Login / Signup
ICISTM
2009
2012
2009
2012
Keyphrases
Publications
2012
Stefano Ferretti
,
Vittorio Ghini
Mitigation of Random Query String DoS via Gossip.
ICISTM
(2012)
N. Hema
,
Krishna Kant
,
Hima Bindu Maringanti
Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication.
ICISTM
(2012)
Nadezhda Kunicina
,
Anastasija Zhiravecka
,
Antons Patlins
,
Yelena Chaiko
,
Leonids Ribickis
Towards of E-Learning Quality Standards for Electrical Engineers.
ICISTM
(2012)
Nobuhiko Matsuura
,
Seiji Suzuki
,
Maki Ohata
,
Ken Ohta
,
Hiroshima Inamura
,
Tadanori Mizuno
,
Hiroshi Mineno
An Efficient and Highly Available Distributed Data Management System.
ICISTM
(2012)
Iskander Zouaghi
,
Abderrazak Laghouag
Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry.
ICISTM
(2012)
Aryya Gangopadhyay
,
Song Chen
,
Yelena Yesha
Detecting Healthcare Fraud through Patient Sharing Schemes.
ICISTM
(2012)
Pooja Jain
,
Deepak Dahiya
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation.
ICISTM
(2012)
Navid Karimi Sani
,
Shokoofeh Ketabchi
,
Kecheng Liu
The Co-design of Business and IT Systems: A Case in Supply Chain Management.
ICISTM
(2012)
Paolo Neirotti
,
Elisabetta Raguseo
Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities?
ICISTM
(2012)
Raymond Siulai Wong
,
Teng-Sheng Moh
,
Melody Moh
Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections.
ICISTM
(2012)
John Barron
,
Todd R. Andel
,
Yong Kim
Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks.
ICISTM
(2012)
Jeffrey Todd McDonald
Capturing the Essence of Practical Obfuscation.
ICISTM
(2012)
Charles LeDoux
,
Andrew Walenstein
,
Arun Lakhotia
Improved Malware Classification through Sensor Fusion Using Disjoint Union.
ICISTM
(2012)
David Kiwana
,
Björn Johansson
The Dynamics of Implementation of Finance Information Systems.
ICISTM
(2012)
Mila Dalla Preda
The Grand Challenge in Metamorphic Analysis.
ICISTM
(2012)
Asma Ben Zakour
,
Sofian Maabout
,
Mohamed Mosbah
,
Marc Sistiaga
Uncertainty Interval Temporal Sequences Extraction.
ICISTM
(2012)
Roberto Giacobazzi
Software Security by Obscurity - A Programming Language Perspective.
ICISTM
(2012)
Mturi Elias
,
Paul Johannesson
A Survey of Process Model Reuse Repositories.
ICISTM
(2012)
Adebayo Oyekan
,
Ifetayo Ojiwusi
,
Ayodeji Oludola Oluwatope
,
G. Adesola Aderounmu
,
Emmanuel Rotimi Adagunodo
Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks.
ICISTM
(2012)
Mariagrazia Fugini
,
José Antonio Parejo Maestre
Energy Analysis of Services through Green Metrics: Towards Green Certificates.
ICISTM
(2012)
Prem Parashar
,
Arvind Kalia
,
Rajesh Bhatia
Pair-Wise Time-Aware Test Case Prioritization for Regression Testing.
ICISTM
(2012)
Mila Dalla Preda
,
Wu Feng
,
Roberto Giacobazzi
,
Richard Greechie
,
Arun Lakhotia
Twisting Additivity in Program Obfuscation.
ICISTM
(2012)
Gen Lu
,
Kevin Coogan
,
Saumya K. Debray
Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract).
ICISTM
(2012)
Neeraj Sharma
,
Kawaljeet Singh
,
D. P. Goyal
Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector.
ICISTM
(2012)
Meera M. Dhabu
,
Parag S. Deshpande
Cardinality Statistics Based Maximal Frequent Itemsets Mining.
ICISTM
(2012)
Akhilesh Bajaj
,
Meredith Bates
Developing a Template for Organizational Knowledge Management.
ICISTM
(2012)
Saïda Boukhedouma
,
Zaia Alimazighi
,
Mourad Oussalah
,
Dalila Tamzalit
Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized Control.
ICISTM
(2012)
Brandon A. Brown
,
Todd R. Andel
,
Yong Kim
An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration.
ICISTM
(2012)
Sunint Kaur Khalsa
,
Rajesh Kumar Bhatia
,
Jitender Kumar Chhabra
,
Maninder Singh
A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing.
ICISTM
(2012)
Razia Haider
,
Federica Mandreoli
,
Riccardo Martoglia
,
Simona Sassatelli
Fast On-Line Summarization of RFID Probabilistic Data Streams.
ICISTM
(2012)
Anshuman Singh
,
Sumi Singh
,
Andrew Walenstein
,
Arun Lakhotia
Deployable Classifiers for Malware Detection.
ICISTM
(2012)
Mahdi Naghibi
,
Adel Torkaman Rahmani
Focused Crawling Using Vision-Based Page Segmentation.
ICISTM
(2012)
Saranya Maneeroj
,
Pannawit Samatthiyadikun
,
Warat Chalermpornpong
,
Sasipa Panthuwadeethorn
,
Atsuhiro Takasu
Ranked Criteria Profile for Multi-criteria Rating Recommender.
ICISTM
(2012)
Clark D. Thomborson
The Art and Science of Obfuscation.
ICISTM
(2012)
Daniel Ritter
,
Christoph Herrmann
A Graph API for Complex Business Network Query and Traversal.
ICISTM
(2012)
Tapan Jain
Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol.
ICISTM
(2012)
Deepak Dahiya
,
Mohit Gupta
,
Pooja Jain
Enterprise Knowledge Management System: A Multi Agent Perspective.
ICISTM
(2012)
Lavneet Singh
,
Girija Chetty
A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta Filters.
ICISTM
(2012)
Stefan Bensch
Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing.
ICISTM
(2012)
Sylvain Guilley
,
Jean-Luc Danger
,
Robert Nguyen
,
Philippe Nguyen
System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion.
ICISTM
(2012)
Olayiwola Ojo
,
Ayodeji Oludola Oluwatope
,
Adesola Oke
,
G. Adesola Aderounmu
Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System.
ICISTM
(2012)
Hesham Allam
,
James Blustein
,
Michael Bliemel
,
Louise Spiteri
Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing Tags.
ICISTM
(2012)
Shehzad Ashraf Chaudhry
,
Nizamuddin
,
Muhammad Sher
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
ICISTM
(2012)
Bernard Ijesunor Akhigbe
,
Babajide Samuel Afolabi
,
Emmanuel Rotimi Adagunodo
Item's Characterization for Model's Development in Information Retrieval System Evaluation.
ICISTM
(2012)
volume 285, 2012
Information Systems, Technology and Management - 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings
ICISTM
285 (2012)
2011
Sanjog Ray
,
Anuj Sharma
A Collaborative Filtering Based Approach for Recommending Elective Courses.
ICISTM
(2011)
S. Tom Au
,
Rong Duan
,
Guangqin Ma
,
Rensheng Wang
A Novel Approach for Combining Experts Rating Scores.
ICISTM
(2011)
Deisy Chelliah
,
A. M. Rajeswari
,
R. M. Indra
,
N. Jayalakshmi
,
P. K. Mehalaa Devi
A Novel Relation-Based Probability Algorithm for Page Ranking in Semantic Web Search Engine.
ICISTM
(2011)
Sapna P. G.
,
Hrushikesha Mohanty
An Ontology Based Approach for Test Scenario Management.
ICISTM
(2011)
volume 141, 2011
Information Intelligence, Systems, Technology and Management - 5th International Conference, ICISTM 2011, Gurgaon, India, March 10-12, 2011. Proceedings
ICISTM
141 (2011)