This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Meer
It has been widely recognized that artificial intelligence computations offer large potential for distributed and parallel processing. Unfortunately, not much is known about designing parallel AI algorithms and efficient, easy-to-use parallel computer architectures for AI applications. Meer
This book had its genesis in the following piece of computer mail: From allegra!joan-b Tue Dec 18 89:15:54 1984 To: sola!hjb Subj ect: 1 i spm Hank, I've been talking with Mark Plotnik and Bill Gale about asking you to conduct a basic course on using the lisp machine. Meer
In the "black box function optimization" problem, a search strategy is required to find an extremal point of a function without knowing the structure of the function or the range of possible function values. Meer
This book features representative work in the design of panoramic image capturing systems, the theory involved in the imaging process, and applications that use panoramic images. Meer
Mass communication in the midst of a crisis must be done in a targeted and timely manner to mitigate the impact and ultimately save lives. Based on sound research, real-world case studies, and the author’s own experiences, Mass Notification and Crisis Communications: Planning, Preparedness, and Systems helps emergency planning professionals create a crisis communications plan that works by establishing upfront relationships with responders, enacting protocols, and utilizing technology to effectively message the intended audience. Meer
This IMA Volume in Mathematics and its Applications FRACTALS IN MULTIMEDIA is a result of a very successful three-day minisymposium on the same title. Meer
Overview This book introduces immunocomputing (Ie) as a new computing approach that replicates the principles of information processing by proteins and immune networks. Meer
This book explores connections between control theory and geometric mechanics. The author links control theory with a geometric view of classical mechanics in both its Lagrangian and Hamiltonian formulations, and in particular with the theory of mechanical systems subject to motion constraints. Meer
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Meer
This book is concerned with recent experimental and theoretical work dealing with phenomena created by the transient dipoles and polarizabilities produced by intermolecular interactions. Meer
COMPUTER VISION is a field of research that encompasses many objectives. A primary goal has been to construct visual sensors that can provide general-purpose robots with the same information about their surroundings as we receive from our own visual senses. Meer
Human action analysis and recognition is a relatively mature field, yet one which is often not well understood by students and researchers. The large number of possible variations in human motion and appearance, camera viewpoint, and environment, present considerable challenges. Meer
Innovation in Manufacturing Networks A fundamental concept of the emergent business, scientific and technological paradigms ces area, innovation the ability to apply new ideas to products, processes, organizational practices and business models - is crucial for the future competitiveness of organizations in a continually increasingly globalised, knowledge-intensive marketplace. Meer
Spatial trajectories have been bringing the unprecedented wealth to a variety of research communities. A spatial trajectory records the paths of a variety of moving objects, such as people who log their travel routes with GPS trajectories. Meer
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. Meer
How do we design a self-organizing system? Is it possible to validate and control non-deterministic dynamics? What is the right balance between the emergent patterns that bring robustness, adaptability and scalability, and the traditional need for verification and validation of the outcomes? Meer
There has continuously been a massive growth of Internet traffic for these years despite the "bubble burst" in year 2000. As the telecom market is gradually picking up, it would be a consensus in telecom and data-com industries that the CAPEX (Capital Expenditures) to rebuild the network infrastructure to cope with this traffic growth would be imminent, while the OPEX (Operational Expenditures) has to be within a tight constraint. Meer
This book presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books