Publications
Querying temporal and spatial constraint networks in PTIME. Artif. Intell.. 123:223–263.
.
2000. Querying Temporal Constraint Networks in PTIME. Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, July 18-22, 1999, Orlando, Florida, USA.. :745–750.
.
1999. The quest for the appropriate cyber-threat intelligence sharing platform. Proceedings of the 8th International Conference on Data Science, Technology and Applications (DATA), Prague, Czech Republic.
.
2019. Rating Prediction Quality Enhancement in Low-Density Collaborative Filtering Datasets. Big Data and Cognitive Computing. 7:59.
.
2023. Real exhibitions in a virtual museum. Virtual Reality. 7:120–128.
.
2004. A Reasoning System of Ternary Projective Relations. IEEE Trans. Knowl. Data Eng.. 22:161–178.
.
2010. Recommendation information diffusion in social networks considering user influence and semantics. Social Network Analysis and Mining. 6:108.
.
2016. Reconnaisance. Cyber-Security Threats, Actors, and Dynamic Mitigation.
.
2020. On Replacement Service Selection in WS-BPEL Scenario Adaptation. Proceedings of the 8th IEEE International Conference on Service Oriented Computing & Applications (SOCA 2015).
.
2015. Reusability in Electronic Services Development. Proceedings of the CSITeA 04 conference.
.
2004. Reverse engineering electronic services: from e-forms to knowledge. ICSOFT (1). :273-278.
.
2006. Rewiring Strategies for Semantic Overlay Networks. Distributed and Parallel Databases (DAPD). 26:181–205.
.
2009. RoG: A Pipeline for Automated Sensitive Data Identification and Anonymisation. Proceedings of the 2023 IEEE CSR Workshop on Data Science for Cyber Security (DS4CS).
.
2023. The role of priority mechanisms on performance metrics of double-buffered switching elements. AIP Conference Proceedings - ICCMSE 2007. 963:937-942.
.
2007. Routing and performance analysis of double-buffered omega networks supporting multi-class priority traffic. Proc. - The 3rd Int. Conf. Systems and Networks Communications, ICSNC 2008 - Includes I-CENTRIC 2008: Int. Conf. Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services. :56-63.
.
2008. Routing and performance evaluation of dual priority Delta networks under hotspot environment. Proceedings - 2009 1st International Conference on Advances in Future Internet, AFIN 2009. :24-30.
.
2009. R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities. Proceedings of the 39th Annual International ACM SIGIR Conference.
.
2016. Safe Travelling Period Recommendation to High Attack Risk European Destinations Based on Past Attack Information. Lecture Notes in Social Networks. :77–100.
.
2021. Scalable hybrid similarity join over geolocated time series. Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2018, Seattle, WA, USA, November 06-09, 2018. :119–128.
.
2018. Scavenger Hunt in the Roads of Freedom (Greek title: “Κυνήγι θησαυρού στους Δρόμους της Ελευθερίας"). Proceedings of the 3nd Pan-Hellenic Conference on Digital Cultural Heritage-EuroMed 2019.
.
2019. Scientific and Statistical Database Management, 21st International Conference, SSDBM 2009, New Orleans, LA, USA, June 2-4, 2009, Proceedings. Lecture Notes in Computer Science. 5566
.
2009. SciTo trends: visualising scientific topic trends. Proceedings of the 23rd International Conference on Theory and Practice of Digital Libraries (TPDL).
.
2019. SECRETA: A System for Evaluating and Comparing RElational and Transaction Anonymization algorithms. Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, Greece. :620–623.
.
2014. SECRETA: A Tool for Anonymizing Relational, Transaction and RT-Datasets. Medical Data Privacy Handbook. :83–109.
.
2015. SECRETA: A Tool for Anonymizing Relational, Transaction and RT-Datasets. Medical Data Privacy Handbook. :83-109.
.
2015.