By Topic

Informatics (PCI), 2011 15th Panhellenic Conference on

Date Sept. 30 2011-Oct. 2 2011

Filter Results

Displaying Results 1 - 25 of 83
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1720 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (142 KB)  
    Freely Available from IEEE
  • Message from General Co-chairs

    Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • Message from Program Co-chairs

    Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): xv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (88 KB)  
    Freely Available from IEEE
  • Local Organizing Committee

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB)  
    Freely Available from IEEE
  • Keynote Speakers

    Page(s): xviii - xix
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB)  
    Freely Available from IEEE
  • Towards an Integrated Teaching Environment for Parallel Programming

    Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB) |  | HTML iconHTML  

    In this paper we present the integration of state of the art, open source, production level tools into a parallel programming environment, used for teaching parallel programming in MPI and OpenMP. Based on experiences introduced during this case study, and opinions gathered by an online questionnaire, a refined set of missing features that would strengthen the environment's educational role is defined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching Software Project Management through Management Antipatterns

    Page(s): 8 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    Technological development and social progress are bound to affect fundamentally the business environments and therefore the people who work in them. The new conditions create unexpected difficulties and expectations that often limit the performance of the employees and consequently of the software projects, which often fail to meet their goals. The integrated education of future administrators - managers becomes a dynamic challenge to the new environments, which can be achieved by proposing new concepts such as Management Antipatterns. In this work, important conclusions and suggestions are made about the importance of effective and innovative education of future managers and their IT projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MentorChat: Introducing a Configurable Conversational Agent as a Tool for Adaptive Online Collaboration Support

    Page(s): 13 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    Research in the field of computer-supported collaborative learning (CSCL) has systematically indicated that providing adaptive support to collaborating students is an efficient way of improving the outcomes of the collaborative learning activity. In this paper we introduce MentorChat, a web-based system that supports collaborative learning by utilizing a Conversational Agent. This agent, which can be easily configured through MentorChat authoring environment, aims to intelligently facilitate and trigger the discussion that takes place among partners. To achieve this, MentorChat models the domain through a series of key concepts and enables the teacher to define the form of agent intervention when a key concept is traced in students' dialogue. We present the system architecture and initial field evaluation data from two studies focusing on end-user acceptance of the system. We also discuss future system improvements and research agenda to explore the impact of MentorChat in collaborative learning settings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using an Automated Speech Emotion Recognition Technique to Explore the Impact of Bullying on Pupils Social Life

    Page(s): 18 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (167 KB) |  | HTML iconHTML  

    Most of the pupils are witness bullying behavior at school. The variety of the roles that bystanders play in school bullying should be seen as a chance of promoting anti-bullying strategies and interventions. The authors suggest the usage of an automated speech emotion recognition technique as part of a multiple methods tool-box of exploring bullying, so as, teachers to identify the nature of the psychological impact experienced by pupils participating in bullying, and to intermediately respond to serious bullying episodes. In this paper we present a speech emotion recognition technique using K Star classifier. Berlin Emotional Database was used for the experiment. This work focuses on speaker and utterance dependent and independent framework. In the speaker dependent framework, K STAR achieves accuracy 77%, while in the speaker independent framework the classification rate reaches 74%. Finally, it is assumed that teachers understanding bystanders' emotions, and consequently, their coping styles in bullying episodes, they could introduce strategies that give pupils who witness bullying positive roles to counter bullying. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Four, Free and Open Source DICOM Software Tools

    Page(s): 23 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (623 KB) |  | HTML iconHTML  

    Nowadays, there is a huge variety of Digital Imaging and Communications in Medicine (DICOM) software tools. Some of these tools can only display DICOM images and some other offer additional features, such as volume rendering and options for further digital processing and analysis. Other published research in the area offer a detailed description of the software functions but not an evaluation of these tools as software applications. This paper evaluates four, freely available and open source DICOM tools focusing on different aspects. The software tools compared are: Eviewbox, GIMIAS, ImageJ and MITK 3M3. The scores resulted from the evaluation are illustrated in four diagrams, one developed for every software tool, which demonstrate the variation in scores. The software tool that has received the highest rating is ImageJ. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Academic Research Policy-Making and Evaluation Using Graph Visualisation

    Page(s): 28 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    Higher education institutions need to have a social responsibility and attainable objectives regarding their education and research activities. In our approach we use multi-indicator analysis in order to evaluate the research activities of an institution as well the degree of achievement for a specified research policy. Our work is a part of prototype system that supports academic evaluation and decision-making processes concerning research policies, using visual analytics. The presented case study emphasises on the analysis of the research collaborations indicated in published research work. Our main data sources are the Scopus library, Google Scholar and the Quality Assurance Unit Service of a Greek higher education institution. Data are retrieved and enriched by additional analysis and graph metrics. The developed system provides enables user to evaluate aspects of the quality of academic research activities in the context of specific policies and criteria and make informed decisions on the establishment of new strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ProMaSI - A Project Management Simulator

    Page(s): 33 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (231 KB) |  | HTML iconHTML  

    This paper presents work-in-progress on a software project management simulator suitable for educating and training prospective software project managers. The work presents the design of a modular architecture for the simulator as well as a modeling language for representing possible management scenarios. It finally reports on issues one has to bear in mind when considering the development of such systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effects of Dimensionality Curse in High Dimensional kNN Search

    Page(s): 41 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    The dimensionality curse phenomenon states that in high dimensional spaces distances between nearest and farthest points from query points become almost equal. Therefore, nearest neighbor calculations cannot discriminate candidate points. Many indexing methods that try to cope with the dimensionality curse in high dimensional spaces have been proposed, but, usually these methods end up behaving like the sequential scan over the database in terms of accessed pages when queries like k-Nearest Neighbors are examined. In this paper, we experiment with state of the art multi-attribute indexing methods and try to investigate when these methods reach their limits, namely, at what dimensionality a kNN query requires visiting all the data pages. In our experiments we compare the Hybrid Tree, the R*-tree, and, the iDistance Method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Node Splitting Policies for Improved Range Query Efficiency in k-dimensional Point Data Indexes

    Page(s): 46 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    High dimensional vectors (points) are very common in image and video classification, time series data mining, and many modern data mining applications. One of the most popular classification methods on such data is k-Nearest Neighbor (kNN) searching. Unfortunately, all proposed and state-of-the-art multi-attribute indexes fall short in terms of usability as dimensionality increases. This is attributed to the ``dimensionality curse" problem, according to which, range searching above 10 dimensions is as efficient as a sequential scan of the entire database. Thus, kNN searching, as a special case of range searching, has to benefit a lot if we find ways to increase the performance of indexes in high dimensions. In this paper, we deal with space partitioning indexes and we propose six data node splitting techniques. We examine their performance in terms of data node storage utilization and quality of space partitioning. These two conflicting goals are both essential for good range query performance. Our experiments with uniform and skewed data demonstrate that certain splitting techniques can perform satisfactorily. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nearest Neighbor Algorithms Using xBR-Trees

    Page(s): 51 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    One of the common queries in spatial databases is the (K) Nearest Neighbor Query that discovers the (K) closest objects to a query object. Processing of spatial queries, in most cases, is accomplished by indexing spatial data by an access method. In this paper, we present algorithms for Nearest Neighbor Queries using a disk based structure that belongs to the Quad tree family, the xBR-tree, that can be used for indexing large point datasets. We demonstrate performance results (I/O efficiency and execution time) of alternative Nearest Neighbor algorithms, using real datasets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental Discovery of Top-k Correlative Subgraphs

    Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    Although data mining is a research area with important contributions, there is relatively limited work on correlation mining from graph databases. In this paper, we formulate the problem of mining the next most correlated graph in a graph database given the top-k correlated graphs, with respect to a query graph q. In order to solve the above problem, we take advantage of the search tree, produced by the top-k graphs. However, the search tree poses significantly difficulties, due to its size. Mainly relied on the TopCor algorithm, we make use of the algorithm's findings and rules, we derive two termination conditions and we devise a new algorithm to address the above problem, iTopCor. Our experimental results demonstrate the efficiency of the algorithm with respect to TopCor, especially when the data set is large or when many sub graph isomorphism tests are involved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Learning Environments - An Overview

    Page(s): 63 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    This paper presents an overview of existing virtual learning environments and recent research efforts towards the design of adaptive learning environments. Nowadays, the educational technology offers a considerable number of virtual learning environments to facilitate the learning process, thus supporting web-based education and e-learning to a large extend. E-learning systems work in a synchronous or asynchronous way and have become a common place in all educational environments. Some of them show adaptive characteristics and more rarely some intelligence in the way they communicate with the user. Adaptivity in virtual learning environment has become a prominent research topic during the past decades and has led to a considerable number of web-based adaptive learning environments. Recent research focuses on the further integration of these systems with computational intelligence technologies as well as on the integration of widely used learning management platforms with adaptive tools and web-services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hacker's Perspective on Educating Future Security Experts

    Page(s): 68 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    Information Systems Security experts should be able to confront new, unknown threats. Therefore, "out-of-the-box" thinking is a necessary skill which can not be taught using traditional educational methodologies. In order to introduce our students into the mentality of modern adversaries and cyber criminals we designed a course based on the well-established theoretical frameworks of Information Systems Security as well as the unconventional challenges which experienced hackers use for training newcomers. Moreover, we developed additional open source software tools which encourage the collaboration between students and confront plagiarism or cheating attempts during the exams. Our course in a Higher Education Institute has been enriched with the use of the Hackademic tool, a virtual framework that allows students to perform hacking attacks and penetration testing in a deliberately vulnerable, but isolated, safe and controlled environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pilot Introduction of IWB and COWs in Greek Schools

    Page(s): 73 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (161 KB)  

    This article focuses on the implementation of two pilot project for the introduction of ICT in Greek schools. These projects (introduction of IWB and COWs) are supposed to be the first steps of the implementation of "digital school" which is the government's strategy for ICT adoption in education. In the following, the key findings of the two projects are identified and improvements upon the selected process are discussed. Although there is insufficient evidence to identify the actual impact of these technologies upon learning due to limited time of their usage, the lessons learned from the managerial point of view are equally important. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.