000 | 04699nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-04126-1 | ||
003 | DE-He213 | ||
005 | 20200421112228.0 | ||
007 | cr nn 008mamaa | ||
008 | 140108s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319041261 _9978-3-319-04126-1 |
||
024 | 7 |
_a10.1007/978-3-319-04126-1 _2doi |
|
050 | 4 | _aQA76.9.A43 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aCOM051300 _2bisacsh |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aApplied Algorithms _h[electronic resource] : _bFirst International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings / _cedited by Prosenjit Gupta, Christos Zaroliagis. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXXIV, 287 p. 115 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8321 |
|
505 | 0 | _aAlgorithmic Challenges in Digital Microfluidic Biochips: Protocols, Design and Test -- Monitoring Distributed, Heterogeneous Data Streams: The Emergence of Safe Zones -- Exploiting Heterogeneous Data Sources: A Computing Paradigm for Live Web and Sustainability Applications -- Constructing an n-dimensional Cell Complex from a Soup of (n − 1)-Dimensional Faces -- A Digital-Geometric Algorithm for Generating a Complete Spherical Surface in Z3 -- Bar 1-Visibility Drawings of 1-Planar Graphs -- Search Strategies for Subgraph Isomorphism Algorithms -- Analysis of Concentration Errors in Sample Dilution Algorithms on a Digital Microfluidic Biochip -- Choosing and Working of an Anonymous Leader -- An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach -- Automata for Modeling the Distributed Probabilistic Reversible Processes -- Finding Influential Nodes in Social Networks Using Minimum k-Hop Dominating Set -- Efficient Heuristics for the Time Dependent Team Orienteering Problem with Time Windows -- Color Texture Image Segmentation Based on Neutrosophic Set and Nonsubsampled Contourlet Transformation -- An Experimental Analysis of Vertex Coloring Algorithms on Sparse Random Graphs -- An Experimental Study of a Novel Move-to-Front-or-Middle (MFM) List Update Algorithm -- Too Long-Didnt Read: A Practical Web Based Approach towards Text Summarization -- A Comparative Study of Tag SNP Selection Using Clustering -- Application of Spectral Unmixing Algorithm on Hyperspectral Data for Mangrove Species Classification -- Automatic Extraction of Headlines from Punjabi Newspapers -- A Similarity Measure for Clustering Gene Expression Data -- A Huffman Code Based Image Steganography Technique -- Expression-Invariant 3D Face Recognition Using K-SVD Method -- An Efficient Face Recognition Method by Fusing Spatial Discriminant Facial Features. | |
520 | _aThis book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation, and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aAlgorithms. |
700 | 1 |
_aGupta, Prosenjit. _eeditor. |
|
700 | 1 |
_aZaroliagis, Christos. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319041254 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8321 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-04126-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57838 _d57838 |