Limit search to available items
Book Cover
Author International Conference on Information Systems, Technology, and Management (6th : 2012 : Grenoble, France)

Title Information systems, technology and management : 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings / Sumeet Dua [and others] (eds.)
Published Berlin ; New York : Springer, ©2012


Description 1 online resource (xvii, 458 pages) : illustrations
Series Communications in computer and information science, 1865-0929 ; 285
Communications in computer and information science ; 285.
Contents Part 1. Information Systems / Focused Crawling Using Vision-Based Page Segmentation / Mahdi Naghibi and Adel Torkaman Rahmani -- The Co-design of Business and IT Systems: A Case in Supply Chain Management / Navid Karimi Sani, Shokoofeh Ketabchi and Kecheng Liu -- Cardinality Statistics Based Maximal Frequent Itemsets Mining / Meera M. Dhabu and Parag S. Deshpande -- Ranked Criteria Profile for Multi-criteria Rating Recommender / Saranya Maneeroj, Pannawit Samatthiyadikun, Warat Chalermpornpong, Sasipa Panthuwadeethorn and Atsuhiro Takasu -- A Graph API for Complex Business Network Query and Traversal / Daniel Ritter and Christoph Herrmann -- A Survey of Process Model Reuse Repositories / Mturi Elias and Paul Johannesson -- The Dynamics of Implementation of Finance Information Systems / David Kiwana and Björn Johansson -- Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities? / Paolo Neirotti and Elisabetta Raguseo -- Item's Characterization for Model's Development in Information Retrieval System Evaluation / Bernard Ijesunor Akhigbe, Babajide Samuel Afolabi and Emmanuel Rotimi Adagunodo -- Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing Tags / Hesham Allam, James Blustein, Michael Bliemel and Louise Spiteri -- Mitigation of Random Query String DoS via Gossip / Stefano Ferretti and Vittorio Ghini -- Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem / Shehzad Ashraf Ch, Nizamuddin and Muhammad Sher -- Part 2. Information Technology / Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks / Adebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oluwatope, Adesola Aderounmu and Emmanuel Rotimi Adagunodo -- Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections / Raymond Siulai Wong, Teng-Sheng Moh and Melody Moh
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation / Pooja Jain and Deepak Dahiya -- Pair-Wise Time-Aware Test Case Prioritization for Regression Testing / Prem Parashar, Arvind Kalia and Rajesh Bhatia -- Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector / Neeraj Sharma, Kawaljeet Singh and D.P. Goyal -- A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing / Sunint Kaur Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra and Maninder Singh -- Part 3. Information Management / Fast On-Line Summarization of RFID Probabilistic Data Streams / Razia Haider, Federica Mandreoli, Riccardo Martoglia and Simona Sassatelli -- An Efficient and Highly Available Distributed Data Management System / Nobuhiko Matsuura, Seiji Suzuki, Maki Ohata, Ken Ohta and Hiroshi Inamura, et al. -- Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing / Stefan Bensch -- Energy Analysis of Services through Green Metrics: Towards Green Certificates / Mariagrazia Fugini and José Antonio Parejo Maestre -- Uncertainty Interval Temporal Sequences Extraction / Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah and Marc Sistiaga -- Part 4. Business Intelligence / Enterprise Knowledge Management System: A Multi Agent Perspective / Deepak Dahiya, Mohit Gupta and Pooja Jain -- Developing a Template for Organizational Knowledge Management / Akhilesh Bajaj and Meredith Bates -- Part 5. Management Science and Education / Towards of E-Learning Quality Standards for Electrical Engineers / Nadezhda Kunicina, Anastasija Zhiravecka, Antons Patlins, Yelena Chaiko and Leonids Ribickis -- Part 6. Applications / A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta Filters / Lavneet Singh and Girija Chetty -- Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System / Olayiwola Ojo, Ayodeji Oluwatope, Adesola Oke and Adesola Aderounmu
An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration / Brandon A. Brown, Todd R. Andel and Yong Kim -- Part 7. Workshop on Program Protection and Reverse Engineering / Twisting Additivity in Program Obfuscation / Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie and Arun Lakhotia -- Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract) / Gen Lu, Kevin Coogan and Saumya Debray -- Improved Malware Classification through Sensor Fusion Using Disjoint Union / Charles LeDoux, Andrew Walenstein and Arun Lakhotia -- Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks / John Barron, Todd R. Andel and Yong Kim -- Deployable Classifiers for Malware Detection / Anshuman Singh, Sumi Singh, Andrew Walenstein and Arun Lakhotia -- Part 8. Short Papers / Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized Control / Saida Boukhedouma, Zaia Alimazighi, Mourad Oussalah and Dalila Tamzalit -- Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry / Iskander Zouaghi and Abderrazak Laghouag -- Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication / N. Hema, Krishna Kant and Hima Bindu Maringanti -- Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol / Tapan Jain -- Part 9. Position Papers / Detecting Healthcare Fraud through Patient Sharing Schemes / Aryya Gangopadhyay, Song Chen and Yelena Yesha -- Software Security by Obscurity / A Programming Language Perspective / Roberto Giacobazzi -- System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion / Sylvain Guilley, Jean-Luc Danger, Robert Nguyen and Philippe Nguyen -- The Grand Challenge in Metamorphic Analysis / Mila Dalla Preda -- The Art and Science of Obfuscation / Clark Thomborson -- Capturing the Essence of Practical Obfuscation / J. Todd McDonald
Summary This book constitutes the refereed proceedings of the 6th International Conference on Information Systems, Technology and Management, ICISTM 2012, held in Grenoble, France, in March 2012. The 38 revised papers were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on information systems; information technology; information management; business intelligence; management science and education; applications; workshop on program protection and reverse engineering
Analysis Computer science
Computer Communication Networks
Software engineering
Database management
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Bibliography Includes bibliographical references and author index
Subject Information technology -- Management -- Congresses
Computer networks -- Management -- Congresses
Database management -- Congresses
Computer networks -- Management.
Database management.
Information technology -- Management.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dua, Sumeet.
ISBN 9783642291661
Other Titles ICISTM 2012