Spyros Sioutas

Spyros Sioutas
Ionian University | IONIO · Department of Informatics

Diplom Comp.Eng., MSc, Mphil, PhD

About

236
Publications
45,909
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,503
Citations
Citations since 2017
89 Research Items
911 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Introduction

Publications

Publications (236)
Preprint
Full-text available
Mobile health applications are steadily gaining momentum in the modern world given the omnipresence of various mobile or WiFi connections. Given that the bandwidth of these connections increases over time, especially in conjunction with advanced modulation and error-correction codes, whereas the latency drops, the cooperation between mobile applica...
Preprint
Full-text available
Blockchain is a linearly linked, distributed, and very robust data structure. Originally proposed as part of the Bitcoin distributed stack, it found a number of applications in a number of fields, most notably in smart contracts, social media, secure IoT, and cryptocurrency mining. It ensures data integrity by distributing strongly encrypted data i...
Article
Full-text available
The rapid emergence of low-power embedded devices and modern machine learning (ML) algorithms has created a new Internet of Things (IoT) era where lightweight ML frameworks such as TinyML have created new opportunities for ML algorithms running within edge devices. In particular, the TinyML framework in such devices aims to deliver reduced latency,...
Conference Paper
Full-text available
Social media have become the main platforms for expressing and supplementing nuanced human activity such as engaging in public and private conversations, creating and sharing multimedia content, participating to digital culture events, and recently describing emotions about events, places, or even products. In this survey, we provide a comprehensiv...
Conference Paper
Full-text available
Speech processing, the field of analysing input speech signals and methods of processing them has emerged in the recent days. Additionally, the development of a speech processing system involves several components in the design phase with probabilistic approximations for enhanced audio sampling and de-noising. In this work, we focus into the use of...
Chapter
Full-text available
Drones are intelligent devices that offer solutions for a continuously expanding variety of applications. Therefore, there would be a significant improvement if these systems could explore space automatically and without human-supervision. This work integrates cutting-edge artificial intelligence techniques that allow drones to travel independently...
Chapter
Full-text available
Query optimization is a crucial process across data mining and big data analytics. As the size of the data in the modern applications is increasing due to various sources, types and multi-modal records across databases, there is an urge to optimize lookup and search operations. Therefore, indexes can be utilized to solve the matter of rapid data gr...
Conference Paper
Full-text available
Emotion detection is crucial in many IoT deployments from an operational perspective with examples ranging from digital health to smart cities. This is particularly true in smart homes where the interaction between the local IoT ecosystem and the inhabitants are continuous, pervasive, and nuanced. More specifically, emotion estimation from human sp...
Chapter
Full-text available
One of the biggest problems the public sector faces is the proper utilization of human resources. Within a particular combination of practices, dynamic resource allocation management aims to increase employee productivity. The question that arises is how to match the abilities of employees on a measurable scale through their connection with the log...
Conference Paper
In distributed interactive application ecosystems, service provision and availability are key factors for the end user's perceived quality. Therefore, the location of any server facility is important from the provider's standpoint for efficient capital expenditure. Given the dynamicity of such environments (e.g., due to traffic load variance over t...
Conference Paper
Full-text available
In this paper, the concepts and techniques for global graph clustering are examined, or the process of locating related clusters of vertices within a graph. We introduce the construction of a graph clustering technique based on an eigenvector embedding and a local graph clustering method based on stochastic exploration of the graph. Then, the devel...
Conference Paper
Full-text available
In the modern era of Internet of Things (IoT) and Industry 4.0 there is a growing need for intelligent microcontrollers that can collect, sense and analyse data effectively and efficiently. Such devices can be installed in large scale IoT deployments ranging from smart homes to smart cities and smart buildings. The aim of these devices shall be not...
Conference Paper
Full-text available
Federated Learning (FL) is an emerging technique that assures user privacy and data integrity in distributed machine learning environments. To perform so, chunks of data are trained across edge devices and a high performance cluster server maintains a local copy without exchanging it with other parties. In this work, we investigate a FL scenario in...
Conference Paper
Full-text available
Big data management methods are paramount in the modern era as applications tend to create massive amounts of data that comes from various sources. Therefore, there is an urge to create adaptive, speedy and robust frameworks that can effectively handle massive datasets. Distributed environments such as Apache Spark are of note, as they can handle s...
Conference Paper
Full-text available
Data streams are becoming increasingly important across a wide array of fields and are generally expected to be the preferred form of big data as aggregators and smart stream analytics in general can efficiently yield stream descriptions in various levels. Among them, event detection analytics are paramount since they typically allow the identifica...
Conference Paper
Full-text available
Social media are widely considered as reflecting to a great extent human behavior including thoughts, emotions, as well as reactions to events. Consequently social media analysis relies heavily on examining the interaction between accounts. This work departs from this established viewpoint by treating the online activity as a result of the diffusio...
Chapter
Full-text available
Pure peer-to-peer networks serve to secure information in a decentralized, distributed topology. The multi-armed bandit (MAB) problem formulation proves to be a useful tool for analyzing the problem of optimizing new peer connections. In this paper, we outline the new peer scenario described as a reinforcement learning problem with MABs in order to...
Chapter
Full-text available
The employment of various language modelling techniques in the area of information retrieval is gaining wide adoption in the state of the art methods. The precision of the language model enables the solution of the issue of information retrieval in a huge corpus of texts. To accomplish this, these techniques begin by estimating a probabilistic ling...
Chapter
In the dairy industry farming as well as transportation conditions are paramount to product quality and to the overall supply chain resiliency. However, modern farms are complex installations with a broad spectrum of factors such as atmospheric conditions, including rain and humidity, ground composition, and highly irregular animal motion making di...
Chapter
Full-text available
Markov Chain Monte Carlo techniques are used to generate samples that closely approximate a given multivariate probability distribution, with the function not having to be normalised in the case of certain algorithms such as Metropolis-Hastings. As with other Monte Carlo techniques, MCMC employs repeated random sampling to exploit the law of large...
Chapter
Full-text available
Monte Carlo simulations using Markov chains as the Gibbs sampler and Metropolis algorithm are widely used techniques for modelling stochastic problems for decision making. Like all other Monte Carlo approaches, MCMC exploits the law of large numbers via repeated random sampling. Samples are formed by running a Markov Chain that is constructed in su...
Chapter
Domestic appliance power consumption measurement was, until recently, a problem without a satisfying solution. It required the use of a measuring device for each appliance to be studied, and thus the spending of a considerable amount of both money and time. The technological advancements made in the past few decades have enabled the engineering of...
Chapter
Non-Intrusive Load Monitoring (NILM) or Energy disaggregation may be the holy grail of energy efficiency. The impact of energy disaggregation at the commercial level of home customers is the increased utility customer engagement and the reduced energy usage. The goal at this level is to itemize the consumer’s energy bill, analyze the energy usage a...
Chapter
Full-text available
Consensus protocols constitute an important part in virtually any blockchain stack as they safeguard transaction validity and uniqueness. This task is achieved in a distributed manner by delegating it to certain nodes which, depending on the protocol, may further utilize the computational resources of other nodes. As a tangible incentive for nodes...
Article
Full-text available
Tailored analytics play a key role in the successful delivery of cultural content to huge and diverse groups. Primarily the latter depends on a number of information retrieval factors determining user experience quality, most prominently precision, recall, and timing. These imply that cultural analytics should be designed with strong predictive pow...
Conference Paper
Full-text available
Consensus protocols constitute an important part in virtually any blockchain stack as they safeguard transaction validity and uniqueness. This task is achieved in a distributed manner by delegating it to certain nodes which, depending on the protocol, may further utilize the computational resources of other nodes. As a tangible incentive for nodes...
Article
Full-text available
In this work, we propose D3-Tree, a dynamic distributed deterministic structure for data management in decentralized networks, by engineering and extending an existing decentralized structure. Conducting an extensive experimental study, we verify that the implemented structure outperforms other well-known hierarchical tree-based structures since it...
Preprint
Full-text available
Big data streams are possibly one of the most essential underlying notions. However, data streams are often challenging to handle owing to their rapid pace and limited information lifetime. It is difficult to collect and communicate stream samples while storing, transmitting and computing a function across the whole stream or even a large segment o...
Conference Paper
Full-text available
At the dawn of the Internet era graph analytics play an important role in high-and low-level network policymaking across a wide array of fields so diverse as transportation network design, supply chain engineering and logistics, social media analysis, and computer communication networks, to name just a few. This can be attributed not only to the si...
Conference Paper
Full-text available
Social graphs abound with information which can be harnessed for numerous behavioral purposes including online political campaigns, digital marketing operations such as brand loyalty assessment and opinion mining, and determining public sentiment regarding an event. In such scenarios the efficiency of the deployed methods depends critically on thre...
Article
Full-text available
The problem of energy disaggregation is the separation of an aggregate energy signal into the consumption of individual appliances in a household. This is useful, since the goal of energy efficiency at the household level can be achieved through energy-saving policies towards changing the behavior of the consumers. This requires as a prerequisite t...
Conference Paper
Full-text available
Process mining is the art and science of (semi)automatically generating business processes from a large number of logs coming from potentially heterogeneous systems. With the recent advent of Industry 4.0 analog enterprise environments such as floor shops and long supply chains are bound to full digitization. In this context interest in process min...
Conference Paper
Full-text available
Digital repositories and cultural content delivery systems built on top of them are integral parts in the current form of cultural landscape. In these systems netizen engagement is paramount and it can take many forms ranging from participation to digital fora to custom multimedia creation. One important engagement manifestation is the annotation o...
Conference Paper
Full-text available
Database deployment is a complex task depending on a multitude of operational parameters such as anticipated data scaling trends, expected type and volume of queries, uptime requirements, replication policies, available budget, and personnel training and experience. Thus, enterprise database administrators eventually rely on various performance met...
Article
Full-text available
Does a tweet with specific emotional content posted by an influential account have the capability to shape or even completely alter the opinions of its readers? Moreover, can other influential accounts further enhance its original emotional potential by retweeting it and, thus, letting their followers read it? Real Twitter conversations seem to imp...
Conference Paper
Full-text available
Graph neural networks (GNNs) is an emerging class of iterative connectionist models taking full advantage of the interaction patterns in an underlying domain. Depending on their configuration GNNs aggregate local state information to obtain robust estimates of global properties. Since graphs inherently represent high dimensional data, GNNs can effe...
Conference Paper
Full-text available
Substantial empirical evidence, including the success of synthetic graph generation models as well as of analytical methodologies, suggests that large, real graphs have a recursive community structure. The latter results, in part at least, in other important properties of these graphs such as low diameter, high clustering coefficient values, heavy...
Conference Paper
Full-text available
Technologies such as cloud computing and big datamanagement, have lately made significant progress creating anurgent need for specific databases that can safely store extensivedata along with high availability. Specifically, an evergrowingamount of companies have put to use a multitude of non-relational databases, typically known as NoSQL databases...
Chapter
Full-text available
Self organizing maps (SOMs) are neural networks designed to be in an unsupervised way to create connections, learned through a modified Hebbian rule, between a high- (the input vector space) and a low-dimensional space (the cognitive map) based solely on distances in the input vector space. Moreover, the cognitive map is segmentwise continuous and...
Conference Paper
Full-text available
Recommender systems are mechanisms that filter information in order to predict the preference of a user for an item drawn from a finite collection. Prime examples include recommendation platforms for movies, games, travel destinations, and books. Such systems rely on identifying users with similar preferences, as indicated by an appropriately selec...
Chapter
In this work, we survey state of the art hierarchical distributed data structures for the efficient handling of big data, in scenarios where the dominant operation is range queries which have to be answered in real-time. Our main focus is on structures that exhibit stable scalability.
Article
Full-text available
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection. The k-anonymity is considered a key solution that has been widely employed to prevent data re-identifcation and concerns us in the cont...
Article
We present efficient fully persistent B-trees in the I/O model with block size B that support range searches on t reported elements at any accessed version of size n in O(logB⁡n+t/B) I/Os and updates at any accessed version in O(logB⁡n+log2⁡B) amortized I/Os, using O(m/B) disk blocks after m updates. This improves both the query and update I/O-effi...
Conference Paper
Full-text available
Self organizing maps (SOMs) are neural networks designed to be in an unsupervised way to create connections, learned through a modified Hebbian rule, between a high-(the input vector space) and a low-dimensional space (the cognitive map) based solely on distances in the input vector space. Moreover, the cognitive map is segmentwise continuous and p...
Article
The skyline of a set P of points consists of the “best” points with respect to minimization or maximization of the attribute values. A point p dominates another point q if p is as good as q in all dimensions and it is strictly better than q in at least one dimension. In this work, we focus on the 2-d space and provide expected performance guarantee...
Chapter
Full-text available
Mobile health applications are steadily gaining momentum in the modern world given the omnipresence of various mobile or Wi-Fi connections. Given that the bandwidth of these connections increases over time, especially in conjunction with advanced modulation and error-correction codes, whereas the latency drops, the cooperation between mobile applic...
Conference Paper
How online cultural content is chosen based on conscious or subconscious criteria is an central question across a broad spectrum of sciences and for the entertainment industry, including content providers and distributors. To this end, a number of tailored analytics forming the backbone of recommendation engines specialized for retrieving cultural...
Article
Metadata-based similarity measurement is far from obsolete nowadays, despite research's focus on content and context based information. It allows for aggregating information from textual references, measuring similarity when content is not available, traditional keyword search in search engines, merging results in meta-search engines, etc. Existing...
Article
Content Management Systems (CMSs) play an increasingly important role in the evolution of the World Wide Web, since almost half of the websites today use some form of CMS as their main development platform. CMSs provide development teams with standardized software platforms that significantly facilitate and speed up Web development, while maintaini...
Article
Full-text available
The availability of numerical data grows from 1 day to another in a remarkable way. New technologies of high-throughput Next-Generation Sequencing (NGS) are producing DNA sequences. Next-Generation Sequencing describes a DNA sequencing technology which has revolutionized genomic research. In this paper, we perform some experiments using a cloud inf...
Chapter
Full-text available
Blockchain is a linearly linked, distributed, and very robust data structure. Originally proposed as part of the Bitcoin distributed stack, it can be applied in a number of fields, most notably in smart contracts, social media, secure IoT, and cryptocurrency mining. It ensures data integrity by distributing strongly encrypted data in widely redunda...
Article
Full-text available
The need to store massive volumes of spatio-temporal data has become a difficult task as GPS capabilities and wireless communication technologies have become prevalent to modern mobile devices. As a result, massive trajectory data are produced, incurring expensive costs for storage, transmission, as well as query processing. A number of algorithms...
Article
A new dynamic Interpolation Search (IS) data structure is presented that achieves O(log⁡log⁡n) search time with high probability on unknown continuous or even discrete input distributions with measurable probability of element collisions, including power law and Binomial distributions. No such previous result holds for IS when the probability of el...
Article
Full-text available
Imagine that we have a highly competing virus that is spreading over a (e.g., social) network where users have different sensitivity/interest against it. A virus may be anything that has a “spreading” behavior such as a rumor, a social media trend or even an infectious disease. Is it possible to predict the outcome in such a viral phenomenon and co...
Article
Full-text available
In the original publication, part figures were incorrectly positioned in Figure 2. The correct figure is given below.
Conference Paper
Full-text available
Non-linear system identification is a challenging problem with a plethora of engineering applications including digital telecommunications, adaptive control of biological systems , assessing integrity of mechanical constructs, and geological surveys. Various approaches have been proposed in the scientific literature, including Volterra and multivar...
Chapter
The availability of numerical data grows from one day to another in a remarkable way. New technologies of high-throughput Next Generation Sequencing (NGS) are producing DNA sequences. Next Generation Sequencing describes a DNA sequencing technology which has revolutionised genomic research. In this paper, we perform some experiments using a cloud i...
Conference Paper
Full-text available
Fibonacci numbers appear in numerous engineering and computing applications including population growth models, software engineering, task management, and data structure analysis. This mandates a computationally efficient way for generating a long sequence of successive Fibonacci integers. With the advent of GPU computing and the associated special...
Article
Full-text available
In the context of this research work, we studied the problem of privacy preserving on spatiotemporal databases. In particular, we investigated the k-anonymity of mobile users based on real trajectory data. The k-anonymity set consists of the k nearest neighbors. We constructed a motion vector of the form (x,y,g,v) where x and y are the spatial coor...
Article
Full-text available
Deep Learning has dramatically advanced the state of the art in vision, speech and many other areas. Recently, numerous deep learning algorithms have been proposed to solve traditional artificial intelligence problems. In this paper, in order to detect the version that can provide the best trade-off in terms of time and accuracy, convolutional netw...
Chapter
Full-text available
Blockchain is a linearly linked, distributed, and very robust data structure. Originally proposed as part of the Bitcoin distributed stack, it found a number of applications in a number of fields, most notably in smart contracts, social media, secure IoT, and cryptocurrency mining. It ensures data integrity by distributing strongly en-crypted data...
Chapter
Full-text available
Mobile health applications are steadily gaining momentum in the modern world given the omnipresence of various mobile or WiFi connections. Given that the bandwidth of these connections increases over time, especially in conjunction with advanced modulation and error-correction codes, whereas the latency drops, the cooperation between mobile applica...
Conference Paper
Metadata-based similarity measurement is far from obsolete in our days, despite research's focus on content and context. It allows for aggregating information from textual references, measuring similarity when content is not available, traditional keyword search in search engines, merging results in meta-search engines and many more research and in...
Conference Paper
Full-text available
Over the last decade, the vast explosion of Internet data has fueled the development of Big Data management systems and technologies. The huge amount of data in combination with the need for records linkage under privacy perspective, has led us to current study. To this direction, we describe Privacy Preserving Record Linkage problem based on Bloom...