Goto Year: 20162014201120102009200820072005200320022000


    1. Naskos A., Gounaris A., Mouratidis H., Katsaros P.: Online Analysis of Security Risks in Elastic Cloud Applications, IEEE Cloud Computing, Vol.3, N.5, pp. 26-33, 2016 (BIB)


    1. Koumarelas I., Naskos A., Gounaris A.: Binary Theta-Joins using MapReduce: Efficiency Analysis and Improvements, Proceedings of the International Workshop on Algorithms for MapReduce & Beyond (BMR) (in conjunction with EDBT/ICDT’2014), pp. 6-9, Athens, Greece, 2014 (BIB)


    1. Basagiannis S., Petridou S., Alexiou N., Papadimitriou G., Katsaros P.: Quantitative Analysis of a Certified e-mail Protocol in Mobile Environments: a Probabilistic Model Checking Approach, Computers & Security, Vol.30, N.4, pp. 257-272, 2011 (BIB)
    2. Chatzieleftheriou G., Katsaros P.: Test Driving Static Analysis Tools in Search of C Code Vulnerabilities, Proceedings of the 35th IEEE Computer Software & Applications Conference Workshops (COMPSACW’2011), pp. 96-103, Munich, Germany, 2011 (BIB)
    3. Deshpande T., Katsaros P., Basagiannis S., Smolka S.: Formal Analysis of the DNS Bandwidth Amplification Attack and its Countermeasures Using Probabilistic Model Checking, Proceedings of the 13th IEEE International High Assurance Systems Engineering Symposium (HASE’2011), Boca Raton, FL, 2011 (BIB)
    4. Doulaverakis C., Paradogiorgaki M., Mezaris V., Mpilis A., Parissi E., Gounaris A., Kompatsiaris I.: IVUS Image Processing and Semantic Analysis for Cardiovascular Diseases Risk Prediction, International Journal of Biomedical Engineering & Technology – Special Issue on Decision Support Systems, Vol.3, N.3-4, pp. 349-374, 2011 (BIB)
    5. Loizidis A., Almaliotis V., Katsaros P.: Static Program Analysis of Multi-Applet JavaCard Applications, Software Engineering for Secure Systems: Industrial & Research Perspectives, IGI Global, , pp. 286-304, 2011 (BIB)


    1. Alexiou N., Basagiannis S., Katsaros P., Deshpande T., Smolka S.A.: Formal Analysis of the Kaminsky DNS Cache-poisoning Attack Using Probabilistic Model Checking, Proceedings of IEEE International Symposium on High Assurance Systems Engineering, pp. 94-103, 2010 (BIB)
    2. Nanopoulos A., Rafailidis D., Symeonidis P., Manolopoulos Y.: MusicBox: Personalized Music Recommendation based on Cubic Analysis of Social Tags, IEEE Transactions on Audio, Speech & Language Processing, Vol.18, N.2, pp. 407-412, 2010 (BIB)
    3. Symeonidis P., Nanopoulos A., Manolopoulos Y.: A Unified Framework for Providing Recommendations in Social Tagging Systems based on Ternary Semantic Analysis, IEEE Transactions on Knowledge & Data Engineering, Vol.22, N.2, pp. 179-192, 2010 (BIB)


    1. Papadimitriou A., Katsaros D., Manolopoulos Y.: Social Network Analysis and its Applications in Wireless Sensor and Vehicular Networks, Proceedings of the 3rd Conference for the e-Democracy, pp. 411-420, Athens, Greece, 2009 (BIB)


    1. Almaliotis V., Loizidis A., Katsaros P., Louridas P., Spinellis D.: Static Program Analysis for Java Card Applets, Proceedings of the 8th IFIP Smart Card Research & Advanced Application Conference (CARDIS’2008), pp. 17-31, London, UK, 2008 (BIB)
    2. Mokos K., Katsaros P., Bassiliades N., Vasiliades V., Perrotin M.: Towards Compositional Safety Analysis via Semantic Representation of Component Failure Behavior, Procedings of the 8th Joint Conference on Knowledge-based Software Engineering (JCKBSE’2008), pp. 405-414, Piraeus, Greece, 2008 (BIB)
    3. Papadopoulos A.: Trajectory Retrieval with Latent Semantic Analysis, Proceedings of the 22nd ACM Symposium on Applied Computing (SAC’2008), pp. 1089-1094, Fortaleza, Brazil, 2008 (BIB)
    4. Symeonidis P., Ruxanda M., Nanopoulos A. Manolopoulos Y.: Ternary Semantic Analysis of Social Tags for Personalized Music Recommendation, Proceedings of the 9th International Symposium on Music Information Retrieval (ISMIR’2008), pp. 219-224, Philadelphia, PA, 2008 (BIB)


    1. Sowe S.K., Angelis L., Stamelos I., Manolopoulos Y.: Using Repository of Repositories (RoRs) to Study the Growth of F/OSS Projects: a Meta-Analysis Research Approach, Proceedings of the 3rd International Conference on Open Source Systems (OSS’2007), Limerick, Ireland, 2007 (BIB)


    1. Katsaros P., Odontidis V., Gousidou-Koutita M.: Colored Petri Net Based Model Checking and Failure Analysis for e-commerce Protocols, Proceedings of the 6th Workshop & Tutorial on Practical Use of Coloured Petri Nets & the CPN Tools (CPN’2005), pp. 267-283, 2005 (BIB)


    1. Katsaros P., Lazos C.: Approximate and Simulation Based Analysis for Distributed Object Software Performance Models, Proceedings of the European Simulation & Modelling Conference (ESM’2003), pp. 409-414, Naples, Italy, 2003 (BIB)


    1. Katsaros P., Lazos C.: Structured Performance Modeling and Analysis for Object Based Distributed Software Systems, Proceedings of the 15th ISCA International Conference on Parallel & Distributed Computing Systems, pp. 96-102, Louisville, KY, 2002 (BIB)


    1. Manousaka A., Manolopoulos Y.: Fringe Analysis of 2-3 trees with Lazy Parent Split, The Computer Journal, Vol.43, N.5, pp. 420-429, 2000 (BIB)


    1. Faloutsos C., Jagadish H.V., Manolopoulos Y.: Analysis of N-dimensional Quadtree Decomposition of Arbitrary Rectangles, IEEE Transactions on Knowledge & Data Engineering, Vol.9, N.3, pp. 373-383, 1997 (BIB)
    2. Vakali A., Manolopoulos Y.: An Exact Analysis on Expected Seeks in Shadowed Disks, Information Processing Letters, Vol.61, N.6, pp. 323-329, 1997 (BIB)


    1. Vassilakopoulos M., Manolopoulos Y., Kroell B.: Efficiency Analysis of Overlapped Quadtrees, Nordic Journal on Computing, Vol.2, N.1, pp. 70-84, 1995 (BIB)


    1. Manolopoulos Y., Faloutsos C.: Analysis for the End of Block Wasted Space, BIT, Vol.30, pp. 620-630, 1990 (BIB)


    1. Christodoulakis S., Manolopoulos Y., Larson P.A.: Analysis of Overflow Handling for Variable Length Records, Information Systems, Vol.14, N.2, pp. 151-162, 1989 (BIB)

    The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders (e.g., IEEE, ACM, Elsevier, Springer, Kluwer, IDEA Group, VLDB Endow.), notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.

    For any comment, send e-mail to: Webadmin

    Last modified: Sunday, October 08th, 2017, 21:06:21