<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antigoni-Maria Founta</style></author><author><style face="normal" font="default" size="100%">Constantinos Djouvas</style></author><author><style face="normal" font="default" size="100%">Despoina Chatzakou</style></author><author><style face="normal" font="default" size="100%">Ilias Leontiadis</style></author><author><style face="normal" font="default" size="100%">Jeremy Blackburn</style></author><author><style face="normal" font="default" size="100%">Gianluca Stringhini</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Michael Sirivianos</style></author><author><style face="normal" font="default" size="100%">Nicolas Kourtellis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior</style></title><tertiary-title><style face="normal" font="default" size="100%">ICWSM-18</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">AAAI</style></publisher><pub-location><style face="normal" font="default" size="100%">Stanford, California</style></pub-location><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms. In fact, past scientific work focused on studying these forms in popular media, such as Facebook and Twitter. Building on such work, we present an 8-month study of the various forms of abusive behavior on Twitter, in a holistic fashion. Departing from past work, we examine a wide variety of labeling schemes, which cover different forms of abusive behavior, at the same time. We propose an incremental and iterative methodology, that utilizes the power of crowdsourcing to annotate a large scale collection of tweets with a set of abuse-related labels. In fact, by applying our methodology including statistical analysis for label merging or elimination, we identify a reduced but robust set of labels. Finally, we offer a first overview and findings of our collected and annotated dataset of 100 thousand tweets, which we make publicly available for further scientific exploration.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolopoulos, Spiros</style></author><author><style face="normal" font="default" size="100%">Chatzilari, Elisavet</style></author><author><style face="normal" font="default" size="100%">Giannakidou, Eirini</style></author><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bessis, Nik</style></author><author><style face="normal" font="default" size="100%">Xhafa, Fatos</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging Massive User Contributions for Knowledge Extraction</style></title><secondary-title><style face="normal" font="default" size="100%">Next Generation Data Technologies for Collective Computational Intelligence</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Studies in Computational Intelligence</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">352</style></volume><pages><style face="normal" font="default" size="100%">415-443</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-20343-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>34</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Symeon Papadopoulos</style></author><author><style face="normal" font="default" size="100%">Yiannis Kompatsiaris</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging Collective Intelligence through Community Detection in Tag Networks</style></title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collective intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">community detection</style></keyword><keyword><style  face="normal" font="default" size="100%">tag networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper studies the problem of community detectionin tag networks, i.e. networks consisting of associationsbetween tags that are used within Social Tagging Systems(STS) to annotate online resources (e.g. bookmarks,pictures, videos, etc.). Community detectionmethods aim at uncovering densely connected groupsof tags, which can reveal the topic structure emergingin the STS. In this way, community detection in tagnetworks leverages Collective Intelligence (CI), that isthe intelligence that is accumulated as a result of thecollective activities of masses of users.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging Collective Intelligence through Community Detection in Tag Networks</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper studies the problem of community detectionin tag networks, i.e. networks consisting of associationsbetween tags that are used within Social Tagging Systems(STS) to annotate online resources (e.g. bookmarks,pictures, videos, etc.). Community detectionmethods aim at uncovering densely connected groupsof tags, which can reveal the topic structure emergingin the STS. In this way, community detection in tagnetworks leverages Collective Intelligence (CI), that isthe intelligence that is accumulated as a result of thecollective activities of masses of users.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pallis, George</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Stamos, Konstantinos</style></author><author><style face="normal" font="default" size="100%">Sidiropoulos, Antonis</style></author><author><style face="normal" font="default" size="100%">Katsaros, Dimitrios</style></author><author><style face="normal" font="default" size="100%">Manolopoulos, Yannis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Latency-Based Object Placement Approach in Content Distribution Networks</style></title><secondary-title><style face="normal" font="default" size="100%">LA-WEB</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">140-147</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2471-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Logic Based Approach for the Multimedia Data Representation and Retrieval</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Nowadays, the amount of multimedia data is increasingrapidly, and hence, there is an increasing need for efficientmethods to manage the multimedia content. This paper proposesa framework for the description and retrieval of multimediadata. The data are represented at both the syntactic(structure, metadata and low level features) and semantic(the meaning of the data) levels. We use the MPEG-7 standard,which provides a set of tools to describe multimediacontent from different viewpoints, to represent the syntacticlevel. However, due to its XML Schema based representation,MPEG-7 is not suitable to represent the semanticaspect of the data in a formal and concise way. Moreover,inferential mechanisms are not provided. To alleviate theselimitations, we propose to extend MPEG-7 with a domainontology, formalized using a logical formalism. Then, thesemantic aspect of the data is described using the ontology’svocabulary, as a set of logical expressions. We enhancethe ontology by a rules layer, to describe more complexconstraints between domain concepts and relations.User’s queries may concern the syntactic and/or semanticfeatures. The syntactic constraints are expressed usingXQuery language and evaluated using an XML query engine;whereas the semantic query constraints are expressedusing a rules language and evaluated using a specific resolutionmechanism.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hammiche, Samira</style></author><author><style face="normal" font="default" size="100%">Benbernou, Salima</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Logic Based Approach for the Multimedia Data Representation and Retrieval</style></title><secondary-title><style face="normal" font="default" size="100%">ISM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Computer Society</style></publisher><pages><style face="normal" font="default" size="100%">241-248</style></pages><isbn><style face="normal" font="default" size="100%">0-7695-2489-3</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Nowadays, the amount of multimedia data is increasingrapidly, and hence, there is an increasing need for efficientmethods to manage the multimedia content. This paper proposesa framework for the description and retrieval of multimediadata. The data are represented at both the syntactic(structure, metadata and low level features) and semantic(the meaning of the data) levels. We use the MPEG-7 standard,which provides a set of tools to describe multimediacontent from different viewpoints, to represent the syntacticlevel. However, due to its XML Schema based representation,MPEG-7 is not suitable to represent the semanticaspect of the data in a formal and concise way. Moreover,inferential mechanisms are not provided. To alleviate theselimitations, we propose to extend MPEG-7 with a domainontology, formalized using a logical formalism. Then, thesemantic aspect of the data is described using the ontologyâ€™svocabulary, as a set of logical expressions. We enhancethe ontology by a rules layer, to describe more complexconstraints between domain concepts and relations.Userâ€™s queries may concern the syntactic and/or semanticfeatures. The syntactic constraints are expressed usingXQuery language and evaluated using an XML query engine;whereas the semantic query constraints are expressedusing a rules language and evaluated using a specific resolutionmechanism.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vassiliki A. Koutsonikola</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">LDAP: Framework, Practices, and Trends</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">66-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Papadimitriou, Georgios I.</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Pomportsis, Andreas S.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A learning-automata-based controller for client/server systems</style></title><secondary-title><style face="normal" font="default" size="100%">Neurocomputing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">client/server systems</style></keyword><keyword><style  face="normal" font="default" size="100%">learning automata</style></keyword><keyword><style  face="normal" font="default" size="100%">polling policies</style></keyword><keyword><style  face="normal" font="default" size="100%">throughput improvement</style></keyword><keyword><style  face="normal" font="default" size="100%">time-delay</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><volume><style face="normal" font="default" size="100%">61</style></volume><pages><style face="normal" font="default" size="100%">381-394</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Polling policies have been introduced to simplifythe accessing process in client/server systems by acentralized control access scheme. This paper considers aclient/server model which employs a polling policy as itsaccess strategy. We propose a learning-automata-based approachfor polling in order to improve the throughput-delayperformance of the system. Each client has an associatedqueue and the server performs selective polling such thatthe next client to be served is identified by a learning automaton.The learning automaton updates each clientâ€™schoice probability according to the feedback information.Under the considered approach, a clientâ€™s choice probabilityasymptotically tends to be proportional to the probabilitythat this client is ready. Simulation results have shown thatthe proposed polling policy is beneficial in comparison tothe conventional round-robin polling when operating underbursty traffic conditions. The benefits are significant for thedelay reduction in the considered client/server system.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">LRU-based algorithms for Web Cache Replacement</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Caching has been introduced and applied in prototype andcommercial Web-based information systems in order to reduce the overallbandwidth and increase system’s fault tolerance. This paper presents atrack of Web cache replacement algorithms based on the Least RecentlyUsed (LRU) idea. We propose an extension to the conventional LRUalgorithm by considering the number of references to Web objects as acritical parameter for the cache content replacement. The proposed algorithmsare validated and experimented under Web cache traces providedby a major Squid proxy cache server installation environment. Cache andbytes hit rates are reported showing that the proposed cache replacementalgorithms improve cache content.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Bauknecht, Kurt</style></author><author><style face="normal" font="default" size="100%">Sanjay Kumar Madria</style></author><author><style face="normal" font="default" size="100%">Pernul, Günther</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">LRU-based Algorithms for Web Cache Replacement</style></title><secondary-title><style face="normal" font="default" size="100%">EC-Web</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cache consistency</style></keyword><keyword><style  face="normal" font="default" size="100%">Cache replacement algorithms</style></keyword><keyword><style  face="normal" font="default" size="100%">Web caching and proxies</style></keyword><keyword><style  face="normal" font="default" size="100%">Web-based information systems</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">1875</style></volume><pages><style face="normal" font="default" size="100%">409-418</style></pages><isbn><style face="normal" font="default" size="100%">3-540-67981-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Caching has been introduced and applied in prototype andcommercial Web-based information systems in order to reduce the overallbandwidth and increase systemâ€™s fault tolerance. This paper presents atrack of Web cache replacement algorithms based on the Least RecentlyUsed (LRU) idea. We propose an extension to the conventional LRUalgorithm by considering the number of references to Web objects as acritical parameter for the cache content replacement. The proposed algorithmsare validated and experimented under Web cache traces providedby a major Squid proxy cache server installation environment. Cache andbytes hit rates are reported showing that the proposed cache replacementalgorithms improve cache content.&lt;/p&gt;
</style></abstract></record></records></xml>