Search Results - traffic allocation algorithm
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 3
- Computational intelligence 3
- Computational complexity 2
- Computer simulation 2
- Traffic engineering 2
- Transportation engineering 2
- Aerospace engineering 1
- Astronautics 1
- Computer communication systems 1
- Computer mathematics 1
- Electrical engineering 1
- Mathematical models 1
- Microprogramming 1
- Mobile computing 1
- Transportation 1
-
1
Resource Allocation in Unlicensed Long Term Evolution HetNets
ISBN: 9783319683126ISSN: 2191-8112Published: Cham : Springer International Publishing, 2018.
Electronic eBook -
2
Introduction to Queueing Networks Theory ∩ Practice /
ISBN: 9783319788227ISSN: 1431-8598Published: Cham : Springer International Publishing, 2018.
Electronic eBook -
3
Computational Methods and Models for Transport New Challenges for the Greening of Transport Systems /
ISBN: 9783319544908ISSN: 1871-3033 ;Published: Cham : Springer International Publishing, 2018.
Electronic eBook -
4
Intelligent Distributed Computing XI
ISBN: 9783319663791ISSN: 1860-949X ;Published: Cham : Springer International Publishing, 2018.Table of Contents: “…Part I: Distributed Algorithms and Optimization -- A Performance Analysis of Self-* Evolutionary Algorithms on Networks with Correlated Failures -- Spatially Structured Evolutionary Algorithms: Graph Degree, Population Size and Convergence Speed -- Heuristic of Anticipation for Fair Scheduling and Resource Allocation in Grid VOs -- On the Applications of Dijkstra's Shortest Path Algorithm in Software Defined Networks -- Part II: Reasoning and Decision Making in Distributed Environments -- Towards a Paraconsistent Approach to Actions in Distributed Information-Rich Environments -- A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions -- Lightweight Cooperative Self-Localization as Support to Traffic Regulation for Autonomous Car Driving -- A New Approach for Vertical Handover between LTE and WLAN Based on Fuzzy Logic and Graph Theory -- Part III: Multi-agent Systems -- Programming the Interaction Space Effectively with ReSpecTX -- Multi-Agent System to Design Next Generation of Airborne Platform -- A Drone-based Building Inspection System using Software-Agents -- Part IV: Data Analysis, Mining and Integration -- Connecting Social Media Data with Observed Hybrid Data for Environment Monitoring -- EUStress: a Human Behaviour Analysis System for Monitoring and Assessing Stress during Exams -- Post Sharing-based Credibility Network for Social Network -- Ontological Hybrid Storage for Security Data -- Part V: Machine Learning -- Wind Power Production Forecasting using Ant Colony Optimization and Extreme Learning Machines -- Convolutional Neural Networks for Four-Class Motor Imagery Data Classification -- Binary Classification of Images for Applications in Intelligent 3D Scanning -- Part VI: Internet of Things and Cloud Computing -- Context Aware Resource and Service Provisioning Management in Fog Computing Systems -- An Argumentative Approach to Smart Home Office Ambient Lighting -- A Recommender System Based on Hierarchical Clustering for Cloud e-Learning -- A Taxonomy of Anomalies in Distributed Cloud Systems: The CRI-Model -- Modeling and Analysis of IoT Energy Resource Exhaustion Attacks -- Part VII: Service-based Distributed Systems -- Service Discovery in Megascale Distributed Systems -- Context-Aware Access Control Model for Services Provided from Cloud Computing -- Reference Architecture for Self-Adaptive Microservice Systems -- Part VIII: WASA 2017 (7th Workshop on Applications of Software Agents) -- Agent-Based Computing in the Internet of Things: a Survey -- Teaching, Learning and Assessment of Agents and Robotics in a Computer Science Curriculum.…”
Electronic eBook -
5
Advances in Dependability Engineering of Complex Systems Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017,...
ISBN: 9783319594156ISSN: 2194-5357 ;Published: Cham : Springer International Publishing, 2018.Table of Contents: “…Zarandi -- 16.Comparative analysis of calculations in cryptographic protocols using a combination of different bases of finite fields -- 17.Dynamic Redundancy in Communication Network of Air Traffic Management System -- 18.Availability models and maintenance strategies for smart building automation systems considering attacks on component vulnerabilities -- 19.Concept of multi-criteria evaluation of the airport security control process -- 20.Extending Continuous Integration with post-mortem debug automation of unhandled exceptions occurred in kernel or user mode applications -- 21.The Methodology of Studying of Active Traffic Management Module Self-Oscillation Regime -- 22.Effectiveness examination of a multi-channel CSMA/CA detector -- 23.IaaS vs. traditional hosting for web applications - cost effectiveness analysis for a local market -- 24.High quality stabilization of an inverted pendulum using the controller based on trigonometric function -- 25.The application of RFID technology in supporting the process of reliable identification of objects in video surveillance systems -- 26.Aspect-oriented management of service requests for assurance of high performance and dependability -- 27.Process of mobile application development from the security perspective -- 28.Managing and Enhancing Performance Benchmarks;Jakub Maleszewski and Janusz Sosnowski -- 29.Reliability Optimization for Controller Placement in Software-Defined Networks -- 30.Agent Approach to Network Systems Experimental Analysis in Case of Critical Situations -- 31.RELIABILITY ASSESSMENT OF DRIVING SYSTEMS OF CITY BUSES;Marek M3yñczak -- 32.Testing the significance of parameters of models estimating execution time of parallel program loops according to the Open MPI standard -- 33.On application of regime-switching models for short-term traffic flow forecasting -- 34.Critical information infrastructure protection model and methodology -- 35.The method of creating players in the marketing strategy;Henryk Piech -- 36.Principles of mobile walking robot control in scope of technical monitoring tasks -- 37.Computer Systems - Simple -- 38.Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory Resources -- 39.Assurance Case Patterns On-line Catalogue;Monika Szczygielska and Aleksander Jarzêbowicz -- 40.Information system as a cause of cargo handling process disruption in intermodal terminal -- 42.Stability Enhancement Against Fluctuations in Complex Networks by Optimal Bandwidth Allocation -- 43.The scope of the collected data for a holistic risk assessment performance in the road freight transport companies -- 44.Language Processing Modelling Notation - orchestration of NLP microservices -- 45.Type Variety Principle and the Algorithm of Strategic Planning of Diversified Portfolio of Electricity Generation Sources.…”
Electronic eBook -
6
Intelligent Engineering Informatics Proceedings of the 6th International Conference on FICTA /
ISBN: 9789811075667ISSN: 2194-5357 ;Published: Singapore : Springer Singapore , 2018.Table of Contents: “…A Hybrid Shadow Removal Algorithm for Vehicle Classification in Traffic Surveillance System -- 67. …”
Electronic eBook

