Match!
George E. Violettas
University of Macedonia
12Publications
3H-index
17Citations
Publications 12
Newest
IoT has evolved from an experimental to a backbone technology able to connect myriads of people, things, and services for a large range of businesses. At the same time, the emergence of SDN can ideally handle IoT challenges for elasticity, heterogeneity, and mobility, offering an architecture that abstracts decision making away from the data plane and providing a programmable network facility. Along these lines, we propose MINOS, a multi-protocol SDN platform for IoT that implements service awar...
Source
#2Sophia G. PetridouH-Index: 10
Last.Lefteris MamatasH-Index: 14
view all 3 authors...
The Routing over Low Power and Lossy Networks (RPL) protocol is an important standardized routing solution for the Internet of Things (IoT), characterized by significant benefits, including IPv6 support and efficient low-power operation over noisy channels, especially for many-to-one communication scenarios (i.e., a set of deployed devices gathering periodic measurements destined to a single sink node). However, the RPL faces performance issues in networks with mobility or point-to-point communi...
Source
Dec 1, 2018 in GLOBECOM (Global Communications Conference)
#1George E. Violettas (UoM: University of Macedonia)H-Index: 3
#2Sophia G. Petridou (UoM: University of Macedonia)H-Index: 10
Last.Lefteris Mamatas (UoM: University of Macedonia)H-Index: 14
view all 3 authors...
Being part of the Internet of Things (IoT), the Wireless Sensor Networks (WSNs) inherit characteristics such as large-scale deployment, dynamicity, heterogeneity and mobility. These aspects mandate elasticity in many network functions and especially in routing. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the state-of-the-art routing protocol for resource-constrained devices in environments with signal issues, but it was not designed to support mobility. However, mobility ...
Source
#1Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
#2George E. Violettas (UoM: University of Macedonia)H-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 4 authors...
May 1, 2017 in INFOCOM WKSHPS (Conference on Computer Communications Workshops)
#1George E. Violettas (UoM: University of Macedonia)H-Index: 3
#2Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
Last.Lefteris Mamatas (UoM: University of Macedonia)H-Index: 14
view all 5 authors...
We present a showcase of our SDN-inspired facility for the Internet of Things (IoT) — the CORAL (Cross-Layer Control of Data Flows) infrastructure. CORAL provides a hierarchy of network controllers that monitor network behaviour and adapts network protocol parameters on demand. It is built on top of rich network control abstractions and is hardware-independent. Our facility offloads protocol functionality to the controllers, enabling intelligent IoT protocol adaptations. To demonstrate our solut...
4 CitationsSource
#1Alexander Chatzigeorgiou (UoM: University of Macedonia)H-Index: 24
#2Tryfon TheodorouH-Index: 3
Last.Stelios Xinogalos (UoM: University of Macedonia)H-Index: 10
view all 4 authors...
The tremendous popularity of mobile computing and Android in particular has attracted millions of developers who see opportunities for building their own start-ups. As a consequence Computer Science students express an increasing interest into the related technology of Java development for Android applications. Android projects are complex by nature and relatively large software products while their development calls for the application of established software engineering practices and tools. Ho...
Source
#2Kyriakos Papadopoulos (Alexander Technological Educational Institute of Thessaloniki)H-Index: 1
This paper describes the password habits of web users, particularly in Greece. A study was conducted online to ask users questions about the length of the password they use today, in how many web sites they use the same password, whether they use personal data while constructing their passwords and if they ever used as a password some of trivial words. They were also asked whether they reveal their password(s) to friends and/or family and if they ever realized that their password was exposed or ...
1 CitationsSource
#2Tryfon TheodorouH-Index: 3
Last.George Stephanides (UoM: University of Macedonia)H-Index: 16
view all 3 authors...
This paper intends to shed light on the security problems faced by e-learning software, which, until now has not been systematically tested for vulnerabilities and weaknesses. These result to web programs exposed to attacks that are fairly easy to implement. Additionally, e-learning software deals with intelligent, studious individuals, The intended audience for the product has the knowledge, or is potentially being taught the knowledge, to compromise the software. The problem is that in a situa...
3 CitationsSource
#1Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
#2George E. Violettas (UoM: University of Macedonia)H-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 3 authors...
Source
Aug 1, 2009 in ICWMC (International Conference on Wireless and Mobile Communications)
#1George E. Violettas (UoM: University of Macedonia)H-Index: 3
#2Tryfon Theodorou (UoM: University of Macedonia)H-Index: 3
Last.Christos K. Georgiadis (UoM: University of Macedonia)H-Index: 10
view all 3 authors...
The paper describes the necessary fields investigated for creating an application that is able to monitor any kind of network, wired or wireless, with all its possible aspects. In the same application, we also implemented original algorithms for finding the position of a moving station, utilizing the signal level of the wireless protocols 802.11 devices (Wi-Fi). Field research and exhausting sampling was done, in order to resolve the various practical problems faced, according to the signal leve...
8 CitationsSource
12