
Manolis Terrovitis
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c24]Panagiotis Bouros, Konstantinos Lampropoulos, Dimitrios Tsitsigkos, Nikos Mamoulis, Manolis Terrovitis:
Band Joins for Interval Data. EDBT 2020: 443-446 - [i4]Dimitrios Tsitsigkos, Konstantinos Lampropoulos, Panagiotis Bouros, Nikos Mamoulis, Manolis Terrovitis:
A Two-level Spatial In-Memory Index. CoRR abs/2005.08600 (2020)
2010 – 2019
- 2019
- [j15]Konstantinos Theocharidis, John Liagouris
, Nikos Mamoulis, Panagiotis Bouros
, Manolis Terrovitis:
SRX: efficient management of spatial RDF data. VLDB J. 28(5): 703-733 (2019) - [c23]Dimitrios Tsitsigkos, Panagiotis Bouros
, Nikos Mamoulis, Manolis Terrovitis:
Parallel In-Memory Evaluation of Spatial Joins. SIGSPATIAL/GIS 2019: 516-519 - [i3]Dimitrios Tsitsigkos, Panagiotis Bouros, Nikos Mamoulis, Manolis Terrovitis:
Parallel In-Memory Evaluation of Spatial Joins. CoRR abs/1908.11740 (2019) - 2017
- [j14]Manolis Terrovitis, Giorgos Poulis
, Nikos Mamoulis, Spiros Skiadopoulos:
Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories. IEEE Trans. Knowl. Data Eng. 29(7): 1466-1479 (2017) - [c22]Katerina Doka, Ioannis Mytilinis, Ioannis Giannakopoulos, Ioannis Konstantinou, Dimitrios Tsitsigkos, Manolis Terrovitis, Nectarios Koziris:
Exploiting Social Networking and Mobile Data for Crisis Detection and Management. ISCRAM-med 2017: 28-40 - [c21]Sergei Ivanov, Konstantinos Theocharidis, Manolis Terrovitis, Panagiotis Karras:
Content Recommendation for Viral Social Influence. SIGIR 2017: 565-574 - 2016
- [j13]Panagiotis Bouros
, Nikos Mamoulis, Shen Ge, Manolis Terrovitis:
Set containment join revisited. Knowl. Inf. Syst. 49(1): 375-402 (2016) - [c20]Olga Gkountouna, Manolis Terrovitis:
Anonymizing collections of tree-structured data. ICDE 2016: 1520-1521 - [i2]Panagiotis Bouros, Nikos Mamoulis, Shen Ge, Manolis Terrovitis:
Set Containment Join Revisited. CoRR abs/1603.05422 (2016) - 2015
- [j12]Olga Gkountouna, Manolis Terrovitis:
Anonymizing Collections of Tree-Structured Data. IEEE Trans. Knowl. Data Eng. 27(8): 2034-2048 (2015) - [c19]Ioannis Mytilinis, Ioannis Giannakopoulos, Ioannis Konstantinou, Katerina Doka, Dimitrios Tsitsigkos, Manolis Terrovitis, Lampros Giampouras, Nectarios Koziris:
MoDisSENSE: A Distributed Spatio-Temporal and Textual Processing Platform for Social Networking Services. SIGMOD Conference 2015: 895-900 - [p1]Grigorios Loukides, John Liagouris
, Aris Gkoulalas-Divanis, Manolis Terrovitis:
Utility-Constrained Electronic Health Record Data Publishing Through Generalization and Disassociation. Medical Data Privacy Handbook 2015: 149-177 - 2014
- [j11]Grigorios Loukides
, John Liagouris, Aris Gkoulalas-Divanis, Manolis Terrovitis:
Disassociation for electronic health record privacy. J. Biomed. Informatics 50: 46-61 (2014) - [j10]John Liagouris
, Nikos Mamoulis, Panagiotis Bouros
, Manolis Terrovitis:
An Effective Encoding Scheme for Spatial RDF Data. Proc. VLDB Endow. 7(12): 1271-1282 (2014) - [j9]John Liagouris
, Manolis Terrovitis:
Efficient Identification of Implicit Facts in Incomplete OWL2-EL Knowledge Bases. Proc. VLDB Endow. 7(14): 1993-2004 (2014) - [c18]Olga Gkountouna, Sotiris Angeli, Athanasios Zigomitros
, Manolis Terrovitis, Yannis Vassiliou:
k m -Anonymity for Continuous Data Using Dynamic Hierarchies. Privacy in Statistical Databases 2014: 156-169 - [c17]Eli Katsiri, George Papastefanatos, Manolis Terrovitis, Timos K. Sellis
:
Airport Context Analytics. RR 2014: 179-184 - 2013
- [c16]Hao Wang, Manolis Terrovitis, Nikos Mamoulis:
Location recommendation in location-based social networks using user check-in data. SIGSPATIAL/GIS 2013: 364-373 - [c15]Olga Gkountouna, Katerina Lepenioti, Manolis Terrovitis:
Privacy against aggregate knowledge attacks. ICDE Workshops 2013: 99-103 - 2012
- [j8]Manolis Terrovitis, John Liagouris
, Nikos Mamoulis, Spiros Skiadopoulos:
Privacy Preservation by Disassociation. Proc. VLDB Endow. 5(10): 944-955 (2012) - [i1]Manolis Terrovitis, John Liagouris, Nikos Mamoulis, Spiros Skiadopoulos:
Privacy Preservation by Disassociation. CoRR abs/1207.0135 (2012) - 2011
- [j7]Manolis Terrovitis:
Privacy preservation in the dissemination of location data. SIGKDD Explor. 13(1): 6-18 (2011) - [j6]Manolis Terrovitis, Nikos Mamoulis, Panos Kalnis
:
Local and global recoding methods for anonymizing set-valued data. VLDB J. 20(1): 83-106 (2011) - [c14]Manolis Terrovitis, Panagiotis Bouros
, Panos Vassiliadis
, Timos K. Sellis
, Nikos Mamoulis:
Efficient answering of set containment queries for skewed item distributions. EDBT 2011: 225-236 - [c13]Shahram Abdollahi-Alibeik, David Weber, Hakan Dogan, William W. Si, Burcin Baytekin, Abbas Komijani, Richard Chang, Babak Vakili-Amini, MeeLan Lee, Haitao Gan, Yashar Rajavi, Hirad Samavati, Brian Kaczynski, Sang-Min Lee, Sotirios Limotyrakis, Hyunsik Park, Phoebe Chen, Paul Park, Mike Shuo-Wei Chen, Andrew Chang, Yangjin Oh, Jerry Jian-Ming Yang, Eric Chien-Chih Lin, Lalitkumar Nathawad, Keith Onodera, Manolis Terrovitis, Sunetra Mendis, Kai Shi, Srenik Mehta, Masoud Zargari, David K. Su:
A 65nm dual-band 3-stream 802.11n MIMO WLAN SoC. ISSCC 2011: 170-172
2000 – 2009
- 2009
- [j5]Sundar G. Sankaran, Brian J. Zargari, Lalitkumar Nathawad, Hirad Samavati, Srenik Mehta, Alireza Kheirkhahi, Phoebe Chen, Ke Gong, Babak Vakili-Amini, Justin A. Hwang, Mike Shuo-Wei Chen, Manolis Terrovitis, Brian Kaczynski, Sotirios Limotyrakis, Michael P. Mack, Haitao Gan, MeeLan Lee, Richard Chang, Hakan Dogan, Shahram Abdollahi-Alibeik, Burcin Baytekin, Keith Onodera, Suni Mendis, Andrew Chang, Yashar Rajavi, Steve Hung-Min Jen, David K. Su, Bruce A. Wooley:
Design and implementation of a CMO 802.11n SoC. IEEE Commun. Mag. 47(4): 134-143 (2009) - 2008
- [j4]Masoud Zargari, Lalitkumar Nathawad, Hirad Samavati, Srenik Mehta, Alireza Kheirkhahi, Phoebe Chen, Ke Gong, Babak Vakili-Amini, Justin A. Hwang, Mike Shuo-Wei Chen, Manolis Terrovitis, Brian Kaczynski, Sotirios Limotyrakis, Michael P. Mack, Haitao Gan, MeeLan Lee, Richard Chang, Hakan Dogan, Shahram Abdollahi-Alibeik, Burcin Baytekin, Keith Onodera, Suni Mendis, Andrew Chang, Yashar Rajavi, Steve Hung-Min Jen, David K. Su, Bruce A. Wooley:
A Dual-Band CMOS MIMO Radio SoC for IEEE 802.11n Wireless LAN. IEEE J. Solid State Circuits 43(12): 2882-2895 (2008) - [j3]Manolis Terrovitis, Nikos Mamoulis, Panos Kalnis:
Privacy-preserving anonymization of set-valued data. Proc. VLDB Endow. 1(1): 115-125 (2008) - [c12]Dimitris Sacharidis
, Kostas Patroumpas, Manolis Terrovitis, Verena Kantere, Michalis Potamias, Kyriakos Mouratidis
, Timos K. Sellis
:
On-line discovery of hot motion paths. EDBT 2008: 392-403 - [c11]Lalitkumar Nathawad, Masoud Zargari, Hirad Samavati, Srenik Mehta, Alireza Kheirkhahi, Phoebe Chen, Ke Gong, Babak Vakili-Amini, Justin A. Hwang, Mike Shuo-Wei Chen, Manolis Terrovitis, Brian Kaczynski, Sotirios Limotyrakis, Michael P. Mack, Haitao Gan, MeeLan Lee, Shahram Abdollahi-Alibeik, Burcin Baytekin, Keith Onodera, Sunetra Mendis, Andrew Chang, Steve H. Jen, David K. Su, Bruce A. Wooley:
A Dual-Band CMOS MIMO Radio SoC for IEEE 802.11n Wireless LAN. ISSCC 2008: 358-359 - [c10]Manolis Terrovitis, Nikos Mamoulis:
Privacy Preservation in the Publication of Trajectories. MDM 2008: 65-72 - 2007
- [j2]Manolis Terrovitis, Panos Vassiliadis
, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, Stefano Rizzi
:
Modeling and language support for the management of pattern-bases. Data Knowl. Eng. 62(2): 368-397 (2007) - 2006
- [c9]Manolis Terrovitis, Spyros Passas, Panos Vassiliadis
, Timos K. Sellis
:
A combination of trie-trees and inverted files for the indexing of set-valued attributes. CIKM 2006: 728-737 - [c8]Srenik Mehta, William W. Si, Hirad Samavati, Manolis Terrovitis, Michael P. Mack, Keith Onodera, Steve H. Jen, Susan Luschas, Justin A. Hwang, Suni Mendis, David K. Su, Bruce A. Wooley:
A 1.9GHz Single-Chip CMOS PHS Cellphone. ISSCC 2006: 1952-1961 - 2005
- [j1]Panos Vassiliadis
, Alkis Simitsis, Panos Georgantas, Manolis Terrovitis, Spiros Skiadopoulos:
A generic and customizable framework for the design of ETL scenarios. Inf. Syst. 30(7): 492-525 (2005) - [c7]Alkis Simitsis, Panos Vassiliadis, Manolis Terrovitis, Spiros Skiadopoulos:
Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates. DaWaK 2005: 43-52 - [c6]Panos Vassiliadis
, Alkis Simitsis, Manolis Terrovitis, Spiros Skiadopoulos:
Blueprints and Measures for ETL Workflows. ER 2005: 385-400 - [c5]Manolis Terrovitis, Spiridon Bakiras, Dimitris Papadias, Kyriakos Mouratidis:
Constrained Shortest Path Computation. SSTD 2005: 181-199 - 2004
- [c4]Panagiotis Bouros, Theodore Dalamagas, Timos K. Sellis, Manolis Terrovitis:
PatManQL: A Language to Manipulate Patterns and Data in Hierarchical Catalogs. PaRMa 2004 - [c3]Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena:
Modeling and Language Support for the Management of Pattern-Bases. SSDBM 2004: 265-274 - 2003
- [c2]Panos Vassiliadis, Alkis Simitsis, Panos Georgantas, Manolis Terrovitis:
A Framework for the Design of ETL Scenarios. CAiSE 2003: 520-535 - [c1]Stefano Rizzi, Elisa Bertino, Barbara Catania, Matteo Golfarelli, Maria Halkidi, Manolis Terrovitis, Panos Vassiliadis, Michalis Vazirgiannis, Euripides Vrachnos:
Towards a Logical Model for Patterns. ER 2003: 77-90
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-19 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint