During the last several decades, the keyboard has proved to be the most important computer input device. It was inherited from the mechanical typewriter from whom computer keyboards inherited a suboptimal key layout. Better solutions have been kept out of use by economic pressure. An arguably optimal layout for the English language is the Dvorak layout. This article discusses the possibility of applying the same guidelines and ideas that shaped the Dvorak layout on keyboards used in other languages. Some of the questions answered are how good the Dvorak layout is in English, how good is it in other languages and how a language specific version would look like
{"title":"The Dvorak keyboard layout and possibilities of its regional adaptation","authors":"T. Nakic-Alfirevic, M. Durek","doi":"10.1109/ITI.2004.241968","DOIUrl":"https://doi.org/10.1109/ITI.2004.241968","url":null,"abstract":"During the last several decades, the keyboard has proved to be the most important computer input device. It was inherited from the mechanical typewriter from whom computer keyboards inherited a suboptimal key layout. Better solutions have been kept out of use by economic pressure. An arguably optimal layout for the English language is the Dvorak layout. This article discusses the possibility of applying the same guidelines and ideas that shaped the Dvorak layout on keyboards used in other languages. Some of the questions answered are how good the Dvorak layout is in English, how good is it in other languages and how a language specific version would look like","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116631720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Open source software (OSS) has become a focal research issue in computer science. One interesting phenomenon in the OSS market is the evolution of dedicated intermediaries, which provide OSS-related services to the OSS community. Prevalently, OSS intermediaries fail to fulfil their financial and nonfinancial goals, such that many of them have vanished from the OSS market or significantly changed their business models. A major reason for this development is the lack of appropriate instruments which are able to dismantle coordination problems and failures inherent to the OSS development model. This paper proposes a controlling instrument for OSS intermediaries based on a behaviouristic approach. Since OSS intermediaries typically provide Internet based services, it is possible to observe actor behaviour by use of technical data acquisition instruments like server logging. Therefore, it seems reasonable to examine the concept of Web log mining, which provides a framework to analyse server based log files. Finally, we apply this concept to the research field of OSS intermediaries and show empirical results. These results relate to the OSS intermediary CampusSource, who provides e-learning software and complementary services
{"title":"Controlling open source intermediaries - a Web log mining approach","authors":"H.L. Grob, F. Bensberg, F. Kaderali","doi":"10.1109/ITI.2004.241608","DOIUrl":"https://doi.org/10.1109/ITI.2004.241608","url":null,"abstract":"Open source software (OSS) has become a focal research issue in computer science. One interesting phenomenon in the OSS market is the evolution of dedicated intermediaries, which provide OSS-related services to the OSS community. Prevalently, OSS intermediaries fail to fulfil their financial and nonfinancial goals, such that many of them have vanished from the OSS market or significantly changed their business models. A major reason for this development is the lack of appropriate instruments which are able to dismantle coordination problems and failures inherent to the OSS development model. This paper proposes a controlling instrument for OSS intermediaries based on a behaviouristic approach. Since OSS intermediaries typically provide Internet based services, it is possible to observe actor behaviour by use of technical data acquisition instruments like server logging. Therefore, it seems reasonable to examine the concept of Web log mining, which provides a framework to analyse server based log files. Finally, we apply this concept to the research field of OSS intermediaries and show empirical results. These results relate to the OSS intermediary CampusSource, who provides e-learning software and complementary services","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli
Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system
{"title":"ebXML verification using model checking","authors":"E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli","doi":"10.1109/ITI.2004.242172","DOIUrl":"https://doi.org/10.1109/ITI.2004.242172","url":null,"abstract":"Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-07DOI: 10.1109/NETWKS.2008.6231396
Pascal Lorenz
The challenge of new communication architectures is to offer QoS in Internet networks. This paper investigates the QoS aspects in the NGN (next generation networks). Voice and video multimedia applications will be developed and used when QoS mechanisms will exist. Therefore new functions must be developed to guarantee performance, offer security, and avoid jitter and to allow the respect of real-time constraints
{"title":"QoS in next generation networks","authors":"Pascal Lorenz","doi":"10.1109/NETWKS.2008.6231396","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.6231396","url":null,"abstract":"The challenge of new communication architectures is to offer QoS in Internet networks. This paper investigates the QoS aspects in the NGN (next generation networks). Voice and video multimedia applications will be developed and used when QoS mechanisms will exist. Therefore new functions must be developed to guarantee performance, offer security, and avoid jitter and to allow the respect of real-time constraints","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A rapidly ageing population has prompted the development of interactive domestic alarm systems (IDASs) to enable older adults to live independently in their own home for longer. The older adults' ability to receive and respond to IDAS outputs is critical for successful alarm handling. This paper considers the use of speech as IDAS output and its impact on an aging user group's ability to handle domestic alarm states effectively. An exploratory field investigation, conducted as an extension of previous laboratory studies [see, 9, 10], is reported. The findings suggest that speech appears to be a promising mode of IDAS output. These findings are discussed and future research directions offered
{"title":"Interactive domestic alarm handling: older adults' interaction with speech alarms","authors":"L. Lines, K. Hone","doi":"10.1109/ITI.2004.241967","DOIUrl":"https://doi.org/10.1109/ITI.2004.241967","url":null,"abstract":"A rapidly ageing population has prompted the development of interactive domestic alarm systems (IDASs) to enable older adults to live independently in their own home for longer. The older adults' ability to receive and respond to IDAS outputs is critical for successful alarm handling. This paper considers the use of speech as IDAS output and its impact on an aging user group's ability to handle domestic alarm states effectively. An exploratory field investigation, conducted as an extension of previous laboratory studies [see, 9, 10], is reported. The findings suggest that speech appears to be a promising mode of IDAS output. These findings are discussed and future research directions offered","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129720237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enterprise resource planning (ERP) systems are among the most important information technology (IT) development efforts to accommodate the operation of an organization into a single IT platform. Before the advent of ERP technology, a significant number of proprietary systems were employed in order to cover the IT needs of a corporation. Through the use of ERP technology, only one platform was necessary. The price to pay for such a technological breakthrough is deployment complexity. In this study, we present our experiences in the deployment of an ERP system in a real world corporation department (a Human Resources department), and the relevant problems appeared all the way from the blueprints implementation to the go live stage
{"title":"ERP systems deployment problems in the real world: from blueprints to go live","authors":"K. Chertouras","doi":"10.1109/ITI.2004.242948","DOIUrl":"https://doi.org/10.1109/ITI.2004.242948","url":null,"abstract":"Enterprise resource planning (ERP) systems are among the most important information technology (IT) development efforts to accommodate the operation of an organization into a single IT platform. Before the advent of ERP technology, a significant number of proprietary systems were employed in order to cover the IT needs of a corporation. Through the use of ERP technology, only one platform was necessary. The price to pay for such a technological breakthrough is deployment complexity. In this study, we present our experiences in the deployment of an ERP system in a real world corporation department (a Human Resources department), and the relevant problems appeared all the way from the blueprints implementation to the go live stage","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web services combine the best of both distributed componentization and the World Wide Web (H. Haas et al., 2004). It brings distributed computing to a broad range of client applications. Web services allow access to software components through standard Web protocols such as HTTP, SMTP and XML. In short, a Web service could be observed as a component running on the Web server, exposed to the world through standard Internet protocols. Using XML and Internet protocols, the concept of Web service enables use of any technology, language and device for both server and client side in a client-server model. The field of usage of Web services is very large. Whenever there is a need for network communication for two applications, a Web service can step in
Web服务结合了分布式组组化和万维网的优点(H. Haas et al., 2004)。它为广泛的客户端应用程序带来了分布式计算。Web服务允许通过HTTP、SMTP和XML等标准Web协议访问软件组件。简而言之,可以将Web服务视为运行在Web服务器上的组件,并通过标准Internet协议向外界公开。通过使用XML和Internet协议,Web服务的概念支持在客户机-服务器模型中为服务器端和客户端使用任何技术、语言和设备。Web服务的使用领域非常广泛。每当两个应用程序需要进行网络通信时,就可以使用Web服务
{"title":"Web services as standard of connecting heterogeneous information systems","authors":"D. Palavra, D. Lišnjić","doi":"10.1109/ITI.2004.241601","DOIUrl":"https://doi.org/10.1109/ITI.2004.241601","url":null,"abstract":"Web services combine the best of both distributed componentization and the World Wide Web (H. Haas et al., 2004). It brings distributed computing to a broad range of client applications. Web services allow access to software components through standard Web protocols such as HTTP, SMTP and XML. In short, a Web service could be observed as a component running on the Web server, exposed to the world through standard Internet protocols. Using XML and Internet protocols, the concept of Web service enables use of any technology, language and device for both server and client side in a client-server model. The field of usage of Web services is very large. Whenever there is a need for network communication for two applications, a Web service can step in","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines the positive and negative effects of online learning in creating an effective virtual learning community, based on communication, cooperation and equality. On the basis of a project called "online support for language and cultural studies for refugees and foreigners in the Czech Republic", tested in a pilot run in the fourth quarter of 2003, the author suggests some observations relating to her personal experience with building a virtual learning and social community in refugee (foreigner) education. Finally, the author discusses the challenge of implementing online forms of education into traditionally face-to-face language education for refugees, asylum seekers, and people who have been granted asylum in the Czech Republic
{"title":"Equality, communication and collaboration in online learning environment: an example of language education for refugees","authors":"G. Hykova","doi":"10.1109/ITI.2004.241783","DOIUrl":"https://doi.org/10.1109/ITI.2004.241783","url":null,"abstract":"This paper examines the positive and negative effects of online learning in creating an effective virtual learning community, based on communication, cooperation and equality. On the basis of a project called \"online support for language and cultural studies for refugees and foreigners in the Czech Republic\", tested in a pilot run in the fourth quarter of 2003, the author suggests some observations relating to her personal experience with building a virtual learning and social community in refugee (foreigner) education. Finally, the author discusses the challenge of implementing online forms of education into traditionally face-to-face language education for refugees, asylum seekers, and people who have been granted asylum in the Czech Republic","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Development of dynamic unstructured model of fed-batch fermentation process with droppings for L-lysine production is the aim of the article. Establishment of the model includes the following main procedures: description of the process by generalized stoichiometric equations; preliminary data processing; identification of the specific rates (growth rate (mu), substrate utilization rate (v), production rate (p), dissolved oxygen utilization rate (gamma); establishment and optimization of dynamic model of the process; simulation researches
{"title":"Investigation of L-lysine fed-batch fermentation process with droppings by mathematical modeling","authors":"Ai Ratkov, T. Georgiev, V. Ivanova, J. Kristeva","doi":"10.1109/ITI.2004.242364","DOIUrl":"https://doi.org/10.1109/ITI.2004.242364","url":null,"abstract":"Development of dynamic unstructured model of fed-batch fermentation process with droppings for L-lysine production is the aim of the article. Establishment of the model includes the following main procedures: description of the process by generalized stoichiometric equations; preliminary data processing; identification of the specific rates (growth rate (mu), substrate utilization rate (v), production rate (p), dissolved oxygen utilization rate (gamma); establishment and optimization of dynamic model of the process; simulation researches","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a proprietary application generator that generates the source code based on code templates and on user-defined parameters applied to these templates. The generator is designed to generate source code written in different languages and for different types of applications. The underlying data model and structure of the templates are presented. The operating principles of the tool are explained on some simple template examples written in XML and on the VB.NET source code generated by the templates. Usage of the tool is briefly described at the end of the article
{"title":"Application generator based on parameterized templates","authors":"T. Helman, K. Fertalj","doi":"10.1109/ITI.2004.241501","DOIUrl":"https://doi.org/10.1109/ITI.2004.241501","url":null,"abstract":"This paper presents a proprietary application generator that generates the source code based on code templates and on user-defined parameters applied to these templates. The generator is designed to generate source code written in different languages and for different types of applications. The underlying data model and structure of the templates are presented. The operating principles of the tool are explained on some simple template examples written in XML and on the VB.NET source code generated by the templates. Usage of the tool is briefly described at the end of the article","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}