slika

46
Feminist Leadership Judith Albino, USA The term “feminist leadership” is seen more frequently in the literature today, yet little has been done to explicate this approach to leadership. Using Warren Bennis’s analysis of various types of power that are employed in leadership and management, a case is made for feminist leadership as a general approach to management that is based on “value power.” Extrapolating from that description, the management behaviors and structures that would define a feminist leadership model will be suggested. Many of these elements are present in current, respected management theories; were they “borrowed” from feminist philosophy – or vice versa? Virtualization Layer for Automated Storage Management Zoran Babovic, IPSI Belgrade, Serbia and Montenegro The task of the virtualization layer is to provide global name space feature to the consumer of the storage with ability to move, relocate, and replicate the files, without affecting client’s view of the files. Such virtualization layer provides strong base for efficient information lifecycle management that means automatically managing data from its creation to deletion. The environment is a typical enterprise storage system that evolves pool network attached storage devices, including NAS appliances, SAN, servers and clients with shared storage. The main issue is choice of the efficient way to track the class of the storage where files reside and in the same time to provide transparent view of the file names to the client. We consider both block oriented and object based file systems, in order to solve the problem. Some topics about independency of the virtualization layer to the remaining part of system are also mentioned. International Private and Public Reinforcing Dependencies for the Innovation of Automotive Emission Control Systems in Japan and USA David Bauner, Royal Institute of Technology Stockholm, Sweden In the beginning of the 1970s, the economies of USA and Japan were growing fast. The larger, sprawling cities had suffered from pollution and congestion for some years. A number of distinctive environmental incidents and growing evidence of the negative effects of air pollution caused the respective governments to act in order to limit pollution. As passenger car emissions were found to be significant and rapidly increasing, their reduction was specially targeted. Initial steps had been taken in the 1960s, but air quality problems and increasing vehicle fleets populating the cities called for substantially reduced emissions. Investigations and entrenched political discussions resulted in requirements for the vehicle manufacturers to reduce the emissions of carbon monoxide (CO) and hydrocarbons (HC) with 90 % until 1975, and nitrogen oxides (NOx) with 90 % by 1976. These requirements were first presented in USA and soon adapted to fit in the Japanese regulatory framework, known in both countries as the "Muskie Act" or "Muskie Law" after the senator who developed the bill passed by US Congress in 1968. Advancement and Synergy Through Interdisciplinary Methods IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004 1

Upload: cameroon45

Post on 20-May-2015

3.462 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: SLIKA

Feminist Leadership

Judith Albino, USA

The term “feminist leadership” is seen more frequently in the literature today, yet little has been done to explicate this approach to leadership. Using Warren Bennis’s analysis of various types of power that are employed in leadership and management, a case is made for feminist leadership as a general approach to management that is based on “value power.” Extrapolating from that description, the management behaviors and structures that would define a feminist leadership model will be suggested. Many of these elements are present in current, respected management theories; were they “borrowed” from feminist philosophy – or vice versa?

Virtualization Layer for Automated Storage Management

Zoran Babovic, IPSI Belgrade, Serbia and Montenegro

The task of the virtualization layer is to provide global name space feature to the consumer of the storage with ability to move, relocate, and replicate the files, without affecting client’s view of the files. Such virtualization layer provides strong base for efficient information lifecycle management that means automatically managing data from its creation to deletion. The environment is a typical enterprise storage system that evolves pool network attached storage devices, including NAS appliances, SAN, servers and clients with shared storage. The main issue is choice of the efficient way to track the class of the storage where files reside and in the same time to provide transparent view of the file names to the client. We consider both block oriented and object based file systems, in order to solve the problem. Some topics about independency of the virtualization layer to the remaining part of system are also mentioned.

International Private and Public Reinforcing Dependencies for the Innovation of Automotive Emission Control Systems in Japan and USA

David Bauner, Royal Institute of Technology Stockholm, Sweden

In the beginning of the 1970s, the economies of USA and Japan were growing fast. The larger, sprawling cities had suffered from pollution and congestion for some years. A number of distinctive environmental incidents and growing evidence of the negative effects of air pollution caused the respective governments to act in order to limit pollution. As passenger car emissions were found to be significant and rapidly increasing, their reduction was specially targeted. Initial steps had been taken in the 1960s, but air quality problems and increasing vehicle fleets populating the cities called for substantially reduced emissions. Investigations and entrenched political discussions resulted in requirements for the vehicle manufacturers to reduce the emissions of carbon monoxide (CO) and hydrocarbons (HC) with 90 % until 1975, and nitrogen oxides (NOx) with 90 % by 1976. These requirements were first presented in USA and soon adapted to fit in the Japanese regulatory framework, known in both countries as the "Muskie Act" or "Muskie Law" after the senator who developed the bill passed by US Congress in 1968.

Advancement and Synergy Through Interdisciplinary Methods

Naala Brewer, Arizona State University, USA

This paper will be discussing the ever-expanding boundaries and overlapping areas of the scientific disciplines. What were once considered autonomous and complete disciplines, now share common threads of thought and rely upon each other to expand their theories. Advances in technology have created a climate for not only globalization and rich communication, but also a movement towards interdisciplinary research and unification of the scientific disciplines. The advancements and synergy that have taken place as a result of the interdisciplinary methods used today, along with potential interdisciplinary methods for the future, will be explored and discussed in this paper.

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

1

Page 2: SLIKA

Artificial Cells: Transport and Adhesion

Françoise Wyart Brochard, Paris University, France

Vesicles decorated with proteins are used as model system to study cell adhesion, cell detachment, and transport via pores and tubes. We are also able to control the membrane permeability, by addition of proteins or surfactants. This is important for membrane fusion, exocytosis, lipidic tube formation. We also extend these studies to real cells, where the membrane is attached to the cytoskeleton.

Networks of Probabilistic Processors

Rais Bukharaev, Kazan State University, Russia

A probabilistic automaton (PA), is a mathematical model of a probabilistic processor (PP) – a device, which is controlled by special commands and realizes certain behavior of output parameters, which are statistical stable and detarminated beforehand.

The Constitutonalization of Contract Law: Something New under the Sun?

Olha Cherednychenko, University of Utrecht, Netherlands

Due to the sharp analytical and historical distinction between private and public law, which is common in European legal systems, contract law has traditionally been considered to be immune from the effect of constitutional rights. This traditional view has, however, been put under pressure as a result of the tendency towards the so-called constitutionalization of contract law. The idea behind this development is that contract law is not an autonomous system for dispensing justice between private parties, but that it is subordinate to the value system of the Constitution. As a result of this, the role of constitutional rights, which were conceived as an instrument for the protection of the individual against the power of the State, is no longer limited to this kind of relationship. Contractual relations have been losing their immunity from the effect of constitutional rights. In this article, an attempt is made to explain what the constitutionalization of contract law actually entails and to assess the desirability of this development. The central question to be discussed is whether by the use of constitutional rights in contract law something substantially new can be gained for the protection of the weaker contractual party in comparison with the well-established contract law concepts such as duties to inform. The answer to this question will become crystallized in the course of analysing three cases which arose in three different legal systems at the beginning of the 1990s and in which the same results were attained, though in different ways, i.e. the famous German Bürgschaft case, on the one hand, and the English O’Brien and the Dutch Van Lanschot Bankiers v Bink cases, on the other.

 Risk Analysis in E-business based on XML Web Sevices

Aleksandra Dacić, Marijana Despotović, and Božidar Radenković, Faculty of Organizational Sciences,Serbia and Montenegro

The subject of this paper is the analysis of methods and applications in software project risk management, shown through the XML Web services development. Risk management and risk analysis in it, are now, standard parts in the software development life cycle. In this paper, special attention is paid to risk analysis methods within the Microsoft Solution Framework (MSF). MSF Risk Management Process comprises the collection of models and principles which should enable efficient creation of software packages of XML Web services for solving e-business problems.

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

2

Page 3: SLIKA

R&D Outsourcing Opportunities in Novi Sad, Serbia

Miroslav Despotović and Vojin Šenk, University of Novi Sad, Serbia and Montenegro

Supported by an EU Tempus grant, a Science & Technology Park has been formed in Novi Sad. Besides a Technology Transfer Centre, Innovation Centre and an Incubator of high-tech companies, it encompasses more than 25 R&D oriented companies, most of them emerging from University-based R&D projects, and tens of groups aiming at opening new companies if a possibility to do it would be enabled (financial, spatial, organizational, consultation etc.). Those companies, with almost 500 jobs and around 10,000,000 EUR of yearly turnover, actively seek good outsourcing opportunities in a wide area of ICT.

Micro Business Solutions, Belgrade – Projects done

Dusan Dimitrijevic, Serbia and Montenegro

We are using latest mainstream technology and developer tools; Database servers - MS SQL Server, Oracle; Programming - MS Visual Studio .NET; Web development - ASP .NET, C#, HTML, DHTML, JavaScript, Openshop, Visual Basic .NET. Furthermore, we invest a large amount of time in developing in-house application framework, which comprises a special database access layer, web interface components, configurable business logic and various enhancements and additions to the Microsoft .Net framework. With this heavy artillery we are offering very fast response to any custom request customers may have.

Simulated NVRAM journaling in ext3 file system

B. Đorđević, D.Pejakov, and N. Maček, Serbia and Montenegro

This paper concentrates on performance impact NVRAM journaling has over Linux ext3 filesystem. The media used in classic journaling techniques is hard disk - actually the part of the filesystem itself. Using NVRAM memory to store the filesystem journal improves overall performance. The main goal this work should achieve is analysis of performance impact due to a different journal storage media - NVRAM. All of ext3 journaling modes (journal, ordered and write back) are included in this testing. The performance is measured in using Postmark benchmark software, while NVRAM is being simulated via RAM disk, trd (trivial RAM disk).

Computers and People with Mobility Disabilities

Marijan Đurek and Emir Skejić

University of Zagreb, Croatia University of Tuzla, Bosnia and Herzegovina

Persons with mobility disabilities have limited capabilities in moving, performing manual tasks and taking participation in some life activities. Muscular dystrophy, multiple sclerosis, spinal cord injuries, head injuries, amputations, arthritis, etc., are some causes of mobility disabilities. Since that mobility impairments can significantly make tedious, even in some cases quite disable using of information technology, it is required to make adaptations that will be enabling the full communication with computers by persons with this kind of disabilities. In this article, some issues about communication between computers and persons with mobility impairments are discussed, and are presented a review of available assistive computer technology that make this communication possible.

New Space Technology: 1km Tether to 100,000km Space Elevator

Hironori A. Fujii Metropolitan Institute of Technology, Japan

Tether technology is a very old technology used for human activity in fabric works for clothes, fishing and hunting, building, and tethering horses and dogs. The tether technology is now becoming one of new and promising technologies for human space activities as spacecraft thrusters, power generators, and important elements of space infrastructures. The present

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

3

Page 4: SLIKA

paper addresses some recent works of the author on the space tether technology applied to an aurora experiment using a sounding rocket, a space solar power satellite and a space elevator for lifting us from the Earth to space.

Prediction of the Optimal Decision Distribution for the Traveling Salesman Problem

Robin Gremlich, Andreas Hamfelt, and Vladislav ValkovskyUniversity of Zurich, SwitzerlandUppsala University, Sweden

By analysis of experiments we formulate the hypotheses and present the approach for analytical prediction of the optimal decision distribution for the large-scale asymmetric traveling salesman problem. We verify the approach by using the TSPLIB- library of best known decisions. In addition, we analyze the asymptotic behavior for prediction of the weight of the optimal decision for the traveling salesman problem and its variance.

AI in Foundations of Computer Science

U. Ferreira, Ufba Escola Politecnica, Brazil

Formal Deductive Logic has been traditionally seen as the Foundation of Computer Science, but, as mentioned here, that is not precisely correct, for Logic has been an inseparable branch of Philosophy since Aristotle. Then, this paper presents associations between Arti_cial Intelligence and Foundations of Computer Science.

Visualizing Grid Computing with Policies based upon Economic Principals

Steve Halladay, Charles Milligan, and Eamonn Lavery, StorageTek USA

Grid computing is a means for effectively applying and leveraging computing resources from differing geographical locations. Constructing the policies for managing large-scale Grids can be challenging. For example, how does the Grid manager determine which compute resources should be allocated to specific processes? Buyya et al. has developed Grid management strategies based upon economic principles. The policies are helpful because they are distributed and have the effects of being self-organizing. However, understanding the other effects of these policies can be challenging. One mechanism for approaching a better understanding of the results of economic policies on Grid management would be to render a representation of such a Grid visually. This paper describes a visual rendition of a model of such a Grid. The resultant visualization application uses a discrete event simulation created by Buyya to model a global Grid, coupled with a commercial visualization tool.

Emotional Intelligence: Theory and Practice

Valerie Hearn, Volant Executive Coaching, USA

The term “emotional intelligence” became popular in the United States, especially in the business world, when Daniel Goleman’s book Emotional Intelligence was published in 1995. What is “emotional intelligence”? Is it a useful concept? How is it measured? Can the level of one’s emotional intelligence be raised? To answer these questions, the work of the major emotional intelligence researchers (Mayer & Salovey) is described and also the work of Daniel Goleman who popularized the construct. Finally, a practical method for raising emotional intelligence is presented

Information Entropy in Data Mining

Fred B. Holt, Panthesis Inc., USA

The past ten years have witnessed a renaissance for subspace representations in data mining. For large collections of unstructured text documents, the insights and tools contributed by Latent Semantic Indexing (LSI), by Iterative Residual Rescaling (IRR), and by Text Representation Using Subspace Transformations (TRUST) improve data mining and information retrieval. One of the open problems in using subspace methods for data mining concerns the selection of the subspace. What dimension should the subspace have? If two subspaces are

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

4

Page 5: SLIKA

offered, how do we compare them for our data mining task? In this paper we explain how the concept of information entropy provides a quantitative tool for addressing these questions

Self-formation in Micro-, Nano-, and Molecular Scales

Stepas Janušonis, Institute of Lithuanian Scientific Society, Lithuania

The possibility to cover artificial object evolution in molecular, nano- and micro-scales by topological approximation, as a basis of the self-formation theory, is discussed. It is shown that such an approach can be used in self-assembly, self-organisation, self-formation of artificial systems. This is a background for simulation of artificial objects’ manufacturing technology.

Chinese Calligraphic Handwriting (Shufa): A Cognitive & Health Science

Henry S.R. Kao, University of Hong Kong, Hong Kong

Three decades of theory-based research has established the effectiveness of Chinese calligraphic handwriting (CCH) in causing one’s cognitive activation, physiological slowdown, emotional stability, and perceptual sharpening. Successful applications of these findings have included (1) behavior changes in children with autism, ADHD and mental retardation; (2) elderly disorders in Alzheimer’s and stroke patients; (3) psychosomatic diseases in hypertension and diabetes, and (4) emotion and conduct changes in psychiatric patients. A general CCH system has been developed for users of Chinese as well as alphabetic writing systems. We are now working on an Internet model of the CCH training for global application.

Conventional and Cybernized Writing Instruments

Henry S.R. Kao, University of Hong Kong, Hong Kong

Two categories of writing instrument designs are described that can be used to facilitate handwriting effectiveness, enhance general health and render therapeutic effects in the treatment of behavioural, psychological, mental and psychosomatic disorders. The first category comprises ergonomic improvements of conventional fountain pens and the second consists of bio-sensors embedded in the shaft of Chinese writing brushes, which feedback one’s biological activities during writing including his perceptual, emotional, cognitive and physiological conditions. Brushes with such designs help to improve one’s general health as well as to render therapeutic effects in certain specific disorders.

A Study on the Encryption Techniques for Digital Right Management of MPEG-4 Video

Jun-il Kim and Ki-Song Yoon, Electronics and Telecommunications Research Institute, Korea

This paper presents encryption techniques for digital right management solutions of MPEG-4 streams. MPEG-4 is a format for multimedia streaming and stored in the MPEG-4 file format. We designed three kinds of encryption methods, which encrypt macro blocks (MBs) or motion vectors (MVs) of I-, P-VOPs (Video Object Planes), extracted from the MPEG-4 file format. We used DES to encrypt MPEG-4 data. Based on theses three methods, we designed and implemented a DRM solution for an Internet broadcasting service, which enabled a MPEG-4 data streaming, and then compared the results to get an optimal encryption method.

WAR: What Art Represents

Stephen R. Koepfer, Maimonides Medical Center, USA

This paper will discuss possible roles of art and artists during times of war. Lecture attendees will gain basic understanding regarding social and psychological foundations underlying art making, it’s therapeutic uses, and ability to offer individuals as well as communities the means to integrate war and traumatic experiences into their lives. The therapeutic role of art and artists will be explored through literature review, various examples of war art, and case

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

5

Page 6: SLIKA

presentations describing the art of New York City children and their reactions to war and violence.

VoIP performance on Local Area Networks

Anton Kos, Aleš Vugrinec and Sašo Tomažič

This paper investigates the possibilities of real-time voice transmission over local area networks networks that provide no guarantees of quality of service. The network of choice is 10 Mbit/s Ethernet and voice coder of choice is G.723.1. Both are widely used. At the beginning we define the requirements for real-time voice transmission and give the basic properties of G.723.1 coder. Delay is identified as the key parameter to real-time voice transmission. Then we identify the most common simplifications that are introduced on the way to theoretical results. We present results of a bimodal delay analysis that is tailored to the transmission of VoIP frames. We identify the upper bounds of network utilisation under which the delay is within acceptable range. Next we present the measurement results for different levels of network utilisation and compare them with simulation results that matched the measured network. Results of both are very similar and demonstrate that simulations are a good tool to predict VoIP behavior on the network. Despite the fact, that theoretical results were not directly comparable with measurements and simulations, they still give good guidelines about network operation under different conditions. All three methods thus complement each other.

Micro Business Solutions, Belgrade

Tatjana Kovacevic, Serbia and Montenegro

Micro Business Solutions is fully devoted to software production and services, offering complete IT solutions and services on a vendor-independent basis to our customers, currently numbering over 15. With our proven experience in eCommerce and outsourcing, as well as in all other IT application areas, we support our customers from timely return on investment to long-term value creation. We are proud to balance technical know-how with the ability to understand and address business issues. This all allows our customers to benefit from innovation across a wide spectrum of business fields.

Optimal Control Structure Determination Using Artificial Intelligence Methods

Kozák, Š. And Spišiak, M. Slovak, University of Technology in Bratislava, Slovakia

The paper deals with a novel approach to automatic generation methods used to design artificial neural network (ANN) structures. ANN’s are applied in modeling and control of highly nonlinear processes. One of the most important problems is to design optimal ANN structure for real applications. In many industrial applications, optimal ANN structures are designed by heuristic approaches or determined via experiments. In this paper, two techniques for automatic finding an optimal ANN structure are proposed. They can be applied in real-time applications as well as in highly nonlinear processes. A possible approach proposed in this paper consists in using genetic algorithms (GA) to find an optimal or minimal ANN structure. The first proposed method deals with designing a structure with one hidden layer. The optimal structure has been verified on a nonlinear model of an isothermal reactor. The second algorithm allows to designs ANN with an unlimited number of hidden layers each of them containing one neuron. This structure has been verified on a highly nonlinear model of a polymerization reactor used in chemical and power industries. The obtained modeling and control results have been compared with the results yielded by a fully connected conventional ANN structure.

Hamming Graphs

Laurence E. LaForge, The Right Stuff of Tahoe, USA

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

6

Page 7: SLIKA

We provide a primer on Hamming graphs, and set the stage for further research into their properties.A graph is Hamming if its vertices can be labeled such that the edge distance between every two vertices equals the Hamming distance between the respective labels.

A Conceptual Model of a Hi-Tech Cyberbrush for Non-ConventionalGraphic Production Including Calligraphy Writing : From Vitruvian Man , Penman to Feynman and “Cyberbrushman”

Chong Ming Lin, Lovoltech Inc., USA This paper will describe a hi-tech cyberbrush for non-conventional graphic production. The purpose of such a device is to perform calligraphy by using knowledge-based algorithm, to emulate the functions of programmable brush, paper and ink in 3-D environment , with timing factors considered. This paper will analyze the programmability of each component near its “atomic size”, in order to design such a new graphonomic device with state-of-the art technologies. We hope this study will serve as a new attempt to bridge the gap between “the two cultures” : science and art, with the art of calligraphy as its ultimate test.

Verifiable e-Voting for Trusted e-Elections

Fotios K. Liotopoulos and Gerasimos Sklavenitis, Hellenic Open University, Greece

One of the main concerns in implementing trusted electronic elections is to ensure the verifiability of the e-voting process, without compromising its confidentiality and vote integrity. This paper proposes a protocol and a mechanism for verifiable, confidential and secure e-voting, thus ensuring the constitutional requirement of Democracy that any election process must be trusted by the People. According to our protocol, every voter can verify the overall election results, as well as their own personal vote, by using publicly available information. This is achieved by combining asymmetric (private-public) key cryptography with a secure architectural framework. Furthermore, a protocol to ensure institutional verifiability for the administrative authorities is proposed, along with a quantitative analysis, indicating the feasibility of a national scale election system.

Cognitive Effects of English Brush Handwriting: The Case of Visual-Spatial Aptitude W.S. Lui, Henry S.R. Kao,and Ann Lin

University of Hong Kong, Hong Kong National Central University, TaiwanChangang Institute of Technology, Taiwan

Calligraphy is simply defined as beautiful writing (Fagg, 1984). Chinese calligraphy, the writing of Chinese characters by hand through a soft-tipped brush is, for centuries, regarded one of the fine arts in China. Chinese people have used of brush writing as a means of conveying thoughts and its expression in peculiar visual forms. The study of Chinese calligraphy in the past has focused mainly on how to execute and appreciate it artistically by following the practical experiences of the great masters. In the last three decades, psychologists have investigated the psychological processes of Chinese calligraphic handwriting (CCH) from the perspectives of perception, cognition, psychophysiology, emotion and motor behaviour.

Serbian ICT Cluster Opportunities Dragan Maric, Serbian Enterprise Development Project (SEDP), USAID, Serbia and Montenegro

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

7

Page 8: SLIKA

The Serbian Enterprise Development Project (SEDP) is a USAID-funded program tasked with strengthening the global competitiveness of Serbian enterprises. SEDP has identified six industry sectors, or clusters, in Serbia for their competitive potential: fruit products, tourism, furniture, pharmaceutical testing, information and communications technology (ICT), and apparel. The ICT sector in particular presents myriad opportunities for foreign clients and partners in terms of products and services development, as well as for foreign direct investment. A concise overview of the status in the Serbian ICT sector will be presented.

The Application of Network Science Principles to Knowledge Simulation

Charles A. Milligan and Steven M. Halladay, StorageTek, USA

Current approaches to knowledge representation begin with the principles of logic and ontology that Aristotle initially introduced into history. These knowledge representation approaches focus on building systems that incorporate not only computational models, but also models that people can understand and analyze. Knowledge representation fidelity requires relationship richness of both relationship types and quantities. This paper introduces a new discipline entitled simulated knowledge. Simulated knowledge differs from knowledge representation in that simulated knowledge relaxes the requirements of human understanding while maintaining the capability for human interaction and emphasizing its computational capability. Also, instead of an Aristotelian foundation, knowledge simulation principles emphasize those of the new Network Science.

The Realities and Fallacies Related to Knowledge Representation

Charles A. Milligan and Steven M. Halladay, StorageTek, USA

Knowledge representation, the utopia of information system management, has long been a holy grail that has promised to solve many problems related to the information revolution. However, the many years of research with less than stellar results should indicate that knowledge representation is not a simple problem to solve. Stymied progress is often an indication of the need for a paradigm shift. This paper encourages this paradigm shift within knowledge representation by identifying several fallacies and truths that may impact the way researchers conceptualize knowledge representation.

A Computer Program to Assist Developers in Validation and Usability Analysis of Intelligent Systems

E. Mosqueira-Rey and V. Moret-Bonillo, University of A Coruña, Spain The validation of intelligent systems is a complex matter due to the lack of standard references for complex domains. Moreover, the validation phase should be followed by a usability analysis for studying the quality of man-machine interaction. The VISNU tool has been designed to assist developers in the validation and usability analysis phases of intelligent system design. The validation module includes quantitative measures (such as pair tests, group tests and agreement ratios) and facilities for planning the entire process and for

interpreting the final results. The usability module includes different types of usability analysis, namely, heuristic (based on the collaboration of experts), subjective (based on the collaboration of users) and empirical (based on objective data). One of the main goals of the system developers has been to integrate different evaluation methods to obtain information which could not otherwise be obtained.

A Business Architecture for M-government to Citizens

Amitava Mukherjee, Agnimitra Biswas,Debashis Saha, and Kaushik Dey

Royal Institute of Technology, Sweden

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

8

Page 9: SLIKA

IBM Global Services India,IndiaIndian Institute of Management-Calcutta (IIMC), IndiaIBM Global Services India,India

In today’s world where mobile and wireless technology [1] is growing without bounds, the extension of e-government services to mgovernance seems to be not a distant reality[2]-[3]. M-Government is itself a complex business strategy for the efficient utilization of all wireless devices providing for instant availability of services and information for better benefits to users. This concept paper proposes business architecture for m- Government services to different parties like citizens, businesses and governments. This business architecture contains two guidelines namely the network architecture for m-Government and the implementation methodology for its (government’s) services to different parties particular to citizens. The implementation methodology, we propose here, will be applied with to other parties with some modifications of this methodology. This business model for m-Government services points to Indian context in few occasions as an example case to explain the fact.

Abstraction and Refining Using Predicates Kaninda Musumbu, Labri, France

A well-known limitation of automatic verification is their applicability only to relatively small finite state systems because of exponential blow up of the models size to have constructed before the verification. process Abstraction techniques propose a way to reduce the original system to a small one, on which we can apply automatic tools. We propose a method using the abstraction of the temporal specifications of the formulas type of transition. The method is based on the analyze of thesatisfiability of abstract temporal specifications which are obtained from the concrete specifications by the abstraction of the states of the system specified.

Ethics in International Business: Emerging Trends

Linda Naimi, Purdue University, USA

The emergence of the global economy has brought wealth and prosperity to multinational corporations and their respective countries. But it has also raised concerns about human rights and the environment. Until recently, no internationally recognized standards existed to ensure that businesses conducted themselves in an ethical, compliant and socially responsible manner. That is about to change. The United Nations, International Labour Organization and numerous international agencies have identified international standards for corporate social responsibility and ethical conduct. From the Global Compact to the International Code of Corporate Citizenship, the world is demanding ethics in international business.

Semantic Web Application Models

Erich Neuhold, Fraunhofer IPSI, Germany

The Semantic Web and the Web service paradigm are currently the most important trends on the way to the next generation of the Web. They promise new opportunities for content and service provision, enabling manifold and flexible new applications and improved support for individual and cooperative tasks. The use of the Web service paradigm in the development of Web applications, that typically couple application databases with user dialogs, is quite obvious. The development of Web applications that can be operated effectively in the Semantic Web context (Semantic Web Applications), however, imposes some challenges. Two main challenges towards extended (conceptual) modeling support are addressed in this talk:

1) In the Semantic Web, Web applications move from a purely human user community towards a mixed user community consisting of humans as well as of software agents; This results into new requirements towards models for Web applications’ user interfaces;

2) Automatic interpretation of content, one of the main building blocks of the Semantic Web, is based on interlinking local models with globally defined interpretation schemes like vocabularies and ontologies; This has to be reflected by the conceptual application domain models of Semantic Web Applications;

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

9

Page 10: SLIKA

Conceptual Modeling for Web applications, thus, has to be revisited in the context of the new Web trends looking for adequate Semantic Web Application Models.

How Significant has Women’s Contribution to the Progress of Science been?

Bill Palmer, Darwin University, Australia

The popular view is that the answer to the question is that women have made little contribution to science. Students, in the author’s experience, both male and female, certainly seem to believe this and the message from most of the books that they use tends to reinforce this view. This author has been interested in ‘the textbook’ for some ten years. In the field of science textbooks, women writers occupy a more prominent position than in pure science and women have greatly influenced the format of the school science textbook and the methodologies used. It may be difficult to justify research into women’s contribution to science on the grounds that so many academics have addressed these issues.

A Style of Theater Production directly inspired by Interactive Data Mining

Francis Rousseaux , Alain Bonardi and Romain Poncelet

Equipe projet SemanticHIFI de l’IRCAMEquipe IARM de l’Université Paris Stagiaire UTT à l’IRCAM

In this paper, we show how traditional theatre staging can be considered as based on a formal approach of similarity. It uses a dramatic ontology and instantiation variations. Drawing our inspiration from the opposite approach through interactive data mining, we hereby account for theatre researches using computers as actor partners to escape a priori specification.

Space-time Fluctuation and Dynamic Geometry in Brain Function

Sisir Roy, Indian Statistical Institute, India

Pellionisz and Llinas proposed the concept of functional geometry to understand the internal representation of the events associated to space-timing of moving objects in the external world. The concept of simultaneity plays significant role to construct this kind of functional geometry for the internal world. Here, the simultaneity concept seems to be different than that prevailed in modern physics. The conduction speeds through various axons for any external stimulus are different. There exists time delay for the same external stimulus and hence the concept of simultaneity is hardly realizable. However, it is well known that brain takes 10−14ms as the ”quanta” of time or minimum time to cognize an event. As the time delay lies within this time interval, the concept of simultaneity has been shown to be valid from the operational point of view and hence the joint representation of space and time is realizable in brain function. The geometric structure of functional geometry is shown to be five dimensional fluctuating space-time whereas the usual Minkowski space-time is a subspace of that. Here, the space-time can accommodate the infinite possibilities of configurations even for the same load associated with muscular movement. The CNS chooses one of these infinite possibilities and we call this kind of functional geometry as Dynamic Geometry. This will shed new light on Tensor Network theory (proposed by Pellionisz and Llinas and the developments of artificial intelligence.

Data Assurance in a Conventional File System

Sasa Rudan, Aleksandra Kovacevic, and Charles Milligan

IPSI Belgrade, Serbia and MontenegroStorageTek, USA

The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goal is a smart card based DSFS (Digital Sealed File System). The main idea is to send only the hash value of a document to the SmartCard together with the unique document identification. After creation of

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

10

Page 11: SLIKA

public/private key pair and hash value encryption, SmartCard destroys private key. This yields a final signature and public key as output. Therefore, sending confidential key material from SmartCard to a system is completely avoided. Since hash value is small data, limited bandwidth to the card for transferring large documents for encryption is not a problem. However, there are some possible drawbacks of the proposed idea. An attacker is able to circumvent the signing process in SmartCard and to act as SigningTool. Moreover, publishing of public key is the issue of the DSFS architecture and public key distribution is too complex and unreliable solution. Here we describe a possibility of overcoming these problems.

Purdue University’s Discovery Park

Charles O. Rutledge, Purdue University,USA

The mission of Discovery Park is to provide Purdue University with facilities, leadership and systems that transcend traditional academic boundaries, fostering an innovative interdisciplinary environment for learning, discovery and engagement that leads to intellectual excitement, scientific achievement, and economic growth. Innovative interdisciplinary efforts will lead science, shape and engage industry, change the way people work and improve the quality of life. Activities of six centers of excellence representing nanotechnology, bioscience, e-enterprise, learning, advanced manufacturing, and entrepreneurship will be highlighted. Discovery Park excels in developing expertise in engineering and technology to address complex questions in the physical and biological sciences.

Logic for Authentication Protocol Analysis

Kok Wei Shiung and Hiew Pang Leang, Malaysia

Most authentication protocol analysis method adopts inductive paradigm. Existing logics, such as BAN logic and its variants focus on proving the correctness of a protocol. Inspired by Millen and Shmatikov’s constraint-solving approach and BAN logic, we present a new method for analysing cryptographic protocols. Unlike traditional methods, the proposed method applies deductive approach, focusing on the capabilities of intruder instead. The proposed method utilizes evidences from messages exchanged to show the intruder able to access the protocol. Each steps of the analysis will indentify the necessity of applying encryption to an element, hence increase efficiency of the security protocol. In this paper, we describe the semantic of proposed method and provide a compare of the results of preliminary analysis with existing methods.

Criteria for Deciding the First Programming Language for Novices

Yuh-Huei Shyu, Tamkang University, Taiwan

Program-first” is a popular approach to teach introductory computer science. Current decision on the first programming language is mainly based on theoretical aspects. Common used strategies can be classified into three types: imperative-first, or functional-first, or object-first. Based on the adopted strategy, the first programming language is then decided. No matter which language is chosen, educators often encounter the same problem, namely, the problem of high withdraw-or-fail rate. This problem indicates the waste of education resources. For these failed students, subsequent programming trainings are meaningless. We wonder that the phenomenon of high withdraw-or-fail rate has something to do with the selected language. In this paper, we will consider the problem of deciding the first programming language. Instead

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

11

Page 12: SLIKA

of deciding it from theoretical aspects, we shall consider it from reality aspect. We then propose criteria for deciding the first programming language. According to our criteria, BASIC language is the best first language for novices. BASIC has many good features that are often neglected.

Simple Web Interface to LDAP Directories

J. Sodnik and S. Tomazic, University Ljubljana, Slovenia

Lightweight Directory Access Protocol is a communication protocol which enables the access to online directories. As it is the case with the majority of free client software, the user is merely able to explore the directory, but can not change its content.

Revisiting Some Issues on the Role of Technology in E-Learning

Vladimir Srdanović, Center for Multidisciplinary Studies, Serbia and Montenegro

Some potentials and limitations of E-learning are examined, as they vary across disciplines. We argue that E-learning is likely to be more successful in disciplines where the role of well-structured knowledge and reasoning is predominant. However, some limiting factors emerge in disciplines where decision making that

requires more complex information processing is involved. Also, when it comes to learning certain skills and/or exhibiting performance knowledge, limitations are encountered that are not likely to be overcome by improving on present technology only. In other words, the role of direct personal interaction between student and instructor emerges as a crucial one in some cases. On the other hand, academic environment itself seems to play an important role in motivating students. It is therefore important to find the proper balance and make optimal use of available technology for E-learning. MIT’s OpenCourseWare and European Credit Transfer System (ECTS) initiatives address some of the issues discussed, and point to possible directions for solving them.

Neurilemom of Parafaringeal Region

Katarina Stankovic, Dejan Stefanovic, Zoran Ivankovic, Ranko Dergenc, Rade Kosanovic, and Jovic Marko, Serbia and Montenegro

Tumors of Parafaringeal region present about 0.5% of all head and neck tumors. They present one of the most important problems in otorhynolaringological practice because of their anatomical area, neuro-vascular content, difficult diagnostic and adequate surgical tehnique. Head and neck neurilemomas present 25-30% of all neurilemomas This is a case report about patient M.D.(51 year old) that was accepted on ENT Departmant because of well at the right side and a sense of strange body in her throat. Swell appeared 4 years ago, it was growing slowly and the sense of strange body in her throat appeared 6 months ago.

Project Managment in Construction Using the Internet

Simo Sudjic, Gemax, Serbia and Montenegro

Project management in construction, on the level of high system (companies), is extremely complexed process for which function the powerful base of dates are necessery and there continual and exact distribution too. Construction projects are often geographically far from the head quarters even in the other continents, so the Internet nowadays is used as tool for managing those projects. There are more program packages which are used for project managing, and one of these is Primavera project planner for the enterprise, which is used for managing projects on the companies level and it completely provides comunication through Internet all the members on the projects. One construction project is presented in that paper, which is being done on the other continent, from the planning phase, the control of progress and managing, and all the steps which were realised are connected to using the Internet.

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

12

Page 13: SLIKA

Towards an Interoperable Information Architecture

R. Summers, J. Chelsom, N. Dinsey, A. Zisman, S. Katz

Dept. Information Science, Loughborough University, UK.CSW Informatics Ltd., Oxford, UK.Dept. Computing, City University, London, UK.UN FAO, Rome, Italy.

An interoperable information architecture is facilitated by the use of web services and XML technologies. This paper describes a further feature – the XML information bus, as a key component for interoperability. To illustrate the benefits and drawbacks of the approach, the information architecture has been applied to the United Nations Food and Agriculture Organisation. Prospects for transferring the knowledge technologies to other domains, principally pharmacogenomics and drug discovery, are discussed.

Gaussian Pulse in Ultra-Wide Band Communications

Rudolf Susnik and Saso Tomazic, University of Ljubljana, Slovenia

Ultra-Wideband (UWB) technology has been gaining increasinginterest from the industry due to its recent application in communications. The technology itself has been well known for decades and its use was mostly reduced to radars in industrial applications.

Expertise Overview of Communication Software Laboratory at the University of Novi Sad

Vojin Šenk and Miroslav Despotović, University of Novi Sad, Serbia and Montenegro

The Communication Software Laboratory designs and prototypes all types of communication software. That includes software development for PC-based platforms (Win32, Linux) and embedded platforms (TI, Motorola, ARM, Symbian). Our expertise includes Protocols for communication networks, Channel coding, Speech and Picture processing, as well as software in the general framework of Digital communications. We have developed a number of communication protocols for different types of networks like: Wireless (GPRS), Ethernet, Digital Transmission (E1/E2), etc. Regarding Channel coding, we are experts in both current and leading-edge FEC technology (such as turbo codes and coding for Partial-response channels), while standard convolutional and block codes are our routine.

Abstract to Reality: Developing Educational Games With A Group of Design Students (Non-Programmers)

Lim Kai Teng , Garfield Toro, Professor Hazel Gamec Wanganui School of Design New Zealand

This paper outlines the processes and outcomes of a 48-hour project by computer graphic design students, to develop an educational game concept. Hosted by the Wanganui School of Design and supported by New Zealand Trade and Enterprise, the project focused on developing New Zealand as a creative hub for Asia-Pacifica. The Wanganui School of Design is a world leader in creative, interactive multimedia design. It also acknowledges the importance of play in life-long learning, values games as an educational tool and recognizes games as a key growth market for computer graphic design.

On Optimality of Quadrature Amplitude Modulation

Saso Tomazic, University of Ljubljana, Slovenia

This paper demonstrates that for transmitting data over a strictly band-limited transmission channel of bandwidth B quadrature amplitude modulation at symbol rate r=2B is optimal with regard to information throughput. In accordance with the sampling theorem any band limited

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

13

Page 14: SLIKA

signal can be uniquely represented with 2B samples per second and reconstructed using reconstruction circuit which is in fact a generic QAM modulator. Band limited signals produced with any other modulation technique can thus also be obtained using a QAM modulator.

Advanced Manufacturing Centers Support Sustainable Economic Growth

Mileta M. Tomovic, Purdue University, USA

Industrial competitiveness and economic growth strongly depend on cooperation between universities, laboratories and industry. Achieving good relationships provides a basis for sound applied research and ascertains faster deployment of scientific discoveries and technological developments, which in turn result in strong economic base capable of supporting knowledge creation. Hence, resulting in sustainable economic growth. Manufacturing is a cornerstone of every economy and foundation of wealth creation, by providing above average salaries to local communities.

Transmission Gain of Multicarrier Modulation

Anton Umek, University Ljubljana, Slovenia

The paper presents the results of research in the field of digital signal transmission on a metal twisted pair. The principal goal is to determine the information rate gain of multicarrier transmission system. In order to compare information rates we selected several transmission system models: coded and uncoded multicarrier and baseband transmission. A multicarrier transmission gain is explained also with a simple two-band channel example.

Development of a Fiber-Optical Microphone to be Used in a Totally Implantable Hearing Aid (TIHA)

Aleksandar Vujanic, Sladjan Mitic, Zoran Djinovic, Dusan Vujanic, Robert Pavelka, Milos Tomic,and Matthias Cordes

Vienna University of Technology, AustriaSchwerpunktkrankenhaus Wr.Neustadt, AustriaSecurity Institute Belgrade, Serbia-MontenegroIntegrated Microsystems Austria, Austria

This paper describes an interdisciplinary approach in development of a microphone, which is based on low coherence fiber-optical vibrometry and intended to be used in a Totally Implantable Hearing Aid (TIHA). Three major issues have been studied in the project: optoelectronics including sub-nanometer resolution optical measuring principle and low-power electronic driving and data-processing unit, surgical implantation technique including miniature implantable mechanical holding and adjusting system, and suitable implantation tools, as well as biocompatibility problems. An overview of performed activities and obtained results, as well as of the further R&D activities is given.

Are We Going Towards Artificial Man? Humanoid Robots: Past, Present State and the Future

Miomir Vukobratović, Mihailo Pupin Institute, Serbia and Montenegro

Rapid development of humanoid robots brings about new shifts of the boundaries of Robotics as a scientific and technological discipline. New technologies of components,sensors, microcomputers, as well as new materials, have recently put up the barriers to real-time integrated control of some very complex dynamic systems such as humanoid robots are, which already today possess about fifty degrees of freedom and are updated in microseconds of controller signals. In view of the above statements, the work for the first time raises the essential question on the justifiability of increasing the number of degrees of freedom of

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

14

Page 15: SLIKA

humanoid robots, having in mind that for the overall skeletal activity man has at its disposal roughly about 650 muscles of human body which could be approximately expressed by more than three hundreds equivalent degrees of freedom, i.e. the same number of biological actuators.

Bringing Semantics to Pharmacogenomics

Hiten Vyas and Ron Summers, Loughborough University UK

Effective knowledge management of the pharmacogenomics discipline presents many challenges when compared to other ‘omic’ studies such as genomics and proteomics. For instance, there are different approaches to pharmacogenomics and different high-throughput methods are used that produce data that are highly variable. Conversely what makes pharmacogenomics unique is the need for effective management and integration of phenotypic data (that is molecular, cellular and clinical data) along with genotypic data. This paper will explore data, information and knowledge management issues associated with pharmacogenomics..

Choosing International Vendors: Contextual Considerations

M. Wisma, C. Tomovic, L. Naimi, Purdue University, USA

Today, problems associated with vendor selection and the management of vendor relationships has been identified as factors that negatively impact multinational performance and economic growth. It is purported that while factors related to logistics and distribution are important when selecting international vendors, they are inadequate when considered in isolation.

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

15

Page 16: SLIKA

TalentedStudents ForumAbstracts

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

16

Page 17: SLIKA

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

17

Page 18: SLIKA

Simulation Language - CSMP 2004

Milos Blagojević , Kostandin Dimitrijević , Goran Milosavljević , Božidar RadenkovićFaculty of Organizational Sciences, University of Belgrade

Program for Simulation of Continous Systems CSMP. In this paper we described a program for simulation of continous systems up to 25th order. The control of the program flow is achiewed by the command language vith a visual representation of the commands. \this program is written in Borland® Delphi™ version 7 as our primary implementation tool and suited for ease use on the personal computers.

Achieving knowledge interoperability: An XML/XSLT approach

J. Jovanović, and D. GasevićFaculty of Organizational Sciences, University of Belgrade

Development of an intelligent system requires not only profound understanding of the problem under study, but also employment of different knowledge representation techniques and tools that are often based on a variety of paradigms and technological platforms. In this context automatation of knowledge sharing between different systems becomes increasingly important. One solution might be to extend a knowledge modeling tool by implementing a set of new classes or functions for importing other knowledge formats (using e.g. Java, C++, etc.). But, this can be a rather difficult and time consuming task. Since XML is now widely accepted as knowledge representation syntax, we believe that a more suitable solution would be to use eXtensible Stylesheet Language Transformation (XSLT) a W3C standard for transforming XML documents into either other XML or regular text documents.

Product Specification: The GOout! System

Ivan Kolarov, Damjan Tomić, Đorđe Milovanović, Borko Kovačević, Marijana DespotovićFaculty of Organizational Sciences, University of Belgrade

The purpose of this specification is to introduce the reader with every technological aspect of the GOout! System, as well as the commercial side of the product. It consists of basic product overview with some specifics regarding technical details and implementation issues.

Case Study: Mobile Commerce Application Usability

Miroslav Minović and Velimir ŠtavljaninFaculty of Organizational Sciences, Belgrade University

This paper presents research results on usability of mobile application designed for sales. Application functionality and user interface quality of design has been tested using methods of cognitive walk-troughs and focus group with end users in lab environment. Further research in this areas are desireable in order to improve usability of mobile commerce applications.

Anti-Spam Filter SpamGuru

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

18

Page 19: SLIKA

Tanja Petrovic, School of Electrical Science, Belgrade, Serbia and Montenegro

The anti-spam filter SpamGuru mirrors the philosophy of attacking the Spam problem on multiple fronts, by incorporating several different filtering technologies and intelligently combining their output to produce a single spamminess rating or score for each incoming message. This paper describes the newest and the most powerful of all the algorithms used in SpamGuru: Chung-Kwei algorithm, for which the current prototype achieved a sensitivity of 96.56% whereas the false positive rate was 0.066%.

Advanced IPSI Research and Development in Infrastructure for E-Business on the Internet

Aleksandar Stojanovski, Ivan Markovic , Aleksandar Stanic, Bojana Malisanovic, Miroslav Radakovic, Ivan Toskov, Andrija Bosnjakovic, Sinisa Rudan, Jelena Krunic, Aleksandra Jankovic, Zoran Babovic, Tanja Petrovic, Darko Jovic, Damjan Vujnovic, Nenad Korolija, Sasa Rudan, Aleksandra Kovacevic, Sanida Omerovic, Ivana Vujovic, Milos Cvetanovic, and Veljko Milutinovic

This presentation gives an overview of the most recent R+D in the field of infrastructure for e-business on the Internet, with special emphasis on the activities of the graduate students of the School of Electrical Engineering, University of Belgrade. This is an overview. Details can be found in about 40 papers published recently or accepted for publication in 40 different IEEE journal papers. The total number of graduate students working on all R+D projects together is about 100; the list of authors includes only those working on the ongoing projects.

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

19

Page 20: SLIKA

IPSI Award

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

20

Page 21: SLIKA

Abstracts

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

21

Page 22: SLIKA

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

22

Page 23: SLIKA

TV is Dead – Long Live the WEB (SSGRR-2000)

Harold Kroto, Nobel Leaurate, University of Sussex, UK

Science, Engineering and Technology are as vital to our intellectual and cultural development (particularly our children’s) as they are to our training to get along in the Modern World. Some efforts to redress the problems involved in the general Public awareness and understanding of science and engineering (PAUSE) issues are being initiated via the Vega Science Trust (www.vega.org.uk), which aims to take advantage of the revolution in TV and Internet communications technology to improve matters. The best scientists and science communicators are being recorded and the programmes are being broadcast on BBC-TV and the Internet. Furthermore School/University outreach programmes are being developed and Vega is piloting ways in which members of the Science, Engineering and Technology (SET) community can, as individuals and groups, make important contributions. Excerpts from SET programmes will be presented. These efforts present a perspective on SET which places the cultural factors in the foreground and focuses on the intrinsic charisma of science which is hidden from many. It is now cruical that the society in general and the scientific community in particular accept that serious problems are involved in communicating science and the Internet is set to play a major role. Before the invention of the printing press there was only one book in the west – the bible – and it was hand-written by monks. After the invention the printing press book – writing and reading was democratized and this was truly the beginning of general education. In a similar way the birth of the Internet has democratized broadcasting – the broadcasting channels no longer control the dissemination of recorded material – individuals and groups of individuals can now do it themselves and so the Internet has enabled broadcasting to fulfill the promise it has always had – to be a superb educational medium.

Electronic Business and Education (SSGRR-2001)

Bob Richardson, Nobel Laureate, Cornell University, USA

There is no longer any question that the Internet and electronic communication are the major new tools for collaborative advances in the creation of new knowledge and in future learning. There are countless examples of highly successful professional courses taught on the Internet. Similarly, international and multidisciplinary collaborations in scientific research based upon little contact other than through electronic communication dominate the scientific literature. Perhaps the most profound examples of distance collaboration in science are found in astronomy. The Hubble telescope has permitted astronomers to gather breathtaking images from the most remote observatory imaginable – one in orbit around the earth. A significant challenge remains. The challenge is to devise a remote mode for nonverbal communication about difficult concepts. In the shared creation of new ideas and knowledge, facial expressions and body gestures frequently play an important role in peer interactions. As the speed and bandwidth of electronic communication increase, we have the prospect that the important elements of human contact can be imitated. Without the development of sympathetic peer or mentor relationships, distance learning will remain quite sterile.

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

23

Page 24: SLIKA

E-Business and E-Challenges (SSGRR-2002)

Jerome Friedman, Nobel Laureate, MIT, USA

The development of Homo sapiens has been a history of innovations, from the earliest crude tools to the modern technological society of today. The growth of science and technology has been exponential during the last century; and under the right circumstances, this rapid growth can be expected to continue. The major innovations of the future - those that will shape the society of the future - will require a strong foundation of both basic and applied research. It is ironic that quantum mechanics, one of most abstruse conceptual frameworks in physics - one that was developed to explain atomic spectra and the structure of the atom, lies at the foundation of some of our most important technological developments, because it provided the understanding of semiconductors that was essential for the invention of the transistor. Quantum mechanics thus contributed directly to the development of technologies that gave us world wide communication, computers with their applications to all phases of modern life, lasers with many diverse uses, consumer electronics, atomic clocks, and superconductors - just to mention a few. The internet and the World Wide Web, which are profoundly reshaping the way that we communicate, learn, and engage in commerce, owe their origins in a deep sense to the physicists of the past who worked to understand the atom. In modern industrial nations, quantum mechanics probably lies at the basis of a sizable fraction of the gross national product. This is but one example, and there are many others in all areas of science that demonstrate this point. It is clear that innovation is the key to the future and the human drive to understand nature is the key to future innovation. Society must do all that it can to preserve, nurture and encourage curiosity and the drive to understand.

The Next Generation of IP – Flow Routing (SSGRR-2003)

Lawrence G. Roberts, Father of the Internet, USA

For the last 33 years IP routers have not changed, they still support only “best effort” traffic. However, the bandwidth available to people has been increasing rapidly with the advent of broadband access. The result is that many new services are now desired that require far better QoS than “best effort” IP can support. Also, with broadband, the problem of controlling the total usage and carrier expense has become important. Thus, it has become critical to improve both the delay performance and the control of bandwidth for IP service, much as was accomplished in ATM. Also, call rejection for high bandwidth streaming services like video is required instead of random discards if quality is to be maintained. All these problems can be solved with no change to TCP/IP by routing flows rather than packets. This requires keeping some state information for the duration of the flow, but this information can be captured on the fly as the first packet goes by. This permits an IP flow router to achieve all the capabilities of an ATM switch, but without the call setup delay and at a lower cost than a conventional IP router.

Number and Organization of Primary Memory Objects in the Brain (IPSI-2004 Montenegro)

P.G. de Gennes, Nobel Laureate, College de France

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

24

Page 25: SLIKA

A memory area contains a large number(N ~10 ) of neurons, each of which is connected with ma neighbors (number of efferents:Z ~104). But the connections are poor: the probability for one connection to be efficient is p ~10-2. This is important: different memory objects must be independent. We discuss how a definite memory object can be stored on a cluster of well connected neurons, and what is th statistics of these clusters. The average number M of neurons per cluster is contained within two limits: if M is too small, the memory is not faithful. If M is too large, the storage capacity is too small. Various consequences of this picture will be presented.

Authors

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

25

Page 26: SLIKA

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

26

Page 27: SLIKA

Judith Albino 9Zoran Babovic 9David Bauner 9Naala Brewer 9Françoise W. Brochard 10Rais Bukharaev 10Olha Cherednychenko 10Aleksandra Dacic 10Marijana Despotovic 10, 25Božidar Radenkovic 10Miroslav Despotovic 11, 21Vojin Šenk 11, 21Dusan Dimitrijevic 11B. Ðordevic 11D.Pejakov 11N. Macek 11Marijan Ðurek 11Emir Skejic 11Hironori A. Fujii 11Robin Gremlich 12Andreas Hamfelt 12Vladislav Valkovsky 12U. Ferreira 12Steve Halladay 12, 16Charles Milligan 12, 16, 17Eamonn Lavery 12Valerie Hearn 12Fred B. Holt 12Stepas Janušonis 13Henry S.R. Kao 13, 15Jun-il Kim 13Ki-Song Yoon 13Stephen R. Koepfer 13Anton Kos 14Aleš Vugrinec 14Sašo Tomažic 14, 21

Tatjana Kovacevic 14Š. Kozák 14 Spišiak M. Slovak 14Laurence E. LaForge 14Chong Ming Lin 15Fotios K. Liotopoulos 15Gerasimos Sklavenitis 15W.S. Lui 15Ann Lin 15Dragan Maric 15E. Mosqueira-Rey 15V. Moret-Bonillo 16Amitava Mukherjee 16Agnimitra Biswas 16Debashis Saha 16Kaushik Dey 16Kaninda Musumbu 17Linda Naimi 17, 22Neuhold Erich 17Bill Palmer 17Francis Rousseaux 18Alain Bonardi 17Romain Poncelet 17Sisir Roy 18Sasa Rudan 18Aleksandra Kovacevic 18Charles O. Rutledge 19Kok Wei Shiung 19Hiew Pang Leang 19Yuh-Huei Shyu 19J. Sodnik 19Saso Tomazic 19, 21Vladimir Srdanovic 19Katarina Stankovic 20Dejan Stefanovic 20Zoran Ivankovic 20Ranko Dergenc 20Rade Kosanovic 20Jovic Marko 20 Simo Sudjic 20

Ron Summers 20, 22J. Chelsom 20N. Dinsey 20A. Zisman 20S. Katz 20Rudolf Susnik 20Lim Kai Teng 21Mileta M. Tomovic 21Anton Umek 21Aleksandar Vujanic 22Sladjan Mitic 22Zoran Djinovic 22Dusan Vujanic 22Robert Pavelka 22Milos Tomic 22Matthias Cordes 22Miomir Vukobratovic 22Hiten Vyas 22M. Wisma 22C. Tomovic 22Milos Blagojevic 25Kostandin Dimitrijevic 25Goran Milosavljevic 25Božidar Radenkovic 25J. Jovanovic 25D. Gasevic 25Ivan Kolarov 25Damjan Tomic 25 Ðorde Milovanovic 25 Borko Kovacevic 25Miroslav Minovic 25Velimir Štavljanin 25Tanja Petrovic 25Harold Kroto 29Bob Richardson 29Jerome Friedman 30Lawrence G. Roberts 30P.G. deGennes 30

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

27

Page 28: SLIKA

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

28

Page 29: SLIKA

Schedule

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

29

Page 30: SLIKA

4. October:

10:15 - 11:15 Speakers Meet Chairman (Casino)

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

30

Page 31: SLIKA

11:15 - 12:45 Opening Ceremony (AboveCasino)

Welcome Addresses: Prof. Dr. Nikola Hajdin President of Serbian Academy of Arts and Sciences Prof. Dr. Momir Djurovic President of Montenegro Academy of Arts and Sciences Prof. Dr. Miomir Vukobratovic President of Academy of Engineering Sciences of SCG Prof. Dr. Dejan Popovic Rector of Belgrade University Prof. Dr. Ljubisa Stankovic Rector of University of Montenegro Prof. Dr. Bozidar Radenkovic President of IEEE Computer Chapter of SCG Prof. Dr. Nebojsa Uskokovic Dean of Electrical Engineering, University of Montenegro Prof. Dr. Vojo Lekovic Dean of Stomatology, University of Belgrade Prof. Dr. Branko Kovacevic Dean of Electrical Engineering, University of Belgrade

Special Welcome Address:

(5.10.2004. @ 14h) Mr. Milan Todorovic, General Director, Zdravlje Leskovac, An Actavis Company, SCG(6.10.2004. @ 14h) Serbian Scientific Society Belgrade, SCG

13:00 - 14:30 New Space Technology:

1km Tether to 100,000km Space Elevator

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

31

Page 32: SLIKA

Hironori A. Fujii Metropolitan Institute of Technology Japan Purdue University’s Discovery Park Charles O. Rutledge Purdue University USA Advanced Manufacturing Centers Support Sustainable Economic Growth Mileta M. Tomovic Purdue University USA

17:15 - 18:45

Semantic Web Application Models Erich Neuhold Fraunhofer IPSI Germany

Information Entropy in Data Mining Fred B. Holt Panthesis Inc. USA Visualizing Grid Computing Eamonn Lavery Flexsim Corp. USA

19:00 - 21:00 School of Electrical Engineering, University of Belgrade: Current Status and Future Trends

Branko Kovacevic University of Belgrade Serbia and Montenegro Serbian ICT Cluster Opportunities

Dragan Maric Serbian Enterprise Development Project (SEDP/USAID)

Serbia and Montenegro

Artificial Man Miomir Vukobratovic Serbian Academy of Arts and Sciences Serbia and Montenegro

5. October:

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

32

Page 33: SLIKA

10:15 - 11:45 Prediction of the Optimal Decision Distribution for the Travelling Salesman Problem Robin Gremlich, Andreas Hamfelt, and Vladislav Valkovsky University of Zurich, Switzerland Uppsala University, Sweden Hamming Graphs Laurence E. LaForge The Right Stuff USA

Towards an Interoperable Information Architecture R. Summers, J. Chelsom, N. Dinsey, A. Zisman, S. Katz Loughborough University, UK City University, UK UN FAO, Italy

12:00 - 14:00

Issues in Constraints Programming

Andreas Hamfelt Uppsala University Sweden The Application of Network Science Principles to Knowledge Simulation Charles A. Milligan and Steven M. Halladay StorageTek USA

Revisiting Some Issues on the Role of Technology in E-Learning

Vladimir Srdanovic Vladimir Serbia and Montenegro

Risk Analysis in E-business based on XML Web Sevices

Bozidar Radenkovic and Marijana Despotovic Faculty of Organizational Sciences, University of Belgrade, Serbia and Montenegro

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

33

Page 34: SLIKA

17:15 - 18:45 VoIP Performance on Local Area Networks

Anton Kos, Aleš Vugrinec and Sašo Tomažič University of Ljubljana Slovenia Siple Web Interface to LDAP Directories

J. Sodnik and S. Tomazic University of Ljubljana Slovenia

Choosing International Vendors: Contextual Considerations

M. Wisma, C. Tomovic, L. Naimi Purdue University USA

19:00 - 21:00

Etnics in International Business: Emerging trends Linda Naimi Purdue University USA The Constitutionalization of Contract Law: Something New under the Sun? Olha Cherednychenko University of Utrecht The Netherlands A Business Architecture for M-Government Services to Citizens Amitava Mukherjee Royal Institute of Technology Sweden

Project Managment in the Construction Using the Internet

Simo Sudjic Gemax Serbia and Montenegro

6. October:

10:15 - 11:45

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

34

Page 35: SLIKA

TehnicomNet - An Overview of Current Research

Petar Kocovic TehnicomNet Serbia and Montenegro The Realities and Fallacies Related to Knowledge Representation Charles A. Milligan and Steven M. Halladay StorageTek USA

International Private and Public Reinforcing Dependencies For the Innovation of Automotive Emission Control Systems In Japan and USA David Bauner Royal Institute of Technology Stockholm, Sweden

12:00 - 14:00 Bringing Semantics to Pharmacogenomics Hiten Vyas and Ron SummersLoughborough University

UK Development of a Fiber-Optical Microphone to be used in a Totally Implantable Hearing Aid (TIHA)

Aleksandar Vujanic, Sladjan Mitic, Zoran Djinovic, Dusan Vujanic, Robert Pavelka*, Milos Tomic, and Matthias Cordes Vienna University of Technology, Schwerpunktkrankenhaus Wr.Neustadt, Integrated Microsystems Austria, Wr.Neustadt, Austria Safety Institute Belgrade, SCG Self-Formation in Micro-, Nano-, and Molecular Scales Stepas Janušonis Institute of Lithuanian Scientific Society, Lithuania

Data Assurance in Conventional File Systems Aleksandra Kovacevic

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

35

Page 36: SLIKA

17:15 - 18: 45 Gaussian pulse in Ultra-Wide Band communications Rudolf Susnik and Saso Tomazis University of Ljubljana Slovenia Transmission gain of multicarrier modulation Anton Umek University of Ljubljana Slovenia On Optimality of Quadrature Amplitude Modulation Saso Tomazic University of Ljubljana Slovenia

19:00 - 21:00

Emotional Intelligence: Theory and Practice Valerie Hearn Volant Executive Coaching USA Feminist Leadership Judith Albino USA WAR: What Art Represents Stephen Koepfer Maimonides Medical Center USA

How significant has women’s contribution to the progress of science been? Bill Palmer Charles Darwin University Australia

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

36

Page 37: SLIKA

7. October:

10:15 - 11:45 Number and organization of primary memory objects in the brain

  P.-G. de Gennes University of Paris France A Computer Program to Assist Developers in Validation and Usability Analysis of Intelligent Systems E. Mosqueira-Rey and V. Moret-Bonillo University of A Coruña Spain Abstract to Reality: Developing Educational Games With A Group of Design Students (Non-Programmers) Lim Kai Teng, Garfield Toro, and Hazel Gamec Wanganui School of Design

New Zealand

12:00 - 14:00

Abstraction and Refining

Using Predicates Kaninda Musumbu, Labri, France

Virtualization Layer for Automated Storage Management

Zoran Babovic IPSI Belgrade Serbia and Montenegro

Micro Business Solutions, Belgrade - Innovative web programming Tatjana Kovacevic Serbia and Montenegro Micro Business Solutions - Projects Done Dusan Dimitrijevic Serbia and Montenegro

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

37

Page 38: SLIKA

17:15 - 18:45 Computers and People with Mobility Disabilities Marijan Đurek and Emir Skejić University of Zagreb, Croatia University of Tuzla, Bosnia and Herzegovina Expertise Overview of Communication Software Laboratory at the University of Novi Sad

Miroslav Despotović University of Novi Sad Serbia and Montenegro

R&D Outsourcing Opportunities in Novi Sad, Serbia

Vojin Šenk University of Novi Sad Serbia and Montenegro

19:00 - 21:00 A Conceptual Model of a Hi-Tech Cyberbrush for Non-Conventional Graphic Production Including Calligraphy Writing : From Vitruvian Man, Penman to Feynman, and “Cyberbrushman” Chong Ming Lin Lovoltech Inc USA Chinese Calligraphic Handwriting (Shufa): A Cognitive & Health Science

Henry S.R. Kao University of Hong Kong Hong Kong

Conventional and Cybernized Writing Instruments

Henry S.R. Kao University of Hong Kong Hong Kong

Cognitive Effects of English Brush Handwriting: The Case of Visual- Spatial Aptitude

W.S. Lui, Henry S.R. Kao and Ann Lin University of Hong Kong, Hong Kong

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

38

Page 39: SLIKA

National Central University, Taiwan

IPSI-2004 MontenegroSveti Stefan, 2 – 9. October, 2004

39