This book constitutes the thoroughly refereed post-proceedings of the 7th International Conference on Artificial Evolution, EA 2005, held in Lille, France, in October 2005. Meer
This book constitutes the proceedings of the First International Conference on Grid and Pervasive Computing, GPC 2006. The 64 revised full papers were carefully reviewed. Meer
The information market place is on the horizon. However, it is unlikely that the basic functions of commerce will change appreciably, even as the coming electronic revolution dramatically changes the forms of commerce. Meer
This book presents a collection of revised refereed papers selected from the contributions to the Fifth International Workshop on Computer Aided Systems Theory, EUROCAST '95, held in Innsbruck, Austria in May 1995. Meer
This book presents the refereed proceedings of the Second International Eurospace - Ada-Europe Symposium, held in Frankfurt, Germany, in October 1995. Meer
This volume constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2017, held in Heidelberg, Germany, in July 2017. Meer
This book constitutes the proceedings of the 4th International Conference on Internet of Vehicles, IOV 2017, held in Kanazawa, Japan, in November 2017. Meer
The problems it addresses include emotion representation, annotation of music excerpts, feature extraction, and machine learning. The book chiefly focuses on content-based analysis of music files, a system that automatically analyzes the structures of a music file and annotates the file with the perceived emotions. Meer
This book examines theoretical and practical aspects of emerging technologies in e-service and artificial intelligence from an academic and professional viewpoint. Meer
It is well-established that while cognitive psychology provides a sound foundation for an understanding of our interactions with digital technology, this is no longer sufficient to make sense of how we use and experience the personal, relational and ubiquitous technologies that pervade everyday life. Meer
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. Meer
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 8th TPC Technology Conference, on Performance Evaluation and Benchmarking, TPCTC 2017, held in conjunction with the43rd International Conference on Very Large Databases (VLDB 2017) in August/September 2017. Meer
This book constitutes the refereed conference proceedings of the 5th International Conference on Big Data Analytics, BDA 2017, held in Hyderabad, India, in December 2017. Meer
This book collects recent theoretical advances and concrete applications of learning automata (LAs) in various areas of computer science, presenting a broad treatment of the computer science field in a survey style. Meer
This volume presents the revised and peer reviewed contributions of the ‘ERP Future 2015’ conference held in Munich, Germany on November 16-17, 2015. Meer
This book carefully defines the technologies involved in web service composition and provides a formal basis for all of the composition approaches and shows the trade-offs among them. Meer
This book constitutes the thoroughly refereed
post-conference proceedings of the 6th International Conference on Mathematical
Aspects of Computer and Information Sciences, MACIS 2015, held in Berlin,
Germany, in November 2015. Meer
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. Meer
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books