default search action
3. ICISTM 2009: Ghaziabad, India
- Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni:
Information Systems, Technology and Management - Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings. Communications in Computer and Information Science 31, Springer 2009, ISBN 978-3-642-00404-9
Part 1 / Keynotes
- S. Sitharama Iyengar:
Embedded Sensor Networks. 1 - Pankaj Jalote:
Future of Software Engineering. 2 - Kesav Vithal Nori:
Seeing beyond Computer Science and Software Engineering. 3 - Sushil K. Prasad:
System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs. 4-5
Part 2 / Session 1. Storage and Retrieval Systems
- T. V. Vijay Kumar, Aloke Ghoshal:
A Reduced Lattice Greedy Algorithm for Selecting Materialized Views. 6-18 - Elzbieta Malinowski:
Improving Expression Power in Modeling OLAP Hierarchies. 19-30 - Vahid Jalali, Mohammad Reza Matash Borujerdi:
A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology. 31-40
Part 3 / Session 2. Data Mining and Classification
- S. Tom Au, Meei-Ling Ivy Chin, Guangqin Ma:
Mining Rare Events Data for Assessing Customer Attrition Risk. 41-46 - Rajib Verma:
Extraction and Classification of Emotions for Business Research. 47-53 - Sumeet Dua, Sheetal Saini:
Data Shrinking Based Feature Ranking for Protein Classification. 54-63
Part 4 / Session 3. Managing Digital Goods and Services
- Tharaka Ilayperuma, Jelena Zdravkovic:
Value-Based Risk Management for Web Information Goods. 64-75 - Demian Antony D'Mello, V. S. Ananthanarayana:
Quality and Business Offer Driven Selection of Web Services for Compositions. 76-87 - Maira Petrini, Marlei Pozzebon:
Managing Sustainability with the Support of Business Intelligence Methods and Tools. 88-99
Part 5 / Session 4. Scheduling and Distributed Systems
- Hesam Izakian, Behrouz Tork Ladani, Kamran Zamanifar, Ajith Abraham:
A Novel Particle Swarm Optimization Approach for Grid Job Scheduling. 100-109 - Sunita Bansal, Chittaranjan Hota:
Priority-Based Job Scheduling in Distributed Systems. 110-118 - Chinmay R. Totekar, P. Santhi Thilagam:
An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network. 119-127
Part 6 / Session 5. Advances in Software Engineering
- Yogesh Singh, Pradeep Kumar Bhatia, Arvinder Kaur, Omprakash Sangwan:
Application of Neural Networks in Software Engineering: A Review. 128-137 - Gagandeep Batra, Yogesh Kumar Arora, Jyotsna Sengupta:
Model-Based Software Regression Testing for Software Components. 138-149 - Praveen Ranjan Srivastava, Krishan Kumar:
An Approach towards Software Quality Assessment. 150-160
Part 7 / Session 6. Case Studies in Information Management
- Kuo-Ming Chu:
A Study of the Antecedents and Consequences of Members' Helping Behaviors in Online Community. 161-172 - Rizwan Ahmed, Rajiv V. Dharaskar:
Mobile Forensics: An Introduction from Indian Law Enforcement Perspective. 173-184 - Parijat Upadhyay, Pranab K. Dan:
A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach. 185-196
Part 8 / Session 7. Algorithms and Workflows
- Nupur Lodha, Nivesh Rai, Rahul Dubey, Hrishikesh Venkataraman:
Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor. 197-207 - Munaga V. N. K. Prasad, M. K. Pramod Kumar, Kuldeep Sharma:
Classification of Palmprint Using Principal Line. 208-219 - Fatemeh Javadi Mottaghi, Mohammad Abdollahi Azgomi:
Workflow Modeling Using Stochastic Activity Networks. 220-231
Part 9 / Session 8. Authentication and Detection Systems
- Negar Almassian, Reza Azmi, Sarah Berenji:
AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel. 232-243 - Raghu Gantasala, Munaga V. N. K. Prasad:
New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication. 244-255 - Naeimeh Laleh, Mohammad Abdollahi Azgomi:
A Taxonomy of Frauds and Fraud Detection Techniques. 256-267
Part 10 / Session 9. Recommendation and Negotiation
- Manish Godse, Rajendra M. Sonar, Anil S. Jadhav:
A Hybrid Approach for Knowledge-Based Product Recommendation. 268-279 - Anil S. Jadhav, Rajendra M. Sonar:
An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages. 280-291 - Hemalatha Chandrashekhar, Bharat Bhasker:
Learning Agents in Automated Negotiations. 292-302
Part 11 / Session 10. Secure and Multimedia Systems
- Rekha Agarwal, B. V. R. Reddy, E. Bindu, Pinki Nayak:
On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications. 303-312 - Pushpita Chatterjee, Indranil Sengupta, Soumya Kanti Ghosh:
A Trust Based Clustering Framework for Securing Ad Hoc Networks. 313-324 - Jatin Verma, Sunita Prasad:
Security Enhancement in Data Encryption Standard. 325-334
Part 12 / Extended Abstracts of Posters
- Dibyahash Bordoloi, Ashish Kumar:
A Novel Framework for Executing Untrusted Programs. 335-336 - Yogesh Singh, Arvinder Kaur, Ruchika Malhotra:
Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes. 337-338 - S. Chandra, Raees Ahmad Khan, Alka Agrawal:
Software Security Factors in Design Phase - (Extended Abstract). 339-340 - Shruti Kohli, B. P. Joshi, Ela Kumar:
Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website. 341-342 - Vahid Jalali, Mohammad Reza Matash Borujerdi:
Personalized Semantic Peer Selection in Peer-to-Peer Networks. 343-344 - Praveen Ranjan Srivastava, Vijay Kumar Rai:
An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing. 345-346 - Praveen Ranjan Srivastava, Deepak Pareek:
Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing. 347-349 - Praveen Ranjan Srivastava:
Optimization of Software Testing Using Genetic Algorithm. 350-351 - Jamwal Deepshikha, Pawanesh Abrol, Devanand Padha:
Study and Analysis of Software Development and User Satisfaction Level. 352-353 - Rekha Agarwal, E. Bindu, Pinki Nayak, B. V. R. Reddy:
Influence of Hot Spots in CDMA Macro Cellular Systems. 354-355 - Naeimeh Laleh, Mohammad Abdollahi Azgomi:
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. 356-357 - Kumar Dhiraj, E. Ashwani Kumar, Rameshwar Baliar Singh, Santanu Kumar Rath:
PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise. 358-359 - Hamid Mohammad Gholizadeh, Mohammad Abdollahi Azgomi:
An Overview of a New Multi-formalism Modeling Framework. 360-361 - Sumeet Dua, Harpreet Singh:
Association Rule Based Feature Extraction for Character Recognition. 362-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.