


default search action
6. ICISTM 2012: Grenoble, France
- Sumeet Dua, Aryya Gangopadhyay, Parimala Thulasiraman, Umberto Straccia

, Michael A. Shepherd, Benno Stein:
Information Systems, Technology and Management - 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings. Communications in Computer and Information Science 285, Springer 2012, ISBN 978-3-642-29165-4
Information Systems
- Mahdi Naghibi, Adel Torkaman Rahmani:

Focused Crawling Using Vision-Based Page Segmentation. 1-12 - Navid Karimi Sani, Shokoofeh Ketabchi, Kecheng Liu:

The Co-design of Business and IT Systems: A Case in Supply Chain Management. 13-27 - Meera M. Dhabu

, Parag S. Deshpande:
Cardinality Statistics Based Maximal Frequent Itemsets Mining. 28-39 - Saranya Maneeroj, Pannawit Samatthiyadikun, Warat Chalermpornpong, Sasipa Panthuwadeethorn, Atsuhiro Takasu:

Ranked Criteria Profile for Multi-criteria Rating Recommender. 40-51 - Daniel Ritter

, Christoph Herrmann:
A Graph API for Complex Business Network Query and Traversal. 52-63 - Mturi Elias, Paul Johannesson:

A Survey of Process Model Reuse Repositories. 64-76 - David Kiwana, Björn Johansson

:
The Dynamics of Implementation of Finance Information Systems. 77-88 - Paolo Neirotti, Elisabetta Raguseo:

Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities? 89-100 - Bernard Ijesunor Akhigbe, Babajide Samuel Afolabi

, Emmanuel Rotimi Adagunodo:
Item's Characterization for Model's Development in Information Retrieval System Evaluation. 101-111 - Hesham Allam, James Blustein

, Michael Bliemel
, Louise Spiteri:
Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing Tags. 112-123 - Stefano Ferretti

, Vittorio Ghini:
Mitigation of Random Query String DoS via Gossip. 124-134 - Shehzad Ashraf Chaudhry

, Nizamuddin, Muhammad Sher
:
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. 135-142
Information Technology
- Adebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oludola Oluwatope

, G. Adesola Aderounmu
, Emmanuel Rotimi Adagunodo:
Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks. 143-151 - Raymond Siulai Wong, Teng-Sheng Moh, Melody Moh:

Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections. 152-163 - Pooja Jain, Deepak Dahiya

:
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation. 164-175 - Prem Parashar, Arvind Kalia, Rajesh Bhatia:

Pair-Wise Time-Aware Test Case Prioritization for Regression Testing. 176-186 - Neeraj Sharma

, Kawaljeet Singh, D. P. Goyal:
Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector. 187-198 - Sunint Kaur Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra

, Maninder Singh
:
A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing. 199-210
Information Management
- Razia Haider, Federica Mandreoli

, Riccardo Martoglia
, Simona Sassatelli:
Fast On-Line Summarization of RFID Probabilistic Data Streams. 211-223 - Nobuhiko Matsuura, Seiji Suzuki, Maki Ohata, Ken Ohta

, Hiroshima Inamura
, Tadanori Mizuno, Hiroshi Mineno
:
An Efficient and Highly Available Distributed Data Management System. 224-234 - Stefan Bensch:

Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing. 235-246 - Mariagrazia Fugini

, José Antonio Parejo Maestre:
Energy Analysis of Services through Green Metrics: Towards Green Certificates. 247-258 - Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah

, Marc Sistiaga:
Uncertainty Interval Temporal Sequences Extraction. 259-270
Business Intelligence
- Deepak Dahiya

, Mohit Gupta, Pooja Jain:
Enterprise Knowledge Management System: A Multi Agent Perspective. 271-281 - Akhilesh Bajaj, Meredith Bates:

Developing a Template for Organizational Knowledge Management. 282-291
Management Science and Education
- Nadezhda Kunicina

, Anastasija Zhiravecka, Antons Patlins
, Yelena Chaiko
, Leonids Ribickis
:
Towards of E-Learning Quality Standards for Electrical Engineers. 292-303
Applications
- Lavneet Singh, Girija Chetty

:
A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta Filters. 304-314 - Olayiwola Ojo, Ayodeji Oludola Oluwatope

, Adesola Oke, G. Adesola Aderounmu
:
Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System. 315-324 - Brandon A. Brown, Todd R. Andel, Yong Kim:

An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration. 325-335
Workshop on Program Protection and Reverse Engineering
- Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie, Arun Lakhotia:

Twisting Additivity in Program Obfuscation. 336-347 - Gen Lu, Kevin Coogan, Saumya K. Debray:

Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract). 348-359 - Charles LeDoux, Andrew Walenstein, Arun Lakhotia:

Improved Malware Classification through Sensor Fusion Using Disjoint Union. 360-371 - John Barron, Todd R. Andel, Yong Kim:

Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks. 372-383 - Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:

Deployable Classifiers for Malware Detection. 384-395
Short Papers
- Saïda Boukhedouma, Zaia Alimazighi, Mourad Oussalah, Dalila Tamzalit:

Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized Control. 396-401 - Iskander Zouaghi

, Abderrazak Laghouag:
Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry. 402-407 - N. Hema, Krishna Kant, Hima Bindu Maringanti:

Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication. 408-413 - Tapan Kumar Jain

:
Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol. 414-420
Position Papers
- Aryya Gangopadhyay, Song Chen, Yelena Yesha:

Detecting Healthcare Fraud through Patient Sharing Schemes. 421-426 - Roberto Giacobazzi:

Software Security by Obscurity - A Programming Language Perspective. 427-432 - Sylvain Guilley, Jean-Luc Danger, Robert Nguyen, Philippe Nguyen:

System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion. 433-438 - Mila Dalla Preda:

The Grand Challenge in Metamorphic Analysis. 439-444 - Clark D. Thomborson

:
The Art and Science of Obfuscation. 445-450 - Jeffrey Todd McDonald:

Capturing the Essence of Practical Obfuscation. 451-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














