researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2010
2011
2012
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Abdul Quaiyum Ansari
Adenike O. Osofisan
Andrew Walenstein
Anil Kumar
Arun Lakhotia
Ayodeji Oludola Oluwatope
D. P. Goyal
Deepak Dahiya
Emmanuel Rotimi Adagunodo
Guangqin Ma
Kawaljeet Singh
Mohammad Abdollahi Azgomi
Neeraj Sharma
Pooja Jain
Praveen Ranjan Srivastava
S. Tom Au
Soumya Kanti Ghosh
Sumeet Dua
T. V. Vijay Kumar
Teng-Sheng Moh
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
business
case
data
detection
factors
framework
information
knowledge
management
mining
model
networks
software
study
system
systems
using
web
ICISTM (icistm)
Editions
Publications
Viewing Publication 1 - 100 from 177
2012
A Graph API for Complex Business Network Query and Traversal
Daniel Ritter 0001
,
Christoph Herrmann 0002
.
icistm 2012
:
52-63
[doi]
Item's Characterization for Model's Development in Information Retrieval System Evaluation
Bernard Ijesunor Akhigbe
,
Babajide Samuel Afolabi
,
Emmanuel Rotimi Adagunodo
.
icistm 2012
:
101-111
[doi]
Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing Tags
Hesham Allam
,
James Blustein
,
Michael Bliemel
,
Louise Spiteri
.
icistm 2012
:
112-123
[doi]
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem
Shehzad Ashraf
,
Nizamuddin
,
Muhammad Sher
.
icistm 2012
:
135-142
[doi]
Developing a Template for Organizational Knowledge Management
Akhilesh Bajaj
,
Meredith Bates
.
icistm 2012
:
282-291
[doi]
Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks
John Barron
,
Todd R. Andel
,
Yong Kim
.
icistm 2012
:
372-383
[doi]
Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing
Stefan Bensch
.
icistm 2012
:
235-246
[doi]
Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized Control
Saïda Boukhedouma
,
Zaia Alimazighi
,
Mourad Oussalah
,
Dalila Tamzalit
.
icistm 2012
:
396-401
[doi]
An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration
Brandon A. Brown
,
Todd R. Andel
,
Yong Kim
.
icistm 2012
:
325-335
[doi]
Enterprise Knowledge Management System: A Multi Agent Perspective
Deepak Dahiya
,
Mohit Gupta
,
Pooja Jain
.
icistm 2012
:
271-281
[doi]
Cardinality Statistics Based Maximal Frequent Itemsets Mining
Meera M. Dhabu
,
Parag S. Deshpande
.
icistm 2012
:
28-39
[doi]
Information Systems, Technology and Management - 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings
Sumeet Dua
,
Aryya Gangopadhyay
,
Parimala Thulasiraman
,
Umberto Straccia
,
Michael A. Shepherd
,
Benno Stein
, editors,
Volume 285 of
Communications in Computer and Information Science
, Springer,
2012.
[doi]
A Survey of Process Model Reuse Repositories
Mturi Elias
,
Paul Johannesson
.
icistm 2012
:
64-76
[doi]
Mitigation of Random Query String DoS via Gossip
Stefano Ferretti
,
Vittorio Ghini
.
icistm 2012
:
124-134
[doi]
Energy Analysis of Services through Green Metrics: Towards Green Certificates
Mariagrazia Fugini
,
José Antonio Parejo Maestre
.
icistm 2012
:
247-258
[doi]
Detecting Healthcare Fraud through Patient Sharing Schemes
Aryya Gangopadhyay
,
Song Chen
,
Yelena Yesha
.
icistm 2012
:
421-426
[doi]
Software Security by Obscurity - A Programming Language Perspective
Roberto Giacobazzi
.
icistm 2012
:
427-432
[doi]
System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion
Sylvain Guilley
,
Jean-Luc Danger
,
Robert Nguyen
,
Philippe Nguyen
.
icistm 2012
:
433-438
[doi]
Fast On-Line Summarization of RFID Probabilistic Data Streams
Razia Haider
,
Federica Mandreoli
,
Riccardo Martoglia
,
Simona Sassatelli
.
icistm 2012
:
211-223
[doi]
Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication
N. Hema
,
Krishna Kant
,
Hima Bindu Maringanti
.
icistm 2012
:
408-413
[doi]
Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol
Tapan Jain
.
icistm 2012
:
414-420
[doi]
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation
Pooja Jain
,
Deepak Dahiya
.
icistm 2012
:
164-175
[doi]
A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing
Sunint Kaur Khalsa
,
Rajesh Kumar Bhatia
,
Jitender Kumar Chhabra
,
Maninder Singh
.
icistm 2012
:
199-210
[doi]
The Dynamics of Implementation of Finance Information Systems
David Kiwana
,
Björn Johansson
.
icistm 2012
:
77-88
[doi]
Towards of E-Learning Quality Standards for Electrical Engineers
Nadezhda Kunicina
,
Anastasija Zhiravecka
,
Antons Patlins
,
Yelena Chaiko
,
Leonids Ribickis
.
icistm 2012
:
292-303
[doi]
Improved Malware Classification through Sensor Fusion Using Disjoint Union
Charles LeDoux
,
Andrew Walenstein
,
Arun Lakhotia
.
icistm 2012
:
360-371
[doi]
Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract)
Gen Lu
,
Kevin Coogan
,
Saumya K. Debray
.
icistm 2012
:
348-359
[doi]
Ranked Criteria Profile for Multi-criteria Rating Recommender
Saranya Maneeroj
,
Pannawit Samatthiyadikun
,
Warat Chalermpornpong
,
Sasipa Panthuwadeethorn
,
Atsuhiro Takasu
.
icistm 2012
:
40-51
[doi]
An Efficient and Highly Available Distributed Data Management System
Nobuhiko Matsuura
,
Seiji Suzuki
,
Maki Ohata
,
Ken Ohta
,
Hiroshima Inamura
,
Tadanori Mizuno
,
Hiroshi Mineno
.
icistm 2012
:
224-234
[doi]
Capturing the Essence of Practical Obfuscation
J. Todd McDonald
.
icistm 2012
:
451-456
[doi]
Focused Crawling Using Vision-Based Page Segmentation
Mahdi Naghibi
,
Adel Torkaman Rahmani
.
icistm 2012
:
1-12
[doi]
Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities?
Paolo Neirotti
,
Elisabetta Raguseo
.
icistm 2012
:
89-100
[doi]
Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System
Olayiwola Ojo
,
Ayodeji Oludola Oluwatope
,
Adesola Oke
,
G. Adesola Aderounmu
.
icistm 2012
:
315-324
[doi]
Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks
Adebayo Oyekan
,
Ifetayo Ojiwusi
,
Ayodeji Oludola Oluwatope
,
G. Adesola Aderounmu
,
Emmanuel Rotimi Adagunodo
.
icistm 2012
:
143-151
[doi]
Pair-Wise Time-Aware Test Case Prioritization for Regression Testing
Prem Parashar
,
Arvind Kalia
,
Rajesh Bhatia
.
icistm 2012
:
176-186
[doi]
The Grand Challenge in Metamorphic Analysis
Mila Dalla Preda
.
icistm 2012
:
439-444
[doi]
Twisting Additivity in Program Obfuscation
Mila Dalla Preda
,
Wu Feng
,
Roberto Giacobazzi
,
Richard Greechie
,
Arun Lakhotia
.
icistm 2012
:
336-347
[doi]
The Co-design of Business and IT Systems: A Case in Supply Chain Management
Navid Karimi Sani
,
Shokoofeh Ketabchi
,
Kecheng Liu
.
icistm 2012
:
13-27
[doi]
Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector
Neeraj Sharma
,
Kawaljeet Singh
,
D. P. Goyal
.
icistm 2012
:
187-198
[doi]
Deployable Classifiers for Malware Detection
Anshuman Singh
,
Sumi Singh
,
Andrew Walenstein
,
Arun Lakhotia
.
icistm 2012
:
384-395
[doi]
A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta Filters
Lavneet Singh
,
Girija Chetty
.
icistm 2012
:
304-314
[doi]
The Art and Science of Obfuscation
Clark D. Thomborson
.
icistm 2012
:
445-450
[doi]
Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections
Raymond Siulai Wong
,
Teng-Sheng Moh
,
W. Melody Moh
.
icistm 2012
:
152-163
[doi]
Uncertainty Interval Temporal Sequences Extraction
Asma Ben Zakour
,
Sofian Maabout
,
Mohamed Mosbah
,
Marc Sistiaga
.
icistm 2012
:
259-270
[doi]
Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry
Iskander Zouaghi
,
Abderrazak Laghouag
.
icistm 2012
:
402-407
[doi]
2011
A Novel Approach for Combining Experts Rating Scores
S. Tom Au
,
Rong Duan
,
Guangqin Ma
,
Rensheng Wang
.
icistm 2011
:
322-329
[doi]
Biztool: A Flexible Cloud-Centric Framework for Business Analytics
Amarnath Ayyadurai
,
Chitra Babu
.
icistm 2011
:
256-264
[doi]
An Efficient Metamorphic Testing Technique Using Genetic Algorithm
Gagandeep Batra
,
Jyotsna Sengupta
.
icistm 2011
:
180-188
[doi]
Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index
Veena H. Bhat
,
S. Krishna
,
P. Deepa Shenoy
,
K. R. Venugopal
,
Lalit M. Patnaik
.
icistm 2011
:
51-60
[doi]
Qualitative Survey-Based Content Analysis and Validation of Measures of Software Development Team Performance
Amar Nath Chatterjee
,
Duraipandian Israel
.
icistm 2011
:
299-310
[doi]
SASM- An Approach towards Self-protection in Grid Computing
Inderpreet Chopra
,
Maninder Singh
.
icistm 2011
:
149-159
[doi]
A Novel Relation-Based Probability Algorithm for Page Ranking in Semantic Web Search Engine
C. Deisy
,
A. M. Rajeswari
,
R. M. Indra
,
N. Jayalakshmi
,
P. K. Mehalaa Devi
.
icistm 2011
:
138-148
[doi]
Information Intelligence, Systems, Technology and Management - 5th International Conference, ICISTM 2011, Gurgaon, India, March 10-12, 2011. Proceedings
Sumeet Dua
,
Sartaj Sahni
,
D. P. Goyal
, editors,
Volume 141 of
Communications in Computer and Information Science
, Springer,
2011.
[doi]
An Ontology Based Approach for Test Scenario Management
Sapna P. G.
,
Hrushikesha Mohanty
.
icistm 2011
:
91-100
[doi]
Soft Computing Model to Predict Average Length of Stay of Patient
Bindu Garg
,
M. M. Sufyan Beg
,
Abdul Quaiyum Ansari
,
B. Mohammed Imran
.
icistm 2011
:
221-232
[doi]
Fuzzy Time Series Prediction Model
Bindu Garg
,
M. M. Sufyan Beg
,
Abdul Quaiyum Ansari
,
B. Mohammed Imran
.
icistm 2011
:
126-137
[doi]
Cognitive Models and Its Current Challenges
Mukta Goyal
,
Alka Choubey
,
Divakar Yadav
.
icistm 2011
:
355-358
[doi]
Pre-processed Depth First Search
Rushabh Hathi
,
Irfan A. Siddavatam
.
icistm 2011
:
214-220
[doi]
Statistical Analysis for Human Authentication Using ECG Waves
Chetana Hegde
,
H. Rahul Prabhu
,
D. S. Sagar
,
P. Deepa Shenoy
,
K. R. Venugopal
,
Lalit M. Patnaik
.
icistm 2011
:
287-298
[doi]
Architecture of a Library Management System Using Gaia Extended for Multi Agent Systems
Pooja Jain
,
Deepak Dahiya
.
icistm 2011
:
340-349
[doi]
Knowledge Sharing Intentions among IT Professionals in India
Binoy Joseph
,
Merin Jacob
.
icistm 2011
:
23-31
[doi]
Inside Story of Business Process Reengineering in State Bank of Patiala (SBOP): Straight from the Horses' Mouth
Ratinder Kaur
.
icistm 2011
:
363-366
[doi]
Application of Vector Quantization in Emotion Recognition from Human Speech
Preeti Khanna
,
M. Sasi Kumar
.
icistm 2011
:
118-125
[doi]
Hybrid Temporal Mining for Finding Out Frequent Itemsets in Temporal Databases Using Clustering and Bit Vector Methods
M. Krishnamurthy
,
Arputharaj Kannan
,
Ramachandran Baskaran
,
G. Bhuvaneswari
.
icistm 2011
:
245-255
[doi]
Service Availability Driven Re-configurable Embedded System Design
Anil Kumar
,
Shampa Chakraverty
.
icistm 2011
:
265-276
[doi]
A View Recommendation Greedy Algorithm for Materialized Views Selection
T. V. Vijay Kumar
,
Mohammad Haider
,
Santosh Kumar
.
icistm 2011
:
61-70
[doi]
Selection of Outsourcing Agency through AHP and Grey Relational Analysis: A Case Analysis
Debendra Kumar Mahalik
.
icistm 2011
:
1-12
[doi]
Reducing Classification Times for Email Spam Using Incremental Multiple Instance Classifiers
Teng-Sheng Moh
,
Nicholas Lee
.
icistm 2011
:
189-197
[doi]
Framework for Spatial Query Resolution for Decision Support Using Geospatial Service Chaining and Fuzzy Reasoning
Jayeeta Mukherjee
,
Indira Mukherjee
,
Soumya Kanti Ghosh
.
icistm 2011
:
81-90
[doi]
Computational Modeling of Collaborative Resources Sharing in Grid System
Ayodeji Oludola Oluwatope
,
Duada Iyanda
,
Ganiyu A. Aderounmu
,
Emmanuel Rotimi Adagunodo
.
icistm 2011
:
311-321
[doi]
Resolving Ambiguous Queries via Fuzzy String Matching and Dynamic Buffering Techniques
Olufade F. W. Onifade
,
Adenike O. Osofisan
.
icistm 2011
:
198-205
[doi]
Change Impact Analysis: A Tool for Effective Regression Testing
Prem Parashar
,
Rajesh Bhatia
,
Arvind Kalia
.
icistm 2011
:
160-169
[doi]
Societal Responsibility of Business and Information Systems
Hugues Poissonnier
,
Claudio Vitari
,
Raffi Duymedjian
,
Renaud Cornu-Emieux
.
icistm 2011
:
110-117
[doi]
Comparative Analysis of Impact of Various Global Stock Markets and Determinants on Indian Stock Market Performance - A Case Study Using Multiple Linear Regression and Neural Networks
Avinash Pokhriyal
,
Lavneet Singh
,
Savleen Singh
.
icistm 2011
:
277-286
[doi]
A Deterministic Approach for the Propagation of Computer Virus in the Framework of Linear and Sinusoidal Time Variation of Birth Rate of Virus
Nistala Suresh Rao
,
Jamwal Deepshikha
.
icistm 2011
:
206-213
[doi]
A Collaborative Filtering Based Approach for Recommending Elective Courses
Sanjog Ray
,
Anuj Sharma
.
icistm 2011
:
330-339
[doi]
Interorganizational Information Systems Diffusion: A Social Network Perspective
Laurence Saglietto
,
Federico Pigni
.
icistm 2011
:
350-354
[doi]
Resolving Productivity Paradox of Fully and Partially IT Oriented Banks: Evidence from India
Dhiraj Sharma
.
icistm 2011
:
359-362
[doi]
Experience Based Software Process Improvement: Have We Found the Silver Bullet?
Neeraj Sharma
,
Kawaljeet Singh
,
D. P. Goyal
.
icistm 2011
:
71-80
[doi]
Critical Success Factors for CRM Implementation: A Study on Indian Banks
Sarika Sharma
,
D. P. Goyal
.
icistm 2011
:
32-40
[doi]
Creating Value for Businesses by Providing CRM Solutions: A Case of Oracle CRM on Demand
Swati Singh
,
Sanjeev Kr. Singh
.
icistm 2011
:
101-109
[doi]
A Study on XML Data Indexing for Web Based Application
Puspha Rani Suri
,
Neetu Sardana
.
icistm 2011
:
13-22
[doi]
Development of Three-Stage Methodology for a Strategy-Based Integrated Dynamics Model from a Value Chain Reconfiguring Perspective
Chung-Chou Tsai
,
Sununta Siengthai
,
Vilas Wuwongse
,
Donyaprueth Krairit
.
icistm 2011
:
233-244
[doi]
Issues before Indian Small and Medium Scale Enterprises Opting for ERP Implementation
Parijat Upadhyay
,
Rana Basu
,
Pranab K. Dan
.
icistm 2011
:
41-50
[doi]
Multi-feature Fusion for Closed Set Text Independent Speaker Identification
Gyanendra K. Verma
.
icistm 2011
:
170-179
[doi]
2010
Mining Rare Events Data by Sampling and Boosting: A Case Study
S. Tom Au
,
Meei-Ling Ivy Chin
,
Guangqin Ma
.
icistm 2010
:
373-379
[doi]
ECC Based Signcryption
Atanu Basu
,
Indranil Sengupta
.
icistm 2010
:
133-144
[doi]
Social Cognitive Theory in IS Research - Literature Review, Criticism, and Research Agenda
Kévin D. Carillo
.
icistm 2010
:
20-31
[doi]
Application of Decision Tree Technique to Analyze Construction Project Data
Vijaya S. Desai
,
Sharad Joshi
.
icistm 2010
:
304-313
[doi]
A Computational Study of Margining Portfolios of Options by Two Approaches
Edward G. Coffman Jr.
,
Dmytro Matsypura
,
Vadim G. Timkovsky
.
icistm 2010
:
325-332
[doi]
Knowledge Intensive Business Processes: A Process-Technology Fit Perspective
Uday Kulkarni
,
Minu Ipe
.
icistm 2010
:
32-43
[doi]
Towards a Knowledge Management Portal for a Local Community
Marcelo López
,
Gustavo A. Isaza
,
Luis Joyanes
.
icistm 2010
:
357-362
[doi]
A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India
Payal Mehra
.
icistm 2010
:
198-209
[doi]
A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information
Indira Mukherjee
,
S. K. Ghosh
.
icistm 2010
:
99-110
[doi]
A System for Analyzing Advance Bot Behavior
JooHyung Oh
,
Chaetae Im
,
HyunCheol Jeong
.
icistm 2010
:
56-63
[doi]
Two Approaches to Handling Proactivity in Pervasive Systems
Elizabeth Papadopoulou
,
Yussuf Abu-Shaaban
,
Sarah Gallacher
,
Nick K. Taylor
,
M. Howard Williams
.
icistm 2010
:
64-75
[doi]
Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural Connectivity
Kavitha Ranganathan
,
Vikramaditya Shekhar
.
icistm 2010
:
221-231
[doi]
A Grid-Based Scalable Classifier for High Dimensional Datasets
Sheetal Saini
,
Sumeet Dua
.
icistm 2010
:
404-415
[doi]
Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation Methods
Anjan Kumar Swain
.
icistm 2010
:
314-324
[doi]
Critical Success Factors in Managing Virtual Teams
Ganesh Vaidyanathan
,
Carmen Debrot
.
icistm 2010
:
275-281
[doi]
Sign in
or
sign up
to see more results.