NOTES

Polskie konferencje i Kluby: część ludzi mowi do siebie po imieniu, a czesc mowi per Pani/Pan.
Powoduje to scisla segregacje na “naszych” i “obcych”. Podzial klubowy jest silny.

 

International multiconference on Computer Science and Information Technology
Mragowo 2009, Poland
* Day 1

** 9:00-10:45

1st International Symposium on Intelligent Mobile Technologies for Social Change (IMT4SC’09)

Session 1
Chair Anita Wasilewska

*** Social Inclusion of Young Marginalized People through Online Mobile Communities
Ilse Marschalek (*), Elisabeth Unterfrauner, Claudia Magdalena Fabian
marschalek@zsi.at

ComeIn Project, Centre for Social Innovation, Vienna, Austria
EU-funded project, www.comein-project.eu, 1.82M Euros, started
September 1, 2008, 24months. Pilot study in UK and Austria 01.2010 to
04.2010. Evaluation/results 05.2010. 98 kids are participating.

Marginalised youth: low education and qualification levels, not
participating in life-long-learning, lack of educ role models, bad
experiences, no easy access to education, 14-21yolds.

Educational aspects and social aspects. ABC: access, basic training,
content. Social contacts, personal support is important, face-to-face
(f2f) as well as virtual support. Navigation based on symbols, playful
design, but not childish. The goal is to develop mobile learning
platfrom and mobil ecommunity. Prototypes with video streaming.

Example: best skill challange. Teens should record via their mobile a
video about their best skill, 30s, uploaded. The purpose was to tell
about one’s skill but also teach others about some skills one’s
mastered. Vido ping-pong approach: challange video followed by
feedback video, answer video, reply video, etc. The need for
moderation to prevent abuse.

Discussion:
– the availability of mobile phones for population, troubled youth,
etc. The capable mobile phones are 2-3 years ahead, but youth is
catching up.
– the availability of Internet: perhaps Library-like model where
mobile phones, Internet, could be provided to the public free of
charge.
– privacy issues, cost issues, accessibility.
*** Conceptual Content Requirements for a Mobile Online Learning Community for Marginalized Youth
Ben Lockyer and Jonny Dyer, Hertfordshire Unitek Kingdom

jonny@notschool.net
ben.lockyer@notschool.net

In the UK there is 10,000 school-age pupils not getting proper education. The main purpose of this project is to create mobile online learning environment to provide functional and enterprise skills that would help young people to re-integrate into the society and become valuable (productive) members of the society. Key guidelines for mobile online community:
– purpose (personal goals to be satisfied), important to leave the youth to define
their own purpose and goals, not to superimpose these
– participation
– netiquette/code of conduct (not necessirily small print, rules, etc, but rather
a set of guidelines to promote respect of ideas and personal respect of
individuals)
– user friendliness
– technology (chat rooms, web2.0, videos, etc)
– roles
– subgroups
– trust
– identity

Content requirements: learner-authored content, young people content for young people. knowledge should be constructed by the learner through experiences, collaborative learning. The content should support several areas that develop young peoples employable skills.
Subject areas: functional literacy, communication skills, numeracy, ict, initiative and sel-directive, etc.
Motivation: mobile penetration reached 100% in most countries.

Discussions:
– gang cultures and troubled youth: similarities and differences
– role models, sence of belonging, mutual trust between people
– short digretion about Maori culture (Jonny)

 

*** WishVast: Buiding Trust and Social Capital using Cellphones
Khanjan Mehta (*) engineering, Ladislaus Semali education, Pennsylvania State University USA

WishVast Venture: The work done on a $1000 + $4000 budget.

Project about Kenya. Social networking mobile platform for Africa. Very strong overlap between social and economic networks. Large mobile phone penetration in Kenya (97%) and Tansania (27%). 66% of Kenyans connected with ooperative.
62% of women own cellphone, 96% use cellphones for business. Poor communication and transportation infrastructure causes huge disparity between prices in various places. Currently there is over 30 startups working on mobile based social networks, mostly focused on western societies. In Kenya: 62% women report they trust their social network peers, 100% respect their partners. In western society these numbers are amazing. Similar perhaps to small rural societies only. Most of the relationships last for over 5years.
WishVast: simple SMS gateway, to facilitate Broadcast of messages. Laptop plugged into a mobile phone, database, rating engine. All communication goes through SMS.
– better supply chains
– connecting sellers and buyers
– connecting employers and employees
– informal lending and micropayment economics

Mashavu, telemedicine project

– redisigning medical tools, to make them cheaper, and make them to leverage computer (laptop) and digital signal processing

 

*** Text Messaging to Authenticate Products through Matching Hidden Codes
Ashifi Gogo, Elsa Garmire

(Postponed)

 

** 11:45, keynote talks, official openning

*** Openning

Openning by Marcin Paprzycki, who chairs the keynote session and openning.

Marek:
Poland build its first operational, working computer in 1958. Polish Information processing Society, funded in 1981. Shortly after the conference in Mragowo started. This is a tradition to meet in Mragowo. Conference has been organised for the last 25 years.

Piotr Wroblewicz: the most influencial person in the Society. “Ideas are not born in human’s brains, but in the space between the brains”.

Maria Ganzha (main organiser)
IMCSIT started in 2005 with 43 submissions. 2006 – 111 2008 – 218 2009 – 207

2009 – new events this year:
– Business Intelligence (BI) – 1st workshop
– IMT4SC – 1st workshop

AAIA – Celebrating 50 years of scientif research of Prof. Juliusz Lech Kulikowski.

PTI R&D session and award – Jan Lukasiewicz for the most innovative Polish company in 2009.

IMCSIT 2010 will be held in Wisla, Beskidy Mountains, October 18-20,
Golebiewski Hotel.

*** Adrian Kossowski: “On some graph coloring problems: and their applications in network optimisation”
Department of algorithms and system modeling
Gdansk University of Technology
adrian@kaims.pl
(when 18 MSc, 20 PhD, 22 now)
Talking about graph-coloring problems: koalalib.org

Most of the best theoretical algorithms cannot be implemented on parallel hardware. However, some less optimal can. Multi-agent systems are the next step in real world problem solving and optimisation, and diagnostic.
*** Juliusz L. Kulikowski “Decision Making Supported by Fuzzy Deontological Statements”
Institute of Biocybernetics and Biomedical Engineering PAS
Warsaw, Poland
** 14:30 Principles of Information Technology and Applications (PITA2009 workshop)

*** Pawel Gapner
New Multicore Intel Xeon Processors help design energy efficient solution for high perf comp
pawel.gapner@intel.com

Power = C_dynamics * V^2 * Freq
Concept of C_dynamics, which is the indication of how many transitors are active at a given moment,

2002: 3.7TFlops, 25 racks, 512 servers 90m2 128kW
2007: 3.7TFlops, 1 rack, 53 servers, 4m2, 21kW
2009: 12TFlops, 1rack, 128 servers/blades, 40qs ft, 30kW

PUE – the constant that signifies how much power is “wasted” on other things other than computing.

New enhancements in Nahalem architecture:
integrated power gates, automated low-power states, intel node manager
significant reduction of the power consumption on the idle mode.

*** Anna Derezinska
An experimental case study to applying mutation analysis for SQL Queries

concept of mutation testing, SQL mutation operators. Mutation is a special form of fault injection. It mimicks some trivial notational mistakes done by the programmer. E.g. < with <=, etc. Syntactic, compiler and static analysis will not catch these faults.
*** Slawomir Chylek “Collecting program execution statistics with Qemu processor emulator”
PhD student, Warsaw University of Technology

Software fault inejction: technique for improving the coverage of test by introducing faults to test code paths. This can be done on the hardware or software levels.
FITS, developped at WUT, utilizes opsys debugging framework (ptrace). Program improvement contains two phases: golden run, a referential run, stats are collected, prgram’s result is recorded. Experiment Run – a run with a fault injected.

Monitoring during the golder run was done through a hardware trap invoked after every single step (20,000 slower than a real run), OS involvement and dependency.
Solution: use Qemu. 20 times slower than a bare run. System emulation and single process emulation (linux only). Binary translation: original code is getting extra instructions injected that dump the state of the running process. Future work: ARM architecture testing, analysis of stas data in parallel, injecting faultts into OS, reverse debugging.
** 15:15 back to the IM4SC stream

*** Anita Wasilewska (Applications for Senegal)

One application: selling/buyng fish. Another one pictorial French dictionary with pictograms and pronouncation.
http://atlantis.seidenberg.pace.edu/wiki/senegal
http://www.cs.stonybrook.edu/~cse594 and cse651
*** Christelle Sharff,
A model for teaching mobile applications development for Social Change
Pace University NY, USA
50k grant, funding from NCIIA, Nokia funded the phones

Project in Senegal: Dakar, Thies and Saint-Louis.
* Day 2

** Session 1, 9-10:45 – AAIA

Short presentations, posters, Q&A.
See: the trust propagation algorithm

** Keynote talks

*** Stephan Pascall, DG INFSO

Lisbon Strategy and Policies for the Information Society
An all inclusive European Research Area in ICT RTD.

Representative of the EU Research offic and European Council
Lisbon Strategy: sustainable economic growth (note: this is oxymoron)
ERA, FP7 ICT Theme, EU12 and AC Integrations

Cooparation: collaborative R&D, 32bn Euro, out of it to ICT 28%
Ideas: 7.5bn innovation,
People: 4.8bn human potential, mobility

ICT enables productivity growth and competitveness
from 4% in early 90ties to 8% today.
half of productivity gains in our economies are due to ICT (impacts business efficiency, underpins innovations)
ICT provides tools for addressing societal challenges: aging population, inclusion, healthcare, education, satery, environment and risk mgmt.
Enables and facilitates participation in public life through modernising administration.

FP7 – 763 project proposals submitted, 73 projects accepted (for Poland)
*** Tanya Lemke, Smart Technologies

Education Consultant Manger, EMEA
Transforming Education for the 21st century

www.smarttech.com

Question from the audience: consumerism, electronic teaching is going into wrong direction. Eletronic waste is a problem. Smart boards may not be a good way to engage the students or at least not to outweight the benefits.

*** Quentin Stafford-Fraser
(recorded lecture from Katowice)

2001, 1 week, front page. Quoted because he put a camera image onto the internet of a coffe mag.

Cory Doctorow: “Innovation happens when people can afford taking risks”
Being able to fail is a necessary component of the innovation framework. Innovators, investors and govt must understand it.
You need to know your own limitations, and work with people that do not have these. When hiring, always try to get people that are better than you. Work with people. Find what motivates and drives you.
Often good ideas might be used in a different contexts. Example of an eye tracking device to type (around 12 eye position). This is how T9 predictive typeing was born. Originally for a different purpose. “Your child may grow up to do something different”. Be prepared for your idea to evolve to something else, something that you have not predicted in advance.

March 2006, trials of using NIVO (Network-in Video out). NTN and GSM mobile phone network was used. NIVO devices are connected to a single PC, which in turn is connected to a mobile phone (through EDGE).

pixels over network

displayLink (company started in 2003 for multidisplay solutions)
ndiyo! (developing countries)

Final thoughts: simple ideas can have the biggest impact, listen to your frustrations, be humble, know your limitations and find people who can make up for them, your child may not grow up to do what you thought it would make up for it.
** 14:30 AAIA – second poster session

** joining the WAPL
2nd workshop on Advances of Programming Languages

*** Jan Kollar, Peter Vaclavik
Data-driven executable language model

Problem: abstraction transformation into implementation becomes a problem with higher complexity problems. Proposed solution: programming in a specially designed intermediate abstract architecture. Namely: executable model driven by data streams.

Communication channels
– transitive clasures
– optional constructs
– jump to a numbered construct
– consuming a value of the terminal symbol

instructions coded as integers. distinction between user input, and machine input.
*** Koen Vanderkimpen, K.U.Leuven, Belgium
MultiProperties (in C#)

new properties
change to the normal C# syntax – the fields are encapsulated into the property. Later, the default keyword “store” has been introduced so that the field does not need to be declared at all. No more fields. Only properties.

multi properties
properties when declared with keyword “multi” are better suited for dealing with collections. MultiProperties provide extra methods (apart inspectors and mutators), i.e. add, remove, clear, indexation, etc. Different types of collections will offer different methodsets.

** 16:30 WAPL session 2, DSL comprehension

*** Nuno Oliveira
University of Minho,

Applying Program Comprehension Techniques to Karel Robot Programs

traditional program comrphension tools use 3 phases
– analysis and data extraction

– visualisation

the problem is that programs might be quite detached from the domain specific comprehension. DSL (domain specific languages).

DSLs reduce distance between problem and program domains, program constructs are then naturally much closer to problem domain constructs, more abstract, and the mapping is natural.

Alma is used to construct the program domain visualisation. There is also Alma2 which is an extension to Alma. Alma creates abstract syntax tree but annotated with domain specific constructs. The group uses Alma to generate certain animations while traversing AST. The group uses Karel language for controling the robot.

*** Tomaz Kosar, Marjan Mernik, et al
Influence of domain specific notation for program understanding

“DSLs are computer languages of the forthcoming years.”
DSL provides appropriate built-in abstractions and notations. It is dedicated to a particular domain or problem. it is usually small, more declarative. And so on – many definitions. Sometimes called “end-user languages” – convenience is important.
Shortcomings: lack of tool support, cost of DSL development, poor interoperability with other languages, resistance to learn new languages
Benefits: easier program understanding, writing and reasoning, enhanced productivity, reliability, reusability, easier verification, reduced semantic distance between the problem and the program domains.

Are DSLs really easier to understand than GPLs? Study:
– FDL vs Java API
– XAML vs C# forms
– DOT vs C API

The results:
DSLs success rate was around 15% better than GPLs (learn, perceive, evolve). Programmers average time to complete the tasks was 40% better for DSLs.

 

* Day 3

** 9:15, PTI, Patents and Copyrights (in Polish)

*** Grzegorz Plucinski

Patenty w informatyce sa potrzebne, aktywny czlonek PTI zajmujacy sie prowem autorskim i patentami. Polska: ustawa z dnia 30.06.2000, nowelizowana czesto. Podstawa zrozumenia patentu zawarte z art.63 ustawy.
Nie narusza sie ustawy np.:”stosowanie wynalazku do celow badawczych i doswiadczalnych, dla dokonania jego oceny, analizy albo nauczania;”

Patenty w informatyce:
– zestawy danych, parametryzacja algorytmu (jest czy nie jest patentowalne)??
– RSA (i niektore inne algorytmy) w polsce nie obowiazuja
– programy komputerowe: w polsce nie wolno (art. 28), nie maja zdolnosci patentowej, sa przedmiotem ochrony wynikajaceq z praw autorskich (rowniez w EU).
– algorytmy: w polsce nie ma konkretnych wytycznych, moga posiadac zdolnosc patentowa, ale sa trudne w zdefiniowaniu (przyklad patentu uzywajacego pamieci ferrytowych, ktore obecnie juz nie sa uzywane).
– rozwiazania sprzetowe: patenty funkcjonuja, dziedzina czysto techniczna
– rozwiazania implementacyjne: cos z pogranicza oprogramowania, moga posiadac zdolnosci patentowa, ustawa pozwala patentowac. Np. sposob indeksowania rekordow w bazie danych (kontrowersyjne, gdyz nie jest jasne jak to sie rozni od patentu).
Zastrzezenia patentowe powinny byc w calosci poparte opisem wynalazku i okreslac w sposob zwiezly, lecz jednoznaczny przez podanie cech technicznych itd.
“Kazde zastrzezenie powinno byc ujete jasno, w jednym zdaniu lub rownowazniu zdania”.

Dlaczego patentowac:
– marketing: innowacyjnosci firmy, zdobywanie dofinansowan, dotacji, itd. prestiz. W celu marketingowym nie ma znaczenia na co ten patent jest.
– cel przemyslowy: finansowy
– cel defensywny (podany z sali)
– patenty podnasza wartosc firmy
– motywowanie pracownikow

Problemem jest zaadoptowanie patentow z innych krajow, co jakby podwaza dokladna tresc ustaw patentowych w danym kraju.

*** Pawel Dobrzynski
Prawa autorskie w internecie: zabezpieczenia stosowane w cyfrowych ksiazkach

2001 – pierwsze czytniki (LCD), 2004 – Sony Librie – pierwszy czytnik wyposazony w ePaprie, 2008 – Kindle (amazon), producenci: sony, iRex, Netronix, Jinke

Zrodla i rozne formaty: gutenberg.org, bookini.pl, google books, mobipocket.com, virtualo.pl, zlotemysli.pl

Copyright (jako licencja i jako prawo)
1984, Sichard Stellman, Copyleft, All rights reversed, GNU GPL
2001, Creative Commons, Some rights reserved, (CC)

Ochrona wlasnosci intelektualnych: dokument jest szyfrowany, zabezpieczenie pewnych funkcji, latwe do zlamania, podatne na kradziez, wymaga zgodnych programow, niektore programy nie honoruja zabezpieczen.

Mobipocket: francuska firma, powstala 2000, w 2005 wykupiona przez Amazon, specjalizowany format dla uzadzen mobilnych. Trik: zeby bez wzgledu na rozmiar czcionki, zeby strona miescicla sie dokladnie na ekranie urzadzenia (przeformatowanie on-the-fly).

Amazon Kindle, uzywal GSM i sieci Sprint i dzialal tylko w USA. Od pazdziernika ma byc wersja miedzynarodowa.
*** Wladyslaw Majewski

Bez patentow informatycy radza sabie lepiej… i co jeszcze czeka nas w Europie?

Nie mozna koncentrowac sie tylko na prawie polskim. Rozmowa na temat rozstrzygania spraw wlasnosci intelektualnych w Stanach Zjednoczonych. Sprawy patentowe dot. oprogramowania nie byly regulowane odgornie, a raczej wynikaly z takich wlasnie nieciekawych praktyk prawnych.

Sprawa Bielski.

*** dr. Wojciech R. Wiewiorowski, Uniwersytet Gdanski
Sacra lingua info populi est

Przyklady jak jezyk informatyczny jest wtlaczany w jezyk prawny i system legislacyjny.

Informatyczny nosnik danych: material lub urzadzenie sluzace do zapisywania, przechowywania i odczytywania danych w postaci cyfrowej i analogowej (zwrot “i analogowej” zostalo jakby dodane przez przypadek, i ma kolosalne reperkusje w innych aktach prawnych). Mimo iz jest system prawny do wyjasniania slownictwa, to ciagle jest mozliwosc nadurzyc i powaznych nieporozumien.

Dokument elektroniczny: stanowiacy odrebna calosc znaczeniowa zbior danych uporzadkowanyc w okreslonej strukturze wewnetrznej i zapisany na informatycznym nosniku danych.

Prawo osobiste, art. 921&1.
Przekaz – kto przekazuje drugiemu (obiorcy przekazu) swiadczenia osoby trzeciej (przekazanego), upowaznia tym samym odbiorce przekazu do przejecia, a przekaanego do spelnienia swiadzczenia.
*** Ryszard Adam Rytner, Krzysztof Radzimski
E-Akty Prawne: Kiedy “papier” przestanie byc oryginalem?

Dyskusja wstepna: jak uniezaleznic sie od Internetu, w sensie, jak zorganizowac strukture sieciowa w taki sposob zeby panstwa nie byly uzaleznione od USA. Wszelka zaleznosc od Internetu (Internet core) jest zaleznoscia od rzadu USA i kilku firm kontrolujacych ta infrastrukture.

*** Marek Wierzbicki, MOTTE, QSort.biz, consulting
Jak rozmawiac z informatykiem?

Istnieje 10 klas ludzi (ci ktorzy rozumieja system binarny, i ci ktorzy nie rozumieja)
Reklama szkolenia – prezentacja jest skrotem tego szkolenia

– klienci bardzo duzo mowia, czesto bez sensu. (klient ma zawsze racje bo klient placi)
– informatycy szybko sie zniechecaja do sluchania bzdur

“Teoria czterech uszu” – sprawdz ksiazke. Metody “miekkie”.

Lepsze zrozumienie wymaga ustalenie slownictwa i obustronna wymiana informacji. Ustalenie wspolnego jezyka.
*** O konwergencji – nie tylko na powaznie
Marek Sredniawa, Edwin Bendyk
Telekomunikacja! Sprawdz kontakt
Common IMS, mobilny i semantyczny Internet. Mobilnosc + Semantyka.

Teoria kultury konwergencji – Henry Jenkins
Nova Spivack: Metaweb
reklama: azouk.com – wyszukiwarka semantyczna, eksperci dla ekspertow.

Piramida Maslowa: potrzeby biologiczne na dole, bezpieczenstwo, przynaleznosc do grupy, uznanie grupy, samospelnienie na gorze. Dostep do sieci jest gdzies na dole.

Leave a Reply

Your email address will not be published. Required fields are marked *