<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Helfert, Markus</style></author><author><style face="normal" font="default" size="100%">Francalanci, Chiara</style></author><author><style face="normal" font="default" size="100%">Filipe, Joaquim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Social Data Sentiment Analysis in Smart Environments - Extending Dual Polarities for Crowd Pulse Capturing</style></title><secondary-title><style face="normal" font="default" size="100%">DATA</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">SciTePress</style></publisher><pages><style face="normal" font="default" size="100%">175-182</style></pages><isbn><style face="normal" font="default" size="100%">978-989-8565-67-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bouzakis, K.-D.</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Sarigiannidou, M.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Automating the manufacturing process under a web based framework</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Engineering Software</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CAD/CAM</style></keyword><keyword><style  face="normal" font="default" size="100%">Manufacturing process</style></keyword><keyword><style  face="normal" font="default" size="100%">Process planning</style></keyword><keyword><style  face="normal" font="default" size="100%">SOAP</style></keyword><keyword><style  face="normal" font="default" size="100%">UDDI</style></keyword><keyword><style  face="normal" font="default" size="100%">Web services</style></keyword><keyword><style  face="normal" font="default" size="100%">xml</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">9</style></number><volume><style face="normal" font="default" size="100%">40</style></volume><pages><style face="normal" font="default" size="100%">956-964</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rapid evolution of the web has affected the way under which the manufacturing process is practised.In this paper, a web based framework â€“ independent from any specific CAD/CAM software â€“ is proposed,for employing electronic interaction between designers and manufacturers. In this context, designers andmanufacturers communicate for the manufacturing of a workpiece, under a platform-independent, easier,faster and more economical way. The proposed framework is implemented as a web service, wherethe Simple Object Access Protocol (SOAP) is used for the exchange of the necessary machined parts dataand the methodologies of UDDI (Universal Description Discovery and Integration) and WSDL (Web ServicesDescription Language) are introduced for providing directories and descriptions information.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Thomos, Charilaos</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Caching Techniques in CDNs using a Classification Approach</style></title><secondary-title><style face="normal" font="default" size="100%">IJBDCN</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">1-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) provide an efficient support for serving â€śresourcehungryâ€ťapplications while minimizing the network impact of content delivery as well asshifting the traffic away from overloaded origin servers. However, their performance gain islimited since the storage space in CDNâ€™s servers is not used optimally. In order to managetheir storage capacity in an efficient way, we integrate caching techniques in CDNs. Thechallenge is to decide which objects would be devoted to caching so as the CDNâ€™s server maybe used both as a replicator and as a proxy server. In this paper we propose a nonlinear nonparametricmodel which classifies the CDNâ€™s server cache into two parts. Through a detailedsimulation environment, we show that the proposed technique can yield significant reductionin user-perceived latency as compared with other heuristic schemes.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Andreadis, George</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Web-based delegation using XML</style></title><secondary-title><style face="normal" font="default" size="100%">SMC (6)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Delegation</style></keyword><keyword><style  face="normal" font="default" size="100%">XML access control</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">5189-5194</style></pages><isbn><style face="normal" font="default" size="100%">0-7803-8566-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Existing access control mechanisms should beextended in order to authorize external (and possiblyunknown) clients, when entering distributedenvironments. This paper proposes the structure andissuing of appropriate authorization certificate to supportthe delegation process under a role-based access controlenvironment. The proposed processes aim to enhanceaccessing automation and to avoid (centraladministrator) bottlenecks (in cases of altering anauthorization or a policy). The delegation requests andthe certificates are expressed according to the XMLsyntax for enhancing the interoperability of thedelegation processes, which is highlighted in a step-bystepalgorithmic fashion using flowcharts.&lt;/p&gt;
</style></abstract></record></records></xml>