|
Conference Proceedings from 2009
PLENARY SESSION
P.1. CompSysTech – Ten Years after the Beginning …
Boris Rachev
P.2. IPv6: The Next Big Bail-Out. Will IPv6 Save the Internet?
Latif Ladid
P.3. ICT infrastructure and Scientific Research
Kiril Boyanov, Dimitar Todorov
P.4. Polymorphic Architectures – from Media Processing to Supercomputing
Georgi Kuzmanov
P.5. Advanced Scalable Algorithms for Advanced Architectures
Vassil Alexandrov
P.6. National Broadband Program of the Republic of Bulgaria
Roumen Trifonov
SESSION I Computer Systems
I.1. Non-contact ultrasound method for identification of yogurt according to its butter content
Nikolay Shopov, Raycho Ilarionov, Ivan Simeonov, Hristo Kilifarev
I.2. Model Approach in the Design of Devices for 3D Information Input into Computing Environment
Raycho Ilarionov
I.3. Hardware implementation of strategies for servicing queues
Stoyan Prokopov, Dimitar Tyanev
I.4. Micro-pipeline Section For Condition-Controlled Loop
Dimitar Tyanev, Stamen Kolev, Dragomir Yanev
I.5. Outline of RISC-based Core for Multiprocessor on Chip Architecture Supporting Moving Threads
Jani Paakkulainen, Jari-Matti Mäkelä, Ville Leppänen, Martti Forsell
I.6. Photonic Crystal Fibers challenge
Jordan Urumov, Zhejno Zhejnov
I.7. Programming and applying of the multiple product distribution system by using PIC 16F877A microcontroller
Özcan Varul, Melih İnal
SESSION II Computer Technologies
II.1. Experiences with Embedding MPL Security Monitors into Java Programs
Jari-Matti Mäkelä, Ville Leppänen
II.2. MVTsim -- Software Simulator for Multicore on Chip Parallel Computer Architectures
Jari-Matti Mäkelä, Jani Paakkulainen, Ville Leppänen
II.3. Dynamic reconfiguration of Multimodal Architectures
Hicham Djenidi, Amar Ramdane-Cherif, Nicole Lévy, Chakib Tadj
II.4. Evaluating the Method of the Transforming Ontology Axioms to Application Domain Rules
Diana Kalibatiene, Olegas Vasilecas
II.5. Cyclic Histogram Thresholding and Multithresholding
Dimo Dimov, Lasko Laskov
II.6. Researching product tiles in eBay using the eBay API
Nikolaj Cholakov
II.7. Security Assurance during the Software Development Cycle
Isaac Agudo, Jose L. Vivas, Javier Lopez
II.8. A practical approach for software project management
Violeta Bozhikova, Mariana Stoeva, Krasimir Tsonev
II.9. Spider vs. Prolog: Simulating Prolog in Spider
Tzanko Golemanov, Kostadin Kratchanov, Emilia Golemanova
II.10. Spider vs. Prolog: Computation Control
Emilia Golemanova, Kostadin Kratchanov, Tzanko Golemanov
II.11. Architectural Design of a Software Engine for Adaptation Control in the ADOPTA Elearning Platform
Boyan Bontchev, Dessislava Vassileva, Boryana Chavkova, Vladimir Mitev
II.12. Approach for data replication on MS SQL Server
Dessislava Petrova-Antonova, Ivelina Vacheva
II.13. Design of Service Level Agreements for Software Services
Diana Berberova, Boyan Bontchev
SESSION IIIA Application Aspects of Computer Systems and Technologies
IIIA.1. Application of contemporary measurement and analysis techniques to human cardiovascular system
Maja Bračič Lotrič, Aneta Stefanovska
IIIA.2. A Bayesian Approach to Recognise Facial Expressions using Vector Flows
Xiaofan Sun, Leon Rothkrantz, Dragos Datcu, Pascal Wiggers
IIIA.3. A bottom-up approach of fusion of events in surveillance systems
Leon Rothkrantz, Zhenke Yang, Michael Jepson, Pascal Wiggers, Dragos Datcu
IIIA.4. FACS-coding of Facial Expressions
Leon Rothkrantz, Dragos Datku, Pascal Wiggers
IIIA.5. Controlling the Speed of Coding Line Conveyor Using Fuzzy Logic
Atanas Atanassov
IIIA.6. XPDL - Bringing Business and Software Together - a Case Study
Orlin Genchev, John Galletly
IIIA.7. A Vision-Based Attentive User Interface with (Semi-)Automatic Parameter
Calibration
Fabio Fosso, Marco Porta
IIIA.8. A Design of an Integrated Document System for Project Management
Iulian Intorsureanu, Rodica Mihalca, Adina Uta, Anca Andreescu
IIIA.9. A General Software Development Process Suitable for Explicit Manipulation of
Business Rules
Anca Andreescu
IIIA.10. Web based portfolio optimization
Todor Stoilov, Krasimira Stoilova
IIIA.11. Learning by Negation of the Negative Examples – Single Model versus Double
Model
Zekie Shevked, Ludmil Dakovski
IIIA.12. 12. Executable Petri Nets: Towards Modelling and Management of e Learning Processes
Hristo Indzhov, Dimitar Blagoev, George Totkov
IIIA.13. Implementation Design of Access Control System. Local Database in Flash Memory Array.
Radoslav Mladenov, Sava Ivanov
IIIA.14. Open Source Solution for a Workflow Execution Architecture
Martin Tsenov, Krasimir Trichkov, Simeon Tsvetanov
IIIA.15. One approach to HTML wrappers creation: using Document Object Model tree
Viera Rozinajova, Ondrej Hluchy
IIIA.16. Keeping Artifacts Alive: Towards a Knowledge Management System
Hilda Tellioglu
IIIA.17. 1-Wire Based Data Acquisition System
Georgi Georgiev
IIIA.18. Personalized Web Search Using Context Enhanced Query
Michal Kajaba, Pavol Navrat
IIIA.19. Distillation column control using genetic algorithms for LQR design
Karl O. Jones, Wilfried Hengue
IIIA.20. Limitations of Multivariable Controller Tuning Using Genetic Algorithms
Karl O. Jones, Wilfried Hengue
IIIA.21. Augmenting UML with decision table technique
Kestutis Normantas, Olegas Vasilecas, Sergejus Sosunovas
IIIA.22. GPROM: a Tool for Non-Invasive Personal Tracking
Andrea Girardello, Giancarlo Succi
SESSION IIIB Application Aspects of Computer Systems and Technologies
IIIB.1. Remote Identification and Information Processing with a Near Field Communication
Compatible Mobile Phone
Raine Kelkka, Tommi Kallonen, Jouni Ikonen
IIIB.2. An Access Control and Time Management Software Solution Using RFID
Jani Peusaari, Raine Kelkka, Jouni Ikonen
IIIB.3. RFID and Business Card Information
Tommi Kallonen, Juho Vartiainen, Jouni Ikonen
IIIB.4. Distributed Mobile Traffic Monitoring System Based on Free and Open Source
Software
Velislava Spasova, Grisha Spasov
IIIB.5. Architectural models for realization of Web-based Personal Health Systems
Mitko Shopov, Grisha Spasov, Galidia Petrova
IIIB.6. An Algorithm for modeling self-similar Ethernet traffic
Evgeniya Gospodinova
IIIB.7. The influence of self-similar traffic on telecommunication
Evgeniya Gospodinova, Mitko Gospodinov
IIIB.8. Cooperation Requirements for Packet Forwarding in Vehicular Ad-Hoc Networks
(VANETs)
Candelaria Hernández-Goya, Pino Caballero-Gil, Jezabel Molina-Gil, Candido
Caballero-Gil
IIIB.9. The Application of Fuzzy Expert Cooling System for Multi Core Microprocessors
and Mainboards
Kursat Zuhtuogullar , Ismail Saritas, Novruz Allahverdi
IIIB.10. Modeling the performance and emission characteristics of diesel engine and
petrol-driven engine by ANN
Kemal Tütüncü, Novruz Allahverdi
IIIB.11. A Nonlinear Programming Case Study to a Sensor Location Problem
Peter Gabor Szabo
IIIB.12. Multidimensional Scaling: Multi-Objective Optimization Approach
Ausra Mackute-Varoneckiene, Antanas Zilinskas, Audrius Varoneckas
IIIB.13. An Application of an Algorithm for Common Subgraph Detection for Comparison
of Protein Molecules
Stoicho Stoichev, Dobrinka Petrova
IIIB.14. Gustafson-Kessel Algorithm for Evolving Data Stream Clustering
Olga Georgieva, Dimitar Filev
IIIB.15. Implementing Common Array Algorithms on modern GPUs
Tzvetomir Vassilev
IIIB.16. Distributed secret on the basis of the linear correcting codes
Nina Siniagina, Boncho Aleksandrov, Petko Kochevski
IIIB.17. Investigation of the Text Entry Speed and Accuracy in Mobile Devices
Tsvetozar Georgiev, Evgeniya Georgieva
IIIB.18. Wavelet Classifiers for Bulgarian Sorting Machines ASM 501
Nikolay Shopov, Vesselin Nachev, Chavdar Damyanov, Tanya Titova
IIIB.19. About singularity of two approaches to solving problems of portfolio selection
under risk
Stela Sotirova, Lyubomir Sotirov
IIIB.20. Research over correlation properties of families of optical orthogonal codes
Aleksandar Milev, Valentin Mutkov
IIIB.21. An Information System for Temperature Monitoring of Administrative Buildings
Valentin Mutkov, Alexander Milev
IIIB.22. Computer modeling of vapor-liquid equilibrium of high fatty acids
Dragomir Dobrudzhaliev, Miluvka Stancheva
SESSION IV Educational Aspects of Computer Systems and Technologies
IV.1. Wireless Sensor Networks to support elementary school learning activities
Ricardo Silva, Nadya Antonova, Jorge Silva, Antonio Mendes, Maria Marcelino
IV.2. Net-Generation Learning Style – a Challenge for Higher Education
Aneliya Ivanova, Galina Ivanova
IV.3. LOGOPED 2.0: Software System for E-consulting and Therapy of People with
Communicative Disorders
Vania Sivakova, George Totkov, Todorka Terzieva
IV.4. FSM Decomposition with Application to FPGA Synthesis
Alexander Sudnitson, Dmitri Mihhailov, Margus Kruus, Konstantin Tarletski
IV.5. You must be independent and have self-confidence. Attitude of Distance Learners
Ásrún Matthíasdóttir
IV.6. A Web Search Methodology for Different User Typologies
Marco Alfano, Biagio Lenzitti
IV.7. The “Jigsaw” Collaborative Method in e-Learning Environment Moodle
Georgi Tuparov, Daniela Tuparova, Ilka Zafirova
IV.8. Scoring Concept Maps: an Overview
Alla Anohina, Janis Grundspenkis
IV.9. An Algorithm for Defining of Initial Package of Notions for Purpose of E-Learning
Mitko Mitev, Elena Racheva, Ginka Marinova
IV.10. The Emerging Global Campus Model
Roumen Nikolov
IV.11. Some remarks about OO teaching
Janusz Jabłonowski
IV.12. Creating an E-Training Course on Computer’s Operation Systems
Yuri Hopteriev
IV.13. An Approach to Development of Personalized E-learning Environment for Dyslexic
Pupils’ Acquisition of Reading Competence
Rumen Andreev, Valentina Terzieva, Petia Kademova-Katzarova
IV.14. On Using of Random Access Machine Simulators in Teaching of Theoretical
Computer Science
Daniela Chudá, Martin Nehéz, Michal Čerňanský
IV.15. Information system topics for studies in software engineering
Mirjana Ivanović, Dragana Todorić-Vukašin, Zoran Budimac
IV.16. European Standardization: Mobility without Borders
Rositsa Doneva, Georgy Totkov, Nikolay Kasakliev, Elena Somova
IV.17. Python Prevails
Vambola Leping, Marina Lepp, Margus Niitsoo, Eno Tõnisson, Varmo Vene, Anne Villems
SESSION V Biometrics
V.1. A Shape Based Approach for Biometrical Analysis
Mariana Stoeva, Violeta Bozhikova
V.2. Multifactor Authentication based on keystroke dynamics
Daniela Chudá, Michal Ďurfina
V.3. A Computer system for graphometric handwriting analysis
Dobrin Nestorov, Stefan Benchev, Stefan Bonchev, Ruslan Kostashki, Georgi Gluhchev
SESSION VI CompSysTech’09 PhD Workshop
VI.1. Prototype of a platform for monitoring and management of asynchronous network
events (Network Simulator of Asynchronous Events)
Vanya Topalova
VI.2. Runtime Generation of an User Interface, Described in a Database
Plamen Paskalev, Ilka Serafimova
VI.3. Rule based GUI modification and adaptation
Plamen Paskalev
VI.4. Clustering and Prediction of Risk Spread Curves
Ventsislav Nikolov
VI.5. Possibilities of Grid computing for realization of simulation problems
Ivaylo Penev, Anatoliy Antonov
VI.6. Ensuring Consistency of Information Systems Rules Models
Olegas Vasilecas, Ruta Dubauskaite
VI.7. Development of Duty Schedule Using Rules Approach
Darius Jurkevicius, Olegas Vasilecas
VI.8. Data Extraction by Visual Matching
Lukáš Bařinka, Ivan Jelínek
VI.9. Proposing of modular system for web information extraction
Vojtěch Jirkovský, Ivan Jelínek
>> Back to Conference Proceedings
|
|