Πλοήγηση ανά Συγγραφέα "Kikiras, P."
-
Cyber-Typhon: An Online Multi-task Anomaly Detection Framework
Demertzis, K.; Iliadis, L.; Kikiras, P.; Tziritas, N. (2019)According to the Greek mythology, Typhon was a gigantic monster with one hundred dragon heads, bigger than all mountains. His open hands were extending from East to West, his head could reach the sky and flames were coming ... -
A framework for secure data delivery in wireless sensor networks
Perlepes, L.; Zaharis, A.; Stamoulis, G.; Kikiras, P. (2012)Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could ... -
i-Protect: An open source emergency management framework
Nef, M. A.; Filippopoulos, I.; Voumvourakis, E.; Aggelis, A.; Perlepes, L.; Stamoulis, G.; Kikiras, P. (2011)Emergency management is an essential capability in modern society. As disasters can happen at any time and can differ from each other considerably, it is necessary to develop a supple framework which can comply with each ... -
Intelligent Parking Management System Based on Wireless Sensor Network Technology
Larisis, N.; Perlepes, L.; Stamoulis, G.; Kikiras, P. (2013)Wireless Sensor Networks can be considered as one of the most challenging and emerging technologies empowering the provision of enhanced services to miscellaneous application domains. The objective of this paper is to ... -
Managing forest fires with i-protect fire simulation module
Filippopoulos, I.; Stamoulis, G.; Kikiras, P. (2012)Emergency management is an essential capability in modern society. As disasters can happen at any time and can differ from each other considerably, it is necessary to develop a supple framework which can comply with each ... -
Post-processing in wireless sensor networks: Benchmarking sensor trace files
Bor, M. C.; Chatzigiannakis, I.; Dulman, S. O.; Kikiras, P.; Theodoridis, E.; Visser, O. W. (2010)Wireless sensor network research usually focuses on the reliable and efficient collection of data. Here, we address the next step in the traces lifetime: we aim at investigating and evaluating, by qualitative and quantitative ... -
User authentication method and implementation using a three-axis accelerometer
Zaharis, A.; Martini, A.; Kikiras, P.; Stamoulis, G. (2010)The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis ... -
User modeling for pedestrian navigation services
Kikiras, P.; Tsetsos, V.; Papataxiarhis, V.; Katsikas, T.; Hadjiefthymiades, S. (2009)Human-centered and user-adaptive systems are at the heart of the Design for All and Ambient Intelligence concepts. Evidently, user models are necessary "ingredients" of such systems. We present a user model for navigation ...