Abstract is missing.
- Enhancing the extraction of SBVR business vocabularies and business rules from UML use case diagrams with natural language processingPaulius Danenas, Tomas Skersys, Rimantas Butleris. 1-8 [doi]
- Transforming the supply-chain management and industry logistics with blockchain smart contractsSofia Terzi, Angeliki Zacharaki, Alexandros Nizamis, Konstantinos Votis, Dimosthenis Ioannidis, Dimitrios Tzovaras, Ioannis Stamelos. 9-14 [doi]
- A usability study with healthcare professionals of a customizable framework for reminiscence and music based cognitive activities for people with dementiaLuis Duarte Andrade Ferreira, Sofia Cavaco, Sergi Bermúdez i Badia. 16-23 [doi]
- Monitoring and management of home appliances with NETCONF and YANGKyriaki Seklou, Panagiotis C. Kokkinos, Nikolaos D. Tselikas, A. C. Boukouvalas. 25-32 [doi]
- Study of the acoustic noise in pipelines carrying oil products in a refinery establishmentGeorge-Othon Glentis, Kostas Angelopoulos, Spyridon Nikolaidis, Georgios-Panagiotis Kousiopoulos, Dimitrios Porlidas, Dimitrios Gkountis. 34-41 [doi]
- Routing policy verification for enhanced energy quality of service and security monitoring in IoT networksKonstantinos Papachristou, Traianos-Ioannis Theodorou, Stavros Papadopoulos 0002, Aikaterini Protogerou, Anastasios Drosou, Dimitrios Tzovaras. 43-48 [doi]
- Leakage detection using leak noise correlation techniques: overview and implementation aspectsGeorge-Othon Glentis, Kostas Angelopoulos. 50-57 [doi]
- A study on speculative task scheduling for apache spark in fog computing realmsMoysis Symeonides, Demetris Trihinas. 59-65 [doi]
- ObjectMap: detecting insecure object deserializationNikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis. 67-72 [doi]
- A hybrid method for missing value imputationAikaterini Karanikola, Sotiris Kotsiantis. 74-79 [doi]
- A semantically annotated JSON metadata structure for open linked cultural data in Neo4jGeorgios Drakopoulos, Evaggelos Spyrou, Yorghos Voutos, Phivos Mylonas. 81-88 [doi]
- Multi-screen lock: visual passwords from user's social dataVasileios Tsoukas, Athanasios Kakarountas, Anargyros Gkogkidis, Georgios Giannakas. 90-95 [doi]
- A comparative survey of machine learning classification algorithms for breast cancer detectionMarkos Marios Kaklamanis, Michael E. Filippakis. 97-103 [doi]
- Knowledge retention through observation of instant messaging systemsJoão Costa, Rui P. Duarte, Carlos Cunha, João Menoita. 105-110 [doi]
- Utilizing the buckshot algorithm for efficient big data clustering in the MapReduce modelSergios Gerakidis, Basilis Mamalis. 112-117 [doi]
- OpenMIC: open multi-agent intelligence and computingAndreas A. Varvarigos, Aristotelis Kretsis, Panagiotis C. Kokkinos. 119-126 [doi]
- An experimental study of IoT transmission power, in outdoor environment, using Crossbow TelosB nodesCharalampos Sergiou, Aristodemos Paphitis, Loizos Kanaris, Stavros Stavrou. 128-133 [doi]
- Instructed late bindingSeyed Hossein Haeri, Paul Keir. 135-142 [doi]
- Factors and models contributing to the optimization of search engine results credibility and application on news content: the cross-credibility engine optimization (CCEO) modelCharalampos Dimoulas, Andreas A. Veglis. 144-147 [doi]
- A unified approach for memory protection in a bare-metal and a real time operating systemMuhammad Faisal, Erik Dilger, Sergio Montenegro 0001. 149-152 [doi]
- Security and time insertionDamas P. Gruska. 154-157 [doi]
- Mutual requirements evolution by combining different information systemsHaruhiko Kaiya, Ryoya Muto, Kaito Nagano, Mizuki Yoshida. 159-162 [doi]
- Greek language object representation scene system: a text interface for designing X3D objects and X3D scenesGeorge A. Krikos, Nikitas N. Karanikolas, George Miaoulis, Athanasios Voulodimos. 164-167 [doi]
- Embedding a chatbot in a news article: design and implementationAndreas A. Veglis, Theodora A. Maniou. 169-172 [doi]