Notice bibliographique

  • Notice

Type(s) de contenu et mode(s) de consultation : Texte noté : électronique

Auteur(s) : International Conference on Information Systems, Technology, and Management (6 ; 2012 ; Grenoble, France)  Voir les notices liées en tant qu'auteur

Titre(s) : Information Systems, Technology and Management [Texte électronique] : 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012, Proceedings / Sumeet Dua and 5 others (Eds.)

Publication : Heidelberg : Springer, [2012]

Description matérielle : 1 ressource dématérialisée

Collection : Communications in computer and information science ; 285


Note(s) : Includes bibliographical references and index


Autre(s) auteur(s) : Dua, Sumeet. Fonction indéterminée  Voir les notices liées en tant qu'auteur


Sujet(s) : Technologie de l'information -- Gestion  Voir les notices liées en tant que sujet

Indice(s) Dewey :  004.068 (23e éd.) = Informatique - Gestion  Voir les notices liées en tant que sujet


Identifiants, prix et caractéristiques : ISBN 9783642291661

Identifiant de la notice  : ark:/12148/cb447042640

Notice n° :  FRBNF44704264 (notice reprise d'un réservoir extérieur)



Table des matières : Part 1 ; Information Systems /Focused Crawling Using Vision-Based Page SegmentationMahdi Naghibi and Adel Torkaman Rahmani ; The Co-design of Business and IT Systems: A Case in Supply Chain Management /Navid Karimi Sani, Shokoofeh Ketabchi and Kecheng Liu ; Cardinality Statistics Based Maximal Frequent Itemsets Mining /Meera M. Dhabu and Parag S. Deshpande ; Ranked Criteria Profile for Multi-criteria Rating Recommender /Saranya Maneeroj, Pannawit Samatthiyadikun, Warat Chalermpornpong, Sasipa Panthuwadeethorn and Atsuhiro Takasu ; A Graph API for Complex Business Network Query and Traversal /Daniel Ritter and Christoph Herrmann ; A Survey of Process Model Reuse Repositories /Mturi Elias and Paul Johannesson ; The Dynamics of Implementation of Finance Information Systems /David Kiwana and Björn Johansson
Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities? /Paolo Neirotti and Elisabetta Raguseo ; Item's Characterization for Model's Development in Information Retrieval System Evaluation /Bernard Ijesunor Akhigbe, Babajide Samuel Afolabi and Emmanuel Rotimi Adagunodo ; Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing Tags /Hesham Allam, James Blustein, Michael Bliemel and Louise Spiteri ; Mitigation of Random Query String DoS via Gossip /Stefano Ferretti and Vittorio Ghini ; Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem /Shehzad Ashraf Ch, Nizamuddin and Muhammad SherPart 2 ; Information Technology /Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks
Adebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oluwatope, Adesola Aderounmu and Emmanuel Rotimi Adagunodo ; Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections /Raymond Siulai Wong, Teng-Sheng Moh and Melody Moh
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation /Pooja Jain and Deepak Dahiya ; Pair-Wise Time-Aware Test Case Prioritization for Regression Testing /Prem Parashar, Arvind Kalia and Rajesh Bhatia ; Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector /Neeraj Sharma, Kawaljeet Singh and D.P. Goyal ; A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing /Sunint Kaur Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra and Maninder Singh
Part 3 ; Information Management /Fast On-Line Summarization of RFID Probabilistic Data StreamsRazia Haider, Federica Mandreoli, Riccardo Martoglia and Simona Sassatelli ; An Efficient and Highly Available Distributed Data Management System /Nobuhiko Matsuura, Seiji Suzuki, Maki Ohata, Ken Ohta and Hiroshi Inamura, et al
Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing /Stefan Bensch ; Energy Analysis of Services through Green Metrics: Towards Green Certificates /Mariagrazia Fugini and José Antonio Parejo Maestre ; Uncertainty Interval Temporal Sequences Extraction /Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah and Marc SistiagaPart 4 ; Business Intelligence /Enterprise Knowledge Management System: A Multi Agent PerspectiveDeepak Dahiya, Mohit Gupta and Pooja Jain ; Developing a Template for Organizational Knowledge Management /Akhilesh Bajaj and Meredith Bates
Part 5 ; Management Science and Education /Towards of E-Learning Quality Standards for Electrical EngineersNadezhda Kunicina, Anastasija Zhiravecka, Antons Patlins, Yelena Chaiko and Leonids RibickisPart 6 ; Applications /A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta FiltersLavneet Singh and Girija Chetty
Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System /Olayiwola Ojo, Ayodeji Oluwatope, Adesola Oke and Adesola Aderounmu
An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration /Brandon A. Brown, Todd R. Andel and Yong KimPart 7 ; Workshop on Program Protection and Reverse Engineering /Twisting Additivity in Program ObfuscationMila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie and Arun Lakhotia ; Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract) /Gen Lu, Kevin Coogan and Saumya Debray
Improved Malware Classification through Sensor Fusion Using Disjoint Union /Charles LeDoux, Andrew Walenstein and Arun Lakhotia ; Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks /John Barron, Todd R. Andel and Yong Kim ; Deployable Classifiers for Malware Detection /Anshuman Singh, Sumi Singh, Andrew Walenstein and Arun LakhotiaPart 8 ; Short Papers /Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized Control
Saida Boukhedouma, Zaia Alimazighi, Mourad Oussalah and Dalila Tamzalit ; Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry /Iskander Zouaghi and Abderrazak Laghouag ; Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication /N. Hema, Krishna Kant and Hima Bindu Maringanti ; Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol /Tapan Jain ; Part 9. ; Position Papers /Detecting Healthcare Fraud through Patient Sharing SchemesAryya Gangopadhyay, Song Chen and Yelena Yesha ; Software Security by Obscurity /A Programming Language PerspectiveRoberto Giacobazzi ; System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion /Sylvain Guilley, Jean-Luc Danger, Robert Nguyen and Philippe Nguyen ; The Grand Challenge in Metamorphic Analysis.
Mila Dalla Preda ; The Art and Science of Obfuscation /Clark Thomborson ; Capturing the Essence of Practical Obfuscation /J. Todd McDonald

Localiser ce document(1 Exemplaire)

Document numérique : 

1 partie d'exemplaire regroupée

ACQNUM-86030
support : document électronique dématérialisé