translated by Google

Machine-translated page for increased accessibility for English questioners.

Seminar program for 2000/2001

Thu. 11.00 - 12.00, D2
Lecturer: doc. RNDr. Ivan Kopeček, CSc. ( )

Autumn 2000

5. 10. 2000
Introductory Seminar of the Spring Semester
Information about the seminar concept.
Agenda of the seminar.
12 October 2000
Pavel Rychlý
Modular Corpus Manager Design
The lecture will briefly explain the concept of text corpus and corporal manager. In addition, the Corpus Manager Manatee will be introduced, based on the dissertation "Corpus Managers and their Effective Implementation" and several projects realized in the Natural Language Processing Laboratory. The overall structure of the manager will be presented, and some technical details of the key modules will be mentioned. The scalability of the manager (from the perspective of the user and the programmer) will be presented on specific examples. Finally, other NLP applications that are not directly related to corpora, but use some manager modules are listed.
19. 10. 2000
Pazdziora, J.
Building web applications in XML / XSL framework
The presentation explores the possibility of building WWW applications using the XML core and XSL transformation open source tools. It focuses on AxKit and other mod_perl featured tools. Issues with dynamic applications and information system will be addressed. No preliminary knowledge of XSL is assumed.
26. 10. 2000
T. Staudek, J. Racek, J. Sluka
Defending the thesis
This seminar will take place exceptionally in FI session (5th floor)
2. 11. 2000
Petr Matula
Fluorescence image analysis
Performing various measurements on cells and their parts plays a key role in both basic and applied biomedical research. The most detailed measurements are currently achieved by analyzing images obtained by optical microscopes. The images obtained by the fluorescence microscope consist of several gray-tone channels. The individual channels correspond to different views of the same scene. The task of image analysis is to create a model of observed objects from these views to make the desired measurements. The aim of the lecture is to describe in detail one of the problems to be addressed and to show a possible approach to its solution.
Marek Veber
Morphological database and its editing
The morphological analysis of the written words of a given language is the process of finding all the possible basic shapes and grammar categories of the examined word form, regardless of the context. In morphological analysis, finite automata (implementing morphological phenomena) are preferably used to compress lexicons of a particular language. To refer to such lexicons as morphological databases. In the paper will be presented the structure of the morphological database based on the dissertation thesis Dr. Clarks Oselsoba (used by morphological analyzers Ajka and Lemma). Some improvements to this structure will be proposed to facilitate editing and maintenance. It will also present a tool for visualizing a morphological database for users and for interactive repairs.
9. 11. 2000
Ondrej Zidek
Presentation of 3D data on the Web and distributed GIS
Geographic information systems are systems dealing with the administration, analysis and presentation of spatially referenced data. Information system architectures have evolved in the last decade, from monolithic to client-server, three-layer to distributed. Tenfo actually needs to be addressed in the design of GIS. In the lecture will be presented a proposal of the structure of generalized distributed GIS.
In connection with the need to ensure maximum openness of the system vis-à-vis users, the Web-based interface is increasingly being selected. It is for GIS to handle the principles of spatial data presentation in raster and vector formats in web browsers. The paper will present possible ways of solving this problem.
16. 11. 2000
Eva Hladka
Pogramable routing
In the lecture will be presented architectures of programmable networks and their basic elements - programmable routers. Advantages and disadvantages of individual approaches will be shown. The basic schema of the PC router with the NetBSD operating system and its role in the past and present of the Brno Metropolitan Network will be shown. The router's PC schema is based on a custom design for extending this router to a programmable router. A family of protocols will be described to ensure this extension and their evaluation. Finally, the advantages of the described approach and the comparison with other models will be mentioned.
23. 11. 2000
Leo Hadacz
Inference of semantic information of natural language expression
The lecture will focus on the presentation of the semantic information inference contained in the natural language expressions. For this purpose, students will be briefly introduced to Transparent Intensive Logic (TIL) and its use for semantic analysis of natural language. Examples of semantic representations of simple natural language expressions will be presented, explaining why they were designed in the same way. The concept of inference will be further explained. Inference will be demonstrated on examples. The TIM system, which is (yet unfinished) implementation of the proposed inference method, will be introduced. Furthermore, semantic representations will be presented for more complex natural language expressions.
30. 11. 2000
L. Markovic
High performance computing in Java - Fact or Fiction?
The possibilities of creating parallel / distributed applications in Jave will be presented.
The results of the project will be presented, with the aim of assessing the suitability of the selected standards for accelerating calculations.
7. 12. 2000
J. Vochozka
Description of help document ML
The speech will be focused on the text processing of the markup language. Duraz will be placed on the description of the tool, which can describe the structure of DTD Data Type Definition and its relation to other documents (RDF Resource Description Framework).
14 December 2000
I. Kopecek: Poster - a party
V. Svalbach: Posters - art page
+ discussion
Presentation of scientific results in the form of posters has recently gained popularity. With this question, we choose the appropriate form, the presentation style and the poster pages. This will be the subject of the talks and the following discussion.
21. 12. 2000
Poster Session
The posters will be presented in the Seminar of the Information Seminar in the autumn semester.

Spring 2001

22. 2. 2001
Introductory Seminar of the Spring Semester
Seminar program for the spring semester.
March 1, 2001
Eva Hladká: Collaborative environment
The presentation will focus on the area of ​​the Collaborative Environment. Basic hardware and software tools and problems of their use will be described. Consequently, transmission models for this environment and protocols, their pros and cons, will be mentioned. The author will introduce her own experience with managing this environment for Datagrid and the ERCIM videoconferencing group. The Abone (Active Backbone) concept will be introduced to show what techniques can be used in this network to overcome the problems of a collaborative environment deployed on the Internet.
8.3. 2001
J. Kasprzak: News in Linux 2.4
At the beginning of January 2001, a new stable Linux kernel series, version 2.4, was released. In the contributions, we will look in more detail at what Linux 2.4 brings new and what changes exist in existing subsystems.
15.3. 2001
Zdeněk Říha: Biometric Authentication Systems
We have heard more and more often about biometric systems recently. However, biometrics as such are not new to the past. Biometric systems have been used for years now. In the last few years, however, due to the increase of the speed of ordinary computers and the improvement of the comparison algorithms, a wide variety of biometric systems have been expanded. The first part of the paper focuses on the most widely used biometric technologies. These include fingerprints, eye iris pattern and eye background, hand geometry, facial and voice recognition. In the second part I will mention some security aspects of biometric systems. Although the word biometrics is perceived to be almost synonymous with ideal security, current biometric systems are still far from perfect.
22.3. 2001
R. Ošlejšek: Object analysis of graphic architectures
Current languages ​​and libraries for description and processing of three-dimensional scenes can only be displayed using local lighting or are narrowly focused on one type of global lighting. The reason is the difficulty in finding a universal software model usable for multiple variants of lighting algorithms. First, one solution of the object decomposition of graphic architectures will be presented, the second part will focus on problems with the design of scenes using spatial space structures.
29.3. 2001
R. Sedlacek: Computer-savvy word-processing
At the beginning of the lecture, the place of word formation in the system of linguistic disciplines will be defined and a morphological analysis of the word will be presented. In addition, the necessary concepts, relations, classifications, methods and procedures in the classical linguistic concept of word formation will be explained, approaches to solving this problem will be outlined using computer technology and discussed possibilities of using word-based analysis in NLP. All the lecture points mentioned will be illustrated by appropriate examples.
5.4. 2001
J. Srba: Moral Aspects of Informatics
At this seminar, I will try to introduce the issue of Responsible Conduct in Computer Science in somewhat non-standard way. In brief, the moral conflicts in which we can find our scientific community will be presented and the basic ethical principles of science, primarily focused on information technology, will be demonstrated. An "ACM Code of Ethics" will also be discussed. In the second part of the seminar, there will be five examples of selected examples (conflict of interest, publishing activity and openness, copyright practices, unethical behavior, error and negligence) to discuss small groups in tax issues with a consistent presentation of the views of individual groups.
12 April 2001
B. Málková
New copyright law from the point of view of informatics
Act No. 121/2000 Coll., On copyright, on rights related to author's rights and on the amendment of some laws (author's law), subject of copyright - clarification of conceptual characters, originality and uniqueness of computer programs and electronic databases, specificity of the copyright regime of computer systems program, personality and property rights, special rights of the database provider.
19. 4. 2001
Jorge Carrillo Ugalde: Cryptography with photons
The current approach to cryptography is based on complexity theory and the belief that cryptoanalysts should not have enough time or space to decrypt messages. The results of quantum computing indicate that quantum mechanics have the potential to ruin a large part of contemporary cryptography. For these reasons, we need to find alternatives for the new kind of cryptography. In this talk we explain the basis of Quantum Cryptography.
26.4. 2001
M. Misáková: Evaluation of the Quality of the University Information System
If we put the information system at the university, the question arises after a certain period of time how the whole project was successful. How do you evaluate the quality of the result of such an event? On what parameters should the interviewer be oriented? Given the very incomparable nature of individual university systems, the issue is very vaguely questionable. At the seminar we will try to mention individual methods of such tests, to think new. In addition to the classic categories (UIS scope, reliability) and less common metrics, the data are filled (ie what data and how many have been collected by the introduction of UIS in the institution, people are oriented to the minimum, or databanks spontaneously fulfill information ?) and penetration (how many people actually work with UIS, what class of tasks do they process, how much UIS has become a part of the working day, and is it useful to management or even academic community?). Quality assessment is, of course, closely linked to human factor; in addition to extracting the above mentioned data from the system runtime data, various surveys, feedback from direct users can be used. Demonstrated on experience with the implementation of the MU information system.
3. 5. 2001
Pavel Matula: Reconstruction of spherical objects using deformable models
Deformable models are a promisingly advanced technique that finds use in many image analysis tasks. It is a powerful tool that combines bottom-up limitations and top-down a priori knowledge of the shape, location, and size of the object being searched for. The lecture will first give a basic overview of deformable models. Then a new method will be presented, which was created at the Faculty of Informatics, suitable for the reconstruction of spherical objects. The success of the new method will be demonstrated on real data (3D images of cell nuclei scanned on a confocal microscope).
10. 5. 2001
D. Kouřil: Grid Environment Security, Datagrid.
In the field of distributed systems, interest in the exploration and use of grid technologies is increasing. One of the projects that build on this technology is the European project Datagrid, which is also attended by Czech Cesnet. The paper deals mainly with security issues in the grid environment and a description of the specific security mechanisms chosen or imposed for the implementation of the "Czech" part of Datagrid.
17.5. 2001
A. Horak: Czech Language Parser
The main points of the Chomsky Standard Theory of Syntax will be summarized in the lecture following the specification of basic concepts of natural language syntax analysis. Here are three major grammatical formalisms used in the analysis - LTAG, LFG and HPSG. Finally, we present the results from the implementation of an efficient Czech word syntax analyzer, which is based on the head-corner chart parsing analysis with added context actions and tests to ensure grammatical matching and generate a tree-like output. Not yet delivered.
17.5. 2001
J. Strejcek: Models of Endless Condition Systems with Limitations
Expand the formalism of the reprogramming formalism about a unit capable of generating global information that affects and is affected by system transitions. The Zminena unit is similar to the "store" unit used in Concurrent constraint programming, but can also be seen as a special (in a sense-poor) state unit. We will show how such a unit changes the expressive capability of standard triad types of transcription systems assigned to Mayr's PRS-hierarchy. New classes will be described (fcBPA, fcBPP, fcPA, fcPAD, dcPAN, fcPRS) and inserted into the hierarchy.
24.5. 2001
Presentations will be created during the spring semester.