Skip to main content
  • Conference proceedings
  • © 2019

Information and Software Technologies

25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings

Conference proceedings info: ICIST 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (46 papers)

  1. Front Matter

    Pages i-xvii
  2. Information Systems: Special Session on Innovative Applications for Knowledge Transfer Support

    1. Front Matter

      Pages 1-1
    2. Forecasting the Level of Expert Knowledge Using the GMDH Method

      • Justyna Patalas-Maliszewska, Małgorzata Śliwa, Sławomir Kłos
      Pages 3-11
    3. Declarative Model of Competences Assessment Robust to Personnel Absence

      • Eryk Szwarc, Grzegorz Bocewicz, Irena Bach-Dąbrowska, Zbigniew Banaszak
      Pages 12-23
    4. Fuzzy Delphi Method with Z-Numbers

      • Marcin Lawnik, Joanna Krakowczyk, Arkadiusz Banasik
      Pages 24-32
    5. Use of Chatbots in Project Management

      • Dace Cīrule, Solvita Bērziša
      Pages 33-43
  3. Business Intelligence for Information and Software Systems: Special Session on Intelligent Methods for Data Analysis and Computer-Aided Software Engineering

    1. Front Matter

      Pages 57-57
    2. TabbyXL: Rule-Based Spreadsheet Data Extraction and Transformation

      • Alexey Shigarov, Vasiliy Khristyuk, Andrey Mikhailov, Viacheslav Paramonov
      Pages 59-75
    3. Extending Interaction Flow Modeling Language (IFML) for Android User Interface Components

      • Iffat Fatima, Muhammad Waseem Anwar, Farooque Azam, Bilal Maqbool, Hanny Tufail
      Pages 76-89
    4. Directed Multi-target Search Based Unit Tests Generation

      • Greta Rudžionienė, Šarūnas Packevičius, Eduardas Bareiša
      Pages 90-109
    5. Modeling Bimodal Social Networks Subject to Recommendation

      • Robert Albert Kłopotek
      Pages 121-135
    6. On Similarity Measures for a Graph-Based Recommender System

      • Zühal Kurt, Alper Bilge, Kemal Özkan, Ömer Nezih Gerek
      Pages 136-147
    7. Modelling Patterns for Business Processes

      • Prima Gustiené, Remigijus Gustas
      Pages 161-172
    8. Challenges for Automated, Model-Based Test Scenario Generation

      • Alexander Kolchin, Stepan Potiyenko, Thomas Weigert
      Pages 182-194
  4. Information Technology Applications: Special Session on Information Technology Security

    1. Front Matter

      Pages 195-195
    2. Investigation of Matrix Power Asymmetric Cipher Resistant to Linear Algebra Attack

      • Aleksejus Mihalkovich, Matas Levinskas
      Pages 197-208

Other Volumes

  1. Information and Software Technologies

About this book

This book constitutes the refereed proceedings of the 25th International Conference on Information and Software Technologies, ICIST 2019, held in Vilnius, Lithuania, in October 2019.

The 46 papers presented were carefully reviewed and selected from 121 submissions. The papers are organized in topical sections on information systems; business intelligence for information and software systems; information technology applications; software engineering. 



Editors and Affiliations

  • Kaunas University of Technology, Kaunas, Lithuania

    Robertas Damaševičius, Giedrė Vasiljevienė

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access