Andreas Symeonidis

Andreas Symeonidis
Verified
Andreas verified their affiliation via an institutional email.
Verified
Andreas verified their affiliation via an institutional email.
  • PhD Eng.
  • Professor at Aristotle University of Thessaloniki

About

236
Publications
55,038
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,118
Citations
Current institution
Aristotle University of Thessaloniki
Current position
  • Professor
Additional affiliations
July 2018 - October 2023
Aristotle University of Thessaloniki
Position
  • Professor (Associate)

Publications

Publications (236)
Article
Full-text available
The amount of software engineering data is constantly growing, as more and more developers employ online services to store their code, keep track of bugs, or even discuss issues. The data residing in these services can be mined to address different research challenges; therefore, certain initiatives have been established to encourage sharing resear...
Article
Introduction: The accurate diagnosis of aging-related neurocognitive disorders as early as possible, even in a phase that is characterized by the absence of clinical symptoms, is nowadays the holy grail of the neurosciences. R4Alz-R is a novel cognitive tool designed to objectively detect the subtle cognitive changes that emerge as the very first r...
Article
Introduction Much of the effort spent on software development is allocated on detecting and fixing bugs or, more generally, violations that lead to erroneous or inefficient code. Although static analysis tools aspire to automate bug detection, their usage is typically limited to code style rules and typical violations, while they only provide gener...
Research Proposal
Full-text available
Dear Colleagues, The impact of intelligent and autonomous systems (IAS) on modern society has continued to increasing over the last few years. Powered by advancements in artificial intelligence and robotics, intelligent and autonomous systems are radically transforming aspects of daily life that reach beyond the sphere of industry. In manufacturin...
Article
Full-text available
Today, Smart Assistants (SAs) are supported by significantly improved Natural Language Processing (NLP) and Natural Language Understanding (NLU) engines as well as AI-enabled decision support, enabling efficient information communication, easy appliance/device control, and seamless access to entertainment services, among others. In fact, an increas...
Article
Full-text available
Code readability is critical to software development and has a significant impact on maintenance and collaboration in evolving technology landscapes. With the increasing complexity of projects and the diversity of developers’ coding styles, the need for automated tools to improve code readability has become more apparent. This paper presents an inn...
Article
Full-text available
R4Alz is utilized for the early detection of minor neurocognitive disorders. It was designed to assess three main dimensions of cognitive-control abilities: working-memory capacity, a􀀿entional control, and executive functioning. Objectives: To reveal the cognitive-control dimensions that can differentiate between adults and older adults with health...
Article
Full-text available
Over the last years, a rapid evolution of unmanned aerial vehicle (UAV) usage in various applications has been observed. Their use in indoor environments requires a precise perception of the surrounding area, immediate response to its changes, and, consequently, a robust position estimation. This paper provides an implementation of navigation algor...
Article
Full-text available
Deep neural networks (DNNs) are key components for the implementation of autonomy in systems that operate in highly complex and unpredictable environments (self-driving cars, smart traffic systems, smart manufacturing, etc.). It is well known that DNNs are vulnerable to adversarial examples, i.e. minimal and usually imperceptible perturbations, app...
Article
Full-text available
In this paper, we propose a dense multi-scale adaptive graph convolutional network (DMA-GCN) method for automatic segmentation of the knee joint cartilage from MR images. Under the multi-atlas setting, the suggested approach exhibits several novelties, as described in the following. First, our models integrate both local-level and global-level lear...
Chapter
Contemporary retail electricity markets dictate real-time trading, while at the same time must take into account a variety of factors for the optimization and continuous adaptation, in order to generate profit and avoid customer losses. Near-future electricity markets demand even more, since RES penetration and advanced storage and distribution sys...
Preprint
Full-text available
Deep neural networks (DNNs) are key components for the implementation of autonomy in systems that operate in highly complex and unpredictable environments (self-driving cars, smart traffic systems, smart manufacturing etc.). It is well known that DNNs are vulnerable to adversarial examples, i.e. minimal and usually imperceptible perturbations, appl...
Article
Full-text available
The availability of code snippets in online repositories like GitHub has led to an uptick in code reuse, this way further supporting an open-source component-based development paradigm. The likelihood of code reuse rises when the code components or snippets are of high quality, especially in terms of readability, making their integration and upkeep...
Chapter
Given the wide adoption of the agile software development paradigm, where efficient collaboration as well as effective maintenance are of utmost importance, and the (re)use of software residing in code hosting platforms, the need to produce qualitative code is evident. A condition for acceptable software reusability and maintainability is the use o...
Research Proposal
Full-text available
In today's world, multimodal data and sensing technologies have emerged as crucial components within the Internet of Things (IoT) and artificial intelligence (AI) paradigms, influencing multiple fields, from healthcare to industry, media, education, robotics, transportation, and environmental monitoring, shaping broader multidisciplinary research a...
Article
Full-text available
Advanced robotic systems are finally becoming a reality; following the increased attention that robotics have attracted during the last few decades, new types of robotic applications are launched, from robotic space vessels and fully autonomous cars to robotic dancers and robot companions. Even more, following the advancements in the Internet of Th...
Article
Full-text available
As more and more software teams use online issue tracking systems to collaborate on software projects, the accurate assignment of new issues to the most suitable contributors may have significant impact on the success of the project. As a result, several research efforts have been directed towards automating this process to save considerable time a...
Article
In this article a real-time method is proposed that reduces the pose estimate error for robots capable of motion on the 2D plane. The solution that the method provides addresses the recent introduction of low-cost panoramic range scanners (2D LIDAR range sensors whose field of view is 360∘), whose use in robot localisation induces elevated pose unc...
Article
Full-text available
Background: The diagnosis of the minor neurocognitive diseases in the clinical course of dementia before the clinical symptoms’ appearance is the holy grail of neuropsychological research. The R4Alz battery is a novel and valid tool that was designed to assess cognitive control in people with minor cognitive disorders. The aim of the current study...
Article
Full-text available
Edge artificial intelligence (EDGE-AI) refers to the execution of artificial intelligence algorithms on hardware devices while processing sensor data/signals in order to extract information and identify patterns, without utilizing the cloud. In the field of predictive maintenance for industrial applications, EDGE-AI systems can provide operational...
Article
Full-text available
We introduce pygrank, an open source Python package to define, run and evaluate node ranking algorithms. We provide object-oriented and extensively unit-tested algorithmic components, such as graph filters, post-processors, measures, benchmarks, and online tuning. Computations can be delegated to numpy, tensorflow, or pytorch backends and fit in ba...
Article
Full-text available
Communication and data exchange between objects is a fundamental aspect of Cyber–Physical Systems. Due to the highly distributed nature of the domain, physical and virtual objects rely on the Sense-Think-Act-Communicate model in order to provide remote interfaces for sending and receiving sensor data and actuation commands and for interconnecting p...
Conference Paper
Full-text available
Conversational assistants with increasing NLP capabilities are becoming commodity functionality for most new devices. However, the underlying language models responsible for language-related intelligence are typically characterized by a large number of parameters and high demand for memory and resources. This makes them a no-go for edge and low-res...
Article
Full-text available
Automatic Speech Recognition (ASR) has become increasingly popular since it significantly simplifies human-computer interaction, providing a more intuitive way of communication. Building an accurate, general-purpose ASR system is a challenging task that requires a lot of data and computing power. Especially for languages not widely spoken, such as...
Article
Full-text available
To help developers discover libraries suited to their software projects, automated approaches often start from already employed libraries and recommend more based on co-occurrence patterns in other projects. The most accurate project–library recommendation systems employ Graph Neural Networks (GNNs) that learn latent node representations for link p...
Article
Full-text available
Flooding is one of the most destructive natural phenomena that happen worldwide, leading to the damage of property and infrastructure or even the loss of lives. The escalation in the intensity and number of flooding events as a result of the combination of climate change and anthropogenic factors motivates the need to adopt real-time solutions for...
Article
Full-text available
It is common knowledge among computer scientists and software engineers that ”building robotics systems is hard”: it includes applied and specialized knowledge from various scientific fields, such as mechanical, electrical and computer engineering, computer science and physics, among others. To expedite the development of robots, a significant numb...
Article
Full-text available
Passive global localisation is defined as locating a robot on a map, under global pose uncertainty, without prescribing motion controls. The majority of current solutions either assume structured environments or require tuning of parameters relevant to establishing correspondences between sensor measurements and segments of the map. This article ad...
Article
Full-text available
Nowadays, news coverage implies the existence of video footage and sound, from which arises the need for fast reflexes by media organizations. Social media and mobile journalists assist in fulfilling this requirement, but quick on-site presence is not always feasible. In the past few years, Unmanned Aerial Vehicles (UAVs), and specifically drones,...
Article
Full-text available
Virtual assistants are becoming popular in a variety of domains, responsible for automating repetitive tasks or allowing users to seamlessly access useful information. With the advances in Machine Learning and Natural Language Processing, there has been an increasing interest in applying such assistants in new areas and with new capabilities. In pa...
Chapter
Full-text available
Nowadays, software development is accelerated through the reuse of code snippets found online in question-answering platforms and software repositories. In order to be efficient, this process requires forming an appropriate query and identifying the most suitable code snippet, which can sometimes be challenging and particularly time-consuming. Over...
Chapter
The wide adoption of component-based software development and the (re)use of software residing in code hosting platforms have led to an increased interest shown towards source code readability and comprehensibility. One factor that can undeniably improve readability is the consistent code styling and formatting used across a project. To that end, m...
Article
In the software development industry, domain specific languages (DSLs) are constantly gaining traction when it comes to developing software for specific application domains. However, building efficient DSL libraries is an extremely complex task that requires extensive programming skills, deep domain understanding, and the ability to generalize and...
Article
Full-text available
Nowadays, agile software development is considered a mainstream approach for software with fast release cycles and frequent changes in requirements. Most of the time, high velocity in software development implies poor software quality, especially when it comes to maintainability. In this work, we argue that ensuring the maintainability of a softwar...
Preprint
Full-text available
We introduce pygrank, an open source Python package to define, run and evaluate node ranking algorithms. We provide object-oriented and extensively unit-tested algorithm components, such as graph filters, post-processors, measures, benchmarks and online tuning. Computations can be delegated to numpy, tensorflow or pytorch backends and fit in back-p...
Article
Full-text available
Developing and using automatic program synthesis mechanisms within Domain Specific Languages (DSLs) requires transcribing empirical knowledge and specifications to formal models. Since the related expertise is time-consuming to build, software engineers are discouraged from adopting automated synthesis as a development paradigm. New approaches prom...
Chapter
Given the wide adoption of the agile software development paradigm, where efficient collaboration as well as effective maintenance are of utmost importance, the need to produce readable source code is evident. To that end, several research efforts aspire to assess the extent to which a software component is readable. Several metrics and evaluation...
Preprint
Full-text available
Graph filters are an emerging paradigm that systematizes information propagation in graphs as transformation of prior node values, called graph signals, to posterior scores. In this work, we study the problem of mitigating disparate impact, i.e. posterior score differences between a protected set of sensitive nodes and the rest, while minimally edi...
Article
Monitoring the status of the soil ecosystem to identify the spatio-temporal extent of the pressures exerted and mitigate the effects of climate change and land degradation necessitates the need for reliable and cost-effective solutions. To address this need, soil spectroscopy in the visible, near- and shortwave-infrared (VNIR–SWIR) has emerged as a...
Article
Full-text available
The continuous evolution of modern software technologies combined with the deluge of available “ready-to-use” data has triggered revolutionary breakthroughs in several domains, preservation of cultural heritage included. This breakthrough is more than obvious just by considering the numerous multimedia tools and frameworks that actually serve as a...
Conference Paper
Full-text available
Over the past few years, there has been a boost in the use of commercial virtual assistants. Obviously, these proprietary tools are well-performing, however the functionality they offer is limited, users are ”vendor-locked”, while possible user privacy issues rise. In this paper we argue that low-cost, open hardware solutions may also perform well,...
Conference Paper
Full-text available
The full integration of online repositories in the contemporary software development process promotes remote work and remote collaboration. Apart from the apparent benefits, online repositories offer a deluge of data that can be utilized to monitor and improve the software development process. Towards this direction, we have designed and implemente...
Article
Full-text available
Robot localisation is predominantly resolved via parametric or non-parametric probabilistic methods. The particle filter, the most common non-parametric approach, is a Monte Carlo Localisation (MCL) method that is extensively used in robot localisation, as it can represent arbitrary probabilistic distributions, in contrast to Kalman filters, which...
Conference Paper
Full-text available
Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research efforts are targeted towards continuous implicit a...
Conference Paper
Full-text available
Most software teams nowadays host their projects online and monitor software development in the form of is-sues/tasks. This process entails communicating through comments and reporting progress through commits and closing issues. In this context, assigning new issues, tasks or bugs to the most suitable contributor largely improves efficiency. Thus,...
Preprint
Full-text available
In this work, we address the problem of audio-based near-duplicate video retrieval. We propose the Audio Similarity Learning (AuSiL) approach that effectively captures temporal patterns of audio similarity between video pairs. For the robust similarity calculation between two videos, we first extract representative audio-based video descriptors by...
Article
Full-text available
Background The early diagnosis of neurocognitive disorders before the symptoms’ onset is the ultimate goal of the scientific community. REMEDES for Alzheimer (R4Alz) is a battery, designed for assessing cognitive control abilities in people with minor and major neurocognitive disorders. Objective To investigate whether the R4Alz battery’s tasks di...
Article
Full-text available
The alignment of two occupancy grid maps generated by SLAM algorithms is a quite researched problem, being an obligatory step either for unsupervised map merging techniques or for evaluation of OGMs (Occupancy Grid Maps) against a blueprint of the environment. This paper provides an overview of the existing automatic alignment techniques of two occ...
Article
Full-text available
Apart from perception, one of the most fundamental aspects of an autonomous mobile robot is the ability to adequately and safely traverse the environment it operates in. This ability is called Navigation and is performed in a two- or three-dimensional fashion, except for cases where the robot is neither a ground vehicle nor articulated (e.g. roboti...
Chapter
Full-text available
The increase of the adoption of IoT devices and the contemporary problem of food production have given rise to numerous applications of IoT in agriculture. These applications typically comprise a set of sensors that are installed in open fields and measure metrics, such as temperature or humidity, which are used for irrigation control systems. Thou...
Chapter
Full-text available
Nowadays, software developers typically search online for reusable solutions to common programming problems. However, forming the question appropriately, and locating and integrating the best solution back to the code can be tricky and time consuming. As a result, several mining systems have been proposed to aid developers in the task of locating r...
Chapter
The momentum of the open-source community has been constantly increasing, thus leading to numerous tools for writing, maintaining, and sharing source code. Several code search engines have been developed to support development tasks and facilitate reuse either directly or by functioning as information sources for code recommenders. In this chapter,...
Chapter
As contemporary software development relies more on software reuse, several systems have been designed to automate the process of finding reusable software components from online sources and integrating them to one’s source code. However, these systems focus on whether the proposed components cover the desired functionality, without assessing also...
Chapter
In this chapter, we discuss ideas for future work in the area of applying mining techniques on software engineering data. We initially focus on potential improvements in each of the three main areas of application, which include requirements mining, source code mining, and quality assessment, and then we discuss the future work that can be identifi...
Chapter
Requirements identification is one of the most important phases in software engineering, as incomplete or badly specified requirements are the most common cause of project failure. In this chapter, we design a methodology to facilitate requirements identification based on software reuse. Our methodology employs our ontology-based model and is appli...
Chapter
As developers rely more and more on reusing components from online sources, an important challenge is that of finding snippets in order to integrate these components and/or to address common programming problems. Thus, several snippet mining systems have been developed, which however have important limitations. API usage mining systems require the...
Chapter
This chapter provides an overview of the background knowledge that is relevant to the main areas of application of this book. The areas of software engineering, software reuse, and software quality are discussed in the context of taking advantage of useful data in order to improve the software development process. Upon providing the relevant defini...
Chapter
Enhancing requirements elicitation and specification extraction has always been of added value to software engineering, as it expedites the software development life cycle. In this context, the main challenge is to construct formal models that are capable of storing requirements from multimodal formats and can facilitate requirements reuse. In this...
Chapter
This chapter concludes the book and summarizes the main contributions produced by applying mining techniques on software engineering data. These contributions lie in three different areas of application, which include requirements mining, source code mining, and quality assessment. We initially review each area individually, and then we discuss how...
Chapter
Although the development of code search engines has brought forth syntax-aware capabilities when searching for reusable components, these engines do not fully exploit the given context and do not assess the retrieved source code. As a result, several test-driven reuse systems have been developed to offer context-aware component search and further a...
Chapter
The introduction of question–answering services, such as Stack Overflow, has given rise to a new problem-solving paradigm in software development. Using these services, developers can post their programming questions online and get useful solutions by the community. In this chapter we propose a methodology that allows searching for solutions in Sta...
Chapter
In the context of reusing components from online repositories, assessing the quality and specifically the reusability of source code before reusing it poses a major challenge for the research community. Although several quality assessment systems have been proposed, most of them do not focus on reusability. In this chapter, we design a reusability...
Book
This monograph discusses software reuse and how it can be applied at different stages of the software development process, on different types of data and at different levels of granularity. Several challenging hypotheses are analyzed and confronted using novel data-driven methodologies, in order to solve problems in requirements elicitation and spe...
Article
Full-text available
In this work, we propose a methodology for reducing false alarms in file system intrusion detection systems, by taking into account the daemon’s file system footprint. More specifically, we experimentally show that sequences of outliers can serve as a distinguishing characteristic between true and false positives, and we show how analysing sequence...
Article
Full-text available
Background Subjective cognitive decline (SCD) and mild cognitive impairment (MCI) are acknowledged stages of the clinical spectrum of Alzheimer’s disease (AD), and cognitive control seems to be among the first neuropsychological predictors of cognitive decline. Existing tests are usually affected by educational level, linguistic abilities, cultural...
Conference Paper
Full-text available
In the era of Big Data, Cloud Computing and Internet of Things, most of the existing, integrated solutions that attempt to solve their challenges are either proprietary, limit functionality to a predefined set of requirements, or hide the way data are stored and accessed. In this work, we propose Cenote, an open source Big Data management and analy...
Article
Full-text available
The widely adopted component-based development paradigm considers the reuse of proper software components as a primary criterion for successful software development. As a result, various research efforts are directed towards evaluating the extent to which a software component is reusable. Prior efforts follow expert-based approaches, however the co...
Article
Full-text available
Context Contemporary development approaches consider that time-to-market is of utmost importance and assume that software projects are constantly evolving, driven by the continuously changing requirements of end-users. This practically requires an iterative process where software is changing by introducing new or updating existing software/user fea...
Article
Full-text available
Nowadays, the continuously evolving open-source community and the increasing demands of end users are forming a new software development paradigm; developers rely more on reusing components from online sources to minimize the time and cost of software development. An important challenge in this context is to evaluate the degree to which a software...
Conference Paper
In this work, we propose a prototype method for the localization of RFID tags, by deploying RFID equipment on a robotic platform. The constructed robot is capable to perform Simultaneous Localization (of its own position) and Mapping of the environment and then locate the RFID tags around its path. The proposed method is based on properly treating...
Article
Local community detection is an emerging topic in network analysis that aims to detect well-connected communities encompassing sets of priorly known seed nodes. In this work, we explore the similar problem of ranking network nodes based on their relevance to the communities characterized by seed nodes. However, seed nodes may not be central enough...
Chapter
Real-time website personalization is a concept that is being discussed for more than a decade, but has only recently been applied in practice, according to new marketing trends. These trends emphasize on delivering user-specific content based on behavior and preferences. In this context, banner recommendation in the form of personalized ads is an a...
Article
Full-text available
The widespread use of smartphones has dictated a new paradigm, where mobile applications are the primary channel for dealing with day-to-day tasks. This paradigm is full of sensitive information, making security of utmost importance. To that end, and given the traditional authentication techniques (passwords and/or unlock patterns) which have becom...

Network

Cited By