Publications in Proceedings in International Conferences

1Alachiotis, N., Kotsiantis, S., Stavropoulos, E. & Verykios, V. S. (2022). Evaluating Contact Sessions and Assignments Grades Impact with Association Rules. International Conference in Open and Distance Learning, 11, 34-46.
2Karapiperis, D., Gkoulalas-Divanis, A. & Verykios, V. S. (2021). MultiBlock: A Scalable Iterative Approach for Progressive Entity Resolution. In the Proceeddings of the 2021 IEEE International Conference on Big Data (Big Data), pp. 219-228, doi: 10.1109/BigData52589.2021.9671540.
3Feretzakis, G., Mitropoulos, K., Kalles, D., & Verykios, V. S. (2021). Inference Control in a Diabetes Data Set using a Java-based Prototype of LDH Algorithm. In J. Mantas, A. Hasman, M. S. Househ, P. Gallos, E. Zoulias, & J. Liaskos (eds.), Informatics and Technology in Clinical Care and Public Health, Proceedings of the 19th International Conference on Informatics, Management and Technology in Healthcare (ICIMTH 2021), pp. 414-417. IOS Press. doi:10.3233/SHTI210946
4Verykios, V. S. & Karapiperis, D. (2021). Entity Resolution in Dissimilarity Spaces. In the Proceedings of the 25th Pan-Hellenic Conference on Informatics, pp. 413-418. https://doi.org/10.1145/3503823.3503899
5Tsoni, R., Zorkadis, V. & Verykios, V. S. (2021). A Data Pipeline to Preserve Privacy in Educational Settings. In the Proceedings of the 25th Pan-Hellenic Conference on Informatics, pp. 138-142. https://doi.org/10.1145/3503823.3503850
6Krasadakis, P., Sakkopoulos, E. & Verykios, V. S. (2021). A Natural Language Processing Survey on Legislative and Greek Documents. In the Proceedings of the 25th Pan-Hellenic Conference on Informatics, pp. 407-412. https://doi.org/10.1145/3503823.3503898
7Karasadakis, P., Verykios V.S., & Sakkopoulos, E. (2021). Resolving Infeasibility in Linear Programs for the Frequent Itemset Hiding Problem. In the Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, pp. 1067-1074, DOI 10.1109/ICTAI52525.2021.00169
8Karapiperis, D., Gkoulalas-Divanis, A., & Verykios, V.S. (2020).Efficient Record Linkage in Data Streams. In the Proceedings of the IEEE International Conference on Big Data, pp. 523-532. DOI: 10.1109/BigData50022.2020.9378127
9Krasadakis, P., Verykios, V.S., & Sakkopoulos, E. (2020). Parallel based Hiding of Sensitive Knowledge. In the Proceedings of the International Conference on Tools with Artificial Intelligence, pp. 1249-1254. DOI: 10.1109/ICTAI50040.2020.00188
10Karapiperis, D., Gkoulalas-Divanis, A., & Verykios, V.S. (2020). Large-Scale Distributed Linkage of Records Containing Spatio-Temporal Information. In the Proceedings of the IEEE International Smart Cities Conference. DOI: 10.1109/ISC251055.2020.9239003
11Feretzakis, G., Mitropoulos, K., Kalles, D., & Verykios, V.S. (2020). Local distortion hiding (LDH) algorithm: A java-based prototype. In the Proceedings of the ACM International Conference Proceeding Series, pp. 144-149. DOI: 10.1145/3411408.3411419
12Verykios, V.S., Stavropoulos, E.C., Zorkadis, V., & Elmagarmid, A.K. (2019). A Constraint-Based Model for the Frequent Itemset Hiding Problem. In S. Katsikas. & V. Zorkadis (Eds.), E-Democracy-Safequarding Democracy and Human Rights in the Digital Age, Proceedings of the 8th International Conference, pp. 49-64. Springer Nature Switzerland. https://doi.org/10.1007/978-3-030-37545-4_4
13Karapiperis, D., Gkoulalas-Divanis, A., & Verykios, V.S. (2019). Linkage of spatio-temporal data and trajectories. In the Proceedings of the 5th IEEE International Smart Cities Conference, pp. 766-771. DOI: 10.1109/ISC246665.2019.9071724
14Feretzakis, G., Kalles, D., & Verykios, V.S. (2019). Local Distortion Hiding in Financial Technology application: A case study with a benchmark data set. In the Proceedings of the 10th International Conference on Information, Intelligence, Systems and Applications. DOI: 10.1109/IISA.2019.8900733
15Gkontzis, A.F., Panagiotakopoulos, C.T., Kotsiantis, S., & Verykios, V.S. (2019). Measuring engagement to assess performance of students in distance learning. In the Proceeding of the 9th International Conference on Information, Intelligence, Systems and Applications. DOI: 10.1109/IISA.2018.8633607
16Tsoni, R., Samaras, C., Paxinou, E., Panagiotakopoulos, C., & Verykios, V.S. (2019).From analytics to cognition: Expanding the reach of data in learning. In the Proceedings of the 11th International Conference on Computer Supported Education, 2, pp. 458-465. DOI: 10.5220/0007751904580465
17Gkontzis, A.F., Kotsiantis, S., Tsoni, R., & Verykios, V.S. (2018). An effective LA approach to predict student achievement. In the Proceedings of the 22nd Pan-Hellenic Conference on Informatics, pp. 76-81. DOI: 10.1145/3291533.3291551
18Karapiperis, D., Gkoulalas-Divanis, A., & Verykios, V.S. (2018). FEMRL: A Framework for Large-Scale Privacy-Preserving Linkage of Patients’ Electronic Health Records. In the Proceedings of the IEEE International Smart Cities Conference, pp. 1-8. doi: 10.1109/ISC2.2018.8656943
19Feretzakis, G., Kalles, D., & Verykios, V.S. (2018). On using linear diophantine equations for efficient hiding of decision tree rules. In the Proceedings of the 10th Hellenic Conference on Artificial Intelligence, pp. 1-8. DOI: 10.1145/3200947.3201030
20Boussis, D., Sioutas, S., Dritsas, E., Tzimas, G., Kanavos, A., & Verykios, V.S. (2018). Mapreduce implementations for privacy preserving record linkage. In the Proceedings of the 10th Hellenic Conference on Artificial Intelligence, pp. 1-4. DOI: 10.1145/3200947.3201043
21Karapiperis, D., Gkoulalas-Divanis, A., & Verykios, V.S. (2018). Summarization algorithms for record linkage. In the Proceedings of the Proceedings of the 21st International Conference on Extending Database Technology, pp. 73-84. DOI: 10.5441/002/edbt.2018.08
22Gkontzis, A.F., Karachristos, C.V., Panagiotakopoulos, C.T., Stavropoulos, E.C., & Verykios, V.S. (2017). Sentiment analysis to track emotion and polarity in student for a. In the Proceedings of the 21th Pan-Hellenic Conference on Informatics. DOI: 10.1145/3139367.3139389
23Theodosiou, T.C., Karapiperis, D., & Verykios, V.S. (2017). Usingwavelets for matching records privately. In the Proceedings of the 21th Pan-Hellenic Conference on Informatics. DOI: 10.1145/3139367.3139371
24Karapiperis, D., Gkoulalas-Divanis, A., & Verykios, V.S. (2017). Distance-Aware encoding of numerical values for privacy-preserving record linkage. In the Proceedings of the IEEE 33rd International Conference on Data Engineering, pp. 135-138. DOI: 10.1109/ICDE.2017.58
25Lazarinis, F., Verykios, V.S., & Panagiotakopoulos, C. (2017). A mobile application for user regulated self-assessments. In the Proceedings of the 13th International Conference on Mobile Learning, pp. 56-62.
26Kostopoulos G., Kotsiantis S., & Verykios V.S. (2017). A Prognosis of Junior High School Students’ Performance Based on Active Learning Methods. In: Frasson C., Kostopoulos G. (Eds.,) Brain Function Assessment in Learning. BFAL 2017. Lecture Notes in Computer Science, vol 10512. Springer, Cham. https://doi.org/10.1007/978-3-319-67615-9_6
27Kagklis, V., Karatrantou, A., Tantoula, M., Panagiotakopoulos, C. T., & Verykios, V.S. (2016). A Learning Analytics Methodology for Detecting Sentiment in Student Fora: A Case Study in Distance Education. European Journal of Open, Distance and E-Learning, 18(2), pp.74-94. https://doi.org/10.1515/eurodl-2015-0014
28Karachristos, C.V., Stavropoulos, E.C., Verykios, V.S., Lazarinis, F., Sakkopoulos, E., & Androulakis, G. (2016). Promoting Active Learning using a web-based Audience Response System. In the Proceedings of the Proceedings of the 20th Pan-Hellenic Conference on Informatics. DOI: 10.1145/3003733.3003753
Kalles, D., Verykios, V.S., Feretzakis, G., & Papagelis, A. (2016). Data set operations to hide decision tree rules. In the Proceedings of the 1st International Workshop on AI for Privacy and Security. DOI: 10.1145/2970030.2970041
29Kalles, D., Verykios, V.S., & Papagelis, A. (2016). Hiding decision tree rules by data set operations. In the Proceedings of the 6th International Conference on Information, Intelligence. DOI: 10.1109/IISA.2015.7387954
30Karapiperis, D., Vatsalan, D., Verykios, V.S., & Christen, P. (2016). Efficient record linkage using a compact Hamming space. In the Proceedings of the 19th International Conference on Extending Database Technology, pp. 209-220. DOI: 10.5441/002/edbt.2016.21
31Karapiperis D., Verykios V.S., Katsiri E., Delis A. (2016). A Tutorial on Blocking Methods for Privacy-Preserving Record Linkage. In: Karydis I., Sioutas S., Triantafillou P., Tsoumakos D. (Eds.), Algorithmic Aspects of Cloud Computing. ALGOCLOUD 2015. Lecture Notes in Computer Science, vol 9511. Springer, Cham. https://doi.org/10.1007/978-3-319-29919-8_1
32Ranbaduge T., Vatsalan D., Christen P., & Verykios V. (2016). Hashing-Based Distributed Multi-party Blocking for Privacy-Preserving Record Linkage. In: Bailey J., Khan L., Washio T., Dobbie G., Huang J., Wang R. (Eds.), Advances in Knowledge Discovery and Data Mining. PAKDD 2016. Lecture Notes in Computer Science, vol 9652. Springer, Cham. https://doi.org/10.1007/978-3-319-31750-2_33
33Gakis, P., Panagiotakopoulos, C., Sgarbas, K., Tsalidis, C., & Verykios, V.S. (2015). Construction of a Modern Greek Grammar Checker Through Mnemosyne Formalism. In A., Ronzhin. R., Potapova. & N., Fakotakis. (Eds.), Speech and Computer. SPECOM 2015. Lecture Notes in Artificial Intelligence, vol 9319. Springer International Publishing. DOI 10.1007/978-3-319-23132-7
34Lazarinis, F., Alexandri, K., Verykios, V.S., & Panagiotakopoulos, C. (2015). Raising safer internet awareness through a mobile application based on contrasting visual stories. In the Proceedings of 9th International Conference on Interactive Mobile Communication Technologies and Learning. DOI: 10.1109/IMCTL.2015.7359561
35Boididis, I., Lazarinis, F., Verykios, V.S., & Panagiotakopoulos, C. (2015). Exploring cultural heritage landscapes in an interactive game-based learning application. In the Proceedings of the 9th International Conference on Interactive Mobile Communication Technologies and Learning, pp. 59-62, doi: 10.1109/IMCTL.2015.7359554.
36Lazarinis, F., Mazaraki, A., Verykios, V.S., & Panagiotakopoulos, C. (2015). E-comics in teaching: Evaluating and using comic strip creator tools for educational purposes. In the Proceedings of the 10th International Conference on Computer Science and Education, pp. 305-309. doi: 10.1109/ICCSE.2015.7250261.
37Karakasidis, A., Koloniari, G., & Verykios, V.S. (2015). Scalable blocking for privacy preserving record linkage. In the Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 527-536. DOI: 10.1145/2783258.2783290
38Karakasidis A., Koloniari G., Verykios V.S. (2015) Privacy Preserving Blocking and Meta-Blocking. In: Bifet A. et al. (eds) Machine Learning and Knowledge Discovery in Databases. ECML PKDD 2015. Lecture Notes in Computer Science, vol 9286. Springer, Cham. DOI: 10.1007/978-3-319-23461-8_20
Lazarinis, F., Verykios, V.S., & Panagiotakopoulos, C. (2015). An adaptive web tool for self-aßeßment using lightweight user profiles. In the Proceedings of the 7th International Conference on Computer Supported Education, 2, pp. 14-23.
39Karapiperis D., Vatsalan D., Verykios V.S., Christen P. (2015) Large-Scale Multi-party Counting Set Intersection Using a Space Efficient Global Synopsis. In: Renz M., Shahabi C., Zhou X., Cheema M. (eds.), Database Systems for Advanced Applications. DASFAA 2015. Lecture Notes in Computer Science, vol 9050. Springer, Cham. DOI: 10.1007/978-3-319-18123-3_20
40Karakasidis, A., Koloniari, G., & Verykios, V.S. (2015). PRIVATEER: A private record linkage toolkit. In the Proceedings of the CEUR Workshop Proceedings, 1367, pp. 197-204.
41Kagklis, V., Verykios, V.S., Tzimas, G., & Tsakalidis, A.K. (2014). An Integer Linear Programming Scheme to Sanitize Sensitive Frequent Itemsets. In the Proceedings of the IEEE 26th International Conference on Tools with Artificial Intelligence, pp. 771-775, doi: 10.1109/ICTAI.2014.119
42Magkos E., Kotzanikolaou P., Magioladitis M., Sioutas S., & Verykios V.S. (2014). Towards Secure and Practical Location Privacy through Private Equality Testing. In: Domingo-Ferrer J. (Eds.), Privacy in Statistical Databases. PSD 2014. Lecture Notes in Computer Science, vol 8744. Springer, Cham. DOI: 10.1007/978-3-319-11257-2_24
43Kagklis, V., Verykios, V.S., Tzimas, G., & Tsakalidis, A.K. (2014). Knowledge sanitization on the web. In the Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics. DOI: 10.1145/2611040.2611044
44Lotsari E., Verykios V.S., Panagiotakopoulos C., & Kalles D. (2014). A Learning Analytics Methodology for Student Profiling. In: Likas A., Blekas K., Kalles D. (Eds.), Artificial Intelligence: Methods and Applications. SETN 2014. Lecture Notes in Computer Science, vol 8445. Springer, Cham. DOI: 10.1007/978-3-319-07064-3_24
45Karapiperis, D., & Verykios, V.S. (2013). A distributed framework for scaling up LSH-based computations in privacy preserving record linkage. In the Proceedings of the 6th Balkan Conference in Informatics, pp. 102-109. DOI: 10.1145/2490257.2490258
46Vatsalan, D., Christen, P., & Verykios, V.S. (2013). Efficient two-party private blocking based on sorted nearest neighborhood clustering. In the Proceedings of the 22nd ACM international conference on Information & Knowledge Management, pp. 1949-1958. DOI: 10.1145/2505515.2505757
47Sakkopoulos, E., Mersini, P., Tsakalidis, A., Sioutas, S., & Verykios, V.S. (2013). A novel mobile framework for anonymity techniques and services research. In the Proceedings of the IEEE 14th International Conference on Mobile Data Management, pp. 353-355, doi: 10.1109/MDM.2013.55.
48Karakasidis, A., & Verykios, V.S. (2012). A Highly Efficient and Secure Multidimensional Blocking Approach for Private Record Linkage. In the Proceedings of the 24th International Conference on Tools with Artificial Intelligence, pp. 428-435. doi: 10.1109/ICTAI.2012.65
49Karakasidis, A., & Verykios, V.S. (2012). A Sorted Neighborhood Approach to Multidimensional Privacy Preserving Blocking. In the Proceedings of the 12th International Conference on Data Mining Workshops, pp. 937-944. doi: 10.1109/ICDMW.2012.70
50Karakasidis, A., & Verykios, V.S. (2012). Reference table based k-anonymous private blocking. In the Proceedings of the of the 27th Annual ACM Symposium on Applied Computing, pp. 859-864. DOI: 10.1145/2245276.2245444
51Karakasidis A., Verykios V.S., & Christen P. (2012.) Fake Injection Strategies for Private Phonetic Matching. In: Garcia-Alfaro J., Navarro-Arribas G., Cuppens-Boulahia N., de Capitani di Vimercati S. (eds.), Data Privacy Management and Autonomous Spontaneus Security. DPM 2011, SETOP 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. DOI: 10.1007/978-3-642-28879-1_2
52Dimitrakakis, C., Gkoulalas-Divanis, A., Mitrokotsa, A., Saygin, Y., & Verykios, V.S. (2011). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6549.
53Vatsalan, D., Christen, P., & Verykios, V.S. (2010). An Efficient Two-Party Protocol for Approximate Matching in Private Record Linkage. Conferences in Research and Practice in Information Technology Series, 121, pp. 125-136.
54Sioutas S., Magkos E., Karydis I., & Verykios V.S. (2010). Uncertainty for Anonymity and 2-Dimensional Range Query Distortion. In: Domingo-Ferrer J., Magkos E. (eds.), Privacy in Statistical Databases. PSD 2010. Lecture Notes in Computer Science, vol 6344. Springer, Berlin, Heidelberg. DOI: 10.1007/978-3-642-15838-4_8
55Delis, A., Verykios, V.S., & Tsitsonis, A.A. (2010). A data perturbation approach to sensitive classification rule hiding. In the Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 605-609. DOI: 10.1145/1774088.1774216
56Gkoulalas-Divanis, A., Liu, K., Verykios, V.S., & Wolff, R. (2010). 2nd IEEE international workshop on Privacy Aspects of Data Mining (PADM 2010). In the Proceedings of the 2010 IEEE International Conference on Data Mining Workshops. DOI: 10.1109/ICDMW.2010.122
57Goulalas-Divanis, A., Verykios, V.S., & Mokbel, M.F. (2009). Identifying unsafe routes for network-based trajectory privacy. In the Proceedings of the 9th SIAM International Conference on Data Mining, 2, pp. 937-948. Retrieved from http://toc.proceedings.com/05463webtoc.pdf
58Karakasidis, Α., & Verykios, V.S. (2009). Privacy Preserving Record Linkage Using Phonetic Codes. In the proceedings of the 4th Fourth Balkan Conference in Informatics, pp. 101-106, doi: 10.1109/BCI.2009.
59Gkoulalas-Divanis, A., & Verykios, V.S., & Eleftheriou, D. (2009). PLOT: Privacy in Location Based Services: An Open-Ended Toolbox. In the Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 62-71, doi: 10.1109/MDM.2009.17.
60Katsarou A., Aris GD., & Verykios V.S. (2009). Reconstruction-based Classification Rule Hiding through Controlled Data Modification. In: Iliadis, Maglogiann, Tsoumakasis, Vlahavas, Bramer (eds.), Artificial Intelligence Applications and Innovations III. AIAI 2009. IFIP International Federation for Information Processing, vol 296. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0221-4_53
61Gkoulalas-Divanis A., Verykios V.S. (2008). A Free Terrain Model for Trajectory K–Anonymity. In: Bhowmick S.S., Küng J., Wagner R. (eds.), Database and Expert Systems Applications. DEXA 2008. Lecture Notes in Computer Science, vol 5181. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85654-2_6
62Gkoulalas-Divanis A., & Verykios V.S. (2008). A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. In: Jajodia S., Samarati P., Cimato S. (eds.), In the Proceedings of the Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_23
63Gkoulalas-Divanis, A., & Verykios, V.S. (2007). A Hybrid Approach to Frequent Itemset Hiding. In the Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence, pp. 297-304. doi: 10.1109/ICTAI.2007.68.
64Zacharouli, P., Gkoulalas-Divanis, A., Verykios, V.S. (2007). A k-anonymity model for spatio-temporal data. In the Proceedings of the International Conference on Data Engineering, pp. 555-564. DOI: 10.1109/ICDEW.2007.4401041
65Gkoulalas-Divanis, A., & Verykios, V.S. (2006). An integer programming approach for frequent itemset hiding. In the Proceedings of the 15th ACM international conference on Information and knowledge management, pp. 748-757. DOI: 10.1145/1183614.1183721
66Moustakides G.V. & Verykios, V.S. (2006). A Max-Min Approach for Hiding Frequent Itemsets. In the Proceedings of the 6th IEEE International Conference on Data Mining – Workshops, pp. 502-506. doi: 10.1109/ICDMW.2006.8
67Verykios, V.S., & Moustakides, G.V. (2004). A generalized cost optimal decision model for record matching. In the Proceedings of the 2004 international workshop on Information quality in information systems, pp.20-26. DOI: 10.1145/1012453.1012457
68Pontikakis, E.D., Tsitsonis, A.A., Verykios, V.S., Theodoridis, Y., & Chang, L. (2004). A quantitative and qualitative analysis of blocking in association rule hiding. In the Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 29-30. https://doi.org/10.1145/1029179.1029187
69Pfoser, D., Tryfona, N., & Verykios, V. (2003). Services-based data management in a global computing environment. In the Proceedings of the 4th International Conference on Web Information Systems Engineering Workshops, pp. 45-53. DOI: 10.1109/WISEW.2003.1286785
70Houstis E.N., Verykios V.S., Catlin A.C., Rice J.R. (2003) A Knowledge Discovery Methodology for Behavior Analysis of Large-Scale Applications on Parallel Architectures. In: Sloot P.M.A., Abramson D., Bogdanov A.V., Gorbachev Y.E., Dongarra J.J., Zomaya A.Y. (eds.), Computational Science — ICCS 2003. ICCS 2003. Lecture Notes in Computer Science, vol 2660. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44864-0_76
71Y. Saygin, Y., Verykios, V.S., & Elmagarmid, A.K. (2002). Privacy preserving association rule mining. In the Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002, pp. 151-158, doi: 10.1109/RIDE.2002.995109.
72Elfeky, M.G., Verykios, V.S., & Elmagarmid, A.K. (2002). TAILOR: A record linkage toolbox. In the Proceedings of the 18th International Conference on Data Engineering, pp. 17-28. doi: 10.1109/ICDE.2002.994694
73Dasseni E., Verykios V.S., Elmagarmid A.K., & Bertino E. (2001). Hiding Association Rules by Using Confidence and Support. In: Moskowitz I.S. (eds.), Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_27
Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., & Verykios, V. (1999). Disclosure limitation of sensitive rules. In the Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange, pp. 45-52. doi: 10.1109/KDEX.1999.836532.
74Pantazopoulos, K.N., Verykios, V.S., & Houstis, E.N. (1998). Knowledge based system for evaluation of option pricing algorithms. In the Proceedings of the IEEE/IAFE Conference on Computational Intelligence for Financial Engineering, pp. 123-140.
75Vergis A., & Verykios V. (1994). On the testability of purely recursive digital filters. In: Halatsis C., Maritsas D., Philokyprou G., Theodoridis S. (eds.), PARLE’94 Parallel Architectures and Languages Europe. PARLE 1994. Lecture Notes in Computer Science, vol 817. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58184-7_92
76Houstis C., Papatheodorou T.S., Verykios V., Floratos A., & Elmagarmid A. (1994). BIND: A biomedical INteroperable database system. In: Karagiannis D. (eds.), Database and Expert Systems Applications. DEXA 1994. Lecture Notes in Computer Science, vol 856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58435-8_233

Skip to content