Panagiotis Louridas

Orcid: 0000-0002-3971-4612

According to our database1, Panagiotis Louridas authored at least 64 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improving Sequential Recommendations with LLMs.
CoRR, 2024

2023
Generative AI for Software Practitioners.
IEEE Softw., 2023

Leveraging Large Language Models for Sequential Recommendation.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

2022
A Greek Parliament Proceedings Dataset for Computational Linguistics and Political Analysis.
CoRR, 2022

A Greek Parliament Proceedings Dataset for Computational Linguistics and Political Analysis.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Software evolution: the lifetime of fine-grained elements.
PeerJ Comput. Sci., 2021

Code smell detection by deep direct-learning and transfer-learning.
J. Syst. Softw., 2021

CrossVul: a cross-language vulnerability dataset with commit data.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

A Replication Package for PyCG: Practical Call Graph Generation in Python.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

PyCG: Practical Call Graph Generation in Python.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Blockchain Technologies in Practice.
IEEE Softw., 2020

Search Engine Similarity Analysis: A Combined Content and Rankings Approach.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

A Dataset of Enterprise-Driven Open Source Software.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

2019
Defending Against Web Application Attacks: Approaches, Challenges and Implications.
IEEE Trans. Dependable Secur. Comput., 2019

Live interactive queries to a software application's memory profile.
IET Softw., 2019

A Non-Interactive Shuffle Argument With Low Trust Assumptions.
IACR Cryptol. ePrint Arch., 2019

On the Feasibility of Transfer-learning Code Smells using Deep Learning.
CoRR, 2019

Time present and time past: analyzing the evolution of JavaScript code in the wild.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

2018
Joint Review of The Power of Networks: Six Principles that Connect our Lives.
SIGACT News, 2018

Review of Network Science by Albert-Làaszlò Barabàasi.
SIGACT News, 2018

The exception handling riddle: An empirical study on the Android API.
J. Syst. Softw., 2018

What are your programming language's energy-delay implications?
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Enabling Global Big Data Computations.
Proceedings of the 20th International Workshop on Design, 2018

2016
PiCO QL: A software library for runtime interactive queries on program data.
SoftwareX, 2016

Machine Learning.
IEEE Softw., 2016

Component Stacks for Enterprise Applications.
IEEE Softw., 2016

The evolution of C programming practices: a study of the Unix operating system 1973-2015.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
An interactive SQL relational interface for querying main-memory data structures.
Computing, 2015

A type-safe embedding of SQL into Java using the extensible compiler framework J%.
Comput. Lang. Syst. Struct., 2015

Generating the Blueprints of the Java Ecosystem.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

An Exploratory Study on the Evolution of C Programming in the Unix Operating System.
Proceedings of the 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
The bug catalog of the maven ecosystem.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

Relational access to Unix kernel data structures.
Proceedings of the Ninth Eurosys Conference 2014, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Embedded Analytics and Statistics for Big Data.
IEEE Softw., 2013

From Helios to Zeus.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Dismal Code: Studying the Evolution of Security Bugs.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Zeus: Bringing Internet Voting to Greece.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

2012
A note on rigour and replicability.
ACM SIGSOFT Softw. Eng. Notes, 2012

Comparative language fuzz testing: programming languages vs. fat fingers.
Proceedings of the ACM 4th Annual Workshop on Evaluation and Usability of Programming Languages and Tools, 2012

2011
Test Management.
IEEE Softw., 2011

Countering Code Injection Attacks: A Unified Approach.
Inf. Manag. Comput. Secur., 2011

2010
Code Quality.
Proceedings of the Encyclopedia of Software Engineering, 2010

Up in the Air: Moving Your Applications to the Cloud.
IEEE Softw., 2010

When students are not programmers.
Inroads, 2010

A market-based approach to managing the risk of peer-to-peer transactions.
Comput. Networks, 2010

2008
Power laws in software.
ACM Trans. Softw. Eng. Methodol., 2008

Orchestrating Web Services with BPEL.
IEEE Softw., 2008

Evaluating the Quality of Open Source Software.
Proceedings of the International Workshop on Software Quality and Maintainability, 2008

The collaborative organization of knowledge.
Commun. ACM, 2008

Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation.
Proceedings of the Panhellenic Conference on Informatics, 2008

Grid-Enabled Instrument Representation and Reservation.
Proceedings of the Fourth International Conference on e-Science, 2008

Static Program Analysis for Java Card Applets.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Declarative GUI Programming in Microsoft Windows.
IEEE Softw., 2007

A framework for the static verification of api calls.
J. Syst. Softw., 2007

Quality Assurance in perfSONAR Release Management.
Proceedings of the Quality of Information and Communications Technology, 2007

2006
SOAP and Web Services.
IEEE Softw., 2006

Static Code Analysis.
IEEE Softw., 2006

Using Wikis in Software Development.
IEEE Softw., 2006

Version Control.
IEEE Softw., 2006

2005
JUnit: Unit Testing and Coding in Tandem.
IEEE Softw., 2005

2000
A generic model for reflective design.
ACM Trans. Softw. Eng. Methodol., 2000

Some guidelines for non-repudiation protocols.
Comput. Commun. Rev., 2000


  Loading...