N. Karanikolas, E. Galiotou, D. Papazachariou, Konstantinos Athanasakos, G. Koronakis, A. Ralli
{"title":"Towards a computational processing of oral dialectal data","authors":"N. Karanikolas, E. Galiotou, D. Papazachariou, Konstantinos Athanasakos, G. Koronakis, A. Ralli","doi":"10.1145/2801948.2801966","DOIUrl":"https://doi.org/10.1145/2801948.2801966","url":null,"abstract":"In this paper, we discuss issues concerning the computational processing of oral data in a unified framework for the exploitation of oral and written dialectal corpora. We describe the analysis and design of a multimedia database and software for storing and retrieving dialectal data, focusing on the subsystem of oral resources from three Greek dialects in Asia Minor. We discuss problems concerning the archiving and exploitation of such an oral corpus and we propose solutions.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abstracting BPMN models","authors":"Christina Tsagkani, A. Tsalgatidou","doi":"10.1145/2801948.2802035","DOIUrl":"https://doi.org/10.1145/2801948.2802035","url":null,"abstract":"The growing orientation in processes of contemporary information systems and service-oriented architectures has led to the existence of large repositories of complex process models that even though they are a great source of knowledge, they are managed with difficulties. Abstraction is a means to reduce the size and complexity of such models. The aim of this short paper is to present a set of abstraction rules that may be used to simplify complex BPMN process models while focusing on important process model elements (abstraction objects), such as activities, data etc. The abstraction rules are applied to real world process models.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automated network intrusion process and countermeasures","authors":"Valkaniotis Tilemachos, C. Manifavas","doi":"10.1145/2801948.2802001","DOIUrl":"https://doi.org/10.1145/2801948.2802001","url":null,"abstract":"This paper presents a case study in an attempt to raise awareness on computer security. Our research showed that theoretically one could indeed build a tool capable of automating a hacking attack, functional under certain circumstances. In this work, we first discuss the fundamental concepts of a penetration testing process and afterwards we highlight a number of open source tools, frameworks and programming languages used to build an automated process (Nmap, Metasploit, Python). Then, we demonstrate how those three technologies/tools can be combined to automate the intrusion process and create a script, allowing an attacker to access a single or multiple remote systems by only typing a single command. Finally, we present some countermeasures. Overall, this paper will serve to justify not only the increase in cyber-attacks but also the decrease in the required knowledge to conduct and be successful in the attack.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131075426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fifty years of evolution in virtualization technologies: from the first IBM machines to modern hyperconverged infrastructures","authors":"N. Koziris","doi":"10.1145/2801948.2802039","DOIUrl":"https://doi.org/10.1145/2801948.2802039","url":null,"abstract":"The evolution of virtualization is an exciting history of enabling technologies that have offered the ability to organize and utilize the hardware resources more efficiently. We will start from the origins of the first IBM machines back in 1960's, where the notion of virtualization was originally introduced to partition the hardware resources more efficiently. This was well before the onset of the majority of the operating systems in the early 1970's, which were initially introduced as a software alternative to partition and expose hardware resources to multiple users. In the late 1980's and 1990's the software hypervisors allowed the multiplexing of PC hardware and enabled the use of virtual machines, which in the 2000's became a commodity that needed to be efficiently orchestrated and provisioned in bulk. The IaaS cloud era had arrived, bringing more interesting challenges for the dynamic, thin provisioning of hardware and software resources to applications. Nowadays, we are living in the times of \"software defined everything\". We have hyper-convergence in all our datacenter infrastructures, where all compute, network and storage resources are controlled by software. The talk will present this exciting long technology journey that started more than 50 years ago and still continues, always driven by the notion of virtualizing expensive hardware resources to multiple users.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"123 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kleovoulos Kalaitzidis, Georgios Dimitriou, G. Stamoulis, Michael F. Dossis
{"title":"Performance and power simulation of a functional-unit-network processor with simplescalar and wattch","authors":"Kleovoulos Kalaitzidis, Georgios Dimitriou, G. Stamoulis, Michael F. Dossis","doi":"10.1145/2801948.2801958","DOIUrl":"https://doi.org/10.1145/2801948.2801958","url":null,"abstract":"Loop acceleration is a means to enhance performance of a single- or multiple-issue microprocessor core. A new edge-like processor architecture incorporates a loop accelerator directly in the out-of-order back end of the processor, forming an extended hypercube interconnected network of functional unit nodes. In this work, we have simulated a full processor pipeline of our architecture in a high-level language. In particular, we have extended the Simplescalar, a well-known processor simulator, to include our multifunctional-unit back-end design, and to support our special instructions for loop acceleration. Thus, instructions forming qualified loops are scheduled and dispatched only once for execution, remaining in the back end for all loop iterations, interchanging values in a data-flow fashion. We have also utilized the Wattch power estimation tool, which has been traditionally coupling Simplescalar to produce an estimation of power consumption during simulation, to show that our design results in significant power savings. Since loop instructions reside in the functional unit nodes during loop execution, all front end of the pipeline is turned off and the register file and the instruction cache are kept at low power at that time. Experiments conducted include simulating execution of small loop-based benchmarks from the Livermore loops, as well as longer real-life code taken from open-source mpeg video compression codes. All experiments exhibit the expected performance and power consumption improvements, verifying earlier performance measurements on the HDL model of the back end.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126619780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dimitra Panagiotou, Efthymios Oikonomou, A. Rouskas
{"title":"Energy-efficient virtual machine provisioning mechanism in cloud computing environments","authors":"Dimitra Panagiotou, Efthymios Oikonomou, A. Rouskas","doi":"10.1145/2801948.2801989","DOIUrl":"https://doi.org/10.1145/2801948.2801989","url":null,"abstract":"As the increasing number of modern applications and enterprises demand more and more resources in computational power, memory and disk storage, cloud data centers are consuming huge amounts of electrical energy. The aim of cloud service providers is to reduce the operational costs by minimizing energy consumption while providing competitive services to their customers. The above, can be fulfilled by trying to reduce the number of active servers, using live VM migrations and keeping the system performance in the requested levels according to SLAs. In this paper, an efficient virtual machine allocation mechanism for cloud data center environments is proposed. We first describe the virtual machine allocation policy and then we perform a series of experiments based on CloudSim [1] 3.0.3 simulator. Experimental results have shown that the proposed scheme is very efficient in terms of energy consumption and QoS (decreased SLA violations) compared to LrMmt provisioning mechanism presented in [2].","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Christoforou, K. H. Gjermundrød, I. Dionysiou
{"title":"HoneyCY: a configurable unified management framework for open-source honeypot services","authors":"Andreas Christoforou, K. H. Gjermundrød, I. Dionysiou","doi":"10.1145/2801948.2802021","DOIUrl":"https://doi.org/10.1145/2801948.2802021","url":null,"abstract":"Given the sophisticated nature of cyber attacks, existing passive defensive techniques may soon deemed to be inadequate to protect network and data assets at a satisfactory level. On the other hand, active defenses are promising techniques that are based on a proactive strategy where one anticipates attacks and prepares for the neutralization of the threats. Honeypots are systems, either isolated production systems or emulated ones, that are configured to be deliberately vulnerable, with the ultimate goal to be probed and exploited by attackers. Honeypots are powerful tools, however the inadequate (or lack of) documentation and the high degree of configuration complexity are prohibitive factors in their deployment. In this paper, we present honeyCY, a system that integrates existing honeypots into a single system, offering visualization features via a web interface or an Android app.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"46 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scan chain based at-speed diagnosis in the presence of scan output compaction schemes","authors":"Helen-Maria Dounavi, Y. Tsiatouhas, A. Arapoyanni","doi":"10.1145/2801948.2801956","DOIUrl":"https://doi.org/10.1145/2801948.2801956","url":null,"abstract":"The use of scan chains in diagnosis operations turns to be an important yield enhancement factor in nanotechnologies. However, scan chain output compaction schemes drastically reduce the ability to effectively diagnose (locate) faults in a defective circuit. In addition, scan chains are not friendly to at-speed diagnosis, where timing faults must be located. A new at-speed scan chain diagnosis technique is presented, which guarantees the maximum diagnostic resolution independently of the presence of any scan chain output compaction schemes.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"44 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121803093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georgios I. Papadimitriou, Andreas Komninos, J. Garofalakis
{"title":"An investigation of the suitability of heterogeneous social network data for use in mobile tourist guides","authors":"Georgios I. Papadimitriou, Andreas Komninos, J. Garofalakis","doi":"10.1145/2801948.2801970","DOIUrl":"https://doi.org/10.1145/2801948.2801970","url":null,"abstract":"Social Networking Sites (SNS) are used daily by billions of people worldwide to keep them informed about the latest news, to help them interact with other people as well as to provide them with Points of Interest (POIs) to visit. In this paper we examine to what extent the information from SNSs such as likes, tags, check-ins can influence the visitors or locals of a city in choosing venues to visit. Next, we implement an Android application, Social City, for mobile devices, which collects and evaluates the information from Facebook and Foursquare in order to recommend to users venues to visit in the city of Patras, Greece. Finally, we discuss an evaluation of Social City. Our results indicate that the combination of SNS data from multiple social networking sites into a single rating, appears to lead to more efficient recommendations for the users, helping them choose faster and easier and with more confidence about the quality of their choice.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126343821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Doulkeridis, Akrivi Vlachou, Panagiotis Nikitopoulos, Panagiotis Tampakis, Mei Saouk
{"title":"The RoadRunner framework for efficient and scalable processing of big data","authors":"C. Doulkeridis, Akrivi Vlachou, Panagiotis Nikitopoulos, Panagiotis Tampakis, Mei Saouk","doi":"10.1145/2801948.2801963","DOIUrl":"https://doi.org/10.1145/2801948.2801963","url":null,"abstract":"In this paper, we present the overall architecture of RoadRunner, a Hadoop-based framework that enhances the efficiency of rank-aware query processing by introducing various optimizations to Hadoop, without changing its internal operation. RoadRunner focuses on a specific class of queries that involve ranking, such as top-k queries and top-k joins, as well as on preference-aware queries, such as skyline queries, which are tightly related. For this class of queries, we identify improvements on various stages of MapReduce processing, which result in improved performance without sacrificing scalability. We describe the RoadRunner framework, along with individual modules and their roles, and we demonstrate the merits of the proposed framework by means of showcase query examples.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}