The text contains a detailed and current presentation of the program analyses and transformations that extract the flow of data in computer memory systems. Meer
In these essays Heinz von Foerster discusses some of the fundamental principles that govern how we know the world and how we process the information from which we derive that knowledge. Meer
Presents an ideal mix of theory and practice, which allows the reader to understand the principle behind the application.; Coverage of performance tuning of datawarehouses offers readers the principles and tools they need to handle large reporting databases. Meer
The earth, viewed through the window of an airplane, shows a regularity and reptition of features, for example, hills, valleys, rivers, lakes, and forests. Meer
Well suited to medium-scale general purpose computing, the Unix time sharing operating system is deservedly popular with academic institutions, research laboratories, and commercial establishments alike. Meer
Proceedings of the International Symposium on High Performance Computational Science and Engineering 2004 (IFIP World Computer Congress) is an essential reference for both academic and professional researchers in the field of computational science and engineering. Meer
Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust. Meer
In many applications, e.g., bioinformatics, web access traces, system u- lization logs, etc., the data is naturally in the form of sequences. It has been of great interests to analyze the sequential data to find their inherent char- teristics. Meer
Software Design: Creating Solutions for Ill-Structured Problems, Third Edition provides a balanced view of the many and varied software design practices used by practitioners. Meer
An authoritative survey of intelligent fingerprint-recognition concepts, technology, and systems is given. Editors and contributors are the leading researchers and applied R&D developers of this personal identification (biometric security) topic and technology. Meer
Data storage, processing, and management at remote location over dynamic networks is the most challenging task in cloud networks. Users’ expectations are very high for data accuracy, reliability, accessibility, and availability in pervasive cloud environment. Meer
Handbook of Approximation Algorithms and Metaheuristics, Second Edition reflects the tremendous growth in the field, over the past two decades. Through contributions from leading experts, this handbook provides a comprehensive introduction to the underlying theory and methodologies, as well as the various applications of approximation algorithms and metaheuristics. Meer
The integration and convergence of state-of-the-art technologies in the grid have enabled more flexible, automatic, and complex grid services to fulfill industrial and commercial needs, from the LHC at CERN to meteorological forecasting systems. Meer
Fully updated and expanded from the previous edition, A Practical Guide to Database Design, Second Edition is intended for those involved in the design or development of a database system or application. Meer
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Meer
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. Meer
Even though the semantic Web is a relatively new and dynamic area of research, a whole suite of components, standards, and tools have already been developed around it. Meer
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. Meer
Modeling complex systems is a difficult challenge and all too often one in which modelers are left to their own devices. Using a multidisciplinary approach, The Art of Software Modeling covers theory, practice, and presentation in detail. Meer
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books