Search Results - (( Defined contributors ((pension plans) OR (pension plan)) ) OR ((( Defined distribution computational plans ) OR ( Defined distribution ((torsion plans) OR (torsion points)) ))))
-
161
Agents and artificial intelligence : third International Conference, ICAART 2011, Rome, Italy, January 28-30, 2011. Revised selected papers
Published: Springer, 2013SpringerLink - Click here for accessDescription: 1 online resource (xiii, 444 pages) : illustrations (black and white).
Conference Proceeding eBook -
162
Pro Couchbase server
Published: Apress, 2014SpringerLink - Click here for accessDescription: 1 online resource (xviii, 310 pages) : illustrations.
eBook -
163
Algorithms and architectures for parallel processing : 21st International Conference, ICA3PP 2021, Virtual event, December 3-5, 2021, Proceedings. Part I
Published: Springer, 2022Contents: “…Deep Learning Models and Applications -- CRFST-GCN :A Deeplearning Spital-Temporal Frame to Predict Traffic Flow -- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images -- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction -- GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation -- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning -- Wasserstein Graph Auto-Encoder -- Fine-grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning -- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based On Bionic Neural Network -- Online Multiple Object Tracking Algorithm based on Heat Map Propagation -- Software Systems and Efficient Algorithms -- Spatio-temporal Topology Routing Algorithm for Opportunistic Network Based on Self-Attention Mechanism -- TSAEns: Ensemble Learning for KPI Anomaly Detection -- Towards Transferable Adversarial Examples using Meta Learning -- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades -- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC -- Parallel Cache Prefetching for LSM-Tree based Store: From Algorithm to Evaluation -- A Hybrid TLBO-TS Algorithm based Mobile Service Selection for Composite Services -- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSD -- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem -- Trace-Navi: A High-Accuracy Indoor Navigation System based on Real-Time Activity Recognition and Discrete Trajectory Calibration -- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-scale Scene -- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process -- A Multi-Precision Quantized Super-Resolution Model Framework -- An Optimized GPU Implementation of Weakly-compressible SPH using CUDA-based strategies -- A Heterogeneous Multi-Core Network-on-Chip Mapping Optimization Algorithm -- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-grained Classification -- Predicting Students Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective -- Motion-sequence Authentication System: guard for smart phones -- Edge Computing and Edge Intelligence -- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing -- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-assisted MEC -- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing -- An Optimized Greedy-based Task Offloading Method for Mobile Edge Computing -- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing -- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing against Collusion Attack -- MGFL: Multi-granularity Federated Learning in Edge Computing Systems -- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing -- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration -- Service Dependability and Security Algorithms -- Edge DDoS attack detection method based on software defined networks -- GradMFL: Gradient Memory-based Federated Learning for Hierarchical Knowledge Transferring over Non-IID Data -- Linear Coded Federated Learning -- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-assisted E-Healthcare Systems -- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning -- A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices -- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains -- A Novel Protection method of continuous location sharing based on local differential privacy and conditional random field -- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid -- Data Science -- Multi-Layer Adaptive Sampling for Per-Flow Spread Measurement -- Transformer-based Rating-Aware Sequential Recommendation -- An effective single-pass approach for estimating the Z-quantile in data streams -- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-IID Data in Federated Learning.…”Description: 1 online resource (835 pages).
SpringerLink - Click here for access
Conference Proceeding eBook -
164
Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
Published: Apress, 2015Contents: “…Defining the Cybersecurity Challenge --…”Description: 1 online resource : illustrations.
SpringerLink - Click here for access
eBook -
165
Pro SQL Server 2012 BI Solutions
Published: Apress, 2012SpringerLink - Click here for accessDescription: 1 online resource (821 pages).
eBook -
166
Pro SQL server internals
Published: Apress, 2014SpringerLink - Click here for accessDescription: 1 online resource (xxv, 750 pages) : illustrations.
eBook -
167
Software engineering for embedded systems : methods, practical techniques, and applications First edition.
Published: Newnes, 2013Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”Description: 1 online resource (xlix, 1150 pages).
Elsevier - Click here for access
eBook -
168
Pro Python Second edition.
Published: Apress, 2014SpringerLink - Click here for accessDescription: 1 online resource.
eBook -
169
The HAZOP leader's handbook how to plan and conduct successful HAZOP studies
Published: Elsevier, 2022Elsevier - Click here for accessDescription: 1 online resource.
Electronic eBook -
170
Advances in dependability engineering of complex systems : proceedings of the twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2-6, 2017,...
Published: Springer, 2018Contents: “…Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7. …”Description: 1 online resource (xvi, 488 pages).
SpringerLink - Click here for access
Conference Proceeding eBook -
171
Test driven development in Ruby : a practical introduction to TDD using problem and solution domain analysis
Published: Apress, 2017SpringerLink - Click here for accessDescription: 1 online resource.
eBook -
172
Autonomic network management principles : from concepts to applications
Published: Academic Press/Elsevier, 2011Elsevier - Click here for accessDescription: 1 online resource (xvii, 288 pages) : illustrations.
eBook -
173
Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I
Published: Springer, 2021SpringerLink - Click here for accessDescription: 1 online resource (xix, 498 pages) : illustrations (some color).
Conference Proceeding eBook -
174
Beginning backup and restore for SQL Server : data loss management and prevention techniques
Published: Apress, 2018SpringerLink - Click here for accessDescription: 1 online resource : illustrations.
eBook -
175
The coder's path to wealth and independence
Published: Apress, 2014SpringerLink - Click here for accessDescription: 1 online resource (1 volume) : illustrations.
eBook -
176
Product-focused software process improvement : 7th international conference, PROFES 2006, Amsterdam, the Netherlands, June 12-14, 2006 : proceedings
Published: Springer, 2006SpringerLink - Click here for accessDescription: 1 online resource (xvii, 474 pages) : illustrations.
Conference Proceeding eBook -
177
Enterprise Drupal 8 development : for advanced projects and large development teams
Published: Apress, 2017SpringerLink - Click here for accessDescription: 1 online resource.
eBook -
178
Network security evaluation using the NSA IEM
Published: Syngress ; Distributed by O'Reilly Media in the United States and Canada, 2005Elsevier - Click here for accessDescription: 1 online resource (xxvi, 437 pages) : illustrations.
eBook -
179
Integration of large-scale renewable energy into bulk power systems : from planning to operation
Published: Springer, 2017SpringerLink - Click here for accessDescription: 1 online resource (xii, 337 pages).
eBook -
180
Investigating challenges to American retirement security : hearing before the Subcommittee on Social Security, Pensions, and Family Policy of the Committee on Finance, United State...
Published: U.S. Government Publishing Office, 2022Get full textDescription: 1 online resource (iii, 65 pages).
Government Document eBook