+ All Categories
Home > Documents > BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6...

BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6...

Date post: 10-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
66
BCI 2012 Fifth Balkan Conference in Informatics Conference Program and Abstracts Novi Sad, Serbia, September 16–20, 2012
Transcript
Page 1: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

BCI 2012

Fifth Balkan Conference inInformatics

Conference Program and Abstracts

Novi Sad, Serbia,September 16–20, 2012

Page 2: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

Volume EditorsZoran BudimacUniversity of Novi SadFaculty of Sciences, Department of Mathematics and InformaticsTrg Dositeja Obradovića 4, 21 000 Novi Sad, SerbiaE-mail: [email protected]

Mirjana IvanovićUniversity of Novi SadFaculty of Sciences, Department of Mathematics and InformaticsTrg Dositeja Obradovića 4, 21 000 Novi Sad, SerbiaE-mail: [email protected]

Miloš RadovanovićUniversity of Novi SadFaculty of Sciences, Department of Mathematics and InformaticsTrg Dositeja Obradovića 4, 21 000 Novi Sad, SerbiaE-mail: [email protected]

Publisher: University of Novi Sad,Faculty of Sciences, Department of Mathematics and InformaticsTrg Dositeja Obradovića 4, 21000 Novi Sad, Serbia, www.dmi.uns.ac.rs

Typesetting: Doni PracnerCover design: Miloš RakićPrinted by: Futura d.o.o., Mažuranićeva 46

21131 Petrovaradin, Serbia, www.futura.rs

ISBN: 978-86-7031-265-4Copyright c© 2012 Department of Mathematics and Informatics, Faculty of Sciences, Universityof Novi Sad, Serbia. The contents of the published paper abstracts express the opinions of theirrespective authors, not the volume editors or the publisher.Novi Sad guide (Sec. 8), DMI map c© Doni Pracner CC-BY-SA (www.creativecommons.org).Campus Map c© University of Novi Sad http://www.uns.ac.rs/sr/mapaKampusa.htmlOther Maps c© OpenStreetMap (www.openstreetmap.org) contributors, CC-BY-SA

Page 3: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

CONTENTS 3

Contents1 Conference Organisation 7

2 Conference Program 132.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132.2 Saturday, September 15 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142.3 Sunday, September 16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142.4 Monday, September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162.5 Tuesday, September 18 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182.6 Wednesday, September 19 . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

3 Abstracts of Invited Lectures 223.1 From Off-line to Continuous On-line Maintenance . . . . . . . . . . . . . . 223.2 Secure and Context-Aware Workflow System . . . . . . . . . . . . . . . . . 223.3 An Implicit Approach to Deal with Periodically Repeated Data . . . . . . . 233.4 Soccer Playing Robots for (e-)Learning . . . . . . . . . . . . . . . . . . . . 233.5 Create, Collect and Share Course Materials . . . . . . . . . . . . . . . . . 243.6 TEL research projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

4 Paper Abstracts – September 16 264.1 CLoBL Workshop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4.1.1 Serbian Text Categorization Using Byte Level n-Grams . . . . 264.1.2 Information Extraction from the Weather Reports in Serbian . . . . 264.1.3 Automatic Recognition of Composite Verb Forms in Serbian . . . . 264.1.4 Recognition and Normalization of Temporal Expressions . . . . . . . 274.1.5 An Approach to Development of Bilingual Lexical Resources . . . . 274.1.6 An Authorship Attribution for Serbian . . . . 27

4.2 SQAMIA Workshop – session 1 . . . . . . . . . . . . . . . . . . . . . . . . 284.2.1 Adoption of Object-Oriented Software Metrics for . . . . . . . 284.2.2 Agile Software Testing Technologies in a Large Scale Project . . . . 284.2.3 Rule-Based Assignment of Comments to AST Nodes in . . . . . . . 284.2.4 ISO Software Quality Standards and Certification . . . . 29

4.3 SQAMIA Workshop – session 2 . . . . . . . . . . . . . . . . . . . . . . . . 294.3.1 Analyzing Structural Software Changes: A Case Study . . . . 294.3.2 Security Analysis Regarding Cross-Site Scripting on . . . . . . . 294.3.3 SSQSA architecture . . . . 304.3.4 Notes on the Parallels Between Biological and Software . . . . . . . 30

4.4 CA1 – Computer Applications in Different Domains . . . . . . . . . . . . . 304.4.1 Risks affecting the development of the information society . . . . . . . 304.4.2 A Software Tool for Building a Statistical Prefix Processor . . . . 314.4.3 Social Networking Software use in Social Media . . . . . . . 314.4.4 Framework for Open Data Mining in e-Government . . . . 324.4.5 Extracting Drug Adverse and Beneficial Reactions in . . . . . . . 32

4.5 AI1 – Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . 324.5.1 OECEP: Enriching Complex Event Processing with . . . . . . . 324.5.2 A Distributed Asynchronous and Privacy Preserving . . . . . . . 334.5.3 An Approach to Automated Reparation of Failed Proof . . . . . . . 33

Page 4: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

4 BCI 2012 Conference Program and Abstracts

4.6 ISR1 – Information Storage and Retrieval and Computer Graphics . . . . . 344.6.1 Efficient dataset size reduction by finding homogeneous . . . . . . . 344.6.2 Discovery and Evaluation of Students’ Profiles with . . . . . . . 344.6.3 Comparison of Information Retrieval Models for Question . . . . . . . 344.6.4 A Novel Algorithm for an Image Processing System in . . . . . . . 354.6.5 The Teaching of Geography using Dynamic Geometry . . . . 35

5 Paper Abstracts – September 17 355.1 SE1: Software Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . 35

5.1.1 Formal Modelling of a Bio-Inspired Paradigm Capable of . . . . . . . 355.1.2 Community Detection and Analysis of Community . . . . . . . 365.1.3 Statically Typed Matrix . . . . 365.1.4 An Evaluation of Java Code Coverage Testing Tools . . . . 37

5.2 AA: Analysis Of Algorithms And Problem Complexity . . . . . . . . . . . . 375.2.1 Virtualized Environments in Cloud Can Have Superlinear . . . . . . . 375.2.2 Comparative Performance Evaluation Of The AVL And . . . . . . . 385.2.3 The Evaluation of Performance in Flow Label and Non . . . . . . . 385.2.4 Logical Representation Of Dependencies Of Items And . . . . . . . 38

5.3 SE2: Software Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . 395.3.1 Evaluation of Tools for Automated Unit Testing for . . . . . . . 395.3.2 A Hoare-Style Verification Calculus for Control State ASMs . . . . 395.3.3 Communication in Machine-to-Machine Environments . . . . 395.3.4 User-Friendly Menu for New-Age Mobile Phones . . . . 405.3.5 Layout Proposal for One-Handed Device Interface . . . . 40

5.4 CA2 – Computer Applications in Different Domains . . . . . . . . . . . . . 405.4.1 Management, Communications and Security Policy in . . . . . . . 405.4.2 Analyzing the Selection and Dynamic Composition of . . . . . . . 415.4.3 An Approach to the Specification of User Interface . . . . . . . 415.4.4 A Software Tool that Helps Teachers in Handling, . . . . . . . 42

5.5 LT: Languages and Techniques . . . . . . . . . . . . . . . . . . . . . . . . 425.5.1 Parameterized Verification of Open Procedural Programs . . . . 425.5.2 Performance Study of Matrix Computations using Multi- . . . . . . . 435.5.3 Recent Advances Delivered by HTML 5 in Mobile Cloud . . . . . . . 435.5.4 Fuzzy XML with Implementation . . . . 435.5.5 Protection of Web Applications Using Aspect Oriented . . . . . . . 44

5.6 AI2: Artificial Intelligence and Computer Application in Education . . . . . 445.6.1 A Knowledge Based Approach for Handling Supply Chain . . . . . . . 445.6.2 Recognition and Normalization of Some Classes of . . . . . . . 455.6.3 Optimising Flash Non-Volatile Memory using Machine . . . . . . . 455.6.4 The Modification of Genetic Algorithms for Solving the . . . . . . . 455.6.5 <L|ETAP> Model for an Adaptive Tutoring System . . . . 46

6 Paper Abstracts – September 18 466.1 AI3: Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

6.1.1 Formal Modelling of Agents acting under Artificial Emotions . . . . 466.1.2 Time Series Mining in a Psychological Domain . . . . 476.1.3 Predictive Complex Event Processing: A Conceptual . . . . . . . 476.1.4 Reservoir Sampling Techniques in Modern Data Analysis . . . . 48

Page 5: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

CONTENTS 5

6.2 OS1: Operating Systems and Networks . . . . . . . . . . . . . . . . . . . 486.2.1 A Parallel Processing of Spatial Data Interpolation on . . . . . . . 486.2.2 Robust Moldable Scheduling Using Application . . . . . . . 486.2.3 A Review of Disc Scrubbing and Intra Disc Redundancy . . . . . . . 496.2.4 Implementation and Evaluation of a Sleep-Proxy for . . . . . . . 496.2.5 Analyses of QoS Routing Approach and the Starvation’s . . . . . . . 50

6.3 ISR2: Information Storage and Retrieval . . . . . . . . . . . . . . . . . . . 506.3.1 Data Model for Consortial Circulation in Libraries . . . . 506.3.2 Applying MDA in Developing Intermediary Service for . . . . . . . 506.3.3 A BIBO Ontology Extension for Evaluation of Scientific . . . . . . . 516.3.4 Collective Information Extraction using First-Order . . . . . . . 516.3.5 Cloud Computing Interoperability Approaches – . . . . . . . 51

6.4 DIS1: Database and Information Systems and Computer Applications . . . 526.4.1 Privacy Aware eLearning Enviroments Based on . . . . . . . 526.4.2 Insider Threats in Corporate Environments: A case study . . . . . . . 526.4.3 S-Suite: A Multipart Service Oriented Architecture for . . . . . . . 536.4.4 Growth rate analysis of e-Government development . . . . 536.4.5 Integrating Serbian Public Data into the LOD Cloud . . . . 53

7 Paper Abstracts – September 19 547.1 Workshop on Applications of Software Agents – WASA – session 1 . . . . . 54

7.1.1 Neuroevolution based Multi-Agent System for . . . . . . . 547.1.2 A Set-Based Approach to Negotiation with Concessions . . . . 547.1.3 Using Jason to Develop Declarative Prototypes of . . . . . . . 557.1.4 GliderAgent 2.0 – Agent-Based Glider Pilot Support . . . . . . . 55

7.2 Workshop on Applications of Software Agents – WASA – session 2 . . . . . 557.2.1 Applying Saaty’s Multicriterial Decision Making . . . . . . . 557.2.2 New Outlook on Agent-Based Travel Support Systems . . . . 567.2.3 Service Agents for Calendar Exchange . . . . 567.2.4 Method for Optimizing Communication Costs in ACODA . . . . . . . 567.2.5 Developing Software Agents Using Enterprise JavaBeans . . . . 56

7.3 CA3: Computer Applications in Education . . . . . . . . . . . . . . . . . . 577.3.1 International Educational Cooperation – One Possible Model . . . . 577.3.2 Modeling the Characteristics of a Learning Object for Use . . . . . . . 577.3.3 Programming Techniques and Environments in a . . . . . . . 577.3.4 Program Assessment via a Capstone Project . . . . 58

7.4 DIS2: Database and Information Systems . . . . . . . . . . . . . . . . . . 587.4.1 Correlation between Soft Organizational Features and . . . . . . . 587.4.2 Challenging Issues of UCON in Modern Computing . . . . . . . 587.4.3 Information System Monitoring and Notifications using . . . . . . . 597.4.4 Storing XML Documents in Databases Using Existing . . . . . . . 59

8 Novi Sad 608.1 Public Transportation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608.2 Taxi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608.3 City Orientation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

8.3.1 The Train Station . . . . 608.3.2 Futog Market . . . . 60

Page 6: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

6 BCI 2012 Conference Program and Abstracts

8.3.3 The Cathedral . . . . 628.3.4 Novi Sad Fair . . . . 628.3.5 Petrovaradin Fortress . . . . 628.3.6 City Centre Map . . . . 63

8.4 Campus Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648.5 On-Line Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658.6 Wireless internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658.7 Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Page 7: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

1 CONFERENCE ORGANISATION 7

Aims and ScopeThe main objective of the BCI series of conferences is to provide a forum for discussions anddissemination of research accomplishments and to promote interaction and collaborationamong scientists from the Balkan countries and the rest of the world, and to encourageinvolvement of young researchers from the region.

The Fifth Balkan Conference in Informatics (BCI) continues the BCI conferences heldin Thessaloniki (2009), Sofia (2007), Ohrid (2005), and Thessaloniki (2003).

The conference consists of regular sessions with technical contributions (regular papers)which were reviewed and selected by an international program committee, as well as ofinvited talks presented by leading scientists. Three workshops are held in line with themain conference.

The official language of the conference is English.

1 Conference OrganisationGeneral ChairMirjana Ivanović (Univ. of Novi Sad, Serbia)

Program Committee ChairZoran Budimac (Univ. of Novi Sad, Serbia)

Program CommitteeNevena Ackovska (Univ. of Ss. Cyril and Methodius, Skopje, FYR Macedonia)Mayer Aladjem (Ben-Gurion Univ. of the Negev, Beer-Sheva, Israel)Ali Al-Dahoud (Al-Zaytoonah Univ., Amman, Jordan)Vasco Amaral (Univ. Nova de Lisboa, Lisboa, Portugal)Zora Arsovski (Univ. of Kragujevac, Kragujevac, Serbia)Erika Asnina (Riga Technical Univ., Riga, Latvia)Costin Bădică (Univ. of Craiova, Craiova, Romania)Marko Banek (Univ. of Zagreb, Zagreb, Croatia)Dragana Bečejski-Vujaklija (Univ. of Belgrade, Belgrade, Serbia)Alexandre Bergel (Univ. of Chile, Santiago de Chile, Chile)Ivana Berković (Univ. of Novi Sad, Novi Sad, Serbia)Arpad Beszedes (Univ. of Szeged, Hungary)Maria Bielikova (Slovak, Univ. of Technology, Bratislava, Slovakia)Holger Billhardt (Univ. Rey Juan Carlos, Mostoles, Spain)Miklos Biro (Software Competence Center Hagenberg GmbH (SCCH), Austria)Günther Blaschek (Johannes Kepler Univ., Linz, Austria)Zoran Bosnić (Univ. of Ljubljana, Ljubljana, Slovenia)Klaus Bothe (Humboldt Univ., Berlin, Germany)Hans-Dieter Burkhard (Humboldt Univ., Berlin, Germany)

Page 8: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

8 BCI 2012 Conference Program and Abstracts

David Camacho (Univ. of Wisconsin, Madison, Canada)Carlos Iván Chesñevar (Univ. Nacional del Sur, Bahía Blanca, Argentina)Betim Çiço (Polytechnic Univ. of Tirana, Tirana, Albania)Miroslav Ćirić (Univ. of Niš, Niš, Serbia)Rebeca Cortazar (Univ. of Deusto, Bilbao, Spain)Marco D’Ambros (Univ. of Lugano, Switzerland)Weihui Dai (Fudan Univ., Shanghai, PR China)Alex Delis (Univ. of Athens, Athens, Greece)Ugur Demiray (Anadolu Univ., Eskisehir, Turkey)Alexiei Dingli (Univ. of Malta Malta)Christos Douligeris (Univ. of Piraeus, Piraeus, Greece)Horatiu Dragomirescu (Bucharest Univ. of Economics, Romania)Dimitris Dranidis (CITY College, Thessaloniki, Greece)Marjan Družovec (Univ. of Maribor, Maribor, Slovenia)George Eleftherakis (CITY International Faculty of the Univ. of Sheffield, Greece)Avram Eskenazi (Bulgarian Academy of Sciences, Sofia, Bulgaria)George Evangelidis (Univ. of Macedonia, Thessaloniki, Greece)Bekim Fetaji (South East European Univ., Tetovo, FYR Macedonia)Vladimir Filipović (Univ. of Belgrade, Belgrade, Serbia)Giancarlo Fortino (Univ. of Calabria, Rende, Italy)Maria Ganzha (Univ. of Gdansk, Gdansk, Poland)Christos K. Georgiadis (Univ. of Macedonia, Thessaloniki, Greece)Silvia Ghilezan (Univ. of Novi Sad, Novi Sad, Serbia)George Gravvanis (Democritus Univ. of Thrace, Xanthi, Greece)Marjan Gusev (Univ. of Ss. Cyril and Methodius, Skopje, FYR Macedonia)Marjan Heričko (Univ. of Maribor, Maribor, Slovenia)Nataša Hoić-Božić (Univ. of Rijeka, Rijeka, Croatia)Zoltan Horvath (Eotvos Lorand Univ., Budapest, Hungary)Ladislav Huraj (Univ. of Ss. Cyril and Methodius, Trnava, Slovakia)Galina Ilieva (Univ. of Plovdiv, Plovdiv, Bulgaria)Mirjana Ivanović (Univ. of Novi Sad, Novi Sad, Serbia)Dragan Janković (Univ. of Niš, Niš, Serbia)Gordan Ježić (Univ. of Zagreb, Zagreb, Croatia)Ioan Jurca (“Politehnica” Univ. of Timisoara, Timisoara, Romania)Damir Kalpić (Univ. of Zagreb, Zagreb, Croatia)Nikitas Karanikolas (Technological Educational Institute of Athens, Greece)Petros Kefalas (South East European Research Center, Athens, Greece)Margita Kon-Popovska (Univ. of Ss. Cyril and Methodius, Skopje, FYR Macedonia)Eugenia Kovatcheva (Univ. of Sofia, Sofia, Bulgaria)Božo Krstajić (Univ. of Montenegro, Podgorica, Montenegro)Vladimir Kurbalija (Univ. of Novi Sad, Novi Sad, Serbia)Alp Kut (Eylül Univ., Izmir, Turkey)Ljubomir Lazić (Univ. of Novi Pazar, Novi Pazar, Serbia)Ivan Luković (Univ. of Novi Sad, Novi Sad, Serbia)

Page 9: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

1 CONFERENCE ORGANISATION 9

Dragan Maćoš (Beuth Univ. of Applied Sciences, Berlin, Germany)Nicolae Magariu (Moldova State Univ., Chişinău, Moldova)Yannis Manolopoulos (Aristotle Univ., Thessaloniki, Greece)Elio Masciari (Univ. of Calabria, Rende, Italy)Dragan Mašulović (Univ. of Novi Sad, Novi Sad, Serbia)Boris Milašinović (Univ. of Zagreb, Zagreb, Croatia)Anastas Mishev (Univ. of Ss. Cyril and Methodius, Skopje, FYR Macedonia)Nenad Mitić (Univ. of Belgrade, Belgrade, Serbia)Matthew Montebello (Univ. of Malta, Malta)Mikolaj Morzy (Poznań Univ. of Technology, Poznań, Poland)Hanspeter Mössenböck (Johannes Kepler Univ., Linz, Austria)Simona Motogna (Univ. of Cluj, Cluj, Romania)Pavol Navrat (Slovak Univ. of Technology, Bratislava, Slovakia)Viorel Negru (Univ. of West Timisoara, Timisoara, Romania)Mykola Nikitchenko (Univ. of Kyiv, Kyiv, Ukraine)Roumen Nikolov (Univ. of Sofia, Sofia, Bulgaria)Nikolaos S. Papaspyrou (National Technical Univ. of Athens, Athens, Greece)Marcin Paprzycki (Polish Academy of Sciences, Warsaw, Poland)Iraklis Paraskakis (South-East European Research Center, Athens, Greece)Dana Petcu (Univ. of Timisoara, Timisoara, Romania)Tomáš Pitner (Masaryk Univ., Brno, Czech Republic)Elvira Popescu (Univ. of Craiova, Craiova, Romania)Zoltan Porkolab (Eotvos Lorand Univ., Budapest, Hungary)Boris Rachev (Varna Technical Univ., Varna, Bulgaria)Miloš Racković (Univ. of Novi Sad, Novi Sad, Serbia)Miloš Radovanović (Univ. of Novi Sad, Novi Sad, Serbia)Daniel Riesco (National Univ. of San Luis, San Luis, Argentina)Ladislav Samuelis (Technical Univ. of Košice, Košice, Slovakia)Spiros Skiadopoulos (Univ. of Peloponnese, Tripolis, Greece)Demosthenes Stamatis (Alexander TEI, Thessaloniki, Greece)Milena Stanković (Univ. of Niš, Niš, Serbia)Bela Stantic (Griffith Univ., Brisbane, Australia)Leonid Stoimenov (Univ. of Niš, Niš, Serbia)Stanimir Stoyanov (Univ. of Plovdiv, Plovdiv, Bulgaria)Sergey Stupnikov (Russian Academy of Sciences, Moscow, Russia)Srđan Škrbić (Univ. of Novi Sad, Novi Sad, Serbia)Dušan Tošić (Univ. of Belgrade, Belgrade, Serbia)Athena Vakali (Aristotle Univ., Thessaloniki, Greece)Anca Vasilescu (Univ. of Brasov, Brasov, Romania)Michael Vassilakopoulos (Univ. of Central Greece, Lamia, Greece)Michalis Vazirgiannis (Athens Univ. of Economics and Business, Athens, Greece)Goran Velinov (Univ. of Ss. Cyril and Methodius, Skopje, FYR Macedonia)George Vouros (Univ. of the Aegean, Samos, Greece)Valentino Vranić (Slovak Univ. of Technology, Bratislava, Slovakia)

Page 10: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

10 BCI 2012 Conference Program and Abstracts

Tatjana Welzer (Univ. of Maribor, Maribor, Slovenia)Stelios Xinogalos (Univ. of Macedonia, Thessaloniki, Greece)Fei Yu (Jiangsu Provincial Key Laboratory of Computer Information Processing Technol-

ogy, Suzhou, PR China)Katerina Zdravkova (Univ. of Ss. Cyril and Methodius, Skopje, FYR Macedonia)Wolf Zimmermann (Univ. of Halle, Halle, Germany)Aleš Živkovič (Univ. of Maribor, Maribor, Slovenia)

Additional Reviewers

Mario BeronBarbora BühnováAdonis BogrisPablo DavicinoBalazs Dezso

Richard Oliver LegendiLeonardo de - MatteisDejan MitrovićFilip NguyenDaniel Pop

Sonja RistićAlejandro SanchezAna SovićAlejandro StankeviciusNenad Teofanov

Organizing Committee (Univ. of Novi Sad, Serbia)Mirjana Ivanović, ChairDejan Mitrović, Co-ChairGordana Rakić, Co-Chair

Members

Živana KomlenovIvan LukovićDoni Pracner

Davorka RadakovićMiloš RadovanovićSaša Tošić

Jovana VidakovićDjurica Salamon

Organizing InstitutionDepartment of Mathematics and Informatics, Faculty of Sciences, University of Novi Sad,

Serbia

Organization of Workshops

Computational Linguistics and Natural Language Processing ofBalkan Languages – CLoBL 2012Program ChairsCvetana Krstev (Faculty of Philology, Univ. of Belgrade, Serbia)Katerina Zdravkova (Faculty of Computer Science and Engineering, Univ. of Ss. Cyril and

Methodius, Skopje, FYR Macedonia)

Page 11: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

1 CONFERENCE ORGANISATION 11

Program Committee Members

Galia Angelova (Bulgarian Academy of Sciences, Sofia, Bulgaria)Tomaž Erjavec (Jožef Stefan Institute, Ljubljana, Slovenia)Arbana Kadrui (South-East European Univ., Tetovo, FYR Macedonia)Svetla Koeva (Bulgarian Academy of Sciences, Sofia, Bulgaria)Ruslan Mitkov (Univ. of Wolverhampton, United Kingdom)Marko Tadić (Faculty of Philosophy, Univ. of Zagreb, Croatia)Dan Tufis (Faculty of Computer Science, Alexandru Ioan Cuza Univ. of Iasi, Romania)Duško Vitas (Faculty of Mathematics, Univ. of Belgrade, Serbia)

Organizing Committee

Katerina Zdravkova, Chair (Faculty of Computer Science and Engineering, Univ. of Ss.Cyril and Methodius, Skopje, FYR Macedonia)

Workshop on Software Quality Analysis, Monitoring,Improvement, and Applications – SQAMIA 2012Program Co-chairs:

Zoran Budimac (Univ. of Novi Sad, Serbia)Marjan Heričko (Univ. of Maribor, Slovenia)Zoltan Horvath (Eotvos Lorand Univ., Budapest, Hungary)Hannu Jaakkola (Tampere Univ. of Technology, Pori, Finland)

Additional ReviewersSelected from BCI PC members.

Organizing Committee (Univ. of Novi Sad, Serbia)

Gordana Rakić, ChairMiloš Savić

2nd Workshop on Applications of Software Agents – WASA 2012Program Chairs:

Mirjana Ivanović (Univ. of Novi Sad, Serbia)Maria Ganzha (Univ. of Gdansk and IBS PAN, Poland)

Program Co-chairs:

Costin Bădică (Univ. of Craiova, Romania)Marcin Paprzycki (IBS PAN and WSM, Poland)

Page 12: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

12 BCI 2012 Conference Program and Abstracts

Program Committee MembersZoran Budimac (Univ. of Novi Sad, Serbia)Paolo Bresciani (FBK, Italy)Giacomo Cabri (Univ. of Modena, Italy)Adina Magda Florea (Univ. Politehnica of Bucharest, Romania)Giancarlo Fortino (Univ. of Calabria, Italy)Matjaz Gams (Jozef Stefan Institute, Slovenia)Galina Ilieva (Univ. of Plovdiv “Paisii Hilendarsky,” Bulgaria)Gordan Jezic (Univ. of Zagreb, Zagreb, Croatia)Mario Kusek (Univ. of Zagreb, Zagreb, Croatia)Marin Lujak (Univ. Rey Juan Carlos, Spain)Viorel Negru (West Univ. of Timisoara, Romania)Andrea Omicini (Univ. of Bologna, Italy)Agostino Poggi (Univ. of Parma, Italy)Denis Trcek (Univ. of Ljubljana, Slovenia)George Vouros (Univ. of Piraeus, Greece)

Additional reviewersSelected from BCI PC members.

Organizing Committee (Univ. of Novi Sad, Serbia)Mirjana Ivanović, ChairDejan Mitrović, Secretary

Zoran Budimac Doni Pracner Gordana Rakić Saša Tošić

Sponsoring Institutions of BCI 2012BCI 2012 was partially financially supported by:

Provincial Secretariat for Science and Technological Development,Autonomous Province of Vojvodina, Republic of Serbia

Ministry of Education, Science and Technological Development,Republic of Serbia

Page 13: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

2 CONFERENCE PROGRAM 13

2 Conference Program2.1 OverviewFull papers have 25 minutes for presentations, while short papers have 15 minutes.Lecture halls (all on the ground floor of the Department of Mathematics and In-formatics – DMI): a1 – Amphitheater 1, a7 – Amphitheater 7, cc1 – ComputerCenter 1, cc10 – Computer Center 10.

16/09/201210:30 – 11:00 a1 : CLoBL11:30 – 13:00 a1 : CLoBL cc10 : SQAMIA13:00 – 14:30 – Lunch break –14:30 – 16:00 a1 : CA1 cc10 : SQAMIA16:00 – 16:30 – coffee break –16:30 – 18:30 a1 : AI1 cc10 : ISR1

Reception a1a7

cc10

cc1

Garden

WC

Entrance

DMIBuilding

17/09/2012 18/09/201209:00 – 09:30 Official Conference Opening09:30 – 10:15 a1 : Mauro Pezze a1 : Bela Stantic10:15 – 11:00 a1 : Hussein Zedan a1 : Hans-Dieter Burkhard10:45 – 11:15 – coffee break –11:30 – 13:00 a1 : SE1 cc10 : AA a1 : AI3 cc10 : OS113:00 – 14:30 – Lunch break –14:30 – 16:00 a1 : SE2 cc10 : CA2 a7 : TUT cc10 : ISR216:00 – 16:30 – coffee break –16:30 – 18:30 a1 : LT cc10 : AI2 a7 : TUT cc10 : DIS2

City Tour Dinner

19/09/201209:00 – 09:45 a1 : Klaus Bothe cc10 : WASA09:45 – 10:30 a1 : Vladan Devedžić cc10 : WASA10:30 – 11:00 – coffee break –11:00 – 12:30 a1 : CA3 cc1 : DIS2 cc10 : WASA

Excursion

Page 14: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

14 BCI 2012 Conference Program and Abstracts

2.2 Saturday, September 15

17:00 – 19:30 Registration, in front of Hall I

2.3 Sunday, September 16

09:00 – 14:00 Registration, in front of Hall I10:30 – 13:00Workshop: Computational Linguistics and Natural Language

Processing of Balkan Languages (CLoBL) a1Session Chair: Cvetana Krstev and Katerina Zdravkova◦ Serbian Text Categorization Using Byte Level n-GramsJelena Graovac◦ Information Extraction from the Weather Reports in SerbianStaša Vujičić Stanković and Vesna Pajić◦ Automatic Recognition of Composite Verb Forms in SerbianBojana Ðorđević◦ Recognition and Normalization of Temporal Expressions in Serbian TextsJelena Jaćimović◦ An Approach to Development of Bilingual Lexical ResourcesRanka Stanković, Ivan Obradović and Aleksandra Trtovac◦ An Authorship Attribution for SerbianAnđelka Zečević and Miloš Utvić

11:30 – 13:00Workshop: Software Quality Analysis, Monitoring, Improve-ment, and Applications, (SQAMIA) – Session 1 cc10

Session Chair: Marjan Heričko and Zoran Budimac◦ Adoption of object-oriented software metrics for ontology evaluationRok Žontar, Marjan Heričko◦ Agile Software Testing Technologies in a Large Scale ProjectBojana Koteska, Anastas Mishev◦ Rule-Based Assignment of Comments to AST Nodes in C++ programsTamás Cséri, Zalán Szügyi, Zoltán Porkoláb◦ ISO Software Quality Standards and CertificationBisera Dugalic, Anastas Mishev

13:00 – 14:30 Lunch break14:30 – 16:00Workshop: Software Quality Analysis, Monitoring, Improve-

ment, and Applications, (SQAMIA) – Session 2 cc10Session Chair: Hannu Jaakkola and Zoran Budimac◦ Analyzing Structural Software Changes: A Case StudyČrt Gerlec, Marjan Heričko◦ Security Analysis Regarding Cross-Site Scripting on Internet ExplorerAdriana Neagoş and Simona Motogna◦ SSQSA architectureZoran Budimac, Gordana Rakić, Miloš Savić◦ Notes on the Parallels Between Biological and Software EvolutionLadislav Samuelis

Page 15: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

2 CONFERENCE PROGRAM 15

14:30 – 16:00 CA1: Computer Applications in . . . a1Session Chair: Sonja Ristić

. . . Society◦ Risks affecting the development of the information society in the Republic ofMoldova: insights from a Delphi survey(full) Horatiu Dragomirescu and Ion Tighineanu

. . . Business◦ A Software Tool for Building a Statistical Prefix Processor(full) Nikitas Karanikolas, Michael Vassilakopoulos and Nektarios Giannoulis◦ Social Networking Software use in Social Media Marketing vs. Traditional Mar-keting: Case Study in Macedonia(short) Bekim Fetaji and Amir Demiri

. . . Government◦ Framework for Open Data Mining in e-Government(short) Petar Milić, Nataša Veljković and Leonid Stoimenov

. . .Medicine◦ Extracting Drug Adverse and Beneficial Reactions in Pediatric Population fromHealthcare Social Network(short) Jelena Hadzi-Puric and Jeca Grmusa

16:00 – 16:30 Coffee break16:30 – 18:30 AI1: Artificial Intelligence a1

Session Chair: Vladimir Kurbalija◦ OECEP: Enriching Complex Event Processing with Domain Knowledge from On-tologies(full) Sebastian Binnewies and Bela Stantic◦ A distributed asynchronous and privacy preserving neural network ensemble selec-tion approach for peer-to-peer data mining(full) Yiannis Kokkinos and Konstantinos G. Margaritis◦ An Approach to Automated Reparation of Failed Proof Attempts in PropositionalLinear Logic Sequent Calculus(full) Tatjana Lutovac

16:30 – 18:30 ISR1: Information Storage and Retrieval and cc10Session Chair: Miloš Radovanović◦ Efficient dataset size reduction by finding homogeneous clusters(Full) Stefanos Ougiaroglou and Georgios Evangelidis◦ Discovery and Evaluation of Students’ Profiles with Machine Learning(Full) Evis Trandafili, Alban Allkoçi, Elinda Kajo and Aleksandër Xhuvani◦ Comparison of Information Retrieval Models for Question Answering(Full) Jasmina Armenska and Katerina Zdravkova

Page 16: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

16 BCI 2012 Conference Program and Abstracts

Computer Graphics◦ A Novel Algorithm for an Image Processing System in Entomology(full) Marjan Kindalov, Ana Madevska Bogdanova and Zarko Erakovic◦ The Teaching of Geography using Dynamic Geometry(short) Ðorđe Herceg, Vera Herceg-Mandić and Davorka Radaković

19:15 – 21:15 Welcome Reception

2.4 Monday, September 17

09:00 – 14:00 Registration, in front of Hall I09:00 – 09:30 Official conference opening09:30 – 10:15 Invited Lecture 1 a1

Session Chair: Mirjana Ivanović◦ From Off-line to Continuous On-line MaintenanceMauro Pezzè

10:15 – 11:00 Invited Lecture 2 a1Session Chair: Zoran Budimac◦ Secure and Context-Aware Workflow SystemHussein Zedan

11:00 – 11:30 Coffee break11:30 – 13:00 SE1: Software Engineering a1

Session Chair: Ivan Luković◦ Formal Modelling of a Bio-Inspired Paradigm Capable of Exhibiting Emergence(full) Konstantinos Rousis, George Eleftherakis, Ognen Paunovski and Tony Cowl-ing◦ Community Detection and Analysis of Community Evolution in Apache Ant ClassCollaboration Networks(full) Miloš Savić, Miloš Radovanović and Mirjana Ivanović◦ Statically Typed Matrix(full) Predrag S. Rakić, Lazar Stričević and Zorica Suvajdžin Rakić◦ An Evaluation of Java Code Coverage Testing Tools(short) Elinda Kajo-Mece and Megi Tartari

11:30 – 13:00 AA: Analysis of Algorithms and Problem Complexity cc10Session Chair: Mirjana Ivanović◦ Virtualized Environments in Cloud Can Have Superlinear Speedup(full) Sasko Ristov, Marjan Gusev, Magdalena Kostoska and Kiril Kiroski◦ Comparative Performance Evaluation of The AVL and Red-black Trees(full) Svetlana Štrbac-Savić and Milo Tomašević◦ The Evaluation of Performance in Flow Label and Non Flow Label Approach Basedon IPv6 Technology(short) Ariana Bejleri, Igli Tafaj, Ermal Beqiri, Julian Fejzaj and Aleksander Bib-eraj

Page 17: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

2 CONFERENCE PROGRAM 17

◦ Logical Representation of Dependencies of Items and The Complexity of CustomerSets(short) János Demetrovics, Hua Nam Son and Ákos Gubán

13:00 – 14:30 Lunch break14:30 – 16:00 SE2: Software Engineering a1

Session Chair: George Eleftherakis◦ Evaluation of Tools for Automated Unit Testing for Applications in OSGi(short) František Geletka, Ladislav Samuelis, and Jozef Vojtko◦ A Hoare-Style Verification Calculus for Control State ASMs(short) Werner Gabrisch and Wolf Zimmermann◦ Communication in Machine-to-Machine Environments(short) Iva Bojic, Mario Kusek, Gordan Jezic, Sasa Desic and Darko Huljenic◦ User-Friendly Menu for New-Age Mobile Phones(Short) Ivan Peric and Oliver Sipos◦ Layout Proposal for One-Handed Device Interface(Short) Oliver Sipos, Ivan Peric and Dragan Ivetic

14:30 – 16:00 CA2: Computer Applications in . . . cc10Session Chair: Stelios Xinogalos

. . . Buisiness◦ Management, Communications and Security Policy in Mobile Database Systems(full) Vigan Raça, Betim Çiço and Majlinda Fetaji◦ Analyzing the Selection and Dynamic Composition of Web Services in E-commerceTransactions(full) Nikolaos Vesyropoulos and Christos K. Georgiadis◦ An Approach to the Specification of User Interface Templates for Business Appli-cations(full) Sonja Ristić, Ivan Luković, Slavica Aleksić, Jelena Banović and Ali Al-Dahoud

. . . Education◦ A Software Tool that Helps Teachers in Handling, Processing and Understandingthe Results of Massive Exams(short) Marko Mišić, Marko Lazić and Jelica Protić

16:00 – 16:30 Coffee break16:30 – 18:45 LT: Languages and Techniques a1

Session Chair: Zoran Budimac◦ Parameterized Verification of Open Procedural Programs(full) Aleksandar Dimovski◦ Performance Study of Matrix Computations using Multi-core Programming Tools(full) Panagiotis Michailidis and Konstantinos G. Margaritis◦ Recent Advances Delivered by HTML 5 in Mobile Cloud Computing Applications:A Survey(full) Stelios Xinogalos, Kostas E. Psannis and Angelo Sifaleras◦ Fuzzy XML with Implementation(short) Goran Panić, Miloš Racković and Srđan Škrbić

Page 18: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

18 BCI 2012 Conference Program and Abstracts

◦ Protection of Web Applications Using Aspect Oriented Programming and Perfor-mance Evaluation(short) Elinda Kajo-Mece, Lorena Kodra, Enid Vrenozi and Bojken Shehu

16:30 – 18:30 AI2: Artificial Intelligence and cc10Session Chair: Petros Kefalas◦ A Knowledge Based Approach for Handling Risk Management(full) Adrian Solomon, Panayiotis Ketikidis and Alok Choudhary◦ Recognition and Normalization of Some Classes of Named Entities in Serbian(full) Cvetana Krstev, Jelena Jaćimović and Duško Vitas◦ Optimising Flash Non-Volatile Memory using Machine Learning: A Project Overview(short) Tom Arbuckle, Damien Hogan and Conor Ryan◦ The Modification of Genetic Algorithms for Solving the Balanced Location Prob-lem(short) Vladimir Filipović, Jozef Kratica, Aleksandar Savić and Ðorđe Dugošija

Computer Application in Education◦ <L|ETAP> Model for an Adaptive Tutoring System(short) Eugenia Kovatcheva

19:00 City tour

2.5 Tuesday, September 1809:00 – 14:00 Registration, in front of Hall I09:30 – 10:15 Invited Lecture 3 a1

Session Chair: Mirjana Ivanović◦ An Implicit Approach to Deal with Periodically Repeated DataBela Stantic

10:15 – 11:00 Invited Lecture 4 a1Session Chair: Zoran Budimac◦ Soccer Playing Robots for (e-)LearningHans-Dieter Burkhard

11:00 – 11:30 Coffee break11:30 – 13:00 AI3: Artificial Intelligence a1

Session Chair: Hans-Dieter Burkhard◦ Formal Modelling of Agents acting under Artificial Emotions(full) Petros Kefalas, Ioanna Stamatopoulou and Dionysis Basakos◦ Time Series Mining in a Psychological Domain(full) Vladimir Kurbalija, Hans-Dieter Burkhard, Mirjana Ivanović, CharlotteMeyer, Jens Nachtwei and Lidija Fodor◦ Predictive Complex Event Processing: A Conceptual Framework for CombiningComplex Event Processing and Predictive Analytics(full) Lajos Jenő Fülöp, Gabriella Tóth, László Vidács, Árpád Beszédes, HunorDemeter, Lóránt Farkas, Tibor Gyimothy and Gergő Balogh◦ Reservoir Sampling Techniques in Modern Data Analysis(short) Anže Pečar, Miha Zidar and Matjaž Kukar

Page 19: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

2 CONFERENCE PROGRAM 19

11:30 – 13:00 OS1: Operating Systems and cc10Session Chair: Betim Çiço◦ A Parallel Processing of Spatial Data Interpolation on Computing Cloud(full) Vladimír Siládi, Ladislav Huraj, Eduard Vesel and Norbert Polčák◦ Robust Moldable Scheduling Using Application Benchmarking for Elastic Enviorn-ments(short) Ibad Kureshi, Violeta Holmes and David Cooke◦ A Review of Disc Scrubbing and Intra Disc Redundancy Techniques for ReducingData Loss in Disc File Systems(short) Genti Daci and Aisa Bezhani

Networks◦ Implementation and Evaluation of a Sleep-Proxy for Energy Savings in NetworkedComputers(short) Enida Sheme, Marin Aranitasi and Neki Frasheri◦ Analyses of QoS Routing Approach and the Starvation’s Evaluation in LAN(short) Ariana Bejleri, Igli Tafaj, Aleksander Biberaj, Ermal Beqiri and JulianFejzaj

13:00 – 14:30 Lunch break14:30 – 18:30 Tutorial: Automated Personality Classification – Data mining

in Social Networks a7Aleksandar Kartelj, Vladimir Filipović, Veljko Milutinović

14:30 – 16:00 ISR2: Information Storage and Retrieval cc10Session Chair: Christos K. Georgiadis◦ Data Model for Consortial Circulation in Libraries(short) Danijela Tešendić◦ Applying MDA in Developing Intermediary Service for Data Retrieval(short) Danijela Boberić Krstićev◦ A BIBO Ontology Extension for Evaluation of Scientific Research Results(short) Bojana Dimić Surla, Milan Segedinac and Dragan Ivanović◦ Collective Information Extraction using First-Order Probabilistic Models(short) Slavko Žitnik, Lovro Šubelj, Dejan Lavbič, Aljaž Zrnec and Marko Bajec◦ Cloud Computing Interoperability Approaches – Possibilities and Challenges(short) Magdalena Kostoska, Marjan Gusev, Sasko Ristov and Kiril Kiroski

16:00 – 16:30 Coffee break16:30 – 18:30 DIS1: Database and Information Systems and cc10

Session Chair: Tomáš Pitner◦ Privacy Aware eLearning Enviroments Based on Hippocratic Database Principles(full) Jasmin Azemović◦ Insider Threats in Corporate Environments:A case study for Data Leakage Pre-vention(short) Veroniki Stamati-Koromina, Christos Ilioudis, Demosthenes Stamatis,Christos K. Georgiadis and Richard Overill◦ S-Suite: A Multipart Service Oriented Architecture for The Car Rental Sector(short) Margarita Karkali and Michalis Vazirgiannis

Page 20: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

20 BCI 2012 Conference Program and Abstracts

Computer Applications in Government◦ Growth rate analysis of e-Government development(full) Kiril Kiroski, Marjan Gushev, Magdalena Kostoska and Sasko Ristov◦ Integrating Serbian Public Data into the LOD Cloud(full) Valentina Janev, Uroš Milošević, Mirko Spasić, Sanja Vraneš, Jelena Milo-jković and Branko Jireček

20:00 Conference Dinner

2.6 Wednesday, September 19

09:00 – 11:00 Info desk, in front of Hall I09:00 – 09:45 Invited Lecture 5 a1

Session Chair: Mirjana Ivanović◦ Create, Collect and Share Course Materials Across Universities: Does it WorkSuccessfully?Klaus Bothe

09:45 –10:30 Invited Lecture 6 a1Session Chair: Zoran Budimac◦ TEL research projectsVladan Devedžić

09:00 – 10:30Workshop on Applications of Software Agents, WASA,session 1 cc10

Session Chair: Maria Ganzha and Costin Bădică◦ Neuroevolution based Multi-Agent System for Micromanagement in Real-TimeStrategy GamesIuhasz Gabriel, Viorel Negru, Daniela Zaharie◦ A Set-Based Approach to Negotiation with ConcessionsCostin Bădică and Amelia Bădică◦ Using Jason to Develop Declarative Prototypes of Automated NegotiationsAlex Muscar, Laura Surcel, Costin Bădică◦ GliderAgent 2.0 – Agent-Based Glider Pilot Support System for Android DevicesMaria Ganzha, Mariusz M. Mesjasz, Marcin Paprzycki

10:30 – 11:00 Coffee break11:00 – 12:30Workshop: WASA – session 2 cc10

Session Chair: Marcin Paprzycki and Mirjana Ivanović◦ Applying Saaty’s Multicriterial Decision Making Approach in Grid Resource Man-agementMaria Ganzha, Marcin Paprzycki, Katarzyna Wasielewska◦ New Outlook on Agent-Based Travel Support SystemsMaria Ganzha, Mariusz M. Mesjasz, Marcin Paprzycki◦ Service Agents for Calendar ExchangeMagdalena Kostoska, Goran Velkoski, Krste Bozinoski, Sasko Ristov, Marjan Gu-sev

Page 21: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

2 CONFERENCE PROGRAM 21

◦ Method for Optimizing Communication Costs in ACODA Using Simulated An-nealingCostin Bădică, Sorin Ilie, Mirjana Ivanović◦ Developing Software Agents Using Enterprise JavaBeansDejan Mitrović, Mirjana Ivanović, Milan Vidaković, Ali Al-Dahoud

11:00 – 12:30 CA3: Computer Applications in Education a1Session Chair: Katerina Zdravkova◦ International Educational Cooperation – One Possible Model(full) Klaus Bothe, Zoran Putnik and Betim Çiço◦ Modeling the Characteristics of a Learning Object for Use within e-Learning Ap-plications(full) George Nikolopoulos, Georgia Solomou, Christos Pierrakeas and AchillesKameas◦ Programming Techniques and Environments in a Technology Management De-partment(full) Stelios Xinogalos◦ Program Assessment via a Capstone Project(short) John Galletly, Dimitar Christozov, Volin Karagiozov and Stoyan Bonev

11:00 – 12:30 DIS2: Database and Information Systems cc1Session Chair: Srđan Škrbić◦ Correlation between Soft Organizational Features and Development of ICT Infras-tructure(full) Mladen Čudanov, Ivan Todorović and Ondrej Jaško◦ Challenging Issues of UCON in Modern Computing Environments(full) Christos Grompanopoulos and Ioannis Mavridis◦ Information System Monitoring and Notifications using Complex Event Processing(full) Filip Nguyen and Tomáš Pitner◦ Storing XML Documents in Databases Using Existing Object-Relational Features(short) Dušan Petković

12:30 – 23:00 Excursion to Zrenjanin and Carska baraLunch packet and dinner includedClosing session

Page 22: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

22 BCI 2012 Conference Program and Abstracts

3 Abstracts of Invited Lectures3.1 From Off-line to Continuous On-line MaintenanceMauro Pezzè, University of Milano Bicocca, Italy, and University of Lugano, Switzer-landAbstract: Software is the cornerstone of the modern society, which can hardlytolerate failures and service discontinuity. At the same time, software systems arerapidly changing, and often rely on dynamically linked modules and services thatmay not be even available at design time. Classic off-line verification that requireaccess to the whole software system, and stop-and-go maintenance that works off linebadly adapt to these new needs of modern software systems. Self-healing technologyaddresses the new demands of software systems by moving some V&V activities fromdesign to runtime. Self-healing systems can detect failures, diagnose, locate andcorrect faults fully automatically and at runtime, thus guaranteeing rapid recoveryand resilience to software failures. In this talk, I discusses how systems can detectand heal failures and faults that are unknown at runtime without additional humanintervention, identify intrinsic software redundancy as a great opportunity that canbe exploited to automatically deal with emerging problems at runtime, and indicatehow self-healing technology can impact on classic maintenance approaches.

3.2 Secure and Context-Aware Workflow SystemHussein Zedan, De Montfort University, Leicester, UKAbstract: Modern workflow systems are (a) highly distributed, (b) cross the bound-aries of many enterprises. This renders them to be

Security-Critical - as it may need to access data of various enterprises;Context-Aware - as activities may be adapted to conform with the context that it

occupies andTime-Critical - some of their activities are inherently temporal with hard timing

constraints.

Current modelling techniques are not adequate to cope with these characteristicsin a unified fashion. In this talk, a new computational model is presented whichsupported by a modelling notation (CS-Flow) which has the following features:

• support for concurrency;• context and context awareness are first-class citizen;• support for mobility as activities can move from one context to another;• has the ability to express timing constrains: delay, deadlines, priority andschedulability;

• allows the expressibility of (access control) security policies without the needfor an extra linguistic complexities; and

Page 23: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

3 ABSTRACTS OF INVITED LECTURES 23

• enjoy sound formal semantics that allows us to animate design and comparevarious designs.

CS-Flow is illustrated on modelling of the next generation of hospital ward system,known as CAW (Context-Aware Ward).

3.3 An Implicit Approach to Deal with Periodically RepeatedData

Bela Stantic, Griffith University, AustraliaAbstract: Periodic data play a major role in many application domains, spanningfrom manufacturing to office automation and from scheduling to data broadcasting.In many of such domains, the huge number of repetitions makes the goal of explicitlystoring and accessing such data very challenging. In this talk a new methodologybased on an implicit representation of periodic data will be explained. It will beshown that the proposed model captures the notion of periodic granularity, providedby the temporal database glossary, and is an extension of the TSQL2 temporalrelational data model. At first, the algebraic operators will be defined and thenaccess algorithms will be introduced. Finally, results from extensive experimentalevaluation will be presented, which demonstrate that the implicit representation ofperiodic data outperforms the explicit approach.

3.4 Soccer Playing Robots for (e-)LearningHans-Dieter Burkhard, Humboldt University, Berlin, GermanyAbstract: Understanding grows with active commitment: to "do" something, tomaster it, provides a deeper understanding. Experiencing with own experiments isof course an important prerequisite for studies in Robotics and Artificial Intelligenceas well. But experimenting with real robots is difficult not only because of expensivehardware. Maintaining the robots and set ups for experiments are very time con-suming even for experienced people. Experiments at home as needed for e-learningrequire a deep technical understanding by the students, i.e. experiences that they arejust going to learn. So it is not surprising that simple hardware is still broadly used inrobot experiments, hardware which is far behind the recent technical developments,not to talk about e.g. complex humanoid robots.Simulated robots in simulated environments can be used as an alternative for com-plex hardware. The RoboCup community has 15 years of experiences with real andsimulated robots in the field of soccer playing robots. Soccer playing robots havebeen established as a challenging test field for the progress in scientific researchand technical developments. Robots have to be able to control their bodies andtheir motions according to soccer play, they must perceive a dynamically changingenvironment and they have to choose successful actions out of many options in realtime. They have to cooperate with team mates and to pay attention to opponents.

Page 24: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

24 BCI 2012 Conference Program and Abstracts

Several thousand scientists and students are participating in the annual RoboCupcompetitions in different leagues with different types of real and simulated robots.The humanoid robot Nao of the French Company Aldebaran is used in the StandardPlatform league, while its simulated version is used in the so-called 3D-simulationleague.The official RoboCup 3D simulator SimSpark provides an excellent environment forexperiments with simulated complex robots: It provides a physical simulation usingODE for the body dynamics of the robot Nao and the soccer environment. Userscan program their own robot controls as “agents” which communicate by messageswith the SimSpark simulation server. The agents could be considered as the “brains”of the robots. They perceive sensory information from the server and send actioncommands back to control the motors of the robot. Unfortunately, the technicaldetails of the simulation server are still a barrier for inexperienced users which is nowtackled by our RoboNewbie project.The RoboNewbie Agent is a basic framework written in JAVA for the development ofsimulated humanoid robots. It provides easy understandable interfaces to simulatedsensors and effectors of the robot as well as a simple control structure. It serves asan inspiration for beginners and behinds that it provides room for many challengingexperiments at schools as well as at universities. It runs in the environment ofthe SimSpark simulation server, thus is can but need not be used for soccer playingrobots. Users can develop their own motions, e.g. for dancing, gymnastics or kickinga ball. They will get insights into the complex phenomena of coordinated limbcontrol, of cinematics and sensor-actor control. They can experiment with problemsof perception, action planning, and coordination with other robots. The frameworkcan also be used for Machine Learning, where many runs can be performed to trainbehaviors – much more than ever possible with real robots.The talk will give an introduction to the framework and its backgrounds. It will alsoreport about experiences with its usage so far.

3.5 Create, Collect and Share Course Materials Across Univer-sities: Does it Work Successfully?

Klaus Bothe, Humboldt University, Berlin, Germany

Abstract: Developing teaching materials is a time-consuming and expensive activ-ity. Thus, over the years, several consortia created joint materials to benefit fromthem. It is expected that shared teaching materials are a means to save efforts for itsdevelopment, to transfer methodological and technical knowledge between differentuniversity staff, and to exchange experience in practical application. However, doesit really pay off considering the diversity of different educational environments andthe difficulties of using externally produced materials rather than dedicated individ-ual ones? This paper reports on the experience gained in a multi-country project.Success factors as well as problems will be outlined.

Page 25: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

3 ABSTRACTS OF INVITED LECTURES 25

3.6 TEL research projectsVladan Devedžić, University of Belgrade, SerbiaAbstract: TEL stands for Technology-Enhanced Learning. It refers to the supportof any learning activity through technology. It encompasses dozens of research top-ics, such as personalization, learner modeling and adaptation, context-aware learningsystems, Social Semantic Web and learning, mobile technologies for learning, net-work infrastructures and architectures for TEL, ubiquitous learning, data mining andinformation retrieval, recommender systems for TEL, learning analytics, problem-and project-based learning / Inquiry based learning, computer supported collabo-rative learning, collaborative knowledge building, game-based and simulation-basedlearning, and many more.TEL is a thriving research area, and draws substantial funding. This talk surveysseveral recent and ongoing TEL research projects and indicates important issues indeveloping and running such projects.

Page 26: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

26 BCI 2012 Conference Program and Abstracts

4 Paper Abstracts – September 16

4.1 Workshop: Computational Linguistics and Natural Lan-guage Processing of Balkan Languages – CLoBL 2012

4.1.1 Serbian Text Categorization Using Byte Level n-Grams

Jelena Graovac

Abstract: This paper presents the results of classifying Serbian text documents usingthe byte-level n-gram based frequency statistics technique, employing four differentdissimilarity measures. Results show that the byte-level n-grams text categorization,although very simple and language independent, achieves very good accuracy.

4.1.2 Information Extraction from the Weather Reports in Serbian

Staša Vujičić Stanković, Vesna Pajić

Abstract: In this paper, we describe a process of extracting information from me-teorological texts in Serbian. The text corpus consists of almost 46000 sentences.Having in mind the specifics of Serbian and characteristics of meteorological sub-language, we develop a classification schema for structuring extracted informationand transducers for annotating pieces of information in the text corpus. We describethe transducer for extracting information about daily temperatures and give someevaluation parameters for all other transducers used in the information extractionprocess.

4.1.3 Automatic Recognition of Composite Verb Forms in Serbian

Bojana Ðorđević

Abstract: In this paper, we will present the work on building a shallow parser forrecognizing composite verb forms in Serbian – the forms that consist of an auxiliaryverb and a main verb. The parser is made in Unitex, a corpus processing software, inthe form of local grammars that rely on using morphological dictionaries of Serbian.The model was tested on a small corpus of texts, both written in Serbian andtranslated into Serbian (total of 171 kw), in a few phases. In the current phase, theaverage result of 95,8% of well recognized units is achieved, with the translation ofJules Verne’s Around the world in 80 days giving the best results (98,8%), and ashort story by Ivo Andric, A Vacation in the South, giving the worst (91,7%).

Page 27: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

4 PAPER ABSTRACTS – SEPTEMBER 16 27

4.1.4 Recognition and Normalization of Temporal Expressions in SerbianTexts

Jelena JaćimovićAbstract: This paper presents a system for recognition and normalization of tem-poral expressions (TEs) in Serbian texts according to the TimeML specificationlanguage. Based on a finite-state transducers methodology, local grammars are de-signed to recognize calendar dates, times of day, periods of time and durations, todetermine the extension of detected expressions, as well as to normalize their val-ues, interpreted in ISO format. The results of a preliminary evaluation demonstrateusefulness of this method in both the recognition and the normalization phases.

4.1.5 An Approach to Development of Bilingual Lexical Resources

Ranka Stanković, Ivan Obradović, Aleksandra TrtovacAbstract: This paper outlines how Bibliša, a tool initially designed for search ofdigital libraries of articles from bilingual e-journals in the form of TMX documents,is used for development of a new bilingual lexical resource. The approach relieson already available resources, Serbian morphological e-dictionaries, Serbian andEnglish wordnets connected via the interlingual index, and a bilingual Dictionaryof Librarianship, as well as on a TMX document collection generated from alignedSerbian-English journal articles published in INFOtheca, a scientific journal in thearea of Library and Information Sciences. The aim of the new resource, Biblimir, isto help overcome the shortcomings of existing bilingual resources and hence improvethe performance of Bibliša.

4.1.6 An Authorship Attribution for Serbian

Anđelka Zečević, Miloš UtvićAbstract: An authorship attribution is a problem of identifying the author of ananonymous or disputed text if there is a closed set of candidate authors. Due tothe richness of natural languages and numerous ways of expressing individuality ina writing process, this task employs all the sources of language knowledge: lexis,syntax, semantics, orthography, etc.The impressive results of n-gram based algorithms have been presented in manypapers for many languages so far. The goal of our research was to test if this groupof algorithms works equally well on Serbian and if it is a case, to calculate theoptimal values for the parameters appearing in the algorithms. Also, we wanted totest if a syllable based word decomposition, which represents a more human like worddecomposition in comparison to n-grams, can be useful in an authorship attribution.Our results confirm good performance of an n-gram based approach (accuracy upto 96%) and show the potential usefulness of a syllable based approach (accuracyfrom 81% to 89%).

Page 28: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

28 BCI 2012 Conference Program and Abstracts

4.2 Workshop: Software Quality Analysis, Monitoring, Improve-ment, and Applications – SQAMIA 2012 – session 1

4.2.1 Adoption of Object-Oriented Software Metrics for Ontology Evalua-tion

Rok Žontar, Marjan HeričkoAbstract: Object-oriented software metrics are well established and widely acknowl-edged as a measure of software quality. The aim of our research is to analyze thepotential use of some of these metrics for ontology evaluation. In this paper wepresent the conclusions of our feasibility study, in which we investigated and as-sessed the ability of software metrics to evaluate ontologies. Based on a review ofexisting literature, we chose a set of 18 object-oriented software metrics. These werecategorized into four groups and analyzed according to their original definitions.

4.2.2 Agile Software Testing Technologies in a Large Scale Project

Bojana Koteska, Anastas MishevAbstract: Software testing in agile development is very complex issue in the ITworld. Since agile methods do not focus much on testing activities and agile softwaredevelopment does not include testing practices required for a quality project, theprocess of finding the suitable method for testing, especially for large scale projectsis challenging. In this paper, we propose a concept of integrated agile softwaretesting in a large scale project. This research explains the software testing processtechnologies and principles for agile software testing and identifies the best practicesfor testing software products in agile development process.

4.2.3 Rule-Based Assignment of Comments to AST Nodes in C++ pro-grams

Tamás Cséri, Zalán Szugyi and Zoltán PorkolábAbstract: Comments are essential components of programming languages: theypreserve the developer’s intentions, help the maintainers to understand hidden con-cepts, and may act as a source of automatic documentation generation. Howevermost of the software maintenance tools (refactorers, slicing and analyser tools) ig-nore them therefore they lose an important part of information about the software.One of the reasons why tools neglect comments is that there is no single well-definedlocation in the software’s AST where to place them. The relationship between theprogram’s control structure and the comments depend on code conventions andhuman habits. Our research – part of a project to develop a software maintenancetool - focuses on the code comprehension process of large legacy C++ projects andheavily utilize code comments. We evaluated the commenting behaviour used inlarge projects and categorized the major patterns. We found that these patterns arestrongly correlating in a single project. In the paper we present a method to find

Page 29: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

4 PAPER ABSTRACTS – SEPTEMBER 16 29

the correct place of the comments in the AST-based on project-specific rules. Weevaluate our method and test it against open source C++ projects.

4.2.4 ISO Software Quality Standards and Certification

Bisera Dugalic, Anastas Mishev

Abstract: In recent years software quality has become a matter of high interestespecially to software developers, managers and maintainers. Regarding the fact thatsoftware is evolving into extremely important part for a company to be competitive inits business, the requirement for the software to be greatly accessible for a companyin accomplishing its ambitions means that the software should have a great level ofuser convenience, quality and utility. The aim of this study is to determine the wayISO standards and certification for software quality are accepted by companies andthe customers. It examines the way it reflects on the quality management system ofthe company and how it helps customers choose what is best for them and preservetheir interests.

4.3 Workshop: Software Quality Analysis, Monitoring, Improve-ment, and Applications – SQAMIA 2012 – session 2

4.3.1 Analyzing Structural Software Changes: A Case Study

Črt Gerlec, Marjan Heričko

Abstract: Software engineers strive to understand software’s evolution and makesoftware better and more reliable. In the last decade, software’s life cycle becamean interesting research area. However, software evolution could be analyzed fromdifferent aspects. In the study, we focused on analyzing structural software changesbetween software’s versions. We used the WatiN project and observed its structuralchanges during the. The research showed that the number of structural source codechanges increased near the release dates.

4.3.2 Security Analysis Regarding Cross-Site Scripting on Internet Explorer

Adriana Neagoş and Simona Motogna

Abstract: The purpose of this paper is to provide an exact evaluation of cross sitescripting vulnerabilities on security, as an important factor of software quality. Since,this kind of risks are depedent on the browser, the study takes into considerationthree versions of Internet Explorer, and uses an established scoring system, theCommon Vulnerability Scoring System, to measure their impact.

Page 30: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

30 BCI 2012 Conference Program and Abstracts

4.3.3 SSQSA architecture

Zoran Budimac, Gordana Rakić and Miloš SavićAbstract: The aim of this paper is to describe architecture of the software systemcalled Set of Software Quality Static Analyzers (SSQSA). The main aim of SSQSAis to provide some static software analyzers to ensure, check, and consequentlyincrease, the quality of software products. Its main characteristic is the languageindependency which makes it more usable than many other similar systems.

4.3.4 Notes on the Parallels Between Biological and Software Evolution

Ladislav SamuelisAbstract: This contribution analyzes parallels between software and biologicalevolution published in software engineering literature. Several papers suggest to thesoftware engineering community that software and biological systems share someuseful features of evolution. We compare the driving forces of the software evolutionwith biological evolution and highlight their different nature. We conclude thatsearching for parallels between biological and software evolution is a challengingtask but at the same time there are limits, which may be hardly observed in theimpure research field of software evolution.

4.4 CA1 – Computer Applications in . . .

. . . Society4.4.1 Risks affecting the development of the information society in the

Republic of Moldova: insights from a Delphi survey

Horatiu Dragomirescu, Ion TighineanuAbstract: In the digital age, the development of information societies, far frombeing a linear process, is exposed to risks that are considerable in countries withemerging economies, including South-Eastern European ones. Foresight studies arerecognised as being useful in generating the kind of actionable knowledge required byexerting multi-stakeholder governance of such societal processes in a precautionaryway. This paper presents the outcomes of a first round of a Delphi survey under-taken in 2011 on the risks affecting the development of the information society inthe Republic of Moldova; a customised methodology was adopted in designing thequestionnaire, most items being peculiar to the decision-type Delphi. The surveyoutcomes indicated that Republic of Moldova’s information society actually reacheda mid-range stage between "disarticulated" and "world leader", on a scale basedupon the International Telecommunications Union’s "8 Cs framework". The devel-opment of the country’s information society was rated as a top priority of the currentpublic agenda that also stands in the medium- and long-term future and is steadilysupported by the state, although mainly in declarative terms. The most severe risk

Page 31: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

4 PAPER ABSTRACTS – SEPTEMBER 16 31

identified is that of the country’s research system and higher education system keep-ing functioning in a barely survival regime, under-financed and loosely coupled; inturn, the main vulnerability deemed to affect Republic of Moldova’s participation inthe European Union’s 7th Framework Programme for Research and TechnologicalDevelopment (2007 – 2013) consist of the insufficient attractiveness of income andacademic career prospects domestically available to young professionals.

. . . Business4.4.2 A Software Tool for Building a Statistical Prefix Processor

Nikitas Karanikolas, Michael Vassilakopoulos and Nektarios GiannoulisAbstract: Information Retrieval or Text Classification need to match words be-tween the user’s input and the documents in a collection of texts. Matching of wordsis not a trivial process since words have grammatical (inflectional and derivational)variations. There are two main approaches for matching between inflected words:Stemming (removing word suffixes based on ad-hoc selected suffixes) and Lemma-tizing (replacing the inflected form with the base form of a word). However, theseapproaches normalize the word variations in their rightmost side. We claim it willbe beneficial to additionally concentrate on word normalization at the left side, byremoving word prefixes. In this report, we present the architecture and functioning ofa software tool that can be used as the first stage of a Statistical Prefix Processor, asystem that could effectively remove prefixes from words and act as a preprocessingstage of text analysis applications. The tool we present is comprised of two stages/ subtools. During the first stage, possible prefixes of words within a collection oftexts are identified. During the second stage, a number of users (native speakers)process the text collection, automatically locate words that contain each stem andcharacterize the prefixes used with each stemmed word. After the text collection hasbeen processed by all users, statistical conclusions can be drawn for each stemmedword and its associated prefixes.

4.4.3 Social Networking Software use in Social Media Marketing vs. Tra-ditional Marketing: Case Study in Macedonia

Bekim Fetaji, Amir DemiriAbstract: The focus of this research is analyzing the possibility of applying socialnetworking software for social media marketing and its analyses compared the tra-ditional marketing and analyzed is a case study of marketing approaches for smallbusinesses in Macedonia. The contribution of the research study is the proposedapproach with the use of social network software for social media marketing. Thestudy also outlines research strategy, sampling methods, questionnaire and data col-lection method. Lastly it presents the validity and reliability measurements used inthis study. Findings have been stated and recommendations are provided.

Page 32: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

32 BCI 2012 Conference Program and Abstracts

. . . Goverment4.4.4 Framework for Open Data Mining in e-Government

Petar Milić, Nataša Veljković and Leonid StoimenovAbstract: Data mining in e-government is the process of translating data fromgovernment web site in useful knowledge that can provide various types of supportin decision making. Data mining can be applied to any type of data, but we havechosen to use this technique on open government data. Open data is a new conceptin the development of e-government. It stands for a public sector information whichis available for distribution and usage without any restrictions. In this paper we willgive an overview of a framework for open data mining and present an example ofusage of this framework for data mining on government open data portals.

. . .Medicine4.4.5 Extracting Drug Adverse and Beneficial Reactions in Pediatric Popu-

lation from Healthcare Social Network

Jelena Hadzi-Puric, Jeca GrmusaAbstract: Popular Web forums offer parents and doctor an opportunity to discussand share healthcare information, about symptoms of diseases, diagnosis and treat-ment in pediatric population, including side effects. The objectives of this paper areto explore extraction of drug reactions from a healthcare social network, review thedifferences between language from biomedical literature and patient vocabulary, tointroduce appropriate database model for presenting qualitative features of approvedand withdrawn drugs. We have also designed an extensible database of commentsthat regularly update with new drug classes and patient messages. The applicationis particularly useful in those countries that can provide pediatric drugs to patientswithout prescription.

4.5 AI1 – Artificial Intelligence4.5.1 OECEP: Enriching Complex Event Processing with Domain Knowl-

edge from Ontologies

Sebastian Binnewies, Bela StanticAbstract: With the increasing adoption of an event-based perspective in many or-ganizations, the demands for automatic processing of events are becoming moresophisticated. Although complex event processing systems can process events innear real-time, these systems rely heavily upon human domain experts. This be-comes an issue in application areas that are rich in specialized domain knowledgeand background information, such as clinical environments. We utilize a frame-workof four techniques to enhance complex event processing with domain knowledge fromontologies to address this issue. We realize this framework in our novel approach of

Page 33: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

4 PAPER ABSTRACTS – SEPTEMBER 16 33

ontology-supported complex event processing, which stands in contrast to relatedapproaches and emphasizes the strengths of current advances in the individual fieldsof complex event processing and ontologies. Experimental results from the imple-mentation of our approach based on a state-of-the-art system show its feasibilityand indicate the direction for future research.

4.5.2 A Distributed Asynchronous and Privacy Preserving Neural NetworkEnsemble Selection Approach for Peer-to-peer Data Mining

Yiannis Kokkinos, Konstantinos G. Margaritis

Abstract: This work describes a fully asynchronous and privacy preserving ensembleselection approach for distributed data mining in peer-to-peer applications. The al-gorithm builds a global ensemble model over large amounts of data distributed overthe peers in a network, without moving the data itself, and with little centralizedcoordination. Only classifiers are transmitted to other peers. Here the test set fromone classifier is the train set of the other and vice versa. Regularization Networksare used as ensemble member classifiers. The approach constructs a mapping of allensemble members to a mutual affinity matrix based on classification rates betweenthem. After the mapping of all members the Affinity Propagation clustering algo-rithm is used for the selection phase. A classical asynchronous peer-to-peer cycle iscontinually executed for computing the mutual affinity matrix. The cycle composedof typical grid commands, like send local classifier to a peer k, check for receivedclassifier m in the queue, compute local average positive hits, send results to peerm and send local classifier to a peer k+1. Thus the communication model used issimple point-to-point with send-receive commands to or from a single peer. Theapproach can also be implemented to other types of classifiers.

4.5.3 An Approach to Automated Reparation of Failed Proof Attempts inPropositional Linear Logic Sequent Calculus

Tatjana Lutovac

Abstract: In many application areas of automated reasoning it is not sufficient toshow that a given assertion is true. A good reasoning system should include tools notonly for the generation of proofs, but also for the analysis of and manipulations withunsuccessful proof attempts. This paper focuses on the development of automatedtechniques for the transformation of a finite, failed sequent proof attempt D (inone-sided propositional linear logic) into a complete proof which retains the order ofsequent rules of D and whose conclusion contains the conclusion of D. An algorithmis developed which replaces each non-axiom leaf ` ∆ with a proof of ` ∆, F whereF is formula dependent on ∆.

Page 34: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

34 BCI 2012 Conference Program and Abstracts

4.6 ISR1 – Information Storage and Retrieval and4.6.1 Efficient dataset size reduction by finding homogeneous clusters

Stefanos Ougiaroglou, Georgios EvangelidisAbstract: Although the k-Nearest Neighbor classifier is one of the most widely-used classification methods, it suffers from the high computational cost and storagerequirements it involves. These major drawbacks have constituted an active researchfield over the last decades. This paper proposes an effective data reduction algorithmthat has low preprocessing cost and reduces storage requirements while maintainingclassification accuracy at an acceptable high level. The proposed algorithm is basedon a fast pre-processing clustering procedure that creates homogeneous clusters.The centroids of these clusters constitute the reduced training-set. Experimentalresults, based on real-life datasets, illustrate that the proposed algorithm is fasterand achieves higher reduction rates than three known existing methods, while it doesnot significantly reduce the classification accuracy.

4.6.2 Discovery and Evaluation of Students’ Profiles with Machine Learning

Evis Trandafili, Alban Allkoçi, Elinda Kajo and Aleksandër XhuvaniAbstract: Higher education institutions are overwhelmed with huge amounts ofinformation regarding student’s enrollment, number of courses completed, achieve-ment in each course, performance indicators and other data. This has led to anincreasingly complex analysis process of the growing volume of data and to the in-capability to take decisions regarding curricula reform and restructuring. On theother side, educational data mining is a growing field aiming at discovering knowl-edge from student’s data in order to thoroughly understand the learning processand take appropriate actions to improve the student’s performance and the qualityof the courses delivery. This paper presents a thorough analysis process performedon student’s data through machine learning techniques. Experiments performed ona very large real-world dataset of students performance on all courses of a univer-sity, reveal interesting and important students profiles with clustering and surprisingrelationships among the courses performance with association rule mining.

4.6.3 Comparison of Information Retrieval Models for Question Answering

Jasmina Armenska, Katerina ZdravkovaAbstract: Question Answering Systems (QAS) are an important research topic trig-gered and at the same time stimulated by the immense amount of texts available indigital form. As the quantity of natural language information increases, the neces-sity of new methods to precisely retrieve the exact information from massive textualdatabases becomes inevitable. Although QAS have already been well explored, thereare still many aspects to be solved, particularly those which are language specific.The main goal of the research presented in this paper was to compare three proven

Page 35: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

5 PAPER ABSTRACTS – SEPTEMBER 17 35

information retrieval (IR) models in order to accurately determine the relevant docu-ments which contain the correct answer to questions posed in Macedonian language.It was accomplished using a real-life corpus of lectures and related questions existingin our e-testing system. In order to compare the results, we designed a small systemcapable of learning the correct answer. We revealed that the modified vector spacemodel is the most suitable for our collection. The results we obtained are promisingand they encouraged us for further improvement adopting some of the existing IRmodels, or even proposing a new one.

Computer Graphics4.6.4 A Novel Algorithm for an Image Processing System in Entomology

Marjan Kindalov, Ana Madevska Bogdanova and Zarko ErakovicAbstract: This paper presents a novel algorithm for localization of characteristicsymmetrical parts of an image. The algorithm is developed in order to recognize thepupae images of the insects Bemisia tabaci and Trialeurodes vaporariorum, but thegeneric nature enables its use in different domains.This novel Symmetrical self-filtration algorithm (SSF) is based on the templatematching algorithm and utilizes the symmetrical nature of the images. Its purposeis to enhance the outcome of the template matching process.

4.6.5 The Teaching of Geography using Dynamic Geometry

Ðorđe Herceg, Vera Herceg-Mandić and Davorka RadakovićAbstract: The use of dynamic geometry software (DGS) in all kinds of mathematicalgames has become a widespread phenomenon. Rich features and availability of freeDGS, such as GeoGebra, have caused a growing interest for developing teachingmaterials for subjects other than matematics. We present the teaching materialsthat we developed in GeoGebra for the subject of geography at elementary andmiddle school level. An interactive component that we developed, aimed specificallyat applications in computer geography, is also discussed.

5 Paper Abstracts – September 175.1 SE1: Software Engineering5.1.1 Formal Modelling of a Bio-Inspired Paradigm Capable of Exhibiting

Emergence

Konstantinos Rousis, George Eleftherakis, Ognen Paunovski and Tony CowlingAbstract: The Emergent Distributed Bio-Organization (EDBO) case study hasdemonstrated the potential of harnessing emegent properties in Artificial DistributedSystems (ADS). Introducing biologically inspired attributes and functions to the

Page 36: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

36 BCI 2012 Conference Program and Abstracts

microscopic level (i.e. the biobots) has allowed for the emergence of global-levelbehaviours such as network scalability, availability and super-node formations. Ex-perience gained during work with EDBO was further incorporated into a disciplinedframework for harnessing emergence in ADS. In an attempt to increase confidencein this framework and the results gathered so far by EDBO simulations, this pa-per performs a feasibility study on formally modelling, documenting, and validatingthe EDBO case study. By using the X-machine formalism, this step further servesas a preliminary, transition, step for running EDBO on FLAME; an agent-basedsimulation platform built upon the theoretical foundation of X-machines.

5.1.2 Community Detection and Analysis of Community Evolution in ApacheAnt Class Collaboration Networks

Miloš Savić, Miloš Radovanović and Mirjana IvanovićAbstract: In this paper we investigate community detection algorithms applied toclass collaboration networks (CCNs) that represent class dependencies of 21 con-secutive versions of the Apache Ant software system. Four community detectiontechniques, Girvan-Newman (GN), Greedy Modularity Optimization (GMO), Walk-trap and Label Propagation (LP), are used to compute community partitions. Ob-tained community structures are evaluated using community quality metrics (inter-and intra- cluster density, conductance and expansion) and compared to packagestructures of analyzed software. In order to investigate evolutionary stability ofcommunity detection methods, we designed an algorithm for tracking evolving com-munities. For LP and GMO, algorithms that produce partitions with higher valuesof normalized modularity score compared to GN and Walktrap, we noticed an evo-lutionary degeneracy — LP and GMO are extremely sensitive to small evolutionarychanges in CCN structure. Walktrap shows the best performance considering com-munity quality, evolutionary stability and comparison with actual class groupingsinto packages. Coarse-grained descriptions (CGD) of CCNs are constructed fromWalktrap partitions and analyzed. Results suggest that CCNs have modular struc-ture that cannot be considered as hierarchical, due to the existence of large stronglyconnected components in CGDs.

5.1.3 Statically Typed Matrix

Predrag S. Rakić, Lazar Stričević and Zorica Suvajdžin RakićAbstract: Contemporary C++ matrix libraries model matrices as if the only relevantcharacteristic of matrix type is its element type and number of dimensions. Actualsize of each dimension is usually completely disregarded in the model. Dimensionsize is treated as dynamic characteristics of matrix object, making a matrix typeneither static nor dynamic, but something in between. Logical consequence of datamodel inconsistency is more or less noticeable discrepancy in the interface design.Matrix model in which element type, number of dimensions and size of each dimen-sion are all treated as equally important characteristic of matrix type is presented in

Page 37: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

5 PAPER ABSTRACTS – SEPTEMBER 17 37

this paper. Proposed matrix model is implemented in the C++ proof–of–concepttemplate library called Typed Matrix Library (TML).Matrices in TML are statically typed objects. Modeling matrices this way enablescompile–time correctness verification in matrix operations. At the same time, thisapproach incurs no run–time overhead compared to the classical one. Arguably,linear algebra programs based on the presented model require no additional informa-tion/dependencies to be supplied to the program code than developers are alreadyaware of, thus no extra developers’ effort is required in order to use matrices basedon this model.

5.1.4 An Evaluation of Java Code Coverage Testing Tools

Elinda Kajo-Mece, Megi Tartari

Abstract: Code coverage metric is considered as the most important metric usedin analysis of software projects for testing. Code coverage analysis also helps in thetesting process by finding areas of a program not exercised by a set of test cases,creating additional test cases to increase coverage, and determine the quantitativemeasure of the code, which is an indirect measure of quality. There are a largenumber of automated tools to find the coverage of test cases in Java. Choosing anappropriate tool for the application to be tested may be a complicated process. Tomake it ease we propose an approach for measuring characteristics of these testingtools in order to evaluate them systematically and to select the appropriate one.

5.2 AA: Analysis Of Algorithms And Problem Complexity

5.2.1 Virtualized Environments in Cloud Can Have Superlinear Speedup

Sasko Ristov, Marjan Gusev, Magdalena Kostoska and Kiril Kiroski

Abstract: CPU cache is used to speedup the execution of memory intensive algo-rithms. Usage of greater cache memory sizes reduces the cache misses and overallexecution time. This paper addresses architectures in modern processors realized asmulti chip and multi core processors with shared L3 cache and dedicated L2 and L1cache.The goal is to analyze the behavior of servers and to check the hypothesis if thevirtual environments are usually slower than standard environments. Although ma-jority will think that adding a new software and operating system layers just slowsdown the software, there is also a contra-argument based on cache size exploitation,since a multiprocessor with dedicated cache per core usually requires smaller cachesize and can exploit the benefits of bigger cache memory than single processor.This might also lead to superlinear speedup greater than the number of processingelements.

Page 38: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

38 BCI 2012 Conference Program and Abstracts

The testing methodology and experiments for this research are applied also to cloudenvironment. The results show that cloud environment can also achieve superlinearspeedup for execution of cache intensive algorithms when high performance com-puting is used in virtual machines allocated with more than one processing element(core).

5.2.2 Comparative Performance Evaluation Of The AVL And Red-BlackTrees

Svetlana Štrbac-Savić and Milo TomaševićAbstract: The AVL and red-black trees are the suboptimal variants of the binarysearch trees which can achieve the logarithmic performance of the search operationwithot an excessive cost of the optimal balancing. After presenting a brief theoret-ical background, the paper comparatively evaluates the performance of these twostructures. The evaluation was performed by means of simulation with a syntheticworkload model. In order to obtain a better insight, the performance indicatorsare chosen to be implementation and platform independent. Some representativeresults of the evalution are given and discussed. Finally, the findings of this studyare summarized into the suggestions for an optimal use of the analyzed trees.

5.2.3 The Evaluation of Performance in Flow Label and Non Flow LabelApproach Based on IPv6 Technology

Ariana Bejleri, Igli Tafaj, Ermal Beqiri, Julian Fejzaj and Aleksander BiberajAbstract: In this paper, we want to evaluate the performance of two broadcasterswith Flow label and Non flow label approach. Experimentally we have presented thatthe throughput utilization for each broadcaster with Flow Label approach which isimplemented in MPLS Routing Technology is 89,95%. This result is better thanNon Flow Label approach which is evaluated at 92,77%. The aim of this paperis to present that MPLS Routers performance is better than IP routers especiallyin Throughput Utilization, Low Level of Drop Packet Rate and time delay. Thesecond technology is implemented in IP routing. Experimentally we have generatedsome video stream packets between 2 broadcasters with an arrange of router nodes.Experiments are performed by using ns-2 simulator.

5.2.4 Logical Representation Of Dependencies Of Items And The Complex-ity Of Customer Sets

János Demetrovics, Hua Nam Son and Ákos GubánAbstract: The problem of discovering of frequent market baskets and associationrules has been considered widely in literatures of data mining. In this study, byusing the algebraic representation of market basket model, we pro pose a conceptof logical constraints of items in an effort to detect the logical relationships hiddenamong them. Via the relationships of the propositional logics and logical constraints

Page 39: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

5 PAPER ABSTRACTS – SEPTEMBER 17 39

of items we propose also the concept of the complexity of customers. As a result weshow that every set of customers can be characterized by a logical constraint andcan be divided into different blocks that are characterized by quite simple logicalconstraints. In the natural way the complexity of a customer set is defined as thenumber of the blocks it contains.

5.3 SE2: Software Engineering5.3.1 Evaluation of Tools for Automated Unit Testing for Applications in

OSGi

František Geletka, Ladislav Samuelis and Jozef VojtkoAbstract: This work provides an overview and comparison of the currently availabletools for testing in OSGi environment such as Pax-Exam, JUnit4OSGi or Spring DM.We developed a plugin for JUnit4OSGi that allows to generate basic skeletons oftests from ordinary Java Eclipse projects. These tests can operate directly in theEclipse enviroment using the modified SwingGUI runner.

5.3.2 A Hoare-Style Verification Calculus for Control State ASMs

Werner Gabrisch, Wolf ZimmermannAbstract: We present a Hoare-style calculus for control-state Abstract State Ma-chines (ASM) such that verification of control-state ASMs is possible. In particular,a Hoare-Triple {ϕ}A{ψ} for an ASM A means that if an initial state I satisfies theprecondition ϕ and a final state F is reached by A, then the final state satisfies thepostcondition ψ. While it is straightforward to generalize the assignment axiom ofthe Hoare-Calculus to a single state transition, the composition of Hoare-Triples ischallenging since typical programming language concepts are not present in ASMs.

5.3.3 Communication in Machine-to-Machine Environments

Iva Bojic, Damjan Katusic, Mario Kusek, Gordan Jezic, Sasa Desic and DarkoHuljenicAbstract: It has been estimated that by the end of 2020 there will be 50 billionconnected devices in Machine-to-Machine (M2M) networks. Such projections shouldencourage us to deal with the corresponding problems in heterogeneous M2M sys-tems. First of all, devices can communicate through different access technologies(e.g. wireline, 2G/3G, WiFi, Bluetooth) and their communication can be classifiedas direct or indirect, internal or external. In this paper we explain differences betweenthose types of communication and propose a new identification scheme that allowsM2M devices to establish communication in every possible way. Secondly, there isa problem of device hardware and software diversity. To overcome this problem, wepropose the usage of the Open Service Gateway Initiative (OSGi) framework.

Page 40: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

40 BCI 2012 Conference Program and Abstracts

5.3.4 User-Friendly Menu for New-Age Mobile Phones

Ivan Peric and Oliver SiposAbstract: Even the quick peek at the specs of upcoming or currently most popularmobile phones makes you come to a conclusion that they are getting physicallythinner, yet taller and wider even though technology is getting smaller. Screen sizeis the main reason for this. As many manufacturers surpass 3.5” display barrier tobring more information and options to the screen, challenge is laid upon the softwareto keep the benefits of one-handed interaction available to users. In this paper, wewill focus on problem that appears on some of the most popular mobile platforms:application menu. Combining usage statistics, minimalistic design and ergonomicspoint of view, we created solution that is generic, but still follows most of the majorplatforms design guidelines.

5.3.5 Layout Proposal for One-Handed Device Interface

Oliver Sipos, Ivan Peric and Dragan IveticAbstract: The paper presents a novel interface layout design suited for thumbnavigation on one-handed device. The layout supports common tasks for this class ofdevices with minimal cognitive and physical effort and was developed through threeiterations of designing and testing layouts. First design proposal was created basedon existing papers and current trends in the field of mobile device design. Secondand third proposals were made by altering previous proposal according to test resultsanalysis. Finally, by combining experiences of other people who worked on similarstudies, theoretical principles of interface design and empirically gained knowledgeabout this problem, design proposal was made. Proposal that will, hopefully, becomefundamental in designing layouts for small hand held devices with touch sensitivescreens.

5.4 CA2 – Computer Applications in . . .. . . Buisiness5.4.1 Management, Communications and Security Policy in Mobile Database

Systems

Vigan Raça, Betim Çiço and Majlinda FetajiAbstract: This paper presents a typical “Net-Centric” system which is based onthree main scenarios as the concept of management of data, communication andsecurity policies, all of these based on mobile system. The paper is projected torelate these elements, presented in a mobile application which is very convenient forthe commercial market by offering a good solution which in addition to facilitatingthe work it also reduces the two valuable components as cost and time. The mobiledevices on which is installed application may be PDA or Smart Phone, which syn-chronized with the server and cause a number of different transactions from client

Page 41: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

5 PAPER ABSTRACTS – SEPTEMBER 17 41

to server direction, using different protocols and communications standards whichare presented and performed in mobile application. Further the report will identifythe key elements that should be met to establish service in the market, and willalso checks relations between business and these elements. Three scenarios thatmentioned above are researched and studied and may observe how the elements canchanged, depending on the reason how the service is performed.

5.4.2 Analyzing the Selection and Dynamic Composition of Web Servicesin E-commerce Transactions

Nikolaos Vesyropoulos, Christos K. Georgiadis and Christos IlioudisAbstract: Over the past few years Web Services (WS) have revolutionized the wayloosely coupled distributed systems communicate and interact online. The aforemen-tioned success has led to an abundance of available WS, which makes it harder forusers and businesses to discover the appropriate services to be used as standalonesor as part of a domain-specific service composition. Semantics and Ontologies maycertainly provide invaluable solutions to facilitate the discovery process. In addition,Quality of Service (QoS) characteristics may also be taken into consideration to-wards optimizing service compositions. In this paper we firstly attempt to stress theimportance of properly discovering and selecting WS by reviewing recent researchresults and secondly to analyze and identify the current discrete dynamic servicecomposition approaches. Our interest is both for QoS-aware service compositions(system level), and for Business-driven automated compositions (business level). Wehighlight the advantages, the methods and techniques involved and the challenges ofeach approach. Finally, we analyze their influence on designing and implementing in-teroperable e-commerce transactions as solutions that exploit dynamic compositionscenarios.

5.4.3 An Approach to the Specification of User Interface Templates forBusiness Applications

Sonja Ristić, Ivan Luković, Slavica Aleksić, Jelena Banović and Ali Al-DahoudAbstract: Through a number of research projects we propose a form-driven ap-proach to business application generation. Our IIS*Studio development environment(IIS*Studio DE, current version 7.1) is aimed to support the form-driven approachand provides the information system (IS) design and generating executable businessapplication prototypes. An executable business application specification, generatedby means of IIS*Studio, may be visually interpreted in different ways. In the paperwe present the extension of the IIS*Studio repository containing the common modelof user interface (UI). The IIS*UIModeler is an integrated part of the IIS*Studiodevelopment environment, aimed at modelling UI templates. Applying it, a designerspecifies UI templates. UI template specification contains attribute values that de-scribe common UI characteristics, such as: screen size, main application window

Page 42: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

42 BCI 2012 Conference Program and Abstracts

position, background/foreground colour, etc. UI template specifications are inde-pendent from any specific IS project specification, generated by means of IIS*Studiotool. The same UI template may be used for the business application prototypegeneration of different ISs. Also, the same IS project specification may be visuallyinterpreted in different ways by means of different UI templates. The specificationof a UI template may be seen as a fully platform independent UI model. Besides thedetail description of UI template common model, we illustrate the main features ofthe IIS* UIModeler tool.

. . . Education5.4.4 A Software Tool that Helps Teachers in Handling, Processing and

Understanding the Results of Massive Exams

Marko Mišić, Marko Lazić and Jelica ProtićAbstract: During the last decade, at the University of Belgrade, School of ElectricalEngineering, various tools have been developed and used for automation of prepa-ration, grading and results processing of programming exams. Those exams consistof multiple-choice questions that represent sophisticated programming puzzles, andcoding problems that require students to write solutions to the given problem. Inorder to get better understanding of student’s achievements, there was a need forstatistical analysis of the exam results. We have developed a new tool in afore-mentioned tool chain that processes exam results and presents various statisticalparameters in tables and graphs. The purpose of the project is to help teachers inhandling massive exams with more than 500 students, and to provide them withinformation on students’ knowledge in various parts of the programming course,specific algorithms etc.

5.5 LT: Languages and Techniques5.5.1 Parameterized Verification of Open Procedural Programs

Aleksandar DimovskiAbstract: This paper describes a concrete implementation of a game semanticsbased approach for verification of open program terms parameterized by a data type.The programs are restricted to be data-independent with respect to the data typetreated as a parameter, which means that the only operation allowed on values of thattype is equality testing. The programs can also input, output, and assign such values.This provides a method for verifying a range of safety properties of programs whichcontain data-independent infinite types. In order to enable verification of programswith arbitrary infinite (integer) types, the proposed method can be extended bycombining it with an abstraction refinement procedure. We have developed a toolwhich implements this method as well as its extension, and we present its practicalityby several academic examples.

Page 43: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

5 PAPER ABSTRACTS – SEPTEMBER 17 43

5.5.2 Performance Study of Matrix Computations using Multi-core Pro-gramming Tools

Panagiotis Michailidis, Konstantinos G. MargaritisAbstract: Basic matrix computations such as vector and matrix addition, dot prod-uct, outer product, matrix transpose, matrix – vector and matrix multiplication arevery challenging computational kernels arising in scientific computing. In this pa-per, we parallelize those basic matrix computations using the multi-core and parallelprogramming tools. Specifically, these tools are Pthreads, OpenMP, Intel Cilk++,Intel TBB, Intel ArBB, SMPSs, SWARM and FastFlow. The purpose of this paperis to present an unified quantitative and qualitative study of these tools for parallelmatrix computations on multicore. Finally, based on the performance results withcompilation optimization we conclude that the Intel ArBB and SWARM parallel pro-gramming tools are the most appropriate because these give good performance andsimplicity of programming. In particular, we conclude that the Intel ArBB is a goodchoice for implementing intensive computations such as matrix product because itgives significant speedup results over the serial implementation. On the other hand,the SWARM tool gives good performance results for implementing matrix operationsof medium size such as vector addition, matrix addition, outer product and matrix– vector product.

5.5.3 Recent Advances Delivered by HTML 5 in Mobile Cloud ComputingApplications: A Survey

Stelios Xinogalos, Kostas Psannis and Angelo SifalerasAbstract: With the explosive growth of the mobile applications and emerging ofCloud Computing (CC) concept, Mobile Cloud Computing (MCC) has been intro-duced to be a potential technology for mobile services. MCC refers to an infras-tructure where both the data storage and the data processing happen outside of themobile device. One of the technologies that will advance MCC is the latest versionof the Web’s markup language, HTML 5. In this paper, we present a survey ofnew HTML 5 features with a focus on the enhancement of the current MCC limita-tions. Specifically, we present the most important features of HTML 5 organized indifferent categories and their contribution in the deployment of MCC applications.Finally, the results of the research carried out on evaluating HTML 5 in terms of awide range of applications and specifications are reviewed.

5.5.4 Fuzzy XML with Implementation

Goran Panić, Miloš Racković and Srđan ŠkrbićAbstract: Standard XML format does not allow for imprecise or incomplete values.This is one of the requests imposed on this format by many real-word usages. Usingfuzzy logic in order to introduce indefiniteness in XML has been researched in severaldifferent papers in the last decade. While these papers were mostly focused on

Page 44: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

44 BCI 2012 Conference Program and Abstracts

setting up theories and the syntax, this paper has practical usage as its main goal.Application called ’Fuzzy XML editor’ was created and described in this research.This editor is intended to work with fuzzy XML and to support XSD and DTDschemas.

5.5.5 Protection of Web Applications Using Aspect Oriented Programmingand Performance Evaluation

Elinda Kajo-Mece, Lorena Kodra, Enid Vrenozi and Bojken Shehu

Abstract: Web application security is a critical issue. Security concerns are oftenscattered through different parts of the system. Aspect oriented programming isa programming paradigm that provides explicit mechanisms to modularize theseconcerns. In this paper we present an Aspect Oriented system for detecting andprevent common attacks in web applications like Cross Site Scripting (XSS) andSQL Injection and evaluate its performance by measuring the overhead introducedinto the web application. The results of our tests show that this technique waseffective in detecting attacks while maintaining a low performance overhead.

5.6 AI2: Artificial Intelligence and

5.6.1 A Knowledge Based Approach for Handling Supply Chain Risk Man-agement

Adrian Solomon, Panayiotis Ketikidis and Alok Choudhary

Abstract: This paper discusses the concept of supply chain risk management(SCRM) in relation to the emerging challenges brought by globalisation and infor-mation and communication technologies (ICT) and the ability of SCRM frameworksto adapt to these latest requirements. As SCRM can be responsible for loss or gainof profit, the ultimate goal of enterprises is to have resilient supply chains with au-tomated decision making that can deal with potential disruptions. In response tothese, taking advantage of ICT developments such as knowledge and data discoverytechniques and automated risk management frameworks have become a vital aspectfor assuring business success. Having this context, this research has the followingaims: 1) to perform literature review on identifying and categorising several typesof supply chain risks in order to analyze their management strategies, 2) to per-form a literature review on knowledge management frameworks and 3) to proposea knowledge management and a risk management framework that would be, at afurther stage of this research, integrated in an agent based decision support systemfor supply chain risk management.

Page 45: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

5 PAPER ABSTRACTS – SEPTEMBER 17 45

5.6.2 Recognition and Normalization of Some Classes of Named Entities inSerbian

Cvetana Krstev, Jelena Jaćimović and Duško VitasAbstract: In this paper we present a system for recognition and normalization ofmeasurement and money expressions and temporal expressions for dates and time inSerbian newspaper texts. The normalization of amount expressions involves a trans-formation of used numerals to a fixed-point notation as well as a transformationof currencies and measurement units into their standard or common abbreviations,while temporal expressions are transformed into the TimeML format. For this pur-pose, we use our general lexical resources and develop some new ones. The systemitself consists of a large collection of finite-state transducers. Finally, we give someevaluation data that show that our system performs well, with well-balanced preci-sion and recall.

5.6.3 Optimising Flash Non-Volatile Memory using Machine Learning: AProject Overview

Tom Arbuckle, Damien Hogan and Conor RyanAbstract: ABSTRACT While near ubiquitous, the physical principles of Flash mem-ory mean that its performance degrades with use. During fabrication and operation,its ability to be repeatedly programmed/erased (endurance) needs to be balancedwith its ability to store information over months/years (retention). This projectoverview describes how our modelling of data we obtain experimentally from Flashchips uniquely allows us to optimise the settings of their internal configuration reg-isters, thereby mitigating these problems.

5.6.4 The Modification of Genetic Algorithms for Solving the BalancedLocation Problem

Vladimir Filipovic, Jozef Kratica, Aleksandar Savić and Ðorđe DugošijaAbstract: In this paper is described the modification of the existing evolutionaryapproach for Discrete Ordered Median Problem (DOMP), in order to solve theBalanced Location Problem (LOBA). Described approach, named HGA1, includesa hybrid of Genetic Algorithm (GA) and a well-known Fast Interchange Heuristic(FIH). HGA1 uses binary encoding schema. Also, new genetic operators that keepthe feasibility of individuals are proposed. In proposed method, caching GA techniquewas integrated with the GFI heuristic to improve computational performance. Thealgorithm is tested on standard instances from the literature and on large-scaleinstances, up to 1000 potential facilities and clients, which is generated by generatordescribed in [5]. The obtained results are also compared with the existing heuristicfrom the literature.

Page 46: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

46 BCI 2012 Conference Program and Abstracts

Computer Application in Education5.6.5 <L|ETAP> Model for an Adaptive Tutoring System

Eugenia KovatchevaAbstract: Nowadays the interest to the adaptive intelligent eLearning systems in-creases. There are different kind of adaptations one to the content, other to thelearning process or to the assessment and so on. The crucial moment for the learnermotivation’s is to catch their needs and possibilities and then to act, i.e. the re-spond from the system. The intelligent tutor (system agent(s)) has to decide themost appropriate path through the content based on the collected information forlearner as: learning style, learner track through the topics, learner grades and offerfurther steps. The intelligent agent – tutor keeps all data for every single learner,analyse them and offers next learner’s actions on the system. This paper presents aconstructive model based on the learning style of the learners and their ability andhow it could be implement in an intelligent eLeaning system. It should be used forself-study in formal and informal education as well as for representing the digitalizedcultural and historical heritage for educational purposes.

6 Paper Abstracts – September 18

6.1 AI3: Artificial Intelligence6.1.1 Formal Modelling of Agents acting under Artificial Emotions

Petros Kefalas, Ioanna Stamatopoulou and Dionysis BasakosAbstract: Artificial Agents infused with emotions have attracted considerable atten-tion in recent years. Many domain areas require agents to be able to demonstrate anemotional reaction to stimuli, beliefs, goals, communication etc., thus exhibiting abelievable behaviour. On the other hand, little has been said on how formal methodscould integrate emotions in a form of rigorous mathematical notation. This paper isan initial attempt to infuse a formal modelling method for reactive agents, namelyX-machines, with appropriate attributes that model artificial emotions. X-machinesare finite statebased models extended with memory as well as functions that are ap-plied on input and memory values. X-machines have been shown to be particularlyuseful to model reactive agents. The computation, that is the overall behaviour ofan agents, is a sequence of states reached through the application of transition func-tions (actions that an agent performs). This computation is amended when artificialemotions are involved, thus leading to a different overall behaviour when an agentacts under artificial emotions. After discussing basic theories on emotions and theirrole to creating believable agents, we present the definition of the e X-machine (eX)and its computation. A simple multi-agent system with emotional reactive agents isused to show the formal modelling process. Additionally, the same example is used

Page 47: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

6 PAPER ABSTRACTS – SEPTEMBER 18 47

to demonstrate how a visual simulation, based on eX formal modelling, has differentbehaviour of the overall system, when artificial emotions are applied.

6.1.2 Time Series Mining in a Psychological Domain

Vladimir Kurbalija, Hans-Dieter Burkhard, Mirjana Ivanović, Charlotte von Bern-storff, Jens Nachtwei and Lidija Fodor

Abstract: Analysis of time-series became an inevitable tool in applied settings, suchas stock market analysis, process and quality control, observation of natural phe-nomena, medical treatments, and in the behavioral science, such as psychologicalresearch. In this paper, we utilize a new kind of a tool set for time-series analy-sis (FAP, developed at Department of Mathematics and Informatics, University ofNovi Sad) on behavioral data gained from a specific experimental lab system, a socalled Socially Augmented Microworld with three human participants (developed byinformatics and psychologists for Human Factors Research at Humboldt UniversityBerlin). On the basis of these data (logfiles) we extracted three types of time-seriesand generated distance matrices using three kinds of time-series similarity measures.Finally, the clustering of generated distance matrices produced dendrograms whichserve as the basis for a deeper analysis of human behavior. The outcome of thisanalysis is two-fold: (a) it allows to select the most suitable similarity measure forthis domain of experimental research and (b) these results can serve as a basis for thedevelopment of artificial agents, which may in turn replace the human participantsin the experiment.

6.1.3 Predictive Complex Event Processing: A Conceptual Framework forCombining Complex Event Processing and Predictive Analytics

Lajos Jenő Fülöp, Gabriella Tóth, László Vidács, Árpád Beszédes, Hunor Demeter,Lóránt Farkas

Abstract: Complex Event Processing deals with the detection of complex eventsbased on rules and patterns defined by domain experts. Many complex eventsrequire real-time detection in order to have enough time for appropriate reactions.However, there are several events (e.g. credit card fraud) that should be preventedproactively before they occur, not just responded after they happened. In this paper,we briefly describe Complex Event Processing (CEP) and Predictive Analytics (PA).Afterwards, we focus on a major future direction of CEP, namely the inclusion ofPA technologies into CEP tools and applications. Involving PA opens a wide rangeof possibilities in several application fields. However, we have observed that onlyfew solutions apply PA techniques. In this paper, we define a conceptual frameworkwhich combines CEP and PA and which can be the basis of generic design patternin the future. The conceptual framework is demonstrated in a proof–of–conceptexperiment. Finally we provide the results and lessons learned.

Page 48: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

48 BCI 2012 Conference Program and Abstracts

6.1.4 Reservoir Sampling Techniques in Modern Data Analysis

Anže Pečar, Miha Zidar and Matjaž KukarAbstract: Reservoir sampling is an interesting statistical sampling technique, de-veloped almost 40 years ago in order to enable analysis of large scale data (for thattime) while utilizing limited computer memory resources. We present an overviewof frequently used reservoir sampling techniques and discuss how they can be usedfor learning from data streams. While they are not perfect for all scenarios, theycan easily be modified for many purpose, and also find place in surprisingly usefulmodern data analysis approaches.

6.2 OS1: Operating Systems and6.2.1 A Parallel Processing of Spatial Data Interpolation on Computing

Cloud

Vladimír Siládi, Ladislav Huraj, Eduard Vesel and Norbert PolčákAbstract: In a short span of time, cloud computing has grown, particularly forcommercial web applications. But the cloud computing has the potential to becomea greater instrument for scientific computing as well. A pay-as-you-go model withminimal or no upfront costs creates a flexible and cost-effective means to accesscompute resources. In this paper, we carry out a study of the performance of thespatial data interpolation of depth of the snow cover on the most widely used cloudinfrastructure (Amazon Elastic Compute Cloud). The main characteristic of theinterpolating computing is the fact that it is time-consuming and data intensive;therefore utilizing parallel programming paradigm is eligible. The geoprocessing isrealized on two configuration provided by Amazon EC2 and the results as well asperformance of the computing is presented in the article.

6.2.2 Robust Moldable Scheduling Using Application Benchmarking for Elas-tic Enviornments

Ibad Kureshi, Violeta Holmes and David CookeAbstract: In this paper we present a framework for developing an intelligent jobmanagement and scheduling system that utilizes application specific benchmarksto mould jobs onto available resources. In an attempt to achieve the seeminglyirreconcilable goals of maximum usage and minimum turnaround time this researchaims to adapt an open-framework benchmarking scheme to supply information toa mouldable job scheduler. In a green IT obsessed world, hardware efficiency andusage of computer systems becomes essential. With an average computer rackconsuming between 7 and 25 kW it is essential that resources be utilized in the mostoptimum way possible. Currently the batch schedulers employed to manage thesemulti-user multi-application environments are nothing more than match making andservice level agreement (SLA) enforcing tools. These management systems rely

Page 49: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

6 PAPER ABSTRACTS – SEPTEMBER 18 49

on user prescribed parameters that can lead to over or under booking of computeresources. System administrators strive to get maximum “usage efficiency” from thesystems by manual fine-tuning and restricting queues. Existing mouldable schedulingstrategies utilize scalability characteristics, which are inherently 2-dimensional andcannot provide predictable scheduling information.In this paper we have considered existing benchmarking schemes and tools, sched-ulers and scheduling strategies, and elastic computational environments. We areproposing a novel job management system that will extract performance character-istics of an application, with an associated dataset and workload, to devise optimalresource allocations and scheduling decisions. As we move towards an era whereon-demand computing becomes the fifth utility, the end product from this researchwill cope with elastic computational environments.

6.2.3 A Review of Disc Scrubbing and Intra Disc Redundancy Techniquesfor Reducing Data Loss in Disc File Systems

Genti Daci, Aisa BezhaniAbstract: Because of high demand that applications and new technologies havetoday for data storage capacity, more disk drives are needed, resulting in increasedprobability to inaccessible sectors, referred as Latent Sector Errors (LSE). Aiming toreduce data loss by LSE, two main techniques are extensively studied lately: DiskScrubbing, which performs reading operations during idle periods on systems tosearch for errors and Intra Disk Redundancy which is based on redundancy codes.This paper reviews and discusses the problems of LSE and the main causes that leadto LSE, its properties and their correlation on nearline and enterprise disks. Focusingon reducing LSE with regards to security, processing overhead and disk space, weanalyze and compare the latest techniques: Disc Scrubbing and Intra Disk Redun-dancy aiming to highlight the issues and challenges according to different statisticalapproaches. Furthermore, based on previous evaluation results, we discuss and in-troduce the benefits on using both schemes simultaneously: combining different IDRcoding schemes with Accelerated Scrubbing and Staggered Scrubbing in particularregions of disc drives that store crucial data during idle periods. Finally, we discussand evaluate from an extended statistical analysis the best ways on how reduce dataloss with a minimum impact on system performance.

Networks6.2.4 Implementation and Evaluation of a Sleep-Proxy for Energy Savings

in Networked Computers

Enida Sheme, Neki Frasheri, Marin AranitasiAbstract: In enterprise networks, idle desktop machines rarely sleep, because usersand IT departments want them to be always accessible. While some solutions havebeen proposed, few of them have been implemented even more evaluated in real

Page 50: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

50 BCI 2012 Conference Program and Abstracts

network environments. In this paper, we implement and evaluate a sleep proxysystem, based on existing proposed architecture for this Proxy.This system is tested in 6 different PC machines of a real network. The results ofthe experiments show that machines can sleep almost 55% of the experimentingtime (which is translated into energy savings) while maintaining their network ac-cessibility to user satisfaction. However, there is a need of “cooperation” betweenIT procedures and sleep proxy system in order to gain better performance and thusless dissipated energy.

6.2.5 Analyses of QoS Routing Approach and the Starvation’s Evaluationin LAN

Ariana Bejleri, Igli Tafa, Aleksander Biberaj, Ermal Beqiri and Julian FejzajAbstract: This paper gives a survey in QoS Routing Architecture implemented byDijkstra‘s algorithm. The performance of QoS Routing architecture is evaluatedby made a comparison between the Shortest Path Routing and QoS one. A veryimportant feature in QoS routing are the conditions for elimination of starvation.Experimentally we have evaluated the number of packets delivery from source nodeto destination one in QoS Routing architecture with high and low priority classesbased on ns-2 simulator.

6.3 ISR2: Information Storage and Retrieval6.3.1 Data Model for Consortial Circulation in Libraries

Danijela TešendićAbstract: This paper deals with a data model of a software system used to managelibrary patrons. This system is known as a circulation system and is usually devel-oped within a library management system. The paper discusses functionalities of acirculation system that allows circulation at the level of library consortium. Basedon these functionalities, a data model is made that contains all necessary data formanaging library users, both local users and users from other libraries within theconsortium. The presented model was used in the development of one particular cir-culation system, but consideration of the following can be useful in the developmentof any other circulation system as well.

6.3.2 Applying MDA in Developing Intermediary Service for Data Retrieval

Danijela Boberić KrstićevAbstract: In this paper, service for data retrieval from existing library managementsystem is described. This service intermediates between library management systemwhich provides data and system which requires that data. The main idea is thatthis service should support various protocols for data retrieval. Also, this serviceshould be flexible for future update and simple enough for integration into any

Page 51: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

6 PAPER ABSTRACTS – SEPTEMBER 18 51

library management system. Service presented in this paper is developed by usingModel Driven Architecture (MDA) approach. Different models (proposed by MDA)of this service are presented in this paper. Models are presented by using UML 2.0specification. Transformations from models to Java programming code are done byusing AndroMDA framework.

6.3.3 A BIBO Ontology Extension for Evaluation of Scientific ResearchResults

Bojana Dimić Surla, Milan Segedinac, Dragan IvanovićAbstract: The paper addresses the issue of semantic description of the bibliographicdata in RDF and OWL. More precisely, the paper focuses on presenting scientificresearch results together with their evaluation and quantitative expression. Theexisting ontologies that are commonly used for describing bibliographic data areDublin Core, FOAF and BIBO. The paper gives a proposal for presenting data forevaluation of scientific results as an extension of the BIBO ontology. The purpose ofthe research in this paper is going towards research management system integrationin terms of evaluation of scientific research results for individuals and institutions.

6.3.4 Collective Information Extraction using First-Order Probabilistic Mod-els

Slavko Žitnik, Lovro Šubelj, Dejan Lavbič, Aljaž Zrnec and Marko BajecAbstract: Traditional information extraction (IE) tasks roughly consist of named-entity recognition, relation extraction and coreference resolution. Much work in thisarea focuses primarily on separate subtasks where best performance can be achievedonly on specialized domains. In this paper we present a collective IE approachcombining all three tasks by employing linear-chain conditional random fields. Theusage of probabilistic models enables us to easily communicate between tasks on thefly and error correction during the iterative process execution. We introduce a noveliterative-based IE system architecture with additional semantic and collective featurefunctions. Proposed system is evaluated against real-world data set, introduced inthe paper, and results are better over traditional approaches on two tested tasks byerror reduction and performance improvements.

6.3.5 Cloud Computing Interoperability Approaches – Possibilities and Chal-lenges

Magdalena Kostoska, Marjan Gusev, Sasko Ristov and Kiril KiroskiAbstract: The Cloud Computing Interoperability (CCI) is a hot research topic andhas been addressed by many scientists, architects, groups etc. A lot of differentapproaches and possible solutions are published, but there is no accepted standardor model yet. This paper is a survey of the most influential published CCI models

Page 52: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

52 BCI 2012 Conference Program and Abstracts

and discusses their possibilities and challenges. The accent in this paper is set toanalysis of the Software as a Service (SaaS) CCI model based on adapters.The current state of the cloud computing market and the results of recent CloudComputing (CC) market surveys are also included in our analysis.The presented conclusion addresses the increasing trend in the usage of cloud com-puting and the lack of visible result to achieve cloud computing interoperability. Sothe next logical step is to create adapters to achieve interoperability at the SaaSlevel.

6.4 DIS1: Database and Information Systems and6.4.1 Privacy Aware eLearning Enviroments Based on Hippocratic Database

Principles

Jasmin AzemovićAbstract: Ensuring privacy in modern information systems is of primary importancefor the users of these environments. Use and trust of users certainly depends on thedegree of privacy.Solution for the above mentioned problems can be found in application of the „Hip-pocratic Databases – HDB concept". The idea is inspired by the basic principles ofHippocratic Oath to be applied on the databases in order to provide data privacy andconfidentiality. Implementation and advantages of this concept have been researchedfor the needs of business intelligence systems and health information systems, butnot of eLearning systems, until now.We have created a prototype model of e-learning environment that fully implementsthe principles of the HDB database. In order to prove the usability and viability ofthe model, we compared the performance of the production eLearning system withprototype model. The results of these studies are found in this research paper.

6.4.2 Insider Threats in Corporate Environments: A case study for DataLeakage Prevention

Veroniki Stamati-Koromina, Christos Ilioudis, Richard Overill, Christos K. Georgiadisand Demosthenes StamatisAbstract: Regardless of the established security controls that organizations haveput in place to protect their digital assets, a rise in insider threats has been observedand particularly in incidents of data leakage. The importance of data as corporateassets is leading to a growing need for detection, prevention and mitigation of suchviolations by the organisations. In this paper we are investigating the different typesof insider threats and their implications to the corporate environment, with specificemphasis to the special case of data leakage. Organisations should evaluate the riskthey are facing due to insider threats and establish proactive measures towards thisdirection. In response to the challenging problem of identifying insider threats, wedesign a forensic readiness model, which is able to identify, prevent and log email

Page 53: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

6 PAPER ABSTRACTS – SEPTEMBER 18 53

messages, which attempt to leak information from an organisation with the aid ofsteganography.

6.4.3 S-Suite: A Multipart Service Oriented Architecture for The Car RentalSector

Margarita Karkali, Michalis VazirgiannisAbstract: The car rental business is one with awesome budgets due to its popularityin tourism and business trips worldwide. The broker service provider model is thedominant one with the brokers searching and negotiating with several providersfor each reservation request. This implies a workload that would overwhelm theparticipating parts. Moreover reservations life cycle in the aforementioned modelis a complex process bearing exhaustive details and constraints that have to bemet until a reservation is confirmed and deployed. In this paper we propose S-Suite, a SOA architecture fully implemented and operational that mediates amongbrokers and service providers. It handles the full life cycle of reservations enablingautomatic reservation treatment incorporating the most enhanced functional featuresdemanded by brokers and service providers. The benefits of the system are multiple:a. efficiency and transparency, b. optimal matching among reservations demandsand service offers at a local level.

Computer Application in Goverment6.4.4 Growth rate analysis of e-Government development

Kiril Kiroski, Marjan Gushev, Magdalena Kostoska and Sasko RistovAbstract: This paper addresses growth rate of e-Government sophistication levelby comparing the corresponding e-Government services’ benchmarks carried out inEuropean countries. We have defined a methodology based on new indicators thatdefine growth rate of e-Government development. This analysis was initiated byextensive amount of information about sophistication level of e-Government servicesfor individual countries and is used to measure, analyze and compare the growth.We introduced two indicators: annual growth and growth period. We have alsodefined clusters about typical behavior of each indicator and show how obtainedresults define categorization.

6.4.5 Integrating Serbian Public Data into the LOD Cloud

Valentina Janev, Uroš Milošević, Mirko Spasić, Sanja Vraneš, Jelena Milojković andBranko JirečekAbstract: Linked Open Data (LOD) is a growing movement for organizations tomake their existing data available in a machine-readable format. There are twoequally important viewpoints to LOD: publishing and consuming. This article ana-lyzes the requirements for both sub-processes and presents an example of publishing

Page 54: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

54 BCI 2012 Conference Program and Abstracts

statistical data in RDF format and integrating the data into the LOD cloud via thePublicData.eu portal. In particular, it discusses the establishment of the SerbianCKAN metadata repository that serves for publishing open governmental data fromSerbia, as well as a source catalogue for the PublicData.eu portal. Furthermore, byusing an illustrative case study of the Statistical Office of the Republic of Serbia, itelaborates the adaption of the LOD2 Stack for analysis and dissemination of officialstatistics information.

7 Paper Abstracts – September 19

7.1 Workshop on Applications of Software Agents – WASA –session 1

7.1.1 Neuroevolution based Multi-Agent System for Micromanagement inReal-Time Strategy Games

Iuhasz Gabriel, Viorel Negru, Daniela Zaharie

Abstract: The main goal of this paper is the design of a multi-agent system (MAS)that handles unit micromanagement in real time strategy games and is able toadapt/learn during game play. To achieve this we adopted the rtNEAT approach inorder to obtain customized neural network topologies, thus avoiding the generationof too complex architectures. Also by defining internal and external inputs for eachagent we managed to create independent agents that are able to co-operate andform teams for their mutual benefit and at the same time eliminate unnecessarycommunication overhead. The MAS was implemented for the real time strategygame StarCraft using JADE multi-agent platform and BWAPI to ensure the interfacewith the game. We used as a baseline the in game AI and also tested it against otheradapting AI systems in order to compare their performance against our system.

7.1.2 A Set-Based Approach to Negotiation with Concessions

Costin Bădică, Amelia Bădică

Abstract: Concessions made to opponents are a well-known mechanism for self-improving your own negotiation position towards reaching an agreement in bilateraland multilateral negotiation. Probably the best well-known negotiation protocol thatemploys concessions is the Monotonic Concession Protocol (MCP). In this paper wepropose a generalization of the bilateral MCP negotiation protocol by conceptualizingagent preferences and offers using sets of deals.

Page 55: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

7 PAPER ABSTRACTS – SEPTEMBER 19 55

7.1.3 Using Jason to Develop Declarative Prototypes of Automated Nego-tiations

Alex Muscar, Laura Surcel, Costin BădicăAbstract: We propose a declarative approach for prototyping automated negotia-tions in multi-agent systems. Our approach is demonstrated by using Jason agentprogramming language to describe English and Dutch auctions.

7.1.4 GliderAgent 2.0 – Agent-Based Glider Pilot Support System for An-droid Devices

Maria Ganzha, Mariusz M. Mesjasz, Marcin PaprzyckiAbstract: Recently an agent-based system for decision support for glider pilots wasdesigned and its initial version implemented (the GliderAgent system). While it wasassumed that it will work on smart phones, its initial implementation was PC-based.In the meantime, a version of JADE agent platform for the Android system wasintroduced. The presentation will describe issues that had to be addressed for theJADE-Android to satisfy the requirements of the GliderAgent system. Furthermore,the slightly re-designed and updated version of the GliderAgent will be presented.

7.2 Workshop on Applications of Software Agents – WASA –session 2

7.2.1 Applying Saaty’s Multicriterial Decision Making Approach in Grid Re-source Management

Maria Ganzha, Marcin Paprzycki, Katarzyna WasielewskaAbstract: In the presentation we consider combining ontologically demarcated in-formation with Saaty’s Analytic Hierarchy Process (AHP) for the multicriterial as-sessment of offers during contract negotiations. The context for the proposal, isprovided by the Agents in Grid (AiG) project, which aims at development of anagent-based infrastructure for resource management in the Grid. In the AiG project,software agents representing users can either (1) join a team and earn money, or(2) find a team to execute a job. Furthermore, agents form teams, managers ofwhich negotiate with clients and workers terms of collaboration. Here, ontologicallydescribed contracts (Service Level Agreements) are the results of autonomous mul-tiround negotiations. Therefore, taking into account relatively complex nature ofthe negotiated contracts, multicriterial assessment of proposals plays a crucial role.The AHP method measures how well does an offer serve the objective of a decisionmaker. Here, we propose how the AHP method can be used to assess ontologicallydescribed contract proposals in the AiG use case.

Page 56: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

56 BCI 2012 Conference Program and Abstracts

7.2.2 New Outlook on Agent-Based Travel Support Systems

Maria Ganzha, Mariusz M. Mesjasz, Marcin PaprzyckiAbstract: The first version of the travel support system (TSS) was presentedaround 2004. Since that time, we have observed an increase in the availability andspeed of the Internet, the development of social networks and web services. Thetravel support system aims to deal with the problem of information overload andattempts at aiding travelers in finding only vital (travel-related) information. Theaim of this presentation is to present current state of the art of user profiling, cross-referencing data sources, and to discuss how the idea of the travel support systemhas evolved over the years. In this context, the initial prototype of the new TSS willbe presented.

7.2.3 Service Agents for Calendar Exchange

Magdalena Kostoska, Goran Velkoski, Krste Bozinoski, Sasko Ristov, Marjan GusevAbstract: With the emerging use of electronic calendars services on the Internetthe users are constantly increasing the number of calendar platforms they use andthe need to have them synchronized in one place is increasing. In this paper wediscuss the evolution of the electronic services for calendars, and give overview ofthe APIs they use, along with protocols and interfaces to these services.We introduce an idea to create Calendar Service Agent as a software agent in orderto exchange, modify and synchronize information about events from different cal-endar platforms. The solution is explained by protocols and patterns, as well as thestructure and architecture, and platforms included.

7.2.4 Method for Optimizing Communication Costs in ACODA Using Sim-ulated Annealing

Costin Bădică, Sorin Ilie, Mirjana IvanovićAbstract: ACODA is a truly distributed framework for Ant Colony Optimization.ACODA is heavily using message passing, so communication costs are quite high.In this paper we formulate the optimization of communication costs in ACODA as amathematical optimization problem. We analyze the feasibility of its solution usingSimulated Annealing.

7.2.5 Developing Software Agents Using Enterprise JavaBeans

Dejan Mitrović, Mirjana Ivanović, Milan Vidaković, Ali Al-DahoudAbstract: Enterprise JavaBeans (EJBs) represent one of the most widely-usedserver-side component architectures for developing the business logic of enterprise-scale applications. Because of their runtime properties, such as scalability, security,and transactional integrity, Enterprise JavaBeans are also an excellent tool for build-ing software agents. This paper outlines an architecture for developing and deployingEJB-based agents. The presented approach is designed in a way that employs all

Page 57: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

7 PAPER ABSTRACTS – SEPTEMBER 19 57

the benefits of EJBs, while, at the same time, it hides the underlying complexityfrom agent developers.

7.3 CA3: Computer Applications in Education7.3.1 International Educational Cooperation – One Possible Model

Klaus Bothe, Zoran Putnik and Betim ÇiçoAbstract: In this paper, an example of successful cooperation in the field of edu-cation is presented. As a part of an international educational project, comprisingnine countries, and fifteen universities, a "crash-course" on "Software Engineering"has been conducted at the Polytechnic University of Tirana, by a professor fromGermany and assistant from Serbia, with the unselfish help from the local professorfrom Albania. After the fifth conduction of a course, in this paper we present ourexperiences, share the knowledge gained, depict the difficulties we encountered, anddescribe the satisfaction we come upon.

7.3.2 Modeling the Characteristics of a Learning Object for Use within e-Learning Applications

George Nikolopoulos, Georgia Solomou, Christos Pierrakeas and Achilles KameasAbstract: Educational content plays a significant role in the process of deliver-ing knowledge, that’s why it needs to be designed carefully, following designatedprinciples. Learning Objects (LOs) constitute a novel approach in the educationalcontent’s organization, bearing features that if effectively used could lead to en-hanced e-learning services. What is missing from literature, though, is a commonagreement about the LO’s attributes and structure. For this reason, we initially tryto specify the main characteristics of a LO and determine its functionality, espe-cially in the context of distance education. Having realized its fundamental role inthe instructional design process, we make explicit its correlation with educationalobjectives and other aspects of learning. Finally, in an attempt to capture all LO’scharacteristics and make them utilizable by e-learning applications, we propose ametadata schema, reflecting all features of a LO, as described in this work.

7.3.3 Programming Techniques and Environments in a Technology Man-agement Department

Stelios XinogalosAbstract: Teaching and learning programming is widely known to be quite prob-lematic. Designing and deploying programming courses is also quite complex. Sev-eral choices have to made, such as selecting the first programming technique andlanguage, the sequence of programming techniques presented to students, the pro-gramming environments and the teaching approaches utilized. In this paper, therationale of the sequence of programming techniques and languages taught at aTechnology Management Department, as well as the decisions that have been made

Page 58: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

58 BCI 2012 Conference Program and Abstracts

for a smoother transition from the imperative to the object-oriented programmingtechnique in terms of the environments and the teaching approaches used are pre-sented. Furthermore, students’ replies in a questionnaire regarding their difficultieswith this sequence of programming techniques and learning programming in generalare analyzed.

7.3.4 Program Assessment via a Capstone Project

John Galletly, Dimitar Christozov, Volin Karagiozov and Stoyan BonevAbstract: This paper describes an approach that has been adopted at the AmericanUniversity in Bulgaria in order to assess the Computer Science degree program foraccreditation purposes.

7.4 DIS2: Database and Information Systems7.4.1 Correlation between Soft Organizational Features and Development

of ICT Infrastructure

Mladen Čudanov, Ivan Todorović and Ondrej JaškoAbstract: This paper aims to research interrelationships between management styleas soft organizational trait and development of ICT infrastructure in company as aprerequisite for corporate ICT adoption. Among large set of factors influencing rateof corporate ICT infrastructure development and adoption, factors of organizationalnature are neglected in literature and from practical focus. In particular, soft or-ganizational factors like managerial styles, skills, shared values or staff traits gainless attention than hard factors like organizational structure, processes or strategy,though existing research shows positive correlation between ICT adoption and softorganizational factors. Empirical background for our research is coming from caseanalysis of 78 enterprises in the Balkan countries. Theoretical background in gainedfrom previous research of connections between managerial styles, dominant manage-ment orientation and other organizational traits and adoption of ICT. Quantitativedata extracted from that analysis is calculated through Composite indicator of ICTinfrastructure, advanced version of Composite Index of ICT Adoption.

7.4.2 Challenging Issues of UCON in Modern Computing Environments

Christos Grompanopoulos, Ioannis MavridisAbstract: Usage CONtrol (UCON) is a next generation access control model en-hanced with capabilities presented in trust and digital rights management. However,modern computing environments are usually introducing complex usage scenarios.Such a complexity results in involving a large number of entities and in utilizing multiparty contextual information during the decision making process of a particular us-age. Moreover, usage control is demanded to support novel access modes on singleor composite resources, while taking into account new socio-technical abstractionsand relations. In this paper, a number of challenging issues faced when UCON is

Page 59: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

7 PAPER ABSTRACTS – SEPTEMBER 19 59

applied in modern computing environments are highlighted through the utilizationof representative usage scenarios. The results of this study are revealing variouslimitations in contextual information handling, lack to support complicated usagemodes of subjects on objects, and weaknesses in utilizing information concerningprevious or current usages of system resources.

7.4.3 Information SystemMonitoring and Notifications using Complex EventProcessing

Filip Nguyen, Tomáš PitnerAbstract: Complex Event Processing (CEP) is a novel approach how to processstreaming events and extract information that would otherwise be lost. While toolsfor CEP are available right now, they are usually used only for a limited number ofprojects. That is disappointing, because every Enterprise Information System (EIS) isproducing a high number of events, e.g. by logging debug information, and industryis not taking an advantage of CEP to make these information useful. We pick twoconcepts that seems to be from a different category – notifications – a ubiquitousway how to notify user of an EIS and EIS monitoring. With notifications we definea new abstraction upon notifications with respect to a separation of concerns tocreate a more maintainable implementation. In our research we show that this isa typical example of a possible future application of CEP and that the industryrequires specific service oriented tools that can be used for both, notifications andmonitoring. When these service oriented tools would be introduced into the industryit would promote EIS maintainability and extensibility.

7.4.4 Storing XML Documents in Databases Using Existing Object-RelationalFeatures

Dušan PetkovićAbstract: One of main research areas concerning XML documents is how to storethem. Researchers usually suggest the use of relational databases for this task.However, object-relational databases with their extended data model are better forthis purpose, because the “flat” relational model is not ideal for mapping of hierarchicstructure of XML. Several papers have been published, which describe how structuresand constraints of XML documents can be mapped to object-relational databases(ORDBs). However, their results cannot be applied in practice, because the availabletechnology is usually not aware of object-oriented concepts, which are used. Inthis paper we propose mapping rules that are practicable for existing ORDBMSs ingeneral. Specifically, we analyze object-oriented concepts implemented in an existingORDBMS (DB2) and show how XML Schema parts can be mapped to them. Wealso perform a case study to illustrate mappings according to our rules. Althoughthe paper discusses the use of XML Schema instances as metadata, existing DTDinstances can also be used, because they can be easily transformed to correspondingXML Schema documents. To our knowledge this is the first such proposition for thedatabase system mentioned above.

Page 60: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

60 BCI 2012 Conference Program and Abstracts

8 Novi Sad8.1 Public TransportationNovi Sad has a fairly well-connected network of city buses. Tickets can be bought in thebuses from the driver. The cost for all the city lines is 45 RSD (about 0.4 EUR), regardlessof the number of stations.The following bus numbers stop at the University bus station: 1, 4, 8, 9, 11A and 11B.More details about buses related to several locations are specified in later sections.Maps of the lines can be found on-line at http://www.gspns.co.rs and at most of thebus stations.

8.2 TaxiThere is a large number of registered taxi companies in Novi Sad. Start fees are around100 RSD, usually including a kilometre or so, with around 40 RSD added per kilometre.Following is a short list of some of the companies:“Beli taxi” (White taxi) +381 21 400 800, +381 62 400 800.“Gradski taxi” +381 21 400 555“Lav taxi” (Lion) +381 21 533 335“Naš taxi” +381 21 6 300 300, +381 65 300 3000“Novus” +381 21 500 700, +381 65 220 220 2, +381 800 220 220“Red Taxi” +381 21 52 51 50, +381 64 52 51 500, +381 69 52 51 500“Vip taxi” +381 21 444 000, +381 69 444 00 00, +381 66 444 000“Vojvođani taxi” +381 21 522 333

8.3 City OrientationFollowing are descriptions of some of the key locations in the city. For each of them, instruc-tions to reach the Campus are given, as well as connections with some of the other locations.

8.3.1 The Train StationThe train station (“Železnička stanica”) is simultaneously the main bus station, and there-fore one of the main points in the city.From the train station you can use bus no. 4 (45 dinars ≈ 0.4 EUR) to get to the Universitycampus, or hire a taxi (around 200 dinars ≈ 2 EUR). Please avoid taxis that are parkedimmediately in front of the train station building – they are unreasonably expensive! Go tothe parking space (paved with yellow bricks) to the left of the main entrance and hire oneof the taxis there.Walking distance to the Campus is about 3km. You should head south, down “BulevarOslobođenja” (Boulevard of Liberation), get to the Futog Market, and follow directionsfrom Section 8.3.2.

8.3.2 Futog MarketThe Futog Market (“Futoška pijaca”) is quite probably the most visited market place inthe city. It is located roughly in the geographical centre of the city.

Page 61: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

8 NOVI SAD 61

The walking distance to the Campus is about 1.5km. Head south down “Oslobođenja”Boulevard, after about 100m turn left into a diagonal street “Laze Kostića,” it will continueinto “Sremska,” and then you will get to the “SPENS” sports–business centre. Go throughit straight, across the parking lot, and you are at the Campus.Alternatively you can take the number 4 bus to the Campus, three stations away. Use thestation in “Jevrejska” (Jewish) street, south across the road from the market.

To the Cathedral and the city centre Simply follow “Jevrejska” street, you shouldbe able to soon see the Cathedral peak, it is less than 1km away.

To the Train Station Follow “Oslobođenja” Boulevard north. It ends at the trainstation, about 1.5km away. Alternatively you can use a bus – 4, 7, 10, 14, or 15.

Page 62: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

62 BCI 2012 Conference Program and Abstracts

8.3.3 The Cathedral

The Cathedral is one of the main landmarks of Novi Sad. It is right in the centre of thecity, in the pedestrian area, and it is visible from quite a distance, and is therefore a verypopular meeting place.Of course no buses pass directly next to it, but the centre bus station is near. You canget there through the “Kralja Aleksandra” (King Alexander’s) street and then through theunderpass. Buses 1, 4 and 8 drive to the University Campus, it is only two stations away.You can also go by foot to the Campus, going mostly south, through the “Modena” street,crossing the semaphore straight and following the curve of the street from there. Thedistance is about 1.5km.

To the Futog Market Head west, past the Serbian National Theatre, and continuethrough “Jevrejska” street. The distance is less than 1km.

To the Petrovaradin Fortress The Fortress lies east of the Cathedral, so there areseveral possible routes to it. The simplest is about 1.5km. First go southeast through“Modena” street, and turning left at the semaphore into “Mihajla Pupina” Boulevard.500m away is the “Varadin” (a.k.a. “Rainbow”) bridge, and you should already be able tosee the Fortress across the Danube. Alternatively you can use the number 3 bus from thecity centre.

8.3.4 Novi Sad Fair

Novi Sad Fair (Novosadski sajam) is the leading fair institution in Serbia, but it deals witha wider scope of activities than just organising exhibitions.Buses 11A and 11B go next to the Fair, and can take you to the Campus. Both of theselines are circular and follow the same route, only in different directions. It should be slightlyfaster to take the 11A bus to the Campus, and 11B when going in the other direction, butthe difference is not significant.Walking distance to the Campus is about 3.5km. It is probably simplest to go south down“Hajduk Veljkova” street (in the direction of the Hospital), turn left into “Novosadskogsajma,” and then right into “Bulevar Oslobođenja.” About 300 metres down the Boulevardis the Futog Market, so you can follow directions in Section 8.3.2.

To the train station Follow “Kralja Petra I” Boulevard about 750 metres, then turnleft into “Bulevar Oslobođenja,” and you should be able to see the train station at the endof it, about 400 metres away.

8.3.5 Petrovaradin Fortress

Petrovaradin Fortress is located in the on the right bank of the Danube river, oppositeto Novi Sad. The cornerstone of the present-day southern part of the fortress was laidon October 18, 1692. The Fortress has many underground tunnels as well (16km ofunderground counter mine system).Since 2000 it became famous as the home of the annual EXIT (http://exitfest.org)music festival.

Page 63: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

8 NOVI SAD 63

The clock tower on the fortress is one of the major landmarks of Novi Sad. It is known inthe city as the “drunken clock,” since the large needle shows the hours, and the small oneshows the minutes, which was once normal, but is opposite to the today’s standards.Buses 3 and 9 go through Petrovaradin and over the bridge to Novi Sad.If you want to go to the Campus from the Fortress, go over the “Varadin” bridge, and headsouth, following the flow of the Danube river. You should soon be able to see the Campus.The whole walk is about 1.5km. Alternatively you can use the number 9 bus.

To the Cathedral The peak of the Cathedral should be visible from the Fortress whenlooking to the west. Walking distance is about 1.5km. After crossing the “Varadin” bridge,continue down “Mihajla Pupina” Boulevard for about 500m. Then at the semaphore turnright into “Modena” street, and the Cathedral should be visible in front of you. Alternativelyyou can use the number 3 bus to the city centre.

8.3.6 City Centre Map

The city centre is an excellent place for taking a walk, any time of day. There is a verylarge pedestrian area, the main parts of it being “Zmaj Jovina” and “Dunavska” streets,expanding into a number of smaller streets and passages. They are all filled with coffeeshops, restaurants, bookstores and all kinds of other shops. Next to the pedestrian zone isthe “Danube” (“Dunavski”) park, where you can sit on one of the numerous benches andenjoy the nature while you rest.

Page 64: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

64 BCI 2012 Conference Program and Abstracts

8.4 Campus Map

1. Rectorate2. Faculty of Agriculture3. Faculty of Technology4. Faculty of Sport and Physical

Education5. Faculty of Philosophy6. Faculty of Law7. Faculty of Technical Sciences - FTN

(Fakultet Tehničkih Nauka)Amphitheatres, Classrooms- Ethno and folk dancing school“Sonja Marinković”

- Post Office8. FTN - TMD - Institute for

Computing and Automation9. FTN - Institute for Civil Engineering

10. FTN - ITC - Centre for Research andTechnology

11. FTN - Centre for Large SystemControl

12. FTN - International Graduate Schoolfor Engineering and Management

13. Faculty Of Sciences - PMF(Prirodno-matematički fakultet)

Page 65: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

8 NOVI SAD 65

14. PMF - Department of Biology andEcology

15. PMF - Department of Chemistry16. PMF - Department of Geography,

Tourism and Hotel Management17. PMF - Department of Mathematics

and Informaticsconference building

18. PMF - Department of Physics19. “Plantland” Garden Center20. Business College21. Faculty of Economics

22. Student Dormitory “Slobodan Bajić”23. Student Dormitory “Veljko Vlahović”24. Teaching Assistant Dormitory25. Student Restaurants26. Centre for Physical Education27. Student Health Center Pharmacy28. Student Sport Fields (football,

basketball, volleyball, handball,tennis)

29. “Student” Tennis Club30. New Rectorate Building (under

contruction)

8.5 On-Line Mapshttp://www.planplus.rs/?lang=en-us Interactive Web map for whole Serbia.Includes detailed street maps for most of the larger cities, and for many of the smallerones, too.http://www.openstreetmap.org/?lat=45.24478&lon=19.85298&zoom=17OpenStreetMap has very good coverage of Novi Sad. The city centre and UniversityCampus have many pedestrian routes drawn in.http://maps.google.com/?ll=45.245313,19.8531&z=18&t=hGoogle Maps also have good coverage of Novi Sad, although there are ocasionalmistakes in road connections.http://www.newdigitalvision.com/novisad/mileticsquare.htmlVirtual 360 tours around a number of locations in the city.

8.6 Wireless internetAt the conference site, free wireless Internet will be provided. You should select anyof the PMF networks that are available (“PMFFREE”, “PMF1”, “PMF2”,...). Nopassword is necessary. Eduroam network is also available. It should work straightaway, but you may need to set up your system (or Internet browser) proxy settingsto automatic. If there are problems, there is an automatic configuration script:http://wpad.pmf.lan/wpad.dat, or you can try with the following serversproxy.pmf.lan:8080 or proxy.uns.ac.rs:8080.

The City of Novi Sad also offers a free wireless network in the city centre, onthe Petrovaradin fortress and a few other places. Network: “gradnovisad”; user-name: “gost”; password: “gost”.

Many of the coffee shops and restaurants around the city offer free wireless serviceto their guests.

Page 66: BCI 2012 Conference Program€¦ · 4 BCI2012ConferenceProgramandAbstracts 4.6 ISR1–InformationStorageandRetrievaland ComputerGraphics . . . . .34 4.6.1 ...

66 BCI 2012 Conference Program and Abstracts

8.7 ContactMirjana Ivanović, General Chair, [email protected] Budimac, Program Chair, [email protected] Mitrović, Organizing Co-Chair, [email protected] Rakić, Organizing Co-Chair, [email protected]

Address:Department of Mathematics and InformaticsFaculty of Sciences, University of Novi SadTrg Dositeja Obradovića 421000 Novi SadSerbia

Phone: (+381) 21 458 888, (+381) 21 485 2852Fax: (+381) 21 6350458Conference Website: http://bci2012.bci-conferences.orgConference e-mail: [email protected] and

[email protected] Website: www.dmi.rs, www.dmi.pmf.uns.ac.rsGPS cooridinates: 45.245204, 19.851968

BCI 2012 was partially financially supported by:Provincial Secretariat for Science and Technological Development,Autonomous Province of Vojvodina, Republic of Serbia

Ministry of Education, Science and Technological Development,Republic of Serbia


Recommended