• Article  

      Effective control of traffic flow in ATM networks using fuzzy explicit rate marking (PERM) 

      Pitsillides, Andreas; Sekercioglu, Y. Ahmet; Ramamurthy, G. (1997)
      In this paper, we describe the fuzzy explicit rate marking (FERM) traffic flow control algorithm for a class of best effort service, known as available bit rate (ABR), proposed by the ATM Forum. FERM is an explicit rate ...
    • Conference Object  

      Enhanced UMTS cellular planning for multiple traffic classes in offices scenarios 

      Cabral, O.; Velez, F. J.; Hadjipollas, George; Stylianou, Marios; Antoniou, Josephina; Vassiliou, Vasos; Pitsillides, Andreas (2006)
      It is shown that Enhanced UMTS will be an affordable solution for providing the required network quality and to reduce infrastructure investments in offices scenarios. System capacity results are obtained by using a system ...
    • Article  

      Evolutionary-fuzzy prediction for strategic ID-QoS: Routing in broadband networks 

      Vasilakos, Athanasios V.; Ricudis, C.; Anagnostakis, Kostas G.; Pedrycz, W.; Pitsillides, Andreas; Gao, X. Z. (2001)
      This article presents an application of evolutionary-fuzzy prediction in interdomain routing of broadband network connections with Quality of Services requirements in the case of an integrated ATM and SDH networking ...
    • Conference Object  

      Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks 

      Vasilakos, Athanasios V.; Ricudis, C.; Anagnostakis, Kostas G.; Pedrycz, W.; Pitsillides, Andreas (IEEE, 1998)
      We present an application of evolutionary-fuzzy prediction in inter-domain routing of broadband network connections with Quality of Services requirements in the case of an integrated ATM and SDH networking architecture. ...
    • Conference Object  

      Flexible agent dialogue strategies and societal communication protocols 

      Kakas, Antonis C.; Maudet, N.; Moraïtis, Pavlos (2004)
      We propose an argumentation-based framework for representing communication theories of agents that can take into account dialogue strategies and society protocols in a way that facilitates their modular development and ...
    • Article  

      Fuzzy logic based congestion control in computer networks 

      Chrysostomou, Chrysostomos; Pitsillides, Andreas (2006)
      Network congestion control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. Designing effective congestion control strategies for computer networks ...
    • Conference Object  

      Fuzzy logic congestion control in TCP/IP differentiated services networks for quality of service provisioning 

      Chrysostomou, Chrysostomos; Pitsillides, Andreas; Hadjipollas, George; Sekercioglu, Y. Ahmet; Polycarpou, Marios M. (2004)
      A two class Fuzzy Explicit Marking (FEM) controller was designed and used in Differentiated Services Networks for quality of service provisioning. The fuzzy control system is designed to regulate the queues of IP routers ...
    • Conference Object  

      Fuzzy logic congestion control in TCP/IP tandem networks 

      Chrysostomou, Chrysostomos; Pitsillides, Andreas (2006)
      Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Active Queue Management (AQM) mechanisms have ...
    • Conference Object  

      A general framework for continuous time power control in time varying long term fading wireless networks 

      Olama, M. M.; Djouadi, S. M.; Charalambous, Charalambos D. (2007)
      In this paper, a general framework for continuous time power control algorithm under time varying long term fading wireless channels is developed. This contrasts most of the power control algorithms introduced in the ...
    • Conference Object  

      Hybrid CAC for MBMS-enabled 3G UMTS networks 

      Neophytou, Marios; Pitsillides, Andreas (2006)
      In this paper, a novel hybrid Connection Admission Control (CAC) scheme combining downlink transmission power and aggregate throughput in the case of dedicated and shared connection setup respectively, is presented ("DPTCAC: ...
    • Article  

      Hydrophilic, cationic large-core star polymers and polymer networks: Synthesis and physicochemical characterization 

      Kafouris, Demetris; Gradzielski, M.; Patrickios, Costas S. (2008)
      Group transfer polymerization was used to prepare hydrophilic, cationic large-core star polymers (LCSPs) and networks of 2-(dimethylamino)ethyl methacrylate (DMAEMA) and ethylene glycol dimethacrylate (EGDMA) in a two-step ...
    • Article  

      The impact of network structure on the stability of greedy protocols 

      Koukopoulos, D.; Mavronicolas, Marios; Nikoletseas, Sotiris E.; Spirakis, Paul G. (2005)
      Some examples of the impact network structure has on stability behavior of greedy protocols and networks were presented. An important problem was to study the impact of network structure parameters on other greedy protocols. ...
    • Conference Object  

      IPMicra: An IP-address based location aware distributed web crawler 

      Papapetrou, Odysseas; Samaras, George S. (2004)
      Distributed crawling is able to overcome Important limitations of the traditional single-sourced web crawling systems. However, the optimal benefit of distributed crawling is usually limited to the sites hosting the crawlers, ...
    • Article  

      IWIM semantics via fibred automata 

      Banach, Richard; Arbab, Farhad; Papadopoulos, George Angelos; Glauert, J. R. W. (2002)
      Coordination programming helps to separate concerns in the programming of the coordination activities in complex applications software. It separates the development, verification, maintenance, and reuse of the coordination ...
    • Conference Object  

      Layered strategies and protocols for argumentation-based agent interaction 

      Kakas, Antonis C.; Maudet, N.; Moraïtis, Pavlos (2005)
      Communication between agents needs to be flexible enough to encompass together a variety of different aspects such as, conformance to society protocols, private tactics of the individual agents, strategies that reflect ...
    • Conference Object  

      A local search mechanism for peer-to-peer networks 

      Kalogeraki, Vana; Gunopulos, Dimitrios; Zeinalipour-Yazdi, Constantinos D. (2002)
      One important problem in peer-to-peer (P2P) networks is searching and retrieving the correct information. However, existing searching mechanisms in pure peer-to-peer networks are inefficient due to the decentralized nature ...
    • Article  

      Locating objects in mobile computing 

      Pitoura, Evaggelia 1967-; Samaras, George S. (2001)
      In current distributed systems, the notion of mobility is emerging in many forms and applications. Mobility arises naturally in wireless computing since the location of users changes as they move. Besides mobility in ...
    • Article  

      Location-aware services over vehicular ad-hoc networks using car-to-car communication 

      Dikaiakos, Marios D.; Florides, A.; Nadeem, T.; Iftode, L. (2007)
      Recent advances in wireless inter-vehicle communication systems enable the establishment of Vehicular Ad-hoc Networks (VANET) and create significant opportunities for the deployment of a wide variety of applications and ...
    • Conference Object  

      Performance and stability bounds for dynamic networks 

      Koukopoulos, D.; Mavronicolas, Marios; Spirakis, Paul G. (2004)
      In this work, we study the impact of dynamically changing link capacities on the delay bounds of LIS (Longest-In-System) and SIS (Shortest-In-System) protocols on specific networks (that can be modelled as Directed Acyclic ...
    • Article  

      Performance and stability bounds for dynamic networks 

      Koukopoulos, D.; Mavronicolas, Marios; Spirakis, Paul G. (2007)
      In this work, we study the impact of dynamically changing link capacities on the delay bounds of LIS (Longest-In-System) and SIS (Shortest-In-System) protocols on specific networks (that can be modelled as Directed Acyclic ...