<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moustaka, Vaia</style></author><author><style face="normal" font="default" size="100%">Zenonas Theodosiou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Anastasis Kounoudes</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Smart Cities at Risk!: Privacy and Security Borderlines  from Social Networking in Cities</style></title><tertiary-title><style face="normal" font="default" size="100%">WWW ’18 Companion </style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">online social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy threats</style></keyword><keyword><style  face="normal" font="default" size="100%">security threats</style></keyword><keyword><style  face="normal" font="default" size="100%">smart cities</style></keyword><keyword><style  face="normal" font="default" size="100%">smart living</style></keyword><keyword><style  face="normal" font="default" size="100%">smart people</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Lyon, France</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p class=&quot;rtejustify&quot;&gt;As smart cities infrastructures mature, data becomes a valuable asset which can radically improve city services and tools. Registration, acquisition and utilization of data, which will be transformed into smart services, are becoming more necessary than ever. Online social networks with their enormous momentum are one of the main sources of urban data offering heterogeneous real-time data at a minimal cost. However, various types of attacks often appear on them, which risk users' privacy and affect their online trust. The purpose of this article is to investigate how risks on online social networks affect smart cities and study the differences between privacy and security threats with regard to smart people and smart living dimensions.&lt;/p&gt;
</style></abstract><orig-pub><style face="normal" font="default" size="100%">WWW ’18 Companion </style></orig-pub></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nikolaos Tsigilis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Experience of emotion in face to face and computer-mediated social interactions: An event sampling study</style></title><secondary-title><style face="normal" font="default" size="100%">Computers in Human Behavior</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Computer-mediated communication</style></keyword><keyword><style  face="normal" font="default" size="100%">Emotion</style></keyword><keyword><style  face="normal" font="default" size="100%">FtF</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">Social interaction</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S0747563217304557</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">76</style></volume><pages><style face="normal" font="default" size="100%">287 - 293</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The present study compared the experience of emotion in social interactions that take place face to face (FtF), co-presently, and those that take place online, in computer-mediated communications (CMC). For a period of ten days participants reported how intensely they experienced positive and negative emotions in CMC and in FtF interactions they had with persons from their social network. Results from factor analyses discerned a three factor emotion structure (positive, negative, and anxious emotions) that was largely shared between CMC and FtF social interactions. Multilevel analyses of emotion across modes of interaction found that in FtF social encounters participants experienced more positive and less negative emotion and higher satisfaction than in CMC; there was no difference in anxious emotion. Positive, but not negative emotions or anxiety partially mediated levels of satisfaction differences between interactions in CMC and those taking place FtF. The results point to similarities and differences in emotion experience in FtF and CMC, underlining in particular the affiliative function of positive emotion in peoples' encounters.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Ioannis Dematis</style></author><author><style face="normal" font="default" size="100%">Athanasios Tolikas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Vol4All: A Volunteering Platform to Drive Innovation and Citizens Empowerment</style></title><secondary-title><style face="normal" font="default" size="100%">WWW (Companion Volume)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1145/3041021.3054712</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Perth, Australia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;div&gt;Cities nowadays have embraced the digital era and continuously strive to merge technological advancements with the benefit of their social capital and communities. A major quest is to place humans and their competences at the center of the efforts towards sustainable and smart cities. Citizen societies have widely accepted and practiced volunteering for years now and already a great number of volunteering actions and networks have flourished, in support and aid to several communities in need. Most popular volunteering networks have greatly&amp;nbsp; capitalized on the rapid advance and spread of Internet and Web technologies, which are ideal for coordinating and monitoring of the volunteering tasks. The Vol4All platform advances this&amp;nbsp; trend, by building on extended Internet technologies in its aim to support citizens’ activism&amp;nbsp; towards novel urban social innovation. Vol4All enables ideas exchange and crowdsourcing by facilitating citizens’ involvement in the realization of community projects. Volunteering actors (initiators, participants, stakeholders) can easily interact via the Vol4All platform which enables volunteering opportunities dynamic sharing, evolution and monitoring. Such opportunities can be initiated by any authorized stakeholders, with a publicly open interface which allows citizens commitment assessment, best practices highlights, and a gamification style of interaction such that volunteering becomes a societal and growth asset.&lt;/div&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antonia Gogoglou</style></author><author><style face="normal" font="default" size="100%">Zenonas Theodosiou</style></author><author><style face="normal" font="default" size="100%">Tasos Kounoudes</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Early Malicious Activity Discovery in Microblogs by Social Bridges Detection</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">16th International Symposium on Signal Processing and Information Technology</style></publisher><pub-location><style face="normal" font="default" size="100%">Limassol, Cyprus</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the emerging and intense use of Online Social Networks (OSNs) amongst young children and teenagers (youngters), safe networking and socializing on the Web has faced extensive scrutiny. Content and interactions which are considered safe for adult OSN users, might embed potentially threatening and malicious information when it comes to underage users. This work is motivated by the strong need to safeguard youngsters OSNs experience such that they can be empowered and aware. The topology of a graph is studied towards detecting the so called social bridges, i.e. the group(s) of malicious users and their supporters, who have links and ties to both honest and malicious user communities. A graph-topology based classification scheme is proposed to detect such bridge linkages which are suspicious for threatening youngsters networking vulnerability. The proposed scheme is validated by a Twitter network, at which potentially dangerous users are identified based on their Twitter connections. The achieved performance is higher compared to previous efforts, despite the increased complexity due to the variety of groups identified as malicious.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Thanassis Tiropanis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Laura Sartori</style></author><author><style face="normal" font="default" size="100%">Pete Burnap</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Internet Science - Second International Conference, INSCI 2015, Brussels, Belgium, May 27-29, 2015, Proceedings</style></title><secondary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-18609-2</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">9089</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-18608-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Nick Bassiliades</style></author><author><style face="normal" font="default" size="100%">Mirjana Ivanovic</style></author><author><style face="normal" font="default" size="100%">Margita Kon-Popovska</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author><author><style face="normal" font="default" size="100%">Themis Palpanas</style></author><author><style face="normal" font="default" size="100%">Goce Trajcevski</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in Database and Information Systems II - Selected papers of the 18th East European Conference on Advances in Databases and Information Systems and Associated Satellite Events, ADBIS 2014 Ohrid, Macedonia, September 7-10, 2014 Proceedings II</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-10518-5</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">312</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-10517-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arvanitidis, Alexandros</style></author><author><style face="normal" font="default" size="100%">Serafi, Anna</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Tsoumakas, Grigorios</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Calders, Toon</style></author><author><style face="normal" font="default" size="100%">Esposito, Floriana</style></author><author><style face="normal" font="default" size="100%">Hullermeier, Eyke</style></author><author><style face="normal" font="default" size="100%">Meo, Rosa</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Branty: A Social Media Ranking Tool for Brands</style></title><secondary-title><style face="normal" font="default" size="100%">ECML/PKDD (3)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8726</style></volume><pages><style face="normal" font="default" size="100%">432-435</style></pages><isbn><style face="normal" font="default" size="100%">978-3-662-44844-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Karagiannidis, Savvas</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Wei Ding</style></author><author><style face="normal" font="default" size="100%">Washio, Takashi</style></author><author><style face="normal" font="default" size="100%">Xiong, Hui</style></author><author><style face="normal" font="default" size="100%">Karypis, George</style></author><author><style face="normal" font="default" size="100%">Thuraisingham, Bhavani M.</style></author><author><style face="normal" font="default" size="100%">Cook, Diane J.</style></author><author><style face="normal" font="default" size="100%">Wu, Xindong</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Dissimilarity Features in Recommender Systems</style></title><secondary-title><style face="normal" font="default" size="100%">ICDM Workshops</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">825-832</style></pages><isbn><style face="normal" font="default" size="100%">978-0-7695-5109-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Srivastava, Lara</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Alvarez, Federico</style></author><author><style face="normal" font="default" size="100%">Cleary, Frances</style></author><author><style face="normal" font="default" size="100%">Daras, Petros</style></author><author><style face="normal" font="default" size="100%">Domingue, John</style></author><author><style face="normal" font="default" size="100%">Galis, Alex</style></author><author><style face="normal" font="default" size="100%">Garcia, Ana</style></author><author><style face="normal" font="default" size="100%">Gavras, Anastasius</style></author><author><style face="normal" font="default" size="100%">Karnouskos, Stamatis</style></author><author><style face="normal" font="default" size="100%">Krco, Srdjan</style></author><author><style face="normal" font="default" size="100%">Li, Man-Sze</style></author><author><style face="normal" font="default" size="100%">Lotz, Volkmar</style></author><author><style face="normal" font="default" size="100%">Müller, Henning</style></author><author><style face="normal" font="default" size="100%">Salvadori, Elio</style></author><author><style face="normal" font="default" size="100%">Sassen, Anne-Marie</style></author><author><style face="normal" font="default" size="100%">Schaffers, Hans</style></author><author><style face="normal" font="default" size="100%">Stiller, Burkhard</style></author><author><style face="normal" font="default" size="100%">Tselentis, Georgios</style></author><author><style face="normal" font="default" size="100%">Turkama, Petra</style></author><author><style face="normal" font="default" size="100%">Zahariadis, Theodore B.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a Narrative-Aware Design Framework for Smart Urban Environments</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet Assembly</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">7281</style></volume><pages><style face="normal" font="default" size="100%">166-177</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-30240-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anthopoulos, Leonidas G.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Alvarez, Federico</style></author><author><style face="normal" font="default" size="100%">Cleary, Frances</style></author><author><style face="normal" font="default" size="100%">Daras, Petros</style></author><author><style face="normal" font="default" size="100%">Domingue, John</style></author><author><style face="normal" font="default" size="100%">Galis, Alex</style></author><author><style face="normal" font="default" size="100%">Garcia, Ana</style></author><author><style face="normal" font="default" size="100%">Gavras, Anastasius</style></author><author><style face="normal" font="default" size="100%">Karnouskos, Stamatis</style></author><author><style face="normal" font="default" size="100%">Krco, Srdjan</style></author><author><style face="normal" font="default" size="100%">Li, Man-Sze</style></author><author><style face="normal" font="default" size="100%">Lotz, Volkmar</style></author><author><style face="normal" font="default" size="100%">Müller, Henning</style></author><author><style face="normal" font="default" size="100%">Salvadori, Elio</style></author><author><style face="normal" font="default" size="100%">Sassen, Anne-Marie</style></author><author><style face="normal" font="default" size="100%">Schaffers, Hans</style></author><author><style face="normal" font="default" size="100%">Stiller, Burkhard</style></author><author><style face="normal" font="default" size="100%">Tselentis, Georgios</style></author><author><style face="normal" font="default" size="100%">Turkama, Petra</style></author><author><style face="normal" font="default" size="100%">Zahariadis, Theodore B.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Urban Planning and Smart Cities: Interrelations and Reciprocities</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet Assembly</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">7281</style></volume><pages><style face="normal" font="default" size="100%">178-189</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-30240-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Larson, Martha</style></author><author><style face="normal" font="default" size="100%">Rae, Adam</style></author><author><style face="normal" font="default" size="100%">Demarty, Claire-Helene</style></author><author><style face="normal" font="default" size="100%">Kofler, Christoph</style></author><author><style face="normal" font="default" size="100%">Metze, Florian</style></author><author><style face="normal" font="default" size="100%">Troncy, Raphaël</style></author><author><style face="normal" font="default" size="100%">Mezaris, Vasileios</style></author><author><style face="normal" font="default" size="100%">Jones, Gareth J. F.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">CERTH @ MediaEval 2011 Social Event Detection Task</style></title><secondary-title><style face="normal" font="default" size="100%">MediaEval</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">CEUR Workshop Proceedings</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">CEUR-WS.org</style></publisher><volume><style face="normal" font="default" size="100%">807</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper describes the participation of CERTH in the â€śSocialEvent Detection Task @ MediaEval 2011â€ť, which aimsat discovering social events in a large photo collection. Thetask comprises two challenges: (i) identification of soccerevents in the cities of Barcelona and Rome, and (ii) identificationof events taking place in two specific venues. Weadopt an approach that combines spatial and temporal filterswith tag-based location classification models and an ef-ficient photo clustering method. In our best runs, we achieveF-measure and NMI scores of 77.4% and 0.63 respectivelyfor Challenge 1, and 64% and 0.38 for Challenge 2.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tsagkalidou, Katerina</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">D’Mello, Sidney K.</style></author><author><style face="normal" font="default" size="100%">Graesser, Arthur C.</style></author><author><style face="normal" font="default" size="100%">Schuller, Björn</style></author><author><style face="normal" font="default" size="100%">Martin, Jean-Claude</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Emotional Aware Clustering on Micro-blogging Sources</style></title><secondary-title><style face="normal" font="default" size="100%">ACII (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Microblogging services</style></keyword><keyword><style  face="normal" font="default" size="100%">Sentiment analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">web clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6974</style></volume><pages><style face="normal" font="default" size="100%">387-396</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-24599-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Microblogging services have nowadays become a very popularcommunication tool among Internet users. Since millions of usersshare opinions on different aspects of life everyday, microblogging websites are considered as a credible source for exploring both factual and subjective information. This fact has inspired research in the area of automatic sentiment analysis. In this paper we propose an emotional aware clustering approach which performs sentiment analysis of users tweets onthe basis of an emotional dictionary and groups tweets according to the degree they express a specific set of emotions. Experimental evaluations on datasets derived from Twitter prove the efficiency of the proposed approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ul Islam, Saif</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pierson, Jean-Marc</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Kranzlmller, Dieter</style></author><author><style face="normal" font="default" size="100%">Tjoa, A Min</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Utilization-Aware Redirection Policy in CDN: A Case for Energy Conservation</style></title><secondary-title><style face="normal" font="default" size="100%">ICT-GLOW</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CDNs</style></keyword><keyword><style  face="normal" font="default" size="100%">Energy conservation</style></keyword><keyword><style  face="normal" font="default" size="100%">QoE</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6868</style></volume><pages><style face="normal" font="default" size="100%">180-187</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-23446-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Due to the gradual and rapid increase in Information andCommunication Technology (ICT) industry, it is very important to introduce energy efficient techniques and infrastructures in large scale distributed systems. Content Distribution Networks (CDNs) are one of these popular systems which try to make the contents closer to the widely dispersed Internet users. A Content Distribution Network provides its services by using a number of surrogate servers geographicallydistributed in the web. Surrogate servers have the copies of the original contents belonging to the origin server, depending on their storage capacity.When a client requests for some particular contents from a surrogateserver, either this request can be fulfilled directly by it or in case of absence of the requested contents, surrogate servers cooperate with eachother or with the origin server. In this paper, our focus is on the surrogate servers utilization and using it as a parameter to conserve energy in CDNs while trying to maintain an acceptable Quality of Experience (QoE).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Paparrizos, Ioannis K.</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Chignell, Mark H.</style></author><author><style face="normal" font="default" size="100%">Toms, Elaine G.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Automatic extraction of structure, content and usage data statistics of web sites</style></title><secondary-title><style face="normal" font="default" size="100%">HT</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">classification</style></keyword><keyword><style  face="normal" font="default" size="100%">Crawling</style></keyword><keyword><style  face="normal" font="default" size="100%">Structure Content and Usage data</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Mining Algorithm</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">301-302</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-0041-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this paper we present a web mining tool which automaticallyextracts the structure, content and usage data statistics of websites. This work inspired by the fact that web mining consists ofthree axes: web structure mining, web content mining and webusage mining. Each one of those axes is using the structure,content and usage data respectively. The scope is to use thedeveloped multi-thread web crawler as a tool to automaticallyextract from web pages data that are associated with each one ofthose three axes in order afterwards to compute several usefuldescriptive statistics and apply advanced mathematical andstatistical methods. A description of our system is provided aswell as some experimentation results.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Tolias, Giorgos</style></author><author><style face="normal" font="default" size="100%">Kalantidis, Yannis</style></author><author><style face="normal" font="default" size="100%">Mylonas, Phivos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Image clustering through community detection on hybrid image similarity graphs</style></title><secondary-title><style face="normal" font="default" size="100%">ICIP</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">community detection</style></keyword><keyword><style  face="normal" font="default" size="100%">content-based image retrieval</style></keyword><keyword><style  face="normal" font="default" size="100%">image clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">tags</style></keyword><keyword><style  face="normal" font="default" size="100%">visual similarity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">2353-2356</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4244-7994-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The wide adoption of photo sharing applications such as FlickrÂ°cand the massive amounts of user-generated content uploaded to themraises an information overload issue for users. An established technique to overcome such an overload is to cluster images into groups based on their similarity and then use the derived clusters to assistnavigation and browsing of the collection. In this paper, we presenta community detection (i.e. graph-based clustering) approach thatmakes use of both visual and tagging features of images in orderto efficiently extract groups of related images within large imagecollections. Based on experiments we conducted on a dataset comprising publicly available images from FlickrÂ°c, we demonstrate the efficiency of our method, the added value of combining visual andtag features and the utility of the derived clusters for exploring animage collection.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Petridou, Sophia G.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Hacid, Hakim</style></author><author><style face="normal" font="default" size="100%">Benatallah, Boualem</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bailey, James</style></author><author><style face="normal" font="default" size="100%">Maier, David</style></author><author><style face="normal" font="default" size="100%">Schewe, Klaus-Dieter</style></author><author><style face="normal" font="default" size="100%">Thalheim, Bernhard</style></author><author><style face="normal" font="default" size="100%">Wang, Xiaoyang Sean</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Correlating Time-Related Data Sources with Co-clustering</style></title><secondary-title><style face="normal" font="default" size="100%">WISE</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">5175</style></volume><pages><style face="normal" font="default" size="100%">264-279</style></pages><isbn><style face="normal" font="default" size="100%">978-3-540-85480-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;A huge amount of data is circulated and collected every dayon a regular time basis. Given a pair of such datasets, it might be possibleto reveal hidden dependencies between them since the presence of the onedataset elements may influence the elements of the other dataset and viceversa. Furthermore, the impact of these relations may last during a periodinstead of the time point of their co-occurrence. Mining such relationsunder those assumptions is a challenging problem. In this paper, we studytwo time-related datasets whose elements are bilaterally affected overtime. We employ a co-clustering approach to identify groups of similarelements on the basis of two distinct criteria: the direction and durationof their impact. The proposed approach is evaluated using time-relatednews and stockâ€™s market real datasets.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Thomos, Charilaos</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Caching Techniques in CDNs using a Classification Approach</style></title><secondary-title><style face="normal" font="default" size="100%">IJBDCN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">1-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) provide an efficient support for serving â€śresourcehungryâ€ťapplications while minimizing the network impact of content delivery as well asshifting the traffic away from overloaded origin servers. However, their performance gain islimited since the storage space in CDNâ€™s servers is not used optimally. In order to managetheir storage capacity in an efficient way, we integrate caching techniques in CDNs. Thechallenge is to decide which objects would be devoted to caching so as the CDNâ€™s server maybe used both as a replicator and as a proxy server. In this paper we propose a nonlinear nonparametricmodel which classifies the CDNâ€™s server cache into two parts. Through a detailedsimulation environment, we show that the proposed technique can yield significant reductionin user-perceived latency as compared with other heuristic schemes.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Theodosiou, Theodosios</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Non-linear correlation of content and metadata information extracted from biomedical article datasets</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Biomedical Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">202-216</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Theodosiou, Theodosios</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Thomopoulos, G. N.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Gene functional annotation by statistical analysis of biomedical articles</style></title><secondary-title><style face="normal" font="default" size="100%">I. J. Medical Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">8</style></number><volume><style face="normal" font="default" size="100%">76</style></volume><pages><style face="normal" font="default" size="100%">601-613</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petridou, Sophia G.</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Gavrilova, Marina L.</style></author><author><style face="normal" font="default" size="100%">Gervasi, Osvaldo</style></author><author><style face="normal" font="default" size="100%">Kumar, Vipin</style></author><author><style face="normal" font="default" size="100%">Tan, Chih Jeng Kenneth</style></author><author><style face="normal" font="default" size="100%">Taniar, David</style></author><author><style face="normal" font="default" size="100%">LaganĂ , Antonio</style></author><author><style face="normal" font="default" size="100%">Mun, Youngsong</style></author><author><style face="normal" font="default" size="100%">Choo, Hyunseung</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Divergence-Oriented Approach for Web Users Clustering</style></title><secondary-title><style face="normal" font="default" size="100%">ICCSA (2)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3981</style></volume><pages><style face="normal" font="default" size="100%">1229-1238</style></pages><isbn><style face="normal" font="default" size="100%">3-540-34072-6</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Clustering web users based on their access patterns is a quite significanttask in Web Usage Mining. Further to clustering it is important to evaluatethe resulted clusters in order to choose the best clustering for a particular framework.This paper examines the usage of Kullback-Leibler divergence, aninformation theoretic distance, in conjuction with the k-means clusteringalgorithm. It compares KL-divergence with other well known distance measures(Euclidean, Standardized Euclidean and Manhattan) and evaluates clusteringresults using both objective functionâ€™s value and Davies-Bouldin index.Since it is imperative to assess whether the results of a clustering process aresusceptible to noise, especially in noisy environments such as Web environment,our approach takes the impact of noise into account. The clusters obtainedwith KL approach seem to be superior to those obtained with the otherdistance measures in case our data have been corrupted by noise.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Thomos, Charilaos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Desai, Bipin C.</style></author><author><style face="normal" font="default" size="100%">Gupta, Shyam K.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A similarity based approach for integrated Web caching and content replication in CDNs</style></title><secondary-title><style face="normal" font="default" size="100%">IDEAS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">239-242</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Web caching and content replication techniques emergedto solve performance problems related to the Web. We proposea generic non-parametric heuristic method that integratesboth techniques under a CDN. We provide experimentationshowing that our method outperforms the so farseparate implementations of Web caching and content replication.Moreover, we show that the performance improvementcompared with an existing algorithm is significant. Wetest all these techniques in a simulation environment undera flash crowd event and a workload of a typical lightweightedCDN operation.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Theodosiou, Theodosios</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Functional Annotation of Genes through Statistical Analysis of Biomedical Articles</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA Workshops</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">585-589</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2424-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One of the most elaborate and important tasks inbiology is the functional annotation of genes.Biologists have developed standardized and structuredvocabularies, called bio-ontologies, to assist them indescribing the different functions. A critical issue inthe assignment of functions to genes is the utilizationof knowledge from published biomedical articles. Thepurpose of this paper is to present a unified andcomprehensive statistical methodology for functionallyannotating genes using biomedical literature.Specifically, classification models are built using thediscriminant analysis method while validation,analysis and interpretation of the results is based ongraphical methods and various performance metricsand techniques. The general conclusions from thestudy are very promising, in the sense that theproposed methodology not only performs well in theassignment of functions to genes, but also providesuseful and interpretable results regarding thediscriminating power of certain keywords in the texts.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bertino, Elisa</style></author><author><style face="normal" font="default" size="100%">Kamra, Ashish</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intrusion Detection in RBAC-administered Databases</style></title><secondary-title><style face="normal" font="default" size="100%">ACSAC</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">170-182</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2461-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;A considerable effort has been recently devoted to thedevelopment of Database Management Systems (DBMS)which guarantee high assurance security and privacy. Animportant component of any strong security solution is representedby intrusion detection (ID) systems, able to detectanomalous behavior by applications and users. To date,however, there have been very few ID mechanisms specificallytailored to database systems. In this paper, we proposesuch a mechanism. The approach we propose to IDis based on mining database traces stored in log files. Theresult of the mining process is used to form user profilesthat can model normal behavior and identify intruders. Anadditional feature of our approach is that we couple ourmechanism with Role Based Access Control (RBAC). Undera RBAC system permissions are associated with roles, usuallygrouping several users, rather than with single users.Our ID system is able to determine role intruders, that is,individuals that while holding a specific role, have a behaviordifferent from the normal behavior of the role. Animportant advantage of providing an ID mechanism specifi-cally tailored to databases is that it can also be used to protectagainst insider threats. Furthermore, the use of rolesmakes our approach usable even for databases with largeuser population. Our preliminary experimental evaluationon both real and synthetic database traces show that ourmethods work well in practical situations.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Murray, Neil V.</style></author><author><style face="normal" font="default" size="100%">Ras, Zbigniew W.</style></author><author><style face="normal" font="default" size="100%">Tsumoto, Shusaku</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Model-Based Cluster Analysis for Web Users Sessions</style></title><secondary-title><style face="normal" font="default" size="100%">ISMIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Model-Based Cluster Analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3488</style></volume><pages><style face="normal" font="default" size="100%">219-227</style></pages><isbn><style face="normal" font="default" size="100%">3-540-25878-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One of the main issues in Web usage mining is the discovery of patternsin the navigational behavior of Web users. Standard approaches, such as clusteringof usersâ€™sessions and discovering association rules or frequent navigational paths,do not generally allow to characterize or quantify the unobservable factors that leadto common navigational patterns. Therefore, it is necessary to develop techniquesthat can discover hidden and useful relationships among users as well as betweenusers and Web objects.Correspondence Analysis(CO-AN) is particularly useful inthis context, since it can uncover meaningful associations among users and pages.We present a model-based cluster analysis for Web users sessions including anovel visualization and interpretation approach which is based on CO-AN.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Current Trends in Database Technology â€“ EDBT 2004 Workshops, EDBT 2004 Workshops PhD, DataX, PIM, P2P&amp;DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004, Revised Selected Papers</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Dalamagas, Theodore</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">An Overview of Web Data Clustering Practices</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Web Data Clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><pages><style face="normal" font="default" size="100%">597-606</style></pages><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Clustering is a challenging topic in the area of Web data management.Various forms of clustering are required in a wide range of applications, includingfinding mirrored Web pages, detecting copyright violations, and reporting searchresults in a structured way. Clustering can either be performed once offline, (independentlyto search queries), or online (on the results of search queries). Importantefforts have focused on mining Web access logs and to cluster search engine resultson the fly. Online methods based on link structure and text have been appliedsuccessfully to finding pages on related topics. This paper presents an overview ofthe most popular methodologies and implementations in terms of clustering eitherWeb users or Web sources and presents a survey about current status and futuretrends in clustering employed over the Web.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A simulated annealing approach for multimedia data placement</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Systems and Software</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">73</style></volume><pages><style face="normal" font="default" size="100%">467-480</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Tsoukalas, Ioannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">XML-Based Revocation and Delegation in a Distributed Environment</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><pages><style face="normal" font="default" size="100%">299-308</style></pages><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rapid increase on the circulation of data over the web has highlightedthe need for distributed storage of Internet-accessible information due tothe rapid increase on the circulation of data over the web. Thus, access controlmechanisms should also be distributed in order to protect them effectively. A recentidea in the access control theory is the delegation and revocation of rights,i.e. the passing over of one clients rights to the other and vice versa. Here, wepropose an XML-based distributed delegation module which can be integratedinto a distributed role-based access control mechanism protecting networks. Theidea of X.509v3 certificates is used for the transfer of authorization informationreferring to a client. The modules are XML-based and all of the associated datastructures are expressed through Document Type Definitions (DTDs).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Bertino, Elisa</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hierarchical data placement for navigational multimedia applications</style></title><secondary-title><style face="normal" font="default" size="100%">Data Knowl. Eng.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">44</style></volume><pages><style face="normal" font="default" size="100%">49-80</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Zhou, Xiaofang</style></author><author><style face="normal" font="default" size="100%">Zhang, Yanchun</style></author><author><style face="normal" font="default" size="100%">Orlowska, Maria E.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Knowledge Representation, Ontologies, and the Semantic Web</style></title><secondary-title><style face="normal" font="default" size="100%">APWeb</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">2642</style></volume><pages><style face="normal" font="default" size="100%">382-387</style></pages><isbn><style face="normal" font="default" size="100%">3-540-02354-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A unified representation for web data and web resources, isabsolutely necessary in nowdays large scale Internet data managementsystems. This representation will allow for the machines to meaningfullyprocess the available information and provide semantically correct answersto imposed queries. Ontologies are expected to play an importantrole towards this direction of web technology which defines the so called,Semantic Web. The goal of this paper is to provide an overview of theKnowledge Representation (KR) techniques and languages that can beused as standards in the Semantic Web.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aref, Walid G.</style></author><author><style face="normal" font="default" size="100%">Catlin, Ann Christine</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author><author><style face="normal" font="default" size="100%">Fan, Jianping</style></author><author><style face="normal" font="default" size="100%">Guo, J.</style></author><author><style face="normal" font="default" size="100%">Hammad, Moustafa A.</style></author><author><style face="normal" font="default" size="100%">Ilyas, Ihab F.</style></author><author><style face="normal" font="default" size="100%">Marzouk, Mirette S.</style></author><author><style face="normal" font="default" size="100%">Prabhakar, Sunil</style></author><author><style face="normal" font="default" size="100%">Rezgui, Abdelmounaam</style></author><author><style face="normal" font="default" size="100%">Teoh, S.</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Tu, Yi-Cheng</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Zhu, Xingquan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Agrawal, Rakesh</style></author><author><style face="normal" font="default" size="100%">Dittrich, Klaus R.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Distributed Database Server for Continuous Media</style></title><secondary-title><style face="normal" font="default" size="100%">ICDE</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">490-491</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-1531-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In our project, we adopt a new approach for handlingvideo data. We view the video as a well-defined datatype with its own description, parameters, and applicablemethods. The system is based on PREDATOR, the opensource object relational DBMS. PREDATOR uses Shoreas the underlying storage manager (SM). Supporting videooperations (storing, searching by content, and streaming)and new query types (query by examples and multi-featuressimilarity search) requires major changes in many ofthe traditional system components. More specifically,the storage and buffer manager will have to deal withhuge volumes of data with real time constraints. Queryprocessing has to consider the video methods and operatorsin generating, optimizing and executing query plans.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Video data storage policies: an access frequency based approach</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Electrical Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">447-464</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multimedia Data Storage and Representation Issues on Tertiary Storage Subssystems: An Overview</style></title><secondary-title><style face="normal" font="default" size="100%">Operating Systems Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">61-77</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Querying XML with Constraints</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Internet Computing (1)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Query Languages Rules</style></keyword><keyword><style  face="normal" font="default" size="100%">xml</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><pages><style face="normal" font="default" size="100%">171-177</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;XML is a language for the description of structured documents and data. It is on the way to become the new standard for data exchange, publishing, and developing intelligent Web agents. XML is based on the concept of documents composed of a series of entities (i.e., objects). Each entity can contain one or more logical elements. Each of these elements can have certain attributes (properties) that describe the way in which it is to be processed. XML provides a formal syntax for describing the relationships between the entities, elements and attributes that make up an XML document. In this paper, we introduce a framework for querying XML databases by specifying ordering constraints over documents.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Wagner, Roland</style></author><author><style face="normal" font="default" size="100%">Thoma, Helmut</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Impact of Seeking in Partial Match Retrieval</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA Workshop</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">432-437</style></pages><isbn><style face="normal" font="default" size="100%">0-8186-7662-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In the pastthe issue of partial match query satisfaction has been investigated inorder to establish allocation schemes minimizing the number of accessed disk pages. Inthe present workwe extend the problem by studying the impact of the seeking duringpartial match query satisfaction. The physical location of resulting pages is the newaspect studied here by considering the number and the sparseness of cylinders holding theresulting pages . Lower and upper seek time boundsas well as the average behavior ofthe seek time are calculated by assuming some real figures of specific modern disk systemdevices  The main conclusion is that the seek time is a fact or affecting the partial matchquery response time and needs to be included in the overall performance measuring.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Revell, Norman</style></author><author><style face="normal" font="default" size="100%">Tjoa, A Min</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Partial Match Retrieval in Two-Headed Disk Systems</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">978</style></volume><pages><style face="normal" font="default" size="100%">594-603</style></pages><isbn><style face="normal" font="default" size="100%">3-540-60303-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>