2010
On topology control and non-uniform node deployment in ad hoc networks Conference
Mannheim, 2010, ISBN: 9781424466054, (cited By 2; Conference of 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010 ; Conference Date: 29 March 2010 Through 2 April 2010; Conference Code:80840).
IEEE Computer Society, 2010, ISBN: 9781424488650, (cited By 2; Conference of 2010 IEEE Globecom Workshops, GC 2010 ; Conference Date: 5 December 2010 Through 10 December 2010; Conference Code:83878).
2009
Understanding the adoption of mobile data services: Differences among mobile portal and mobile internet users Proceedings Article
In: 2009 Eighth International Conference on Mobile Business, pp. 12–17, IEEE 2009.
A stochastic model using self-organization to explore the ICT Industry evolution Conference
2009, (cited By 1).
vol. 530, 2009, (cited By 0).
On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in Ad Hoc and Sensor Networks Proceedings Article
In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 255–261, IEEE 2009.
Mediated versus direct access to mobile data services: adoption patterns in Greece Proceedings Article
In: 8th Global Mobility Roundtable, 2009.
Topology-Aware Hybrid Random Walk Protocols for Wireless Multihop Networks Proceedings Article
In: International Conference on Mobile Networks and Management, pp. 107–118, Springer, Berlin, Heidelberg 2009.
Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).
2008
Delineating the degree of'pervasiveness' in pervasive information systems: an assessment framework and design implications Proceedings Article
In: 2008 Panhellenic Conference on Informatics, pp. 251–255, IEEE 2008.
Corfunet: A mesh network providing wireless services at metropolitan level Conference
2008, (cited By 0).
An opportunistic combined power and rate allocation approach in CDMA ad hoc networks Proceedings Article
In: 2008 IEEE Sarnoff symposium, pp. 1–5, IEEE 2008.
On the problem of joint power and rate control in CDMA ad hoc networks Proceedings Article
In: 2008 3rd International Symposium on Wireless Pervasive Computing, pp. 78–82, IEEE 2008.
On the problem of joint power and rate control in CDMA ad hoc networks Conference
Santorini, 2008, ISBN: 9781424416530, (cited By 1; Conference of 3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008 ; Conference Date: 7 May 2008 Through 9 May 2008; Conference Code:73424).
An opportunistic combined power and rate allocation approach in CDMA ad hoc networks Conference
Princeton, NJ, 2008, ISBN: 1424418437; 9781424418435, (cited By 3; Conference of 2008 IEEE Sarnoff Symposium, SARNOFF ; Conference Date: 28 April 2008 Through 30 April 2008; Conference Code:72891).
2007
On the risk-based operation of mobile attacks in wireless ad hoc networks Proceedings Article
In: 2007 IEEE International Conference on Communications, pp. 1130–1135, IEEE 2007.
On the malware spreading over non-propagative wireless Ad Hoc networks: The attacker's perspective Proceedings Article
In: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, pp. 156–159, 2007.
On the asymptotic behavior of malware-propagative mobile ad hoc networks Proceedings Article
In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–9, IEEE 2007.
Social measures and flexible navigation on online contact networks Conference
2007, (cited By 3).
Towards the construction of a global bibliometric indicator Conference
2007, (cited By 0).
On the asymptotic behavior of malware-propagative mobile ad hoc networks Conference
Pisa, 2007, ISBN: 1424414555; 9781424414550, (cited By 3; Conference of 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS ; Conference Date: 8 October 2007 Through 11 October 2007; Conference Code:73246).
On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference
Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).
On the risk-based operation of mobile attacks in wireless ad hoc networks Conference
Glasgow, Scotland, 2007, ISSN: 05361486, (cited By 3; Conference of 2007 IEEE International Conference on Communications, ICC'07 ; Conference Date: 24 June 2007 Through 28 June 2007; Conference Code:71262).
2006
Governance options for strategic technology alliances in value Webs Conference
vol. 6, 2006, (cited By 3).
On the characterization and evaluation of mobile attack strategies in wireless ad hoc networks Proceedings Article
In: 11th IEEE Symposium on Computers and Communications (ISCC'06), pp. 29–34, IEEE 2006.
Modeling framework for the study and analysis of mobile attack propagation in wireless ad-hoc networks Proceedings Article
In: 12th European Wireless Conference 2006-Enabling Technologies for Wireless Multimedia Communications, pp. 1–6, VDE 2006.
2006, (cited By 2).
Institute of Electrical and Electronics Engineers Inc., 2006, ISBN: 9783800729616, (cited By 1; Conference of 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006 ; Conference Date: 2 April 2006 Through 5 April 2006; Conference Code:114330).
On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks Conference
Institute of Electrical and Electronics Engineers Inc., Cagliari, Sardinia, 2006, ISSN: 15301346, (cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930).
A design theory for pervasive information systems Proceedings Article
In: The 3rd International Workshop on Ubiquitous Computing, pp. 62–70, SCITEPRESS 2006.
2005
Towards’ smarter’Supply and Demand-Chain Collaboration Practices Enabled by RFID Technology Proceedings Article
In: Consumer Driven Electronic Transformation: Applying New Technologies to Enthuse Consumers and Transform the Supply Chain, pp. 241–256, Springer Berlin Heidelberg 2005.
Shopping in the 21 st Century: Embedding Technology in the Retail Arena Proceedings Article
In: Consumer Driven Electronic Transformation: Applying New Technologies to Enthuse Consumers and Transform the Supply Chain, pp. 227–239, Springer Berlin Heidelberg 2005.
2004
Intelligence in the Supply Chain: Current Status and Adoption Prospects of RFID in the Greek Market Proceedings Article
In: 8th National Congress on Logistics, 2004.
2003
Systems architecture for pervasive retail Proceedings Article
In: Proceedings of the 2003 ACM symposium on Applied Computing, pp. 631–636, 2003.
Developing the user experience in ubiquituous commerce Proceedings Article
In: Workshop on Ubiquitous Commerce, International Conference on Ubiquitous Computing (UBICOMP’03), pp. 1–4, 2003.
Distributed Information Systems Development For Consumer Market Proceedings Article
In: IEEE AIS'03 conference September 3-10, 2003, Divnomorskoe, Russia, pp. volume–3, IEEE/Phismathlit, Moscow 2003.
2002
ecomp: An architecture that supports p2p networking among ubiquitous computing devices Proceedings Article
In: Peer-to-Peer Computing, 2002.(P2P 2002). Proceedings. Second International Conference on, pp. 57–64, IEEE 2002.
A case study in pervasive retail Proceedings Article
In: Proceedings of the 2nd international workshop on Mobile commerce, pp. 90–94, 2002.
Business-to-employee cooperation support through online job interviews Conference
vol. 2002-January, 2002, (cited By 7).
Improving the Retail Grocery Supply Chain through Mobile Shopping of Electronically Referenced Products Proceedings Article
In: 15th Bled eCommerce Conference, pp. 263–278, 2002.
Auctioning tourism products over mobile devices Proceedings Article
In: Proceedings of the 1st International Conference on Mobile Commerce, 2002.
Intelligent tagging and automatic home replenishment schemes: The MyGrocer innovative business and technology framework Proceedings Article
In: International Conference on New Technologies and Strategies to Enhance Packaging Supply Chains, 2002.
A case study in ubiquitous retail Proceedings Article
In: ACM MOBICOM Second International Workshop in Mobile Commerce, pp. 90–94, 2002.
A Case Study in Pervasive Retail Proceedings Article
In: Proceedings of the... ACM International Workshop on Mobile Commerce, pp. 90, ACM Press 2002.
Intelligent cokes and diapers: MyGrocer ubiquitous computing environment Proceedings Article
In: First International Mobile Business Conference, pp. 150–172, 2002.
2001
Redesigning the traditional retail value chain: MyGROCER Innovative Business and Technology Framework Proceedings Article
In: Proc. eBusiness & eWorks Conference, Venice, Italy, 2001.
Grocery Supply-Chain Management: MyGROCER innovative business and technology framework Proceedings Article
In: the Proceedings of the 17th International Logistics Congress on Logistics from A to `U: Strategies and Applications, Thessaloniki, Greece, pp. 264–273, 2001.
0000
A Case Study in Pervasive Retail. En Marisa-S. Viveros et al. editors Proceedings Article
In: Proc. of the Workshop Mobile Commerce, pp. 90–94, 0000.