Fotios Kounelis

ORCID: 0009-0005-5552-8974
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Distributed systems and fault tolerance
  • Algorithms and Data Compression
  • Machine Learning in Bioinformatics
  • Cloud Computing and Resource Management
  • Security and Verification in Computing
  • Cryptographic Implementations and Security
  • Parallel Computing and Optimization Techniques
  • Error Correcting Code Techniques
  • Aviation Industry Analysis and Trends
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • CRISPR and Genetic Engineering
  • Advanced Data Storage Technologies
  • Hemoglobinopathies and Related Disorders
  • Forecasting Techniques and Applications
  • Forest ecology and management
  • Air Traffic Management and Optimization
  • Advanced Proteomics Techniques and Applications
  • Data Mining Algorithms and Applications
  • Integrated Circuits and Semiconductor Failure Analysis
  • Scientific Computing and Data Management
  • DNA and Biological Computing
  • Advanced Database Systems and Queries
  • Gene expression and cancer classification
  • Iron Metabolism and Disorders

Imperial College London
2021-2023

University of Patras
2017-2020

Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing the growing demand multiparty applications however means that building modern CIA systems is more challenging than ever. In response, we present Confidential Consortium Framework (CCF), a general-purpose foundation developing secure stateful applications. CCF combines centralized compute with decentralized trust, supporting...

10.14778/3626292.3626304 article EN Proceedings of the VLDB Endowment 2023-10-01

Single-node multi-core stream processing engines (SPEs) can process hundreds of millions tuples per second. Yet making them fault-tolerant with exactly-once semantics while retaining this performance is an open challenge: due to the limited I/O bandwidth a single-node, it becomes infeasible persist all data and operator state during execution. Instead, single-node SPEs rely on upstream distributed systems, such as Apache Kafka, recover after failure, necessitating complex cluster-based...

10.14778/3489496.3489515 article EN Proceedings of the VLDB Endowment 2021-10-01

Integrated circuits can be modified with malicious circuitries, like hardware trojans. The use of these is either to leak confidential information, or disable security fence a system, even the total destroy chip. In this work, several shift registers and set logic gates were used implement key generators. A trojan circuit was added in combinational circuit, information that generated. Only few logical are needed effectively trigger circuitry, combination flip-flop. These additional gates,...

10.1109/dsd.2017.27 article EN 2017-08-01

FINDbase (http://www.findbase.org) is a comprehensive data resource recording the prevalence of clinically relevant genomic variants in various populations worldwide, such as pathogenic underlying genetic disorders well pharmacogenomic biomarkers that can guide drug treatment. Here, we report significant new developments and technological advancements database architecture, leading to completely revamped structure, querying interface, accompanied with substantial extensions content curation....

10.1002/humu.24018 article EN Human Mutation 2020-04-05

10.1016/j.ic.2019.104466 article EN publisher-specific-oa Information and Computation 2019-09-04

A significant problem in computer science is the management of large data strings and a great number works dealing with specific has been published scientific literature. In this article, we use technique to store efficiently biological sequences, making structures like suffix trees inverted files also employing techniques n-grams, order improve previous constructions. our attempt, drastically reduce space needed indexes, by representing substrings that appear more frequently compact index....

10.3934/medsci.2017.4.426 article EN cc-by AIMS Medical Science 2017-01-01

Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing the growing demand multiparty applications however means that building modern CIA systems is more challenging than ever. In response, we present Confidential Consortium Framework (CCF), a general-purpose foundation developing secure stateful applications. CCF combines centralized compute with decentralized trust, supporting...

10.48550/arxiv.2310.11559 preprint EN cc-by arXiv (Cornell University) 2023-01-01
Coming Soon ...