<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antigoni-Maria Founta</style></author><author><style face="normal" font="default" size="100%">Constantinos Djouvas</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Ilias Leontiadis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Michael Sirivianos</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior</style></title><tertiary-title><style face="normal" font="default" size="100%">ICWSM-18</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">AAAI</style></publisher><pub-location><style face="normal" font="default" size="100%">Stanford, California</style></pub-location><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms. In fact, past scientific work focused on studying these forms in popular media, such as Facebook and Twitter. Building on such work, we present an 8-month study of the various forms of abusive behavior on Twitter, in a holistic fashion. Departing from past work, we examine a wide variety of labeling schemes, which cover different forms of abusive behavior, at the same time. We propose an incremental and iterative methodology, that utilizes the power of crowdsourcing to annotate a large scale collection of tweets with a set of abuse-related labels. In fact, by applying our methodology including statistical analysis for label merging or elimination, we identify a reduced but robust set of labels. Finally, we offer a first overview and findings of our collected and annotated dataset of 100 thousand tweets, which we make publicly available for further scientific exploration.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moustaka, Vaia</style></author><author><style face="normal" font="default" size="100%">Zenonas Theodosiou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Anastasis Kounoudes</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Smart Cities at Risk!: Privacy and Security Borderlines  from Social Networking in Cities</style></title><tertiary-title><style face="normal" font="default" size="100%">WWW ’18 Companion </style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">online social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy threats</style></keyword><keyword><style  face="normal" font="default" size="100%">security threats</style></keyword><keyword><style  face="normal" font="default" size="100%">smart cities</style></keyword><keyword><style  face="normal" font="default" size="100%">smart living</style></keyword><keyword><style  face="normal" font="default" size="100%">smart people</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Lyon, France</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p class=&quot;rtejustify&quot;&gt;As smart cities infrastructures mature, data becomes a valuable asset which can radically improve city services and tools. Registration, acquisition and utilization of data, which will be transformed into smart services, are becoming more necessary than ever. Online social networks with their enormous momentum are one of the main sources of urban data offering heterogeneous real-time data at a minimal cost. However, various types of attacks often appear on them, which risk users' privacy and affect their online trust. The purpose of this article is to investigate how risks on online social networks affect smart cities and study the differences between privacy and security threats with regard to smart people and smart living dimensions.&lt;/p&gt;
</style></abstract><orig-pub><style face="normal" font="default" size="100%">WWW ’18 Companion </style></orig-pub></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vaia Moustaka</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Leonidas G. Anthopoulos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CityDNA: Smart City Dimensions' Correlations for Identifying Urban Profile</style></title><secondary-title><style face="normal" font="default" size="100%">WWW (Companion Volume)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">city boroughs</style></keyword><keyword><style  face="normal" font="default" size="100%">city profiles</style></keyword><keyword><style  face="normal" font="default" size="100%">DNA structure</style></keyword><keyword><style  face="normal" font="default" size="100%">Greater London areas</style></keyword><keyword><style  face="normal" font="default" size="100%">smart cities</style></keyword><keyword><style  face="normal" font="default" size="100%">smart economy and mobility</style></keyword><keyword><style  face="normal" font="default" size="100%">smart mobility</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1145/3041021.3054714</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Perth, Australia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;div&gt;Smart cities evolve over multiple themes and areas with the development of cyber-physical systems and smart services that address several urban issues regarding economy, mobility,&amp;nbsp; environment, people, living and governance. This evolution has bliged the definition of several conceptualization and evaluation models, which respect alternative smart city perspectives. This work proposes smart city profiling with the introduction of the “CityDNA” model, ccording which, smart city’s dimensions’ relevance can be captured and visualized. Based on this model, a smart city’s profile can be defined and characterized, under a simple comprehensive view of local needs and challenges. A particular smart city scenario is highlighted as a proof of concept for CityDNA and future design and implementation ideas are identified and justified.&lt;/div&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Joan Serrà</style></author><author><style face="normal" font="default" size="100%">Ilias Leontiadis</style></author><author><style face="normal" font="default" size="100%">Dimitris Spathis</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Class-based Prediction Errors to Categorize Text with Out-of-vocabulary Words</style></title><tertiary-title><style face="normal" font="default" size="100%">ALW1'17</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><pub-location><style face="normal" font="default" size="100%">Vancouver, Canada</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Common approaches to text categorization essentially rely either on n-gram counts or on word embeddings. This presents important difficulties in highly dynamic or quickly-interacting environments, where the appearance of new words and/or varied misspellings is the norm. A paradigmatic example of this situation is abusive online behavior, with social networks and media platforms struggling to effectively combat uncommon or non-blacklisted hate words. To better deal with these issues in those fast-paced environments, we propose using the error signal of class-based language models as input to text classification algorithms. In particular, we train a next-character prediction model for any given class, and then exploit the error of such class-based models to inform a neural network classifier. This way, we shift from the ability to describe seen documents to the ability to predict unseen content. Preliminary studies using out-of-vocabulary splits from abusive tweet data show promising results, outperforming competitive text categorization strategies by 4–11%.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Emiliano De Cristofaro</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Detecting Aggressors and Bullies on Twitter</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 26th International Conference on World Wide Web Companion</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">WWW '17 Companion</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crowdsourcing</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-aggression</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberbullying</style></keyword><keyword><style  face="normal" font="default" size="100%">Twitter</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dl.acm.org/citation.cfm?id=3054211</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Perth, Australia</style></pub-location><pages><style face="normal" font="default" size="100%">767--768</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Online social networks constitute an integral part of people's every day social activity and the existence of aggressive and bullying phenomena in such spaces is inevitable. In this work, we analyze user behavior on Twitter in an effort to detect cyberbullies and cuber-aggressors by considering specific attributes of their online activity using machine learning classifiers.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Detecting Variation of Emotions in Online Activities</style></title><secondary-title><style face="normal" font="default" size="100%">Expert Systems with Applications</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Emotion detection</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid process</style></keyword><keyword><style  face="normal" font="default" size="100%">Lexicon-based approach</style></keyword><keyword><style  face="normal" font="default" size="100%">Machine learning</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S0957417417305213</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">89</style></volume><pages><style face="normal" font="default" size="100%">318 - 332</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Online text sources form evolving large scale data repositories out of which valuable knowledge about human emotions can be derived. Beyond the primary emotions which refer to the global emotional signals, deeper understanding of a wider spectrum of emotions is important to detect online public views and attitudes. The present work is motivated by the need to test and provide a system that categorizes emotion in online activities. Such a system can be beneficial for online services, companies recommendations, and social support communities. The main contributions of this work are to: (a) detect primary emotions, social ones, and those that characterize general affective states from online text sources, (b) compare and validate different emotional analysis processes to highlight the most efficient, and (c) provide a proof of concept case study to monitor and validate online activity, both explicitly and implicitly. The proposed approaches are tested on three datasets collected from different sources, i.e., news agencies, Twitter, and Facebook, and on different languages, i.e., English and Greek. Study results demonstrate that the methodologies at hand succeed to detect a wider spectrum of emotions out of text sources.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vasiliki Gkatziaki</style></author><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">DynamiCITY : Revealing city dynamics from citizens social media broadcasts</style></title><secondary-title><style face="normal" font="default" size="100%">Information Systems</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crowdsourcing</style></keyword><keyword><style  face="normal" font="default" size="100%">Data Mining</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart City Applications</style></keyword><keyword><style  face="normal" font="default" size="100%">Social Data Mining</style></keyword><keyword><style  face="normal" font="default" size="100%">Urban Dynamics</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S0306437917300650</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">-</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nikolaos Tsigilis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Experience of emotion in face to face and computer-mediated social interactions: An event sampling study</style></title><secondary-title><style face="normal" font="default" size="100%">Computers in Human Behavior</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Computer-mediated communication</style></keyword><keyword><style  face="normal" font="default" size="100%">Emotion</style></keyword><keyword><style  face="normal" font="default" size="100%">FtF</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">Social interaction</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S0747563217304557</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">76</style></volume><pages><style face="normal" font="default" size="100%">287 - 293</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The present study compared the experience of emotion in social interactions that take place face to face (FtF), co-presently, and those that take place online, in computer-mediated communications (CMC). For a period of ten days participants reported how intensely they experienced positive and negative emotions in CMC and in FtF interactions they had with persons from their social network. Results from factor analyses discerned a three factor emotion structure (positive, negative, and anxious emotions) that was largely shared between CMC and FtF social interactions. Multilevel analyses of emotion across modes of interaction found that in FtF social encounters participants experienced more positive and less negative emotion and higher satisfaction than in CMC; there was no difference in anxious emotion. Positive, but not negative emotions or anxiety partially mediated levels of satisfaction differences between interactions in CMC and those taking place FtF. The results point to similarities and differences in emotion experience in FtF and CMC, underlining in particular the affiliative function of positive emotion in peoples' encounters.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Emiliano De Cristofaro</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter</style></title><tertiary-title><style face="normal" font="default" size="100%">HT '17</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Prague, Czech Republic</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Over the past few years, online bullying and aggression have become increasingly prominent, and manifested in many different forms on social media. However, there is little work analyzing the characteristics of abusive users and what distinguishes them from typical social media users. In this paper, we start addressing this gap by analyzing tweets containing a great amount of abusiveness. We focus on a Twitter dataset revolving around the Gamergate controversy, which led to many incidents of cyberbullying and cyberaggression on various gaming and social media platforms. We study the properties of the users tweeting about Gamergate, the content they post, and the differences in their behavior compared to typical Twitter users.&lt;/p&gt;

&lt;p&gt;We find that while their tweets are often seemingly about aggressive and hateful subjects, ``Gamergaters'' do not exhibit common expressions of online anger, and in fact primarily differ from typical users in that their tweets are less joyful. They are also more engaged than typical Twitter users, which is an indication as to how and why this controversy is still ongoing. Surprisingly, we find that Gamergaters are less likely to be suspended by Twitter, thus we analyze their properties to identify differences from typical users and what may have led to their suspension. We perform an unsupervised machine learning analysis to detect clusters of users who, though currently active, could be considered for suspension since they exhibit similar behaviors with suspended users. Finally, we confirm the usefulness of our analyzed features by emulating the Twitter suspension mechanism with a supervised learning method, achieving very good precision and recall.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Emiliano De Cristofaro</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Mean Birds: Detecting Aggression and Bullying on Twitter</style></title><tertiary-title><style face="normal" font="default" size="100%">WebSci '17</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://arxiv.org/abs/1702.06877</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Troy, NY, USA</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In recent years, bullying and aggression against users on social media have grown significantly, causing serious consequences to victims of all demographics. In particular, cyberbullying affects more than half of young social media users worldwide, and has also led to teenage suicides, prompted by prolonged and/or coordinated digital harassment. Nonetheless, tools and technologies for understanding and mitigating it are scarce and mostly ineffective. In this paper, we present a principled and scalable approach to detect bullying and aggressive behavior on Twitter. We propose a robust methodology for extracting text, user, and network-based attributes, studying the properties of cyberbullies and aggressors, and what features distinguish them from regular users. We find that bully users post less, participate in fewer online communities, and are less popular than normal users, while aggressors are quite popular and tend to include more negativity in their posts. We evaluate our methodology using a corpus of 1.6M tweets posted over 3 months, and show that machine learning classification algorithms can accurately detect users exhibiting bullying and aggressive behavior, achieving over 90% AUC.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Emiliano De Cristofaro</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 26th International Conference on World Wide Web Companion</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">WWW '17 Companion</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dl.acm.org/citation.cfm?id=3053890</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Perth, Australia</style></pub-location><pages><style face="normal" font="default" size="100%">1285-1290</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we study the Gamergate controversy. Started in August 2014 in the online gaming world, it quickly spread across various social networking platforms, ultimately leading to many incidents of cyberbullying and cyberaggression. We focus on Twitter, presenting a measurement study of a dataset of 340k unique users and 1.6M tweets to study the properties of these users, the content they post, and how they differ from random Twitter users. We find that users involved in this &quot;Twitter war&quot; tend to have more friends and followers, are generally more engaged and post tweets with negative sentiment, less joy, and more hate than random users. We also perform preliminary measurements on how the Twitter suspension mechanism deals with such abusive behaviors. While we focus on Gamergate, our methodology to collect and analyze tweets related to aggressive and bullying activities is of independent interest.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Manolis G. Vozalis</style></author><author><style face="normal" font="default" size="100%">Konstantinos Diamantaras</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">George Sarigiannidis</style></author><author><style face="normal" font="default" size="100%">Konstantinos Ch. Chatzisavvas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sentiment analysis leveraging emotions and word embeddings</style></title><secondary-title><style face="normal" font="default" size="100%">Expert Systems with Applications</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Online user reviews</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S095741741630584X</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">69</style></volume><pages><style face="normal" font="default" size="100%">214 - 224</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Abstract Sentiment analysis and opinion mining are valuable for extraction of useful subjective information out of text documents. These tasks have become of great importance, especially for business and marketing professionals, since online posted products and services reviews impact markets and consumers shifts. This work is motivated by the fact that automating retrieval and detection of sentiments expressed for certain products and services embeds complex processes and pose research challenges, due to the textual phenomena and the language specific expression variations. This paper proposes a fast, flexible, generic methodology for sentiment detection out of textual snippets which express people’s opinions in different languages. The proposed methodology adopts a machine learning approach with which textual documents are represented by vectors and are used for training a polarity classification model. Several documents’ vector representation approaches have been studied, including lexicon-based, word embedding-based and hybrid vectorizations. The competence of these feature representations for the sentiment classification task is assessed through experiments on four datasets containing online user reviews in both Greek and English languages, in order to represent high and weak inflection language groups. The proposed methodology requires minimal computational resources, thus, it might have impact in real world scenarios where limited resources is the case.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Ioannis Dematis</style></author><author><style face="normal" font="default" size="100%">Athanasios Tolikas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Vol4All: A Volunteering Platform to Drive Innovation and Citizens Empowerment</style></title><secondary-title><style face="normal" font="default" size="100%">WWW (Companion Volume)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1145/3041021.3054712</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Perth, Australia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;div&gt;Cities nowadays have embraced the digital era and continuously strive to merge technological advancements with the benefit of their social capital and communities. A major quest is to place humans and their competences at the center of the efforts towards sustainable and smart cities. Citizen societies have widely accepted and practiced volunteering for years now and already a great number of volunteering actions and networks have flourished, in support and aid to several communities in need. Most popular volunteering networks have greatly&amp;nbsp; capitalized on the rapid advance and spread of Internet and Web technologies, which are ideal for coordinating and monitoring of the volunteering tasks. The Vol4All platform advances this&amp;nbsp; trend, by building on extended Internet technologies in its aim to support citizens’ activism&amp;nbsp; towards novel urban social innovation. Vol4All enables ideas exchange and crowdsourcing by facilitating citizens’ involvement in the realization of community projects. Volunteering actors (initiators, participants, stakeholders) can easily interact via the Vol4All platform which enables volunteering opportunities dynamic sharing, evolution and monitoring. Such opportunities can be initiated by any authorized stakeholders, with a publicly open interface which allows citizens commitment assessment, best practices highlights, and a gamification style of interaction such that volunteering becomes a societal and growth asset.&lt;/div&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Stefanos Antaris</style></author><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cloud-based architectures for Geo-located blogosphere dynamics detection</style></title><secondary-title><style face="normal" font="default" size="100%">Smart Cities</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cloud service deployment</style></keyword><keyword><style  face="normal" font="default" size="100%">geo-located blogosphere dynamics</style></keyword><keyword><style  face="normal" font="default" size="100%">social geo-located data clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks and wisdom of the crowd</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social networking data threads emerge rapidly and such crowd-driven big data streams are valuable for detecting trends and opinions. For such analytics, conventional data mining approaches are challenged by both high-dimensionality and scalability concerns. Here, we leverage on the Cloud4Trends framework, for collecting and analyzing geo-located microblogging content, partitioned into clusters under cloud-based infrastructures. Different cloud architectures are proposed to offer flexible solutions for geo-located data analytics, with emphasis on incremental trend analysis. The proposed architectures are largely based on a set of service modules which facilitate the deployment of the experimentation on Cloud infrastructures. Several experimentation remarks are highlighted to showcase the requirements and testing capabilities of different cloud computing settings.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antonia Gogoglou</style></author><author><style face="normal" font="default" size="100%">Zenonas Theodosiou</style></author><author><style face="normal" font="default" size="100%">Tasos Kounoudes</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Early Malicious Activity Discovery in Microblogs by Social Bridges Detection</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">16th International Symposium on Signal Processing and Information Technology</style></publisher><pub-location><style face="normal" font="default" size="100%">Limassol, Cyprus</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the emerging and intense use of Online Social Networks (OSNs) amongst young children and teenagers (youngters), safe networking and socializing on the Web has faced extensive scrutiny. Content and interactions which are considered safe for adult OSN users, might embed potentially threatening and malicious information when it comes to underage users. This work is motivated by the strong need to safeguard youngsters OSNs experience such that they can be empowered and aware. The topology of a graph is studied towards detecting the so called social bridges, i.e. the group(s) of malicious users and their supporters, who have links and ties to both honest and malicious user communities. A graph-topology based classification scheme is proposed to detect such bridge linkages which are suspicious for threatening youngsters networking vulnerability. The proposed scheme is validated by a Twitter network, at which potentially dangerous users are identified based on their Twitter connections. The achieved performance is higher compared to previous efforts, despite the increased complexity due to the variety of groups identified as malicious.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Paschalis Korosoglou</style></author><author><style face="normal" font="default" size="100%">Pavlos Daoglou</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A multi-layer software architecture framework for adaptive real-time analytics</style></title><secondary-title><style face="normal" font="default" size="100%">Workshop on Real-time &amp; Stream Analytics in Big Data</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">big data analytics</style></keyword><keyword><style  face="normal" font="default" size="100%">cloud based services</style></keyword><keyword><style  face="normal" font="default" size="100%">real time data management</style></keyword><keyword><style  face="normal" font="default" size="100%">software architecutures</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><pub-location><style face="normal" font="default" size="100%">Washington D.C.</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Highly distributed applications dominate today’s software industry posing new challenges for novel software architectures capable of supporting real time processing and analytics. The proposed framework, so called REAλICS, is motivated by the fact that the demand for aggregating current and past big data streams requires new software methodologies, platforms and services. The proposed framework is designed to tackle with data intensive problems in real time environments, via services built dynamically under a fully scalable and elastic Lambda based architecture. REAλICS proposes a multi-layer software platform, based on the lambda architecture paradigm, for aggregating and synchronizing real time and batch processing. The proposed software layers and adaptive components support quality of experience, along with community driven software development. Flexibility and elasticity are targeted by hiding the complexity of bootstrapping and maintaining a multi level architecture, upon which the end user can drive queries over input data streams. REAλICS proposes a flexible and extensible software architecture that can capture&lt;br /&gt;
users preference at the front-end and adapHighly distributed applications dominate today’s software industry posing new challenges for novel software architectures capable of supporting real time processing and analytics. The proposed framework, so called REAλICS, is motivated by the fact that the demand for aggregating current and past big data streams requires new software methodologies, platforms and services. The proposed framework is designed to tackle with data intensive problems in real time environments, via services built dynamically under a fully scalable and elastic Lambda based architecture. REAλICS proposes a multi-layer software platform, based on the lambda architecture paradigm, for aggregating and synchronizing real time and batch&lt;br /&gt;
processing. The proposed software layers and adaptive components support quality of experience, along with community&lt;br /&gt;
driven software development. Flexibility and elasticity are targeted by hiding the complexity of bootstrapping and maintaining a multi level architecture, upon which the end user can drive queries over input data streams. REAλICS proposes a flexible and extensible software architecture that can capture users preference at the front-end and adapt the appropriate distributed technologies and processes at the back-end. Such a model enables real time analytics in large-scale data driven cloud-based systems.t the appropriate distributed technologies and processes at the back-end. Such a model enables real time analytics in large-scale data driven cloud-based systems.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed Reda Bouadjenek</style></author><author><style face="normal" font="default" size="100%">Hakim Hacid</style></author><author><style face="normal" font="default" size="100%">Mokrane Bouzeghoub</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">PerSaDoR: Personalized social document representation for improving web search</style></title><secondary-title><style face="normal" font="default" size="100%">Information Sciences</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Social recommendation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S0020025516305278</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">369</style></volume><pages><style face="normal" font="default" size="100%">614 - 633</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Abstract In this paper, we discuss a contribution towards the integration of social information in the index structure of an {IR} system. Since each user has his/her own understanding and point of view of a given document, we propose an approach in which the index model provides a Personalized Social Document Representation (PerSaDoR) of each document per user based on his/her activities in a social tagging system. The proposed approach relies on matrix factorization to compute the PerSaDoR of documents that match a query, at query time. The complexity analysis shows that our approach scales linearly with the number of documents that match the query, and thus, it can scale to very large datasets. PerSaDoR has been also intensively evaluated by an offline study and by a user survey operated on a large public dataset from delicious showing significant benefits for personalized search compared to state of the art methods.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Angeliki Milonaki</style></author><author><style face="normal" font="default" size="100%">Ioannis Gkrosdanis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Smart Cities Tales and Trails</style></title><secondary-title><style face="normal" font="default" size="100%">Internet Science - Third International Conference, INSCI 2016, Florence, Italy, September 12-14, 2016, Proceedings</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-45982-0_24</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Evangelos Chatzicharalampous</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Exploriometer: Leveraging Personality Traits for Coverage and Diversity Aware Recommendations</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://doi.acm.org/10.1145/2740908.2742140</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Harvesting Opinions and Emotions from Social Media Textual Resources</style></title><secondary-title><style face="normal" font="default" size="100%">Internet Computing, IEEE</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Adaptation models</style></keyword><keyword><style  face="normal" font="default" size="100%">Analytical models</style></keyword><keyword><style  face="normal" font="default" size="100%">Filtering</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet/Web technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">Media</style></keyword><keyword><style  face="normal" font="default" size="100%">Sentiment analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Text processing</style></keyword><keyword><style  face="normal" font="default" size="100%">textual resources</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 2.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">46-50</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Thanassis Tiropanis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Laura Sartori</style></author><author><style face="normal" font="default" size="100%">Pete Burnap</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Internet Science - Second International Conference, INSCI 2015, Brussels, Belgium, May 27-29, 2015, Proceedings</style></title><secondary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-18609-2</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">9089</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-18608-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Passalis, Nikolaos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Sanjay Kumar Madria</style></author><author><style face="normal" font="default" size="100%">Hara, Takahiro</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">MultiSpot: Spotting Sentiments with Semantic Aware Multilevel Cascaded Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Big Data Analytics and Knowledge Discovery</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Multilevel features</style></keyword><keyword><style  face="normal" font="default" size="100%">Sentiment detection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-22729-0_26</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer International Publishing</style></publisher><volume><style face="normal" font="default" size="100%">9263</style></volume><pages><style face="normal" font="default" size="100%">337-350</style></pages><isbn><style face="normal" font="default" size="100%">978-3-319-22728-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Neil Shah</style></author><author><style face="normal" font="default" size="100%">Alex Beutel</style></author><author><style face="normal" font="default" size="100%">Christos Faloutsos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ND-SYNC: Detecting Synchronized Fraud Activities</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Knowledge Discovery and Data Mining, 19th Pacific-Asia Conference, PAKDD 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part II</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-18032-8_16</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">201â€“214</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Nick Bassiliades</style></author><author><style face="normal" font="default" size="100%">Mirjana Ivanovic</style></author><author><style face="normal" font="default" size="100%">Margita Kon-Popovska</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author><author><style face="normal" font="default" size="100%">Themis Palpanas</style></author><author><style face="normal" font="default" size="100%">Goce Trajcevski</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in Database and Information Systems II - Selected papers of the 18th East European Conference on Advances in Databases and Information Systems and Associated Satellite Events, ADBIS 2014 Ohrid, Macedonia, September 7-10, 2014 Proceedings II</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-10518-5</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">312</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-10517-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Neil Shah</style></author><author><style face="normal" font="default" size="100%">Christos Faloutsos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Cao, Tru</style></author><author><style face="normal" font="default" size="100%">Lim, Ee-Peng</style></author><author><style face="normal" font="default" size="100%">Zhou, Zhi-Hua</style></author><author><style face="normal" font="default" size="100%">Ho, Tu-Bao</style></author><author><style face="normal" font="default" size="100%">Cheung, David</style></author><author><style face="normal" font="default" size="100%">Motoda, Hiroshi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Retweeting Activity on Twitter: Signs of Deception</style></title><secondary-title><style face="normal" font="default" size="100%">PAKDD (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">9077</style></volume><pages><style face="normal" font="default" size="100%">122-134</style></pages><isbn><style face="normal" font="default" size="100%">978-3-319-18037-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">User communities evolution in microblogs: A public awareness barometer for real world events</style></title><secondary-title><style face="normal" font="default" size="100%">World Wide Web</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer US</style></publisher><pages><style face="normal" font="default" size="100%">1269-1299</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In social media, users' interactions are affected by real-world events which influence emergence and shifts of opinions and topics. Interactions around an event-related topic can be captured in a weighted network, while identification of connectivity and intensity patterns can improve understanding of users' interest on the topic. Community detection is studied here as a means to reveal groups of social media users with common interaction patterns in such networks. The proposed community detection approach identifies communities exploiting both structural properties and intensity patterns, while dynamics of communities' evolution around an event are revealed based on an iterative community detection and mapping scheme. We investigate the importance of considering interactions' intensity for community detection via a benchmarking process on synthetic graphs and propose a generic framework for: i) modeling user interactions, ii) identifying static and evolving communities around events, iii) extracting quantitative and qualitative measurements from the communities' timeline, iv) leveraging measurements to understand the events' impact. Two real-world case studies based on Twitter interactions demonstrate the framework's potential for capturing and interpreting associations among communities and events.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Boualem Benatallah</style></author><author><style face="normal" font="default" size="100%">Azer Bestavros</style></author><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Armin Haller</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yanchun Zhang</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Web Information Systems Engineering - WISE 2014 Workshops - 15th International Workshops IWCSN 2014, Org2 2014, PCS 2014, and QUAT 2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected Papers</style></title><secondary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-20370-6</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">9051</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-20369-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arvanitidis, Alexandros</style></author><author><style face="normal" font="default" size="100%">Serafi, Anna</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Tsoumakas, Grigorios</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Calders, Toon</style></author><author><style face="normal" font="default" size="100%">Esposito, Floriana</style></author><author><style face="normal" font="default" size="100%">Hullermeier, Eyke</style></author><author><style face="normal" font="default" size="100%">Meo, Rosa</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Branty: A Social Media Ranking Tool for Brands</style></title><secondary-title><style face="normal" font="default" size="100%">ECML/PKDD (3)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8726</style></volume><pages><style face="normal" font="default" size="100%">432-435</style></pages><isbn><style face="normal" font="default" size="100%">978-3-662-44844-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Filippou, George</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Collaborative event annotation in tagged photo collections</style></title><secondary-title><style face="normal" font="default" size="100%">Multimedia Tools Appl.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Event authoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Ground truth generation</style></keyword><keyword><style  face="normal" font="default" size="100%">Multimedia annotation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">70</style></volume><pages><style face="normal" font="default" size="100%">89-118</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Events constitute a significant means of multimedia content organizationand sharing. Despite the recent interest in detecting events and annotating mediacontent in an event-centric way, there is currently insufficient support for managingevents in large-scale content collections and limited understanding of the eventannotation process. To this end, this paper presents CrEve, a collaborative eventannotation framework which uses content found in social media sites with theprime objective to facilitate the annotation of large media corpora with eventinformation. The proposed annotation framework could significantly benefit socialmedia research due to the proliferation of event-related user-contributed content.We demonstrate that, compared to a standard â€śbrowse-and-annotateâ€ť interface,CrEve leads to a 19% increase in the coverage of the generated ground truth in alarge-scale annotation experiment. Furthermore, the paper discusses the results of auser study that quantifies the performance of CrEve and the contribution of differentevent dimensions in the event annotation process. The study confirms the prevalenceof spatio-temporal queries as the prime option of discovering event-related contentin a large collection. In addition, textual queries and social cues (content contributor) were also found to be significant as event search dimensions. Finally, it demonstratesthe potential of employing automatic photo clustering methods with the goal offacilitating event annotation.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kakarontzas, George</style></author><author><style face="normal" font="default" size="100%">Anthopoulos, Leonidas G.</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Obaidat, Mohammad S.</style></author><author><style face="normal" font="default" size="100%">Holzinger, Andreas</style></author><author><style face="normal" font="default" size="100%">van Sinderen, Marten</style></author><author><style face="normal" font="default" size="100%">Dolog, Peter</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Conceptual Enterprise Architecture Framework for Smart Cities - A Survey Based Approach</style></title><secondary-title><style face="normal" font="default" size="100%">ICE-B</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">SciTePress</style></publisher><pages><style face="normal" font="default" size="100%">47-54</style></pages><isbn><style face="normal" font="default" size="100%">978-989-758-043-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ali, Haider</style></author><author><style face="normal" font="default" size="100%">Shafait, Faisal</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Figueroa, Nadia</style></author><author><style face="normal" font="default" size="100%">Varvadoukas, Theodoros</style></author><author><style face="normal" font="default" size="100%">Mavridis, Nikolaos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Contextual object category recognition for RGB-D scene labeling</style></title><secondary-title><style face="normal" font="default" size="100%">Robotics and Autonomous Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">62</style></volume><pages><style face="normal" font="default" size="100%">241-256</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Polymerou, Evangelia</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Akerkar, Rajendra</style></author><author><style face="normal" font="default" size="100%">Bassiliades, Nick</style></author><author><style face="normal" font="default" size="100%">Davies, John</style></author><author><style face="normal" font="default" size="100%">Ermolayev, Vadim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">EmoTube: A Sentiment Analysis Integrated Environment for Social Web Content</style></title><secondary-title><style face="normal" font="default" size="100%">WIMS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">20</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-2538-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anthopoulos, Leonidas G.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Akerkar, Rajendra</style></author><author><style face="normal" font="default" size="100%">Bassiliades, Nick</style></author><author><style face="normal" font="default" size="100%">Davies, John</style></author><author><style face="normal" font="default" size="100%">Ermolayev, Vadim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Foreword to 3M4City Workshop</style></title><secondary-title><style face="normal" font="default" size="100%">WIMS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">55</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-2538-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Cerquitelli, Tania</style></author><author><style face="normal" font="default" size="100%">Chiusano, Silvia</style></author><author><style face="normal" font="default" size="100%">Guerrini, Giovanna</style></author><author><style face="normal" font="default" size="100%">Kämpf, Mirko</style></author><author><style face="normal" font="default" size="100%">Kemper, Alfons</style></author><author><style face="normal" font="default" size="100%">Novikov, Boris</style></author><author><style face="normal" font="default" size="100%">Palpanas, Themis</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in Databases and Information Systems, 17th East European Conference on Advances in Databases and Information Systems</style></title><secondary-title><style face="normal" font="default" size="100%">ADBIS (2)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">04/2013</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Genoa, Italy</style></pub-location><volume><style face="normal" font="default" size="100%">241</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-01863-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Anthopoulos, Leonidas G.</style></author><author><style face="normal" font="default" size="100%">Krco, Srdjan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Akerkar, Rajendra</style></author><author><style face="normal" font="default" size="100%">Bassiliades, Nick</style></author><author><style face="normal" font="default" size="100%">Davies, John</style></author><author><style face="normal" font="default" size="100%">Ermolayev, Vadim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Smart Cities Data Streams Integration: experimenting with Internet of Things and social data flows</style></title><secondary-title><style face="normal" font="default" size="100%">WIMS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">60</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-2538-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Mavridis, Nikolaos</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Akerkar, Rajendra</style></author><author><style face="normal" font="default" size="100%">Bassiliades, Nick</style></author><author><style face="normal" font="default" size="100%">Davies, John</style></author><author><style face="normal" font="default" size="100%">Ermolayev, Vadim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a Framework for Social Semiotic Mining</style></title><secondary-title><style face="normal" font="default" size="100%">WIMS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">21</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-2538-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Hameurlain, Abdelkader</style></author><author><style face="normal" font="default" size="100%">Küng, Josef</style></author><author><style face="normal" font="default" size="100%">Wagner, Roland</style></author><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Guerrini, Giovanna</style></author><author><style face="normal" font="default" size="100%">Palpanas, Themis</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Transactions on Large-Scale Data- and Knowledge-Centered Systems</style></title><secondary-title><style face="normal" font="default" size="100%">T. Large-Scale Data- and Knowledge-Centered Systems</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8920</style></volume><isbn><style face="normal" font="default" size="100%">978-3-662-45760-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Benatallah, Boualem</style></author><author><style face="normal" font="default" size="100%">Bestavros, Azer</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Zhang, Yanchun</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Web Information Systems Engineering - WISE 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part II</style></title><secondary-title><style face="normal" font="default" size="100%">WISE (2)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8787</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-11745-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Benatallah, Boualem</style></author><author><style face="normal" font="default" size="100%">Bestavros, Azer</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Zhang, Yanchun</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Web Information Systems Engineering - WISE 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part I</style></title><secondary-title><style face="normal" font="default" size="100%">WISE (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8786</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-11748-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Capturing Social Data Evolution Using Graph Clustering</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">74-79</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The fast and unpredictable evolution of social data poses challenges for capturing user activities and complex associations. Evolving social graph clustering promises to uncover the dynamics of latent user and content patterns.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Lin, Xuemin</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Srivastava, Divesh</style></author><author><style face="normal" font="default" size="100%">Huang, Guangyan</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Community Detection in Social Media by Leveraging Interactions and Intensities</style></title><secondary-title><style face="normal" font="default" size="100%">WISE (2)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">community detection</style></keyword><keyword><style  face="normal" font="default" size="100%">user weighted interaction networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8181</style></volume><pages><style face="normal" font="default" size="100%">57-72</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-41153-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kastrinakis, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Guerrini, Giovanna</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Compact and Distinctive Visual Vocabularies for Efficient Multimedia Data Indexing</style></title><secondary-title><style face="normal" font="default" size="100%">ADBIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">composite visual word</style></keyword><keyword><style  face="normal" font="default" size="100%">local descriptors</style></keyword><keyword><style  face="normal" font="default" size="100%">multimedia data indexing</style></keyword><keyword><style  face="normal" font="default" size="100%">visual word</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">8133</style></volume><pages><style face="normal" font="default" size="100%">98-111</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-40682-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Multimedia data indexing for content-based retrieval has attractedsignificant attention in recent years due to the commoditizationof multimedia capturing equipment and the widespread adoption of social networking platforms as means for sharing media content online. Due to the very large amounts of multimedia content, notably images, produced and shared online by people, a very important requirement for multimedia indexing approaches pertains to their efficiency both in terms of computation and memory usage. A common approach to support query-by-example image search is based on the extraction of visual words from images and their indexing by means of inverted indices, a method proposed and popularized in the field of text retrieval.The main challenge that visual word indexing systems currently facearises from the fact that it is necessary to build very large visual vocabularies (hundreds of thousands or even millions of words) to support sufficiently precise search. However, when the visual vocabulary is large,the image indexing process becomes computationally expensive due to the fact that the local image descriptors (e.g. SIFT) need to be quantized to the nearest visual words.To this end, this paper proposes a novel method that significantly decreases the time required for the above quantization process. Instead of using hundreds of thousands of visual words for quantization, the proposed method manages to preserve retrieval quality by using a much smaller number of words for indexing. This is achieved by the concept of composite words, i.e. assigning multiple words to a local descriptor in ascending order of distance. We evaluate the proposed method in the Oxford and Paris buildings datasets to demonstrate the validity of the proposed approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Karagiannidis, Savvas</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Wei Ding</style></author><author><style face="normal" font="default" size="100%">Washio, Takashi</style></author><author><style face="normal" font="default" size="100%">Xiong, Hui</style></author><author><style face="normal" font="default" size="100%">Karypis, George</style></author><author><style face="normal" font="default" size="100%">Thuraisingham, Bhavani M.</style></author><author><style face="normal" font="default" size="100%">Cook, Diane J.</style></author><author><style face="normal" font="default" size="100%">Wu, Xindong</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Dissimilarity Features in Recommender Systems</style></title><secondary-title><style face="normal" font="default" size="100%">ICDM Workshops</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">825-832</style></pages><isbn><style face="normal" font="default" size="100%">978-0-7695-5109-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Karagiannidis, Savvas</style></author><author><style face="normal" font="default" size="100%">Koumarelas, Ioannis K.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating similarity and dissimilarity notions in recommenders</style></title><secondary-title><style face="normal" font="default" size="100%">Expert Syst. Appl.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Dissimilarity recommender</style></keyword><keyword><style  face="normal" font="default" size="100%">Distributed framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Recommender systems</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><number><style face="normal" font="default" size="100%">13</style></number><volume><style face="normal" font="default" size="100%">40</style></volume><pages><style face="normal" font="default" size="100%">5132-5147</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Collaborative recommenders rely on the assumption that similar users may exhibit similar tastes whilecontent-based ones favour items that found to be similar with the items a user likes. Weak related entities,which are often considered to be useful, are neglected by those similarity-driven recommenders. Totake advantage of this neglected information, we introduce a novel dissimilarity-based recommenderthat bases its estimations on degrees of dissimilarities among itemsâ€™ attributes. However, instead of usingthe proposed recommender as a stand-alone method, we combine it with similarity-based ones to maintainthe selective nature of the latter while detecting, through our recommender, information that mayhave been overlooked. Such combinations are established by IANOS, a proposed framework throughwhich we increase the accuracy of two popular similarity-based recommenders (Naive Bayes andSlope-One) after their combination with our algorithm. Improved accuracy results in experimentationon two datasets (Yahoo! Movies and Movielens) enhance our reasoning. However, the proposed recommendercomes with an additional computational complexity when combined with other techniques. Byusing Hadoop technology, we developed a distributed version of IANOS through which execution timewas reduced. Evaluation on IANOS procedures in terms of time performance endorses the use of distributedimplementations.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Micro-blogging Content Analysis via Emotionally-Driven Clustering</style></title><secondary-title><style face="normal" font="default" size="100%">Affective Computing and Intelligent Interaction (ACII), 2013 Humaine Association Conference on</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">affective analysis methodology</style></keyword><keyword><style  face="normal" font="default" size="100%">Clustering algorithms</style></keyword><keyword><style  face="normal" font="default" size="100%">content management</style></keyword><keyword><style  face="normal" font="default" size="100%">content sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">Dictionaries</style></keyword><keyword><style  face="normal" font="default" size="100%">emotion intensity monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">emotionally-driven clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">Equations</style></keyword><keyword><style  face="normal" font="default" size="100%">human emotion states</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">lexicon-based technique</style></keyword><keyword><style  face="normal" font="default" size="100%">Mathematical model</style></keyword><keyword><style  face="normal" font="default" size="100%">microblogging content analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">pattern clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">people perception</style></keyword><keyword><style  face="normal" font="default" size="100%">Pragmatics</style></keyword><keyword><style  face="normal" font="default" size="100%">Semantics</style></keyword><keyword><style  face="normal" font="default" size="100%">Sentiment analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">social networking (online)</style></keyword><keyword><style  face="normal" font="default" size="100%">social pulse</style></keyword><keyword><style  face="normal" font="default" size="100%">social relations</style></keyword><keyword><style  face="normal" font="default" size="100%">text analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Twitter</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Sept</style></date></pub-dates></dates><pages><style face="normal" font="default" size="100%">375-380</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Samaras, Christos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Ketikidis, Panayiotis H.</style></author><author><style face="normal" font="default" size="100%">Margaritis, Konstantinos G.</style></author><author><style face="normal" font="default" size="100%">Vlahavas, Ioannis P.</style></author><author><style face="normal" font="default" size="100%">Chatzigeorgiou, Alexander</style></author><author><style face="normal" font="default" size="100%">Eleftherakis, George</style></author><author><style face="normal" font="default" size="100%">Stamelos, Ioannis</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Requirements and architecture design principles for a smart city experiment with sensor and social networks integration</style></title><secondary-title><style face="normal" font="default" size="100%">Panhellenic Conference on Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">327-334</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-1969-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Sagonas, Christos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Li, Shipeng</style></author><author><style face="normal" font="default" size="100%">El-Saddik, Abdulmotaleb</style></author><author><style face="normal" font="default" size="100%">Wang, Meng</style></author><author><style face="normal" font="default" size="100%">Mei, Tao</style></author><author><style face="normal" font="default" size="100%">Sebe, Nicu</style></author><author><style face="normal" font="default" size="100%">Yan, Shuicheng</style></author><author><style face="normal" font="default" size="100%">Hong, Richang</style></author><author><style face="normal" font="default" size="100%">Gurrin, Cathal</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Semi-supervised Concept Detection by Learning the Structure of Similarity Graphs</style></title><secondary-title><style face="normal" font="default" size="100%">MMM (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">7732</style></volume><pages><style face="normal" font="default" size="100%">1-12</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-35725-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We present an approach for detecting concepts in images bya graph-based semi-supervised learning scheme. The proposed approach builds a similarity graph between both the labeled and unlabeled images of the collection and uses the Laplacian Eigemaps of the graph as features for training concept detectors. Therefore, it offers multiple options for fusing different image features. In addition, we present an incremental learning scheme that, given a set of new unlabeled images, efficiently performs the computation of the Laplacian Eigenmaps. We evaluate the performance of our approach both on synthetic datasets and on MIR Flickr, comparing it with high-performance state-of-the-art learning schemes with competitive and in some cases superior results.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sensors talk and humans sense Towards a reciprocal collective awareness smart city framework</style></title><secondary-title><style face="normal" font="default" size="100%">ICC Workshops</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collective aware applications</style></keyword><keyword><style  face="normal" font="default" size="100%">sensors data management</style></keyword><keyword><style  face="normal" font="default" size="100%">smart city</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks mining</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">189-193</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Smart city infrastructures provide unique opportunities for innovative applications developing and testing. Sensor city installations offer the ground for experimenting with user-oriented services, which at the same time can test and improve the infrastructure itself. The proposed work summarizes principles and methodology for and experiment, entitled SEN2SOC which will bridge sensor measurements and social networks interactions via natural language generation for supporting smart city services. SEN2SOC aims at exploiting the SmartSantander infrastructure in a sensor to social reciprocal fashion such that the sensor measurements will be and communicated to the public (citizens,authorities, etc), while social networks users activities in relevance to sensors social postings will be analyzed and summarized both to verify sensors reporting and to develop collective aware applications.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Helfert, Markus</style></author><author><style face="normal" font="default" size="100%">Francalanci, Chiara</style></author><author><style face="normal" font="default" size="100%">Filipe, Joaquim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Social Data Sentiment Analysis in Smart Environments - Extending Dual Polarities for Crowd Pulse Capturing</style></title><secondary-title><style face="normal" font="default" size="100%">DATA</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">SciTePress</style></publisher><pages><style face="normal" font="default" size="100%">175-182</style></pages><isbn><style face="normal" font="default" size="100%">978-989-8565-67-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Desai, Bipin C.</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Bernardino, Jorge</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving social data mining and affective analysis methodologies, framework and applications</style></title><secondary-title><style face="normal" font="default" size="100%">IDEAS</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">evolving social data mining</style></keyword><keyword><style  face="normal" font="default" size="100%">microblogging data analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">social affective analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Social networking</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">1-7</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-1234-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social networks drive todays opinions and content diffusion.Large scale, distributed and unpredictable social data streams areproduced and such evolving data production offers the ground forthe data mining and analysis tasks. Such social data streamsembed human reactions and inter-relationships and affective andemotional analysis has become rather important in todaysapplications. This work highlights the major data structures andmethodologies used in evolving social data mining and proceedsto the relevant affective analysis techniques. A particularframework is outlined along with indicative applications whichemploy evolving social data analysis with emphasis on theseminal criteria of topic, location and time. Such mining andanalysis overview is beneficial for various scientific andenterpreneural audiences and communities in the socialnetworking area.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">In &amp; out zooming on time-aware user/tag clusters</style></title><secondary-title><style face="normal" font="default" size="100%">J. Intell. Inf. Syst.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Events</style></keyword><keyword><style  face="normal" font="default" size="100%">Social tagging systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Time-aware clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">Users' interests over time</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">38</style></volume><pages><style face="normal" font="default" size="100%">685-708</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The common ground behind most approaches that analyze social taggingsystems is addressing the information challenge that emerges from the massiveactivity of millions of users who interact and share resources and/or metadata online.However, lack of any time-related data in the analysis process implicitly deniesmuch of the dynamic nature of social tagging activity. In this paper we claim thatholding a temporal dimension, allows for tracking macroscopic and microscopicusersâ€™ interests, detecting emerging trends and recognizing events. To this end, wepropose a time-aware co-clustering approach for acquiring semantic and temporalpatterns out of the tagging activity. The resulted clusters contain both users and tagsof similar patterns over time, and reveal non-obvious or â€śhiddenâ€ť relations amongusers and topics of their common interest. Zoom in &amp;amp; out views serve as visualizationmethods on different aspects of the clustersâ€™ structure, in order to evaluate theefficiency of the approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Laskaris, Nikolaos A.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Mani-Web: Large-Scale Web Graph Embedding via Laplacian Eigenmap Approximation</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Transactions on Systems, Man, and Cybernetics, Part C</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Laplacian eigenmap</style></keyword><keyword><style  face="normal" font="default" size="100%">large scale</style></keyword><keyword><style  face="normal" font="default" size="100%">manifold learning</style></keyword><keyword><style  face="normal" font="default" size="100%">spectral graph theory</style></keyword><keyword><style  face="normal" font="default" size="100%">web communities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">42</style></volume><pages><style face="normal" font="default" size="100%">879-888</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The Web as a graph can be embedded in a lowdimensionalspace where its geometry can be visualized and studiedin order to mine interesting patterns such as web communities.The existing algorithms operate on small-to-medium-scalegraphs; thus, we propose a close to linear time algorithm calledMani-Web suitable for large-scale graphs. The result is similarto the one produced by the manifold-learning technique Laplacianeigenmap that is tested on artificial manifolds and real webgraphs.Mani-Web can also be used as a general-purpose manifoldlearning/dimensionality-reductiontechnique as long as the datacan be represented as a graph.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Antaris, Stefanos</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Mille, Alain</style></author><author><style face="normal" font="default" size="100%">Gandon, Fabien L.</style></author><author><style face="normal" font="default" size="100%">Misselis, Jacques</style></author><author><style face="normal" font="default" size="100%">Rabinovich, Michael</style></author><author><style face="normal" font="default" size="100%">Staab, Steffen</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Social networking trends and dynamics detection via a cloud-based framework design</style></title><secondary-title><style face="normal" font="default" size="100%">WWW (Companion Volume)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cloud service deployment</style></keyword><keyword><style  face="normal" font="default" size="100%">microblogs and blogosphere dynamics</style></keyword><keyword><style  face="normal" font="default" size="100%">Social networks social</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Data Clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">1213-1220</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-1230-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Srivastava, Lara</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Alvarez, Federico</style></author><author><style face="normal" font="default" size="100%">Cleary, Frances</style></author><author><style face="normal" font="default" size="100%">Daras, Petros</style></author><author><style face="normal" font="default" size="100%">Domingue, John</style></author><author><style face="normal" font="default" size="100%">Galis, Alex</style></author><author><style face="normal" font="default" size="100%">Garcia, Ana</style></author><author><style face="normal" font="default" size="100%">Gavras, Anastasius</style></author><author><style face="normal" font="default" size="100%">Karnouskos, Stamatis</style></author><author><style face="normal" font="default" size="100%">Krco, Srdjan</style></author><author><style face="normal" font="default" size="100%">Li, Man-Sze</style></author><author><style face="normal" font="default" size="100%">Lotz, Volkmar</style></author><author><style face="normal" font="default" size="100%">Müller, Henning</style></author><author><style face="normal" font="default" size="100%">Salvadori, Elio</style></author><author><style face="normal" font="default" size="100%">Sassen, Anne-Marie</style></author><author><style face="normal" font="default" size="100%">Schaffers, Hans</style></author><author><style face="normal" font="default" size="100%">Stiller, Burkhard</style></author><author><style face="normal" font="default" size="100%">Tselentis, Georgios</style></author><author><style face="normal" font="default" size="100%">Turkama, Petra</style></author><author><style face="normal" font="default" size="100%">Zahariadis, Theodore B.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a Narrative-Aware Design Framework for Smart Urban Environments</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet Assembly</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">7281</style></volume><pages><style face="normal" font="default" size="100%">166-177</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-30240-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anthopoulos, Leonidas G.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Alvarez, Federico</style></author><author><style face="normal" font="default" size="100%">Cleary, Frances</style></author><author><style face="normal" font="default" size="100%">Daras, Petros</style></author><author><style face="normal" font="default" size="100%">Domingue, John</style></author><author><style face="normal" font="default" size="100%">Galis, Alex</style></author><author><style face="normal" font="default" size="100%">Garcia, Ana</style></author><author><style face="normal" font="default" size="100%">Gavras, Anastasius</style></author><author><style face="normal" font="default" size="100%">Karnouskos, Stamatis</style></author><author><style face="normal" font="default" size="100%">Krco, Srdjan</style></author><author><style face="normal" font="default" size="100%">Li, Man-Sze</style></author><author><style face="normal" font="default" size="100%">Lotz, Volkmar</style></author><author><style face="normal" font="default" size="100%">Müller, Henning</style></author><author><style face="normal" font="default" size="100%">Salvadori, Elio</style></author><author><style face="normal" font="default" size="100%">Sassen, Anne-Marie</style></author><author><style face="normal" font="default" size="100%">Schaffers, Hans</style></author><author><style face="normal" font="default" size="100%">Stiller, Burkhard</style></author><author><style face="normal" font="default" size="100%">Tselentis, Georgios</style></author><author><style face="normal" font="default" size="100%">Turkama, Petra</style></author><author><style face="normal" font="default" size="100%">Zahariadis, Theodore B.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Urban Planning and Smart Cities: Interrelations and Reciprocities</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet Assembly</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">7281</style></volume><pages><style face="normal" font="default" size="100%">178-189</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-30240-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Larson, Martha</style></author><author><style face="normal" font="default" size="100%">Rae, Adam</style></author><author><style face="normal" font="default" size="100%">Demarty, Claire-Helene</style></author><author><style face="normal" font="default" size="100%">Kofler, Christoph</style></author><author><style face="normal" font="default" size="100%">Metze, Florian</style></author><author><style face="normal" font="default" size="100%">Troncy, Raphaël</style></author><author><style face="normal" font="default" size="100%">Mezaris, Vasileios</style></author><author><style face="normal" font="default" size="100%">Jones, Gareth J. F.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">CERTH @ MediaEval 2011 Social Event Detection Task</style></title><secondary-title><style face="normal" font="default" size="100%">MediaEval</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">CEUR Workshop Proceedings</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">CEUR-WS.org</style></publisher><volume><style face="normal" font="default" size="100%">807</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper describes the participation of CERTH in the â€śSocialEvent Detection Task @ MediaEval 2011â€ť, which aimsat discovering social events in a large photo collection. Thetask comprises two challenges: (i) identification of soccerevents in the cities of Barcelona and Rome, and (ii) identificationof events taking place in two specific venues. Weadopt an approach that combines spatial and temporal filterswith tag-based location classification models and an ef-ficient photo clustering method. In our best runs, we achieveF-measure and NMI scores of 77.4% and 0.63 respectivelyfor Challenge 1, and 64% and 0.38 for Challenge 2.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Kapiris, Stefanos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Natale, Francesco G. B. De</style></author><author><style face="normal" font="default" size="100%">Bimbo, Alberto Del</style></author><author><style face="normal" font="default" size="100%">Hanjalic, Alan</style></author><author><style face="normal" font="default" size="100%">Manjunath, B. S.</style></author><author><style face="normal" font="default" size="100%">Satoh, Shin’ichi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">City exploration by use of spatio-temporal analysis and clustering of user contributed photos</style></title><secondary-title><style face="normal" font="default" size="100%">ICMR</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">content browsing</style></keyword><keyword><style  face="normal" font="default" size="100%">landmark/event detection</style></keyword><keyword><style  face="normal" font="default" size="100%">spatio-temporal mining</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">65</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-0336-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We present a technical demonstration of an online city explorationapplication that helps users identify interesting spotsin a city by use of spatio-temporal analysis and clusteringof user contributed photos. Our framework analyzes thespatial distribution of large city-centered collections of usercontributed photos at different time scales in order to indexthe most popular spots of a city in a time-aware manner.Subsequently, the photo sets belonging to the same spatiotemporalcontext are clustered in order to extract representativephotos for each spot. The resulting applicationenables users to obtain flexible summaries of the most importantspots in a city given a temporal slice (time of theday, month, season). The demonstration will be based on aphoto dataset covering major European cities.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cluster-Based Landmark and Event Detection for Tagged Photo Collections</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE MultiMedia</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">52-63</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rising popularity of photosharingapplications on the Webhas led to the generation of hugeamounts of personal image collections.Browsing through image collections ofsuch magnitude is currently supported by theuse of tags. However, tags suffer from severallimitationsâ€”such as polysemy, lack of uniformity,and spamâ€”thus not presenting an adequatesolution to the problem of contentorganization. Therefore, automated contentorganizationmethods are of particular importanceto improve the content-consumptionexperience. Because itâ€™s common for users to associatetheir photo-captured experiences withsome landmarksâ€”for example, a tourist site oran event, such as a music concert or a gatheringwith friendsâ€”we can view landmarks andevents as natural units of organization forlarge image collections. Itâ€™s for this reasonthat automating the process of detecting suchconcepts in large image sets can enhance theexperience of accessing massive amounts ofpictorial content.In this article, we present a novel scheme forautomatically detecting landmarks and eventsin tagged image collections. Our proposal isbased on the simple yet elegant concept ofimage similarity graphs as a means of combiningmultiple notions of similarity betweenimages in a photo collection; in our case, weuse visual and tag similarity. We perform clusteringon such image similarity graphs bymeans of community detection,1 a processthat identifies on the graph groups of nodesthat are more densely connected to eachother than to the rest of the network. In contrastto conventional clustering schemes suchas k-means or hierarchical agglomerative clustering,community detection is computationallymore efficient and doesnâ€™t require thenumber of clusters to be provided as input. Subsequently,we classify the resulting image clustersas landmarks or events by use of featuresrelated to the temporal, social, and tag characteristicsof image clusters. In the case of landmarks,we also conduct a cluster-merging stepon the basis of spatial proximity to enrich ourlandmark model.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Clustering-Driven LDAP Framework</style></title><secondary-title><style face="normal" font="default" size="100%">TWEB</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">DIT organization</style></keyword><keyword><style  face="normal" font="default" size="100%">LDAP services</style></keyword><keyword><style  face="normal" font="default" size="100%">merging criteria</style></keyword><keyword><style  face="normal" font="default" size="100%">query and retrieval engine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;LDAP directories have proliferated as the appropriate storage framework for various and heterogeneousdata sources, operating under a wide range of applications and services. Due to the increased amount andheterogeneity of the LDAP data, there is a requirement for appropriate data organization schemes. TheLPAIR &amp;amp; LMERGE (LP-LM) algorithm, presented in this article, is a hierarchical agglomerative structurebasedclustering algorithm which can be used for the LDAP directory information tree definition. A thoroughstudy of the algorithmâ€™s performance is provided, which designates its efficiency. Moreover, the RelativeLink as an alternative merging criterion is proposed, since as indicated by the experimentation, it canresult in more balanced clusters. Finally, the LP and LM Query Engine is presented, which considering theclustering-based LDAP data organization, results in the enhancement of the LDAP serverâ€™s performance.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolopoulos, Spiros</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Patras, Ioannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Hoi, Steven C. H.</style></author><author><style face="normal" font="default" size="100%">Luo, Jiebo</style></author><author><style face="normal" font="default" size="100%">Boll, Susanne</style></author><author><style face="normal" font="default" size="100%">Xu, Dong</style></author><author><style face="normal" font="default" size="100%">Jin, Rong</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Combining Multi-modal Features for Social Media Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Social Media Modeling and Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pages><style face="normal" font="default" size="100%">71-96</style></pages><isbn><style face="normal" font="default" size="100%">978-0-85729-435-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Pardede, Eric</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Community Detection in Collaborative Tagging Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Community-Built Databases</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pages><style face="normal" font="default" size="100%">107-131</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-19046-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Martinez, José M.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Detecting the long-tail of Points of Interest in tagged photo collections</style></title><secondary-title><style face="normal" font="default" size="100%">CBMI</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">235-240</style></pages><isbn><style face="normal" font="default" size="100%">978-1-61284-433-6</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper tackles the problem of matching the photosof a tagged photo collection to a list of â€ślong-tailâ€ť PointsOf Interest (PoIs), that is PoIs that are not very popularand thus not well represented in the photo collection. Despitethe significance of improving â€ślong-tailâ€ť PoI photoretrieval for travel applications, most landmark detectionmethods to date have been tested on very popular landmarks.In this paper, we conduct a thorough empirical analysiscomparing four baseline matching methods that relyon photo metadata, three variants of an approach that usescluster analysis in order to discover PoI-related photo clusters,and a real-world retrieval mechanism (Flickr search)on a set of less popular PoIs.A user-based evaluation of the aforementioned methodsis conducted on a Flickr photo collection of over 100, 000photos from 10 well-known touristic destinations in Greece.A set of 104 â€ślong-tailâ€ť PoIs is collected for these destinationsfrom Wikipedia, Wikimapia and OpenStreetMap. Theresults demonstrate that two of the baseline methods outperformFlickr search in terms of precision and F-measure,whereas two of the cluster-based methods outperform it interms of recall and PoI coverage. We consider the results ofthis study valuable for enhancing the indexing of pictorialcontent in social media sites.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tsagkalidou, Katerina</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">D’Mello, Sidney K.</style></author><author><style face="normal" font="default" size="100%">Graesser, Arthur C.</style></author><author><style face="normal" font="default" size="100%">Schuller, Björn</style></author><author><style face="normal" font="default" size="100%">Martin, Jean-Claude</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Emotional Aware Clustering on Micro-blogging Sources</style></title><secondary-title><style face="normal" font="default" size="100%">ACII (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Microblogging services</style></keyword><keyword><style  face="normal" font="default" size="100%">Sentiment analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">web clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6974</style></volume><pages><style face="normal" font="default" size="100%">387-396</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-24599-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Microblogging services have nowadays become a very popularcommunication tool among Internet users. Since millions of usersshare opinions on different aspects of life everyday, microblogging websites are considered as a credible source for exploring both factual and subjective information. This fact has inspired research in the area of automatic sentiment analysis. In this paper we propose an emotional aware clustering approach which performs sentiment analysis of users tweets onthe basis of an emotional dictionary and groups tweets according to the degree they express a specific set of emotions. Experimental evaluations on datasets derived from Twitter prove the efficiency of the proposed approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Jain, Lakhmi C.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Innovations and Trends in Web Data Management</style></title><secondary-title><style face="normal" font="default" size="100%">New Directions in Web Data Management 1</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Studies in Computational Intelligence</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><volume><style face="normal" font="default" size="100%">331</style></volume><pages><style face="normal" font="default" size="100%">1-18</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-17550-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolopoulos, Spiros</style></author><author><style face="normal" font="default" size="100%">Chatzilari, Elisavet</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bessis, Nik</style></author><author><style face="normal" font="default" size="100%">Xhafa, Fatos</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging Massive User Contributions for Knowledge Extraction</style></title><secondary-title><style face="normal" font="default" size="100%">Next Generation Data Technologies for Collective Computational Intelligence</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Studies in Computational Intelligence</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">352</style></volume><pages><style face="normal" font="default" size="100%">415-443</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-20343-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Jain, Lakhmi C.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Massive Graph Management for the Web and Web 2.0</style></title><secondary-title><style face="normal" font="default" size="100%">New Directions in Web Data Management 1</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Studies in Computational Intelligence</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><volume><style face="normal" font="default" size="100%">331</style></volume><pages><style face="normal" font="default" size="100%">19-58</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-17550-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Jain, Lakhmi C.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">New Directions in Web Data Management 1</style></title><secondary-title><style face="normal" font="default" size="100%">New Directions in Web Data Management 1</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Studies in Computational Intelligence</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><volume><style face="normal" font="default" size="100%">331</style></volume><isbn><style face="normal" font="default" size="100%">978-3-642-17550-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maaradji, Abderrahmane</style></author><author><style face="normal" font="default" size="100%">Hacid, Hakim</style></author><author><style face="normal" font="default" size="100%">Skraba, Ryan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Social Web Mashups Full Completion via Frequent Sequence Mining</style></title><secondary-title><style face="normal" font="default" size="100%">SERVICES</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Mashups</style></keyword><keyword><style  face="normal" font="default" size="100%">Sequence mining</style></keyword><keyword><style  face="normal" font="default" size="100%">Social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Web services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">9-16</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4577-0879-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this paper we address the problem of WebMashups full completion which consists of predicting themost suitable set of (combined) services that successfully meetthe goals of an end-user Mashup, given the current service(or composition of services) initially supplied. We model fullcompletion as a frequent sequence mining problem and weshow how existing algorithms can be applied in this context.To overcome some limitations of the frequent sequence miningalgorithms, e.g., efficiency and recommendation granularity,we propose FESMA, a new and efficient algorithm for computingfrequent sequences of services and recommending completions.FESMA also integrates a social dimension, extractedfrom the transformation of user ? service interactions intouser ? user interactions, building an implicit graph thathelps to better predict completions of services in a fashiontailored to individual users. Evaluations show that FESMAis more efficient outperforming the existing algorithms evenwith the consideration of the social dimension. Our proposalhas been implemented in a prototype, SoCo, developed at BellLabs.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gabriel, Hans-Henning</style></author><author><style face="normal" font="default" size="100%">Spiliopoulou, Myra</style></author><author><style face="normal" font="default" size="100%">Stachtiari, Emmanouela</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Boissier, Olivier</style></author><author><style face="normal" font="default" size="100%">Benatallah, Boualem</style></author><author><style face="normal" font="default" size="100%">Papazoglou, Mike P.</style></author><author><style face="normal" font="default" size="100%">Ras, Zbigniew W.</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Summarization Meets Visualization on Online Social Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Web Intelligence</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">communities</style></keyword><keyword><style  face="normal" font="default" size="100%">community representatives</style></keyword><keyword><style  face="normal" font="default" size="100%">social network summarization</style></keyword><keyword><style  face="normal" font="default" size="100%">social network visualization</style></keyword><keyword><style  face="normal" font="default" size="100%">Social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">visualization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">475-478</style></pages><isbn><style face="normal" font="default" size="100%">978-0-7695-4513-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Getting an overview of a large online social networkand deciding which communities to join is a challengingtask for a new user. We propose a method that maps a largenetwork into a smaller graph with two kinds of nodes: a nodeof the first kind is representative of a community; a node ofthe second kind is neighbor to a representative and reflectsthe semantics of that community. Our approach encompassesa learning and ranking algorithm that derives this smallergraph from the original one, and a visualization algorithmthat returns a graph layout to the observer. We report on ourresults on inspecting the network of a folksonomy.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Karagiannidis, Savvas</style></author><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Kosmatopoulos, Andreas</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Liarokapis, Fotis</style></author><author><style face="normal" font="default" size="100%">Doulamis, Anastasios D.</style></author><author><style face="normal" font="default" size="100%">Vescoukis, Vassilios</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a User-Aware Virtual Museum</style></title><secondary-title><style face="normal" font="default" size="100%">VS-GAMES</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">user groups</style></keyword><keyword><style  face="normal" font="default" size="100%">user preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">virtual museum</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">228-235</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4577-0316-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ul Islam, Saif</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pierson, Jean-Marc</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Kranzlmller, Dieter</style></author><author><style face="normal" font="default" size="100%">Tjoa, A Min</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Utilization-Aware Redirection Policy in CDN: A Case for Energy Conservation</style></title><secondary-title><style face="normal" font="default" size="100%">ICT-GLOW</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CDNs</style></keyword><keyword><style  face="normal" font="default" size="100%">Energy conservation</style></keyword><keyword><style  face="normal" font="default" size="100%">QoE</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6868</style></volume><pages><style face="normal" font="default" size="100%">180-187</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-23446-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Due to the gradual and rapid increase in Information andCommunication Technology (ICT) industry, it is very important to introduce energy efficient techniques and infrastructures in large scale distributed systems. Content Distribution Networks (CDNs) are one of these popular systems which try to make the contents closer to the widely dispersed Internet users. A Content Distribution Network provides its services by using a number of surrogate servers geographicallydistributed in the web. Surrogate servers have the copies of the original contents belonging to the origin server, depending on their storage capacity.When a client requests for some particular contents from a surrogateserver, either this request can be fulfilled directly by it or in case of absence of the requested contents, surrogate servers cooperate with eachother or with the origin server. In this paper, our focus is on the surrogate servers utilization and using it as a parameter to conserve energy in CDNs while trying to maintain an acceptable Quality of Experience (QoE).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Paparrizos, Ioannis K.</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Chignell, Mark H.</style></author><author><style face="normal" font="default" size="100%">Toms, Elaine G.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Automatic extraction of structure, content and usage data statistics of web sites</style></title><secondary-title><style face="normal" font="default" size="100%">HT</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">classification</style></keyword><keyword><style  face="normal" font="default" size="100%">Crawling</style></keyword><keyword><style  face="normal" font="default" size="100%">Structure Content and Usage data</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Mining Algorithm</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">301-302</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-0041-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this paper we present a web mining tool which automaticallyextracts the structure, content and usage data statistics of websites. This work inspired by the fact that web mining consists ofthree axes: web structure mining, web content mining and webusage mining. Each one of those axes is using the structure,content and usage data respectively. The scope is to use thedeveloped multi-thread web crawler as a tool to automaticallyextract from web pages data that are associated with each one ofthose three axes in order afterwards to compute several usefuldescriptive statistics and apply advanced mathematical andstatistical methods. A description of our system is provided aswell as some experimentation results.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Sidiropoulos, Antonis</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CDNsim: A simulation tool for content distribution networks</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Trans. Model. Comput. Simul.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">caching</style></keyword><keyword><style  face="normal" font="default" size="100%">Content Distribution Network</style></keyword><keyword><style  face="normal" font="default" size="100%">services</style></keyword><keyword><style  face="normal" font="default" size="100%">trace-driven simulation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">20</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Distribution Networks (CDNs) have gained considerable attention in the past few years.As such, there is need for developing frameworks for carrying out CDN simulations. In this paper,we present a modeling and simulation framework for CDNs, called CDNsim. CDNsim hasbeen designated to provide a realistic simulation for CDNs, simulating the surrogate servers, theTCP/IP protocol and the main CDN functions. The main advantages of this tool are its high performance,its extensibility and its user interface which is used to configure its parameters. CDNsimprovides an automated environment for conducting experiments and extracting client, server andnetwork statistics. The purpose of CDNsim is to be used as a testbed for CDN evaluation andexperimentation. This is quite useful both for the research community (to experiment with newCDN data management techniques) and for CDN developers (to evaluate profits on prior certainCDN installations).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moussiades, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Clustering dense graphs: A web site graph paradigm</style></title><secondary-title><style face="normal" font="default" size="100%">Inf. Process. Manage.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">247-267</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Kapiris, Stefanos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bimbo, Alberto Del</style></author><author><style face="normal" font="default" size="100%">Chang, Shih-Fu</style></author><author><style face="normal" font="default" size="100%">Smeulders, Arnold W. M.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">ClustTour: city exploration by use of hybrid photo clustering</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Multimedia</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">event and landmark detection</style></keyword><keyword><style  face="normal" font="default" size="100%">tagging</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">1617-1620</style></pages><isbn><style face="normal" font="default" size="100%">978-1-60558-933-6</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We present a technical demonstration of an online city explorationapplication that helps users identify interesting spotsin a city by use of photo clusters corresponding to landmarksand events. Our application, called ClustTour, is based onan efficient landmark and event detection scheme for taggedphoto collections. The proposed scheme relies on the combinationof a graph-based photo clustering algorithm, makinguse of both visual and tag information of photos, with acluster classification and merging module. ClustTour createsa map-based visualization of the identified photo clustersthat are classified in prominent categories and are filterableby time and tag. We believe that such an applicationcan greatly facilitate the task of knowing a city through itslandmarks and events. So far, the demo has been based on alarge photo dataset focused on Barcelona, and it is graduallyexpanding to contain photo clusters of several major cities ofEurope. Furthermore, an Android application is developedthat complements the web-based version of ClustTour.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maria Giatsoglou</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Dynamic Code Generation for Cultural Content Management</style></title><secondary-title><style face="normal" font="default" size="100%">Panhellenic Conference on Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">21-24</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4244-7838-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Dynamics of Content Popularity in Social Media</style></title><secondary-title><style face="normal" font="default" size="100%">IJDWM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Collaborative Technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">Data Mining</style></keyword><keyword><style  face="normal" font="default" size="100%">Electronic Media</style></keyword><keyword><style  face="normal" font="default" size="100%">Online Behavior</style></keyword><keyword><style  face="normal" font="default" size="100%">Online Community</style></keyword><keyword><style  face="normal" font="default" size="100%">Resource Sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">Web-Based Applications</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">20-37</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social Bookmarking Systems (SBS) have been widely adopted in the last years, and thus they havehad a significant impact on the way that online content is accessed, read and rated. Until recently,the decision on what content to display in a publisherâ€™s web pages was made by one or at most fewauthorities. In contrast, modern SBS-based applications permit their users to submit their preferredcontent, to comment on and to rate the content of other users and establish social relations witheach other. In that way, the vision of the social media is realized, i.e. the online users collectivelydecide upon the interestingness of the available bookmarked content. This article attempts to provideinsights into the dynamics emerging from the process of content rating by the user community.To this end, the article proposes a framework for the study of the statistical properties of an SBS,the evolution of bookmarked content popularity and user activity in time, as well as the impact ofonline social networks on the content consumption behavior of individuals. The proposed analysisframework is applied to a large dataset collected from digg, a popular social media application.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Exploring temporal aspects in user-tag co-clustering</style></title><secondary-title><style face="normal" font="default" size="100%">WIAMIS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-4</style></pages><isbn><style face="normal" font="default" size="100%">978-88-905328-0-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Tagging environments have become an interesting topic ofresearch lately, focused mainly on clustering approaches, inorder to extract emergent patterns that are derived from tagsimilarity and involve tag relations or user interconnections.Apart from tag similarity, an interesting parameter to be analyzedduring the clustering/mining process in such data isthe actual time that each tagging activity occurred. Indeed,holding a temporal dimension unfolds macroscopic and microscopicviews of tagging, highlights links between objectsfor specific time periods and, in general, lets us observe howthe usersâ€™ tagging activity changes over time. In this article,we propose a time-aware user/tag clustering approach, whichgroups together similar users and tags that are very â€śactiveâ€ťduring the same time periods. Emphasis is given on usingvarying time scales, so that we distinguish between clustersthat are robust at many time scales and clusters that are somehowoccasional, i.e. they emerge, only at a specific time period.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A graph-based clustering scheme for identifying related tags in folksonomies</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 12th international conference on Data warehousing and knowledge discovery</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">DaWaK’10</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">community detection</style></keyword><keyword><style  face="normal" font="default" size="100%">folksonomies</style></keyword><keyword><style  face="normal" font="default" size="100%">graph-based clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">tag recommendation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer-Verlag</style></publisher><pub-location><style face="normal" font="default" size="100%">Berlin, Heidelberg</style></pub-location><pages><style face="normal" font="default" size="100%">65–76</style></pages><isbn><style face="normal" font="default" size="100%">3-642-15104-3, 978-3-642-15104-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper presents a novel scheme for graph-based clusteringwith the goal of identifying groups of related tags in folksonomies.The proposed scheme searches for core sets, i.e. groups of nodes thatare densely connected to each other by efficiently exploring the twodimensional core parameter space, and successively expands the identified cores by maximizing a local subgraph quality measure. We evaluate this scheme on three real-world tag networks by assessing the relatedness of same-cluster tags and by using tag clusters for tag recommendation. In addition, we compare our results to the ones derived from a baseline graph-based clustering method and from a popular modularity maximization clustering method.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Tolias, Giorgos</style></author><author><style face="normal" font="default" size="100%">Kalantidis, Yannis</style></author><author><style face="normal" font="default" size="100%">Mylonas, Phivos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Image clustering through community detection on hybrid image similarity graphs</style></title><secondary-title><style face="normal" font="default" size="100%">ICIP</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">community detection</style></keyword><keyword><style  face="normal" font="default" size="100%">content-based image retrieval</style></keyword><keyword><style  face="normal" font="default" size="100%">image clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">tags</style></keyword><keyword><style  face="normal" font="default" size="100%">visual similarity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">2353-2356</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4244-7994-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The wide adoption of photo sharing applications such as FlickrÂ°cand the massive amounts of user-generated content uploaded to themraises an information overload issue for users. An established technique to overcome such an overload is to cluster images into groups based on their similarity and then use the derived clusters to assistnavigation and browsing of the collection. In this paper, we presenta community detection (i.e. graph-based clustering) approach thatmakes use of both visual and tagging features of images in orderto efficiently extract groups of related images within large imagecollections. Based on experiments we conducted on a dataset comprising publicly available images from FlickrÂ°c, we demonstrate the efficiency of our method, the added value of combining visual andtag features and the utility of the derived clusters for exploring animage collection.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Auer, S'oren</style></author><author><style face="normal" font="default" size="100%">Decker, Stefan</style></author><author><style face="normal" font="default" size="100%">Hauswirth, Manfred</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Web 20 Data into Linked Open Data Cloud via Clustering</style></title><secondary-title><style face="normal" font="default" size="100%">CEUR Workshop Proceedings ISSN 1613-0073</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">FIA-LOD2010 imported</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">February</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">700</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stampouli, Anastasia</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Yoshikawa, Masatoshi</style></author><author><style face="normal" font="default" size="100%">Meng, Xiaofeng</style></author><author><style face="normal" font="default" size="100%">Yumoto, Takayuki</style></author><author><style face="normal" font="default" size="100%">Ma, Qiang</style></author><author><style face="normal" font="default" size="100%">Sun, Lifeng</style></author><author><style face="normal" font="default" size="100%">Watanabe, Chiemi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Tag Disambiguation through Flickr and Wikipedia</style></title><secondary-title><style face="normal" font="default" size="100%">DASFAA Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">DBpedia project</style></keyword><keyword><style  face="normal" font="default" size="100%">flick</style></keyword><keyword><style  face="normal" font="default" size="100%">mashup</style></keyword><keyword><style  face="normal" font="default" size="100%">term disambiguation</style></keyword><keyword><style  face="normal" font="default" size="100%">Wikipedia</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6193</style></volume><pages><style face="normal" font="default" size="100%">252-263</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-14588-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Given the popularity of social tagging systems and the limitationsthese systems have, due to lack of any structure, a common issue that arises involves the low retrieval quality in such systems due to ambiguities of certain terms. In this paper, an approach for improving the retrieval in these systems, in case of ambiguous terms, is presented that attempts to perform tag disambiguation and, at the same time, provide users with relevant content. The idea is based on a mashup that combines data and functionality of two major web 2.0 sites, namely Flickr and Wikipedia and aims at enhancing content retrieval for web users. A case study with the ambiguous notion â€śAppleâ€ť illustrates the value of the proposed approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Liu, Ling</style></author><author><style face="normal" font="default" size="100%">Ozsu, M. Tamer</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Access Control Policy Languages</style></title><secondary-title><style face="normal" font="default" size="100%">Encyclopedia of Database Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer US</style></publisher><pages><style face="normal" font="default" size="100%">15-18</style></pages><isbn><style face="normal" font="default" size="100%">978-0-387-39940-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bouzakis, K.-D.</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Sarigiannidou, M.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Automating the manufacturing process under a web based framework</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Engineering Software</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CAD/CAM</style></keyword><keyword><style  face="normal" font="default" size="100%">Manufacturing process</style></keyword><keyword><style  face="normal" font="default" size="100%">Process planning</style></keyword><keyword><style  face="normal" font="default" size="100%">SOAP</style></keyword><keyword><style  face="normal" font="default" size="100%">UDDI</style></keyword><keyword><style  face="normal" font="default" size="100%">Web services</style></keyword><keyword><style  face="normal" font="default" size="100%">xml</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">9</style></number><volume><style face="normal" font="default" size="100%">40</style></volume><pages><style face="normal" font="default" size="100%">956-964</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rapid evolution of the web has affected the way under which the manufacturing process is practised.In this paper, a web based framework â€“ independent from any specific CAD/CAM software â€“ is proposed,for employing electronic interaction between designers and manufacturers. In this context, designers andmanufacturers communicate for the manufacturing of a workpiece, under a platform-independent, easier,faster and more economical way. The proposed framework is implemented as a web service, wherethe Simple Object Access Protocol (SOAP) is used for the exchange of the necessary machined parts dataand the methodologies of UDDI (Universal Description Discovery and Integration) and WSDL (Web ServicesDescription Language) are introduced for providing directories and descriptions information.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moussiades, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Flory, Andre</style></author><author><style face="normal" font="default" size="100%">Collard, Martine</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Benchmark graphs for the evaluation of Clustering Algorithms</style></title><secondary-title><style face="normal" font="default" size="100%">RCIS</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Artificial graph</style></keyword><keyword><style  face="normal" font="default" size="100%">Community structure</style></keyword><keyword><style  face="normal" font="default" size="100%">Graph clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">Intra linkage ratio</style></keyword><keyword><style  face="normal" font="default" size="100%">Modularity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">197-206</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4244-2864-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Artificial graphs are commonly used for theevaluation of community mining and clustering algorithms. Eachartificial graph is assigned a pre-specified clustering, which iscompared to clustering solutions obtained by the algorithmsunder evaluation. Hence, the pre-specified clustering shouldcomply with specifications that are assumed to delimit a goodclustering. However, existing construction processes for artificialgraphs do not set explicit specifications for the pre-specifiedclustering. We call these graphs, randomly clustered graphs.Here, we introduce a new class of benchmark graphs which areclustered according to explicit specifications. We call themoptimally clustered graphs. We present the basic properties ofoptimally clustered graphs and propose algorithms for theirconstruction. Experimentally, we compare two communitymining algorithms using both randomly and optimally clusteredgraphs. Results of this evaluation reveal interesting insights bothfor the algorithms and the artificial graphs.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Sidiropoulos, Antonis</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CDNs Content Outsourcing via Generalized Communities</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Trans. Knowl. Data Eng.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">caching</style></keyword><keyword><style  face="normal" font="default" size="100%">content distribution networks</style></keyword><keyword><style  face="normal" font="default" size="100%">replication</style></keyword><keyword><style  face="normal" font="default" size="100%">social network analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">web communities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">137-151</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content distribution networks (CDNs) balance costs and quality in services related to content delivery. Devising an efficientcontent outsourcing policy is crucial since, based on such policies, CDN providers can provide client-tailored content, improveperformance, and result in significant economical gains. Earlier content outsourcing approaches may often prove ineffective since theydrive prefetching decisions by assuming knowledge of content popularity statistics, which are not always available and are extremelyvolatile. This work addresses this issue, by proposing a novel self-adaptive technique under a CDN framework on which outsourcedcontent is identified with no a priori knowledge of (earlier) request statistics. This is employed by using a structure-based approachidentifying coherent clusters of â€ścorrelatedâ€ť Web server content objects, the so-called Web page communities. These communities arethe core outsourcing unit, and in this paper, a detailed simulation experimentation has shown that the proposed technique is robust andeffective in reducing user-perceived latency as compared with competing approaches, i.e., two communities-based approaches, Webcaching, and non-CDN.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dikaiakos, Marios D.</style></author><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Mehra, Pankaj</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cloud Computing: Distributed Internet Computing for IT and Scientific Research</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">13</style></volume><pages><style face="normal" font="default" size="100%">10-13</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cloud computing is a recent trend in informationtechnology and networking that has the potentialto change radically the way computer servicesare constructed, managed, and delivered. The key drivingforces behind the emergence of cloud computing includethe overcapacity of todayâ€™s large corporate data centers,the ubiquity of broadband and wireless networking, thefalling cost of storage, and progressive improvements innetworking technologies. Cloud computing opens new perspectiveswith profound implications in the area of communicationnetworks, raising new issues in their architecture,design, and implementation.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Vossen, Gottfried</style></author><author><style face="normal" font="default" size="100%">Long, Darrell D. E.</style></author><author><style face="normal" font="default" size="100%">Yu, Jeffrey Xu</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Clustering of Social Tagging System Users: A Topic and Time Based Approach</style></title><secondary-title><style face="normal" font="default" size="100%">WISE</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Social tagging systems</style></keyword><keyword><style  face="normal" font="default" size="100%">time</style></keyword><keyword><style  face="normal" font="default" size="100%">topic</style></keyword><keyword><style  face="normal" font="default" size="100%">user clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">5802</style></volume><pages><style face="normal" font="default" size="100%">75-86</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-04408-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Under Social Tagging Systems, a typical Web 2.0 application,users label digital data sources by using freely chosen textual descriptions(tags). Mining tag information reveals the topic-domain ofusers interests and significantly contributes in a profile construction process.In this paper we propose a clustering framework which groups usersaccording to their preferred topics and the time locality of their taggingactivity. Experimental results demonstrate the efficiency of the proposedapproach which results in more enriched time-aware users profiles.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Dikaiakos, Marios D.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the utility of content delivery networks</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CDN pricing</style></keyword><keyword><style  face="normal" font="default" size="100%">Content Delivery</style></keyword><keyword><style  face="normal" font="default" size="100%">network utility</style></keyword><keyword><style  face="normal" font="default" size="100%">networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">11-20</style></pages><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) balance costs and qualityin services related to content delivery. This has urgedmany Web entrepreneurs to make contracts with CDNs. Inthe literature, a wide range of techniques has been developed,implemented and standardized for improving the performanceof CDNs. The ultimate goal of all the approachesis to improve the utility of CDN surrogate servers. In thispaper we define a metric which measures the utility of CDNsurrogate servers, called CDN utility. This metric capturesthe traffic activity in a CDN, expressing the usefulness ofsurrogate servers in terms of data circulation in the network.Through an extensive simulation testbed, we identifythe parameters that affect the CDN utility in such infrastructures.We evaluate the utility of surrogate servers undervarious parameters and provide insightful comments.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A fuzzy bi-clustering approach to correlate web users and pages</style></title><secondary-title><style face="normal" font="default" size="100%">I. J. Knowledge and Web Intelligence</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">fuzzy bi-clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">spectral analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">web pages</style></keyword><keyword><style  face="normal" font="default" size="100%">web users</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">1/2</style></number><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">3-23</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the rapid development of information technology, thesignificance of clustering in the process of delivering information to users isbecoming more eminent. Especially in the web information space, clusteringanalysis can prove particularly beneficial for a variety of applications such asweb personalisation and profiling, caching and prefetching and content deliverynetworks. In this paper, we propose a bi-clustering approach, which identifiesgroups of related web users and pages. The proposed approach is a three-stepprocess that relies on the principles of spectral clustering analysis and providesa fuzzy relation scheme for the revealed usersâ€™ and pagesâ€™ clusters. Experimentshave been conducted on both synthetic and real datasets to prove the proposedmethodâ€™s efficiency and reveal hidden knowledge.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kaburlasos, Vassilis G.</style></author><author><style face="normal" font="default" size="100%">Moussiades, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Fuzzy lattice reasoning (FLR) type neural computation for weighted graph partitioning</style></title><secondary-title><style face="normal" font="default" size="100%">Neurocomputing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clustering</style></keyword><keyword><style  face="normal" font="default" size="100%">Fuzzy lattices</style></keyword><keyword><style  face="normal" font="default" size="100%">Graph partitioning</style></keyword><keyword><style  face="normal" font="default" size="100%">Metric Measurable path</style></keyword><keyword><style  face="normal" font="default" size="100%">Similarity measure</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">10-12</style></number><volume><style face="normal" font="default" size="100%">72</style></volume><pages><style face="normal" font="default" size="100%">2121-2133</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The fuzzy lattice reasoning (FLR) neural network was introduced lately based on an inclusion measurefunction. This work presents a novel FLR extension, namely agglomerative similarity measure FLR, orasmFLR for short, for clustering based on a similarity measure function, the latter (function) may also bebased on a metric. We demonstrate application in a metric space emerging from a weighted graphtowards partitioning it. The asmFLR compares favorably with four alternative graph-clusteringalgorithms from the literature in a series of computational experiments on artificial data. In addition,our work introduces a novel index for the quality of clustering, which (index) compares favorably withtwo popular indices from the literature.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information analysis in mobile social networks for added-value services</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The emerging evolution of technology has changed the role of mobile phones which apart from beingcommunication devices are also powerful devices for uploading and consuming content. This fact poses newchallenges for the mobile industry, which needs to develop and adapt useful and appealing services for theusers in order to enhance the role of the mobile phone as a mainstream device. Adopting and using mobilesocial networks sites and other Web 2.0 services is expected to be inline with such a mobile technologytrend. Current mobile web technologies offer a computer-like user-experience since a user can easilygenerate and share digital content from his/her mobile. However, current services and applications do notinclude techniques for analyzing this mass user-generated input (e.g. content, annotations), user interactions(e.g. ranking) and social interactions (e.g. relationships). Knowledge extracted from this massive usercontribution and interaction can offer personalized added-value services enabling more efficient mobileusage. Our goal is to outline this information analysis gaps in existing services and going one step further tosuggest possible solutions. Aiming at social networks we discuss novel methods for analyzing usersâ€™ actionsand modeling usersâ€™ social relationships. The goal from these suggestions is to extract the underlyingknowledge from usersâ€™ tagging activities, usersâ€™ generated content and usersâ€™ social relationships within asocial network. We present our points with indicative example services.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>34</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging Collective Intelligence through Community Detection in Tag Networks</style></title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collective intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">community detection</style></keyword><keyword><style  face="normal" font="default" size="100%">tag networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper studies the problem of community detectionin tag networks, i.e. networks consisting of associationsbetween tags that are used within Social Tagging Systems(STS) to annotate online resources (e.g. bookmarks,pictures, videos, etc.). Community detectionmethods aim at uncovering densely connected groupsof tags, which can reveal the topic structure emergingin the STS. In this way, community detection in tagnetworks leverages Collective Intelligence (CI), that isthe intelligence that is accumulated as a result of thecollective activities of masses of users.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moussiades, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Kefalas, Petros</style></author><author><style face="normal" font="default" size="100%">Stamatis, Demosthenes</style></author><author><style face="normal" font="default" size="100%">Douligeris, Christos</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Mining the Community Structure of a Web Site</style></title><secondary-title><style face="normal" font="default" size="100%">BCI</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">239-244</style></pages><isbn><style face="normal" font="default" size="100%">978-0-7695-3783-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Petridou, Sophia G.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A new approach to web users clustering and validation: a divergence-based scheme</style></title><secondary-title><style face="normal" font="default" size="100%">IJWIS</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cluster analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet Data mining</style></keyword><keyword><style  face="normal" font="default" size="100%">User studies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">348-371</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Purpose â€“ Web usersâ€™ clustering is an important mining task since it contributes in identifying usagepatterns, a beneficial task for a wide range of applications that rely on the web. The purpose of thispaper is to examine the usage of Kullback-Leibler (KL) divergence, an information theoretic distance,as an alternative option for measuring distances in web users clustering.Design/methodology/approach â€“ KL-divergence is compared with other well-known distancemeasures and clustering results are evaluated using a criterion function, validity indices, andgraphical representations. Furthermore, the impact of noise (i.e. occasional or mistaken page visits) isevaluated, since it is imperative to assess whether a clustering process exhibits tolerance in noisyenvironments such as the web.Findings â€“ The proposed KL clustering approach is of similar performance when compared withother distance measures under both synthetic and real data workloads. Moreover, imposing extranoise on real data, the approach shows minimum deterioration among most of the other conventionaldistance measures.Practical implications â€“ The experimental results show that a probabilistic measure such asKL-divergence has proven to be quite efficient in noisy environments and thus constitute a goodalternative, the web users clustering problem.Originality/value â€“ This work is inspired by the usage of divergence in clustering of biological dataand it is introduced by the authors in the area of web clustering. According to the experimental resultspresented in this paper, KL-divergence can be considered as a good alternative for measuringdistances in noisy environments such as the web.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Next generation content networks: trends and challenges</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">49</style></pages><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Proceedings of the 4th Workshop on the Use of P2P, GRID and Agents for the Development of Content Networks, UPGRADE-CNâ€™09, jointly held with the 18th International Symposium on High-Performance Distributed Computing (HPDC-18 2009), 10 June 2009, Ga</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Liu, Ling</style></author><author><style face="normal" font="default" size="100%">Ozsu, M. Tamer</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Services</style></title><secondary-title><style face="normal" font="default" size="100%">Encyclopedia of Database Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer US</style></publisher><pages><style face="normal" font="default" size="100%">2546-2547</style></pages><isbn><style face="normal" font="default" size="100%">978-0-387-39940-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A clustering-based prefetching scheme on a Web cache environment</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Electrical Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">309-323</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Co-Clustering Tags and Social Data Sources</style></title><secondary-title><style face="normal" font="default" size="100%">WAIM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">317-324</style></pages><isbn><style face="normal" font="default" size="100%">978-0-7695-3185-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Under social tagging systems, a typical Web 2.0 application,users label digital data sources by using freely chosentextual descriptions (tags). Poor retrieval in the aforementionedsystems remains a major problem mostly due toquestionable tag validity and tag ambiguity. Earlier clusteringtechniques have shown limited improvements, since theywere based mostly on tag co-occurrences. In this paper,a co-clustering approach is employed, that exploits jointgroups of related tags and social data sources, in whichboth social and semantic aspects of tags are consideredsimultaneously. Experimental results demonstrate the effi-ciency and the beneficial outcome of the proposed approachin correlating relevant tags and resources.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Buyya, Rajkumar</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Content Delivery Networks (Lecture Notes Electrical Engineering)</style></title><secondary-title><style face="normal" font="default" size="100%">Content Delivery Networks</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cdn</style></keyword><keyword><style  face="normal" font="default" size="100%">content</style></keyword><keyword><style  face="normal" font="default" size="100%">lnee</style></keyword><keyword><style  face="normal" font="default" size="100%">networks</style></keyword><keyword><style  face="normal" font="default" size="100%">placement</style></keyword><keyword><style  face="normal" font="default" size="100%">qos</style></keyword><keyword><style  face="normal" font="default" size="100%">replacement</style></keyword><keyword><style  face="normal" font="default" size="100%">replica</style></keyword><keyword><style  face="normal" font="default" size="100%">search</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><edition><style face="normal" font="default" size="100%">1</style></edition><publisher><style face="normal" font="default" size="100%">Springer-Verlag Gmbh</style></publisher><isbn><style face="normal" font="default" size="100%">3540778861</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">**Content Delivery Networks** enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Petridou, Sophia G.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Hacid, Hakim</style></author><author><style face="normal" font="default" size="100%">Benatallah, Boualem</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bailey, James</style></author><author><style face="normal" font="default" size="100%">Maier, David</style></author><author><style face="normal" font="default" size="100%">Schewe, Klaus-Dieter</style></author><author><style face="normal" font="default" size="100%">Thalheim, Bernhard</style></author><author><style face="normal" font="default" size="100%">Wang, Xiaoyang Sean</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Correlating Time-Related Data Sources with Co-clustering</style></title><secondary-title><style face="normal" font="default" size="100%">WISE</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">5175</style></volume><pages><style face="normal" font="default" size="100%">264-279</style></pages><isbn><style face="normal" font="default" size="100%">978-3-540-85480-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;A huge amount of data is circulated and collected every dayon a regular time basis. Given a pair of such datasets, it might be possibleto reveal hidden dependencies between them since the presence of the onedataset elements may influence the elements of the other dataset and viceversa. Furthermore, the impact of these relations may last during a periodinstead of the time point of their co-occurrence. Mining such relationsunder those assumptions is a challenging problem. In this paper, we studytwo time-related datasets whose elements are bilaterally affected overtime. We employ a co-clustering approach to identify groups of similarelements on the basis of two distinct criteria: the direction and durationof their impact. The proposed approach is evaluated using time-relatednews and stockâ€™s market real datasets.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Thomos, Charilaos</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Caching Techniques in CDNs using a Classification Approach</style></title><secondary-title><style face="normal" font="default" size="100%">IJBDCN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">1-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) provide an efficient support for serving â€śresourcehungryâ€ťapplications while minimizing the network impact of content delivery as well asshifting the traffic away from overloaded origin servers. However, their performance gain islimited since the storage space in CDNâ€™s servers is not used optimally. In order to managetheir storage capacity in an efficient way, we integrate caching techniques in CDNs. Thechallenge is to decide which objects would be devoted to caching so as the CDNâ€™s server maybe used both as a replicator and as a proxy server. In this paper we propose a nonlinear nonparametricmodel which classifies the CDNâ€™s server cache into two parts. Through a detailedsimulation environment, we show that the proposed technique can yield significant reductionin user-perceived latency as compared with other heuristic schemes.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Theodosiou, Theodosios</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Non-linear correlation of content and metadata information extracted from biomedical article datasets</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Biomedical Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">202-216</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sidiropoulos, Antonis</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Prefetching in Content Distribution Networks via Web Communities Identification and Outsourcing</style></title><secondary-title><style face="normal" font="default" size="100%">World Wide Web</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">39-70</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SEMSOC: SEMantic, SOcial and Content-Based Clustering in Multimedia Collaborative Tagging Systems</style></title><secondary-title><style face="normal" font="default" size="100%">ICSC</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">128-135</style></pages><isbn><style face="normal" font="default" size="100%">978-0-7695-3279-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Mpalasas, Antonios</style></author><author><style face="normal" font="default" size="100%">Valavanis, Michael</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">An, Aijun</style></author><author><style face="normal" font="default" size="100%">Matwin, Stan</style></author><author><style face="normal" font="default" size="100%">Ras, Zbigniew W.</style></author><author><style face="normal" font="default" size="100%">Slezak, Dominik</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Structure-Based Clustering on LDAP Directory Information</style></title><secondary-title><style face="normal" font="default" size="100%">ISMIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">4994</style></volume><pages><style face="normal" font="default" size="100%">121-130</style></pages><isbn><style face="normal" font="default" size="100%">978-3-540-68122-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;LDAP directories have rapidly emerged as the essentialframework for storing a wide range of heterogeneous information undervarious applications and services. Increasing amounts of informationare being stored in LDAP directories imposing the need for efficientdata organization and retrieval. In this paper, we propose the LPAIR&amp;amp; LMERGE (LP-LM) hierarchical agglomerative clustering algorithmfor improving LDAP data organization. LP-LM merges a pair of clustersat each step, considering the LD-vectors, which represent the entriesâ€™structure. The clustering-based LDAP data organization enhances LDAPserverâ€™s response times, under a specific query framework.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petridou, Sophia G.</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Time-Aware Web Users’ Clustering</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Trans. Knowl. Data Eng.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">653-667</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Clustering subjects in a credential-based access control framework</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">120-129</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hammiche, Samira</style></author><author><style face="normal" font="default" size="100%">Lopez, Bernardo</style></author><author><style face="normal" font="default" size="100%">Benbernou, Salima</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Domain Knowledge Based Queries for Multimedia Data Retrieval</style></title><secondary-title><style face="normal" font="default" size="100%">JDIM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Logic Languages</style></keyword><keyword><style  face="normal" font="default" size="100%">Mapping Rules</style></keyword><keyword><style  face="normal" font="default" size="100%">MPEG-7</style></keyword><keyword><style  face="normal" font="default" size="100%">Multimedia Data Descriptions</style></keyword><keyword><style  face="normal" font="default" size="100%">Ontology</style></keyword><keyword><style  face="normal" font="default" size="100%">Semantic and Structural Aspects</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">75-81</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper describes an approach for semantic description and retrieval of multimedia data described by means ofMPEG-7. This standard uses XML schema to define the descriptions. Therefore, it lacks ability to represent the data semanticsin a formal and concise way and it does not allow integration and use of domain specific knowledge. Moreover,inference mechanisms are not provided and hence the extraction of implicit information is not (always) possible. To addressthese issues, we propose to add a conceptual layer on top of MPEG-7 metadata layer, where the domain knowledgeis represented using a formal language. A set of mapping rules is proposed. They serve as a bridge between the twolayers.Querying MPEG-7 descriptions using XML query languages such as XPath or XQuery requires to know MPEG-7syntax and documents structure. To provide a flexible query formulation, we exploit the conceptual layer vocabularyto express user queries. A user query, making reference to terms specified at the conceptual level, is rewritten into anXQuery expression over MPEG-7 descriptions.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Theodosiou, Theodosios</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Thomopoulos, G. N.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Gene functional annotation by statistical analysis of biomedical articles</style></title><secondary-title><style face="normal" font="default" size="100%">I. J. Medical Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">8</style></number><volume><style face="normal" font="default" size="100%">76</style></volume><pages><style face="normal" font="default" size="100%">601-613</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Validation and interpretation of Web users’ sessions clusters</style></title><secondary-title><style face="normal" font="default" size="100%">Inf. Process. Manage.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">1348-1367</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Simeoforidis, Zisis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Levi, Albert</style></author><author><style face="normal" font="default" size="100%">Savas, Erkay</style></author><author><style face="normal" font="default" size="100%">Yenigün, Hüsnü</style></author><author><style face="normal" font="default" size="100%">Balcisoy, Selim</style></author><author><style face="normal" font="default" size="100%">Saygin, Yücel</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Credential-Based Policies Management in an Access Control Framework Protecting XML Resources</style></title><secondary-title><style face="normal" font="default" size="100%">ISCIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">4263</style></volume><pages><style face="normal" font="default" size="100%">603-612</style></pages><isbn><style face="normal" font="default" size="100%">3-540-47242-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;XML has been widely adopted for Web data representation undervarious applications (such as DBMSs, Digital Libraries etc). Therefore, accessto XML data sources has become a crucial issue. In this paper we introduce acredential-based access control framework for protecting XML resources. Underthis framework, we propose the use of access policy files containing policiesconcerning a specific credentials type. Moreover, we propose the reorganizationof the policies in these files based on their frequency of use (the morefrequently it is used the higher in the file it is placed). Our main goal is to improverequest servicing times. Several experiments have been conducted whichare carried out either on single request or on multiple requests base. The proposedframework is proven quite beneficial for protecting XML-based frameworkssuch as digital libraries or any other data resources whose format is expressedin XML.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petridou, Sophia G.</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Gavrilova, Marina L.</style></author><author><style face="normal" font="default" size="100%">Gervasi, Osvaldo</style></author><author><style face="normal" font="default" size="100%">Kumar, Vipin</style></author><author><style face="normal" font="default" size="100%">Tan, Chih Jeng Kenneth</style></author><author><style face="normal" font="default" size="100%">Taniar, David</style></author><author><style face="normal" font="default" size="100%">LaganĂ , Antonio</style></author><author><style face="normal" font="default" size="100%">Mun, Youngsong</style></author><author><style face="normal" font="default" size="100%">Choo, Hyunseung</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Divergence-Oriented Approach for Web Users Clustering</style></title><secondary-title><style face="normal" font="default" size="100%">ICCSA (2)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3981</style></volume><pages><style face="normal" font="default" size="100%">1229-1238</style></pages><isbn><style face="normal" font="default" size="100%">3-540-34072-6</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Clustering web users based on their access patterns is a quite significanttask in Web Usage Mining. Further to clustering it is important to evaluatethe resulted clusters in order to choose the best clustering for a particular framework.This paper examines the usage of Kullback-Leibler divergence, aninformation theoretic distance, in conjuction with the k-means clusteringalgorithm. It compares KL-divergence with other well known distance measures(Euclidean, Standardized Euclidean and Manhattan) and evaluates clusteringresults using both objective functionâ€™s value and Davies-Bouldin index.Since it is imperative to assess whether the results of a clustering process aresusceptible to noise, especially in noisy environments such as Web environment,our approach takes the impact of noise into account. The clusters obtainedwith KL approach seem to be superior to those obtained with the otherdistance measures in case our data have been corrupted by noise.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Insight and Perspectives for Content Delivery Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Commun. ACM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">imported</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">New York, NY, USA</style></pub-location><volume><style face="normal" font="default" size="100%">49</style></volume><pages><style face="normal" font="default" size="100%">101–106</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Sellis, Timos K.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Caching Techniques on a Content Distribution Network</style></title><secondary-title><style face="normal" font="default" size="100%">ADBIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">4152</style></volume><pages><style face="normal" font="default" size="100%">200-215</style></pages><isbn><style face="normal" font="default" size="100%">3-540-37899-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Web caching and replication tune capacity with performance and theyhave become essential components of the Web. In practice, caching and replicationtechniques have been applied in proxy servers and Content DistributionNetworks (CDNs) respectively. In this paper, we investigate the benefits of integratingcaching policies on a CDNâ€™ s infrastructure. Using a simulation testbed,our results indicate that there is much room for performance improvement interms of perceived latency, hit ratio and byte hit ratio. Moreover, we show thatthe combination of caching with replication fortifies CDNs against flash crowdevents.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">QoS-oriented negotiation in disk subsystems</style></title><secondary-title><style face="normal" font="default" size="100%">Data Knowl. Eng.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">58</style></volume><pages><style face="normal" font="default" size="100%">107-128</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Sidiropoulos, Antonis</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Barga, Roger S.</style></author><author><style face="normal" font="default" size="100%">Zhou, Xiaofang</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Replication Based on Objects Load under a Content Distribution Network</style></title><secondary-title><style face="normal" font="default" size="100%">ICDE Workshops</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">53</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Thomos, Charilaos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Desai, Bipin C.</style></author><author><style face="normal" font="default" size="100%">Gupta, Shyam K.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A similarity based approach for integrated Web caching and content replication in CDNs</style></title><secondary-title><style face="normal" font="default" size="100%">IDEAS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">239-242</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Web caching and content replication techniques emergedto solve performance problems related to the Web. We proposea generic non-parametric heuristic method that integratesboth techniques under a CDN. We provide experimentationshowing that our method outperforms the so farseparate implementations of Web caching and content replication.Moreover, we show that the performance improvementcompared with an existing algorithm is significant. Wetest all these techniques in a simulation environment undera flash crowd event and a workload of a typical lightweightedCDN operation.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Sidiropoulos, Eythimis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">FRES-CAR: An Adaptive Cache Replacement Policy</style></title><secondary-title><style face="normal" font="default" size="100%">WIRI</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">74-81</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2414-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Caching Web objects has become a common practicetowards improving content delivery and usersâ€™ servicing.A Web caching framework is characterized by its cachereplacement policy, which identifies the objects (i.e. theelements on a Web page, which include text, graphics,and scripts) to be replaced in a cache upon a requestarrival. In this paper, we present a cache replacementalgorithm (so-called FRES-CAR), which identifies theobjects that should be evicted by considering togetherthree important criteria: objectâ€™s frequency, recency andsize. Experimentation under synthetic workloads hasshown that FRES-CAR achieves higher hit rates whencompared with the most popular and existing algorithms.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Theodosiou, Theodosios</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Functional Annotation of Genes through Statistical Analysis of Biomedical Articles</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA Workshops</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">585-589</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2424-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One of the most elaborate and important tasks inbiology is the functional annotation of genes.Biologists have developed standardized and structuredvocabularies, called bio-ontologies, to assist them indescribing the different functions. A critical issue inthe assignment of functions to genes is the utilizationof knowledge from published biomedical articles. Thepurpose of this paper is to present a unified andcomprehensive statistical methodology for functionallyannotating genes using biomedical literature.Specifically, classification models are built using thediscriminant analysis method while validation,analysis and interpretation of the results is based ongraphical methods and various performance metricsand techniques. The general conclusions from thestudy are very promising, in the sense that theproposed methodology not only performs well in theassignment of functions to genes, but also providesuseful and interpretable results regarding thediscriminating power of certain keywords in the texts.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bertino, Elisa</style></author><author><style face="normal" font="default" size="100%">Kamra, Ashish</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intrusion Detection in RBAC-administered Databases</style></title><secondary-title><style face="normal" font="default" size="100%">ACSAC</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">170-182</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2461-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;A considerable effort has been recently devoted to thedevelopment of Database Management Systems (DBMS)which guarantee high assurance security and privacy. Animportant component of any strong security solution is representedby intrusion detection (ID) systems, able to detectanomalous behavior by applications and users. To date,however, there have been very few ID mechanisms specificallytailored to database systems. In this paper, we proposesuch a mechanism. The approach we propose to IDis based on mining database traces stored in log files. Theresult of the mining process is used to form user profilesthat can model normal behavior and identify intruders. Anadditional feature of our approach is that we couple ourmechanism with Role Based Access Control (RBAC). Undera RBAC system permissions are associated with roles, usuallygrouping several users, rather than with single users.Our ID system is able to determine role intruders, that is,individuals that while holding a specific role, have a behaviordifferent from the normal behavior of the role. Animportant advantage of providing an ID mechanism specifi-cally tailored to databases is that it can also be used to protectagainst insider threats. Furthermore, the use of rolesmakes our approach usable even for databases with largeuser population. Our preliminary experimental evaluationon both real and synthetic database traces show that ourmethods work well in practical situations.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Sidiropoulos, Antonis</style></author><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Latency-Based Object Placement Approach in Content Distribution Networks</style></title><secondary-title><style face="normal" font="default" size="100%">LA-WEB</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">140-147</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2471-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hammiche, Samira</style></author><author><style face="normal" font="default" size="100%">Benbernou, Salima</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Logic Based Approach for the Multimedia Data Representation and Retrieval</style></title><secondary-title><style face="normal" font="default" size="100%">ISM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">241-248</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2489-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Nowadays, the amount of multimedia data is increasingrapidly, and hence, there is an increasing need for efficientmethods to manage the multimedia content. This paper proposesa framework for the description and retrieval of multimediadata. The data are represented at both the syntactic(structure, metadata and low level features) and semantic(the meaning of the data) levels. We use the MPEG-7 standard,which provides a set of tools to describe multimediacontent from different viewpoints, to represent the syntacticlevel. However, due to its XML Schema based representation,MPEG-7 is not suitable to represent the semanticaspect of the data in a formal and concise way. Moreover,inferential mechanisms are not provided. To alleviate theselimitations, we propose to extend MPEG-7 with a domainontology, formalized using a logical formalism. Then, thesemantic aspect of the data is described using the ontologyâ€™svocabulary, as a set of logical expressions. We enhancethe ontology by a rules layer, to describe more complexconstraints between domain concepts and relations.Userâ€™s queries may concern the syntactic and/or semanticfeatures. The syntactic constraints are expressed usingXQuery language and evaluated using an XML query engine;whereas the semantic query constraints are expressedusing a rules language and evaluated using a specific resolutionmechanism.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Murray, Neil V.</style></author><author><style face="normal" font="default" size="100%">Ras, Zbigniew W.</style></author><author><style face="normal" font="default" size="100%">Tsumoto, Shusaku</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Model-Based Cluster Analysis for Web Users Sessions</style></title><secondary-title><style face="normal" font="default" size="100%">ISMIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Model-Based Cluster Analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3488</style></volume><pages><style face="normal" font="default" size="100%">219-227</style></pages><isbn><style face="normal" font="default" size="100%">3-540-25878-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One of the main issues in Web usage mining is the discovery of patternsin the navigational behavior of Web users. Standard approaches, such as clusteringof usersâ€™sessions and discovering association rules or frequent navigational paths,do not generally allow to characterize or quantify the unobservable factors that leadto common navigational patterns. Therefore, it is necessary to develop techniquesthat can discover hidden and useful relationships among users as well as betweenusers and Web objects.Correspondence Analysis(CO-AN) is particularly useful inthis context, since it can uncover meaningful associations among users and pages.We present a model-based cluster analysis for Web users sessions including anovel visualization and interpretation approach which is based on CO-AN.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Moussiades, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">PDetect: A Clustering Approach for Detecting Plagiarism in Source Code Datasets</style></title><secondary-title><style face="normal" font="default" size="100%">Comput. J.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">48</style></volume><pages><style face="normal" font="default" size="100%">651-661</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Khosrow-Pour, Mehdi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Storage and Access Control Issues for XML Documents</style></title><secondary-title><style face="normal" font="default" size="100%">Encyclopedia of Information Science and Technology (V)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Idea Group</style></publisher><pages><style face="normal" font="default" size="100%">2616-2621</style></pages><isbn><style face="normal" font="default" size="100%">1-59140-553-X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Anna Maddalena</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">XML Data Stores: Emerging Practices</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">62-69</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Anna Maddalena</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">XML document indexes: a classification</style></title><secondary-title><style face="normal" font="default" size="100%">Internet Computing, IEEE</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">documents indexing</style></keyword><keyword><style  face="normal" font="default" size="100%">xml</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">64–71</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;XML’s increasing diffusion makes efficient XML query processing and indexing all the more critical. Given the semistructured nature of XML documents, however, general query processing techniques won’t work. Researchers have proposed several specialized indexing methods that offer query processors efficient access to XML documents, although none are yet fully implemented in commercial products. In this article the classification of XML indexing techniques identifies current practices and trends, offering insight into how developers can improve query processing and select the best solution for particular contexts.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Anna Maddalena</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">XML Document Indexes: A Classification</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">64-71</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Current Trends in Database Technology â€“ EDBT 2004 Workshops, EDBT 2004 Workshops PhD, DataX, PIM, P2P&amp;DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004, Revised Selected Papers</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">LDAP: Framework, Practices, and Trends</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">66-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pomportsis, Andreas S.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A learning-automata-based controller for client/server systems</style></title><secondary-title><style face="normal" font="default" size="100%">Neurocomputing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">client/server systems</style></keyword><keyword><style  face="normal" font="default" size="100%">learning automata</style></keyword><keyword><style  face="normal" font="default" size="100%">polling policies</style></keyword><keyword><style  face="normal" font="default" size="100%">throughput improvement</style></keyword><keyword><style  face="normal" font="default" size="100%">time-delay</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><volume><style face="normal" font="default" size="100%">61</style></volume><pages><style face="normal" font="default" size="100%">381-394</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Polling policies have been introduced to simplifythe accessing process in client/server systems by acentralized control access scheme. This paper considers aclient/server model which employs a polling policy as itsaccess strategy. We propose a learning-automata-based approachfor polling in order to improve the throughput-delayperformance of the system. Each client has an associatedqueue and the server performs selective polling such thatthe next client to be served is identified by a learning automaton.The learning automaton updates each clientâ€™schoice probability according to the feedback information.Under the considered approach, a clientâ€™s choice probabilityasymptotically tends to be proportional to the probabilitythat this client is ready. Simulation results have shown thatthe proposed polling policy is beneficial in comparison tothe conventional round-robin polling when operating underbursty traffic conditions. The benefits are significant for thedelay reduction in the considered client/server system.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MPEG-7 based description schemes for multi-level video content classification</style></title><secondary-title><style face="normal" font="default" size="100%">Image Vision Comput.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">367-378</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Dalamagas, Theodore</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">An Overview of Web Data Clustering Practices</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Web Data Clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><pages><style face="normal" font="default" size="100%">597-606</style></pages><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Clustering is a challenging topic in the area of Web data management.Various forms of clustering are required in a wide range of applications, includingfinding mirrored Web pages, detecting copyright violations, and reporting searchresults in a structured way. Clustering can either be performed once offline, (independentlyto search queries), or online (on the results of search queries). Importantefforts have focused on mining Web access logs and to cluster search engine resultson the fly. Online methods based on link structure and text have been appliedsuccessfully to finding pages on related topics. This paper presents an overview ofthe most popular methodologies and implementations in terms of clustering eitherWeb users or Web sources and presents a survey about current status and futuretrends in clustering employed over the Web.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A probabilistic validation algorithm for Web users’ clusters</style></title><secondary-title><style face="normal" font="default" size="100%">SMC (5)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">4129-4134</style></pages><isbn><style face="normal" font="default" size="100%">0-7803-8566-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hammiche, Samira</style></author><author><style face="normal" font="default" size="100%">Benbernou, Salima</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Chen, Shu-Ching</style></author><author><style face="normal" font="default" size="100%">Shyu, Mei-Ling</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Semantic retrieval of multimedia data</style></title><secondary-title><style face="normal" font="default" size="100%">MMDB</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Approximation Ontologies</style></keyword><keyword><style  face="normal" font="default" size="100%">MPEG-7</style></keyword><keyword><style  face="normal" font="default" size="100%">Multimedia Data</style></keyword><keyword><style  face="normal" font="default" size="100%">Tree embedding</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">36-44</style></pages><isbn><style face="normal" font="default" size="100%">1-58113-975-6</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper deals with the problem of finding multimediadata that fulfill the requirements of user queries. We assumeboth the user query and the multimedia data are expressedby MPEG-7 standard. The MPEG-7 formalism lacks thesemantics and reasoning support in many ways. For example,the search of the implicit data can not be achieved,due to its description based on XML schema. We propose aframework for querying multimedia data based on a tree embeddingapproximation algorithm, combining the MPEG-7standard and an ontology&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A simulated annealing approach for multimedia data placement</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Systems and Software</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">73</style></volume><pages><style face="normal" font="default" size="100%">467-480</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Web-based delegation using XML</style></title><secondary-title><style face="normal" font="default" size="100%">SMC (6)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Delegation</style></keyword><keyword><style  face="normal" font="default" size="100%">XML access control</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">5189-5194</style></pages><isbn><style face="normal" font="default" size="100%">0-7803-8566-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Existing access control mechanisms should beextended in order to authorize external (and possiblyunknown) clients, when entering distributedenvironments. This paper proposes the structure andissuing of appropriate authorization certificate to supportthe delegation process under a role-based access controlenvironment. The proposed processes aim to enhanceaccessing automation and to avoid (centraladministrator) bottlenecks (in cases of altering anauthorization or a policy). The delegation requests andthe certificates are expressed according to the XMLsyntax for enhancing the interoperability of thedelegation processes, which is highlighted in a step-bystepalgorithmic fashion using flowcharts.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zeng, Xingjie</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Zhang, Dongmo</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An XML-Based Bootstrapping Method for Pattern Acquisition</style></title><secondary-title><style face="normal" font="default" size="100%">ICEIS (2)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><pages><style face="normal" font="default" size="100%">303-308</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Tsoukalas, Ioannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">XML-Based Revocation and Delegation in a Distributed Environment</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><pages><style face="normal" font="default" size="100%">299-308</style></pages><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rapid increase on the circulation of data over the web has highlightedthe need for distributed storage of Internet-accessible information due tothe rapid increase on the circulation of data over the web. Thus, access controlmechanisms should also be distributed in order to protect them effectively. A recentidea in the access control theory is the delegation and revocation of rights,i.e. the passing over of one clients rights to the other and vice versa. Here, wepropose an XML-based distributed delegation module which can be integratedinto a distributed role-based access control mechanism protecting networks. Theidea of X.509v3 certificates is used for the transfer of authorization informationreferring to a client. The modules are XML-based and all of the associated datastructures are expressed through Document Type Definitions (DTDs).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Content Delivery Networks: Status and Trends</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">68-74</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Bertino, Elisa</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hierarchical data placement for navigational multimedia applications</style></title><secondary-title><style face="normal" font="default" size="100%">Data Knowl. Eng.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">44</style></volume><pages><style face="normal" font="default" size="100%">49-80</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Zhou, Xiaofang</style></author><author><style face="normal" font="default" size="100%">Zhang, Yanchun</style></author><author><style face="normal" font="default" size="100%">Orlowska, Maria E.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Knowledge Representation, Ontologies, and the Semantic Web</style></title><secondary-title><style face="normal" font="default" size="100%">APWeb</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">2642</style></volume><pages><style face="normal" font="default" size="100%">382-387</style></pages><isbn><style face="normal" font="default" size="100%">3-540-02354-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A unified representation for web data and web resources, isabsolutely necessary in nowdays large scale Internet data managementsystems. This representation will allow for the machines to meaningfullyprocess the available information and provide semantically correct answersto imposed queries. Ontologies are expected to play an importantrole towards this direction of web technology which defines the so called,Semantic Web. The goal of this paper is to provide an overview of theKnowledge Representation (KR) techniques and languages that can beused as standards in the Semantic Web.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Hamza, M. H.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Study on Workload Characterization for a Web Proxy Server</style></title><secondary-title><style face="normal" font="default" size="100%">Applied Informatics</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Web Caching</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Data Workload Analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Technologies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">IASTED/ACTA Press</style></publisher><pages><style face="normal" font="default" size="100%">779-784</style></pages><isbn><style face="normal" font="default" size="100%">0-88986-345-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The popularity of the World-Wide-Web has increaseddramatically in the past few years. Web proxy servershave an important role in reducing server loads, networktraffic, and client request latencies. This paper presentsa detailed workload characterization study of a busyWeb proxy server. The study aims in identifying themajor characteristics which will improve modelling ofWeb proxy accessing. A set of log files is processed forworkload characterization. Throughout the study,emphasis is given on identifying the criteria for a Webcaching model. A statistical analysis, based on theprevious criteria, is presented in order to characterizethe major workload parameters. Results of this analysisare presented and the paper concludes with a discussionabout workload characterization and content deliveryissues.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An XML-based language for access control specifications in an RBAC environment</style></title><secondary-title><style face="normal" font="default" size="100%">SMC</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Access control</style></keyword><keyword><style  face="normal" font="default" size="100%">Attribute Certificates</style></keyword><keyword><style  face="normal" font="default" size="100%">Role Based Access Control</style></keyword><keyword><style  face="normal" font="default" size="100%">XML-based language</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1717-1722</style></pages><isbn><style face="normal" font="default" size="100%">0-7803-7952-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Lately, Web-accessed resources havesuperceded the resources accessed by local or wide-areanetworks. Therefore, new mechanisms should beimplemented for protecting resources from unknownclients. Attribute Certificates is a quite new technologyoffering such functionality. Those certificates are issuedby Attribute Authorities validating the attributes of theowner of the certificate. Based on this technology anXML-based access control mechanism is introduced forprotecting any kind of resources (from both known andunknown clients). The proposed model is ultimately rolebasedsince both clients and protected resources areorganized into roles. Moreover, an XML-based languageis introduced to express roles, authorizations, delegationrules, hierarchies and certificates.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aref, Walid G.</style></author><author><style face="normal" font="default" size="100%">Catlin, Ann Christine</style></author><author><style face="normal" font="default" size="100%">Elmagarmid, Ahmed K.</style></author><author><style face="normal" font="default" size="100%">Fan, Jianping</style></author><author><style face="normal" font="default" size="100%">Guo, J.</style></author><author><style face="normal" font="default" size="100%">Hammad, Moustafa A.</style></author><author><style face="normal" font="default" size="100%">Ilyas, Ihab F.</style></author><author><style face="normal" font="default" size="100%">Marzouk, Mirette S.</style></author><author><style face="normal" font="default" size="100%">Prabhakar, Sunil</style></author><author><style face="normal" font="default" size="100%">Rezgui, Abdelmounaam</style></author><author><style face="normal" font="default" size="100%">Teoh, S.</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Tu, Yi-Cheng</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Zhu, Xingquan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Agrawal, Rakesh</style></author><author><style face="normal" font="default" size="100%">Dittrich, Klaus R.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Distributed Database Server for Continuous Media</style></title><secondary-title><style face="normal" font="default" size="100%">ICDE</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">490-491</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-1531-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In our project, we adopt a new approach for handlingvideo data. We view the video as a well-defined datatype with its own description, parameters, and applicablemethods. The system is based on PREDATOR, the opensource object relational DBMS. PREDATOR uses Shoreas the underlying storage manager (SM). Supporting videooperations (storing, searching by content, and streaming)and new query types (query by examples and multi-featuressimilarity search) requires major changes in many ofthe traditional system components. More specifically,the storage and buffer manager will have to deal withhuge volumes of data with real time constraints. Queryprocessing has to consider the video methods and operatorsin generating, optimizing and executing query plans.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolutionary Techniques for Web Caching</style></title><secondary-title><style face="normal" font="default" size="100%">Distributed and Parallel Databases</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">93-116</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Video data storage policies: an access frequency based approach</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Electrical Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">447-464</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author><author><style face="normal" font="default" size="100%">Pomportsis, Andreas S.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A feedback-based model for I/O servicing</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Electrical Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">309-322</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Angelis, Lefteris</style></author><author><style face="normal" font="default" size="100%">Pournara, Dimitra</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Internet based auctions: a survey on models and applications</style></title><secondary-title><style face="normal" font="default" size="100%">SIGecom Exchanges</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">6-15</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multimedia Data Storage and Representation Issues on Tertiary Storage Subssystems: An Overview</style></title><secondary-title><style face="normal" font="default" size="100%">Operating Systems Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">61-77</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proxy Cache Replacement Algorithms: A History-Based Approach</style></title><secondary-title><style face="normal" font="default" size="100%">World Wide Web</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">277-298</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Stupa, Constantina</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Hung, C. C.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A QoS based disk subsystem</style></title><secondary-title><style face="normal" font="default" size="100%">Computers and Their Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><publisher><style face="normal" font="default" size="100%">ISCA</style></publisher><pages><style face="normal" font="default" size="100%">409-412</style></pages><isbn><style face="normal" font="default" size="100%">1-880843-37-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hacid, Mohand-Said</style></author><author><style face="normal" font="default" size="100%">Terzi, Evimaria</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Querying XML with Constraints</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Internet Computing (1)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Query Languages Rules</style></keyword><keyword><style  face="normal" font="default" size="100%">xml</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><pages><style face="normal" font="default" size="100%">171-177</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;XML is a language for the description of structured documents and data. It is on the way to become the new standard for data exchange, publishing, and developing intelligent Web agents. XML is based on the concept of documents composed of a series of entities (i.e., objects). Each entity can contain one or more logical elements. Each of these elements can have certain attributes (properties) that describe the way in which it is to be processed. XML provides a formal syntax for describing the relationships between the entities, elements and attributes that make up an XML document. In this paper, we introduce a framework for querying XML databases by specifying ordering constraints over documents.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ilioudis, Christos</style></author><author><style face="normal" font="default" size="100%">Pangalos, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Model for XML Data</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Internet Computing (1)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Role Based Access Control</style></keyword><keyword><style  face="normal" font="default" size="100%">XML Security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><pages><style face="normal" font="default" size="100%">400-406</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The significance of XML technology for sharing data over the Internet is being rapidly recognised. In this paper, we examine the security problems related to XML data and present our approach, the XML Security model, for enforcing security policies in XML based Information systems. Our methodology has been based on the study of the XML data model, on the identification of the security requirements of XML Information systems and on the survey of security models which have been proposed to support the conventional data models(relational, object-oriented, hypertext etc). The proposed approach takes into account and exploits the specific characteristics of XML data and incorporates the flexibility of Role based Access Control policies.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Data block prefetching and caching in a hierarchical storage model</style></title><secondary-title><style face="normal" font="default" size="100%">Inf. Sci.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><number><style face="normal" font="default" size="100%">1-2</style></number><volume><style face="normal" font="default" size="100%">128</style></volume><pages><style face="normal" font="default" size="100%">19-41</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Data placement schemes in replicated mirrored disk systems</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Systems and Software</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">55</style></volume><pages><style face="normal" font="default" size="100%">115-128</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Yakhno, Tatyana M.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolutionary Prefetching and Caching in an Independent Storage Units Model</style></title><secondary-title><style face="normal" font="default" size="100%">ADVIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">data prefetching and caching</style></keyword><keyword><style  face="normal" font="default" size="100%">object-based storage models</style></keyword><keyword><style  face="normal" font="default" size="100%">parallel storage units</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">1909</style></volume><pages><style face="normal" font="default" size="100%">265-274</style></pages><isbn><style face="normal" font="default" size="100%">3-540-41184-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Modern applications demand support for a large number ofclients and require large scale storage subsystems. This paper presentsa theoretical model of prefetching and caching of storage objects undera parallel storage units architecture. The storage objects are definedas variable sized data blocks and a specific cache area is reserved fordata prefetching and caching. An evolutionary algorithm is proposed foridentifying the storage objects to be prefetched and cached. The storageobject prefetching approach is experimented under certain artificialworkloads of requests for a set of storage units and has shown significantperformance improvement with respect to request service times, as wellas cache and byte hit ratios.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bauknecht, Kurt</style></author><author><style face="normal" font="default" size="100%">Sanjay Kumar Madria</style></author><author><style face="normal" font="default" size="100%">Pernul, Günther</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">LRU-based Algorithms for Web Cache Replacement</style></title><secondary-title><style face="normal" font="default" size="100%">EC-Web</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cache consistency</style></keyword><keyword><style  face="normal" font="default" size="100%">Cache replacement algorithms</style></keyword><keyword><style  face="normal" font="default" size="100%">Web caching and proxies</style></keyword><keyword><style  face="normal" font="default" size="100%">Web-based information systems</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">1875</style></volume><pages><style face="normal" font="default" size="100%">409-418</style></pages><isbn><style face="normal" font="default" size="100%">3-540-67981-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Caching has been introduced and applied in prototype andcommercial Web-based information systems in order to reduce the overallbandwidth and increase systemâ€™s fault tolerance. This paper presents atrack of Web cache replacement algorithms based on the Least RecentlyUsed (LRU) idea. We propose an extension to the conventional LRUalgorithm by considering the number of references to Web objects as acritical parameter for the cache content replacement. The proposed algorithmsare validated and experimented under Web cache traces providedby a major Squid proxy cache server installation environment. Cache andbytes hit rates are reported showing that the proposed cache replacementalgorithms improve cache content.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author><author><style face="normal" font="default" size="100%">Pomportsis, Andreas S.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bubak, Marian</style></author><author><style face="normal" font="default" size="100%">Afsarmanesh, Hamideh</style></author><author><style face="normal" font="default" size="100%">Williams, Roy</style></author><author><style face="normal" font="default" size="100%">Hertzberger, Louis O.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A New Approach to the Design of High Performance Multiple Disk Subsystems: Dynamic Load Balancing Schemes</style></title><secondary-title><style face="normal" font="default" size="100%">HPCN Europe</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">1823</style></volume><pages><style face="normal" font="default" size="100%">610-613</style></pages><isbn><style face="normal" font="default" size="100%">3-540-67553-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The performance of storage subsystems has not followed therapid improvements in processors technology, despite the increased capacityand density in storage medium. Here, we introduce a new modelbased on the idea of enhancing the I/O subsystem controller capabilitiesby dynamic load balancing on a storage subsystem of multiple disk drives.The request servicing is modified such that each request is directed to themost appropriate disk drive towards servicing performance improvement.The redirection is performed by a proposed algorithm which considersthe disk drive queues and the disk drives â€śpopularityâ€ť. The proposed requestservicing has been simulated and the load balancing approach hasbeen shown quite effective as compared to conventional request servicing.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Arabnia, Hamid R.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Caching Techniques for Parallel I/O Servicing</style></title><secondary-title><style face="normal" font="default" size="100%">PDPTA</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><publisher><style face="normal" font="default" size="100%">CSREA Press</style></publisher><pages><style face="normal" font="default" size="100%">1230-1235</style></pages><isbn><style face="normal" font="default" size="100%">1-892512-15-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Web-Based Evolutionary Model for Internet Data Caching</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA Workshop</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">650-654</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-0281-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Litwin, Witold</style></author><author><style face="normal" font="default" size="100%">Morzy, Tadeusz</style></author><author><style face="normal" font="default" size="100%">Vossen, Gottfried</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Replication in Mirrored Disk Systems</style></title><secondary-title><style face="normal" font="default" size="100%">ADBIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">1475</style></volume><pages><style face="normal" font="default" size="100%">224-235</style></pages><isbn><style face="normal" font="default" size="100%">3-540-64924-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we study data replication in a mirrored disk system.Free disk space is exploited by keeping replicas of specific cylindersat appropriate disk locations. Assuming an organ-pipe arrangement wecalculate the expected seek distance by varying the probability cylinderaccess under different distributions. Also, analytic formulae are derivedfor the expected seek distance under replication and comparison with theconventional (without replication) mirrored disk system is performed.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Exact Analysis on Expected Seeks in Shadowed Disks</style></title><secondary-title><style face="normal" font="default" size="100%">Inf. Process. Lett.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">61</style></volume><pages><style face="normal" font="default" size="100%">323-329</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Parallel data paths in two-headed disk systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Software Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">125-135</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Wagner, Roland</style></author><author><style face="normal" font="default" size="100%">Thoma, Helmut</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Impact of Seeking in Partial Match Retrieval</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA Workshop</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">432-437</style></pages><isbn><style face="normal" font="default" size="100%">0-8186-7662-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In the pastthe issue of partial match query satisfaction has been investigated inorder to establish allocation schemes minimizing the number of accessed disk pages. Inthe present workwe extend the problem by studying the impact of the seeking duringpartial match query satisfaction. The physical location of resulting pages is the newaspect studied here by considering the number and the sparseness of cylinders holding theresulting pages . Lower and upper seek time boundsas well as the average behavior ofthe seek time are calculated by assuming some real figures of specific modern disk systemdevices  The main conclusion is that the seek time is a fact or affecting the partial matchquery response time and needs to be included in the overall performance measuring.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Revell, Norman</style></author><author><style face="normal" font="default" size="100%">Tjoa, A Min</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Partial Match Retrieval in Two-Headed Disk Systems</style></title><secondary-title><style face="normal" font="default" size="100%">DEXA</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">978</style></volume><pages><style face="normal" font="default" size="100%">594-603</style></pages><isbn><style face="normal" font="default" size="100%">3-540-60303-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Seek Distances in Disks with Two Independent Heads Per Surface</style></title><secondary-title><style face="normal" font="default" size="100%">Inf. Process. Lett.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1991</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">37-42</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>