Petros Maniatis

Orcid: 0000-0003-3777-5291

According to our database1, Petros Maniatis authored at least 75 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CodeQueries: A Dataset of Semantic Queries over Code.
Proceedings of the 17th Innovations in Software Engineering Conference, 2024

2023
Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

Predicting Dynamic Properties of Heap Allocations using Neural Networks Trained on Static Code: An Intellectual Abstract.
Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management, 2023

2022
Learning to Answer Semantic Queries over Code.
CoRR, 2022

A Library for Representing Python Programs as Graphs for Machine Learning.
CoRR, 2022

CodeTrek: Flexible Modeling of Code using an Extensible Relational Representation.
Proceedings of the Tenth International Conference on Learning Representations, 2022

2021
Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

PLUR: A Unifying, Graph-Based View of Program Learning, Understanding, and Repair.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

SpreadsheetCoder: Formula Prediction from Semi-structured Context.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms.
ACM SIGOPS Oper. Syst. Rev., 2020

Neural Program Synthesis with a Differentiable Fixer.
CoRR, 2020

Pre-trained Contextual Embedding of Source Code.
CoRR, 2020

Learning and Evaluating Contextual Embedding of Source Code.
Proceedings of the 37th International Conference on Machine Learning, 2020

Global Relational Models of Source Code.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Neural Program Repair by Jointly Learning to Localize and Repair.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
The Use of CT Scans and 3D Modeling as a Powerful Tool to Assist Fossil Vertebrate Taxonomy.
Proceedings of the Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection, 2018

2017
Oblivious Stash Shuffle.
CoRR, 2017

Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers.
Proceedings of the 26th USENIX Security Symposium, 2017

Prochlo: Strong Privacy for Analytics in the Crowd.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Glimmers: Resolving the Privacy/Trust Quagmire.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

2016
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices.
IEEE Trans. Mob. Comput., 2015

The Performance Cost of Shadow Stacks and Stack Canaries.
Proceedings of the 10th ACM Symposium on Information, 2015

2013
Towards verifiable resource accounting for outsourced computation.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

Mantis: Automatic Performance Prediction for Smartphone Applications.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

Symbolic software model validation.
Proceedings of the 11th ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2013

2012
Verification with small and short worlds.
Proceedings of the Formal Methods in Computer-Aided Design, 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
Small trusted primitives for dependable systems.
ACM SIGOPS Oper. Syst. Rev., 2011

Secure Data Preservers for Web Services.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

CloneCloud: elastic execution between mobile device and cloud.
Proceedings of the European Conference on Computer Systems, 2011

Verifiable resource accounting for cloud computing services.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
Mantis: Predicting System Performance through Program Analysis and Modeling
CoRR, 2010

CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution
CoRR, 2010

A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users
CoRR, 2010

Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression.
Proceedings of the Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, 2010

Verifiable network-performance measurements.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Declarative networking.
Commun. ACM, 2009

Zeno: Eventually Consistent Byzantine-Fault Tolerance.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

Augmented Smartphone Applications Through Clone Cloud Execution.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Tiered Fault Tolerance for Long-Term Integrity.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

2008
Evita raced: metacompilation for declarative networks.
Proc. VLDB Endow., 2008

Diverse Replication for Single-Machine Byzantine-Fault Tolerance.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

BFT Protocols Under Fire.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Defining weakly consistent Byzantine fault-tolerant services.
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, 2008

2007
Attested append-only memory: making adversaries stick to their word.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Friday: Global Comprehension for Distributed Replay.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Loss and Delay Accountability for the Internet.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Proof Sketches: Verifiable In-Network Aggregation.
Proceedings of the 23rd International Conference on Data Engineering, 2007

Public Health for the Internet (PHI).
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

2006
Declarative networking: language, execution and optimization.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2006

Induced Churn as Shelter from Routing-Table Poisoning.
Proceedings of the Network and Distributed System Security Symposium, 2006

Using queries for distributed monitoring and forensics.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

A fresh look at the reliability of long-term digital storage.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

2005
The LOCKSS peer-to-peer digital preservation system.
ACM Trans. Comput. Syst., 2005

Attrition Defenses for a Peer-to-Peer Digital Preservation System.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

Implementing declarative overlays.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

The Many Faces of Systems Research - and How to Evaluate Them.
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

The Architecture of PIER: an Internet-Scale Query Processor.
Proceedings of the Second Biennial Conference on Innovative Data Systems Research, 2005

2004
Notes On The Design Of An Internet Adversary
CoRR, 2004

Impeding attrition attacks in P2P systems.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

2 P2P or Not 2 P2P?
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Historic integrity in distributed systems.
PhD thesis, 2003

Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS
CoRR, 2003

Authenticated Append-only Skip Lists
CoRR, 2003

A Historic Name-Trail Service.
Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2003), 2003

Preserving peer replicas by rate-limited sampled voting.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

2002
Secure History Preservation Through Timeline Entanglement.
Proceedings of the 11th USENIX Security Symposium, 2002

Peer-to-Peer Caching Schemes to Address Flash Crowds.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Enabling the Archival Storage of Signed Documents.
Proceedings of the FAST '02 Conference on File and Storage Technologies, 2002

2001
Enabling the Long-Term Archival of Signed Documents through Time Stamping
CoRR, 2001

1999
The mobile people architecture.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999

Person-level Routing in the Mobile People Architecture.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999


  Loading...