Search Results - (((((((want OR find) OR semantic) OR carter) OR cantor) OR anne) OR maarten) OR mantis) algorithms.

Search alternatives:

  1. 601

    Anesthesia student survival guide : a case-based approach

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  2. 602

    Fog and fogonomics : challenges and practices of fog computing, communication, networking, strategy, and economics

    Published 2020
    Table of Contents: “…5.5.2 Survivability, Availability, and Reliability 122 -- 5.6 Sovereignty, Privacy, Security, Interoperability, and Management 123 -- 5.6.1 Data Sovereignty 123 -- 5.6.2 Privacy and Security 123 -- 5.6.3 Heterogeneity and Interoperability 124 -- 5.6.4 Monitoring, Orchestration, and Management 124 -- 5.7 Trade-Offs 125 -- 5.8 Conclusion 126 -- References 126 -- 6 Incentive Schemes for User-Provided Fog Infrastructure 129 /George Iosifidis, Lin Gao, Jianwei Huang, and Leandros Tassiulas -- 6.1 Introduction 129 -- 6.2 Technology and Economic Issues in UPIs 132 -- 6.2.1 Overview of UPI models for Network Connectivity 132 -- 6.2.2 Technical Challenges of Resource Allocation 134 -- 6.2.3 Incentive Issues 135 -- 6.3 Incentive Mechanisms for Autonomous Mobile UPIs 137 -- 6.4 Incentive Mechanisms for Provider-assisted Mobile UPIs 140 -- 6.5 Incentive Mechanisms for Large-Scale Systems 143 -- 6.6 Open Challenges in Mobile UPI Incentive Mechanisms 145 -- 6.6.1 Autonomous Mobile UPIs 145 -- 6.6.1.1 Consensus of the Service Provider 145 -- 6.6.1.2 Dynamic Setting 146 -- 6.6.2 Provider-assisted Mobile UPIs 146 -- 6.6.2.1 Modeling the Users 146 -- 6.6.2.2 Incomplete Market Information 147 -- 6.7 Conclusions 147 -- References 148 -- 7 Fog-Based Service Enablement Architecture 151 /Nanxi Chen, Siobhán Clarke, and Shu Chen -- 7.1 Introduction 151 -- 7.1.1 Objectives and Challenges 152 -- 7.2 Ongoing Effort on FogSEA 153 -- 7.2.1 FogSEA Service Description 156 -- 7.2.2 Semantic Data Dependency Overlay Network 158 -- 7.2.2.1 Creation and Maintenance 159 -- 7.2.2.2 Semantic-Based Service Matchmarking 161 -- 7.3 Early Results 164 -- 7.3.1 Service Composition 165 -- 7.3.1.1 SeDDON Creation in FogSEA 167 -- 7.3.2 Related Work 168 -- 7.3.2.1 Semantic-Based Service Overlays 169 -- 7.3.2.2 Goal-Driven Planning 170 -- 7.3.2.3 Service Discovery 171 -- 7.3.3 Open Issue and Future Work 172 -- References 174 -- 8 Software-Defined Fog Orchestration for IoT Services 179 /Renyu Yang, Zhenyu Wen, David McKee, Tao Lin, Jie Xu, and Peter Garraghan.…”
    Full text (MFA users only)
    Electronic eBook
  3. 603

    From scratch : writings in music theory by Tenney, James

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  4. 604
  5. 605

    Data mining applications with R by Zhao, Yanchang, 1977-

    Published 2014
    Table of Contents: “…OOS Frequency Events; 1.4.3.2. Finding Generator Trip Features; 1.4.3.3. Creating Overlapping Frequency Data; 1.5. …”
    Full text (MFA users only)
    Electronic eBook
  6. 606

    Management of Osteoarthritis - A holistic view

    Published 2017
    Table of Contents: “…MORPHOLOGICAL FINDINGS IN EARLY ARTHRITIS -- INDICATIONS AND TECHNIQUES IN ARTHROSCOPIC SURGERY -- INDICATIONS AND TECHNIQUES IN OPEN CARTILAGE SURGERY -- FINAL CONSIDERATION ABOUT THE TREATMENT OF EARLY HIP ARTHRITIS -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Total Hip Arthroplasty-evolution and Current Concepts -- INTRODUCTION -- Surgical Approaches to Total Hip Arthroplasty (THA) -- Posterior Approach -- Surgical Approaches During Revision Total Hip Replacement -- Bearing Surfaces in THA -- Hard on Soft Bearings -- Hard on Hard Bearing Surfaces -- Wear -- Adhesive Wear -- Abrasive Wear -- Fatigue Wear -- Corrosive Wear -- Wear Modes -- Implant Selection During Total Hip Replacement -- Role of Large Femoral Heads in THA -- Recent Advances in Total Hip Arthroplasty -- Complications Following Total Hip Replacement -- Deep Vein Thrombosis (DVT) and Pulmonary Embolism (PE) -- Dislocation -- Recent Developments in THA -- Short Stem Hip Arthroplasty -- Navigation in Total Hip Arthroplasty -- Minimally Invasive (MIS) Total Hip Arthroplasty -- Our Approach to THA -- Our Peri-operative Pain Management Protocol -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- SUBJECT INDEX.…”
    Full text (MFA users only)
    Electronic eBook
  7. 607
  8. 608
  9. 609

    Diagnostic Imaging of the Foot and Ankle. by Szeimies, Ulrike

    Published 2014
    Table of Contents: “…2.2 History2.2.1 Relevant Questions; 2.2.2 Pain History; 2.3 Inspection; 2.4 Palpation; 2.5 Motion Tests; 2.5.1 Translation Tests; 2.5.2 Muscle Function Tests; 2.6 Sensory Testing; 2.7 Assessment of Blood Flow; 2.8 Special Tests on the Foot; 2.8.1 Hindfoot; 2.8.2 Joint Stability; 2.8.3 Nerve Irritation; 2.8.4 Forefoot; 2.9 Stress Tests and Provocative Testing; 2.10 Other Diagnostic Options; 2.11 Summary; 2.12 Special Case: Chronic Pain Syndrome without Objective Findings; 2.13 Bibliography; 3 Ankle and Hindfoot; 3.1 Trauma; 3.1.1 Capsule and Ligaments; 3.1.2 Fractures.…”
    Full text (MFA users only)
    Electronic eBook
  10. 610
  11. 611
  12. 612

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  13. 613
  14. 614

    The illustrated network : how TCP/IP works in a modern network by Goralski, Walter

    Published 2017
    Table of Contents: “…-- An Audience Note for the Second Edition -- What You Won't Find in This Book -- And One More Thing Before I Go -- Oh, One More Thing -- The Illustrated Network -- Using This Book -- Source Code -- Acknowledgments -- Technical Reviewers -- I. …”
    Full text (MFA users only)
    Electronic eBook
  15. 615
  16. 616

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Using The Metasploit Framework / Peter Van Eeckhoutte -- Starting Metasploit / Peter Van Eeckhoutte -- Finding Metasploit Modules / Peter Van Eeckhoutte.…”
    Full text (MFA users only)
    Electronic eBook
  17. 617
  18. 618

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  19. 619

    Manipulative voting dynamics by Gohar, Neelam

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  20. 620

    Electric Power System Fundamentals. by Acha Daza, Salvador

    Published 2016
    Full text (MFA users only)
    Electronic eBook