University of the Aegean
About: University of the Aegean is a(n) education organization based out in Mytilene, Greece. It is known for research contribution in the topic(s): Population & Tourism. The organization has 2818 authors who have published 8100 publication(s) receiving 179275 citation(s). The organization is also known as: UAEG.
Topics: Population, Tourism, European union, Information system, The Internet
Papers published on a yearly basis
Imperial College London1, University of Zurich2, University of Bayreuth3, Technical University of Lisbon4, University of the Aegean5, University College Cork6, Swedish University of Agricultural Sciences7, University of Basel8, École Normale Supérieure9, University of Sheffield10, Max Planck Society11
TL;DR: Niche complementarity and positive species interactions appear to play a role in generating diversity-productivity relationships within sites in addition to sampling from the species pool.
Abstract: At eight European field sites, the impact of loss of plant diversity on primary productivity was simulated by synthesizing grassland communities with different numbers of plant species. Results differed in detail at each location, but there was an overall log-linear reduction of average aboveground biomass with loss of species. For a given number of species, communities with fewer functional groups were less productive. These diversity effects occurred along with differences associated with species composition and geographic location. Niche complementarity and positive species interactions appear to play a role in generating diversity-productivity relationships within sites in addition to sampling from the species pool.
TL;DR: This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Abstract: The recent emergence of cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
TL;DR: The results suggest that a conceptually simplistic view is often adopted with regard to open data, which automatically correlates the publicizing of data with use and benefits, and five "myths" concerning open data are presented.
Abstract: Although a significant number of public organizations have embraced the idea of open data, many are still reluctant to do this. One root cause is that the publicizing of data represents a shift from a closed to an open system of governance, which has a significant impact upon the relationships between public agencies and the users of open data. Yet no systematic research is available which compares the benefits of an open data with the barriers to its adoption. Based on interviews and a workshop, the benefits and adoption barriers for open data have been derived. The findings show that a gap exists between the promised benefits and barriers. They furthermore suggest that a conceptually simplistic view is often adopted with regard to open data, one which automatically correlates the publicizing of data with use and benefits. Five ‘myths’ are formulated promoting the use of open data and placing the expectations within a realistic perspective. Further, the recommendation is given to take a user’s view and to actively govern the relationship between government and its users.
01 Mar 1998-Aquatic Geochemistry
TL;DR: In this article, a computationally efficient and rigorous thermodynamic model that predicts the physical state and composition of inorganic atmospheric aerosol is presented, where the main features of the model is the implementation of mutual deliquescence of multicomponent salt particles.
Abstract: A computationally efficient and rigorous thermodynamic model that predicts the physical state and composition of inorganic atmospheric aerosol is presented. One of the main features of the model is the implementation of mutual deliquescence of multicomponent salt particles, which lowers the deliquescence point of the aerosol phase. The model is used to examine the behavior of four types of tropospheric aerosol (marine, urban, remote continental and non-urban continental), and the results are compared with the predictions of two other models currently in use. The results of all three models were generally in good agreement. Differences were found primarily in the mutual deliquescence humidity regions, where the new model predicted the existence of water, and the other two did not. Differences in the behavior (speciation and water absorbing properties) between the aerosol types are pointed out. The new model also needed considerably less CPU time, and always shows stability and robust convergence.
TL;DR: A survey of recent advances of the automated approaches to attributing authorship is presented, examining their characteristics for both text representation and text classification.
Abstract: Authorship attribution supported by statistical or computational methods has a long history starting from the 19th century and is marked by the seminal study of Mosteller and Wallace (1964) on the authorship of the disputed “Federalist Papers.” During the last decade, this scientific field has been developed substantially, taking advantage of research advances in areas such as machine learning, information retrieval, and natural language processing. The plethora of available electronic texts (e.g., e-mail messages, online forum messages, blogs, source code, etc.) indicates a wide variety of applications of this technology, provided it is able to handle short and noisy text from multiple candidate authors. In this article, a survey of recent advances of the automated approaches to attributing authorship is presented, examining their characteristics for both text representation and text classification. The focus of this survey is on computational requirements and settings rather than on linguistic or literary issues. We also discuss evaluation methodologies and criteria for authorship attribution studies and list open questions that will attract future work in this area. © 2009 Wiley Periodicals, Inc.
Showing all 2818 results
|B. G. Pope||125||926||75215|
|Th. D. Papadopoulou||70||272||32541|
|Nikolaos S. Thomaidis||57||275||10388|
|Camilla Di Donato||57||185||9481|
|Polychronis C Tzedakis||54||106||8982|
Related Institutions (5)
Polytechnic University of Catalonia
45.3K papers, 949.3K citations
Aristotle University of Thessaloniki
58.2K papers, 1.4M citations
44.5K papers, 1.6M citations
City University of Hong Kong
60.1K papers, 1.7M citations
32.6K papers, 829.6K citations