568 papers found .

541. From user-understandable to technical process model: a model-driven approach using CUTA4BPM

ICIST 2013 Proceedings, 161-166
Kirchner Kathrin, Nešković Siniša, Stojimirović Dejan
Abstract: For business process modeling, we can choose between graph-oriented and block-oriented languages. Block-oriented languages are more structured and therefore better understandable for domain experts, while graph-oriented languages allow more modeling freedom and technical versatility for process designers. To bridge this gap between understandability and technical versatility, we propose a participative forward engineering approach. It uses our block-oriented CUTA4BPM language to support high level process modeling together with domain experts, while graph-oriented BPMN is used for further detailed process design and automation. To support smooth transition from the high level modeling step to the detailed one, CUTA4BPM process models are automatically transformed to BPMN models using model driven engineering techniques.

542. Explicit support for languages and mograms in the SLEWorks language workbench

ICIST 2013 Proceedings, 167-171
Dejanović Igor, Milosavljević Gordana, Perišić Branko, Vasiljević Ivan, Filipović Milorad
Abstract: In our previous work we have described MoRP (Model-Reference-Property) meta-meta model [1], a simple meta-meta model which forms a foundation for SLEWorks language workbench. In this paper we present an explicit support for concepts of a language, language components (abstract and concrete syntaxes) and language utterances (i.e. mograms) in the SLEWorks platform. This support is implemented as a MoRP based language called MetaLanguage. Making these two concepts explicit enables us to organize our language utterances in the logical parts, i.e. mograms. Furthermore, we are able to specify relationship of conformance between mograms and languages. We also give an overview of some basic MoRP languages and their relationship inside SLEWorks repository

543. Reverse engineering smart card middleware

ICIST 2013 Proceedings, 172-177
Nikolić Aleksandar, Sladić Goran, Milosavljević Branko
Abstract: Many times the software source code or the implementation specification is not available and reverse engineering is employed in order to achieve interoperability with other systems or to ensure standards compliance. The goal of this paper is to introduce tools and techniques for reverse engineering of the smart card middleware layer on the Windows platform

544. Using aspect reweaving techniques for application performance monitoring

ICIST 2013 Proceedings, 178-182
Okanović Dušan, Vidaković Milan
Abstract: AspectJ and several other AOP frameworks allow for aspects to be woven with classes at compile time or at load time. While load-time weaving offers some flexibility, once weaved classes stay that way until application restarts with new aspects to be loaded. Adaptive continuous monitoring built on these frameworks requires periodical restarting of application in order for the new aspect configuration to be loaded. This approach is often very uncomfortable, sometimes even unacceptable. There are applications and systems that are not allowed to be restarted, or are allowed to be restarted very rarely. For these systems, the use of another AOP platform that allows runtime weaving and re-weaving of aspects would be of great importance.

545. Practical experience with the change management process in software development

ICIST 2013 Proceedings, 183-188
Stufi Martin, Rančić Dejan, Ćirić Milica, Stanimirović Aleksandar, Stoimenov Leonid
Abstract: Complexity of the software development process has greatly increased compared to early days of software development. Considering that new software development methodologies allow changes in each phase of the process the need for using a change management system is obvious. These systems enable the software development team to respond to customer’s change requirements and changes to the business process and business model while maximizing value and minimizing incidents, disruption and reworking. In this paper we describe the role of change management systems and our practical experience with the change management process in the Solutia s.r.o. company

546. Application of MetaEdit+ tool to specify information system modeling concepts

ICIST 2013 Proceedings, 189-194
Dimitrieski Vladimir, Čeliković Milan, Ristić Sonja, Luković Ivan
Abstract: In this paper we present a formal specification of platform independent model (PIM) concepts of the Integrated Information Systems CASE Tool. PIM concepts are described by Graph-Object-Property-Port- Role-Relationship meta-modeling language used in MetaEdit+ meta-modeling environment. Through our previous research we have specified PIM concepts using Ecore implementation of Meta Object Facility 2.0 in Eclipse Modeling Framework. As our goal is to create a formal specification of PIM concepts that designers would later use to graphically specify the structure of an information system, MetaEdit+ was the obvious choice. MetaEdit+ provides an integrated environment for definition of abstract syntax as well as the definition of concrete syntax using graphical symbol editor. In this paper we give an example of information system modeling using specified PIM concepts.

547. Attention Capturing Story-based Individualized Information Integration: A New Way to Browse the Web

ICIST 2013 Proceedings, 195-199
Rakočević Goran, Maurer Herman, Milutinović Veljko
Abstract: Web search has developed from simple information retrieval to complex tools. The same is not yet true for Web information management. Heterogeneous databases are still state of the art and make thorough understanding of content hard. However, small well curated locally focused servers of cultural collections emerge throughout Europe, offering a perfect basis for making a leap in Web information management. Therefore, we propose an innovative way of presenting and accessing the information on the Web. The central concept is that of a personalized storyline offering an organized “tour” through resources. Based on content metadata and on information about uses of a resource, a system would automatically generate storylines fitting users’ requests. But to capture attention story telling alone is not sufficient: humanity is starting to be unable to concentrate deeply onto any one single aspect for any length of time. In addition to the story telling issue we are going to use ideas to capture attention, like showing a cultural artefact with an error or asking a question after a video-clip. We also will tie in the Community deeply into building story lines

548. A Hash Based Archiving System

ICIST 2013 Proceedings, 200-205
Kos Anton, Tomažič Sašo
Abstract: The amount of data created annually is growing exponentially. Some of the newly created data is important enough to be kept for shorter or longer time, therefore the need for data archiving is growing proportionally to data growth. We designed an efficient and scalable archiving system that can easily be adapted to the needs of different archiving applications and scenarios. A Fast Hash-based File Existence Checking algorithm is the core of the system. It outperforms other algorithms for file uniqueness checking. The proposed archiving system is a distributed processing and storage system that works with metadata hashes and file hashes. We implemented the archiving system in a form of a backup-like application for files on personal computers in the laboratory. The application operational tests yielded very favourable results, for example, the need for archive storage almost halved just because of the elimination of files with exactly the same content. We expect the proposed archiving system will find many uses in the present and future data archiving efforts

549. Automatic anonymization of judgments in electronic format

ICIST 2013 Proceedings, 206-211
Sladić Goran, Gostojić Stevan, Milosavljević Branko, Konjović Zora
Abstract: This paper proposes a novel method for anonymization of judgments, represented in XML format, according to the predefined anonymization rules. The method is based on the access control for XML documents enforced using the XXACF framework. AKOMA NTOSO was used as an electronic format for representation of judgments in order to enable efficient integration of the proposed solution with existing legal information systems.

550. Linking visually impaired people to libraries

ICIST 2013 Proceedings, 212-217
Tešendić Danijela, Boberić Krstićev Danijela, Milosavljević Branko
Abstract: This paper describes communication between the application for the visually impaired people (Audio Library) and the library management system BISIS. By integrating these two systems, visually impaired people will be able to access electronic materials that libraries possess. Communication is achieved through the web service which is implemented within the LMS BISIS. This paper gives a specification of that web service used for exchange messages and files between BISIS system and Audio library system

551. Storing of bibliometric indicators in CERIF data model

ICIST 2013 Proceedings, 218-223
Nikolić Siniša, Penca Valentin, Ivanović Dragan
Abstract: This paper presents an example for classification of bibliometric indicators. The basics of the CERIF model and one solution of bibliometric indicator mapping to CERIF model are presented. Mapping was accomplished by using the CERIF semantic layer and applying appropriate classification scheme.

552. I18N of linked data tools with respect to Western Balkans languages

ICIST 2013 Proceedings, 224-229
Milošević Uroš, Janev Valentina, Vraneš Sanja
Abstract: To be able to cope with all the challenges that are emerging with the rise of the Web of Data, linked data tools must find ways to deal with its heterogeneity with regard to the content being published and the languages that content is being published in. Adequate internationalization support is a must for distributing or consuming multilingual data, but providing it is not straightforward. In this paper, we analyze the problems semantic web tools are faced with when it comes to data being published in Western Balkan languages. We look at resource presentation mechanisms, show how IRIs can solve many of the common problems related to Serbian alphabets, but also that the Semantic Web is still not ready for full transition to internationalized identifiers. We also review different serialization options and explain why most XML-based formats are not suitable for the task of internationalization. To see how popular linked data tools deal with such data, we propose an evaluation methodology, and give an insight into the i18n-readiness of some popular semantic web tools.

553. An extension of the CERIF data model for description of scientific projects in the Republic of Serbia

ICIST 2013 Proceedings, 230-234
Mijić Dejan, Ivanović Dragan, Konjović Zora, Surla Dušan
Abstract: This paper presents an extension of the CERIF data model, necessary for storing information about scientific projects funded by state authorities in the Republic of Serbia. Based on the set of metadata identified in these projects, a CERIF compatible conceptual model is designed which will be deployed in the common research information system of the University Novi Sad – CRIS-UNS.

554. Using Linked Data and LOD2 stack in Emergency Management

ICIST 2013 Proceedings, 235-239
Mijović Vuk, Kraus Lydia
Abstract: This paper investigates how Linked Data can be applied to emergency management. Intended to IT engineers and safety experts, this paper shows how Linked Data is used today in emergency management systems, as well as how LOD2 stack, a collection of tools for managing the life-cycle of Linked Data, can be used to improve the learning curve of new personnel and increase situational awareness during emergencies.

555. Realistic benchmarking of shared web hosting environment

ICIST 2013 Proceedings, 240-245
Jekovec Matija, Sodnik Jaka
Abstract: In this paper we focus on several issues related to slow responsiveness of web sites. Page response time directly correlates to user abandonment, which consequently means a loss of profit. We analyze the whole round trip time (RTT) for each web page, excluding the factors that are not vital for optimization. We concentrate on the main factors behind slow response times and focus on the indicators that can be improved by web hosting providers running a shared hosting environment. In addition, we also describe a fresh approach to benchmarking. It is far better suited for a shared hosting environment using real log files that are already collected in the course of regular traffic. These log files are then used to recreate log traffic in order to perform various tests with different setups. The insights gained from these tests represent the basis for business decisions on infrastructure for the next 3-5 year period.

556. Proposal for possible approach for Critical Information Infrastructure protection in Serbia

ICIST 2013 Proceedings, 246-250
Murić Goran, Gospić Nataša, Bogojević Dragan
Abstract: The issues of protecting critical infrastructure, especially telecommunication and information critical infrastructure are in the focus of many governments, regulatory agencies and standardization bodies worldwide. Standardization bodies are trying to establish general model and standard for the protection of critical information infrastructure, but conditions differ from country to country and each one of them must provide its unique model based on general recommendations. In this paper, the possible approach for critical information infrastructure protection in Serbia is presented regarding EU and Serbian standards and regulations. The key stakeholders are identified, and their roles in this process are discussed.

557. New cloud business model towards performance

ICIST 2013 Proceedings, 251-253
Simjanoska Monika, Velkoski Goran, Ristov Saško, Gušev Marjan
Abstract: Cloud service providers (CSPs) offer a payper-use pricing model which charges the customers according to acquired resources. The quality assurance of such a model is negotiated between the customers and the CSPs via Service Level Agreements (SLAs). However, SLAs almost never guarantee sustainable performance. In this paper we propose a new CSP pricing model that aims towards performance charging, instead of rental. We believe that this model provides the customers maximum performance gain with minimum monetary costs. The methodology we developed is based on machine learning analysis that promise to provide accurate decisions when offering both performance and cost-effective configurations in the cloud.

558. Statistical calculation of industrial production

ICIST 2013 Proceedings, 254-257
Živanović Milan, Vukmirović Aleksandra, Vukmirović Jovanka
Abstract: This work will explain the growth of the standards for measurement and calculation of industrial production over the past 60 years. International standards led by the UN have been implemented in statistical systems around the world including the European Statistical Commission as well as the Republic of Serbia. Throughout the work the index of industrial production will be explained and its importance in the evaluation of an economy as a very important indicator. IIP is used not only to measure industrial production of a country but is also used in future forecasting of economic activities. Also in the work, the statistical survey for measurement of industrial production in the Republic of Serbia will be explained in detail describing the questionnaires, scope, and coverage.

559. Development of business models in entertainment and games software industry

ICIST 2013 Proceedings, 258-263
Špikić Sonja, Štavljanin Velimir, Čudanov Mladen
Abstract: The topic of this article are the specifics and the characteristics of contemporary business models and platforms in online gaming industry. Main focus is on how development of information and communication technologies influenced new organizational forms. Furthermore it is described how the video games industry grew through the time and what is the actual situation and future directions of this industry. Within this, differ- ent business models and modern platforms for playing video games are presented. At the end, there is a detailed presentation of a Nordeus company business model, dedicated to development of video games in international market
View details

Full paper not yet accessible

560. Development of business models in entertainment and games software industry

ICIST 2013 Proceedings, 258-263
Špikić Sonja, Čudanov Mladen, Štavljanin Velimir
Abstract: The topic of this article are the specifics and the characteristics of contemporary business models and platforms in online gaming industry. Main focus is on how development of information and communication technologies influenced new organizational forms. Furthermore it is described how the video games industry grew through the time and what is the actual situation and future directions of this industry. Within this, differ- ent business models and modern platforms for playing video games are presented. At the end, there is a detailed presentation of a Nordeus company business model, dedicated to development of video games in international market

Eventiotic

Spread the word!

     

About

Eventiotic is a platform for provision of the unique digital services to scientific events' organizers, participants, and other interested communities.

Eventiotic repository facilitates universal and unrestricted access to the scientific events' online proceedings, for better visibility, more citations and more collaborations.