Diomidis Spinellis

According to our database1, Diomidis Spinellis authored at least 262 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Digital Transformation?A Primer for Practitioners.
IEEE Softw., 2020

Energy-Delay investigation of Remote Inter-Process communication technologies.
J. Syst. Softw., 2020

PDGuard: an architecture for the control and secure processing of personal data.
Int. J. Inf. Sec., 2020

An empirical investigation on the relationship between design and architecture smells.
Empir. Softw. Eng., 2020

Standing on shoulders or feet? An extended study on the usage of the MSR data papers.
Empir. Softw. Eng., 2020

ACM SIGSOFT Empirical Standards.
CoRR, 2020

Identifying Bugs in Make and JVM-Oriented Builds.
CoRR, 2020

A Dataset for GitHub Repository Deduplication.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

A Dataset of Enterprise-Driven Open Source Software.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

The Software Heritage Graph Dataset: Large-scale Analysis of Public Software Development History.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

A Complete Set of Related Git Repositories Identified via Community Detection Approaches Based on Shared Commits.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Practical fault detection in puppet programs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Live interactive queries to a software application's memory profile.
IET Softw., 2019

Software Development Lifecycle for Energy Efficiency: Techniques and Tools.
ACM Comput. Surv., 2019

Detecting Missing Dependencies and Notifiers in Puppet Programs.
CoRR, 2019

On the Feasibility of Transfer-learning Code Smells using Deep Learning.
CoRR, 2019

Does Unit-Tested Code Crash? A Case Study of Eclipse.
CoRR, 2019

How to Select Open Source Components.
Computer, 2019

The software heritage graph dataset: public software development under one roof.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Time present and time past: analyzing the evolution of JavaScript code in the wild.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Standing on shoulders or feet?: the usage of the MSR data papers.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Semantic source code models using identifier embeddings.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities.
Proceedings of the Reuse in the Big Data Era, 2019

2018
The Editor's Retrospective.
IEEE Softw., 2018

The Success of a Heavenly Marriage.
IEEE Softw., 2018

Being a Software Developer.
IEEE Softw., 2018

Self-Evolving Software Architectures.
IEEE Softw., 2018

The Challenges and Practices of Release Engineering.
IEEE Softw., 2018

Under the Covers of IEEE Software.
IEEE Softw., 2018

A survey on software smells.
J. Syst. Softw., 2018

The exception handling riddle: An empirical study on the Android API.
J. Syst. Softw., 2018

Towards an affordable brain computer interface for the assessment of programmers' mental workload.
Int. J. Hum. Comput. Stud., 2018

Modern debugging: the art of finding a needle in a haystack.
Commun. ACM, 2018

Aspects of the History of Computing in Modern Greece.
IEEE Ann. Hist. Comput., 2018

Documented unix facilities over 48 years.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

VulinOSS: a dataset of security vulnerabilities in open-source systems.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

What are your programming language's energy-delay implications?
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Word embeddings for the software engineering domain.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Enabling Practices for Information Systems Adoption in the Complex Context of Greek E-Government.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

How to analyze git repositories with command line tools: we're not in kansas anymore.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Smelly relations: measuring and understanding database schema quality.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Echoes from space: grouping commands with large-scale telemetry data.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Code review comments: language matters.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

On the dichotomy of debugging behavior among programmers.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Extending Unix Pipelines to DAGs.
IEEE Trans. Computers, 2017

The Elusiveness of Smart Healthcare.
IEEE Softw., 2017

State-of-the-Art Software Testing.
IEEE Softw., 2017

Software Reliability Redux.
IEEE Softw., 2017

How Abundance Changes Software Engineering.
IEEE Softw., 2017

The Social Responsibility of Software Development.
IEEE Softw., 2017

Software-Engineering the Internet of Things.
IEEE Softw., 2017

The long-term growth rate of evolving software: Empirical results and implications.
J. Softw. Evol. Process., 2017

Fatal injection: a survey of modern code injection attack countermeasures.
PeerJ Comput. Sci., 2017

A repository of Unix history and evolution.
Empir. Softw. Eng., 2017


Analyzing Programming Languages' Energy Consumption: An Empirical Study.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Half-century of unix: history, preservation, and lessons learned.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Towards a context dependent Java exceptions hierarchy.
Proceedings of the 39th International Conference on Software Engineering, 2017

Type Checking for Reliable APIs.
Proceedings of the 1st IEEE/ACM International Workshop on API Usage and Evolution, 2017

Mining software engineering data from GitHub.
Proceedings of the 39th International Conference on Software Engineering, 2017

House of Cards: Code Smells in Open-Source C# Repositories.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

2016
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.
ACM Trans. Priv. Secur., 2016

The Changing Role of the Software Architect.
IEEE Softw., 2016

Managing a Software Business.
IEEE Softw., 2016

Reflecting on Quality.
IEEE Softw., 2016

Being a DevOps Developer.
IEEE Softw., 2016

Serving Professionals.
IEEE Softw., 2016

Developer, Debug Thyself.
IEEE Softw., 2016

Does your configuration code smell?
Proceedings of the 13th International Conference on Mining Software Repositories, 2016

The evolution of C programming practices: a study of the Unix operating system 1973-2015.
Proceedings of the 38th International Conference on Software Engineering, 2016

An Empirical Analysis of Vulnerabilities in Virtualization Technologies.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Tools! Tools! We need tools!
Proceedings of the Perspectives on Data Science for Software Engineering, 2016

2015
Extending Our Field's Reach.
IEEE Softw., 2015

Architecture from a Developer's Perspective.
IEEE Softw., 2015

Introductions.
IEEE Softw., 2015

Recruiting a Star Team.
IEEE Softw., 2015

The Strategic Importance of Release Engineering.
IEEE Softw., 2015

Fewer Dead Trees, More Engagement.
IEEE Softw., 2015

Charting the API minefield using software telemetry data.
Empir. Softw. Eng., 2015

An interactive SQL relational interface for querying main-memory data structures.
Computing, 2015

A type-safe embedding of SQL into Java using the extensible compiler framework J%.
Comput. Lang. Syst. Struct., 2015

A Repository with 44 Years of Unix Evolution.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

Generating the Blueprints of the Java Ecosystem.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

An Exploratory Study on the Evolution of C Programming in the Unix Operating System.
Proceedings of the 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2015

Tools and Techniques for Analyzing Product and Process Data.
Proceedings of the Art and Science of Analyzing Software Data, 2015

2014
Software Development Tooling: Information, Opinion, Guidelines, and Tools.
IEEE Softw., 2014

First, Do No Harm.
IEEE Softw., 2014

Service Orchestration with Rundeck.
IEEE Softw., 2014

Developing in the Cloud.
IEEE Softw., 2014

Bespoke Infrastructures.
IEEE Softw., 2014

Conducting quantitative software engineering studies with Alitheia Core.
Empir. Softw. Eng., 2014

TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The bug catalog of the maven ecosystem.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

Undocumented and unchecked: exceptions that spell trouble.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

Relational access to Unix kernel data structures.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Against the Odds: Managing the Unmanagable in a Time of Crisis.
Proceedings of the Advanced Information Systems Engineering, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
The Frictionless Development Environment Scorecard.
IEEE Softw., 2013

Differential Debugging.
IEEE Softw., 2013

Portability: Goodies vs. the Hair Shirt.
IEEE Softw., 2013

Systems Software.
IEEE Softw., 2013

The Importance of Being Declarative.
IEEE Softw., 2013

Dismal Code: Studying the Evolution of Security Bugs.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Improving the quality of APIs through the analysis of software crash reports.
Proceedings of the 2013 Imperial College Computing Student Workshop, 2013

2012
APIs, Libraries, and Code.
IEEE Softw., 2012

Virtualize Me.
IEEE Softw., 2012

Don't Install Software by Hand.
IEEE Softw., 2012

IEEE Softw., 2012

Package Management Systems.
IEEE Softw., 2012

Refactoring on the Cheap.
IEEE Softw., 2012

Division of Effort, Productivity, Quality, and Relationships in FLOSS Virtual Teams: Evidence from the FreeBSD Project.
J. Univers. Comput. Sci., 2012

Organizational adoption of open source software.
J. Syst. Softw., 2012

Measuring the Occurrence of Security-Related Bugs through Software Evolution.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Comparative language fuzz testing: programming languages vs. fat fingers.
Proceedings of the ACM 4th Annual Workshop on Evaluation and Usability of Programming Languages and Tools, 2012

Software tools research: a matter of scale and scope - or commoditization?
Proceedings of the Conference on Systems, 2012

GHTorrent: Github's data from a firehose.
Proceedings of the 9th IEEE Working Conference of Mining Software Repositories, 2012

2011
Lessons from Space.
IEEE Softw., 2011

Faking It.
IEEE Softw., 2011

Agility Drivers.
IEEE Softw., 2011

Choosing and Using Open Source Components.
IEEE Softw., 2011

elytS edoC.
IEEE Softw., 2011

Barriers to the Adoption of B2B e-Marketplaces by Large Enterprises: Lessons Learned From the Hellenic Aerospace Industry.
Inf. Syst. Manag., 2011

Countering Code Injection Attacks: A Unified Approach.
Inf. Manag. Comput. Secur., 2011

Data mining in software engineering.
Intell. Data Anal., 2011

Open Source Software: A Survey from 10, 000 Feet.
Found. Trends Technol. Inf. Oper. Manag., 2011

Quality Wars: Open Source Versus Proprietary Software.
Proceedings of the Making Software - What Really Works, and Why We Believe It., 2011

2010
Farewell to Disks.
IEEE Softw., 2010

UML Everywhere.
IEEE Softw., 2010

Code Documentation.
IEEE Softw., 2010

Software Tracks.
IEEE Softw., 2010

CScout: A refactoring browser for C.
Sci. Comput. Program., 2010

A market-based approach to managing the risk of peer-to-peer transactions.
Comput. Networks, 2010

Cyberdiversity: Measures and Initial Results.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

Open Source Licensing Across Package Dependencies.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
User-level operating system transactions.
Softw. Pract. Exp., 2009

Guest Editors' Introduction: What Kinds of Nails Need a Domain-Specific Hammer?
IEEE Softw., 2009

Basic Etiquette of Technical Communication.
IEEE Softw., 2009

Job Security.
IEEE Softw., 2009

Drawing Tools.
IEEE Softw., 2009

Start with the Most Difficult Part.
IEEE Softw., 2009

Optimizing header file include directives.
J. Softw. Maintenance Res. Pract., 2009

Commercial uses: Going functional on exotic trades.
J. Funct. Program., 2009

Evaluating the Quality of Open Source Software.
Electron. Notes Theor. Comput. Sci., 2009

SDriver: Location-specific signatures prevent SQL injection attacks.
Comput. Secur., 2009

J%: Integrating Domain-Specific Languages with Java.
Proceedings of the PCI 2009, 2009

A platform for software engineering research.
Proceedings of the 6th International Working Conference on Mining Software Repositories, 2009

Open Source Adoption In Large US Companies.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Fortifying Applications Against Xpath Injection Attacks.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Measuring Developer Contribution From Software Repository Data.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Alitheia Core: An extensible software quality monitoring platform.
Proceedings of the 31st International Conference on Software Engineering, 2009

Biological Aspects of Computer Virology.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Analysis and Design of Discrete Part Production Lines.
Optimization and its applications 31, Springer, ISBN: 978-0-387-89493-5, 2009

2008
Power laws in software.
ACM Trans. Softw. Eng. Methodol., 2008

FIRE/J - optimizing regular expression searches with generative programming.
Softw. Pract. Exp., 2008

The Way We Program.
IEEE Softw., 2008

Software Builders.
IEEE Softw., 2008

Using and Abusing XML.
IEEE Softw., 2008

Rational Metaprogramming.
IEEE Softw., 2008

Where's My Jetpack?
IEEE Softw., 2008

The Antikythera Mechanism: A Computer Science Perspective.
Computer, 2008

The collaborative organization of knowledge.
Commun. ACM, 2008

Java Performance Evaluation Using External Instrumentation.
Proceedings of the Panhellenic Conference on Informatics, 2008

Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation.
Proceedings of the Panhellenic Conference on Informatics, 2008

The SQO-OSS Quality Model: Measurement Based Open Source Software Evaluation.
Proceedings of the Open Source Development, 2008

Measuring developer contribution from software repository data.
Proceedings of the 2008 International Working Conference on Mining Software Repositories, 2008

A tale of four kernels.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Static Program Analysis for Java Card Applets.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Coping with TiVo: Opportunities of the networked digital video recorder.
Telematics Informatics, 2007

Bookshelf.
IEEE Softw., 2007

On Paper.
IEEE Softw., 2007

Abstraction and Variation.
IEEE Softw., 2007

The Tools We Use.
IEEE Softw., 2007

Silver Bullets and Other Mysteries.
IEEE Softw., 2007

I Spy.
IEEE Softw., 2007

Cracking Software Reuse.
IEEE Softw., 2007

A framework for the static verification of api calls.
J. Syst. Softw., 2007

A PRoactive malware identification system based on the computer hygiene principles.
Inf. Manag. Comput. Secur., 2007

The MoR-Trust Distributed Trust Management System: Design and Simulation Results.
Electron. Notes Theor. Comput. Sci., 2007

Implementing regular cash with blind fixed-value electronic coins.
Comput. Stand. Interfaces, 2007

Coping with plagiarism and grading load: Randomized programming assignments and reflective grading.
Comput. Appl. Eng. Educ., 2007

Refactoring-Does It Improve Software Quality?
Proceedings of the 5th International Workshop on Software Quality, 2007

2006
Some Types of Memory Are More Equal than Others.
login Usenix Mag., 2006

Using Linux Live CDs for Penetration Testing.
login Usenix Mag., 2006

User interface evaluation of interactive TV: a media studies perspective.
Univers. Access Inf. Soc., 2006

Open Source and Professional Advancement.
IEEE Softw., 2006

Choosing a Programming Language.
IEEE Softw., 2006

Debuggers and logging frameworks.
IEEE Softw., 2006

Bug Busters.
IEEE Softw., 2006

Project Asset Portability.
IEEE Softw., 2006

Review of "Sustainable Software Development: An Agile Perspective by Kevin Tate, " Addison-Wesley Professional, 2005, ISBN: 0321286081.
ACM Queue, 2006

Wireless value-added services in exhibition shows.
Int. J. Mob. Commun., 2006

2005
Bookshelf.
IEEE Softw., 2005

Version Control, Part 2.
IEEE Softw., 2005

Working with Unix Tools.
IEEE Softw., 2005

Version Control Systems.
IEEE Softw., 2005

Version Control, Part I.
IEEE Softw., 2005

Tool Writing: A Forgotten Art?
IEEE Softw., 2005

Java Makes Scripting Languages Irrelevant?
IEEE Softw., 2005

Dear Editor.
IEEE Softw., 2005

The Tools at Hand.
IEEE Softw., 2005

Index-Based Persistent Document Identifiers.
Inf. Retr., 2005

Handling and Reporting Security Advisories: A Scorecard Approach.
IEEE Secur. Priv., 2005

Guest Editors' Introduction: Advanced Heuristics in Transportation and Logistics.
IEEE Intell. Syst., 2005

NGCE - Network Graphs for Computer Epidemiologists.
Proceedings of the Advances in Informatics, 2005

Trial Evaluation of Wireless Info-communication and Indoor Location-Based Services in Exhibition Shows.
Proceedings of the Advances in Informatics, 2005

2004
Guest Editors' Introduction: How Is Open Source Affecting Software Development?
IEEE Softw., 2004

Bookshelf.
IEEE Softw., 2004

A survey of peer-to-peer content distribution technologies.
ACM Comput. Surv., 2004

Security applications of peer-to-peer networks.
Comput. Networks, 2004

Affective usability evaluation for an interactive music television channel.
Comput. Entertain., 2004

User interface development for interactive television: extending a commercial DTV platform to the virtual channel API.
Comput. Graph., 2004

Editorial message: special track on ubiquitous computing.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Targeted messages in indoor mobile environment: A software - oriented approach.
Proceedings of the IASTED International Conference on Software Engineering, 2004

2003
Organized Pruning of File Sets.
login Usenix Mag., 2003

Global Analysis and Transformations in Preprocessed Languages.
IEEE Trans. Software Eng., 2003

Reliable identification of bounded-length viruses is NP-complete.
IEEE Trans. Inf. Theory, 2003

On the Declarative Specification of Models.
IEEE Softw., 2003

Reading, Writing, and Code.
ACM Queue, 2003

The information furnace: consolidated home control.
Pers. Ubiquitous Comput., 2003

Position-Annotated Photographs: A Geotemporal Web.
IEEE Pervasive Comput., 2003

Security architectures for network clients.
Inf. Manag. Comput. Secur., 2003

Towards a framework for evaluating certificate status information mechanisms.
Comput. Commun., 2003

Reflections on trusting trust revisited.
Commun. ACM, 2003

The decay and failures of web references.
Commun. ACM, 2003

Intelligent user interfaces in the living room: usability design for personalized television applications.
Proceedings of the 8th International Conference on Intelligent User Interfaces, 2003

Code Reading: The Open Source Perspective
Addison-Wesley, ISBN: 0-201-79940-5, 2003

2002
Unix tools as visual programming components in a GUI-builder environment.
Softw. Pract. Exp., 2002

A modest proposal for curing the public field phobia.
ACM SIGPLAN Notices, 2002

Panoptis: Intrusion Detection Using a Domain-Specific Language.
J. Comput. Secur., 2002

A Metaphor for Personalized Television Programming.
Proceedings of the Universal Access: Theoretical Perspectives, 2002

2001
Notable design patterns for domain-specific languages.
J. Syst. Softw., 2001

Information systems security in the Greek public sector.
Inf. Manag. Comput. Secur., 2001

Multi-technology distributed objects and their integration.
Comput. Stand. Interfaces, 2001

Fear of Coding, and How to Reduce It.
Computer, 2001

Sandboxing Applications.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001

Information Systems in the Living Room: A Case Study of Personalized Interactive TV Design.
Proceedings of the 9th European Conference on Information Systems, 2001

2000
Reflection as a mechanism for software integrity verification.
ACM Trans. Inf. Syst. Secur., 2000

Component mining: a process and its pattern language.
Inf. Softw. Technol., 2000

A simulated annealing approach for buffer allocation in reliable production lines.
Ann. Oper. Res., 2000

Outwit: UNIX Tool-Based Programming Meets the Windows World.
Proceedings of the General Track: 2000 USENIX Annual Technical Conference, 2000

Evaluating certificate status information mechanisms.
Proceedings of the CCS 2000, 2000

1999
Declarative Peephole Optimization Using String Pattern Matching.
ACM SIGPLAN Notices, 1999

Architectures for secure portable executable content.
Internet Res., 1999

Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Secur., 1999

Explore, Excogitate, Exploit: Component Mining.
Computer, 1999

Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification.
Comput. Commun., 1999

1998
The Computer's New Clothes.
IEEE Softw., 1998

Palmtop Programmable Appliance Controls.
Pers. Ubiquitous Comput., 1998

The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction.
Microprocess. Microsystems, 1998

Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach.
Int. J. Medical Informatics, 1998

1997
Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools.
Proceedings of the 16th International Conference on Computer Safety, 1997

Lightweight Languages as Software Engineering Tools.
Proceedings of the Conference on Domain-Specific Languages, 1997

1996
Greek Character Encoding for Electronic Mail Messages.
RFC, May, 1996

1995
Object-Oriented Technology in Multiparadigm Language Implementation.
J. Object Oriented Program., 1995

1994
Trace: A Tool for Logging Operating System Call Transactions.
ACM SIGOPS Oper. Syst. Rev., 1994

Wux: UNIX Tools under Windows.
Proceedings of the USENIX Winter 1994 Technical Conference, 1994

Language and Architecture Paradigms as Object Classes.
Proceedings of the Programming Languages and System Architectures, 1994

The Design and Implementation of a Legal Text Database.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

1993
Implementing Haskell: Language Implementation as a Tool Building Exercise.
Struct. Program., 1993

1991
Type-safe linkage for variables and functions.
ACM SIGPLAN Notices, 1991


  Loading...