• A Methodology for Calculating the Undetactable Double-Faults in Self-Checking Circuits 

    Nikolaidis, S.; Karaolis, E.; Kakarountas, Athanasios; Papadomanolakis, K.; Goutis, C. E. (World Scientific Publishing Company, 2003)
    In this paper, a methodology for the calculation of the undetectable double-faults in self-checking circuits with bit-sliced architecture is introduced. This methodology is based on a systematic exploration of the combinations ...
  • A Most Popular Approach of Predictive Prefetching on a WAN to Efficiently Improve WWW Response Times 

    Bouras, Christos; Konidaris, Agisilaos; Kostoulas, Dionysios (Springer Berlin Heidelberg, 2004)
    This paper studies Predictive Prefetching on a Wide Area Network with two levels of caching. The WAN that we refer to is the GRNET academic network in Greece. We rely on log files collected at the network’s Transparent ...
  • A new approach to elliptic curve cryptography: an RNS architecture 

    Schinianakis, D. M.; Kakarountas, Athanasios P.; Stouraitis, T. (IEEE, 2006)
    An elliptic curve point multiplier (ECPM) is the main part of all elliptic curve cryptography (ECC) systems and its performance is decisive for the performance of the overall cryptosystem. A VLSI residue number system (RNS) ...
  • A Novel Constant-Time Fault-Secure Binary Counter 

    Karatasos, Dimitris; Kakarountas, Athanasios P.; Theodoridis, George; Goutis, Costas (Springer-Verlag Berlin Heidelberg, 2004)
    A novel constant-time fault-secure binary counter is presented. This counter is appropriate for performance aware safety critical systems. This is achieved due its ability to read its binary output on-the-fly. The safety ...
  • A novel high-speed counter with counting rate independent of the counter's length 

    Kakarountas, Athanasios P.; Theodoridis, G.; Goutis, Costas E. (IEEE, 2003)
    Counters are among the basic blocks in every digital system. We propose a novel high-speed counter with a constant counting rate, independent of its length. Exploiting special features of the binary arithmetic system and ...
  • A novel high-throughput implementation of a partially unrolled SHA-512 

    Aisopos, F.; Aisopos, K.; Schinianakis, D.; Michail, Harris E.; Kakarountas, Athanasios P. (IEEE, 2006-05)
    A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily embedded to operate in HMAC IP cores, providing a high degree of ...
  • A Period Analysis of V505 Sagittarri 

    Livaniou, H.; Antonopoulou, E.; Rovithis, Peter; Kalimeris, Anastasios (1991-05-21)
    The variable star V505 Sgr (HR 7571, HD 187949) was discovered to be an eclipsing binary by Hoffmeister (1934). Its first photoelectric light curves were obtained by Oosterhoff in 1950 and were analysed by Kwee (1953) ...
  • A simple model for the prediction of the fatigue delamination growth of impacted composite panels 

    Κατερέλος, Διονύσιος Θ. Γ.; Παϊτέτης, Α.; Κωστόπουλος, Β. (2004)
    The fatigue behaviour of composite panels that have been subjected to low-velocity impact was studied. Impacted specimens were tested under compression–compression fatigue. A delamination propagation model based on the ...
  • A survey on throughput-efficient architectures for IEEE P1619 for shared storage media 

    Kakarountas, Athanasios P.; Hatzidimitriou, E.; Milidonis, A. (IEEE, 2011-06)
    The IEEE P1619 standard for achieving high degree of security in shared storage media is explored, in terms of area requirements, performance and resource exploitation. Several architectures are considered, highlighting ...
  • A technique for preference ordering for advice generation in an intelligent help system 

    Kabassi, Katerina; Virvou, Maria (IEEE, 2004-10)
    This paper presents the way that a technique for preference ordering has been applied for advice generation in an intelligent graphical user interface. The graphical user interface is called I-Mailer and helps users while ...
  • A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores 

    Michail, Harris E.; Kakarountas, Athanasios P.; Milidonis, Athanasios S.; Goutis, Costas E. (IEEE computer society, 2009)
    Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of cryptographic algorithms. Applications ...
  • Adapting the Human Plausible Reasoning Theory to a Graphical User Interface 

    Virvou, Maria; Kabassi, Katerina (2004)
    This paper describes the adaptation of a cognitive theory, called Human Plausible Reasoning (HPR), for the purposes of an intelligent graphical user interface (GUI). The GUI is called intelligent file manipulator (IFM) and ...
  • Adaptive Help for e-mail Users 

    Kabassi, Katerina; Virvou, Maria (2003)
    This paper describes a graphical user interface that provides intelligent help to the users of an emailing system. The graphical user interface is called Intelligent Mailer (I-Mailer). I-Mailer monitors users while they ...
  • Advanced Population Study of Black Vulture in Dadia National Park 

    Skartsi, T.; Poirazidis, Kostas; Elorriaga, Javier N.; Vasilakis, D. (2004)
    An annual scientific monitoring plan for the Dadia national park (Dadia NP) has been implemented by the WWF Greece since 2000 and it includes the monitoring of ecological status of the forest, raptor population, and human ...
  • Adverse Effect of Bermudagrass on Physiological and Growth Components of Cotton 

    Bouchagier, P.; Efthimiadou, A.; Katsileros, A.; Bilalis, D.; Efthimiadis, P. (Asian Network for Scientific Information, 2008)
    A two-year (2002/03 and 2003/04) experiment was conducted in the research site of the Agricultural University of Athens, Greece, to study the effects of Bermudagrass (Cynodon dactylon L.) in several agronomic and physiological ...
  • Affective student modeling based on microphone and keyboard user actions 

    Alepis, Efthymios; Virvou, Maria; Kabassi, Katerina (2006)
    This paper presents an affective educational application that bases its inferences about students? emotions on user evidence provided by the keyboard and the microphone. The actual combination of evidence from these two ...
  • Affective Reasoning Based on Bi-modal Interaction and User Stereotypes 

    Alepis, Efthymios; Virvou, Maria; Kabassi, Katerina (Springer Berlin Heidelberg, 2008)
    This paper describes a novel research approach for affective reasoning that aims at recognizing user emotions within an educational application. The novel approach is based on information about users that arises from two ...
  • Age Stereotypes for Personalised Adult Learning on the Use of Computers 

    Virvou, Maria; Kabassi, Katerina (2004)
    In this paper we describe an intelligent learning environment that is targeted to users of varying ages ranging from typical school ages to adult professional ages. The learning environment is called PEMALE and aims at ...
  • Allelicvariation in key peptide binding pockets discriminates between closely relateddiabetes-protective and diabetes-susceptible HLADQB1*06 alleles 

    Ettinger, R. A.; Papadopoulos, George K.; Moustakas, Antonis K.; Nepom, G. T. (The American Association of Immunologists, Inc., 2006-07)
    HLA-DQA1*0102-DQB1*0602 is associated with protection against type 1 diabetes (T1D). A similar allele, HLA-DQA1*0102- DQB1*0604, contributes to T1D susceptibility in certain populations but differs only at seven amino ...
  • Allelopathic Susceptibility of Cotton to Bermudagrass 

    Bouchagier, P.; Efthimiadis, P. (Asian Network for Scientific Information, 2010)
    The aim of the study was to investigate the influence of bermudagrass on growth components, physiology parameters (stomatal aperture, leaf transpiration, carbon dioxide intake, leaf temperature, Fv/Fm values and net ...