• Conference Object  

      Adjourn state concurrency control avoiding time-out problems in atomic commit protocols 

      Obermeier, S.; Böttcher, S.; Hett, M.; Chrysanthis, Panos K.; Samaras, George S. (2008)
      The use of atomic commit protocols in mobile ad-hoc networks involves difficulties in setting up reasonable timeouts for aborting a pending distributed transaction. This paper presents the non-blocking Adjourn State, a ...
    • Article  

      Conservation laws and hierarchies of potential symmetries for certain diffusion equations 

      Ivanova, Nataliya M.; Popovych, R. O.; Sophocleous, Christodoulos; Vaneeva, Olena O. (2009)
      We show that the so-called hidden potential symmetries considered in a recent paper [M.L. Gandarias, New potential symmetries for some evolution equations, Physica A 387 (2008) 2234-2242] are ordinary potential symmetries ...
    • Conference Object  

      Discovering genetic polymorphism associated with gene expression levels across the whole genome 

      Antoniades, Athos; Kalvari, Ioanna; Pattichis, Constantinos S.; Jones, N.; Matthews, P. M.; Domenici, E.; Muglia, P. (2009)
      Genetic differences have been shown to contribute to gene expression variability. A complete evaluation of the associations between a whole genome scan with 550k Single Nucleotide Polymorphisms (SNPs) and 54k detectable ...
    • Article  

      Modeling data access legislation with Gorgias 

      Spanoudakis, Nikolaos I.; Constantinou, Elena; Koumi, Adamos; Kakas, Antonis C. (2017)
      This paper uses argumentation as the basis for modeling and implementing the relevant legislation of an EU country relating to medical data access. Users can consult a web application for determining their allowed level ...
    • Conference Object  

      A semantic framework for privacy-aware access control 

      Lioudakis, Georgios V.; Delias, Nikolaos L.; Koutsoloukas, Eleftherios A.; Kapitsaki, Georgia M.; Kaklamani, Dimitra I.; Venieris, Iakovos St (2008)
      The issue of privacy is constantly brought to the spotlight since an ever increasing number of services collects and processes personal information from users. In fact, recent advances in mobile communications, location ...