Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces最新文献

筛选
英文 中文
Design of moore finite state machine with extended state codes 扩展状态码的摩尔有限状态机设计
L. Titarenko, O. Hebda, A. Barkalov
{"title":"Design of moore finite state machine with extended state codes","authors":"L. Titarenko, O. Hebda, A. Barkalov","doi":"10.2498/iti.2013.0504","DOIUrl":"https://doi.org/10.2498/iti.2013.0504","url":null,"abstract":"The new method is proposed for reduction of chip area occupied by logic circuit of Moore FSM implemented with PLAs. It is based on the representation of the state code as a concatenation of the code of class of pseudoequivalent states and code of state inside this class. Such an approach allows elimination of dependence among states and output variables. It allows the hardware reduction in the FSM logic circuit in comparison with known design methods.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards new energy efficiency limits of High Performance Clusters 迈向高性能集群的新能效极限
D. Tomić, E. Imamagic, L. Gjenero
{"title":"Towards new energy efficiency limits of High Performance Clusters","authors":"D. Tomić, E. Imamagic, L. Gjenero","doi":"10.2498/iti.2013.0582","DOIUrl":"https://doi.org/10.2498/iti.2013.0582","url":null,"abstract":"In recent years performance of High Performance Computing Clusters took precedence over their power consumption. However, costs of energy and demand for ecologically acceptable IT solutions are higher than ever before, therefore a need for HPC clusters with acceptable power consumption becomes increasingly important. Consequently, the Green500 list, which takes into account both performance and power consumption of HPC clusters, almost reached the popularity of the Top500 list. Interestingly, the Green500 list is not an opponent to Top500 list; its core idea is to complement the Top500. Therefore, the Top500 list still serves as the basis for the Green500 list, and its numbers regarding measured HPL performance, are a basis for calculating the Green500 list. Indeed, the Green500 is the Top500 list ordered by HPL measured performance per Watt. Rmax numbers gained from High Performance Linpack benchmarks serve as performance input parameters, and total power consumed during execution of HPL on a certain HPC clusters is a power consumption parameter. The critical question remains: how to measure the consumed power correctly? This paper proposes that if it is not possible to measure the consumed power, one can still use maximum power consumption numbers rated from hardware vendors to find at least the lower bound green efficiency of HPC clusters. The main idea behind this approach is that Rmax values found on Top500 list never achieve Rpeak theoretical values, and that even most efficient HPL benchmark can never utilize computing nodes at their maximum. Furthermore by comparing MFLOPS/W results we gained with those found on Green500 list, we noted the excellent efficiency of the new HPC Isabella cluster recently powered on at University Computing Centre in Zagreb, ranking in just behind University of North Carolina KillDevil Top500 super cluster.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting hubs for self-adaptive secondary re-ranking in bug report duplicate detection 利用集线器在bug报告重复检测中进行自适应二次重新排序
Nenad Tomašev, Gregor Leban, D. Mladenić
{"title":"Exploiting hubs for self-adaptive secondary re-ranking in bug report duplicate detection","authors":"Nenad Tomašev, Gregor Leban, D. Mladenić","doi":"10.2498/iti.2013.0488","DOIUrl":"https://doi.org/10.2498/iti.2013.0488","url":null,"abstract":"Bug duplicate detection is an integral part of many bug tracking systems. Most bugs are reported multiple times and detecting the duplicates saves time and valuable resources. We propose a novel approach to potential duplicate report query ranking. Our secondary re-ranking procedure is self-adaptive, as it learns from previous report occurrences. It is based on the analysis of temporal evolution of the underlying distribution of influence. The experiments show definite improvements in system performance.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Forensic analysis of social networks (case study) 社交网络的法医分析(案例研究)
M. Baca, Jasmin Cosic, Z. Cosic
{"title":"Forensic analysis of social networks (case study)","authors":"M. Baca, Jasmin Cosic, Z. Cosic","doi":"10.2498/iti.2013.0526","DOIUrl":"https://doi.org/10.2498/iti.2013.0526","url":null,"abstract":"This paper deals with a new challenge for digital forensic experts - the forensic analysis of social networks. There is a lot of identity theft, theft of personal data, public defamation, cyber stalking and other criminal activities on social network sites. This paper will present a forensic analysis of social networks and cloud forensics in the internet environment. For the purpose of this research one case study is created like - a common practical scenario where the combination of identity theft and public defamation through Facebook activity is explored. Investigators must find the person who stole some others profile, who publish inappropriate and prohibited contents performing act of public defamation and humiliation of profile owner.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Devising a model of electronic School Management System based on web services for secondary schools in Macedonia 设计一个基于web服务的马其顿中学电子学校管理系统模型
M. Fetaji, B. Fetaji, A. Ajredini, M. Ebibi
{"title":"Devising a model of electronic School Management System based on web services for secondary schools in Macedonia","authors":"M. Fetaji, B. Fetaji, A. Ajredini, M. Ebibi","doi":"10.2498/iti.2013.0573","DOIUrl":"https://doi.org/10.2498/iti.2013.0573","url":null,"abstract":"Advanced computer technologies available today can play a crucial role in reorganization of school management activities to promote unity and reliability among students, parents, teachers, and school administrators. However computers are not used to analyze data and output information. Therefore, e-School Management System (e-SMS) is developed to facilitate teaching and administration staff to manage school activities in high schools and parents/teachers to have in-time/reliable information about the performance of their child/student. In this paper we propose a conceptual model of an e-school management system and explain the functionality of an e-SMS and benefits of electronic management. Insights and recommendations are provided.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Does the performance scale the same as the cost in the cloud 性能的扩展是否与云中的成本相同
M. Simjanoska, Goran Velkoski, S. Ristov, M. Gusev
{"title":"Does the performance scale the same as the cost in the cloud","authors":"M. Simjanoska, Goran Velkoski, S. Ristov, M. Gusev","doi":"10.2498/iti.2013.0570","DOIUrl":"https://doi.org/10.2498/iti.2013.0570","url":null,"abstract":"Cloud computing is a paradigm that offers on-demand scalable resources with the “pay-per-usage” model. Cloud service providers' price rises linearly as the resources scale. However, the main challenge for the cloud customers is “Does the performance scale as the price for the rented resources in the cloud”? Also, how does the performance scales for different server load? In this paper we analyze the performance and the cost of a web service that utilize both memory and CPU varying the server load with different message size and number of concurrent messages in order to determine the real cost of rented CPU resources. The results show that the web service's cost rises linearly with the resources, i.e. the lowest cost is determined while hosted on one CPU.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129002556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cancer patient blogs: How patients, clinicians, and researchers learn from rich narratives of illness 癌症患者博客:患者、临床医生和研究人员如何从丰富的疾病叙述中学习
Lisa Gualtieri, Fiona Y. Akhtar
{"title":"Cancer patient blogs: How patients, clinicians, and researchers learn from rich narratives of illness","authors":"Lisa Gualtieri, Fiona Y. Akhtar","doi":"10.2498/iti.2013.0586","DOIUrl":"https://doi.org/10.2498/iti.2013.0586","url":null,"abstract":"Blogs written by cancer patients can offer deep insights to other patients about what to expect in the course of illness and treatment, can provide information to oncologists and other clinicians about patient experiences outside of appointments, and can increase researcher awareness of treatment effects and alternatives. While many forms of social media and online communities are used by patients, blogs are unique in that they provide a narrative of many aspects of disease and treatment, offering a comprehensive view of the disease experience delivered in installments, often from diagnosis through life as a survivor. However, the impact of patient blogs has been modest thus far because patient blogs are spread across the internet and, with no central repository of patient blogs, opportunities for analysis are limited. Given the life-altering and potentially devastating impact of cancer on people's lives, we seek to develop a tool that will analyze tens of thousands of patient-authored blogs to improve cancer patient care.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Continuous user verification based on behavioral biometrics using mouse dynamics 基于使用鼠标动态的行为生物识别技术的连续用户验证
Mirko Stanic
{"title":"Continuous user verification based on behavioral biometrics using mouse dynamics","authors":"Mirko Stanic","doi":"10.2498/iti.2013.0505","DOIUrl":"https://doi.org/10.2498/iti.2013.0505","url":null,"abstract":"This paper provides overview of the current methods of identifying users based on their interactions with a computer keyboard, mouse or a touchscreen and argues that in their current state of development none of them are capable of establishing the users identity within the time it takes for a user to input a password. The paper proposes the application of behavioral biometrics as a supplement to regular password based user authentication as a safeguard against unauthorized users gaining access to a computer that is already running an authenticated session e.g. unattended computers in offices.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126335536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyses of factors that influence the reliability of e- school Management software System in high schools in Macedonia 马其顿高中电子学校管理软件系统可靠性影响因素分析
M. Fetaji, B. Fetaji, M. Ebibi
{"title":"Analyses of factors that influence the reliability of e- school Management software System in high schools in Macedonia","authors":"M. Fetaji, B. Fetaji, M. Ebibi","doi":"10.2498/iti.2013.0571","DOIUrl":"https://doi.org/10.2498/iti.2013.0571","url":null,"abstract":"High schools have rapidly adapted computers in their administration, management and academy. School management uses papers and computers as tools to store the administrative and management data. However computers are not used to analyze data and output information. Therefore, e-School Management System (e-SMS) is developed to facilitate teaching and administration staffs to manage school activities in high schools and parents to have in-time information about the performance of their child. As a result, users found that e-SMS is capable of offering reliable and correct information and communication among teachers, parents, students and the general public and improved the management process in schools. Findings are presented and recommendations are provided.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence of human resources on the IT service management 人力资源对IT服务管理的影响
Jan Ministr
{"title":"The influence of human resources on the IT service management","authors":"Jan Ministr","doi":"10.2498/iti.2013.0561","DOIUrl":"https://doi.org/10.2498/iti.2013.0561","url":null,"abstract":"Optimal utilization of human resources contributes to achievement of the aims of IT department and also of the entire company. Organizational Structure of IT department should be designed on the base of IT Service Lifecycle. IT personnel should support the IT Services in all stages of their Lifecycles. The paper is focused on the method describing transformation of the organization structure of IT department on the base of adopting and implementing the principles which are described in the IT Infrastructure Library.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信