Search  English (United States) Hrvatski (Hrvatska)

innovative promotional partnershipDriving the Future with Smart and Intelligent ICT

Technical co-sponsorship

 
MIPRO 2025 - 48th Convention

SSE - Software and Systems Engineering

Tuesday, 6/3/2025 9:00 AM - 3:00 PM, Nava 1, Hotel Admiral, Opatija

Hybrid Event
Event program
Tuesday, 6/3/2025 9:00 AM - 3:00 PM,
Nava 1, Hotel Admiral, Opatija
Openning and Welcome

Chair: Tihana Galinac Grbac 

9:00 AM - 10:30 AMLLM for Software and System Engineering

Section chair: Michel Burch 

1.I. Urek, K. Aleksić Maslać (Zagreb School of Economics and Management, Zagreb, Croatia), A. Budin (Ericsson Nikola Tesla/Zagreb School of Economics and Management, Zagreb, Croatia)
An Insight into the Impact Of Generative Artificial Intelligence Tools on Software Development Practices 
Integration of Generative Artificial Intelligence (AI) tools into software engineering, especially for automated code generation, has started reshaping development practices and raising questions about the future of the profession itself. This paper presents the results of a research exploring the impact of AI on software engineering, focusing on three key aspects: automated code generation, human-AI collaboration and ethical considerations. The use of Generative AI tools, in particular AI chatbots ChatGPT, Gemini and Bing, has been tested on coding examples of varying levels of difficulty. The results demonstrate outstanding capabilities of the tested tools in streamlining tasks and providing assistance, but show that these tools remain most effective when integrated into a workflow under the supervision of qualified engineers/developers. The paper also presents the results of a survey conducted among software engineers/developers highly proficient in using AI. The survey indicates that most of the respondents believe that AI has a positive impact on the productivity of software engineers/developers, with more than half of respondents believing that AI will not replace software engineers/developers but is a tool that helps them be more productive. Survey respondents particularly emphasized the importance of ethics, privacy, and data security.
2.T. Hynninen, S. Maunula (Häme University of Applied Sciences, Hameenlinna, Finland)
Towards Enabling Privacy-First AI Solutions for SMEs Using Open-Source LLMs 
Large language models (LLMs) have opened new possibilities for AI applications. Adoption is easy, for example, for big tech companies but small and medium-sized enterprises (SMEs) can face barriers such as data privacy, vendor lock-in, and lack of technical know-how. The current paper describes an initiative where open-source LLMs can enable secure, privacy-first AI solutions for SMEs. This is demonstrated with the implementation of a private AI chatbot powered by open-source local LLMs. As a result, this paper describes the design and use cases of the prototype system. We hope that bridging the gap between privacy, security, and accessibility will enable SMEs to innovate AI solutions without compromising sensitive data.
3.E. Leka (Polytechnic University of Tirana, TIRANE, Albania), A. Aliti (Mother Teresa University, SKOPJE, Macedonia), L. Lamani (Polytechnic University of Tirana, TIRANE, Albania), E. Hoxha (Albanian University, TIRANE, Albania)
The Role of Artificial Intelligence in Transforming Tourism: Enhancing Personalization, Engagement, and Sustainability 
Artificial Intelligence (AI) is revolutionizing international travel by providing more personalized, engaging, and environmentally conscious experiences. This article investigates the revolutionary influence of AI-powered technologies, such as Natural Language Processing (NLP), Machine Learning (ML), and conversational AI on the way travelers plan, experience, and interact with places. AI-powered technology, such as recommendation engines, multilingual chatbots, and gamified digital guides, improves visitor happiness by lowering language barriers and personalizing experiences to individual tastes. AI has also improved the tourism industry's environmental sustainability and operational efficiency. Despite its enormous promise, the use of AI in tourism confronts many difficulties, including expensive development costs, data privacy concerns, and unequal access to technology. This paper explores these impediments critically and recommends responsible implementation options, with a focus on stakeholder inclusivity and collaboration. This work highlights AI's involvement in tackling industry difficulties such as limited digital adoption, low stakeholder synergy, and sustainable sector. The findings add to a growing corpus of studies on using AI to fulfil changing tourist expectations, promote economic growth, and ensure tourism's resilience in the digital age.
4.T. Nikolova, S. Toleva-Stoimenova (University of Library Studies and Information Technologies, Sofia, Bulgaria)
Application of Large Language Models for Enhancing Bug Reporting Activities 
Software testing is a vital phase of the Software Development Life Cycle, ensuring system quality, reliability, and requirement compliance. Central to this process is defect management, which involves systematic identification, classification, and resolution of software defects. A well-defined defect management strategy enhances product quality and team efficiency. This paper presents a structured model inspired by CMMI and TMMi standards, combining comprehensive defect reports and an extended bug status workflow. Despite its strengths, some challenges emerged when in was applied - redundant fields, fragmented responsibilities, and lack of visibility – and highlighted the limitations of traditional bug report systems. To address these gaps, the paper explores the integration of Large Language Models into the bug reporting lifecycle. A review of recent research highlights Large Language Models’ potential to automate bug triaging, generate concise summaries, assist in test case creation for defect reproduction, support automated fixing, predict severity levels, and enhance bug taxonomy classification. Large Language Models can reduce manual effort, improve communication, and ensure more consistent handling of the defect data.
5.A. Dreshaj, M. Hamiti (South-East European University, Tetovo, Macedonia), Z. Hasani (University "Ukshin Hoti", Prizren, Kosovo), N. Besimi, J. Ajdari (South-East European University, Tetovo, Macedonia)
Systematic Literature Review on Automatic Anomaly Detection Based on Database Logs 
Automatic anomaly detection based on database logs is a crucial technique for ensuring the security and reliability of modern database management systems. This systematic literature review, which is of significant importance to the field, summarises the existing research on database logs methodologies, algorithms, and anomaly detection applications. The review explores various approaches, including statistical methods, machine learning techniques, and hybrid models, highlighting their effectiveness in identifying anomalies such as unauthorised access, data corruption, and performance issues. By analysing conference papers, articles, and industry reports published over the past two decades, this study identifies key trends, challenges, and future directions in the field. The findings suggest that while significant advancements have been made, there are still gaps in scalability, real-time detection, and handling of complex data environments. This review provides a comprehensive overview for researchers and practitioners, engaging them in the current landscape and inspiring them to develop more robust anomaly detection systems in database management.
6.M. Mijač, D. Oreški, L. Posarić (Faculty of Organization and Informatics, Varaždin, Croatia)
A Framework for AI-Powered Neutralization of Environmental Interferences in Measurement Processes 
Accurate measurements are essential for understanding, comparing, and controlling phenomena around us. However, measurement accuracy is often compromised by interfering factors such as instrument quality, calibration, operator skill, and environmental conditions (e.g., vibrations, electromagnetic fields, or weather). While issues like instrument quality and operator training can often be addressed, mitigating complex environmental interferences poses a greater challenge. Traditional approaches struggle to model the intricate effects of such interferences, making AI a promising alternative due to its ability to leverage large datasets to capture complex patterns and relationships. In this paper, we propose AIM, a software framework designed to support the development of AI-powered solutions for neutralizing environmental interferences during measurement processes. AIM provides a modular architecture and generic building blocks to seamlessly integrate base measurement instruments, auxiliary sensors, and AI models, facilitating the creation of tailored solutions for accurate measurements.
7.S. Siddeeq (Tampere University, Tampere, Finland)
Distributed Approach to Haskell Based Applications Refactoring with LLMs Based Multi-Agent Systems 
We present a large language models (LLMs) based multi-agent system to automate the refactoring of Haskell codebases. The multi-agent system consists of specialized agents performing tasks such as context analysis, refactoring, validation, and testing. Refactoring improvements are using metrics such as cyclomatic complexity, runtime, and memory allocation. Experimental evaluations conducted on Haskell codebases demonstrate improvements in code quality. Cyclomatic complexity was reduced by 13.64\% and 47.06\% in the respective codebases. Memory allocation improved by 4.17\% and 41.73\%, while runtime efficiency increased by up to 50\%. These metrics highlight the system’s ability to optimize Haskell’s functional paradigms while maintaining correctness and scalability. Results show reductions in complexity and performance enhancements across codebases. The integration of LLMs based multi-agent system enables precise task execution and inter-agent collaboration, addressing the challenges of refactoring in functional programming. This approach aims to address the challenges of refactoring functional programming languages through distributed and modular systems.
10:30 AM - 10:45 AMBreak 
10:45 AM - 11:45 AMProgramming Aspects of Software and System Engineering

Section chair: Tihana Galinac Grbac 

1.M. Burch, S. Mettler (FHGR, University of Applied Sciences, Chur, Switzerland)
A Preliminary Study of the Structural Dynamics of Open Source Software 
Software evolution encompasses all changes and adaptations in a software project from its initial development to the later stages of its lifecycle. Understanding this evolution helps developers identify patterns and potential issues, supporting, e.g., the decision to conduct refactorings with the goal of improving maintainability. In this paper, we investigate the dynamics of open source software projects in a programming language-agnostic manner. To illustrate the usefulness of our method, we analyzed 16 software projects written in Java, Python, and C++. As a result, we found differences in the structures of the software projects,
2.G. Spaits, K. Umann, Z. Porkoláb (ELTE Eötvös Loránd University, Faculty of informatics, Department of Compilers and Computer Language, Budapest, Hungary)
A Comparative Study of Static Program Slicing Tools for C 
Program slicing techniques have been a hot topic in the field of program analysis since the early 1980s. These techniques are most often used to find all program statements that might effect the state of a so-called slicing criterion. A slicing criterion is usually defined as a variable statement pair. For instance, if a division by zero error occurs program slicing may help reduce the program to the set of those statements that contributed to the bug. In this case, the slicing criterion would be the denominator at the point of the division. There are many approaches to program slicing, most notably dynamic and static. There have been numerous studies on the theoretical capabilities of many dynamic and static slicers and many practical results were drawn on certain benchmarks. With that said no study takes a look at currently available slicing tools on real software. In our paper, we intend to fill this gap by measuring the performance of tools like Llvm-slicer, Frama-C and Unravel. We also show a methodology for selecting slicing criteria against which slices can be measured, which has historically been a pain point of this field of study.
3.Z. Sirotić (ISTRA TECH d.o.o., Pula, Croatia), S. Sovilj, M. Oršulić (Faculty of Informatics, Pula, Croatia), K. Pripužić (Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
Comparison of Java Virtual and Non-Virtual Threads in Parallel Programming 
The Java programming language, in its long-term support version 21 (released in September 2023), introduced Java virtual threads (prior to version 21, this was a prototype solution). While Java non-virtual (or platform) threads are mapped one-to-one to operating system threads, multiple Java virtual threads can be executed on a single platform thread, i.e. on a single operating system thread, which makes the number of Java virtual threads practically unlimited. Java virtual threads enable writing code that is as efficient as asynchronous code but is more readable, much easier to debug, and provides clearer error messaging (exceptions) compared to asynchronous code. It is often stated that virtual threads are primarily intended for concurrent programming (e.g. each active user on an application server can now be assigned a separate virtual thread) and are less suited for parallel programming (where a task is divided into subtasks to utilize the processing power of multiprocessor systems). In this paper, we analyze the efficiency of virtual threads specifically in parallel programming (counting prime numbers that are less than a given number and the goal was not to create a particularly efficient program, but to compare different methods). First, we demonstrate the use of non-virtual Java threads in Java versions 5/6 (Executors), Java 7 (Fork Join framework), and Java 8 (Parallel Streams), and then we modify the Java 5/6 program (with very simple changes) to an equivalent program using Java 21 virtual threads. It was found that Java 21 virtual threads were slightly slower in our case than the solution using non-virtual threads.
4.D. Lozic, V. Bralić (Veleučilište Velika Gorica, Velika Gorica, Croatia), A. Filipović (CARNET, Zagreb, Croatia)
Concurrency model in Go programming language 
As demands for scalable systems grow, effective concurrency management becomes important. Go's concurrency model, based on goroutines and channels, provides an efficient and developer-friendly framework for managing concurrent tasks. Lightweight goroutines enable dynamic task execution, with Go's runtime efficiently mapping numerous goroutines onto a small set of system threads. The channel-based communication introduces a synchronization mechanism, reducing the complexity inherent in traditional multithreading approaches. This paper analyzes the principles of Go's concurrency design, highlighting its simplicity and efficiency. Through real-world examples, we demonstrate Go's capability to build scalable, high-performance systems.
5.M. Kovács, K. Bolla (John von Neumann University, Kecskemet, Hungary)
A Comparison of UIKit and SwiftUI in iOS Development 
In the field of iOS development, UIKit has historically served as a foundational tool for the creation of user interfaces. In contrast, SwiftUI's modern, declarative framework is designed to enhance efficiency and ease of use. UIKit affords the user comprehensive control over every element, thereby making it an ideal tool for the creation of complex applications. In contrast, SwiftUI streamlines UI development with its transparent and intuitive syntax, supporting numerous Apple platforms. SwiftUI provides real-time previews and enhances the efficiency of the development process. Despite its relative lack of functionality and maturity compared to UIKit, SwiftUI ensures accelerated development and cross-platform capabilities. UIKit's comprehensive documentation and robust community support provide a dependable foundation for developers. This article presents a comparative analysis of the advantages and disadvantages of the two technologies by a developer with hands-on experience of the two technologies
11:45 AM - 12:00 PMBreak 
12:00 PM - 1:00 PMEngineering Networked Systems and Applications

Section chair: Siniša Sovilj 

1.D. Fonović (Faculty of Engineering, Pula, Croatia), D. Huljenić (Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
A Survey of CoAP Congestion Control in the Context of 6TiSCH Networks for Real-Time Applications 
CoAP (Constrained Application Protocol) is a RESTful protocol standardized by the IETF and widely used for IoT applications. 6TiSCH (IPv6 over the TSCH (time-slotted channel hopping) mode of IEEE 802.15.4e) networks provide deterministic communication and high reliability through TSCH which makes them suitable for real-time IoT applications. In the context of constrained networks, network congestion can have a severe impact on the performance of real-time IoT applications. This paper surveys state-of-the-art congestion control mechanisms for CoAP in the context of 6LoWPAN (IPv6 over Low-power Wireless Personal Area Networks) and 6TiSCH networks, emphasizing their applicability to real-time applications. Additionally, it identifies key gaps in existing techniques and offers insights into optimizing network protocols for constrained environments.
2.D. Sindičić, N. Momčilović (APIS IT d.o.o., Zagreb, Croatia)
Efficient Container Image Distribution for Multi-Tenant Kubernetes Clusters 
The distributed Kubernetes environment utilizes container images to run designated workloads. Image registries, which store these container images, can be located either inside or outside the Kubernetes cluster, depending on the product and application requirements. Container image sizes can vary based on the type and scale of workloads. Consequently, the application startup time depends on the duration of the image download phase. If the image registry is hosted on a low-bandwidth link outside the cluster, this can negatively impact the application's startup time. Prolonged download times may saturate the internet link, potentially violating SLA agreements and causing issues in production environments. Previous approaches have primarily focused on building a Torrent network across Kubernetes nodes to facilitate local distribution of images. However, in multi-tenant environments or when disk space is constrained, this method becomes impractical. In this paper, we introduce a novel method that distributes container images only to the nodes when they require them, leveraging the local high-bandwidth network. This approach reduces disk space utilization and decreases the application's startup time.
3.J. Benjak, F. Tišljar, M. Šarić, N. Miljančić (Nybble d.o.o., Nedelišće, Croatia)
Flexible User Management and Access Control in Multitenant Microservice Systems 
Microservice architectures have become a cornerstone for developing scalable and modular applications, particularly in complex systems such as Enterprise Resource Planning (ERP) solutions. These systems often cater to large organizations with hierarchical structures, including parent companies overseeing multiple subsidiaries. A significant challenge arises in managing user access across such entities: some users require access to all subsidiaries, while others are restricted to specific ones. Flexible and secure access control is paramount in addressing this challenge. This paper presents an approach for flexible user management and access control in multitenant microservice environments. The proposed solution leverages JSON Web Tokens (JWT) with refresh and access tokens to dynamically manage and enforce user permissions across organizational boundaries. The architecture ensures seamless integration with microservices while maintaining robust security and scalability. This research highlights the practical implementation and benefits of the proposed approach in addressing complex user access requirements in multitenant ERP systems.
4.V. Diklić, I. Marković (FER, Zagreb, Croatia)
Vehicle trajectory filtering based on optimal control and simulator-based reconstruction 
In the automotive industry, simulations driven by real-world data are desirable for testing and development, enabling realistic and accurate performance evaluation and system optimization. However, real-world data is often plagued by disturbances due to factors such as sensor noise, outliers, varying driving conditions, recording delays, and inconsistencies that affect data reliability and limit simulation effectiveness. A common practice for mitigating these disturbances is to employ low-pass filters, Kalman filters, smoothers, or a combination of these methods to improve the quality of recorded data. While these techniques can yield accurate results, they may inhibit the use of more complex vehicle physical models or oversmooth critical moments from the traffic scenario. In this paper, we propose to rethink vehicle trajectory filtering and treat it instead as a control problem where the vehicle needs to traverse a set of reference points based on a physically realistic vehicle model.The final output of this approach is noise- and outlier-free, resampled vehicle trajectory, and states such as velocity, heading angle, and vehicle steering wheel position. The proposed method is evaluated in simulation scenarios with data plagued by various disturbances. Common solution for such data is the Rauch-Tung-Striebel smoother which was utilizes as comparison method.
1:00 PM - 1:15 PMBreak 
1:15 PM - 3:00 PMInformation Systems Design 

Section chair: Mladen Tomić 

1.S. Miftari (South East European University, Tetovo, Macedonia), A. Aliu (South East European University, Skopje, Macedonia)
Designing a Tailored ERP System with Localized Architecture for North Macedonian Enterprises 
This paper introduced a tailored ERP system designed specifically for North Macedonian enterprises. The system addresses the limitations of conventional ERP solutions by integrating localized client server architecture built using PHP and Laravel frameworks. It prioritized regulatory compliance through automated appearance to dynamic local legislation, reducing administration burdens. The inclusion of real-time multilingual supports fosters inclusivity and enhanced accessibility for the diverse North Macedonian system and multiethnic workforce. Key features include artificial intelligence powered analytics for strategic decision making, modular decision for scalability, and fully automated payroll management aligned with local labor laws. Advanced security measures, such as SQL injection prevention and CSRF protection, ensure data integrity and protection. The ERP system also incorporates tools for workplace safety and harassment reporting, promoting an inclusive work environment. The system’s novel architecture combines cultural and legal adaptability with cutting-edge technologies, providing cost-effective solutions for small and medium-sized enterprises. It enhances operational efficiency, simplifies compliance, and fosters sustainable growth. Future improvements will focus on cloud integration and expanding artificial intelligence capabilities to maintain technological relevance. This tailored ERP system sets a benchmark for localized solutions, empowering North Macedonian businesses to thrive in an increasingly dynamic and complex regulatory landscape.
2.J. Matkovic (Faculty of Mechanical Engineering, Computing and Electrical Engineering, University of Mostar , Mostar, Bosnia and Herzegovina)
Analysis of Event-Driven Service Interactions: Choreography versus Orchestration Approach 
Implementing event-driven behavior involves an approach where a preceding event occurrence triggers each action within a system. Business processes, often built using distributed, autonomous, communicating web services, frequently exhibit such behavior patterns during their execution. Two approaches emerge in integrating web services into business processes: choreography and orchestration. Choreography supports loosely coupled services that are unaware of being part of a larger scenario, and they can only be integrated through an event occurrence mechanism, i.e., by exchanging messages via a shared message container where the receipt of a message is treated as an event occurrence. Orchestration, on the other hand, implies an approach that requires the existence of a central coordinator, which usually calls services according to a predefined execution sequence. In this case, the execution does not necessarily have to be event-driven; it proceeds according to the business process definition stored on the coordinator side. This paper analyzes the possibilities for creating event-driven interactions in both approaches. It examines their complexity, advantages, and disadvantages, as well as decision-making scenarios regarding which approach would be more optimal based on the existing integration conditions.
3.P. Kudela, M. Fandakova, M. Jakubec, M. Palcak (University Science Park, University of Zilina, Zilina, Slovakia)
Comparison of Digital Technologies Deployed in The Preservation of Selected Cultural Heritage: Analysis of Accuracy, Quality and Effectiveness 
The protection of cultural heritage plays a key role in preserving historical values, making available to the public and promoting sustainability. Modern digital technologies, such as laser scanning and photogrammetry, provide accurate tools for documenting monuments and creating accurate digital duplicates. This article focuses on the comparative analysis of these technologies deployed in the protection of selected cultural heritage, with emphasis on data quality, accuracy and timeliness. The ability of these methods to meet the expectations of monument documentation experts shall be analysed by assessing the density of point clouds, the fidelity of textures and processing procedures. The article also makes recommendations with a view to optimising accuracy and efficiency. The results shall be supported by visual analyses using available tools that will demonstrate the differences in the density and quality of the data obtained and highlight their practical usefulness in protecting and restoring cultural heritage.
4.I. Zakarija, T. Besjedica, M. Lazo, R. Senjo (Faculty of Electrical Engineering and Applied Computing, University of Dubrovnik, Dubrovnik, Croatia)
An Overview of the Online Room Booking System for Higher Education Institutions 
Nowadays, the creation of timetables in many universities is still inefficient, as many employees have to enter data several times into different documents and systems to prepare the timetable for publication to students and staff. Multiple versions of the unsynchronized timetable are published. This paper provides an overview of the Online Room Booking System for universities, focusing on the data, business and presentation layers. Special attention is given to the aspects of the system that support specific administrative processes in higher education institutions, with the aim of optimizing organizational processes and resource management. A detailed description of the methodology, user requirements analysis, functional specifications and database design, is also given. The implementation of the system as a web application allows students to easily view timetables and provides an intuitive platform for reserving rooms for different types of activities (courses, conferences, project meetings etc.). In addition, the system provides a real-time check of room availability, allowing for better coordination and resource optimization.
5.K. Kavran, I. Rakarić (InfoDom d.o.o., Zagreb, Croatia)
Application of the Command Query Responsibility Segregation Design Pattern in the Information Systems of Croatian State Administration Bodies 
During the process of digitalizing Croatian State Administration bodies, an appropriate information system had to be chosen. Every administration body had to decide from which software provider to purchase the software. This paper describes an information system based on the Command Query Responsibility Segregation design pattern. A Croatian software company created the chosen information system, which is constantly updated with new features. The paper describes how the design pattern was implemented and the benefits of the selected implementation. The core concept of the Command Query Responsibility Segregation design pattern, as applied in the chosen information system, is the separation of read and write commands to the database. This separation facilitates the creation of modular microservice applications. These applications, designed to better utilize modern high-load systems, enable a high number of concurrent user requests, thereby enhancing the system's overall performance. The Command Query Responsibility Segregation design pattern offers significant advantages in the context of the Croatian State Administration bodies. It enables the scalability and customization of the information system to meet the unique needs of customers and their work environments, thereby enhancing the efficiency and effectiveness of their operations.
6.K. Kavran, I. Rakarić (InfoDom d.o.o., Zagreb, Croatia)
Caching in Information Systems Based on Command Query Responsibility Segregation Design Pattern 
Information systems in the business domain use databases to store data. Depending on the design pattern, information systems can use one or more databases. In the case of multiple databases, the purpose of each database instance can be different. Regardless of configuration, databases contain the data necessary for all operations. To reduce the number of reads to the databases and to reduce the number of recalculations, solution architects and developers use caching. In the information system based on the Command Query Responsibility Segregation design pattern, there are more options per component for implementing caching. The Command Query Responsibility Segregation design pattern plays a crucial role in caching. It allows for the separation of read and write actions, facilitating the creation of distinct cache mechanisms and the storage of different values for each type of action or component. This paper presents a practical implementation of caching in an information system based on the Command Query Responsibility Segregation design pattern. The presented caching solution allows the usage of multiple cache storages for various modules of the information system and facilitates data synchronization between modules and simplifies the process of adding or modifying features, enhancing the system's flexibility and scalability.
7.K. Kavran, I. Rakarić (InfoDom d.o.o., Zagreb, Croatia)
Eventing in Information Systems Based on Command Query Responsibility Segregation Design Pattern 
Information systems based on Command Query Responsibility Segregation must separate read and write operations to the database. This separation enables the use of multiple databases and their configurations to further separate read and write operations. In the case of multiple databases, it is essential to implement synchronization between databases. Regardless of the chosen database configuration, the bottleneck remains. Bottleneck are write operations to the database. To minimize the impact of the bottleneck, developers must choose the appropriate solution. A strong consistency database model guarantees that all changes will immediately be written in the database. Another database consistency model is eventual consistency, which guarantees that all changes will eventually be written in the database with a delay. This delay in the information systems can result in inconsistent information in the user interface if more users simultaneously work with the same data. This paper aims to describe the use of strong and eventual consistency in the database for write operations in the information system based on Command Query Responsibility Segregation. The presented solution enables the use of two database consistency models for write operations and improves system performance. This paper presents a practical application of the described database consistency models.


Basic information:
Chairs:

Tihana Galinac Grbac (Croatia), Darko Huljenić (Croatia)

Program Committee:

Stipo Čelar (Croatia), Andrej Grgurić (Croatia), Igor Ljubi (Croatia), Mladen Sokele (Croatia), Nikola Tanković (Croatia), Mladen Tomić (Croatia), Linda Vicković (Croatia)

Registration / Fees:

REGISTRATION / FEES
Price in EUR
EARLY BIRD
Up to 23 May 2025
REGULAR
From 24 May 2025
Members of MIPRO and IEEE 270 297
Students (undergraduate and graduate), primary and secondary school teachers 150 165
Others 300 330


The student discount doesn't apply to PhD students.

NOTE FOR AUTHORS: In order to have your paper published, it is required that you pay at least one registration fee for each paper. Authors of 2 or more papers are entitled to a 10% discount.

Contact:

Tihana Galinac Grbac
Juraj Dobrila University of Pula
Faculty of Engineering
Zagrebacka 30
HR-52100 Pula, Croatia

GSM: +385 99 3820 750
E-mail: tgalinac@unipu.hr

The best papers will get a special award.
Accepted papers will be published in the ISSN registered conference proceedings. Papers in English presented at the conference will be submitted for inclusion in the IEEE Xplore Digital Library. 

 

Location:

Opatija is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style, Opatija has been attracting artists, kings, politicians, scientists, sportsmen, as well as business people, bankers and managers for more than 180 years.

The tourist offer in Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools – this city satisfies all wishes and demands.

Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities in the Mediterranean, particularly important for its ICT conventions, one of which is MIPRO, which has been held in Opatija since 1979, and attracts more than a thousand participants from over forty countries. These conventions promote Opatija as one of the most desirable technological, business, educational and scientific centers in South-eastern Europe and the European Union in general.


For more details, please visit www.opatija.hr and visitopatija.com.

 

 

Download
 
News about event
Currently there are no news
 
Media sponsors

 

 

 

 

 

 

 

 

 

 

 

 

 
Patrons - random
FOI VaraždinIRB ZagrebHAKOMKončar Elektroindustrija ZagrebENT Zagreb