No abstract available.
Towards Privacy in Personal Data Management
We present a personal data management framework called Polis, which abides by the following principle: Every individual has absolute control over her personal data, which reside only at her own side. Preliminary results indicate that beyond the apparent ...
Intrusion Detection Using Evolutionary Neural Networks
In this paper a network Intrusion Detection SystemUsing Evolutionary Neural Networks (ENN's) is proposed. Theanalysis engine of the IDS is modeled by the ENN and its abilityto predict attacks in a network environment is evaluated. TheENN is trained by a ...
Analysis and Synthesis of the Current Situation in IT Security
The article presents a survey undertaken from medium - large scale organizations and focuses on specific concerns of the top level executives working for modern organizations in Greece and Cyprus. Through the survey we explore what decision makers think,...
A Comparison of Centralized and Distributed Information Retrieval Approaches
Distributed Information Retrieval (DIR) has been suggested to offer a prospective solution to a number of issues concerning information retrieval in the WWW. On the other hand, previous studies have indicated that centralized approaches offer the best ...
Cost Models and Efficient Algorithms on Existentially Uncertain Spatial Data
The domain of existentially uncertain spatial data refers to objects that are modelled using an existential probability accompanying spatial data values. An interesting and challenging query type over existentially uncertain data is the search of the ...
Continuous Top-k Dominating Queries in Subspaces
Dominating queries are significant tools for preference-based query processing in databases and decision support applications. An important preference-based query is the top-$k$ dominating query, which reports the $k$ most important objects according to ...
Effective Ranking Fusion Methods for Personalized Metasearch Engines
Metasearch engines are a significant part of the information retrieval process. Most of Web users use them directly or indirectly to access information from more than one data sources. The cornerstone of their technology is their rank aggregation method,...
Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation
We can distinguish two types of web search engines: general use ones that index and search all the web, and site-specific ones that are provided by individual websites for local searching. A comparison of the effectiveness of the two types allows search ...
Mitos: Design and Evaluation of a DBMS-Based Web Search Engine
Engineering a Web search engine offering effective and efficient information retrieval is a challenging task. Mitos is a recently developed search engine that offers a wide spectrum of functionalities. A rather unusual design choice is that its index is ...
User Interface Personalization for the WWW Using Adaptive Browsing Shortcuts
Intelligent adaptive user interfaces have been long explored as a promising technique to solve problems due to the complexity of modern user interfaces. These problems can occur in various application settings such as accessing the Web from small screen ...
Cognitive and Affective Antecedents of Mobile Data Services Usage Intention
Technology acceptance theories predict user intentions to use services tailored for organizational needs. However, in this paper we postulate that the aforementioned theories do not apply when investigating intentions towards the use of mobile data ...
The Greek Electronic Government Interoperability Framework: Standards and Infrastructures for One-Stop Service Provision
- Yannis Charalabidis,
- Fenareti Lampathaki,
- Demetrios Sarantis,
- Aikaterini-Maria Sourouni,
- Spiros Mouzakitis,
- George Gionis,
- Sotirios Koussouris,
- Christos Ntanos,
- Christos Tsiakaliaris,
- Vasilis Tountopoulos,
- Dimitris Askounis
The need for centralized e-Government strategies and policies is a fertile ground for the development of e-Government Interoperability Frameworks (eGIFs). Integrated Information Systems and one-stop public services to citizens and businesses are heavily ...
Resource Discovery in a Grid System Based on Matchmaking-Routers
This paper studies the Resource Discovery problem in a Grid system based on Matchmaking-Routers. The proposed framework suggests that a Grid can be seen as an environment comprised by matchmaking-routers and resources. Each matchmaking-router is in ...
QoS-Based Decision Services in Grids
Complex and mission-critical applications require the use of distributed environments, which will allow their execution in a reliable and cost-efficient way. Grid environments made this case feasible by providing heterogeneous resources. Nevertheless, ...
Design and Implementation Aspects of a Novel Java P2P Simulator with GUI
Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practically impossible, especially at design and testing stages. The purpose of ...
P2P Reputation Systems Credibility Analysis: Tradeoffs and Design Decisions
Peer-to-Peer (P2P) systems are distributed self-organized systems without a controlling entity where peers need to make trust decisions regarding who they will transact with. P2P reputation systems exploit past transactional information to provide ...
Knowledge Exploitation through Modeling, Navigation and Querying, an Ontology-Based Integrated Architecture
Knowledge Management has received great and ongoing attention during the last decades. The amount of knowledge and the interest for knowledge exploitation has been the spark for numerous attempts and proposals concerning knowledge representation, ...
Applying Machine Learning to Extract New Knowledge in Precision Agriculture Applications
We are considering a facet of precision agriculture that concentrates on plant-driven crop management. By monitoring soil, crop and climate in a field and providing a decision support system that is able to learn, it is possible to deliver treatments, ...
Graphical Representation as a Factor of 3D Software User Satisfaction: A Metric Based Approach
During the last few years, an increase in the development and research activity on 3D applications, mainly motivated by the rigorous growth of the game industry, is observed. This paper deals with assessing user satisfaction, i.e. a critical aspect of ...
Development of Wireless Embedded System Using ZigBEE Protocol to Avoid White Gaussian Noise and 50 Hz Power Line Noise in ECG and Pressure Blood Signals
Electrocardiogram (ECG) and Pressure blood is a main source for doctors to diagnose the health condition and pathology of heart. The magnitudes of ECG signals are usually approximate 1mV. The Electrocardiogram signals are affected by environment noises. ...
A BBN Based Approach for Improving a Telecommunication Software Estimation Process
This paper describes analytically a methodology for improving the estimation process of a small-medium telecommunication (TLC) company. All the steps required for the generation of estimates such as data collection, data transformation, estimation model ...
Real-Time Collection of Electromagnetic Field Measurements Using a Metropolitan Wireless Mesh Network
We present a system for real-time collection of Electromagnetic Field (EMF) measurements. The two innovative features of the system that differentiate it from other similar monitoring systems are the use of a low-cost EMF measurement device and the ...
Design and Simulation of NAND Gates Made of Single Electron Devices
In this paper we present NAND gates designed using single electron logic. First the single-electron NAND behaviour is studied and then the energy performance of the circuit is examined. The whole design and simulation is made using a Monte-Carlo based ...
A Design Flow for the Precise Identification of the Worst-Case Voltage Drop in Power Grid Analyses
Modern IC designs contain hundreds of millions of transistors and new approaches of multicore chips take place in commercial products. Identifying worst-case voltage drop conditions in every hierarchical module supplied by the power grid is a crucial ...
Simulator Implementation of an IF-ISAR System for Studies in Target Glint
The formation steps leading to the creation of a computer simulator for an extended naval target as viewed by an approaching Interferometric Inverse Synthetic Aperture Radar (IF-ISAR) seeker sensor is presented in this paper. The conceptual model ...