Information Systems, Technology and Management

4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings

ISBN: 978-3-642-12034-3 (Print) 978-3-642-12035-0 (Online)

Table of contents (42 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Keynote Talks

    1. No Access

      Book Chapter

      Pages 1-7

      Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and Security

    2. No Access

      Book Chapter

      Pages 8-15

      High-End Analytics and Data Mining for Sustainable Competitive Advantage

    3. No Access

      Book Chapter

      Pages 16-19

      Resource Allocation for Energy Efficient Large-Scale Distributed Systems

  3. Information Systems

    1. No Access

      Book Chapter

      Pages 20-31

      Social Cognitive Theory in IS Research – Literature Review, Criticism, and Research Agenda

    2. No Access

      Book Chapter

      Pages 32-43

      Knowledge Intensive Business Processes: A Process-Technology Fit Perspective

    3. No Access

      Book Chapter

      Pages 44-55

      A Web Service Similarity Refinement Framework Using Automata Comparison

    4. No Access

      Book Chapter

      Pages 56-63

      A System for Analyzing Advance Bot Behavior

    5. No Access

      Book Chapter

      Pages 64-75

      Two Approaches to Handling Proactivity in Pervasive Systems

    6. No Access

      Book Chapter

      Pages 76-88

      A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management

    7. No Access

      Book Chapter

      Pages 89-98

      Proposing Candidate Views for Materialization

    8. No Access

      Book Chapter

      Pages 99-110

      A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information

  4. Information Technology

    1. No Access

      Book Chapter

      Pages 111-122

      Dynamic Web Service Composition Based on Operation Flow Semantics

    2. No Access

      Book Chapter

      Pages 123-132

      Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage Problems

    3. No Access

      Book Chapter

      Pages 133-144

      Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption

    4. No Access

      Book Chapter

      Pages 145-155

      Model-Based Software Reliability Prediction

    5. No Access

      Book Chapter

      Pages 156-166

      Real-Time Power-Aware Routing Protocol for Wireless Sensor Network

    6. No Access

      Book Chapter

      Pages 167-175

      Document Clustering with Semantic Features and Fuzzy Association

    7. No Access

      Book Chapter

      Pages 176-186

      Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based Handover

  5. Information Management

    1. No Access

      Book Chapter

      Pages 187-197

      Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods

    2. No Access

      Book Chapter

      Pages 198-209

      A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India

previous Page of 3