 International Workshop on Performance of Communication Systems: Modelling and Performance Evaluation of ATM Technology, 1993. (BibTeX) (More info)
  323. T. Johansson:
    A construction of authentication codes with total secrecy
    1st International Winter Meeting on Coding and Information Theory, pp. 32-, 1991. (BibTeX) (More info)
  324. U. Körner, C. Nyberg:
    On overload control of high-speed switching nodes
    NATO A S I Series F, Computer and Systems Sciences, NATO Advanced Research Workshop on Architecture and Performance Issues of High-Capacity Local and Metropolitan Area Networks, Sophia Antipolis, France, Vol. 72, pp. 423-438, 1990. (BibTeX) (More info)
  325. U. Körner:
    Overload control of SPC systems
    Teletraffic and datatraffic in a period of change/ North-Holland Studies in Telecommunications, ITC-13 : thirteenth international teletraffic conference, Copenhagen, Denmark, Vol. 14, pp. 105-114, 1991-06-19/1991-06-26. (BibTeX) (More info)
  326. H. Osthoff, R. Johannesson, B. Smeets, H. Vinck:
    On the linear M-algorithm
    1990 IEEE International Symposium on Information Theory (ISIT), San Diego, California, 1990-01-14/1990-01-19. (BibTeX) (More info)
  327. M. Pioro, J. Lubacz, U. Körner:
    Dynamic routing in multi service networks: a unified approach
    Network Planning in the 1990's, The Fourth International Network Planning Symposium, Palma de Mallorca, Spain, pp. 115-121, 1989-09-17/1989-09-22. (BibTeX) (More info)
  328. H. Vinck, H. Osthoff, R. Johannesson, R. van der Vleuten, B. Smeets:
    Linear complexity decoding for convolutional codes and intersymbol interference channels
    1988 IEEE International Symposium on Information Theory (ISIT), Kobe, Japan, 1988-06-19/1988-06-24. (BibTeX) (More info)
  329. M. Pioro, U. Körner, B. Wallström:
    Design methods and routing control in integrated services networks with alternative routing
    Teletraffic CongressTeletraffic science for new cost-effective systems, networks, and services / Studies in Telecommunication, ITC-12 : twelfth international teletraffic congress,, Torino, Italy, Vol. 12, pp. 887-893, 1988-06-01/1988-06-08. (BibTeX) (More info)
  330. Z. Dziong, M. Pioro, U. Körner, T. Wickberg:
    On adaptive call routing strategies in circuit switched networks - maximum revenue approach
    Teletraffic science for new cost-effective systems, networks, and services / Studies in Telecommunication, ITC-12 : twelfth international teletraffic congress, Torino, Italy, Vol. 12, pp. 998-1005, 1988-06-01/1988-06-08. (BibTeX) (More info)
  331. U. Körner:
    Concatenated data networks
    Proceedings of the IFIP TC6 International Conference on Information Network and Data Communication II, pp. 167-176, 1988. (BibTeX) (More info)
  332. U. Körner, S. Fdida, H. G. Perros, G. Shapiro:
    End to End Delays in a Catanet Environment
    Data Communication Systems and their Performance, Third IFIP TC6/WG 7.3 international conference, Rio de Janeiro, Brazil, pp. 441-452, 1987. (BibTeX) (More info)
  333. U. Körner:
    Concatenated data networks a performance survey
    Information Network and Data Communication II, IFIP TC 6 International Conference, Copenhagen, Denmark, pp. 167-176, 1988-03-14/1988-03-17. (BibTeX) (More info)

Conference Papers

  1. Y. Li, M. Pioro:
    Robust Topology Design with Routing Optimization in Wireless Optical Networks
    Polish Teletraffic Symposium 2012 (PTS 2012), Zakopane, Poland, 2012-12-05. (BibTeX) (More info)
  2. Y. Li, U. Körner, M. Pioro, D. Yuan:
    An Ef?cient Heuristic for Flow Optimization in Wireless Mesh Networks
    Third Nordic Workshop on System & Network Optimization for Wireless, Trysil, Norway, 2012-04-10. (BibTeX) (More info)
  3. J. Cao, C. Nyberg:
    A monotonic property of the optimal admission control to an M/M/1 queue under periodic observations with average cost criterion
    Seventeenth Nordic Teletraffic Seminar, NTS 17, Fornebu, Norway, 25-27 August 2004, 2004. (BibTeX) (More info)
  4. C. Jianhua, C. Nyberg:
    On overload control through queue length for web servers
    Sixteenth Nordic Teletraffic Seminar NTS 16 : Helsinki University of Technology, Espoo August 21-23, 2002 : proceedings (Report / Helsinki University of Technology, Networking Laboratory), 2002. (BibTeX) (More info)
  5. M. Kihl, N. Widell, C. Nyberg:
    Perfomance Modelling and Control of Distributed E-commerce Sites
    Proceedings (on CD), SSGRR-2001, Infrastructure for e-Business, e-Education and e-Science on the Internet, L'Aquila, Italy, 2001, 2001. (BibTeX) (More info)
  6. N. Widell, C. Nyberg:
    Gateway-based call admission in distributed object oriented systems
    Proceedings fifteenth Nordic Teletraffic Seminar, NTS-15, Lund University, August 22-24, 2000, 2000. (BibTeX) (More info)
  7. M. Kihl, C. Nyberg, N. Widell:
    Measuring real-time performance in distributed object oriented systems
    Performance and control of network systems III : 20-21 September 1999, Boston, Massachusetts, SPIE Performance and control of network systems III, pp. 248-258, 1999. (BibTeX) (More info)

Conference Abstracts

  1. M. Safavi, S. Bastani:
    A Simulation Package for Energy Consumption of Content Delivery Networks (CDNs)
    OMNeT++ Community Summit, Zurich, Switzerland, 2015-09-04. (BibTeX) (More info)
  2. M. Nyström, I. Hooge, R. Andersson:
    The effect of pupil size on the dynamics of the eye tracker signal during saccades
    Journal of Eye Movement Research, European Conference on Eye Movements, Vienna, Vol. 8, No. 4:1, pp. 139-139, 2015-08-16/2015-08-21. (BibTeX) (More info)
  3. I. Bianchi, R. Burro, M. Nyström, C. Paradis, J. van de Weijer:
    The perception of intermediates
    Contrast in perception, cognition and language, University of Verona, Italy, 2015-10-29. (BibTeX) (More info)
  4. R. Andersson, D. Witzner Hansen, I. Hooge, M. Nyström:
    Are microsaccade amplitudes overestimated in modern studies?
    Journal of Eye Movement Research, European Conference on Eye Movements, Vienna, Vol. 8, No. 4:1, pp. 44-44, 2015-08-16/2015-08-21. (BibTeX) (More info)
  5. A. Strukelj, K. Scheiter, M. Nyström, K. Holmqvist:
    The adaptation period for blurry text : Low-pass filtered text is read fast initially but slows down over time, and does not improve learning outcomes
    European Conference on Eye Movements (ECEM), Vienna, Austria, 2015. (BibTeX) (More info)
  6. R. Andersson, L. Larsson, K. Holmqvist, M. Stridh, M. Nyström:
    The not so simple art of automatic eye movement identification
    APCPP, Brno, Czech Republic, 2015-05-21/2015-05-22. (BibTeX) (More info)
  7. A. Eitel, K. Scheiter, A. Schüler, M. Nyström, K. Holmqvist:
    How a Picture Fosters Comprehension of Text: Evidence from Eye Movements on Blank Screen
    Book of Abstracts of the 17th European Conference on Eye Movements, Journal of Eye Movement Research, ECEM 2013 :17th European Conference on Eye Movement, Lund, Sweden, Vol. 6, No. 3, pp. 214-214, 2013-08-11/2013-08-16. (BibTeX) (More info)
  8. M. Nyström, I. Hooge, K. Holmqvist:
    Do pupil-based eye trackers measure eye movements? Relative movements between the pupil- and iris centers directly after saccades
    Book of Abstracts of the 17th European Conference on Eye Movements, Journal of Eye Movement Research, ECEM 2013 :17th European Conference on Eye Movements, Lund, Sweden, Vol. 6, No. 3, pp. 249-249, 2013-08-11/2013-08-16. (BibTeX) (More info)
  9. A. Strukelj, M. Nyström, C. Paradis:
    Reading What You Think You See. Good Enough Representations and Lingering Effects of Error Correction
    11th International Symposium of Psycholinguistics and Neurolinguistics, Tenerife, Spain, 2013-03-20. (BibTeX) (More info)
  10. H. Jarodzka, M. Nyström, M. Ögren:
    There's more to multimedia than meets the eye: is seeing pictures believing?
    Book of Abstracts of the 17th European Conference on Eye Movements, 11-16 August 2013, in Lund, Sweden. Journal of Eye Movement Research, ECEM 2013 :17th European Conference on Eye Movements, Lund, Sweden, Vol. 6, No. 3, pp. 211-211, 2013-08-11/2013-08-16. (BibTeX) (More info)
  11. P. Timberg, K. Lång, M. Nyström, K. Holmqvist, P. Wagner, D. Förnvik, A. Tingberg, S. Zackrisson:
    Investigation of viewing procedures for interpretation of breast tomosynthesis image volumes: a detection-task study with eye tracking
    Book of Abstracts of the 17th European Conference on Eye Movements, Journal of Eye Movement Research, ECEM 2013 :17th European Conference on Eye Movements, Lund, Sweden, Vol. 6, No. 3, pp. 555-555, 2013-08-11/2013-08-16. (BibTeX) (More info)
  12. I. Hooge, M. Nyström, T. Cornelissen, K. Holmqvist:
    Properties of post-saccadic oscillations induced by eye trackers
    Book of Abstracts of the 17th European Conference on Eye Movements, 11-16 August 2013, in Lund, Sweden. Journal of Eye Movement Research, ECEM 2013 :17th European Conference on Eye Movements, Lund, Sweden, Vol. 6, No. 3, pp. 252-252, 2013-08-11/2013-08-16. (BibTeX) (More info)
  13. L. Larsson, M. Nyström, M. Stridh:
    Detection of fixations and smooth pursuit eye movements using local and global properties of the eye-tracking signal
    Book of Abstracts of the 17th European Conference on Eye Movements, Journal of Eye Movement Research, ECEM 2013 :17th European Conference on Eye Movements, Lund, Sweden, Vol. 6, No. 3, pp. 250-250, 2013-08-11/2013-08-16. (BibTeX) (More info)
  14. T. Balslev, H. Jarodzka, K. Holmqvist, M. Nyström, B. Eika, P. Gerjets:
    Enhancing learners' visual search in videocases
    12th International Child Neurology Congress, Brisbane, Australia, 2012-05-27. (BibTeX) (More info)
  15. M. Nyström, I. Hooge, K. Holmqvist:
    Accuracy of fast, post-saccadic eye movements recorded with pupil-based eye trackers is influenced by relative motion between the pupil and the iris
    SWAET 2012 : The Scandinavian Workshop on Applied Eye Tracking, SWAET 2012 - The Scandinavian Workshop on Applied Eye Tracking, Stockholm, KI, pp. 30-30, 2012-05-02/2012-05-14. (BibTeX) (More info)
  16. A. Eitel, K. Scheiter, A. Schuler, M. Nyström, K. Holmqvist:
    How a picture can foster comprehension of text: Evidence for scaffolding
    SWAET 2012 - The Scandinavian Workshop on Applied Eye Tracking, Stockholm, KI, pp. 33-33, 2012-05-02/2012-05-14. (BibTeX) (More info)
  17. R. Dewhurst, M. Nyström, H. Jarodzka, T. Foulsham, R. Johansson, K. Holmqvist:
    The effect of task difficulty on eye movement sequences in multiple dimensions
    SWAET 2012 : The Scandinavian Workshop on Applied Eye Tracking, SWAET 2012 - The Scandinavian Workshop on Applied Eye Tracking, Stockholm, KI, pp. 31-31, 2012-05-02/2012-05-14. (BibTeX) (More info)
  18. M. Ögren, M. Nyström:
    How do university students solve problems in vector calculus? Evidence from eye tracking
    SWAET 2012 : The Scandinavian Workshop on Applied Eye Tracking, SWAET 2012 - The Scandinavian Workshop on Applied Eye Tracking, Stockholm, KI, pp. 35-35, 2012-05-02/2012-05-14. (BibTeX) (More info)
  19. A. Eitel, K. Scheiter, A. Schuler, M. Nyström, K. Holmqvist:
    How a picture can scaffold comprehension of text
    EARLI SIG2, Grenoble, France, pp. 61-63, 2012-08-29/2012-08-31. (BibTeX) (More info)
  20. H. Jarodzka, T. Balslev, K. Holmqvist, M. Nyström, K. Scheiter, P. Gerjets, B. Eika:
    Foveating instructional videos based on experts? eye movements to teach perception and interpretation of dynamic scenes
    ECEM 2011, 16th European Conference on Eye Movements, Marseille, France, pp. 282-282, 2011-08-21/2011-08-25. (BibTeX) (More info)
  21. M. Ögren, M. Nyström:
    Eye-tracking studie av vektoranalys på LTH
    Lunds universitets tredje utvecklingskonferens, Lund, Sweden, 2011-10-13. (BibTeX) (More info)
  22. H. Jarodzka, T. Balslev, K. Holmqvist, M. Nyström, K. Scheiter, P. Gerjets, B. Eika:
    Foveating instructional videos based on experts? eye movements to teach perception and interpretation of dynamic scenes
    ECEM 2011,16th European Conference on Eye Movements, Université de Provence, Marseille, France, Vol. 4, No. 3, pp. 282-282, 2011-08-21/2011-08-25. (BibTeX) (More info)
  23. K. Holmqvist, M. Nyström, F. Mulvey:
    An initiative for the standardisation of data quality in eye-trackers
    ECEM 2011, 16th European Conference on Eye Movements, Marseille, France, pp. 134-134, 2011-08-21/2011-08-25. (BibTeX) (More info)
  24. R. Dewhurst, M. Nyström, H. Jarodzka, K. Holmqvist:
    Scanpath similarity depends on how you look at it: Evaluating a ?MultiMatch? comparison algorithm
    ECEM 2011, 16th European Conference on Eye Movements, Marseille, France, 2011-08-21/2011-08-25. (BibTeX) (More info)
  25. R. Dewhurst, H. Jarodzka, K. Holmqvist, T. Foulsham, M. Nyström:
    A new method for comparing scanpaths based on vectors and dimensions
    Vision Sceinces Society, Naples, Florida, 2011-05-06. (BibTeX) (More info)
  26. K. Holmqvist, M. Nyström, R. Andersson, J. van de Weijer:
    Participants know best : The effect of calibration method on data quality
    Vision Science Society 2011, Naples, Florida, 2011-05-11. (BibTeX) (More info)
  27. R. Andersson, M. Nyström, K. Holmqvist:
    Quantification of the effects of calibration method and eye factors on eye- tracking accuracy
    Journal of Eye Movement Research - Abstracts of the 16th European Conference on Eye Movements, Marseille, France, Vol. 4, No. 3, pp. 96-96, 2011-08-21. (BibTeX) (More info)
  28. L. Larsson, M. Stridh, M. Nyström:
    Event detection in data with static and dynamic stimuli
    ECEM 2011, 16th European Conference on Eye Movements, Marseille, France, pp. 37-37, 2011-08-21/2011-08-25. (BibTeX) (More info)
  29. P. Stankovski:
    Automated algebraic cryptanalysis
    Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010, Royal Holloway, Egham, UK, pp. 11-11, 2010-06-22/2010-06-23. (BibTeX) (More info)
  30. H. Jarodzka, T. Balslev, K. Holmqvist, K. Scheiter, M. Nyström, B. Eika:
    Learning Perceptual Skills for Medical Diagnosis via Eye Movement Modeling Examples on Patient Video Cases
    The 5th Scandinavian Workshop on Applied Eye-Tracking, SWAET 2010, Program & Abstracts, The 5th Scandinavian Workshop on Applied Eye-tracking (SWAET 2010), Lund, Sweden, pp. 11-11, 2010-05-05/2010-05-07. (BibTeX) (More info)
  31. M. Nyström, R. Andersson, J. van de Weijer:
    Quantifying and modelling factors that influence calibration and data quality
    The 5th Scandinavian Workshop on Applied Eye-Tracking, SWAET 2010, Program & Abstracts, The 5th Scandinavian Workshop on Applied Eye-tracking, Lund, Sweden, pp. 28-28, 2010-05-05/2010-05-07. (BibTeX) (More info)
  32. R. Andersson, M. Nyström, K. Holmqvist:
    What speed do I need? Sampling frequency and dependent variables
    5th Scandinavian Workshop on Applied Eye-Tracking, Lund, Sweden, 2010-05-05/2010-05-07. (BibTeX) (More info)
  33. M. Nyström:
    An algorithm to detect glissades in eye-tracking data
    The Scandinavian Workshop on Applied Eye Tracking, Stavanger, Norway, 2009. (BibTeX) (More info)
  34. M. Nyström, K. Holmqvist:
    Role of glissades in event detection algorithms
    15th European Conference on Eye Movements (ECEM), Southampton, UK, 2009-08-23/2009-08-27. (BibTeX) (More info)
  35. M. Zotkiewicz, M. Pioro, A. Tomaszewski:
    On the complexity of resilient network optimization problems
    AIRO 2008, Ischia, Italy, 2008-09-07/2008-09-11. (BibTeX) (More info)
  36. A. Tomaszewski, M. Pioro:
    On complexity of a multicommodity flow problem with path diversity
    18th Triennial Conference of the International of Operational Research Societies IFORS 2008, Sandton, South Africa, pp. 29-, 2008-07-13/2008-07-18. (BibTeX) (More info)
  37. M. Pioro, T. Sliwnski, M. Zagozdzon, W. Ogryczak, M. Dzida:
    Path generation issues in survivable network design problems
    18th Triennial Conference of the International of Operational Research Societies IFORS 2008, Sandton, South Africa, pp. 21-, 2008-07-13/2008-07-18. (BibTeX) (More info)
  38. M. Zagozdzon, M. Dzida, M. Pioro:
    A survey of IGP/MPLS hybrid routing approaches
    International Workshop on Traffic Management and Traffic Engineering for the Future Internet (FITraMEn 2008), Porto, Portugal, 2008-12-11/2008-12-12. (BibTeX) (More info)
  39. M. Nyström, K. Holmqvist:
    Perceptual effects of off-line foveated video
    The Scandinavian Workshop on Applied Eye Tracking, Lund, Sweden, 2007. (BibTeX) (More info)
  40. M. Nyström, K. Holmqvist:
    Video compression controlled by viewers' gazes
    Scandinavian Workshop on Applied Eye-tracking, Lund, Sweden, 2006. (BibTeX) (More info)
  41. M. Nyström, K. Holmqvist:
    Allocating overt attention in video based on eye-tracking measurements
    European Conference on Eye Movements, Bern, 2005. (BibTeX) (More info)
  42. M. Nyström, K. Holmqvist:
    A quality function for variable resolution video based on eye-tracking measurements
    Bioinspired Information Processing (BIP), Lubeck, Germany, 2005. (BibTeX) (More info)
  43. M. Dzida, M. Pioro, M. Zagozdzon:
    Application of max-min fairness rule to bandwidth allocation in telecommunication networks - implementation issues
    Euro-NGI Workshop on Traffic Engineering, Protection and Restoration for NGI, Lund, Sweden, pp. 1-, May 2004. (BibTeX) (More info)
  44. T. Johansson:
    Relations between error-correcting codes, authentication
    Computer Security, Cryptology and Coding theory research program, Cambridge, 1996. (BibTeX) (More info)

Reports

  1. C. Jämthagen, L. Karlsson, P. Stankovski, M. Hell:
    eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
    2014. (BibTeX) (More info)
  2. D. Medved, A. Franco, X. Gao, F. Yang:
    Challenges in teaching international students: group separation, language barriers and culture differences
    Genombrottet, Lunds tekniska högskola, 2013. (BibTeX) (More info)
  3. J. Liu, R. Yu, M. Ye:
    Energy Efficient Cellular Strategy: Virtual Cell Based Recoverable Sleeping Mode
    2012. (BibTeX) (More info)
  4. T. Johansson, C. Löndahl:
    An improvement to Stern's algorithm
    2011. (BibTeX) (More info)
  5. W. Li, H. Yi, B. Chen, H. Hu, J. Liu:
    Demand-Driven Dynamic Spectrum Allocation in Heterogeneous Cellular Networks
    2011. (BibTeX) (More info)
  6. M. Ågren, M. Hell, T. Johansson:
    Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
    2011. (BibTeX) (More info)
  7. M. Hell, T. Johansson:
    Security Evaluation of Stream Cipher Enocoro-128v2
    CRYPTREC Technical Report, 2010. (BibTeX) (More info)
  8. S. Orlowski, M. Pioro:
    On the complexity of column generation in survivable network design with path-based survivability mechanisms
    ZIB-Report, ISSN 1438-0064, Warsaw University of Technology, 2008. (BibTeX) (More info)
  9. A. Hamidian:
    Providing QoS Guarantees in Ad Hoc Networks through EDCA with Resource Reservation
    Faculty of Engineering, LTH at Lund University, 2006. (BibTeX) (More info)
  10. N. Widell, C. Nyberg, M. Kihl:
    Overload Protection for CORBA Systems with Time Constraints
    NetRG Publications, 2002. (BibTeX) (More info)

Dissertations

  1. C. Löndahl:
    Some Notes on Code-Based Cryptography
    ISBN 978-91-7623-119-7, 2015. (BibTeX) (More info)
  2. Y. Li:
    Mathematical Models and Algorithms for Wireless Network Design and Optimization
    Vol. 66, ISSN 1654-790X, 2015. (BibTeX) (More info)
  3. P. Stankovski:
    Cryptanalysis of Selected Stream Ciphers
    Series of licentiate and doctoral dissertations, Vol. 50, ISSN 1654-790X, Department of Electrical and Information Technology, Lund University, 2013. (BibTeX) (More info)
  4. M. Ågren:
    On Some Symmetric Lightweight Cryptographic Designs
    ISSN 1654-790X, 2012. (BibTeX) (More info)
  5. A. Hamidian:
    Supporting Internet Access and Quality of Service in Distributed Wireless Ad Hoc Networks
    ISSN 1654-790X, 2009. (BibTeX) (More info)
  6. M. Nyström:
    Off-line Foveated Compression and Scene Perception: An Eye-Tracking Approach
    ISSN 1654-790X, Department of Electrical and Information Technology, Lund University, 2008. (BibTeX) (More info)
  7. E. Kubilinskas:
    Design of Multi-layer Telecommunication Networks: Fairness, Resilience, and Load Balancing
    Series of licentiate and doctoral theses (Department of Electrical and Information Technology), ISSN 1654-790X, Tryckeriet i E-huset, Lunds universitet, 2008. (BibTeX) (More info)
  8. M. Hell:
    On the Design and Analysis of Stream Ciphers
    ISBN 91-7167-043-2, Department of Electrical and Information Technology, Lund University, 2007. (BibTeX) (More info)
  9. A. Nilsson Plymoth:
    Wireless Multi Hop Access Networks and Protocols
    Reports on Communications Systems, ISSN 1101-3931, Faculty of Engineering, LTH at Lund University, 2007. (BibTeX) (More info)
  10. U. Ahlfors:
    Dynamic Traffic Control in Multiservice Networks - Applications of Decision Models
    Reports on communication systems, Vol. 140, ISSN 1101-3931, Department of Communication Systems, Lund University, 2000. (BibTeX) (More info)
  11. C. Gehrmann:
    Topics in Authentication Theory
    ISBN 91-7167-007-6, Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE-221 00 Lund,, 1997. (BibTeX) (More info)
  12. T. Johansson:
    Contributions to unconditionally secure authentication
    ISBN 91-7167-004-1, 1994. (BibTeX) (More info)
  13. U. Körner:
    Congestion Control in Packet Switching Computer Communication Networks
    1982. (BibTeX) (More info)

Licentiate Thesis

  1. A. Hamidian:
    Internet Access and QoS in Ad Hoc Networks
    Faculty of Engineering, LTH at Lund University, 2006. (BibTeX) (More info)
  2. J. Cao:
    Some topics in web performance analysis
    Reports on communication systems, Vol. 158, ISSN 1101-3931, Lund Institute of Technology, 2004. (BibTeX) (More info)

Popular Science Papers

  1. F. Kristensen, O. Troeng, M. Safavi, P. Narayanan:
    Competition in higher education ? good or bad?
    Lund University, 2015. (BibTeX) (More info)
  2. B. Smeets:
    Relevans av tekniskt skydd för tillit
    DigiTrust: Tillit i det digitala. Tvärvetenskapliga perspektiv från ett forskningsprojekt, pp. 47-51, ISBN 978-91-979893-6-7, Pufendorfinstitutet, Lunds universitet, 2014. (BibTeX) (More info)

Submitted/Unpublished

  1. M. Andersson, A. Bengtsson, M. Höst, C. Nyberg, J. Holst:
    Web server traffic in crisis conditions
    3:rd Swedish National Computer Networking Workshop (SNCN), 2005. (BibTeX) (More info)
  2. J. K. Andersson, C. Nyberg:
    Shaping in multi service architectures
    2005. (BibTeX) (More info)

Editor for Books/Conferences

  1. T. Johansson, N. Phong Q.:
    Advances in Cryptology -- EUROCRYPT 2013
    ISBN 978-3-642-38348-9, 2013.
  2. D. Pointcheval, T. Johansson:
    Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques
    Lecture Notes in Computer Science, Vol. 7237, ISSN 0302-9743, Springer, 2012.
  3. M. Pioro, K. Szczypiorski, J. Rak, O. Gonzales-Soto:
    Proceedings of the 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2010),
    ISBN 978-1-4244-6705-1, IEEE, 2010-09-27/2010-09-30.
  4. N. Akar, M. Pioro, C. Skianis:
    IP operations and management
    Lecture Notes in Computer Science, 8th IEEE international workshop, IPOM 2008, Vol. 5275, ISSN 1611-3349, Springer, 2008-09-22/2008-09-26.
  5. A. Feldman, P. J. Kuehn, M. Pioro, A. Wolisz:
    Proceedings of the 5th Polish-German Teletraffic Symposium (PGTS)
    ISBN 978-8325-2047-2, Logos Verlag, 2008-10-06/2008-10-07.
  6. P. Buchholz, R. Lehnert, M. Pioro:
    Proceeding of the Twelfth GI/ITG Conference on Measuring, Modelling and Evaluation of Computer and Communication Systems (MMB) and the Third Polish-German Teletraffic Symposium (PGTS)
    ISBN 0-12-557189-5, VDI Verlag GmbH, 2004.
  7. T. Johansson:
    Fast Software Encryption, FSE 2003
    Lecture Notes in Computer Science, Vol. 2887, ISBN 3-540-20449-0, Springer, 2003.
  8. T. Johansson:
    Progress in Cryptology - INDOCRYPT 2003
    Lecture Notes in Computer Science, Vol. 2904, ISBN 3-540-20609-4, Springer, 2003.
  9. P. Kuehn, R. Lehnert, M. Pioro, J. Wozniak:
    Proceedings of the Second Polish-German Teletraffic Symposium (PGTS)
    ISBN 83-917681-0-4, Technical University of Gdansk Publishing Company, 2002.
  10. G. Pujolle, H. Perros, S. Fdida, U. Körner, I. Stavrakakis:
    Networking 2000 : broadband communications, high performance networking and performance of communication networks
    Lecture Notes in Computer Science, Vol. 1815, ISSN 0302-9743, Springer, 2000.
  11. U. Körner, A. Nilsson:
    Performance of information and communication systems
    IFIP Advances in Information and Communication Technology, ISBN 978-0412837302, Chapman and Hall, 1998.
  12. U. Körner:
    ITC specialist seminar on control in communications
    ISBN 91-630-4804-3, 1996.