• Article  

      Emergency TeleOrthoPaedics m-health system for wireless communication links 

      Hadjinicolaou, Marios G.; Nilavalan, R.; Itagaki, T.; Voskarides, Sotos Ch; Pattichis, Constantinos S.; Schizas, Akis N. (2009)
      For the first time, a complete wireless and mobile emergency TeleOrthoPaedics system with field trials and expert opinion is presented. The system enables doctors in a remote area to obtain a second opinion from doctors ...
    • Conference Object  

      Hierarchical approach for the bandwidth allocation, management and control in B-ISDN 

      Herzberg, Meir; Pitsillides, Andreas (Publ by IEEE, 1993)
      This paper adopts a hierarchical multilayer/ multilevel approach for the allocation, management and control of B-ISDN resources. This approach seems appropriate to present a vertical decomposition of control layers, having ...
    • Article  

      How many attackers can selfish defenders catch? 

      Mavronicolas, Marios; Monien, Burkhard; Lesta, Vicky Papadopoulou (2013)
      In a distributed system with attacks and defenses, both attackers and defenders are self-interested entities. We assume a reward-sharing scheme among interdependent defenders
    • Conference Object  

      Information hovering in vehicular ad-hoc networks 

      Xeros, Andreas; Lestas, Marios; Andreou, Maria I.; Pitsillides, Andreas; Ioannou, Petros A. (2009)
      Information Hovering is a relatively new concept of information dissemination over a mobile set of peers. It naturally applies in many applications in Vehicular Ad-Hoc Networks, where useful information needs to be made ...
    • Article  

      Nash equilibria in discrete routing games with convex latency functions 

      Gairing, M.; Lücking, T.; Mavronicolas, Marios; Monien, Burkhard; Rode, M. (2004)
      We study Nash equilibria in a discrete routing game that combines features of the two most famous models for non-cooperative routing, the KP model [16] and the Wardrop model [27]. In our model, users share parallel links. ...
    • Article  

      Nash equilibria in discrete routing games with convex latency functions 

      Gairing, M.; Lücking, T.; Mavronicolas, Marios; Monien, Burkhard; Rode, M. (2008)
      In a discrete routing game, each of n selfish users employs a mixed strategy to ship her (unsplittable) traffic over m parallel links. The (expected) latency on a link is determined by an arbitrary non-decreasing, non-constant ...
    • Article  

      A new estimation scheme for the effective number of users in internet congestion control 

      Lestas, Marios; Pitsillides, Andreas; Ioannou, Petros A.; Hadjipollas, George (2011)
      Many congestion control protocols have been recently proposed in order to alleviate the problems encountered by TCP in high-speed networks and wireless links. Protocols utilizing an architecture that is in the same spirit ...
    • Article  

      A new model for selfish routing 

      Lücking, T.; Mavronicolas, Marios; Monien, Burkhard; Rode, M. (2008)
      In this work, we introduce and study a new, potentially rich model for selfish routing over non-cooperative networks, as an interesting hybridization of the two prevailing such models, namely the KPmodel [E. Koutsoupias, ...
    • Article  

      A new model for selfish routing 

      Lücking, T.; Mavronicolas, Marios; Monien, Burkhard; Rode, M. (2004)
      In this work, we introduce and study a new model for selfish routing over non-cooperative networks that combines features from the two such best studied models, namely the KP model and the Wardrop model in an interesting ...
    • Article  

      On network survivability algorithms based on trellis graph transformations 

      Louca, Soulla P.; Pitsillides, Andreas; Samaras, George S. (1999)
      Due to the wide range of services being supported, telecommunications networks are loaded with massive quantities of information. This stimulates extra concern for network survivability. In this paper, we use graph theoretic ...
    • Article  

      Performance aspects of data broadcast in wireless networks with user retrials 

      Vlajic, N.; Charalambous, Charalambos D.; Makrakis, D. (2004)
      The User retrial phenomenon and its significant impact on network performance in unicast wireless systems are known and relatively well studied in the literature. However, there have been no previous studies on the impact ...
    • Conference Object  

      The power of the defender 

      Gelastou, Marina; Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2006)
      We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in the ...
    • Conference Object  

      Practical evaluation of GPRS use in a telemedicine system in Cyprus 

      Voskarides, Sotos Ch; Pattichis, Constantinos S.; Istepanian, Robert Sh Habib; Michaelides, C.; Schizas, Christos N. (Institute of Electrical and Electronics Engineers Inc., 2003)
      The unceasing emergence of new technologies in wireless and mobile telecommunication networks, combined with the simultaneous rapid advances in information technology, are leading to many new solutions in the field of ...
    • Article  

      The price of anarchy for polynomial social cost 

      Gairing, M.; Lücking, T.; Mavronicolas, Marios; Monien, Burkhard (2004)
      In this work, we consider an interesting variant of the well-studied KP model [18] for selfish routing that reflects some influence from the much older Wardrop model [31]. In the new model, user traffics are still unsplittable, ...
    • Article  

      The price of defense and fractional matchings 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Persiano, Giuseppe; Philippou, Anna; Spirakis, Paul G. (2006)
      Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was ...
    • Conference Object  

      RAN selection for converged networks supporting IMS signalling and MBMS service 

      Antoniou, Josephina; Stylianou, Marios; Pitsillides, Andreas (2007)
      Future Communication Networks are envisioned to be based upon a common, flexible and scalable convergence platform, where different access networks, different terminals and different services can coexist. The new user ...
    • Conference Object  

      Real-time graph visualization tool for vehicular ad-hoc networks: (VIVAGr: VIsualization tool of VAnet Graphs in real-time) 

      Spanakis, E.; Efstathiades, Christodoulos; Pallis, George C.; Dikaiakos, Marios D. (2011)
      In this work we describe VIVAGr, a graphical-oriented real time visualization tool for vehicular ad-hoc network connectivity graphs. This tool enables the effective synthesis of structural, topological, and dynamic ...
    • Article  

      Requirements for the transmission of streaming video in mobile wireless networks 

      Vassiliou, Vasos; Antoniou, Pavlos Ch.; Giannakou, Iraklis; Pitsillides, Andreas (2006)
      The ability to transmit video and support related real-time multimedia applications is considered important in mobile networks. Video streaming, video conferencing, online interactive gaming, and mobile TV are only a few ...
    • Article  

      Selfish routing in the presence of network uncertainty 

      Georgiou, Chryssis; Pavlides, Theophanis; Philippou, Anna (2009)
      We study the problem of selfish routing in the presence of incomplete network information. Our model consists of a number of users who wish to route their traffic on a network of m parallel links with the objective of ...
    • Conference Object  

      A simulation tool to evaluate radio resource management algorithms for enhanced UMTS 

      Vassiliou, Vasos; Antoniou, Josephina; Hadjipollas, George; Pitsillides, Andreas (2005)
      This paper presents a new system level simulator that has been developed to evaluate Radio Resource Management (RRM) techniques in UMTS (Universal Mobile Telecommunication Systems) and enhanced-UMTS networks. The simulator ...