Scheduled System Maintenance
On Tuesday, January 22, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2015 IEEE 13th International Scientific Conference on Informatics

18-20 Nov. 2015

Filter Results

Displaying Results 1 - 25 of 63
  • Modern Taylor Series Method

    Publication Year: 2015, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Methods for numerical solutions of differential equations have been studied since the end of the last century. A large number of integration formulas have been published especially for solving special systems of differential equations. In general, it was not possible to choose the best method but for a subclass of tasks defined by similar properties the most suitable method could always be found. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From lightweight ontology to mental illness indication

    Publication Year: 2015, Page(s):9 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    Mosaic of research, applications and case studies, starting with natural language text processing, automated domain building, sentiment analysis, document similarities, and ending with indication of mental illness based on self-essay analysis, is given in an overview of this extended abstract of the invited paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud computing — Between hype and profitable business model

    Publication Year: 2015, Page(s):13 - 14
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (39 KB) | HTML iconHTML

    Cloud computing is getting increasingly important part of IT strategies in modern organizations [5] and nowadays it is generally positioned in broad context of strategic planning of information systems [2] [3]. Since cloud services can appear in various flavors (software as a service, platform as service, etc.) there is no one common approach to their incorporation into certain business and organi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document verification using n-grams and histograms of words

    Publication Year: 2015, Page(s):21 - 26
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    In the paper, there are analyzed and compared results of usable methods for a document verification based on n-grams and on local histograms build for its words for English and Arabic language. English and Arabic texts were analyzed from many statistical characteristics point of view. There were discovered some statistical differences between both languages and applied n-gram analysis and local hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi Path Transmission Control Protocols as a security solution

    Publication Year: 2015, Page(s):27 - 31
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    This article presents the potential of using Multi-Path Transmission Control Protocols for more secure data transfer. Data transfer over the network could be sniffed and then some decryption process could be made. Nowadays lot of network have more than one connection to others. The authors presents idea of Multi-Path TCP which could be used in such networks which have more than one connection to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewall rule with token bucket as a DDoS protection tool

    Publication Year: 2015, Page(s):32 - 35
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    The subject of this article are the security problems of network resources in computer networks. Presently the main problem of computer networks are Distributed Denial of Service attacks which can block them. The methods suggested by the literature that mostly base on using firewall and IDS/IPS mechanisms to fight the attacks are not sufficient enough. In this article the author presents a new met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C/C++ Preprocessing with modern data storage devices

    Publication Year: 2015, Page(s):36 - 40
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    The progress of hardware evolution cannot be stopped. Not just new CPUs and memory modules are invented but new kind of data storage devices appeared. Typically the programming languages do not follow all the changes in hardware. Solid-state drives (SSD) are improved data storage devices in order to reach must faster read and write speed than hard disk drives. Nowadays the solid-state drives have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards automated evaluation of domain usability

    Publication Year: 2015, Page(s):41 - 46
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    Many software systems nowadays aim for usability or accessibility from the effectiveness and ergonomics point of view. However there still is lack of such ones that correctly use the domain dictionary, correct describe domain relations and properties and implement the target domain processes via their user interfaces. This property is called `domain usability'. This paper aims at automating the ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection of minimal set of locations in the public service system design

    Publication Year: 2015, Page(s):47 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    This paper deals with the problem of designing the optimal structure of a public service system. The public service system design problem are often related to the p-median location problem. Optimal solution of smaller instances of the problem can be obtained by universal IP solvers. The universal IP solvers are very time-consuming and often fail when a large instance is solved. Our approach to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of GCC optimization levels in energy consumption during C/C++ program execution

    Publication Year: 2015, Page(s):52 - 56
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    In the context of a research project aimed at studying patterns for energy consumption at runtime in order to transform the original software into executable programs that consume less energy, we are carrying out a master's thesis looking for ways to get this improvement at the code generation phase. First we investigated how the hardware manufacturers have been and are concerned with green issues... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool for detecting standardwise differences in C++ legacy code

    Publication Year: 2015, Page(s):57 - 62
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Programming languages are continuously evolving as the experiences are accumulated, developers face new problems and other requirements such as increasing support for multi-threading is emerging. These changes are reflected in new language standards and compiler versions. Although these changes are carefully planned to keep reverse compatibility with previous versions to keep the syntax and the se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linearization algorithms CLOS and LOOPS of the classes in programming languages: The formal definitions

    Publication Year: 2015, Page(s):63 - 66
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    The methods of conflict resolution of names in programming languages that allow multiple inheritance were researched. Those methods are based on the linearization of the classes. The idea of linearization is to reduce multiple inheritance to single, in which the problem of selecting a suitable attribute is solved trivially. The definition of a hierarchy of classes is introduced. The property of mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to concurrent/parallel programming in Java

    Publication Year: 2015, Page(s):67 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Nowadays there is a strong demand for programming frameworks which can help the systems programmers to effectively exploit, in a natural way, the computing potential of modern clusters of multi-core machines. This paper proposes a methodology for the development of concurrent/parallel programs in Java which depends on UPPAAL, for modelling and exhaustive verification of a concurrent system, and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GreenDroid: A tool for analysing power consumption in the android ecosystem

    Publication Year: 2015, Page(s):73 - 78
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    This paper presents GreenDroid, a tool for monitoring and analyzing power consumption for the Android ecosystem. This tool instruments the source code of a giving Android application and is able to estimate the power consumed when running it. Moreover, it uses advanced classification algorithms to detect abnormal power consumption and to relate them to fragments in the source code. A set of graphi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Examining structural correctness of documentation comments in C++ programs

    Publication Year: 2015, Page(s):79 - 84
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (99 KB) | HTML iconHTML

    Tools guaranteeing the correctness of software focus almost exclusively on the syntax and the semantics of programming languages. Compilers, static analysis tools, etc. generate diagnostic messages on inconsistencies of the language elements. However, source code contains other important artifacts: comments, which are highly important to document, understand and therefore maintain the software. It... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Down to hades and back — Experiences gained in comprehending a distributed legacy system

    Publication Year: 2015, Page(s):85 - 90
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Software engineering principles and practices face a lot of challenges. Among them, debugging and comprehending systems is still demanding. Furthermore, comprehending distributed systems, even though there are several papers and approaches to be found in literature, is a challenge of a completely different dimension. This paper describes the experiences gained when trying to comprehend (and debug)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component composition using linear logic and Petri nets

    Publication Year: 2015, Page(s):91 - 96
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    Linear logic is a suitable logical system for showing how program systems can be described. Individual connectives used in linear logic formulae correspond to some fragments of Petri nets, the other tool for modeling behavior of systems. In this paper we use this correspondence between linear logic and Petri nets to show how the composition of small working Petri nets brings new problems not occur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of sequential algorithms as tools for modeling the chain-like-body evolution

    Publication Year: 2015, Page(s):97 - 102
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    This presentation is devoted to the algorithmization of the chain-like body's movements. An ample set of experimental data and recent theoretical achievements show that chain-like polymers traversing a membrane opening undergo multiple changes of their shape. These changes are mostly due to a mechanical tension induced by an environment with its chemical interactions that affect polymer's mobility... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approaches to human-computer interaction based on observation of a software developer

    Publication Year: 2015, Page(s):103 - 108
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    The human-computer interaction is important concern of working with computer system, especially in the growing trend of multi-display work environments. This paper introduces an approach of interaction with computer system based on observation of the software developer. This interaction has additional benefits in multi-display work environment. It connects multiple computer displays as one user in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monte Carlo simulation of the Young measures — Comparison of random-number generators

    Publication Year: 2015, Page(s):109 - 113
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    "Young measure" is an abstract notion from mathematical measure theory growing up from the analysis of some variational problems. From the formal point of view it may be regarded as a continuous linear functional defined on the space of Carathéodory integrands. However, calculating an explicit form of specific Young measure based on its formal theoretical definition involves so-called "weak" limit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phobia treatment with the help of virtual reality

    Publication Year: 2015, Page(s):114 - 119
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    In this paper, we try to present the problems of the modern approach to treating various phobias. Virtual environments created by virtual reality (VR) tools can help to make the treatment of certain types of phobias more efficient. Attention to this form of phobia treatment with the help of VR is on the rise in the world, so we are also monitoring its development, as well. Our paper introduces the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commands composition user interface pattern

    Publication Year: 2015, Page(s):120 - 123
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    Interactive user interfaces include commands that allow to manipulate data or other objects. While in most cases these commands are atomic, it is possible to support composition of simple command elements into complex commands directly during the user interaction. In this case commands have properties of a language. Prominent example of such interface is the Vim text editor. In this paper properti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social network and forum hybrid

    Publication Year: 2015, Page(s):124 - 127
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    The ambition to create hybrid between social network and forum (blog and chat) is based on the idea of Slovak community site called "Birdz". Hybrid social network merge functions of popular website types. It tries to introduce all-in-one site that join the best and most requested features of social networks, forums, blogs and chats. The main contribution of this work is concept of hybrid social ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generative framework for development of CRUD-based Linux desktop applications

    Publication Year: 2015, Page(s):133 - 138
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    CRUD applications, i.e. applications focused on creating, reading, updating and deleting data records, have always been commonly used. Nonetheless, to the authors' knowledge there is no framework or tool targeting this class of applications in the Gnome desktop environment (using GTK+ widget toolkit). This paper describes a framework based on the model-driven development paradigm for generating CR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separation of concerns and concern granularity in source code

    Publication Year: 2015, Page(s):139 - 144
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    Software systems deal with many concerns that are defined by the user or by the system requirements. These concerns are often implemented in multiple places throughout the source code, despite any decomposition technique that may be used. There are approaches and tools that try to separate concerns present in the system, usually using methods as the smallest unit of concern granularity. In this wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.