By Topic

Information Technology Interfaces, 2008. ITI 2008. 30th International Conference on

Date 23-26 June 2008

Filter Results

Displaying Results 1 - 25 of 176
  • Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces

    Page(s): c1
    Save to Project icon | PDF file iconPDF (5030 KB)  
    Freely Available from IEEE
  • Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces

    Page(s): c2
    Save to Project icon | PDF file iconPDF (4781 KB)  
    Freely Available from IEEE
  • Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces

    Save to Project icon | Request Permissions | PDF file iconPDF (4781 KB)  
    Freely Available from IEEE
  • [Back cover]

    Page(s): c4
    Save to Project icon | PDF file iconPDF (4781 KB)  
    Freely Available from IEEE
  • Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces

    Page(s): i
    Save to Project icon | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): ii
    Save to Project icon | PDF file iconPDF (88 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): ii
    Save to Project icon | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • Conference sponsors & acknowledgements

    Page(s): iii - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xiv
    Save to Project icon | PDF file iconPDF (152 KB)  
    Freely Available from IEEE
  • ITI 2008 Committees

    Page(s): xv - xvi
    Save to Project icon | PDF file iconPDF (79 KB)  
    Freely Available from IEEE
  • ITI 2008 reviewers

    Page(s): xvii - xxii
    Save to Project icon | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xxiii - xxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Keynote lectures

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2271 KB)  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some analyses of interval data

    Page(s): 3 - 11
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (572 KB) |  | HTML iconHTML  

    Contemporary computers bring us very large datasets, datasets which can be too large for those same computers to analyse properly. One approach is to aggregate these data (by some suitably scientific criteria) to provide more manageably-sized datasets. These aggregated data will perforce be symbolic data consisting of lists, intervals, histograms, etc. Now an observation is a p-dimensional hypercube or Cartesian product of p distributions in Rp, instead of the p-dimensional point in in Rp of classical data. Other data can be naturally symbolic. We give a brief overview of interval-valued data and show briefly that it is important to use symbolic analysis methodology since, e.g., analyses based on classical surrogates ignore some of the information in the dataset. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering relational data

    Page(s): 13 - 18
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (340 KB) |  | HTML iconHTML  

    A large class of clustering problems can be formulated as an optimizational problem in which the best clustering is searched among all feasible clustering according to a selected criterion function. This clustering approach can be applied to a variety of very interesting clustering problems, as it is possible to adapt it to a concrete clustering problem by an appropriate specification of the criterion function and/or by the definition of the set of feasible clusterings. Both, the blockmodeling problem (clustering of the relational data) and the clustering with relational constraint problem (clustering of the attribute and relational data) can be very successfully treated by this approach. It also opens many new developments in these areas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Walking a tightrope: IT strategies for supporting university research, teaching & administration

    Page(s): 19 - 26
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    The importance of ICT to all aspects of university business cannot be overemphasised. However the devolved nature of university management, and particularly of research, results in tensions between the central university ICT services (including elearning), striving to provide resilient and cost-effective services for all, and the academic communities that need agile and leading-edge ICTs to serve their time-constrained and collaborative needs. Examples of these tensions are provided. Completely resolving these tensions is not realistic, but some methods, based on good practice in strategic management and knowledge management can support better partnerships that enable all to feel that their objectives are taken into account and ensure better understanding by all stakeholders of the issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From learning over e-learning to MyLearning

    Page(s): 27 - 30
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (266 KB) |  | HTML iconHTML  

    Lifelong learning is the new adagio for modern European citizens preparing our knowledge-based society for the next decades to come. Therefore, we need open and flexible learning systems, enabling individual learning pathways for all citizens, suitable to their needs and interests at all stages of their lives. This paper will address the question how universities should support the individual citizens in their lifelong learning trajectory, by transforming learning into e-learning with the help of modern ICT, and further into a personalized way of learning, MyLearning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud computing — Issues, research and implementations

    Page(s): 31 - 40
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (528 KB) |  | HTML iconHTML  

    ldquoCloudrdquo computing - a relatively recent term, builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things. This paper discusses the concept of ldquocloudrdquo computing, issues it tries to address, related research topics, and a ldquocloudrdquo implementation available today. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise-wide information logistics: Conceptual foundations, technology enablers, and management challenges

    Page(s): 41 - 50
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1218 KB) |  | HTML iconHTML  

    Information logistics (IL) is understood as the process of planning, implementing and controlling cross-unit data flows as well as storage and provisioning of respective data - as long as data is used for unitpsilas decision support. IL creates significant business value - but mostly for other units and in the future while costs occur now at the IT units. As a consequence, managerial aspects of IL like requirements analysis, strategic alignment, financials, organizational design and architecture design need more attention than technical issues. This article defines IL, discusses its managerial challenges, and sketches first solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited anniversary lectures

    Page(s): 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2271 KB)  

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An assessment of machine learning methods for robotic discovery

    Page(s): 53 - 60
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (290 KB) |  | HTML iconHTML  

    In this paper we consider autonomous robot discovery through experimentation in the robotpsilas environment. We analyse the applicability of machine learning (ML) methods with respect to various levels of robot discovery tasks, from extracting simple laws among the observed variables, to discovering completely new notions that were never mentioned in the data directly. We first introduce the XPERO project, and present some illustrative initial experiments in robot learning in XPERO. Then we formulate a systematic list of types of learning or discovery tasks, and discuss the suitability of chosen ML methods for these tasks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Love emotions between Laura and Petrarca —an approach by mathematics and system dynamics

    Page(s): 61 - 74
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1546 KB)  

    Laura, a very beautiful but also mysterious lady, inspired the famous poet Petrarch for poems, which express ecstatic love as well as deep despair. F. J. Jones - a scientist for literary - recognised in these changes between love and despair an oscillating behaviour - from 1328 to 1350 -, which he called Petrarch's emotional cycle. The mathematician S .Rinaldi investigated this cycle and established a mathematical model based on ordinary differential equation: two coupled nonlinear ODEs, reflecting Laura's and Petrarch's emotion for each other, drive an inspiration variable, which coincides with Petrarch 's emotional cycle. These ODEs were starting point for the investigations in two directions: mapping the mathematical model to a suitable modelling concept, and trying to extend the model for love dynamics in modern times (F Breitenecker et al). This contribution introduces and investigates a modelling approach for love dynamics and inspiration by means of System Dynamics, as well as for Laura's and Petrarch's emotions as well as for a modern couple in love. In principal, emotions and inspiration emerge from a source, and are fading into a sink. But the controlling parameters for increase and decrease of emotion create a broad variety of emotional behaviour and of degree of inspiration, because of the nonlinearities. Experiments with an implementation of this model approach and selected simulations provide interesting case studies for different kind of love dynamics - attraction, rejection and neglect, - stable equilibriums and chaotic cycles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic art: Technology, mathematics and art

    Page(s): 75 - 82
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    This paper describes algorithmic art, i.e. visual art created on the basis of algorithms that completely describe generation of images. Algorithmic art is rooted in rational approach to art, technology and application of mathematics. It is based on computer technology and particularly on programming that make algorithmic art possible and that influences it most. Therefore we first explore relations of technology and mathematics to art and then describe algorithmic art itself. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time student assessment using a system of RF clickers

    Page(s): 83 - 88
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    The paper presents an analysis of a one-semester technical course ldquoElectrical facilitiesrdquo. The goal of the paper is to show how a system of real-time knowledge testing at undergraduate level, using a radio-frequency clicker system and conventional knowledge assessment methods, was implemented on a single course at the University of Zagreb. Using statistical analysis, students are clustered in groups to show the influence of clickers on the student population. It is shown that clickers have a favorable impact on students and work in accordance with each studentpsilas abilities, as confirmed using conventional assessment methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computerisation, data privacy and scientific excellence; Where are we going?

    Page(s): 89 - 96
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (188 KB) |  | HTML iconHTML  

    Computerisation of most human activities that handle data is widely in function nowadays. General fears of Big Brother syndrome are ubiquitous. The paper attempts to challenge this common wisdom by demonstrating on some examples how computerisation in connection with proclaimed data privacy politics actually hinders the useful information, some of which was even formerly available, without computerisation or in older information system versions before the current rigid data privacy legislation. Examples are taken primarily from some personal author's experience and from information systems aimed for academic community in Croatia, developed at the author's Department. Data privacy prevents ordinary members of the academic community or society from proper investigation that could challenge the adequacy of existing policies. At the same time, the persons who institutionally have granted access to the collected information and who are the most influential to conduct policies have hardly time to do os. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.