More accessible version
ICS > DCS > Publications >  Site Map. Search. Help.GreekEnglish

. Printer friendly version

 Distributed Computing Systems Lab.

Publications

Book Chapters

  • Evangelos P. Markatos and Antonis Danalis: Web Caching. Enterprise Networking: Multilayer Switching and Applications, editors V. Theoharakis and D.N. Serpanos, pp. 383-408, Idea Group Publishing, ISBN: 1930708173, 2001.
  • S. Ioannidis, A.E. Papathanasiou, G. Maglis, E.P. Markatos, D. Pnevmatikatos and J. Sevaslidou: On Using Reliable Network RAM in Networks of Workstations. Cluster Computing, pp. 109-121, Chapter 10, 2001, ISBN 1-59033-113-3, Nova Science Publishers, USA
  • Michail D. Flouris, and Evangelos P. Markatos: Network RAM. In High Performance Cluster Computing, pp. 383-408, editor Buyya Rajkumar, Prentice Hall, USA, 1999.
  • Evangelos P. Markatos, and T.J. LeBlanc: Multiprogramming and Multiprocessing. In Encyclopedia of Electrical and Electronic Engineering editor J.G. Webster, volume 14, pp. 25-35, 1999, John Wiley and Sons, Inc, Publishers, ISBN 0-471-13955-6.
  • E.P. Markatos and T.J. LeBlanc: Locality-Based Scheduling in Shared-Memory Multiprocessors . In Parallel Computing: Paradigms and Applications , edited by Albert Zomaya, Chapman and Hall Series on Parallel Computing, International Thomoson Computer Press, Chapter 8, pp. 237-276, ISBN 1-85032188-4, 1996. Also published as Techinal Report 94, Institute of Computer Science, FORTH, Greece, August 1993. (Available in .pdf).
  • Evangelos P. Markatos: Multiprocessor Synchronization Primitives with Priorities , in Y.-H. Lee, C.M. Krisna (Eds.), Readings in Real-Time Systems, IEEE Computer Society Press, Los Alamitos, CA, 1992. Also appeared in W.Halang and K. Ramamtitham (Eds.), Real-Time Programming, pages 1-7, Pergamon Press, 1992 (ISBN 0 08 041282).

Journal Publications

2012

  • Harris Papadakis, Mema Roussopoulos, Paraskevi Fragopoulou and Evangelos P. Markatos ITA: Innocuous Topology Awareness for Unstructured P2P Networks. In Transactions on Parallel and Distributed Systems (to appear).
  • Antonis Papadogiannakis, Giorgos Vasiliadis, Demetres Antoniades, Michalis Polychronakis, Evangelos P. Markatos. Improving the Performance of Passive Network Monitoring Applications with Memory Locality Enhancements. In Computer Communications Journal (COMCOM), 35(1), pp129-140, January 2012. (available from Science Direct and locally as pre-print)

2011

  • Roderick P. Webb, James M. Dailey, Robert J. Manning, Graeme D. Maxwell, Alistair J. Poustie, Sebastien Lardenois, Robert Harmon, James Harrison, Georgios Kopidakis, Elias Athanasopoulos, Antonis Krithinakis, Francis Doukhan, Mohamed Omar, Dominique Vaillant, Frederic Di Nallo, Martin Koyabe, Carla Di Cairano-Gilfedder. All-Optical Header Processing in a 42.6 Gb/s Optoelectronic Firewall. In IEEE Journal of Selected Topics in Quantum Electronics Issue 99 (PP), pp1-8, May 2011. (available from IEEE Xplore)

2010

  • Andreas Makridakis, Elias Athanasopoulos, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannids, Evangelos P. Markatos. Understanding The Behavior of Malicious Applications in Social Networks. In IEEE Network, 24(5), pp. 14-19, September-October 2010. (available from IEEE Xplore)
  • Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis, Angelos D. Keromytis, and Evangelos P. Markatos. Shadow Honeypots. In International Journal of Computer and Network Security (IJCNS), vol. 2, no. 9, pp. 1-16, September 2010. (pdf)
  • Meltini Christodoulaki, Paraskevi Fragopoulou. SafeLine: Reporting Illegal Internet Content. in Information Management & Computer Security, 18(1), pp. 54-65, 2010. (available from Emerald Insight)

2009

  • Harris Papadakis, Paraskevi Fragopoulou, Evangelos P. Markatos, Marios D. Dikaiakos, Alexandros Labrinidis. Hash-Based Overlay Partitioning in Unstructured Peer-to-Peer Systems. In Parallel Processing Letters, 19(1), pp. 57-71, 2009. (available from World Scientific)
  • Geoffrey Goodell, Mema Roussopoulos and Scott Bradner. A Directory Service for Perspective Access Network. In IEEE/ACM Transactions on Networking, 17(2), pp. 501-514, 2009. (available from IEEE Xplore)

2008

  • Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, and Sotiris Ioannidis. Decentralized Access Control in Networked File Systems. In ACM Computing Surveys, vol. 40, no. 3, August 2008. (pdf)

2007

  • K. Neocleous, M.D. Dikaiakos, P. Fragopoulou, and E. P. Markatos. Failure Management in Grids: The Case of the EGEE Infrastructure In Parallel Processing Letters 17(4) pp. 391-410, Dec. 2007 (available from World Scientific)
  • V. T. Lam, Spiros Antonatos, Periklis Akritidis and Kostas G. Anagnostakis. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. In ACM Transactions on Information and System Security (TISSEC), 2007. (pdf)
  • Spiros Antonatos, Periklis Akritidis, Evangelos P. Markatos and Kostas G. Anagnostakis. Defending against Hitlist Worms using Network Address Space Randomization. In Computer Networks, vol. 51, no. 12, pp. 3471-3490, August 2007 (pdf)
  • Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Network-level Polymorphic Shellcode Detection using Emulation. In Journal in Computer Virology, vol. 2, no. 4, pp. 257-274, February 2007. (pdf)
  • Paolo Trunfio, Domenico Talia, Paraskevi Fragopoulou, Charis Papadakis, Matteo Mordacchini, Mika Pennanen, Konstantin Popov, Vladimir Vlassov and Seif Haridi. Peer-to-Peer Models for Resource Discovery on Grids. In FGCS, 2007. (pdf)

2006

  • K. Xinidis, I. Charitakis, S. Antonatos, K. G. Anagnostakis, and E. P. Markatos. An Active Splitter Architecture for Intrusion Detection and Prevention. In IEEE Transactions on Dependable and Secure Computing, vol.3, no.1, Jan-Mar 2006. (pdf)

2002

  • Evangelos P. Markatos, Dionisios N. Pnevmatikatos, Michail D. Flouris, and Manolis G.H. Katevenis. Web-Conscious Storage Management for Web Proxies. In IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 735-748, Dec 2002. (available from IEEE Xplore)

2001

  • Evangelos P. Markatos. On Caching Search Engine Query Results. In Computer Communications, pp. 137-143, Jan 2001, Elsevier Science. (pdf)

1999

  • Evangelos P. Markatos, Athanasios E. Papathanasiou, and Nektarios Papadakakis. Visualizing Traffic on the World Wide Web. In WebNet Journal: Internet Technologies, Applications and Issues, 1(2), pp. 57-65, April-June 1999. (available from Ed/ITLib)
  • George Dramitinos and Evangelos P. Markatos. Adaptive and Reliable Paging to Remote Main Memory. In Journal of Parallel and Distributed Computing, pages 357-388, 58(3), September 1999, Academic Press. (available from Science Direct)
  • Sotiris Ioannidis, Athanasios E. Papathanasiou, Gregory Maglis, Dionisis Pnevmatikatos and Evangelos P. Markatos, Julia Sevaslidou. On Using Reliable Network RAM in Networks of Workstations. In Parallel and Distributed Computing Practices, Special Issue on High Performance Computing on Clusters, Nova Science Publishers, USA, accepted for publication. (available from SCPE)
  • Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Maglis, and Sotiris Ioannidis. On Using Network RAM as a non-volatile Buffer. In Cluster Computing Journal on Networks, Software, and Applications, 2(4), pp. 295-303, 1999, Baltzer Science Publishers. (available from Springer Link)
  • Michail Flouris and Evangelos P. Markatos. The Network RamDisk: using remote memory on heterogeneous NOWs. In Cluster Computing Journal on Networks, Software, and Applications, 2(4), pp. 281-293, 1999, Baltzer Science Publishers. (available from Springer Link)

1997

  • Manolis Katevenis, Evangelos P. Markatos, George Kalokairinos, and Apostolos Dollas. Telegraphos: A Substrate for High Performance Computing on Workstation Clusters. In Journal of Parallel and Distributed Computing. pages 94-108, 43(2), June 1997, Academic Press. (available from Science Direct)
  • C. Houstis, S. Kapidakis, Evangelos P. Markatos, and Erol. Gelenbe. Execution of Compute Intensive Applications into Parallel Machines. In Information Sciences, special issue on load balancing in distributed systems, pages 83-124, vol. 97, numbers 1-2, March 1997, Elsevier Science. (available from Science Direct)

1996

  • Evangelos P. Markatos. Main Memory Caching of Web Documents. In Computer Networks and ISDN Systems, volume 28, issues 7-11, pages 893-906, 1996. Also appeared in Proceedings of the Fifth International World Wide Web Conference, Paris, France, May 1996. (html)

1994

  • E.P. Markatos and T.J. LeBlanc: Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors. In IEEE Transactions on Parallel and Distributed Processing, pages 379-400, April 94, v 5 n 4. (pdf)

Conference and Workshop Proceedings

2013

  • Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. Practical Information Flow for Legacy Web Applications. In Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS). July 2013, Montpellier, France.
  • Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis. You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger. In Proceedings of the 6th European Workshop on System Security (EuroSec). April 2013, Prague, Czech Republic.

2012

  • Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero. All your face are belong to us: Breaking Facebook¢s Social Authentication. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC). December 2012, Orlando, FL, USA.
  • Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. Digging up social structures from documents on the web. In Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS). December 2012, Anaheim, CA, USA.
  • Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos. Minimizing information disclosure to third parties in social login platforms. In International Journal of Information Security (IJIS), Volume 11, Issue 5. October 2012.
  • Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis and Evangelos P. Markatos. Privacy-Preserving Social Plugins. In Proceedings of the 21st USENIX Security Symposium. August 2012, Bellevue, WA, USA. (to appear)
  • Antonis Papadogiannakis, Michalis Polychronakis, and Evangelos P. Markatos. Tolerating Overload Attacks Against Packet Capturing Systems. In Proceedings of the USENIX Annual Technical Conference (ATC). June 2012, Boston, MA, USA.
  • Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, and Evangelos Markatos. ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12). June 2012, Singapore.
  • Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis. Towards a Universal Data Provenance Framework using Dynamic Instrumentation. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC). June 2012, Heraklion, Crete, Greece. (pdf)

2011

  • Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. Parallelization and Characterization of Pattern Matching using GPUs. In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC). November 2011, Austin, TX. (pdf)
  • Georgios Kontaxis, Michalis Polychronakis, and Evangelos P. Markatos. SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. In Proceedings of the 14th Information Security Conference (ISC). October 2011, Xi'an, China. (pdf)
  • Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. MIDeA: A Multi-Parallel Intrusion Detection Architecture. In Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS). October 2011, Chicago, IL, USA. (pdf)
  • Eleni Gessiou, Quang Hieu Vu and Sotiris Ioannidis. IRILD: an Information Retrieval based method for Information Leak Detection. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND). September 2011, Gothenburg, Sweden. (pdf)
  • Georgios Kontaxis, Iasonas Polakis, Michalis Polychronakis, and Evangelos P. Markatos. dead.drop: URL-based Stealthy Messaging. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND). September 2011, Gothenburg, Sweden. (pdf)
  • Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. CensMon: A Web Censorship Monitor. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with the 20th USENIX Security Symposium. August 2011, San Francisco, CA, USA. (pdf)
  • Iasonas Polakis, Georgios Kontaxis, and Sotiris Ioannidis. CAPTCHuring Automated (Smart)Phone Attacks. In Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). July 2011, Amsterdam, Netherlands. (pdf)
  • Georgios Kontaxis, Iasonas Polakis, and Sotiris Ioannidis. Outsourcing Malicious Infrastructure to the Cloud. In Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). July 2011, Amsterdam, Netherlands. (pdf)
  • Georgios Kontaxis, Demetris Antoniades, Iasonas Polakis and Evangelos P. Markatos. An Empirical Study on the Security of Cross-Domain Policies in Rich Internet Applications. In Proceedings of the 4th European Workshop on System Security (EuroSec). April 2011, Salzburg, Austria. (pdf)
  • Zacharias Tzermias, Giorgos Sykiotakis, Michalis Polychronakis, and Evangelos P. Markatos. Combining Static and Dynamic Analysis for the Detection of Malicious Documents. In Proceedings of the 4th European Workshop on System Security (EuroSec). April 2011, Salzburg, Austria. (pdf)
  • Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis, and Evangelos P. Markatos. Dynamic Monitoring of Dark IP Address Space. In Proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA) (poster session). April 2011, Vienna, Austria. (pdf)
  • Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, and Evangelos P. Markatos. Detecting Social Network Profile Cloning. In Proceedings of the 3rd IEEE International Workshop on SEcurity and SOCial Networking (SESOC). March 2011, Seattle, WA. (pdf)
  • Demetris Antoniades, Iasonas Polakis, Georgios Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, and Thomas Karagiannis. we.b: The Web of Short URLs. In Proceedings of the 20th International World Wide Web Conference (WWW). March 2011, Hyderabad, India. (pdf)

2010

  • Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Comprehensive Shellcode Detection using Runtime Heuristics. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). December 2010, Austin, TX, USA. (pdf)
  • Vasiliki Danilatou, Sotiris Ioannidis. Security and Privacy Architectures for Biomedical Cloud Computing. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine. November 2010, Corfu, Greece. (pdf)
  • Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos. An Architecture For Enforcing JavaScript Randomization in Web2.0 Applications. Short paper in Proceedings of the 13th Information Security Conference (ISC). October 2010, Boca Raton, FL, USA. (pdf)
  • Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. GPU-assisted Malware. In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (MALWARE). October 2010, Nancy, France. (pdf)
  • Iasonas Polakis, Georgios Kontaxis, Spiros Antonatos, Eleni Gessiou, Thanasis Petsas and Evangelos P. Markatos. Using Social Networks to Harvest Email Addresses. In Proceedings of the 9th Workshop on Privacy in the Electronic Society (WPES), co-located with ACM CCS. October 2010, Chicago, IL, USA. (pdf)
  • Georgios Kontaxis, Iasonas Polakis, Spiros Antonatos and Evangelos P. Markatos. Experiences and observations from the NoAH infrastructure. In Proceedings of the 6th European Conference on Computer Network Defense (EC2ND). October 2010, Berlin, Germany. (pdf)
  • Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). September 2010, Athens, Greece. (pdf)
  • Antonis Krithinakis, Elias Athanasopoulos, and Evangelos P. Markatos. Isolating JavaScript in Dynamic Code Environments. In Proceedings of the 1st Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications (APLWACA), co-located with PLDI, June 2010, Toronto, Canada. (pdf)
  • Giorgos Vasiliadis and Sotiris Ioannidis. GrAVity: A Massively Parallel Antivirus Engine. In Proceedings of the 13th International Symposium On Recent Advances In Intrusion Detection (RAID). September 2010, Ottawa, Canada. (pdf)
  • Antonis Papadogiannakis, Michalis Polychronakis, and Evangelos P. Markatos. RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage. In Proceedings of the 18th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). August 2010, Miami, Florida. (pdf)
  • Elias Athanasopoulos, Vasilis Pappas, Antonis Krithinakis, Spyros Ligouras, Evangelos P. Markatos, and Thomas Karagiannis. xJS: Practical XSS Prevention for Web Application Development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps). June 2010, Boston, MA. (pdf)
  • Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos. Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP). May 2010, Oakland, California. (pdf)
  • Antonis Papadogiannakis, Michalis Polychronakis, and Evangelos P. Markatos. Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding. In Proceedings of the European Workshop on System Security (EuroSec). April 2010, Paris, France. (pdf)
  • Demetris Antoniades,Evangelos P. Markatos, and Constantine Dovrolis. MOR: Monitoring and Measurements through the Onion Router. In Proceedings of the Passive and Active Measurement Conference (PAM). April 2010, Zurich, Switzerland. (pdf)
  • Spiros Antonatos, Iasonas Polakis, Thanasis Petsas, and Evangelos P. Markatos. A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS). February-March 2010. (pdf)

2009

  • Demetris Antoniades, Evangelos P. Markatos and Constantine Dovrolis. One-Click Hosting Services: A File-Sharing Hideout. In Proceedings of the 9th ACM Conference Internet Measuremet (IMC). November 2009, Chicago, Illinois, US. (pdf)
  • Eleni Gessiou, Alexandros Labrinidis, Sotiris Ioannidis. A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece. In Proceedings of the 8th ACM CCS Workshop on Privacy in the Electronic Society (WPES), November 2009, Chicago, IL, USA. (pdf)
  • W. Y. Chin, Evangelos P. Markatos, Spiros Antonatos and Sotiris Ioannidis. HoneyLab: Large-scale Honeypot Deployment and Resource Sharing. In Proceedings of the 3rd International Conference on Network and System Security (NSS), Ocotber 2009, Gold Coast, Australia. (pdf)
  • Spiros Antonatos and Vu Quang Hieu. Harnessing the power of P2P systems for fast attack signature validation. In Proceedings of the 3rd International Conference on Network and System Security (NSS), October 2009, Gold Coast, Australia. (pdf)
  • Harris Papadakis, Mema Roussopoulos, Paraskevi Fragopoulou and Evangelos P. Markatos. Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing. September 2009, Seattle. (pdf)
  • Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Evangelos P. Markatos and Sotiris Ioannidis. Regular Expression Matching on Graphics Hardware for Intrusion Detection. In Proceedings of the 12th International Symposium On Recent Advances In Intrusion Detection (RAID). September 2009, Saint-Malo, France. (pdf)
  • Lazaros Koromilas, George Chinis, Irini Fundulaki, and Sotiris Ioannidis. Controlling Access to XML Documents over XML Native and Relational Databases. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM). August 2009, Lyon, France. (pdf)
  • Harris Papadakis, Paolo Trunfio, Domenico Talia and Paraskevi Fragopoulou. An Experimental Evaluation of the DQ-DHT Algorithm in a Grid Information Service In Proceedings of the CoreGRID ERCIM Working Group Workshop on Grids, P2P and Service Computing. Held in conjunction With EuroPAR 2009, August 2009.
  • Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA), June 2009, Athens, Greece (Invited Paper). (pdf)
  • Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos. Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP). May 2009, Oakland, CA. (pdf)
  • Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. An Empirical Study of Real-world Polymorphic Code Injection Attacks. In Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). April 2009, Boston, MA. (pdf)
  • Ales Friedl, Sven Ubik, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos. Realistic Passive Packet Loss Measurement for High-Speed Networks. In Proceedings of the 1st Traffic Monitoring and Analysis Workshop (TMA). May 2009, Aachen, Germany. (pdf)
  • Elias Athanasopoulos, Antonis Krithinakis, Georgios Kopidakis, Graeme Maxwell, Alistair Poustie, Bob Manning, Rod Webb, Martin Koyabe, Carla Di Cairano-Gilfedder. WISDOM: Security-Aware Fibres. In Proceedings of the 2nd ACM European Workshop on System Security (EUROSEC). March 2009, Nuremberg, Germany. (pdf)
  • Michael Foukarakis, Demetres Antoniades, Michalis Polychronakis. Deep Packet Anonymization. In Proceedings of the 2nd ACM European Workshop on System Security (EUROSEC). March 2009, Nuremberg, Germany. (pdf)

2008

  • Georgios Smaragdakis, Vassilis Lekakis, Nikolaos Laoutaris, Azer Bestavros, John Byers, Mema Roussopoulos. The EGOIST Overlay Routing System. In Proceedings of the 4th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT). December 2008, Madrid, Spain. (pdf)
  • Antonis Krithinakis, Lubomir Stroetmann, Elias Athanasopoulos, Georgios Kopidakis, Evangelos P. Markatos. WSIM: A software platform to simulate all-optical security operations. In Proceedings of the 2nd European Conference on Computer Network Defense (EC2ND). December 2008, Dublin, Ireland. (pdf)
  • Antonis Theocharides, Demetris Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P. Markatos. Topnet: A network-aware top(1). In Proceedings of the 22nd Large Installation System Administration Conference (LISA). November 2008, San Diego, California, US. (pdf)
  • Elias Athanasopoulos, Andreas Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Antisocial Networks: Turning a Social Network into a Botnet. In Proceedings of the 11th Information Security Conference (ISC). September 2008, Taipei, Taiwan. (pdf)
  • Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. Compromising Anonymity Using Packet Spinning. In Proceedings of the 11th Information Security Conference (ISC). September 2008, Taipei, Taiwan. (pdf)
  • Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos and Sotiris Ioannidis. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. In Proceedings of the 11th International Symposium On Recent Advances In Intrusion Detection (RAID). September 2008, Boston, MA, USA (pdf)
  • Herbert Bos, Sotiris Ioannidis, Erland Jonsson, Engin Kirda and Chris Kruegel. Future threats to future trust. In Proceedings of the Future of Trust in Computing Conference. July 2008, Berlin, Germany. (pdf)
  • Paul M. Williams, David S. H. Rosenthal, Mema Roussopoulos, Steve Georgis. Predicting the Archival Life of Removable Hard Disk Drives In Proceedings of Imaging Science & Technology (IS&T) Archiving Conference. June 2008, Bern, Switzerland. (pdf)
  • Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Real-World Polymorphic Attack Detection using Network-Level Emulation. In Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW). May 2008, Oak Ridge, TN (pdf)
  • Georgios Smaragdakis, Nikolaos Laoutaris, Pietro Michiardi, Azer Bestavros, John Byers and Mema Roussopoulos. Swarming on Optimized Graphs for n-way Broadcast. In Proceedings of IEEE INFOCOM. April 2008. (pdf)
  • S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. Ioannidis and E. P. Markatos. Honey@home: A New Approach to Large-Scale Threat Monitoring. In Proceedings of the 1st WOMBAT workshop on Information Security Threats Data Collection and Sharing (WISTDCS). April 2008, Amsterdam, The Netherlands (pdf)
  • Michalis Polychronakis, Panayiotis Mavrommatis, and Niels Provos. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). April 2008, San Francisco, CA. (pdf)
  • Demetris Antoniades, Michalis Polychronakis, Nick Nikiforakis, Evangelos P. Markatos, Yiannis Mitsos Monitoring three National Research Networks for Eight Weeks: Observations and Implications. In Proceedings of the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon). April 2008, Salvador, Bahia, Brazil. (pdf)
  • Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, Sotiris Ioannidis, Arne Olesbo, When AppMon met Stager. In Proceedings of the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon). April 2008, Salvador, Bahia, Brazil. (pdf)
  • Peter I. Politopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Evaluation of Compression of Remote Network Monitoring Data Streams. In Proceedings of the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon). April 2008, Salvador, Bahia, Brazil. (pdf)
  • Augusto Ciuffoletti, Yari Marchetti, Antonis Papadogiannakis, Michalis Polychronakis Prototype Implementation of a Demand-Driven Network Monitoring Architecture. CoreGRID Integration Workshop, April 2008, Heraklion-Crete, Greece. (pdf)
  • Agostino Forestiero, Carlo Mastroianni, Harris Papadakis, Paraskevi Fragopoulou, Alberto Troisi, Eugenio Zimeo, A Scalable Architecture for Discovery and Composition in P2P Service Networks, 2008 CoreGRID Integration Workshop, Heraklion-Crete, Greece.
  • Demetres Antoniades, Michalis Polychronakis, Antonis Papadogiannakis, Panagiotis Trimintzios, Sven Ubik, Vladimir Smotlacha, Arne Øslebø and Evangelos P. Markatos. LOBSTER: A European Platform for Passive Network Traffic Monitoring. In proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM). March 2008, Innsbruck, Austria. (pdf)
  • Michalis Foukarakis, Demetres Antoniades, Spiros Antonatos and Evangelos P. Markatos. On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008. January 2008, Savannah, Georgia, USA. (pdf)

2007

  • Nikos Nikiforakis, Andreas Makridakis, Elias Athanasopoulos, and Evangelos P. Markatos. Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND). October 2007, Heraklion, Greece. (pdf)
  • Spiros Antonatos, Kostas G. Anagnostakis and Evangelos P. Markatos Honey@home: A new approach to Large-scale Threat Monitoring. In the 5th ACM Workshop on Recurring Malcode (WORM 2007), November 2007. (pdf)
  • Antonis Papadogiannakis, Demetres Antoniades, Michalis Polychronakis, and Evangelos P. Markatos. Improving the Performance of Passive Network Monitoring Applications using Locality Buffering. In Proceedings of the 15th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). October 2007, Istanbul, Turkey. (pdf)
  • Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, and Evangelos P. Markatos. GAS: Overloading a File Sharing Network as an Anonymizing System. In Proceedings of the 2nd International Workshop on Security (IWSEC). October 2007, Nara, Japan. (pdf)
  • Michalis Foukarakis, Demetres Antoniades, Spiros Antonatos and Evangelos P. Markatos. Flexible and High-Performance Anonymization of Netwflow Records using Anontool. In Proceedings of the Third International Workshop on the Value of Security through Collaboration (SECOVAL). September 2007, Nice, France. (pdf)
  • Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Emulation-based Detection of Non-self-contained Polymorphic Shellcode. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID). September 2007, Queensland, Australia. (pdf)
  • Harris Papadakis, Paolo Trunfio, Domenico Talia and Paraskevi Fragopoulou. Design and Implementation of a Hybrid P2P-based Grid Resource Discovery System. In Proceedings of the CoreGRID Workshop on Grid Programming Models, Grid and P2P System Architecture, Grid Systems, Tools and Environments. Heraklion, Crete, Greece June 12-13, 2007. Also appered in Making Grids Work, Springer, USA, 2008, ISBN: 978-0-387-78447-2. (pdf)
    (Editors: Marco Danelutto, Paraskevi Fragopoulou and Vladimir Getov)
  • Augusto Ciuffoletti, Antonis Papadogiannakis, and Michalis Polychronakis. Network Monitoring Session Description. In Proceedings of the CoreGRID Workshop on Grid Middleware (in conjunction with ISC '07). June 2007, Dresden, Germany (pdf)
  • Sven Ubik, Demetres Antoniades, and Arne Øslebø. ABW - Short-timescale passive bandwidth monitoring. In Proceedings of the Sixth International Conference on Networking (ICN'07), April 2007, Martinique, France. (pdf)
  • Charis Papadakis, Paraskevi Fragopoulou, Elias Athanasopoulos, Evangelos Markatos, Marios Dikaiakos and Alexandros Labrinidis: A Feedback Based Approach to Reduce Duplicate Messages in Unstructured Peer-to-Peer Systems. In Integrated Research in GRID Computing, pages 103-118, Springer, 2007. ISBN: 978-0-387-47656-8 (pdf)
    (Editors: Sergei Gorlatch and Marco Danelutto)
  • Sergio Andreozzi, Demetres Antoniades, Augusto Ciuffoletti, Antonia Ghiselli, Evangelos P. Markatos, Michalis Polychronakis, and Panos Trimintzios. Issues about the Integration of Passive and Active Monitoring for Grid Networks. Integrated Research in GRID Computing, Springer-Verlag ISBN 0-387-47656-3, p. 147-161, January 2007 (pdf) Presented on CoreGRID Integration Workshop 2005 (Selected Papers), November 28-30, Pisa, Italy(pdf)

2006

  • Demetres Antoniades, Michalis Polychronakis, Spiros Antonatos, Evangelos P. Markatos, Sven Ubik, and Arne Øslebø. Appmon: An Application for Accurate per Application Network Traffic Characterization. In IST Broadband Europe 2006 Conference, December 2006, Geneva, Switzerland. (pdf)
  • Kyriacos Neocleous, Marios D. Dikaiakos, Paraskevi Fragopoulou and Evangelos Markatos. GRID RELIABILITY: A STUDY OF FAILURES ON THE EGEE INFRASTRUCTURE. CoreGRID Integration Workshop (preliminary version, available in .pdf format)
  • Harris Papadakis, Paraskevi Fragopoulou, Marios Dikaiakos, Alexandros Labrinidis and Evangelos Markatos. Divide Et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 2nd CoreGRID Integration Workshop, October 2006. Also appeared in Achievements in European Research on Grid Systems, pages 1-12. Springer, 2008. ISBN: 978-0-387-72811-7 (pdf)
  • Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos, and Augusto Ciuffoletti. Passive End-to-End Packet Loss Estimation for Grid Traffic Monitoring. CoreGRID Integration Workshop, October 2006 (pdf)
  • Elias Athanasopoulos and Spiros Antonatos. Enhanced CAPTCHAs: Using Animation To Tell Humans And Computers Apart. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS'06) (pdf)
  • Dimitris Koukis, Spiros Antonatos and Kostas G . Anagnostakis. On The Privacy Risks of Publishing Anonymized IP Network Traces. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS'06) (pdf)
  • Spiros Antonatos and Kostas G. Anagnostakis. TAO: Protecting against Hitlist Worms using Transparent Address Obfuscation. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS'06) (pdf)
  • Augusto Ciuffoletti and Michalis Polychronakis. Architecture of a Network Monitoring Element. In Proceedings of the CoreGRID Workshop on Grid Middleware (in conjunction with EuroPar 2006). August 2006, Dresden, Germany. (pdf)
  • Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Network-level Polymorphic Shellcode Detection using Emulation. In Proceedings of the GI/IEEE SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). July 2006, Berlin, Germany. (pdf)
  • Elias Athanasopoulos, Kostas G. Anagnostakis and Evangelos P. Markatos. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network that Never Forgets. In Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06). June 2006, Singapore. (pdf)
  • Augusto Ciuffoletti and Michalis Polychronakis. Architecture of a Network Monitoring Element. In Proceedings of the 5th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), Third International Workshop on Emerging Technologies for Next-generation GRID (ETNGRID). June 2006, Manchester, U.K. (short paper - pdf)
  • D. Antoniades, M. Athanatos, A. Papadogiannakis, E.P. Markatos, and C. Dovrolis. Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006), March 2006 (pdf)
  • D. Koukis, S. Antonatos, D. Antoniades, P. Trimintzios, E.P. Markatos. A Generic Anonymization Framework for Network Traffic. In Proceedings of the IEEE International Conference on Communications (ICC 2006) June 2006, Istanbul, Turkey. (pdf)
  • Panos Trimintzios, Michalis Polychronakis, Antonis Papadogiannakis, Michalis Foukarakis, Evangelos P. Markatos, and A. Øslebø. DiMAPI: An Application Programming Interface for Distributed Network Monitoring. In Proceedings of the 10th IEEE/IFIP Network Operations and Management Symposium (NOMS). April 2006, Vancouver, Canada. (pdf)

2005

  • Charis Papadakis, Paraskevi Fragopoulou, Elias Athanasopoulos, Marios Dikaiakos, Alexandros Labrinidis, and Evangelos Markatos. A Feedback-based Approach to Reduce Duplicate Messages in Unstructured Peer-to-Peer Networks. In Proceedings of the CoreGRID Integration Workshop, November 2005 (pdf)
  • S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending Against Hitlist Worms using Network Address Space Randomization. In Proceedings of the The 3rd Workshop on Rapid Malcode (WORM 2005) , November 2005 (pdf | compressed postscript)
  • Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos Markatos, and Angelos D. Keromytis: Detecting Targeted Attacks Using Shadow Honeypots. In Proceedings of the 14th USENIX Security Symposium. August 2005, Baltimore, MD. (pdf)
  • P. Akritidis, Kostas Anagnostakis, and E.P. Markatos: Efficient Content-Based Fingerprinting of Zero-Day Worms. In Proceedings of the International Conference on Communications (ICC 2005), Seoul, Korea, 16-20 May 2005. (pdf)
  • Kostas Xinidis, Kostas D. Anagnostakis, and Evangelos P. Markatos: Design and Implementation of a High-Performance Network Intrusion Prevention System. In Proceedings of the 20th IFIP International Information Security Conference (IFIP/SEC 2005), May 2005. (pdf)
  • S. Antonatos, M. Polychronakis, P. Akritidis, Kostas D. Anagnostakis, and Evangelos P. Markatos: Piranha: Fast and Memory-efficient Pattern Matching for Intrusion Detection. In Proceedings of the 20th IFIP International Information Security Conference (IFIP/SEC 2005), May 2005. (pdf)
  • P. Akritidis, Evangelos P. Markatos, M. Polychronakis, and Kostas D. Anagnostakis: STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis. In Proceedings of the 20th IFIP International Information Security Conference (IFIP/SEC 2005), May 2005. (pdf)

2004

2003

  • I.Charitakis, K.Anagnostakis,E.Markatos An Active Traffic Splitter Architecture for Intrusion Detection. Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 238-241, Orlando Florida, October 2003. (.pdf version) (ppt)
  • I.Charitakis, D.Pnevmatikatos,E.Markatos, K.Anagnostakis S2I: a Tool for Automatic Rule Match Compilation for the IXP Network Processor. Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, pp.226-239, September 24-26, Vienna - Austria (.pdf version).
  • Jan Coppens, Steven Van den Berghe, Herbert Bos, Evangelos P. Markatos, Filip De Turck, Arne Oslebo, and Sven Ubik. SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Proceedings of the Workshop on End-to-End Monitoring Techniques and Services (E2EMON), September 2003. (.pdf version)
  • K. G. Anagnostakis, E. P. Markatos, S. Antonatos, and M. Polychronakis. E2xB: A domain–specific string matching algorithm for intrusion detection. Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003. (.pdf version)

2002

  • E.P Markatos, S. Antonatos, M. Polychronakis and K.G Anagnostakis. ExB: Exclusion-based signature matching for intrusion detection. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN), pp. 146-152, Cambridge, USA, November 2002 (.pdf version).
  • Evangelos P. Markatos: Speeding-up TCP/IP: faster processors are not enough. In Proceedings of the 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002) , April 2002, pages 341-345. (Available in .pdf)
  • Evangelos P. Markatos: Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella. In Proceedings of the CCGrid 2002: the second IEEE International Symposium on Cluster Computing and the Grid , May 2002, pages 65-74. (.pdf version)

2001

  • Ekaterini M. Gialama, Evangelos P. Markatos, Julia E. Sevasslidou, Dimitrios N. Serpanos, Xeni A. Asimakopoulou, and Evangelos N. Kotsovinos: divISOR: DIstributed VIdeo Server fOr stReaming. In the Proceedings of the 5th WSES/IEEE WORLD MULTICONFERENCE ON Circuits, Systems, Communications and Computers (CSCC 2001), July 2001, pages 4531-4536. (Available in word) (474 KBytes).

2000

  • Evangelos P. Markatos: On Caching Search Engine Query Results In the Proceedings of the 5th International Web Caching and Content Delivery Workshop, May 2000. (Available in .pdf)

1999

  • Evangelos P. Markatos, Manolis G.H. Katevenis, Dionisis Pnevmatikatos, and Michail Flouris: Secondary Storage Management for Web Proxies. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS99), 1999, pp. 93-104, Co-Sponsored by IEEE Computer Society, Technical Committee on the Internet. (.pdf version).

1998

1996

  • Evangelos P. Markatos: Issues in Reliable Network Memory Paging. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, Feb. 1996. (.pdf version).
  • Evangelos P. Markatos: Using Remote Memory to avoid Disk Thrashing: A Simulation Study. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, Feb. 1996. (.pdf version).
  • Evangelos P. Markatos, George Dramitinos: Implementation of a Reliable Remote Memory Pager. In USENIX 1996 Technical Conference, San Diego, Ca, January 22-26, 1996. (.pdf version).

1995

  • Evangelos Markatos, Manolis Katevenis, George Kalokerinos, Dimitrios Serpanos: An Efficient Processor-Network Interface for Local Area Multiprocessors. In The Fourth International Workshop on SCI-based Low-cost/High-performance Computing, Heraklion, Crete, Greece, October 1995, pages 23-32. (.pdf version).
  • Evangelos P. Markatos, George Dramitinos: Adding Flexibility to a Remote Memory Pager. In Fourth International Workshop on Object Orientation in Operating Systems, IWOOOS 96, pages 183-186, Lund, Sweden, August 1995. (.pdf version).

1994

  • E. Markatos, C. Chronaki: Using reference counters in Update Based Coherent Memory. In in Europe PARLE '94, Athens, Greece, 1994. (.pdf version).

1993

  • E.P. Markatos: How Architecture Evolution influences the Scheduling Discipline in Shared-Memory Multiprocessors. In PARCO 93, Grenoble, France. (.pdf version).

Technical Reports

2005

  • K.G. Anagnostakis, S. Antonatos, P. Akritidis, E.P. Markatos, Defending against Hitlist Worms using Network Address Space Randomization, Technical Report 349, ICS-FORTH, Heraklion, Crete, Greece, January 2005 (.pdf version)
  • K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis, Detecting Targeted Attacks Using Shadow Honeypots, Technical Report 348, ICS-FORTH, Heraklion, Crete, Greece, January 2005 (.pdf version)

2004

  • Ioannis Charitakis, Kostas Anagnostakis and Evangelos P. Markatos A Network-Processor-Based Traffic Splitter for Intrusion Detection Technical Report 342, ICS-FORTH, Heraklion, Crete, Greece, September 2004 (.pdf version)

2003

  • I.Charitakis, K.Anagnostakis,E.Markatos An Active Traffic Splitter Architecture for Intrusion Detection. Technical Report 323, ICS-FORTH, July 2003 (.pdf version).

2002

  • S. Antonatos, K.G. Anagnostakis, E.P. Markatos, M. Polychronakis, Benchmarking and Design of String Matching Intrusion Detection Systems, Technical Report 315, ICS-FORTH, Heraklion, Crete, Greece, December 2002
  • Georgios Portokalidis, Evangelos P. Markatos, Manolis Marazakis, Study and Bridging of Peer-to-Peer File Sharing Systems, Technical Report 321, ICS-FORTH, Heraklion, Crete, Greece, October 2002. (.pdf version).
  • Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis, E2 XB: A Domain-Specific String Matching Algorithm for Intrusion Detection, Technical Report 311, ICS-FORTH, Heraklion, Crete, Greece, October 2002
  • Evangelos P. Markatos, Spyros Antonatos, Michalis Polychronakis, Kostas G. Anagnostakis, Exclusion-based signature matching for intrusion detection, Technical Report 310, ICS-FORTH, Heraklion, Crete, Greece, October 2002 (.pdf version)

2001

  • E.Markatos, Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella, Technical Report 298, ICS-FORTH, Heraklion, Crete, Greece, December 2001 (.pdf version)
  • Evangelos P. Markatos, Speeding up TCP / IP : Faster Processors are not Enough, Technical Report 297, ICS-FORTH, Heraklion, Crete, Greece, December 2001 (.pdf version)

2000

  • Evangelos P. Markatos, Dionisios N. Pnevmatikatos, Michail D. Flouris, Manolis G.H. Katevenis, Web-Conscious Storage Management for Web Proxies, Technical Report 275, ICS-FORTH, Heraklio, Crete, Greece, August 2000 (.pdf version)

1999

  • Apostolos Dollas, Kyprianos Papadimitriou, Constantinos Mathioudakis, Evangelos P. Markatos, Manolis Katevenis, Experimental ATM Network Interface Performance Evaluation, Technical Report 244, ICS-FORTH, Heraklion, Crete, Greece, February 1999 (.pdf version)

1998

  • Evangelos P. Markatos: A Cash-based Approach to Caching Web Documents, Technical Report 230, ICS-FORTH, Aug. 1998. (.pdf version).
  • Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Maglis, and Sotiris Ioannidis: On Using Network RAM as a non-volatile Buffer. Technical Report 227, ICS-FORTH, Aug. 1998. (.pdf version).
  • Michail D. Flouris and Evangelos P. Markatos : The Network RamDisk : Using Remote Memory on Heterogeneous NOWs, Technical Report 226, ICS-FORTH, Aug. 1998. (.pdf version).
  • Sotiris Ioannidis, Evangelos P. Markatos, Julia Sevaslidou, On Using Network Memory to Improve the Performance of Transaction -Based Systems, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, July 1998 (.pdf version)
  • Athanasios E. Papathanasiou, Evangelos P. Markatos, Lightweight Transactions on Networks of Workstations, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, May 1998 (.pdf version)
  • Evangelos P. Markatos, Manolis G.H. Katevenis, Panagiota Vatsolaki, The Remote Enqueue Operation on Networks of Workstations, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, 1998 (.pdf version)

1997

  • Manolis Katevenis, Dimitrios Serpanos, Evangelos Markatos, Multi-Queue Management and Scheduling for Improved QoS in Communication Networks, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, 3-5 November 1997 (.pdf version)
  • A. E. Papathanassiou, E. P. Markatos: On using Reliable Network RAM for Database Systems poster paper at the 16th Symposium on Operating System Principles (SOSP), Oct 1997. (.pdf version).
  • A. E. Papathanassiou, E. P. Markatos: Lightweight Transactions on Networks of Workstations Technical Report 209, ICS-FORTH, Sept 1997. (.pdf version).
  • E. P. Markatos: Visualizing Working Sets Technical Report No. 192, May 1997, ICS-FORTH, Heraklion, Crete, Greece. Appeared in Operating Systems Review 31(4), pp. 3-11, 1997. (.pdf version).
  • Evangelos P. Markatos, Manolis G.H. Katevenis, George Kalokerinos, Gregory Maglis, George Milolidakis, Thanos Oikonomou, Issues in the Design and Implementation of User-Level DMA, Technical Report 182, ICS-FORTH, Heraklion, Crete, June 1997 (.pdf version)
  • Sotiris Ioannidis, Evangelos P. Markatos, Julia Sevaslidou, On using Network Memory to Improve the Performance of Transaction-Based Systems, Technical Report 190, ICS-FORTH, Heraklion, Crete, Greece, March 1997 (.pdf version)
  • Evangelos P. Markatos, Manolis G.H. Katevenis, User-Level DMA without Operating System Kernel Modification, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, February 1997 (.pdf version)
  • Manolis G.H. Katevenis, Panagiota Vatsolaki, Dimitrios Serpanos, Evangelos Markatos, ATLAS I: A Single-chip ATM switch for NOWs, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, February 1997 (.pdf version)

1996

  • Evangelos Markatos, Catherine E. Chronaki: A Top-10 Approach to Prefetching on the Web, Technical Report No. 173, August 1996, ICS-FORTH, Heraklion, Crete, Greece. (.pdf version).
  • Evangelos P. Markatos, Using Remote Memory to avoid Disk Thrashing: A Simulation Study, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, February 1996 (.pdf version)
  • Evangelos P. Markatos, Issues in Reliable Network Memory Paging, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, February 1996 (.pdf version)
  • Christos Nikolaou, Evangelos Markatos, Maria Karavassili, Titos Saridakis, ArrayTracer: A Parallel Performance Analysis Tool, Technical Report 162, ICS-FORTH, Heraklion, Crete, Greece, January 1996 (.pdf version)
  • Evangelos P. Markatos, George Dramitinos, Implementation of a Reliable Remote Memory Pager, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, 1996 (.pdf version)
  • Evangelos P. Markatos, Manolis G.H. Katevenis, Telegraphos :High-Performance Networking for Parallel Processing on Workstation Clusters., Technical Report, ICS-FORTH, Heraklion, Crete, Greece, 1996 (.pdf version)
  • S. Ioannidis, E. P. Markatos, and J. Sevaslidou: On using Network Memory to Improve the Performance of Transaction-Based Systems Technical Report No. 190, March 1996, ICS-FORTH, Heraklion, Crete, Greece. (.pdf version).

1995

  • Evangelos P. Markatos, George Dramitinos, Kosmas Papachristos: Implementation and Evaluation of a Remote Memory Pager. Technical Report 129,ICS-FORTH, Crete, Greece ,March 1995. (.pdf version).

1994

  • Evangelos P. Markatos, Catherine E. Chronaki, Using reference counters in Update Based Coherent Memory, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, 1994 (.pdf version)

1993

  • Evangelos P. Markatos, How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors, Technical Report, ICS-FORTH, Heraklion, Crete, Greece, 7-10 September 1993 (.pdf version)
  • E.P. Markatos and T.J. LeBlanc: Locality-Based Scheduling in Shared-Memory Multiprocessors. In Current and Future Trends in Parallel and Distributed Computing, Editor Albert Zomaya, World Scientific Publishing, 1995. Also published as Technical Report 94, Institute of Computer Science, FORTH, Greece, August 1993. (.pdf version).
  • E.P. Markatos, T.J. LeBlanc, Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors, Technical Report 94, ICS-FORTH, Heraklion, Crete, Greece, 1993
  • Evangelos P. Markatos, Catherine E. Chronaki, Trace-Driven Simulation of Data-Alignment and other Factors affecting Update and Invalidate Based Coherent Memory, Technical Report 93, ICS-FORTH, Heraklio, Crete, Greece, July 1993 (.pdf version)