ICT Innovations 2010: Second International Conference, ICT Innovations 2010, Ohrid Macedonia, September 12-15, 2010. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second International Conference, ICT Innovations 2010, held in Ohrid, Macedonia, in September 2010. The 33 revised papers presented together with 5 invited papers were carefully reviewed and selected. The papers address the following topics: internet applications and services, artificial intelligence, bioinformatics, internet, mobile and wireless technologies, multimedia information systems, computer networks, computer security, e-business, cryptography, high-performance-computing, social networks, e-government, as well as GPU computing.

Author(s): Nataša Jonoska, Nadrian C. Seeman (auth.), Marjan Gusev, Pece Mitrevski (eds.)
Series: Communications in Computer and Information Science 83
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 378
Tags: Computer Communication Networks; Computation by Abstract Devices; Artificial Intelligence (incl. Robotics); Algorithm Analysis and Problem Complexity; Information Systems Applications (incl.Internet); Information Storage and Retrieval

Front Matter....Pages -
Finite State Automata by DNA Self-assembly....Pages 1-4
Length Extension Attack on Narrow-Pipe SHA-3 Candidates....Pages 5-10
Review of Knowledge Sharing: Conceptual Foundations for Micro-level Knowledge Sharing and Readiness-for Change Related Behaviours....Pages 11-26
Inferring Causal Interpretations of Change-Readiness Using Causal-Models: A Knowledge-Based Perspective....Pages 27-39
E-Business, Emerging Trends in the European Union....Pages 40-50
On Some Cryptographic Properties of the Polynomial Quasigroups....Pages 51-60
Some Probabilistic Properties of Quasigroup Processed Strings Useful for Cryptanalysis....Pages 61-70
A Compositional Method for Deciding Program Termination....Pages 71-80
Practical Consequences of the Aberration of Narrow-Pipe Hash Designs from Ideal Random Functions....Pages 81-93
Unique and Minimum Distance Decoding of Linear Codes with Reduced Complexity....Pages 94-101
Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates....Pages 102-113
Self-Heating Effects in High Performance Devices....Pages 114-122
Performance Analysis of Dual-Hop MIMO Systems....Pages 123-132
Parallel Machine Translation for gLite Based Grid Infrastructures....Pages 133-141
e-Consumer Online Behavior: A Basis for Obtaining e-Commerce Performance Metrics....Pages 142-151
e-Government and e-Business in Western Balkans 2010....Pages 152-165
Information Brokering with Social Networks Analysis....Pages 166-175
A Distributed Catalog for Digitized Cultural Heritage....Pages 176-186
Toward an Integration Technology Selection Model for Information Systems Integration in Supply Chains....Pages 187-194
Development of an English-Macedonian Machine Readable Dictionary by Using Parallel Corpora....Pages 195-204
Information Retrieval Using a Macedonian Test Collection for Question Answering....Pages 205-214
A Modeling Framework for Performance Analysis of P2P Live Video Streaming Systems....Pages 215-225
Correlation between Object-Oriented Metrics and Refactoring....Pages 226-235
Mobile Robot Environment Learning and Localization Using Active Perception....Pages 236-244
Diatom Classification with Novel Bell Based Classification Algorithm....Pages 245-254
Organizations Analysis with Complex Network Theory....Pages 255-265
An Agglomerative Clustering Technique Based on a Global Similarity Metric....Pages 266-275
Accelerating Clustering Coefficient Calculations on a GPU Using OPENCL....Pages 276-285
Selective Attack in Virus Propagation Processes....Pages 286-295
Object Recognition Based on Local Features Using Camera – Equipped Mobile Phone....Pages 296-305
HDL IP Cores Search Engine Based on Semantic Web Technologies....Pages 306-315
Monitoring Wireless Sensor Network System Based on Classification of Adopted Supervised Growing Neural Gas Algorithm....Pages 316-324
Assessing the Performance of Assembly Tools on Simulated Sequencing Data and Their Sensitivity to GC Content....Pages 325-332
Durkin’s Propagation Model Based on Triangular Irregular Network Terrain....Pages 333-341
An Enhanced Visualization Ontology for a Better Representation of the Visualization Process....Pages 342-347
Framework to Design a Business Intelligence Solution....Pages 348-357
A New Methodology to Benchmark Sophistication of e-Invoicing and e-Ordering....Pages 358-368
ASGRT – Automated Report Generation System....Pages 369-376
Back Matter....Pages -