Now showing items 941-960 of 1952

    • Article  

      A q-Analog of Approximate Inclusion-Exclusion 

      Mavronicolas, Marios (1998)
      We consider the lattice of subspaces of ann-dimensional vector spaceVnqover a finite fieldGF(q) and represent a family of such subspaces by elements of a setX. Theq-analog of the principle of inclusion-exclusion expresses ...
    • Article  

      The price of defense and fractional matchings 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Persiano, Giuseppe; Philippou, Anna; Spirakis, Paul G. (2006)
      Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was ...
    • Article  

      A graph-theoretic network security game 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2008)
      Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, ...
    • Article  

    • Conference Object  

      Networks in distributed computing 

      Mavronicolas, Marios; DIMACS (Organisation); American Mathematical Society. (American Mathematical Society, 1999)
    • Conference Object  

      A post cardiac surgery home-monitoring system 

      Matheou, George; Kyriacou, Efthyvoulos C.; Chimonidou, Panayiota; Pattichis, Constantinos S.; Lambrinou, Ekaterini; Barberis, Vassilis I. I.; Georghiou, Georgios P. (2011)
      The aim of this work was to develop a system that will be used for remote monitoring of patients at home after a cardiac surgery so as to keep their rehabilitation period as smooth as possible and avoid unnecessary visits ...
    • Article  

      Architectural support for data-driven execution 

      Matheou, George; Evripidou, Paraskevas (2014)
      The exponential growth of sequential processors has come to an end, and thus, parallel processing is probably the only way to achieve performance growth. We propose the development of parallel architectures based on ...
    • Conference Object  

      Verilog-based simulation of hardware support for Data-flow concurrency on Multicore systems 

      Matheou, George; Evripidou, Paraskevas (IEEE Computer Society, 2013)
      Data-Driven Multithreading (DDM) is a threaded data-flow model that schedules threads for execution based on data availability. DDM is utilizing a Thread Scheduling Unit (TSU) for the management of the threads on sequential ...
    • Article  

    • Article  

      Preface: Algorithmic Game Theory 

      Mavronicolas, Marios (2011)
    • Article  

      Preface 

      Mavronicolas, Marios (2009)
    • Conference Object  

      Experimental evaluation of NFC reliability between an RFID tag and a smartphone 

      Mareli, M.; Rimer, S.; Paul, B. S.; Ouahada, K.; Pitsillides, Andreas (Institute of Electrical and Electronics Engineers Inc., 2013)
      Near Field Communication (NFC) is a short range wireless technology that enables data transfer between two NFC devices. It is derived from Radio Frequency Identification (RFID) technology. However, NFC only operates at ...
    • Book  

      Information processing and technology 

      Mastorakis, Nikos E.; Nikolopoulos, Stavros D. (Nova Science, 2001)
    • Conference Object  

      Data privacy considerations in Intensive Care Grids 

      Luna, J.; Dikaiakos, Marios D.; Kyprianou, T.; Bilas, Angelos 1971-; Marazakis, M. (2008)
      Novel eHealth systems are being designed to provide a citizen-centered health system, however the even demanding need for computing and data resources has required the adoption of Grid technologies. In most of the cases, ...
    • Article  

      Which is the worst-case Nash equilibrium? 

      Lücking, T.; Mavronicolas, Marios; Monien, Burkhard; Rode, M.; Spirakis, Paul G.; Vrto, I. (2003)
      A Nash equilibrium of a routing network represents a stable state of the network where no user finds it beneficial to unilaterally deviate from its routing strategy. In this work, we investigate the structure of such ...
    • Article  

      A new model for selfish routing 

      Lücking, T.; Mavronicolas, Marios; Monien, Burkhard; Rode, M. (2004)
      In this work, we introduce and study a new model for selfish routing over non-cooperative networks that combines features from the two such best studied models, namely the KP model and the Wardrop model in an interesting ...
    • Conference Object  

      A realistic evaluation and comparison of indoor location technologies: Experiences and lessons learned 

      Lymberopoulos, D.; Liu, J.; Yang, X.; Choudhury, R. R.; Handziski, V.; Sen, S.; Lemic, F.; Busch, J.; Jiang, Z.; Zou, H.; Jiang, H.; Ashok, A.; Xu, C.; Ghose, A.; Ahmed, N.; Zhang, C.; Xiao, Z.; Wen, H.; Schmid, T.; Lee, D.; Klepal, M.; Beder, C.; Nikodem, M.; Szymczak, S.; Hoffmann, P.; Selavo, L.; Giustiniano, D.; Lenders, V.; Rea, M.; Marcaletti, A.; Laoudias, Christos; Zeinalipour-Yazdi, Constantinos D.; Tsai, Y. -K; Abrudan, T. E.; Markham, A.; Bestmann, A.; Reimann, R.; Li, L.; Zhao, C.; Adler, S.; Schmitt, S.; Lazik, P.; Rajagopal, N.; Rowe, A.; Dentamaro, V.; Colucci, D.; Ambrosini, P.; Ferraz, A. S.; Martins, L. Q. L.; Bello, P.; Alvino, A.; Sark, V.; Pirkl, G.; Hevesi, P. (Association for Computing Machinery, Inc, 2015)
      We present the results, experiences and lessons learned from comparing a diverse set of technical approaches to indoor localization during the 2014 Microsoft Indoor Localization Competition. 22 different solutions to indoor ...
    • Article  

      ARNI: Abductive inference of complex regulatory network structures 

      Maimari, N.; Turliuc, C. -R; Broda, K.; Kakas, Antonis C.; Krams, R.; Russo, A. (2013)
      Physical network inference methods use a template of molecular interaction to infer biological networks from high throughput datasets. Current inference methods have limited applicability, relying on cause-effect pairs or ...
    • Article  

      Preface 

      Manolopoulos, Yannis; Evripidou, Skevos; Kakas, Antonis C. (2003)
    • Article  

      Data-centric privacy protocol for intensive care grids 

      Luna, J.; Dikaiakos, Marios D.; Marazakis, M.; Kyprianou, T. (2010)
      Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid systems. In particular, intensive care medicine uses ...