Browsing School of Information Sciences by Title
Now showing items 102-121 of 162
-
ParkChain: An IoT Parking Service Based on Blockchain
(IEEE, 2019-08-19)The IoT ecosystem is evolving quickly, developing several applications in different sectors. The majority of these applications use centralized infrastructures something that poses several challenges especially related to ...
-
Pay-as-you-go data integration for linked data: opportunities, challenges and architectures
(ACM Digital Library, 2012)Linked Data (LD) provides principles for publishing data that underpin the development of an emerging web of data. LD follows the web in providing low barriers to entry: publishers can make their data available using a ...
-
Performance Study of the Most Commonly Used Image Retrieval Evaluation Methods
(ACTA PRESS, 2010)One of the most significant problems in the field of image retrieval results from the lack of a common test bed for the evaluation of the systems. So far, many of the methods used in the field of information retrieval ...
-
PHUBMIT - A new smart intervention for estimating and mitigating the cell phone induced ostracism (phubbing)
(University Research Institute of Maternal and Child Health and Precision Medicine, 2018)Phubbing or the cell phone-induced ostracism is defined as “snubbing someone by being busy oneself with one’s mobile phone and ignore social surroundings”. Thus, “phubber” is the subject, whereas, ‘phubbee’ is the target ...
-
Privacy Leakages about Political Beliefs through Analysis of Twitter Followers
(Pan-Hellenic Conference on Informatics, 2018-11)In this paper, we focus on privacy leakages about Twitter usersand show that simply establishing follower and friend connectionsin the Twitter network might be enough to reveal sensitive in-formation about the political ...
-
Privacy Leakages about Political Beliefs through Analysis of Twitter Followers
(ICPS Proceedings, 2018-11)In this paper, we focus on privacy leakages about Twitter users and show that simply establishing follower and friend connections in the Twitter network might be enough to reveal sensitive information about the political ...
-
A Privacy-by-Design Contextual Suggestion System for Tourism
(MDPI, 2016-05-05)We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we ...
-
Privacy-Enhanced Management of Ubiquitous Health Monitoring Data
(PETRA, 2011-05-25)In this paper, we propose a new architecture for managing data in a Ubiquitous Health Monitoring System (UHMS). The purpose of this architecture is to enhance the privacy of patients and furthermore to decongest the Health ...
-
Privacy-Enhanced Television Audience Measurements
(2017-02)Internet-enabled television systems (SmartTVs) are a development that introduces these devices into the interconnected environment of the Internet of Things. We propose a privacy-preserving application for computing ...
-
A privacy-preserving cloud computing system for creating participatory noise maps
(IEEE, 2012)Participatory sensing is a crowd-sourcing technique which relies both on active contribution of citizens and on their location and mobility patterns. As such, it is particularly vulnerable to privacy concerns, which may ...
-
Privacy-preserving computation of participatory noise maps in the cloud
(Elsevier Ltd., 2014-06)This paper presents a privacy-preserving system for participatory sensing, which relies on cryptographic techniques and distributed computations in the cloud. Each individual user is represented by a personal software ...
-
A privacy-preserving protocol for finding the nearest doctor in an emergency
(2010-06)In this work, we define the Nearest Doctor Problem (NDP) for finding the closest doctor in case of an emergency and present a secure multi-party computation for solving it. The solution is based on a privacy-preserving ...
-
Privacy-Preserving Statistical Analysis on Ubiquitous Health Data
(Electrical and Computer Engineering, Democritus University of Thrace, 2011)In this work, we consider ubiquitous health data generated from wearable sensors in a Ubiquitous Health Monitoring System (UHMS) and examine how these data can be used within privacy preserving distributed statistical ...
-
Privacy-Preserving Television Audience Measurement Using Smart TVs
(2012)Internet-enabled television systems, often referred to as Smart TVs, are a new development in television and home entertainment technologies. In this work, we propose a new, privacy-preserving, approach for Television ...
-
A probabilistic semantic analysis of eHealth scientific literature
(Sage Journals, 2019-05-12)Introduction: eHealth emerged as an interdisciplinary research area about 70 years ago. This study employs probabilistic techniques to semantically analyse scientific literature related to the field of eHealth in order to ...
-
Pythia: A Privacy-enhanced Personalized Contextual Suggestion System for Tourism
(COMPSAC, 2015-07)We present Pythia, a privacy-enhanced non-invasive contextual suggestion system for tourists, with important architectural innovations. The system offers high quality personalized recommendations, non-invasive operation ...
-
Quantifying integration quality using feedback on mapping results
(iiWAS2017, 2017)Traditional data integration delivers high integration quality but requires significant upfront effort because of the need for expensive experts to be involved. The pay-as-you-go approach to data integration aims to reduce ...
-
Quantum: Ένα Δίκτυο Ομότιμων Κόμβων για Κατανεμημένους Υπολογισμούς με Ενισχυμένη Ιδιωτικότητα
(3ο Πανελλήνιο Επιστημονικό Φοιτητικό Συνέδριο Πληροφορικής "ΦΟΙΤΗΤΙΚΟ ΕΥΡΗΚΑ", 2009-09)In this paper, a new platform, called Quantum, for distributed computations among independent agents, is presented. Quantum is capable to operate on infrastructures that are formed by massive numbers of agents communicating ...
-
A query scrambler for search privacy on the internet
(Springer Link, 2012-10-09)We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search results, without submitting the intended query ...
-
Radio Propagation in Industrial Wireless Sensor Network Environments: From Testbed to Simulation Evaluation
(ACM, 2012)In recent years, sensor networks characteristics have led to incremental utilization in different types of applications. Several techniques have been proposed to evaluate the performance of WSNs; the two most popular being ...