There is an ongoing data explosion transpiring that will make previous creations, collections, and storage of data look trivial. Big Data, Mining, and Analytics: Components of Strategic Decision Making ties together big data, data mining, and analytics to explain how readers can leverage them to extract valuable insights from their data. Meer
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. Meer
From Combinatorics to Philosophy: The Legacy of G. -C. Rota provides an assessment of G. -C. Rota's legacy to current international research issues in mathematics, philosophy and computer science. Meer
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. Meer
Ambient Intelligence is a vision of the future where the world will be surrounded by electronic environments sensitive and responsive to people, wherein devices work in concert to support people in carrying out their everyday life activities, in an easy and natural way. Meer
Rapid advances in 3-D scientific visualization have made a major impact on the display of behavior. The use of 3-D has become a key component of both academic research and commercial product development in the field of engineering design. Meer
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. Meer
This text was developed over a three year period of time (1971- 1973) from a variety of notes and references used in the presentation of a senior/first year graduate level course in the Division of En gineering at Brown University titled Linear System Theory. Meer
"Software engineering" is a term which was coined in the late 1960's as the theme for a workshop on the problems involved in producing software that could be developed economicaLly and would run reliably on real machines. Meer
The basis for this book is a number of lectures given frequently by the author to third year students of the Department of Economics at Leningrad State University who specialize in economical cybernetics. Meer
This monograph is an introduction to optimal control theory for systems governed by vector ordinary differential equations. It is not intended as a state-of-the-art handbook for researchers. Meer
The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Meer
Uses a modular structure, oriented to solve several small-sized cybersecurity problems, each workable in about two weeks with a hands-on approach Evolves from the experience of educating students for more than ten years, following the same principle Includes tutorial work that guides students through a development model aiming to stimulate specific education for non-functional requirements implementation Integrates well-known multimedia resources aiming to explain background concepts and to familiarize students with technological tools. Meer
Formal Methods in Computer Science gives students a comprehensive introduction to formal methods and their application in software and hardware specification and verification. Meer
An Introduction. This book explains how to use business analytics to sort through an ever-increasing amount of data and improve the decision-making capabilities of an organization. Meer
Focusing on grid computing and asynchronism, Parallel Iterative Algorithms explores the theoretical and practical aspects of parallel numerical algorithms. Meer
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. Meer
Computer and microprocessor architectures are advancing at an astounding pace. However, increasing demands on performance coupled with a wide variety of specialized operating environments act to slow this pace by complicating the performance evaluation process. Meer
Performance Assurance for IT Systems emphasizes the importance of addressing performance and technology-related issues from the beginning of the planning process, at the feasibility and bid stages. Meer
Efficient access to data, sharing data, extracting information from data, and making use of the information have become urgent needs for today's corporations. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books