<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Nikolaos Tsigilis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Experience of emotion in face to face and computer-mediated social interactions: An event sampling study</style></title><secondary-title><style face="normal" font="default" size="100%">Computers in Human Behavior</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Computer-mediated communication</style></keyword><keyword><style  face="normal" font="default" size="100%">Emotion</style></keyword><keyword><style  face="normal" font="default" size="100%">FtF</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">Social interaction</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.sciencedirect.com/science/article/pii/S0747563217304557</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">76</style></volume><pages><style face="normal" font="default" size="100%">287 - 293</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The present study compared the experience of emotion in social interactions that take place face to face (FtF), co-presently, and those that take place online, in computer-mediated communications (CMC). For a period of ten days participants reported how intensely they experienced positive and negative emotions in CMC and in FtF interactions they had with persons from their social network. Results from factor analyses discerned a three factor emotion structure (positive, negative, and anxious emotions) that was largely shared between CMC and FtF social interactions. Multilevel analyses of emotion across modes of interaction found that in FtF social encounters participants experienced more positive and less negative emotion and higher satisfaction than in CMC; there was no difference in anxious emotion. Positive, but not negative emotions or anxiety partially mediated levels of satisfaction differences between interactions in CMC and those taking place FtF. The results point to similarities and differences in emotion experience in FtF and CMC, underlining in particular the affiliative function of positive emotion in peoples' encounters.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antonia Gogoglou</style></author><author><style face="normal" font="default" size="100%">Zenonas Theodosiou</style></author><author><style face="normal" font="default" size="100%">Tasos Kounoudes</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Early Malicious Activity Discovery in Microblogs by Social Bridges Detection</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">16th International Symposium on Signal Processing and Information Technology</style></publisher><pub-location><style face="normal" font="default" size="100%">Limassol, Cyprus</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the emerging and intense use of Online Social Networks (OSNs) amongst young children and teenagers (youngters), safe networking and socializing on the Web has faced extensive scrutiny. Content and interactions which are considered safe for adult OSN users, might embed potentially threatening and malicious information when it comes to underage users. This work is motivated by the strong need to safeguard youngsters OSNs experience such that they can be empowered and aware. The topology of a graph is studied towards detecting the so called social bridges, i.e. the group(s) of malicious users and their supporters, who have links and ties to both honest and malicious user communities. A graph-topology based classification scheme is proposed to detect such bridge linkages which are suspicious for threatening youngsters networking vulnerability. The proposed scheme is validated by a Twitter network, at which potentially dangerous users are identified based on their Twitter connections. The achieved performance is higher compared to previous efforts, despite the increased complexity due to the variety of groups identified as malicious.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Evangelos Chatzicharalampous</style></author><author><style face="normal" font="default" size="100%">Christos Zigkolis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Exploriometer: Leveraging Personality Traits for Coverage and Diversity Aware Recommendations</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://doi.acm.org/10.1145/2740908.2742140</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Polymerou, Evangelia</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Akerkar, Rajendra</style></author><author><style face="normal" font="default" size="100%">Bassiliades, Nick</style></author><author><style face="normal" font="default" size="100%">Davies, John</style></author><author><style face="normal" font="default" size="100%">Ermolayev, Vadim</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">EmoTube: A Sentiment Analysis Integrated Environment for Social Web Content</style></title><secondary-title><style face="normal" font="default" size="100%">WIMS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">20</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-2538-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Emotion aware clustering analysis as a tool for Web 2.0 communities detection: Implications for curriculum development</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The emergent Web 2.0 reality has advanced a new role for Web users since they now approach information in a dynamic way regulating content, opinions, and policies. Revealing,analyzing and exploiting non-evident (often hidden) communities formulated in Web social networks is crucial, since communities influence content distribution and drive Web trendsand events. It is now important to overcome typical single- criterion community detection methodologies (usually originating from graph mining), and within multidisciplinary efforts advance novel multiple criteria approaches which will identify communities of high coherence and homogeneity. In constructing such Web community indices (both now and in the future Web context) it isvital to consider human behavioral and cognitive criteria, since, it is those that affect users’ activities, preferences and social interactions on the Web. We therefore argue, that within typical processing criteria (such as frequency of access, user profiling, and contentsemantics), we need to incorporate affective criteria which are closely connected to users’ actions and social interactions. In this paper we present an emotion aware clustering approachthat incorporates affect as a central component. This approach can be applied to a range of activities such as: highlighting non-obvious and evolving phenomena on the Web, improvingdata accessing performance, assisting the design of novel content promotion strategies, and developing targeted actions of personalized recommendation. The report identifies thescientific and technical background needed for such multidisciplinary approach on the Web 2.0 and highlights the major topics required for a competitive Web science curriculum.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Desai, Bipin C.</style></author><author><style face="normal" font="default" size="100%">Pokorny, Jaroslav</style></author><author><style face="normal" font="default" size="100%">Bernardino, Jorge</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving social data mining and affective analysis methodologies, framework and applications</style></title><secondary-title><style face="normal" font="default" size="100%">IDEAS</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">evolving social data mining</style></keyword><keyword><style  face="normal" font="default" size="100%">microblogging data analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">social affective analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Social networking</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">1-7</style></pages><isbn><style face="normal" font="default" size="100%">978-1-4503-1234-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social networks drive todays opinions and content diffusion.Large scale, distributed and unpredictable social data streams areproduced and such evolving data production offers the ground forthe data mining and analysis tasks. Such social data streamsembed human reactions and inter-relationships and affective andemotional analysis has become rather important in todaysapplications. This work highlights the major data structures andmethodologies used in evolving social data mining and proceedsto the relevant affective analysis techniques. A particularframework is outlined along with indicative applications whichemploy evolving social data analysis with emphasis on theseminal criteria of topic, location and time. Such mining andanalysis overview is beneficial for various scientific andenterpreneural audiences and communities in the socialnetworking area.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving social data mining and affective analysis methodologies, framework and applications</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social networks drive todays opinions and content diffusion.Large scale, distributed and unpredictable social data streams areproduced and such evolving data production offers the ground forthe data mining and analysis tasks. Such social data streamsembed human reactions and inter-relationships and affective andemotional analysis has become rather important in todaysapplications. This work highlights the major data structures andmethodologies used in evolving social data mining and proceedsto the relevant affective analysis techniques. A particularframework is outlined along with indicative applications whichemploy evolving social data analysis with emphasis on theseminal criteria of topic, location and time. Such mining andanalysis overview is beneficial for various scientific andenterpreneural audiences and communities in the socialnetworking area.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Editorial for special issue Internet-based Content Delivery</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We are in the midst of an Internet computing revolution.One vision of 21st century computing is that userswill access Internet services and ‘‘resource-hungry’’ applications(e.g. gaming, streaming media, video on demand,and voice-over-IP) over lightweight portable devices ratherthan through some descendant of the traditional desktopPCs. In this context, distributing and processing Internetbaseddata in an efficient and cost-effective manner is achallenging issue in Internet technology.Content Delivery Networks (CDNs) have emerged toovercome the inherent limitations of the Internet in termsof user perceived Quality of Service (QoS) when accessingWeb data. They offer infrastructure and mechanisms to delivercontent and services in a scalable manner, and enhanceusers’ Web experience. Specifically, a CDN is an overlay networkacross the Internet, which consists of a set of servers(distributed around the world), routers and network elements.Edge servers are the key elements in a CDN, actingas proxy caches that serve directly cached content to users.With CDNs, content is distributed to edge cache servers locatedclose to users, resulting in fast, reliable applicationsand Web services for the users. Once a user requests contenton a Web provider (managed by a CDN), the user’s request isdirected to the appropriate CDN server. The perceived highend-user performance and cost savings of using CDNs havealready urged many Web entrepreneurs to make contractswith CDNs. For instance, Akamai – one of the largest CDNproviders in the world – claims to be delivering 20% of theworld’s Web traffic.1 While the real numbers are debatable,it is clear that CDNs play a crucial role in the modern Internetinfrastructure.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tsagkalidou, Katerina</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Konstantinos Kafetsios</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">D’Mello, Sidney K.</style></author><author><style face="normal" font="default" size="100%">Graesser, Arthur C.</style></author><author><style face="normal" font="default" size="100%">Schuller, Björn</style></author><author><style face="normal" font="default" size="100%">Martin, Jean-Claude</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Emotional Aware Clustering on Micro-blogging Sources</style></title><secondary-title><style face="normal" font="default" size="100%">ACII (1)</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Microblogging services</style></keyword><keyword><style  face="normal" font="default" size="100%">Sentiment analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">web clustering</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">6974</style></volume><pages><style face="normal" font="default" size="100%">387-396</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-24599-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Microblogging services have nowadays become a very popularcommunication tool among Internet users. Since millions of usersshare opinions on different aspects of life everyday, microblogging websites are considered as a credible source for exploring both factual and subjective information. This fact has inspired research in the area of automatic sentiment analysis. In this paper we propose an emotional aware clustering approach which performs sentiment analysis of users tweets onthe basis of an emotional dictionary and groups tweets according to the degree they express a specific set of emotions. Experimental evaluations on datasets derived from Twitter prove the efficiency of the proposed approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Emotional Aware Clustering on Micro-blogging Sources</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Microblogging services have nowadays become a very popularcommunication tool among Internet users. Since millions of usersshare opinions on different aspects of life everyday, microblogging websites are considered as a credible source for exploring both factual and subjective information. This fact has inspired research in the area of automatic sentiment analysis. In this paper we propose an emotional aware clustering approach which performs sentiment analysis of users tweets onthe basis of an emotional dictionary and groups tweets according to the degree they express a specific set of emotions. Experimental evaluations on datasets derived from Twitter prove the efficiency of the proposed approach.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">EXPLORING TEMPORAL ASPECTS IN USER-TAG CO-CLUSTERING</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Tagging environments have become an interesting topic ofresearch lately, focused mainly on clustering approaches, inorder to extract emergent patterns that are derived from tagsimilarity and involve tag relations or user interconnections.Apart from tag similarity, an interesting parameter to be analyzedduring the clustering/mining process in such data isthe actual time that each tagging activity occurred. Indeed,holding a temporal dimension unfolds macroscopic and microscopicviews of tagging, highlights links between objectsfor specific time periods and, in general, lets us observe howthe users’ tagging activity changes over time. In this article,we propose a time-aware user/tag clustering approach, whichgroups together similar users and tags that are very “active”during the same time periods. Emphasis is given on usingvarying time scales, so that we distinguish between clustersthat are robust at many time scales and clusters that are somehowoccasional, i.e. they emerge, only at a specific time period.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Exploring temporal aspects in user-tag co-clustering</style></title><secondary-title><style face="normal" font="default" size="100%">WIAMIS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-4</style></pages><isbn><style face="normal" font="default" size="100%">978-88-905328-0-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Tagging environments have become an interesting topic ofresearch lately, focused mainly on clustering approaches, inorder to extract emergent patterns that are derived from tagsimilarity and involve tag relations or user interconnections.Apart from tag similarity, an interesting parameter to be analyzedduring the clustering/mining process in such data isthe actual time that each tagging activity occurred. Indeed,holding a temporal dimension unfolds macroscopic and microscopicviews of tagging, highlights links between objectsfor specific time periods and, in general, lets us observe howthe usersâ€™ tagging activity changes over time. In this article,we propose a time-aware user/tag clustering approach, whichgroups together similar users and tags that are very â€śactiveâ€ťduring the same time periods. Emphasis is given on usingvarying time scales, so that we distinguish between clustersthat are robust at many time scales and clusters that are somehowoccasional, i.e. they emerge, only at a specific time period.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Dikaiakos, Marios D.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Fortino, Giancarlo</style></author><author><style face="normal" font="default" size="100%">Mastroianni, Carlo</style></author><author><style face="normal" font="default" size="100%">Al-Mukaddim Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the utility of content delivery networks</style></title><secondary-title><style face="normal" font="default" size="100%">UPGRADE-CN</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CDN pricing</style></keyword><keyword><style  face="normal" font="default" size="100%">Content Delivery</style></keyword><keyword><style  face="normal" font="default" size="100%">network utility</style></keyword><keyword><style  face="normal" font="default" size="100%">networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">11-20</style></pages><isbn><style face="normal" font="default" size="100%">978-1-60558-591-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) balance costs and qualityin services related to content delivery. This has urgedmany Web entrepreneurs to make contracts with CDNs. Inthe literature, a wide range of techniques has been developed,implemented and standardized for improving the performanceof CDNs. The ultimate goal of all the approachesis to improve the utility of CDN surrogate servers. In thispaper we define a metric which measures the utility of CDNsurrogate servers, called CDN utility. This metric capturesthe traffic activity in a CDN, expressing the usefulness ofsurrogate servers in terms of data circulation in the network.Through an extensive simulation testbed, we identifythe parameters that affect the CDN utility in such infrastructures.We evaluate the utility of surrogate servers undervarious parameters and provide insightful comments.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the Utility of Content Delivery Networks</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Content Delivery Networks (CDNs) balance costs and qualityin services related to content delivery. This has urgedmany Web entrepreneurs to make contracts with CDNs. Inthe literature, a wide range of techniques has been developed,implemented and standardized for improving the performanceof CDNs. The ultimate goal of all the approachesis to improve the utility of CDN surrogate servers. In thispaper we define a metric which measures the utility of CDNsurrogate servers, called CDN utility. This metric capturesthe traffic activity in a CDN, expressing the usefulness ofsurrogate servers in terms of data circulation in the network.Through an extensive simulation testbed, we identifythe parameters that affect the CDN utility in such infrastructures.We evaluate the utility of surrogate servers undervarious parameters and provide insightful comments.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An evolutionary scheme for Web Replication and Caching</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Design and implementation of eectivecaching schemes has been a critical issue withrespect to World Wide Web ob jects circulation and availability Caching and replication have been combined and applied in prototype systems in order to reduce the overallbandwidth and increase systems fault tolerance This paper presents a model for optimizing access performance when requesting Web ob jects across distributed systems Thereplication and caching scheme is designed by the use of an evolutionary computationalgorithm Cached data are considered as a population evolving over simulated timereplicating the most prominent data to dedicated replication servers The simulationmodel is experimented and tested under cache traces provided by the Squid proxy cacheserver at the Aristotle University of Thessaloniki Cache hit rates and bytes hit length arereported showing that the proposed evolutionary mechanisms improve cache consistencyand reliability.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Exploring the correlation of biomedical article keywords to MeSH terms</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The exponential growth in the availability ofbiomedical information has posed the need to solve retrievalissues raised in huge sequence/biomedical article repositories.Biomedical article databases, like PubMed, are hugerepositories of useful biological information given in naturallanguage form and thus not easily processed by computers.Medical Subject Headings (MeSH) terms have been proposed tofacilitate the process of electronically retrieving biomedicalarticles, which are semantically related. However, most of theclassification algorithms, used for information retrieval, requirenumeric representations of either the keywords or the MeSHterms of the articles. These representations are essentiallyvectors of variables forming large multivariate numericaldatasets. In order to combine the information from keyworddatasets and MeSH datasets, this paper proposes a multivariatestatistical approach which can quantify their relationships andreveal the underlying correlation. The basis of this approach isa mathematical technique, called non-linear canonicalcorrelation analysis (NLCCA). NLCCA can assembleinformation from several datasets by building a modeldescribing the whole of the data. The method was applied to alarge number of articles from PubMed. Certain statisticsobtained from the analysis showed that the degree ofcorrelation between MeSH terms and keywords is high. Themethod results in the reduction of data dimensionality,containing in one dataset with new variables significantinformation of the original data. These results are veryimportant for the efficient description and visualization of thedata in order to explore their structure.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolutionary Techniques for Web Caching</style></title><secondary-title><style face="normal" font="default" size="100%">Distributed and Parallel Databases</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">93-116</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evolutionary Prefetching and Caching in an Independent Storage Units Model</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Modern applications demand support for a large number ofclients and require large scale storage subsystems. This paper presentsa theoretical model of prefetching and caching of storage objects undera parallel storage units architecture. The storage objects are definedas variable sized data blocks and a specific cache area is reserved fordata prefetching and caching. An evolutionary algorithm is proposed foridentifying the storage objects to be prefetched and cached. The storageobject prefetching approach is experimented under certain artificialworkloads of requests for a set of storage units and has shown significantperformance improvement with respect to request service times, as wellas cache and byte hit ratios.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Yakhno, Tatyana M.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolutionary Prefetching and Caching in an Independent Storage Units Model</style></title><secondary-title><style face="normal" font="default" size="100%">ADVIS</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">data prefetching and caching</style></keyword><keyword><style  face="normal" font="default" size="100%">object-based storage models</style></keyword><keyword><style  face="normal" font="default" size="100%">parallel storage units</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">1909</style></volume><pages><style face="normal" font="default" size="100%">265-274</style></pages><isbn><style face="normal" font="default" size="100%">3-540-41184-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Modern applications demand support for a large number ofclients and require large scale storage subsystems. This paper presentsa theoretical model of prefetching and caching of storage objects undera parallel storage units architecture. The storage objects are definedas variable sized data blocks and a specific cache area is reserved fordata prefetching and caching. An evolutionary algorithm is proposed foridentifying the storage objects to be prefetched and cached. The storageobject prefetching approach is experimented under certain artificialworkloads of requests for a set of storage units and has shown significantperformance improvement with respect to request service times, as wellas cache and byte hit ratios.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Exact Analysis on Expected Seeks in Shadowed Disks</style></title><secondary-title><style face="normal" font="default" size="100%">Inf. Process. Lett.</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><number><style face="normal" font="default" size="100%">6</style></number><volume><style face="normal" font="default" size="100%">61</style></volume><pages><style face="normal" font="default" size="100%">323-329</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Expected Seeks in Mirrored Disks</style></title></titles><dates><year><style  face="normal" font="default" size="100%">1994</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Analytic models on the expected seek distances for a set of k &amp;gt;= 2 replicated disks with one read/write head per surface have been reported in the past, The aim of the present paper is twofold. Since previous models are not exact, firstly, we study the performance of such systems for the boundary case of k = 2 disks and provide new exact formulae for the expected seek distances traveled. Secondly, we examine the performance of a set of k &amp;gt;= 2 two-headed disks with either independently or dependently moving heads. For both models of the latter case, we derive new exact formulae for the expected seek distances and make performance comparisons to one-headed disks.&lt;/p&gt;
</style></abstract></record></records></xml>