This volume presents the proceedings of the IFIP TC2 WG 2.5 Conference on Grid-Based Problem Solving Environments: Implications for Development and Deployment of Numerical Software, held in Prescott, Arizona from July 17-21, 2006. Meer
This volume represents the papers reviewed and accepted for the HOIT2007 conference held at the Indian Institute of Technology Madras in the city of Chennai, India in August 2007. Meer
This book contains a selection of papers presented at a symposium organized under the aegis of COST Telecommunications Action 285. COST (European Cooperation in the field of Scientific and Technical Research) is a framework for scientific and technical cooperation, allowing the coordination of national research on a European level. Meer
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Meer
This book contains extended and revised versions of the best papers presented during the fourteenth IFIP TC 10/WG 10.5 International Conference on Very Large Scale Integration. Meer
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Meer
Assembled in this volume is a collection of some of the state-of-the-art methods that are using computer vision and machine learning techniques as applied in robotic applications. Meer
A large number of cultural heritage objects around the world are deteriorating or being destroyed due to the work of natural disasters, such as earthquakes and floods, and human-inflicted destruction, such as war and vandalism. Meer
This book covers a highly relevant and timely topic that is of wide interest, especially in finance, engineering and computational biology. The introductory material on simulation and stochastic differential equation is very accessible and will prove popular with many readers. Meer
John Chambers turns his attention to R, the enormously successful open-source system based on the S language. His book guides the reader through programming with R, beginning with simple interactive use and progressing by gradual stages, starting with simple functions. Meer
Multimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results from theoretic, algorithmic and application viewpoints. Meer
Multimedia Content Analysis: Theory and Applications covers the latest in multimedia content analysis and applications based on such analysis. As research has progressed, it has become clear that this field has to appeal to other disciplines such as psycho-physics, media production, etc. Meer
It’s hard to believe that it’s been over a decade since One Jump Ahead: Challenging Human Supremacy at Checkers was published. I’m delighted to have the oppor- nity to update and expand the book. Meer
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Meer
Brain Inspired Cognitive Systems 2008 (June 24-27, 2008; São Luís, Brazil) brought together leading scientists and engineers who use analytic, syntactic and computational methods both to understand the prodigious processing properties of biological systems and, specifically, of the brain, and to exploit such knowledge to advance computational methods towards ever higher levels of cognitive competence. Meer
Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. Meer
Programming Languages: An Active Learning Approach introduces students to three programming paradigms: object-oriented/imperative languages using C++ and Ruby, functional languages using Standard ML, and logic programming using Prolog. Meer
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. Meer
This book constitutes the proceedings of the 8th International Conference on Human Choice and Computers held in Pretoria, South Africa.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books