Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Panos Louridas"'
Publikováno v:
PeerJ Computer Science, Vol 7, p e372 (2021)
A model regarding the lifetime of individual source code lines or tokens can estimate maintenance effort, guide preventive maintenance, and, more broadly, identify factors that can improve the efficiency of software development. We present methods an
Externí odkaz:
https://doaj.org/article/5c79c131b4b94476bb07ddde2ff7c108
Autor:
Panos Louridas, Diomidis Spinellis
Publikováno v:
PLoS ONE, Vol 16, Iss 9, p e0255970 (2021)
People can exhibit their status by the consumption of particular goods or experiential purchases; this is known as "conspicuous consumption"; the practice is widespread and explains the market characteristics of a whole class of goods, Veblen goods,
Externí odkaz:
https://doaj.org/article/b1f58c2b12654e6eac97c630fdfbfb73
Publikováno v:
SoftwareX, Vol 5, Iss , Pp 134-138 (2016)
Pico ql is an open source c/c++ software whose scientific scope is real-time interactive analysis of in-memory data through sql queries. It exposes a relational view of a system’s or application’s data structures, which is queryable through sql.
Externí odkaz:
https://doaj.org/article/8fc8d321ce0242409c98cadbe8ec0496
Autor:
Diomidis Spinellis, Panos Louridas
Publikováno v:
PLoS ONE, Vol 8, Iss 6, p e66508 (2013)
The action required to stem the environmental and social implications of climate change depends crucially on how humankind shapes technology, economy, lifestyle and policy. With transport CO2 emissions accounting for about a quarter of the total, we
Externí odkaz:
https://doaj.org/article/7a981743798e4594a1e2c8382a936d6d
Publikováno v:
IEEE Software. 37:17-25
Suppose that you are developing a critical application that handles sensitive data. Access to the data should be limited, and data should be changed only under specific circumstances. Moreover, at any point in time you may be asked to provide an audi
Publikováno v:
ESEC/SIGSOFT FSE
Examining the characteristics of software vulnerabilities and the code that contains them can lead to the development of more secure software. We present a dataset (∼1.4 GB) containing vulnerable source code files together with the corresponding, p
Publikováno v:
IET Software. 13:241-248
Memory operations are critical to an application's reliability and performance. To reason about their correctness and track opportunities for optimisations, sophisticated instrumentation frameworks, such as Valgrind and Pin, have been developed. Both
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:188-203
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection, exploit vulnerabilities in web applications that may accept and process data of uncertain origin without proper validation or filtering, allowing the injection an
Autor:
Panos Louridas, Diomidis Spinellis, Thodoris Sotiropoulos, Dimitris Mitropoulos, Vitalis Salis
Publikováno v:
ICSE (Companion Volume)
The ICSE 2021 paper titled "PyCG: Practical Call Graph Generation in Python" comes with a replication package with the purpose of providing open access to (1) our prototype call graph generator, namely PyCG, and (2) the data and scripts that replicat
Autor:
Panos Louridas
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics.We all keep secrets—from our gym locker codes to our email passwords to our online interactio