4. ICISTM 2010: Bangkok, Thailand
Sushil K. Prasad, Harrick M. Vin, Sartaj Sahni, Mahadeo Jaiswal, Bundit Thipakorn (Eds.): Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings. Springer 2010 Communications in Computer and Information Science 54 ISBN 978-3-642-12034-3
Richard Werner Nelem Pazzi, Kaouther Abrougui, Cristiano De Rezende, Azzedine Boukerche: Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and Security. 1-7
Alok N. Choudhary, Ramanathan Narayanan, Kunpeng Zhang: High-End Analytics and Data Mining for Sustainable Competitive Advantage. 8-15
Young Choon Lee, Albert Y. Zomaya: Resource Allocation for Energy Efficient Large-Scale Distributed Systems. 16-19
2. / Information Systems
Kévin D. Carillo: Social Cognitive Theory in IS Research - Literature Review, Criticism, and Research Agenda. 20-31
Uday Kulkarni, Minu Ipe: Knowledge Intensive Business Processes: A Process-Technology Fit Perspective. 32-43

Elizabeth Papadopoulou, Yussuf Abu-Shaaban, Sarah Gallacher, Nick K. Taylor, M. Howard Williams: Two Approaches to Handling Proactivity in Pervasive Systems. 64-75
Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta: A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management. 76-88
T. V. Vijay Kumar, Mohammad Haider, Santosh Kumar: Proposing Candidate Views for Materialization. 89-98
Indira Mukherjee, S. K. Ghosh: A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information. 99-110
3. / Information Technology
Demian Antony D'Mello, V. S. Ananthanarayana: Dynamic Web Service Composition Based on Operation Flow Semantics. 111-122
Akshaye Dhawan, Aung Aung, Sushil K. Prasad: Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage Problems. 123-132
Atanu Basu, Indranil Sengupta: Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption. 133-144
Omar Al-Jarrah, Ayad Salhieh, Aziz Qaroush: Real-Time Power-Aware Routing Protocol for Wireless Sensor Network. 156-166
Sun Park, Dong Un An, ByungRea Cha, Chul-Won Kim: Document Clustering with Semantic Features and Fuzzy Association. 167-175
Phuong-Quyen Huynh, Pat Jangyodsuk, Melody Moh: Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based Handover. 176-186
4. / Information Management
Junseok Hwang, Jihyoun Park, Jörn Altmann: Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods. 187-197
Payal Mehra: A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India. 198-209
Teng-Sheng Moh, Alexander J. Murmann: Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers. 210-220
Kavitha Ranganathan, Vikramaditya Shekhar: Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural Connectivity. 221-231
Olufade F. W. Onifade, Odile Thiery, Adenike O. Osofisan, Gérald Duffing: Fuzzontology: Resolving Information Mining Ambiguity in Economic Intelligent Process. 232-243
Teng-Sheng Moh, Neha Sushil Saxena: Personalizing Web Recommendations Using Web Usage Mining and Web Semantics with Time Attribute. 244-254
Amit Sangroya, Saurabh Kumar, Jaideep Dhok, Vasudeva Varma: Towards Analyzing Data Security Risks in Cloud Computing Environments. 255-265
Kiyoshi Nosu, Takeshi Koike, Ayuko Shigeta: Time-Sequential Emotion Diagnosis Based on the Eye Movement of the User in Support of Web-Based e-Learning. 266-274
5. / Applications
Varin Chouvatut, Suthep Madarasmi, Mihran Tuceryan: 3D Reconstruction and Camera Pose from Video Sequence Using Multi-dimensional Descent. 282-292
Boonlit Adipat, Dongsong Zhang, Lina Zhou: Adapting Content Presentation for Mobile Web Browsing. 293-303
Vijaya S. Desai, Sharad Joshi: Application of Decision Tree Technique to Analyze Construction Project Data. 304-313
Anjan Kumar Swain: Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation Methods. 314-324
6. / Short Papers
Edward G. Coffman Jr., Dmytro Matsypura, Vadim G. Timkovsky: A Computational Study of Margining Portfolios of Options by Two Approaches. 325-332
Anil Kumar, M. K. Ghose: Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map. 333-338
Girish Parmar, Mahendra K. Pandey, Vijay Kumar: Linear Multivariable System Reduction Using Particle Swarm Optimization and A Comparative Study Using Relative Integral Square Error. 339-347
Bharat Gupta, Deepak Arora, Vishal Jha: An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems. 348-356
Marcelo López, Gustavo A. Isaza, Luis Joyanes: Towards a Knowledge Management Portal for a Local Community. 357-362
Rahul Kala, Harsh Vazirani, Anupam Shukla, Ritu Tiwari: Fusion of Speech and Face by Enhanced Modular Neural Network. 363-372
S. Tom Au, Meei-Ling Ivy Chin, Guangqin Ma: Mining Rare Events Data by Sampling and Boosting: A Case Study. 373-379
Neeraj Sharma, Kawaljeet Singh, D. P. Goyal: Software Process Improvement through Experience Management: An Empirical Analysis of Critical Success Factors. 386-391
7. / Tutorial Papers
Prerna Sethi, Mohit Jain: A Comparative Feature Selection Approach for the Prediction of Healthcare Coverage. 392-403



