Home
Michalis Spyrou
Cancel

Setting multiple home VPN servers with WireGuard

Recently I created a few VPN access points using my home connection(s) (2 remote geo points) with the aim to use them for unblocking content and hiding my real location. One of the requirements was...

Analyzing 12 years of music tracking history

Since 2009, I’ve been tracking what songs I listen on last.fm using the then popular Winamp and nowadays Spotify. I was always wondering what questions I could answer from this data, such as: H...

AR app for displaying QR image codes in react-native

As part of a side project I’m working on, I had to create an augmented reality application for reading QR codes that contained images and displaying them on screen. I have some experience in Androi...

Creating a Spotify playlist from a radio show

Recently, I discovered a very interesting radio show hosted by Giannis Petridis on ert. Giannis is hosting one of the longest surviving radio shows in Greece and has one of the biggest record colle...

Transmitting EMG data over BLE using BBC micro:bit

Recently I took part in a challenge organized by ARM Ltd which involved using a BBC micro:bit as the main processing board in an EMG sensor device. The device sends electrode sensor readings throug...

Runtime support for approximate computing in heterogeneous systems

In my MSc Thesis, titled “Runtime support for approximate computing in heterogeneous systems”, I developed a run-time system in C programming language that supports approximate computations using ...

Performance and power prediction on heterogeneous systems using statistical methods

Download Thesis Abstract Heterogeneous systems provide high computing performance, combining low cost and low power consumption. These systems include various computational resources with differe...

Two player pong game using accelerometers

Git This two person project was completed through the course of Embedded Systems at the University of Thessaly, Department of Computer Engineering. In the context of this project we implemented th...

GPU assisted ELF binary decryption

Usually a malware writer, or a closed source product, use some techniques in order to make the binaries difficult to read. In one hand, the anti-virus are unable to read the signature of the malwar...