{"title":"IAVI-UIR: an efficient caching scheme for mobile computing systems","authors":"E. Chan, Lai Ha Woo, J. Yuen","doi":"10.1109/ITI.2005.1491095","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491095","url":null,"abstract":"Caching is frequently used in mobile computing systems. However, maintaining cache consistency is challenging. In this paper a hybrid cache invalidation scheme based on self-invalidation and replicated updated invalidation reports is proposed. The performance of the scheme is studied using simulation and demonstrated to be superior to existing schemes.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114993675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed support for distributed database resources: a framework for analysis","authors":"G. Nezlek","doi":"10.1109/ITI.2005.1491112","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491112","url":null,"abstract":"Distributed information management implicitly assumes a suitable infrastructure providing reliable, high quality electric power. Recent large scale disruptions of power infrastructures are a reminder that power requirements of contemporary commerce must be considered by organizations that deploy distributed databases. IT managers are increasingly becoming aware that 20 th century electric power infrastructures may not provide acceptable answers to 21 st century power requirements. This paper considers the relationship between distributed information resources and the distributed power infrastructures needed to support them. An analytical framework for organizations to consider tradeoffs in providing increased uptime in the context of power infrastructure reliability is proposed.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114924418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Eidukas, A. Valinevicius, Š. Kilius, R. Kavaliunas, R. Plėštys, G. Vilutis
{"title":"Intelligent building information network loading and efficiency evaluation","authors":"D. Eidukas, A. Valinevicius, Š. Kilius, R. Kavaliunas, R. Plėštys, G. Vilutis","doi":"10.1109/ITI.2005.1491181","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491181","url":null,"abstract":"As the result of the increase of households, which have a computer, the number of Internet users increased too. Greater throughput and permanent connection of a computer to the Internet enables the users to get more and more qualified services. The development of new Internet services and the use of the Internet to transmit important messages raise quite high requirements to the quality and reliability of the connection. As there is a high increase of Internet users, it is very important to predict the load of network during the network development. Some problems appear when there is a need to find the transfer rate of services that reaches the users through local network because network's throughput is divided to the users dynamically and the number of connected users, at the same time, always changes.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Jolevski, S. Loskovska, I. Chorbev, D. Mihajlov
{"title":"An overview of a constraint solving engine with multiple optimization algorithms","authors":"I. Jolevski, S. Loskovska, I. Chorbev, D. Mihajlov","doi":"10.1109/ITI.2005.1491197","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491197","url":null,"abstract":"This article is concerned with the classes of the Constraint Solving Engine and a Constraint Programming Library for problems that can be defined as Constraint Satisfaction Problems. The theoretical and mathematical foundations of our ideas and the problem solving process are explained. Among the first problems that were solved was the Traveling Salesman Problem (TSP). The results and conclusions for TSP solution are given in the closing part of the paper.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"m-order - payment model via SMS within the m-banking","authors":"B. Dukic, M. Katic","doi":"10.1109/ITI.2005.1491103","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491103","url":null,"abstract":"Abstract. Modern social concepts which originated in the postindustrial era of Western civilization development promote mobility as an important factor of social practice. Mobile communication technology has ensured significant changes in lifestyle, in which a person does not move towards the solution to the problem, but solves it from their current position. The activities within the payment system fall into the category of activities which people perform almost on daily basis as part of their private and professional tasks. It is therefore reasonable to explore the possibilities of exploiting the potential of the modern mobile technology for the purpose of solving problems connected to the payment system within the concept of mobile banking. Considering the fact that SMS is the simplest and most widely accepted service of digital data exchange, it is necessary to develop the model of mobile payment system, based on the potential of this particular service.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-dimensional shape modeling for distance education","authors":"J. Doi, W. Sato","doi":"10.1109/ITI.2005.1491128","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491128","url":null,"abstract":"This paper proposes a topologically robust and accurate shape modeling procedure to prepare materials for distance learning. The procedure approximates a real 3D object based not on the recently used so-called ICP (Iterative Closed Point) algorithm or the Delaunay triangulation for noise resistive reconstruction. An easy-to-manipulate geometric model with desired meshing, not limited to a triangular one, but also organized and matrix-formatted quadrilateral, hexagonal or n-gonal mesh, is directly reconstructed based on a solid modeling approach. The radial distance of each scanning point is measured using a laser triangulation sensor. The mesh connectivity is assigned and conserved throughout the process. Examples of archeological replicas and stone specimens are demonstrated.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-agent-based approach to face detection and localization","authors":"D. Kipsic, S. Ribaric","doi":"10.1109/ITI.2005.1491156","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491156","url":null,"abstract":"This paper presents a multi-agent- based approach to face detection and localization in colour images. In the initial step of the process the autonomous behaviour agents are distributed throughout the image. In subsequent steps the agents detect and mark skin-colour pixels using the HSI model and the innate agent's behaviour functions, such as diffusion, self-reproduction and dying. During the final step, the results of all the families of agents are combined and the face-like regions are detected. After face-like region localization, the shape information is used to decide if the region really represents a human face. The approach was tested using both the XM2VTS database of frontal face images and images containing people in natural situations.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability analysis of active queue management algorithms in input and output queued switches in heterogeneous networks","authors":"R. Rahmani","doi":"10.1109/ITI.2005.1491187","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491187","url":null,"abstract":"Both streaming techniques and wireless heterogeneous networks have recently become more widely deployed. As the current streaming techniques are primarily designed for homogenous wired networks, streaming multimedia applications in heterogeneous networks can perform poorly due to wireless networks conditions and vertical handover. These problems can significantly degrade the performance of streaming multimedia applications. Effects of the degradation are delay, jitter and packet loss resulting in lower multimedia quality. The use of some congestion recovery algorithms are detrimental factors to QoS. One approach used to control congestion in the network layer is Active Queue Management (AQM). This dissertation presents an evaluation and comparison of AQM mechanisms in heterogeneous networks. Based of the results of this research a new AQM algorithm, named the Adaptive AQM (AAQM) is proposed. The AAQM uses control law and link utilization in order to manage congestion. The action of the control law is to mark incoming packets in order to maintain the quotient between arriving and departing packets as low as possible. The AAQM enhances performance with respect to the queue length and packet loss as well as buffer space requirements. AAQM outperforms the other AQM algorithms in terms of multimedia packet loss and buffer delay.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AsmL specification and verification of Lamport's bakery algorithm","authors":"M. Botincan","doi":"10.2498/CIT.2005.04.09","DOIUrl":"https://doi.org/10.2498/CIT.2005.04.09","url":null,"abstract":"We present a specification of Lamport's Bakery algorithm written in AsmL specification language. By exploration of the state space of the induced labeled transition system we show how to verify important safety and liveness properties of the algorithm.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evolutionary algorithm with repeated mutations for solving the vehicle routing problem","authors":"K. Puljic, R. Manger","doi":"10.1109/ITI.2005.1491174","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491174","url":null,"abstract":"An evolutionary algorithm for solving the vehicle routing problem is presented. The algorithm employs repeated mutations in a manner similar to local search. Experiments are described, where the algorithm has been implemented and tested on some benchmark problem instances.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}