Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation, and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions.
Algorithmic Challenges in Digital Microfluidic Biochips: Protocols, Design and Test.- Monitoring Distributed, Heterogeneous Data Streams: The Emergence of Safe Zones.- Exploiting Heterogeneous Data Sources: A Computing Paradigm for Live Web and Sustainability Applications.- Constructing an n-dimensional Cell Complex from a Soup of (n − 1)-Dimensional Faces.- A Digital-Geometric Algorithm for Generating a Complete Spherical Surface in Z3.- Bar 1-Visibility Drawings of 1-Planar Graphs.- Search Strategies for Subgraph Isomorphism Algorithms.- Analysis of Concentration Errors in Sample Dilution Algorithms on a Digital Microfluidic Biochip.- Choosing and Working of an Anonymous Leader.- An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach.- Automata for Modeling the Distributed Probabilistic Reversible Processes.- Finding Influential Nodes in Social Networks Using Minimum k-Hop Dominating Set.- Efficient Heuristics for the Time Dependent Team Orienteering Problem with Time Windows.- Color Texture Image Segmentation Based on Neutrosophic Set and Nonsubsampled Contourlet Transformation.- An Experimental Analysis of Vertex Coloring Algorithms on Sparse Random Graphs.- An Experimental Study of a Novel Move-to-Front-or-Middle (MFM) List Update Algorithm.- Too Long-Didnt Read: A Practical Web Based Approach towards Text Summarization.- A Comparative Study of Tag SNP Selection Using Clustering.- Application of Spectral Unmixing Algorithm on Hyperspectral Data for Mangrove Species Classification.- Automatic Extraction of Headlines from Punjabi Newspapers.- A Similarity Measure for Clustering Gene Expression Data.- A Huffman Code Based Image Steganography Technique.- Expression-Invariant 3D Face Recognition Using K-SVD Method.- An Efficient Face Recognition Method by Fusing Spatial Discriminant Facial Features.