By Topic

Proceedings of the 25th International Conference on Information Technology Interfaces, 2003. ITI 2003.

16-19 June 2003

Filter Results

Displaying Results 1 - 25 of 109
  • Analysis of Croatian management in ICT environment

    Publication Year: 2003, Page(s):451 - 456
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Information and communication technologies (ICT) enable transmission and application of all kinds of information and represent the most assertive generic technology of today. The task of ICT management is to stimulate and develop the awareness, knowledge and application of the new technology in the Croatian economy, which will correspond better to the challenges of the future economic development ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drivers and perils of e-commerce in the Australian wholesale and retail industry

    Publication Year: 2003, Page(s):445 - 450
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    We report on the results of a survey of the top 500 Australian companies. The study showed that most of these companies are still at the same stage of the adoption of electronic commerce, they encountered similar challenges, identified similar success factors and achieved similar benefits. The research, which focused on the wholesale and retail industry, also demonstrated that this sector, when co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Knowledge of stealing" - challenges and possibilities in knowledge modeling

    Publication Year: 2003, Page(s):439 - 444
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    Knowledge management offers effective and efficient solutions in knowledge modelling not only for the academic area, but for the corporate sector also. Many areas especially development of knowledge management systems and knowledge-based systems gain benefit from the results of knowledge management. The first step in the development process is the identification and modelling of the organizational... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A research model for collaborative value creation from intellectual capital

    Publication Year: 2003, Page(s):431 - 437
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    As successful organizations recognize that they need to convert their intellectual resources into customized services, the value of electronic collaboration has increased. Current efforts in managing knowledge have concentrated on producing; sharing and storing knowledge while business problems require the combined use of these intellectual resources to enable organizations to provide innovative a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of facial recognition systems on business practices within an operational setting

    Publication Year: 2003, Page(s):315 - 320
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    We concentrate on investigations designed to assess the impact of facial recognition systems (FRS) on human factors considerations and business practices within an operational setting. Following a brief introduction to FRS technology, modes of operation and the human factors influence on these systems, a description of the methodologies used are provided (including baseline interviews, process map... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zachman framework in teaching information systems

    Publication Year: 2003, Page(s):161 - 166
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    The Zachman framework for information systems architecture is a classification scheme for development and documenting an enterprise-wide information system. It is useful in teaching various topics on information systems, such as: information systems development as an engineering process, basic information systems components and design artefacts, system development life cycle and information system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ENA-based strategy replacing subobjectives definition in incremental learning

    Publication Year: 2003, Page(s):383 - 390
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    Incremental evolution has proved to be extremely useful in complex process control. The need to define manually the subobjectives at each stage constitutes the method weakest point, hindering its generalization. We propose the application of evolving neural arrays (ENA) in order to implement incremental evolution (without the explicit explanation of subobjectives) applicable to a large set of proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge termination: the end of the game?

    Publication Year: 2003, Page(s):425 - 430
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Knowledge termination is the last, but mostly unperformed task in the knowledge life cycle. It is the process that describes the process of selecting and deleting unusable knowledge items. Through performing knowledge termination, organisations can avoid losing efficiency in the knowledge management practice by waiting for the search results, selecting the real useful knowledge items, or using wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross cultural Web design: an experiences of developing UK and Korean cultural markers

    Publication Year: 2003, Page(s):309 - 313
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    The international and multicultural nature of the World Wide Web positions the issues of recognizing and observing cultural differences at the forefront of considerations in the design of Web pages. We address some of these issues. Research has already identified some Web page design elements that may be culturally or genre specific, that may also be generalised as 'cultural markers', and that con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system for compacting phonebook database

    Publication Year: 2003, Page(s):155 - 159
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    A full text search phonebook database may need to be stored on a portable device with limited storage resources. We describe a system of data structures and algorithms used to produce a very compact structure with full text search capability, which enables storing 1.8 million entries Republic of Croatia phonebook in fewer than 50 MB. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive mapping framework in heterogeneous computing environment

    Publication Year: 2003, Page(s):581 - 586
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    Heterogeneity of computer environment allows execution of large diverse applications, but it also simultaneously aggravates mapping. We present a combined multicriterial mapping based on the MEVSP model. Model parameters originate from the level of application, platform, mapping and user. The most suitable prediction methods are long-term performance prediction, short-term prediction of threshold ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving timetable scheduling problem using genetic algorithms

    Publication Year: 2003, Page(s):519 - 524
    Cited by:  Papers (7)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    A genetic algorithm for solving a timetable scheduling problem is described. The algorithm was tested on small and large instances of the problem. Algorithm performance was significantly enhanced with modification of basic genetic operators. Intelligent operators restrain the creation of new conflicts in the individual and improve the overall algorithm 's behavior. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Qualitative data mining and its applications

    Publication Year: 2003, Page(s):3 - 8
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    In machine learning from numerical data, usually the target concept is a numerical function that facilitates quantitative prediction. In contrast to this, we consider qualitative data mining which aims at finding qualitative patterns, or qualitative relationships in numerical data. We present one approach to qualitative data mining, in which the target concepts are expressed as qualitative decisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information fusion meta-search interface for precise photo acquisition on the Web

    Publication Year: 2003, Page(s):375 - 381
    Cited by:  Patents (18)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Nowadays most Web pages contain both text and images. Nevertheless, search engines index documents based on their disseminated content or their meta-tags only. Although many search engines offer image search, this service is based over textual information filtering and retrieval. Thus, in order to facilitate effective search for images on the Web, text analysis and image processing must work in co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Market segmentation and customer knowledge for shopping centers

    Publication Year: 2003, Page(s):417 - 424
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Shopping centers represent a substantial slice of the UK economy and have rightly attracted considerable research. Despite interest from academics and practitioners, little research attention has been paid to the market segmentation of shoppers. Proactive marketing management is a feature of only a minority of UK shopping centers. The marketing communications of most would appear to be aimed mainl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An activity theory framework for computer interface design

    Publication Year: 2003, Page(s):301 - 307
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    Computer interface design has the primary purpose of assisting information technology users in their professional activities. In order to accomplish this, users need to be able to work 'through the interface' to complete the tasks which achieve the goals associated with an activity. Although this is the conceptual province of psychology, very little use has been made of psychology in practical int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing belief-consistent multilevel secure relational data model: issues and solutions

    Publication Year: 2003, Page(s):149 - 154
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    We summarize our efforts in implementing a working multilevel secure database prototype. We have chosen belief-consistent multilevel secure relational data model (BCMLS) as a basis for our prototype because of its comprehensive semantics for interpreting all stored information. While semantically superior to other models, this model has not been implemented as a working system before. Our prototyp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving traveling salesman problem with nested queue-jumping algorithm

    Publication Year: 2003, Page(s):537 - 542
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    We present a new approximate algorithm nested queue-jumping algorithm (NQJA) to solve the traveling salesman problem. The proposed algorithm incorporates the thoughts of heuristic algorithm, randomized algorithm and local optimization. Numerical results show that for the small-scale instances, using a queue-jumping algorithm (QJA) directly can obtain a known optimal solution with a large probabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application framework development for virtual learning environments

    Publication Year: 2003, Page(s):557 - 562
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    We present the framework development process for a virtual learning environment (VLE). The VLE framework, based on a multitier architecture, is a generic solution that allows the creation of different VLE Web applications. We outline the process of the VLE domain framework development, from analysis phase to custom application generation by framework instantiation. We propose and discuss a set of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Croatian Internet exchange - the principles

    Publication Year: 2003, Page(s):575 - 579
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    Internet service provider (ISP) peering has emerged as one of the most important and effective ways for ISPs to improve the efficiency of operation. Peering is defined as "an interconnection business relationship whereby ISPs provide connectivity to each others' transit customers". ISPs seek peering relationships primarily for two reasons. First, peering decreases the cost and reliance on purchase... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative studies of fed-batch fermentation processes for production of L-lysine and L-valine based on mathematical models

    Publication Year: 2003, Page(s):513 - 518
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Fed-batch fermentations for production of L-lysine and L-valine are carried out using high producing strains. Based on the experimental data, comparative studies of both processes are done, applying different mathematical procedures as follows: preliminary data processing and calculation of different specific rates; development of nonlinear models of specific growth, specific utilization and speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving sparse symmetric path problems on a network of computers

    Publication Year: 2003, Page(s):657 - 662
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    We present an optimized version of a previously studied distributed algorithm for solving path problems in graphs. The new version is designed for sparse symmetric path problems, i.e. for graphs that are both sparse and undirected. We report on experiments where the new version has been implemented and evaluated with the PVM package. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System of automated timetabling

    Publication Year: 2003, Page(s):495 - 500
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    A construction of timetabling is considered to be a computationally hard problem. The problem lies not only in NP-completeness, but also in a number of complicated interactions between different users. We present a system of automated timetabling (SAT), as a proposition for a global look at timetabling. It describes four tools for managing timetable. The constraint programming (CP) techniques were... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Liberalization and regulation of information and communication technologies in Europe

    Publication Year: 2003, Page(s):367 - 372
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    The main focus is to present the possible consequences of ICT liberalization. Since the market is usually regulated after the liberalization, different regulating decisions and their positive and negative consequences are studied. A methodology for measuring market structure and consequently the need to regulate is also presented. This methodology is then used to compare the market structure of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factor analysis of essential facial features

    Publication Year: 2003, Page(s):187 - 191
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    We present the results of an exploratory factor analysis to determine the minimum number of facial features required for recognition. In the introduction, we provide an overview of research we have done in the area of the evaluation of facial recognition systems. In the next section, we provide a description of the facial recognition process (including signal processing operations such as face cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.