Search Results - (( Defined (contribution OR contributorss) pension plant ) OR ((( Defined distribution ((operation plan) OR (((operating plan) OR (operating a)))) ) OR ( Defined distribution erosion plans ))))

  1. 241

    Network convergence : Ethernet applications and next generation packet transport architectures by Joseph, Vinod

    Published: Morgan Kaufmann, 2013
    Description: 1 online resource.
    Elsevier - Click here for access
    eBook
  2. 242
  3. 243

    CyberSecurity by Cambridge Educational (Firm), Films for the Humanities & Sciences (Firm), Infobase

    Published: Infobase, 2007
    Description: 1 streaming video file (21 min.) : sd., col., digital file + instructional materials (online)
    Films on Demand - Click here for access
    Video
  4. 244

    Mathematical analysis in interdisciplinary research by SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (1 volume) : illustrations (black and white, and color).
    Contents: “…Gal) -- Variational Inequalities and General Equilibrium models (Milasi) -- The strong convergence of Douglas-Rachford methods for the split feasibility problem (Dong) -- Some Triple Integral Inequalities for Functions Defined on 3-Dimensional Bodies Via Gauss-Ostrogradsky Identity (Dragomir) -- Optimal emergency evacuation with uncertainty (Scrimali) -- On Global Hyperbolicity of Spacetimes: Some Recent Advances and Open Problems (Papadopoulos) -- Spectrum Perturbations of Linear Operators in a Banach Space (Gil) -- Perturbations of Operator Functions. …”
    SpringerLink - Click here for access
    eBook
  5. 245

    C quick syntax reference by Olsson, Mikael (Web programmer)

    Published: Apress, 2015
    Description: 1 online resource (xv, 75 pages).
    SpringerLink - Click here for access
    eBook
  6. 246

    Beginning Python visualization : crafting visual transformation scripts Second edition. by Vaingast, Shai

    Published: Apress, 2014
    Description: 1 online resource (xxvii, 385 pages) : illustrations.
    Contents: “…CygwinVirtual Machines; Choosing an Operating System; Then Again, Why Choose? Using Several Operating Systems; The Python Environment; Versions; Python; Python Distributions with Scientific Packages; Python Integrated Development Environments; IDLE; IPython; IPython Notebook; Spyder; Scientific Computing; NumPy; SciPy; Matplotlib; Image Processing; PySerial; Manually Installing a Python Package; Installation Summary; Additional Applications; Editors; Selecting the Proper Editor for You; A Short List of Text Editors; Spreadsheets; Word Processors; Image Viewers; Version-Control Systems.…”
    SpringerLink - Click here for access
    eBook
  7. 247
  8. 248

    Transitioning to Swift by Gardner, Scott

    Published: Apress, 2014
    Description: 1 online resource (xv, 240 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  9. 249

    Mac programming for absolute beginners by Wang, Wally

    Published: Apress ; Distributed to the Book trade worldwide by Springer Science+Business Media, 2011
    Description: 1 online resource (xvi, 398 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  10. 250

    Modernization of electric power systems : energy efficiency and power quality by SpringerLink (Online service)

    Published: Springer, 2023
    Description: 1 online resource.
    Contents:
    SpringerLink - Click here for access
    eBook
  11. 251
  12. 252

    Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers by CRiSIS (Conference) Arcachon, France), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource (x, 237 pages) : illustrations (some color).
    Contents: “…An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 253

    Documentary Film Festivals Vol. 1 Methods, History, Politics 1st ed. 2020. by SpringerLink (Online service)

    Published: Springer International Publishing, Imprint Palgrave Macmillan. 2020
    Description: 1 online resource (XXV, 296 pages 18 illustrations, 13 illustrations in color.) : online resource.
    SpringerLink - Click here for access
    Electronic eBook
  14. 254

    Complex analysis in Banach spaces : holomorphic functions and domains of holomorphy in finite and infinite dimensions by Mujica, Jorge, 1946-

    Published: North-Holland ; Sole distributors for the U.S.A. and Canada, Elsevier Science Pub. Co., 1986
    Description: 1 online resource (xi, 434 pages).
    Elsevier - Click here for access
    eBook
  15. 255

    High performance computing : ISC High Performance Digital 2021 International Workshops, Frankfurt am Main, Germany, June 24-July 2, 2021, Revised Selected Papers by ISC High Performance (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xiii, 515 pages) : illustrations (some color).
    Contents: “…Second International Workshop on the Application of Machine Learning Techniques to Computational Fluid Dynamics and Solid Mechanics Simulations and Analysis -- Machine-Learning-Based Control of Perturbed and Heated Channel Flows -- Novel DNNs for Stiff ODEs with Applications to Chemically Reacting Flows -- Lettuce: PyTorch-based Lattice Boltzmann Framework -- Reservoir computing in reduced order modeling for chaotic dynamical systems -- Film cooling prediction and optimization based on deconvolution neural network -- Turbomachinery Blade Surrogate Modeling using Deep Learning -- A Data-driven Wall-shear Stress Model for LES using Gradient Boosted Decision Trees -- Nonlinear mode decomposition and reduced-order modeling for three-dimensional cylinder flow by distributed learning on Fugaku -- Using physics-informed enhanced super-resolution generative adversarial networks to reconstruct mixture fraction statistics of turbulent jet flows -- HPC I/O in the Data Center -- Toward a Workflow for Identifying Jobs with Similar I/O Behavior Utilizing Time Series Analysis -- H3: An Application-Level, Low-Overhead Object Store -- Compiler-assisted Correctness Checking and Performance Optimization for HPC -- Automatic partitioning of MPI operations in MPI+OpenMP applications -- heimdallr: Improving Compile Time Correctness Checking for Message Passing with Rust -- Potential of Interpreter Specialization for Data Analysis -- Refactoring for Performance with Semantic Patching: Case Study with Recipes -- Negative Perceptions About the Applicability of Source-to-Source Compilers in HPC: A Literature Review -- Machine Learning on HPC Systems -- Automatic Tuning of Tensorflow's CPU Backend using Gradient-Free Optimization Algorithms -- MSM: Multi-Stage Multicuts for Scalable Image Clustering -- OmniOpt -- a tool for hyperparameter optimization on HPC -- Parallel/distributed intelligent hyperparameters search for GANs -- Machine learning for generic energy models of high performance computing resources -- Fourth International Workshop on Interoperability of Supercomputing and Cloud Technologies -- Automation for Data-Driven Research with the NERSC Superfacility API -- A Middleware Supporting Data Movement inComplex and Software-Defined Storage and Memory Architectures -- Second International Workshop on Monitoring and Operational Data Analytics -- An Operational Data Collecting and Monitoring Platform for Fugaku: System Overviews and Case Studies in the Prelaunch Service Period -- An Explainable Model for Fault Detection in HPC Systems -- Sixteenth Workshop on Virtualization in HighƯ-Performance Cloud Computing -- A Scalable Cloud Deployment Architecture for High-Performance Real-Time Online Interactive Applications -- Leveraging HW approximation for exploiting performance-energy trade-offs within the edge-cloud computing continuum -- Datashim and its applications in Bioinformatics -- FaaS and Curious: Performance implications of serverless functions on edge computing platforms -- Differentiated performance in NoSQL database access for hybrid Cloud-HPC workloads -- Deep Learning on Supercomputers -- JUWELS Booster -- A Supercomputer for Large-Scale AI Research -- Fifth International Workshop on In Situ Visualization -- In Situ Visualization of WRF Data using Universal Data Junction -- Catalyst Revised: Rethinking the ParaView In Situ Analysis and Visualization API -- Fides: A General Purpose Data Model Library for Streaming Data.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  16. 256
  17. 257

    Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings by ICICS (Conference) Raleigh, N.C.), SpringerLink (Online service)

    Published: Springer, 2006
    Description: 1 online resource (xiv, 558 pages) : illustrations.
    Contents: “…Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert's RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit?…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  18. 258
  19. 259

    Proceedings of fifth International Conference on Soft Computing for Problem Solving : SocProS 2015. Volume 1 by International Conference on Soft Computing for Problem Solving Roorkee, India, SpringerLink (Online service)

    Published: Springer, 2016
    Description: 1 online resource (xix, 1063 pages) : illustrations.
    Contents: “…Optimization of Non Local Means Filtering Technique for Denoising Magnetic Resonance Images: A Review -- Chapter 2. A Production Model with Stock Dependent Demand, Partial Backlogging, Weibull Distribution Deterioration and Customer Returns -- Chapter 3. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  20. 260

    Consumer driven electronic transformation : applying new technologies to enthuse consumers and transform the supply chain by SpringerLink (Online service)

    Published: Springer, 2005
    Description: 1 online resource (x, 256 pages) : illustrations.
    Contents: “…Emerging Techniques and Technologies for Supply Chain Management -- Improvement Opportunities in Retail Logistics -- A Dynamic Real-Time Vehicle Routing System for Distribution Operations -- Bargaining and Alliances in Supply Chains -- Last-Mile Supply Chain Integration: Easy Connection and Information Exchange between Suppliers and Retailers -- Multichannel Retailing: Relationships, Integration and Electronic Transformation -- Multichannel Retailing and Brand Policies -- Designing Alternative Store Layouts for Internet Retailing -- In Search for Viable e-Solutions -- Beyond CPFR: Defining the Future of Supply Chain Collaboration -- On Shelf Availability: An Examination of the Extent, the Causes, and the Efforts to Address Retail Out-of-Stocks -- Increasing Shelf Availability Through Internet-Based Information Sharing and Collaborative Store Ordering -- Towards the Development of an Algorithm to Discover Out-Of-Shelf Situations -- Food Value Chain Analysis -- Extending ECR into Product Innovation -- Beyond RFID: Supporting Supply Chain Management with Intelligent Tagging -- Turning Signals into Profits in the RFID-Enabled Supply Chain -- Shopping in the 21st Century: Embedding Technology in the Retail Arena -- Towards 'smarter' Supply and Demand-Chain Collaboration Practices Enabled by RFID Technology.…”
    SpringerLink - Click here for access
    eBook