Teinemaa, I., „Predictive Business Process Monitoring with Structured and Unstructured Data.“ Leontjeva, A., „Combining Static and Dynamic Features for Multivariate Sequence Classification.“ Raun, J., Ahas, R., Tiru, M., „Measuring tourism destinations using mobile tracking data.“ Reisberg, S., „Working with digital health data.” International conference “Nordic Digital Day 2016.” Saar, T., Dumas, M., Kaljuve, M., Semenenko, N., „Browserbite: cross-browser testing via image processing.”


Kõivumägi, E., Vait, M., Hadachi, A., Singer, G., Vainikko E. “Real Time Movement Labeling of Mobile Event Data”, Journal of Location Based Services, Editor: Taylor & Francis, 2015. Krips, T., Willemson, J. “Point-counting method for embarrassingly parallel evaluation in secure computation.“ Foundations & Practice of Security 2015, 25.-29.10.2015, Clermont-Ferrand, France. To be published in volume 9482 of Lecture Notes in Computer Science, Springer. Pettai, M., Laud, P. “Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries”. In IEEE 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 14-17 July 2015. Pettai, M., Laud, P. “Combining Differential Privacy and Secure Multiparty Computation,“ Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, 7.-11.12.2015, pages 421-430. Daneshmand, M., Traumann, A., Anbarjafari, G. ”3D Size-Estimation based on the Geodesic Distance Measured by Photogrammetric Scanning Device”. 6th Int. Conf. on 3D Body Scanning Technologies, Lugano. Switzerland: Hometrica Consulting, 221−231. Daneshmand, M., Aabloo, A., Anbarjafari, G. ”Size-Dictionary Interpolation for Robot’s Adjustment”. Frontiers in Bioengineering and Biotechnology, 3, 63-70. Traumann, A., Daneshmand, M., Escalera, S., Anbarjafari, G. ”Vision-based Accurate 3D Measurement Using Optical Depth Information”. Electronics Letters Journal, 51 (18), 1420−1422. Traumann, A., Anbarjafari, G., Escalera, S.A. “A new Retexturing Method for Virtual Fitting Room Using Microsoft Kinect 2 Camera”. Computer Vision and Pattern Recognition Conference. Boston, USA: IEEE, 75−79. Daneshman, M., Aabloo, A., Ozcinar, c., Anbarjafari, G. “Real-time, Automatic Shape-Changing Robot Adjustment and Gender Classification”. Signal, Image and Video Processing, 1−8. Heiberg, S., Parsovs, A., Willemson, J. “Log Analysis of Estonian Internet Voting 2013–2014”. 5th International Conference on E-Voting and Identity, VoteID 2015, Bern, Switzerland, September 2nd-4th, 2015. Ed. Rolf Haenni, Reto E. Koenig, Douglas Wikström. Springer, 19−34. (Lecture Notes in Computer Science; 9269). Ahas, R., Aasa, A., Yuan, Y., Smoreda, Z., Raubal, M., Liu, Y., Ziemlicki, C., Zook, M., Tiru, M. “Everyday Space-Time Geographies: Using mobile phone based sensor data to monitor urban activity in Harbin” Paris and Tallinn, International Journal of Geographical Information Science 2015. Raun, J., Ahas, R., Tiru, M. “Distinguishing tourism destinations with behavioural data from mobile positiong databases”. Annals of Tourism Research. Kikas, R., Dumas, M., Saabas, A. Explaining International Migration in the Skype Network: The Role of Social Network Features. ACM Workshop on Social Media World Sensors (Sideways@HT 2015). ACM, 17−22. Verenich, I., Dumas, M., Kikas, R., Melnikov, D. “Combining Propensity and Influence Models for Product Adoption Prediction”. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang:. ACM, 49−56. Teinemaa, I., Leontjeva, A., Dumas, M., Kikas, R. “Community-Based Prediction of Activity Change in Skype”. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang. ACM, 73−80. Rossetti, G., Pappalardo, L., Kikas, R., Pedreschi, D., Giannotti, F., Dumas, M. “Community-centric analysis of user engagement in Skype social networks”. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang. ACM, 547−552.


Heiberg, S., Willemson, J. Verifiable Internet Voting in Estonia. In: Krimmer, R., Volkamer, M.: Proceedings of Electronic Voting 2014 (EVOTE2014), TUT Press, Tallinn, pages 23-29. Laud, P., Pankova, A. Verifiable Computation in Multiparty Protocols with Honest Majority. IACR Cryptology ePrint Archive 2014: 60 (2014). Pettai, M., Laud, P. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries. IACR Cryptology ePrint Archive 2014: 240 (2014). Krips, T., Willemson, J. Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. IACR Cryptology ePrint Archive 2014: 221 (2014). Šor, V., Srirama, N. S. Memory Leak Detection in Java: Taxonomy and Classification of Approaches, The Journal of Systems & Software (2014) ISSN: 0164-1212, 96(1):139-151, 2014. Elsevier, DOI: 10.1016/j.jss.2014.06.005. Šor, V., Srirama, S. N., Salnikov-Tarnovski, N. Memory leak detection in Plumbr. Journal of Software Practice and Experience, ISSN: 1097-024X, Wiley, DOI: 10.1002/spe.2275. Karsai, M., Iñiguez, G., Kaski, K., Kertész, J. Complex contagion process in spreading of online innovation. Journal of the Royal Society Interface Volume 11, Number 101, 2014. T. Saar, M. Dumas, M. Kaljuve, N. Semenenko. Cross-browser testing in Browserbite. In Proc. of 14th Int. Conf. on Web Engineering, ICWE 2014. S. Heiberg, J. Willemson. Modeling Threats of a Voting Method, Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors) Design, Development, and Use of Secure Electronic Voting Systems, IGI Global, 2014, pages 128-148 . Floreskul, K. Tretyakov, M. Dumas. Memory-Efficient Fast Shortest Path Estimation in Large Social Networks. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM'2014), Ann Arbor, MI, USA, June 2014. A. Hadachi, O. Batrashev, A. Lind, G. Singer and E. Vainikko. Cell phone Subscribers Mobility Prediction Using an Enhance Markov Chain Algorithm. In: Intelligent Vehicles Symposium (IV), 2014 IEEE: 2014 Intelligent Vehicles Symposium; Dearborn, Michigan, USA; June 8-11, 2014.


E. Kõivumägi, M. Vait, A. Hadachi. G. Singer. Real Time Movement Labeling of Mobile Event Streams. Conference presentation at Mobile Ghent '13. R. Sirel, S. Reisberg, M. Merzin, J. Pruulmann, R. Kalda, J. Vilo. Elektrooniliste terviselugude analüüsimise võimalused Tartu perearstide infosüsteemi näitel. Eesti Arst 2013, 92(8), 452-459. S. Heiberg (2013). New Technologies for Democratic Elections. In: Business Process Management Workshops, Lecture Notes in Business Information Processing Volume 132, 2013, pp 630-635, Springer 2013. S. Laur, R. Talviste, J. Willemson. From oblivious AES to efficient and secure database join in the multiparty setting. 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 84-101. Springer, 2013. A. Pankova, P. Laud, M. Pettai, J. Randmets. pecifying Sharemind’s Arithmetic Black Box. PETShop: The Workshop on Language Support for Privacy Enhancing Technologies, Berlin, Germany, November 4th, 2013. Association for Computing Machinery (ACM) , 2013, 19 – 21. A. Pankova, P. Laud. On the (Im)possibility of Privately Outsourcing Linear Programming. CCSW 2013: The ACM Cloud Computing Security Workshop, Berlin, Germany, November 8th, 2013. (Toim.) Juels, Ari; Parno, Bryan. Association for Computing Machinery (ACM) , 2013, 55 - 64. A. Pankova, P. Laud. New Attacks against Transformation-Based Privacy-Preserving Linear Programming. Security and Trust Management - 9th International Workshop (STM 2013), Royal Holloway University of London, September 12-13. (Toim.) Accorsi, Rafael; Ranise, Silvio. Springer, 2013, (Lecture Notes in Computer Science; 8203), 17 - 32. A. Leontjeva, M. Goldszmidt, Y. Xie, F. Yu, and M. Abadi. "Early security classification of skype users via machine learning". In Proceedings of the 2013 ACM workshop on Artificial intelligence and security (AISec '13). ACM, New York, NY, USA, 35-44. N. Semenenko, T. Saar, M. Dumas. Browserbite: Accurate Cross-Browser Testing via Machine Learning Over Image Features. In Proc. of the 29th IEEE International Conference on Software Maintenance (ICSM 2013 - Industry Track), Eindhoven, The Netherlands. September 2013. IEEE Computer Society. V. Šor, T. Treier, S.N. Srirama. Improving statistical approach for memory leak detection using machine learning. In Proc. of the 29th IEEE International Conference on Software Maintenance (ICSM 2013 - Industry Track), Eindhoven, The Netherlands. September 2013. IEEE Computer Society R. Kikas, M. Dumas, M. Karsai. Bursty egocentric network evolution in Skype. Social Network Analysis and Mining, July 2013. A. Abels, M. Kruusmaa. Construction of a Female Shape-Changing Robotic Mannequin. Journal of Automation and Control Engineering, Vol. 1, No. 2, June 2013. A. Abels, M. Kruusmaa. Shape Control of an Anthropomorphic Tailoring Robot Mannequin. International Journal of Humanoid Robotics, Vol. 10, No. 2m June 2013. R. Sirel, (2013). Meetodeid tekstide leksikaalsete ja grammatiliste erinevuste tuvastamiseks meditsiiniliste tarbetekstide näitel. Eesti Rakenduslingvistika Ühingu Aastaraamat, 9, 265 - 278. L. Kamm, D. Bogdanov, S. Laur, J. Vilo. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. First published online Feb. 14, 2013, doi:10.1093/bioinformatics/btt066.


D. Bogdanov, M. Niitsoo, T. Toft, J. Willemson. "High-performance secure multi-party computation for data mining applications". International Journal of Information Security, Springer, 2012, Volume 11, Number 6, pages 403-418. S. Heiberg, P. Laud and J. Willemson. The Application of I-voting for Estonian Parliamentary Elections of 2011. In Aggelos Kiayias and Helger Lipmaa, editors, E-Voting and Identity, VoteID 2011, LNCS 7187, pp. 208-223. Springer, 2012. D. Bogdanov, R. Talviste, J. Willemson. Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper). In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012. V. Šor, Satish N. Srirama. Evaluation of embeddable graph manipulation libraries in memory constrained environments, In Proc. of the ACM Research in Applied Computation Symposium (RACS 2012), Oct. 23-26 2012 San Antonio, TX, USA, pp. 269-275, ACM Press. D. Bogdanov, R. Jagomägis, S. Laur. "A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining". In Proceedings of the Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2012), Kuala Lumpur, Malaysia, May 2012, Springer, pp. 112-126. M. Mazzucco, I. Mitrani, "Empirical Evaluation of Power Saving Policies for Data Centers". SIGMETRICS Performance Evaluation Review Volume 40, Number 3, pages 18-22, 2012. M. Mazzucco, M. Vasar, M. Dumas, "Squeezing out the Cloud via Profit-Maximizing Resource Allocation Policies", to appear in the IEEE 20th International Symposium of Modeling, Analysis and Simulation of Computer and Telecommunciation Systems (MASCOTS 2012), Arlington (USA), August 2012. Leontjeva, A., Tretjakov, T., Tamkivi, T., Vilo, J. “Fraud Detection: Methods of Analysis for Hypergraph Data” In Proceedings of the Workshop on Cyber Security of Online Social Networks (CSOSN 2012), Istanbul, Turkey, August 26-29, 2012. M. Mazzucco, D. Dyachuk. "Optimizing cloud providers revenues via energy efficient server allocation". Sustainable Computing: Informatics and Systems, pp 1--12, Vol. 2, Issue 1, March 2012. Mazzucco, M., Dyachuk, D. Balancing electricity bill and performance in server farms with setup costs. Future Generation Computing Systems, vol. 28, no. 2, pp. 415-426, 2012.


Matulevicius, R., Lakk, H., Lepmets, M. An approach to assess and compare quality of security models. Computer Science and Information Systems, vol. 8, no. 2, pp. 447-476, 2011. Freudenthal, M., Pugal, D. Simpl: a toolkit for rapid DSL implementatvn. In Proceedings of 12th Symp. on Programming Languages and Software Tools (SPLST 2011), Tallinn, October 2011, pp. 78-89. S. Mokarizadeh, P. Küngas, M. Matskin. Evaluation of a Semi-Automated Semantic Annotation Approach for Bootstrapping the Analysis of Large-scale Web Service Networks. In Proceedings of IEEE/WIC/ACM Intl. Conf. on Web Intelligence - WI 2011 (Lyon, France, August 2011), pp. 388-395, ACM, 2011. Tretyakov K., Armas-Cervantes A., García-Bañuelos L., Vilo J., Dumas M. Fast Fully Dynamic Landmark-based Estimation of Shortest Path Distances in Very Large Graphs. In Proceedings og the 20th ACM Conference on Information and Knowledge Management (CIKM'2011), Glasgow, UK, 1785-1794. Küngas P., Dumas M.. Configurable SOAP Proxy Cache for Data Provisioning Web Services. In Proceedings of the 25th ACM Symposium On Applied Computing, TaiChung, Taiwan, March 2011. ACM Press. Mazzucco, M., Dumas, M., Reserved or On-Demand Instances? A Revenue Maximization Model for Cloud Provider. 2011. Matulevicius, R., Dumas, M. (2011). Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control. Barzdins, J., Kirikova, M. (Eds.). Databases and Information Systems VI (339 - 352).IOS Press Laur, S., Zhang, B., Willemson, J., Round-efficient Oblivious Database Manipulation. 2011.


Mazzucco, M., Dyachuk, D., On Allocation Policies for Power and Performance. 2010. Freudenthal, M., Using DSLs for Developing Enterprise Systems. Language Descriptions Tools and Applications, Paphos, Cyprus. March 27-28. 2010. Freudenthal, M., Domain-Specific Languages in a Customs Information System. IEEE Software, 2, 65 - 71. 2010. Bogdanov, D., Laur, S., The design of a privacy-preserving distributed virtual machine. In the Collection of AEOLUS theoretical findings. Deliverable D1.0.6. AEOLUS project IP-FP6-015964. 2010. Matulevicius R., Dumas M., A Comparison of SecureUML and UMLsec for Role-based Access Control, Proceedings of the 9th International Baltic Conference (Baltic DB&IS 2010), University of Latvia Press, 2010, 171-185 Matulevicius R., Lepmets M., Lakk H., Sisask A., Comparing Quality of Security Models: a Case Study, Local Proceedings of the 14th East European Conference on Advances in Databases and Information Systems (ADBIS 2010), University of Novi Sad, 2010, 95-109. Annamaa A., Breslav A., Kabanov J., Vene V.: An interactive tool for analyzing embedded SQL queries. In Proceedings of the 8th ASIAN Symposium on Programming Languages and Systems (APLAS'2010), Shanghai, November 2010. Springer.