Zobrazeno 1 - 10
of 165
pro vyhledávání: '"Panos Louridas"'
Autor:
Hugo Aaronson
Publikováno v:
The Mathematical Gazette. 106:380-381
Autor:
Ramon de Vera
Publikováno v:
ACM SIGACT News. 49:16-19
Autor:
Tu, Lucy (AUTHOR)
Publikováno v:
Scientific American. Oct2024, Vol. 331 Issue 3, p71-71. 1/8p. 1 Color Photograph.
Autor:
de Vera Jr., Ramon
Publikováno v:
ACM SIGACT News; March 2018, Vol. 49 Issue: 1 p16-19, 4p
Publikováno v:
PeerJ Computer Science, Vol 7, p e372 (2021)
A model regarding the lifetime of individual source code lines or tokens can estimate maintenance effort, guide preventive maintenance, and, more broadly, identify factors that can improve the efficiency of software development. We present methods an
Externí odkaz:
https://doaj.org/article/5c79c131b4b94476bb07ddde2ff7c108
Autor:
Panos Louridas, Diomidis Spinellis
Publikováno v:
PLoS ONE, Vol 16, Iss 9, p e0255970 (2021)
People can exhibit their status by the consumption of particular goods or experiential purchases; this is known as "conspicuous consumption"; the practice is widespread and explains the market characteristics of a whole class of goods, Veblen goods,
Externí odkaz:
https://doaj.org/article/b1f58c2b12654e6eac97c630fdfbfb73
Publikováno v:
SoftwareX, Vol 5, Iss , Pp 134-138 (2016)
Pico ql is an open source c/c++ software whose scientific scope is real-time interactive analysis of in-memory data through sql queries. It exposes a relational view of a system’s or application’s data structures, which is queryable through sql.
Externí odkaz:
https://doaj.org/article/8fc8d321ce0242409c98cadbe8ec0496
Autor:
Panos Louridas
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics.We all keep secrets—from our gym locker codes to our email passwords to our online interactio
Publikováno v:
IEEE Software. 37:17-25
Suppose that you are developing a critical application that handles sensitive data. Access to the data should be limited, and data should be changed only under specific circumstances. Moreover, at any point in time you may be asked to provide an audi
Publikováno v:
ESEC/SIGSOFT FSE
Examining the characteristics of software vulnerabilities and the code that contains them can lead to the development of more secure software. We present a dataset (∼1.4 GB) containing vulnerable source code files together with the corresponding, p