Publications
Export 73 results:
Author Title [ Type
Filters: First Letter Of Last Name is S [Clear All Filters]
Storage and Access Control Issues for XML Documents." In Encyclopedia of Information Science and Technology (V), edited by Mehdi Khosrow-Pour, 2616-2621. Idea Group, 2005.
"Branty: A Social Media Ranking Tool for Brands." In ECML/PKDD (3), edited by Toon Calders, Floriana Esposito, Eyke Hullermeier and Rosa Meo, 432-435. Vol. 8726. Lecture Notes in Computer Science 8726. Springer, 2014.
"City exploration by use of spatio-temporal analysis and clustering of user contributed photos." In ICMR, edited by Francesco G. B. De Natale, Alberto Del Bimbo, Alan Hanjalic, B. S. Manjunath and Shin’ichi Satoh, 65. ACM, 2011.
"ClustTour: city exploration by use of hybrid photo clustering." In ACM Multimedia, edited by Alberto Del Bimbo, Shih-Fu Chang and Arnold W. M. Smeulders, 1617-1620. ACM, 2010.
"Community Detection in Social Media by Leveraging Interactions and Intensities." In WISE (2), edited by Xuemin Lin, Yannis Manolopoulos, Divesh Srivastava and Guangyan Huang, 57-72. Vol. 8181. Lecture Notes in Computer Science 8181. Springer, 2013.
PDF (442.9 KB)
"
Correlating Time-Related Data Sources with Co-clustering." In WISE, edited by James Bailey, David Maier, Klaus-Dieter Schewe, Bernhard Thalheim and Xiaoyang Sean Wang, 264-279. Vol. 5175. Lecture Notes in Computer Science 5175. Springer, 2008.
C61.pdf (497.83 KB)
"
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources." In ISCIS, edited by Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy and Yücel Saygin, 603-612. Vol. 4263. Lecture Notes in Computer Science 4263. Springer, 2006.
C53.pdf (1.51 MB)
"
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources." In ISCIS, edited by Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy and Yücel Saygin, 603-612. Vol. 4263. Lecture Notes in Computer Science 4263. Springer, 2006.
C53.pdf (1.51 MB)
"
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources." In ISCIS, edited by Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy and Yücel Saygin, 603-612. Vol. 4263. Lecture Notes in Computer Science 4263. Springer, 2006.
C53.pdf (1.51 MB)
"
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources." In ISCIS, edited by Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy and Yücel Saygin, 603-612. Vol. 4263. Lecture Notes in Computer Science 4263. Springer, 2006.
C53.pdf (1.51 MB)
"
Dynamic Code Generation for Cultural Content Management." In Panhellenic Conference on Informatics, 21-24. IEEE Computer Society, 2010.
PDF (187.93 KB)
"
Emotional Aware Clustering on Micro-blogging Sources." In ACII (1), edited by Sidney K. D’Mello, Arthur C. Graesser, Björn Schuller and Jean-Claude Martin, 387-396. Vol. 6974. Lecture Notes in Computer Science 6974. Springer, 2011.
C81.pdf (269.97 KB)
"
Evaluating the utility of content delivery networks." In UPGRADE-CN, edited by Giancarlo Fortino, Carlo Mastroianni, Al-Mukaddim Khan Pathan and Athena Vakali, 11-20. ACM, 2009.
C67.pdf (205.12 KB)
"
FRES-CAR: An Adaptive Cache Replacement Policy." In WIRI, 74-81. IEEE Computer Society, 2005.
C42.pdf (327.32 KB)
"
Integrating Caching Techniques on a Content Distribution Network." In ADBIS, edited by Yannis Manolopoulos, Jaroslav Pokorny and Timos K. Sellis, 200-215. Vol. 4152. Lecture Notes in Computer Science 4152. Springer, 2006.
"Integrating Caching Techniques on a Content Distribution Network." In ADBIS, edited by Yannis Manolopoulos, Jaroslav Pokorny and Timos K. Sellis, 200-215. Vol. 4152. Lecture Notes in Computer Science 4152. Springer, 2006.
"A Latency-Based Object Placement Approach in Content Distribution Networks." In LA-WEB, 140-147. IEEE Computer Society, 2005.
"A Latency-Based Object Placement Approach in Content Distribution Networks." In LA-WEB, 140-147. IEEE Computer Society, 2005.
"Mining the Community Structure of a Web Site." In BCI, edited by Petros Kefalas, Demosthenes Stamatis and Christos Douligeris, 239-244. IEEE Computer Society, 2009.
"ND-SYNC: Detecting Synchronized Fraud Activities." In Advances in Knowledge Discovery and Data Mining, 19th Pacific-Asia Conference, PAKDD 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part II, 201–214., 2015.
PDF (4.36 MB)
Dataset (1.96 MB)
Presentation (2.16 MB)
"


A QoS based disk subsystem." In Computers and Their Applications, edited by C. C. Hung, 409-412. ISCA, 2001.
"Replication Based on Objects Load under a Content Distribution Network." In ICDE Workshops, edited by Roger S. Barga and Xiaofang Zhou, 53. IEEE Computer Society, 2006.
"Replication Based on Objects Load under a Content Distribution Network." In ICDE Workshops, edited by Roger S. Barga and Xiaofang Zhou, 53. IEEE Computer Society, 2006.
"Requirements and architecture design principles for a smart city experiment with sensor and social networks integration." In Panhellenic Conference on Informatics, edited by Panayiotis H. Ketikidis, Konstantinos G. Margaritis, Ioannis P. Vlahavas, Alexander Chatzigeorgiou, George Eleftherakis and Ioannis Stamelos, 327-334. ACM, 2013.
PDF (226.39 KB)
"
Requirements and architecture design principles for a smart city experiment with sensor and social networks integration." In Panhellenic Conference on Informatics, edited by Panayiotis H. Ketikidis, Konstantinos G. Margaritis, Ioannis P. Vlahavas, Alexander Chatzigeorgiou, George Eleftherakis and Ioannis Stamelos, 327-334. ACM, 2013.
PDF (226.39 KB)
"