3. ICISTM 2009: Ghaziabad, India
Sushil K. Prasad, Susmi Routray, Reema Khurana, Sartaj Sahni (Eds.): Information Systems, Technology and Management - Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings. Springer 2009 Communications in Computer and Information Science 31 ISBN 978-3-642-00404-9
Part 1 / Keynotes
Sitharama S. Iyengar: Embedded Sensor Networks. 1
Pankaj Jalote: Future of Software Engineering. 2
Kesav Vithal Nori: Seeing beyond Computer Science and Software Engineering. 3
Sushil K. Prasad: System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs. 4-5
Part 2 / Session 1. Storage and Retrieval Systems
T. V. Vijay Kumar, Aloke Ghoshal: A Reduced Lattice Greedy Algorithm for Selecting Materialized Views. 6-18
Elzbieta Malinowski: Improving Expression Power in Modeling OLAP Hierarchies. 19-30
Vahid Jalali, Mohammad Reza Matash Borujerdi: A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology. 31-40
Part 3 / Session 2. Data Mining and Classification
S. Tom Au, Meei-Ling Ivy Chin, Guangqin Ma: Mining Rare Events Data for Assessing Customer Attrition Risk. 41-46
Rajib Verma: Extraction and Classification of Emotions for Business Research. 47-53
Part 4 / Session 3. Managing Digital Goods and Services

Demian Antony D'Mello, V. S. Ananthanarayana: Quality and Business Offer Driven Selection of Web Services for Compositions. 76-87
Maira Petrini, Marlei Pozzebon: Managing Sustainability with the Support of Business Intelligence Methods and Tools. 88-99
Part 5 / Session 4. Scheduling and Distributed Systems
Hesam Izakian, Behrouz Tork Ladani, Kamran Zamanifar, Ajith Abraham: A Novel Particle Swarm Optimization Approach for Grid Job Scheduling. 100-109
Chinmay R. Totekar, P. Santhi Thilagam: An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network. 119-127
Part 6 / Session 5. Advances in Software Engineering
Yogesh Singh, Pradeep Kumar Bhatia, Arvinder Kaur, Omprakash Sangwan: Application of Neural Networks in Software Engineering: A Review. 128-137
Gagandeep Batra, Yogesh Kumar Arora, Jyotsna Sengupta: Model-Based Software Regression Testing for Software Components. 138-149
Part 7 / Session 6. Case Studies in Information Management
Kuo-Ming Chu: A Study of the Antecedents and Consequences of Members' Helping Behaviors in Online Community. 161-172
Rizwan Ahmed, Rajiv V. Dharaskar: Mobile Forensics: An Introduction from Indian Law Enforcement Perspective. 173-184
Parijat Upadhyay, Pranab K. Dan: A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach. 185-196
Part 8 / Session 7. Algorithms and Workflows
Nupur Lodha, Nivesh Rai, Rahul Dubey, Hrishikesh Venkataraman: Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor. 197-207
Munaga V. N. K. Prasad, M. K. Pramod Kumar, Kuldeep Sharma: Classification of Palmprint Using Principal Line. 208-219
Fatemeh Javadi Mottaghi, Mohammad Abdollahi Azgomi: Workflow Modeling Using Stochastic Activity Networks. 220-231
Part 9 / Session 8. Authentication and Detection Systems
Negar Almassian, Reza Azmi, Sarah Berenji: AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel. 232-243
Raghu Gantasala, Munaga V. N. K. Prasad: New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication. 244-255
Naeimeh Laleh, Mohammad Abdollahi Azgomi: A Taxonomy of Frauds and Fraud Detection Techniques. 256-267
Part 10 / Session 9. Recommendation and Negotiation
Manish Godse, Rajendra M. Sonar, Anil S. Jadhav: A Hybrid Approach for Knowledge-Based Product Recommendation. 268-279
Anil S. Jadhav, Rajendra M. Sonar: An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages. 280-291
Part 11 / Session 10. Secure and Multimedia Systems
Rekha Agarwal, B. V. R. Reddy, E. Bindu, Pinki Nayak: On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications. 303-312
Pushpita Chatterjee, Indranil Sengupta, Soumya Kanti Ghosh: A Trust Based Clustering Framework for Securing Ad Hoc Networks. 313-324
Part 12 / Extended Abstracts of Posters

Yogesh Singh, Arvinder Kaur, Ruchika Malhotra: Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes. 337-338
S. Chandra, R. A. Khan, A. Agrawal: Software Security Factors in Design Phase - (Extended Abstract). 339-340
Shruti Kohli, B. P. Joshi, Ela Kumar: Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website. 341-342
Vahid Jalali, Mohammad Reza Matash Borujerdi: Personalized Semantic Peer Selection in Peer-to-Peer Networks. 343-344
Praveen Ranjan Srivastava, Vijay Kumar Rai: An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing. 345-346
Praveen Ranjan Srivastava, Deepak Pareek: Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing. 347-349
Praveen Ranjan Srivastava: Optimization of Software Testing Using Genetic Algorithm. 350-351
Deepshikha Jamwal, Pawanesh Abrol, Devanand Padha: Study and Analysis of Software Development and User Satisfaction Level. 352-353
Rekha Agarwal, E. Bindu, Pinki Nayak, B. V. R. Reddy: Influence of Hot Spots in CDMA Macro Cellular Systems. 354-355
Naeimeh Laleh, Mohammad Abdollahi Azgomi: An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. 356-357
Kumar Dhiraj, E. Ashwani Kumar, Rameshwar Baliar Singh, Santanu Kumar Rath: PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise. 358-359
Hamid Mohammad Gholizadeh, Mohammad Abdollahi Azgomi: An Overview of a New Multi-formalism Modeling Framework. 360-361
Sumeet Dua, Harpreet Singh: Association Rule Based Feature Extraction for Character Recognition. 362-364



