BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Argentina
1 × China
1 × Greece
1 × Hungary
2 × Germany
3 × The Netherlands
4 × Canada
5 × Italy
7 × USA
Collaborated with:
B.S.Mitchell M.Shevertalov M.Salah A.Shokoufandeh T.S.Souder J.Kothari C.Dahn T.Denton M.Traverso Y.Chen E.R.Gansner C.Nagy R.C.Lange G.Antoniol M.D.Penta L.Moonen J.Gargiulo R.C.Holt K.Lynch C.Rorres W.M.Mongan M.Maycock D.Bespalov A.E.Hassan D.DaCosta V.Prevelakis E.Stehle S.Wong M.Aaron J.Segall F.I.Vokolos J.L.Korn
Talks about:
softwar (17) use (9) cluster (8) system (8) engin (7) program (6) revers (6) secur (5) tool (5) distribut (4)

♂ Person: Spiros Mancoridis

DBLP DBLP: Mancoridis:Spiros

Facilitated 3 volumes:

CSMR-WCRE 2014PrCo
WCRE 2013PrCo
ICSM 2006GCh

Contributed to:

ASE 20112011
ICSM 20112011
WCRE 20102010
CSMR 20092009
SCAM 20092009
ASE 20082008
ICPC 20082008
ICSM 20082008
ICPC 20072007
WCRE 20072007
CSMR 20062006
ICPC 20062006
WCRE 20062006
ICSM 20052005
ICSM 20042004
ICSM 20032003
WCRE 20032003
SEKE 20022002
WCRE 20022002
ICSM 20012001
SEKE 20012001
WCRE 20012001
WICSA 20012001
ICSM 19991999
WCRE 19991999
IWPC 19981998
ICSM 19961996

Wrote 32 papers:

ASE-2011-StehleLSRM #geometry #using
Diagnosis of software failures using computational geometry (ES, KL, MS, CR, SM), pp. 496–499.
ICSM-2011-ShevertalovM #maintenance #on the
On the maintenance of UI-integrated mashup applications (MS, SM), pp. 203–212.
WCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
CSMR-2009-NagyM #analysis #fault #security
Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
SCAM-2009-LangeM #communication #csp #named #process #thread #towards
thr2csp: Toward Transforming Threads into Communicating Sequential Processes (RCL, SM), pp. 3–12.
ASE-2008-ShevertalovM #automation #case study #composition #network
A Case Study on the Automatic Composition of Network Application Mashups (MS, SM), pp. 359–362.
ICPC-2008-MonganSM #distributed #re-engineering #reverse engineering
Re-Engineering a Reverse Engineering Portal to a Distributed SOA (WMM, MS, SM), pp. 218–223.
ICSM-2008-KothariBMS #algebra #development #on the #performance #using
On evaluating the efficiency of software feature development using algebraic manifolds (JK, DB, SM, AS), pp. 7–16.
ICPC-2007-KothariDSM #comprehension #convergence #evolution #implementation
Reducing Program Comprehension Effort in Evolving Software by Recognizing Feature Implementation Convergence (JK, TD, AS, SM), pp. 17–26.
WCRE-2007-ShevertalovM #protocol #reverse engineering
A Reverse Engineering Tool for Extracting Protocols of Networked Applications (MS, SM), pp. 229–238.
CSMR-2006-SalahMAP #dynamic analysis #scalability
Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems (MS, SM, GA, MDP), pp. 71–80.
ICPC-2006-KothariSMH #clustering #evolution #using
Studying the Evolution of Software Systems Using Change Clusters (JK, AS, SM, AEH), pp. 46–55.
WCRE-2006-KothariDMS #canonical #on the
On Computing the Canonical Features of Software Systems (JK, TD, SM, AS), pp. 93–102.
WCRE-2006-MoonenM #security
Code Based Software Security Assessments (LM, SM), p. 313.
ICSM-2005-SalahDMSV #named #reverse engineering #sequence
Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences (MS, TD, SM, AS, FIV), pp. 155–164.
ICSM-2005-SalahMAP #dynamic analysis #towards
Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla (MS, SM, GA, MDP), pp. 639–642.
ICSM-2004-SalahM
A Hierarchy of Dynamic Software Views: From Object-Interactions to Feature-Interactions (MS, SM), pp. 72–81.
ICSM-2003-DaCostaDMP #security
Characterizing the “Security Vulnerability Likelihood” of Software Functions (DD, CD, SM, VP), p. 266–?.
WCRE-2003-DahnM #c #program transformation #source code #using
Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
WCRE-2003-SalahM #distributed #towards
Toward an environment for comprehending distributed systems (MS, SM), pp. 238–247.
SEKE-2002-MitchellMT #reverse engineering
Search based reverse engineering (BSM, SM, MT), pp. 431–438.
WCRE-2002-ShokoufandehMM #clustering
Applying Spectral Methods to Software Clustering (AS, SM, MM), pp. 3–10.
ICSM-2001-MitchellM #algorithm #clustering #metric #similarity #using
Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements (BSM, SM), pp. 744–753.
ICSM-2001-SouderMS #framework #named
Form: A Framework for Creating Views of Program Executions (TSS, SM, MS), p. 612–?.
SEKE-2001-GargiuloM #java #named #source code
Gadget: A Tool for Extracting the Dynamic Structure of Java Programs (JG, SM), pp. 244–251.
WCRE-2001-MancoridisSCGK #named #reverse engineering
REportal: A Web-Based Portal Site for Reverse Engineering (SM, TSS, YFC, ERG, JLK), pp. 221–230.
WCRE-2001-MitchellM #benchmark #clustering #framework #metric #named
CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark Decompositions (BSM, SM), pp. 93–102.
WICSA-2001-MitchellRM #algorithm #architecture #clustering
An Architecture for Distributing the Computation of Software Clustering Algorithms (BSM, MT, SM), pp. 181–190.
ICSM-1999-MancoridisMCG #clustering #maintenance #named
Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures (SM, BSM, YFC, ERG), p. 50–?.
WCRE-1999-SouderM #distributed #legacy
A Tool for Securely Integrating Legacy Systems into a Distributed Environment (TSS, SM), pp. 47–55.
IWPC-1998-MancoridisMRCG #automation #clustering #source code #using
Using Automatic Clustering to Produce High-Level System Organizations of Source Code (SM, BSM, CR, YFC, ERG), pp. 45–52.
ICSM-1996-MancoridisH #clustering #graph #using
Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering (SM, RCH), p. 23–?.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.