By Topic

Information Technology Interfaces (ITI), Proceedings of the ITI 2011 33rd International Conference on

Date 27-30 June 2011

Filter Results

Displaying Results 1 - 25 of 125
  • Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces [Covers]

    Page(s): c1 - c4
    Save to Project icon | PDF file iconPDF (2634 KB)  
    Freely Available from IEEE
  • Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces [Front cover]

    Page(s): c1
    Save to Project icon | PDF file iconPDF (2625 KB)  
    Freely Available from IEEE
  • Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces [Spine]

    Page(s): 1
    Save to Project icon | PDF file iconPDF (87 KB)  
    Freely Available from IEEE
  • [Back cover]

    Page(s): c4
    Save to Project icon | PDF file iconPDF (97 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • [Title page ii]

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • Sponsors

    Page(s): iii - iv
    Save to Project icon | PDF file iconPDF (97 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xii
    Save to Project icon | PDF file iconPDF (151 KB)  
    Freely Available from IEEE
  • ITI 2011 committees

    Page(s): xiii - xiv
    Save to Project icon | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • ITI 2011 reviewers

    Page(s): xv - xviii
    Save to Project icon | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xix - xxii
    Save to Project icon | PDF file iconPDF (138 KB)  
    Freely Available from IEEE
  • Keynote lectures [breaker pages]

    Page(s): 1 - 2
    Save to Project icon | PDF file iconPDF (3327 KB)  
    Freely Available from IEEE
  • The seven deadly sins of data mining - and how to avoid them

    Page(s): 3 - 4
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (31 KB)  

    Summary form only given. Fifteen years ago, the salient features of the known extrasolar planets could be written down on an index card. At present the catalog of extrasolar planets numbers in the thousands, and the rate of detection is increasing rapidly. Highly diverse planets are being identified through a diverse set of observational techniques; photometric transit detection, Doppler radial velocimetry, gravitational microlensing, and direct detection via adaptive optics imaging are all producing discoveries at an increasing rate. In this talk, I will give an overview of the census as currently understood, and I will show how the different detection methods are producing complementary detections. Like many areas in astronomy, exoplanetary detection is facing issues related to “Big Data”. Large online repositories (such as that produced by the Kepler Mission) serve many terabytes of data, much of which has gone analyzed due to the time-consuming algorithms required. The talk will seek to highlight the current issues, and will show how ad-hoc collaborations across the community are being formed to deal with the challenges (and the excitement) of this fast-moving area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Intelligence opportunities for research

    Page(s): 5 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (34 KB)  

    Summary form only given. Business Intelligence, whether or not we explicitly realize it, is rooted in the field of Knowledge Management. This is a field characterized by knowledge resources, knowledge processors, and knowledge processes. The design, implementation, and application of business intelligence (BI) can benefit from a consideration of knowledge management (KM). When we consciously ground our BI activity in a deep understanding of KM, we can begin to cultivate and nurture BI in unforeseen ways that enhance its yield. No longer is it overrun in a tangle of confused or inconsistent visions and strategy. It is no longer as prone to wither in droughts of shallow perspective. Mindful appreciation of KM helps nourish the practice and study of business intelligence, giving it more of an opportunity to flourish for the benefit of host organizations. Against this background, we examine fundamentals of a knowledge management ontology and examine their relevance to BI practices and technologies. Further, we develop a simple taxonomy of four knowledge-intensive categories of problem solving, each of which is a candidate for BI application. Finally, we ponder how knowledge chain theory connects BI to four key avenues available for enhancing an organization's performance or competitiveness: productivity, agility, innovation, and reputation. This connection solidifies the important role that BI can play in researchers' development of a science of competitiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Data Analysis for complex systems

    Page(s): 7 - 8
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (38 KB)  

    Summary form only given. The study of the thermal properties of materials and heat transport at the nanoscale is complicated by the speed needed to generate and probe thermal transport. At the nanoscale, the use of ultrafast lasers is needed to generate and probe heat transport. Two techniques based on ultrafast lasers are used to probe heat transport in metals and semiconductors. The first is based on femtosecond transient thermomodulation reflectance and transmittance. In this technique electron heating and transport is probed by the modulation in the optical properties of a thin film. Results on Au 25–400 nm films show that heat transport occurs due to ballistic electrons up to a thickness of 200–300 nm, while diffusive transport occurs for the 400 nm film. The second is based on time-resolved reflection high-energy electron diffraction used to probe the surface temperature through the Debye-Waller factor, which is a direct measure of lattice vibration. The results show that for heating with 100-ps laser pulses, the surface temperature follows that modeled by the Fourier law of heat diffusion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preparedness and response new roles and responsibilities for IT

    Page(s): 9 - 18
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    While historically focused on back office transactions, Information Technology and its ubiquitous presence are now part and parcel of the global business infrastructure and workflow processes. In an increasingly connected world, the need for seamless performance by technology, communication networks, databases and associated public and private processes is no longer a luxury, rather it is a necessity. As such preparedness and response, which at one time were viewed as a fringe roles for IT, is now the new mantra for success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relating health outcomes to environmental factors: Assessing uncertainty in the presence of predicted environmental factors

    Page(s): 19 - 20
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (34 KB)  

    Summary form only given. Quantum communication is important for information-theoretic secure key distribution through public channels as well as for beating standard limits to information transfer in finite-bandwidth channels and for performing distributed quantum computation. Practical and theoretical quantum communication is advancing rapidly but key challenges remain. I present the current state of the field and some promising research activities now underway. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special topic/session: Statistics, computing and it in the coming decade [breaker page]

    Page(s): 21 - 22
    Save to Project icon | PDF file iconPDF (3329 KB)  
    Freely Available from IEEE
  • Classification and profiles of students based on their motivations concerning higher education

    Page(s): 23 - 28
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    Cluster analysis was used to create segments of high school graduates based on their motivations/opinions regarding their future education. Data for this study were collected using a questionnaire distributed to high school graduates following State Matura exam. The students were asked to evaluate the importance of 13 different reasons/causes for choosing the faculty selected as their first choice. The analysis yielded five meaningful clusters of students that differ not only in motivations but also in achievement on State Matura exams and in their preference regarding the scientific field of their future study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stuttering Cantor-like random sets

    Page(s): 29 - 34
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    In each step of the construction of the Cantor set we consider two complementary operations: in the first stage (damage) the middle step of each remaining segment is deleted; in the second stage (random repair) an uniform random segment is united to what remains after deletion. We compute the Hausdorff dimension of the limiting fractal obtained as the intersection of the sets obtained in the ad infinitum repetition of this stammering iterative procedure, which as expected is bigger than the Hausdorff dimension of the classical middle Cantor set with no repair. Stuttering random Cantor sets are obtained using deletion of uniform random segments both in the damage and in the repair stages in each step of the iterative procedure. The use of general beta random segments in the stuttering construction of Cantor-like random sets is also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The “Selection, Training, Follow and Evaluation Framework” (STFEF) for manager's in business innovation transformation projects” a holistic overview

    Page(s): 35 - 40
    Save to Project icon | PDF file iconPDF (139 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Minitrack: Leveraging is for competitiveness in transition economies

    Page(s): 41 - 42
    Save to Project icon | Request Permissions | PDF file iconPDF (3328 KB)  
    Freely Available from IEEE
  • Implementation of the IT governance standards through business continuity management: Cases from Croatia and Bosnia-Herzegovina

    Page(s): 43 - 50
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (130 KB) |  | HTML iconHTML  

    Over the past decade business continuity management (BCM) has been treated mainly from either technology or planning perspective. This paper goes a step further and considers BCM from the IT governance view. In addition, the standards and legislation activities are evaluated with cases from Croatia and Bosnia and Herzegovina. Implementation of industry best practices standards and processes such as ITIL and CobiT combined with other IT-related continuous computing technologies can deliver substantial risk reduction and result with reduced system downtime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Orientation in Croatian companies: A multi-site case study

    Page(s): 51 - 58
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    Business Process Management (BPM) has been recently adopted as a mechanism for achieving competitive advantage thorough process-related performance improvement. In order to analyze the current level of BPM adoption, and thus improve it, contemporary organizations use the concept of Business Process Orientation (BPO). This research uses a multi-site case study approach is to analyze how five Croatian companies have implemented BPO as a tool for ongoing improvement of their business processes.. The selected case organizations have introduced BPO several years ago, and all have mature BPM systems in place. Having achieved a high level of BP automation, this study confirms that each organization is now turning their attention towards process-related performance. This in turn has created the need for additional process-related information that could be only achieved through better data integration between BPM systems and companies' information systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of the Internet in the job search process in European countries: Position of Croatia

    Page(s): 59 - 64
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (107 KB) |  | HTML iconHTML  

    The article presents data exploration and regression analysis of the percentage of individuals using the Internet in their job search and six independent variables (averages for the period 2004-2008) for EU-27 countries, Iceland, Turkey and Croatia. Among the four regression models, this paper favours the multiple linear regression model with two regressors (the percentage of households with an Internet access; and GDPpc in PPS, EU-27=100) for 28 countries. Both regressors are statistically significant, explaining the vast majority of the total sum of squares. As far as the studied variables are concerned, Croatia does not differ significantly from other European countries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.