Search Results - (( Defined contributors ((pension plans) OR (pension plan)) ) OR ((( Defined distribution operations plans ) OR ( Defined distribution decisions plans ))))

  1. 81

    Marketing analytics roadmap : methods, metrics, and tools by Rackley, Jerry

    Published: Apress, 2015
    Description: 1 online resource (xiv, 300 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  2. 82

    CMMI for development : implementation guide by Chaudhary, Mukund, Chopra, Abhishek

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  3. 83

    Beginning SQL Server for developers Fourth edition. by Dewson, Robin

    Published: Apress, 2015
    Description: 1 online resource (xxi, 684 pages) : illustrations.
    Contents: “…-- SQL Server Editions -- The Example -- Installation -- Install -- Setup Role -- Choosing the Features to Install -- Naming the Instance -- Service Accounts -- Authentication Mode -- Defining the Data Directories -- FILESTREAM Options -- Creating the Reporting Services Database -- Distributed Replay Options -- Security -- Services Accounts -- Looking at the Authentication Mode -- Windows Authentication Mode -- Administrators on a Machine -- Mixed Mode -- The sa Login -- Summary -- Chapter 2: SQL Server Management Studio -- A Quick Overview of SSMS -- Query Editor -- sqlcmd -- Summary -- Chapter 3: Database Design and Creation -- Defining a Database -- Prebuilt Databases Within SQL Server -- master -- tempdb -- model -- msdb -- AdventureWorks/AdventureWorksDW -- Choosing the Database System Type -- OLTP -- Backups -- Indexes -- In-memory data -- BI/OLAP -- Example System Choice -- Gathering the Data -- Determining the Information to Store in the Database -- Financial Products -- Customers -- Customer Addresses -- Shares -- Transactions -- External and Ignored Information -- Building Relationships -- Using Keys -- Primary Key -- Foreign/Referencing Key -- Candidate/Alternate Key -- A Unique Constraint Instead of a Primary Key -- Creating Relationships -- Relationships and Referential Integrity -- Types of Relationships -- One-to-One -- One-to-Many -- Many-to-Many -- More on Foreign Keys -- Normalization -- Assign Each Entity a Unique Identifier -- Store Only Information That Directly Relates to That Entity -- Avoid Repeating Values or Columns -- Normal Forms -- First Normal Form -- Customers -- Shares -- Second Normal Form -- Third Normal Form.…”
    SpringerLink - Click here for access
    eBook
  4. 84

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  5. 85

    VMware cloud on AWS insights on the first VMware enterprise-proven SaaS solution by Lombard, Christophe

    Published: Apress, 2023
    Description: 1 online resource (xvii, 301 pages) : illustrations.
    SpringerLink - Click here for access
    Electronic eBook
  6. 86

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  7. 87

    Virtual, augmented and mixed reality : 13th International Conference, VAMR 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021,... by VAMR (Conference) Online), SpringerLink (Online service), International Conference on Human-Computer Interaction

    Published: Springer, 2021
    Description: 1 online resource (xxi, 715 pages) : illustrations (some color).
    Contents: “…Designing and Evaluating VAMR Environments -- Narrative Cognition in Mixed Reality Systems: Towards an Empirical Framework -- Exploratory Study on the Use of Augmentation for Behavioural Control in Shared Spaces -- Pose Estimation and Video Annotation Approaches for Understanding Individual and Team Interaction during Augmented Reality-Enabled Mission Planning -- GazeXR: A General Eye-tracking System Enabling Invariable Gaze Data in Virtual Environment -- SpatialViewer: A Remote Work Sharing Tool that Considers Intimacy Among Workers -- A Review of Virtual Therapists in Anxiety and Phobias Alleviating Applications -- Designing Limitless Path in Virtual Reality Environment -- A Comparative Study of Conversational Proxemics for Virtual Agents -- Real-time Data Analytics of COVID Pandemic using Virtual Reality -- Design Considerations for Interacting and Navigating with 2 Dimensional and 3 Dimensional Medical Images in Virtual, Augmented and Mixed Reality Medical Applications -- Virtual Reality Sickness Evaluation in Exergames for Older Hypertensive Patients: A Comparative Study of Training Methods in a Virtual Environment -- Consistency in Multi-device Service including VR : A Case Study -- Multimodal and Natural Interaction in VAMR -- The Effect of Body-Based Haptic Feedback on Player Experience during VR Gaming -- User Defined Walking-in-place Gestures for Intuitive Locomotion in Virtual Reality -- Exploring Human-to-Human Telepresence and the Use of Vibro-Tactile Commands to Guide Human Streamers -- Pseudo-haptic Perception in Smartphones Graphical Interfaces: a Case Study -- A Research on Sensing Localization & Orientation of Objects in VR with Facial Vibrotactile Display -- HaptMR: Smart Haptic Feedback for Mixed Reality based on Computer Vision Semantic -- Position Estimation of Occluded Fingertip based on Image of Dorsal Hand from RGB Camera -- Head-mounted Displays and VR Glasses -- Usability and User Experience of Interactions on VR-PC, HoloLens 2, VR Cardboard and AR Smartphone in a Biomedical Application -- Simulation of the Field of View in AR and VR Headsets -- Exploring Perspective Switching in Immersive VR for Learning First Aid in Lower Secondary Education -- Beyond Visible Light: User and Societal Impacts of Egocentric Multispectral Vision -- No One is Superman: 3-D Safety Margin Profiles when Using Head-Up display (HUD) for Takeoff in Low Visibility and High Crosswind Conditions -- Robust Camera Motion Estimation for Point-of-View Video Stabilization -- Rendering Tree Roots Outdoors: A Comparison between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality Visualization -- Using Head-Mounted Displays for Virtual Reality: Investigating Subjective Reactions to Eye-Tracking Scenarios -- Omnidirectional Flick View -- VAMR Applications in Design, the Industry and the Military -- Virtual Fieldwork: Designing Augmented Reality Applications using Virtual Reality Worlds -- Contextually Adaptive Multimodal Mixed Reality Interfaces for Dismounted Operator Teaming with Unmanned System Swarms -- Virtual Solutions for Gathering Consumer Feedback on Food: A Literature Review and Analysis -- Modernizing Aircraft Inspection: Conceptual Design of an Augmented Reality Inspection Support Tool -- The Potential of Augmented Reality for Remote Support -- A Review of Distributed VR Co-Design Systems -- The Mobile Office: A Mobile AR Systems for Productivity Applications in Industrial Environments -- Virtual Reality Compensatory Aid for Improved Weapon Splash-Zone Awareness -- Mixed Reality Visualization of Friendly vs Hostile Decision Dynamics -- Doing versus Observing: Virtual Reality and 360-degree Video for Training Manufacturing Tasks -- VAMR in Learning and Culture -- Design and Research on the Virtual Simulation Teaching Platform of Shanghai Jade Carving Techniques Based on Unity 3d Technology -- IME VR: an MVC Framework for Military Training VR Simulators -- Extended Reality, Pedagogy, and Career Readiness: A Review of Literature -- Development of an AR Training Construction System using Embedded Information in a Real Environment -- LibrARy : Enriching the Cultural Physical Spaces with Collaborative AR Content -- Supporting Embodied and Remote Collaboration in Shared Virtual Environments -- A Survey on Applications of Augmented, Mixed and Virtual Reality for Nature and Environment -- Flexible Low-Cost Digital Puppet System -- Mixed Reality Technology Capabilities for Combat-Casualty Handoff Training.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  8. 88

    Agile marketing by Accardi-Petersen, Michelle

    Published: Apress ; Distributed by Springer Science + Business Media, 2011
    Description: 1 online resource (xv, 232 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  9. 89

    Logic, rationality, and interaction : 7th International Workshop, LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings by LORI (Workshop) Chongqing, China), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (xxi, 441 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 90

    Logic, Rationality, and Interaction : Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings by LORI 2009 Chongqing, China, SpringerLink (Online service)

    Published: Springer-Verlag, 2009
    Description: 1 online resource.
    Contents: “…Contributed Papers -- Expressing Properties of Coalitional Ability under Resource Bounds -- Dynamic Context Logic -- Toward a Dynamic Logic of Questions -- A General Family of Preferential Belief Removal Operators -- Computing Compliance -- Attributing Distributed Responsibility in Stit Logic -- Characterizations of Iterated Admissibility Based on PEGL -- Can Doxastic Agents Learn? …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 91

    Configuration management for senior managers : essential product configuration and lifecycle management for manufacturing by Watts, Frank B.

    Published: Elsevier : BH, 2015
    Description: 1 online resource.
    Contents: “…Front Cover; Configuration Management for Senior Managers; Copyright; Contents; List of Figures; Preface; Policies and Critical Practices; POLICIES; CRITICAL PRACTICES; PLATINUM POLICY; Chapter One -- Introduction; Chapter Two -- Why CM; THE DIRTY HALF DOZEN; PROCESS SPEED; THROW IT OVER THE WALL; QUALITY CONTROL FOR ENGINEERING; SUMMARY; Chapter Three -- CM System, Where to Start; PROCESS MEASUREMENTS; DISTRIBUTED CM; ORGANIZATION; CHAIN OF COMMAND; CM MANAGER; ISO STANDARDS AND CERTIFICATION; DOD/MILITARY STANDARDS; BEST OF THE BEST PRACTICES; STANDARDS RESPONSIBILITY; PEOPLE REQUIRED.…”
    Elsevier - Click here for access
    eBook
  12. 92

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 93

    Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health records by Robichau, Bernard Peter

    Published: Apress, 2014
    Description: 1 online resource (xi, 167 pages) : illustrations (some color)
    SpringerLink - Click here for access
    eBook
  14. 94

    Sport marketing Fourth edition. by Mullin, Bernard James

    Published: Human Kinetics, 2014
    Description: xix, 482 pages : color illustrations ; 29 cm.
    Contents: “…Chapter 1 The Special Nature of Sport Marketing -- The NBA and Global Marketing Strategy -- Weathering Recessions -- The Competitive Marketplace -- Sport Marketing Defined -- Marketing Myopia in Sport -- Change in the Profession -- Uniqueness of Sport Marketing -- Chapter 2 Strategic Marketing Management -- Sport Strategy Is More Than Locker Room Talk -- Marketing Planning Process -- Strategic Step 1 -- Develop Vision, Position, and Purpose -- Strategic Step 2 -- Develop Strategic Goals and Objectives -- Strategic Step 3 -- Develop a Ticket Marketing, Sales, and Service Plan -- Strategic Step 4 -- Integrate the Marketing Plan Into a Broader, Strategic Resource Allocation -- Strategic Step 5 -- Control and Evaluate Implementation of the Plan -- Eight-Point Ticket Marketing, Sales, and Service Plan Model -- Chapter 3 Understanding the Sport Consumer -- Socialization, Involvement, and Commitment -- Environmental Factors -- Individual Factors -- Decision Making -- Chapter 4 Market Research in the Sport Industry -- Sources of Information -- Users of Market Research in Sport and Entertainment -- Application of Market Research in the Sport Industry -- Performing the Right Research -- Chapter 5 Market Segmentation -- What Is Market Segmentation? …”
    Book
  15. 95

    How to validate a pharmaceutical process by Ostrove, Steve

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Contents: “…II: Stage I-Process Development4 Getting Started; Before It All Starts; Example; Getting Started (After the Equipment Specifications); The Validation Master Plan; Standard Operating Procedures (SOPs) Preparation; Quality Programs; Training; Basic Risk Approach; Putting it Together; Notes; 5 Basic Equipment and Utility Qualification; Introduction; Determining the Level of Qualification; Factory Acceptance Test and Site Acceptance Test; Commissioning; Qualification Protocols-Installation Qualification (IQ) and Operational Qualification (OQ); Performance Qualification.…”
    Elsevier - Click here for access
    eBook
  16. 96

    Lake Charles CCS Project. Phase 2. Final technical report by Leib, Thomas J., Cole, Dan E.

    Published: United States. Department of Energy, 2015
    Description: 1 online resource (141 pages) : illustrations.
    Get full text
    Address at time of PURL creation
    Government Document eBook
  17. 97

    Wireless internet : 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings by International Conference on Wireless Internet Haikou Shi, China, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xiv, 322 pages) : illustrations.
    Contents: “…Joint Asynchronous Time and Localization of an Unknown Node in Wireless Sensor Networks -- Distributed Beacon Synchronization Mechanism for 802.15.4 Cluster-Tree Topology -- A Short Survey on Fault Diagnosis in Wireless Sensor Networks -- Research on Data Storage Scheme under Sink Failures in Wireless Sensor Networks -- Impact of Irregular Radio and Faulty Nodes on Localization in Industrial WSNs -- A SDN Proactive Defense Scheme Based on IP and MAC Address Mutation -- An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage -- High capacity embedding methods of QR code error correction -- Perceptual secret sharing scheme based on Boolean operations and random grids -- Security-Aware Distributed Service Composition for WSNs based Smart Metering in Smart Grid Using Software Defined Networks -- A Simplied Interference Model for Outdoor Millimeter Wave Networks -- A CWMN Spectrum Allocation Based on Multi-Strategy Fusion Glowworm Swarm Optimization Algorithm -- Decode-and-Forward Full-duplex Relay Selection under Rayleigh Fading Environment -- Parameter Control Scheme among Multi-Cell for Mobility Load Balancing in Ultra-Dense Network -- Spectrum Sensing based on Modulated Wideband Converter with CoSaMP Reconstruction Algorithm -- Joint Partial Relay and Antenna Selection for Full-Duplex Amplify-and-Forward Relay Networks -- A Low-Complexity Power Allocation Method in Ultra-Dense Network -- QRD Architecture Using the Modied ILMGS Algorithm for MIMO Systems Simulating and Analyzing the Effect of Timeliness on the Accuracy Rate of Central Path Planning -- An Optimization of DBN/GPU Speech Recognition on Wireless Network Applications Estimating End-to-End Available Bandwidth for Cyber-Physical Applications in Hybrid Networks -- Delay Aware Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks -- An Improved Dynamic Clustering Algorithm Based on Uplink Capacity Analysis in Ultra-Dense Network System -- Wideband Spectrum Sensing by Multi-step Sample Autocorrelation Detection -- Noncoherent Joint Multiple Symbol Differential Detection and Channel Decoding in Massive MIMO System -- Downlink PDMA in the Heterogeneous Network Internet of Things -- Edge Caching to Deliver Mobile Content in Vehicular Ad Hoc Networks -- Enhanced IoT Data Acquisition in Information Centric Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  18. 98

    Remediation in medical education : a mid-course correction Second edition. by SpringerLink (Online service)

    Published: Springer International Publishing, 2023
    Description: 1 online resource (xxxv, 330 pages) : illustrations (some color)
    Contents: “…Goal 1E: Promote the Availability of Remediation Resources to All Learners and Health Professions Education Community Members -- Goal 1F: Support Faculty Development Initiatives for All Steps of the Remediation Process, Including Early Identification, Intervention, and Referral -- Phase 2: Structural Elements of the Remediation Process -- Goal 2A: Tailor Remediation Plans to Individual Learners' Needs -- Goal 2B: Construct Effective and Nonjudgmental Processes to Share Evolving Information About Learners Who Struggle -- Goal 2C: Avoid Conflicts of Interest When Distributing Remediation Roles.…”
    SpringerLink - Click here for access
    eBook
  19. 99
  20. 100

    Current topics in artificial intelligence : 13th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2009, Seville, Spain, November 9-13, 2009. Selected Paper... by Asociación Española de Inteligencia Artificial. Conferencia, SpringerLink (Online service)

    Published: Springer-Verlag, 2010
    Description: 1 online resource (xii, 302 pages).
    Contents: “…Diagnosis -- Employing Test Suites for Verilog Fault Localization -- Analyzing the Influence of Differential Constraints in Possible Conflict and ARR Computation -- On the Complexity of Program Debugging Using Constraints for Modeling the Program's Syntax and Semantics -- Evolutive Algorithms and Neural Networks -- An Analysis of Particle Properties on a Multi-swarm PSO for Dynamic Optimization Problems -- An Incremental Learning Method for Neural Networks Based on Sensitivity Analysis -- A Multi-objective Neuro-evolutionary Algorithm to Obtain Interpretable Fuzzy Models -- Improving Isolated Handwritten Word Recognition Using a Specialized Classifier for Short Words -- Knowledge Representation and Engineering -- Closeness and Distance Relations in Order of Magnitude Qualitative Reasoning via PDL -- Base Belief Change for Finitary Monotonic Logics -- Common Pitfalls in Ontology Development -- Machine Learning -- Obtaining Optimal Class Distribution for Decision Trees: Comparative Analysis of CTC and C4.5 -- Selecting Few Genes for Microarray Gene Expression Classification -- Sequential Pattern Mining in Multi-relational Datasets -- CBR Outcome Evaluation for High Similar Cases: A Preliminary Approach -- On the Suitability of Combining Feature Selection and Resampling to Manage Data Complexity -- Automated Constraint Selection for Semi-supervised Clustering Algorithm -- Multiagents -- Empirical Hardness for Mixed Auctions -- Developing Strategies for the ART Domain -- A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack -- Natural Language -- Adding Morphological Information to a Connectionist Part-Of-Speech Tagger -- Planning -- A Look-Ahead B&B Search for Cost-Based Planning -- A Tabu Search Algorithm to Minimize Lateness in Scheduling Problems with Setup Times -- Improving Local Search for the Fuzzy Job Shop Using a Lower Bound -- Tutoring Systems -- Data-Driven Student Knowledge Assessment through Ill-Defined Procedural Tasks -- Uncertainty: Bayesian Networks -- Recursive Probability Trees for Bayesian Networks -- Vision -- Generating Saliency Maps Using Human Based Computation Agents -- A New Contiguity-Constrained Agglomerative Hierarchical Clustering Algorithm for Image Segmentation -- Applications -- Classifying Sleep Apneas Using Neural Networks and a Combination of Experts -- Expert System to Real Time Control of Machining Processes -- A Flexible System for Document Processing and Text Transcription.…”
    SpringerLink - Click here for access
    eBook