Search Results - (( Defined (contribution OR contributions) ((pension plant) OR (pension plan)) ) OR ((( Defined distribution ((operations plans) OR (operating a)) ) OR ( Defined distribution decision plans ))))

Refine Results
  1. 1

    The mathematics of the uncertain : a tribute to Pedro Gil by SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xxv, 917 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  2. 2

    Agents and artificial intelligence : third International Conference, ICAART 2011, Rome, Italy, January 28-30, 2011. Revised selected papers by ICAART (Conference) Rome, Italy), SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xiii, 444 pages) : illustrations (black and white).
    Contents: “…Web Service Composition Plans in OWL-S /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 3

    Adaptive and natural computing algorithms : 11th International Conference, ICANNGA 2013, Lausanne, Switzerland, April 4-6, 2013 : proceedings by ICANNGA (Conference) Lausanne, Switzerland), SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xiii, 506 pages) : illustrations.
    Contents: “…Can Two Hidden Layers Make a Difference? /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  4. 4
  5. 5
  6. 6

    Hybrid Artificial Intelligent Systems : 8th International Conference, HAIS 2013, Salamanca, Spain, September 11-13, 2013 : proceedings by HAIS 2013 Salamanca, Spain, SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xx, 691 pages) : illustrations.
    Contents: “…A Hybrid Fuzzy Approach to Facility Location Decision-Making /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  7. 7
  8. 8
  9. 9

    Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering by International Conference on Communication, Electronics and Automation Engineering Xi'an Shi, China, SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource.
    Contents: “…Recovery Time Analysis of a Distributed Redundancy Protocol --…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 10

    Logic, rationality, and interaction : 7th International Workshop, LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings by LORI (Workshop) Chongqing, China), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (xxi, 441 pages) : illustrations (some color).
    Contents: “…3 Step 1: Arguments Based on Two Monotonic Logics4 Step 2: Preferences Among Arguments; 5 Step 3: Designing Non-monotonic Logics; 6 Related Work; 7 Summary and Concluding Remarks; References; A Discrete Representation of Lattice Frames; 1 Introduction; 2 Notation and First Definitions; 3 Urquhart's Lattice Representation; 4 Modal Definability of Doubly Ordered Frames; 5 Representability of Lattice Frames; 6 Summary and Outlook; References; Group Announcement Logic with Distributed Knowledge; 1 Introduction; 2 Background; 2.1 Languages; 2.2 Models and Bisimulation; 2.3 Semantics of GALD.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 11

    Logic, Rationality, and Interaction : Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings by LORI 2009 Chongqing, China, SpringerLink (Online service)

    Published: Springer-Verlag, 2009
    Description: 1 online resource.
    Contents: “…Contributed Papers -- Expressing Properties of Coalitional Ability under Resource Bounds -- Dynamic Context Logic -- Toward a Dynamic Logic of Questions -- A General Family of Preferential Belief Removal Operators -- Computing Compliance -- Attributing Distributed Responsibility in Stit Logic -- Characterizations of Iterated Admissibility Based on PEGL -- Can Doxastic Agents Learn? …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 12
  13. 13

    Current topics in artificial intelligence : 13th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2009, Seville, Spain, November 9-13, 2009. Selected Paper... by Asociación Española de Inteligencia Artificial. Conferencia, SpringerLink (Online service)

    Published: Springer-Verlag, 2010
    Description: 1 online resource (xii, 302 pages).
    Contents: “…Diagnosis -- Employing Test Suites for Verilog Fault Localization -- Analyzing the Influence of Differential Constraints in Possible Conflict and ARR Computation -- On the Complexity of Program Debugging Using Constraints for Modeling the Program's Syntax and Semantics -- Evolutive Algorithms and Neural Networks -- An Analysis of Particle Properties on a Multi-swarm PSO for Dynamic Optimization Problems -- An Incremental Learning Method for Neural Networks Based on Sensitivity Analysis -- A Multi-objective Neuro-evolutionary Algorithm to Obtain Interpretable Fuzzy Models -- Improving Isolated Handwritten Word Recognition Using a Specialized Classifier for Short Words -- Knowledge Representation and Engineering -- Closeness and Distance Relations in Order of Magnitude Qualitative Reasoning via PDL -- Base Belief Change for Finitary Monotonic Logics -- Common Pitfalls in Ontology Development -- Machine Learning -- Obtaining Optimal Class Distribution for Decision Trees: Comparative Analysis of CTC and C4.5 -- Selecting Few Genes for Microarray Gene Expression Classification -- Sequential Pattern Mining in Multi-relational Datasets -- CBR Outcome Evaluation for High Similar Cases: A Preliminary Approach -- On the Suitability of Combining Feature Selection and Resampling to Manage Data Complexity -- Automated Constraint Selection for Semi-supervised Clustering Algorithm -- Multiagents -- Empirical Hardness for Mixed Auctions -- Developing Strategies for the ART Domain -- A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack -- Natural Language -- Adding Morphological Information to a Connectionist Part-Of-Speech Tagger -- Planning -- A Look-Ahead B&B Search for Cost-Based Planning -- A Tabu Search Algorithm to Minimize Lateness in Scheduling Problems with Setup Times -- Improving Local Search for the Fuzzy Job Shop Using a Lower Bound -- Tutoring Systems -- Data-Driven Student Knowledge Assessment through Ill-Defined Procedural Tasks -- Uncertainty: Bayesian Networks -- Recursive Probability Trees for Bayesian Networks -- Vision -- Generating Saliency Maps Using Human Based Computation Agents -- A New Contiguity-Constrained Agglomerative Hierarchical Clustering Algorithm for Image Segmentation -- Applications -- Classifying Sleep Apneas Using Neural Networks and a Combination of Experts -- Expert System to Real Time Control of Machining Processes -- A Flexible System for Document Processing and Text Transcription.…”
    SpringerLink - Click here for access
    eBook
  14. 14

    Machine learning : ECML 2006 : 17th European Conference on Machine Learning, Berlin, Germany, September 18-22, 2006 : proceedings by European Conference on Machine Learning Berlin, Germany, SpringerLink (Online service)

    Published: Springer, 2006
    Description: 1 online resource (xxiii, 851 pages) : illustrations.
    Contents: “…Invited Talks -- On Temporal Evolution in Data Streams -- The Future of CiteSeer: CiteSeerx -- Learning to Have Fun -- Winning the DARPA Grand Challenge -- Challenges of Urban Sensing -- Long Papers -- Learning in One-Shot Strategic Form Games -- A Selective Sampling Strategy for Label Ranking -- Combinatorial Markov Random Fields -- Learning Stochastic Tree Edit Distance -- Pertinent Background Knowledge for Learning Protein Grammars -- Improving Bayesian Network Structure Search with Random Variable Aggregation Hierarchies -- Sequence Discrimination Using Phase-Type Distributions -- Languages as Hyperplanes: Grammatical Inference with String Kernels -- Toward Robust Real-World Inference: A New Perspective on Explanation-Based Learning -- Fisher Kernels for Relational Data -- Evaluating Misclassifications in Imbalanced Data -- Improving Control-Knowledge Acquisition for Planning by Active Learning -- PAC-Learning of Markov Models with Hidden State -- A Discriminative Approach for the Retrieval of Images from Text Queries -- TildeCRF: Conditional Random Fields for Logical Sequences -- Unsupervised Multiple-Instance Learning for Functional Profiling of Genomic Data -- Bayesian Learning of Markov Network Structure -- Approximate Policy Iteration for Closed-Loop Learning of Visual Tasks -- Task-Driven Discretization of the Joint Space of Visual Percepts and Continuous Actions -- EM Algorithm for Symmetric Causal Independence Models -- Deconvolutive Clustering of Markov States -- Patching Approximate Solutions in Reinforcement Learning -- Fast Variational Inference for Gaussian Process Models Through KL-Correction -- Bandit Based Monte-Carlo Planning -- Bayesian Learning with Mixtures of Trees -- Transductive Gaussian Process Regression with Automatic Model Selection -- Efficient Convolution Kernels for Dependency and Constituent Syntactic Trees -- Why Is Rule Learning Optimistic and How to Correct It -- Automatically Evolving Rule Induction Algorithms -- Bayesian Active Learning for Sensitivity Analysis -- Mixtures of Kikuchi Approximations -- Boosting in PN Spaces -- Prioritizing Point-Based POMDP Solvers -- Graph Based Semi-supervised Learning with Sharper Edges -- Margin-Based Active Learning for Structured Output Spaces -- Skill Acquisition Via Transfer Learning and Advice Taking -- Constant Rate Approximate Maximum Margin Algorithms -- Batch Classification with Applications in Computer Aided Diagnosis -- Improving the Ranking Performance of Decision Trees -- Multiple-Instance Learning Via Random Walk -- Localized Alternative Cluster Ensembles for Collaborative Structuring -- Distributional Features for Text Categorization -- Subspace Metric Ensembles for Semi-supervised Clustering of High Dimensional Data -- An Adaptive Kernel Method for Semi-supervised Clustering -- To Select or To Weigh: A Comparative Study of Model Selection and Model Weighing for SPODE Ensembles -- Ensembles of Nearest Neighbor Forecasts -- Short Papers -- Learning Process Models with Missing Data -- Case-Based Label Ranking -- Cascade Evaluation of Clustering Algorithms -- Making Good Probability Estimates for Regression -- Fast Spectral Clustering of Data Using Sequential Matrix Compression -- An Information-Theoretic Framework for High-Order Co-clustering of Heterogeneous Objects -- Efficient Inference in Large Conditional Random Fields -- A Kernel-Based Approach to Estimating Phase Shifts Between Irregularly Sampled Time Series: An Application to Gravitational Lenses -- Cost-Sensitive Decision Tree Learning for Forensic Classification -- The Minimum Volume Covering Ellipsoid Estimation in Kernel-Defined Feature Spaces -- Right of Inference: Nearest Rectangle Learning Revisited -- Reinforcement Learning for MDPs with Constraints -- Efficient Non-linear Control Through Neuroevolution -- Efficient Prediction-Based Validation for Document Clustering -- On Testing the Missing at Random Assumption -- B-Matching for Spectral Clustering -- Multi-class Ensemble-Based Active Learning -- Active Learning with Irrelevant Examples -- Classification with Support Hyperplanes -- (Agnostic) PAC Learning Concepts in Higher-Order Logic -- Evaluating Feature Selection for SVMs in High Dimensions -- Revisiting Fisher Kernels for Document Similarities -- Scaling Model-Based Average-Reward Reinforcement Learning for Product Delivery -- Robust Probabilistic Calibration -- Missing Data in Kernel PCA -- Exploiting Extremely Rare Features in Text Categorization -- Efficient Large Scale Linear Programming Support Vector Machines -- An Efficient Approximation to Lookahead in Relational Learners -- Improvement of Systems Management Policies Using Hybrid Reinforcement Learning -- Diversified SVM Ensembles for Large Data Sets -- Dynamic Integration with Random Forests -- Bagging Using Statistical Queries -- Guiding the Search in the NO Region of the Phase Transition Problem with a Partial Subsumption Test -- Spline Embedding for Nonlinear Dimensionality Reduction -- Cost-Sensitive Learning of SVM for Ranking -- Variational Bayesian Dirichlet-Multinomial Allocation for Exponential Family Mixtures.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  15. 15

    Safety for future transport and mobility by Ross, Hans-Leo

    Published: Springer, 2021
    Description: 1 online resource (424 pages)
    Contents: “…2.1.1 Development of the Context -- 2.1.2 Identification of Risk -- 2.1.3 Assessment of the Risk in the Target Context -- 2.1.4 Development of a Strategy and Treatment of Potential Risk -- 2.1.5 Development and Defining of Activities and Their Objectives -- 2.1.6 Development of an Implementation and Realisation Strategy -- 2.1.7 Review and Evaluation of the Plan -- 2.2 Technical Risk -- 2.3 Risk in Road Traffic -- 2.3.1 Causes of Technical Risk -- 2.3.2 Control of Technical Risk -- 2.4 Standardisation of Safety for Road Vehicles -- 2.4.1 Risk and Integrity Definition from the IEC 61508.…”
    SpringerLink - Click here for access
    eBook
  16. 16

    Software engineering research, management and applications 2009 by SERA 2009 Haikou Shi, China, SpringerLink (Online service)

    Published: Springer-Verlag, 2009
    Description: 1 online resource (xvi, 306 pages) : illustrations.
    Contents: “…Efficiency from Formalization: An Initial Case Study on Archi3D -- An Agent-Based Framework for Association Rules Mining of Distributed Data -- Defining and Implementing Software Subcontracting Management Processes in Small Enterprises -- A Robust Approach to Subsequence Matching -- Toward Automated Support for Software Process Improvement Initiatives in Small and Medium Size Enterprises -- Syntactic and Semantic Prediction in Dynamic Languages -- M-KAD: A Scalable Peer-to-Peer System for Similarity Search in Metric Space -- A State Based Fitness Function for Evolutionary Testing of Object-Oriented Programs -- A Practical Approach to Developing Applications with Reusable Services -- Supporting Real-Life Applications in Hierarchical Component Systems -- Towards Specifying Reactive Autonomic Systems with a Categorical Approach: A Case Study -- Frameworks for Maturity Questionnaire Selection Model -- An Agent-Based Web Services Market -- Investigating Inconsistency Detection as a Validation Operation in Software Product Line -- Combined Algorithms for Classification of Conduct Disorder of Students in Thai Vocational School -- Error Estimation Model for Managing Embedded Software Development -- Identifying Data Member Level Changes for Regression Testing of Object-Oriented Programs -- Network Monitoring with Real-Time Properties: A Step Forward -- A Pragmatic Analysis Model for Software Reuse -- Evaluation of Test-Driven Development: An Academic Case Study -- New Smith Predictor and Fuzzy Adaptive Control for Wireless Networked Control Systems -- FRAME: A Generic Fractal Process Metamodel for Agile Methodologies -- Workflow Change Patterns: Opportunities for Extension and Reuse -- Patterns of Situational Method Engineering -- A Novel MHC-Inspired Approach for Malicious Code Detection.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 17

    Artificial intelligence and security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, proceedings. Part IV by ICAIS (Conference) New York, N.Y.), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource.
    Contents: “…Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- ̂Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- ̂A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- ̂Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  18. 18

    Artificial intelligence and security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings. Part I by ICAIS (Conference) Hohhot, China), SpringerLink (Online service)

    Published: Springer, 2020
    Description: 1 online resource (719 pages) : illustrations (some color).
    Contents: “…Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique --…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  19. 19

    Security informatics by SpringerLink (Online service)

    Published: Springer, 2010
    Description: 1 online resource (vii, 170 pages) : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  20. 20

    Smart objects and technologies for social good : 7th EAI International Conference, GOODTECHS 2021, virtual event, September 15-17, 2021, Proceedings by GOODTECHS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xv, 312 pages) : illustrations.
    Contents: “…Learning -- Balancing activity recognition and privacy preservation with a multi-objective evolutionary algorithm -- Biometric data capture as a way to identify lack f physical activity in daily life -- Comparative Analysis of Process Mining Algorithms in Python -- COVID-19 Next Day Trend ForecastAnomaly Detection in Cellular IoT with Machine Learning -- Internet of Things -- A Smart IoT System for Water Monitoring and Analysis -- Decentralising the Internet of Medical Things with Distributed Ledger Technologies and Off-Chain Storages: a Proof of Concept -- Towards a Monitoring Framework for Users of Retirement Houses with Mobile Sensing -- Temporal authorization graphs: Pros, Cons and Limits -- Advanced 5G Network Slicing Isolation Using Enhanced VPN+ for Healthcare Verticals -- Social considerations of technology -- GuideSwarm: A Drone Network Design to Assist Visually-impaired People -- LISA -- Lingua Italiana dei Segni Accessibile: A Progressive Web App to Support Communication Between Deaf People and Public Administrations -- Building emotionally stable, inclusive, and healthy communities with ICT: from state of the art to PSsmile app -- issue design, implementation, deployment, operation, and evaluation of smart objects and technologies for social good. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook