{"title":"A methodology for the selection of knowledge management (KM) tools","authors":"N. Patel, V. Hlupic","doi":"10.1109/ITI.2002.1024701","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024701","url":null,"abstract":"As a result of the increasing popularity of knowledge management numerous knowledge management tools have appeared on the software market. Therefore, selecting a tool that suitably meets their requirements is difficult and confusing for many organisations. Consequently a methodology is designed that describes the issues and factors that should be taken into consideration during the selection of a knowledge management tool.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Off-line signature verification using geometric features specific to Chinese handwriting","authors":"Yaqian Shen, Qinghua Qianq, Jingui Pan","doi":"10.1109/ITI.2002.1024679","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024679","url":null,"abstract":"This paper is concerned with the off-line signature verification scheme. The distinction in our work is that we have taken more consideration with the Chinese signature structure. And we present four main features for the optimization of the verification of the Chinese signatures, viz, the envelop of the signature, cross-count feature, center of gravity of sub-region and distance between vectors made of center of gravity, and area of embedded white space. Experimental results show that the combination of the four-feature based classifiers increases the verification accuracy, particularly for the Chinese signature verification.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surprises in modeling decision problems","authors":"R. E. Wendell","doi":"10.1109/ITI.2002.1024647","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024647","url":null,"abstract":"Insights in modeling are often surprises that occur as part of the modeling process. These can happen in many ways and for many reasons. This paper discusses how some such surprises occurred in real applications based on personal experiences of the author. The goal of the paper is to help develop a better understanding for the types and the impacts of surprises that may occur in practice, which in turn hopefully can lead to more effective modeling.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127552213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-centric collaboration for wired and wireless platforms","authors":"I. Marsic","doi":"10.1109/ITI.2002.1024646","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024646","url":null,"abstract":"With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this domain is sharing and manipulation of information using very different devices and communications. We propose a novel, data-centric collaboration paradigm, where each user can obtain a subset of the shared data and the data may be visualized differently for different users. The data amount and the visualization technique reflect the user's interests and/or computing and communication capabilities. The users collaborate on and exchange data, and the data is dynamically transformed to adapt to the particular computing/network platform. The resulting design is simple yet very powerful and scalable. It is implemented and tested by developing several complex groupware applications.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of ontologies in the application of KM strategies","authors":"P. Fehér","doi":"10.1109/ITI.2002.1024694","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024694","url":null,"abstract":"Effective operation of organisations requires intensive use of knowledge in the recent, highly competitive environment, therefore knowledge became one of the most valuable resources of companies. There re the development of knowledge management support systems (KMSS.) has an increasing and important role. Unfortunately there is no, or just a very light connection between business demands and the technological solutions. In this article an integrated framework is presented to connect these areas. Related to the framework, the role of organisational and domain/task ontologies is examined.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"512 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116196458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web farming as a support for e-business systems","authors":"Jacek Ciarkowski","doi":"10.1109/ITI.2002.1024692","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024692","url":null,"abstract":"The aim of this paper is to present the methodology of Web farming and the examples of its usage. Due to using numerous technologies relevant to Internet (Web mining, data warehouse, CRM and many others) it offers a singularly strong support for e-business systems. It enables efficient and methodical, as well a systematic search in Internet resources for current and up-to-date information, as well as gathering it in a specific form, subject to subsequent distribution and analysis. Exemplary problems and the ways of coping with them are discussed, with focus on technologies used to this purpose.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications classification and QoS requirements","authors":"D. Žagar, S. Rimac-Drlje","doi":"10.1109/ITI.2002.1024725","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024725","url":null,"abstract":"The applications and network services are key points that could provide the user the necessary quality of service. It is very hard to definitely divide the applications and the underlying services to uniquely describe the application and the service classes. This paper tries to comprise different classes of applications into a unique classification. Different standpoints and criteria are included and evaluated The QoS requirements for every defined application class are defined and described. Finally, on the basis of the introduced classification the required service classes for serving such classes are defined.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sober thoughts on multimedia based distance learning","authors":"W. Halang","doi":"10.1109/ITI.2002.1024645","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024645","url":null,"abstract":"This contribution sets out, with general observations on distance learning, and with identifying the fundamental difference between learning at presence or from a distance, which is essentially decoupling of teaching and learning in time and speed. Then, experiences with developing and employing multimedia material in distance teaching are presented, covering the phases of initial euphoria and subsequent disillusion. Realising that the use of development tools may be counterproductive, a pragmatic approach to developing multimedia courses under tight financial and labour constraints is outlined. It is concluded that students value simple things, that content is much more important than appearance, and that computers and multimedia must be used in a very thoughtful way in order not to be detrimental to the educational process.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive monitoring of the information system risk and quality","authors":"A. Trad, D. Kalpić, K. Fertalj","doi":"10.1109/ITI.2002.1024687","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024687","url":null,"abstract":"Proactive system monitoring is the search for potential problems in the Information Systems (IS) before they occur. With reference to IS, monitoring is always proactive. Watching for evidence of emerging or potential problems and identifying their source (factor), checking available disk space, the health of essential processes, probing systems to ensure that they are reachable, business requirement fulfilment; these are all examples of detecting problems before they disrupt the work/flow of an IS. Monitoring is not something that should be cavalierly put off until there's nothing else on the development team's schedule to be done. As soon as the IS is put in production, it is time to start to protect it against all possible types of problems.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new approach for vertex guarding of planar graphs","authors":"B. Kaucic, B. Žalik","doi":"10.1109/ITI.2002.1024709","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024709","url":null,"abstract":"Vertex guarding is one of many optimisation problems in graph theory with wide area of applications. It is proven to be NP-hard, therefore fast approximative solutions are significant. In the paper, at first, known algorithms are considered, and then a new algorithm working on planar graphs is introduced. The new algorithm is based on the dynamic approach and produces better and faster solutions. Its efficiency among other algorithms is demonstrated experimentally. In addition, ideas to additionally improve the algorithm are presented at the end.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}