Goto Year: 20172015201420122011201020092008200720062005
200019951987

    2017

    1. Kokkos A., Tzouramanis T., Manolopoulos Y.: A Hybrid Model for Linking Multiple Social Identities across Heterogeneous Online Social Networks, Proceedings of the 43rd International Conference on Current Trends in Theory & Practice of Computer Science (SOFSEM’2017), pp. 423-435, Limerick, Ireland, 2017 (BIB)
    2. Naskos A., Gounaris A., Katsaros P.: Cost-aware Horizontal Scaling of NoSQL Databases Using Probabilistic Model Checking, Cluster Computing, Vol.20, N.3, pp. 2687-2701, 2017 (BIB)

    2015

    1. Naskos A., Stachtiari A., Gounaris A., Katsaros P., Tsoumakos D., Konstantinou I., Sioutas S.: Dependable Horizontal Scaling Based On Probabilistic Model Checking, Proceedings of the 15th IEEE/ACM International Symposium on Cluster, Cloud & Grid Computing (CCGrid’2015), pp. 31-40, Shenzhen, China, 2015 (BIB)
    2. Naskos A., Stachtiari A., Katsaros P., Gounaris A.: Probabilistic Model Checking for the Provisioning of Cloud Resources, Proceedings of the 15th International Conference on Runtime Verification (RV’2015), pp. 275-280, Vienna, Austria, 2015 (BIB)
    3. Sattari M., Toroslu I., Karagoz P., Symeonidis P., Manolopoulos Y.: Extended Feature Combination Model for Recommendations in Location-based Mobile Services, Knowledge & Information Systems, Vol.3, N.44, pp. 629-661, 2015 (BIB)
    4. Proceedings of the 5th International Conference on Model & Data Engineering (MEDI’2015), (eds.: Bellatreche L. and Manolopoulos Y.), Springer Verlag LNCS, Vol.9344, 2015 (BIB)

    2014

    1. Gounaris A., Karampaglis Z., Naskos A., Manolopoulos Y.: A Bi-objective Cost Model for Database Queries in a Multi-cloud Environment (invited), Journal of Innovation in Digital Ecosystems, Vol.1, N.1-2, pp. 12-25, 2014 (BIB)
    2. Karampaglis Z., Gounaris A., Manolopoulos Y.: “A Bi-objective Cost Model for Database Queries in a Multi-cloud Environment” (best paper award), Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems (MEDES’2014), pp. 109-116, Buraidah Al Qassim, Saudi Arabia, 2014 (BIB)

    2012

    1. Yfoulis C., Gounaris A.: Online load balancing in parallel database queries with model predictive control, Proceedings of the 7th IEEE ICDE International Workshop on Self Managing Database Systems (SMDB’2012), pp. 269-274, Washington, DC, 2012 (BIB)

    2011

    1. Bartocci E., Grosu R., Katsaros P., Ramakrishnan CR, Smolka S.: Model Repair for Probabilistic Systems, Proceedings of the 17th International Conference on Tools & Algorithms for the Construction & Analysis of Systems (TACAS’2011), pp. 326-340, Saarbruecken, Germany, 2011 (BIB)
    2. Basagiannis S., Katsaros P., Pombortsis A.: Synthesis of Attack Actions Using Model Checking for the Verification of Security Protocols, Security & Communication Networks, Vol.4, N.2, pp. 147-161, 2011 (BIB)
    3. Basagiannis S., Petridou S., Alexiou N., Papadimitriou G., Katsaros P.: Quantitative Analysis of a Certified e-mail Protocol in Mobile Environments: a Probabilistic Model Checking Approach, Computers & Security, Vol.30, N.4, pp. 257-272, 2011 (BIB)
    4. Deshpande T., Katsaros P., Basagiannis S., Smolka S.: Formal Analysis of the DNS Bandwidth Amplification Attack and its Countermeasures Using Probabilistic Model Checking, Proceedings of the 13th IEEE International High Assurance Systems Engineering Symposium (HASE’2011), Boca Raton, FL, 2011 (BIB)
    5. Mentis A., Katsaros P.: Model Checking and Code Generation for Transaction Processing Software, Concurrency & Computation: Practice & Experience, 2011 (BIB)
    6. Petridou S., Basagiannis S., Alexiou N., Papadimitriou G., Katsaros P.: Quantitative Model Checking of an RSA-based Email Protocol on Mobile Devices, Proceedings of the 16th IEEE Symposium on Computers & Communications (ISCC’2011), pp. 639-645, Corfu, Greece, 2011 (BIB)

    2010

    1. Alexiou N., Basagiannis S., Katsaros P., Deshpande T., Smolka S.A.: Formal Analysis of the Kaminsky DNS Cache-poisoning Attack Using Probabilistic Model Checking, Proceedings of IEEE International Symposium on High Assurance Systems Engineering, pp. 94-103, 2010 (BIB)
    2. Basagiannis S., Katsaros P., Pombortsis A.: An Intruder Model with Message Inspection for Model Checking Security Protocols, Computers & Security, Vol.29, N.1, pp. 16-34, 2010 (BIB)
    3. Mokos K., Meditskos G., Katsaros, P., Bassiliades, N., Vasiliades, V.: Ontology-based Model Driven Engineering for Safety Verification, Proceedings of the 36th EUROMICRO Conference on Software Engineering & Advanced Applications (SEAA’2010), pp. 47-54, 2010 (BIB)

    2009

    1. Basagiannis S., Katsaros P., Pombortsis A., Alexiou N.: Probabilistic Model Checking for the Quantification of DoS Security Threats, Computers & Security, Vol.28, N.6, pp. 450-465, 2009 (BIB)
    2. Katsaros P.: A Roadmap to Electronic Payment Transaction Guarantees and a Colored Petri Net Model Checking Approach, Information & Software Technology, Vol.51, N.2, pp. 235-257, 2009 (BIB)
    3. Mentis A., Katsaros P.: The ACID model Checker and Code Generator for Transaction Processing, Proceedings of the International Conference on High Performance Computing & Simulation (HPCS’2009), pp. 138-144, 2009 (BIB)

    2008

    1. Basagiannis S., Katsaros P., Alexiou N., Pombortsis A.: A probabilistic Attacker Model for Quantitative Verification of DoS Security Threats, Proceedings of the International Computer Software & Applications Conference, pp. 12-19, 2008 (BIB)

    2007

    1. Basagiannis S., Katsaros P., Pombortsis A.: Intrusion Attack Tactics for the Model Checking of e-commerce Security Guarantees, Proceedings of the 26th International Conference on Computer Safety, Reliability & Security (SAFECOMP’2007), pp. 238-251, Nuremberg, Germany, 2007 (BIB)
    2. Symeonidis P., Nanopoulos A., Manolopoulos Y.: Feature-weighed User Model for Recommender Systems, Proceedings of the 11th International Conference on User Modeling (UM’2007), pp. 97-106, Corfu, Greece, 2007 (BIB)

    2006

    1. Basagiannis S., Katsaros P., Pombortsis A.: Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker, Proceedings of the International Symposium on Parallel & Distributed Processing & Applications (ISPA’2006), pp. 317-328, Sorrento, Italy, 2006 (BIB)

    2005

    1. Katsaros P., Odontidis V., Gousidou-Koutita M.: Colored Petri Net Based Model Checking and Failure Analysis for e-commerce Protocols, Proceedings of the 6th Workshop & Tutorial on Practical Use of Coloured Petri Nets & the CPN Tools (CPN’2005), pp. 267-283, 2005 (BIB)
    2. Katsaros, P.: On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: a Colored Petri Net Based Model, Proceedings of the International Symposium on Distributed Objects & Applications (DOA’2005), pp. 941-959, Agia Napa, Cyprus, 2005 (BIB)

    2000

    1. Bozanis P., Manolopoulos Y.: DSL: Accommodating Skip Lists in the SDDS Model, Proceedings of the 3rd Workshop on Distributed Data & Structures (WDAS’2000), pp. 1-9, L’Aquila, Italy, 2000 (BIB)

    1995

    1. Lorentzos N., Manolopoulos Y.: Functional Requirements for Historical and Interval Extensions to the Relational Model, Data & Knowledge Engineering, Vol.17, N.1, pp. 59-86, 1995 (BIB)
    2. Vassilakopoulos M., Manolopoulos Y.: A Random Model for Analyzing Region Quadtrees, Pattern Recognition Letters, Vol.16, pp. 1137-1145, 1995 (BIB)

    1987

    1. Manolopoulos Y., Kleftouris D., Petrou L.: A Model for an ISAM File with Multiple Overflow Chains, The Computer Journal, Vol.30, N.6, pp. 529-534, 1987 (BIB)


    The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders (e.g., IEEE, ACM, Elsevier, Springer, Kluwer, IDEA Group, VLDB Endow.), notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.

    For any comment, send e-mail to: Webadmin

    Last modified: Saturday, June 09th, 2018, 17:50:04