Information Systems, Technology and Management: Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedings by Sushil K. PrasadInformation Systems, Technology and Management: Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedings by Sushil K. Prasad

Information Systems, Technology and Management: Third International Conference, ICISTM 2009…

bySushil K. PrasadEditorSusmi Routray, Reema Khurana

Paperback | February 24, 2009

Pricing and Purchase Info

$159.25 online 
$191.95 list price save 17%
Earn 796 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009 The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on storage and retrieval systems; data mining and classification; managing digital goods and services; scheduling and distributed systems; advances in software engineering; case studies in information management; algorithms and workflows; authentication and detection systems; recommendation and negotiation; secure and multimedia systems; as well as 14 extended poster abstracts.
Title:Information Systems, Technology and Management: Third International Conference, ICISTM 2009…Format:PaperbackDimensions:366 pages, 23.5 × 15.5 × 0.01 inPublished:February 24, 2009Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642004040

ISBN - 13:9783642004049

Look for similar items by category:

Reviews

Table of Contents

Keynotes.- Embedded Sensor Networks.- Future of Software Engineering.- Seeing beyond Computer Science and Software Engineering.- System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs.- Session 1. Storage and Retrieval Systems.- A Reduced Lattice Greedy Algorithm for Selecting Materialized Views.- Improving Expression Power in Modeling OLAP Hierarchies.- A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology.- Session 2. Data Mining and Classification.- Mining Rare Events Data for Assessing Customer Attrition Risk.- Extraction and Classification of Emotions for Business Research.- Data Shrinking Based Feature Ranking for Protein Classification.- Session 3. Managing Digital Goods and Services.- Value-Based Risk Management for Web Information Goods.- Quality and Business Offer Driven Selection of Web Services for Compositions.- Managing Sustainability with the Support of Business Intelligence Methods and Tools.- Session 4. Scheduling and Distributed Systems.- A Novel Particle Swarm Optimization Approach for Grid Job Scheduling.- Priority-Based Job Scheduling in Distributed Systems.- An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network.- Session 5. Advances in Software Engineering.- Application of Neural Networks in Software Engineering: A Review.- Model-Based Software Regression Testing for Software Components.- An Approach towards Software Quality Assessment.- Session 6. Case Studies in Information Management.- A Study of the Antecedents and Consequences of Members' Helping Behaviors in Online Community.- Mobile Forensics: An Introduction from Indian Law Enforcement Perspective.- A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach.- Session 7. Algorithms and Workflows.- Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor.- Classification of Palmprint Using Principal Line.- Workflow Modeling Using Stochastic Activity Networks.- Session 8. Authentication and Detection Systems.- AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel.- New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication.- A Taxonomy of Frauds and Fraud Detection Techniques.- Session 9. Recommendation and Negotiation.- A Hybrid Approach for Knowledge-Based Product Recommendation.- An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages.- Learning Agents in Automated Negotiations.- Session 10. Secure and Multimedia Systems.- On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications.- A Trust Based Clustering Framework for Securing Ad Hoc Networks.- Security Enhancement in Data Encryption Standard.- Extended Abstracts of Posters.- A Novel Framework for Executing Untrusted Programs.- Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes.- Software Security Factors in Design Phase.- Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website.- Personalized Semantic Peer Selection in Peer-to-Peer Networks.- An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing.- Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing.- Optimization of Software Testing Using Genetic Algorithm.- Study and Analysis of Software Development and User Satisfaction Level.- Influence of Hot Spots in CDMA Macro Cellular Systems.- An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data.- PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise.- An Overview of a New Multi-formalism Modeling Framework.- Association Rule Based Feature Extraction for Character Recognition.

Editorial Reviews

From the reviews:"Information systems, Technology and Management (ICISTM) to be a rich collection of actionable research papers in information systems (IS) and information technology (IT) management. . The books layout, length, and presentation are quite good. . Computer Science (CS) students and research scholars, particularly those who work in the software engineering field, will like this book. That being said, very few papers will appeal to CIOs and IS manager." (C. S. Arora, ACM Computing Reviews, February, 2010)