default search action
Petros Maniatis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Manushree Vijayvergiya, Malgorzata Salawa, Ivan Budiselic, Dan Zheng, Pascal Lamblin, Marko Ivankovic, Juanjo Carin, Mateusz Lewko, Jovan Andonov, Goran Petrovic, Daniel Tarlow, Petros Maniatis, René Just:
AI-Assisted Assessment of Coding Practices in Modern Code Review. AIware 2024 - [c56]Alexander Frömmgen, Jacob Austin, Peter Choy, Nimesh Ghelani, Lera Kharatyan, Gabriela Surita, Elena Khrapko, Pascal Lamblin, Pierre-Antoine Manzagol, Marcus Revaj, Maxim Tabachnyk, Daniel Tarlow, Kevin Villela, Daniel Zheng, Satish Chandra, Petros Maniatis:
Resolving Code Review Comments with Machine Learning. ICSE-SEIP 2024: 204-215 - [c55]Surya Prakash Sahu, Madhurima Mandal, Shikhar Bharadwaj, Aditya Kanade, Petros Maniatis, Shirish K. Shevade:
CodeQueries: A Dataset of Semantic Queries over Code. ISEC 2024: 7:1-7:11 - [i24]Manushree Vijayvergiya, Malgorzata Salawa, Ivan Budiselic, Dan Zheng, Pascal Lamblin, Marko Ivankovic, Juanjo Carin, Mateusz Lewko, Jovan Andonov, Goran Petrovic, Daniel Tarlow, Petros Maniatis, René Just:
AI-Assisted Assessment of Coding Practices in Modern Code Review. CoRR abs/2405.13565 (2024) - [i23]Alex Mathai, Chenxi Huang, Petros Maniatis, Aleksandr Nogikh, Franjo Ivancic, Junfeng Yang, Baishakhi Ray:
KGym: A Platform and Dataset to Benchmark Large Language Models on Linux Kernel Crash Resolution. CoRR abs/2407.02680 (2024) - [i22]Elizabeth Dinella, Satish Chandra, Petros Maniatis:
CRQBench: A Benchmark of Code Reasoning Questions. CoRR abs/2408.08453 (2024) - 2023
- [c54]Christian Navasca, Martin Maas, Petros Maniatis, Hyeontaek Lim, Guoqing Harry Xu:
Predicting Dynamic Properties of Heap Allocations using Neural Networks Trained on Static Code: An Intellectual Abstract. ISMM 2023: 43-57 - [c53]Sishuai Gong, Dinglan Peng, Deniz Altinbüken, Pedro Fonseca, Petros Maniatis:
Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor. SOSP 2023: 35-51 - 2022
- [c52]Pardis Pashakhanloo, Aaditya Naik, Yuepeng Wang, Hanjun Dai, Petros Maniatis, Mayur Naik:
CodeTrek: Flexible Modeling of Code using an Extensible Relational Representation. ICLR 2022 - [i21]David Bieber, Kensen Shi, Petros Maniatis, Charles Sutton, Vincent J. Hellendoorn, Daniel D. Johnson, Daniel Tarlow:
A Library for Representing Python Programs as Graphs for Machine Learning. CoRR abs/2208.07461 (2022) - [i20]Surya Prakash Sahu, Madhurima Mandal, Shikhar Bharadwaj, Aditya Kanade, Petros Maniatis, Shirish K. Shevade:
Learning to Answer Semantic Queries over Code. CoRR abs/2209.08372 (2022) - 2021
- [c51]Xinyun Chen, Petros Maniatis, Rishabh Singh, Charles Sutton, Hanjun Dai, Max Lin, Denny Zhou:
SpreadsheetCoder: Formula Prediction from Semi-structured Context. ICML 2021: 1661-1672 - [c50]Zimin Chen, Vincent J. Hellendoorn, Pascal Lamblin, Petros Maniatis, Pierre-Antoine Manzagol, Daniel Tarlow, Subhodeep Moitra:
PLUR: A Unifying, Graph-Based View of Program Learning, Understanding, and Repair. NeurIPS 2021: 23089-23101 - [c49]Sishuai Gong, Deniz Altinbüken, Pedro Fonseca, Petros Maniatis:
Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis. SOSP 2021: 66-83 - [i19]Xinyun Chen, Petros Maniatis, Rishabh Singh, Charles Sutton, Hanjun Dai, Max Lin, Denny Zhou:
SpreadsheetCoder: Formula Prediction from Semi-structured Context. CoRR abs/2106.15339 (2021) - 2020
- [j7]Amit Vasudevan, Petros Maniatis, Ruben Martins:
überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms. ACM SIGOPS Oper. Syst. Rev. 54(1): 8-22 (2020) - [c48]Vincent J. Hellendoorn, Charles Sutton, Rishabh Singh, Petros Maniatis, David Bieber:
Global Relational Models of Source Code. ICLR 2020 - [c47]Aditya Kanade, Petros Maniatis, Gogul Balakrishnan, Kensen Shi:
Learning and Evaluating Contextual Embedding of Source Code. ICML 2020: 5110-5121 - [i18]Aditya Kanade, Petros Maniatis, Gogul Balakrishnan, Kensen Shi:
Pre-trained Contextual Embedding of Source Code. CoRR abs/2001.00059 (2020) - [i17]Matej Balog, Rishabh Singh, Petros Maniatis, Charles Sutton:
Neural Program Synthesis with a Differentiable Fixer. CoRR abs/2006.10924 (2020)
2010 – 2019
- 2019
- [c46]Marko Vasic, Aditya Kanade, Petros Maniatis, David Bieber, Rishabh Singh:
Neural Program Repair by Jointly Learning to Localize and Repair. ICLR (Poster) 2019 - [i16]Marko Vasic, Aditya Kanade, Petros Maniatis, David Bieber, Rishabh Singh:
Neural Program Repair by Jointly Learning to Localize and Repair. CoRR abs/1904.01720 (2019) - 2018
- [c45]George Theodorou, Yiannis Bassiakos, Evangelos Tsakalos, Evyenia Yiannouli, Petros Maniatis:
The Use of CT Scans and 3D Modeling as a Powerful Tool to Assist Fossil Vertebrate Taxonomy. EuroMed (1) 2018: 79-89 - 2017
- [c44]David Lie, Petros Maniatis:
Glimmers: Resolving the Privacy/Trust Quagmire. HotOS 2017: 94-99 - [c43]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld:
Prochlo: Strong Privacy for Analytics in the Crowd. SOSP 2017: 441-459 - [c42]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. USENIX Security Symposium 2017: 815-832 - [i15]David Lie, Petros Maniatis:
Glimmers: Resolving the Privacy/Trust Quagmire. CoRR abs/1702.07436 (2017) - [i14]Petros Maniatis, Ilya Mironov, Kunal Talwar:
Oblivious Stash Shuffle. CoRR abs/1709.07553 (2017) - [i13]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld:
Prochlo: Strong Privacy for Analytics in the Crowd. CoRR abs/1710.00901 (2017) - 2016
- [c41]Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta:
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. USENIX Security Symposium 2016: 87-104 - 2015
- [j6]Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek:
Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices. IEEE Trans. Mob. Comput. 14(10): 2059-2072 (2015) - [c40]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
The Performance Cost of Shadow Stacks and Stack Canaries. AsiaCCS 2015: 555-566 - 2013
- [c39]Cynthia Sturton, Rohit Sinha, Thurston H. Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Symbolic software model validation. MEMOCODE 2013: 97-108 - [c38]Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek:
Mantis: Automatic Performance Prediction for Smartphone Applications. USENIX ATC 2013: 297-308 - [c37]Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan, Vyas Sekar:
Towards verifiable resource accounting for outsourced computation. VEE 2013: 167-178 - [e2]Petros Maniatis:
14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013. USENIX Association 2013 [contents] - 2012
- [c36]Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, Petros Maniatis:
Path-exploration lifting: hi-fi tests for lo-fi emulators. ASPLOS 2012: 337-348 - [c35]Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Verification with small and short worlds. FMCAD 2012: 68-77 - 2011
- [j5]Petros Maniatis, Byung-Gon Chun:
Small trusted primitives for dependable systems. ACM SIGOPS Oper. Syst. Rev. 45(1): 126-141 (2011) - [c34]Vyas Sekar, Petros Maniatis:
Verifiable resource accounting for cloud computing services. CCSW 2011: 21-26 - [c33]Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, Ashwin Patti:
CloneCloud: elastic execution between mobile device and cloud. EuroSys 2011: 301-314 - [c32]Petros Maniatis, Devdatta Akhawe, Kevin R. Fall, Elaine Shi, Dawn Song:
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. HotOS 2011 - [c31]Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun:
Secure Data Preservers for Web Services. WebApps 2011 - 2010
- [c30]Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable network-performance measurements. CoNEXT 2010: 1 - [c29]Ling Huang, Jinzhu Jia, Bin Yu, Byung-Gon Chun, Petros Maniatis, Mayur Naik:
Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression. NIPS 2010: 883-891 - [i12]Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun:
A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users. CoRR abs/1002.0298 (2010) - [i11]Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable Network-Performance Measurements. CoRR abs/1005.3148 (2010) - [i10]Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik:
CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution. CoRR abs/1009.3088 (2010) - [i9]Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik:
Mantis: Predicting System Performance through Program Analysis and Modeling. CoRR abs/1010.0019 (2010)
2000 – 2009
- 2009
- [j4]Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica:
Declarative networking. Commun. ACM 52(11): 87-95 (2009) - [c28]Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz:
Tiered Fault Tolerance for Long-Term Integrity. FAST 2009: 267-282 - [c27]Byung-Gon Chun, Petros Maniatis:
Augmented Smartphone Applications Through Clone Cloud Execution. HotOS 2009 - [c26]Atul Singh, Pedro Fonseca, Petr Kuznetsov, Rodrigo Rodrigues, Petros Maniatis:
Zeno: Eventually Consistent Byzantine-Fault Tolerance. NSDI 2009: 169-184 - [c25]Ramakrishna Gummadi, Hari Balakrishnan, Petros Maniatis, Sylvia Ratnasamy:
Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. NSDI 2009: 307-320 - 2008
- [j3]Tyson Condie, David Chu, Joseph M. Hellerstein, Petros Maniatis:
Evita raced: metacompilation for declarative networks. Proc. VLDB Endow. 1(1): 1153-1165 (2008) - [c24]Atul Singh, Pedro Fonseca, Petr Kuznetsov, Rodrigo Rodrigues, Petros Maniatis:
Defining weakly consistent Byzantine fault-tolerant services. LADIS 2008: 11:1-11:5 - [c23]Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, Timothy Roscoe:
BFT Protocols Under Fire. NSDI 2008: 189-204 - [c22]Byung-Gon Chun, Petros Maniatis, Scott Shenker:
Diverse Replication for Single-Machine Byzantine-Fault Tolerance. USENIX ATC 2008: 287-292 - [e1]Lorenzo Alvisi, Petros Maniatis:
Proceedings of the Fourth Workshop on Hot Topics in System Dependability, HotDep 2008, San Diego, CA, USA, December 7, 2008. USENIX Association 2008 [contents] - 2007
- [c21]Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft:
Public Health for the Internet (PHI). CIDR 2007: 332-340 - [c20]Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis:
Proof Sketches: Verifiable In-Network Aggregation. ICDE 2007: 996-1005 - [c19]Katerina J. Argyraki, Petros Maniatis, Olga Irzak, Subramanian Ashish, Scott Shenker:
Loss and Delay Accountability for the Internet. ICNP 2007: 194-205 - [c18]Dennis Geels, Gautam Altekar, Petros Maniatis, Timothy Roscoe, Ion Stoica:
Friday: Global Comprehension for Distributed Replay. NSDI 2007 - [c17]Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz:
Attested append-only memory: making adversaries stick to their word. SOSP 2007: 189-204 - 2006
- [c16]Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale:
A fresh look at the reliability of long-term digital storage. EuroSys 2006: 221-234 - [c15]Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel:
Using queries for distributed monitoring and forensics. EuroSys 2006: 389-402 - [c14]Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis:
Induced Churn as Shelter from Routing-Table Poisoning. NDSS 2006 - [c13]Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica:
Declarative networking: language, execution and optimization. SIGMOD Conference 2006: 97-108 - 2005
- [j2]Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker:
The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23(1): 2-50 (2005) - [c12]Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi:
The Architecture of PIER: an Internet-Scale Query Processor. CIDR 2005: 28-43 - [c11]Aaron B. Brown, Anupam Chanda, Rik Farrow, Alexandra Fedorova, Petros Maniatis, Michael L. Scott:
The Many Faces of Systems Research - and How to Evaluate Them. HotOS 2005 - [c10]Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica:
Implementing declarative overlays. SOSP 2005: 75-90 - [c9]Thomas J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos:
Attrition Defenses for a Peer-to-Peer Digital Preservation System. USENIX ATC, General Track 2005: 163-178 - [i8]Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale:
A Fresh Look at the Reliability of Long-term Digital Storage. CoRR abs/cs/0508130 (2005) - 2004
- [c8]Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul:
2 P2P or Not 2 P2P? IPTPS 2004: 33-43 - [c7]Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker:
Impeding attrition attacks in P2P systems. ACM SIGOPS European Workshop 2004: 12 - [i7]David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, Mary Baker:
Notes On The Design Of An Internet Adversary. CoRR cs.DL/0411078 (2004) - 2003
- [b1]Petros Maniatis:
Historic integrity in distributed systems. Stanford University, USA, 2003 - [c6]Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi:
Preserving peer replicas by rate-limited sampled voting. SOSP 2003: 44-59 - [c5]Petros Maniatis, Mary Baker:
A Historic Name-Trail Service. WMCSA 2003: 88-99 - [i6]Petros Maniatis, Mary Baker:
Authenticated Append-only Skip Lists. CoRR cs.CR/0302010 (2003) - [i5]Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi:
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS. CoRR cs.DC/0303026 (2003) - [i4]Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul:
2 P2P or Not 2 P2P? CoRR cs.NI/0311017 (2003) - 2002
- [c4]Petros Maniatis, Mary Baker:
Enabling the Archival Storage of Signed Documents. FAST 2002: 31-45 - [c3]Tyron Stading, Petros Maniatis, Mary Baker:
Peer-to-Peer Caching Schemes to Address Flash Crowds. IPTPS 2002: 203-213 - [c2]Petros Maniatis, Mary Baker:
Secure History Preservation Through Timeline Entanglement. USENIX Security Symposium 2002: 297-312 - [i3]Petros Maniatis, Mary Baker:
Secure History Preservation Through Timeline Entanglement. CoRR cs.DC/0202005 (2002) - [i2]Petros Maniatis, Mary Baker:
A Historic Name-Trail Service. CoRR cs.NI/0210019 (2002) - 2001
- [i1]Petros Maniatis, Thomas J. Giuli, Mary Baker:
Enabling the Long-Term Archival of Signed Documents through Time Stamping. CoRR cs.DC/0106058 (2001)
1990 – 1999
- 1999
- [j1]Petros Maniatis, Mema Roussopoulos, Edward Swierk, Kevin Lai, Guido Appenzeller, Xinhua Zhao, Mary Baker:
The mobile people architecture. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(3): 36-42 (1999) - [c1]Mema Roussopoulos, Petros Maniatis, Edward Swierk, Kevin Lai, Guido Appenzeller, Mary Baker:
Person-level Routing in the Mobile People Architecture. USENIX Symposium on Internet Technologies and Systems 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint