2010
Markov Random Fields for malware propagation: The case of chain networks Journal Article
In: IEEE Communications Letters, vol. 14, no. 9, pp. 875-877, 2010, ISSN: 10897798, (cited By 13).
Socially-inspired topology improvements in wireless multi-hop networks Conference
Capetown, 2010, ISBN: 9781424468263, (cited By 9; Conference of 2010 IEEE International Conference on Communications Workshops, ICC 2010 ; Conference Date: 23 May 2010 Through 27 May 2010; Conference Code:81220).
On topology control and non-uniform node deployment in ad hoc networks Conference
Mannheim, 2010, ISBN: 9781424466054, (cited By 2; Conference of 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010 ; Conference Date: 29 March 2010 Through 2 April 2010; Conference Code:80840).
IEEE Computer Society, 2010, ISBN: 9781424488650, (cited By 2; Conference of 2010 IEEE Globecom Workshops, GC 2010 ; Conference Date: 5 December 2010 Through 10 December 2010; Conference Code:83878).
Delineating ‘pervasiveness’ in pervasive information systems: a taxonomical framework and design implications Journal Article
In: Journal of Information Technology, vol. 25, no. 3, pp. 273–287, 2010.
2009
Understanding the adoption of mobile data services: Differences among mobile portal and mobile internet users Proceedings Article
In: 2009 Eighth International Conference on Mobile Business, pp. 12–17, IEEE 2009.
A stochastic model using self-organization to explore the ICT Industry evolution Conference
2009, (cited By 1).
vol. 530, 2009, (cited By 0).
Active Citizenship methods of promoting in adult education Miscellaneous
2009.
Decision making on governance of strategic technology alliances Journal Article
In: Management Decision, vol. 47, no. 2, pp. 246-270, 2009, (cited By 24).
Cooperative wireless communications Journal Article
In: 2009.
Towards a validated construct for information systems pervasiveness: An exploratory assessment Journal Article
In: BLED 2009 proceedings, pp. 12, 2009.
On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in Ad Hoc and Sensor Networks Proceedings Article
In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 255–261, IEEE 2009.
8 Topology Control in Cooperative Wireless Ad Hoc Networks Journal Article
In: Cooperative Wireless Communications, pp. 167, 2009.
Mediated versus direct access to mobile data services: adoption patterns in Greece Proceedings Article
In: 8th Global Mobility Roundtable, 2009.
Topology-Aware Hybrid Random Walk Protocols for Wireless Multihop Networks Proceedings Article
In: International Conference on Mobile Networks and Management, pp. 107–118, Springer, Berlin, Heidelberg 2009.
RFID-integrated retail supply chain services: Lessons learnt from the SMART project Journal Article
In: 2009.
Demystifying self-awareness of autonomic systems Journal Article
In: ICT Mobile Summit, Santander, Spain, 10-12 June 2009, 2009.
Analytic stochastic propagation model for urban streets Journal Article
In: IET Microwaves, Antennas and Propagation, vol. 4, no. 1, pp. 91-98, 2009, ISSN: 17518725, (cited By 3).
Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).
Topology Control in Cooperative Wireless Ad Hoc Networks Book
CRC Press, 2009, ISBN: 9781420064704; 9781420064698, (cited By 4).
2008
Delineating the degree of'pervasiveness' in pervasive information systems: an assessment framework and design implications Proceedings Article
In: 2008 Panhellenic Conference on Informatics, pp. 251–255, IEEE 2008.
Corfunet: A mesh network providing wireless services at metropolitan level Conference
2008, (cited By 0).
Malware-propagative mobile ad hoc networks: asymptotic behavior analysis Journal Article
In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389–399, 2008.
An opportunistic combined power and rate allocation approach in CDMA ad hoc networks Proceedings Article
In: 2008 IEEE Sarnoff symposium, pp. 1–5, IEEE 2008.
On the problem of joint power and rate control in CDMA ad hoc networks Proceedings Article
In: 2008 3rd International Symposium on Wireless Pervasive Computing, pp. 78–82, IEEE 2008.
Stochastic ray propagation for two parallel urban streets: Exact and approximate results Journal Article
In: IEEE Antennas and Wireless Propagation Letters, vol. 7, pp. 381–384, 2008.
移动自组网的恶意软件传播: 渐进行为分析 Journal Article
In: 计算机科学技术学报, vol. 23, no. 3, pp. 389–399, 2008.
Determinants of User Acceptance for RFID Ticketing Systems Book Section
In: Advances in Ubiquitous Computing: Future Paradigms and Directions, pp. 150–170, IGI Global, 2008.
The impact of readability on the usefulness of online product reviews: A case study on an online bookstore Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5288 LNAI, pp. 423-432, 2008, (cited By 33).
Stochastic ray propagation for two parallel urban streets: Exact and approximate results Journal Article
In: IEEE Antennas and Wireless Propagation Letters, vol. 7, pp. 381-384, 2008, ISSN: 15361225, (cited By 1).
On the problem of joint power and rate control in CDMA ad hoc networks Conference
Santorini, 2008, ISBN: 9781424416530, (cited By 1; Conference of 3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008 ; Conference Date: 7 May 2008 Through 9 May 2008; Conference Code:73424).
An opportunistic combined power and rate allocation approach in CDMA ad hoc networks Conference
Princeton, NJ, 2008, ISBN: 1424418437; 9781424418435, (cited By 3; Conference of 2008 IEEE Sarnoff Symposium, SARNOFF ; Conference Date: 28 April 2008 Through 30 April 2008; Conference Code:72891).
Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis Journal Article
In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389-399, 2008, ISSN: 10009000, (cited By 25).
Pervasive information systems Miscellaneous
2008.
2007
An interdisciplinary research framework to investigate electronic business models Book
2007, (cited By 0).
Governance contingencies for strategic technology alliances: A case in wireless business Journal Article
In: International Journal of Technology Management, vol. 40, no. 4, pp. 310-329, 2007, (cited By 4).
User acceptance of pervasive information systems: Evaluating an RFID ticketing system Journal Article
In: 2007.
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Journal Article
In: Computer Networks, vol. 51, no. 9, pp. 2397–2410, 2007.
On the risk-based operation of mobile attacks in wireless ad hoc networks Proceedings Article
In: 2007 IEEE International Conference on Communications, pp. 1130–1135, IEEE 2007.
A closed queueing network model for malware spreading over non-propagative Ad Hoc networks Journal Article
In: Proc. Mediterranean Ad Hoc Netw, pp. 129–136, 2007.
Mobile and wireless positioning technologies Journal Article
In: Telecommunication Systems and Technologies, UNESCO Encyclopedia of Life Support Systems (EOLSS), EOLSS Publishers Co Ltd, vol. 6, 2007.
On the malware spreading over non-propagative wireless Ad Hoc networks: The attacker's perspective Proceedings Article
In: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, pp. 156–159, 2007.
On the asymptotic behavior of malware-propagative mobile ad hoc networks Proceedings Article
In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–9, IEEE 2007.
Social network models for enhancing reference-based search engine rankings Book
2007, (cited By 1).
Social measures and flexible navigation on online contact networks Conference
2007, (cited By 3).
Social metadata for the impact factor Journal Article
In: Electronic Library, vol. 25, no. 2, pp. 166-175, 2007, (cited By 0).
Towards the construction of a global bibliometric indicator Conference
2007, (cited By 0).
On the asymptotic behavior of malware-propagative mobile ad hoc networks Conference
Pisa, 2007, ISBN: 1424414555; 9781424414550, (cited By 3; Conference of 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS ; Conference Date: 8 October 2007 Through 11 October 2007; Conference Code:73246).
On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference
Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).
On the risk-based operation of mobile attacks in wireless ad hoc networks Conference
Glasgow, Scotland, 2007, ISSN: 05361486, (cited By 3; Conference of 2007 IEEE International Conference on Communications, ICC'07 ; Conference Date: 24 June 2007 Through 28 June 2007; Conference Code:71262).
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Journal Article
In: Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007, ISSN: 13891286, (cited By 7).
Enhancing user experience through pervasive information systems: The case of pervasive retailing Journal Article
In: International Journal of Information Management, vol. 27, no. 5, pp. 319–335, 2007.
2006
Governance options for strategic technology alliances in value Webs Conference
vol. 6, 2006, (cited By 3).
Wireless value-added services in exhibition shows Journal Article
In: International Journal of Mobile Communications, vol. 4, no. 2, pp. 193-209, 2006, (cited By 6).
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks Journal Article
In: International Journal of Security and Networks, vol. 1, no. 3-4, pp. 255–265, 2006.
On the characterization and evaluation of mobile attack strategies in wireless ad hoc networks Proceedings Article
In: 11th IEEE Symposium on Computers and Communications (ISCC'06), pp. 29–34, IEEE 2006.
Modeling framework for the study and analysis of mobile attack propagation in wireless ad-hoc networks Proceedings Article
In: 12th European Wireless Conference 2006-Enabling Technologies for Wireless Multimedia Communications, pp. 1–6, VDE 2006.
2006, (cited By 2).
Evaluating authoritative sources using social networks: An insight from Wikipedia Journal Article
In: Online Information Review, vol. 30, no. 3, pp. 252-262, 2006, (cited By 104).
Institute of Electrical and Electronics Engineers Inc., 2006, ISBN: 9783800729616, (cited By 1; Conference of 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006 ; Conference Date: 2 April 2006 Through 5 April 2006; Conference Code:114330).
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks Journal Article
In: International Journal of Security and Networks, vol. 1, no. 3-4, pp. 255-265, 2006, ISSN: 17478405, (cited By 24).
On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks Conference
Institute of Electrical and Electronics Engineers Inc., Cagliari, Sardinia, 2006, ISSN: 15301346, (cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930).
The design of pervasive retail experiences Journal Article
In: Ubiquitous and Pervasive Commerce: New Frontiers for Electronic Business, pp. 133–153, 2006.
A design theory for pervasive information systems Proceedings Article
In: The 3rd International Workshop on Ubiquitous Computing, pp. 62–70, SCITEPRESS 2006.
2005
Trial evaluation of wireless info-communication and indoor location-based services in exhibition shows Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3746 LNCS, pp. 199-210, 2005, (cited By 9).
Technology innovation-induced business model change: A contingency approach Journal Article
In: Journal of Organizational Change Management, vol. 18, no. 2, pp. 167-183, 2005, (cited By 121).
A Base Case Study of the Worm Propogation Problem in the Framework of Topology Control in Wireless Ad-hoc Networks PhD Thesis
School of Engineering and Applied Science, University of Pennsylvania, 2005.
A roadmap for research in mobile business Journal Article
In: International Journal of Mobile Communications, vol. 3, no. 4, pp. 350–373, 2005.
Towards’ smarter’Supply and Demand-Chain Collaboration Practices Enabled by RFID Technology Proceedings Article
In: Consumer Driven Electronic Transformation: Applying New Technologies to Enthuse Consumers and Transform the Supply Chain, pp. 241–256, Springer Berlin Heidelberg 2005.
Shopping in the 21 st Century: Embedding Technology in the Retail Arena Proceedings Article
In: Consumer Driven Electronic Transformation: Applying New Technologies to Enthuse Consumers and Transform the Supply Chain, pp. 227–239, Springer Berlin Heidelberg 2005.
2004
A research framework for analysing eBusiness models Journal Article
In: European Journal of Information Systems, vol. 13, no. 4, pp. 302-314, 2004, (cited By 260).
Intelligence in the Supply Chain: Current Status and Adoption Prospects of RFID in the Greek Market Proceedings Article
In: 8th National Congress on Logistics, 2004.
Ubiquitous commerce Journal Article
In: Ubiconf 2004, 2004.
2003
Systems architecture for pervasive retail Proceedings Article
In: Proceedings of the 2003 ACM symposium on Applied Computing, pp. 631–636, 2003.
Designing appliances for mobile commerce and retailtainment Journal Article
In: Personal and Ubiquitous Computing, vol. 7, pp. 203–209, 2003.
Can technology make shopping fun? Journal Article
In: International Commerce Review: ECR Journal, vol. 3, no. 2, pp. 37, 2003.
Developing the user experience in ubiquituous commerce Proceedings Article
In: Workshop on Ubiquitous Commerce, International Conference on Ubiquitous Computing (UBICOMP’03), pp. 1–4, 2003.
Distributed Information Systems Development For Consumer Market Proceedings Article
In: IEEE AIS'03 conference September 3-10, 2003, Divnomorskoe, Russia, pp. volume–3, IEEE/Phismathlit, Moscow 2003.
Mobile commerce Journal Article
In: BE Mennecke and TJ Strader, Editors, 2003.
Systems architecture for ubiquitous retail Journal Article
In: ACM SAC Track on E-Commerce, pp. 350–356, 2003.
Towards a classification framework for mobile location based services Book Section
In: Mobile commerce: technology, theory and applications, pp. 67–85, IGI Global, 2003.
Developing consumer-friendly pervasive retail systems Journal Article
In: IEEE Pervasive Computing, vol. 2, no. 02, pp. 32–39, 2003.
2002
ecomp: An architecture that supports p2p networking among ubiquitous computing devices Proceedings Article
In: Peer-to-Peer Computing, 2002.(P2P 2002). Proceedings. Second International Conference on, pp. 57–64, IEEE 2002.
A case study in pervasive retail Proceedings Article
In: Proceedings of the 2nd international workshop on Mobile commerce, pp. 90–94, 2002.
Business-to-employee cooperation support through online job interviews Conference
vol. 2002-January, 2002, (cited By 7).
Improving the Retail Grocery Supply Chain through Mobile Shopping of Electronically Referenced Products Proceedings Article
In: 15th Bled eCommerce Conference, pp. 263–278, 2002.
Auctioning tourism products over mobile devices Proceedings Article
In: Proceedings of the 1st International Conference on Mobile Commerce, 2002.
Intelligent tagging and automatic home replenishment schemes: The MyGrocer innovative business and technology framework Proceedings Article
In: International Conference on New Technologies and Strategies to Enhance Packaging Supply Chains, 2002.
A case study in ubiquitous retail Proceedings Article
In: ACM MOBICOM Second International Workshop in Mobile Commerce, pp. 90–94, 2002.
Mobile commerce: technology, theory, and applications Miscellaneous
2002.
Improving the retail grocery supply chain through mobile shopping of electronically referenced products Journal Article
In: 2002.
A Case Study in Pervasive Retail Proceedings Article
In: Proceedings of the... ACM International Workshop on Mobile Commerce, pp. 90, ACM Press 2002.
On the potential use of mobile positioning technologies in indoor environments Journal Article
In: BLED 2002 Proceedings, pp. 33, 2002.
Intelligent cokes and diapers: MyGrocer ubiquitous computing environment Proceedings Article
In: First International Mobile Business Conference, pp. 150–172, 2002.
2001
Challenges for Automatic Home Supply Replenishment in e-Retailing Journal Article
In: e-Commerce Frontiers, 2001.
Grocery Supply-Chain Management: MyGROCER innovative business and technology framework1." the e-Business Center Journal Article
In: Athens University of Economics & Business, Athens, Greece, pp. 5–9, 2001.
Redesigning the traditional retail value chain: MyGROCER Innovative Business and Technology Framework Proceedings Article
In: Proc. eBusiness & eWorks Conference, Venice, Italy, 2001.
Grocery Supply-Chain Management: MyGROCER innovative business and technology framework Proceedings Article
In: the Proceedings of the 17th International Logistics Congress on Logistics from A to `U: Strategies and Applications, Thessaloniki, Greece, pp. 264–273, 2001.