This book provides theoretical and practical insights related to bidirectional traffic on a stretch containing bottleneck segments. On a bottleneck segment concurrent traveling of vehicles in opposite direction is not possible. The book is motivated by and considers in particular the ship traffic at the Kiel Canal. It connects the North and Baltic Seas and is operated in both directions. In addition, considerations are included that account for the fact that ships register their requests only shortly before their arrival such that scheduling decisions must be adapted online.
This book includes a selection of refereed papers presented at the "Annual International Conference of the German Operations Research Society (OR2016)," which took place at the Helmut-Schmidt-Universität / Universität der Bundeswehr Hamburg, Germany, Aug. 30 - Sept. 2, 2016. Over 700 practitioners and academics from mathematics, computer science, business/economics, and related fields attended the conference. The scientific program included around 475 presentations on the theme Analytical Decision Making, focusing on the process of researching complex decision problems and devising effective solution methods towards better decisions. The book presents papers discussing classical mathematical optimization, statistics and simulation techniques. Such approaches are complemented by computer science methods and tools for the processing of data and the design and implementation of information systems. The book also examines recent advances in information technology, which allow big data volumes to be treated and enable real-time predictive and prescriptive business analytics to drive decisions and actions. Further, it includes problems modeled and treated under consideration of uncertainty, risk management, behavioral issues, and strategic decision situations.
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Introducing Microsoft Power BI enables you to evaluate when and how to use Power BI. Get inspired to improve business processes in your company by leveraging the available analytical and collaborative features of this environment. Be sure to watch for the publication of Alberto Ferrari and Marco Russo's upcoming retail book, Analyzing Data with Power BI and Power Pivot for Excel (ISBN 9781509302765). Go to the book's page at the Microsoft Press Store here for more details:http://aka.ms/analyzingdata/details. Learn more about Power BI at https://powerbi.microsoft.com/.
This comprehensive test preparation book is the best resource available for IT professionals seeking to pass the MCSE Designing and Deploying a Messaging Infrastructure with Microsoft Exchange 2000 Server exam (70-225). Clear, concise chapters cover all of the pertinent test concepts such as analyzing business requirements and resources for Exchange 2000, designing and deploying Exchange 2000 Server messaging solutions, fault tolerance, and data recovery, and managing Active Directory and Internet Information Server (IIS). Real-world projects and examples provide the reader with practical hands-on experience that aid recall during the exam.
Researchers in management, industrial engineering, operations, and computer science have intensely studied scheduling for more than 50 years, resulting in an astounding body of knowledge in this field. Handbook of Scheduling: Algorithms, Models, and Performance Analysis, the first handbook on scheduling, provides full coverage of the most recent and advanced topics on the subject. It assembles researchers from all relevant disciplines in order to facilitate cross-fertilization and create new scheduling insights. The book comprises six major parts, each of which breaks down into smaller chapters: · Part I introduces materials and notation, with tutorials on complexity theory and algorithms for the minimization of makespan, total completion time, dual objectives, maximum lateness, the number of late jobs, and total tardiness. · Part II is devoted to classical scheduling problems. · Part III explores scheduling models that originate in computer science, operations research, and management science. · Part IV examines scheduling problems that arise in real-time systems, focusing on meeting hard deadline constraints while maximizing machine utilization. · Part V discusses stochastic scheduling and queueing networks, highlighting jobs that are not deterministic. · Part VI covers applications, discussing scheduling problems in airline, process, and transportation industries, as well as in hospitals and educational institutions.
"This book covers aspects of system design and efficient modelling, and also introduces various fault models and fault mechanisms associated with digital circuits integrated into System on Chip (SoC), Multi-Processor System-on Chip (MPSoC) or Network on Chip (NoC)"--
Over the past few decades, devices and technologies have been significantly miniaturized from one generation to the next, providing far more potential in a much smaller package. The smallest of these recently developed tools are miniscule enough to be invisible to the naked eye. Nanotechnology: Concepts, Methodologies, Tools, and Applications describes some of the latest advances in microscopic technologies in fields as diverse as biochemistry, materials science, medicine, and electronics. Through its investigation of theories, applications, and new developments in the nanotechnology field, this impressive reference source will serve as a valuable tool for researchers, engineers, academics, and students alike.
This book gathers the refereed proceedings of the Intelligent Algorithms in Software Engineering Section of the 9th Computer Science On-line Conference 2020 (CSOC 2020), held on-line in April 2020. Software engineering research and its applications to intelligent algorithms have now assumed an essential role in computer science research. In this book, modern research methods, together with applications of machine and statistical learning in software engineering research, are presented.
As a manager of the 90s, you know that IT departments like your own must continue to meet increasingly sophisticated end-user needs despite highly limited resources. Learn when its best to farm out work to consultants, when to reserve internal resources for other tasks, and how best to use your in-house staff. Coverage unlike any other in the marketplace. Written by 41 experts all practitioners in the networking and IS management fields this guidebook provides unique depth and scope. In this Third Edition, youll find all new material that clearly outlines todays hottest issues. Prepares you to quickly respond to management requirements. Are you aware of the latest on strategic planning, systems planning, and points-of-failure planning? Have you linked your IT architecture and business plans? Have you updated senior management as to how IT can help achieve corporate goals? Do you have a corporate technology plan? Turn to the Handbook for all this and more. Now you can get up to speed on the latest in client/server, on how to give your end users faster and greater access to corporate data at a lower cost, and on how to quantify the amount of network support that this improvement will require? The Handbook was written with you in mind. The perfect resource for todays successful communications systems manager. This comprehensive, highly authoritative reference is designed to help you select, maintain, and manage your communications systems. It provides all the tools you need to evaluate, formulate, and implement effective communications network strategies to keep pace with todays rapidly changing technology. You get illustrations, tables, and diagrams to clearly outline and guide you the entire way. Be aware of the latest technologies and their impact on you. Keep costs down by aiding your thinking through all the systems and network elements from concept through implementation and day-to-day operation.
In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book: Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks Investigates various malicious activities associated with cloud computing and proposes some countermeasures Examines current and emerging security threats in long-term evolution backhaul and core networks Supplies a brief introduction to application-layer denial-of-service (DoS) attacks Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon. This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.