000838615 000__ 02710cam\a2200553Ii\4500 000838615 001__ 838615 000838615 005__ 20230306144552.0 000838615 006__ m\\\\\o\\d\\\\\\\\ 000838615 007__ cr\un\nnnunnun 000838615 008__ 180416s2018\\\\si\a\\\\o\\\\\101\0\eng\d 000838615 019__ $$a1034544453$$a1038439240 000838615 020__ $$a9789811300233$$q(electronic book) 000838615 020__ $$a9811300232$$q(electronic book) 000838615 020__ $$z9789811300226 000838615 0247_ $$a10.1007/978-981-13-0023-3$$2doi 000838615 035__ $$aSP(OCoLC)on1031376383 000838615 035__ $$aSP(OCoLC)1031376383$$z(OCoLC)1034544453$$z(OCoLC)1038439240 000838615 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCF$$dAZU$$dUWO$$dUPM$$dCOO$$dUAB 000838615 049__ $$aISEA 000838615 050_4 $$aQA76.9.M35 000838615 08204 $$a004.01/51$$223 000838615 1112_ $$aInternational Conference on Mathematics and Computing$$n(4th :$$d2018 :$$cVārānasi, India) 000838615 24510 $$aMathematics and computing :$$b4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised selected papers /$$cDebdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh (eds.). 000838615 2463_ $$aICMC 2018 000838615 264_1 $$aSingapore :$$bSpringer,$$c2018. 000838615 300__ $$a1 online resource (xix, 325 pages) :$$billustrations. 000838615 336__ $$atext$$btxt$$2rdacontent 000838615 337__ $$acomputer$$bc$$2rdamedia 000838615 338__ $$aonline resource$$bcr$$2rdacarrier 000838615 347__ $$atext file$$bPDF$$2rda 000838615 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v834 000838615 500__ $$aIncludes author index. 000838615 5050_ $$aSecurity and coding theory -- Computing -- Applied mathematics -- Pure mathematics. 000838615 506__ $$aAccess limited to authorized users. 000838615 520__ $$aThis book constitutes the proceedings of the 4th International Conference on Mathematics and Computing, ICMC 2018, held in Varanasi, India, in January 2018. The 29 papers presented in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections on security and coding theory; computing; applied mathematics; pure mathematics. 000838615 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 16, 2018). 000838615 650_0 $$aComputer science$$xMathematics$$vCongresses. 000838615 7001_ $$aGhosh, Debdas,$$eeditor. 000838615 7001_ $$aGiri, Debasis,$$eeditor. 000838615 7001_ $$aMohapatra, Ram N.,$$eeditor. 000838615 7001_ $$aSavas, Ekrem,$$eeditor. 000838615 7001_ $$aSakurai, Kouichi,$$eeditor. 000838615 7001_ $$aSingh, L. P.$$eeditor. 000838615 77608 $$iPrint version: $$z9789811300226 000838615 830_0 $$aCommunications in computer and information science ;$$v834. 000838615 852__ $$bebk 000838615 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-13-0023-3$$zOnline Access$$91397441.1 000838615 909CO $$ooai:library.usi.edu:838615$$pGLOBAL_SET 000838615 980__ $$aEBOOK 000838615 980__ $$aBIB 000838615 982__ $$aEbook 000838615 983__ $$aOnline 000838615 994__ $$a92$$bISE