{"title":"Thoughts and concepts on exploring, visualizing, and measuring distances on networks","authors":"Y. Vardi","doi":"10.1109/ITI.2004.242814","DOIUrl":"https://doi.org/10.1109/ITI.2004.242814","url":null,"abstract":"The properties of data networks are determined by routing protocols, link delays, traffic demands, and similar system parameters, which are not directly connected to the formal topology of the network's graph. Consequently, two different links, or source-destination (SD) pairs, could appear close in the network's topological layout, and yet be far apart when measured on the \"functionality scale\" of traffic flow. We present our own ideas regarding distance functions for network objects, the type of data that can be collected to determine such distances, and applications in network visualization, exploration, and monitoring, and in network tomography. This short paper is not intended as a survey of the topic but rather narrowly focuses on our own current thoughts on the topic","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring computer and Web attitudes using CAS and WAS measurement instruments","authors":"J. Horvat, G. Petrič, M. Mikrut","doi":"10.1109/ITI.2004.242078","DOIUrl":"https://doi.org/10.1109/ITI.2004.242078","url":null,"abstract":"The purpose of this article was to examine CAS (computer attitude scale) and WAS (WWW attitude scale) measurement instrument for measuring computer and WWW attitudes in Region of East Croatia. The research questions to be answered by this study are: (R1) What is the relationship between the CAS and the WAS? (R2) What are the predictor variables of various computer experiences to the CAS and to the WAS? (R3) Are there significantly demographic differences on the CAS and on the WAS? Internal consistency, stability and validity of the CAS and the WAS measurement instrument were tested and discussed","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning object repositories as a way to teachers communities?","authors":"Z. Lustigova","doi":"10.1109/ITI.2004.241786","DOIUrl":"https://doi.org/10.1109/ITI.2004.241786","url":null,"abstract":"This paper presents a short part of a larger comparative study of national or international projects and existing Web sites, aiming at creating learning objects repositories and presenting themselves as environments for building virtual communities. The general description of selected sites and projects is followed by the identification of key factors, out of these accessibility to public, browsing and contributing materials, publishing rules and functions are illustrated, compared, and discussed in the paper. The authors, also the developers of one of the compared sites (Telmae), aim to help the project managers to identify critical features, which might affect the project sustainability and maintenance of the site after financial sources are restricted","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130355092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of acceptance of e-government services in the UK","authors":"Priti Adeshara, R. Juric, J. Kuljis, R. Paul","doi":"10.2498/CIT.2004.02.10","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.10","url":null,"abstract":"This paper gives an insight into the readiness of small and medium sized enterprises (SMEs) for accepting e-government services in he UK. We conducted a survey of 128 SMEs, which revealed that there is a moderate demand for e-government services, but they were not rated as efficient and essential for SMEs' businesses as conventional services. The proliferation of the UK government's Web sites, which requires co-ordination between several organisations/multiple sites, and inadequate awareness of such services, do not comply with the common concepts of e-governance and consequently have an impact on the SMEs acceptance of e-government services in the UK","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of smart cards in distributed information systems","authors":"V. Mornar, D. Palavra, D. Kalpić","doi":"10.1109/ITI.2004.241598","DOIUrl":"https://doi.org/10.1109/ITI.2004.241598","url":null,"abstract":"Since their appearance in 1990, utilization of smart cards has been in constant growth. It is quite evident that any magnetic card can be replaced by a smart card bringing in all the benefits of this technology. The power of contemporary smart cards, which contain an embedded powerful computer, makes their area of application very extensive, especially in the field of information systems","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information flow model of integrated security system","authors":"A. Valinevicius, M. Zilys, D. Eidukas","doi":"10.1109/ITI.2004.242368","DOIUrl":"https://doi.org/10.1109/ITI.2004.242368","url":null,"abstract":"The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126157430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Possible implications of design decisions based on predictions","authors":"Magnus Larsson, Ivica Crnkovic","doi":"10.1109/ITI.2004.242582","DOIUrl":"https://doi.org/10.1109/ITI.2004.242582","url":null,"abstract":"Software systems and applications are increasingly constructed as assemblies of preexisting components. This makes software development cheaper and faster, and results in more favorable preconditions for achieving higher quality. This approach, however, introduces several problems, most of them originating from the fact that preexisting software components behave as black boxes. One problem is that it is difficult to analyze the properties of systems in which they are incorporated. To simplify the evaluation of system properties, different techniques have been developed to predict the behavior of systems on the basis of the properties of the constituent components. Because many cannot be formally specified, these techniques make use of statistical terms such as probability or mean value to express system properties. This paper discusses ethical aspects of the interpretation of such predictions. This problem is characteristic of many domains (data mining, safety-critical systems, etc.) but it is inherent in component-based software development","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"694 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards true process descriptions interoperability","authors":"T. Rozman, R. Horvat, G. Polančič","doi":"10.2498/CIT.2004.02.11","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.11","url":null,"abstract":"The article describes a part of our research in the area of (business) process modeling, analysis and execution. It describes the current state of process languages and standards. It concentrates on the process model interoperability and portability problems, which are caused because of huge number of process modeling standards, which often do not even target the same conceptual level of process modeling. It provides an idea how to bring together those standards, using process concepts mapping into Petri nets and incorporating the usage of process patterns. Transformation to strictly formal process languages has a potential to prove itself as a fair solution with the following advantages: the number of mappings among different process languages is reduced and the process model can be analyzed using proven Petri net or general graph algorithms. The development of the approach is still in early phase. Mapping rules to/from process patterns are not strictly defined, neither trivial, therefore, they will be the main focus of our future research","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127580288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Browsing thumbnails: a comparison of three techniques","authors":"A. Hedman, D. A. Carr, H. Nassla","doi":"10.1109/ITI.2004.241876","DOIUrl":"https://doi.org/10.1109/ITI.2004.241876","url":null,"abstract":"We conducted a usability study comparing three different browser alternatives (iconic, zoom-and-pan, and fisheye) for an electronic bulletin board containing thumbnails of notes. The iconic browser behaves in the manner of a standard windowing system. The zoom-and-pan browser allows the user to pan over a note and zoom to a readable size. The fisheye browser was an implementation of the bifocal view. We conducted an experiment where 21 subjects performed browsing tasks with each browser. We found that users performed best with the iconic browser and that young people (20-25) were significantly faster than older (31-53)","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of ERP systems based on n-tier architecture","authors":"H. Lin, P. Hsu, Jun-der Leu, W. Tsai","doi":"10.1109/ITI.2004.241505","DOIUrl":"https://doi.org/10.1109/ITI.2004.241505","url":null,"abstract":"The proliferation of ERP systems naturally leads to an intriguing question of products classification. In this paper, a framework for analyzing ERP systems is proposed. This framework includes various IT infrastructures that can be incorporated in the n-tier architecture. By using cluster analysis, different groups of ERP systems are classified to verify the correctness of the framework. The results may be useful for ERP vendors to improve their products strategy and help companies to evaluate most suitable ERP products to satisfy their requirements","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}