Spinellis, Diomidis.
Διομήδης Δ. Σπινέλλης
Spinellis, Diomidis D., 19..-....
Σπινέλλης, Διομήδης
VIAF ID: 75684161 (Personal)
Permalink: http://viaf.org/viaf/75684161
Preferred Forms
-
-
100 1 _ ‡a Spinellis, Diomidis
-
100 1 _ ‡a Spinellis, Diomidis
-
100 1 _ ‡a Spinellis, Diomidis
-
-
-
100 1 _ ‡a Spinellis, Diomidis
-
-
-
-
-
100 1 _ ‡a Spinellis, Diomidis
-
-
100 1 _ ‡a Spinellis, Diomidis D., ‡d 19..-....
-
-
100 0 _ ‡a Διομήδης Δ. Σπινέλλης
-
4xx's: Alternate Name Forms (13)
Works
Title | Sources |
---|---|
Analysis and design of discrete part production ines |
![]() |
Beautiful architecture |
![]() ![]() ![]() ![]() ![]() ![]() |
Byūtifuru ākitekucha |
![]() |
CMSD 2003 |
![]() |
Code quality : the open source perspective |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Code Reading |
![]() ![]() ![]() ![]() ![]() ![]() |
Code reading : the open source perspective |
![]() |
Coping with plagiarism and grading load: Randomized programming assignments and reflective grading |
![]() |
Coping with TiVo: Opportunities of the networked digital video recorder |
![]() |
Countering code injection attacks: a unified approach |
![]() |
A critique of the Windows Application Programming Interface |
![]() |
Cross-media service delivery |
![]() ![]() ![]() |
Czytanie kodu : punkt widzenia twórców oprogramowania open source |
![]() ![]() |
The decay and failures of web references |
![]() |
Developer-Centric Knowledge Mining from Large Open-Source Software Repositories (CROSSMINER) |
![]() |
Developing in the Cloud |
![]() |
Differential Debugging |
![]() |
Drawing Tools |
![]() |
Efekutivu debaggingu : Sofutoea to shisutemu o debaggu suru rokujurokukomoku. |
![]() |
Effective debugging : 66 specific ways to debug software and systems |
![]() ![]() ![]() ![]() ![]() |
Effective debugging : ソフトウェアとシステムをデバッグする66項目 |
![]() ![]() |
The elements of computing style : 200+ tips for busy knowledge workers |
![]() |
elytS edoC |
![]() |
The exception handling riddle: An empirical study on the Android API |
![]() |
Farewell to Disks |
![]() |
Fatal injection: a survey of modern code injection attack countermeasures |
![]() |
A framework for the static verification of api calls |
![]() |
The Frictionless Development Environment Scorecard |
![]() |
GHTorrent: Github's data from a firehose |
![]() |
How to Select Open Source Components |
![]() |
Implementing regular cash with blind fixed-value electronic coins |
![]() |
The Importance of Being Declarative |
![]() |
Index-Based Persistent Document Identifiers |
![]() |
Job Security |
![]() |
Kōdo kuoriti : Kōdo rīdingu ni yoru hikinō tokusei no shikibetsu gihō |
![]() |
A market-based approach to managing the risk of peer-to-peer transactions |
![]() |
The MoR-Trust Distributed Trust Management System: Design and Simulation Results |
![]() |
n2002162232 |
![]() |
NGCE – Network Graphs for Computer Epidemiologists |
![]() |
Organizational adoption of open source software |
![]() |
Package Management Systems |
![]() |
Panoptis: Intrusion detection using a domain-specific language |
![]() |
PDGuard: an architecture for the control and secure processing of personal data |
![]() |
Portability: Goodies vs. the Hair Shirt |
![]() |
Power laws in software |
![]() |
Problem der Strafverantwortung von juristischen Personen in Griechenland |
![]() |
Rational Metaprogramming |
![]() |
Refactoring--Does It Improve Software Quality? |
![]() |
Reflection as a mechanism for software integrity verification |
![]() |
Reflections on trusting trust revisited |
![]() |
Relational access to Unix kernel data structures |
![]() |
SDriver: Location-specific signatures prevent SQL injection attacks |
![]() |
Security applications of peer-to-peer networks |
![]() |
Security architectures for network clients |
![]() |
Service Orchestration with Rundeck |
![]() |
Silver Bullets and Other Mysteries |
![]() |
Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation |
![]() |
Software Builders |
![]() |
Software Engineering Education Knowledge Versus Industrial Needs |
![]() |
Software evolution: the lifetime of fine-grained elements |
![]() |
Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities |
![]() |
Software tools research |
![]() |
The SQO-OSS Quality Model: Measurement Based Open Source Software Evaluation |
![]() |
Start with the Most Difficult Part |
![]() |
Static Program Analysis for Java Card Applets |
![]() |
The Strategic Importance of Release Engineering |
![]() |
A survey of peer-to-peer content distribution technologies |
![]() |
A survey on software smells |
![]() |
The Tools We Use |
![]() |
Towards a framework for evaluating certificate status information mechanisms |
![]() |
Towards an affordable brain computer interface for the assessment of programmers’ mental workload |
![]() |
TRACER: A Platform for Securing Legacy Code |
![]() |
Trusted third party services for deploying secure telemedical applications over the WWW |
![]() |
A type-safe embedding of SQL into Java using the extensible compiler framework J% |
![]() |
UML Everywhere |
![]() |
Unix tools as visual programming components in a GUI-builder environment |
![]() |
User interface development for interactive television: extending a commercial DTV platform to the virtual channel API |
![]() |
User-level operating system transactions |
![]() |
Using and Abusing XML |
![]() |
Virtualize Me |
![]() |
The Way We Program |
![]() |
Well-typed programs can go wrong: a study of typing-related bugs in JVM compilers |
![]() |
Where's My Jetpack? |
![]() |
Why computing students should contribute to open source software projects |
![]() |
Word embeddings for the software engineering domain |
![]() |
コード・クオリティ : コードリーディングによる非機能特性の識別技法 |
![]() ![]() |
コード・リーディング : オープンソースから学ぶソフトウェア開発技法 |
![]() |
ビューティフルアーキテクチャ |
![]() ![]() |