ISAT 2009 SZKLARSKA PORĘBA, POLAND 20 – 22 September 2009 CONFERENCE SCHEDULE AND PROGRAM |
||||||
Ver. 3 | ||||||
SUNDAY – 20 SEPTEMBER 2009 | ||||||
14:00 - 17:30 | Registration | |||||
18:00 - 18:15 | Opening of the Conference - Room A | |||||
18:15 - 19:30 | Plenary Session: prof. W. Kasprzak - Room A | |||||
20:00 - 21:00 | Supper | |||||
MONDAY – 21 SEPTEMBER 2009 | ||||||
7:45 – 8:45 | Breakfast | |||||
8:00 – 8:50 | Registration | |||||
9:05 – 10:50 | PART I | Chairs: Z. Wilimowska, L. Borzemski, A. Grzech | ||||
Room A | Room B | Room C | ||||
Session A1 | Session B1 | Session C1 | ||||
9:05 – 9:20 | Scott Fortmann-Roe, Ryszarda Iwanejko,
Włodzimierz Wójcik A PROPOSAL FOR A DYNAMIC RISK ASSESSMENT METHOD |
Leszek Borzemski, Łukasz Cichocki, Marta Kliber
A DISTRIBUTED SYSTEM TO MEASURE THE INTERNET PERFORMANCE BASED ON AGENT ARCHITECTURE |
Jozef Vrana, Kristina Machova VISUALIZATION OF ONTOLOGIES USING CONTEXT |
|||
9:20 – 9:35 | Piotr Nowak, Maciej Romaniuk PORTFOLIO OF FINANCIAL AND INSURANCE INSTRUMENTS FOR LOSSES CAUSED BY NATURAL CATASTROPHES |
Leszek Borzemski, Ziemowit Nowak EMPIRICAL WEB PERFORMANCE EVALUATION WITH USING A MWING SYSTEM |
Rafał Kern, Marcin Pietranik ONTOLOGY BASED MODEL OF INFORMATION FLOW PATH IN ON-LINE SOCIAL NETWORK |
|||
9:35 – 9:50 | Dorota Kuchta, Ewa Ptaszyńska RISK REGISTER AS A TOOL OF MANAGING RISK IN EUROPEAN PROJECTS |
Leszek Borzemski, Mariusz Fraś ANALYSIS OF INTERNET STRUCTURE BASED ON AUTONOMOUS SYSTEMS MEASUREMENTS |
Adam Czarnecki, Cezary Orłowski HYBRID APPROACH TO ONTOLOGY SPECIFICATION AND DEVELOPMENT |
|||
9:50 – 10:05 | Łukasz. Radliński, Norman Fenton CAUSAL RISK FRAMEWORK FOR SOFTWARE PROJECTS |
Leszek Borzemski, Marek Rodkiewicz, Gabriel
Starczewski AS-PATH INFLUENCE ON GOODPUT PREDICTION |
Jacek Chmielewski ONTOLOGY ENABLED METADATA FOR INTERACTIVE 3D OBJECTS |
|||
10:05 – 10.20 | Bogdan Rębiasz, Bartłomiej Gaweł CREDIBILITY DISTRIBUTION AS A BASIS FOR ESTIMATION OF EFFECTIVENESS AND RISK OF INVESTMENT PROJECT |
Grzegorz Marszałek, Anna Zatwarnicka, Leszek
Borzemski, Krzysztof Zatwarnicki AN APPLICATION FOR MONITORING OF HOSTS IN LOCAL OR GLOBAL NETWORK BASED ON CRISTIAN'S ALGORITHM |
Witold Wysota SEMANTIC MODEL OF APPLICATION USER INTERFACES |
|||
10:20 – 10:35 | Piotr Czapiewski STOCHASTIC OPTIMISATION IN RULE INDUCTION FOR TRADING DECISIONS SUPPORT |
Grzegorz Kotowski, Dariusz Gąsior APPLICATION OF NON-PROBABILISTIC DESCRIPTIONS OF UNCERTAINTY FOR EVALUATION OF APPROXIMATE PERFORMANCE PARAMETERS IN AUTONOMOUS SYSTEMS AGGREGATION |
Tomasz Lukasiewicz, Edward Radosinski MASS CUSTOMIZATION IN TELECOMMUNICATION SERVICES - SEGMENTATION ATTRIBUTES SELECTION |
|||
10:35 – 10:50 | Aleksander Orłowski, Edward Szczerbicki TOWARD FUZZY MODEL OF INTERNET MORTGAGE MARKET: CONCEPTS AND INITIAL ASSUMPTIONS |
Krzysztof Zatwarnicki - APPLICATION OF FUZZY-NEURAL MODELS IN HTTP REQUEST DISTRIBUTION IN LOCAL WEB CLUSTERS |
Grzegorz Skorupa, Radosław Katarzyniak EXTENDING MODAL LANGUAGE OF AGENTS' COMMUNICATION WITH MODAL IMPLICATIONS |
|||
10:50 – 11:20 | Coffee Break | |||||
11:20 – 12:50 | PART II | Chairs: E. Szczerbicki, K. Choroś, J. Świątek | ||||
Room A | Room B | Room C | ||||
Session A2 | Session B2 | Session C2 | ||||
11:20 – 11:35 | Cezary Orłowski, Artur Ziółkowski VERIFICATION OF AGENT SYSTEM FOR IT PROJECT MANAGEMENT SUPPORT |
Magdalena Granos, Aleksander Zgrzywa NEW DIRECTIONS IN WEB SEARCH BASED ON LIFE-MEANING ASPECTS |
Cezary Orłowski, Tomasz Sitek APPLICATION OF ALGORITHMS FOR REASONING FROM IMPERFECT KNOWLEDGE IN IT EVALUATION ENVIRONMENT |
|||
11:35 – 11:50 | Iwona Dubielewicz, Bogumiła Hnatkowska,
Zbigniew Huzar, Lech Tuzinkiewicz EVALUATION OF SOFTWARE QUALITY - MODEL-BASED APPROACH |
Julian Szymański. Dawid Kilanowski WIKIPEDIA AND WORDNET INTEGRATION BASED ON WORDS CO-OCCURRENCES |
Marek Lubicz, Bernard Richards INTELLIGENT INFORMATION SYSTEMS FOR HEALTH CARE DECISION MAKING |
|||
11:50 – 12:05 | Anna Wilbik, Janusz Kacprzyk LINGUISTIC SUMMARIES FOR THE COMPARISON OF TIME SERIES: AN APPLICATION TO THE ANALYSIS OF INVESTMENT FUND QUOTATIONS |
Tatiana Jaworska MULTI-CRITERIA OBJECT INDEXING AND A GRAPHICAL USER QUERY AS AN ASPECT OF CONTENT-BASED IMAGE RETRIEVAL |
Justyna Uziałko-Mydlikowska, Bożena
Mielczarek SIMULATION MODELS AND SOFTWARE TOOLS IN HEALTH CARE PROBLEMS |
|||
12:05 – 12.20 | Joanna Szczepańska MEASURES OF VALUE ENHANCEMENT |
Paweł Forczmański, Sandra Wojcieszak WEB SYSTEM FOR PERCEPTIVE EVALUATION OF CBIR ALGORITHMS |
Grzegorz Chodak GENETIC ALGORITHMS IN FORECASTING OF INTERNET SHOPS DEMAND |
|||
12:20 – 12:35 | Wojciech Sibilski DEGREE OF FINANCIAL LEVERAGE VERSUS ELASTICITY OF FINANCIAL LEVERAGE |
Kazimierz Choroś SHOT CONTENT ANALYSIS FOR VIDEO SCENE DETECTION IN VISUAL RETRIEVAL SYSTEMS |
Bassam Daya, Shadi Khawandi, Mohamed Akoum
A NEURAL NETWORK ARCHITECTURE FOR INVERSE KINEMATICS OF A TWO-JOINT ROBOT |
|||
12:35 – 12:50 | Beata Siuta, Jacek Rudnicki, KNOWLEDGE MANAGEMENT IN LEAN PRODUCT DEVELOPMENT SYSTEM |
Marek Łatuszko PROVIDING EFFICIENT DATA PROCESSING IN OLAP APPLICATIONS |
Mariusz Śleziak, Adam Sudoł,Viktor Vlasienko
DYNAMIC TEXTURAL IMAGES VISUALIZATION AND IDENTIFICATION BASED ON DIGITAL HILBERT OPTICS: APPLICATIONS OF THE CORRELATIVE PARTICLE VELOCIMETRY AND FRAGMENTS LOCALIZATION METHODS |
|||
13:00 – 14:00 | Lunch | |||||
MONDAY – 21 SEPTEMBER 2009 | ||||||
14:20 – 15:50 | PART III | Chairs: C. Orłowski, P. Zwierzykowski, B. Daya | ||||
Room A | Room B | Room C | ||||
Session A3 | Session B3 | Session C3 | ||||
14:20 – 14:35 | Peter Butka DIFFERENT KNOWLEDGE REPRESENTATIONS OF SOFTWARE DEVELOPMENT METHODOLOGIES USED FOR V-MODELL XT |
Krzysztof J. Brzostowski, Jarosław Drapała,
Paweł Świątek, Jakub M. Tomczak PROCESSING OF KNOWLEDGE REPRESENTED BY AN ONTOLOGY IN SOA/SOKU ARCHITECTURE USING OWL-S AND PROLOG |
Al Hussain Akoum, Bassam Daya, Kamel
Belkhelladi, Lionel Prevost, Pierre Chauvet FUSION OF BASIC ALGORITHMS FOR DETECTION AND LOCALIZATION OF VEHICLE PLATE NUMBERS |
|||
14:35 – 14:50 | Krzysztof Olczyk, Witold Marańda GRAPHICAL USER INTERFACE DEVELOPMENT FOR WINDOWS SCRIPTING |
Paweł Cichoń, Kevin May THE EXECUTION OF ADAPTIVE FIXED PRICE INFORMATION TECHNOLOGY PROJECTS USING TELECOMMUTING |
Magdalena Barańska FUTURE OF AN OVERTAKE MANEUVER WITH USE OF AN ACTIVE SAFETY SYSTEM |
|||
14:50 – 15:05 | Bogumila Hnatkowska, Krzysztof Głogocki USER INTERFACE DEVELOPMENT WITH MDD APPROACH |
Dariusz Gąsior SIMULATION OF AN ALGORITHM FOR JOINT ADMISSION CONTROL AND RATE ALLOCATION UNDER UNCERTAINTY |
Dariusz Frejlichowski GENERAL SHAPE ANALYSIS USING FOURIER DESCRIPTORS |
|||
15:05 – 15.20 | Ilona Bluemke, Joanna Chojecka VISUALIZATION OF C CODE AFTER PARALLELIZATION |
Przemysław Kobylański, Michał Kulej, Jerzy
Pieronek EVALUATION OF ROBUSTNESS OF CONNECTIVITY IN THE LARGE UNDIRECTED NETWORKS |
Jacek Mazurkiewicz SYSTOLIC ARRAY APPROACH TO IMPLEMENTATION OF DISCRETE HOPFIELD NEURAL NETWORK |
|||
15:20 – 15:35 | Maciej Pawłowski, Jan Kwiatkowski, Marcin
Pawlik PROGRAMMING GRAPHICS PROCESSING UNITS IN THE CUDA ENVIRONMENT |
Karol Marchwicki DIFFICULT CHILDHOOD PROBLEM IN PEER-TO-PEER NETWORKS |
Piotr Lasek A FASTER METHOD OF BUILDING THE LVA-INDEX |
|||
15:35 – 15:50 | Bogumila Hnatkowska, Mateusz Kapanowski DSL FOR MICROSOFT WINDOWS SHAREPOINT SERVICES |
Jakub Lemiesz PARTIAL COUNTING: ESTIMATION OF AD HOC NETWORK SIZE |
Krzysztof Dobosz, Mateusz Lis, Łukasz Pintal,
Jerzy Świątek ON-LINE SIGNATURE VERIFICATION |
|||
15:50 – 16:20 | Coffee break | |||||
16:20 – 17:50 | PART IV | Chairs: Z. Banaszak, B. Zieliński, M. Wyrwicka | ||||
Room A | Room B | Room C | ||||
Session A4 | Session B4 | Session C4 | ||||
16:20 – 16:35 | Bożena Skołud, Iwona Wosik CLONALLY SELECTION AND MULTI-OBJECTIVE IMMUNE ALGORITHMS FOR OPEN JOB SHOP SCHEDULING PROBLEMS |
Michał Czarkowski, Sylwester Kaczmarek SIMULATION MODEL FOR EVALUATION OF QOS DYNAMIC ROUTING |
Aleksandra Grzech ALGORITHMS OF THE VARIANT CHOICE IN THE INVESTMENT DECISION-MAKING OF VENTURE CAPITAL FUNDS |
|||
16:35 – 16:50 | Grzegorz Filcek, Jerzy Józefczyk AN EXACT ALGORITHM FOR MANAGEMENT IN A CLASS OF SUPPLY NETWORKS |
Damian Parniewicz, Piotr Zwierzykowski PYTHON IN NUMERICAL COMPUTATIONS |
Ewa Prałat ELECTRONIC PROCUREMENT IN PUBLIC ADMINISTRATION |
|||
16:50 – 17:05 | Maciej Hojda, Jerzy Józefczyk APPLICATION OF UNCERTAIN VARIABLES TO ROUTING-SCHEDULING IN MANUFACTURING SYSTEMS |
Waldemar Mikluszka FORMAL VERIFICATION OF REAL-TIME COMMUNICATION SYSTEM WITH PROTOCOL CONVERSION |
Leszek Borzemski, Grażyna Suchacka AN APPROACH TO KEY CUSTOMERS AND REVENUE ORIENTED B2C SERVICE |
|||
17:05 – 17.20 | Jerzy Józefczyk, Marcin Siepak AN EXACT ALGORITHM FOR UNCERTAIN TASK SCHEDULING TO MINIMIZE MAKESPAN |
Artur Sierszeń, Łukasz Sturgulewski, Joanna
Janicka GNS3 ENVIRONMENT IN THE ASPECT OF TESTING SOFTWARE FOR MANAGEMENT AND MONITORING OF COMPUTER NETWORKS |
Jacek Zabawa, Bożena Mielczarek SIMULATION MODELING OF SUPPLY CHAIN MANAGEMENT SYSTEM |
|||
17:20 – 17:35 | Adam Janiak, Rafał Januszkiewicz PARALLEL PROCESSOR SCHEDULING OF UNIT-TIME JOBS TO MINIMIZE WEIGHTED NUMBER OF EARLY AND TARDY JOBS |
Tomasz Bartczak, Maciej Piechowiak, Piotr
Zwierzykowski THE EFFICIENCY OF MULTICAST TREES IN PACKET NETWORKS |
Magdalena Wyrwicka, Michał Masadyński, Barbara
Zasada CHANGES AND TECHNOLOGICAL CULTURE |
|||
17:35 – 17:50 | Mateusz Gorczyca, Adam Janiak THE OPTIMAL RESOURCE ALLOCATION IN SCHEDULING OF TASKS WITH DYNAMIC MODELS OF RELEASE DATES |
Mariusz Głąbowski, Maciej Sobieraj RECURRENT METHOD FOR DETERMINING BLOCKING PROBABILITY IN MULTI-SERVICE SWITCHING NETWORKS WITH BBB TRAFFIC AND BANDWIDTH RESERVATION |
Rafał Jankowski, Anna Gruszka, Paweł Majdosz,
DETERMINATION OF BASELINE MATRIX UNDER STRUCTURAL CHANGE ANALYSIS |
|||
20:00 – 24:00 | Conference Dinner | |||||
TUESDAY – 22 SEPTEMBER 2009 | ||||||
8:00 – 9:00 | Breakfast | |||||
9:05 – 11:10 | PART V | Chairs: J. Sosnowski, G. Kołaczek, K. Juszczyszyn | ||||
Room A | Room B | Room C | ||||
Session A5 | Session B5 | Session C5 | ||||
9:05 – 9:20 | Tomasz Bilski INCONSISTENCY IN QOS FACTORS IMPROVEMENT RATES |
Michał Karbowańczyk, Piotr Duszyński, Krzysztof
Lichy A SIMPLE, RATE-BASED TRAFFIC CONTROL SOLUTION FOR IPV4 NETWORKS USING LINUX-BASED HOP-BY-HOP CLOSED LOOP AND QUEUING DISCIPLINE IMPLEMENTATION |
Bartosz Kucharski, Edward Szczerbicki SECURITY AND KNOWLEDGE MANAGEMENT |
|||
9:20 – 9:35 | Janusz Sosnowski, Marcin Król, Jakub Machnicki
- TECHNIQUES AND GOALS OF MONITORING COMPUTER SYSTEMS |
Bartłomiej Zieliński FURTHER CONSIDERATIONS ON AX.25 PROTOCOL PERFORMANCE |
Jarosław Pastuszak, Maciej Stolarek, Cezary
Orłowski PRACTICE IMPLEMENTATION OF OPERATIONAL LEVEL AGREEMENT |
|||
9:35 – 9:50 | Mateusz Smoliński, Marcin Kwapisz, Ewa
Lipowska-Nadolska SCHEDULING SYSTEM FOR DISTRIBUTED TRANSACTION PROCESSING |
Michał Kowal, Sławomir Kubal, Piotr Piotrowski,
Ryszard Zieliński REAL TIME PEOPLE LOCATION AND VOIP SERVICES EFFICIENCY IN UNDERGROUND MINING ENVIRONMENT |
Mirosław Dytczak, Grzegorz Ginda A MULTI-ATTRIBUTE CHOICE OF THE BEST METHOD AND TOOL FOR SOFTWARE IMPLEMENTATION MANAGEMENT |
|||
9:50 – 10:05 | Janusz Sosnowski, Jakub Machnicki, Andrzej
Tymoczko, Piotr Gawkowski DYNAMIC TASK MANAGEMENT IN FARM COMPUTING |
Krzysztof Juszczyszyn, Grzegorz Kołaczek SUBJECTIVE LOGIC-BASED FRAMEWORK FOR THE EVALUATION OF WEB SERVICES' SECURITY |
Adam Janiak, Radosław Rudek, Agnieszka Wielgus
SOLUTION ALGORITHMS FOR A FLOWSHOP PROBLEM WITH AN AGING EFFECT |
|||
10:05 – 10.20 | Katarzyna Michalska, Tomasz Walkowiak SIMULATION APPROACH TO PERFORMANCE ANALYSIS OF INFORMATION SYSTEMS WITH LOAD BALANCER |
Cesar De La Torre UNIFIED THREAT MANAGEMENT LOCATION FOR REAL TIME NETWORK PROTECTION |
Adam Janiak, Andrzej Kozik, Bartosz Tomeczko
COMPLEX OUTLINE PACKING PROBLEM IN VLSI PHYSICAL DESIGN |
|||
10:20 – 10:35 | Marek Kamiński TOWARDS AUTOMATING REPAIRS OF IT SYSTEMS |
Dawid Gawor, Piotr Pawłowski, Grzegorz
Kołaczek A CONCEPT OF DISTRIBUTED INTRUSION DETECTION SYSTEM USING AUTONOMOUS AGENTS. |
Malgorzata Sumisławska, Leszek Koszałka, Iwona
Poźniak-Koszałka PERFORMANCE OF THE PDSBA ALLOCATION ALGORITHM IN MESH NETWORK. |
|||
10:35 – 10:50 | Katarzyna Jach, Jacek Ławik THE APPLICATION OF GRAPHIC ELEMENTS FOR THE CARD SORTING METHOD. |
Jacek Marciniak, Grzegorz Kołaczek THE E-MAIL ANALYZING TOOL FOR PHISHING DETECTION |
Aleksander Kniat SURFACE SHAPE REVERSE ENGINEERING WITH NURBS |
|||
11:15 – 11:45 | Closing
of the Conference Room A |
|||||
12:00 – 13:00 | Lunch |