


default search action
3. ICISTM 2009: Ghaziabad, India
- Sushil K. Prasad  , Susmi Routray, Reema Khurana, Sartaj Sahni: , Susmi Routray, Reema Khurana, Sartaj Sahni:
 Information Systems, Technology and Management - Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings. Communications in Computer and Information Science 31, Springer 2009, ISBN 978-3-642-00404-9
Part 1 / Keynotes
- S. Sitharama Iyengar  : :
 Embedded Sensor Networks. 1
- Pankaj Jalote: 
 Future of Software Engineering. 2
- Kesav Vithal Nori: 
 Seeing beyond Computer Science and Software Engineering. 3
- Sushil K. Prasad  : :
 System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs. 4-5
Part 2 / Session 1. Storage and Retrieval Systems
- T. V. Vijay Kumar, Aloke Ghoshal: 
 A Reduced Lattice Greedy Algorithm for Selecting Materialized Views. 6-18
- Elzbieta Malinowski: 
 Improving Expression Power in Modeling OLAP Hierarchies. 19-30
- Vahid Jalali, Mohammad Reza Matash Borujerdi: 
 A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology. 31-40
Part 3 / Session 2. Data Mining and Classification
- S. Tom Au, Meei-Ling Ivy Chin, Guangqin Ma: 
 Mining Rare Events Data for Assessing Customer Attrition Risk. 41-46
- Rajib Verma: 
 Extraction and Classification of Emotions for Business Research. 47-53
- Sumeet Dua, Sheetal Saini: 
 Data Shrinking Based Feature Ranking for Protein Classification. 54-63
Part 4 / Session 3. Managing Digital Goods and Services
- Tharaka Ilayperuma  , Jelena Zdravkovic , Jelena Zdravkovic : :
 Value-Based Risk Management for Web Information Goods. 64-75
- Demian Antony D'Mello  , V. S. Ananthanarayana: , V. S. Ananthanarayana:
 Quality and Business Offer Driven Selection of Web Services for Compositions. 76-87
- Maira Petrini, Marlei Pozzebon: 
 Managing Sustainability with the Support of Business Intelligence Methods and Tools. 88-99
Part 5 / Session 4. Scheduling and Distributed Systems
- Hesam Izakian, Behrouz Tork Ladani  , Kamran Zamanifar, Ajith Abraham: , Kamran Zamanifar, Ajith Abraham:
 A Novel Particle Swarm Optimization Approach for Grid Job Scheduling. 100-109
- Sunita Bansal, Chittaranjan Hota  : :
 Priority-Based Job Scheduling in Distributed Systems. 110-118
- Chinmay R. Totekar, P. Santhi Thilagam  : :
 An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network. 119-127
Part 6 / Session 5. Advances in Software Engineering
- Yogesh Singh, Pradeep Kumar Bhatia, Arvinder Kaur, Omprakash Sangwan  : :
 Application of Neural Networks in Software Engineering: A Review. 128-137
- Gagandeep Batra  , Yogesh Kumar Arora, Jyotsna Sengupta: , Yogesh Kumar Arora, Jyotsna Sengupta:
 Model-Based Software Regression Testing for Software Components. 138-149
- Praveen Ranjan Srivastava  , Krishan Kumar , Krishan Kumar : :
 An Approach towards Software Quality Assessment. 150-160
Part 7 / Session 6. Case Studies in Information Management
- Kuo-Ming Chu  : :
 A Study of the Antecedents and Consequences of Members' Helping Behaviors in Online Community. 161-172
- Rizwan Ahmed, Rajiv V. Dharaskar  : :
 Mobile Forensics: An Introduction from Indian Law Enforcement Perspective. 173-184
- Parijat Upadhyay, Pranab K. Dan: 
 A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach. 185-196
Part 8 / Session 7. Algorithms and Workflows
- Nupur Lodha, Nivesh Rai, Rahul Dubey, Hrishikesh Venkataraman: 
 Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor. 197-207
- Munaga V. N. K. Prasad, M. K. Pramod Kumar, Kuldeep Sharma: 
 Classification of Palmprint Using Principal Line. 208-219
- Fatemeh Javadi Mottaghi, Mohammad Abdollahi Azgomi  : :
 Workflow Modeling Using Stochastic Activity Networks. 220-231
Part 9 / Session 8. Authentication and Detection Systems
- Negar Almassian, Reza Azmi  , Sarah Berenji: , Sarah Berenji:
 AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel. 232-243
- Raghu Gantasala, Munaga V. N. K. Prasad: 
 New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication. 244-255
- Naeimeh Laleh, Mohammad Abdollahi Azgomi  : :
 A Taxonomy of Frauds and Fraud Detection Techniques. 256-267
Part 10 / Session 9. Recommendation and Negotiation
- Manish Godse  , Rajendra M. Sonar , Rajendra M. Sonar , Anil S. Jadhav: , Anil S. Jadhav:
 A Hybrid Approach for Knowledge-Based Product Recommendation. 268-279
- Anil S. Jadhav, Rajendra M. Sonar: 
 An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages. 280-291
- Hemalatha Chandrashekhar, Bharat Bhasker  : :
 Learning Agents in Automated Negotiations. 292-302
Part 11 / Session 10. Secure and Multimedia Systems
- Rekha Agarwal  , B. V. R. Reddy, E. Bindu, Pinki Nayak: , B. V. R. Reddy, E. Bindu, Pinki Nayak:
 On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications. 303-312
- Pushpita Chatterjee  , Indranil Sengupta, Soumya Kanti Ghosh: , Indranil Sengupta, Soumya Kanti Ghosh:
 A Trust Based Clustering Framework for Securing Ad Hoc Networks. 313-324
- Jatin Verma, Sunita Prasad: 
 Security Enhancement in Data Encryption Standard. 325-334
Part 12 / Extended Abstracts of Posters
- Dibyahash Bordoloi  , Ashish Kumar: , Ashish Kumar:
 A Novel Framework for Executing Untrusted Programs. 335-336
- Yogesh Singh, Arvinder Kaur, Ruchika Malhotra: 
 Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes. 337-338
- S. Chandra, Raees Ahmad Khan, Alka Agrawal: 
 Software Security Factors in Design Phase - (Extended Abstract). 339-340
- Shruti Kohli, B. P. Joshi, Ela Kumar: 
 Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website. 341-342
- Vahid Jalali, Mohammad Reza Matash Borujerdi: 
 Personalized Semantic Peer Selection in Peer-to-Peer Networks. 343-344
- Praveen Ranjan Srivastava  , Vijay Kumar Rai: , Vijay Kumar Rai:
 An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing. 345-346
- Praveen Ranjan Srivastava  , Deepak Pareek: , Deepak Pareek:
 Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing. 347-349
- Praveen Ranjan Srivastava  : :
 Optimization of Software Testing Using Genetic Algorithm. 350-351
- Jamwal Deepshikha, Pawanesh Abrol  , Devanand Padha: , Devanand Padha:
 Study and Analysis of Software Development and User Satisfaction Level. 352-353
- Rekha Agarwal  , E. Bindu, Pinki Nayak, B. V. R. Reddy: , E. Bindu, Pinki Nayak, B. V. R. Reddy:
 Influence of Hot Spots in CDMA Macro Cellular Systems. 354-355
- Naeimeh Laleh, Mohammad Abdollahi Azgomi  : :
 An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. 356-357
- Kumar Dhiraj, E. Ashwani Kumar, Rameshwar Baliar Singh, Santanu Kumar Rath  : :
 PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise. 358-359
- Hamid Mohammad Gholizadeh, Mohammad Abdollahi Azgomi  : :
 An Overview of a New Multi-formalism Modeling Framework. 360-361
- Sumeet Dua, Harpreet Singh: 
 Association Rule Based Feature Extraction for Character Recognition. 362-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














