John Violos

John Violos

Doctor of Engineering

About

61
Publications
13,473
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
605
Citations

Publications

Publications (61)
Preprint
Full-text available
Energy efficiency of Convolutional Neural Networks (CNNs) has become an important area of research, with various strategies being developed to minimize the power consumption of these models. Previous efforts, including techniques like model pruning, quantization, and hardware optimization, have made significant strides in this direction. However, t...
Preprint
Full-text available
This paper discusses four facets of the Knowledge Distillation (KD) process for Convolutional Neural Networks (CNNs) and Vision Transformer (ViT) architectures, particularly when executed on edge devices with constrained processing capabilities. First, we conduct a comparative analysis of the KD process between CNNs and ViT architectures, aiming to...
Preprint
Full-text available
Conventional latency metrics are formulated based on a broad definition of traditional monolithic services, and hence lack the capacity to address the complexities inherent in modern services and distributed computing paradigms. Consequently, their effectiveness in identifying areas for improvement is restricted, falling short of providing a compre...
Article
Internet of Things (IoT) applications generate tremendous amounts of data streams which are characterized by varying Quality of Service (QoS) indicators. These indicators need to be accurately estimated in order to appropriately schedule the computational and communication resources of the access and Edge networks. Nonetheless, such types of IoT da...
Preprint
Full-text available
Anomaly Detection in multivariate time series is a major problem in many fields. Due to their nature, anomalies sparsely occur in real data, thus making the task of anomaly detection a challenging problem for classification algorithms to solve. Methods that are based on Deep Neural Networks such as LSTM, Autoencoders, Convolutional Autoencoders etc...
Preprint
Full-text available
The proliferation of demanding applications and edge computing establishes the need for an efficient management of the underlying computing infrastructures, urging the providers to rethink their operational methods. In this paper, we propose an Intelligent Proactive Fault Tolerance (IPFT) method that leverages the edge resource usage predictions th...
Article
Full-text available
The demands for a large number of sensors increase as the proliferation of Internet of Things (IoT) and smart cities applications are continuing at a rapid pace. This also increases the cost of the infrastructure and the installation and maintenance overhead and creates significant performance degradation in the end-to-end communication, monitoring...
Article
Full-text available
In this paper we examine different approaches for the prediction of Service Level Agreements (SLAs) violations that occur during the service provisioning between cloud customers and providers. Despite the fact that there are many network metrics that involve the server -client interaction, it is an open research question how these available metrics...
Article
Full-text available
Today’s organizations have been embracing digital transformation to boost the quality of living within IoT-based smart-sustainable environments (e.g., healthcare, factories, vehicles, etc.). At the same time, augmenting the network infrastructure surface with billions of new devices accommodating myriad applications creates the need for network aut...
Article
Full-text available
The proliferation of demanding applications and edge computing establishes the need for efficient management of the underlying computing infrastructures, urging the providers to rethink their operational methods. In this paper, we propose an Intelligent Proactive Fault Tolerance (IPFT) method that leverages the edge resource usage predictions throu...
Article
Multistep Human Density Prediction (MHDP) is an emerging challenge in urban mobility with lots of applications in several domains such as Smart Cities, Edge Computing and Epidemiology Modeling. The basic goal is to estimate the density of people gathered in a set of urban Regions of Interests (ROIs) or Points of Interests (POIs) in a forecast horiz...
Article
Internet of Things (IoT) devices generate a tremendous amount of time series data that is extremely dynamic, heterogeneous and time dependent. Such types of data introduce significant challenges for the real-time prediction of QoS metrics of IoT applications with different traffic characteristics. To this end, in this paper, we propose a temporal t...
Article
Edge computing is characterised by varying workload intensities that have a strong effect on applications’ performance and requirements in terms of resources. Thus, in order to maintain a sustainable performance a resource autoscaling mechanism that will automatically add or remove computational nodes is needed. This autoscaling mechanism must ensu...
Article
Full-text available
As the number of Internet of Things (IoT) devices and applications increases, the capacity of the IoT access networks is considerably stressed. This can create significant performance bottlenecks in various layers of an end-to-end communication path, including the scheduling of the spectrum, the resource requirements for processing the IoT data at...
Chapter
As the computational needs of edge infrastructures increased, efficient resource management becomes a necessity. An accurate prediction of future resource usage provides insight into dynamic task offloading, proactive auto-scaling, virtual machine migration, and workload balancing. In this paper we propose the use of multi-output one-dimensional co...
Article
Full-text available
Next generation communication networks are expected to accommodate a high number of new and resource-voracious applications that can be offered to a large range of end users. Even though end devices are becoming more powerful, the available local resources cannot cope with the requirements of these applications. This has created a new challenge cal...
Chapter
Full-text available
Cloud and Fog technologies are steadily gaining momentum and popularity in the research and industry circles. Both communities are wondering about the resource usage. The present work aims to predict the resource usage of a machine learning application in an edge environment, utilizing Raspberry Pies. It investigates various experimental setups and...
Article
Full-text available
A prominent challenge in our information age is the classification over high frequency data streams. In this research, we propose an innovative and high-accurate text stream classification model that is designed in an elastic distributed way and is capable to service text load with fluctuated frequency. In this classification model, text is represe...
Article
Full-text available
The deployment of a data-intensive application to a Cloud poses a number of serious challenges, mainly concerning the provider and resources selection process, based on the Quality of Service expected, as well as the management of the Virtual Machines in the provider premises. This work attempts to address those issues by providing a sophisticated...
Chapter
BASMATI aims at delivering an integrated platform that will support the dynamic needs of mobile applications and users through an end-to-end approach for cloud services. BASMATI will emphasize on enabling runtime adaptation of all assets, including user and application prediction models, federation patterns, resources and data management policies,...
Conference Paper
Edge computing has emerged as a solution that can accommodate complex application requirements by shifting data and computation to infrastructure elements that are more suitable to manage them given the current circumstances. The BASMATI Knowledge Extractor is a component that facilitates the modeling of the resource utilization by providing tools...
Conference Paper
The BASMATI architecture is designed to improve the service quality perceived by end-users. In particular, it focuses on the support of applications that offer services to mobile end-users, ranging from those crossing national borders to those roaming around locally and who both need access to widely dispersed cloud resources. To achieve this, the...
Research
Full-text available
The Word-Graph Sentiment Analysis Method is proposed to identify the sentiment that expressed in a microblog document using the sequence of the words that contains. The sequence of the words can be represented using graphs in which graph similarity metrics and classification algorithms can be applied to produce sentiment predictions. Experiments th...
Conference Paper
Full-text available
In this paper we illustrate an innovative clustering method of documents using the 3-Gram graphs representation model and deducing the problem of document clustering to graph partitioning. For the latter we employ the kernel k-means algorithm. We evaluated the proposed method using the Test Collections of Reuters-21578, and compared the results usi...

Network

Cited By