Skip to main content

Showing 1–46 of 46 results for author: Nikolopoulos, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06154  [pdf, other

    cs.CY cs.DC

    Towards a real-time distributed feedback system for the transportation assistance of PwD

    Authors: Iosif Polenakis, Vasileios Vouronikos, Maria Chroni, Stavros D. Nikolopoulos

    Abstract: In this work we propose the design principles of an integrated distributed system for the augment of the transportation for people with disabilities inside the road network of a city area utilizing the IT technologies. We propose the basis of our system upon the utilization of a distributed sensor network that will be incorporated by a real-time integrated feedback system. The main components of t… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: 7 pages, 6 figures

  2. arXiv:2307.01210  [pdf

    q-bio.OT cs.AI cs.CY

    AI and Non AI Assessments for Dementia

    Authors: Mahboobeh Parsapoor, Hamed Ghodrati, Vincenzo Dentamaro, Christopher R. Madan, Ioulietta Lazarou, Spiros Nikolopoulos, Ioannis Kompatsiaris

    Abstract: Current progress in the artificial intelligence domain has led to the development of various types of AI-powered dementia assessments, which can be employed to identify patients at the early stage of dementia. It can revolutionize the dementia care settings. It is essential that the medical community be aware of various AI assessments and choose them considering their degrees of validity, efficien… ▽ More

    Submitted 29 June, 2023; originally announced July 2023.

    Comments: 49 pages

  3. arXiv:2302.00657  [pdf, ps, other

    cs.DS

    Adding a Tail in Classes of Perfect Graphs

    Authors: Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios

    Abstract: Consider a graph $G$ which belongs to a graph class ${\cal C}$. We are interested in connecting a node $w \not\in V(G)$ to $G$ by a single edge $u w$ where $u \in V(G)$; we call such an edge a \emph{tail}. As the graph resulting from $G$ after the addition of the tail, denoted $G+uw$, need not belong to the class ${\cal C}$, we want to compute a minimum ${\cal C}$-completion of $G+w$, i.e., the mi… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  4. arXiv:2302.00112  [pdf, ps, other

    cs.DS

    Adding an Edge in a $P_4$-sparse Graph

    Authors: Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios

    Abstract: The minimum completion (fill-in) problem is defined as follows: Given a graph family $\mathcal{F}$ (more generally, a property $Π$) and a graph $G$, the completion problem asks for the minimum number of non-edges needed to be added to $G$ so that the resulting graph belongs to the graph family $\mathcal{F}$ (or has property $Π$). This problem is NP-complete for many subclasses of perfect graphs an… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

  5. arXiv:2212.07187  [pdf, other

    cs.CV

    Design-time Fashion Popularity Forecasting in VR Environments

    Authors: Stefanos-Iordanis Papadopoulos, Christos Koutlis, Anastasios Papazoglou-Chalikias, Symeon Papadopoulos, Spiros Nikolopoulos

    Abstract: Being able to forecast the popularity of new garment designs is very important in an industry as fast paced as fashion, both in terms of profitability and reducing the problem of unsold inventory. Here, we attempt to address this task in order to provide informative forecasts to fashion designers within a virtual reality designer application that will allow them to fine tune their creations based… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  6. arXiv:2207.02543  [pdf, other

    math.NA cs.AI cs.LG

    AI-enhanced iterative solvers for accelerating the solution of large scale parametrized systems

    Authors: Stefanos Nikolopoulos, Ioannis Kalogeris, Vissarion Papadopoulos, George Stavroulakis

    Abstract: Recent advances in the field of machine learning open a new era in high performance computing. Applications of machine learning algorithms for the development of accurate and cost-efficient surrogates of complex problems have already attracted major attention from scientists. Despite their powerful approximation capabilities, however, surrogates cannot produce the `exact' solution to the problem.… ▽ More

    Submitted 24 August, 2022; v1 submitted 6 July, 2022; originally announced July 2022.

  7. arXiv:2111.05802  [pdf, other

    physics.soc-ph cs.CY

    A Stochastic Graph-based Model for the Simulation of SARS-CoV-2 Transmission

    Authors: Christos Chondros, Stavros D. Nikolopoulos, Iosif Polenakis

    Abstract: In this work we propose the design principles of a stochastic graph-based model for the simulation of SARS-CoV-2 transmission. The proposed approach incorporates three sub-models, namely, the spatial model, the mobility model, and the propagation model, in order to develop a realistic environment for the study of the properties exhibited by the spread of SARS-CoV-2. The spatial model converts imag… ▽ More

    Submitted 10 November, 2021; originally announced November 2021.

    Comments: 10 Pages, 7 Figures, 2 Tables

  8. arXiv:2106.14567  [pdf, other

    cs.CY

    SARiSsa -- A Mobile Application for the Proactive Control of SARS-CoV-2 Spread

    Authors: Christos Chondros, Christos Georgiou-Mousses, Stavros D. Nikolopoulos, Iosif Polenakis, Vasileios Vouronikos

    Abstract: In this work we propose the design principles behind the development of a smart application utilized by mobile devices in order to control the spread of SARS-CoV-2 coronavirus disease that caused the COVID-19 pandemic. Through the deployment of this application utilizing their Bluetooth enabled devices, individuals may keep track of their close contacts, and if nearby contacts using the same appli… ▽ More

    Submitted 29 June, 2021; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: 9 pages,4 figures

  9. arXiv:2101.05555  [pdf, other

    math.NA cs.AI cs.LG

    Non-intrusive Surrogate Modeling for Parametrized Time-dependent PDEs using Convolutional Autoencoders

    Authors: Stefanos Nikolopoulos, Ioannis Kalogeris, Vissarion Papadopoulos

    Abstract: This work presents a non-intrusive surrogate modeling scheme based on machine learning technology for predictive modeling of complex systems, described by parametrized time-dependent PDEs. For these problems, typical finite element approaches involve the spatiotemporal discretization of the PDE and the solution of the corresponding linear system of equations at each time step. Instead, the propose… ▽ More

    Submitted 23 April, 2021; v1 submitted 14 January, 2021; originally announced January 2021.

  10. arXiv:2003.12448  [pdf, other

    cs.DC cs.AR

    Workload-Aware DRAM Error Prediction using Machine Learning

    Authors: Lev Mukhanov, Konstantinos Tovletoglou, Hans Vandierendonck, Dimitrios S. Nikolopoulos, Georgios Karakonstantis

    Abstract: The aggressive scaling of technology may have helped to meet the growing demand for higher memory capacity and density, but has also made DRAM cells more prone to errors. Such a reality triggered a lot of interest in modeling DRAM behavior for either predicting the errors in advance or for adjusting DRAM circuit parameters to achieve a better trade-off between energy efficiency and reliability. Ex… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    ACM Class: B.3.4

    Journal ref: In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC), Orlando, Florida, USA, 2019

  11. arXiv:2003.08305  [pdf, other

    cs.DC

    Cross Architectural Power Modelling

    Authors: Kai Chen, Peter Kilpatrick, Dimitrios S. Nikolopoulos, Blesson Varghese

    Abstract: Existing power modelling research focuses on the model rather than the process for develo** models. An automated power modelling process that can be deployed on different processors for develo** power models with high accuracy is developed. For this, (i) an automated hardware performance counter selection method that selects counters best correlated to power on both ARM and Intel processors, (… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    Comments: 10 pages; IEEE/ACM CCGrid 2020. arXiv admin note: text overlap with arXiv:1710.10325

  12. arXiv:1905.03184  [pdf, other

    cs.DC

    Implementing Efficient Message Logging Protocols as MPI Application Extensions

    Authors: Kiril Dichev, Dimitrios S. Nikolopoulos

    Abstract: Message logging protocols are enablers of local rollback, a more efficient alternative to global rollback, for fault tolerant MPI applications. Until now, message logging MPI implementations have incurred the overheads of a redesign and redeployment of an MPI library, as well as continued performance penalties across various kernels. Successful research efforts for message logging implementations… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

  13. arXiv:1812.11080  [pdf, ps, other

    cs.DM cs.CR

    Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks

    Authors: Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios

    Abstract: In the domain of software watermarking, we have proposed several graph theoretic watermarking codec systems for encoding watermark numbers $w$ as reducible permutation flow-graphs $F[π^*]$ through the use of self-inverting permutations $π^*$. Following up on our proposed methods, we theoretically study the oldest one, which we call W-RPG, in order to investigate and prove its resilience to edge-mo… ▽ More

    Submitted 28 December, 2018; originally announced December 2018.

    Comments: 17 pages, 1 figure

    ACM Class: G.2.1; G.2.2; G.2.3

  14. arXiv:1812.10748  [pdf, ps, other

    cs.CR

    Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations

    Authors: Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis

    Abstract: In this work we propose a graph-based model that, utilizing relations between groups of System-calls, distinguishes malicious from benign software samples and classifies the detected malicious samples to one of a set of known malware families. More precisely, given a System-call Dependency Graph (ScDG) that depicts the malware's behavior, we first transform it to a more abstract representation, ut… ▽ More

    Submitted 27 December, 2018; originally announced December 2018.

    Comments: 23 pages, 15 figures, 1 table

    ACM Class: D.4.6; D.4.8; K.6.5

  15. arXiv:1811.04481  [pdf, other

    cs.DC

    RADS: Real-time Anomaly Detection System for Cloud Data Centres

    Authors: Sakil Barbhuiya, Zafeirios Papazachos, Peter Kilpatrick, Dimitrios S. Nikolopoulos

    Abstract: Cybersecurity attacks in Cloud data centres are increasing alongside the growth of the Cloud services market. Existing research proposes a number of anomaly detection systems for detecting such attacks. However, these systems encounter a number of challenges, specifically due to the unknown behaviour of the attacks and the occurrence of genuine Cloud workload spikes, which must be distinguished fr… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

    Comments: 14 pages

  16. arXiv:1810.04608  [pdf, other

    cs.DC eess.SY

    DYVERSE: DYnamic VERtical Scaling in Multi-tenant Edge Environments

    Authors: Nan Wang, Michail Matthaiou, Dimitrios S. Nikolopoulos, Blesson Varghese

    Abstract: Multi-tenancy in resource-constrained environments is a key challenge in Edge computing. In this paper, we develop 'DYVERSE: DYnamic VERtical Scaling in Edge' environments, which is the first light-weight and dynamic vertical scaling mechanism for managing resources allocated to applications for facilitating multi-tenancy in Edge environments. To enable dynamic vertical scaling, one static and thr… ▽ More

    Submitted 21 February, 2020; v1 submitted 19 September, 2018; originally announced October 2018.

  17. arXiv:1806.06576  [pdf, other

    cs.DC

    VEBO: A Vertex- and Edge-Balanced Ordering Heuristic to Load Balance Parallel Graph Processing

    Authors: Jiawen Sun, Hans Vandierendonck, Dimitrios S. Nikolopoulos

    Abstract: Graph partitioning drives graph processing in distributed, disk-based and NUMA-aware systems. A commonly used partitioning goal is to balance the number of edges per partition in conjunction with minimizing the edge or vertex cut. While this type of partitioning is computationally expensive, we observe that such topology-driven partitioning nonetheless results in computational load imbalance. We p… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

    Comments: 13 pages

  18. arXiv:1712.08482  [pdf, ps, other

    cs.DS

    Encoding Watermark Numbers as Reducible Permutation Graphs using Self-inverting Permutations

    Authors: Maria Chroni, Stavros D. Nikolopoulos, Leonidas Palios

    Abstract: Several graph theoretic watermark methods have been proposed to encode numbers as graph structures in software watermarking environments. In this paper, we propose an efficient and easily implementable codec system for encoding watermark numbers as reducible permutation flow-graphs and, thus, we extend the class of graphs used in such a watermarking environment. More precisely, we present an algor… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

    Comments: 27 pages, 6 figures. arXiv admin note: text overlap with arXiv:1110.1194

    ACM Class: G.2.2; G.2.3; F.2.2

  19. arXiv:1712.04495  [pdf, other

    cs.DC

    Intra-node Memory Safe GPU Co-Scheduling

    Authors: Carlos Reano, Federico Silla, Dimitrios S. Nikolopoulos, Blesson Varghese

    Abstract: GPUs in High-Performance Computing systems remain under-utilised due to the unavailability of schedulers that can safely schedule multiple applications to share the same GPU. The research reported in this paper is motivated to improve the utilisation of GPUs by proposing a framework, we refer to as schedGPU, to facilitate intra-node GPU co-scheduling such that a GPU can be safely shared among mult… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Comments: Accepted on 12 Dec 2017, IEEE Transactions on Parallel and Distributed Systems

  20. arXiv:1710.10325  [pdf, ps, other

    cs.PF

    Power Modelling for Heterogeneous Cloud-Edge Data Centers

    Authors: Kai Chen, Blesson Varghese, Peter Kilpatrick, Dimitrios S. Nikolopoulos

    Abstract: Existing power modelling research focuses not on the method used for develo** models but rather on the model itself. This paper aims to develop a method for deploying power models on emerging processors that will be used, for example, in cloud-edge data centers. Our research first develops a hardware counter selection method that appropriately selects counters most correlated to power on ARM and… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

    Comments: 10 pages,10 figures,conference

  21. arXiv:1710.10090  [pdf, other

    cs.DC

    Edge-as-a-Service: Towards Distributed Cloud Architectures

    Authors: Blesson Varghese, Nan Wang, Jianyu Li, Dimitrios S. Nikolopoulos

    Abstract: We present an Edge-as-a-Service (EaaS) platform for realising distributed cloud architectures and integrating the edge of the network in the computing ecosystem. The EaaS platform is underpinned by (i) a lightweight discovery protocol that identifies edge nodes and make them publicly accessible in a computing environment, and (ii) a scalable resource provisioning mechanism for offloading workloads… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

    Comments: 10 pages; presented at the EdgeComp Symposium 2017; will appear in Proceedings of the International Conference on Parallel Computing, 2017

  22. arXiv:1709.04061  [pdf, other

    cs.DC

    ENORM: A Framework For Edge NOde Resource Management

    Authors: Nan Wang, Blesson Varghese, Michail Matthaiou, Dimitrios S. Nikolopoulos

    Abstract: Current computing techniques using the cloud as a centralised server will become untenable as billions of devices get connected to the Internet. This raises the need for fog computing, which leverages computing at the edge of the network on nodes, such as routers, base stations and switches, along with the cloud. However, to realise fog computing the challenge of managing edge nodes will need to b… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

    Comments: 14 pages; accepted to IEEE Transactions on Services Computing on 12 September 2017

  23. arXiv:1705.10208  [pdf, ps, other

    cs.DC

    Dependency-Aware Rollback and Checkpoint-Restart for Distributed Task-Based Runtimes

    Authors: Kiril Dichev, Herbert Jordan, Konstantinos Tovletoglou, Thomas Heller, Dimitrios S. Nikolopoulos, Georgios Karakonstantis, Charles Gillan

    Abstract: With the increase in compute nodes in large compute platforms, a proportional increase in node failures will follow. Many application-based checkpoint/restart (C/R) techniques have been proposed for MPI applications to target the reduced mean time between failures. However, rollback as part of the recovery remains a dominant cost even in highly optimised MPI applications employing C/R techniques.… ▽ More

    Submitted 29 May, 2017; originally announced May 2017.

  24. arXiv:1701.05451  [pdf, other

    cs.DC

    Feasibility of Fog Computing

    Authors: Blesson Varghese, Nan Wang, Dimitrios S. Nikolopoulos, Rajkumar Buyya

    Abstract: As billions of devices get connected to the Internet, it will not be sustainable to use the cloud as a centralised server. The way forward is to decentralise computations away from the cloud towards the edge of the network closer to the user. This reduces the latency of communication between a user device and the cloud, and is the premise of 'fog computing' defined in this paper. The aim of this p… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: 8 pages

  25. arXiv:1609.01967  [pdf, other

    cs.DC

    Challenges and Opportunities in Edge Computing

    Authors: Blesson Varghese, Nan Wang, Sakil Barbhuiya, Peter Kilpatrick, Dimitrios S. Nikolopoulos

    Abstract: Many cloud-based applications employ a data centre as a central server to process data that is generated by edge devices, such as smartphones, tablets and wearables. This model places ever increasing demands on communication and computational infrastructure with inevitable adverse effect on Quality-of-Service and Experience. The concept of Edge Computing is predicated on moving some of this comput… ▽ More

    Submitted 7 September, 2016; originally announced September 2016.

    Comments: 6 pages, accepted to IEEE SmartCloud 2016

  26. arXiv:1607.02281  [pdf, ps, other

    cs.MM

    Two RPG Flow-graphs for Software Watermarking using Bitonic Sequences of Self-inverting Permutations

    Authors: Anna Mpanti, Stavros D. Nikolopoulos

    Abstract: Software watermarking has received considerable attention and was adopted by the software development community as a technique to prevent or discourage software piracy and copyright infringement. A wide range of software watermarking techniques has been proposed among which the graph-based methods that encode watermarks as graph structures. Following up on our recently proposed methods for encodin… ▽ More

    Submitted 15 July, 2016; v1 submitted 8 July, 2016; originally announced July 2016.

    Comments: 10 pages, 2 figures

    ACM Class: E.1; E.3; G.2.2

  27. arXiv:1607.00827  [pdf, ps, other

    cs.CR

    Preventing Malware Pandemics in Mobile Devices by Establishing Response-time Bounds

    Authors: Stavros D. Nikolopoulos, Iosif Polenakis

    Abstract: We study the propagation of a malicious software in a network of mobile devices, which are moving in a specific city area, and establish time bounds for the activation of a counter-measure, i.e., an antivirus or a cleaner in order to prevent pandemic. More precisely, given an initial infected population (mobile devices), we establish upper bounds on the time needed for a counter-measure to take ef… ▽ More

    Submitted 4 July, 2016; originally announced July 2016.

    Comments: 13 pages, 33 figures

    ACM Class: D.4.6; D.4.8; K.6.5

  28. arXiv:1606.04288  [pdf, other

    cs.DC cs.PL

    BDDT-SCC: A Task-parallel Runtime for Non Cache-Coherent Multicores

    Authors: Alexandros Labrineas, Polyvios Pratikakis, Dimitrios S. Nikolopoulos, Angelos Bilas

    Abstract: This paper presents BDDT-SCC, a task-parallel runtime system for non cache-coherent multicore processors, implemented for the Intel Single-Chip Cloud Computer. The BDDT-SCC runtime includes a dynamic dependence analysis and automatic synchronization, and executes OpenMP-Ss tasks on a non cache-coherent architecture. We design a runtime that uses fast on-chip inter-core communication with small mes… ▽ More

    Submitted 14 June, 2016; originally announced June 2016.

  29. arXiv:1606.04282  [pdf, other

    cs.DC cs.PL

    Myrmics: Scalable, Dependency-aware Task Scheduling on Heterogeneous Manycores

    Authors: Spyros Lyberis, Polyvios Pratikakis, Iakovos Mavroidis, Dimitrios S. Nikolopoulos

    Abstract: Task-based programming models have become very popular, as they offer an attractive solution to parallelize serial application code with task and data annotations. They usually depend on a runtime system that schedules the tasks to multiple cores in parallel while resolving any data hazards. However, existing runtime system implementations are not ready to scale well on emerging manycore processor… ▽ More

    Submitted 14 June, 2016; originally announced June 2016.

  30. arXiv:1605.04580  [pdf, other

    cs.DC

    TwinCG: Dual Thread Redundancy with Forward Recovery for Conjugate Gradient Methods

    Authors: Kiril Dichev, Dimitrios S. Nikolopoulos

    Abstract: Even though iterative solvers like the Conjugate Gradients method (CG) have been studied for over fifty years, fault tolerance for such solvers has seen much attention in recent years. For iterative solvers, two major reliable strategies of recovery exist: checkpoint-restart for backward recovery, or some type of redundancy technique for forward recovery. Important redundancy techniques like ABFT… ▽ More

    Submitted 15 May, 2016; originally announced May 2016.

  31. arXiv:1605.04111  [pdf, other

    cs.DC

    Energy Optimization of Memory Intensive Parallel workloads

    Authors: Chhaya Trehan, Hans Vandierendonck, Georgios Karakonstantis, Dimitrios S. Nikolopoulos

    Abstract: Energy consumption is an important concern in modern multicore processors. The energy consumed during the execution of an application can be minimized by tuning the hardware state utilizing knobs such as frequency, voltage etc. The existing theoretical work on energy mini- mization using Global DVFS (Dynamic Voltage and Frequency Scaling), despite being thorough, ignores the energy consumed by the… ▽ More

    Submitted 13 May, 2016; originally announced May 2016.

  32. arXiv:1602.02057  [pdf, ps, other

    cs.IT

    A Generalised Differential Framework for Measuring Signal Sparsity

    Authors: Anastasios Maronidis, Elisavet Chatzilari, Spiros Nikolopoulos, Ioannis Kompatsiaris

    Abstract: The notion of signal sparsity has been gaining increasing interest in information theory and signal processing communities. As a consequence, a plethora of sparsity metrics has been presented in the literature. The appropriateness of these metrics is typically evaluated against a set of objective criteria that has been proposed for assessing the credibility of any sparsity metric. In this paper, w… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Comments: 14 pages, 4 figures, The abstract field cannot be longer than 1,920 characters: The abstract appearing here is slightly shorter than the one in the pdf

  33. arXiv:1602.00904  [pdf, other

    cs.HC cs.CV stat.ML

    Comparative evaluation of state-of-the-art algorithms for SSVEP-based BCIs

    Authors: Vangelis P. Oikonomou, Georgios Liaros, Kostantinos Georgiadis, Elisavet Chatzilari, Katerina Adam, Spiros Nikolopoulos, Ioannis Kompatsiaris

    Abstract: Brain-computer interfaces (BCIs) have been gaining momentum in making human-computer interaction more natural, especially for people with neuro-muscular disabilities. Among the existing solutions the systems relying on electroencephalograms (EEG) occupy the most prominent place due to their non-invasiveness. However, the process of translating EEG signals into computer commands is far from trivial… ▽ More

    Submitted 3 February, 2016; v1 submitted 2 February, 2016; originally announced February 2016.

  34. arXiv:1504.00825  [pdf, other

    cs.PF

    ALEA: Fine-grain Energy Profiling with Basic Block Sampling

    Authors: Lev Mukhanov, Dimitrios S. Nikolopoulos, Bronis R. de Supinski

    Abstract: Energy efficiency is an essential requirement for all contemporary computing systems. We thus need tools to measure the energy consumption of computing systems and to understand how workloads affect it. Significant recent research effort has targeted direct power measurements on production computing systems using on-board sensors or external instruments. These direct methods have in turn guided st… ▽ More

    Submitted 14 November, 2016; v1 submitted 3 April, 2015; originally announced April 2015.

    Comments: 20 pages

  35. arXiv:1503.08104  [pdf, other

    cs.DC cs.AR

    Evaluating Asymmetric Multicore Systems-on-Chip using Iso-Metrics

    Authors: Charalampos Chalios, Dimitrios S. Nikolopoulos, Enrique S. Quintana-Orti

    Abstract: The end of Dennard scaling has pushed power consumption into a first order concern for current systems, on par with performance. As a result, near-threshold voltage computing (NTVC) has been proposed as a potential means to tackle the limited cooling capacity of CMOS technology. Hardware operating in NTV consumes significantly less power, at the cost of lower frequency, and thus reduced performanc… ▽ More

    Submitted 27 March, 2015; originally announced March 2015.

    Comments: Presented at HiPEAC EEHCO '15, 6 pages

    ACM Class: C.1.3; G.4

  36. arXiv:1501.03481  [pdf, other

    cs.DC

    Iso-Quality of Service: Fairly Ranking Servers for Real-Time Data Analytics

    Authors: Giorgis Georgakoudis, Charles J. Gillan, Ahmed Sayed, Ivor Spence, Richard Faloon, Dimitrios S. Nikolopoulos

    Abstract: We present a mathematically rigorous Quality-of-Service (QoS) metric which relates the achievable quality of service metric (QoS) for a real-time analytics service to the server energy cost of offering the service. Using a new iso-QoS evaluation methodology, we scale server resources to meet QoS targets and directly rank the servers in terms of their energy-efficiency and by extension cost of owne… ▽ More

    Submitted 14 January, 2015; originally announced January 2015.

    Comments: 12 pages, 5 figures, 8 tables, 6 equations. arXiv admin note: text overlap with arXiv:1501.00048

  37. arXiv:1501.02686  [pdf, ps, other

    cs.MM

    Watermarking PDF Documents using Various Representations of Self-inverting Permutations

    Authors: Maria Chroni, Stavros D. Nikolopoulos

    Abstract: This work provides to web users copyright protection of their Portable Document Format (PDF) documents by proposing efficient and easily implementable techniques for PDF watermarking; our techniques are based on the ideas of our recently proposed watermarking techniques for software, image, and audio, expanding thus the digital objects that can be efficiently watermarked through the use of self-in… ▽ More

    Submitted 12 January, 2015; originally announced January 2015.

    Comments: 17 pages, 6 figures. arXiv admin note: text overlap with arXiv:1003.1796 by other authors

    ACM Class: D.2.2; D.4.6; H.1.1

  38. arXiv:1501.00048  [pdf, other

    cs.DC

    Methods and Metrics for Fair Server Assessment under Real-Time Financial Workloads

    Authors: Giorgis Georgakoudis, Charles J. Gillan, Ahmed Sayed, Ivor Spence, Richard Faloon, Dimitrios S. Nikolopoulos

    Abstract: Energy efficiency has been a daunting challenge for datacenters. The financial industry operates some of the largest datacenters in the world. With increasing energy costs and the financial services sector growth, emerging financial analytics workloads may incur extremely high operational costs, to meet their latency targets. Microservers have recently emerged as an alternative to high-end servers… ▽ More

    Submitted 30 December, 2014; originally announced January 2015.

  39. arXiv:1412.8712  [pdf, ps, other

    cs.CR

    Detecting Malicious Code by Exploiting Dependencies of System-call Groups

    Authors: Stavros D. Nikolopoulos, Iosif Polenakis

    Abstract: In this paper we present an elaborated graph-based algorithmic technique for efficient malware detection. More precisely, we utilize the system-call dependency graphs (or, for short ScD graphs), obtained by capturing taint analysis traces and a set of various similarity metrics in order to detect whether an unknown test sample is a malicious or a benign one. For the sake of generalization, we deci… ▽ More

    Submitted 30 December, 2014; originally announced December 2014.

    Comments: 21 pages, 4 figures

    ACM Class: K.6.5; D.4.6

  40. arXiv:1412.5150  [pdf, other

    cs.PL

    A Programming Model and Runtime System for Significance-Aware Energy-Efficient Computing

    Authors: Vassilis Vassiliadis, Konstantinos Parasyris, Charalambos Chalios, Christos D. Antonopoulos, Spyros Lalis, Nikolaos Bellas, Hans Vandierendonck, Dimitrios S. Nikolopoulos

    Abstract: Reducing energy consumption is one of the key challenges in computing technology. One factor that contributes to high energy consumption is that all parts of the program are considered equally significant for the accuracy of the end-result. However, in many cases, parts of computations can be performed in an approximate way, or even dropped, without affecting the quality of the final output to a s… ▽ More

    Submitted 15 December, 2014; originally announced December 2014.

  41. arXiv:1403.6658  [pdf, ps, other

    cs.MM cs.CR

    WaterRPG: A Graph-based Dynamic Watermarking Model for Software Protection

    Authors: Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos

    Abstract: Software watermarking involves embedding a unique identifier or, equivalently, a watermark value within a software to prove owner's authenticity and thus to prevent or discourage copyright infringement. Towards the embedding process, several graph theoretic watermarking algorithmic techniques encode the watermark values as graph structures and embed them in application programs. Recently, we prese… ▽ More

    Submitted 17 March, 2014; originally announced March 2014.

    Comments: 27 pages, 11 pages

    ACM Class: D.2.2; D.4.6; H.1.1

  42. arXiv:1110.1194  [pdf, ps, other

    cs.DS

    Efficient Encoding of Watermark Numbers as Reducible Permutation Graphs

    Authors: Maria Chroni, Stavros D. Nikolopoulos

    Abstract: In a software watermarking environment, several graph theoretic watermark methods use numbers as watermark values, where some of these methods encode the watermark numbers as graph structures. In this paper we extended the class of error correcting graphs by proposing an efficient and easily implemented codec system for encoding watermark numbers as reducible permutation flow-graphs. More precisel… ▽ More

    Submitted 6 October, 2011; originally announced October 2011.

    ACM Class: G.2.2; G.2.3; F.2.2

  43. arXiv:1012.4938  [pdf, ps, other

    cs.DS

    Join-Reachability Problems in Directed Graphs

    Authors: Loukas Georgiadis, Stavros D. Nikolopoulos, Leonidas Palios

    Abstract: For a given collection G of directed graphs we define the join-reachability graph of G, denoted by J(G), as the directed graph that, for any pair of vertices a and b, contains a path from a to b if and only if such a path exists in all graphs of G. Our goal is to compute an efficient representation of J(G). In particular, we consider two versions of this problem. In the explicit version we wish to… ▽ More

    Submitted 22 December, 2010; originally announced December 2010.

  44. arXiv:0807.4234  [pdf, ps, other

    cs.DM cs.DS

    Linear Coloring and Linear Graphs

    Authors: Kyriaki Ioannidou, Stavros D. Nikolopoulos

    Abstract: Motivated by the definition of linear coloring on simplicial complexes, recently introduced in the context of algebraic topology \cite{Civan}, and the framework through which it was studied, we introduce the linear coloring on graphs. We provide an upper bound for the chromatic number $χ(G)$, for any graph $G$, and show that $G$ can be linearly colored in polynomial time by proposing a simple li… ▽ More

    Submitted 26 July, 2008; originally announced July 2008.

    Comments: 21 pages, 7 figures

    ACM Class: G.2.2; F.2.2

  45. arXiv:0806.4372  [pdf, ps, other

    cs.DS cs.DM

    The 1-fixed-endpoint Path Cover Problem is Polynomial on Interval Graph

    Authors: Katerina Asdre, Stavros D. Nikolopoulos

    Abstract: We consider a variant of the path cover problem, namely, the $k$-fixed-endpoint path cover problem, or kPC for short, on interval graphs. Given a graph $G$ and a subset $\mathcal{T}$ of $k$ vertices of $V(G)$, a $k$-fixed-endpoint path cover of $G$ with respect to $\mathcal{T}$ is a set of vertex-disjoint paths $\mathcal{P}$ that covers the vertices of $G$ such that the $k$ vertices of… ▽ More

    Submitted 26 June, 2008; originally announced June 2008.

  46. arXiv:cs/0502038  [pdf, ps, other

    cs.DM

    The Number of Spanning Trees in Kn-complements of Quasi-threshold Graphs

    Authors: Stavros D. Nikolopoulos, Charis Papadopoulos

    Abstract: In this paper we examine the classes of graphs whose $K_n$-complements are trees and quasi-threshold graphs and derive formulas for their number of spanning trees; for a subgraph $H$ of $K_n$, the $K_n$-complement of $H$ is the graph $K_n-H$ which is obtained from $K_n$ by removing the edges of $H$. Our proofs are based on the complement spanning-tree matrix theorem, which expresses the number o… ▽ More

    Submitted 7 February, 2005; originally announced February 2005.

    Comments: 13 pages, 2 figures

    ACM Class: G.2.1; G.2.2

    Journal ref: Graphs and Combinatorics 20(3): 383-397, 2004