Match!
Tryfon Theodorou
University of Macedonia
11Publications
3H-index
23Citations
Publications 11
Newest
IoT has evolved from an experimental to a backbone technology able to connect myriads of people, things, and services for a large range of businesses. At the same time, the emergence of SDN can ideally handle IoT challenges for elasticity, heterogeneity, and mobility, offering an architecture that abstracts decision making away from the data plane and providing a programmable network facility. Along these lines, we propose MINOS, a multi-protocol SDN platform for IoT that implements service awar...
Source
#1Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
#2George E. Violettas (UoM: University of Macedonia)H-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 4 authors...
#1Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
#2Lefteris Mamatas (UoM: University of Macedonia)H-Index: 14
Topology control is a crucial process for an efficient operation of a Wireless Sensor Network (WSN). The usage of WSNs in the Internet of Things (IoT) emerges new research challenges and novel applications. Recent WSNs proposals enhanced with Software Defined Networking (SDN) practices introduce new innovative network control strategies and protocols based on central control logic. This paper introduces two novel topology control techniques for Software Defined WSNs that can be combined and adap...
3 CitationsSource
#1Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
#2Lefteris Mamatas (UoM: University of Macedonia)H-Index: 14
Recent proposals enhances Wireless Sensor Networks (WSNs) with Software Defined Networking (SDN) practices, introducing new innovative network control strategies and protocols based on a central control logic, i.e., enabling WSNs as crucial facilities for the Internet of Things (IoT). In this direction, we demonstrate CORAL-SDN, an SDN solution for WSNs which: (i) uses intelligent centralized control mechanisms to adjust dynamically the protocol functionalities; (ii) supports elasticity to the c...
4 CitationsSource
May 1, 2017 in INFOCOM WKSHPS (Conference on Computer Communications Workshops)
#1George E. Violettas (UoM: University of Macedonia)H-Index: 3
#2Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
Last.Lefteris Mamatas (UoM: University of Macedonia)H-Index: 14
view all 5 authors...
We present a showcase of our SDN-inspired facility for the Internet of Things (IoT) — the CORAL (Cross-Layer Control of Data Flows) infrastructure. CORAL provides a hierarchy of network controllers that monitor network behaviour and adapts network protocol parameters on demand. It is built on top of rich network control abstractions and is hardware-independent. Our facility offloads protocol functionality to the controllers, enabling intelligent IoT protocol adaptations. To demonstrate our solut...
4 CitationsSource
#1Alexander Chatzigeorgiou (UoM: University of Macedonia)H-Index: 24
#2Tryfon TheodorouH-Index: 3
Last.Stelios Xinogalos (UoM: University of Macedonia)H-Index: 10
view all 4 authors...
The tremendous popularity of mobile computing and Android in particular has attracted millions of developers who see opportunities for building their own start-ups. As a consequence Computer Science students express an increasing interest into the related technology of Java development for Android applications. Android projects are complex by nature and relatively large software products while their development calls for the application of established software engineering practices and tools. Ho...
Source
#2Tryfon TheodorouH-Index: 3
Last.George Stephanides (UoM: University of Macedonia)H-Index: 16
view all 3 authors...
This paper intends to shed light on the security problems faced by e-learning software, which, until now has not been systematically tested for vulnerabilities and weaknesses. These result to web programs exposed to attacks that are fairly easy to implement. Additionally, e-learning software deals with intelligent, studious individuals, The intended audience for the product has the knowledge, or is potentially being taught the knowledge, to compromise the software. The problem is that in a situa...
3 CitationsSource
#1Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
#2George E. Violettas (UoM: University of Macedonia)H-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 3 authors...
Source
Aug 1, 2009 in ICWMC (International Conference on Wireless and Mobile Communications)
#1George E. Violettas (UoM: University of Macedonia)H-Index: 3
#2Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 3 authors...
The paper describes the necessary fields investigated for creating an application that is able to monitor any kind of network, wired or wireless, with all its possible aspects. In the same application, we also implemented original algorithms for finding the position of a moving station, utilizing the signal level of the wireless protocols 802.11 devices (Wi-Fi). Field research and exhausting sampling was done, in order to resolve the various practical problems faced, according to the signal leve...
8 CitationsSource
#1Tryfon TheodorouH-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 3 authors...
ABSTRACT E-Voting is an election system that allows a voter to record his or her secure and secret ballot electronically. We can also define as e-voting the process of evaluating an article or ranking a translation of a specific scientific term in a relevant web site. This all process of participation and interaction is one of the Web 2.0 definitions, the collaborative knowledge. An electronic (on-line) dictionary in order to succeed has to consider this factor. It has to be interactive and it h...
1 Citations
12