Search Results - "ARGYRAKI, Katerina"
-
1
Integration of heparin-binding protein and interleukin-6 in the early prediction of respiratory failure and mortality in pneumonia by SARS-CoV-2 (COVID-19)
Published in European journal of clinical microbiology & infectious diseases (01-07-2021)“…Recent publications on the probable role of heparin-binding protein (HBP) as a biomarker in sepsis prompted us to investigate its diagnostic and prognostic…”
Get full text
Journal Article -
2
Predictive and Prognostic Value of Peripheral Blood Cytokeratin-19 mRNA-Positive Cells Detected by Real-Time Polymerase Chain Reaction in Node-Negative Breast Cancer Patients
Published in Journal of clinical oncology (10-08-2006)“…To evaluate the predictive and prognostic value of peripheral blood cytokeratin-19 (CK-19) mRNA-positive cells in axillary lymph node-negative breast cancer…”
Get full text
Journal Article -
3
Optimal Source-Based Filtering of Malicious Traffic
Published in IEEE/ACM transactions on networking (01-04-2012)“…In this paper, we consider the problem of blocking malicious traffic on the Internet via source-based filtering. In particular, we consider filtering via…”
Get full text
Journal Article -
4
Home Blood Pressure Is as Reliable as Ambulatory Blood Pressure in Predicting Target-Organ Damage in Hypertension
Published in American journal of hypertension (01-06-2007)“…Our objective was to assess the value of home blood pressure (BP) monitoring in comparison to office BP measurements and ambulatory monitoring in predicting…”
Get full text
Journal Article -
5
Netscope: Practical Network Loss Tomography
Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)“…We present Netscope, a tomographic technique that infers the loss rates of network links from unicast end-to-end measurements. Netscope uses a novel…”
Get full text
Conference Proceeding -
6
Salmonella enteritidis Infection Complicated by Acute Myocarditis: A Case Report and Review of the Literature
Published in Cardiology Research and Practice (01-01-2011)“…Salmonella spp. is the cause of commonly encountered infections, with seasonal pattern of occurrence and worldwide distribution. Some of the clinical…”
Get full text
Journal Article -
7
Creating Secrets Out of Packet Erasures
Published in IEEE transactions on information forensics and security (01-06-2016)“…We present protocols for creating pairwise secrets between nodes in a wireless network, so that these secrets are secure from an eavesdropper, Eve, with…”
Get full text
Journal Article -
8
HEPARIN-BINDING PROTEIN LEVELS PREDICT UNFAVORABLE OUTCOME IN COVID-19 PNEUMONIA: A POST HOC ANALYSIS OF THE SAVE TRIAL
Published in Shock (Augusta, Ga.) (01-03-2024)“…We aimed to evaluate heparin-binding protein (HBP) as a marker of prognosis of unfavorable outcome in COVID-19 pneumonia. This was a post hoc analysis of the…”
Get full text
Journal Article -
9
Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks
Published in IEEE/ACM transactions on networking (01-08-2009)“…In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and…”
Get full text
Journal Article -
10
Beneficial Effects of Intermediate Dosage of Anticoagulation Treatment on the Prognosis of Hospitalized COVID-19 Patients: The ETHRA Study
Published in In vivo (Athens) (01-01-2021)“…To investigate the efficacy (prognosis, coagulation/inflammation biomarkers) and safety (bleeding events) of different anticoagulation dosages in COVID-19…”
Get full text
Journal Article -
11
Early Occurrence of Adverse Events in Hospitalized Patients With COVID-19 and Beneficial Effect of Anticoagulation
Published in In vivo (Athens) (01-01-2022)“…This study analyzed the characteristics of patients with COVID-19 with major events during the first days of hospitalization. This is a retrospective analysis…”
Get full text
Journal Article -
12
Exchanging pairwise secrets efficiently
Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)“…We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an…”
Get full text
Conference Proceeding -
13
Loss and Delay Accountability for the Internet
Published in 2007 IEEE International Conference on Network Protocols (01-10-2007)“…The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their…”
Get full text
Conference Proceeding -
14
Optimal Filtering of Source Address Prefixes: Models and Algorithms
Published in IEEE INFOCOM 2009 (01-04-2009)“…How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS)…”
Get full text
Conference Proceeding -
15
Group secret key generation over broadcast erasure channels
Published in 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (01-11-2010)“…We consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. We assume an…”
Get full text
Conference Proceeding -
16
Identity Aware Sensor Networks
Published in IEEE INFOCOM 2009 (01-04-2009)“…In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the…”
Get full text
Conference Proceeding -
17
Generating Steganographic Text with LSTMs
Published 30-05-2017“…Motivated by concerns for user privacy, we design a steganographic system ("stegosystem") that enables two users to exchange encrypted messages without an…”
Get full text
Journal Article -
18
Verifying Reachability in Networks with Mutable Datapaths
Published 04-07-2016“…Recent work has made great progress in verifying the forwarding correctness of networks . However, these approaches cannot be used to verify networks…”
Get full text
Journal Article -
19
Verifying Isolation Properties in the Presence of Middleboxes
Published 25-09-2014“…Great progress has been made recently in verifying the correctness of router forwarding tables. However, these approaches do not work for networks containing…”
Get full text
Journal Article -
20
Towards unconditional tor-like anonymity
Published in 2015 International Symposium on Network Coding (NetCod) (01-06-2015)“…We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol…”
Get full text
Conference Proceeding