skip to main content
10.1145/2984393acmotherconferencesBook PagePublication Pagesseeda-cecnsmConference Proceedingsconference-collections
SEEDA-CECNSM '16: Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SEEDA-CECNSM '16: SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference Kastoria Greece September 25 - 27, 2016
ISBN:
978-1-4503-4810-2
Published:
25 September 2016
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 12 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: First Day Coference
research-article
Rapid Implementation of Embedded Systems using Xilinx Zynq Platform

In any digital system design, it is crucial to achieve the lowest time-to-market possible. Indeed, that need has pushed large FPGA manufacturers to produce SoCs which will implement reprogrammable logic along with CPU and DSP cores. Especially, during ...

research-article
Source-Level Compiler Optimizations for High-Level Synthesis

With high-level synthesis becoming the preferred method for hardware design, tools that operate on high-level programming languages and optimize hardware output are crucial for successful synthesis. In high-level synthesis, conventional programming ...

research-article
Heuristics for Iterative Detailed Standard Cell Placement

In cell placement a number of cells with rectangular shapes, must be placed inside a chip area so that no cells overlap and a target function is optimized. In standard cell placement all rectangles have the same width and the chip area is split into ...

research-article
Leveraging Parallelization Opportunities by an Online CAD Tool

High-performance computing utilizes many ranks and threads exploiting contemporary parallel and distributing processing architectures. Parallelizing an application is not a straightforward task as it is commonly admitted among all the researchers with ...

research-article
Enhanced Tetris Legalization

Legalization and detailed placement methods for standard cell designs, are two of the most notable topics in current VLSI research. Being the final steps in a classic placement procedure they must be efficient in terms of the delay overhead they ...

research-article
SER Analysis of Multiple Transient Faults in Combinational Logic

In the VLSI field, reliability of chips is a major issue and it becomes more significant considering the continuous technology down-scaling. Modern chips are extremely sensitive to various factors such as radiation and, thus, it is crucial to implement ...

research-article
IoT Architecture for Monitoring Wine Fermentation Process of Debina Variety Semi-Sparkling Wine

This paper proposes a new system architecture and HTTP communication mechanism called Smart Barrel System (Wine-SBS) for the process of monitoring Debina varietal sparkling wine fermenting conditions, produced at the area of Zitsa Epirus, Greece. The ...

research-article
A two layer supervisor scheme for ring manufacturing production chains

A generic model for a ring production chain with various manufacturing machines and a mobile robotic system is modelled as a finite deterministic automaton. The desired behavior of the plant is prescribed as a desired language. The properties of the ...

research-article
On Security Provision in Demanding Cyberphysical Bluetooth based Systems

During the last few years, short range wireless communication technologies are increasingly utilized in highly demanding applications characterized by strict performance and security demands. Among various respective communication technologies Bluetooth ...

research-article
RF low energy monitoring protocol and system architecture for location based sensor measurements

In this paper, we propose a new protocol for sensors Frequency Shift Keying data transmission named RF-Tania protocol and a mobile application in order to test our protocol. This protocol focuses on Energy Efficiency and it is based on an existent open ...

research-article
Communication Security & Cyberbullying: A Review of the Legal Issues

The research of legal issues concerning the Cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in ...

research-article
A Review of Continuous Authentication Using Behavioral Biometrics

The present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are ...

research-article
Methods for Peak to Average Power Ratio Reduction on SCFDMA

Single Carrier Frequency Division Multiple Access (SCFDMA) is currently adopted by 3GPP in the LTE cellular systems for the uplink due to its high data rate and low peak-to-average power-ratio (PAPR). In this work, the PAPR for IFDMA (Interleaved ...

SESSION: Second Day Coference
research-article
Gamifying e-learning as a Means of Overcoming Its Deficiencies

In the last 20 years computers have been playing an increasingly important part in all aspects of everyday life, changing the way people understand but mostly the way people do things. Education, an integral part of every person's life, could not have ...

research-article
S.A.T.E.P.: Synchronous-Asynchronous Tele-education Platform

S.A.T.E.P.: Synchronous-Asynchronous Tele-education Platform is a software application for educational purposes, with a lot of parametrizing (configuration) features written entirely from scratch. It aims at the training and examination of computer ...

research-article
Reputation Mechanisms in on-line Social Networks: The case of an Influence Estimation System in Twitter

Online social networks have changed the way people communicate, create content and share it via online social actions. In order for users to engage in a social network application, they need mechanisms that will help them to find other users that they ...

research-article
Drivers of Candidates' Social Media Popularity in the 2014 European Parliamentary Elections in Greece

The purpose of the present study is to investigate the main antecedents of candidates' popularity on social media. Herein, social media popularity was measured based on the number of Facebook page likes, Twitter followers, and YouTube video views. Our ...

research-article
Design and Development of a Learning Management System for Vocational Education

In this paper, we present the initial design and implementation of a Learning Management System (L.M.S.) targeting to support Vocational Lyceum students with their laboratory courses. We address the support of laboratory courses for vocational High ...

research-article
Automata-Based Programming for the Development of a Web based Application: A Case Study

The software design of web based applications using the automata-based programming approach is studied. An indicative case study is developed. The case is the Web Based Application of an Innovation and Entrepreneurship Unit. The software is modelled ...

research-article
Loan Evaluation Applying Artificial Neural Networks

The research presented pertains to the evaluation of loans' performance, using soft computing techniques and more specifically Artificial Neural Networks (ANN). Given the economic situation in Europe in the last few years, it is very important for the ...

Recommendations