Cargando…

Information Systems, Technology and Management Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedings /

This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009 The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 7...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Prasad, Sushil K. (Editor ), Routray, Susmi (Editor ), Khurana, Reema (Editor ), Sahni, Sartaj (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Communications in Computer and Information Science, 31
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-00405-6
003 DE-He213
005 20220115215134.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642004056  |9 978-3-642-00405-6 
024 7 |a 10.1007/978-3-642-00405-6  |2 doi 
050 4 |a TK7885-7895 
050 4 |a TK5105.5-5105.9 
072 7 |a UK  |2 bicssc 
072 7 |a COM059000  |2 bisacsh 
072 7 |a UK  |2 thema 
082 0 4 |a 621.39  |2 23 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Information Systems, Technology and Management  |h [electronic resource] :  |b Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedings /  |c edited by Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XV, 366 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Communications in Computer and Information Science,  |x 1865-0937 ;  |v 31 
505 0 |a Keynotes -- Embedded Sensor Networks -- Future of Software Engineering -- Seeing beyond Computer Science and Software Engineering -- System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs -- Session 1. Storage and Retrieval Systems -- A Reduced Lattice Greedy Algorithm for Selecting Materialized Views -- Improving Expression Power in Modeling OLAP Hierarchies -- A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology -- Session 2. Data Mining and Classification -- Mining Rare Events Data for Assessing Customer Attrition Risk -- Extraction and Classification of Emotions for Business Research -- Data Shrinking Based Feature Ranking for Protein Classification -- Session 3. Managing Digital Goods and Services -- Value-Based Risk Management for Web Information Goods -- Quality and Business Offer Driven Selection of Web Services for Compositions -- Managing Sustainability with the Support of Business Intelligence Methods and Tools -- Session 4. Scheduling and Distributed Systems -- A Novel Particle Swarm Optimization Approach for Grid Job Scheduling -- Priority-Based Job Scheduling in Distributed Systems -- An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network -- Session 5. Advances in Software Engineering -- Application of Neural Networks in Software Engineering: A Review -- Model-Based Software Regression Testing for Software Components -- An Approach towards Software Quality Assessment -- Session 6. Case Studies in Information Management -- A Study of the Antecedents and Consequences of Members' Helping Behaviors in Online Community -- Mobile Forensics: An Introduction from Indian Law Enforcement Perspective -- A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach -- Session 7. Algorithms and Workflows -- Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor -- Classification of Palmprint Using Principal Line -- Workflow Modeling Using Stochastic Activity Networks -- Session 8. Authentication and Detection Systems -- AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel -- New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication -- A Taxonomy of Frauds and Fraud Detection Techniques -- Session 9. Recommendation and Negotiation -- A Hybrid Approach for Knowledge-Based Product Recommendation -- An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages -- Learning Agents in Automated Negotiations -- Session 10. Secure and Multimedia Systems -- On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications -- A Trust Based Clustering Framework for Securing Ad Hoc Networks -- Security Enhancement in Data Encryption Standard -- Extended Abstracts of Posters -- A Novel Framework for Executing Untrusted Programs -- Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes -- Software Security Factors in Design Phase -- Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website -- Personalized Semantic Peer Selection in Peer-to-Peer Networks -- An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing -- Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing -- Optimization of Software Testing Using Genetic Algorithm -- Study and Analysis of Software Development and User Satisfaction Level -- Influence of Hot Spots in CDMA Macro Cellular Systems -- An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data -- PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise -- An Overview of a New Multi-formalism Modeling Framework -- Association Rule Based Feature Extraction for Character Recognition. 
520 |a This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009 The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on storage and retrieval systems; data mining and classification; managing digital goods and services; scheduling and distributed systems; advances in software engineering; case studies in information management; algorithms and workflows; authentication and detection systems; recommendation and negotiation; secure and multimedia systems; as well as 14 extended poster abstracts. 
650 0 |a Computer engineering. 
650 0 |a Computer networks . 
650 0 |a Software engineering. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Electronic data processing-Management. 
650 0 |a Multimedia systems. 
650 0 |a Data mining. 
650 1 4 |a Computer Engineering and Networks. 
650 2 4 |a Software Engineering. 
650 2 4 |a Cryptology. 
650 2 4 |a IT Operations. 
650 2 4 |a Multimedia Information Systems. 
650 2 4 |a Data Mining and Knowledge Discovery. 
700 1 |a Prasad, Sushil K.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Routray, Susmi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Khurana, Reema.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Sahni, Sartaj.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642004063 
776 0 8 |i Printed edition:  |z 9783642004049 
830 0 |a Communications in Computer and Information Science,  |x 1865-0937 ;  |v 31 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-00405-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)