Skip to main content

Showing 1–18 of 18 results for author: Sioutas, S

Searching in archive cs. Search in all archives.
.
  1. Blockchain For Mobile Health Applications: Acceleration With GPU Computing

    Authors: Georgios Drakopoulos, Michail Marountas, Xenophon Liapakis, Giannis Tzimas, Phivos Mylonas, Spyros Sioutas

    Abstract: Blockchain is a linearly linked, distributed, and very robust data structure. Originally proposed as part of the Bitcoin distributed stack, it found a number of applications in a number of fields, most notably in smart contracts, social media, secure IoT, and cryptocurrency mining. It ensures data integrity by distributing strongly encrypted data in widely redundant segments. Each new insertion re… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    MSC Class: 65Y05; 68Q05; 68Q10; 68W10

  2. An Architecture For Cooperative Mobile Health Applications

    Authors: Georgios Drakopoulos, Phivos Mylonas, Spyros Sioutas

    Abstract: Mobile health applications are steadily gaining momentum in the modern world given the omnipresence of various mobile or WiFi connections. Given that the bandwidth of these connections increases over time, especially in conjunction with advanced modulation and error-correction codes, whereas the latency drops, the cooperation between mobile applications becomes gradually easier. This translates to… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    MSC Class: 05C12; 05C20; 05C80; 05C85

  3. arXiv:2203.01114  [pdf, other

    cs.LG cs.DB cs.DS cs.IR cs.LO

    Pattern Recognition and Event Detection on IoT Data-streams

    Authors: Christos Karras, Aristeidis Karras, Spyros Sioutas

    Abstract: Big data streams are possibly one of the most essential underlying notions. However, data streams are often challenging to handle owing to their rapid pace and limited information lifetime. It is difficult to collect and communicate stream samples while storing, transmitting and computing a function across the whole stream or even a large segment of it. In answer to this research issue, many strea… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

  4. arXiv:1709.03949  [pdf, other

    cs.DB

    Skyline Queries in O(1) time?

    Authors: Spyros Sioutas, Kostas Tsichlas, Andreas Kosmatopoulos, Apostolos N. Papadopoulos, Dimitrios Tsoumakos, Katerina Doka

    Abstract: The skyline of a set $P$ of points ($SKY(P)$) consists of the "best" points with respect to minimization or maximization of the attribute values. A point $p$ dominates another point $q$ if $p$ is as good as $q$ in all dimensions and it is strictly better than $q$ in at least one dimension. In this work, we focus on the static $2$-d space and provide expected performance guarantees for $3$-sided Ra… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

    Comments: 22 pages

  5. arXiv:1602.01248  [pdf, ps, other

    cs.DB cs.CL cs.IR

    Using Hadoop for Large Scale Analysis on Twitter: A Technical Report

    Authors: Nikolaos Nodarakis, Spyros Sioutas, Athanasios Tsakalidis, Giannis Tzimas

    Abstract: Sentiment analysis (or opinion mining) on Twitter data has attracted much attention recently. One of the system's key features, is the immediacy in communication with other users in an easy, user-friendly and fast way. Consequently, people tend to express their feelings freely, which makes Twitter an ideal source for accumulating a vast amount of opinions towards a wide diversity of topics. This a… ▽ More

    Submitted 3 February, 2016; originally announced February 2016.

    Comments: 8 pages, 3 tables, 3 figures

    ACM Class: H.2.4

  6. arXiv:1504.03306  [pdf, ps, other

    cs.SI physics.soc-ph

    Virus Propagation in Multiple Profile Networks

    Authors: Angeliki Rapti, Kostas Tsichlas, Spiros Sioutas, Giannis Tzimas

    Abstract: Suppose we have a virus or one competing idea/product that propagates over a multiple profile (e.g., social) network. Can we predict what proportion of the network will actually get "infected" (e.g., spread the idea or buy the competing product), when the nodes of the network appear to have different sensitivity based on their profile? For example, if there are two profiles $\mathcal{A}$ and… ▽ More

    Submitted 13 April, 2015; originally announced April 2015.

  7. arXiv:1503.07905  [pdf, other

    cs.DS cs.DC

    D3-Tree: A Dynamic Distributed Deterministic Load - Balancer for decentralized tree structures

    Authors: Efrosini Sourla, Spyros Sioutas, Kostas Tsichlas, Christos Zaroliagis

    Abstract: In this work, we propose D3-Tree, a dynamic distributed deterministic structure for data management in decentralized networks. We present in brief the theoretical algorithmic analysis, in which our proposed structure is based on, and we describe thoroughly the key aspects of the implementation. Conducting experiments, we verify that the implemented structure outperforms other well-known hierarchic… ▽ More

    Submitted 26 March, 2015; originally announced March 2015.

    Comments: 32 pages, 21 figures

  8. arXiv:1405.4699  [pdf, ps, other

    cs.DC cs.LO

    Cloud elasticity using probabilistic model checking

    Authors: Athanasios Naskos, Emmanouela Stachtiari, Anastasios Gounaris, Panagiotis Katsaros, Dimitrios Tsoumakos, Ioannis Konstantinou, Spyros Sioutas

    Abstract: Cloud computing has become the leading paradigm for deploying large-scale infrastructures and running big data applications, due to its capacity of achieving economies of scale. In this work, we focus on one of the most prominent advantages of cloud computing, namely the on-demand resource provisioning, which is commonly referred to as elasticity. Although a lot of effort has been invested in deve… ▽ More

    Submitted 19 May, 2014; originally announced May 2014.

    Comments: 14 pages

  9. arXiv:1404.0696  [pdf

    cs.DB

    D-P2P-Sim+:A Novel Distributed Framework for P2P Protocols Performance Testing

    Authors: S. Sioutas, E. Sakkopoulos, A. Panaretos, D. Tsoumakos, P. Gerolymatos, G. Tzimas, Y. Manolopoulos

    Abstract: In recent IoT (Internet of Things) and Web 2.0 technologies, a critical problem arises with respect to storing and processing the large amount of collected data. In this paper we develop and evaluate distributed infrastructures for storing and processing large amount of such data. We present a distributed framework that supports customized deployment of a variety of indexing engines over million-n… ▽ More

    Submitted 2 April, 2014; originally announced April 2014.

    Comments: 51 pages, 37 figures, submitted to JSS (Elsevier)

    ACM Class: H.2.4

  10. arXiv:1402.7063  [pdf, ps, other

    cs.DB

    Rapid AkNN Query Processing for Fast Classification of Multidimensional Data in the Cloud

    Authors: Nikolaos Nodarakis, Spyros Sioutas, Dimitrios Tsoumakos, Giannis Tzimas, Evaggelia Pitoura

    Abstract: A $k$-nearest neighbor ($k$NN) query determines the $k$ nearest points, using distance metrics, from a specific location. An all $k$-nearest neighbor (A$k$NN) query constitutes a variation of a $k$NN query and retrieves the $k$ nearest points for each point inside a database. Their main usage resonates in spatial databases and they consist the backbone of many location-based applications and not o… ▽ More

    Submitted 27 February, 2014; originally announced February 2014.

    Comments: 12 pages, 14 figures, 4 tables (it will be submitted to DEXA 2014)

    ACM Class: H.2.4

  11. arXiv:1209.5430  [pdf, ps, other

    cs.DC cs.DB

    SART: Speeding up Query Processing in Sensor Networks with an Autonomous Range Tree Structure

    Authors: Spyros Sioutas, Alexandros Panaretos, Ioannis Karydis, Dimitrios Tsoumakos, Giannis Tzimas, Dimitrios Tsolis

    Abstract: We consider the problem of constructing efficient P2P overlays for sensornets providing "Energy-Level Application and Services". The method presented in \cite{SOPXM09} presents a novel P2P overlay for Energy Level discovery in a sensornet. However, this solution is not dynamic, since requires periodical restructuring. In particular, it is not able to support neither join of sensor\_nodes with ener… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

    Comments: 11 pages, 23 figures, 5 algorithms or operations

    ACM Class: H.2

    Journal ref: ACM Applied Computing Review (ACR), Vol. 12, No.3, 2012, pp.60-74

  12. arXiv:1201.2766  [pdf, ps, other

    cs.DB

    ART : Sub-Logarithmic Decentralized Range Query Processing with Probabilistic Guarantees

    Authors: Spyros Sioutas, Peter Triantafillou, George Papaloukopoulos, Evangelos Sakkopoulos, Kostas Tsichlas, Yannis Manolopoulos

    Abstract: We focus on range query processing on large-scale, typically distributed infrastructures, such as clouds of thousands of nodes of shared-datacenters, of p2p distributed overlays, etc. In such distributed environments, efficient range query processing is the key for managing the distributed data sets per se, and for monitoring the infrastructure's resources. We wish to develop an architecture that… ▽ More

    Submitted 13 January, 2012; originally announced January 2012.

    Comments: Submitted to Distributed and Parallel Databases (DAPD) Journal, Springer

  13. arXiv:1201.2702  [pdf, ps, other

    cs.DS

    Dynamic 3-sided Planar Range Queries with Expected Doubly Logarithmic Time

    Authors: Gerth Stølting Brodal, Alexis C. Kaporis, Apostolos N. Papadopoulos, Spyros Sioutas, Konstantinos Tsakalidis, Kostas Tsichlas

    Abstract: This work studies the problem of 2-dimensional searching for the 3-sided range query of the form $[a, b]\times (-\infty, c]$ in both main and external memory, by considering a variety of input distributions. We present three sets of solutions each of which examines the 3-sided problem in both RAM and I/O model respectively. The presented data structures are deterministic and the expectation is wit… ▽ More

    Submitted 12 January, 2012; originally announced January 2012.

  14. arXiv:1009.3134  [pdf, ps, other

    cs.DC cs.DS

    D$^2$-Tree: A New Overlay with Deterministic Bounds

    Authors: G. S. Brodal, S. Sioutas, K. Tsichlas, C. Zaroliagis

    Abstract: We present a new overlay, called the {\em Deterministic Decentralized tree} ($D^2$-tree). The $D^2$-tree compares favourably to other overlays for the following reasons: (a) it provides matching and better complexities, which are deterministic for the supported operations; (b) the management of nodes (peers) and elements are completely decoupled from each other; and (c) an efficient deterministic… ▽ More

    Submitted 8 March, 2012; v1 submitted 16 September, 2010; originally announced September 2010.

  15. arXiv:0810.3058  [pdf, other

    cs.DS cs.CR

    Watermarking Digital Images Based on a Content Based Image Retrieval Technique

    Authors: Dimitrios K. Tsolis, Spyros Sioutas, Theodore S. Papatheodorou

    Abstract: The current work is focusing on the implementation of a robust watermarking algorithm for digital images, which is based on an innovative spread spectrum analysis algorithm for watermark embedding and on a content-based image retrieval technique for watermark detection. The highly robust watermark algorithms are applying "detectable watermarks" for which a detection mechanism checks if the water… ▽ More

    Submitted 17 October, 2008; originally announced October 2008.

    Comments: 18 pages, 4 figures, 4 tables, submitted to Multimedia Tools and Applications Journal, Springer

    ACM Class: C.3; F.2.2

  16. arXiv:0805.4134  [pdf

    cs.NI cs.DB cs.DC

    Design and Implementation Aspects of a novel Java P2P Simulator with GUI

    Authors: V. Chrissikopoulos, G. Papaloukopoulos, E. Sakkopoulos, S. Sioutas

    Abstract: Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practically impossible, especially at design and testing stages. The purpose of this paper is to describe the implementation aspects of a new Java based P2P simulator that has been developed to support scalability in the evaluat… ▽ More

    Submitted 27 May, 2008; originally announced May 2008.

    Comments: 8 Pages, 7 figures, This article was accepted for presentation in the IEEE Panhellenic Conference in Informatics (PCI 2008), http://www.aegean.gr/PCI2008

    ACM Class: D.2; H.2; E.1

  17. arXiv:0805.2681  [pdf, ps, other

    cs.CG cs.DS

    Canonical polygon Queries on the plane: a New Approach

    Authors: Spyros Sioutas, Dimitrios Sofotassios, Kostas Tsichlas, Dimitrios Sotiropoulos, Panayiotis Vlamos

    Abstract: The polygon retrieval problem on points is the problem of preprocessing a set of $n$ points on the plane, so that given a polygon query, the subset of points lying inside it can be reported efficiently. It is of great interest in areas such as Computer Graphics, CAD applications, Spatial Databases and GIS developing tasks. In this paper we study the problem of canonical $k$-vertex polygon quer… ▽ More

    Submitted 30 July, 2009; v1 submitted 17 May, 2008; originally announced May 2008.

    Comments: 7 pages, 9 figures, Accepted for publication in Journal of Computers (JCP), http://www.informatik.uni-trier.de/~ley/db/journals/jcp/index.html

    ACM Class: E.1; E.5

  18. arXiv:0805.2671  [pdf, ps, other

    cs.DS cs.DB

    Finger Indexed Sets: New Approaches

    Authors: Spyros Sioutas

    Abstract: In the particular case we have insertions/deletions at the tail of a given set S of $n$ one-dimensional elements, we present a simpler and more concrete algorithm than that presented in [Anderson, 2007] achieving the same (but also amortized) upper bound of $O(\sqrt{logd/loglogd})$ for finger searching queries, where $d$ is the number of sorted keys between the finger element and the target elem… ▽ More

    Submitted 17 May, 2008; originally announced May 2008.

    Comments: 13 pages, 1 figure, Submitted to Journal of Universal Computer Science (J.UCS)

    ACM Class: E.1; E.5