Panagiotis Louridas

According to our database1, Panagiotis Louridas authored at least 55 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




PyCG: Practical Call Graph Generation in Python.
CoRR, 2021

Blockchain Technologies in Practice.
IEEE Softw., 2020

Search Engine Similarity Analysis: A Combined Content and Rankings Approach.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

A Dataset of Enterprise-Driven Open Source Software.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Defending Against Web Application Attacks: Approaches, Challenges and Implications.
IEEE Trans. Dependable Secur. Comput., 2019

Live interactive queries to a software application's memory profile.
IET Softw., 2019

A Non-Interactive Shuffle Argument With Low Trust Assumptions.
IACR Cryptol. ePrint Arch., 2019

On the Feasibility of Transfer-learning Code Smells using Deep Learning.
CoRR, 2019

Time present and time past: analyzing the evolution of JavaScript code in the wild.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Joint Review of The Power of Networks: Six Principles that Connect our Lives.
SIGACT News, 2018

Review of Network Science by Albert-Làaszlò Barabàasi.
SIGACT News, 2018

The exception handling riddle: An empirical study on the Android API.
J. Syst. Softw., 2018

What are your programming language's energy-delay implications?
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Enabling Global Big Data Computations.
Proceedings of the 20th International Workshop on Design, 2018

PiCO QL: A software library for runtime interactive queries on program data.
SoftwareX, 2016

Machine Learning.
IEEE Softw., 2016

Component Stacks for Enterprise Applications.
IEEE Softw., 2016

The evolution of C programming practices: a study of the Unix operating system 1973-2015.
Proceedings of the 38th International Conference on Software Engineering, 2016

An interactive SQL relational interface for querying main-memory data structures.
Computing, 2015

A type-safe embedding of SQL into Java using the extensible compiler framework J%.
Comput. Lang. Syst. Struct., 2015

Generating the Blueprints of the Java Ecosystem.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

An Exploratory Study on the Evolution of C Programming in the Unix Operating System.
Proceedings of the 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

The bug catalog of the maven ecosystem.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

Relational access to Unix kernel data structures.
Proceedings of the Ninth Eurosys Conference 2014, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Embedded Analytics and Statistics for Big Data.
IEEE Softw., 2013

From Helios to Zeus.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Dismal Code: Studying the Evolution of Security Bugs.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Zeus: Bringing Internet Voting to Greece.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

A note on rigour and replicability.
ACM SIGSOFT Softw. Eng. Notes, 2012

Comparative language fuzz testing: programming languages vs. fat fingers.
Proceedings of the ACM 4th Annual Workshop on Evaluation and Usability of Programming Languages and Tools, 2012

Test Management.
IEEE Softw., 2011

Countering Code Injection Attacks: A Unified Approach.
Inf. Manag. Comput. Secur., 2011

Code Quality.
Proceedings of the Encyclopedia of Software Engineering, 2010

Up in the Air: Moving Your Applications to the Cloud.
IEEE Softw., 2010

When students are not programmers.
Inroads, 2010

A market-based approach to managing the risk of peer-to-peer transactions.
Comput. Networks, 2010

Evaluating the Quality of Open Source Software.
Electron. Notes Theor. Comput. Sci., 2009

Power laws in software.
ACM Trans. Softw. Eng. Methodol., 2008

Orchestrating Web Services with BPEL.
IEEE Softw., 2008

The collaborative organization of knowledge.
Commun. ACM, 2008

Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation.
Proceedings of the Panhellenic Conference on Informatics, 2008

Grid-Enabled Instrument Representation and Reservation.
Proceedings of the Fourth International Conference on e-Science, 2008

Static Program Analysis for Java Card Applets.
Proceedings of the Smart Card Research and Advanced Applications, 2008

Declarative GUI Programming in Microsoft Windows.
IEEE Softw., 2007

A framework for the static verification of api calls.
J. Syst. Softw., 2007

Quality Assurance in perfSONAR Release Management.
Proceedings of the Quality of Information and Communications Technology, 2007

SOAP and Web Services.
IEEE Softw., 2006

Static Code Analysis.
IEEE Softw., 2006

Using Wikis in Software Development.
IEEE Softw., 2006

Version Control.
IEEE Softw., 2006

JUnit: Unit Testing and Coding in Tandem.
IEEE Softw., 2005

A generic model for reflective design.
ACM Trans. Softw. Eng. Methodol., 2000

Some guidelines for non-repudiation protocols.
Comput. Commun. Rev., 2000