<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vakali, Athena</style></author><author><style face="normal" font="default" size="100%">Kitmeridis, Nikolaos</style></author><author><style face="normal" font="default" size="100%">Panourgia, Maria</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Angelov, Plamen</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Iliadis, Lazaros</style></author><author><style face="normal" font="default" size="100%">Roy, Asim</style></author><author><style face="normal" font="default" size="100%">Vellasco, Marley</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Distributed Framework for Early Trending Topics Detection on Big Social Networks Data Threads</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Big Data: Proceedings of the 2nd INNS Conference on Big Data, October 23-25, 2016, Thessaloniki, Greece</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-47898-2_20</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer International Publishing</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><pages><style face="normal" font="default" size="100%">186–194</style></pages><isbn><style face="normal" font="default" size="100%">978-3-319-47898-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social networks have become big data production engines and their analytics can reveal insightful trending topics, such that hidden knowledge can be utilized in various applications and settings. This paper addresses the problem of popular topics’ and trends’ early prediction out of social networks data streams which demand distributed software architectures. Under an online time series classification model, which is implemented in a flexible and adaptive distributed framework, trending topics are detected. Emphasis is placed on the early detection process and on the performance of the proposed framework. The implemented framework builds on the lambda architecture design and the experimentation carried out highlights the usefulness of the proposed approach in early trends detection with high rates in performance and with a validation aligned with a popular microblogging service.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Nick Bassiliades</style></author><author><style face="normal" font="default" size="100%">Mirjana Ivanovic</style></author><author><style face="normal" font="default" size="100%">Margita Kon-Popovska</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author><author><style face="normal" font="default" size="100%">Themis Palpanas</style></author><author><style face="normal" font="default" size="100%">Goce Trajcevski</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in Database and Information Systems II - Selected papers of the 18th East European Conference on Advances in Databases and Information Systems and Associated Satellite Events, ADBIS 2014 Ohrid, Macedonia, September 7-10, 2014 Proceedings II</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-10518-5</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">312</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-10517-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ul Islam, Saif</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pierson, Jean-Marc</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Kranzlmller, Dieter</style></author><author><style face="normal" font="default" size="100%">Tjoa, A Min</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Utilization-Aware Redirection Policy in CDN: A Case for Energy Conservation</style></title><secondary-title><style face="normal" font="default" size="100%">ICT-GLOW</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CDNs</style></keyword><keyword><style  face="normal" font="default" size="100%">Energy conservation</style></keyword><keyword><style  face="normal" font="default" size="100%">QoE</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6868</style></volume><pages><style face="normal" font="default" size="100%">180-187</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-23446-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Due to the gradual and rapid increase in Information andCommunication Technology (ICT) industry, it is very important to introduce energy efficient techniques and infrastructures in large scale distributed systems. Content Distribution Networks (CDNs) are one of these popular systems which try to make the contents closer to the widely dispersed Internet users. A Content Distribution Network provides its services by using a number of surrogate servers geographicallydistributed in the web. Surrogate servers have the copies of the original contents belonging to the origin server, depending on their storage capacity.When a client requests for some particular contents from a surrogateserver, either this request can be fulfilled directly by it or in case of absence of the requested contents, surrogate servers cooperate with eachother or with the origin server. In this paper, our focus is on the surrogate servers utilization and using it as a parameter to conserve energy in CDNs while trying to maintain an acceptable Quality of Experience (QoE).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aref, Walid G.</style></author><author><style face="normal" font="default" size="100%">Catlin, Ann Christine</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author><author><style face="normal" font="default" size="100%">Fan, Jianping</style></author><author><style face="normal" font="default" size="100%">Guo, J.</style></author><author><style face="normal" font="default" size="100%">Hammad, Moustafa A.</style></author><author><style face="normal" font="default" size="100%">Ilyas, Ihab F.</style></author><author><style face="normal" font="default" size="100%">Marzouk, Mirette S.</style></author><author><style face="normal" font="default" size="100%">Prabhakar, Sunil</style></author><author><style face="normal" font="default" size="100%">Rezgui, Abdelmounaam</style></author><author><style face="normal" font="default" size="100%">Teoh, S.</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Tu, Yi-Cheng</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Zhu, Xingquan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Agrawal, Rakesh</style></author><author><style face="normal" font="default" size="100%">Dittrich, Klaus R.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Distributed Database Server for Continuous Media</style></title><secondary-title><style face="normal" font="default" size="100%">ICDE</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">490-491</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-1531-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In our project, we adopt a new approach for handlingvideo data. We view the video as a well-defined datatype with its own description, parameters, and applicablemethods. The system is based on PREDATOR, the opensource object relational DBMS. PREDATOR uses Shoreas the underlying storage manager (SM). Supporting videooperations (storing, searching by content, and streaming)and new query types (query by examples and multi-featuressimilarity search) requires major changes in many ofthe traditional system components. More specifically,the storage and buffer manager will have to deal withhuge volumes of data with real time constraints. Queryprocessing has to consider the video methods and operatorsin generating, optimizing and executing query plans.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ilioudis, Christos</style></author><author><style face="normal" font="default" size="100%">Pangalos, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Model for XML Data</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Internet Computing (1)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Role Based Access Control</style></keyword><keyword><style  face="normal" font="default" size="100%">XML Security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><pages><style face="normal" font="default" size="100%">400-406</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The significance of XML technology for sharing data over the Internet is being rapidly recognised. In this paper, we examine the security problems related to XML data and present our approach, the XML Security model, for enforcing security policies in XML based Information systems. Our methodology has been based on the study of the XML data model, on the identification of the security requirements of XML Information systems and on the survey of security models which have been proposed to support the conventional data models(relational, object-oriented, hypertext etc). The proposed approach takes into account and exploits the specific characteristics of XML data and incorporates the flexibility of Role based Access Control policies.&lt;/p&gt;
</style></abstract></record></records></xml>