Abstract is missing.
- A Heuristic Framework for Priority Based Nurse SchedulingParamita Sarkar, Rituparna Chaki, Ditipriya Sinha. 3-18 [doi]
- A Divide-and-Conquer Algorithm for All Spanning Tree GenerationMaumita Chakraborty, Ranjan Mehera, Rajat Kumar Pal. 19-36 [doi]
- Circuit Synthesis of Marked Clique Problem using Quantum WalkArpita Sanyal, Amit Saha, Bipulan Gain, Sudhindu Bikash Mandal. 37-51 [doi]
- Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional MemoryAmmlan Ghosh, Rituparna Chaki, Nabendu Chaki. 53-71 [doi]
- Graph Problems Performance Comparison Using Intel Xeon and Intel Xeon-PhiJirí Hanzelka, Robert Skopal, Katerina Slaninová, Jan Martinovic, Jiri Dvorský. 73-83 [doi]
- A Novel Image Steganographic Scheme Using 8 \times 8 Sudoku PuzzleDebanjali Dey, Ambar Bandyopadhyay, Sunanda Jana, Arnab Kumar Maji, Rajat Kumar Pal. 85-100 [doi]
- Comparison of K-means Clustering Initialization Approaches with Brute-Force InitializationMartin Golasowski, Jan Martinovic, Katerina Slaninová. 103-114 [doi]
- Association Based Multi-attribute Analysis to Construct Materialized ViewSantanu Roy, Bibekananda Shit, Soumya Sen. 115-131 [doi]
- A New Method for Key Author Analysis in Research Professionals' Collaboration NetworkAnand Bihari, Sudhakar Tripathi. 133-143 [doi]
- Single-Shot Person Re-identification by Spectral Matching of Symmetry-Driven Local FeaturesAparajita Nanda, Pankaj Kumar Sa. 147-159 [doi]
- Analysis of Eavesdropping in QKD with Qutrit Photon StatesSupriyo Banerjee, Biswajit Maiti, Banani Saha. 161-171 [doi]
- Evaluating the Performance of a Chaos Based Partial Image Encryption SchemeSukalyan Som, Sarbani Palit, Kashinath Dey. 173-185 [doi]
- Keystroke Dynamics and Face Image Fusion as a Method of Identification Accuracy ImprovementPiotr Panasiuk, Marcin Dabrowski, Khalid Saeed 0001. 187-196 [doi]