Nikola Tankovic

Nikola Tankovic
Juraj Dobrila University of Pula · Faculty of Informatics

Assistant Professor (Computer Science)

About

42
Publications
9,213
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
110
Citations
Introduction
Additional affiliations
September 2010 - November 2015
Juraj Dobrila University of Pula
Position
  • Research Assistant

Publications

Publications (42)
Conference Paper
Full-text available
There exists a huge amount of vertical applications that are developed for isolated computing environments. Due to increasing demand for additional resources there is a clear need to adapt these applications to the distributed environments. However, this is not an easy task and numerous variants are possible. Moreover, in this transition a new qual...
Article
Full-text available
Application architectures in the cloud employ elastic components, and achieve lower operating costs without sacrificing quality. Software architects strive to provide efficient services by deciding on software topology: a set of structural architectural decisions. For a given application, there can be numerous software topology alternatives creatin...
Chapter
Full-text available
Plethora of available heterogeneous transactional data and recent advancements in machine learning are the key forces that enable the development of complex algorithms that can reach human-level performance on an increasing number of tasks. Given the non-linear structure composed of many layers of computation, these highly accurate models are usual...
Article
Full-text available
Application models are commonly used in the development of information systems. Recent trends have introduced techniques by which models can be directly transformed into execution code and thus become a single source for application design. Inherently, it has been challenging for software developers to become proficient in designing entire systems...
Article
Full-text available
Recently, large numbers of Polyclad flatworms (Stylochus mediterraneus) have been observed in Istrian County shellfish farms connected to intensive ascidian fouling. To assess a possible threat and determine whether the flatworm feeds only on weakened dead mussels or can also infest healthy mussels, we have conducted a field research and laboratory...
Article
Full-text available
Neurological diseases pose a significant public health challenge, leading to disability and mortality globally. Current diagnostics for neuroinflammatory diseases are complex and lack efficacy, necessitating invasive procedures. Calcium signaling dynamics in astrocytes and microglia play pivotal roles in central nervous system (CNS) function and dy...
Article
Full-text available
The exchange of model parameters between peers is critical in peer-to-peer deep learning. Historically, connections between agents were assigned randomly based on network topology. However, recent methodologies enable agents to autonomously establish their connections, which is especially beneficial for non-IID data settings. Recent studies suggest...
Conference Paper
Full-text available
This review explores the application of machine learning (ML) in the classification of astrocytic calcium (Ca 2+) signaling, a pivotal aspect of cellular biology. Fluorescence imaging has enabled thorough recording of astrocyte activity, but the resulting large, complex time series data sets defy manual analysis, highlighting the need for automated...
Article
Single photon emission computed tomography (SPECT) procedures are characterized by long acquisition time to acquire diagnostically acceptable image data. The goal of this investigation was to assess the feasibility of using a deep convolutional neural network (DCNN) to reduce the acquisition time. The DCNN was implemented using the PyTorch and trai...
Article
Cloud computing is one of the critical technologies that meet the demand of various businesses for the high-capacity computational processing power needed to gain knowledge from their ever-growing business data. When utilizing cloud computing resources to deal with Big Data processing, companies face the challenge of determining the optimal use of...
Conference Paper
Full-text available
This study aims to create a method for transforming a Unified Modeling Language (UML) class model into an open-source end-user database. The manual transformation of UML class models into a database can be time-consuming and prone to errors. By making a database schema from a UML class model in standard XMI format, our framework offers an automated...
Conference Paper
Full-text available
Digitalization is introducing a virtual representation of the physical world. Such virtual or digital assets, interconnected via global communication network, open unbounded management opportunities that are realized in form of software. Nowadays, digitalization is not a matter of technology change, but is rather perceived as a prerequisite of mode...
Article
Collaborative training of deep neural networks using edge devices has attracted substantial research interest recently. The two main architecture approaches for the training process are centrally orchestrated Federated Learning and fully decentralized peer-to-peer learning. In decentralized systems, edge devices, known as agents, collaborate in a p...
Conference Paper
A successful business operates on many interacting processes to meet the business goals; thus, organizing these processes in a structured business model is essential. Business process modeling notation (BPMN) is a widely used business modeling technique based on simple business and logic specifications understandable not only by domain experts but...
Book
This book focuses on novel design and systems engineering approaches, including theories and best practices, for promoting a better integration of people and engineering systems. It covers a range of innovative topics related to: development of human-centered systems; interface design and human-computer interaction; usability and user experience; i...
Conference Paper
This paper identifies the emerging cybersecurity issues of the smart grid ICT component in the implementation of control and monitoring systems at the substation level. The attack surface originates from a local network across different levels of interoperability, communication (data) model standard, and digital data collection. Given the level of...
Conference Paper
Full-text available
Recent advances in blockchain gained significant social attention, mainly due to substantial price fluctuations of Bitcoin and Ethereum cryptocurrencies. By its design, blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way, providing solutions for many complex ta...
Chapter
Full-text available
With the emerging IoT and Cloud-based networked systems that rely heavily on virtualization technologies, elasticity becomes a dominant system engineering attribute for providing QoS-aware services to their users. Although the concept of elasticity can introduce significant QoS and cost benefits, its implementation in real systems is full of challe...
Article
This paper summarizes a novel approach for consuming a domain specific language (DSL) by transforming it to a directed graph representation persisted by a graph database. Using such specialized database enables advanced navigation trough the stored model exposing only relevant subsets of meta-data to different involved services and components. We a...
Book
Full-text available
Many of us discuss about past. Some of us are rethinking the present. Only the brave among us dare to devise the future. Discussing the past is easy. Rethinking the present is demanding. But the real challenge comes when dealing with future perspectives. And that is what the authors of following papers dared to do. The idea of this scientific monog...
Conference Paper
Full-text available
This paper summarizes a novel approach for consuming a domain specific language (DSL) by transforming it to a directed graph representation persisted by a graph database. Using such specialized database enables advanced navigation trough the stored model exposing only relevant subsets of meta-data to different involved services and components.We ap...
Conference Paper
Full-text available
A recent trend, movement of software applications to Cloud, provides among numerous benefits, an important model for infrastructure cost reduction using the pay-as-you-go concept. In our experiments, we noticed that software distribution may significantly influence cost benefits achieved in Cloud. Software distribution optimization requires a conti...
Conference Paper
Full-text available
End user development (EUD) is the idea of providing end users, professionals outside computer science community, to develop their own software. This idea has received special attention by domain experts who would like to easily modify software applications to their needs, without intervention of technical professionals and without learning conventi...
Conference Paper
Full-text available
Application modeling is gaining its share as the next generation software development methodology. Model Driven Development (MDD) uses abstract models of software systems to yield concrete implementations. This process can be achieved in two fundamentally different ways: by generating end artifacts, or by applying model interpretation. Regardless o...
Conference Paper
Full-text available
This paper proposes a novel approach to consumer application development using executable Application Graph Model (AGM). Based on Object-Process Methodology (OPM), AGM has expressive nature to model a generic, data-centric application based on desired domain model. AGM is interpretative, not generative, and also reflective, which enables runtime mo...
Article
Full-text available
Application modeling is gaining its share as the next generation software development methodology. Model Driven Development (MDD) approaches use abstract models of software systems to yield concrete implementations. This process can be achieved in two fundamentally different ways: by generating end artifacts like programing code and database schema...
Article
Full-text available
Computer hardware is gaining its share in human population towards one computer per user, with a tendency to become more than one computer per single user. Smartphone market is significantly contributing that trend. To use the creative and consumer potential of such vast amount of users, there is a need to enable intuitive and easy modeling, develo...

Questions

Questions (2)
Question
I have a real system for which I have built a simulation that can express its certain characteristics. This real system can be in very large amount of configurations which can also be represented within simulation environment. Evaluation of each configuration on real system takes couple of hours, where evaluation within simulation takes couple of minutes.
I developed an optimization algorithm which finds a Pareto set of configurations that minimize (maximize) several objectives.
To solve this, I have built a genetic algorithm which uses simulator to obtain a Pareto set that will further be evaluated on real system.
I am wondering what approach to take on evaluating such two-step optimization heuristic? Evaluating all candidates on real system is infeasible.
So far I have think of this:
- compare results with randomly selected configurations
- compare worst and best results to see if they are distant enough (e.g. in separated cluster)
Any thoughts?
Question
I am looking for a optimizer who can accept non-linear models from queue theory used to find optimal deployments of web services.

Network

Cited By