找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applied Algorithms; First International Prosenjit Gupta,Christos Zaroliagis Conference proceedings 2014 Springer International Publishing

[复制链接]
查看: 17535|回复: 60
发表于 2025-3-21 18:11:19 | 显示全部楼层 |阅读模式
期刊全称Applied Algorithms
期刊简称First International
影响因子2023Prosenjit Gupta,Christos Zaroliagis
视频video
发行地址Up-to-date results.State-of-the-art research.Fast-track conference proceedings
学科分类Lecture Notes in Computer Science
图书封面Titlebook: Applied Algorithms; First International  Prosenjit Gupta,Christos Zaroliagis Conference proceedings 2014 Springer International Publishing
影响因子This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions.
Pindex Conference proceedings 2014
The information of publication is updating

书目名称Applied Algorithms影响因子(影响力)




书目名称Applied Algorithms影响因子(影响力)学科排名




书目名称Applied Algorithms网络公开度




书目名称Applied Algorithms网络公开度学科排名




书目名称Applied Algorithms被引频次




书目名称Applied Algorithms被引频次学科排名




书目名称Applied Algorithms年度引用




书目名称Applied Algorithms年度引用学科排名




书目名称Applied Algorithms读者反馈




书目名称Applied Algorithms读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:32:34 | 显示全部楼层
Monitoring Distributed, Heterogeneous Data Streams: The Emergence of Safe Zones data streams to a central node and process them there. Often, the monitoring problem consists of determining whether the value of a global function, which depends on the union of all streams, crossed a certain threshold. A great deal of effort is directed at reducing communication overhead by trans
发表于 2025-3-22 03:04:49 | 显示全部楼层
Exploiting Heterogeneous Data Sources: A Computing Paradigm for Live Web and Sustainability Applicatvolutionary technologies are creating an explosion on the size and variety of information that is becoming available. Such technologies include the development and widespread adoption of networks of small and inexpensive embedded sensors that are being used to instrument the environment at an unprec
发表于 2025-3-22 07:49:04 | 显示全部楼层
发表于 2025-3-22 12:11:26 | 显示全部楼层
A Digital-Geometric Algorithm for Generating a Complete Spherical Surface in ℤ3f some holes (absentee voxels) in its spherical surface of revolution. This incompleteness calls for a proper characterization of the absentee voxels whose restoration in the surface of revolution can ensure the required completeness. In this paper, we present a characterization of the absentee voxe
发表于 2025-3-22 16:43:34 | 显示全部楼层
Bar 1-Visibility Drawings of 1-Planar Graphsa vertical line segment between its incident vertices such that each edge crosses at most one bar. A graph . is bar 1-visible if . has a bar 1-visibility drawing. A graph . is 1-planar if . can be drawn in the plane such that each edge has at most one crossing. In this paper we give .(.) time algori
发表于 2025-3-22 19:01:32 | 显示全部楼层
Search Strategies for Subgraph Isomorphism Algorithmsassign pattern nodes to compatible nodes in the target graph. It is well known that the order in which nodes are assigned, a so-called search strategy, influences drastically the size of the search space. In this article we investigate the impact of various search strategies on the efficiency of two
发表于 2025-3-23 00:17:17 | 显示全部楼层
发表于 2025-3-23 02:38:25 | 显示全部楼层
发表于 2025-3-23 07:35:03 | 显示全部楼层
An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Ellip of the major and attractive fields of research in computer network. The importance of Elliptic Curve Cryptography (ECC) in this field is increasing rapidly because of its smaller key size compare to other known public-key algorithms. Several user authentication and key management algorithms or sche
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-7 04:39
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表