By Topic

2009 Fourth Balkan Conference in Informatics

17-19 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 49
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1926 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • Conference Information

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • A Collision Detection and Resolution Multi Agent Approach Using Utility Functions

    Publication Year: 2009, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Free Flight is the concept introduced by NASA and FAA in order to change the aviation of the 21st century, allowing for pilots to choose dynamically (¿on the fly¿) their nominal paths. Despite its many advantages as opposed to today's situation, the free flight concept raises many new issues that need to be addressed before being applicable, with the main interest focusing on conflict detection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-to-Many Monotonic Concession Negotiation Protocol

    Publication Year: 2009, Page(s):8 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    In this paper we propose a generalization of the classic monotonic concession protocol for agent negotiation, originally proposed for two agents, to one-to-many negotiation. This assumes generalization of agreement formation and concession operations from two-agents case to one-to-many case. Our approach is inspired by a recent generalization of the two-agent case to multiple agents. We perform a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Morphological Algorithm for Color Objects Classification

    Publication Year: 2009, Page(s):17 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    A mathematical morphology based approach for automated classification of color objects is explored in this paper. Using an adapted set of mathematical morphology operators, the initial color images are analyzed until final color classification is accomplished. Morphological feature extraction algorithm includes morphological color gradient, homotopic skeleton, Hit-or-Miss transform and other speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secrecy for Bounded Security Protocols: Disequality Tests and an Intruder with Existentials Lead to Undecidability

    Publication Year: 2009, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The complexity of the initial secrecy problem for protocols in restricted form, with bounded length messages, unbounded number of protocol sessions, bounded existentials, disequality tests and an intruder with existentials remained open. In this paper, we prove that the problem above is undecidable, using exactly the same setting and formalism as in the paper in that the problem was initially stat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel ENT - ParENT

    Publication Year: 2009, Page(s):28 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    As the need for high throughput and good quality random number generators is constantly increasing in security applications, the efforts for developing high performance generators must be combined with increasing the performance of the batteries of statistical tests that assess their quality.In order to increase the confidence in the random number generators, several randomness tests are applied o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Proving of the Behavioral Attributes

    Publication Year: 2009, Page(s):33 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Behavioral equivalence is indistinguishably under experiments: two elements are behavioral equivalent iff each experiment returns the same value for the two elements. Behavioral equivalence can be proved by coinduction. CIRC is a theorem prover which implements circular coinduction, an efficient coinductive technique. Equational attributes refer properties like associativity, commutativity, unity,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical Testing of Random Number Sequences Using Graphics Processing Units

    Publication Year: 2009, Page(s):39 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Due to the great processing power available on today's Graphics Processing Units (GPU), we studied the suitability of mapping statistical testing algorithms to this specialized hardware. Out of the testing algorithms proposed by the National Institute of Standards and Technology (NIST), only some were suitable for implementation on GPU, due to the computational format and restrictions of the hardw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Preserving in eLearning Environment (Case of Modeling Hippocratic Database Structure)

    Publication Year: 2009, Page(s):47 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    The number and size of different kinds of electronic files (text, pictures and videos) incorporated into eLearning environments were dramatically increased during the last ten years and this triggered a development of new web based systems for that specific environment. These systems were developed to satisfy current and specific users' needs which lead to appearance of very heterogeneous environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Animation of Behavioral Specifications through Code Generation for a Payment System

    Publication Year: 2009, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    We present a case study concerned with the animation of behavioral specifications through code generation for a payment system; namely, electronic funds transfer system (EFT). The exchange of messages between a central bank and two client banks during daily operations is modeled as a communications model of live sequence charts (LSCs). Using an LSC to Java/AspectJ code generator, the communication... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Codesign in Xilinx Virtex II Pro

    Publication Year: 2009, Page(s):59 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Nowadays the real time video processing is becoming more and more critical. Thus the systems used for these purposes require powerful computation of the data in order to have short response time. Another attribute that is preferred for these systems to have, is versatility or offering the opportunity to be reconfigurable on demand. Co-design is a technique that involves both software and hardware ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Reengineering as a Modernizing Tool for the Public Administration - From Theory to Reality

    Publication Year: 2009, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    In this paper, Business Process Reengineering is briefly analyzed in theoretical level. An effective methodology as well as Administration and Information Technology matters is described, while the differences to Total Quality Management are highlighted. Moreover, the phases of the BPMS methodology as well as reengineering techniques are explained. It is also presented how BPMS methodology is appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MIXPLAN: A CLP-Based Mixed-initiative Planning System for Temporal Domains

    Publication Year: 2009, Page(s):73 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    In mixed-initiative planning the objective is to achieve the best combination of human and machine involvement in the process of constructing qualitative plans. Several mixed-initiative planning systems have been developed in recent years, aiming at reinforcing planning operators in constructing plans for sophisticated domains, such as military or space. In this paper we present a lightweight mixe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Model Design Using Genetic Algorithms and Model Checking

    Publication Year: 2009, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    In recent years there has been a growing interest in applying metaheuristic search algorithms in model-checking. On the other hand, model checking has been used far less in other software engineering activities, such as model design and software testing. In this paper we propose an automated model design strategy, by integrating genetic algorithms (used for model generation) with model checking (u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Task-Based Ontology Enginnering Approach for Novice Ontology Developers

    Publication Year: 2009, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    After classifying the multitude of the ontology development methodologies available in the literature, we propose a new ontology development approach, by combining activities from these methodologies, based on the needs of a novice ontology developer. This approach is adaptive, with respect to contextual factors, which affect the ontology engineering. In order to achieve this, we apply a twofold r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faster Estimation of the Correlation Fractal Dimension Using Box-counting

    Publication Year: 2009, Page(s):93 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    Fractal dimension is widely adopted in spatial databases and data mining, among others as a measure of dataset skewness. State-of-the-art algorithms for estimating the fractal dimension exhibit linear runtime complexity whether based on box-counting or approximation schemes. In this paper, we revisit a correlation fractal dimension estimation algorithm that redundantly rescans the dataset and, ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interpreter for Priority Fuzzy Logic Enriched SQL

    Publication Year: 2009, Page(s):96 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    In this paper we describe a query language called PFSQL (priority fuzzy structured query language) that, beside basic fuzzy capabilities, adds the possibility to specify priorities for fuzzy statements. We give an analysis of possibilities to extend the SQL language and briefly describe the GPFCSP (generalized prioritized fuzzy constraint satisfaction problem) systems, a theoretical concept vital ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Preserving Record Linkage Using Phonetic Codes

    Publication Year: 2009, Page(s):101 - 106
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    Phonetic codes such as Soundex and Metaphone have been used in the past to address the Record Linkage Problem. However, to the best of our knowledge, no particular effort has been made within this context towards privacy assurance during the matching process. Phonetic codes have an interesting feature which can be cornerstone to providing privacy. They are mappings of strings which do not exhibit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Evolution and Improvement of Data Warehouse Design

    Publication Year: 2009, Page(s):107 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Frequently changing business requirements result not only in changes to the data warehouse (DW) workload but also in changes to the schema structure. These schema changes introduce new DW versions and so the problem of optimization of all of its versions becomes a very challenging one.In this paper we present a new approach for dynamically evolving the design of the implementation schema spanning ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster-Based Similarity Search in Time Series

    Publication Year: 2009, Page(s):113 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    In this paper, we present a new method that accelerates similarity search implemented via one-nearest neighbor on time series data. The main idea is to identify the most similar time series to a given query without necessarily searching over the whole database. Our method is based on partitioning the search space by applying the K-means algorithm on the data. Then, similarity search is performed h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.