Search Results - (( Defined (contribution OR contributorss) ((pensions plans) OR (pension plans)) ) OR ((( Defined distribution ((((operation plan) OR (operations plan))) OR (((operating plan) OR (operating a)))) ) OR ( Defined distribution erosion plans ))))
-
341
Fund custody and administration
Published: Elsevier/Academic Press, 2016Contents: “…Regulation and directivesAIFMD and AIFMs; EEA Firms; Retail funds; UCITS Directive; Money laundering; Principles and recommendations; Fund Structures-Companies, Trusts, Partnerships, Common Funds; Fund of funds; Multimanager funds; Other structures; Retail funds; Alternative Investment Funds; Hedge funds; Open Ended and Closed Funds; Fund Jurisdictions; Key Players in the Operation of a Fund; Retail/mutual fund custodian; Fund administration; Prime broker/brokers; Setting up a Fund; Outsourcing; Documentation and agreements; Summary; Part 3 -- The Day-to-Day Operation of a Fund; Introduction.…”Description: 1 online resource (xxiii, 319 pages) : illustrations.
Elsevier - Click here for access
eBook -
342
Advanced software engineering : expanding the frontiers of software technology
Published: Springer, 2006SpringerLink - Click here for accessDescription: 1 online resource (170 pages) : illustrations.
Conference Proceeding eBook -
343
Mobile, Secure, and Programmable Networking : 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, Revised Selected Papers
Published: Springer, 2019SpringerLink - Click here for accessDescription: 1 online resource (xiii, 277 pages) : illustrations (some color).
Conference Proceeding eBook -
344
Big data for dummies
Published: Wiley, 2013Contents: “…Grasping the fundamentals of big data -- Examining big data types -- Old meets new: distributed computing -- Digging into the big data technology components -- Virtualization and how it supports distributed computing -- Examining the cloud and big data -- Operational databases -- MapReduce fundamentals -- Exploring the world of Hadoop -- The Hadoop foundation and ecosystem -- Appliances and big data warehouses -- Defining big data analytics -- Understanding text analytics and big data -- Customized approaches for analysis of big data -- Integrating data sources -- Dealing with real-time data streams and complex event processing -- Operationalizing big data -- Applying big data within your organization -- Security and governance for big data environments -- The importance of big data to business -- Analyzing data in motion: a real-world view -- Improving business processes with big data analytics: a real-world view -- Ten big data best practices -- Ten great big data resources -- Ten big data do's and don'ts.…”Description: 1 online resource (xii, 312 pages) : illustrations.
Prospector EBL - Click here for access
Electronic eBook -
345
Computer safety, reliability, and security : 26th international conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007 : proceedings
Published: Springer, 2007Contents: “…Safety Cases -- Establishing Evidence for Safety Cases in Automotive Systems -- A Case Study -- Goal-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety -- Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety -- Future Perspectives: The Car and Its IP-Address -- A Potential Safety and Security Risk Assessment -- Modelling Interdependencies Between the Electricity and Information Infrastructures -- Poster Session 1 -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security Environments -- Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems -- RAMSS Analysis for a Co-operative Integrated Traffic Management System -- Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian Networks -- Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake System -- Compositional Temporal Fault Tree Analysis -- Representing Parameterised Fault Trees Using Bayesian Networks -- Human Error Analysis Based on a Semantically Defined Cognitive Pilot Model -- Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System -- Specification of a Software Common Cause Analysis Method -- Combining Bayesian Belief Networks and the Goal Structuring Notation to Support Architectural Reasoning About Safety -- Application of Interactive Cause and Effect Diagrams to Safety-Related PES in Industrial Automation -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy -- Defense-in-Depth and Diverse Qualification of Safety-Critical Software -- Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer -- Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different Approaches -- Modeling, Analysis and Testing of Safety Issues -- An Event-Based Approach and Case Study -- A Concept for a Safe Realization of a State Machine in Embedded Automotive Applications -- Safety Demonstration and Software Development -- Improving Test Coverage for UML State Machines Using Transition Instrumentation -- Verification of Distributed Applications -- Analysis of Combinations of CRC in Industrial Communication -- A Comparison of Partitioning Operating Systems for Integrated Systems -- Software Encoded Processing: Building Dependable Systems with Commodity Hardware -- Reliability Modeling for the Advanced Electric Power Grid -- Case Study on Bayesian Reliability Estimation of Software Design of Motor Protection Relay -- A Reliability Evaluation of a Group Membership Protocol -- Poster Session 3 -- Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity -- A Tool for Network Reliability Analysis -- DFT and DRBD in Computing Systems Dependability Analysis -- Development of Model Based Tools to Support the Design of Railway Control Applications -- Formal Specification and Analysis of AFDX Redundancy Management Algorithms -- Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts -- Using Deductive Cause-Consequence Analysis (DCCA) with SCADE -- Experimental Assessment of Astrée on Safety-Critical Avionics Software -- Detection of Runtime Errors in MISRA C Programs: A Deductive Approach -- A Taxonomy for Modelling Safety Related Architectures in Compliance with Functional Safety Requirements -- Controller Architecture for Safe Cognitive Technical Systems -- Improved Availability and Reliability Using Re-configuration Algorithm for Task or Process in a Flight Critical Software.…”Description: 1 online resource (x, 548 pages) : illustrations.
SpringerLink - Click here for access
Conference Proceeding eBook -
346
Software architectures and tools for computer aided process engineering
Published: Elsevier, 2002Elsevier - Click here for accessDescription: 1 online resource (xii, 700 pages) : illustrations.
eBook -
347
Geomorphology and natural hazards : proceedings of the 25th Binghamton Symposium in Geomorphology, held September 24-25, 1994 at SUNY, Binghamton, USA
Published: Elsevier, 1994Elsevier - Click here for accessDescription: 1 online resource (x, 355 pages) : illustrations, maps.
Conference Proceeding eBook -
348
Spatio-temporal data streams
Published: Springer, 2016Contents: “…2.5 Implementation2.5.1 User-Defined Aggregate Functions; 2.5.2 SQL-Like Language Embedding: CSQL; References; 3 Spatio-Temporal Data Streams and Big Data Paradigm; 3.1 Background; 3.2 MobyDick -- A Prototype of Distributed Framework #x83;; 3.2.1 Data Model; 3.2.2 Apache Flink; 3.2.3 Spatio-Temporal Queries; 3.3 Related Work; 3.3.1 Distributed Spatial and Spatio-Temporal Batch Systems; 3.3.2 Centralized DSMS-Based Systems; 3.3.3 Distributed DSMS-Based Systems; 3.4 Final Remarks; References; 4 Spatio-Temporal Data Stream Clustering; 4.1 Introduction; 4.1.1 Spatio-Temporal Clustering.…”Description: 1 online resource (xiv, 107 pages) : illustrations.
SpringerLink - Click here for access
eBook -
349
Sources in the development of mathematics : infinite series and products from the fifteenth to the twenty-first century
Published: Cambridge University Press, 2011Contributor biographical informationDescription: xix, 974 pages : illustrations ; 26 cm.
Publisher description
Table of contents only
Book -
350
Network convergence : Ethernet applications and next generation packet transport architectures
Published: Morgan Kaufmann, 2013Elsevier - Click here for accessDescription: 1 online resource.
eBook -
351
Breaking the Wall of Tropical Diseases How the Tropical Laboratory Initiative Is Increasing Access to Health Care in Low-Resource Countries
Published: Infobase, 2013Films on Demand - Click here for accessDescription: 1 streaming video file (17 min.) : sd., col.
Video -
352
CyberSecurity
Published: Infobase, 2007Films on Demand - Click here for accessDescription: 1 streaming video file (21 min.) : sd., col., digital file + instructional materials (online)
Video -
353
Mathematical analysis in interdisciplinary research
Published: Springer, 2022Contents: “…Gal) -- Variational Inequalities and General Equilibrium models (Milasi) -- The strong convergence of Douglas-Rachford methods for the split feasibility problem (Dong) -- Some Triple Integral Inequalities for Functions Defined on 3-Dimensional Bodies Via Gauss-Ostrogradsky Identity (Dragomir) -- Optimal emergency evacuation with uncertainty (Scrimali) -- On Global Hyperbolicity of Spacetimes: Some Recent Advances and Open Problems (Papadopoulos) -- Spectrum Perturbations of Linear Operators in a Banach Space (Gil) -- Perturbations of Operator Functions. …”Description: 1 online resource (1 volume) : illustrations (black and white, and color).
SpringerLink - Click here for access
eBook -
354
Oracle high availability, disaster recovery, and cloud services : explore RAC, data guard, and cloud technology
Published: Apress, 2019SpringerLink - Click here for accessDescription: 1 online resource : color illustrations.
eBook -
355
C quick syntax reference
Published: Apress, 2015SpringerLink - Click here for accessDescription: 1 online resource (xv, 75 pages).
eBook -
356
Automated workflow scheduling in self-adaptive clouds : concepts, algorithms and methods
Published: Springer, 2017SpringerLink - Click here for accessDescription: 1 online resource.
eBook -
357
Beginning Python visualization : crafting visual transformation scripts Second edition.
Published: Apress, 2014Contents: “…CygwinVirtual Machines; Choosing an Operating System; Then Again, Why Choose? Using Several Operating Systems; The Python Environment; Versions; Python; Python Distributions with Scientific Packages; Python Integrated Development Environments; IDLE; IPython; IPython Notebook; Spyder; Scientific Computing; NumPy; SciPy; Matplotlib; Image Processing; PySerial; Manually Installing a Python Package; Installation Summary; Additional Applications; Editors; Selecting the Proper Editor for You; A Short List of Text Editors; Spreadsheets; Word Processors; Image Viewers; Version-Control Systems.…”Description: 1 online resource (xxvii, 385 pages) : illustrations.
SpringerLink - Click here for access
eBook -
358
Transitioning to Swift
Published: Apress, 2014SpringerLink - Click here for accessDescription: 1 online resource (xv, 240 pages) : illustrations.
eBook -
359
Mac programming for absolute beginners
Published: Apress ; Distributed to the Book trade worldwide by Springer Science+Business Media, 2011SpringerLink - Click here for accessDescription: 1 online resource (xvi, 398 pages) : illustrations.
eBook -
360
Modernization of electric power systems : energy efficiency and power quality
Published: Springer, 2023Contents: SpringerLink - Click here for accessDescription: 1 online resource.
eBook