Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : International Conference on Information Systems, Technology, and Management (6 ; 2012
; Grenoble, France)
Titre(s) : Information Systems, Technology and Management [Texte électronique] : 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012, Proceedings / Sumeet Dua and 5 others (Eds.)
Publication : Heidelberg : Springer, [2012]
Description matérielle : 1 ressource dématérialisée
Collection : Communications in computer and information science ; 285
Note(s) : Includes bibliographical references and index
Autre(s) auteur(s) : Dua, Sumeet. Fonction indéterminée
Sujet(s) : Technologie de l'information -- Gestion
Indice(s) Dewey :
004.068 (23e éd.) = Informatique - Gestion
Identifiants, prix et caractéristiques : ISBN 9783642291661
Identifiant de la notice : ark:/12148/cb447042640
Notice n° :
FRBNF44704264
(notice reprise d'un réservoir extérieur)
Table des matières : Part 1 ; Information Systems /Focused Crawling Using Vision-Based Page SegmentationMahdi
Naghibi and Adel Torkaman Rahmani ; The Co-design of Business and IT Systems: A Case
in Supply Chain Management /Navid Karimi Sani, Shokoofeh Ketabchi and Kecheng Liu
; Cardinality Statistics Based Maximal Frequent Itemsets Mining /Meera M. Dhabu and
Parag S. Deshpande ; Ranked Criteria Profile for Multi-criteria Rating Recommender
/Saranya Maneeroj, Pannawit Samatthiyadikun, Warat Chalermpornpong, Sasipa Panthuwadeethorn
and Atsuhiro Takasu ; A Graph API for Complex Business Network Query and Traversal
/Daniel Ritter and Christoph Herrmann ; A Survey of Process Model Reuse Repositories
/Mturi Elias and Paul Johannesson ; The Dynamics of Implementation of Finance Information
Systems /David Kiwana and Björn Johansson
Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry
Environment Influence the Returns of IT-Based Capabilities? /Paolo Neirotti and Elisabetta
Raguseo ; Item's Characterization for Model's Development in Information Retrieval
System Evaluation /Bernard Ijesunor Akhigbe, Babajide Samuel Afolabi and Emmanuel
Rotimi Adagunodo ; Knowledge Contribution in Social Media: Exploring Factors Influencing
Social Taggers' Acceptance towards Contributing and Sharing Tags /Hesham Allam, James
Blustein, Michael Bliemel and Louise Spiteri ; Mitigation of Random Query String DoS
via Gossip /Stefano Ferretti and Vittorio Ghini ; Public Verifiable Signcryption Schemes
with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem /Shehzad Ashraf Ch,
Nizamuddin and Muhammad SherPart 2 ; Information Technology /Analytical Modelling
of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS)
Networks
Adebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oluwatope, Adesola Aderounmu and Emmanuel
Rotimi Adagunodo ; Efficient Semi-supervised Learning BitTorrent Traffic Detection
with Deep Packet and Deep Flow Inspections /Raymond Siulai Wong, Teng-Sheng Moh and
Melody Moh
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and
Argumentation for Negotiation /Pooja Jain and Deepak Dahiya ; Pair-Wise Time-Aware
Test Case Prioritization for Regression Testing /Prem Parashar, Arvind Kalia and Rajesh
Bhatia ; Is Technology Universal Panacea for Knowledge and Experience Management?
Answers from Indian IT Sector /Neeraj Sharma, Kawaljeet Singh and D.P. Goyal ; A Review
of Coupling and Cohesion Measurement in OO Systems Using Program Slicing /Sunint Kaur
Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra and Maninder Singh
Part 3 ; Information Management /Fast On-Line Summarization of RFID Probabilistic
Data StreamsRazia Haider, Federica Mandreoli, Riccardo Martoglia and Simona Sassatelli
; An Efficient and Highly Available Distributed Data Management System /Nobuhiko Matsuura,
Seiji Suzuki, Maki Ohata, Ken Ohta and Hiroshi Inamura, et al
Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing /Stefan Bensch ; Energy
Analysis of Services through Green Metrics: Towards Green Certificates /Mariagrazia
Fugini and José Antonio Parejo Maestre ; Uncertainty Interval Temporal Sequences Extraction
/Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah and Marc SistiagaPart 4 ; Business
Intelligence /Enterprise Knowledge Management System: A Multi Agent PerspectiveDeepak
Dahiya, Mohit Gupta and Pooja Jain ; Developing a Template for Organizational Knowledge
Management /Akhilesh Bajaj and Meredith Bates
Part 5 ; Management Science and Education /Towards of E-Learning Quality Standards
for Electrical EngineersNadezhda Kunicina, Anastasija Zhiravecka, Antons Patlins,
Yelena Chaiko and Leonids RibickisPart 6 ; Applications /A Comparative Study of Recognition
of Speech Using Improved MFCC Algorithms and Rasta FiltersLavneet Singh and Girija
Chetty
Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System
/Olayiwola Ojo, Ayodeji Oluwatope, Adesola Oke and Adesola Aderounmu
An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration /Brandon
A. Brown, Todd R. Andel and Yong KimPart 7 ; Workshop on Program Protection and Reverse
Engineering /Twisting Additivity in Program ObfuscationMila Dalla Preda, Wu Feng,
Roberto Giacobazzi, Richard Greechie and Arun Lakhotia ; Automatic Simplification
of Obfuscated JavaScript Code (Extended Abstract) /Gen Lu, Kevin Coogan and Saumya
Debray
Improved Malware Classification through Sensor Fusion Using Disjoint Union /Charles
LeDoux, Andrew Walenstein and Arun Lakhotia ; Dynamic Architectural Countermeasure
to Protect RSA against Side Channel Power Analysis Attacks /John Barron, Todd R. Andel
and Yong Kim ; Deployable Classifiers for Malware Detection /Anshuman Singh, Sumi
Singh, Andrew Walenstein and Arun LakhotiaPart 8 ; Short Papers /Interconnecting Workflows
Using Services: An Approach for "Case Transfer" with Centralized Control
Saida Boukhedouma, Zaia Alimazighi, Mourad Oussalah and Dalila Tamzalit ; Assessing
Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry
/Iskander Zouaghi and Abderrazak Laghouag ; Automatic Light Control for White Marker
Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication
/N. Hema, Krishna Kant and Hima Bindu Maringanti ; Wireless Environmental Monitoring
System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol /Tapan Jain
; Part 9. ; Position Papers /Detecting Healthcare Fraud through Patient Sharing SchemesAryya
Gangopadhyay, Song Chen and Yelena Yesha ; Software Security by Obscurity /A Programming
Language PerspectiveRoberto Giacobazzi ; System-Level Methods to Prevent Reverse-Engineering,
Cloning, and Trojan Insertion /Sylvain Guilley, Jean-Luc Danger, Robert Nguyen and
Philippe Nguyen ; The Grand Challenge in Metamorphic Analysis.
Mila Dalla Preda ; The Art and Science of Obfuscation /Clark Thomborson ; Capturing
the Essence of Practical Obfuscation /J. Todd McDonald