You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Third International Conference on Applied Algorithms, ICAA 2026, held in Kolkata, India, during January 7–9, 2026. The 33 full papers presented in this book were carefully reviewed and selected from 92 submissions. They focus on the design, analysis, implementation, and experimental evaluation of efficient algorithms and data structures aimed at solving practical, real-world problems.
This book LNCS constitutes the refereed proceedings of the Second International Conference on Applied Algorithms, ICAA 2025, held in Kolkata, India, during January 8–10, 2025. The 26 full papers and 4 short papers are carefully reviewed and selected from 93 submissions. This conference sought original contributions related to the design, analysis, implementation, and experimental evaluation of efficient algorithms and data structures for problems.
None
International Symposium on Engineering under Uncertainty: Safety Assessment and Management (ISEUSAM - 2012) is organized by Bengal Engineering and Science University, India during the first week of January 2012 at Kolkata. The primary aim of ISEUSAM 2012 is to provide a platform to facilitate the discussion for a better understanding and management of uncertainty and risk, encompassing various aspects of safety and reliability of engineering systems. The conference received an overwhelming response from national as well as international scholars, experts and delegates from different parts of the world. Papers received from authors of several countries including Australia, Canada, China, Germ...
None
This book constitutes the refereed proceedings of the 26th International Conference on Cryptology in India, held in Bhubaneshwar, India, during December 14-17, 2025. The 19 full papers presented in this volume were carefully reviewed and selected from 83 submissions. They are organized into these topical sections: Classical Algorithms; Symmetric-Key Cryptography; Zero-Knowledge and Interactive Proofs; Isogeny-based Cryptography; Multivariate and Lattice-based Cryptography; Quantum Cryptography; and Secret Sharing and Cloud Security.
Issues for 1919-47 include Who's who in India; 1948, Who's who in India and Pakistan.
Issues for 1919-47 include Who's who in India; 1948, Who's who in India and Pakistan.