Εντοπίστηκε ένα σφάλμα στη λειτουργία της ΠΥΞΙΔΑΣ όταν χρησιμοποιείται μέσω του προγράμματος περιήγησης Safari. Μέχρι να αποκατασταθεί το πρόβλημα, προτείνουμε τη χρήση εναλλακτικού browser όπως ο Chrome ή ο Firefox. A bug has been identified in the operation of the PYXIDA platform when accessed via the Safari browser. Until the problem is resolved, we recommend using an alternative browser such as Chrome or Firefox.
 

Ανακοινώσεις σε Επιστημονικά Συνέδρια

Μόνιμο URI για αυτήν τη συλλογήhttps://pyxida.aueb.gr/handle/123456789/55

Περιήγηση

Πρόσφατες Υποβολές

Τώρα δείχνει 1 - 3 από 3
  • Τεκμήριο
    Word embeddings for the software engineering domain
    (2018) Efstathiou, Vasiliki; Chatzilenas, Christos; Spinellis, Diomidis
    The software development process produces vast amounts of textual data expressed in natural language. Outcomes from the natural language processing community have been adapted in software engineering research for leveraging this rich textual information;these include methods and readily available tools, often furnished with pre–trained models. State of the art pre–trained models however,capture general, common sense knowledge, with limited value when it comes to handling data specific to a specialized domain.There is currently a lack of domain-specific pre–trained models that would further enhance the processing of natural language artefacts related to software engineering. To this end, we release a word2vecmodel trained over 15GB of textual data from Stack Overflow posts.We illustrate how the model disambiguates polysemous words by interpreting them within their software engineering context. In addition, we present examples of fine-grained semantics captured by the model, that imply transferability of these results to diverse,targeted information retrieval tasks in software engineering and motivate for further reuse of the model.
  • Τεκμήριο
    An empirical analysis of vulnerabilities in virtualization technologies
    (2016) Gkortzis, Antonios; Rizou, Stamatia; Spinellis, Diomidis
    Cloud computing relies on virtualization technologies to provide computer resource elasticity and scalability. Despite its benefits, virtualization technologies come with serious concerns in terms of security. Although existing work focuses on specific vulnerabilities and attack models related to virtualization, a systematic analysis of known vulnerabilities for different virtualization models, including hypervisor-based and container-based solutions is not present in the literature. In this paper, we present an overview of the existing known vulnerabilities for hypervisor and container solutions reported in the CVE database and classified under CWE categories. Given the vulnerability identification and categorization, we analyze our results with respect to different virtualization models and license schemes (open source/commercial). Our findings show among others that hypervisors and containers share common weaknesses with most of their vulnerabilities reported in the category of security features.
  • Τεκμήριο
    Integrated Marketing Communications: pushing the boundaries through digital technologies
    Koukopoulos, Anastasios; Vrechopoulos, Adam; Athens University of Economics and Business, Department of Management Science and Technology
    The evolving nature of Digital Technologies and the continuous diffusion and adoption of innovative technological tools and applications, provide challenging research and business opportunities. Following these evolutions, this study explores the role of Digital Technologies in Integrated Marketing Communications (IMC) in the context of Strategic Marketing Planning. The paper briefly presents the latest developments in the field of IMC through a technological perspective and reviews the dynamics and features of three major technologies (Chatbots, Quick Response codes and Augmented and Virtual Reality) as promising tools and methods for effectively applying IMC initiatives. The paper attempts to provide an initial argumentation regarding the role of these technologies in the design and implementation of IMC. Implications for research and practice are provided throughout the paper.