default search action
4. ICISTM 2010: Bangkok, Thailand
- Sushil K. Prasad, Harrick M. Vin, Sartaj Sahni, Mahadeo Jaiswal, Bundit Thipakorn:
Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings. Communications in Computer and Information Science 54, Springer 2010, ISBN 978-3-642-12034-3 - Richard Werner Nelem Pazzi, Kaouther Abrougui, Cristiano De Rezende, Azzedine Boukerche:
Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and Security. 1-7 - Alok N. Choudhary, Ramanathan Narayanan, Kunpeng Zhang:
High-End Analytics and Data Mining for Sustainable Competitive Advantage. 8-15 - Young Choon Lee, Albert Y. Zomaya:
Resource Allocation for Energy Efficient Large-Scale Distributed Systems. 16-19
2. / Information Systems
- Kevin Daniel Andre Carillo:
Social Cognitive Theory in IS Research - Literature Review, Criticism, and Research Agenda. 20-31 - Uday R. Kulkarni, Minu Ipe:
Knowledge Intensive Business Processes: A Process-Technology Fit Perspective. 32-43 - Lu Chen, Randy Chow:
A Web Service Similarity Refinement Framework Using Automata Comparison. 44-55 - JooHyung Oh, Chaetae Im, Hyuncheol Jeong:
A System for Analyzing Advance Bot Behavior. 56-63 - Elizabeth Papadopoulou, Yussuf Abu-Shaaban, Sarah Gallacher, Nick K. Taylor, M. Howard Williams:
Two Approaches to Handling Proactivity in Pervasive Systems. 64-75 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management. 76-88 - T. V. Vijay Kumar, Mohammad Haider, Santosh Kumar:
Proposing Candidate Views for Materialization. 89-98 - Indira Mukherjee, S. K. Ghosh:
A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information. 99-110
3. / Information Technology
- Demian Antony D'Mello, V. S. Ananthanarayana:
Dynamic Web Service Composition Based on Operation Flow Semantics. 111-122 - Akshaye Dhawan, Aung Aung, Sushil K. Prasad:
Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage Problems. 123-132 - Atanu Basu, Indranil Sengupta:
Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption. 133-144 - G. Sri Krishna, Rajib Mall:
Model-Based Software Reliability Prediction. 145-155 - Omar M. Al-Jarrah, Ayad Salhieh, Aziz Qaroush:
Real-Time Power-Aware Routing Protocol for Wireless Sensor Network. 156-166 - Sun Park, Dong Un An, ByungRea Cha, Chul-Won Kim:
Document Clustering with Semantic Features and Fuzzy Association. 167-175 - Phuong-Quyen Huynh, Pat Jangyodsuk, Melody Moh:
Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based Handover. 176-186
4. / Information Management
- Junseok Hwang, Jihyoun Park, Jörn Altmann:
Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods. 187-197 - Payal Mehra:
A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India. 198-209 - Teng-Sheng Moh, Alexander J. Murmann:
Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers. 210-220 - Kavitha Ranganathan, Vikramaditya Shekhar:
Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural Connectivity. 221-231 - Olufade F. W. Onifade, Odile Thiery, Adenike O. Osofisan, Gérald Duffing:
Fuzzontology: Resolving Information Mining Ambiguity in Economic Intelligent Process. 232-243 - Teng-Sheng Moh, Neha Sushil Saxena:
Personalizing Web Recommendations Using Web Usage Mining and Web Semantics with Time Attribute. 244-254 - Amit Sangroya, Saurabh Kumar, Jaideep Dhok, Vasudeva Varma:
Towards Analyzing Data Security Risks in Cloud Computing Environments. 255-265 - Kiyoshi Nosu, Takeshi Koike, Ayuko Shigeta:
Time-Sequential Emotion Diagnosis Based on the Eye Movement of the User in Support of Web-Based e-Learning. 266-274 - Ganesh Vaidyanathan, Carmen Debrot:
Critical Success Factors in Managing Virtual Teams. 275-281
5. / Applications
- Varin Chouvatut, Suthep Madarasmi, Mihran Tuceryan:
3D Reconstruction and Camera Pose from Video Sequence Using Multi-dimensional Descent. 282-292 - Boonlit Adipat, Dongsong Zhang, Lina Zhou:
Adapting Content Presentation for Mobile Web Browsing. 293-303 - Vijaya S. Desai, Sharad Joshi:
Application of Decision Tree Technique to Analyze Construction Project Data. 304-313 - Anjan Kumar Swain:
Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation Methods. 314-324
6. / Short Papers
- Edward G. Coffman Jr., Dmytro Matsypura, Vadim G. Timkovsky:
A Computational Study of Margining Portfolios of Options by Two Approaches. 325-332 - Anil Kumar, Mrinal Kanti Ghose:
Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map. 333-338 - Girish Parmar, Mahendra K. Pandey, Vijay Kumar:
Linear Multivariable System Reduction Using Particle Swarm Optimization and A Comparative Study Using Relative Integral Square Error. 339-347 - Bharat Gupta, Deepak Arora, Vishal Jha:
An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems. 348-356 - Marcelo López, Gustavo A. Isaza, Luis Joyanes:
Towards a Knowledge Management Portal for a Local Community. 357-362 - Rahul Kala, Harsh Vazirani, Anupam Shukla, Ritu Tiwari:
Fusion of Speech and Face by Enhanced Modular Neural Network. 363-372 - S. Tom Au, Meei-Ling Ivy Chin, Guangqin Ma:
Mining Rare Events Data by Sampling and Boosting: A Case Study. 373-379 - Chhabi Rani Panigrahi, Rajib Mall:
Model-Based Regression Test Case Prioritization. 380-385 - Neeraj Sharma, Kawaljeet Singh, D. P. Goyal:
Software Process Improvement through Experience Management: An Empirical Analysis of Critical Success Factors. 386-391
7. / Tutorial Papers
- Prerna Sethi, Mohit Jain:
A Comparative Feature Selection Approach for the Prediction of Healthcare Coverage. 392-403 - Sheetal Saini, Sumeet Dua:
A Grid-Based Scalable Classifier for High Dimensional Datasets. 404-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.