GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Industrial engineering. ; Metaheuristics. ; Scheduling. ; Management science. ; Metaheuristik. ; Produktionsplanung. ; Reihenfolgeproblem. ; Electronic books.
    Description / Table of Contents: This volume presents meta-heuristics approaches for scheduling problems arising in industrial and manufacturing applications. The present volume is the first book on scheduling problems in Grid, P2P and other Emergent Computational Systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (362 pages)
    Edition: 1st ed.
    ISBN: 9783540789857
    Series Statement: Studies in Computational Intelligence Series ; v.128
    DDC: 620
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer networks-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1217 pages)
    Edition: 1st ed.
    ISBN: 9783030150358
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.927
    DDC: 004.6
    Language: English
    Note: Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshop Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Welcome Message from FINA-2019 Symposium Co-chairs -- FINA-2019 Organizing Committee -- FINA-2019 Symposium Co-chairs -- Program Committee Members -- Welcome Message from HWISE-2019 International Workshop Co-chairs -- Workshop Co-chairs -- Advisory Co-chairs -- Program Committee Members -- Web Administrator Co-chairs -- Welcome Message from MAW-2019 International Symposium Co-chairs -- MAW-2019 Organizing Committee -- Symposium Organizers -- Program Committee Members -- Welcome Message from BICom-2019 International Workshop Co-chairs -- BICom-2019 Organizing Committee -- Workshop Co-chairs -- Advisory Co-chairs -- Program Committee Members -- Web Administrator Co-chairs -- Welcome Message from TeNAS-2019 Workshop Organizers -- TeNAS-2019 Organizing Committee -- Steering Committee Chair -- General Co-chairs -- Program Co-chairs -- Program Committee Members -- Welcome Message from IWDENS-2019 Workshop Organizers -- IWDENS-2019 Organizing Committee -- Program Co-chairs -- Program Committee Members -- Welcome Message from COLLABES-2019 International Workshop Organizer -- COLLABES-2019 Organizing Committee -- Workshop Organizer -- Program Committee Members -- Welcome Message from INTRICATE-SEC-2019 Workshop Chair -- INTRICATE-SEC-2019 Organizing Committee -- Workshop Chair. , Program Committee Members -- Welcome Message from E3WSN-2019 International Workshop Co-chairs -- E3WSN-2019 Organizing Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from WITIN-2019 International Workshop Organizers -- WITIN-2019 Organizing Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from BOSON-2019 International Workshop Chair -- BOSON-2019 Organizing Committee -- Workshop Chair -- Workshop Program Committee Co-chairs -- Program Committee Members -- Welcome Message from IOEMLA-2019 International Workshop Co-chair -- IOEMLA-2019 Organizing Committee -- Workshop Co-chair -- Program Committee Members -- Welcome Message from M2EC-2019 Workshop Organizers -- General Co-chairs -- Publicity Chairs -- Program Committee Members -- Welcome Message from AIMAL-2019 Workshop Chair -- AIMAL-2019 Organizing Committee -- Workshop Chair -- Program Committee Members -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search -- Contents -- The 15th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2019) -- Adaptive Waveform Design of Polarimetric Radar for Extended Targets in Signal-Dependent Clutter -- 1 Introduction -- 2 System Model -- 3 Problem Formulation -- 4 Transmit Code and Receive Filter Design -- 4.1 Receive Filter Optimization: Solution to Problem Pw(m) -- 4.2 Radar Code Optimization: Solution to Problem Ps(m) -- 4.3 Transmit-Receive System Design: Optimization Procedure -- 5 Numerical Results -- 5.1 Monotonic Property of the Proposed Method -- 5.2 SINR Behavior vs. TAA Uncertainty Interval -- 6 Conclusions -- References -- CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology -- Abstract -- 1 Introduction. , 2 System Structure -- 3 Description of CRAWL Algorithm -- 3.1 Algorithmic Process -- 3.2 Path Blocking and Recovery -- 4 CDM Algorithm -- 5 Experimental Results and Analysis -- 5.1 Method Realization -- 5.2 Parameter Settings -- 5.3 Routing Message Overhead -- 5.4 Content Matching Overhead -- 6 Conclusion -- References -- Design and Implementation of IoT Based Class Attendance Monitoring System Using Computer Vision and Embedded Linux Platform -- Abstract -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Proposed Approach -- 5 Hardware Requirements -- 5.1 Raspberry Pi 3 Model B -- 5.2 Pi Camera -- 6 Software and Algorithm -- 6.1 OpenCV -- 6.2 Haar Cascade Classifier Algorithm -- 6.3 Python -- 6.4 Numpy -- 6.5 Flask Framework -- 6.6 HTML and Bootstrap -- 7 Experimental Result -- 8 Conclusion -- Acknowledgement -- References -- An Indoor 3D Positioning Technology Based on NB-IoT -- Abstract -- 1 Introduction -- 2 The Advantages and Deployment of NB-IoT -- 2.1 The Advantages of NB-IoT -- 2.2 NB-IoT Deployment Method -- 2.3 NB-IoT Physical Layer Frame Structure -- 3 Location Algorithm -- 3.1 Delay Estimation -- 3.1.1 Calculation of Arrival Time -- 3.1.2 Cycle Estimation -- 3.2 Non-Line-of-Sight Error Optimization -- 3.2.1 Original CLS Algorithm -- 3.2.2 CLS Algorithm for Lagrange Multiplier [9] -- 3.3 Height Estimation -- 4 Conclusion -- Acknowledgements -- References -- Consideration of Implementation Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain -- Abstract -- 1 Introduction -- 2 Motivation and Related Research -- 3 Existing DACS SCHEME and wDACS System -- 3.1 Basic Principle of the DACS Scheme -- 3.2 Communication Control on Client -- 3.3 Security Mechanism of the DACS Scheme -- 3.4 The Cloud Type Virtual PBNM for the Common Use Between Plural Organizations. , 4 Consideration of Implementation Method for the Scheme to Manage the Specific Domain -- 4.1 Concept of the Scheme to Manage the Specific Domain -- 4.2 Implementation Method for the Scheme to Manage the Specific Domain -- 5 Conclusion -- Acknowledgments -- References -- A Model of Virtual Machines to Support Storage Processes -- 1 Introduction -- 2 System Model -- 2.1 Virtual Machines -- 2.2 Clones -- 3 Experiments -- 4 A Model of Storage Applications on Virtual Machines -- 5 Concluding Remarks -- References -- Energy Efficient Scheduling of Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 4.1 Appliances Categories -- 4.2 Problem Formulation -- 5 Scheduling Techniques -- 5.1 Strawberry Algorithm (SA) -- 5.2 Salp Swarm Algorithm (SSA) -- 5.3 IAPR -- 6 Simulation Results and Discussions -- 7 Conclusion and Future Work -- References -- Minimizing Daily Cost and Maximizing User Comfort Using a New Metaheuristic Technique -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 SBA -- 5.2 EWA -- 5.3 Proposed -- 6 Simulation Results and Discussion -- 6.1 Pricing Tariff -- 7 Conclusion -- References -- Efficiency Analysis of TFHE Fully Homomorphic Encryption Software Library Based on GPU -- Abstract -- 1 Introduction -- 2 Preliminary -- 2.1 Algorithm -- 2.2 GPU Parallel Computing -- 3 TFHE Library Debug and Analysis -- 3.1 TFHE Library -- 3.2 TFHE Library Installation and Debugging -- 3.3 TFHE Library Debug Process -- 4 cuFHE Library Debugging and Analysis -- 4.1 cuFHE Library -- 4.2 cuFHE Library Installation and Debugging -- 4.3 cuFHE Library Debug Process -- 5 Performance Analysis -- 6 Conclusion -- References -- NADEEM: A Novel Reliable Data Delivery Routing Protocol for Underwater WSNs -- 1 Introduction. , 2 Related Work and Problem Statement -- 3 Proposed System Model -- 3.1 UWSNs Propagation Model -- 4 Proposed Work -- 4.1 Dissemination of Beacon Message -- 4.2 The FA-NADEEM -- 4.3 The TA-NADEEM -- 5 Simulation Results and Discussion -- 5.1 Performance Control Parameters -- 5.2 Fraction of Local Maximum Nodes -- 5.3 Packet Delivery Ratio -- 5.4 Energy Consumption -- 6 Conclusion -- References -- An Architecture for Distributed Ledger-Based M2M Auditing for Electric Autonomous Vehicles -- 1 Introduction -- 2 Platform Architecture -- 2.1 Physical Layer -- 2.2 Network Layer -- 2.3 Services Layer -- 3 Unmanned EAV Charging -- 4 Research Challenges -- 5 Threat Model -- 6 Conclusions -- References -- Is QUIC Quicker Than TCP? -- 1 Introduction -- 1.1 Contribution -- 1.2 Paper Organization -- 2 Related Work -- 3 Background -- 3.1 Transport Control Protocol (TCP) -- 3.2 Quick UDP Internet Connections (QUIC) -- 4 Methodology -- 5 Analysis -- 5.1 Generate Raw Data -- 5.2 Data Analysis -- 5.3 Visualization -- 6 Conclusions -- 7 Future Work -- References -- PRAN: A Provenance Based Model and Prototype to Strengthen Authentication -- Abstract -- 1 Introduction -- 1.1 Motivation and Contributions -- 2 Problem Statement -- 3 Related Work -- 4 Provenance Based Authentication Model -- 4.1 Authentication Provenance -- 4.2 Policy Model -- 5 Prototype -- 5.1 Authentication Validation Point (AVP) -- 5.2 Authentication Server -- 5.3 Authentication Policy Specification -- 5.4 Policy Engine -- 5.5 Provenance Mechanism -- 6 Prototype Evaluation -- 6.1 Primary Detection -- 6.2 Secondary Detection -- 6.3 Evaluation Results -- 7 Limitations and Challenges -- 8 Conclusions and Future Directions -- References -- The Deepest Vertex First Reboot: Rebooting Network Edge Switches in a Campus Network -- 1 Introduction -- 2 Deepest Vertex First Reboot -- 2.1 Pre-condition. , 2.2 Campus Network in Graph Theory.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...