|
Τίτλος |
Δημιουργός |
Ημερομηνία |
|
5.
|
Decentralized identity management and access control based on Blockchain technologies
|
Πλευρίδη, Ελευθερία Σ.
|
2024-07-26 |
|
6.
|
From file folders to knowledge graphs : an automatic and configurable symbiotic approach
|
Σμυρνάκης, Εμμανουήλ Τ.
|
2024-07-26 |
|
7.
|
Mistakes were made; design patterns for error feedback in virtual reality training simulations in a no-code authoring tool
|
Φιλιππίδης, Αχιλλέας Χ.
|
2024-07-26 |
|
8.
|
Protecting LSM key-value stores using Secure Enclaves
|
Ευδώρου, Γιάννος Δ.
|
2024-07-26 |
|
9.
|
pyGANDALF - a Geometric, ANimation, Directed, Algorithmic, Learning Framework for computer graphics
|
Πετρόπουλος, Ιωάννης Α.
|
2024-07-26 |
|
10.
|
Automated causal discovery library
|
Ντρουμπογιάννης, Αντώνιος Χ.
|
2024-03-22 |
|
11.
|
An automated method for the creation of oriented bounding boxes in remote sensing object detection datasets
|
Σαβαθράκης, Γεώργιος Κων.
|
2024-03-22 |
|
12.
|
A commonsense knowledge-driven framework for part-of relation discovery in images
|
Κουμούρου, Σωτήρης Θ.
|
2024-03-22 |
|
13.
|
Employing encryption workarounds to support digital forensics investigations
|
Καλοχριστιανάκης, Διονύσιος Αριστοτέλης Γ.
|
2024-03-22 |
|
14.
|
The evolution of cybercrime through the lens of cryptocurrencies
|
Αρακάς, Ιωάννης Γ.
|
2024-03-22 |
|