Search Results - (( Defined contributors pensions plans ) OR ((((( Defined distributions applications plans ) OR ( Defined distribution properties bland ))) OR ( Defined distribution decision pass ))))*

Refine Results
  1. 1
  2. 2

    Software defined mobile networks (SDMN) : Beyond LTE network architecture by Liyanage, Madhusanka

    Published: Wiley, 2015
    Description: 1 online resource.
    Contents:
    Prospector EBC - Click here for access
    eBook
  3. 3

    Decentralized frameworks for future power systems operation, planning and control perspectives by ScienceDirect (Online service)

    Published: Academic Press, 2022
    Description: 1 online resource.
    Elsevier - Click here for access
    Electronic eBook
  4. 4

    Applications of fuzzy logic in planning and operation of smart grids by SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (vii, 229 pages) : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  5. 5
  6. 6

    Future intent-based networking : on the QoS robust and energy efficient heterogenous software defined networks by SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource : illustrations (some color).
    SpringerLink - Click here for access
    eBook
  7. 7
  8. 8

    Agents and multi-agent systems : technologies and applications 2021 : proceedings of 15th KES International Conference, KES-AMSTA 2021, June 2021 by KES-AMSTA (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xviii, 523 pages : illustrations (some color)).
    Contents: “…Learned Dynamics Models and Online Planning for Model-Based Animation Agents --…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 9

    Pro Apache JMeter : web application performance testing by Matam, Sai, Jain, Jagdeep

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  10. 10

    Hybrid Artificial Intelligent Systems : 8th International Conference, HAIS 2013, Salamanca, Spain, September 11-13, 2013 : proceedings by HAIS 2013 Salamanca, Spain, SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xx, 691 pages) : illustrations.
    Contents:
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 11
  12. 12

    Running mainframe z on distributed platforms : how to create robust cost-efficient multiplatform z environments by Barrett, Kenneth

    Published: Apress : Distributed by Springer Science+Business Media, 2014
    Description: 1 online resource (1 volume) : illustrations.
    Contents: “…Case 2: Server Class Machine Hosting Multiple Mainframe Systems for Software QA TestingChapter 3: Building the Hypervisor Host; Networking Design Considerations; Remote Access to the Physical Server; Network KVM; RAC; Network Connectivity Planning; Physical Network Connections; IP Configuration; Hard Drive Configuration; RAID Configuration Consideration; Other Storage Technologies; Installing the Linux Operating System; Network Time Protocol Server; File System Creation; Swap File System; Root File System; Virtual System Data; Software Packages; 3270 Application; Graphical FTP utility.…”
    SpringerLink - Click here for access
    eBook
  13. 13

    Collaborative computing : networking, applications and worksharing : 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11-13, 2017, Proceedings by International Conference on Collaborative Computing: Networking, Applications, and Worksharing Edinburgh, Scotland, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xviii, 731 pages) : illustrations.
    Contents: “…Sentiment Analysis of Chinese Words Using Word Embedding and Sentiment Morpheme Matching -- Collaborative and Green Resource Allocation in 5G HetNet With Renewable Energy -- On Cost Efficient Dataflow Computing Program Deployment in SDN Managed Distributed Computing Environment -- A Short Review of Constructing Noise Map using Crowdsensing Technology -- Research of Positioning Tracking on Dynamic Target Based on the integral complementing algorithm -- LWTP: An Improved Automatic Image Annotation Method Based on Image Segmentation -- A Comparative Analysis of Content Delivery Capability for Collaborative Dual-Architecture Network -- AXE: Objects Search in Mobile Volunteered Service 9 Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones -- Constrained Route Planning Based on the Regular Expression -- A Human-Machine Collaborative Detection Model for Identifying Web Attacks -- A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment -- p-Faster R-CNN algorithm for food detection PUED: A Social Spammer Detection Method Based on PU Learning and Ensemble Learning -- Position vs. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  14. 14
  15. 15

    Control of higher-dimensional PDEs : flatness and backstepping designs by Meurer, Thomas, Dipl.-Ing

    Published: Springer, 2013
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  16. 16
  17. 17

    Wireless algorithms, systems, and applications : 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings. Part III by WASA (Conference) Nanjing Shi, China), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xvi, 601 pages) : illustrations (some color).
    Contents: “…-Automated Honey Document Generation Using Genetic Algorithm -- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm -- Design and implementation of a real-time distributed precise point positioning platform -- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks -- Robust Estimator for NLOS Error Mitigation in TOA-based Localization -- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory -- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity -- Optimized Segment Routing Traffic Engineeringwith Multiple Segments -- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing -- Lightweight Threshold Private Set Intersection via Oblivious Transfer -- Person Re-identification Algorithm Based on Spatial Attention Network -- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs -- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory -- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism -- Application of Matrix-NMS in face detection and autonomous driving -- Blockchain-based verifiable DSSE with forward security in multi-server environments -- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM -- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices -- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization -- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning -- Multi-dimensional LSTM:A Model of NetworkText Classification -- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing -- Complex Task Allocation in Spatial Crowdsourcing: A Task Graph Perspective -- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology -- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles -- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations -- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks -- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network -- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network -- Deep Learning-Based Task Offloading for Vehicular Edge Computing -- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search -- The sensor-cloud system and node reliability analysis -- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN -- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network -- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks -- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds -- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks -- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks -- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks -- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy -- New Rectangle Attack Against SKINNY Block Cipher -- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach -- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms -- Social-Interaction GAN: Pedestrian Trajectory Prediction -- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing -- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update -- Research on Path Planning for Relay Drones with Multiple Constraints -- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing -- Authentication System Based on Fuzzy Extractors -- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme -- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions -- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles -- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction -- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN -- Blockchain Empowered Federated Learning for Medical Data Sharing Model -- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO -- GreenAP: An Energy-saving Protocol for Mobile Access Points -- A Robust Multi-Tenant Server Consolidation Algorithm -- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance -- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing -- An Edge-Cloud Collaborative Object Detection System -- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  18. 18

    Wireless algorithms, systems, and applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015 : proceedings by WASA (Conference) Qufu Shi, China), SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvii, 858 pages) : illustrations.
    Contents: “…Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based "Handprint" Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  19. 19

    Serious games and edutainment applications by SpringerLink (Online service)

    Published: Springer-Verlag London Ltd., 2011
    Description: 1 online resource (xvi, 504 pages) : illustrations (some color)
    SpringerLink - Click here for access
    eBook
  20. 20