Search Results - (( Defined contribution ((pension plans) OR (pension plan)) ) OR ((( Defined ((distribution operational) OR (distribution computational)) plans ) OR ( Defined distribution torsion plans ))))

  1. 221

    Performance evaluation for network services, systems and protocols by Fernandes, Stênio

    Published: Springer, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  2. 222
  3. 223

    Integrated formal methods : 14th International Conference, IFM 2018, Maynooth, Ireland, September 5-7, 2018, Proceedings by International Conference on Integrated Formal Methods Maynooth, Ireland, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xvi, 420 pages) : illustrations.
    Contents: “…Dynamic Symbolic Execution for Software Analysis -- Integrating Formal Methods for Modeling and Simulation of Swarm Robotics -- Program Correctness Under Weak Memory Consistency -- On the Industrial Uptake of Formal Methods in the Railway Domain: A Survey with Stakeholders -- Reasoning About JML: Differences Between KeY and OpenJML -- Design and Verification of Restart-robust Industrial Control Software -- Efficiently Characterizing the Undefined Requests of a Rule-Based System -- Study of Integrating Random and Symbolic Testing for Object-Oriented Software -- Making Linearizability Compositional for Partially Ordered Executions -- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA -- A Precise Pictorial Language for Array Invariants -- Robotics and Integrated Formal Methods: Necessity Meets Opportunity -- Formal Modeling of Software Defined Networking -- Resource-Aware Virtually Timed Ambients -- Stateful Behavioral Types for Active Objects -- Probabilistic Verification of Timing Constraints in Automotive Systems Using UPPAAL-SMC -- Facilitating the Implementation of Distributed Systems with Heterogeneous Interactions -- State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin -- Towards A Formal Notion of Impact Metric for Cyber-physical Attacks -- Task Planning with OMT: An Application to Production Logistics -- Branching Temporal Logic of Calls and Returns for Pushdown Systems -- Repair and Generation of Formal Models Using Synthesis -- Mode-aware Concolic Testing for PLC Software -- Formalisation of SysML/KAOS Goal Assignments with B System Component Decompositions -- Analysing AWN-specifications Using mCRL2.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  4. 224

    Agents and artificial intelligence : third International Conference, ICAART 2011, Rome, Italy, January 28-30, 2011. Revised selected papers by ICAART (Conference) Rome, Italy), SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xiii, 444 pages) : illustrations (black and white).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  5. 225

    Algorithms and architectures for parallel processing : 21st International Conference, ICA3PP 2021, Virtual event, December 3-5, 2021, Proceedings. Part I by International Conference on Algorithms and Architectures for Parallel Processing Online, SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (835 pages).
    Contents: “…Deep Learning Models and Applications -- CRFST-GCN :A Deeplearning Spital-Temporal Frame to Predict Traffic Flow -- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images -- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction -- GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation -- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning -- Wasserstein Graph Auto-Encoder -- Fine-grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning -- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based On Bionic Neural Network -- Online Multiple Object Tracking Algorithm based on Heat Map Propagation -- Software Systems and Efficient Algorithms -- Spatio-temporal Topology Routing Algorithm for Opportunistic Network Based on Self-Attention Mechanism -- TSAEns: Ensemble Learning for KPI Anomaly Detection -- Towards Transferable Adversarial Examples using Meta Learning -- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades -- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC -- Parallel Cache Prefetching for LSM-Tree based Store: From Algorithm to Evaluation -- A Hybrid TLBO-TS Algorithm based Mobile Service Selection for Composite Services -- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSD -- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem -- Trace-Navi: A High-Accuracy Indoor Navigation System based on Real-Time Activity Recognition and Discrete Trajectory Calibration -- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-scale Scene -- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process -- A Multi-Precision Quantized Super-Resolution Model Framework -- An Optimized GPU Implementation of Weakly-compressible SPH using CUDA-based strategies -- A Heterogeneous Multi-Core Network-on-Chip Mapping Optimization Algorithm -- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-grained Classification -- Predicting Students Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective -- Motion-sequence Authentication System: guard for smart phones -- Edge Computing and Edge Intelligence -- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing -- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-assisted MEC -- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing -- An Optimized Greedy-based Task Offloading Method for Mobile Edge Computing -- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing -- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing against Collusion Attack -- MGFL: Multi-granularity Federated Learning in Edge Computing Systems -- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing -- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration -- Service Dependability and Security Algorithms -- Edge DDoS attack detection method based on software defined networks -- GradMFL: Gradient Memory-based Federated Learning for Hierarchical Knowledge Transferring over Non-IID Data -- Linear Coded Federated Learning -- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-assisted E-Healthcare Systems -- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning -- A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices -- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains -- A Novel Protection method of continuous location sharing based on local differential privacy and conditional random field -- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid -- Data Science -- Multi-Layer Adaptive Sampling for Per-Flow Spread Measurement -- Transformer-based Rating-Aware Sequential Recommendation -- An effective single-pass approach for estimating the Z-quantile in data streams -- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-IID Data in Federated Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  6. 226

    The HAZOP leader's handbook how to plan and conduct successful HAZOP studies by Eames, Phil

    Published: Elsevier, 2022
    Description: 1 online resource.
    Contents: “…-- 3.3.8 Schedule and deliverables -- 3.3.9 Report content and distribution -- 3.4 The HAZOP team -- 3.4.1 The core HAZOP roles -- 3.4.2 Additional roles (if you must) -- 3.4.3 Independent process engineer -- 3.4.4 Safety manager -- 3.4.5 Preparing the team -- 3.5 Node selection -- 3.5.1 Node selection for a continuous process -- 3.5.2 Nodes for complex systems -- 3.5.3 Different operating modes -- 3.5.4 Parallel trains -- 3.5.5 Study boundaries or interfaces -- 3.5.6 Node selection for batch and procedural HAZOP -- 3.6 Deviations from design intent.…”
    Elsevier - Click here for access
    Electronic eBook
  7. 227

    Pro Python Second edition. by Browning, J. Burton, Alchin, Marty

    Published: Apress, 2014
    Description: 1 online resource.
    Contents: “…Using __all __ to Customize Imports -- Relative Imports -- The __import__() function -- The importlib module -- Taking It With You -- Chapter 3: Functions -- Arguments -- Planning for Flexibility -- Variable Positional Arguments -- Variable Keyword Arguments -- Combining Different Kinds of Arguments -- Invoking Functions with Variable Arguments -- Preloading Arguments -- Introspection -- Example: Identifying Argument Values -- Example: A More Concise Version -- Example: Validating Arguments -- Decorators -- Closures -- Wrappers -- Decorators with Arguments -- Decorators with-or without-Arguments -- Example: Memoization -- Example: A Decorator to Create Decorators -- Function Annotations -- Example: Type Safety -- Factoring Out the Boilerplate -- Example: Type Coercion -- Annotating with Decorators -- Example: Type Safety as a Decorator -- Generators -- Lambdas -- Introspection -- Identifying Object Types -- Modules and Packages -- Docstrings -- Taking It with You -- Chapter 4: Classes -- Inheritance -- Multiple Inheritance -- Method Resolution Order -- Example: C3 Algorithm -- Using super() to Pass Control to Other Classes -- Introspection -- How Classes Are Created -- Creating Classes at Runtime -- Metaclasses -- Example: Plugin Framework -- Controlling the Namespace -- Attributes -- Properties -- Descriptors -- Methods -- Unbound Methods -- Bound Methods -- Class Methods -- Static Methods -- Assigning Functions to Classes and Instances -- Magic Methods -- Creating Instances -- Example: Automatic Subclasses -- Dealing with Attributes -- String Representations -- Taking It With You -- Chapter 5: Common Protocols -- Basic Operations -- Mathematical Operations -- Bitwise Operations -- Variations -- Numbers -- Sign Operations -- Comparison Operations -- Iterables -- Example: Repeatable Generators -- Sequences -- Mappings -- Callables.…”
    SpringerLink - Click here for access
    eBook
  8. 228

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  9. 229

    Pro SQL Server 2012 BI Solutions by Root, Randal, Mason, Caryn

    Published: Apress, 2012
    Description: 1 online resource (821 pages).
    SpringerLink - Click here for access
    eBook
  10. 230

    Advances in dependability engineering of complex systems : proceedings of the twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2-6, 2017,... by International Conference on Dependability of Computer Systems Brunów, Poland, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xvi, 488 pages).
    Contents: “…Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 231

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 232
  13. 233

    Autonomic network management principles : from concepts to applications by Agoulmine, Nazim

    Published: Academic Press/Elsevier, 2011
    Description: 1 online resource (xvii, 288 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  14. 234

    Beginning backup and restore for SQL Server : data loss management and prevention techniques by Beard, Bradley

    Published: Apress, 2018
    Description: 1 online resource : illustrations.
    SpringerLink - Click here for access
    eBook
  15. 235

    The coder's path to wealth and independence by Beckner, Mark

    Published: Apress, 2014
    Description: 1 online resource (1 volume) : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 236
  17. 237

    Enterprise Drupal 8 development : for advanced projects and large development teams by Tomlinson, Todd

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  18. 238

    Network security evaluation using the NSA IEM by ScienceDirect (Online service)

    Published: Syngress ; Distributed by O'Reilly Media in the United States and Canada, 2005
    Description: 1 online resource (xxvi, 437 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  19. 239

    CMMI for development : implementation guide by Chaudhary, Mukund, Chopra, Abhishek

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  20. 240

    Microsoft SharePoint : building Office 2007 solutions in VB 2005 by Hillier, Scot

    Published: Apress ; Distributed to the Book trade worldwide by Springer-Verlag, 2006
    Description: 1 online resource (xxv, 519 pages) : illustrations.
    SpringerLink - Click here for access
    eBook