6. ICISTM 2012: Grenoble, France
Sumeet Dua, Aryya Gangopadhyay, Parimala Thulasiraman, Umberto Straccia, Michael A. Shepherd, Benno Stein (Eds.): Information Systems, Technology and Management - 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings. Springer 2012 Communications in Computer and Information Science 285 ISBN 978-3-642-29165-4
Information Systems

Navid Karimi Sani, Shokoofeh Ketabchi, Kecheng Liu: The Co-design of Business and IT Systems: A Case in Supply Chain Management. 13-27
Meera M. Dhabu, Parag S. Deshpande: Cardinality Statistics Based Maximal Frequent Itemsets Mining. 28-39
Saranya Maneeroj, Pannawit Samatthiyadikun, Warat Chalermpornpong, Sasipa Panthuwadeethorn, Atsuhiro Takasu: Ranked Criteria Profile for Multi-criteria Rating Recommender. 40-51
Daniel Ritter, Christoph Herrmann: A Graph API for Complex Business Network Query and Traversal. 52-63

Paolo Neirotti, Elisabetta Raguseo: Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities? 89-100
Bernard Ijesunor Akhigbe, Babajide Samuel Afolabi, Emmanuel Rotimi Adagunodo: Item's Characterization for Model's Development in Information Retrieval System Evaluation. 101-111
Hesham Allam, James Blustein, Michael Bliemel, Louise Spiteri: Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing Tags. 112-123
Shehzad Ashraf, Nizamuddin, Muhammad Sher: Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. 135-142
Information Technology
Adebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oludola Oluwatope, G. Adesola Aderounmu, Emmanuel Rotimi Adagunodo: Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks. 143-151
Raymond Siulai Wong, Teng-Sheng Moh, W. Melody Moh: Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections. 152-163
Pooja Jain, Deepak Dahiya: An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation. 164-175
Prem Parashar, Arvind Kalia, Rajesh Bhatia: Pair-Wise Time-Aware Test Case Prioritization for Regression Testing. 176-186
Neeraj Sharma, Kawaljeet Singh, D. P. Goyal: Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector. 187-198
Sunint Kaur Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra, Maninder Singh: A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing. 199-210
Information Management
Razia Haider, Federica Mandreoli, Riccardo Martoglia, Simona Sassatelli: Fast On-Line Summarization of RFID Probabilistic Data Streams. 211-223
Nobuhiko Matsuura, Seiji Suzuki, Maki Ohata, Ken Ohta, Hiroshima Inamura, Tadanori Mizuno, Hiroshi Mineno: An Efficient and Highly Available Distributed Data Management System. 224-234
Stefan Bensch: Quo vadis: Descriptive and Thematic Analysis on IT Outsourcing. 235-246
Mariagrazia Fugini, José Antonio Parejo Maestre: Energy Analysis of Services through Green Metrics: Towards Green Certificates. 247-258
Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga: Uncertainty Interval Temporal Sequences Extraction. 259-270
Business Intelligence
Deepak Dahiya, Mohit Gupta, Pooja Jain: Enterprise Knowledge Management System: A Multi Agent Perspective. 271-281
Akhilesh Bajaj, Meredith Bates: Developing a Template for Organizational Knowledge Management. 282-291
Management Science and Education
Nadezhda Kunicina, Anastasija Zhiravecka, Antons Patlins, Yelena Chaiko, Leonids Ribickis: Towards of E-Learning Quality Standards for Electrical Engineers. 292-303
Applications
Lavneet Singh, Girija Chetty: A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta Filters. 304-314
Olayiwola Ojo, Ayodeji Oludola Oluwatope, Adesola Oke, G. Adesola Aderounmu: Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System. 315-324
Brandon A. Brown, Todd R. Andel, Yong Kim: An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration. 325-335
Workshop on Program Protection and Reverse Engineering
Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie, Arun Lakhotia: Twisting Additivity in Program Obfuscation. 336-347
Gen Lu, Kevin Coogan, Saumya K. Debray: Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract). 348-359
Charles LeDoux, Andrew Walenstein, Arun Lakhotia: Improved Malware Classification through Sensor Fusion Using Disjoint Union. 360-371
John Barron, Todd R. Andel, Yong Kim: Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks. 372-383
Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia: Deployable Classifiers for Malware Detection. 384-395
Short Papers
Saïda Boukhedouma, Zaia Alimazighi, Mourad Oussalah, Dalila Tamzalit: Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized Control. 396-401
Iskander Zouaghi, Abderrazak Laghouag: Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry. 402-407
N. Hema, Krishna Kant, Hima Bindu Maringanti: Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless Communication. 408-413
Tapan Jain: Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid Protocol. 414-420
Position Papers
Aryya Gangopadhyay, Song Chen, Yelena Yesha: Detecting Healthcare Fraud through Patient Sharing Schemes. 421-426
Roberto Giacobazzi: Software Security by Obscurity - A Programming Language Perspective. 427-432
Sylvain Guilley, Jean-Luc Danger, Robert Nguyen, Philippe Nguyen: System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion. 433-438
Mila Dalla Preda: The Grand Challenge in Metamorphic Analysis. 439-444
Clark D. Thomborson: The Art and Science of Obfuscation. 445-450
J. Todd McDonald: Capturing the Essence of Practical Obfuscation. 451-456



