Publications
Export 169 results:
Author [ Title![(Desc)](https://soda.dit.uop.gr/sites/all/modules/biblio/misc/arrow-desc.png)
Filters: First Letter Of Last Name is K [Clear All Filters]
Comparative Study of Protocols of the Transport Layer for Multimedia Applications. Proceedings of the 4th Hellenic Conference on Informatics. :105-118.
.
1993. Composing cardinal direction relations. Artif. Intell.. 152:143–171.
.
2004. Composing Cardinal Direction Relations. Advances in Spatial and Temporal Databases, 7th International Symposium, SSTD 2001, Redondo Beach, CA, USA, July 12-15, 2001, Proceedings. :299–320.
.
2001. Computing and Handling Cardinal Direction Information. Advances in Database Technology - EDBT 2004, 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, March 14-18, 2004, Proceedings. :329–347.
.
2004. Computing and Managing Cardinal Direction Relations. IEEE Trans. Knowl. Data Eng.. 17:1610–1623.
.
2005. Conceptual Modeling - ER 2005, 24th International Conference on Conceptual Modeling, Klagenfurt, Austria, October 24-28, 2005, Proceedings. Lecture Notes in Computer Science. 3716
.
2005. Consistency Checking for Qualitative Spatial Reasoning with Cardinal Directions. Principles and Practice of Constraint Programming - CP 2002, 8th International Conference, CP 2002, Ithaca, NY, USA, September 9-13, 2002, Proceedings. :341–355.
.
2002. On the consistency of cardinal direction constraints. Artif. Intell.. 163:91–135.
.
2005. A context-based adaptive visualization environment. Proceedings of the International Conference on Information Visualisation. :62-67.
.
2006. Correction to "A Family of Directional Relation Models for Extended Objects". IEEE Trans. Knowl. Data Eng.. 19:1448.
.
2007. A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence. In Proceedings of the IEEE Workshop on Cyber Security & Resilience in the Internet of Things (CSRIoT @ IEEE Services).
.
2016. Creating an Historical Archive Ontology: Guidelines and Evaluation. ICDIM. :102-109.
.
2006. Creating an Ontology for the User Profile: Method and Applications. RCIS. :407–412.
.
2007. Cyber-Security Training Evaluation Metrics. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience.
.
2021. Cyber-Security Training Evaluation Metrics. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience.
.
2021. Data Models and Languages for Agent-Based Textual Information Dissemination. Proceedings of the 6th International Workshop on Cooperative Information Agents (CIA).
.
2002. Data Models and Languages for Agent-Based Textual Information Dissemination. Proceedings of the 6th International Workshop on Cooperative Information Agents (CIA).
.
2002. Data Science Tutor: An online platform for automated exercise solving in Data Science. Proceedings of the 9th Conference on Computer Science Teaching (DIDINFO).
.
2018. Data Warehousing and Knowledge Discovery, 5th International Conference, DaWaK 2003, Prague, Czech Republic, September 3-5,2003, Proceedings. Lecture Notes in Computer Science. 2737
.
2003. On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids. Energies. 14:2818.
.
2021. On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids. Energies. 14:2818.
.
2021. Designing a virtual museum within a museum. Proceedings VAST 2001 Virtual Reality, Archeology, and Cultural Heritage. :284.
.
2001. Disruptive Technologies for Parliaments: A Literature Review. Future Internet. 15:66.
.
2023. Disruptive Technologies for Parliaments: A Literature Review. Future Internet. 15:66.
.
2023. Distributed Evaluation of Continuous Equi-join Queries over Large Structured Overlay Networks. Proceedings of the 22nd International Conference on Data Engineering (ICDE).
.
2006.