Search Results - (( Defined contribution ((pension plant) OR (pension plan)) ) OR ((( Defined ((distribution operations) OR (distributed cooperative)) plans ) OR ( Defined distribution decision plans ))))

  1. 181

    Big data and the internet of things : enterprise information architecture for a new age by Stackowiak, Robert, Licht, Art, Mantha, Venu, Nagode, Louis

    Published: Apress, 2015
    Description: 1 online resource (xviii, 220 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  2. 182

    The new public health Third edition. by Tulchinsky, Theodore H., Varavikova, Elena

    Published: Academic Press, 2014
    Description: xxv, 884 pages : illustrations.
    Contents:
    Table of contents
    Summary
    Book
  3. 183

    Theory and engineering of complex systems and dependability : proceedings of the tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29-July 3... by International Conference on Dependability of Computer Systems Brunów, Poland, SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvi, 604 pages) : illustrations.
    Contents: “…-Application of Data Encryption for Building Modern Virtual Private Networks -- Defining States in Reliability and Safety Modelling -- Macroscopic Transport Model as a Part of Traffic Management Center: Technical Feasibility Study -- Reliability Assessment of Integrated Airport Surface Surveillance System -- A Group Decision Support Technique for Critical IT-Infrastructures -- Planning of Electric Power Distribution Networks with Reliability Criteria -- Selected Aspects of Modeling the Movement of Aircraft in the Vicinity of the Airport with Regard to Emergency Situations -- Identifying and Symulation of Status of an Ict System Using Rough Sets -- Popular FPGA Device Families in Implementation of Cryptographic Algorithms -- Aspect-oriented Test Inputs Generation from Matlab/Simulink Models, Manel TEKAYA -- Ranking and Cyclic Job Scheduling in QoS-guaranteed Grids.- Web Based Engine for Processing and Clustering of Polish texts -- Effectiveness of Providing Data Confidentiality in Backbone Networks Based on Scalable and Dynamic Environment Technologies.- Models for Estimating the Execution Time of Software Loops in Parallel and Distributed Systems -- Analysis of Different Aspects of Infomobility for Public Transport in Latvia -- Data Actualization Using Regression Models in Decision Support System for Urban Transport Planning -- New Parallel Algorithm for the Calculation of Importance Measures -- An Unloading Work Model at an Intermodal Terminal.- Cost-aware Request Batching for Byzantine Fault-tolerant replication -- Symbolic Analysis Of Timed Petri nets.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  4. 184

    Geographic information and cartography for risk and crises management : towards better solutions by SpringerLink (Online service)

    Published: Springer Verlag, 2010
    Description: 1 online resource (xxii, 446 pages) : illustrations, maps.
    Contents: “…Geoinformation Processing and Modelling -- Earth Observations and Dynamic Mapping: Key Assets for Risk Management -- Spatial Information for Disaster Management Using Examples from IstanbulIstanbul -- Rapid Population Maps for Crisis Response -- Modeling of Spatiotemporal Distribution of Urban Population at High Resolution -- Value for Risk Assessment and Emergency Management -- A Framework for Defining a 3D Model in Support of Risk Management -- DB4GeO, a 3D/4D Geodatabase and Its Application for the Analysis of Landslides -- GIS Procedure to Forecast and Manage Woodland Fires -- Cartographic Support of Fire Engine Navigation to Operation Site -- Strategies for the Automatic Extraction of Water Bodies from TerraSAR-X / TanDEM-X data -- GIS Techniques in the Evaluation of Pipeline Networks Seismic Hazard -- Towards a Quick Damage Detection System Based on Grid Computing -- GMES Services for Conflict Prevention and Mitigation: Supporting the DG RELEX in Mission Planning -- Geo-information Services -- Mobilizing Multi-source Geospatial Information for EW and EM: Maximize Sharing, Enhance Flexibility, and Minimize Costs -- Metainformation in Crisis Management Architecture -- Theoretical Approaches, INSPIRE Solution -- Collaborative Post-disaster Damage Mapping via Geo Web Services -- Decision Support for Tsunami Early Warning in Indonesia: The Role of OGC Standards -- A Service-Based Architecture for the Interoperability of Heterogeneous Sensor data: A Case Study on Early Warning -- Development of a Coupled Geoinformation and Simulation System for Early Warning -- Multi-criteria Evaluation for Emergency Management in Spatial Data Infrastructures -- Field Tracking Tool: A Collaborative Framework from the Field to the Decision Makers -- Practical Experience with a Contextual Map Service -- Advanced Cartographic Visualisation -- Cartography and Geoinformation for Early Warning and Emergency Management -- Process Support and Adaptive Geovisualisation in Emergency Management -- Perceptions of Various Cartographic Representations Under Specific Conditions -- Research of Students' Cartographical Knowledge in Early Warning and Crisis Management -- Geovisual Analytics Tools for Communicating Emergency and Early Warning -- Kernel Density Estimations for Visual Analysis of Emergency Response Data -- Monitoring and Comparing: A Cartographic Web Application for Real-time Visualization of Hydrological Data -- Designing Map Keys Map Key for Crisis ManagementCrisis Management on the Regional Operational and Informational Centre Level: Monitoring Transport of Dangerous Goods via Contextual Visualisation Contextual Visualization.…”
    SpringerLink - Click here for access
    eBook
  5. 185

    Saving for development : how Latin America and the Caribbean can save more and better by Inter-American Development Bank

    Published: Palgrave Macmillan US, 2016
    Description: 1 online resource (352 pages)
    Contents: “…The Last Resort: Taking Care of Grandma; Act Today, for a Better Tomorrow; Notes; 7 Saving for the Future: Pension Systems; Newer Systems for Older Populations; PAYG/Defined-Benefit Systems: Promises, Promises; Sustainability; Adequacy and Redistribution; Institutional Arrangements; Recommendations; Defined Contribution Systems: A Work in Progress; Transition Costs; Investments, Returns, and Costs; Retirement Products and Insurance Arrangements; Financial Literacy, Legitimacy, and Confidence; Appropriate Regulation and Supervision; Recommendations; When All Else Fails: Noncontributory Pensions.…”
    SpringerLink - Click here for access
    eBook
  6. 186
  7. 187

    Logic, Rationality, and Interaction : Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings by LORI 2009 Chongqing, China, SpringerLink (Online service)

    Published: Springer-Verlag, 2009
    Description: 1 online resource.
    Contents: “…On the Temporal Structure of Learning -- Agreement Theorems in Dynamic-Epistemic Logic -- Learning and Teaching as a Game: A Sabotage Approach -- First-Order Logic Formalisation of Arrow's Theorem -- Twelve Angry Men: A Study on the Fine-Grain of Announcements -- Dynamic Testimonial Logic -- From the Logical Point of View: The Chain Store Paradox Revisited -- A Cooperation Logic for Declaration Structures -- Intentions and Assignments -- Epistemic Games in Modal Logic: Joint Actions, Knowledge and Preferences All Together -- Dynamic Epistemic Logic of Finite Identification -- An Epistemic Logic for Planning with Trials -- Obligations in a Responsible World -- Dynamic Epistemic Temporal Logic -- Measurement-Theoretic Foundation of Preference-Based Dyadic Deontic Logic -- An Update Operator for Strategic Ability -- Strategy Elimination in Games with Interaction Structures -- Posters -- The Logic of Knowledge-Based Cooperation in the Social Dilemma -- Getting Together: A Unified Perspective on Modal Logics for Coalitional Interaction -- Oppositional Logic -- Deliberate Contrary-to-Law Action -- Mono-Agent Dynamics -- Modal Expressivity and Definability over Sets -- Dynamic Logics for Explicit and Implicit Information -- Existence of Satisfied Alternative and the Occurring of Morph-Dictator.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  8. 188

    A Guide to Co-Teaching New Lessons and Strategies to Facilitate Student Learning 3rd ed. by Villa, Richard A., 1952-

    Published: SAGE Publications, 2013
    Description: 1 online resource (281 pages)
    Contents:
    Prospector EBC - Click here for access
    Electronic eBook
  9. 189

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    Contents: “…Simulation System for Space Debris Intelligent Detecting -- Traffic Prediction Based Capacity Pre-assignment Scheme for Low Latency in LEO Satellite Communication Systems -- Distributed Cooperative Positioning Algorithm Based on Message Passing using Box Particles in UAVs Networks -- A Multi-Service Traffic Generation System for Emulation of Space Information Networks -- MininetE: A Lightweight Emulator for Space Information Networks -- On the Performance of Packet Layer Coding for delay tolerant Data Streaming in deep Space -- Virtual Full-Duplex for Two-Way Relaying in SOQPSK Modulation in Small-Scale Satellite Network Application Enhanced Contention Resolution Diversity Slotted ALOHA in Satellite-based IoTs Using Sparse Code Multiple Access -- Bat-Inspired Biogeography-Based Optimization Algorithm for Smoothly UAV Track Planning Using Bezier Function -- Three Level Filtering for Cross-project Defect Prediction Online Fault Detection Method of Aerospace Embedded Software -- ̂Research of Improved Genetic Algorithm for Resource Allocation in Space-based Information Network -- Switching-Aware Dynamic Control Path Planning for Software Defined Large-Scale LEO Satellite Networks with GEO Controllers -- Cross-term Suppression in Cyclic Spectrum Estimation Based on EMD -- Visual Image Downtransmission of Landing Phase for Deep Space Explorers -- Parameter Estimation of MIMO Radar Based on the OMP Algorithm -- Time-division Frequency Measurement and Localization Technology of Single-satellite in Different Orbits Based on Optimal Observation Position -- On the impact of intrinsic delay variation sources on Iridium LEO constellation -- Research and Simulation of Rain Attenuation Time Series at Q / V Bands -- An improved routing strategy based on virtual topology in LEO satellite networks -- Interference Source Location Based on Spaceborne Multi-beam Antenna Research on Signal Separation Technology for Satellite IoT Signal -- ̂Design of Optimal Routing for Cooperative Microsatellite Swarm Network -- An inter-domain routing protocol for space Internetworking --…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 190

    Wireless algorithms, systems, and applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015 : proceedings by WASA (Conference) Qufu Shi, China), SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvii, 858 pages) : illustrations.
    Contents: “…Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based "Handprint" Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 191

    Artificial intelligence in education : 15th international conference, AIED 2011, Auckland, New Zealand, June 28-July 1, 2011 by International Conference on Artificial Intelligence in Education Auckland, N.Z., SpringerLink (Online service)

    Published: Springer, 2011
    Description: 1 online resource (xxvi, 638 pages) : illustrations.
    Contents: “…Faster Teaching by POMDP Planning /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 192

    Ubiquitous computing application and wireless sensor : UCAWSN-14 by FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network Cheju-do, Korea, SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource.
    Contents: “…Lin, P.-H. Wang -- A New Distributed Grid Scheme utilizing Node-based Preprocessing Technique for Supporting k-NN Queries; H. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 193

    VMware cloud on AWS insights on the first VMware enterprise-proven SaaS solution by Lombard, Christophe

    Published: Apress, 2023
    Description: 1 online resource (xvii, 301 pages) : illustrations.
    SpringerLink - Click here for access
    Electronic eBook
  14. 194

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  15. 195

    CMMI for development : implementation guide by Chaudhary, Mukund, Chopra, Abhishek

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  16. 196

    Logic, rationality, and interaction : 7th International Workshop, LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings by LORI (Workshop) Chongqing, China), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (xxi, 441 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 197

    CRM fundamentals by Kostojohn, Scott, Johnson, Mathew, Paulen, Brian

    Published: Apress, 2011
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  18. 198

    Virtual, augmented and mixed reality : 13th International Conference, VAMR 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021,... by VAMR (Conference) Online), SpringerLink (Online service), International Conference on Human-Computer Interaction

    Published: Springer, 2021
    Description: 1 online resource (xxi, 715 pages) : illustrations (some color).
    Contents: “…Designing and Evaluating VAMR Environments -- Narrative Cognition in Mixed Reality Systems: Towards an Empirical Framework -- Exploratory Study on the Use of Augmentation for Behavioural Control in Shared Spaces -- Pose Estimation and Video Annotation Approaches for Understanding Individual and Team Interaction during Augmented Reality-Enabled Mission Planning -- GazeXR: A General Eye-tracking System Enabling Invariable Gaze Data in Virtual Environment -- SpatialViewer: A Remote Work Sharing Tool that Considers Intimacy Among Workers -- A Review of Virtual Therapists in Anxiety and Phobias Alleviating Applications -- Designing Limitless Path in Virtual Reality Environment -- A Comparative Study of Conversational Proxemics for Virtual Agents -- Real-time Data Analytics of COVID Pandemic using Virtual Reality -- Design Considerations for Interacting and Navigating with 2 Dimensional and 3 Dimensional Medical Images in Virtual, Augmented and Mixed Reality Medical Applications -- Virtual Reality Sickness Evaluation in Exergames for Older Hypertensive Patients: A Comparative Study of Training Methods in a Virtual Environment -- Consistency in Multi-device Service including VR : A Case Study -- Multimodal and Natural Interaction in VAMR -- The Effect of Body-Based Haptic Feedback on Player Experience during VR Gaming -- User Defined Walking-in-place Gestures for Intuitive Locomotion in Virtual Reality -- Exploring Human-to-Human Telepresence and the Use of Vibro-Tactile Commands to Guide Human Streamers -- Pseudo-haptic Perception in Smartphones Graphical Interfaces: a Case Study -- A Research on Sensing Localization & Orientation of Objects in VR with Facial Vibrotactile Display -- HaptMR: Smart Haptic Feedback for Mixed Reality based on Computer Vision Semantic -- Position Estimation of Occluded Fingertip based on Image of Dorsal Hand from RGB Camera -- Head-mounted Displays and VR Glasses -- Usability and User Experience of Interactions on VR-PC, HoloLens 2, VR Cardboard and AR Smartphone in a Biomedical Application -- Simulation of the Field of View in AR and VR Headsets -- Exploring Perspective Switching in Immersive VR for Learning First Aid in Lower Secondary Education -- Beyond Visible Light: User and Societal Impacts of Egocentric Multispectral Vision -- No One is Superman: 3-D Safety Margin Profiles when Using Head-Up display (HUD) for Takeoff in Low Visibility and High Crosswind Conditions -- Robust Camera Motion Estimation for Point-of-View Video Stabilization -- Rendering Tree Roots Outdoors: A Comparison between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality Visualization -- Using Head-Mounted Displays for Virtual Reality: Investigating Subjective Reactions to Eye-Tracking Scenarios -- Omnidirectional Flick View -- VAMR Applications in Design, the Industry and the Military -- Virtual Fieldwork: Designing Augmented Reality Applications using Virtual Reality Worlds -- Contextually Adaptive Multimodal Mixed Reality Interfaces for Dismounted Operator Teaming with Unmanned System Swarms -- Virtual Solutions for Gathering Consumer Feedback on Food: A Literature Review and Analysis -- Modernizing Aircraft Inspection: Conceptual Design of an Augmented Reality Inspection Support Tool -- The Potential of Augmented Reality for Remote Support -- A Review of Distributed VR Co-Design Systems -- The Mobile Office: A Mobile AR Systems for Productivity Applications in Industrial Environments -- Virtual Reality Compensatory Aid for Improved Weapon Splash-Zone Awareness -- Mixed Reality Visualization of Friendly vs Hostile Decision Dynamics -- Doing versus Observing: Virtual Reality and 360-degree Video for Training Manufacturing Tasks -- VAMR in Learning and Culture -- Design and Research on the Virtual Simulation Teaching Platform of Shanghai Jade Carving Techniques Based on Unity 3d Technology -- IME VR: an MVC Framework for Military Training VR Simulators -- Extended Reality, Pedagogy, and Career Readiness: A Review of Literature -- Development of an AR Training Construction System using Embedded Information in a Real Environment -- LibrARy : Enriching the Cultural Physical Spaces with Collaborative AR Content -- Supporting Embodied and Remote Collaboration in Shared Virtual Environments -- A Survey on Applications of Augmented, Mixed and Virtual Reality for Nature and Environment -- Flexible Low-Cost Digital Puppet System -- Mixed Reality Technology Capabilities for Combat-Casualty Handoff Training.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  19. 199

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  20. 200

    Beginning SQL Server for developers Fourth edition. by Dewson, Robin

    Published: Apress, 2015
    Description: 1 online resource (xxi, 684 pages) : illustrations.
    Contents: “…-- SQL Server Editions -- The Example -- Installation -- Install -- Setup Role -- Choosing the Features to Install -- Naming the Instance -- Service Accounts -- Authentication Mode -- Defining the Data Directories -- FILESTREAM Options -- Creating the Reporting Services Database -- Distributed Replay Options -- Security -- Services Accounts -- Looking at the Authentication Mode -- Windows Authentication Mode -- Administrators on a Machine -- Mixed Mode -- The sa Login -- Summary -- Chapter 2: SQL Server Management Studio -- A Quick Overview of SSMS -- Query Editor -- sqlcmd -- Summary -- Chapter 3: Database Design and Creation -- Defining a Database -- Prebuilt Databases Within SQL Server -- master -- tempdb -- model -- msdb -- AdventureWorks/AdventureWorksDW -- Choosing the Database System Type -- OLTP -- Backups -- Indexes -- In-memory data -- BI/OLAP -- Example System Choice -- Gathering the Data -- Determining the Information to Store in the Database -- Financial Products -- Customers -- Customer Addresses -- Shares -- Transactions -- External and Ignored Information -- Building Relationships -- Using Keys -- Primary Key -- Foreign/Referencing Key -- Candidate/Alternate Key -- A Unique Constraint Instead of a Primary Key -- Creating Relationships -- Relationships and Referential Integrity -- Types of Relationships -- One-to-One -- One-to-Many -- Many-to-Many -- More on Foreign Keys -- Normalization -- Assign Each Entity a Unique Identifier -- Store Only Information That Directly Relates to That Entity -- Avoid Repeating Values or Columns -- Normal Forms -- First Normal Form -- Customers -- Shares -- Second Normal Form -- Third Normal Form.…”
    SpringerLink - Click here for access
    eBook