Coverart for item
The Resource Information Systems, Technology and Management : Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings, edited by Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni, (electronic resource)

Information Systems, Technology and Management : Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings, edited by Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni, (electronic resource)

Label
Information Systems, Technology and Management : Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings
Title
Information Systems, Technology and Management
Title remainder
Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings
Statement of responsibility
edited by Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009 The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on storage and retrieval systems; data mining and classification; managing digital goods and services; scheduling and distributed systems; advances in software engineering; case studies in information management; algorithms and workflows; authentication and detection systems; recommendation and negotiation; secure and multimedia systems; as well as 14 extended poster abstracts
Member of
http://library.link/vocab/creatorName
Prasad, Sushil K
Image bit depth
0
LC call number
QA76.9.M3
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Routray, Susmi.
  • Khurana, Reema.
  • Sahni, Sartaj.
  • SpringerLink
Series statement
Communications in Computer and Information Science,
Series volume
31
http://library.link/vocab/subjectName
  • Computer science
  • Computer network architectures
  • Software engineering
  • Data encryption (Computer science)
  • Data mining
  • Multimedia systems
  • Information Systems
  • Computer Science
  • Management of Computing and Information Systems
  • Multimedia Information Systems
  • Data Mining and Knowledge Discovery
  • Data Encryption
  • Software Engineering/Programming and Operating Systems
  • Computer Systems Organization and Communication Networks
Label
Information Systems, Technology and Management : Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings, edited by Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynotes -- Embedded Sensor Networks -- Future of Software Engineering -- Seeing beyond Computer Science and Software Engineering -- System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs -- Session 1. Storage and Retrieval Systems -- A Reduced Lattice Greedy Algorithm for Selecting Materialized Views -- Improving Expression Power in Modeling OLAP Hierarchies -- A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology -- Session 2. Data Mining and Classification -- Mining Rare Events Data for Assessing Customer Attrition Risk -- Extraction and Classification of Emotions for Business Research -- Data Shrinking Based Feature Ranking for Protein Classification -- Session 3. Managing Digital Goods and Services -- Value-Based Risk Management for Web Information Goods -- Quality and Business Offer Driven Selection of Web Services for Compositions -- Managing Sustainability with the Support of Business Intelligence Methods and Tools -- Session 4. Scheduling and Distributed Systems -- A Novel Particle Swarm Optimization Approach for Grid Job Scheduling -- Priority-Based Job Scheduling in Distributed Systems -- An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network -- Session 5. Advances in Software Engineering -- Application of Neural Networks in Software Engineering: A Review -- Model-Based Software Regression Testing for Software Components -- An Approach towards Software Quality Assessment -- Session 6. Case Studies in Information Management -- A Study of the Antecedents and Consequences of Members’ Helping Behaviors in Online Community -- Mobile Forensics: An Introduction from Indian Law Enforcement Perspective -- A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach -- Session 7. Algorithms and Workflows -- Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor -- Classification of Palmprint Using Principal Line -- Workflow Modeling Using Stochastic Activity Networks -- Session 8. Authentication and Detection Systems -- AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel -- New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication -- A Taxonomy of Frauds and Fraud Detection Techniques -- Session 9. Recommendation and Negotiation -- A Hybrid Approach for Knowledge-Based Product Recommendation -- An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages -- Learning Agents in Automated Negotiations -- Session 10. Secure and Multimedia Systems -- On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications -- A Trust Based Clustering Framework for Securing Ad Hoc Networks -- Security Enhancement in Data Encryption Standard -- Extended Abstracts of Posters -- A Novel Framework for Executing Untrusted Programs -- Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes -- Software Security Factors in Design Phase -- Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website -- Personalized Semantic Peer Selection in Peer-to-Peer Networks -- An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing -- Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing -- Optimization of Software Testing Using Genetic Algorithm -- Study and Analysis of Software Development and User Satisfaction Level -- Influence of Hot Spots in CDMA Macro Cellular Systems -- An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data -- PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise -- An Overview of a New Multi-formalism Modeling Framework -- Association Rule Based Feature Extraction for Character Recognition
Dimensions
unknown
File format
multiple file formats
Form of item
electronic
Isbn
9783642004056
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-00405-6
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-642-00405-6
Label
Information Systems, Technology and Management : Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings, edited by Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynotes -- Embedded Sensor Networks -- Future of Software Engineering -- Seeing beyond Computer Science and Software Engineering -- System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs -- Session 1. Storage and Retrieval Systems -- A Reduced Lattice Greedy Algorithm for Selecting Materialized Views -- Improving Expression Power in Modeling OLAP Hierarchies -- A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology -- Session 2. Data Mining and Classification -- Mining Rare Events Data for Assessing Customer Attrition Risk -- Extraction and Classification of Emotions for Business Research -- Data Shrinking Based Feature Ranking for Protein Classification -- Session 3. Managing Digital Goods and Services -- Value-Based Risk Management for Web Information Goods -- Quality and Business Offer Driven Selection of Web Services for Compositions -- Managing Sustainability with the Support of Business Intelligence Methods and Tools -- Session 4. Scheduling and Distributed Systems -- A Novel Particle Swarm Optimization Approach for Grid Job Scheduling -- Priority-Based Job Scheduling in Distributed Systems -- An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network -- Session 5. Advances in Software Engineering -- Application of Neural Networks in Software Engineering: A Review -- Model-Based Software Regression Testing for Software Components -- An Approach towards Software Quality Assessment -- Session 6. Case Studies in Information Management -- A Study of the Antecedents and Consequences of Members’ Helping Behaviors in Online Community -- Mobile Forensics: An Introduction from Indian Law Enforcement Perspective -- A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach -- Session 7. Algorithms and Workflows -- Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor -- Classification of Palmprint Using Principal Line -- Workflow Modeling Using Stochastic Activity Networks -- Session 8. Authentication and Detection Systems -- AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel -- New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication -- A Taxonomy of Frauds and Fraud Detection Techniques -- Session 9. Recommendation and Negotiation -- A Hybrid Approach for Knowledge-Based Product Recommendation -- An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages -- Learning Agents in Automated Negotiations -- Session 10. Secure and Multimedia Systems -- On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications -- A Trust Based Clustering Framework for Securing Ad Hoc Networks -- Security Enhancement in Data Encryption Standard -- Extended Abstracts of Posters -- A Novel Framework for Executing Untrusted Programs -- Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes -- Software Security Factors in Design Phase -- Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website -- Personalized Semantic Peer Selection in Peer-to-Peer Networks -- An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing -- Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing -- Optimization of Software Testing Using Genetic Algorithm -- Study and Analysis of Software Development and User Satisfaction Level -- Influence of Hot Spots in CDMA Macro Cellular Systems -- An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data -- PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise -- An Overview of a New Multi-formalism Modeling Framework -- Association Rule Based Feature Extraction for Character Recognition
Dimensions
unknown
File format
multiple file formats
Form of item
electronic
Isbn
9783642004056
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-00405-6
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-642-00405-6

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...