Diomidis Spinellis
#14,660
Most Influential Person Now
Greek computer scientist
Diomidis Spinellis's AcademicInfluence.com Rankings
Diomidis Spinelliscomputer-science Degrees
Computer Science
#948
World Rank
#983
Historical Rank
Software Engineering
#42
World Rank
#42
Historical Rank
Algorithms
#221
World Rank
#224
Historical Rank
Database
#1143
World Rank
#1200
Historical Rank
Download Badge
Computer Science
Why Is Diomidis Spinellis Influential?
(Suggest an Edit or Addition)According to Wikipedia, Diomidis D. Spinellis is a Greek computer science academic and author of the books Code Reading, Code Quality, Beautiful Architecture and Effective Debugging. Education Spinellis holds a Master of Engineering degree in Software Engineering and a Ph.D. in Computer Science both from Imperial College London. His PhD was supervised by Susan Eisenbach and Sophia Drossopoulou.
Diomidis Spinellis's Published Works
Published Works
- A survey of peer-to-peer content distribution technologies (2004) (1617)
- Notable design patterns for domain-specific languages (2001) (319)
- GHTorrent: Github's data from a firehose (2012) (241)
- Power laws in software (2008) (200)
- Refactoring--Does It Improve Software Quality? (2007) (177)
- The decay and failures of web references (2003) (176)
- The SQO-OSS Quality Model: Measurement Based Open Source Software Evaluation (2008) (170)
- A survey on software smells (2018) (154)
- How is open source affecting software development? (2004) (136)
- Measuring developer contribution from software repository data (2008) (130)
- Guest Editors' Introduction: What Kinds of Nails Need a Domain-Specific Hammer? (2009) (130)
- A simulated annealing approach for buffer allocation in reliable production lines (2000) (127)
- Does Your Configuration Code Smell? (2016) (116)
- Chapter 1 Using Object-Oriented Design Metrics to Predict Software Defects (2010) (106)
- Code Quality: The Open Source Perspective (2006) (104)
- The Athens Affair (2007) (102)
- Reliable identification of bounded-length viruses is NP-complete (2003) (101)
- Analysis and Design of Discrete Part Production Lines (2009) (97)
- Tool Writing: A Forgotten Art? (2005) (95)
- Evaluating the Quality of Open Source Software (2009) (95)
- Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification (1999) (92)
- Using Object-Oriented Design Metrics to Predict Software Defects 1* (2010) (88)
- Organizational adoption of open source software (2012) (86)
- The collaborative organization of knowledge (2008) (79)
- The Carbon Footprint of Conference Papers (2013) (77)
- A tale of four kernels (2008) (76)
- Word Embeddings for the Software Engineering Domain (2018) (76)
- Security requirements, risks and recommendations for small enterprise and home-office environments (1999) (70)
- Don't Install Software by Hand (2012) (68)
- Security applications of peer-to-peer networks (2004) (67)
- Code Reading: The Open Source Perspective (2003) (64)
- Git (2012) (64)
- Sandboxing Applications (2001) (63)
- User interface evaluation of interactive TV: a media studies perspective (2006) (61)
- Reflection as a mechanism for software integrity verification (2000) (59)
- Faking It (2011) (58)
- A survey of peer - to - peer file sharing technologies (2002) (58)
- Alitheia Core: An extensible software quality monitoring platform (2009) (57)
- Software-Engineering the Internet of Things (2017) (56)
- Towards an affordable brain computer interface for the assessment of programmers' mental workload (2018) (54)
- Version Control Systems (2005) (54)
- Open Source Software: A Survey from 10, 000 Feet (2011) (54)
- On the Dichotomy of Debugging Behavior Among Programmers (2018) (53)
- Global Analysis and Transformations in Preprocessed Languages (2003) (52)
- Barriers to the Adoption of B2B e-Marketplaces by Large Enterprises: Lessons Learned From the Hellenic Aerospace Industry (2011) (50)
- Information Systems in the Living Room: A Case Study of Personalized Interactive TV Design (2001) (49)
- Stochastic Algorithms for Buffer Allocation in Reliable Production Lines (2000) (49)
- Undocumented and unchecked: exceptions that spell trouble (2014) (49)
- Avoiding the Top 10 Software Security Design Flaws (2014) (48)
- Intelligent Cokes and Diapers: MyGROCER Ubiquitous Computing Environment (2002) (44)
- VulinOSS: A Dataset of Security Vulnerabilities in Open-Source Systems (2018) (44)
- Global software development in the freeBSD project (2006) (42)
- On the declarative specification of models (2003) (41)
- Mining Software Engineering Data from GitHub (2017) (39)
- Affective usability evaluation for an interactive music television channel (2004) (37)
- Lightweight Languages as Software Engineering Tools (1997) (37)
- Position-Annotated Photographs: A Geotemporal Web (2003) (36)
- The Software Heritage Graph Dataset: Public Software Development Under One Roof (2019) (36)
- The information furnace: consolidated home control (2003) (35)
- Towards a framework for evaluating certificate status information mechanisms (2003) (34)
- Code Quality: The Open Source Perspective (Effective Software Development Series) (2006) (34)
- Evaluating certificate status information mechanisms (2000) (34)
- Introductions (2015) (32)
- The bug catalog of the maven ecosystem (2014) (31)
- A platform for software engineering research (2009) (31)
- Intelligent user interfaces in the living room: usability design for personalized television applications (2003) (30)
- Developing secure Web-based medical applications. (1999) (30)
- PyCG: Practical Call Graph Generation in Python (2021) (29)
- SDriver: Location-specific signatures prevent SQL injection attacks (2009) (29)
- A repository of Unix history and evolution (2017) (28)
- User interface development for interactive television: extending a commercial DTV platform to the virtual channel API (2004) (27)
- Code Documentation (2010) (27)
- Software Quality Assessment of Open Source Software (2007) (26)
- CScout: A refactoring browser for C (2010) (25)
- Open Source and Professional Advancement (2006) (24)
- Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities (2021) (24)
- Commercial uses: Going functional on exotic trades (2009) (23)
- Smelly Relations: Measuring and Understanding Database Schema Quality (2017) (23)
- Charting the API minefield using software telemetry data (2015) (23)
- An empirical investigation on the relationship between design and architecture smells (2020) (23)
- Component mining: a process and its pattern language (2000) (23)
- Addressing Threats and Security Issues in World Wide Web Technology (1997) (22)
- Rational Metaprogramming (2008) (21)
- The Virtual Channel Model for Personalized Television (2003) (20)
- Trusted third party services for deploying secure telemedical applications over the WWW (1999) (20)
- Information systems security in the Greek public sector (2001) (20)
- Conducting quantitative software engineering studies with Alitheia Core (2014) (19)
- A PRoactive malware identification system based on the computer hygiene principles (2007) (19)
- User Requirements of Trusted Third Parties in Europe (1999) (19)
- Semantic Source Code Models Using Identifier Embeddings (2019) (19)
- Handling and reporting security advisories: a scorecard approach (2005) (19)
- A framework for the static verification of api calls (2007) (18)
- Code smell detection by deep direct-learning and transfer-learning (2021) (18)
- Reliable software implementation using domain-specific languages (1999) (18)
- House of Cards: Code Smells in Open-Source C# Repositories (2017) (18)
- Choosing a programming language (2006) (17)
- The long‐term growth rate of evolving software: Empirical results and implications (2017) (17)
- Being a DevOps Developer (2016) (17)
- Dismal Code: Studying the Evolution of Security Bugs (2013) (16)
- A Complete Set of Related Git Repositories Identified via Community Detection Approaches Based on Shared Commits (2020) (16)
- A Comparison of Portable Dynamic Web Content Technologies for the Apache Server (2002) (16)
- Data mining in software engineering (2011) (16)
- A Repository with 44 Years of Unix Evolution (2015) (16)
- Coping with plagiarism and grading load: Randomized programming assignments and reflective grading (2007) (16)
- Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools (1997) (16)
- A critique of the Windows application programming interface (1998) (15)
- A Metaphor for Personalized Television Programming (2002) (15)
- Coping with TiVo: Opportunities of the networked digital video recorder (2007) (15)
- Package Management Systems (2012) (15)
- On the Feasibility of Transfer-learning Code Smells using Deep Learning (2019) (15)
- Java Makes Scripting Languages Irrelevant? (2005) (15)
- PERFORMING PEER-TO-PEER E-BUSINESS TRANSACTIONS: A REQUIREMENTS ANALYSIS AND PRELIMINARY DESIGN PROPOSAL 1 (2004) (15)
- Reading, Writing, and Code (2003) (15)
- Software Development Lifecycle for Energy Efficiency (2019) (15)
- ACM SIGSOFT Empirical Standards (2020) (14)
- An Empirical Analysis of Vulnerabilities in Virtualization Technologies (2016) (14)
- What are Your Programming Language's Energy-Delay Implications? (2018) (14)
- Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach (1998) (14)
- Declarative peephole optimization using string pattern matching (1999) (14)
- Unix tools as visual programming components in a GUI‐builder environment (2002) (13)
- A Dataset for GitHub Repository Deduplication (2020) (13)
- Fatal injection: a survey of modern code injection attack countermeasures (2017) (13)
- Multi-technology distributed objects and their integration (2001) (13)
- NGCE - Network Graphs for Computer Epidemiologists (2005) (12)
- Practical Fault Detection in Puppet Programs (2020) (12)
- The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction (1998) (12)
- Fortifying Applications Against Xpath Injection Attacks (2009) (12)
- State-of-the-Art Software Testing (2017) (12)
- Extending Unix Pipelines to DAGs (2017) (12)
- Developer-Centric Knowledge Mining from Large Open-Source Software Repositories (CROSSMINER) (2017) (12)
- Time Present and Time Past: Analyzing the Evolution of JavaScript Code in the Wild (2019) (11)
- Clonos: Consistent Causal Recovery for Highly-Available Streaming Dataflows (2021) (11)
- On Paper (2007) (11)
- How to Train Your Browser (2016) (11)
- Countering Code Injection Attacks: A Unified Approach (2011) (11)
- Open Source Licensing Across Package Dependencies (2010) (11)
- Code Review Comments: Language Matters (2018) (11)
- Cross-Media Service Delivery (2003) (11)
- Building an e-business platform: An experience report (2005) (11)
- A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities (2019) (11)
- Debuggers and logging frameworks (2006) (10)
- Software Builders (2008) (10)
- Programming Paradigms as Object Classes: A Structuring Mechanism for Multiparadigm Programming (2002) (10)
- Cracking Software Reuse (2007) (10)
- Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design (2009) (10)
- Evaluative Models of Discrete Part Production Lines (2009) (10)
- The Evolution of C Programming Practices: A Study of the Unix Operating System 1973-2015 (2016) (10)
- The Antikythera Mechanism: A Computer Science Perspective (2008) (10)
- Enabling B2B transactions over the Internet through Application Interconnection: The PRAXIS Project (2004) (10)
- Standing on Shoulders or Feet? The Usage of the MSR Data Papers (2019) (10)
- Security architectures for network clients (2003) (10)
- Measuring the Occurrence of Security-Related Bugs through Software Evolution (2012) (10)
- Drawing Tools (2009) (9)
- Agility Drivers (2011) (9)
- Modern debugging (2018) (9)
- Code Reading: The Open Source Perspective, Vol. 1 (2003) (9)
- Standing on shoulders or feet? An extended study on the usage of the MSR data papers (2020) (9)
- Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation (2008) (9)
- Where's My Jetpack? (2008) (9)
- A type-safe embedding of SQL into Java using the extensible compiler framework J% (2015) (9)
- The Information Furnace: User-friendly Home Control † (2002) (9)
- Energy-Delay investigation of Remote Inter-Process communication technologies (2020) (9)
- I Spy (2007) (9)
- Software Tracks (2010) (9)
- Trial Evaluation of Wireless Info-communication and Indoor Location-Based Services in Exhibition Shows (2005) (8)
- Static Program Analysis for Java Card Applets (2008) (8)
- EXPLORE: A MODULAR ARCHITECTURE FOR PRODUCTION LINE OPTIMISATION (1999) (8)
- The exception handling riddle: An empirical study on the Android API (2018) (8)
- The Software Heritage Graph Dataset: Large-scale Analysis of Public Software Development History (2020) (8)
- Data-Oriented Differential Testing of Object-Relational Mapping Systems (2021) (8)
- Digital Transformation?A Primer for Practitioners (2020) (8)
- elytS edoC (2011) (7)
- Tuning Java's memory manager for high performance server applications (2006) (7)
- Language and Architecture Paradigms as Object Classes (1994) (7)
- Towards a Context Dependent Java Exceptions Hierarchy (2017) (7)
- Bug busters (2006) (7)
- How to Select Open Source Components (2019) (7)
- Panoptis: Intrusion Detection Using a Domain-Specific Language (2002) (7)
- Guest Editors' Introduction: Advanced Heuristics in Transportation and Logistics (2005) (7)
- The Way We Program (2008) (7)
- Silver Bullets and Other Mysteries (2007) (7)
- Tools and Techniques for Analyzing Product and Process Data (2015) (7)
- The MoR-Trust Distributed Trust Management System: Design and Simulation Results (2007) (7)
- Generating the Blueprints of the Java Ecosystem (2015) (7)
- Optimizing header file include directives (2009) (7)
- Outwit: UNIX Tool-Based Programming Meets the Windows World (2000) (7)
- Implementing regular cash with blind fixed-value electronic coins (2007) (7)
- Implementing Haskell: Language Implementation as a Tool Building Exercise (1993) (7)
- Context Aware Services in Exhibition Environment-The mEXPRESS approach 12 (2002) (6)
- Division of Effort, Productivity, Quality, and Relationships in FLOSS Virtual Teams: Evidence from the FreeBSD Project (2012) (6)
- PROMISing Steps Towards Computer Hygiene (2006) (6)
- Explore, Excogitate, Exploit: Component Mining (1999) (6)
- MITOS : An Integrated Web-based System for Information Management (2001) (6)
- A Dataset for GitHub Repository Deduplication: Extended Description. (2020) (6)
- The Buffer Allocation Problem (2009) (6)
- Substrate‐Integrated Millimeter‐Wave Antennas for Next‐Generation Communication and Radar Systems (2021) (6)
- Type-safe linkage for variables and functions (1991) (6)
- Why computing students should contribute to open source software projects (2021) (6)
- Architectures for secure portable executable content (1999) (6)
- Quality Wars: Open Source Versus Proprietary Software (2011) (6)
- Choosing and Using Open Source Components (2011) (6)
- A Dataset of Enterprise-Driven Open Source Software (2020) (6)
- Relational access to Unix kernel data structures (2014) (5)
- Object-Oriented Technology in Multiparadigm Language Implementation (1995) (5)
- A model for detecting faults in build specifications (2020) (5)
- Evolution of the Unix System Architecture: An Exploratory Case Study (2019) (5)
- A Taxonomy of Certificate Status Information Mechanisms (2000) (5)
- Systems Software (2013) (5)
- The cascade vulnerability problem: the detection problem and a simulated annealing approach to its c (1998) (5)
- Trace: a tool for logging operating system call transactions (1994) (5)
- Securing e-voting against MITM attacks (2009) (5)
- Recruiting a Star Team (2015) (5)
- An Implementation of the Haskell Language (1990) (5)
- UML Everywhere (2010) (5)
- Working with Unix Tools (2005) (5)
- Abstraction and Variation (2007) (4)
- Version Control, Part I (2005) (4)
- The Tools We Use (2007) (4)
- Bespoke Infrastructures (2014) (4)
- Java Performance Evaluation Using External Instrumentation (2008) (4)
- Analyzing Programming Languages' Energy Consumption: An Empirical Study (2017) (4)
- An interactive SQL relational interface for querying main-memory data structures (2015) (4)
- The Social Responsibility of Software Development (2017) (4)
- Reflections on trusting trust revisited (2003) (4)
- Documented Unix Facilities over 48 Years (2018) (4)
- Checking C Declarations at Link Time (1993) (4)
- Countering SQL Injection Attacks with a Database Driver (2007) (4)
- FIRE/J—optimizing regular expression searches with generative programming (2008) (4)
- The Changing Role of the Software Architect (2016) (4)
- Production line buffer allocation : Genetic algorithms versus simulated annealing (2013) (4)
- Palmtop programmable appliance controls (1998) (4)
- WIRELESS INFO-COMMUNICATION AND NAVIGATION SERVICES IN EXHIBITION SHOWS (2004) (4)
- Wireless value-added services in exhibition shows (2006) (4)
- Using Objects for Structuring Multiparadigm Programming Environments (1999) (3)
- Well-typed programs can go wrong: a study of typing-related bugs in JVM compilers (2021) (3)
- First, Do No Harm (2014) (3)
- Do We Need Improved Code Quality Metrics? (2020) (3)
- Aspects of the History of Computing in Modern Greece (2018) (3)
- FIRE-J—optimizing regular expression searches with generative programming (2008) (3)
- Open Source Adoption In Large US Companies (2009) (3)
- Applying MDA in Enterprise Application Interoperability: The PRAXIS Project ¶ (2004) (3)
- Usability Design for the Home Media Station (2003) (3)
- Manufacturing Systems: Types and Modeling (2009) (3)
- Detecting Missing Dependencies and Notifiers in Puppet Programs (2019) (3)
- Biological Aspects of Computer Virology (2009) (3)
- Java as Distributed Object Glue 1 (2000) (3)
- Using and Abusing XML (2008) (3)
- The Vulnerability Dataset of a Large Software Ecosystem (2014) (3)
- The Importance of Being Declarative (2013) (3)
- Software Reliability Redux (2017) (3)
- Start with the Most Difficult Part (2009) (3)
- Differential Debugging (2013) (3)
- The Strategic Importance of Release Engineering (2015) (3)
- An Exploratory Study on the Evolution of C Programming in the Unix Operating System (2015) (3)
- The Elusiveness of Smart Healthcare (2017) (3)
- User‐level operating system transactions (2009) (3)
- Fear of Coding, and How to Reduce It (2001) (3)
- Modular production line optimization: The exPLORE architecture (2001) (3)
- A modest proposal for curing the public field phobia (2002) (3)
- The Tools at Hand (2005) (3)
- Portability: Goodies vs. the Hair Shirt (2013) (2)
- The Frictionless Development Environment Scorecard (2013) (2)
- Cyberdiversity: Measures and Initial Results (2010) (2)
- Against the Odds: Managing the Unmanagable in a Time of Crisis (2014) (2)
- Software Development Tooling: Information, Opinion, Guidelines, and Tools (2014) (2)
- Does Unit-Tested Code Crash? A Case Study of Eclipse (2019) (2)
- Finding typing compiler bugs (2022) (2)
- Index-Based Persistent Document Identifiers (2004) (2)
- WEB REFERENCES Decay (2003) (2)
- Best Practice Dissemination : The ISA-EUNET Approach (1999) (2)
- Application Interconnection and Execution of Business to Business Transactions over the Internet (2004) (2)
- Software tools research: a matter of scale and scope - or commoditization? (2012) (2)
- Dear Editor (2005) (2)
- Wux: UNIX Tools under Windows (1994) (2)
- Managing a Software Business (2016) (2)
- A market-based approach to managing the risk of peer-to-peer transactions (2010) (2)
- J%: Integrating Domain-Specific Languages with Java (2009) (2)
- Software reliability: modern challenges (1999) (2)
- Basic Etiquette of Technical Communication (2009) (2)
- Greek Character Encoding for Electronic Mail Messages (1996) (2)
- Comparative language fuzz testing: programming languages vs. fat fingers (2012) (2)
- Service Orchestration with Rundeck (2014) (2)
- Developer, Debug Thyself (2016) (1)
- Charting the API minefield using software telemetry data (2014) (1)
- Lessons from Space (2011) (1)
- Technology Solutions for the Enterprise (2015) (1)
- Type Checking for Reliable APIs (2017) (1)
- Being a Software Developer (2018) (1)
- 15 What Kinds of Nails Need (1992) (1)
- Targeted messages in indoor mobile environment: A software - oriented approach (2004) (1)
- Software evolution: the lifetime of fine-grained elements (2021) (1)
- Refactoring on the Cheap (2012) (1)
- The cascade vulnerability problem for open distributed systems: a review (1997) (1)
- Organized Pruning of File Sets (2003) (1)
- The Design and Implementation of a Legal Text Database (1994) (1)
- Developing in the Cloud (2014) (1)
- The Challenges and Practices of Release Engineering (2018) (1)
- Distributed Object Bridges and Java-based Object Mediator (2000) (1)
- A Domain-specific Language for Intrusion Detection (2000) (1)
- PDGuard: an architecture for the control and secure processing of personal data (2019) (1)
- Under the Covers of IEEE Software (2017) (1)
- Echoes from Space: Grouping Commands with Large-Scale Telemetry Data (2017) (1)
- Half-Century of Unix: History, Preservation, and Lessons Learned (2017) (1)
- Some Types of Memory Are More Equal than Others (2006) (1)
- Farewell to Disks (2010) (1)
- Bookshelf - Software engineering for the rest of us (2007) (1)
- Architecture from a Developer's Perspective (2015) (1)
- How to Analyze Git Repositories with Command Line Tools: We're not in Kansas Anymore (2018) (1)
- RepoFS: File system view of Git repositories (2019) (1)
- The Computer's New Clothes (1998) (1)
- Review of "Sustainable Software Development: An Agile Perspective by Kevin Tate," Addison-Wesley Professional, 2005, $39.99, ISBN: 0321286081. (2006) (1)
- Improving the quality of APIs through the analysis of software crash reports (2013) (1)
- Enterprise-Driven Open Source Software (2020) (1)
- Project asset portability (2006) (1)
- Optimal peripheral access using pipe-bassed double-buffering (1999) (1)
- The Success of a Heavenly Marriage (2018) (1)
- Clonos (2021) (1)
- Open Source Software (2011) (1)
- Tools! Tools! We need tools! (2016) (1)
- Position-Annotated Photographs: Web (2003) (1)
- Extending Our Field's Reach (2015) (1)
- Fewer Dead Trees, More Engagement (2015) (1)
- Securing the Network Client (2002) (1)
- Work-Load and Server Allocation Problems (2009) (0)
- A Software Development Metaphor for Developing Semi-dynamic Web Sites through Declarative Specifications (2004) (0)
- The Design of Production Lines (2009) (0)
- Conspicuous corruption: Evidence at a country level (2021) (0)
- An SQL interface for querying a program’s objects (2013) (0)
- BOOKSHELF (1977) (0)
- PiCO QL: A software library for runtime interactive queries on program data (2016) (0)
- Spatial Indexes for Inkscape (2009) (0)
- Enabling Practices for Information Systems Adoption in the Complex Context of Greek E-Government (2018) (0)
- A Bibliography of Publications of Diomidis Spinellis (0)
- Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions (2002) (0)
- Serving Professionals (2016) (0)
- The Information Train (2014) (0)
- A modular architecture for production line optimization (2013) (0)
- Identifying Bugs in Make and JVM-Oriented Builds (2020) (0)
- The Elements of Computing Style: 200+ Tips for Busy Knowledge Workers (2014) (0)
- A Replication Package for PyCG: Practical Call Graph Generation in Python (2021) (0)
- A repository of Unix history and evolution (2016) (0)
- User-level operating system transactions (2009) (0)
- 0 7 4 0 -7 4 5 9 / 0 4 / $ 2 0 . 0 0 © 2 0 0 4 I E E E Guest Editors' Introduction (2004) (0)
- BOOK REVIEW: High-Speed Windows Applications: Multitasking Design Methods by Dr. Bruce E. Krell (1995) (0)
- How Abundance Changes Software Engineering (2017) (0)
- An empirical investigation on the relationship between design and architecture smells (2020) (0)
- APIs, Libraries, and Code (2012) (0)
- A gentle introduction to embedded systems [Book Review] (2002) (0)
- Working Group on Software-Intensive Business Research : Definition and Roadmap (2018) (0)
- Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis (2022) (0)
- Using Linux Live CDs for Penetration Testing (2006) (0)
- Peer Review #3 of "GrimoireLab: A toolset for software development analytics (v0.2)" (2021) (0)
- The Editor's Retrospective (2018) (0)
- Software Engineering Education Knowledge Versus Industrial Needs (2021) (0)
- Self-Evolving Software Architectures (2018) (0)
- A Bibliography of Publications of Diomidis Spinellis Diomidis Spinellis (2007) (0)
- Tools of The Trade Differential Debugging (2013) (0)
- Dimensions of Usability Design for Home Infotainment Appliances (2003) (0)
- Impact of Software Engineering Research in Practice (2022) (0)
- USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual (2001) (0)
- Working Group on Health Measurement of Open Source Projects and Ecosystems (2018) (0)
- Incident Management in a Software-Defined Business: A Case Study (2023) (0)
- Live interactive queries to a software application's memory profile (2019) (0)
- Software Development Tools (2008) (0)
- Practical programming advice - The Pragmatic Programmer: From Journeyman to Master[Book Review] (2000) (0)
- Simulating Bandwidth-Limited Worms , One Graph to Rule Them All ? (2007) (0)
- Version Control, Part 2 (2005) (0)
- An interactive SQL relational interface for querying main-memory data structures (2015) (0)
- Patmtop Programmabte ApptJance ControLs (0)
- Does Unit-Tested Code Crash? An Extended Case Study of Eclipse (2021) (0)
- An Object Model for Multiparadigm Programming (2007) (0)
- Replication Package for Article: Data-Oriented Differential Testing of Object-Relational Mapping Systems (2021) (0)
- Coding for Numbers [Bookshelf] (2005) (0)
- A Software Development Metaphor for Implementing Semi-dynamic Web Sites through Declarative Specifications (2007) (0)
- Conducting quantitative software engineering studies with Alitheia Core (2013) (0)
- Practical testing advice [Book Review] (2001) (0)
- The Collaborative Organization of Knowledge: Data Set (2008) (0)
- A Domain-specificLanguage for Intrusion Detection (2000) (0)
- Enterprise-Driven Open Source Software: Replication Package (2020) (0)
- Open Reproducible Systematic Publication Research (2023) (0)
- Job Security (2009) (0)
- A dataset of open-source safety-critical software A Dataset of Open-Source Safety-Critical Software (2021) (0)
- Rethinking the Java software stack: Optimisation opportunities in the face of hardware resource virtualisation (2012) (0)
- PDGuard: an architecture for the control and secure processing of personal data (2019) (0)
- Book Review: High-Speed Windows Applications: Multitasking Design Methods, by Dr. Bruce E. Krell (1995) (0)
- Project Number 732223 D 3 . 5 Mining Documentation and Code Snippets Version 1 . 0 30 June 2019 Final Public Distribution Edge (2019) (0)
- Reflecting on Quality (2016) (0)
- Information Security Best Practice Dissemination: The ISA-EUNET Approach (1999) (0)
- Double and Triple Optimization (2009) (0)
- Personalized Television Programming and Metaphors for All (0)
- Editorial message: special track on ubiquitous computing (2004) (0)
- Peer Review #3 of "GrimoireLab: A toolset for software development analytics (v0.1)" (2021) (0)
- Securing Legacy Code with the TRACER Platform (2014) (0)
- The Design and Implementation of a Two Process (1989) (0)
- Project Number 732223 D 2 . 3 Dependency Inference and Analysis – Final Report (2018) (0)
- Machine Learning for Software Engineering: A Tertiary Study (2022) (0)
- Open Reproducible Publication Research (2023) (0)
- The Collaborative Organization of Knowledge: Source Code (2008) (0)
- TRACER: A Platform for Securing Legacy Code (2014) (0)
This paper list is powered by the following services:
Other Resources About Diomidis Spinellis
What Schools Are Affiliated With Diomidis Spinellis?
Diomidis Spinellis is affiliated with the following schools: