


default search action
Sotiris Maniatis
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j11]Theodore B. Zahariadis, Panagiotis Trakadas, Helen-Catherine Leligou, Sotiris Maniatis, Panagiotis Karkazis:
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 69(2): 805-826 (2013) - 2012
- [j10]Helen-Catherine Leligou, Panagiotis Trakadas, Sotirios Maniatis, Panagiotis Karkazis, Theodore B. Zahariadis:
Combining trust with location information for routing in wireless sensor networks. Wirel. Commun. Mob. Comput. 12(12): 1091-1103 (2012)
2000 – 2009
- 2009
- [c12]Panayiotis Kotzanikolaou
, Sotirios Maniatis, Eugenia G. Nikolouzou, Vassilios Stathopoulos:
Evaluating Common Privacy Vulnerabilities in Internet Service Providers. e-Democracy 2009: 161-170 - [c11]Panagiotis Trakadas, Sotiris Maniatis, Panagiotis Karkazis, Theodore B. Zahariadis, Helen-Catherine Leligou, Stamatis Voliotis:
A novel flexible trust management system for heterogeneous wireless sensor networks. ISADS 2009: 369-374 - [c10]Yannis Stelios, Nikos Papayanoulas, Panagiotis Trakadas, Sotiris Maniatis, Helen-Catherine Leligou
, Theodore B. Zahariadis
:
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks. MOBILIGHT 2009: 85-92 - 2007
- [j9]Eugenia G. Nikolouzou, Petros Sampatakos
, Evangelos A. Kosmatos, Sotiris Maniatis, Iakovos S. Venieris:
Constraint-based media content delivery over heterogeneous networks and devices. Int. J. Wirel. Mob. Comput. 2(2/3): 224-234 (2007) - 2006
- [j8]Sotiris Maniatis, Eugenia G. Nikolouzou, Iakovos S. Venieris:
Dynamic resource management for QoS provisioning over next-generation IP-based wireless networks. Comput. Commun. 29(6): 730-740 (2006) - 2004
- [j7]Sotiris Maniatis, Eugenia G. Nikolouzou, Iakovos S. Venieris:
End-to-end QoS specification issues in the converged all-IP wired and wireless environment. IEEE Commun. Mag. 42(6): 80-86 (2004) - [j6]Evi Tsolakou, Eugenia G. Nikolouzou, Sotiris Maniatis, Iakovos S. Venieris:
Definition and Performance Evaluation of Network Services Deployed over a Differentiated Services Network. J. Netw. Syst. Manag. 12(4): 537-565 (2004) - [c9]Eugenia G. Nikolouzou, Sotirios Maniatis, Iakovos S. Venieris:
Resource allocation algorithms for intra-domain quality of service provisioning. ISCC 2004: 939-944 - 2003
- [j5]Charilaos A. Tsetsekas, Sotirios Maniatis, Iakovos S. Venieris:
The end-user application toolkit: a QoS portal for the next generation Internet. Int. J. Commun. Syst. 16(7): 605-626 (2003) - [j4]Constantinos F. Grecas, Sotirios Maniatis, Iakovos S. Venieris:
Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration. Mob. Networks Appl. 8(2): 145-150 (2003) - [j3]Constantinos F. Grecas, Sotirios Maniatis, Iakovos S. Venieris:
GIP: An Infrastructure for Mobile Intranets Deployment. Wirel. Networks 9(4): 321-330 (2003) - [c8]Falk Kemmel, Sotiris Maniatis, Anne Thomas, Charilaos A. Tsetsekas:
Application Support by QoS Middleware. Art-QoS 2003: 165-176 - 2002
- [j2]Sotiris Maniatis, Eugenia G. Nikolouzou, Iakovos S. Venieris:
QoS issues in the converged 3G wireless and wired networks. IEEE Commun. Mag. 40(8): 44-53 (2002) - [j1]Nikos A. Nikolaou, Konstantinos Vaxevanakis, Sotirios Maniatis, Iakovos S. Venieris, Nicholas Zervos:
Wireless Convergence Architecture: A Case Study Using GSM and Wireless LAN. Mob. Networks Appl. 7(4): 259-267 (2002) - [c7]Eugenia G. Nikolouzou, Sotirios Maniatis, Petros Sampatakos
, H. Tsetsekas, Iakovos S. Venieris:
Network services definition and deployment in a differentiated services architecture. ICC 2002: 1057-1062 - 2001
- [c6]Charilaos A. Tsetsekas, Sotirios Maniatis, Iakovos S. Venieris:
Supporting QoS for Legacy Applications. ICN (2) 2001: 108-116 - [c5]Constantinos F. Grecas, Sotirios Maniatis, Iakovos S. Venieris:
Building Mobile Intranets Over The UMTS. PWC 2001: 151-167 - [c4]Constantinos F. Grecas, Sotirios Maniatis, Iakovos S. Venieris:
Towards the Introduction of the Asymmetric Cryptography in GSM, GPRS, and UMTS Networks. ISCC 2001: 15-21 - [c3]Constantinos F. Grecas, Sotirios Maniatis, Iakovos S. Venieris:
GIP: an infrastructure for mobile intranets development. Wireless Mobile Internet 2001: 19-25 - 2000
- [c2]Konstantinos Vaxevanakis, Sotirios Maniatis, Nikolaos P. Nikolaou
, Iakovos S. Venieris:
Seamless and Uniterrupted Interworking of Wireless and Wireline Network Technologies. INTERWORKING 2000: 326-336 - [c1]Nikos A. Nikolaou, Konstantinos Vaxevanakis, Sotiris Maniatis, Iakovos S. Venieris, Nicholaos Zervos:
Wireless technologies convergence: results and experience. WCNC 2000: 566-571
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint