Search Results - (( Defined contribution ((pension plans) OR (pension plan)) ) OR ((( Defined distribution operational plans ) OR ( Defined ((distribution decision) OR (distribution torsion)) plans ))))

  1. 221

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  2. 222
  3. 223

    Safety for future transport and mobility by Ross, Hans-Leo

    Published: Springer, 2021
    Description: 1 online resource (424 pages)
    Contents: “…2.1.1 Development of the Context -- 2.1.2 Identification of Risk -- 2.1.3 Assessment of the Risk in the Target Context -- 2.1.4 Development of a Strategy and Treatment of Potential Risk -- 2.1.5 Development and Defining of Activities and Their Objectives -- 2.1.6 Development of an Implementation and Realisation Strategy -- 2.1.7 Review and Evaluation of the Plan -- 2.2 Technical Risk -- 2.3 Risk in Road Traffic -- 2.3.1 Causes of Technical Risk -- 2.3.2 Control of Technical Risk -- 2.4 Standardisation of Safety for Road Vehicles -- 2.4.1 Risk and Integrity Definition from the IEC 61508.…”
    SpringerLink - Click here for access
    eBook
  4. 224

    Forest recreation 3rd ed. by Douglass, Robert W.

    Published: Pergamon Press, 1982
    Description: 1 online resource (x, 326 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  5. 225
  6. 226

    Springer handbook of mechanical engineering by SpringerLink (Online service)

    Published: Springer, 2009
    Description: 1 online resource.
    Contents: “…Equilibria -- First Law of Thermodynamics -- Second Law of Thermodynamics -- Exergy and Anergy -- Thermodynamics of Substances -- Changes of State of Gases and Vapors -- Thermodynamic Processes -- Ideal Gas Mixtures -- Heat Transfer -- Tribology -- Tribology -- Design of Machine Elements -- Mechanical Drives -- Gearings -- Cylindrical Gearings -- Bevel Gearings -- Worm Gearings -- Design of Gear Wheels, Worm Wheels, and Worms -- Planetary Gears -- Wave Gears -- Shafts and Axles -- Shaft-Hub Connections -- Rolling Bearings -- Design of Bearing Units -- Appendix A -- Appendix B -- Manufacturing Engineering -- Casting -- Metal Forming -- Machining Processes -- Assembly, Disassembly, Joining Techniques -- Rapid Prototyping and Advanced Manufacturing -- Precision Machinery Using MEMS Technology -- Measuring and Quality Control -- Quality Management -- Manufacturing Measurement Technology -- Measuring Uncertainty and Traceability -- Inspection Planning -- Further Reading -- Engineering Design -- Design Theory -- Basics -- Precisely Defining the Task -- Conceptual Design -- Design -- Design and Manufacturing for the Environment -- Failure Mode and Effect Analysis for Capital Goods -- Piston Machines -- Foundations of Piston Machines -- Positive Displacement Pumps -- Compressors -- Internal Combustion Engines -- Pressure Vessels and Heat Exchangers -- Pressure Vessel -- General Design Concepts -- Design of Tall Towers -- Testing Requirement -- Design Codes for Pressure Vessels -- Heat Exchangers -- Material of Construction -- Turbomachinery -- Theory of Turbomachinery Stages -- Gas Turbine Engines: Design and Dynamic Performance -- Transport Systems -- Overview -- Automotive Engineering -- Railway Systems -- Railway Engineering -- Aerospace Engineering -- Construction Machinery -- Basics -- Earthmoving, Road Construction, and Farming Equipment -- Machinery for Concrete Works -- Site Lifts -- Access Machinery and Equipment -- Cranes -- Equipment for Finishing Work -- Automation and Robotics in Construction -- Enterprise Organization and Operation -- Overview -- Organizational Structures -- Process Organization, Capabilities, and Supply Networks -- Modeling and Data Structures -- Enterprise Resource Planning (ERP) -- Manufacturing Execution Systems (MES) -- Advanced Organization Concepts -- Interorganizational Structures -- Organization and Communication -- Enterprise Collaboration and Logistics -- Complementary Material for Mechanical Engineers -- Power Generation -- Principles of Energy Supply -- Primary Energies -- Fuels -- Transformation of Primary Energy into Useful Energy -- Various Energy Systems and Their Conversion -- Direct Combustion System -- Internal Combustion Engines -- Fuel Cells -- Nuclear Power Stations -- Combined Power Station -- Integrated Gasification Combined Cycle (IGCC) System -- Magnetohydrodynamic (MHD) Power Generation -- Total-Energy Systems for Heat and Power Generation -- Transformation of Regenerative Energies -- Solar Power Stations -- Heat Pump -- Energy Storage and Distribution -- Furnaces -- Fluidized-Bed Combustion System -- Liquid-Fuel Furnace -- Burners -- General Furnace Accessories -- Environmental Control Technology -- Steam Generators -- Parts and Components of Steam Generator -- Energy Balance Analysis of a Furnace/Combustion System -- Performance of Steam Generator -- Furnace Design -- Strength Calculations -- Heat Transfer Calculation -- Nuclear Reactors -- Future Prospects and Conclusion -- Electrical Engineering -- Fundamentals -- Transformers -- Rotating Electrical Machines -- Power Electronics -- Electric Drives -- Electric Power Transmission and Distribution -- Electric Heating.…”
    SpringerLink - Click here for access
    eBook
  7. 227

    Beginning backup and restore for SQL Server : data loss management and prevention techniques by Beard, Bradley

    Published: Apress, 2018
    Description: 1 online resource : illustrations.
    SpringerLink - Click here for access
    eBook
  8. 228

    Trustworthy software development processes : International Conference on Software Process, ICSP 2009, Vancouver, Canada, May 16-17, 2009 : proceedings by International Conference on the Software Process Vancouver, B.C., SpringerLink (Online service)

    Published: Springer, 2009
    Description: 1 online resource (xiv, 412 pages) : illustrations.
    Contents: “…for the Process of Re-planning for Product Releases -- Overcoming the First Hurdle: Why Organizations Do Not Adopt CMMI -- Value-Based Multiple Software Projects Scheduling with Genetic Algorithm -- Process Tools -- Meta Model Based Architecture for Software Process Instantiation -- Distributed Orchestration Versus Choreography: The FOCAS Approach -- An Architecture for Modeling and Applying Quality Processes on Evolving Software -- Process Analysis -- Evaluating the Perceived Effect of Software Engineering Practices in the Italian Industry -- Evidence-Based Insights about Issue Management Processes: An Exploratory Study -- Process Aspect: Handling Crosscutting Concerns during Software Process Improvement -- Stochastic Process Algebra Based Software Process Simulation Modeling -- Process Simulation Modeling -- Combining Aspect and Model-Driven Engineering Approaches for Software Process Modeling and Execution -- Dynamic COQUALMO: Defect Profiling over Development Cycles -- A Hybrid Model for Dynamic Simulation of Custom Software Projects in a Multiproject Environment -- On the Relative Merits of Software Reuse -- Investigating the Gap between Quantitative and Qualitative/Semi-quantitative Software Process Simulation Models: An Explorative Study -- Experience Report -- Bridge the Gap between Software Test Process and Business Value: A Case Study -- Subcontracting Processes in Software Service Organisations -- An Experience Report -- On Reducing the Pre-release Failures of Web Plug-In on Social Networking Site -- Technical Software Development Process in the XML Domain -- Process Metrics -- Software Product Quality: Ensuring a Common Goal -- Predicting Upgrade Project Defects Based on Enhancement Requirements: An Empirical Study -- Process Modeling and Representation -- Incremental Process Modeling through Stakeholder-Based Hybrid Process Simulation -- A Process-Oriented Approach for the Optimal Satisficing of Non-Functional Requirements -- A Pattern for Modeling Rework in Software Development Processes -- Achieving On-Time Delivery: A Two-Stage Probabilistic Scheduling Strategy for Software Projects -- Incrementally Introducing Process Model Rationale Support in an Organization -- A Process for Driving Process Improvement in VSEs -- Modeling Software Evolution with Game Theory -- Structural Considerations in Defining Executable Process Models -- Analyzing a Software Process Model Repository for Understanding Model Evolution -- Process Trustworthiness as a Capability Indicator for Measuring and Improving Software Trustworthiness -- A System Dynamics Model That Simulates a Significant Late Life Cycle Manpower Increase Phenomenon.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 229

    Cybersecurity incident response : how to contain, eradicate, and recover from incidents by Thompson, Eric C.

    Published: Apress, 2018
    Description: 1 online resource (xv, 176 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  10. 230

    Climate change and its impacts : risks and inequalities by SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  11. 231
  12. 232
  13. 233

    Algorithms and architectures for parallel processing : 21st International Conference, ICA3PP 2021, Virtual event, December 3-5, 2021, Proceedings. Part I by International Conference on Algorithms and Architectures for Parallel Processing Online, SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (835 pages).
    Contents: “…Deep Learning Models and Applications -- CRFST-GCN :A Deeplearning Spital-Temporal Frame to Predict Traffic Flow -- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images -- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction -- GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation -- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning -- Wasserstein Graph Auto-Encoder -- Fine-grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning -- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based On Bionic Neural Network -- Online Multiple Object Tracking Algorithm based on Heat Map Propagation -- Software Systems and Efficient Algorithms -- Spatio-temporal Topology Routing Algorithm for Opportunistic Network Based on Self-Attention Mechanism -- TSAEns: Ensemble Learning for KPI Anomaly Detection -- Towards Transferable Adversarial Examples using Meta Learning -- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades -- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC -- Parallel Cache Prefetching for LSM-Tree based Store: From Algorithm to Evaluation -- A Hybrid TLBO-TS Algorithm based Mobile Service Selection for Composite Services -- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSD -- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem -- Trace-Navi: A High-Accuracy Indoor Navigation System based on Real-Time Activity Recognition and Discrete Trajectory Calibration -- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-scale Scene -- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process -- A Multi-Precision Quantized Super-Resolution Model Framework -- An Optimized GPU Implementation of Weakly-compressible SPH using CUDA-based strategies -- A Heterogeneous Multi-Core Network-on-Chip Mapping Optimization Algorithm -- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-grained Classification -- Predicting Students Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective -- Motion-sequence Authentication System: guard for smart phones -- Edge Computing and Edge Intelligence -- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing -- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-assisted MEC -- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing -- An Optimized Greedy-based Task Offloading Method for Mobile Edge Computing -- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing -- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing against Collusion Attack -- MGFL: Multi-granularity Federated Learning in Edge Computing Systems -- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing -- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration -- Service Dependability and Security Algorithms -- Edge DDoS attack detection method based on software defined networks -- GradMFL: Gradient Memory-based Federated Learning for Hierarchical Knowledge Transferring over Non-IID Data -- Linear Coded Federated Learning -- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-assisted E-Healthcare Systems -- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning -- A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices -- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains -- A Novel Protection method of continuous location sharing based on local differential privacy and conditional random field -- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid -- Data Science -- Multi-Layer Adaptive Sampling for Per-Flow Spread Measurement -- Transformer-based Rating-Aware Sequential Recommendation -- An effective single-pass approach for estimating the Z-quantile in data streams -- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-IID Data in Federated Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  14. 234

    Oracle high availability, disaster recovery, and cloud services : explore RAC, data guard, and cloud technology by Kumar, Y. V. Ravi, Basha, Nassyam, K. M., Krishna Kumar, Śarmā, Bālamukunda, 1889-1956, Kerekovski, Konstantin

    Published: Apress, 2019
    Description: 1 online resource : color illustrations.
    Contents: “…With this knowledge, end users will be able to make better decisions on how to build out their infrastructure in a resilient and fault tolerant way. …”
    SpringerLink - Click here for access
    eBook
  15. 235

    Microsoft SharePoint : building Office 2007 solutions in VB 2005 by Hillier, Scot

    Published: Apress ; Distributed to the Book trade worldwide by Springer-Verlag, 2006
    Description: 1 online resource (xxv, 519 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 236

    Microservices : science and engineering by SpringerLink (Online service)

    Published: Springer, 2020
    Description: 1 online resource (363 pages)
    Contents:
    SpringerLink - Click here for access
    eBook
  17. 237

    Serious games and edutainment applications by SpringerLink (Online service)

    Published: Springer-Verlag London Ltd., 2011
    Description: 1 online resource (xvi, 504 pages) : illustrations (some color)
    SpringerLink - Click here for access
    eBook
  18. 238

    Teacher empowerment toward professional development and practices : perspectives across borders by SpringerLink (Online service)

    Published: This Springer imprint is published by Springer Nature, 2017
    Description: 1 online resource (xv, 307 pages)
    SpringerLink - Click here for access
    eBook
  19. 239

    Wireless algorithms, systems, and applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015 : proceedings by WASA (Conference) Qufu Shi, China), SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvii, 858 pages) : illustrations.
    Contents: “…Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based "Handprint" Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  20. 240

    Pro Python Second edition. by Browning, J. Burton, Alchin, Marty

    Published: Apress, 2014
    Description: 1 online resource.
    Contents: “…Using __all __ to Customize Imports -- Relative Imports -- The __import__() function -- The importlib module -- Taking It With You -- Chapter 3: Functions -- Arguments -- Planning for Flexibility -- Variable Positional Arguments -- Variable Keyword Arguments -- Combining Different Kinds of Arguments -- Invoking Functions with Variable Arguments -- Preloading Arguments -- Introspection -- Example: Identifying Argument Values -- Example: A More Concise Version -- Example: Validating Arguments -- Decorators -- Closures -- Wrappers -- Decorators with Arguments -- Decorators with-or without-Arguments -- Example: Memoization -- Example: A Decorator to Create Decorators -- Function Annotations -- Example: Type Safety -- Factoring Out the Boilerplate -- Example: Type Coercion -- Annotating with Decorators -- Example: Type Safety as a Decorator -- Generators -- Lambdas -- Introspection -- Identifying Object Types -- Modules and Packages -- Docstrings -- Taking It with You -- Chapter 4: Classes -- Inheritance -- Multiple Inheritance -- Method Resolution Order -- Example: C3 Algorithm -- Using super() to Pass Control to Other Classes -- Introspection -- How Classes Are Created -- Creating Classes at Runtime -- Metaclasses -- Example: Plugin Framework -- Controlling the Namespace -- Attributes -- Properties -- Descriptors -- Methods -- Unbound Methods -- Bound Methods -- Class Methods -- Static Methods -- Assigning Functions to Classes and Instances -- Magic Methods -- Creating Instances -- Example: Automatic Subclasses -- Dealing with Attributes -- String Representations -- Taking It With You -- Chapter 5: Common Protocols -- Basic Operations -- Mathematical Operations -- Bitwise Operations -- Variations -- Numbers -- Sign Operations -- Comparison Operations -- Iterables -- Example: Repeatable Generators -- Sequences -- Mappings -- Callables.…”
    SpringerLink - Click here for access
    eBook