Search Results - "Giannoutakis, Konstantinos"
-
1
Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges
Published in Future internet (26-02-2019)“…The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other…”
Get full text
Journal Article -
2
Evaluation of self‐organizing and self‐managing heterogeneous high performance computing clouds through discrete‐time simulation
Published in Concurrency and computation (10-09-2021)“…Recently, a new management and resource delivery model based on self‐organization and self‐management (SOSM) principles for heterogeneous cloud infrastructures…”
Get full text
Journal Article -
3
An Aggregation-Based Algebraic Multigrid Method with Deflation Techniques and Modified Generic Factored Approximate Sparse Inverses
Published in Mathematics (Basel) (01-01-2023)“…In this paper, we examine deflation-based algebraic multigrid methods for solving large systems of linear equations. Aggregation of the unknown terms is…”
Get full text
Journal Article -
4
Large-scale simulation of a self-organizing self-management cloud computing framework
Published in The Journal of supercomputing (01-02-2018)“…A recently introduced cloud simulation framework is extended to support self-organizing and self-management local strategies in the cloud resource hierarchy…”
Get full text
Journal Article -
5
On the Optimization of Self-Organization and Self-Management Hardware Resource Allocation for Heterogeneous Clouds
Published in Computers (Basel) (01-11-2021)“…There is a tendency, during the last years, to migrate from the traditional homogeneous clouds and centralized provisioning of resources to heterogeneous…”
Get full text
Journal Article -
6
Automatic categorization of Web service elements
Published in International journal of Web information systems (18-06-2018)“…PurposeSemantic categorization of Web services comprises a fundamental requirement for enabling more efficient and accurate search and discovery of services in…”
Get full text
Journal Article -
7
The UniversAAL Platform for AAL (Ambient Assisted Living)
Published in Journal of intelligent systems (01-08-2015)“…This article describes the UniversAAL platform, an open platform intended to facilitate the development, distribution, and deployment of technological…”
Get full text
Journal Article -
8
Making a Business Case for Intelligent Transport Systems: A Holistic Business Model Framework
Published in Transport reviews (01-11-2012)“…Intelligent transport systems (ITS) are technologies, applications and systems for accident warnings, reduction of driving workload, congestion avoidance and…”
Get full text
Journal Article -
9
An Intrusion Detection System for Multi-class Classification Based on Deep Neural Networks
Published in 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) (01-12-2019)“…Intrusion Detection Systems (IDSs) are considered as one of the fundamental elements in the network security of an organisation since they form the first line…”
Get full text
Conference Proceeding -
10
Analyzing resource distribution over a real-world large-scale virtual content infrastructure
Published in 2019 IEEE Symposium on Computers and Communications (ISCC) (01-06-2019)“…Communication service providers (CSPs) face competitive pressure to increase infrastructure utilization and reduce operational costs while at the same time…”
Get full text
Conference Proceeding -
11
High performance finite element approximate inverse preconditioning
Published in Applied mathematics and computation (15-07-2008)“…A new parallel normalized optimized approximate inverse algorithm, based on the concept of the “fish bone” computational approach satisfying an antidiagonal…”
Get full text
Journal Article -
12
Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes
Published in 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (01-09-2019)“…In this paper, a security solution is proposed for IoT smart homes based on constructing behavioral device templates. These templates are being calculated by…”
Get full text
Conference Proceeding -
13
On the performance of parallel approximate inverse preconditioning using Java multithreading techniques
Published in Applied mathematics and computation (01-07-2007)“…In this paper a parallel shared memory Java multithreaded design and implementation of the explicit approximate inverse preconditioning is presented for…”
Get full text
Journal Article -
14
Normalized explicit approximate inverse preconditioning for solving 3D boundary value problems on uniprocessor and distributed systems
Published in International journal for numerical methods in engineering (01-01-2006)“…Normalized explicit approximate inverse matrix techniques, based on normalized approximate factorization procedures, for solving sparse linear systems…”
Get full text
Journal Article -
15
A Behaviour based Ransomware Detection using Neural Network Models
Published in 2020 10th International Conference on Advanced Computer Information Technologies (ACIT) (01-09-2020)“…This study proposes a behaviour based methodology for ransomware detection. Ransomware is the type of malware that restricts access to files or blocks an…”
Get full text
Conference Proceeding -
16
Normalized explicit finite element approximate inverse preconditioning
Published in Computers & structures (01-11-2004)“…Normalized explicit approximate inverse matrix techniques for computing explicitly various families of normalized approximate inverses based on normalized…”
Get full text
Journal Article -
17
Intrusion Detection System Based on Network Traffic Using Deep Neural Networks
Published in 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (01-09-2019)“…Nowadays, the small-medium enterprises security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially…”
Get full text
Conference Proceeding -
18
Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust
Published in 2018 Innovations in Intelligent Systems and Applications (INISTA) (01-07-2018)“…The H2020 European research project Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control (GHOST) aims to develop a cyber-security layer…”
Get full text
Conference Proceeding -
19
A Lightweight Cyber-Security Defense Framework for Smart Homes
Published in 2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (01-08-2020)“…Inevitably, the explosion of the Internet of Things (IoT) has alerted the modern human life. Apart from the benefits that this new technology offers to the…”
Get full text
Conference Proceeding -
20
Energy modeling in cloud simulation frameworks
Published in Future generation computer systems (01-02-2018)“…There is a quite intensive research for Cloud simulators in the recent years, mainly due to the fact that the need for powerful computational resources has led…”
Get full text
Journal Article