Browsing School of Information Sciences by Title

Now showing items 102-121 of 162

  • ParkChain: An IoT Parking Service Based on Blockchain 

    Zinonos, Zinon; Christodoulou, Panayiotis; Andreou, Andreas; Chatzichristofis, Savvas A. (IEEE, 2019-08-19)
    The IoT ecosystem is evolving quickly, developing several applications in different sectors. The majority of these applications use centralized infrastructures something that poses several challenges especially related to ...

  • Pay-as-you-go data integration for linked data: opportunities, challenges and architectures 

    Christodoulou, Klitos; Paton, Norman W.; Fernandes, Alvaro A.A.; Parsia, Bijan; Hedeler, Cornelia (ACM Digital Library, 2012)
    Linked Data (LD) provides principles for publishing data that underpin the development of an emerging web of data. LD follows the web in providing low barriers to entry: publishers can make their data available using a ...

  • Performance Study of the Most Commonly Used Image Retrieval Evaluation Methods 

    Chatzichristofis, Savvas A.; Boutalis, Yiannis (ACTA PRESS, 2010)
    One of the most significant problems in the field of image retrieval results from the lack of a common test bed for the evaluation of the systems. So far, many of the methods used in the field of information retrieval ...

  • PHUBMIT - A new smart intervention for estimating and mitigating the cell phone induced ostracism (phubbing) 

    Drosatos, George; Tsoumani, Olga; Geronikolou, Styliani (University Research Institute of Maternal and Child Health and Precision Medicine, 2018)
    Phubbing or the cell phone-induced ostracism is defined as “snubbing someone by being busy oneself with one’s mobile phone and ignore social surroundings”. Thus, “phubber” is the subject, whereas, ‘phubbee’ is the target ...

  • Privacy Leakages about Political Beliefs through Analysis of Twitter Followers 

    Briola, Helen; Drosatos, George; Stamatelatos, Giorgos; Gyftopoulos, Sotirios; Efraimidis, Pavlos S. (Pan-Hellenic Conference on Informatics, 2018-11)
    In this paper, we focus on privacy leakages about Twitter usersand show that simply establishing follower and friend connectionsin the Twitter network might be enough to reveal sensitive in-formation about the political ...

  • Privacy Leakages about Political Beliefs through Analysis of Twitter Followers 

    Briola, Helen; Drosatos, George; Stamatelatos, Giorgos; Gyftopoulos, Sotirios; Efraimidis, Pavlos S. (ICPS Proceedings, 2018-11)
    In this paper, we focus on privacy leakages about Twitter users and show that simply establishing follower and friend connections in the Twitter network might be enough to reveal sensitive information about the political ...

  • A Privacy-by-Design Contextual Suggestion System for Tourism 

    Efraimidis, Pavlos S.; Drosatos, George; Arampatzis, Avi; Stamatelatos, Giorgos; Athanasiadis, Ioannis N. (MDPI, 2016-05-05)
    We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we ...

  • Privacy-Enhanced Management of Ubiquitous Health Monitoring Data 

    Drosatos, George; Efraimidis, Pavlos S. (PETRA, 2011-05-25)
    In this paper, we propose a new architecture for managing data in a Ubiquitous Health Monitoring System (UHMS). The purpose of this architecture is to enhance the privacy of patients and furthermore to decongest the Health ...

  • Privacy-Enhanced Television Audience Measurements 

    Drosatos, George; Tasidou, Aimilia; Efraimidis, Pavlos S. (2017-02)
    Internet-enabled television systems (SmartTVs) are a development that introduces these devices into the interconnected environment of the Internet of Things. We propose a privacy-preserving application for computing ...

  • A privacy-preserving cloud computing system for creating participatory noise maps 

    Drosatos, George; Efraimidis, Pavlos S.; Athanasiadis, Ioannis N.; D’Hondt, Ellie; Stevens, Matthias (IEEE, 2012)
    Participatory sensing is a crowd-sourcing technique which relies both on active contribution of citizens and on their location and mobility patterns. As such, it is particularly vulnerable to privacy concerns, which may ...

  • Privacy-preserving computation of participatory noise maps in the cloud 

    Drosatos, George; Efraimidis, Pavlos S.; Athanasiadis, Ioannis N.; Stevens, Matthias; D’Hondt, Ellie (Elsevier Ltd., 2014-06)
    This paper presents a privacy-preserving system for participatory sensing, which relies on cryptographic techniques and distributed computations in the cloud. Each individual user is represented by a personal software ...

  • A privacy-preserving protocol for finding the nearest doctor in an emergency 

    Drosatos, Georgios; Efraimidis, Pavlos S. (2010-06)
    In this work, we define the Nearest Doctor Problem (NDP) for finding the closest doctor in case of an emergency and present a secure multi-party computation for solving it. The solution is based on a privacy-preserving ...

  • Privacy-Preserving Statistical Analysis on Ubiquitous Health Data 

    Drosatos, George; Efraimidis, Pavlos S. (Electrical and Computer Engineering, Democritus University of Thrace, 2011)
    In this work, we consider ubiquitous health data generated from wearable sensors in a Ubiquitous Health Monitoring System (UHMS) and examine how these data can be used within privacy preserving distributed statistical ...

  • Privacy-Preserving Television Audience Measurement Using Smart TVs 

    Drosatos, George; Tasidou, Aimilia; Efraimidis, Pavlos S. (2012)
    Internet-enabled television systems, often referred to as Smart TVs, are a new development in television and home entertainment technologies. In this work, we propose a new, privacy-preserving, approach for Television ...

  • A probabilistic semantic analysis of eHealth scientific literature 

    Drosatos, George; Kaldoudi, Eleni (Sage Journals, 2019-05-12)
    Introduction: eHealth emerged as an interdisciplinary research area about 70 years ago. This study employs probabilistic techniques to semantically analyse scientific literature related to the field of eHealth in order to ...

  • Pythia: A Privacy-enhanced Personalized Contextual Suggestion System for Tourism 

    Drosatos, George; Efraimidis, Pavlos S.; Arampatzis, Avi; Stamatelatos, Giorgos; Athanasiadis, Ioannis N. (COMPSAC, 2015-07)
    We present Pythia, a privacy-enhanced non-invasive contextual suggestion system for tourists, with important architectural innovations. The system offers high quality personalized recommendations, non-invasive operation ...

  • Quantifying integration quality using feedback on mapping results 

    Serrano, Fernando R. S.; Fernandes, Alvaro A. A.; Christodoulou, Klitos (iiWAS2017, 2017)
    Traditional data integration delivers high integration quality but requires significant upfront effort because of the need for expensive experts to be involved. The pay-as-you-go approach to data integration aims to reduce ...

  • Quantum: Ένα Δίκτυο Ομότιμων Κόμβων για Κατανεμημένους Υπολογισμούς με Ενισχυμένη Ιδιωτικότητα 

    Stamatelatos, George; Drosatos, George; Efraimidis, Pavlos S. (3ο Πανελλήνιο Επιστημονικό Φοιτητικό Συνέδριο Πληροφορικής "ΦΟΙΤΗΤΙΚΟ ΕΥΡΗΚΑ", 2009-09)
    In this paper, a new platform, called Quantum, for distributed computations among independent agents, is presented. Quantum is capable to operate on infrastructures that are formed by massive numbers of agents communicating ...

  • A query scrambler for search privacy on the internet 

    Arampatzis, Avi; Efraimidis, Pavlos S.; Drosatos, George (Springer Link, 2012-10-09)
    We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search results, without submitting the intended query ...

  • Radio Propagation in Industrial Wireless Sensor Network Environments: From Testbed to Simulation Evaluation 

    Zinonos, Zinon; Vassiliou, Vasos; Christofides, Tasos C. (ACM, 2012)
    In recent years, sensor networks characteristics have led to incremental utilization in different types of applications. Several techniques have been proposed to evaluate the performance of WSNs; the two most popular being ...