Now showing items 1-11 of 11

  • Enabling wireless LAN troubleshooting 

    Syrigos, I.; Keranidis, S.; Korakis, T.; Dovrolis, C. (2015)
    Particular WLAN pathologies experienced in realistic scenarios are hard to detect, due to the complex nature of the wireless medium. Prior work has employed sophisticated equipment, driver modifications, or even application-layer ...
  • Experimental evaluation of strut-and-tie model of indeterminate deep beam 

    Garber, D. B.; Gallardo, J. M.; Huaco, G. D.; Samaras, V. A.; Breen, J. E. (2014)
    An experimental study was performed to determine the accuracy of designing a statically indeterminate deep beam with three openings using the strut-and-tie modeling method in accordance with Appendix A of ACI 318-08. In ...
  • Fake injection strategies for private phonetic matching 

    Karakasidis, A.; Verykios, V. S.; Christen, P. (2012)
    In many aspects of everyday life, from education to health care and from economics to homeland security, information exchange involving companies or government agencies has become a common application. Locating the same ...
  • Initial results on SiPM array based on a symmetric resistive voltage division readout 

    David, S.; Georgiou, M.; Fysikopoulos, E.; Efthimiou, N.; Paipais, T.; Kefalidis, L.; Loudos, G. (2012)
    The aim of this study is to design and apply a symmetric resistive voltage division matrix to read out the compact silicon photomultiplier array (SPMArray2 by SensL) photodetector for possible applications as gamma or PET ...
  • Massively parallel programming models used as hardware description languages: The OpenCL case 

    Owaida, M.; Bellas, N.; Antonopoulos, C. D.; Daloukas, K.; Antoniadis, C. (2011)
    The problem of automatically generating hardware modules from high level application representations has been at the forefront of EDA research during the last few years. In this paper, we introduce a methodology to ...
  • Methodology and tools for measurements on wireless testbeds: The NITOS approach 

    Giatsios, D.; Apostolaras, A.; Korakis, T.; Tassiulas, L. (2013)
    Since its establishment in 2009, the Network Implementation Testbed using Open Source drivers (NITOS) wireless testbed has been extensively used in several research projects for the experimental evaluation of protocols and ...
  • On emulating hardware/software co-designed control algorithms for packet switches 

    Syrivelis, D.; Giaccone, P.; Koutsopoulos, I.; Pretti, M.; Tassiulas, L. (2014)
    Hardware accelerators in networking systems for control algorithms offer a promising approach to scale performance. To that end, several research efforts have been devoted to verify a hardware version of complex control ...
  • A programming model and runtime system for significance-aware energy-efficient computing 

    Vassiliadis, V.; Parasyris, K.; Chalios, C.; Antonopoulos, C. D.; Lalis, S.; Bellas, N.; Vandierendonck, H.; Nikolopoulos, D. S. (2015)
    We introduce a task-based programming model and runtime system that exploit the observation that not all parts of a program are equally significant for the accuracy of the end-result, in order to trade off the quality of ...
  • Query sensitive storage for wireless sensor networks 

    Papadimitriou, A.; Katsaros, D.; Manolopoulos, Y. (2009)
    Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS), Data-Centric Storage (DCS) and more recently ...
  • Reconstruction-based classification rule hiding through controlled data modification 

    Katsarou, A.; Aris, G. D.; Verykios, V. S. (2009)
    In this paper, we propose a reconstruction-based approach to classification rule hiding in categorical datasets. The proposed methodology modifies transactions supporting both sensitive and nonsensitive classification rules ...
  • RuleMR: Classification rule discovery with MapReduce 

    Kolias, V.; Kolias, C.; Anagnostopoulos, I.; Kayafas, E. (2014)
    The vast amounts of data generated, exchanged and consumed on a daily basis by contemporary networks and devices renders their analysis a cumbersome procedure with inherent difficulties. On the one hand, the need for ...