Search Results - traffic allocation algorithm

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Resource Allocation in Unlicensed Long Term Evolution HetNets by Zhang, Huaqing

    ISBN: 9783319683126
    ISSN: 2191-8112
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  2. 2

    Introduction to Queueing Networks Theory ∩ Practice / by Smith, J. MacGregor

    ISBN: 9783319788227
    ISSN: 1431-8598
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  3. 3

    Computational Methods and Models for Transport New Challenges for the Greening of Transport Systems /

    ISBN: 9783319544908
    ISSN: 1871-3033 ;
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  4. 4

    Intelligent Distributed Computing XI

    ISBN: 9783319663791
    ISSN: 1860-949X ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I: Distributed Algorithms and Optimization -- A Performance Analysis of Self-* Evolutionary Algorithms on Networks with Correlated Failures -- Spatially Structured Evolutionary Algorithms: Graph Degree, Population Size and Convergence Speed -- Heuristic of Anticipation for Fair Scheduling and Resource Allocation in Grid VOs -- On the Applications of Dijkstra's Shortest Path Algorithm in Software Defined Networks -- Part II: Reasoning and Decision Making in Distributed Environments -- Towards a Paraconsistent Approach to Actions in Distributed Information-Rich Environments -- A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions -- Lightweight Cooperative Self-Localization as Support to Traffic Regulation for Autonomous Car Driving -- A New Approach for Vertical Handover between LTE and WLAN Based on Fuzzy Logic and Graph Theory -- Part III: Multi-agent Systems -- Programming the Interaction Space Effectively with ReSpecTX -- Multi-Agent System to Design Next Generation of Airborne Platform -- A Drone-based Building Inspection System using Software-Agents -- Part IV: Data Analysis, Mining and Integration -- Connecting Social Media Data with Observed Hybrid Data for Environment Monitoring -- EUStress: a Human Behaviour Analysis System for Monitoring and Assessing Stress during Exams -- Post Sharing-based Credibility Network for Social Network -- Ontological Hybrid Storage for Security Data -- Part V: Machine Learning -- Wind Power Production Forecasting using Ant Colony Optimization and Extreme Learning Machines -- Convolutional Neural Networks for Four-Class Motor Imagery Data Classification -- Binary Classification of Images for Applications in Intelligent 3D Scanning -- Part VI: Internet of Things and Cloud Computing -- Context Aware Resource and Service Provisioning Management in Fog Computing Systems -- An Argumentative Approach to Smart Home Office Ambient Lighting -- A Recommender System Based on Hierarchical Clustering for Cloud e-Learning -- A Taxonomy of Anomalies in Distributed Cloud Systems: The CRI-Model -- Modeling and Analysis of IoT Energy Resource Exhaustion Attacks -- Part VII: Service-based Distributed Systems -- Service Discovery in Megascale Distributed Systems -- Context-Aware Access Control Model for Services Provided from Cloud Computing -- Reference Architecture for Self-Adaptive Microservice Systems -- Part VIII: WASA 2017 (7th Workshop on Applications of Software Agents) -- Agent-Based Computing in the Internet of Things: a Survey -- Teaching, Learning and Assessment of Agents and Robotics in a Computer Science Curriculum.…”

    Get full text
    Electronic eBook
  5. 5

    Advances in Dependability Engineering of Complex Systems Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017,...

    ISBN: 9783319594156
    ISSN: 2194-5357 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Zarandi -- 16.Comparative analysis of calculations in cryptographic protocols using a combination of different bases of finite fields -- 17.Dynamic Redundancy in Communication Network of Air Traffic Management System -- 18.Availability models and maintenance strategies for smart building automation systems considering attacks on component vulnerabilities -- 19.Concept of multi-criteria evaluation of the airport security control process -- 20.Extending Continuous Integration with post-mortem debug automation of unhandled exceptions occurred in kernel or user mode applications -- 21.The Methodology of Studying of Active Traffic Management Module Self-Oscillation Regime -- 22.Effectiveness examination of a multi-channel CSMA/CA detector -- 23.IaaS vs. traditional hosting for web applications - cost effectiveness analysis for a local market -- 24.High quality stabilization of an inverted pendulum using the controller based on trigonometric function -- 25.The application of RFID technology in supporting the process of reliable identification of objects in video surveillance systems -- 26.Aspect-oriented management of service requests for assurance of high performance and dependability -- 27.Process of mobile application development from the security perspective -- 28.Managing and Enhancing Performance Benchmarks;Jakub Maleszewski and Janusz Sosnowski -- 29.Reliability Optimization for Controller Placement in Software-Defined Networks -- 30.Agent Approach to Network Systems Experimental Analysis in Case of Critical Situations -- 31.RELIABILITY ASSESSMENT OF DRIVING SYSTEMS OF CITY BUSES;Marek M3yñczak -- 32.Testing the significance of parameters of models estimating execution time of parallel program loops according to the Open MPI standard -- 33.On application of regime-switching models for short-term traffic flow forecasting -- 34.Critical information infrastructure protection model and methodology -- 35.The method of creating players in the marketing strategy;Henryk Piech -- 36.Principles of mobile walking robot control in scope of technical monitoring tasks -- 37.Computer Systems - Simple -- 38.Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory Resources -- 39.Assurance Case Patterns On-line Catalogue;Monika Szczygielska and Aleksander Jarzêbowicz -- 40.Information system as a cause of cargo handling process disruption in intermodal terminal -- 42.Stability Enhancement Against Fluctuations in Complex Networks by Optimal Bandwidth Allocation -- 43.The scope of the collected data for a holistic risk assessment performance in the road freight transport companies -- 44.Language Processing Modelling Notation - orchestration of NLP microservices -- 45.Type Variety Principle and the Algorithm of Strategic Planning of Diversified Portfolio of Electricity Generation Sources.…”

    Get full text
    Electronic eBook
  6. 6

    Intelligent Engineering Informatics Proceedings of the 6th International Conference on FICTA /

    ISBN: 9789811075667
    ISSN: 2194-5357 ;
    Published: Singapore : Springer Singapore , 2018.
    Table of Contents: “…A Hybrid Shadow Removal Algorithm for Vehicle Classification in Traffic Surveillance System -- 67. …”

    Get full text
    Electronic eBook