<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antigoni-Maria Founta</style></author><author><style face="normal" font="default" size="100%">Constantinos Djouvas</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Ilias Leontiadis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Michael Sirivianos</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior</style></title><tertiary-title><style face="normal" font="default" size="100%">ICWSM-18</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">AAAI</style></publisher><pub-location><style face="normal" font="default" size="100%">Stanford, California</style></pub-location><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms. In fact, past scientific work focused on studying these forms in popular media, such as Facebook and Twitter. Building on such work, we present an 8-month study of the various forms of abusive behavior on Twitter, in a holistic fashion. Departing from past work, we examine a wide variety of labeling schemes, which cover different forms of abusive behavior, at the same time. We propose an incremental and iterative methodology, that utilizes the power of crowdsourcing to annotate a large scale collection of tweets with a set of abuse-related labels. In fact, by applying our methodology including statistical analysis for label merging or elimination, we identify a reduced but robust set of labels. Finally, we offer a first overview and findings of our collected and annotated dataset of 100 thousand tweets, which we make publicly available for further scientific exploration.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Neil Shah</style></author><author><style face="normal" font="default" size="100%">Alex Beutel</style></author><author><style face="normal" font="default" size="100%">Christos Faloutsos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ND-SYNC: Detecting Synchronized Fraud Activities</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Knowledge Discovery and Data Mining, 19th Pacific-Asia Conference, PAKDD 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part II</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-18032-8_16</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">201â€“214</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Neil Shah</style></author><author><style face="normal" font="default" size="100%">Christos Faloutsos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Cao, Tru</style></author><author><style face="normal" font="default" size="100%">Lim, Ee-Peng</style></author><author><style face="normal" font="default" size="100%">Zhou, Zhi-Hua</style></author><author><style face="normal" font="default" size="100%">Ho, Tu-Bao</style></author><author><style face="normal" font="default" size="100%">Cheung, David</style></author><author><style face="normal" font="default" size="100%">Motoda, Hiroshi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Retweeting Activity on Twitter: Signs of Deception</style></title><secondary-title><style face="normal" font="default" size="100%">PAKDD (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">9077</style></volume><pages><style face="normal" font="default" size="100%">122-134</style></pages><isbn><style face="normal" font="default" size="100%">978-3-319-18037-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Filippou, George</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Collaborative event annotation in tagged photo collections</style></title><secondary-title><style face="normal" font="default" size="100%">Multimedia Tools Appl.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Event authoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Ground truth generation</style></keyword><keyword><style  face="normal" font="default" size="100%">Multimedia annotation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">70</style></volume><pages><style face="normal" font="default" size="100%">89-118</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Events constitute a significant means of multimedia content organizationand sharing. Despite the recent interest in detecting events and annotating mediacontent in an event-centric way, there is currently insufficient support for managingevents in large-scale content collections and limited understanding of the eventannotation process. To this end, this paper presents CrEve, a collaborative eventannotation framework which uses content found in social media sites with theprime objective to facilitate the annotation of large media corpora with eventinformation. The proposed annotation framework could significantly benefit socialmedia research due to the proliferation of event-related user-contributed content.We demonstrate that, compared to a standard â€śbrowse-and-annotateâ€ť interface,CrEve leads to a 19% increase in the coverage of the generated ground truth in alarge-scale annotation experiment. Furthermore, the paper discusses the results of auser study that quantifies the performance of CrEve and the contribution of differentevent dimensions in the event annotation process. The study confirms the prevalenceof spatio-temporal queries as the prime option of discovering event-related contentin a large collection. In addition, textual queries and social cues (content contributor) were also found to be significant as event search dimensions. Finally, it demonstratesthe potential of employing automatic photo clustering methods with the goal offacilitating event annotation.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ali, Haider</style></author><author><style face="normal" font="default" size="100%">Shafait, Faisal</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Figueroa, Nadia</style></author><author><style face="normal" font="default" size="100%">Varvadoukas, Theodoros</style></author><author><style face="normal" font="default" size="100%">Mavridis, Nikolaos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Contextual object category recognition for RGB-D scene labeling</style></title><secondary-title><style face="normal" font="default" size="100%">Robotics and Autonomous Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">62</style></volume><pages><style face="normal" font="default" size="100%">241-256</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Helfert, Markus</style></author><author><style face="normal" font="default" size="100%">Francalanci, Chiara</style></author><author><style face="normal" font="default" size="100%">Filipe, Joaquim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Social Data Sentiment Analysis in Smart Environments - Extending Dual Polarities for Crowd Pulse Capturing</style></title><secondary-title><style face="normal" font="default" size="100%">DATA</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">SciTePress</style></publisher><pages><style face="normal" font="default" size="100%">175-182</style></pages><isbn><style face="normal" font="default" size="100%">978-989-8565-67-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moussiades, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Flory, Andre</style></author><author><style face="normal" font="default" size="100%">Collard, Martine</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Benchmark graphs for the evaluation of Clustering Algorithms</style></title><secondary-title><style face="normal" font="default" size="100%">RCIS</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Artificial graph</style></keyword><keyword><style  face="normal" font="default" size="100%">Community structure</style></keyword><keyword><style  face="normal" font="default" size="100%">Graph clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">Intra linkage ratio</style></keyword><keyword><style  face="normal" font="default" size="100%">Modularity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">197-206</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4244-2864-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Artificial graphs are commonly used for theevaluation of community mining and clustering algorithms. Eachartificial graph is assigned a pre-specified clustering, which iscompared to clustering solutions obtained by the algorithmsunder evaluation. Hence, the pre-specified clustering shouldcomply with specifications that are assumed to delimit a goodclustering. However, existing construction processes for artificialgraphs do not set explicit specifications for the pre-specifiedclustering. We call these graphs, randomly clustered graphs.Here, we introduce a new class of benchmark graphs which areclustered according to explicit specifications. We call themoptimally clustered graphs. We present the basic properties ofoptimally clustered graphs and propose algorithms for theirconstruction. Experimentally, we compare two communitymining algorithms using both randomly and optimally clusteredgraphs. Results of this evaluation reveal interesting insights bothfor the algorithms and the artificial graphs.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Dikaiakos, Marios D.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the utility of content delivery networks</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CDN pricing</style></keyword><keyword><style  face="normal" font="default" size="100%">Content Delivery</style></keyword><keyword><style  face="normal" font="default" size="100%">network utility</style></keyword><keyword><style  face="normal" font="default" size="100%">networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">11-20</style></pages><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) balance costs and qualityin services related to content delivery. This has urgedmany Web entrepreneurs to make contracts with CDNs. Inthe literature, a wide range of techniques has been developed,implemented and standardized for improving the performanceof CDNs. The ultimate goal of all the approachesis to improve the utility of CDN surrogate servers. In thispaper we define a metric which measures the utility of CDNsurrogate servers, called CDN utility. This metric capturesthe traffic activity in a CDN, expressing the usefulness ofsurrogate servers in terms of data circulation in the network.Through an extensive simulation testbed, we identifythe parameters that affect the CDN utility in such infrastructures.We evaluate the utility of surrogate servers undervarious parameters and provide insightful comments.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Next generation content networks: trends and challenges</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">49</style></pages><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Proceedings of the 4th Workshop on the Use of P2P, GRID and Agents for the Development of Content Networks, UPGRADE-CNâ€™09, jointly held with the 18th International Symposium on High-Performance Distributed Computing (HPDC-18 2009), 10 June 2009, Ga</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aref, Walid G.</style></author><author><style face="normal" font="default" size="100%">Catlin, Ann Christine</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author><author><style face="normal" font="default" size="100%">Fan, Jianping</style></author><author><style face="normal" font="default" size="100%">Guo, J.</style></author><author><style face="normal" font="default" size="100%">Hammad, Moustafa A.</style></author><author><style face="normal" font="default" size="100%">Ilyas, Ihab F.</style></author><author><style face="normal" font="default" size="100%">Marzouk, Mirette S.</style></author><author><style face="normal" font="default" size="100%">Prabhakar, Sunil</style></author><author><style face="normal" font="default" size="100%">Rezgui, Abdelmounaam</style></author><author><style face="normal" font="default" size="100%">Teoh, S.</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Tu, Yi-Cheng</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Zhu, Xingquan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Agrawal, Rakesh</style></author><author><style face="normal" font="default" size="100%">Dittrich, Klaus R.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Distributed Database Server for Continuous Media</style></title><secondary-title><style face="normal" font="default" size="100%">ICDE</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">490-491</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-1531-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In our project, we adopt a new approach for handlingvideo data. We view the video as a well-defined datatype with its own description, parameters, and applicablemethods. The system is based on PREDATOR, the opensource object relational DBMS. PREDATOR uses Shoreas the underlying storage manager (SM). Supporting videooperations (storing, searching by content, and streaming)and new query types (query by examples and multi-featuressimilarity search) requires major changes in many ofthe traditional system components. More specifically,the storage and buffer manager will have to deal withhuge volumes of data with real time constraints. Queryprocessing has to consider the video methods and operatorsin generating, optimizing and executing query plans.</style></abstract></record></records></xml>