Skip to:Content
|
Bottom
Cover image for Information systems, technology and management
Title:
Information systems, technology and management
Series:
Communications in Computer and Information Science

Communications in computer and information science, 31
Publication Information:
Berlin : Springer, 2009
Physical Description:
xv, 366 p. : ill. ; 24 cm.
ISBN:
9783642004049
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010194953 HD30.2 I53 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on storage and retrieval systems; data mining and classification; managing digital goods and services; scheduling and distributed systems; advances in software engineering; case studies in information management; algorithms and workflows; authentication and detection systems; recommendation and negotiation; secure and multimedia systems; as well as 14 extended poster abstracts.


Table of Contents

Sitharama S. IyengarPankaj JaloteKesav Vithal NoriSushil K. PrasadT.V. Vijay Kumar and Aloke GhoshalElzbieta MalinowskiVahid Jalali and Mohammad Reza Matash BorujerdiTom Au and Meei-Ling Ivy Chin and Guangqin MaRajib VermaSumeet Dua and Sheetal SainiTharaka Ilayperuma and Jelena ZdravkovicDemian Antony D'Mello and V.S. AnanthanarayanaMaira Petrini and Marlei PozzebonHesam Izakian and Behrouz Tork Ladani and Kamran Zamanifar and Ajith AbrahamSunita Bansal and Chittaranjan HotaC.R. Totekar and P. Santhi ThilagamYogesh Singh and Pradeep Kumar Bhatia and Arvinder Kaur and Omprakash SangwanGagandeep Batra and Yogesh Kumar Arora and Jyotsna SenguptaPraveen Ranjan Srivastava and Krishan KumarKuo-Ming ChuRizwan Ahmed and Rajiv V. DharaskarParijat Upadhyay and Pranab K. DanNupur Lodha and Nivesh Rai and Rahul Dubey and Hrishikesh VenkataramanMunaga V.N.K. Prasad and M.K. Pramod Kumar and Kuldeep SharmaFatemeh Javadi Mottaghi and Mohammad Abdollahi AzgomiNegar Almassian and Reza Azmi and Sarah BerenjiRaghu Gantasala and Munaga V.N.K. PrasadNaeimeh Laleh and Mohammad Abdollahi AzgomiManish Godse and Rajendra Sonar and Anil JadhavAnil Jadhav and Rajendra SonarHemalatha Chandrashekhar and Bharat BhaskerRekha Agarwal and B.V.R. Reddy and E. Bindu and Pinki NayakPushpita Chatterjee and Indranil Sengupta and S.K. GhoshJatin Verma and Sunita PrasadDibyahash Bordoloi and Ashish KumarYogesh Singh and Arvinder Kaur Takkar and Ruchika MalhotraS. Chandra and R.A. Khan and A. AgrawalShruti Kohli and B.P. Joshi and Ela KumarVahid Jalali and Mohammad Reza Matash BorujerdiPraveen Ranjan Srivastava and Vijay Kumar RaiPraveen Ranjan Srivastava and Deepak PareekPraveen Ranjan SrivastavaDeepshikha Jamwal and Pawanesh Abrol and Devanand PadhaRekha Agarwal and E. Bindu and Pinki Nayak and B.V.R. ReddyNaeimeh Laleh and Mohammad Abdollahi AzgomiKumar Dhiraj and E. Ashwani Kumar and Rameshwar Baliar Singh and Santanu Kumar RathHamid Mohammad Gholizadeh and Mohammad Abdollahi AzgomiSumeet Dua and Harpreet Singh
Keynotes
Embedded Sensor Networksp. 1
Future of Software Engineeringp. 2
Seeing beyond Computer Science and Software Engineeringp. 3
System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAsp. 4
Session 1 Storage and Retrieval Systems
A Reduced Lattice Greedy Algorithm for Selecting Materialized Viewsp. 6
Improving Expression Power in Modeling OLAP Hierarchiesp. 19
A Hybrid Information Retrieval System for Medical Field Using MeSH Ontologyp. 31
Session 2 Data Mining and Classification
Mining Rare Events Data for Assessing Customer Attrition Riskp. 41
Extraction and Classification of Emotions for Business Researchp. 47
Data Shrinking Based Feature Ranking for Protein Classificationp. 54
Session 3 Managing Digital Goods and Services
Value-Based Risk Management for Web Information Goodsp. 64
Quality and Business Offer Driven Selection of Web Services for Compositionsp. 76
Managing Sustainability with the Support of Business Intelligence Methods and Toolsp. 88
Session 4 Scheduling and Distributed Systems
A Novel Particle Swarm Optimization Approach for Grid Job Schedulingp. 100
Priority-Based Job Scheduling in Distributed Systemsp. 110
An Efficient Search to Improve Neighbour Selection Mechanism in P2P Networkp. 119
Session 5 Advances in Software Engineering
Application of Neural Networks in Software Engineering: A Reviewp. 128
Model-Based Software Regression Testing for Software Componentsp. 138
An Approach towards Software Quality Assessmentp. 150
Session 6 Case Studies in Information Management
A Study of the Antecedents and Consequences of Members' Helping Behaviors in Online Communityp. 161
Mobile Forensics: An Introduction from Indian Law Enforcement Perspectivep. 173
A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approachp. 185
Session 7 Algorithms and Workflows
Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processorp. 197
Classification of Palmprint Using Principal Linep. 208
Workflow Modeling Using Stochastic Activity Networksp. 220
Session 8 Authentication and Detection Systems
AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernelp. 232
New Quantization Technique in Semi-fragile Digital Watermarking for Image Authenticationp. 244
A Taxonomy of Frauds and Fraud Detection Techniquesp. 256
Session 9 Recommendation and Negotiation
A Hybrid Approach for Knowledge-Based Product Recommendationp. 268
An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packagesp. 280
Learning Agents in Automated Negotiationsp. 292
Session 10 Secure and Multimedia Systems
On Performance of Linear Multiuser Detectors for Wireless Multimedia Applicationsp. 303
A Trust Based Clustering Framework for Securing Ad Hoc Networksp. 313
Security Enhancement in Data Encryption Standardp. 325
Extended Abstracts of Posters
A Novel Framework for Executing Untrusted Programsp. 335
Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classesp. 337
Software Security Factors in Design Phase (Extended Abstract)p. 339
Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Websitep. 341
Personalized Semantic Peer Selection in Peer-to-Peer Networksp. 343
An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testingp. 345
Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testingp. 347
Optimization of Software Testing Using Genetic Algorithmp. 350
Study and Analysis of Software Development and User Satisfaction Levelp. 352
Influence of Hot Spots in CDMA Macro Cellular Systemsp. 354
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Datap. 356
PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noisep. 358
An Overview of a New Multi-formalism Modeling Frameworkp. 360
Association Rule Based Feature Extraction for Character Recognitionp. 362
Author Indexp. 365
Go to:Top of Page