2017

Salnikov- Tarnovski, N., “Deceived by monitoring.” JFokus conference, Stockholm, Sweden. 06.-08.02.2017.

 

2016

Teinemaa, I., “Predictive Business Process Monitoring with Structured and Unstructured Data.”

Leontjeva, A., “Combining Static and Dynamic Features for Multivariate Sequence Classification.”

Raun, J., Ahas, R., Tiru, M., “Measuring tourism destinations using mobile tracking data.”

Reisberg, S., “Working with digital health data.” International conference “Nordic Digital Day 2016.”

Saar, T., Dumas, M., Kaljuve, M., Semenenko, N., “Browserbite: cross-browser testing via image processing.”

Dage Särg. Internetikeele süntaktiline analüüs kitsenduste grammatikaga. MA. University of Tartu.

Aleksei Panarin. Logs Mining Based Approach to eCommerce Customer Classification. M.Sc. University of Tartu.

Mari-Liis Allikivi. Clustering-based motif discovery from short peptides. M.Sc. University of Tartu

 

2015

Kõivumägi, E., Vait, M., Hadachi, A., Singer, G., Vainikko E. “Real Time Movement Labeling of Mobile Event Data”, Journal of Location Based Services, Editor: Taylor & Francis, 2015.

Krips, T., Willemson, J. “Point-counting method for embarrassingly parallel evaluation in secure computation.” Foundations & Practice of Security 2015, 25.-29.10.2015, Clermont-Ferrand, France. To be published in volume 9482 of Lecture Notes in Computer Science, Springer.

Pettai, M., Laud, P. “Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries”. In IEEE 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 14-17 July 2015.

Pettai, M., Laud, P. “Combining Differential Privacy and Secure Multiparty Computation,” Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, 7.-11.12.2015, pages 421-430.

Daneshmand, M., Traumann, A., Anbarjafari, G. “3D Size-Estimation based on the Geodesic Distance Measured by Photogrammetric Scanning Device”. 6th Int. Conf. on 3D Body Scanning Technologies, Lugano. Switzerland: Hometrica Consulting, 221−231.

Daneshmand, M., Aabloo, A., Anbarjafari, G. “Size-Dictionary Interpolation for Robot’s Adjustment”. Frontiers in Bioengineering and Biotechnology, 3, 63-70.

Traumann, A., Daneshmand, M., Escalera, S., Anbarjafari, G. “Vision-based Accurate 3D Measurement Using Optical Depth Information”. Electronics Letters Journal, 51 (18), 1420−1422.

Traumann, A., Anbarjafari, G., Escalera, S.A. “A new Retexturing Method for Virtual Fitting Room Using Microsoft Kinect 2 Camera”. Computer Vision and Pattern Recognition Conference. Boston, USA: IEEE, 75−79.

Daneshman, M., Aabloo, A., Ozcinar, c., Anbarjafari, G. “Real-time, Automatic Shape-Changing Robot Adjustment and Gender Classification”. Signal, Image and Video Processing, 1−8.

Heiberg, S., Parsovs, A., Willemson, J. “Log Analysis of Estonian Internet Voting 2013–2014”. 5th International Conference on E-Voting and Identity, VoteID 2015, Bern, Switzerland, September 2nd-4th, 2015. Ed. Rolf Haenni, Reto E. Koenig, Douglas Wikström. Springer, 19−34. (Lecture Notes in Computer Science; 9269).

Ahas, R., Aasa, A., Yuan, Y., Smoreda, Z., Raubal, M., Liu, Y., Ziemlicki, C., Zook, M., Tiru, M. “Everyday Space-Time Geographies: Using mobile phone based sensor data to monitor urban activity in Harbin” Paris and Tallinn, International Journal of Geographical Information Science 2015

Raun, J., Ahas, R., Tiru, M. “Distinguishing tourism destinations with behavioural data from mobile positiong databases”. Annals of Tourism Research.

Kikas, R., Dumas, M., Saabas, A. Explaining International Migration in the Skype Network: The Role of Social Network Features. ACM Workshop on Social Media World Sensors (Sideways@HT 2015). ACM, 17−22.

Verenich, I., Dumas, M., Kikas, R., Melnikov, D. “Combining Propensity and Influence Models for Product Adoption Prediction”. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang:. ACM, 49−56.

Teinemaa, I., Leontjeva, A., Dumas, M., Kikas, R. “Community-Based Prediction of Activity Change in Skype”. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang. ACM, 73−80.

Rossetti, G., Pappalardo, L., Kikas, R., Pedreschi, D., Giannotti, F., Dumas, M. “Community-centric analysis of user engagement in Skype social networks”. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang. ACM, 547−552.

Mari-Liis Allikivi. Clustering-based motif discovery from short peptides. M.Sc. University of Tartu

Aleksei Panarin. Logs Mining Based Approach to eCommerce Customer Classification. M.Sc. University of Tartu.

Dage Särg. Internetikeele süntaktiline analüüs kitsenduste grammatikaga. MA. University of Tartu.

 

2014

Heiberg, S., Willemson, J. Verifiable Internet Voting in Estonia. In: Krimmer, R., Volkamer, M.: Proceedings of Electronic Voting 2014 (EVOTE2014), TUT Press, Tallinn, pages 23-29.

Laud, P., Pankova, A. Verifiable Computation in Multiparty Protocols with Honest Majority. IACR Cryptology ePrint Archive 2014: 60 (2014).

Pettai, M., Laud, P. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries. IACR Cryptology ePrint Archive 2014: 240 (2014).

Krips, T., Willemson, J. Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. IACR Cryptology ePrint Archive 2014: 221 (2014).

Šor, V., Srirama, N. S. Memory Leak Detection in Java: Taxonomy and Classification of Approaches, The Journal of Systems & Software (2014) ISSN: 0164-1212, 96(1):139-151, 2014. Elsevier, DOI: 10.1016/j.jss.2014.06.005.

Šor, V., Srirama, S. N., Salnikov-Tarnovski, N. Memory leak detection in Plumbr. Journal of Software Practice and Experience, ISSN: 1097-024X, Wiley, DOI: 10.1002/spe.2275.

Karsai, M., Iñiguez, G., Kaski, K., Kertész, J. Complex contagion process in spreading of online innovation. Journal of the Royal Society Interface Volume 11, Number 101, 2014.

T. Saar, M. Dumas, M. Kaljuve, N. Semenenko. Cross-browser testing in Browserbite. In Proc. of 14th Int. Conf. on Web Engineering, ICWE 2014.

S. Heiberg, J. Willemson. Modeling Threats of a Voting Method, Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors) Design, Development, and Use of Secure Electronic Voting Systems, IGI Global, 2014, pages 128-148

V. Floreskul, K. Tretyakov, M. Dumas. Memory-Efficient Fast Shortest Path Estimation in Large Social Networks. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM’2014), Ann Arbor, MI, USA, June 2014.

A. Hadachi, O. Batrashev, A. Lind, G. Singer and E. Vainikko. Cell phone Subscribers Mobility Prediction Using an Enhance Markov Chain Algorithm. In: Intelligent Vehicles Symposium (IV), 2014 IEEE: 2014 Intelligent Vehicles Symposium; Dearborn, Michigan, USA; June 8-11, 2014.

Vladimir Šor. Statistical approach for memory leak detection in Java applications. PhD thesis. University of Tartu

Ilya Verenich. Prediction of Product Adoption in Social Networks Using the Network Value of Users. MSc thesis, University of Tartu

Irene Teinemaa. Community-Based Prediction of Activity Decay in a Social Network. MSc thesis, University of Tartu

 

2013

E. Kõivumägi, M. Vait, A. Hadachi. G. Singer. Real Time Movement Labeling of Mobile Event Streams. Conference presentation at Mobile Ghent ’13.

R. Sirel, S. Reisberg, M. Merzin, J. Pruulmann, R. Kalda, J. Vilo. Elektrooniliste terviselugude analüüsimise võimalused Tartu perearstide infosüsteemi näitel. Eesti Arst 2013, 92(8), 452-459.

S. Heiberg (2013). New Technologies for Democratic Elections. In: Business Process Management Workshops, Lecture Notes in Business Information Processing Volume 132, 2013, pp 630-635, Springer 2013

S. Laur, R. Talviste, J. Willemson. From oblivious AES to efficient and secure database join in the multiparty setting. 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 84-101. Springer, 2013.

A. Pankova, P. Laud, M. Pettai, J. Randmets. pecifying Sharemind’s Arithmetic Black Box. PETShop: The Workshop on Language Support for Privacy Enhancing Technologies, Berlin, Germany, November 4th, 2013. Association for Computing Machinery (ACM) , 2013, 19 – 21.

A. Pankova, P. Laud. On the (Im)possibility of Privately Outsourcing Linear Programming. CCSW 2013: The ACM Cloud Computing Security Workshop, Berlin, Germany, November 8th, 2013. (Toim.) Juels, Ari; Parno, Bryan. Association for Computing Machinery (ACM) , 2013, 55 – 64.

A. Pankova, P. Laud. New Attacks against Transformation-Based Privacy-Preserving Linear Programming. Security and Trust Management – 9th International Workshop (STM 2013), Royal Holloway University of London, September 12-13. (Toim.) Accorsi, Rafael; Ranise, Silvio. Springer, 2013, (Lecture Notes in Computer Science; 8203), 17 – 32.

A. Leontjeva, M. Goldszmidt, Y. Xie, F. Yu, and M. Abadi. “Early security classification of skype users via machine learning”. In Proceedings of the 2013 ACM workshop on Artificial intelligence and security (AISec ’13). ACM, New York, NY, USA, 35-44.

N. Semenenko, T. Saar, M. Dumas. Browserbite: Accurate Cross-Browser Testing via Machine Learning Over Image Features. In Proc. of the 29th IEEE International Conference on Software Maintenance (ICSM 2013 – Industry Track), Eindhoven, The Netherlands. September 2013. IEEE Computer Society.

V. Šor, T. Treier, S.N. Srirama. Improving statistical approach for memory leak detection using machine learning. In Proc. of the 29th IEEE International Conference on Software Maintenance (ICSM 2013 – Industry Track), Eindhoven, The Netherlands. September 2013. IEEE Computer Society

R. Kikas, M. Dumas, M. Karsai. Bursty egocentric network evolution in Skype. Social Network Analysis and Mining, July 2013.

A. Abels, M. Kruusmaa. Construction of a Female Shape-Changing Robotic Mannequin. Journal of Automation and Control Engineering, Vol. 1, No. 2, June 2013.

A. Abels, M. Kruusmaa. Shape Control of an Anthropomorphic Tailoring Robot Mannequin. International Journal of Humanoid Robotics, Vol. 10, No. 2m June 2013.

R. Sirel, (2013). Meetodeid tekstide leksikaalsete ja grammatiliste erinevuste tuvastamiseks meditsiiniliste tarbetekstide näitel. Eesti Rakenduslingvistika Ühingu Aastaraamat, 9, 265 – 278.

L. Kamm, D. Bogdanov, S. Laur, J. Vilo. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. First published online Feb. 14, 2013, doi:10.1093/bioinformatics/btt066.

Margus Freudenthal. Simpl: A Toolkit for Domain-Specific Language Development in Enterprise Information Systems. PhD thesis. University of Tartu

Jevgeni Kabanov. Towards a more productive Java EE ecosystem. PhD thesis. University of Tartu

Dan Bogdanov. Sharemind: programmable secure computations with practical applications. PhD thesis, University of Tartu

Kerli Tarkin. Possibilities to improve semantic interoperability in medical data exchange in Estonia with Snomed CT: Analysis of discharge summary. MSc thesis, Tallinn University of Technology

Nataliia Semenenko. Accurate diagnosis of cross-browser compatibility issues via machine learning. MSc thesis, University of Tartu

Alisa Pankova. Insecurity of Transformation-Based Privacy-Preserving Linear Programming. MSc thesis, University of Tartu

Marti Kaljuve. Cross-Browser Document Capture System. MSc thesis, Univeristy of Tartu

Volodymyr Floreskul. Memory-Efficient Fast Shortest Path Distance Estimation in Large Graphs. MSc thesis, University of Tartu

 

2012

D. Bogdanov, M. Niitsoo, T. Toft, J. Willemson. “High-performance secure multi-party computation for data mining applications”. International Journal of Information Security, Springer, 2012, Volume 11, Number 6, pages 403-418.

S. Heiberg, P. Laud and J. Willemson. The Application of I-voting for Estonian Parliamentary Elections of 2011. In Aggelos Kiayias and Helger Lipmaa, editors, E-Voting and Identity, VoteID 2011, LNCS 7187, pp. 208-223. Springer, 2012.

D. Bogdanov, R. Talviste, J. Willemson. Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper). In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012.

V. Šor, Satish N. Srirama. Evaluation of embeddable graph manipulation libraries in memory constrained environments, In Proc. of the ACM Research in Applied Computation Symposium (RACS 2012), Oct. 23-26 2012 San Antonio, TX, USA, pp. 269-275, ACM Press.

D. Bogdanov, R. Jagomägis, S. Laur. “A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining”. In Proceedings of the Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2012), Kuala Lumpur, Malaysia, May 2012, Springer, pp. 112-126.

M. Mazzucco, I. Mitrani, “Empirical Evaluation of Power Saving Policies for Data Centers”. SIGMETRICS Performance Evaluation Review Volume 40, Number 3, pages 18-22, 2012.

M. Mazzucco, M. Vasar, M. Dumas, “Squeezing out the Cloud via Profit-Maximizing Resource Allocation Policies”, to appear in the IEEE 20th International Symposium of Modeling, Analysis and Simulation of Computer and Telecommunciation Systems (MASCOTS 2012), Arlington (USA), August 2012.

Leontjeva, A., Tretjakov, T., Tamkivi, T., Vilo, J. “Fraud Detection: Methods of Analysis for Hypergraph Data” In Proceedings of the Workshop on Cyber Security of Online Social Networks (CSOSN 2012), Istanbul, Turkey, August 26-29, 2012.

M. Mazzucco, D. Dyachuk. “Optimizing cloud providers revenues via energy efficient server allocation”. Sustainable Computing: Informatics and Systems, pp 1–12, Vol. 2, Issue 1, March 2012.

Mazzucco, M., Dyachuk, D. Balancing electricity bill and performance in server farms with setup costs. Future Generation Computing Systems, vol. 28, no. 2, pp. 415-426, 2012.

Markko Merzin. Efficient algorithm for Local Area Network topology discovery. MSc thesis, University of Tartu

Timo Petmanson. Pattern-Based Fact Extraction from Estonian Free-Texts. MSc thesis, University of Tartu

Reimo Rebane. A Feasibility Analysis of Secure Multiparty Computation Deployments. MSc thesis, University of Tartu

Jaak Sarv. Comparative Evaluation of Topological and Demographic Features for Service Adoption Prediction. MSc thesis, University of Tartu

Dmitri Melnikov. Predicting Paid Service Adoption in a Large Social Network. MSc thesis, University of Tartu

 

2011

Matulevicius, R., Lakk, H., Lepmets, M. An approach to assess and compare quality of security models. Computer Science and Information Systems, vol. 8, no. 2, pp. 447-476, 2011.

Freudenthal, M., Pugal, D. Simpl: a toolkit for rapid DSL implementatvn. In Proceedings of 12th Symp. on Programming Languages and Software Tools (SPLST 2011), Tallinn, October 2011, pp. 78-89.

S. Mokarizadeh, P. Küngas, M. Matskin. Evaluation of a Semi-Automated Semantic Annotation Approach for Bootstrapping the Analysis of Large-scale Web Service Networks. In Proceedings of IEEE/WIC/ACM Intl. Conf. on Web Intelligence – WI 2011 (Lyon, France, August 2011), pp. 388-395, ACM, 2011.

Tretyakov K., Armas-Cervantes A., García-Bañuelos L., Vilo J., Dumas M. Fast Fully Dynamic Landmark-based Estimation of Shortest Path Distances in Very Large Graphs. In Proceedings og the 20th ACM Conference on Information and Knowledge Management (CIKM’2011), Glasgow, UK, 1785-1794.

Küngas P., Dumas M.. Configurable SOAP Proxy Cache for Data Provisioning Web Services. In Proceedings of the 25th ACM Symposium On Applied Computing, TaiChung, Taiwan, March 2011. ACM Press.

Mazzucco, M., Dumas, M., Reserved or On-Demand Instances? A Revenue Maximization Model for Cloud Provider. 2011.

Matulevicius, R., Dumas, M. (2011). Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control. Barzdins, J., Kirikova, M. (Eds.). Databases and Information Systems VI (339 – 352).IOS Press

Laur, S., Zhang, B., Willemson, J., Round-efficient Oblivious Database Manipulation. 2011.

Abel Armas-Cervantes. Fast Estimation of Shortest Path Distances in Very Large Graphs. MSc thesis, University of Tartu

 

2010

Mazzucco, M., Dyachuk, D., On Allocation Policies for Power and Performance. 2010.

Freudenthal, M., Using DSLs for Developing Enterprise Systems. Language Descriptions Tools and Applications, Paphos, Cyprus. March 27-28. 2010.

Freudenthal, M., Domain-Specific Languages in a Customs Information System. IEEE Software, 2, 65 – 71. 2010.

Bogdanov, D., Laur, S., The design of a privacy-preserving distributed virtual machine. In the Collection of AEOLUS theoretical findings. Deliverable D1.0.6. AEOLUS project IP-FP6-015964. 2010.

Matulevicius R., Dumas M., A Comparison of SecureUML and UMLsec for Role-based Access Control, Proceedings of the 9th International Baltic Conference (Baltic DB&IS 2010), University of Latvia Press, 2010, 171-185

Matulevicius R., Lepmets M., Lakk H., Sisask A., Comparing Quality of Security Models: a Case Study, Local Proceedings of the 14th East European Conference on Advances in Databases and Information Systems (ADBIS 2010), University of Novi Sad, 2010, 95-109.

Annamaa A., Breslav A., Kabanov J., Vene V.: An interactive tool for analyzing embedded SQL queries. In Proceedings of the 8th ASIAN Symposium on Programming Languages and Systems (APLAS’2010), Shanghai, November 2010. Springer.

Roman Jagomägis “SecreC: a Privacy-Aware Programming Language with Applications in Data Mining”, MSc thesis, University of Tartu

Lauri Tulmin “A Conjugate Gradient Solver on the PlayStation 3”, MSc thesis, University of Tartu

Toomas Römer “Autoscaling Hadoop Clusters” , MSc thesis, University of Tartu

Rein Raudjärv “Dynamic Schema-Based Web Forms Generation in Java”, MSc thesis, University of Tartu

Rainer Villido “Semantic Integration Platform for Web Widget Communication”, MSc thesis, University of Tartu

Jaak Ristioja. An analysis framework for an imperative privacy-preserving programming language. MSc thesis. University of Tartu

Aleksandr Tkatšenko “Named Entity Recognition for the Estonian Language”, MSc thesis, University of Tartu