Linköpings universitet > Department of Computer and Information Science > Division for Database and Information Techniques > Nahid Shahmehri
research commissions publications supervision teaching links
  Publication list  
 
 
   

Security, trust and networks

  • Kargén U., Shahmehri N., 'Speeding Up Bug Finding using Focused Fuzzing', International Conference on Availability, Reliability and Security (ARES 2018). Hamburg, Germany, August 27-30 2018. ISBN: 978-1-4503-6448-5. DOI
  • Kargén U., Shahmehri N., 'Towards robust instruction-level trace alignment of binary code', 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pages 342-352, 2017. October 30-November 3, 2017. Urbana Champaign, Illinois. DOI
  • Hiran, R., Carlsson N., Shahmehri N., 'Collaborative Framework for Protection Against Attacks Targeting BGP and Edge Networks', Computer Networks, Volume 122, pp 120--137. July 2017, DOI.
  • Kargén U., Shahmehri N., 'Towards Accurate Binary Correspondence using Runtime- Observed Values', IEEE International Conference on Software Maintenance and Evolution, ICSME 2016, pp 438 -- 442. October 5-7. Raleigh, North Carolina. DOI.
  • Rahul Hiran, Niklas Carlsson, and Nahid Shahmehri, 'Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms', Proc. IFIP Networking, Vienna, Austria, May 2016. Electronic ISBN: 978-3-9018-8283-8. DOI.
  • Vapen A. Carlsson N., Mahanti A., and Shahmehri N., 'A Look at the Third-Party Identity Management Landscape', IEEE Internet Computing, Vol. 20, No. 2, Mar/Apr. 2016, pp 18 -- 25. DOI.
  • Vapen A. Carlsson N., and Shahmehri N., 'Longitudinal Analysis of the Third-party Authentication Landscape', Proceeding NDSS Workshop on Understanding and Enhancing Online Privacy (UEOP@NDSS), San Diego, CA, 21-24 Feb. 2016. ISBN: 1-891562-44-4.
  • Krishnamoorthi V., Carlsson N., Eager D., Mahanti A., and Shahmehri N., 'Bandwidth-aware Prefetching for Proactive Multi-video Preloading and Improved HAS Performance', ACM Multimedia (MM) 2015. Brisbane, Australia, October 26-30, 2015. DOI.
  • Hiran R., Carlsson N., Shahmehri N., 'Crowd-based Detection of Routing Anomalies on the Internet', IEEE Conference on Communications and Network Security (CNS) 2015. Florence, Italy, Sep. 28-30 2015.
  • Kargén U., Shahmehri N., 'Turning Programs against Each Other: 'High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing', ESEC/FSE 2015: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp 782 -- 792, Bergamo, Italy, Sep. 2-4 2015. ISBN: 978-1-4503-3675-8, DOI.
  • Vapen A., Carlsson N., Mahanti A., and Shahmehri N., 'Information Sharing and User Privacy in the Third-party Identity Management Landscape', ICT Systems Security and Privacy Protection: Proc. IFIP International Information Security and Privacy Conference (IFIP SEC), Hamburg, Germany, May 26-28, 2015, Vol 455, Springer, pp 174-188. DOI.
  • Vapen A., Carlsson N., Mahanti A., and Shahmehri N., 'Information Sharing and User Privacy in the Third-party Identity Management Landscape', Proceedings of ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2015), Pages 151-153. San Antonio, TX, Mar. 2015. ISBN: 978-1-4503-3191-3, DOI.
    ** Outstanding poster award **
  • Krishnamoorthi V., Bergström P., Carlsson N., Eager D., Mahanti A., and Shahmehri N., 'Quality-adaptive Prefetching for Interactive Branched Video using HTTP-based Adaptive Streaming', Proceeding of ACM International Conference on Multimedia (ACM Multimedia), pp 317-326 , Orlando, FL, Nov. 2014. DOI.
  • Hiran R., Carlsson N., and Shahmehri N., 'PrefiSec: A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security', Proceeding of ACM CCS Workshop on Information Sharing and Collaborative Security (ACM WISCS @CCS), Pages 3-12. Scottsdale, AZ, Nov. 2014. ISBN: 978-1-4503-3151-7. DOI.
  • Kargén U., Shahmehri N., 'Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing', IEEE SCAM'14 (International Working Conference on Source Code Analysis and Manipulation), pp: 155-164. Victoria, British Columbia, Canada. Sep. 2014. DOI.
  • Vapen A., Carlsson N., Mahanti A., and Shahmehri N., 'Third-party Identity Management Usage on the Web', Proceedings of Passive and Active Measurement Conference (PAM), Los Angeles, CA, Mar. 2014. DOI.
  • Byers D., Shahmehri N., 'Graphical Modeling of Security Goals and Software Vulnerabilities', in Handbook of Research on Innovations in Systems and Software Engineering García Díaz V., Cueva Lovelle J. M., B. Pelayo García-Bustelo C. (eds.), IGI Global, pp 1--31, 2014. DOI. ISBN 10:1466663596, EISNB 13: 9781466663602.
  • Krishnamoorthi V., Bergström P., Carlsson N., Eager D., Mahanti A., and Shahmehri N., 'Empowering the Creative User: Personalized HTTP-based Adaptive Streaming of Multi-path Nonlinear Video', ACM SIGCOMM Workshop on Future Human-Centric Multimedia Networking (FhMN), Hong Kong, Aug. 2013, pp 53--58. (This paper also appeared in ACM SIGCOMM Computer Communication Review (CCR), Volume 43, Issue 4, Oct. 2013, pp 591--596.)
    ** Best paper award **
  • Krishnamoorthi V., Carlsson N., Eager D., Mahanti A., and Shahmehri N., 'Helping Hand or Hidden Hurdle: Proxy-assisted HTTP-based Adaptive Streaming Performance', Proceeding of IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), San Francisco, Aug. 2013, pp 182--191. DOI.
  • Kargén U., Shahmehri N., 'InputTracer: A Data-flow Analysis Tool for Manual Program Comprehension of x86 Binaries'. Proceedings of the 12th IEEE International Working Conference on Source Code Analysis and Manipulation, pp-138-143. September 23-24, 2012 - Riva del Garda, Trento, Italy. ISBN: 978-1-4673-2398-7.
  • Martucci L., Zuccato A., Smeets B., Habib S.M., Johansson T., Shahmehri N., 'Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry'. IEEE 9th International Conference on Ubiquitous Intelligence and Computing (UIC)/ Autonomic and Trusted Computing (ATC), September 4-7, 2012 - Fukuoka. DOI.
  • Shahmehri N., Mammar A., Montes de Oca, E., Byers D., Cavalli A., Ardi S., Jimenez J., 'An Advanced Approach for Modeling and Detecting Software Vulnerabilities'. To be published by Information and Software Technology. Volume 54, Issue 9, September 2012, Pages 997–1013. DOI. An earlier draft of the paper.
  • Shahmehri N., Byers D., Hiran R., 'TRAP: An Open Decentralized Distributed Spam Filtering'. The 8th International Conference on Trust, Privacy and Security in Digital Businees, TRUSTBUS 2011. LNCS, Springer, Vol 6863. pp 86 -- 97, August 29 - September 2, 2011, Toulouse, France. DOI.
  • Byers D., Shahmehri N., 'Modeling Security Goals and Software Vulnerabilities', in Dependability and Computer Engineering: Concepts for Software-Intensive Systems Petre L., Sere K., and Troubitsyna E. (Eds). IGI Global, pp 171 -- 198,2011. DOI. ISBN 10:1proc609607473, EISNB 13: 9781609607487.
  • Vapen A., Shahmehri N., '2-clickAuth - optical challenge-response authentication using mobile handsets' in International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3 (Issue 2), pp 1 -- 18, IGI Global, ISSN: 1937-9412, 2011.
  • Vapen A., Shahmehri N., 'Security levels for web authentication using mobile phones', in Privacy and Identity Management for Life. Fischer-Hübner S., Duquenoy P., Hansen M., Leenes R., and Zhang G. (eds.), Vol 352, pp 130 -- 143, Springer, 2011, ISBN 978-3-642-20768-6.
  • Byers D., Shahmehri, N.,'Unified modeling of attacks, vulnerabilities and security activities' (position paper), Proceedings of the 2010 Workshop on Software Engineering for Secure Systems(SESS10), in conjunction with the 23rd International Conference on Software Engineering(ICSE2010), pp 36-42, May 2-8, 2010, Cape Town, South Africa. DOI.
  • Vapen A., Shahmehri N., 'Security levels for web authentication using mobile phones'. PrimeLife/IFIP Summer School, 2010. Electronic pre-proceedings, distributed to summer school participants. Accepted papers, Link to the paper.
  • Vapen A., Byers D., Shahmehri N., '2-clickAuth - Optical Challenge/Response Authentication', Fifth International Conference on Availability, Reliability and Security, ARES 2010 (IEEE Computer Society ed.), vol., no., pp79-86, 15-18 Feb. 2010, Krakow, Poland, February 2010. DOI
  • Byers D., Shahmehri N., A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1., Digital Investigation 6 (1-2): 61-70 (2009).
  • Ardi S., Shahmehri N., 'Introducing vulnerability awareness to Common Criteria's Secutity Targets', Proceedings of the Fourth International Conference on Software Engineering Advances, ICSEA2009 (IEEE Computer Society ed.), pp 419 -- 424, Porto, Portugal, September 2009. DOI
  • Byers D., Shahmehri N., 'Prioritisation and Selection of Software Security Activities', Fourth International Conference on Availability, Reliability and Security, ARES 2009 ( IEEE Computer Society ed.), Fukuoka, Japan, March 2009. DOI
  • Ardi S., Shahmehri N., 'A post-mortem incident modeling method', in the Proceedings of the Second International Workshop on Digital Forensics (WSDF), (ARES2009, IEEE Computer Society ed.), pages 1018-1023, Fukuoka, Japan, March 2009. DOI
  • Meland P.H., Ardi S., Jensen J., Rios E., Sanchez T., Shahmehri N., Tondel I.A., 'An architectural foundation for security model sharing and reuse', Accepted for Publication in the Proceedings of the Third International Workshop on Secure Software Engineering (SecSE), (ARES2009, IEEE Computer Society ed.), pp 823-828, Fukuoka, Japan, March 2009. DOI
  • Karresand M., Shahmehri N., 'Reassembly of Fragmented JPEG Images Containing Restart Markers', European Conference on Computer Network Defense in cooperation with ENISA (EC2ND'08), pp 25 -- 32, December 11-12, 2008, Dublin, Ireland. DOI
  • Byers D., Shahmehri N., 'Contagious errors: understanding and avoiding issues with imaging drives containing faulty sectors', Digital Investigation 5 (1-2): 29-33 (2008).
  • Ardi S., Shahmehri N., 'Integrating a security plug-in with the OpenUP/Basic development process', Proceedings of the Third International Conference on Availability, Reliability and Security, ARES2008 (IEEE Computer Society ed.), Pages 284-291, Barcelona, Spain, March 2008. DOI
  • Byers D., Shahmehri N., 'A Cause-Based Approach to Preventing Software Vulnerabilities', Proceedings of the Third International Conference on Availability, Reliability and Security, ARES2008 (IEEE Computer Society ed.), Pages 276-283, Barcelona, Spain, March 2008.
    Best Paper Award. DOI
  • Herzog A., Shahmehri N., `Usable Set-up of Runtime Security Policies'. International Journal of Information Management and Computer Security.15(5): 394-407, 27. DOI
  • Herzog A., Shahmehri N., `Usable Set-up of Runtime Security Policies'. Proceedings of the International Symposium on Human Aspects of Information Security and Assurance. July 2007. Pages 99-113. July 2007.
  • Herzog A., Shahmehri N., Duma C., `An Ontology of Information Security'. International Journal of Information Security and Privacy.1(4): 1-23, 2007.
  • Duma C., Herzog A., Shahmehri N., `Privacy in the Semantic Web: What Policy Languages Have to Offer'. IEEE Workshop on Policies for Distributed Systems and Networks, pages 109-118. June 13-15, Bologna, Italy, 2007.
  • Herzog A., Shahmehri N., `Usability and Security of Personal Firewalls', Proceedings of the International Information Security Conference (IFIP TC-11) (SEC'07), pages 37-48, Springer-Verlag. May 2007. DOI
  • Herzog A., Shahmehri N., `User Help Techniques for Usable Security', Proceedings of the 1st Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT'07) ACM Press. In connection to SIGCHI (ACM Special Interest Group on Computer-Human Interaction). South Africa, March 2007.
  • Ardi S., Byers D., Shahmehri N., `How can the developer benefit from security modeling?', Workshop on Secure Software Engineering (SecSE 2007), in conjunction with the ARES 2007 conference, organized by Dexa Ascociation in cooperation with ENISA (European Network and Information Security Agency), 1017-1025, April 10-13, Vienna, 2007. IEEE CS. DOI
  • Byers D., Shahmehri N., `Design of a Process for Security Model', ARES 2007(the dependability conference), International Conference on Availability, Reliability, and Security: Bridging theory and practice, organized by Dexa Ascociation in cooperation with ENISA (European Network and Information Security Agency), pages 301-309, April 10-13, Vienna, 2007. IEEE CS. DOI
  • Byers D., Ardi, S., Shahmehri N., Duma C., `Modeling Software Vulnerabilities With Vulnerability Cause Graphs', Proceedings of the International Conference on Software Maintenance (ICSM), Pages 411-422, Pennsylvania, September 24-27, 2006. DOI
  • Karresand M., Shahmehri N., `Oscar - File Type and Camera Identification Using the Structure of Binary Data Fragments', 1st Conference on Advances in Computer Security and Forensics (ACSF) July 13-14, Published by The School of Computing and Mathematical Sciences, John Moores University, pp 11-20, Liverpool, UK.
  • Karresand M., Shahmehri N., `File Type Identification of Data Fragments by Their Binary Structure', Proceedings of the 7th Annual IEEE Information Assurance Workshop, "The West Point Workshop", pp 140-147, United States Military Academy, West Point, 21-23 June 2006, New York. DOI
  • Ardi S., Byers D., Shahmehri N., `Towards a Structured Unified Process for Software Security', Proceedings of the Software Engineering for Secure Systems (SESS06), in conjunction with the 28th International Conference on Software Engineering (ICSE 2006), Pages 3-10, May 20-28, 2006, Shanghai, China. DOI
  • Duma C., Karresand M., Shahmehri N., Caronni G., `A Trust-Aware, P2P-based Overlay for Intrusion Detection', 3nd International Workshop on P2P Data Management, Security and Trust (PDMST'06), in conjunction with the 17th International Conference on Database and Expert Systems Applications (DEXA'2006), Pages 692-696, Krakow, Poland, 4 - 8 September 2006. DOI
  • Bonatti P.A., Duma C., Fuchs N., Nejdl W., Olmedilla D., Peer J., Shahmehri N., `Semantic Web Policies - A Discussion of Requirements and Research Issues', 3rd European Semantic Web Conference (ESWC), Volume 4011 LNCS, 2006, Pages 712-724, Budva, Montenegro, June 2006. Journal page.
  • Herzog A., Shahmehri N., `A Usability Study of Security Policy Management', Proceedings of IFIP International Information Security Conference: Security and Privacy in Dynamic Environments (SEC2006), Springer, ISBN 0-387-33405-x, pp 296-306, May 22 - 24, Karlstad, Sweden. Journal page.
  • Karresand M., Shahmehri N., `Oscar: File Type Identification of Binary Data in Disk Clusters and RAM Pages', Proceedings of IFIP International Information Security Conference: Security and Privacy in Dynamic Environments (SEC2006), Springer, ISBN 0-387-33405-x, pp 413-424, May 22 - 24, Karlstad, Sweden. Journal page.
  • Bonatti P.A., Duma C., Olmedilla D., Shahmehri N., `An Integration of Reputation-based and Policy-based Trust Management', Semantic Web and Policy Workshop (in conjunction with 4th International Semantic Web Conference), Galway, Ireland, November 2005.
  • Bonatti P.A., Antoniou G., Baldoni M., Baroglio C., Duma C., Fuchs N., Martelli A., Nejdl W., Olmedilla D., Peer J., Patti V., Shamheri N., `The REWERSE View on Policies', Semantic Web and Policy Workshop (in conjunction with 4th International Semantic Web Conference), Galway, Ireland, November 2005.
  • Duma C., Shahmehri N., Caronni G., `Dynamic Trust Metrics for Peer-to-Peer Systems', 2nd International Workshop on P2P Data Management, Security and Trust (PDMST'05), pp 776-781, Copenhagen, Denmark, August 2005.
  • Herzog A., Shahmehri N., `An Evaluation of Java Application Containers according to Security Requirements', Proceedings of the IEEE WETICE Workshop on Security Technologies for Collaborative Architectures, pp 178-183, Linköping, Sweden, June 13-15, 2005.
  • Herzog A., Shahmehri N., `Performance of the Java Security Manager'. Computers & Security, 24(3):192-207, 2005.
  • Herzog A., Shahmehri N., `Problems Running Untrusted Services as Java Threads', Nardelli, E., Talamo, M. (eds) Certification and Security in Inter-Organizational E-Services - Proceedings of CSES'04 (Toulouse, France, August 26-27, 2004), pp 19-32, Springer Verlag, 2005. ISBN 0-387-25087-5.
  • Bonatti, P., Shahmehri N., Duma C., Olmedilla, D., Nejdl, W., Baldoni, M., Baroglio, C., Martelli, A., Patti, V., Coraggio, P., Antoniou, G., Peer, J., Fuchs, N., `Rule-based Policy Specification: State of the Art and Future Work', REWERSE Deliverable I2-D1, 2004.
  • Duma C., Shahmehri N., Lambrix P., `Efficient Storage for Category-Based Group Key Management', Fifth Ph.D. Student Conference on Computer Science and Systems Engineering, pp 139-146, Norrköping, Sweden, 2004.
  • Duma C., Shahmehri N., Turcan E., `Resilient Trust for Peer-to-Peer Based Critical Information Infrastructures', 2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France, October 2004.
  • Duma C, Shahmehri N., Lambrix P., `A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements', Proceedings of the IEEE WETICE Workshop on Enterprise Security, pp 208-213, Linz, Austria, 2003.
  • Duma D., Shahmehri N., Lambrix P., 'A Flexible Category-Based Collusion-Resistant Key Management Scheme for Multicast'. Proceedings of the 18th IFIP International Information Security Conference , pp 133-144, Athens, Greece, May 2003.
  • Herzog A., Shahmehri N., 'Using the Java Sandbox for Resource Control'. Proceedings of the 7th Nordic Workshop on Secure IT Systems (NordSec), Karlstad, Sweden. pp 135-147. November, 2002.
  • Herzog A., Shahmehri N., 'Towards Secure E-Services: Risk Analysis of a Home Automation Service'. Proceedings of the 6th Nordic Workshop on Secure IT-Systems (Nordsec), pp 18-26, Technical University of Denmark, Lungby, Denmark, Nov. 1-2, 2001.
  • Herzog A., Shahmehri N., Bednarski A., Chisalita I., Nordqvist, U., Saldamli, L., Szentivanyi, D., Östring, M., 'Security Issues in E-Home Network and Software Infrastructures', Short paper. Proceedings of the Third Conference on Computer Science and Systems Engineering, CCSSE '01, pp 155-161, Norrköping, ProNova, Linköping, Sweden 2001.
  • Han, L., Shahmehri N., 'Secure Multicast Software Delivery'. In the proceedings of the IEEE 9th International Workshops on Enabling Technologies: Enterprise Security, pp 207-212, June 14-16, NIST, Gaithursburg, Maryland, USA, 2000. DOI
  • Duma C., Herzog A., Shahmehri N., 'Towards Secure e-Services'. In the proceedings of the IEEE 9th International Workshops on Enabling Technologies: Enterprise Security, pp 221-222, June 14-16, NIST, Gaithursburg, Maryland, USA, 2000.
  • DOI
  • Han, L., Shahmehri N., 'Establishing a Secure Multicast Group for Remote Software Delivery', Proceedings of the IEEE 8th International Workshops on Enabling Technologies: Enterprise Security, pp 194-195, June 16-18, Palo Alto, CA, USA, 1999.
  • Han, L., Shahmehri N., 'Towards Remote Software Delivery Using Secure Multicast Group Establishment', Proceedings of the Second Conference on Computer Science and Systems Engineering in Linköping (CCSSE'99), pp 85-91, Norrköping, Sweden, 1999.
  • Shahmehri N., Gustafsson M., 'Security Issues in Distributed Information Systems'. The Second European RISI Conference, The ISES project conference track, November 27-28, 1998, Graz, Styria, Austria.
  • Gustafsson M., Deligny B., Shahmehri N., 'Using NFS to implement role-based access control', in Proceedings of the IEEE Sixth WET-ICE, International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises(WET-ICE'97), Enterprise Security, pp 299-304, (Cambridge, MA, USA), 1997.
  • Gustafsson M., Shahmehri N., 'A Role-Description Framework and its Applications to Role-Based Access Control', Presented at the IEEE Fifth WET-ICE, International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Enterprise Security., March, 1996. A revised version of this paper is presented at NORDSEC, Nordic Workshop on Secure Computer Systems, (Göteborg), November 7-8, 1996.

Vehicular communication

  • Shahmehri N., Chisalita I., Aberg J., People with Special Needs and Traffic Safety, Book chapter, Chapter 24 in The Engineering Handbook of Smart Technology for Aging, Disability and Independence (eds. Helal A., Mokhtari M., Abdulrazak B.), Wiley, ISBN: 978-0-471-71155-1, October 2008.
  • Chisalita I., Shahmehri N., `On the design of safety communication systems for vehicles', IEEE Transactions on Systems, Man and Cybernetics, Part A (TSMC) 37(6): 932-945 (2007), DOI
  • Chisalita I., Shahmehri N., `Adaptive dissemination of safety data among moving vehicles', Proceedings of the 17th IEEE Personal, Indoor and Mobile Radio Communication Symposium (PIMRC), Helsinki, Finland, September 11-14, 2006, in press.
  • Chisalita I., Shahmehri N., `Performance evaluation of safety communication for vehicles', Proceedings of the 3rd International Symposium on Wireless Information Systems, Valencia, Spain, September 2006, in press.
  • Chisalita I., Shahmehri N., `Emergency information dissemination in mobile networks for vehicles International Conference on Wireless Information Networks and Systems (WINSYS), pages 284-289, part of the 3rd International Joint Conference on e-Business and Telecommunications, Setubal, Portugal, August 7-10, 2006.
  • Chisalita I., Shahmehri N., `A context-based vehicular communication protocol', Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication Conference (PIMRC 2004), pp 2820-2824, Barcelona, Spain, September 5-8, 2004.
  • Chisalita I., Shahmehri N., `Vehicular communication - A candidate technology for traffic safety', Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC04), pp 3903-3908, Hague, The Netherlands, October 10-13, 2004.
  • Chisalita I., Shahmehri N., Lambrix P., `Traffic Accidents Modeling and Analysis using Temporal Reasoning', Proceedings of the IEEE Conference on Intelligent Transportation Systems, pp 378-383, Washington, D.C., USA, 2004.
  • Shahmehri N., Chisalita I., Aberg, J., Maciuszek, D., Hellqvist, M., `Using Vehicular Communication to Support Older Drivers at Road Intersections: A Feasibility Study', Proceedings of 2nd International Conference On Smart homes and health Telematics (ICOST2004), pp 33-40, Singapore, September 15-17, 2004.
  • Chisalita I., Shahmehri N., 'An in-vehicle approach for improving traffic safety through GIS utilization'. 2002 IEEE International Conference on Systems, Man and Cybernetics (SMC02), pp 6-11, Hammamet, Tunisia, Oct. 6-9, 2002. DOI
  • Chisalita I., Shahmehri N., 'A peer-to-peer approach to vehicular communication for the support of traffic safety applications'. Proceedings of the 5th IEEE Conference on Intelligent Transportation Systems, pp 336-341, Singapore, Sep. 3-6, 2002. DOI
  • Chisalita I., Shahmehri N., 'A novel architecture for supporting vehicular communication'. Proceedings of IEEE 56th Vehicular Technology Conference , pp 1002-1006, Vancouver, Canada, 24-28 Sep. 2002. DOI

Peer-to-Peer

  • Hauswirth M., Montresor A., Shahmehri N., Wehrle K. and Wierzbicki A., Proceedings of the Seventh International Conference on Peer-to-Peer Computing, IEEE Computer society. September 2-5, 2007, Galway, Ireland. IEEE Computer Society, 2007. ISBN 0-7695-2986-0.
  • Montresor A., Wierzbicki A., Shahmehri N., Proceedings of the Sixth International Conference on Peer-to-Peer Computing, IEEE Computer society. September 6-8, 2006, Cambridge, UK. IEEE Computer Society, 2006. ISBN 0-7695-2679-9.
  • Caronni G., Weiler N., Waldvogel M., Shahmehri N. (eds). Proceedings of the Fifth International Conference on Peer-to-Peer Computing, IEEE Computer society. August 31- September 2, 2005, Konstanz, Germany. IEEE Computer Society, 2005. ISBN 0-7695-2376-5.
  • Duma C., Shahmehri N., Caronni G., `Dynamic Trust Metrics for Peer-to-Peer Systems', 2nd International Workshop on P2P Data Management, Security and Trust (PDMST'05), in conjunction with the 16th International Conference on Database and Expert Systems Applications (DEXA'2005), pp 776-781, Copenhagen, Denmark, August 2005.
  • Caronni G., Weiler N., Waldvogel M., Shahmehri N. (eds). Proceedings of the Fifth International Conference on Peer-to-Peer Computing. August 31- September 2, 2005, Konstanz, Germany. IEEE Computer Society, 2004. ISBN 0-7695-2376-5.
  • Duma C., Shahmehri N., Caronni G., `Dynamic Trust Metrics for Peer-to-Peer Systems', 2nd International Workshop on P2P Data Management, Security and Trust (PDMST'05), pp 776-781, Copenhagen, Denmark, August 2005.
  • Caronni G., Weiler N., Shahmehri N. (eds). Proceedings of the Fourth International Conference on Peer-to-Peer Computing, IEEE Computer society. August 25-27, 2004, Zurich, Switzerland. IEEE Computer Society, 2004. ISBN 0-7695-2156-8.
  • Shahmehri N., Graham, R.L., Caronni, G. (eds).Proceedings of the Third International Conference on Peer-to-Peer Computing, IEEE Computer society. September 1-3, 2003, Linköping, Sweden. IEEE Computer Society, 2003. ISBN 0-7695-2023-5.
  • Graham, R.L., Shahmehri N. (eds). Proceedings of the Second International Conference on Peer-to-Peer Computing: Use of Computers at the Edge of Networks (P2P, Grid, Clusters), P2P2002. Linköpping, Sweden, September 5-7, 2002. IEEE Computer Society. ISBN 0-7695-1810-9.
  • Graham R.L., Shahmehri N. (eds). Proceedings of the First International Conference on Peer-to-Peer Computing, P2P2001. Linköping, Sweden, August 27-29, 2001. IEEE Computer Society, ISBN 0-7695-1503-7.
  • Turcan E., Shahmehri N., Graham R.L., 'Intelligent Software Delivery using P2P'. Proceedings of the Second IEEE International Conference on Peer-to-Peer Computing - P2P2002, pp 136-143. Linköping, Sweden, Sep. 5-7 2002.

Assistive technologies

  • Shahmehri N., Aberg J., Maciuszek D., Virtual Companions, Book chapter, Chapter 35 in The Engineering Handbook of Smart Technology for Aging, Disability and Independence (eds. Helal A., Mokhtari M., Abdulrazak B.), Wiley, ISBN: 978-0-471-71155-1, October 2008.
  • Aberg J., Shahmehri N., `Äldre och framtidens teknik - ett datavetenskapligt perspektiv (Elderly and future technology - a computer science perspective)'. In Gosta Blucher and Goran Graninger (eds), Den omvända ålderspyramiden, pp 253-265, Linkoping University Interdisciplinary Studies, Linkoping, Sweden, 2005. (Essay in Swedish)
  • Maciuszek D., Aberg J., Shahmehri N., `Evaluation and Refinement of a Design Framework for Generating Dependable Virtual Companions for Later Life', 3rd International Conference On Smart homes and health Telematic - ICOST 2005, July 4-6, Sherbrooke, Canada, 2005.
  • Maciuszek D., Aberg J., Shahmehri N., `What Help Do Older People Need? Constructing a Functional Design Space of Electronic Assistive Technology Applications', The Seventh International ACM SIGACCESS Conference on Computers and Accessibility - ASSETS 2005, October 9-12, 2005, Baltimore, USA. Journal page.
  • Shahmehri N., Aberg J., Maciuszek D., Chisalita I., `Linköping University's Virtual Companion project'. IEEE Pervasive Computing, 3(2):50, 2004.
  • Maciuszek D., Shahmehri N., Aberg J., `Dependability requirements to aid the design of virtual companions for later life', Proceedings of the First The Home and Electronic Assistive Technology Workshop (HEAT), pp 51-60, York, UK, March 16-17, 2004.
  • Maciuszek D., Shahmehri N., Aberg J., `User involvement in the design of software to assist people with dementia: Creating a personalised virtual kitchen companion', Poster at the ENABLE Final Conference: Challenges in Dementia Care, pp 23, Oslo, Norway, June 21-23, 2004.

Engineering information systems

  • Aberg C, Aberg J, Lambrix P, Shahmehri N, 'A Platform to Evaluate the Technology for Service Discovery in the Semantic Web', Proceedings of the Twenty-First National Conference on Artificial Intelligence - AAAI06, 1253-1258, Boston, MA, USA, 2006. © AAAI.
  • Tan, H., Jakoniene V., Lambrix P., Aberg J., Shahmehri N., 'Alignment of Biomedical Ontologies using Life Science Literature', Proceedings of the International Workshop on Knowledge Discovery in Life Science Literature, Volume 3886 LNBI, 2006, Pages 1-17, Singapore, 2006. Journal page.
  • Aberg C., Lambrix P., Shahmehri N., `An Agent-based Framework for Integrating Workflows and Web Services', Proceedings of the IEEE WETICE Workshop on Agent-based Computing for Enterprise Collaboration, pp 27-32, Linköping, Sweden, June 13-15, 2005.
    Best paper award.
  • Aberg C., Lambrix P., Takkinen J., Shahmehri N., `sButler: A Mediator between Organizations' Workflows and the Semantic Web', Proceedings of the WWW 2005 Workshop on Web Service Semantics: Towards Dynamic Business Integration, Chiba, Japan, May 2005.
  • Shahmehri N., Proceedings of the Conferences on Computer Science and Systems Engineering, CCSSE. Ph.D. student conferences. 1998, 1999, 2001, 2002, 2004.
  • Shahmehri N., Takkinen J., Aberg C., 'Towards Creating Workflows On-the-Fly and Maintaining Them Using the Semantic Web: The sButler Project at Linköping University', poster. Proceedings of The 12th International World Wide Web Conference - WWW 2003, May 2003.
  • Aberg C., Shahmehri N., 'A Framework for Generating Task Specific Information Extraction Systems'. Proceedings of the 13th International Symposium on Methodologies for Intelligent Systems - ISMIS 2002. LNAI 2366, pp 491-502, Lyon, France, June 2002.
  • Aberg J., Shahmehri N., 'Live Help Systems', in Julie Ratner (ed.), Human Factors and Web Development, chapter 15, Lawrence Erlbaum Associates, second edition, 2002. ISBN 0-8058-4221-7.
  • Aberg J., Shahmehri N., Maciuszek D., 'Live Help Systems'. Proceedings of the Second International Workshop on Electronic Commerce (Welcom'01), pp 164-179, Heidelberg, Germany, November 16-17, 2001. Springer-Verlag. ISBN nr: 3-540-42878-X.
  • Aberg J., Shahmehri N., Maciuszek D., 'Live Help Systems for Live Help Systems: Initial Results'. Proceedings of the Third ACM Conference on Electronic Commerce (EC'01), pp 194-197, Tampa, FL, USA, October 14-17, 2001. DOI
  • Chisalita I., Shahmehri N., 'Issues in Image Utilization within Mobile E-Services'. In proceedings of the IEEE 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET-ICE), pp 62-67, June 20-22, MIT, Cambridge, USA, 2001. DOI
  • Lambrix P., Shahmehri N., 'Querying Document Bases using Content, Structure and Properties', Ontologies and Search - Proceedings of the 2nd OntoQuery Workshop, pp 15-21, Copenhagen, Denmark, 2001. Invited contribution.
  • Chisalita I., Shahmehri N., 'An Adaptive Approach in Providing E-services for Mobile Devices'. Proceedings of the Third Conference on Computer Science and Systems Engineering, CCSSE '01, Norrköping, ProNova, Linköping, Sweden 2001.
  • Aberg J., Shahmehri N., 'User Modelling as an Aid for Human Web Assistants', short paper in Proceedings of the 8th International Conference on User Modeling, pp 201-203, Sonthofen, Germany, July 13-17, 2001. Springer-Verlag. DOI
  • Aberg J., Shahmehri N., 'An Empirical Study of Human Web Assistants: Implications for User Support in Web Information Systems'. In the proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, pp 404-411, Seatle, Wahsington, March 31-April 5, 2001. DOI
  • Aberg J., Shahmehri N., 'Collection and Exploitation of Expert Knowledge in Web Assistant Systems'. Proceedings of the 34th Hawaii International Conference on System Sciences, Maui, Hawaii, January 3-6, 2001. DOI
  • Lambrix P., Shahmehri N.,  'Querying Documents using Content, Structure and Properties'. Journal of Intelligent Information Systems, 15 (3):287-307, November 2000. Kluwer Academic Publishers, ISSN 0925-9902. DOI
  • Aberg J., Shahmehri N., 'The Role of Human Web Assistants in Ecommerce: An analysis and a usability study'. Journal of Internet Research: Electronic Networking Applications and Policy, vol 10, number 2, 2000.
  • Boisson C., Shahmehri N., `Template Generation for Identifying Text Patterns'. Proceedings of the Twelfth International Symposium on Methodologies for Intelligent Systems - ISMIS 2000,. LNAI 1932, pp 463-473, Charlotte, NC, USA, October 11-14, 2000.
  • Aberg J., Shahmehri N., 'Web Assistants: Towards an Intelligent and Personal Web Shop'. Proceedings of the Second Workshop on Adaptive Systems and User Modeling on the World Wide Web, pp 5-12, Toronto and Banff, Canada, 1999.
  • Lambrix P., Shahmehri N., Jacobsen S., 'Querying Document Bases by Content, Structure and Properties'. Proceedings of the Eleventh International Symposium on Methodologies for Intelligent Systems - ISMIS 99, (Warsaw, Poland), 1999
  • Kindborg M., Aberg J., Shahmehri N., 'A Lightweight Agent Framework for Interactive Multi-Agent Applications'. Proceedings of the Fourth International Conference and Exhibition on The Practical Application of Intelligent Agents and Multi-Agents - PAAM, April 19-21, (London, UK), 1999.
  • Takkinen J., Shahmehri N., 'Task-Oriented Restructuring of an Application Domain: A Multi-Agent Architecture for Doing Things in Internet E-Mail', in Proceedings of 32nd Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA.
  • Takkinen J., Shahmehri N., 'Are You Busy, Cool, or just Curious? -- CAFE: A Model with Three Different States of Mind for a User to Manage Information in Electronic Mail', in P. A. Lundgren (Ed.) Human IT, No. 1/98, March 1998. ISSN 1402-1501.
  • Takkinen J., Shahmehri N., 'Coordination in Message-Based Environments: Restructuring E-Mail to Accomplish Tasks'. In the International Workshop on Coordination Technologies for Information Systems (CTIS'98), August 25, 1998, Vienna. IEEE Press
  • Takkinen J., Shahmehri N., 'Delegation of Tasks and Dissemination of Information in Organizations: Restructuring Internet E-Mail for Doing Things', in Proceedings of American Information Society 1998 Americas Conference (AIS-98), the Group Supported Collaboration mini-track, August 14-16, 1998, Baltimore, Maryland, USA.
  • Lambrix P., Shahmehri N., Wahllöf N., 'A default extension to description logics for use in an intelligent search engine', in Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS-31), Volume V - Modeling Technologies and Intelligent Systems Track, pp 28-35, (Hawaii), January 6-9, 1998.
  • Takkinen J., Shahmehri N., 'CAFE: A Conceptual Model for Managing Information in Electronic Mail', in Proceedings of the 31st Hawaii International Conference on System Sciences (HICCS-31), Volume V - Modeling Technologies and Intelligent Systems Track, pp 44-53, (Hawaii), January 6-9, 1998. Nominated for Best Paper.
  • Lambrix P., Shahmehri N., 'TRIFU: The Right Information For yoU'. In Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS-31), Volume IV - Internet and the Digital Economy Track, pp 505-512, (Hawaii), January 6-9, 1998.
  • Lambrix P., Shahmehri N., Aberg J., 'Towards Creating a Knowledge Base for World-Wide Documents', in Proceedings of the International Conference on Intelligent Information System , IEEE Press, (Grand Bahama Island, the Bahamas), December 8-10, 1997.
  • Lambrix P., Shahmehri N., Wahllöf N., A default extension to description logics for use in an intelligent search engine, in Proceedings of Tenth International Symposium on Methodologies for Intelligent Systems - Poster Session, (Charlotte, North Carolina, USA), 1997.
  • Lambrix P., Shahmehri N., Wahllöf N., 'Dwebic: An Intelligent Search Engine based on Default Description Logics', Proceedings of the International Workshop on Description Logics, (Gif sur Yvette, France), 1997.
  • Biglari N., Shahmehri N., 'Intelligent Interactive Services (IIS)', in Proceedings of the Conference on Distribution Automation & Demand Side Management (DA/DSM'97), (Amsterdam, The Netherlands), October 14-16, 1997.
  • Hall T., Shahmehri N., 'An Intelligent Multi.Agent Architecture for Support of Process Reuse in a Workflow Management System', in Proceedings of the First International Conference on the Practical Applications of Intelligent Agents and Multi-Agent Technology, (London, UK), April, 1996.

Programming environments

  • Shahmehri N., Kamkar M., Fritzson P., 'Usability Criteria for Automated Debugging Systems', in the Journal of Systems and Software, pp 55-70; October 1995.
  • Fritzson P., Auguston M., Shahmehri N., 'Using Assertions in Declarative and Operational Models for Automated Debugging', in the Journal of Systems and Software, Vol 25, pp 223-239, 1994.
  • Lennartsson B., Shahmehri N., Bonnier S., 'On Exploiting Declarative Programming and Parallel Execution in Computer Based Real-time Systems', in Proceedings of the Tutorial and Workshop on Computer-Based Systems, ECBS'94, In IEEE Computer Society Press, (Sockholm), 24-27 May, 1994.
  • Kamkar M., Shahmehri N., Fritzson P., 'Three Approaches to Interprocedural Dynamic Slicing', in Proceedings of EUROMICRO'93, the Journal of Microprocessing and Microprogramming, North-Holland, Vol 38, No 1-5, September 1993.
  • Kamkar M., Fritzson P., Shahmehri N., 'Interprocedural Dynamic Slicing with Applications to Interprocedural Data Flow Testing', in Proceedings of the IEEE Conference on Software Maintenance, CSM-93, (San Diego, CA), September 1993.
  • Shahmehri N. Kamkar M., Fritzson P., 'Usability Criteria for Automated Debugging Systems', in Proceedings of AADEBUG'93 -1st Int. Workshop on Automated and Algorithmic Debugging, LNCS 749, Springer Verlag, May 1993.
  • Fritzson P., Auguston M., Shahmehri N., 'Using Assertions in Declarative and Operational Models for Automated Debugging', in Proceedings of Tolouse'92 - The fifth International Conference in Software Engineering and its Applications, (Tolouse, France), December 7-11, 1992.
  • Kamkar M., Shahmehri N., Fritzson, P., 'Interprocedural Dynamic Slicing', in Proceedings of PLILP'92 - Symposium on Programming Language Implementation and Logic Programming, LNCS 631, Springer Verlag, (Leuven, Belgium), August 1992.
  • Fritzson P., Shahmehri N., Kamkar, M., Gyimothy, T., ' Generalized Algorithmic Debugging and Testing', in ACM LOPLAS - Letters of Programming Languages and Systems, Vol 1, No 4, Dec 1992.
  • Fritzson P., Gyimothy T., Kamkar M., Shahmehri N., 'Generalized Algorithmic Debugging and Testing', in Proceedings of SIGPLAN'91 Conference on Programming Language Design and Implementation, SIGPLAN Notices 26:6, (Toronto, Ontario, Canada), June 1991.
  • Shahmehri N., Generalized Algorithmic Debugging. Dissertation no 260, Linköping University, December 1991.
  • Shahmehri N., Kamkar M., Fritzson P., 'Semi-Automatic Bug Localization in Software Maintenance', in Proceedings of the IEEE Conference on Software Maintenance, CSM-90, (San Diego, CA), November, 1990.
  • Shahmehri N., Fritzson P., 'Algorithmic Debugging for Imperative Languages with Side-effects', in Proceedings of CC'90 - The 3rd International Workshop on Compiler Compilers, (Schwerin, Germany), 22-24 October, 1990. Extended abstract in LNCS 477, Springer-Verlag.
  • Kamkar M., Shahmehri N., Fritzson, P., 'Bug Localization by Algorithmic Debugging and Program Slicing', in Proceedings of the International Conference on Programming Language Implementation and Logic Programming, August 1990, LNCS 456, Springer-Verlag, 1990.
  • Kamkar M., Shahmehri N., Fritzson P., 'Affect-Chaining and Dependency Oriented Flow Analysis Applied to Queries of Programs', in Proceedings of the ACM Symposium on Personal and Small Computers, (Cannes, France), May 1988.
  • Kamkar M., Shahmehri N., Affect-Chaining in Program Flow Analysis Applied to Queries of Programs. Licentiate thesis no 118, Linköping University, Linköping, May 1987.
  • Kamkar M., Shahmehri N., 'Runtime Dependent Program Flow Analysis'. In Proceedings of the Nordic Workshop at Roskilde University Center, (Roskilde, Denmark), October 1986.

Other

  • Shahmehri N., Aberg J., Lambrix P., 'Projects as a means for subject learning and personal development under student responsibility'. Proceedings of Second International Conference on Problem-based Learning in Higher Education, Linköping, Sweden, 2000.
  • DOI

Print this page

 
   
Last updated on 29-May-2005 by Nahid Shahmehri