By Topic

Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces

21-24 June 2010

Filter Results

Displaying Results 1 - 25 of 135
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    IEEE is not the copyright holder of this material | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    IEEE is not the copyright holder of this material | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): i
    IEEE is not the copyright holder of this material | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2010, Page(s): ii
    IEEE is not the copyright holder of this material | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2010, Page(s):iii - iv
    IEEE is not the copyright holder of this material | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xii
    IEEE is not the copyright holder of this material | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s):xiii - xiv
    IEEE is not the copyright holder of this material | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xv - xviii
    IEEE is not the copyright holder of this material | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xix - xxii
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote lectures

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-step method for detecting selection signatures using genetic markers

    Publication Year: 2010, Page(s):3 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    A two-step procedure is presented for analysis of θ (FST) statistics obtained for a battery of loci, which eventually leads to a clustered structure of values. The first step uses a simple Bayesian model for drawing samples from posterior distributions of θ-parameters but without constructing Markov chains. This step assigns a weakly informative prior to allelic frequencie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Intelligence at the crossroads: Convergence or confusion ahead?

    Publication Year: 2010, Page(s):21 - 28
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    Business Intelligence (BI) innovation may have stagnated given the combined forces of a down economy and the mergers and acquisitions that have reshaped the BI vendor space. To catalyze needed innovation, a new challenge is issued that focuses on advancing global services growth. That challenge is contextualized as one requiring piecemeal advancements within specific service industries before gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Systems Need Safety Locks

    Publication Year: 2010, Page(s):29 - 36
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (89 KB) | HTML iconHTML

    User interfaces often behave unpredictably on erroneous input - rather than blocking errors and requiring the user to correct them. The consequences of this in the context of medical devices, which may give patients undetected overdoses, can be unfortunate. The solution should include better design, including the concept of safety locks, that block some forms of user error. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquiring and using large scale knowledge

    Publication Year: 2010, Page(s):37 - 42
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (949 KB) | HTML iconHTML

    Formalized representations of knowledge can offer greater flexibility and broader applicability to problem solving programs, by reducing the need for specialized programming. However, this promise can only be fully realized if all of the knowledge required for some task is available in suitable form. The recent increase in popularity of logicbased representations, operating over web-based logical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Culture change in data management

    Publication Year: 2010, Page(s):43 - 48
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (58 KB) | HTML iconHTML

    In the emerging e-Science scenario users should be able to easily combine data resources and tools/services; and machines should automatically be able to trace paths and carry out interpretations. Users who want to participate need to move from a down-load first to a cyberinfrastructure paradigm, thus increasing their dependency on the seamless operation of all components in the Internet. Such a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special lecture

    Publication Year: 2010, Page(s):49 - 50
    IEEE is not the copyright holder of this material | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • Research quality matters

    Publication Year: 2010, Page(s):51 - 52
    IEEE is not the copyright holder of this material | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Special topic/session “language technologies: An infrastructure for information society”

    Publication Year: 2010, Page(s):53 - 54
    IEEE is not the copyright holder of this material | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • An experiment in verb valency frame extraction from Croatian Dependency Treebank

    Publication Year: 2010, Page(s):55 - 60
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    The paper presents an approach to semi-automatic verb valency frame extraction from the Croatian Dependency Treebank. Our algorithm extracted 1923 verb valency frames for 594 different verbs. We discuss applicability of our method to semi-automatic verb valency lexicon creation and refinement, along with possibilities of utilizing it in the task of parsing Croatian texts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tagger voting improves morphosyntactic tagging accuracy on Croatian texts

    Publication Year: 2010, Page(s):61 - 66
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (99 KB) | HTML iconHTML

    We present results of an experiment dealing with combining outputs of five part-of-speech taggers via tagger voting in order to improve the overall accuracy of morphosyntactic tagging of Croatian texts using a subset of the Multext-East v3 tagset. The increase in accuracy over the best-performing single tagger is shown to exist, but not to be statistically significant. We discuss the performance o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying syntactic patterns in Croatian WordNet synset definitions

    Publication Year: 2010, Page(s):67 - 72
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    The paper presents syntactic pattern definitions designed for Croatian WordNet in order to create unambiguous and consistent synset definitions. The rules are implemented in form of finite-state transducers and tested on already existing version of Croatian WordNet. Results are presented using standard evaluation measures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextualized question answering

    Publication Year: 2010, Page(s):73 - 78
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    The paper proposes an approach to contextualized answering of questions. The contextualization is achieved by using an ontology. The answers are provided based on a domain specific document collection. The approach consists of several phases as follows: data preparation, data enhancement, data indexing and handling questions. The functioning of the proposed approach is demonstrated on English docu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptation of NLP techniques to cultural heritage research and documentation

    Publication Year: 2010, Page(s):79 - 84
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    The WissKI system provides a framework for ontology-based science communication and cultural heritage documentation. In many cases, the documentation consists of semi-structured data records with free text fields. Most references in the texts comprise of person and place names, as well as time specifications. We present the WissKI tools for semantic annotation using controlled vocabularies and for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.