Publications
2023
Journal Articles
2022
Journal Articles
2021
Journal Articles
2020
Journal Articles
Alexandros Filotheou, Emmanouil Tsardoulias, Antonis Dimitriou, Andreas Symeonidis and Loukas Petrou
"Pose Selection and Feedback Methods in Tandem Combinations of Particle Filters with Scan-Matching for 2D Mobile Robot Localisation"
Journal of Intelligent & Robotic Systems, 100, pp. 925-944, 2020 Sep
![]() ![]() ![]() Robot localisation is predominantly resolved via parametric or non-parametric probabilistic methods. The particle filter, the most common non-parametric approach, is a Monte Carlo Localisation (MCL) method that is extensively used in robot localisation, as it can represent arbitrary probabilistic distributions, in contrast to Kalman filters, which is the standard parametric representation. In particle filters, a weight is internally assigned to each particle, and this weight serves as an indicator of a particle’s estimation certainty. Their output, the tracked object’s pose estimate, is implicitly assumed to be the weighted average pose of all particles; however, we argue that disregarding low-weight particles from this averaging process may yield an increase in accuracy. Furthermore, we argue that scan-matching, treated as a prosthesis of (or, put differently, fit in tandem with) a particle filter, can also lead to better accuracy. Moreover, we study the effect of feeding back this improved estimate to MCL, and introduce a feedback method that outperforms current state-of-the-art feedback approaches in accuracy and robustness, while alleviating their drawbacks. In the process of formulating these hypotheses we construct a localisation pipeline that admits configurations that are a superset of state-of-the-art configurations of tandem combinations of particle filters with scan-matching. The above hypotheses are tested in two simulated environments and results support our argumentation. @article{alexPoseSelection2020, | |
D. Geromichalos, M.Azkarate, E. Tsardoulias, L. Gerdes, L. Petrou and C. Perez Del Pulgar
Journal of Field Robotics, pp. 1-18, 2020 Feb
![]() ![]() ![]() This paper describes a novel approach to simultaneous localization and mapping (SLAM) techniques applied to the autonomous planetary rover exploration scenario to reduce both the relative and absolute localization errors, using two well‐proven techniques: particle filters and scan matching. Continuous relative localization is improved by matching high‐resolution sensor scans to the online created local map. Additionally, to avoid issues with drifting localization, absolute localization is globally corrected at discrete times, according to predefined event criteria, by matching the current local map to the orbiter's global map. The resolutions of local and global maps can be appropriately chosen for computation and accuracy purposes. Further, the online generated local map, of the form of a structured elevation grid map, can also be used to evaluate the traversability of the surrounding environment and allow for continuous navigation. The objective of this study is to support long‐range low‐supervision planetary exploration. The implemented SLAM technique has been validated with a data set acquired during a field test campaign performed at the Teide Volcano on the island of Tenerife, representative of a Mars/Moon exploration scenario. @article{etsardouEsa2020, | |
A. Tzitzis, S. Megalou, S. Siachalou, E. Tsardoulias, A. Filotheou, T. Yioultsis, and A. G. Dimitriou
IEEE Journal of Radio Frequency Identification, 2020 Jun
![]() ![]() ![]() In this work, we present a method for 3D localization of RFID tags by a reader-equipped robot with a single antenna. The robot carries a set of sensors, which enable it to create a map of the environment and locate itself in it (Simultaneous Localization and Mapping -SLAM). Then we exploit the collected phase measurements to localize large tag populations in real-time. We show that by forcing the robot to move along non-straight trajectories, thus creating non-linear synthetic apertures, the circular ambiguity of the possible tag’s locations is eliminated and 3D localization is accomplished. A reliability metric is introduced, suitable for real-time assessment of the localization error. We investigate how the curvature of the robot’s trajectory affects the accuracy under varying multipath conditions. It is found that increasing the trajectory’s slope and number of turns improves the accuracy of the method. We introduce a phase model that accounts for the effects of multipath and derive the closed form expression of the resultant’s phase probability density function. Finally, the proposed method is extended when multiple antennas are available. Experimental results in a "multipath-rich" indoor environment demonstrate a mean 3D error of 35cm, achieved in a few seconds. @article{etsardouRfid22020, | |
Michail D. Papamichail and Andreas L. Symeonidis
"A Generic Methodology for Early Identification of Non-Maintainable Source Code Components through Analysis of Software Releases"
Information and Software Technology, 118, pp. 106218, 2020 Feb
![]() ![]() ![]() Contemporary development approaches consider that time-to-market is of utmost importance and assume that software projects are constantly evolving, driven by the continuously changing requirements of end-users. This practically requires an iterative process where software is changing by introducing new or updating existing software/user features, while at the same time continuing to support the stable ones. In order to ensure efficient software evolution, the need to produce maintainable software is evident. In this work, we argue that non-maintainable software is not the outcome of a single change, but the consequence of a series of changes throughout the development lifecycle. To that end, we define a maintainability evaluation methodology across releases and employ various information residing in software repositories, so as to decide on the maintainability of software. Upon using the dropping of packages as a non-maintainability indicator (accompanied by a series of quality-related criteria), the proposed methodology involves using one-class-classification techniques for evaluating maintainability at a package level, on four different axes each targeting a primary source code property: complexity, cohesion, coupling, and inheritance. Given the qualitative and quantitative evaluation of our methodology, we argue that apart from providing accurate and interpretable maintainability evaluation at package level, we can also identify non-maintainable components at an early stage. This early stage is in many cases around 50% of the software package lifecycle. Based on our findings, we conclude that modeling the trending behavior of certain static analysis metrics enables the effective identification of non-maintainable software components and thus can be a valuable tool for the software engineers. @article{ISTmaintainabilityPaper, | |
Evridiki Papachristou, Antonios Chrysopoulos and Nikolaos Bilalis
"Machine learning for clothing manufacture as a mean to respond quicker and better to the demands of clothing brands: a Greek case study"
The International Journal of Advanced Manufacturing Technology, 2020 Oct
![]() ![]() ![]() In the clothing industry, design, development and procurement teams have been affected more than any other industry and are constantly being under pressure to present more products with fewer resources in a shorter time. The diversity of garment designs created as new products is not found in any other industry and is almost independent of the size of the business. The proposed research is being applied to a Greek clothing manufacturing company with operations in two different countries and a portfolio of diverse brands and moves in two dimensions: The first dimension concerns the perfect transformation of the product design field into a field of action planning that can be supported by artificial intelligence, providing timely and valid information to the designer drawing information from a wider range of sources than today’s method. The second dimension of the research concerns the design and implementation of an intelligent and semi-autonomous decision support system for everyone involved in the sample room. This system utilizes various machine learning techniques in order to become a versatile, robust and useful “assistant”: multiple clustering and classification models are utilized for grouping and combining similar/relevant products, Computer Vision state-of-the-art algorithms are extracting meaningful attributes from images and, finally, a reinforcement learning system is used to evolve the existing models based on user’s preferences. @article{Papachristou2020, | |
Eleni Poptsi, Despina Moraitou, Emmanouil Tsardoulias, Andreas L. Symeonidis and Magda Tsolaki
"Is the Discrimination of Subjective Cognitive Decline from Cognitively Healthy Adulthood and Mild Cognitive Impairment Possible? A Pilot Study Utilizing the R4Alz Battery"
Journal of Alzheimers Disease, 77, pp. 715-732, 2020 Sep
![]() ![]() ![]() Background: The early diagnosis of neurocognitive disorders before the symptoms' onset is the ultimate goal of the scientific community. REMEDES for Alzheimer (R4Alz) is a battery, designed for assessing cognitive control abilities in people with minor and major neurocognitive disorders. Objective: To investigate whether the R4Alz battery's tasks differentiate subjective cognitive decline (SCD) from cognitively healthy adults (CHA) and mild cognitive impairment (MCI). Methods: The R4Alz battery was administered to 175 Greek adults, categorized in five groups a) healthy young adults (HYA; n = 42), b) healthy middle-aged adults (HMaA; n = 33), c) healthy older adults (HOA; n = 14), d) community-dwelling older adults with SCD (n = 34), and e) people with MCI (n = 52). Results: Between the seven R4Alz subtasks, four showcased the best results for differentiating HOA from SCD: the working memory updating (WMCUT-S3), the inhibition and switching subtask (ICT/RST-S1&S2), the failure sets (FS) of the ICT/RST-S1&S2, and the cognitive flexibility subtask (ICT/RST-S3). The total score of the four R4Alz subtasks (R4AlzTot4) leads to an excellent discrimination among SCD and healthy adulthood, and to fare discrimination among SCD and MCI. Conclusion: The R4Alz battery is a novel approach regarding the neuropsychological assessment of people with SCD, since it can very well assist toward discriminating SCD from HOA. The R4Alz is able to measure decline of specific cognitive control abilities - namely of working memory updating, and complex executive functions - which seem to be the neuropsychological substrate of cognitive complaints in community dwelling adults of advancing age. @article{poptsiJad2020, |
2019
Journal Articles
Alexandros Filotheou, Emmanouil Tsardoulias, Antonis Dimitriou, Andreas Symeonidis and Loukas Petrou
"Quantitative and Qualitative Evaluation of ROS-Enabled Local and Global Planners in 2D Static Environments"
Journal of Intelligent & Robotic Systems, 2019 Oct
![]() ![]() ![]() Apart from perception, one of the most fundamental aspects of an autonomous mobile robot is the ability to adequately and safely traverse the environment it operates in. This ability is called Navigation and is performed in a two- or three-dimensional fashion, except for cases where the robot is neither a ground vehicle nor articulated (e.g. robotics arms). The planning part of navigation comprises a global planner, suitable for generating a path from an initial to a target pose, and a local planner tasked with traversing the aforementioned path while dealing with environmental, sensorial and motion uncertainties. However, the task of selecting the optimal global and/or local planner combination is quite hard since no research provides insight on which is best regarding the domain and planner limitations. In this context, current work performs a comparative analysis on qualitative and quantitative aspects of the most common ROS-enabled global and local planners for robots operating in two-dimensional static environments, on the basis of mission-centered and planner-related metrics, optimality and traversability aspects, as well as non-measurable aspects, such as documentation quality, parameterisability, ease of use, etc. @article{Filotheou2019, | |
Emmanouil Krasanakis, Emmanouil Schinas, Symeon Papadopoulos, Yiannis Kompatsiaris and Andreas Symeonidis
Information Processing & Management, pp. 102053, 2019 Jun
![]() ![]() Local community detection is an emerging topic in network analysis that aims to detect well-connected communities encompassing sets of priorly known seed nodes. In this work, we explore the similar problem of ranking network nodes based on their relevance to the communities characterized by seed nodes. However, seed nodes may not be central enough or sufficiently many to produce high quality ranks. To solve this problem, we introduce a methodology we call seed oversampling, which first runs a node ranking algorithm to discover more nodes that belong to the community and then reruns the same ranking algorithm for the new seed nodes. We formally discuss why this process improves the quality of calculated community ranks if the original set of seed nodes is small and introduce a boosting scheme that iteratively repeats seed oversampling to further improve rank quality when certain ranking algorithm properties are met. Finally, we demonstrate the effectiveness of our methods in improving community relevance ranks given only a few random seed nodes of real-world network communities. In our experiments, boosted and simple seed oversampling yielded better rank quality than the previous neighborhood inflation heuristic, which adds the neighborhoods of original seed nodes to seeds. @article{KRASANAKIS2019102053, | |
Michail Papamichail, Kyriakos Chatzidimitriou, Thomas Karanikiotis, Napoleon-Christos Oikonomou, Andreas Symeonidis and Sashi Saripalle
"BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication"
Data, 4, (2), 2019 May
![]() ![]() ![]() The widespread use of smartphones has dictated a new paradigm, where mobile applications are the primary channel for dealing with day-to-day tasks. This paradigm is full of sensitive information, making security of utmost importance. To that end, and given the traditional authentication techniques (passwords and/or unlock patterns) which have become ineffective, several research efforts are targeted towards biometrics security, while more advanced techniques are considering continuous implicit authentication on the basis of behavioral biometrics. However, most studies in this direction are performed “in vitro” resulting in small-scale experimentation. In this context, and in an effort to create a solid information basis upon which continuous authentication models can be built, we employ the real-world application “BrainRun”, a brain-training game aiming at boosting cognitive skills of individuals. BrainRun embeds a gestures capturing tool, so that the different types of gestures that describe the swiping behavior of users are recorded and thus can be modeled. Upon releasing the application at both the “Google Play Store” and “Apple App Store”, we construct a dataset containing gestures and sensors data for more than 2000 different users and devices. The dataset is distributed under the CC0 license and can be found at the EU Zenodo repository. @article{Papamichail2019, | |
Michail D. Papamichail, Themistoklis Diamantopoulos and Andreas L. Symeonidis
"Software Reusability Dataset based on Static Analysis Metrics and Reuse Rate Information"
Data in Brief, 2019 Dec
![]() ![]() ![]() The widely adopted component-based development paradigm considers the reuse of proper software components as a primary criterion for successful software development. As a result, various research efforts are directed towards evaluating the extent to which a software component is reusable. Prior efforts follow expert-based approaches, however the continuously increasing open-source software initiative allows the introduction of data-driven alternatives. In this context we have generated a dataset that harnesses information residing in online code hosting facilities and introduces the actual reuse rate of software components as a measure of their reusability. To do so, we have analyzed the most popular projects included in the maven registry and have computed a large number of static analysis metrics at both class and package levels using SourceMeter tool [2] that quantify six major source code properties: complexity, cohesion, coupling, inheritance, documentation and size. For these projects we additionally computed their reuse rate using our self-developed code search engine, AGORA [5]. The generated dataset contains analysis information regarding more than 24,000 classes and 2,000 packages, and can, thus, be used as the information basis towards the design and development of data-driven reusability evaluation methodologies. The dataset is related to the research article entitled "Measuring the Reusability of Software Components using Static Analysis Metrics and Reuse Rate Information @article{PAPAMICHAIL2019104687, | |
Michail D. Papamichail , Themistoklis Diamantopoulos and Andreas L. Symeonidis
Journal of Systems and Software, pp. 110423, 2019 Sep
![]() ![]() ![]() Nowadays, the continuously evolving open-source community and the increasing demands of end users are forming a new software development paradigm; developers rely more on reusing components from online sources to minimize the time and cost of software development. An important challenge in this context is to evaluate the degree to which a software component is suitable for reuse, i.e. its reusability. Contemporary approaches assess reusability using static analysis metrics by relying on the help of experts, who usually set metric thresholds or provide ground truth values so that estimation models are built. However, even when expert help is available, it may still be subjective or case-specific. In this work, we refrain from expert-based solutions and employ the actual reuse rate of source code components as ground truth for building a reusability estimation model. We initially build a benchmark dataset, harnessing the power of online repositories to determine the number of reuse occurrences for each component in the dataset. Subsequently, we build a model based on static analysis metrics to assess reusability from five different properties: complexity, cohesion, coupling, inheritance, documentation and size. The evaluation of our methodology indicates that our system can effectively assess reusability as perceived by developers. @article{PAPAMICHAIL2019110423, | |
Eleni Poptsi, Emmanouil Tsardoulias, Despina Moraitou, Andreas Symeonidis and Magda Tsolaki
Journal of Alzheimer's Disease, pp. 1-19, 2019 Oct
![]() ![]() Background:Subjective cognitive decline (SCD) and mild cognitive impairment (MCI) are acknowledged stages of the clinical spectrum of Alzheimer’s disease (AD), and cognitive control seems to be among the first neuropsychological predictors of cognitive decline. Existing tests are usually affected by educational level, linguistic abilities, cultural differences, and social status, constituting them error-prone when differentiating between the aforementioned stages. Creating robust neuropsychological tests is therefore prominent. Objective:The design of a novel psychometric battery for the cognitive control and attention assessment, free of demographic effects, capable to discriminate cognitively healthy aging, SCD, MCI, and mild Dementia (mD). Methods:The battery initial hypothesis was tuned using iterations of administration on random sampling healthy older adults and people with SCD, MCI, and mD, from the area of Thessaloniki, Greece. This resulted in the first release of the REflexes MEasurement DEviceS for Alzheimer battery (REMEDES for Alzheimer-R4Alz). Results:The first release lasts for almost an hour. The battery was design to assess working memory (WM) including WM storage, processing, and updating, enriched by episodic buffer recruitment. It was also designed to assess attention control abilities comprising selective, sustained, and divided attention subtasks. Finally, it comprises an inhibitory control, a task/rule switching or set-shifting, and a cognitive flexibility subtask as a combination of inhibition and task/rule switching abilities. Conclusion:The R4Alz battery is an easy to use psychometric battery with increasing difficulty levels and assumingly ecological validity, being entertaining for older adults, potentially free of demographic effects, and promising as a more accurate and early diagnosis tool of neurodegeneration. @article{poptsi2019remedes, | |
Emmanouil G. Tsardoulias, M. Protopapas, Andreas L. Symeonidis and Loukas Petrou
Journal of Intelligent & Robotic Systems, 2019 Jul
![]() ![]() ![]() The alignment of two occupancy grid maps generated by SLAM algorithms is a quite researched problem, being an obligatory step either for unsupervised map merging techniques or for evaluation of OGMs (Occupancy Grid Maps) against a blueprint of the environment. This paper provides an overview of the existing automatic alignment techniques of two occupancy grid maps that employ pattern matching. Additionally, an alignment pipeline using local features and image descriptors is implemented, as well as a method to eliminate erroneous correspondences, aiming at producing the correct transformation between the two maps. Finally, map quality metrics are proposed and utilized, in order to quantify the produced map’s correctness. A comparative analysis was performed over a number of image processing and OGM-oriented detectors and descriptors, in order to identify the best combinations for the map evaluation problem, performed between two OGMs or between an OGM and a Blueprint map. @article{Tsardoulias2019, | |
Anastasios Tzitzis, Spyros Megalou, Stavroula Siachalou, Emmanouil Tsardoulias, Athanasios Kehagias, Traianos Yioultsis and Antonis Dimitriou
"Localization of RFID Tags by a Moving Robot, via Phase Unwrapping and Non-Linear Optimization"
IEEE Journal of Radio Frequency Identification, 3, (4), pp. 216 - 226, 2019 Aug
![]() ![]() ![]() In this paper, we propose a new method for the localization of RFID tags, by deploying off-the-shelf RFID equipment on a robotic platform. The constructed robot is capable to perform Simultaneous Localization (of its own position) and Mapping (SLAM) of the environment and then locate the RFID tags around its path. The proposed method is based on properly treating the measured phase of the backscattered signal by each tag at the reader’s antenna, located on top of the robot. More specifically, the measured phase samples are reconstructed, such that the $2\pi $ discontinuities are eliminated (phase-unwrapping). This allows for the formation of an optimization problem, which can be solved rapidly by standard methods. The proposed method is experimentally compared against the SAR/imaging methods, which represent the accuracy benchmark in prior-art, deploying off-the-shelf equipment. It is shown that the proposed method solves exactly the same problem as holographic-imaging methods, overcoming the grid-density constraints of the latter. Furthermore, the problem, being calculations-grid-independent, is solved orders of magnitude faster, allowing for the applicability of the method in real-time inventorying and localization. It is also shown that the state-of-the-art SLAM method, which is used for the estimation of the trace of the robot, also suffers from errors, which directly affect the accuracy of the RFID localization method. Deployment of reference RFID tags at known positions, seems to significantly reduce such errors. @article{tzitzis2019localization, |
2018
Journal Articles
Christoforos Zolotas, Kyriakos C. Chatzidimitriou and Andreas L. Symeonidis
"RESTsec: a low-code platform for generating secure by design enterprise services"
Enterprise Information Systems, pp. 1-27, 2018 Mar
![]() ![]() In the modern business world it is increasingly often that Enterprises opt to bring their business model online, in their effort to reach out to more end users and increase their customer base. While transitioning to the new model, enterprises consider securing their data of pivotal importance. In fact, many efforts have been introduced to automate this ‘webification’ process; however, they all fall short in some aspect: a) they either generate only the security infrastructure, assigning implementation to the developers, b) they embed mainstream, less powerful authorisation schemes, or c) they disregard the merits of the dominating REST architecture and adopt less suitable approaches. In this paper we present RESTsec, a Low-Code platform that supports rapid security requirements modelling for Enterprise Services, abiding by the state of the art ABAC authorisation scheme. RESTsec enables the developer to seamlessly embed the desired access control policy and generate the service, the security infrastructure and the code. Evaluation shows that our approach is valid and can help developers deliver secure by design enterprise services in a rapid and automated manner. @article{2018Zolotas, | |
George Mamalakis, Christos Diou, Andreas L. Symeonidis and Leonidas Georgiadis
"Of daemons and men: reducing false positive rate in intrusion detection systems with file system footprint analysis"
Neural Computing and Applications, 2018 May
![]() ![]() In this work, we propose a methodology for reducing false alarms in file system intrusion detection systems, by taking into account the daemon’s file system footprint. More specifically, we experimentally show that sequences of outliers can serve as a distinguishing characteristic between true and false positives, and we show how analysing sequences of outliers can lead to lower false positive rates, while maintaining high detection rates. Based on this analysis, we developed an anomaly detection filter that learns outlier sequences using k-nearest neighbours with normalised longest common subsequence. Outlier sequences are then used as a filter to reduce false positives on the FI2DS file system intrusion detection system. This filter is evaluated on both overlapping and non-overlapping sequences of outliers. In both cases, experiments performed on three real-world web servers and a honeynet show that our approach achieves significant false positive reduction rates (up to 50 times), without any degradation of the corresponding true positive detection rates. @article{Mamalakis2018, |
2017
Journal Articles
Themistoklis Diamantopoulos, Michael Roth, Andreas Symeonidis and Ewan Klein
"Software requirements as an application domain for natural language processing"
Language Resources and Evaluation, pp. 1-30, 2017 Feb
![]() ![]() ![]() Mapping functional requirements first to specifications and then to code is one of the most challenging tasks in software development. Since requirements are commonly written in natural language, they can be prone to ambiguity, incompleteness and inconsistency. Structured semantic representations allow requirements to be translated to formal models, which can be used to detect problems at an early stage of the development process through validation. Storing and querying such models can also facilitate software reuse. Several approaches constrain the input format of requirements to produce specifications, however they usually require considerable human effort in order to adopt domain-specific heuristics and/or controlled languages. We propose a mechanism that automates the mapping of requirements to formal representations using semantic role labeling. We describe the first publicly available dataset for this task, employ a hierarchical framework that allows requirements concepts to be annotated, and discuss how semantic role labeling can be adapted for parsing software requirements. @article{Diamantopoulos2017, | |
Themistoklis Diamantopoulos and Andreas Symeonidis
Enterprise Information Systems, pp. 1-22, 2017 Dec
![]() ![]() ![]() Enhancing the requirements elicitation process has always been of added value to software engineers, since it expedites the software lifecycle and reduces errors in the conceptualization phase of software products. The challenge posed to the research community is to construct formal models that are capable of storing requirements from multimodal formats (text and UML diagrams) and promote easy requirements reuse, while at the same time being traceable to allow full control of the system design, as well as comprehensible to software engineers and end users. In this work, we present an approach that enhances requirements reuse while capturing the static (functional requirements, use case diagrams) and dynamic (activity diagrams) view of software projects. Our ontology-based approach allows for reasoning over the stored requirements, while the mining methodologies employed detect incomplete or missing software requirements, this way reducing the effort required for requirements elicitation at an early stage of the project lifecycle. @article{Diamantopoulos2017EIS, | |
A. Thallas, E.G. Tsardoulias and L. Petrou
"Topological Based Scan Matching – Odometry Posterior Sampling in RBPF Under Kinematic Model Failures"
Journal of Intelligent & Robotic Systems, 91, pp. 543-568, 2017 Nov
![]() ![]() ![]() Rao-Blackwellized Particle Filters (RBPF) have been utilized to provide a solution to the SLAM problem. One of the main factors that cause RBPF failure is the potential particle impoverishment. Another popular approach to the SLAM problem are Scan Matching methods, whose good results require environments with lots of information, however fail in the lack thereof. To face these issues, in the current work techniques are presented to combine Rao-Blackwellized particle filters with a scan matching algorithm (CRSM SLAM). The particle filter maintains the correct hypothesis in environments lacking features and CRSM is employed in feature-rich environments while simultaneously reduces the particle filter dispersion. Since CRSM’s good performance is based on its high iteration frequency, a multi-threaded combination is presented which allows CRSM to operate while RBPF updates its particles. Additionally, a novel method utilizing topological information is proposed, in order to reduce the number of particle filter resamplings. Finally, we present methods to address anomalous situations where scan matching can not be performed and the vehicle displays behaviors not modeled by the kinematic model, causing the whole method to collapse. Numerous experiments are conducted to support the aforementioned methods’ advantages. @article{etsardouRbpf2017, | |
Miltiadis G. Siavvas, Kyriakos C. Chatzidimitriou and Andreas L. Symeonidis
"QATCH - An adaptive framework for software product quality assessment"
Expert Systems with Applications, 2017 May
![]() ![]() ![]() The subjectivity that underlies the notion of quality does not allow the design and development of a universally accepted mechanism for software quality assessment. This is why contemporary research is now focused on seeking mechanisms able to produce software quality models that can be easily adjusted to custom user needs. In this context, we introduce QATCH, an integrated framework that applies static analysis to benchmark repositories in order to generate software quality models tailored to stakeholder specifications. Fuzzy multi-criteria decision-making is employed in order to model the uncertainty imposed by experts’ judgments. These judgments can be expressed into linguistic values, which makes the process more intuitive. Furthermore, a robust software quality model, the base model, is generated by the system, which is used in the experiments for QATCH system verification. The paper provides an extensive analysis of QATCH and thoroughly discusses its validity and added value in the field of software quality through a number of individual experiments. @article{Siavvas2017, | |
Athanassios M. Kintsakis, Fotis E. Psomopoulos, Andreas L. Symeonidis and Pericles A. Mitkas
"Hermes: Seamless delivery of containerized bioinformatics workflows in hybrid cloud (HTC) environments"
SoftwareX, 6, pp. 217-224, 2017 Sep
![]() ![]() ![]() Hermes introduces a new ”describe once, run anywhere” paradigm for the execution of bioinformatics workflows in hybrid cloud environments. It combines the traditional features of parallelization-enabled workflow management systems and of distributed computing platforms in a container-based approach. It offers seamless deployment, overcoming the burden of setting up and configuring the software and network requirements. Most importantly, Hermes fosters the reproducibility of scientific workflows by supporting standardization of the software execution environment, thus leading to consistent scientific workflow results and accelerating scientific output. @article{SOFTX89, | |
Cezary Zielinski, Maciej Stefanczyk, Tomasz Kornuta, Maksym Figat, Wojciech Dudek, Wojciech Szynkiewicz, Wlodzimierz Kasprzak, Jan Figat, Marcin Szlenk, Tomasz Winiarski, Konrad Banachowicz, Teresa Zielinska, Emmanouil G. Tsardoulias, Andreas L. Symeonidis, Fotis E. Psomopoulos, Athanassios M. Kintsakis, Pericles A. Mitkas, Aristeidis Thallas, Sofia E. Reppou, George T. Karagiannis, Konstantinos Panayiotou, Vincent Prunet, Manuel Serrano, Jean-Pierre Merlet, Stratos Arampatzis, Alexandros Giokas, Lazaros Penteridis, Ilias Trochidis, David Daney and Miren Iturburu
"Variable structure robot control systems: The RAPP approach"
Robotics and Autonomous Systems, 94, pp. 226-244, 2017 May
![]() ![]() ![]() This paper presents a method of designing variable structure control systems for robots. As the on-board robot computational resources are limited, but in some cases the demands imposed on the robot by the user are virtually limitless, the solution is to produce a variable structure system. The task dependent part has to be exchanged, however the task governs the activities of the robot. Thus not only exchange of some task-dependent modules is required, but also supervisory responsibilities have to be switched. Such control systems are necessary in the case of robot companions, where the owner of the robot may demand from it to provide many services. @article{Zielnski2017, |