Search Results - "Giannoutakis, Konstantinos"

Refine Results
  1. 1

    Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges by Svorobej, Sergej, Takako Endo, Patricia, Bendechache, Malika, Filelis-Papadopoulos, Christos, Giannoutakis, Konstantinos, Gravvanis, George, Tzovaras, Dimitrios, Byrne, James, Lynn, Theo

    Published in Future internet (26-02-2019)
    “…The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other…”
    Get full text
    Journal Article
  2. 2

    Evaluation of self‐organizing and self‐managing heterogeneous high performance computing clouds through discrete‐time simulation by Giannoutakis, Konstantinos M., Filelis‐Papadopoulos, Christos K., Gravvanis, George A., Tzovaras, Dimitrios

    Published in Concurrency and computation (10-09-2021)
    “…Recently, a new management and resource delivery model based on self‐organization and self‐management (SOSM) principles for heterogeneous cloud infrastructures…”
    Get full text
    Journal Article
  3. 3

    An Aggregation-Based Algebraic Multigrid Method with Deflation Techniques and Modified Generic Factored Approximate Sparse Inverses by Natsiou, Anastasia A., Gravvanis, George A., Filelis-Papadopoulos, Christos K., Giannoutakis, Konstantinos M.

    Published in Mathematics (Basel) (01-01-2023)
    “…In this paper, we examine deflation-based algebraic multigrid methods for solving large systems of linear equations. Aggregation of the unknown terms is…”
    Get full text
    Journal Article
  4. 4

    Large-scale simulation of a self-organizing self-management cloud computing framework by Filelis-Papadopoulos, Christos K., Giannoutakis, Konstantinos M., Gravvanis, George A., Tzovaras, Dimitrios

    Published in The Journal of supercomputing (01-02-2018)
    “…A recently introduced cloud simulation framework is extended to support self-organizing and self-management local strategies in the cloud resource hierarchy…”
    Get full text
    Journal Article
  5. 5

    On the Optimization of Self-Organization and Self-Management Hardware Resource Allocation for Heterogeneous Clouds by Giannoutakis, Konstantinos M., Filelis-Papadopoulos, Christos K., Gravvanis, George A., Tzovaras, Dimitrios

    Published in Computers (Basel) (01-11-2021)
    “…There is a tendency, during the last years, to migrate from the traditional homogeneous clouds and centralized provisioning of resources to heterogeneous…”
    Get full text
    Journal Article
  6. 6

    Automatic categorization of Web service elements by Mavridou, Efthimia, Giannoutakis, Konstantinos M., Kehagias, Dionysios, Tzovaras, Dimitrios, Hassapis, George

    “…PurposeSemantic categorization of Web services comprises a fundamental requirement for enabling more efficient and accurate search and discovery of services in…”
    Get full text
    Journal Article
  7. 7

    The UniversAAL Platform for AAL (Ambient Assisted Living) by Ferro Erina, Girolami Michele, Salvi Dario, Mayer Christopher, Gorman Joe, Grguric Andrej, Ram Roni, Sadat Rubaiyat, Giannoutakis Konstantinos M., Stocklöw Carsten

    Published in Journal of intelligent systems (01-08-2015)
    “…This article describes the UniversAAL platform, an open platform intended to facilitate the development, distribution, and deployment of technological…”
    Get full text
    Journal Article
  8. 8

    Making a Business Case for Intelligent Transport Systems: A Holistic Business Model Framework by Giannoutakis, Konstantinos N., Li, Feng

    Published in Transport reviews (01-11-2012)
    “…Intelligent transport systems (ITS) are technologies, applications and systems for accident warnings, reduction of driving workload, congestion avoidance and…”
    Get full text
    Journal Article
  9. 9

    An Intrusion Detection System for Multi-class Classification Based on Deep Neural Networks by Toupas, Petros, Chamou, Dimitra, Giannoutakis, Konstantinos M., Drosou, Anastasios, Tzovaras, Dimitrios

    “…Intrusion Detection Systems (IDSs) are considered as one of the fundamental elements in the network security of an organisation since they form the first line…”
    Get full text
    Conference Proceeding
  10. 10
  11. 11

    High performance finite element approximate inverse preconditioning by Giannoutakis, Konstantinos M., Gravvanis, George A.

    Published in Applied mathematics and computation (15-07-2008)
    “…A new parallel normalized optimized approximate inverse algorithm, based on the concept of the “fish bone” computational approach satisfying an antidiagonal…”
    Get full text
    Journal Article
  12. 12

    Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes by Spanos, Georgios, Giannoutakis, Konstantinos M., Votis, Konstantinos, Tzovaras, Dimitrios

    “…In this paper, a security solution is proposed for IoT smart homes based on constructing behavioral device templates. These templates are being calculated by…”
    Get full text
    Conference Proceeding
  13. 13

    On the performance of parallel approximate inverse preconditioning using Java multithreading techniques by Gravvanis, George A., Epitropou, Victor N., Giannoutakis, Konstantinos M.

    Published in Applied mathematics and computation (01-07-2007)
    “…In this paper a parallel shared memory Java multithreaded design and implementation of the explicit approximate inverse preconditioning is presented for…”
    Get full text
    Journal Article
  14. 14

    Normalized explicit approximate inverse preconditioning for solving 3D boundary value problems on uniprocessor and distributed systems by Gravvanis, George A., Giannoutakis, Konstantinos M.

    “…Normalized explicit approximate inverse matrix techniques, based on normalized approximate factorization procedures, for solving sparse linear systems…”
    Get full text
    Journal Article
  15. 15

    A Behaviour based Ransomware Detection using Neural Network Models by Ketzaki, Eleni, Toupas, Petros, Giannoutakis, Konstantinos M., Drosou, Anastasios, Tzovaras, Dimitrios

    “…This study proposes a behaviour based methodology for ransomware detection. Ransomware is the type of malware that restricts access to files or blocks an…”
    Get full text
    Conference Proceeding
  16. 16

    Normalized explicit finite element approximate inverse preconditioning by Gravvanis, George A., Giannoutakis, Konstantinos M.

    Published in Computers & structures (01-11-2004)
    “…Normalized explicit approximate inverse matrix techniques for computing explicitly various families of normalized approximate inverses based on normalized…”
    Get full text
    Journal Article
  17. 17

    Intrusion Detection System Based on Network Traffic Using Deep Neural Networks by Chamou, Dimitra, Toupas, Petros, Ketzaki, Eleni, Papadopoulos, Stavros, Giannoutakis, Konstantinos M., Drosou, Anastasios, Tzovaras, Dimitrios

    “…Nowadays, the small-medium enterprises security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially…”
    Get full text
    Conference Proceeding
  18. 18
  19. 19

    A Lightweight Cyber-Security Defense Framework for Smart Homes by Spanos, Georgios, Giannoutakis, Konstantinos M., Votis, Konstantinos, Viano, Brais, Augusto-Gonzalez, Javier, Aivatoglou, Georgios, Tzovaras, Dimitrios

    “…Inevitably, the explosion of the Internet of Things (IoT) has alerted the modern human life. Apart from the benefits that this new technology offers to the…”
    Get full text
    Conference Proceeding
  20. 20

    Energy modeling in cloud simulation frameworks by Makaratzis, Antonios T., Giannoutakis, Konstantinos M., Tzovaras, Dimitrios

    Published in Future generation computer systems (01-02-2018)
    “…There is a quite intensive research for Cloud simulators in the recent years, mainly due to the fact that the need for powerful computational resources has led…”
    Get full text
    Journal Article