Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors’ lecture notes. Meer
Resilience is an increasingly important concept and quality in today’s world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. Meer
Biometric System and Data Analysis: Design, Evaluation, and Data Mining brings together aspects of statistics and machine learning to provide a comprehensive guide to evaluate, interpret and understand biometric data. Meer
Social computing concerns the study of social behavior and context based on computational systems. Behavioral modeling reproduces the social behavior, and allows for experimenting with and deep understanding of behavior, patterns, and potential outcomes. Meer
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. Meer
Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. Meer
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Meer
This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ? Meer
"Information Theory and Statistical Learning" presents theoretical and practical results about information theoretic methods used in the context of statistical learning. Meer
This book constitutes the proceedings of the 8th International Conference on Human Choice and Computers held in Pretoria, South Africa.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
The ever expanding abundance of information and computing power enables - searchers and users to tackle highly interesting issues, such as applications prov- ing personalized access and interactivity to multimodal information based on user preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. Meer
Hybrid systems describe the interaction of software, described by finite models such as finite-state machines, with the physical world, described by infinite models such as differential equations. Meer
Computer graphics games and animations have been popular for over a decade, and personal computers have now evolved to support real-time, realistic-looking interactive games. Meer
Identifying some of the most influential algorithms that are widely used in the data mining community, The Top Ten Algorithms in Data Mining provides a description of each algorithm, discusses its impact, and reviews current and future research. Meer
While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Meer
Structurally Constrained Controllers: Analysis and Synthesis studies the control of interconnected systems with a particular application in network, power systems, flight formations, etc. Meer
This book is intended to serve as a textbook for a second course in the im plementation (Le. microarchitecture) of computer architectures. The subject matter covered is the collection of techniques that are used to achieve the highest performance in single-processor machines; these techniques center the exploitation of low-level parallelism (temporal and spatial) in the processing of machine instructions. Meer
Genetic Programming Theory and Practice VII presents the results of the annual Genetic Programming Theory and Practice Workshop, contributed by the foremost international researchers and practitioners in the GP arena. Meer
Most texts on computational methods are borne out of research activities at postgraduate study programs, and this is no exception. After being introduced to the boundary element method (BEM) (then referred to as the boundary integral equation method (BIEM)) in 1981 by Prof. Meer
Future Application and Middleware Technology on e-Science presents selected papers from the 2008 Korea e-Science All-Hands-Meeting (AHM 2008). Hosted by the Korea Institute of Science and Technology Information, this meeting was designed to bring together developers and users of e-Science applications and enabling information technologies from international and interdisciplinary research communities. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books