Search Results - (( Defined (contribution OR contributions) pension plant ) OR ((( Defined distribution ((operation plan) OR (((operating plan) OR (operating a)))) ) OR ( Defined distributions regression plans ))))

  1. 241

    Ubiquitous computing application and wireless sensor : UCAWSN-14 by FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network Cheju-do, Korea, SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource.
    Contents: “…-W. Lin, P.-H. Wang -- A New Distributed Grid Scheme utilizing Node-based Preprocessing Technique for Supporting k-NN Queries; H. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  2. 242

    Big data for dummies by Hurwitz, Judith

    Published: Wiley, 2013
    Description: 1 online resource (xii, 312 pages) : illustrations.
    Contents: “…Grasping the fundamentals of big data -- Examining big data types -- Old meets new: distributed computing -- Digging into the big data technology components -- Virtualization and how it supports distributed computing -- Examining the cloud and big data -- Operational databases -- MapReduce fundamentals -- Exploring the world of Hadoop -- The Hadoop foundation and ecosystem -- Appliances and big data warehouses -- Defining big data analytics -- Understanding text analytics and big data -- Customized approaches for analysis of big data -- Integrating data sources -- Dealing with real-time data streams and complex event processing -- Operationalizing big data -- Applying big data within your organization -- Security and governance for big data environments -- The importance of big data to business -- Analyzing data in motion: a real-world view -- Improving business processes with big data analytics: a real-world view -- Ten big data best practices -- Ten great big data resources -- Ten big data do's and don'ts.…”
    Prospector EBL - Click here for access
    Electronic eBook
  3. 243

    Computer safety, reliability, and security : 26th international conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007 : proceedings by SAFECOMP (Conference) Nuremberg, Germany), SpringerLink (Online service)

    Published: Springer, 2007
    Description: 1 online resource (x, 548 pages) : illustrations.
    Contents: “…Safety Cases -- Establishing Evidence for Safety Cases in Automotive Systems -- A Case Study -- Goal-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety -- Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety -- Future Perspectives: The Car and Its IP-Address -- A Potential Safety and Security Risk Assessment -- Modelling Interdependencies Between the Electricity and Information Infrastructures -- Poster Session 1 -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security Environments -- Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems -- RAMSS Analysis for a Co-operative Integrated Traffic Management System -- Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian Networks -- Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake System -- Compositional Temporal Fault Tree Analysis -- Representing Parameterised Fault Trees Using Bayesian Networks -- Human Error Analysis Based on a Semantically Defined Cognitive Pilot Model -- Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System -- Specification of a Software Common Cause Analysis Method -- Combining Bayesian Belief Networks and the Goal Structuring Notation to Support Architectural Reasoning About Safety -- Application of Interactive Cause and Effect Diagrams to Safety-Related PES in Industrial Automation -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy -- Defense-in-Depth and Diverse Qualification of Safety-Critical Software -- Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer -- Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different Approaches -- Modeling, Analysis and Testing of Safety Issues -- An Event-Based Approach and Case Study -- A Concept for a Safe Realization of a State Machine in Embedded Automotive Applications -- Safety Demonstration and Software Development -- Improving Test Coverage for UML State Machines Using Transition Instrumentation -- Verification of Distributed Applications -- Analysis of Combinations of CRC in Industrial Communication -- A Comparison of Partitioning Operating Systems for Integrated Systems -- Software Encoded Processing: Building Dependable Systems with Commodity Hardware -- Reliability Modeling for the Advanced Electric Power Grid -- Case Study on Bayesian Reliability Estimation of Software Design of Motor Protection Relay -- A Reliability Evaluation of a Group Membership Protocol -- Poster Session 3 -- Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity -- A Tool for Network Reliability Analysis -- DFT and DRBD in Computing Systems Dependability Analysis -- Development of Model Based Tools to Support the Design of Railway Control Applications -- Formal Specification and Analysis of AFDX Redundancy Management Algorithms -- Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts -- Using Deductive Cause-Consequence Analysis (DCCA) with SCADE -- Experimental Assessment of Astrée on Safety-Critical Avionics Software -- Detection of Runtime Errors in MISRA C Programs: A Deductive Approach -- A Taxonomy for Modelling Safety Related Architectures in Compliance with Functional Safety Requirements -- Controller Architecture for Safe Cognitive Technical Systems -- Improved Availability and Reliability Using Re-configuration Algorithm for Task or Process in a Flight Critical Software.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  4. 244

    Software architectures and tools for computer aided process engineering by ScienceDirect (Online service)

    Published: Elsevier, 2002
    Description: 1 online resource (xii, 700 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  5. 245

    Artificial intelligence and evolutionary computations in engineering systems : proceedings of ICAIECES 2017 by International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems Madanapalle, India, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource : illustrations (some color).
    Contents: “…2.4 Performance Measures3 Experimental Results; 4 Conclusions; Bibliography; 3 Distributive MPPT Approach Using ANFIS and Perturb & Observe Techniques Under Uniform and Partial Shading Conditions; Abstract; 1 Introduction; 2 MPPT Techniques; 2.1 Perturb & Observe (P & O) Technique; 2.2 Adaptive Neuro-Fuzzy Inference System (ANFIS); 2.3 Series-Connected Distributed Maximum Power Point Tracking (DMPPT); 3 Simulation Model; 4 Results and Discussion; 5 Conclusion; References; 4 Performance of MPPT in Photovoltaic Systems Using GA-ANN Optimization Scheme; Abstract; 1 Introduction; 2 Related Works.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  6. 246

    Spatio-temporal data streams by Galić, Zdravko

    Published: Springer, 2016
    Description: 1 online resource (xiv, 107 pages) : illustrations.
    Contents: “…2.5 Implementation2.5.1 User-Defined Aggregate Functions; 2.5.2 SQL-Like Language Embedding: CSQL; References; 3 Spatio-Temporal Data Streams and Big Data Paradigm; 3.1 Background; 3.2 MobyDick -- A Prototype of Distributed Framework #x83;; 3.2.1 Data Model; 3.2.2 Apache Flink; 3.2.3 Spatio-Temporal Queries; 3.3 Related Work; 3.3.1 Distributed Spatial and Spatio-Temporal Batch Systems; 3.3.2 Centralized DSMS-Based Systems; 3.3.3 Distributed DSMS-Based Systems; 3.4 Final Remarks; References; 4 Spatio-Temporal Data Stream Clustering; 4.1 Introduction; 4.1.1 Spatio-Temporal Clustering.…”
    SpringerLink - Click here for access
    eBook
  7. 247
  8. 248

    Network convergence : Ethernet applications and next generation packet transport architectures by Joseph, Vinod

    Published: Morgan Kaufmann, 2013
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  9. 249
  10. 250

    CyberSecurity by Cambridge Educational (Firm), Films for the Humanities & Sciences (Firm), Infobase

    Published: Infobase, 2007
    Description: 1 streaming video file (21 min.) : sd., col., digital file + instructional materials (online)
    Films on Demand - Click here for access
    Video
  11. 251

    Mathematical analysis in interdisciplinary research by SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (1 volume) : illustrations (black and white, and color).
    Contents: “…Gal) -- Variational Inequalities and General Equilibrium models (Milasi) -- The strong convergence of Douglas-Rachford methods for the split feasibility problem (Dong) -- Some Triple Integral Inequalities for Functions Defined on 3-Dimensional Bodies Via Gauss-Ostrogradsky Identity (Dragomir) -- Optimal emergency evacuation with uncertainty (Scrimali) -- On Global Hyperbolicity of Spacetimes: Some Recent Advances and Open Problems (Papadopoulos) -- Spectrum Perturbations of Linear Operators in a Banach Space (Gil) -- Perturbations of Operator Functions. …”
    SpringerLink - Click here for access
    eBook
  12. 252

    C quick syntax reference by Olsson, Mikael (Web programmer)

    Published: Apress, 2015
    Description: 1 online resource (xv, 75 pages).
    SpringerLink - Click here for access
    eBook
  13. 253

    Beginning Python visualization : crafting visual transformation scripts Second edition. by Vaingast, Shai

    Published: Apress, 2014
    Description: 1 online resource (xxvii, 385 pages) : illustrations.
    Contents: “…CygwinVirtual Machines; Choosing an Operating System; Then Again, Why Choose? Using Several Operating Systems; The Python Environment; Versions; Python; Python Distributions with Scientific Packages; Python Integrated Development Environments; IDLE; IPython; IPython Notebook; Spyder; Scientific Computing; NumPy; SciPy; Matplotlib; Image Processing; PySerial; Manually Installing a Python Package; Installation Summary; Additional Applications; Editors; Selecting the Proper Editor for You; A Short List of Text Editors; Spreadsheets; Word Processors; Image Viewers; Version-Control Systems.…”
    SpringerLink - Click here for access
    eBook
  14. 254
  15. 255

    Transitioning to Swift by Gardner, Scott

    Published: Apress, 2014
    Description: 1 online resource (xv, 240 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 256

    Mac programming for absolute beginners by Wang, Wally

    Published: Apress ; Distributed to the Book trade worldwide by Springer Science+Business Media, 2011
    Description: 1 online resource (xvi, 398 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  17. 257

    Modernization of electric power systems : energy efficiency and power quality by SpringerLink (Online service)

    Published: Springer, 2023
    Description: 1 online resource.
    Contents:
    SpringerLink - Click here for access
    eBook
  18. 258
  19. 259

    Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers by CRiSIS (Conference) Arcachon, France), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (x, 237 pages) : illustrations (some color).
    Contents: “…An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  20. 260

    Documentary Film Festivals Vol. 1 Methods, History, Politics 1st ed. 2020. by SpringerLink (Online service)

    Published: Springer International Publishing, Imprint Palgrave Macmillan. 2020
    Description: 1 online resource (XXV, 296 pages 18 illustrations, 13 illustrations in color.) : online resource.
    SpringerLink - Click here for access
    Electronic eBook