Petros Belsis

Orcid: 0000-0002-2632-4391

According to our database1, Petros Belsis authored at least 40 papers between 2004 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Helping visually impaired people use smart phones in education: content retrieval with fingerprint identification.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

2014
PBURC: a patterns-based, unsupervised requirements clustering framework for distributed agile software development.
Requir. Eng., 2014

A k-anonymity privacy-preserving approach in wireless medical monitoring environments.
Pers. Ubiquitous Comput., 2014

Admission Control of Video Sessions over Ad Hoc Networks Using Neural Classifiers.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
A Wireless System for Secure Electronic Healthcare Records Management.
Int. J. Adv. Pervasive Ubiquitous Comput., 2013

NFC-triggered IMS flow mobility across different devices.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Secure mobile assessment of deaf and hard-of-hearing and dyslexic students in higher education.
Proceedings of the 17th Panhellenic Conference on Informatics, 2013

Towards effective organization of medical data.
Proceedings of the 17th Panhellenic Conference on Informatics, 2013

2012
User-Directed, Cluster-Based Retrieval for Large Document Collections in Highly Parallel Environments.
Int. J. Comput. Their Appl., 2012

An Ad Hoc-Based ERP for Medical Treatment Provision in Crisis Conditions.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Secure Management of Medical Data in Wireless Environments.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Challenges and Solutions in Electronic Patient Records Management Using Wireless Sensor Networks.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Applying Soft Computing Technologies for Implementing Privacy-Aware Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

2011
Identifying and utilizing secure paths in <i>ad hoc</i> assistive medical environments.
Secur. Commun. Networks, 2011

Secure Electronic Healthcare Records Management in Wireless Environments.
J. Inf. Technol. Res., 2011

A soft computing approach for privacy requirements engineering: The PriS framework.
Appl. Soft Comput., 2011

Design for all: towards a social platform for integrating distributed open-access repositories.
Proceedings of the PETRA 2011, 2011

Protecting anonymity in wireless medical monitoring environments.
Proceedings of the PETRA 2011, 2011

2010
Providing advanced remote medical treatment services through pervasive environments.
Pers. Ubiquitous Comput., 2010

2009
End to end secure communication in ad-hoc assistive medical environments using secure paths.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

A wireless distributed framework for supporting assistive learning environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

A scheme for on-site service provision in pervasive assistive environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

2008
Interactive Cluster-Based Personalized Retrieval on Large Document Collections.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
J. Comput. Secur., 2008

A pervasive architectural framework for providing remote medical treatment.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

Secure dissemination of electronic healthcare records in distributed wireless environments.
Proceedings of the eHealth Beyond the Horizon, 2008

2007
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.
Proceedings of the Trust, 2007

Fuzzy Interval Number (FIN) Techniques for Multilingual and Cross Language Information Retrieval.
Proceedings of the ICEIS 2007, 2007

Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments.
Proceedings of the Advances in Computer Science, 2007

2006
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Optimized Multi-Domain Secure Interoperation using Soft Constraints.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

2005
Information systems security from a knowledge management perspective.
Inf. Manag. Comput. Security, 2005

Deploying pervasive secure knowledge management infrastructures.
Int. J. Pervasive Comput. Commun., 2005

Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains.
Proceedings of the Trust, 2005

Pervasive Secure Electronic Healthcare Records Management.
Proceedings of the Ubiquitous Computing, 2005

Secure and distributed knowledge management in pervasive environments.
Proceedings of the International Conference on Pervasive Services 2005, 2005

2004
Enhancing Knowledge Management Through the Use of GIS and Multimedia.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004

Implementing Knowledge Management Techniques for Security Purposes.
Proceedings of the ICEIS 2004, 2004


  Loading...