Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. 1 Feminist Leadership Judith Albino, USA The term “feminist leadership” is seen more frequently in the literature today, yet little has been done to explicate this approach to leadership. Using Warren Bennis’s analysis of various types of power that are employed in leadership and management, a case is made for feminist leadership as a general approach to management that is based on “value power.” Extrapolating from that description, the management behaviors and structures that would define a feminist leadership model will be suggested. Many of these elements are present in current, respected management theories; were they “borrowed” from feminist philosophy – or vice versa? Virtualization Layer for Automated Storage Management Zoran Babovic, IPSI Belgrade, Serbia and Montenegro The task of the virtualization layer is to provide global name space feature to the consumer of the storage with ability to move, relocate, and replicate the files, without affecting client’s view of the files. Such virtualization layer provides strong base for efficient information lifecycle management that means automatically managing data from its creation to deletion. The environment is a typical enterprise storage system that evolves pool network attached storage devices, including NAS appliances, SAN, servers and clients with shared storage. The main issue is choice of the efficient way to track the class of the storage where files reside and in the same time to provide transparent view of the file names to the client. We consider both block oriented and object based file systems, in order to solve the problem. Some topics about independency of the virtualization layer to the remaining part of system are also mentioned. International Private and Public Reinforcing Dependencies for the Innovation of Automotive Emission Control Systems in Japan and USA David Bauner, Royal Institute of Technology Stockholm, Sweden In the beginning of the 1970s, the economies of USA and Japan were growing fast. The larger, sprawling cities had suffered from pollution and congestion for some years. A number of distinctive environmental incidents and growing evidence of the negative effects of air pollution caused the respective governments to act in order to limit pollution. As passenger car emissions were found to be significant and rapidly increasing, their reduction was specially targeted. Initial steps had been taken in the 1960s, but air quality problems and increasing vehicle fleets populating the cities called for substantially reduced emissions. Investigations and entrenched political discussions resulted in requirements for the vehicle manufacturers to reduce the emissions of carbon monoxide (CO) and hydrocarbons (HC) with 90 % until 1975, and nitrogen oxides (NOx) with 90 % by 1976. These requirements were first presented in USA and soon adapted to fit in the Japanese regulatory framework, known in both countries as the "Muskie Act" or "Muskie Law" after the senator who developed the bill passed by US Congress in 1968. Advancement and Synergy Through Interdisciplinary Methods Naala Brewer, Arizona State University, USA This paper will be discussing the ever-expanding boundaries and overlapping areas of the scientific disciplines. What were once considered autonomous and complete disciplines, now share common threads of thought and rely upon each other to expand their theories. Advances in technology have created a climate for not only globalization and rich communication, but also a movement towards interdisciplinary research and unification of the scientific disciplines. The advancements and synergy that have taken place as a result of the interdisciplinary methods used today, along with potential interdisciplinary methods for the future, will be explored and discussed in this paper. Artificial Cells: Transport and Adhesion IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  2. 2. 2 Françoise Wyart Brochard, Paris University, France Vesicles decorated with proteins are used as model system to study cell adhesion, cell detachment, and transport via pores and tubes. We are also able to control the membrane permeability, by addition of proteins or surfactants. This is important for membrane fusion, exocytosis, lipidic tube formation. We also extend these studies to real cells, where the membrane is attached to the cytoskeleton. Networks of Probabilistic Processors Rais Bukharaev, Kazan State University, Russia A probabilistic automaton (PA), is a mathematical model of a probabilistic processor (PP) – a device, which is controlled by special commands and realizes certain behavior of output parameters, which are statistical stable and detarminated beforehand. The Constitutonalization of Contract Law: Something New under the Sun? Olha Cherednychenko, University of Utrecht, Netherlands Due to the sharp analytical and historical distinction between private and public law, which is common in European legal systems, contract law has traditionally been considered to be immune from the effect of constitutional rights. This traditional view has, however, been put under pressure as a result of the tendency towards the so-called constitutionalization of contract law. The idea behind this development is that contract law is not an autonomous system for dispensing justice between private parties, but that it is subordinate to the value system of the Constitution. As a result of this, the role of constitutional rights, which were conceived as an instrument for the protection of the individual against the power of the State, is no longer limited to this kind of relationship. Contractual relations have been losing their immunity from the effect of constitutional rights. In this article, an attempt is made to explain what the constitutionalization of contract law actually entails and to assess the desirability of this development. The central question to be discussed is whether by the use of constitutional rights in contract law something substantially new can be gained for the protection of the weaker contractual party in comparison with the well-established contract law concepts such as duties to inform. The answer to this question will become crystallized in the course of analysing three cases which arose in three different legal systems at the beginning of the 1990s and in which the same results were attained, though in different ways, i.e. the famous German Bürgschaft case, on the one hand, and the English O’Brien and the Dutch Van Lanschot Bankiers v Bink cases, on the other. Risk Analysis in E-business based on XML Web Sevices Aleksandra Dacić, Marijana Despotović, and Božidar Radenković, Faculty of Organizational Sciences, Serbia and Montenegro The subject of this paper is the analysis of methods and applications in software project risk management, shown through the XML Web services development. Risk management and risk analysis in it, are now, standard parts in the software development life cycle. In this paper, special attention is paid to risk analysis methods within the Microsoft Solution Framework (MSF). MSF Risk Management Process comprises the collection of models and principles which should enable efficient creation of software packages of XML Web services for solving e-business problems. R&D Outsourcing Opportunities in Novi Sad, Serbia Miroslav Despotović and Vojin Šenk, University of Novi Sad, Serbia and Montenegro Supported by an EU Tempus grant, a Science & Technology Park has been formed in Novi Sad. Besides a Technology Transfer Centre, Innovation Centre and an Incubator of high-tech companies, it encompasses IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  3. 3. 3 more than 25 R&D oriented companies, most of them emerging from University-based R&D projects, and tens of groups aiming at opening new companies if a possibility to do it would be enabled (financial, spatial, organizational, consultation etc.). Those companies, with almost 500 jobs and around 10,000,000 EUR of yearly turnover, actively seek good outsourcing opportunities in a wide area of ICT. Micro Business Solutions, Belgrade – Projects done Dusan Dimitrijevic, Serbia and Montenegro We are using latest mainstream technology and developer tools; Database servers - MS SQL Server, Oracle; Programming - MS Visual Studio .NET; Web development - ASP .NET, C#, HTML, DHTML, JavaScript, Openshop, Visual Basic .NET. Furthermore, we invest a large amount of time in developing in-house application framework, which comprises a special database access layer, web interface components, configurable business logic and various enhancements and additions to the Microsoft .Net framework. With this heavy artillery we are offering very fast response to any custom request customers may have. Simulated NVRAM journaling in ext3 file system B. Đorđević, D.Pejakov, and N. Maček, Serbia and Montenegro This paper concentrates on performance impact NVRAM journaling has over Linux ext3 filesystem. The media used in classic journaling techniques is hard disk - actually the part of the filesystem itself. Using NVRAM memory to store the filesystem journal improves overall performance. The main goal this work should achieve is analysis of performance impact due to a different journal storage media - NVRAM. All of ext3 journaling modes (journal, ordered and write back) are included in this testing. The performance is measured in using Postmark benchmark software, while NVRAM is being simulated via RAM disk, trd (trivial RAM disk). Computers and People with Mobility Disabilities Marijan Đurek and Emir Skejić University of Zagreb, Croatia University of Tuzla, Bosnia and Herzegovina Persons with mobility disabilities have limited capabilities in moving, performing manual tasks and taking participation in some life activities. Muscular dystrophy, multiple sclerosis, spinal cord injuries, head injuries, amputations, arthritis, etc., are some causes of mobility disabilities. Since that mobility impairments can significantly make tedious, even in some cases quite disable using of information technology, it is required to make adaptations that will be enabling the full communication with computers by persons with this kind of disabilities. In this article, some issues about communication between computers and persons with mobility impairments are discussed, and are presented a review of available assistive computer technology that make this communication possible. New Space Technology: 1km Tether to 100,000km Space Elevator Hironori A. Fujii Metropolitan Institute of Technology, Japan Tether technology is a very old technology used for human activity in fabric works for clothes, fishing and hunting, building, and tethering horses and dogs. The tether technology is now becoming one of new and promising technologies for human space activities as spacecraft thrusters, power generators, and important elements of space infrastructures. The present paper addresses some recent works of the author on the space tether technology applied to an aurora experiment using a sounding rocket, a space solar power satellite and a space elevator for lifting us from the Earth to space. Prediction of the Optimal Decision Distribution for the Traveling Salesman Problem Robin Gremlich, Andreas Hamfelt, and Vladislav Valkovsky University of Zurich, Switzerland Uppsala University, Sweden IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  4. 4. 4 By analysis of experiments we formulate the hypotheses and present the approach for analytical prediction of the optimal decision distribution for the large-scale asymmetric traveling salesman problem. We verify the approach by using the TSPLIB- library of best known decisions. In addition, we analyze the asymptotic behavior for prediction of the weight of the optimal decision for the traveling salesman problem and its variance. AI in Foundations of Computer Science U. Ferreira, Ufba Escola Politecnica, Brazil Formal Deductive Logic has been traditionally seen as the Foundation of Computer Science, but, as mentioned here, that is not precisely correct, for Logic has been an inseparable branch of Philosophy since Aristotle. Then, this paper presents associations between Arti_cial Intelligence and Foundations of Computer Science. Visualizing Grid Computing with Policies based upon Economic Principals Steve Halladay, Charles Milligan, and Eamonn Lavery, StorageTek USA Grid computing is a means for effectively applying and leveraging computing resources from differing geographical locations. Constructing the policies for managing large-scale Grids can be challenging. For example, how does the Grid manager determine which compute resources should be allocated to specific processes? Buyya et al. has developed Grid management strategies based upon economic principles. The policies are helpful because they are distributed and have the effects of being self-organizing. However, understanding the other effects of these policies can be challenging. One mechanism for approaching a better understanding of the results of economic policies on Grid management would be to render a representation of such a Grid visually. This paper describes a visual rendition of a model of such a Grid. The resultant visualization application uses a discrete event simulation created by Buyya to model a global Grid, coupled with a commercial visualization tool. Emotional Intelligence: Theory and Practice Valerie Hearn, Volant Executive Coaching, USA The term “emotional intelligence” became popular in the United States, especially in the business world, when Daniel Goleman’s book Emotional Intelligence was published in 1995. What is “emotional intelligence”? Is it a useful concept? How is it measured? Can the level of one’s emotional intelligence be raised? To answer these questions, the work of the major emotional intelligence researchers (Mayer & Salovey) is described and also the work of Daniel Goleman who popularized the construct. Finally, a practical method for raising emotional intelligence is presented Information Entropy in Data Mining Fred B. Holt, Panthesis Inc., USA The past ten years have witnessed a renaissance for subspace representations in data mining. For large collections of unstructured text documents, the insights and tools contributed by Latent Semantic Indexing (LSI), by Iterative Residual Rescaling (IRR), and by Text Representation Using Subspace Transformations (TRUST) improve data mining and information retrieval. One of the open problems in using subspace methods for data mining concerns the selection of the subspace. What dimension should the subspace have? If two subspaces are offered, how do we compare them for our data mining task? In this paper we explain how the concept of information entropy provides a quantitative tool for addressing these questions Self-formation in Micro-, Nano-, and Molecular Scales Stepas Janušonis, Institute of Lithuanian Scientific Society, Lithuania IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  5. 5. 5 The possibility to cover artificial object evolution in molecular, nano- and micro-scales by topological approximation, as a basis of the self-formation theory, is discussed. It is shown that such an approach can be used in self-assembly, self-organisation, self-formation of artificial systems. This is a background for simulation of artificial objects’ manufacturing technology. Chinese Calligraphic Handwriting (Shufa): A Cognitive & Health Science Henry S.R. Kao, University of Hong Kong, Hong Kong Three decades of theory-based research has established the effectiveness of Chinese calligraphic handwriting (CCH) in causing one’s cognitive activation, physiological slowdown, emotional stability, and perceptual sharpening. Successful applications of these findings have included (1) behavior changes in children with autism, ADHD and mental retardation; (2) elderly disorders in Alzheimer’s and stroke patients; (3) psychosomatic diseases in hypertension and diabetes, and (4) emotion and conduct changes in psychiatric patients. A general CCH system has been developed for users of Chinese as well as alphabetic writing systems. We are now working on an Internet model of the CCH training for global application. Conventional and Cybernized Writing Instruments Henry S.R. Kao, University of Hong Kong, Hong Kong Two categories of writing instrument designs are described that can be used to facilitate handwriting effectiveness, enhance general health and render therapeutic effects in the treatment of behavioural, psychological, mental and psychosomatic disorders. The first category comprises ergonomic improvements of conventional fountain pens and the second consists of bio-sensors embedded in the shaft of Chinese writing brushes, which feedback one’s biological activities during writing including his perceptual, emotional, cognitive and physiological conditions. Brushes with such designs help to improve one’s general health as well as to render therapeutic effects in certain specific disorders. A Study on the Encryption Techniques for Digital Right Management of MPEG-4 Video Jun-il Kim and Ki-Song Yoon, Electronics and Telecommunications Research Institute, Korea This paper presents encryption techniques for digital right management solutions of MPEG-4 streams. MPEG-4 is a format for multimedia streaming and stored in the MPEG-4 file format. We designed three kinds of encryption methods, which encrypt macro blocks (MBs) or motion vectors (MVs) of I-, P-VOPs (Video Object Planes), extracted from the MPEG-4 file format. We used DES to encrypt MPEG-4 data. Based on theses three methods, we designed and implemented a DRM solution for an Internet broadcasting service, which enabled a MPEG-4 data streaming, and then compared the results to get an optimal encryption method. WAR: What Art Represents Stephen R. Koepfer, Maimonides Medical Center, USA This paper will discuss possible roles of art and artists during times of war. Lecture attendees will gain basic understanding regarding social and psychological foundations underlying art making, it’s therapeutic uses, and ability to offer individuals as well as communities the means to integrate war and traumatic experiences into their lives. The therapeutic role of art and artists will be explored through literature review, various examples of war art, and case presentations describing the art of New York City children and their reactions to war and violence. VoIP performance on Local Area Networks IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  6. 6. 6 Anton Kos, Aleš Vugrinec and Sašo Tomažič This paper investigates the possibilities of real-time voice transmission over local area networks networks that provide no guarantees of quality of service. The network of choice is 10 Mbit/s Ethernet and voice coder of choice is G.723.1. Both are widely used. At the beginning we define the requirements for real-time voice transmission and give the basic properties of G.723.1 coder. Delay is identified as the key parameter to real-time voice transmission. Then we identify the most common simplifications that are introduced on the way to theoretical results. We present results of a bimodal delay analysis that is tailored to the transmission of VoIP frames. We identify the upper bounds of network utilisation under which the delay is within acceptable range. Next we present the measurement results for different levels of network utilisation and compare them with simulation results that matched the measured network. Results of both are very similar and demonstrate that simulations are a good tool to predict VoIP behavior on the network. Despite the fact, that theoretical results were not directly comparable with measurements and simulations, they still give good guidelines about network operation under different conditions. All three methods thus complement each other. Micro Business Solutions, Belgrade Tatjana Kovacevic, Serbia and Montenegro Micro Business Solutions is fully devoted to software production and services, offering complete IT solutions and services on a vendor-independent basis to our customers, currently numbering over 15. With our proven experience in eCommerce and outsourcing, as well as in all other IT application areas, we support our customers from timely return on investment to long-term value creation. We are proud to balance technical know-how with the ability to understand and address business issues. This all allows our customers to benefit from innovation across a wide spectrum of business fields. Optimal Control Structure Determination Using Artificial Intelligence Methods Kozák, Š. And Spišiak, M. Slovak, University of Technology in Bratislava, Slovakia The paper deals with a novel approach to automatic generation methods used to design artificial neural network (ANN) structures. ANN’s are applied in modeling and control of highly nonlinear processes. One of the most important problems is to design optimal ANN structure for real applications. In many industrial applications, optimal ANN structures are designed by heuristic approaches or determined via experiments. In this paper, two techniques for automatic finding an optimal ANN structure are proposed. They can be applied in real-time applications as well as in highly nonlinear processes. A possible approach proposed in this paper consists in using genetic algorithms (GA) to find an optimal or minimal ANN structure. The first proposed method deals with designing a structure with one hidden layer. The optimal structure has been verified on a nonlinear model of an isothermal reactor. The second algorithm allows to designs ANN with an unlimited number of hidden layers each of them containing one neuron. This structure has been verified on a highly nonlinear model of a polymerization reactor used in chemical and power industries. The obtained modeling and control results have been compared with the results yielded by a fully connected conventional ANN structure. Hamming Graphs Laurence E. LaForge, The Right Stuff of Tahoe, USA We provide a primer on Hamming graphs, and set the stage for further research into their properties. A graph is Hamming if its vertices can be labeled such that the edge distance between every two vertices equals the Hamming distance between the respective labels. A Conceptual Model of a Hi-Tech Cyberbrush for Non-Conventional IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  7. 7. 7 Graphic Production Including Calligraphy Writing : From Vitruvian Man , Penman to Feynman and “Cyberbrushman” Chong Ming Lin, Lovoltech Inc., USA This paper will describe a hi-tech cyberbrush for non-conventional graphic production. The purpose of such a device is to perform calligraphy by using knowledge-based algorithm, to emulate the functions of programmable brush, paper and ink in 3-D environment , with timing factors considered. This paper will analyze the programmability of each component near its “atomic size”, in order to design such a new graphonomic device with state-of-the art technologies. We hope this study will serve as a new attempt to bridge the gap between “the two cultures” : science and art, with the art of calligraphy as its ultimate test. Verifiable e-Voting for Trusted e-Elections Fotios K. Liotopoulos and Gerasimos Sklavenitis, Hellenic Open University, Greece One of the main concerns in implementing trusted electronic elections is to ensure the verifiability of the e- voting process, without compromising its confidentiality and vote integrity. This paper proposes a protocol and a mechanism for verifiable, confidential and secure e-voting, thus ensuring the constitutional requirement of Democracy that any election process must be trusted by the People. According to our protocol, every voter can verify the overall election results, as well as their own personal vote, by using publicly available information. This is achieved by combining asymmetric (private-public) key cryptography with a secure architectural framework. Furthermore, a protocol to ensure institutional verifiability for the administrative authorities is proposed, along with a quantitative analysis, indicating the feasibility of a national scale election system. Cognitive Effects of English Brush Handwriting: The Case of Visual-Spatial Aptitude W.S. Lui, Henry S.R. Kao,and Ann Lin University of Hong Kong, Hong Kong National Central University, Taiwan Changang Institute of Technology, Taiwan Calligraphy is simply defined as beautiful writing (Fagg, 1984). Chinese calligraphy, the writing of Chinese characters by hand through a soft-tipped brush is, for centuries, regarded one of the fine arts in China. Chinese people have used of brush writing as a means of conveying thoughts and its expression in peculiar visual forms. The study of Chinese calligraphy in the past has focused mainly on how to execute and appreciate it artistically by following the practical experiences of the great masters. In the last three decades, psychologists have investigated the psychological processes of Chinese calligraphic handwriting (CCH) from the perspectives of perception, cognition, psychophysiology, emotion and motor behaviour. Serbian ICT Cluster Opportunities Dragan Maric, Serbian Enterprise Development Project (SEDP), USAID, Serbia and Montenegro The Serbian Enterprise Development Project (SEDP) is a USAID-funded program tasked with strengthening the global competitiveness of Serbian enterprises. SEDP has identified six industry sectors, or clusters, in Serbia for their competitive potential: fruit products, tourism, furniture, pharmaceutical testing, information and communications technology (ICT), and apparel. The ICT sector in particular presents myriad opportunities for foreign clients and partners in terms of products and services development, as well as for foreign direct investment. A concise overview of the status in the Serbian ICT sector will be presented. The Application of Network Science Principles to Knowledge Simulation IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  8. 8. 8 Charles A. Milligan and Steven M. Halladay, StorageTek, USA Current approaches to knowledge representation begin with the principles of logic and ontology that Aristotle initially introduced into history. These knowledge representation approaches focus on building systems that incorporate not only computational models, but also models that people can understand and analyze. Knowledge representation fidelity requires relationship richness of both relationship types and quantities. This paper introduces a new discipline entitled simulated knowledge. Simulated knowledge differs from knowledge representation in that simulated knowledge relaxes the requirements of human understanding while maintaining the capability for human interaction and emphasizing its computational capability. Also, instead of an Aristotelian foundation, knowledge simulation principles emphasize those of the new Network Science. The Realities and Fallacies Related to Knowledge Representation Charles A. Milligan and Steven M. Halladay, StorageTek, USA Knowledge representation, the utopia of information system management, has long been a holy grail that has promised to solve many problems related to the information revolution. However, the many years of research with less than stellar results should indicate that knowledge representation is not a simple problem to solve. Stymied progress is often an indication of the need for a paradigm shift. This paper encourages this paradigm shift within knowledge representation by identifying several fallacies and truths that may impact the way researchers conceptualize knowledge representation. A Computer Program to Assist Developers in Validation and Usability Analysis of Intelligent Systems E. Mosqueira-Rey and V. Moret-Bonillo, University of A Coruña, Spain The validation of intelligent systems is a complex matter due to the lack of standard references for complex domains. Moreover, the validation phase should be followed by a usability analysis for studying the quality of man-machine interaction. The VISNU tool has been designed to assist developers in the validation and usability analysis phases of intelligent system design. The validation module includes quantitative measures (such as pair tests, group tests and agreement ratios) and facilities for planning the entire process and for interpreting the final results. The usability module includes different types of usability analysis, namely, heuristic (based on the collaboration of experts), subjective (based on the collaboration of users) and empirical (based on objective data). One of the main goals of the system developers has been to integrate different evaluation methods to obtain information which could not otherwise be obtained. A Business Architecture for M-government to Citizens Amitava Mukherjee, Agnimitra Biswas,Debashis Saha, and Kaushik Dey Royal Institute of Technology, Sweden IBM Global Services India,India Indian Institute of Management-Calcutta (IIMC), India IBM Global Services India,India In today’s world where mobile and wireless technology [1] is growing without bounds, the extension of e- government services to mgovernance seems to be not a distant reality [2]-[3]. M-Government is itself a complex business strategy for the efficient utilization of all wireless devices providing for instant availability of services and information for better benefits to users. This concept paper proposes business architecture for m- Government services to different parties like citizens, businesses and governments. This business architecture contains two guidelines namely the network architecture for m- Government and the implementation methodology for its (government’s) services to different parties particular to citizens. The implementation methodology, we propose here, will be applied with to other parties with some modifications of this methodology. This business model for m-Government services points to Indian context in few occasions as an example case to explain the fact. Abstraction and Refining Using Predicates IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  9. 9. 9 Kaninda Musumbu, Labri, France A well-known limitation of automatic verification is their applicability only to relatively small finite state systems because of exponential blow up of the models size to have constructed before the verification. process Abstraction techniques propose a way to reduce the original system to a small one, on which we can apply automatic tools. We propose a method using the abstraction of the temporal specifications of the formulas type of transition. The method is based on the analyze of thesatisfiability of abstract temporal specifications which are obtained from the concrete specifications by the abstraction of the states of the system specified. Ethics in International Business: Emerging Trends Linda Naimi, Purdue University, USA The emergence of the global economy has brought wealth and prosperity to multinational corporations and their respective countries. But it has also raised concerns about human rights and the environment. Until recently, no internationally recognized standards existed to ensure that businesses conducted themselves in an ethical, compliant and socially responsible manner. That is about to change. The United Nations, International Labour Organization and numerous international agencies have identified international standards for corporate social responsibility and ethical conduct. From the Global Compact to the International Code of Corporate Citizenship, the world is demanding ethics in international business. Semantic Web Application Models Erich Neuhold, Fraunhofer IPSI, Germany The Semantic Web and the Web service paradigm are currently the most important trends on the way to the next generation of the Web. They promise new opportunities for content and service provision, enabling manifold and flexible new applications and improved support for individual and cooperative tasks. The use of the Web service paradigm in the development of Web applications, that typically couple application databases with user dialogs, is quite obvious. The development of Web applications that can be operated effectively in the Semantic Web context (Semantic Web Applications), however, imposes some challenges. Two main challenges towards extended (conceptual) modeling support are addressed in this talk: 1) In the Semantic Web, Web applications move from a purely human user community towards a mixed user community consisting of humans as well as of software agents; This results into new requirements towards models for Web applications’ user interfaces; 2) Automatic interpretation of content, one of the main building blocks of the Semantic Web, is based on interlinking local models with globally defined interpretation schemes like vocabularies and ontologies; This has to be reflected by the conceptual application domain models of Semantic Web Applications; Conceptual Modeling for Web applications, thus, has to be revisited in the context of the new Web trends looking for adequate Semantic Web Application Models. How Significant has Women’s Contribution to the Progress of Science been? Bill Palmer, Darwin University, Australia The popular view is that the answer to the question is that women have made little contribution to science. Students, in the author’s experience, both male and female, certainly seem to believe this and the message from most of the books that they use tends to reinforce this view. This author has been interested in ‘the textbook’ for some ten years. In the field of science textbooks, women writers occupy a more prominent position than in pure science and women have greatly influenced the format of the school science textbook and the methodologies used. It may be difficult to justify research into women’s contribution to science on the grounds that so many academics have addressed these issues. A Style of Theater Production directly inspired by Interactive Data Mining Francis Rousseaux , Alain Bonardi and Romain Poncelet IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  10. 10. 10 Equipe projet SemanticHIFI de l’IRCAM Equipe IARM de l’Université Paris Stagiaire UTT à l’IRCAM In this paper, we show how traditional theatre staging can be considered as based on a formal approach of similarity. It uses a dramatic ontology and instantiation variations. Drawing our inspiration from the opposite approach through interactive data mining, we hereby account for theatre researches using computers as actor partners to escape a priori specification. Space-time Fluctuation and Dynamic Geometry in Brain Function Sisir Roy, Indian Statistical Institute, India Pellionisz and Llinas proposed the concept of functional geometry to understand the internal representation of the events associated to space-timing of moving objects in the external world. The concept of simultaneity plays significant role to construct this kind of functional geometry for the internal world. Here, the simultaneity concept seems to be different than that prevailed in modern physics. The conduction speeds through various axons for any external stimulus are different. There exists time delay for the same external stimulus and hence the concept of simultaneity is hardly realizable. However, it is well known that brain takes 10−14ms as the ”quanta” of time or minimum time to cognize an event. As the time delay lies within this time interval, the concept of simultaneity has been shown to be valid from the operational point of view and hence the joint representation of space and time is realizable in brain function. The geometric structure of functional geometry is shown to be five dimensional fluctuating space-time whereas the usual Minkowski space-time is a subspace of that. Here, the space-time can accommodate the infinite possibilities of configurations even for the same load associated with muscular movement. The CNS chooses one of these infinite possibilities and we call this kind of functional geometry as Dynamic Geometry. This will shed new light on Tensor Network theory (proposed by Pellionisz and Llinas and the developments of artificial intelligence. Data Assurance in a Conventional File System Sasa Rudan, Aleksandra Kovacevic, and Charles Milligan IPSI Belgrade, Serbia and Montenegro StorageTek, USA The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goal is a smart card based DSFS (Digital Sealed File System). The main idea is to send only the hash value of a document to the SmartCard together with the unique document identification. After creation of public/private key pair and hash value encryption, SmartCard destroys private key. This yields a final signature and public key as output. Therefore, sending confidential key material from SmartCard to a system is completely avoided. Since hash value is small data, limited bandwidth to the card for transferring large documents for encryption is not a problem. However, there are some possible drawbacks of the proposed idea. An attacker is able to circumvent the signing process in SmartCard and to act as SigningTool. Moreover, publishing of public key is the issue of the DSFS architecture and public key distribution is too complex and unreliable solution. Here we describe a possibility of overcoming these problems. Purdue University’s Discovery Park Charles O. Rutledge, Purdue University,USA IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  11. 11. 11 The mission of Discovery Park is to provide Purdue University with facilities, leadership and systems that transcend traditional academic boundaries, fostering an innovative interdisciplinary environment for learning, discovery and engagement that leads to intellectual excitement, scientific achievement, and economic growth. Innovative interdisciplinary efforts will lead science, shape and engage industry, change the way people work and improve the quality of life. Activities of six centers of excellence representing nanotechnology, bioscience, e-enterprise, learning, advanced manufacturing, and entrepreneurship will be highlighted. Discovery Park excels in developing expertise in engineering and technology to address complex questions in the physical and biological sciences. Logic for Authentication Protocol Analysis Kok Wei Shiung and Hiew Pang Leang, Malaysia Most authentication protocol analysis method adopts inductive paradigm. Existing logics, such as BAN logic and its variants focus on proving the correctness of a protocol. Inspired by Millen and Shmatikov’s constraint-solving approach and BAN logic, we present a new method for analysing cryptographic protocols. Unlike traditional methods, the proposed method applies deductive approach, focusing on the capabilities of intruder instead. The proposed method utilizes evidences from messages exchanged to show the intruder able to access the protocol. Each steps of the analysis will indentify the necessity of applying encryption to an element, hence increase efficiency of the security protocol. In this paper, we describe the semantic of proposed method and provide a compare of the results of preliminary analysis with existing methods. Criteria for Deciding the First Programming Language for Novices Yuh-Huei Shyu, Tamkang University, Taiwan Program-first” is a popular approach to teach introductory computer science. Current decision on the first programming language is mainly based on theoretical aspects. Common used strategies can be classified into three types: imperative-first, or functional-first, or object-first. Based on the adopted strategy, the first programming language is then decided. No matter which language is chosen, educators often encounter the same problem, namely, the problem of high withdraw-or-fail rate. This problem indicates the waste of education resources. For these failed students, subsequent programming trainings are meaningless. We wonder that the phenomenon of high withdraw-or-fail rate has something to do with the selected language. In this paper, we will consider the problem of deciding the first programming language. Instead of deciding it from theoretical aspects, we shall consider it from reality aspect. We then propose criteria for deciding the first programming language. According to our criteria, BASIC language is the best first language for novices. BASIC has many good features that are often neglected. Simple Web Interface to LDAP Directories J. Sodnik and S. Tomazic, University Ljubljana, Slovenia Lightweight Directory Access Protocol is a communication protocol which enables the access to online directories. As it is the case with the majority of free client software, the user is merely able to explore the directory, but can not change its content. Revisiting Some Issues on the Role of Technology in E-Learning Vladimir Srdanović, Center for Multidisciplinary Studies, Serbia and Montenegro Some potentials and limitations of E-learning are examined, as they vary across disciplines. We argue that E-learning is likely to be more successful in disciplines where the role of well-structured knowledge and reasoning is predominant. However, some limiting factors emerge in disciplines where decision making that requires more complex information processing is involved. Also, when it comes to learning certain skills and/ or exhibiting performance knowledge, limitations are encountered that are not likely to be overcome by improving on present technology only. In other words, the role of direct personal interaction between student and instructor emerges as a crucial one in some cases. On the other hand, academic environment IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  12. 12. 12 itself seems to play an important role in motivating students. It is therefore important to find the proper balance and make optimal use of available technology for E-learning. MIT’s OpenCourseWare and European Credit Transfer System (ECTS) initiatives address some of the issues discussed, and point to possible directions for solving them. Neurilemom of Parafaringeal Region Katarina Stankovic, Dejan Stefanovic, Zoran Ivankovic, Ranko Dergenc, Rade Kosanovic, and Jovic Marko, Serbia and Montenegro Tumors of Parafaringeal region present about 0.5% of all head and neck tumors. They present one of the most important problems in otorhynolaringological practice because of their anatomical area, neuro-vascular content, difficult diagnostic and adequate surgical tehnique. Head and neck neurilemomas present 25-30% of all neurilemomas This is a case report about patient M.D.(51 year old) that was accepted on ENT Departmant because of well at the right side and a sense of strange body in her throat. Swell appeared 4 years ago, it was growing slowly and the sense of strange body in her throat appeared 6 months ago. Project Managment in Construction Using the Internet Simo Sudjic, Gemax, Serbia and Montenegro Project management in construction, on the level of high system (companies), is extremely complexed process for which function the powerful base of dates are necessery and there continual and exact distribution too. Construction projects are often geographically far from the head quarters even in the other continents, so the Internet nowadays is used as tool for managing those projects. There are more program packages which are used for project managing, and one of these is Primavera project planner for the enterprise, which is used for managing projects on the companies level and it completely provides comunication through Internet all the members on the projects. One construction project is presented in that paper, which is being done on the other continent, from the planning phase, the control of progress and managing, and all the steps which were realised are connected to using the Internet. Towards an Interoperable Information Architecture R. Summers, J. Chelsom, N. Dinsey, A. Zisman, S. Katz Dept. Information Science, Loughborough University, UK. CSW Informatics Ltd., Oxford, UK. Dept. Computing, City University, London, UK. UN FAO, Rome, Italy. An interoperable information architecture is facilitated by the use of web services and XML technologies. This paper describes a further feature – the XML information bus, as a key component for interoperability. To illustrate the benefits and drawbacks of the approach, the information architecture has been applied to the United Nations Food and Agriculture Organisation. Prospects for transferring the knowledge technologies to other domains, principally pharmacogenomics and drug discovery, are discussed. Gaussian Pulse in Ultra-Wide Band Communications Rudolf Susnik and Saso Tomazic, University of Ljubljana, Slovenia Ultra-Wideband (UWB) technology has been gaining increasing interest from the industry due to its recent application in communications. The technology itself has been well known for decades and its use was mostly reduced to radars in industrial applications. Expertise Overview of Communication Software Laboratory at the University of Novi Sad Vojin Šenk and Miroslav Despotović, University of Novi Sad, Serbia and Montenegro IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  13. 13. 13 The Communication Software Laboratory designs and prototypes all types of communication software. That includes software development for PC-based platforms (Win32, Linux) and embedded platforms (TI, Motorola, ARM, Symbian). Our expertise includes Protocols for communication networks, Channel coding, Speech and Picture processing, as well as software in the general framework of Digital communications. We have developed a number of communication protocols for different types of networks like: Wireless (GPRS), Ethernet, Digital Transmission (E1/E2), etc. Regarding Channel coding, we are experts in both current and leading-edge FEC technology (such as turbo codes and coding for Partial-response channels), while standard convolutional and block codes are our routine. Abstract to Reality: Developing Educational Games With A Group of Design Students (Non-Programmers) Lim Kai Teng , Garfield Toro, Professor Hazel Gamec Wanganui School of Design New Zealand This paper outlines the processes and outcomes of a 48-hour project by computer graphic design students, to develop an educational game concept. Hosted by the Wanganui School of Design and supported by New Zealand Trade and Enterprise, the project focused on developing New Zealand as a creative hub for Asia- Pacifica. The Wanganui School of Design is a world leader in creative, interactive multimedia design. It also acknowledges the importance of play in life-long learning, values games as an educational tool and recognizes games as a key growth market for computer graphic design. On Optimality of Quadrature Amplitude Modulation Saso Tomazic, University of Ljubljana, Slovenia This paper demonstrates that for transmitting data over a strictly band-limited transmission channel of bandwidth B quadrature amplitude modulation at symbol rate r=2B is optimal with regard to information throughput. In accordance with the sampling theorem any band limited signal can be uniquely represented with 2B samples per second and reconstructed using reconstruction circuit which is in fact a generic QAM modulator. Band limited signals produced with any other modulation technique can thus also be obtained using a QAM modulator. Advanced Manufacturing Centers Support Sustainable Economic Growth Mileta M. Tomovic, Purdue University, USA Industrial competitiveness and economic growth strongly depend on cooperation between universities, laboratories and industry. Achieving good relationships provides a basis for sound applied research and ascertains faster deployment of scientific discoveries and technological developments, which in turn result in strong economic base capable of supporting knowledge creation. Hence, resulting in sustainable economic growth. Manufacturing is a cornerstone of every economy and foundation of wealth creation, by providing above average salaries to local communities. Transmission Gain of Multicarrier Modulation Anton Umek, University Ljubljana, Slovenia The paper presents the results of research in the field of digital signal transmission on a metal twisted pair. The principal goal is to determine the information rate gain of multicarrier transmission system. In order to compare information rates we selected several transmission system models: coded and uncoded multicarrier and baseband transmission. A multicarrier transmission gain is explained also with a simple two-band channel example. Development of a Fiber-Optical Microphone to be Used in a Totally Implantable Hearing Aid (TIHA) Aleksandar Vujanic, Sladjan Mitic, Zoran Djinovic, Dusan Vujanic, Robert Pavelka, Milos Tomic,and IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  14. 14. 14 Matthias Cordes Vienna University of Technology, Austria Schwerpunktkrankenhaus Wr.Neustadt, Austria Security Institute Belgrade, Serbia-Montenegro Integrated Microsystems Austria, Austria This paper describes an interdisciplinary approach in development of a microphone, which is based on low coherence fiber-optical vibrometry and intended to be used in a Totally Implantable Hearing Aid (TIHA). Three major issues have been studied in the project: optoelectronics including sub-nanometer resolution optical measuring principle and low-power electronic driving and data-processing unit, surgical implantation technique including miniature implantable mechanical holding and adjusting system, and suitable implantation tools, as well as biocompatibility problems. An overview of performed activities and obtained results, as well as of the further R&D activities is given. Are We Going Towards Artificial Man? Humanoid Robots: Past, Present State and the Future Miomir Vukobratović, Mihailo Pupin Institute, Serbia and Montenegro Rapid development of humanoid robots brings about new shifts of the boundaries of Robotics as a scientific and technological discipline. New technologies of components,sensors, microcomputers, as well as new materials, have recently put up the barriers to real-time integrated control of some very complex dynamic systems such as humanoid robots are, which already today possess about fifty degrees of freedom and are updated in microseconds of controller signals. In view of the above statements, the work for the first time raises the essential question on the justifiability of increasing the number of degrees of freedom of humanoid robots, having in mind that for the overall skeletal activity man has at its disposal roughly about 650 muscles of human body which could be approximately expressed by more than three hundreds equivalent degrees of freedom, i.e. the same number of biological actuators. Bringing Semantics to Pharmacogenomics Hiten Vyas and Ron Summers, Loughborough University UK Effective knowledge management of the pharmacogenomics discipline presents many challenges when compared to other ‘omic’ studies such as genomics and proteomics. For instance, there are different approaches to pharmacogenomics and different high-throughput methods are used that produce data that are highly variable. Conversely what makes pharmacogenomics unique is the need for effective management and integration of phenotypic data (that is molecular, cellular and clinical data) along with genotypic data. This paper will explore data, information and knowledge management issues associated with pharmacogenomics.. Choosing International Vendors: Contextual Considerations M. Wisma, C. Tomovic, L. Naimi, Purdue University, USA Today, problems associated with vendor selection and the management of vendor relationships has been identified as factors that negatively impact multinational performance and economic growth. It is purported that while factors related to logistics and distribution are important when selecting international vendors, they are inadequate when considered in isolation. IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  15. 15. 15 Talented Students Forum Abstracts IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  16. 16. 16 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  17. 17. 17 Simulation Language - CSMP 2004 Milos Blagojević , Kostandin Dimitrijević , Goran Milosavljević , Božidar Radenković Faculty of Organizational Sciences, University of Belgrade Program for Simulation of Continous Systems CSMP. In this paper we described a program for simulation of continous systems up to 25th order. The control of the program flow is achiewed by the command language vith a visual representation of the commands. this program is written in Borland® Delphi™ version 7 as our primary implementation tool and suited for ease use on the personal computers. Achieving knowledge interoperability: An XML/XSLT approach J. Jovanović, and D. Gasević Faculty of Organizational Sciences, University of Belgrade Development of an intelligent system requires not only profound understanding of the problem under study, but also employment of different knowledge representation techniques and tools that are often based on a variety of paradigms and technological platforms. In this context automatation of knowledge sharing between different systems becomes increasingly important. One solution might be to extend a knowledge modeling tool by implementing a set of new classes or functions for importing other knowledge formats (using e.g. Java, C++, etc.). But, this can be a rather difficult and time consuming task. Since XML is now widely accepted as knowledge representation syntax, we believe that a more suitable solution would be to use eXtensible Stylesheet Language Transformation (XSLT) a W3C standard for transforming XML documents into either other XML or regular text documents. Product Specification: The GOout! System Ivan Kolarov, Damjan Tomić, Đorđe Milovanović, Borko Kovačević, Marijana Despotović Faculty of Organizational Sciences, University of Belgrade The purpose of this specification is to introduce the reader with every technological aspect of the GOout! System, as well as the commercial side of the product. It consists of basic product overview with some specifics regarding technical details and implementation issues. Case Study: Mobile Commerce Application Usability Miroslav Minović and Velimir Štavljanin Faculty of Organizational Sciences, Belgrade University This paper presents research results on usability of mobile application designed for sales. Application functionality and user interface quality of design has been tested using methods of cognitive walk- troughs and focus group with end users in lab environment. Further research in this areas are desireable in order to improve usability of mobile commerce applications. Anti-Spam Filter SpamGuru Tanja Petrovic, School of Electrical Science, Belgrade, Serbia and Montenegro The anti-spam filter SpamGuru mirrors the philosophy of attacking the Spam problem on multiple fronts, by incorporating several different filtering technologies and intelligently combining their output to produce a single spamminess rating or score for each incoming message. This paper describes the newest and the most powerful of all the algorithms used in SpamGuru: Chung-Kwei algorithm, for which the current prototype achieved a sensitivity of 96.56% whereas the false positive rate was 0.066%. Advanced IPSI Research and Development in Infrastructure for E-Business on the Internet IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  18. 18. 18 Aleksandar Stojanovski, Ivan Markovic , Aleksandar Stanic, Bojana Malisanovic, Miroslav Radakovic, Ivan Toskov, Andrija Bosnjakovic, Sinisa Rudan, Jelena Krunic, Aleksandra Jankovic, Zoran Babovic, Tanja Petrovic, Darko Jovic, Damjan Vujnovic, Nenad Korolija, Sasa Rudan, Aleksandra Kovacevic, Sanida Omerovic, Ivana Vujovic, Milos Cvetanovic, and Veljko Milutinovic This presentation gives an overview of the most recent R+D in the field of infrastructure for e-business on the Internet, with special emphasis on the activities of the graduate students of the School of Electrical Engineering, University of Belgrade. This is an overview. Details can be found in about 40 papers published recently or accepted for publication in 40 different IEEE journal papers. The total number of graduate students working on all R+D projects together is about 100; the list of authors includes only those working on the ongoing projects. IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  19. 19. 19 IPSI Award Abstracts IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  20. 20. 20 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  21. 21. 21 TV is Dead – Long Live the WEB (SSGRR-2000) Harold Kroto, Nobel Leaurate, University of Sussex, UK Science, Engineering and Technology are as vital to our intellectual and cultural development (particularly our children’s) as they are to our training to get along in the Modern World. Some efforts to redress the problems involved in the general Public awareness and understanding of science and engineering (PAUSE) issues are being initiated via the Vega Science Trust (, which aims to take advantage of the revolution in TV and Internet communications technology to improve matters. The best scientists and science communicators are being recorded and the programmes are being broadcast on BBC-TV and the Internet. Furthermore School/University outreach programmes are being developed and Vega is piloting ways in which members of the Science, Engineering and Technology (SET) community can, as individuals and groups, make important contributions. Excerpts from SET programmes will be presented. These efforts present a perspective on SET which places the cultural factors in the foreground and focuses on the intrinsic charisma of science which is hidden from many. It is now cruical that the society in general and the scientific community in particular accept that serious problems are involved in communicating science and the Internet is set to play a major role. Before the invention of the printing press there was only one book in the west – the bible – and it was hand-written by monks. After the invention the printing press book – writing and reading was democratized and this was truly the beginning of general education. In a similar way the birth of the Internet has democratized broadcasting – the broadcasting channels no longer control the dissemination of recorded material – individuals and groups of individuals can now do it themselves and so the Internet has enabled broadcasting to fulfill the promise it has always had – to be a superb educational medium. Electronic Business and Education (SSGRR-2001) Bob Richardson, Nobel Laureate, Cornell University, USA There is no longer any question that the Internet and electronic communication are the major new tools for collaborative advances in the creation of new knowledge and in future learning. There are countless examples of highly successful professional courses taught on the Internet. Similarly, international and multidisciplinary collaborations in scientific research based upon little contact other than through electronic communication dominate the scientific literature. Perhaps the most profound examples of distance collaboration in science are found in astronomy. The Hubble telescope has permitted astronomers to gather breathtaking images from the most remote observatory imaginable – one in orbit around the earth. A significant challenge remains. The challenge is to devise a remote mode for nonverbal communication about difficult concepts. In the shared creation of new ideas and knowledge, facial expressions and body gestures frequently play an important role in peer interactions. As the speed and bandwidth of electronic communication increase, we have the prospect that the important elements of human contact can be imitated. Without the development of sympathetic peer or mentor relationships, distance learning will remain quite sterile. IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  22. 22. 22 E-Business and E-Challenges (SSGRR-2002) Jerome Friedman, Nobel Laureate, MIT, USA The development of Homo sapiens has been a history of innovations, from the earliest crude tools to the modern technological society of today. The growth of science and technology has been exponential during the last century; and under the right circumstances, this rapid growth can be expected to continue. The major innovations of the future - those that will shape the society of the future - will require a strong foundation of both basic and applied research. It is ironic that quantum mechanics, one of most abstruse conceptual frameworks in physics - one that was developed to explain atomic spectra and the structure of the atom, lies at the foundation of some of our most important technological developments, because it provided the understanding of semiconductors that was essential for the invention of the transistor. Quantum mechanics thus contributed directly to the development of technologies that gave us world wide communication, computers with their applications to all phases of modern life, lasers with many diverse uses, consumer electronics, atomic clocks, and superconductors - just to mention a few. The internet and the World Wide Web, which are profoundly reshaping the way that we communicate, learn, and engage in commerce, owe their origins in a deep sense to the physicists of the past who worked to understand the atom. In modern industrial nations, quantum mechanics probably lies at the basis of a sizable fraction of the gross national product. This is but one example, and there are many others in all areas of science that demonstrate this point. It is clear that innovation is the key to the future and the human drive to understand nature is the key to future innovation. Society must do all that it can to preserve, nurture and encourage curiosity and the drive to understand. The Next Generation of IP – Flow Routing (SSGRR-2003) Lawrence G. Roberts, Father of the Internet, USA For the last 33 years IP routers have not changed, they still support only “best effort” traffic. However, the bandwidth available to people has been increasing rapidly with the advent of broadband access. The result is that many new services are now desired that require far better QoS than “best effort” IP can support. Also, with broadband, the problem of controlling the total usage and carrier expense has become important. Thus, it has become critical to improve both the delay performance and the control of bandwidth for IP service, much as was accomplished in ATM. Also, call rejection for high bandwidth streaming services like video is required instead of random discards if quality is to be maintained. All these problems can be solved with no change to TCP/IP by routing flows rather than packets. This requires keeping some state information for the duration of the flow, but this information can be captured on the fly as the first packet goes by. This permits an IP flow router to achieve all the capabilities of an ATM switch, but without the call setup delay and at a lower cost than a conventional IP router. Number and Organization of Primary Memory Objects in the Brain (IPSI-2004 Montenegro) P.G. de Gennes, Nobel Laureate, College de France A memory area contains a large number(N ~10 ) of neurons, each of which is connected with ma neighbors (number of efferents:Z ~104). But the connections are poor: the probability for one connection to be efficient is p ~10-2. This is important: different memory objects must be independent. We discuss how a definite memory object can be stored on a cluster of well connected neurons, and what is th statistics of these clusters. IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  23. 23. 23 The average number M of neurons per cluster is contained within two limits: if M is too small, the memory is not faithful. If M is too large, the storage capacity is too small. Various consequences of this picture will be presented. Author s IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  24. 24. 24 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  25. 25. 25 Judith Albino 9 Spišiak M. Slovak 14 Ron Summers 20, 22 Zoran Babovic 9 Laurence E. LaForge 14 J. Chelsom 20 David Bauner 9 Chong Ming Lin 15 N. Dinsey 20 Naala Brewer 9 Fotios K. Liotopoulos 15 A. Zisman 20 Françoise W. Brochard 10 Gerasimos Sklavenitis 15 S. Katz 20 Rais Bukharaev 10 W.S. Lui 15 Rudolf Susnik 20 Olha Cherednychenko 10 Ann Lin 15 Lim Kai Teng 21 Aleksandra Dacic 10 Dragan Maric 15 Mileta M. Tomovic 21 Marijana Despotovic 10, 25 E. Mosqueira-Rey 15 Anton Umek 21 Božidar Radenkovic 10 V. Moret-Bonillo 16 Aleksandar Vujanic 22 Miroslav Despotovic 11, 21 Amitava Mukherjee 16 Sladjan Mitic 22 Vojin Šenk 11, 21 Agnimitra Biswas 16 Zoran Djinovic 22 Dusan Dimitrijevic 11 Debashis Saha 16 Dusan Vujanic 22 B. Ðordevic 11 Kaushik Dey 16 Robert Pavelka 22 D.Pejakov 11 Kaninda Musumbu 17 Milos Tomic 22 N. Macek 11 Linda Naimi 17, 22 Matthias Cordes 22 Marijan Ðurek 11 Neuhold Erich 17 Miomir Vukobratovic 22 Emir Skejic 11 Bill Palmer 17 Hiten Vyas 22 Hironori A. Fujii 11 Francis Rousseaux 18 M. Wisma 22 Robin Gremlich 12 Alain Bonardi 17 C. Tomovic 22 Andreas Hamfelt 12 Romain Poncelet 17 Milos Blagojevic 25 Vladislav Valkovsky 12 Sisir Roy 18 Kostandin Dimitrijevic 25 U. Ferreira 12 Sasa Rudan 18 Goran Milosavljevic 25 Steve Halladay 12, 16 Aleksandra Kovacevic 18 Božidar Radenkovic 25 Charles Milligan 12, 16, 17 Charles O. Rutledge 19 J. Jovanovic 25 Eamonn Lavery 12 Kok Wei Shiung 19 D. Gasevic 25 Valerie Hearn 12 Hiew Pang Leang 19 Ivan Kolarov 25 Fred B. Holt 12 Yuh-Huei Shyu 19 Damjan Tomic 25 Stepas Janušonis 13 J. Sodnik 19 Ðorde Milovanovic 25 Henry S.R. Kao 13, 15 Saso Tomazic 19, 21 Borko Kovacevic 25 Jun-il Kim 13 Vladimir Srdanovic 19 Miroslav Minovic 25 Ki-Song Yoon 13 Katarina Stankovic 20 Velimir Štavljanin 25 Stephen R. Koepfer 13 Dejan Stefanovic 20 Tanja Petrovic 25 Anton Kos 14 Zoran Ivankovic 20 Harold Kroto 29 Aleš Vugrinec 14 Ranko Dergenc 20 Bob Richardson 29 Sašo Tomažic 14, 21 Rade Kosanovic 20 Jerome Friedman 30 Tatjana Kovacevic 14 Jovic Marko 20 Lawrence G. Roberts 30 Š. Kozák 14 Simo Sudjic 20 P.G. deGennes 30 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  26. 26. 26 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  27. 27. 27 Schedul e IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  28. 28. 28 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  29. 29. 29 4. October: 10:15 - 11:15 Speakers Meet Chairman (Casino) 11:15 - 12:45 Opening Ceremony (AboveCasino) Welcome Addresses: Prof. Dr. Nikola Hajdin President of Serbian Academy of Arts and Sciences Prof. Dr. Momir Djurovic President of Montenegro Academy of Arts and Sciences Prof. Dr. Miomir Vukobratovic President of Academy of Engineering Sciences of SCG Prof. Dr. Dejan Popovic Rector of Belgrade University Prof. Dr. Ljubisa Stankovic Rector of University of Montenegro Prof. Dr. Bozidar Radenkovic President of IEEE Computer Chapter of SCG Prof. Dr. Nebojsa Uskokovic Dean of Electrical Engineering, University of Montenegro Prof. Dr. Vojo Lekovic Dean of Stomatology, University of Belgrade Prof. Dr. Branko Kovacevic Dean of Electrical Engineering, University of Belgrade Special Welcome Address: (5.10.2004. @ 14h) Mr. Milan Todorovic, General Director, Zdravlje Leskovac, An Actavis Company, SCG IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  30. 30. 30 (6.10.2004. @ 14h) Serbian Scientific Society Belgrade, SCG 13:00 - 14:30 17:15 - 18:45 New Space Technology: Semantic Web Application 1km Tether to 100,000km Models Space Elevator Erich Neuhold Hironori A. Fujii Fraunhofer IPSI Metropolitan Institute of Technology Germany Japan Purdue University’s Information Entropy in Discovery Park Data Mining Charles O. Rutledge Fred B. Holt Purdue University Panthesis Inc. USA USA Advanced Manufacturing Visualizing Grid Centers Computing Support Sustainable Eamonn Lavery Economic Growth Flexsim Corp. USA Mileta M. Tomovic Purdue University USA 19:00 - 21:00 School of Electrical Engineering, University of Belgrade: Current Status and Future Trends Branko Kovacevic University of Belgrade Serbia and Montenegro Serbian ICT Cluster Opportunities Dragan Maric IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  31. 31. 31 Serbian Enterprise Development Project (SEDP/USAID) Miomir Vukobratovic Serbia and Montenegro Serbian Academy of Arts and Sciences Artificial Man Serbia and Montenegro 5. October: 10:15 - 11:45 12:00 - 14:00 Prediction of the Optimal Issues in Constraints Decision Distribution for Programming the Travelling Salesman Andreas Hamfelt Problem Uppsala University Sweden Robin Gremlich, Andreas Hamfelt, and Vladislav Valkovsky The Application of University of Zurich, Switzerland Network Science Principles Uppsala University, Sweden to Knowledge Simulation Hamming Graphs Charles A. Milligan and Steven M. Laurence E. LaForge Halladay The Right Stuff StorageTek USA USA Towards an Interoperable Revisiting Some Issues on Information Architecture the Role of Technology in R. Summers, J. Chelsom, N. Dinsey, E-Learning A. Zisman, S. Katz Loughborough University, UK Vladimir Srdanovic Vladimir City University, UK Serbia and Montenegro UN FAO, Italy Risk Analysis in E- business based on XML Web Sevices Bozidar Radenkovic and Marijana Despotovic Faculty of Organizational Sciences, University of Belgrade, Serbia and Montenegro IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  32. 32. 32 17:15 - 18:45 19:00 - 21:00 VoIP Performance on Etnics in International Local Area Networks Business: Emerging trends Anton Kos, Aleš Vugrinec and Sašo Linda Naimi Tomažič Purdue University University of Ljubljana USA Slovenia The Constitutionalization Siple Web Interface to of Contract Law: LDAP Directories Something New under the Sun? J. Sodnik and S. Tomazic University of Ljubljana Olha Cherednychenko Slovenia University of Utrecht The Netherlands Choosing International A Business Architecture Vendors: Contextual for M-Government Considerations Services to Citizens M. Wisma, C. Tomovic, L. Naimi Amitava Mukherjee Purdue University Royal Institute of Technology USA Sweden Project Managment in the Construction Using the Internet Simo Sudjic Gemax Serbia and Montenegro IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  33. 33. 33 6. October: 10:15 - 11:45 12:00 - 14:00 TehnicomNet - An Bringing Semantics to Overview of Current Pharmacogenomics Research Hiten Vyas and Ron Summers Loughborough University Petar Kocovic UK TehnicomNet Serbia and Montenegro Development of a Fiber- The Realities and Fallacies Optical Microphone to be Related to used in a Knowledge Totally Implantable Representation Hearing Aid (TIHA) Charles A. Milligan and Steven M. Halladay Aleksandar Vujanic, Sladjan StorageTek Mitic, Zoran Djinovic, Dusan USA Vujanic, Robert Pavelka*, Milos Tomic, and Matthias Cordes International Private and Vienna University of Technology, Public Reinforcing Schwerpunktkrankenhaus Dependencies Wr.Neustadt, Integrated For the Innovation of Microsystems Austria, Wr.Neustadt, Austria Automotive Emission Safety Institute Belgrade, SCG Control Systems In Japan and USA Self-Formation in Micro-, Nano-, and Molecular David Bauner Royal Institute of Technology Scales Stockholm, Sweden Stepas Janušonis Institute of Lithuanian Scientific Society, Lithuania Data Assurance in Conventional File Systems Aleksandra Kovacevic IPSI Belgrade Serbia and Montenegro IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  34. 34. 34 19:00 - 21:00 Emotional Intelligence: 17:15 - 18: 45 Theory and Practice Valerie Hearn Gaussian pulse in Ultra- Volant Executive Coaching Wide Band USA communications Feminist Leadership Rudolf Susnik and Saso Tomazis University of Ljubljana Judith Albino Slovenia USA Transmission gain of WAR: What Art multicarrier modulation Represents Anton Umek Stephen Koepfer University of Ljubljana Maimonides Medical Center Slovenia USA On Optimality of How significant has Quadrature Amplitude women’s contribution to Modulation the progress of science been? Saso Tomazic University of Ljubljana Bill Palmer Slovenia Charles Darwin University Australia 7. October: IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  35. 35. 35 10:15 - 11:45 New Zealand Number and organization 12:00 - 14:00 of primary memory objects in the brain Abstraction and Refining P.-G. de Gennes Using Predicates University of Paris France Kaninda Musumbu, Labri, France A Computer Program to Assist Developers in Virtualization Layer for Validation and Usability Automated Storage Analysis of Intelligent Management Systems Zoran Babovic IPSI Belgrade E. Mosqueira-Rey and V. Moret- Serbia and Montenegro Bonillo University of A Coruña Micro Business Solutions, Spain Belgrade - Innovative web Abstract to Reality: programming Developing Educational Tatjana Kovacevic Games Serbia and Montenegro With A Group of Design Students (Non- Micro Business Solutions - Programmers) Projects Done Lim Kai Teng, Garfield Toro, and Dusan Dimitrijevic Hazel Gamec Serbia and Montenegro Wanganui School of Design 17:15 - 18:45 IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004
  36. 36. 36 Computers and People A Conceptual Model of a with Mobility Disabilities Hi-Tech Cyberbrush for Non-Conventional Graphic Marijan Đurek and Emir Skejić Production Including University of Zagreb, Croatia University of Tuzla, Bosnia and Calligraphy Writing : Herzegovina From Vitruvian Man, Penman to Expertise Overview of Feynman, and Communication Software “Cyberbrushman” Laboratory at the University of Novi Sad Chong Ming Lin Lovoltech Inc USA Miroslav Despotović University of Novi Sad Serbia and Montenegro Chinese Calligraphic Handwriting (Shufa): R&D Outsourcing A Cognitive & Health Opportunities in Novi Sad, Science Serbia Henry S.R. Kao Vojin Šenk University of Hong Kong University of Novi Sad Hong Kong Serbia and Montenegro Conventional and Cybernized Writing Instruments Henry S.R. Kao University of Hong Kong Hong Kong Cognitive Effects of English Brush Handwriting: The Case of Visual- Spatial Aptitude W.S. Lui, Henry S.R. Kao and Ann Lin University of Hong Kong, Hong Kong 19:00 - 21:00 National Central University, Taiwan IPSI-2004 Montenegro Sveti Stefan, 2 – 9. October, 2004