Search Results - (( Defined contributors ((pension plans) OR (pension plan)) ) OR ((( Defined distribution computational plans ) OR ( Defined distribution ((torsion plans) OR (torsion points)) ))))

  1. 161

    Agents and artificial intelligence : third International Conference, ICAART 2011, Rome, Italy, January 28-30, 2011. Revised selected papers by ICAART (Conference) Rome, Italy), SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xiii, 444 pages) : illustrations (black and white).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  2. 162

    Pro Couchbase server by Ostrovsky, David, Rodenski, Yaniv

    Published: Apress, 2014
    Description: 1 online resource (xviii, 310 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  3. 163

    Algorithms and architectures for parallel processing : 21st International Conference, ICA3PP 2021, Virtual event, December 3-5, 2021, Proceedings. Part I by International Conference on Algorithms and Architectures for Parallel Processing Online, SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (835 pages).
    Contents: “…Deep Learning Models and Applications -- CRFST-GCN :A Deeplearning Spital-Temporal Frame to Predict Traffic Flow -- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images -- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction -- GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation -- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning -- Wasserstein Graph Auto-Encoder -- Fine-grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning -- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based On Bionic Neural Network -- Online Multiple Object Tracking Algorithm based on Heat Map Propagation -- Software Systems and Efficient Algorithms -- Spatio-temporal Topology Routing Algorithm for Opportunistic Network Based on Self-Attention Mechanism -- TSAEns: Ensemble Learning for KPI Anomaly Detection -- Towards Transferable Adversarial Examples using Meta Learning -- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades -- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC -- Parallel Cache Prefetching for LSM-Tree based Store: From Algorithm to Evaluation -- A Hybrid TLBO-TS Algorithm based Mobile Service Selection for Composite Services -- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSD -- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem -- Trace-Navi: A High-Accuracy Indoor Navigation System based on Real-Time Activity Recognition and Discrete Trajectory Calibration -- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-scale Scene -- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process -- A Multi-Precision Quantized Super-Resolution Model Framework -- An Optimized GPU Implementation of Weakly-compressible SPH using CUDA-based strategies -- A Heterogeneous Multi-Core Network-on-Chip Mapping Optimization Algorithm -- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-grained Classification -- Predicting Students Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective -- Motion-sequence Authentication System: guard for smart phones -- Edge Computing and Edge Intelligence -- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing -- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-assisted MEC -- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing -- An Optimized Greedy-based Task Offloading Method for Mobile Edge Computing -- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing -- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing against Collusion Attack -- MGFL: Multi-granularity Federated Learning in Edge Computing Systems -- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing -- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration -- Service Dependability and Security Algorithms -- Edge DDoS attack detection method based on software defined networks -- GradMFL: Gradient Memory-based Federated Learning for Hierarchical Knowledge Transferring over Non-IID Data -- Linear Coded Federated Learning -- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-assisted E-Healthcare Systems -- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning -- A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices -- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains -- A Novel Protection method of continuous location sharing based on local differential privacy and conditional random field -- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid -- Data Science -- Multi-Layer Adaptive Sampling for Per-Flow Spread Measurement -- Transformer-based Rating-Aware Sequential Recommendation -- An effective single-pass approach for estimating the Z-quantile in data streams -- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-IID Data in Federated Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  4. 164

    Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats by Donaldson, Scott E., Siegel, Stanley G., Williams, Chris K., Aslam, Abdul

    Published: Apress, 2015
    Description: 1 online resource : illustrations.
    Contents: “…Defining the Cybersecurity Challenge --…”
    SpringerLink - Click here for access
    eBook
  5. 165

    Pro SQL Server 2012 BI Solutions by Root, Randal, Mason, Caryn

    Published: Apress, 2012
    Description: 1 online resource (821 pages).
    SpringerLink - Click here for access
    eBook
  6. 166

    Pro SQL server internals by Korotkevitch, Dmitri

    Published: Apress, 2014
    Description: 1 online resource (xxv, 750 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  7. 167

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  8. 168

    Pro Python Second edition. by Browning, J. Burton, Alchin, Marty

    Published: Apress, 2014
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  9. 169

    The HAZOP leader's handbook how to plan and conduct successful HAZOP studies by Eames, Phil

    Published: Elsevier, 2022
    Description: 1 online resource.
    Elsevier - Click here for access
    Electronic eBook
  10. 170

    Advances in dependability engineering of complex systems : proceedings of the twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2-6, 2017,... by International Conference on Dependability of Computer Systems Brunów, Poland, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xvi, 488 pages).
    Contents: “…Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 171
  12. 172

    Autonomic network management principles : from concepts to applications by Agoulmine, Nazim

    Published: Academic Press/Elsevier, 2011
    Description: 1 online resource (xvii, 288 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  13. 173

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  14. 174

    Beginning backup and restore for SQL Server : data loss management and prevention techniques by Beard, Bradley

    Published: Apress, 2018
    Description: 1 online resource : illustrations.
    SpringerLink - Click here for access
    eBook
  15. 175

    The coder's path to wealth and independence by Beckner, Mark

    Published: Apress, 2014
    Description: 1 online resource (1 volume) : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 176
  17. 177

    Enterprise Drupal 8 development : for advanced projects and large development teams by Tomlinson, Todd

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  18. 178

    Network security evaluation using the NSA IEM by ScienceDirect (Online service)

    Published: Syngress ; Distributed by O'Reilly Media in the United States and Canada, 2005
    Description: 1 online resource (xxvi, 437 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  19. 179

    Integration of large-scale renewable energy into bulk power systems : from planning to operation by SpringerLink (Online service)

    Published: Springer, 2017
    Description: 1 online resource (xii, 337 pages).
    SpringerLink - Click here for access
    eBook
  20. 180