This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009
The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on storage and retrieval systems; data mining and classification; managing digital goods and services; scheduling and distributed systems; advances in software engineering; case studies in information management; algorithms and workflows; authentication and detection systems; recommendation and negotiation; secure and multimedia systems; as well as 14 extended poster abstracts.
Author(s): Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni
Series: Communications in Computer and Information Science
Edition: 1
Publisher: Springer
Year: 2009
Language: English
Commentary: 40426
Pages: 381
Cover Page......Page 1
Title Page......Page 2
Embedded Sensor Networks......Page 16
Future of Software Engineering......Page 17
Seeing beyond Computer Science and Software Engineering......Page 18
System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs......Page 19
Introduction......Page 21
Related Work......Page 22
Semantic Retrieval Algorithm......Page 24
Experiment and Results......Page 26
Discussion......Page 28
References......Page 29
Introduction......Page 31
Greedy Based Algorithms......Page 32
Algorithm HRU......Page 33
Algorithm RLGA......Page 34
Complexity Analysis – RLGA......Page 36
An Example......Page 37
Comparison – RLGA vs. HRU......Page 38
References......Page 42
Introduction......Page 44
Related Work......Page 45
Motivating Example......Page 46
The MultiDim Model......Page 47
Unbalanced Hierarchies......Page 49
Recursive Hierarchies......Page 50
Non-covering Hierarchies......Page 51
Non-strict Hierarchies......Page 52
Alternative Hierarchies......Page 53
Conclusions......Page 54
Introduction......Page 56
Methodology......Page 58
Proposed Shrinking Method......Page 59
Proposed Feature Selection Method......Page 62
Comparative Study......Page 63
References......Page 64
An Overview of Happiness Extraction......Page 66
Classification......Page 67
Conclusion and Future Work......Page 71
References......Page 72
Introduction......Page 73
Data Structure for Events Prediction......Page 74
Case-Based Sampling......Page 75
Predictive Modeling......Page 76
Results......Page 77
Introduction......Page 79
Sustainability and CSR Issues......Page 80
BI (Business Intelligence) Methods and Tools......Page 81
Looking for Information Planning Methods That Integrate Sustainability......Page 82
Research Approach......Page 83
Data Collection......Page 84
Research Results from a Grounded Theory Approach......Page 85
Discussion and Preliminary Conclusions......Page 88
References......Page 89
Introduction......Page 91
QoS of Web Services......Page 92
Motivating Example......Page 93
Conditional and Probabilistic Business Offers......Page 94
Composition Requirement Modeling......Page 95
Roles and Operations......Page 96
Component Interactions......Page 97
Composition Structure......Page 98
QoS and BO Computation......Page 99
Illustration for Selection......Page 100
Conclusion......Page 101
Introduction......Page 103
Business Models......Page 104
Value-Based Risk Identification......Page 106
Risks Present after Transferring Right and Custody......Page 107
Risks Associated with Value Object Features......Page 108
Risk Mitigation Instruments......Page 109
Mitigating Risks Present after Transfer of Right and Custody......Page 110
Mitigating Risks Associated with Value Object Features......Page 111
Identifying New Processes......Page 112
Conclusion......Page 113
References......Page 114
Introduction......Page 115
Problem Formulation......Page 116
Particle Swarm Optimization......Page 118
Particles Velocity, {\it pbest} and {\it nbest}......Page 119
Particle Updating......Page 120
Implementation and Experimental Results......Page 121
Comparison of Results with the Method Proposed in [15]......Page 122
References......Page 124
Introduction......Page 125
Problem Description......Page 127
Proposed Schemes......Page 128
Experimental Study......Page 130
Results and Analysis......Page 131
Conclusions......Page 132
References......Page 133
Introduction......Page 134
Related Work......Page 135
System Model......Page 136
Communication Model......Page 137
Enhance Sender Initiate Algorithm......Page 138
Simulation Results......Page 139
References......Page 141
Introduction......Page 143
Background......Page 144
Our Approach......Page 145
Case Study......Page 149
References......Page 153
Introduction......Page 154
Neural Network (NN) Methodology......Page 155
Software Project Effort Estimation......Page 156
Software Metrics......Page 158
Software Testing Activities......Page 159
Other Software Metrics (Software Quality and Software Reliability)......Page 160
References......Page 161
Introduction......Page 164
UML and Regression Testing......Page 165
Construction of Sequence Diagram for Software Components......Page 166
Construction of Control Flow Graph (CFG) to Store Sequence Diagram......Page 167
Traversal of Storage Graph to Generate Regression Test Suite......Page 169
Case Study......Page 170
References......Page 174
Introduction......Page 176
Information Sharing......Page 177
The Influences of Social Capital on Helping Behaviors......Page 178
The Influences of the Nature of Online Community on Helping Behaviors......Page 179
Research Conceptual Framework......Page 181
Operationalization and Measurement......Page 182
Data Analysis......Page 183
Discussion and Managerial Implications......Page 184
Further Research Directions......Page 185
References......Page 186
Introduction......Page 188
The Concept of ERP......Page 189
The ERP Implementation Context......Page 190
Methodology......Page 192
About the SME......Page 193
Data Collection and Data Analysis......Page 194
References......Page 197
The Need for Mobile Phone Handset Forensics......Page 200
Law Enforcement, Criminals and Mobile Phone Devices......Page 201
Connectivity Options and Their Impact on Dead and Live Forensic Analysis......Page 202
Operating Systems and File Systems......Page 203
Hardware......Page 204
Forensic Tools and Toolkits Available......Page 205
Principles of Electronic Evidence......Page 206
Mobile Phone Evidence Guides......Page 207
Concluding Remarks and Future Work......Page 209
References......Page 210
Introduction......Page 212
Related Work......Page 214
Steps to Find the Finger Web Points......Page 215
ROI Extraction......Page 217
Feature Extraction......Page 219
Classification......Page 220
Experimental Results......Page 221
Conclusion......Page 222
References......Page 223
Introduction......Page 224
QR Decomposition Based RLS......Page 226
CORDIC in QRD......Page 227
Systolic Arrays......Page 228
Hardware Flow......Page 229
Software Flow......Page 230
Verification of Our Design......Page 231
Analysis of Our Design......Page 232
Conclusion......Page 233
Introduction......Page 235
Related Works......Page 236
Workflow Patterns......Page 237
An Overview of Stochastic Activity Networks......Page 238
AND-Join Submodel......Page 239
Discriminator Submodel......Page 240
An Example of Workflow Modeling with SANs......Page 241
References......Page 245
Web Network Fraud......Page 247
Credit Fraud......Page 249
Telecommunication Fraud......Page 250
Supervised Methods......Page 251
Semi-supervised Methods......Page 252
Unsupervised Methods......Page 253
Real Time Approaches......Page 254
Conclusions......Page 255
References......Page 256
Introduction......Page 259
Design and Implementation of Proposed Kernel Based IDS......Page 261
Feature Selection......Page 262
Kernels Variety Experiment......Page 264
C-SVC Binary-Classification Experiment......Page 265
Sequential Instances Experiment......Page 268
References......Page 269
Introduction......Page 271
Watermark Embedding......Page 273
Quantization Process......Page 274
Watermark Embedding......Page 275
Results......Page 278
References......Page 280
Introduction......Page 283
Hybrid Approach for Product Recommendation......Page 285
An Illustrative Example for Hybrid Approach......Page 286
Product Clustering Based on CBR......Page 290
Data Capture and Analysis......Page 291
Conclusion......Page 292
References......Page 293
Introduction......Page 295
Related Work......Page 296
An Integrated Approach for Selection of the Software Packages......Page 297
Case Study: Selection of the Campus Management System......Page 298
Evaluation of an Integrated RBR and CBR Approach......Page 303
Conclusions......Page 304
References......Page 305
Introduction......Page 307
Context of the Proposed Work......Page 309
The Proposed Negotiation Procedure......Page 310
The Proposal Construction Algorithm......Page 311
Experiments......Page 313
Conclusions......Page 316
References......Page 317
Introduction......Page 318
Related Works......Page 319
Protocol Details......Page 320
Notation......Page 321
Node Join or Registration......Page 322
Intra Cluster Routing......Page 323
Node Unjoin......Page 325
Dempster Shafer Theory of Combining Evidences and Its Application to Trust Prediction......Page 326
Conclusion and Future Work......Page 328
References......Page 329
Introduction......Page 330
Signal Model......Page 331
Multi-modulation Systems......Page 332
Multi-processing Gain Schemes in Linear Multiuser Detection......Page 333
Results and Conclusion......Page 335
References......Page 338
Introduction......Page 340
Data Encryption Standard......Page 341
Modifications in DES......Page 342
Cryptographic Analysis......Page 345
References......Page 348
Introduction......Page 350
References......Page 351
Software Testing and ACO......Page 352
Reference......Page 353
Extended Abstract......Page 354
References......Page 355
Extended Abstract......Page 356
References......Page 357
Proposed Methodology......Page 358
Conclusion......Page 359
References......Page 360
Introduction......Page 361
Conclusion......Page 362
Non-homogenous Poisson Process Based Cumulative Priority Model......Page 363
Priority Weight Calculation......Page 364
Reference......Page 365
Influence of Hot Spots in CDMA Macro Cellular Systems......Page 366
References......Page 367
Introduction......Page 368
References......Page 369
Algorithm Implemented......Page 370
Reference......Page 371
Improved Peak-and-Valley......Page 372
References......Page 373
Personalized Semantic Peer Selection in Peer-to-Peer Networks......Page 374
References......Page 375
Software Security Factors in Design Phase......Page 376
Methodology......Page 378
References......Page 379
Author Index......Page 380