Costas Kalogiros

  • Citations Per Year
Learn More
Over the last few years, a significant amount of the effort of the Future Internet architecture is devoted in order to improve the scalability of the next generation routing architecture. In this paper, we study providers' incentives to perform prefix aggregation or deaggregation of non-customers routes. This is essentially a trade-off between reduced(More)
With the evolution of the Internet from a controlled research network to a worldwide social and economic platform, the initial assumptions regarding stakeholder cooperative behavior are no longer valid. Conflicts have emerged in situations where there are opposing interests. Previous work in the literature has termed these conflicts tussles. This article(More)
Over the past decades, the fundamental principles of the Internet architecture have not significantly changed. However, Internet evolution and its effects on participants’ interests have triggered the need for re-defining these design principles. “Design for Tussle” is an aspiration for future network designs, which enables the involved stakeholders to(More)
Current Future Internet (FI) research brings out the trend of designing information-oriented networks, in contrast to the current host-centric Internet. Information-centric Networking (ICN) focuses on finding and transmitting information to end-users, instead of connecting end hosts that exchange data. The key concepts of ICN are expected to have(More)
Trustworthiness of dynamical and distributed socio-technical systems is a key factor for the success and wide adoption of these systems in digital businesses. Different trustworthiness attributes should be identified and accounted for when such systems are built, and in order to maintain their overall trustworthiness they should be monitored during(More)
The analysis of existing software evaluation techniques reveals the need for evidence-based evaluation of systems’ trustworthiness. This paper aims at evaluating trustworthiness of socio-technical systems during designtime. Our approach combines two existing evaluation techniques: a computational approach and a risk management approach. The risk-based(More)
We evaluate from a VoIP provider’s point of view possible strategies for selecting PSTN gateways and/or signaling servers (perhaps through ENUM) under blocking uncertainty. Different gateways may have different prices for terminating the VoIP calls to the PSTN and different blocking probabilities. A customer placing a call to the VoIP provider is impatient(More)
We apply a tussle analysis methodology to two types of functionality offered by the ETICS framework. The first one is related to establishment of QoS-aware, inter-domain paths. We find that allowing fine-grained control over major properties of interconnection agreement (such as set of IP destinations) can help adoption of the ETICS system and sustain a(More)
Trustworthiness of software and services is a key concern for their use and adoption by organizations and endusers. Trustworthiness evaluation is an important task to support making informed decisions for both providers and consumers, i.e., for selecting components from a software marketplace. An analysis of the state of the art in software evaluation(More)