- Olayiwola Ojo, Ayodeji Oludola Oluwatope, Adesola Oke, G. Adesola Aderounmu:
Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network System. ICISTM 2012: 315-324 - Adebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oludola Oluwatope, G. Adesola Aderounmu, Emmanuel Rotimi Adagunodo:
Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) Networks. ICISTM 2012: 143-151 - Prem Parashar, Arvind Kalia, Rajesh Bhatia:
Pair-Wise Time-Aware Test Case Prioritization for Regression Testing. ICISTM 2012: 176-186 - Mila Dalla Preda:
The Grand Challenge in Metamorphic Analysis. ICISTM 2012: 439-444 - Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie, Arun Lakhotia:
Twisting Additivity in Program Obfuscation. ICISTM 2012: 336-347 - Daniel Ritter, Christoph Herrmann:
A Graph API for Complex Business Network Query and Traversal. ICISTM 2012: 52-63 - Navid Karimi Sani, Shokoofeh Ketabchi, Kecheng Liu:
The Co-design of Business and IT Systems: A Case in Supply Chain Management. ICISTM 2012: 13-27 - Neeraj Sharma, Kawaljeet Singh, D. P. Goyal:
Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT Sector. ICISTM 2012: 187-198 - Lavneet Singh, Girija Chetty:
A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta Filters. ICISTM 2012: 304-314 - Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:
Deployable Classifiers for Malware Detection. ICISTM 2012: 384-395 - Clark D. Thomborson:
The Art and Science of Obfuscation. ICISTM 2012: 445-450 - Raymond Siulai Wong, Teng-Sheng Moh, Melody Moh:
Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections. ICISTM 2012: 152-163 - Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga:
Uncertainty Interval Temporal Sequences Extraction. ICISTM 2012: 259-270 - Iskander Zouaghi, Abderrazak Laghouag:
Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive Industry. ICISTM 2012: 402-407 - Sumeet Dua, Aryya Gangopadhyay, Parimala Thulasiraman, Umberto Straccia, Michael A. Shepherd, Benno Stein:
Information Systems, Technology and Management - 6th International Conference, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings. Communications in Computer and Information Science 285, Springer 2012, ISBN 978-3-642-29165-4 [contents] - 2011
- S. Tom Au, Rong Duan, Guangqin Ma, Rensheng Wang:
A Novel Approach for Combining Experts Rating Scores. ICISTM 2011: 322-329 - Amarnath Ayyadurai, Chitra Babu:
Biztool: A Flexible Cloud-Centric Framework for Business Analytics. ICISTM 2011: 256-264 - Gagandeep Batra, Jyotsna Sengupta:
An Efficient Metamorphic Testing Technique Using Genetic Algorithm. ICISTM 2011: 180-188 - Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index. ICISTM 2011: 51-60 - Amar Nath Chatterjee, Duraipandian Israel:
Qualitative Survey-Based Content Analysis and Validation of Measures of Software Development Team Performance. ICISTM 2011: 299-310 - Inderpreet Chopra, Maninder Singh:
SASM- An Approach towards Self-protection in Grid Computing. ICISTM 2011: 149-159 - Deisy Chelliah, A. M. Rajeswari, R. M. Indra, N. Jayalakshmi, P. K. Mehalaa Devi:
A Novel Relation-Based Probability Algorithm for Page Ranking in Semantic Web Search Engine. ICISTM 2011: 138-148 - Sapna P. G., Hrushikesha Mohanty:
An Ontology Based Approach for Test Scenario Management. ICISTM 2011: 91-100 - Bindu Garg, M. M. Sufyan Beg, Abdul Quaiyum Ansari, B. Mohammed Imran:
Fuzzy Time Series Prediction Model. ICISTM 2011: 126-137 - Bindu Garg, M. M. Sufyan Beg, Abdul Quaiyum Ansari, B. Mohammed Imran:
Soft Computing Model to Predict Average Length of Stay of Patient. ICISTM 2011: 221-232 - Mukta Goyal, Alka Choubey, Divakar Yadav:
Cognitive Models and Its Current Challenges. ICISTM 2011: 355-358 - Rushabh Hathi, Irfan A. Siddavatam:
Pre-processed Depth First Search. ICISTM 2011: 214-220 - Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Statistical Analysis for Human Authentication Using ECG Waves. ICISTM 2011: 287-298 - Pooja Jain, Deepak Dahiya:
Architecture of a Library Management System Using Gaia Extended for Multi Agent Systems. ICISTM 2011: 340-349 - Binoy Joseph, Merin Jacob:
Knowledge Sharing Intentions among IT Professionals in India. ICISTM 2011: 23-31