Search Results - (( Defined (contribution OR contributions) ((pensions plans) OR (pension plans)) ) OR ((( Defined distribution ((operation plan) OR (((operational plan) OR (operating a)))) ) OR ( Defined ((distribution erosion) OR (distribution decision)) plans ))))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Monitoring, security, and rescue techniques in multiagent systems 1st ed. by MSRAS 2004 Płock, Poland, SpringerLink (Online service)

    Published: Springer, 2005
    Description: 1 online resource (xii, 596 pages) : illustrations.
    Contents: “…Foundations and Methods -- Flow Graphs, their Fusion and Data Analysis -- Approximation Spaces for Hierarchical Intelligent Behavioral System Models -- Distributed Adaptive Control: Beyond Single-Instant, Discrete Control Variables -- Multi-agent Planning for Autonomous Agents' Coordination -- Creating Common Beliefs in Rescue Situations -- Coevolutionary Processes for Strategic Decisions -- Automatic Proofs of Protocols via Program Transformation -- Mereological Foundations to Approximate Reasoning -- Data Security and Null Value Imputation in Distributed Information Systems -- Basic Principles and Foundations of Information Monitoring Systems -- Modelling Unreliable and Untrustworthy Agent Behaviour -- Nearest Neighbours without k -- Classifiers Based on Approximate Reasoning Schemes -- Towards Rough Applicability of Rules -- On the Computer-Assisted Reasoning about Rough Sets -- Similarity-Based Data Reduction and Classification -- Decision Trees and Reducts for Distributed Decision Tables -- Learning Concept Approximation from Uncertain Decision Tables -- In Search for Action Rules of the Lowest Cost -- Circularity in Rule Knowledge Bases Detection using Decision Unit Approach -- Feedforward Concept Networks -- Extensions of Partial Structures and Their Application to Modelling of Multiagent Systems -- Tolerance Information Granules -- Attribute Reduction Based on Equivalence Relation Defined on Attribute Set and Its Power Set -- Query Cost Model Constructed and Analyzed in a Dynamic Environment -- The Efficiency of the Rules' Classification Based on the Cluster Analysis Method and Salton's Method -- Extracting Minimal Templates in a Decision Table -- Application Domains and Case Studies -- Programming Bounded Rationality -- Generalized Game Theory's Contribution to Multi-agent Modelling -- Multi-Agent Decision Support System for Disaster Response and Evacuation -- Intelligent System for Environmental Noise Monitoring -- Multi-agent and Data Mining Technologies for Situation Assessment in Security-related Applications -- Virtual City Simulator for Education, Training, and Guidance -- Neurocomputing for Certain Bioinformatics Tasks -- Rough Set Based Solutions for Network Security -- Task Assignment with Dynamic Token Generation -- DyKnow: A Framework for Processing Dynamic Knowledge and Object Structures in Autonomous Systems -- Classifier Monitoring using Statistical Tests -- What Do We Learn When We Learn by Doing? …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 3
  4. 4

    Digital forensics basics : a practical guide using Windows OS by Hassan, Nihad A.

    Published: Apress, 2019
    Description: 1 online resource (xxii, 335 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  5. 5

    HP Nonstop server security : a practical handbook by Hill, Terri

    Published: Elsevier Digital Press, 2004
    Description: 1 online resource (xxxxiv, 616 pages).
    Contents: “…Gazette A to Z -- ADDUSER User Program -- AUDSERV System Program -- AXCEL User Program -- BACKCOPY System Utility -- BACKUP User Program -- Binder Subsystem -- BUSCMD System Utility -- $CMON System Program -- Compilers -- COUP System Utility -- CROSSREF User Program -- *CSTM Customization Files -- Data Build User Program -- DATA Loader/MP User Program -- DCOM System Utility -- Data Definition Language (DDL) Subsystem -- DEFAULT User Program -- DELUSER User Program -- Disk Processes -- DISKGEN System Utility -- Distributed Name Service (DNS) Subsystem -- DIVER System Utility -- DSAP User Program -- DSM/SCM Subsystem -- DSM/TC Subsystem -- ECHO User Program -- EDIT User Program -- EMS Subsystem -- EMSA Subsystem -- ENABLE User Program -- ENFORM Subsystem -- ERROR User Program -- Expand Subsystem -- FINGER System Utility -- File Transfer Protocols -- FUP System Utility -- INSPECT Subsystem -- Libraries, SRLs and Common Routines -- Licensed Files -- LISTNER System Utility -- LOGIN System Program -- LOGON User Program -- MEASURE Subsystem -- Native Link Editor (NLD) User Program -- Native Object File Tool (NOFT) User Program -- NETBATCH Subsystem -- NSKCOM System Utility -- Operating System -- PAK/UNPAK User Programs -- Password User Program -- Pathway Subsystem -- PCFORMAT User Program -- PEEK System Utility -- PING User Program -- PROGID'd Files -- PUP System Utility -- NonStop RDF Subsystem -- RESTORE User Program -- RPASSWRD User Program -- Safeguard Subsystem -- Subsystem Control Facility (SCF) -- Subsystem Control Point (SCP) -- SEEVIEW User Program -- SORT Subsystem -- Subsystem Programmatic Interface (SPI) --T.…”
    Elsevier - Click here for access
    eBook
  6. 6

    Advanced persistent training : take your security awareness program to the next level by Schroeder, Jordan

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  7. 7

    Computer safety, reliability, and security : 26th international conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007 : proceedings by SAFECOMP (Conference) Nuremberg, Germany), SpringerLink (Online service)

    Published: Springer, 2007
    Description: 1 online resource (x, 548 pages) : illustrations.
    Contents: “…Safety Cases -- Establishing Evidence for Safety Cases in Automotive Systems -- A Case Study -- Goal-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety -- Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety -- Future Perspectives: The Car and Its IP-Address -- A Potential Safety and Security Risk Assessment -- Modelling Interdependencies Between the Electricity and Information Infrastructures -- Poster Session 1 -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security Environments -- Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems -- RAMSS Analysis for a Co-operative Integrated Traffic Management System -- Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian Networks -- Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake System -- Compositional Temporal Fault Tree Analysis -- Representing Parameterised Fault Trees Using Bayesian Networks -- Human Error Analysis Based on a Semantically Defined Cognitive Pilot Model -- Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System -- Specification of a Software Common Cause Analysis Method -- Combining Bayesian Belief Networks and the Goal Structuring Notation to Support Architectural Reasoning About Safety -- Application of Interactive Cause and Effect Diagrams to Safety-Related PES in Industrial Automation -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy -- Defense-in-Depth and Diverse Qualification of Safety-Critical Software -- Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer -- Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different Approaches -- Modeling, Analysis and Testing of Safety Issues -- An Event-Based Approach and Case Study -- A Concept for a Safe Realization of a State Machine in Embedded Automotive Applications -- Safety Demonstration and Software Development -- Improving Test Coverage for UML State Machines Using Transition Instrumentation -- Verification of Distributed Applications -- Analysis of Combinations of CRC in Industrial Communication -- A Comparison of Partitioning Operating Systems for Integrated Systems -- Software Encoded Processing: Building Dependable Systems with Commodity Hardware -- Reliability Modeling for the Advanced Electric Power Grid -- Case Study on Bayesian Reliability Estimation of Software Design of Motor Protection Relay -- A Reliability Evaluation of a Group Membership Protocol -- Poster Session 3 -- Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity -- A Tool for Network Reliability Analysis -- DFT and DRBD in Computing Systems Dependability Analysis -- Development of Model Based Tools to Support the Design of Railway Control Applications -- Formal Specification and Analysis of AFDX Redundancy Management Algorithms -- Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts -- Using Deductive Cause-Consequence Analysis (DCCA) with SCADE -- Experimental Assessment of Astrée on Safety-Critical Avionics Software -- Detection of Runtime Errors in MISRA C Programs: A Deductive Approach -- A Taxonomy for Modelling Safety Related Architectures in Compliance with Functional Safety Requirements -- Controller Architecture for Safe Cognitive Technical Systems -- Improved Availability and Reliability Using Re-configuration Algorithm for Task or Process in a Flight Critical Software.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  8. 8

    CyberSecurity by Cambridge Educational (Firm), Films for the Humanities & Sciences (Firm), Infobase

    Published: Infobase, 2007
    Description: 1 streaming video file (21 min.) : sd., col., digital file + instructional materials (online)
    Films on Demand - Click here for access
    Video
  9. 9

    Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers by CRiSIS (Conference) Arcachon, France), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (x, 237 pages) : illustrations (some color).
    Contents: “…An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 10
  11. 11

    Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings by ICICS (Conference) Raleigh, N.C.), SpringerLink (Online service)

    Published: Springer, 2006
    Description: 1 online resource (xiv, 558 pages) : illustrations.
    Contents: “…Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert's RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit?…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 12

    Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals by Foster, James C.

    Published: Syngress Pub. ; Distributed by O'Reilly Media in the United States and Canada, 2005
    Description: 1 online resource (xxviii, 665 pages)
    Elsevier - Click here for access
    eBook
  13. 13

    Security informatics by SpringerLink (Online service)

    Published: Springer, 2010
    Description: 1 online resource (vii, 170 pages) : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  14. 14

    Advances in artificial intelligence and security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings. Part I by ICAIS (Conference) Dublin, Ireland), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xxx, 730 pages) : illustrations (some color).
    Contents: “…Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  15. 15

    Future data and security engineering : big data, security and privacy, smart city and Industry 4.0 applications : 10th International Conference, FDSE 2023, Da Nang, Vietnam, Novemb... by FDSE (Conference) Da Nang, Vietnam), SpringerLink (Online service)

    Published: Springer, 2023
    Description: 1 online resource (xv, 615 pages) : illustrations (some color).
    Contents: “…An experiment report -- Authenticating Parties in Blockchain-Enabled Inter-Organizational Processes with Configurable Challenge-Sets -- Differential Privacy for Consumer Data in Retail Data Partnerships -- Using transformer technique for intrusion detection -- Machine Learning and Artificial Intelligence for Security and Privacy -- A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks -- An Efficient Machine Learning-based Web Application Firewall with Deep Automated Pattern Categorization -- Utilizing InfoGAN and PE Header Features for Synthetic Ransomware Image Generation: An Experimental Study -- Enhancing Detection of Daily-Used Face Swap Applications by Using Focused Landmark Analysis -- Differential Privacy under Membership Inference Attacks -- Smart City and Industry 4.0 Applications -- LAVETTES: Large-scAle-dataset Vietnamese ExTractive TExt Summarization Models -- Exploring Links between Personality Traits and Environmental Attitudes with GreenBig5 System -- Study on Web Based Virtualized Containers for Software Development Lectures in BYOD -- Session-based Recommendation System Approach for Predicting Learning Performance -- A Fuzzy Logic Model for Digital Transformation Assessment of Vietnamese Higher Education Institutions -- Digital Transformation Insights from an AI Solution in Search of a Problem -- Improving Human Resources⁰́₉ Efficiency with A Generative AI-based Resume Analysis Solution -- LORAP: Local Deep Neural Network for Solar Radiation Prediction -- A Digital Therapeutics System for the Diagnosis and Management of Depression: Work in Progress -- BERT-based Sentence Recommendation for Building Vietnamese Universal Dependency Treebank -- Evaluate the Efficiency of Hybrid Model based on Convolutional Neural Network and Long Short-Term Memory in Information Technology Job Graph Network -- A Dataset of Vietnamese Documents for Text Detection -- Data Analytics and Healthcare Systems -- Personalized Stress Detection System Using Physiological Data from Wearable Sensors -- Vision Transformer for Kidney Stone Detection -- Attention Models and Image Pre-Processing For Covid- 19 Detection Based on Lung Ultrasound Images -- Deep Learning Techniques for Segmenting Breast Lesion Regions and Classifying Mammography Images -- Development of a Handwriting Drawings Assessment System for Early Parkinson⁰́₉s Disease Identification with Deep Learning Methods -- Breast Cancer Classification on Mammograms Using Vision Transformer -- Comparing Performance of Linear Regression Models Trained on Systemathic Forest Measurement Datasets to Predict Diameter at Breast Height -- Detection and Segmentation of Brain Tumors on 3D MR images Using 3D U-Net -- Short Papers: Security and Data Engineering -- Towards Automating Semantic Relationship Awareness in Operational Technology Monitoring -- Feature Fool Exploitation for Lightweight Anomaly Detection in Respiratory Sound -- Multiple Vehicles Detection and Tracking using Ground and Aerial Images for Vehicular Management System -- Deep Learning Approach for Tomato Leaf Disease Detection -- Invasive Ductal Carcinoma Classification from Whole Slide Image based on BRISQUE and Convolutional Neural Networks -- Robust and Accurate Automatic License Plate Recognition System -- Community Detection for Personalized Learning Pathway Recommendations on IT E-Learning System -- Improving Warped Planar Object Detection Network for Automatic License Plate Recognition.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  16. 16

    Smart computing and communication : first International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings by SmartCom (Conference : Smart computing and communication) Shenzhen Shi, China), SpringerLink (Online service)

    Published: Springer, 2017
    Description: 1 online resource (xiii, 589 pages) : illustrations.
    Contents: “…Bike-Sharing System: a Big-Data Perspective. -- Process mining of event log from web information and administration system for management of student's computer networks. -- A Virtual Network Embedding Algorithm based on Hybrid Particle Swarm Optimization -- Research on Content Distribution of P2P VoD with Cloud Assisting.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 17

    Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings by WASA (Conference) Tianjin, China), SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (XVIII, 910 pages) : illustrations.
    SpringerLink - Click here for access
    Conference Proceeding eBook