Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Diomidis Spinellis is active.

Publication


Featured researches published by Diomidis Spinellis.


Journal of Systems and Software | 2001

Notable design patterns for domain-specific languages

Diomidis Spinellis

The realisation of domain-specific languages ( DSL s) diAers in fundamental ways from that of traditional programming languages. We describe eight recurring patterns that we have identified as being used for DSL design and implementation. Existing languages can be extended, restricted, partially used, or become hosts for DSL s. Simple DSL s can be implemented by lexical processing. In addition, DSL s can be used to create front-ends to existing systems or to express complicated data structures. Finally, DSL s can be combined using process pipelines. The patterns described form a pattern language that can be used as a building block for a systematic view of the software development process involving DSL s. ” 2001 Elsevier Science Inc. All rights reserved.


ACM Transactions on Software Engineering and Methodology | 2008

Power laws in software

Panagiotis Louridas; Diomidis Spinellis; Vasileios Vlachos

A single statistical framework, comprising power law distributions and scale-free networks, seems to fit a wide variety of phenomena. There is evidence that power laws appear in software at the class and function level. We show that distributions with long, fat tails in software are much more pervasive than previously established, appearing at various levels of abstraction, in diverse systems and languages. The implications of this phenomenon cover various aspects of software engineering research and practice.


Communications of The ACM | 2003

The decay and failures of web references

Diomidis Spinellis

Attempting to determine how quickly archival information becomes outdated.


open source systems | 2008

The SQO-OSS Quality Model: Measurement Based Open Source Software Evaluation

Ioannis Samoladas; Georgios Gousios; Diomidis Spinellis; Ioannis Stamelos

Software quality evaluation has always been an important part of software business. The quality evaluation process is usually based on hierarchical quality models that measure various aspects of software quality and deduce a characterization of the product quality being evaluated. The particular nature of open source software has rendered existing models inappropriate for detailed quality evaluations. In this paper, we present a hierarchical quality model that evaluates source code and community processes, based on automatic calculation of metric values and their correlation to a set of predefined quality profiles.1


Annals of Operations Research | 2000

A simulated annealing approach for buffer allocation in reliable production lines

Diomidis Spinellis; Chrissoleon T. Papadopoulos

We describe a simulated annealing approach for solving the buffer allocation problem in reliable production lines. The problem entails the determination of near optimal buffer allocation plans in large production lines with the objective of maximizing their average throughput. The latter is calculated utilizing a decomposition method. The allocation plan is calculated subject to a given amount of total buffer slots in a computationally efficient way.


international conference on software engineering | 2007

Refactoring--Does It Improve Software Quality?

Konstantinos Stroggylos; Diomidis Spinellis

Software systems undergo modifications, improvements and enhancements to cope with evolving requirements. This maintenance can cause their quality to decrease. Various metrics can be used to evaluate the way the quality is affected. Refactoring is one of the most important and commonly used techniques of transforming a piece of software in order to improve its quality. However, although it would be expected that the increase in quality achieved via refactoring is reflected in the various metrics, measurements on real life systems indicate the opposite. We analyzed source code version control system logs of popular open source software systems to detect changes marked as refactorings and examine how the software metrics are affected by this process, in order to evaluate whether refactoring is effectively used as a means to improve software quality within the open source community.


IEEE Spectrum | 2007

The Athens Affair

Vassilis Prevelakis; Diomidis Spinellis

How some extremely smart hackers pulled off the most audacious cell-network break-in ever. On 9 march 2005, a 38-year-old Greek electrical engineer named Costas Tsalikidis was found hanged in his Athens loft apartment, an apparent suicide. It would prove to be merely the first public news of a scandal that would roil Greece for months. The next day, the prime minister of Greece was told that his cellphone was being bugged, as were those of the mayor of Athens and at least 100 other high-ranking dignitaries, including an employee of the U.S. embassy. The victims were customers of Athens based Vodafone-Panafon, generally known as Vodafone Greece, the countrys largest cellular service provider. Tsalikidis was in charge of network planning at the company. A connection seemed obvious. Given the list of people and their positions at the time of the tapping, we can only imagine the sensitive political and diplomatic discussions, high-stakes business deals, or even marital indiscretions that may have been routinely overheard and, quite possibly, recorded. Even before Tsalikidiss death, investigators had found rogue software installed on the Vodafone Greece phone network by parties unknown. Some extraordinarily knowledgeable people either penetrated the network from outside or subverted it from within, aided by an agent or mole. In either case, the software at the heart of the phone system, investigators later discovered, was reprogrammed with a finesse and sophistication rarely seen before or since. A study of the Athens affair, surely the most bizarre and embarrassing scandal ever to engulf a major cellphone service provider, sheds considerable light on the measures networks can and should take to reduce their vulnerability to hackers and moles. Its also a rare opportunity to get a glimpse of one of the most elusive of cybercrimes. Major network penetrations of any kind are exceedingly uncommon. They are hard to pull off, and equally hard to investigate.


IEEE Transactions on Information Theory | 2003

Reliable identification of bounded-length viruses is NP-complete

Diomidis Spinellis

A virus is a program that replicates itself by copying its code into other files. A common virus-protection mechanism involves scanning files to detect code patterns of known viruses. We prove that the problem of reliably identifying a bounded-length mutating virus is NP-complete by showing that a virus detector for a certain virus strain can be used to solve the satisfiability problem. The implication of this result is that virus identification methods will be facing increasing strain as virus mutation and hosting strategies mature, and that different protection methods should be developed and employed.


mining software repositories | 2008

Measuring developer contribution from software repository data

Georgios Gousios; Eirini Kalliamvakou; Diomidis Spinellis

Apart from source code, software infrastructures supporting agile and distributed software projects contain traces of developer activity that does not directly affect the product itself but is important for the development process. We propose a model that, by combining traditional contribution metrics with data mined from software repositories, can deliver accurate developer contribution measurements. The model creates clusters of similar projects to extract weights that are then applied to the actions a developer performed on project assets to extract a combined measurement of the developers contribution. We are currently implementing the model in the context of a software quality monitoring system while we are also validating its components by means of questionnaires.


Computer Communications | 1999

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

Stefanos Gritzalis; Diomidis Spinellis; Panagiotis Georgiadis

Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the examination of robustness principles and application limitations. Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols. Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach. Finally, an outline is presented on current trends for the utilisation of formal methods for the analysis and verification of modern complicated protocols and protocol suites for the real commercial world.

Collaboration


Dive into the Diomidis Spinellis's collaboration.

Top Co-Authors

Avatar

Georgios Gousios

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Vassilios Karakoidas

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Dimitris Mitropoulos

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Maria Kechagia

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Stephanos Androutsellis-Theotokis

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Chrissoleon T. Papadopoulos

Aristotle University of Thessaloniki

View shared research outputs
Top Co-Authors

Avatar

Panagiotis Louridas

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Panos Louridas

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Konstantinos Chorianopoulos

Athens University of Economics and Business

View shared research outputs
Researchain Logo
Decentralizing Knowledge