GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Last Month's Catalog Additions

Export
  • 1
    Keywords: Computer security
    Description / Table of Contents: Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- About the Intel Reviewers -- Acknowledgements -- Legal Notices and Disclaimers -- Abstract -- Chapter 1: Introduction and Overview -- Why You Should Read This Introduction and What to Expect -- …Because That's Where the Money Is -- Cogito Ergo (Multiply and) Sum - Artificial Intelligence -- What This Means for You As a Security and Safety Professional -- Every Journey Begins with a Single Step - Maya Angelou -- Chapter 2: IMSS System Level View -- Summary -- History of Intelligent Multi-modal Security System Solutions -- Video 1.0 - Analog Video Technology -- Video 2.0 - IP-Connected Cameras and Video Recorders -- Current Intelligent Multi-modal Security Systems Solutions -- Video 3.0 - Intelligent Cameras and Video Recorders -- Bandwidth and Connectivity -- Cost/Power/Performance -- Ease of Development, Deployment, and Scaling -- Next-Generation Intelligent Multi-modal Security Systems Solutions -- Impact of Memory and Compute Improvements -- Design for Privacy -- Personal data -- Processing -- Protection -- Protection Security guidelines -- Principle IMSS System Components -- IMSS System View -- Smart IP Camera -- Network Video Recorder with Analytics -- Compute resources - General to Specialized, Key Performance Indicators (KPIs) -- Edge Server -- Operations Data Center Server -- End-to-End Security -- Cost Overheads for Security -- Confidentiality, Integrity, Availability -- Secure Data Storage -- Conclusion -- Chapter 3: Architecting and E2E IMSS Pipeline -- What Does It Take? -- IMSS Data Pipeline Terminology -- Defining the Data Pipeline - Key Concepts -- Desired Actions and Outcomes -- Three Basic Tasks - Storage, Display, and Analytics -- Basic Datatypes and Relationships - Sensed Data, Algorithms, and Metadata.
    Type of Medium: Online Resource
    Pages: 1 online resource (296 pages)
    Edition: 1st ed.
    ISBN: 9781484282977
    DDC: 005.8
    Language: English
    Note: Description based on publisher supplied metadata and other sources
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin / Heidelberg
    Keywords: Application software ; Computer security ; Artificial intelligence ; Electronic books
    Description / Table of Contents: Intro -- Preface -- Transactions on Computational Collective Intelligence -- Contents -- A Theoretical Examination of the Ranked Choice Voting Procedure -- 1 Introduction -- 2 Two Peculiar Features of the U.S. Electoral System -- 3 RCV as a Special Variant of STV -- 4 The Performance of RCV on Standard Criteria -- 4.1 Arrow's Conditions -- 4.2 Condorcet Criteria -- 4.3 Choice Set Variability Criteria -- 5 Modifying RCV -- 6 Concluding Remarks -- References -- A Game Theoretic Model of Searching for a Unique Good from a Large Set of Offers -- 1 Introduction -- 2 A Model of Search with an Individual Decision Maker -- 3 A Game Theoretic Model -- 4 Some Theoretical Results -- 4.1 A Similar Optimization Problem -- 4.2 A Similar Game Where the DMs Have Independent Preferences -- 5 A Procedure for Estimating the Nash Equilibrium and Value of the Original Game -- 6 Numerical Results -- 6.1 Mixed Equilibria -- 6.2 Accuracy in Estimating the Individual Payoffs -- 6.3 Effect of the Parameters of the Game -- 7 Conclusion -- References -- Operation Comfort of Multistate System vs. The Importance of Its Components -- 1 Introduction -- 1.1 Preliminaries -- 1.2 Investigation of Element Role in a Given State -- 1.3 Organization of the Paper -- 2 Multistate Systems -- 2.1 Coherent Multistate Systems -- 2.2 Introductory Characteristic for the Importance Measure -- 2.3 Nonrepairable Coherent Multistate Systems -- 2.4 Repairable Coherent Multistate Systems -- 3 State Dependent Importance Measure -- 4 Concluding Remarks -- 4.1 Summary -- 4.2 Important Direction of Further Investigations -- A List of Symbols -- B Endnotes -- B.1 Risk -- B.2 General Idea of Importance Measure -- B.3 Review of Importance Measure Concepts -- B.4 Cooperative Games vs. Semicoherent Systems -- References -- Implicit Power Indices for Measuring Indirect Control in Corporate Structures.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    ISBN: 9783662645635
    Series Statement: Lecture Notes in Computer Science Ser. v.13010
    DDC: 006.3
    Language: English
    Note: Description based on publisher supplied metadata and other sources
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...