Rule-Based Programming is a broad presentation of the rule-based programming method with many example programs showing the strengths of the rule-based approach. Meer
The field of computational learning theory arose out of the desire to for mally understand the process of learning. As potential applications to artificial intelligence became apparent, the new field grew rapidly. Meer
The mathematical theory of networks and systems has a long, and rich history, with antecedents in circuit synthesis and the analysis, design and synthesis of actuators, sensors and active elements in both electrical and mechanical systems. Meer
by Luea Cardelli Ever since Strachey's work in the 1960's, polymorphism has been classified into the parametric and overloading varieties. Parametric polymorphism has been the subject of extensive study for over two decades. Meer
Combinatory logic started as a programme in the foundation of mathematics and in an historical context at a time when such endeavours attracted the most gifted among the mathematicians. Meer
HIS book presents a generalized state-space theory for the analysis T and synthesis of finite horizon suboptimal Hoo controllers. We de rive expressions for a suboptimal controller in a general setting and propose an approximate solution to the Hoo performance robustness problem. Meer
Developing correct and efficient software is far more complex for parallel and distributed systems than it is for sequential processors. Some of the reasons for this added complexity are: the lack of a universally acceptable parallel and distributed programming paradigm, the criticality of achieving high performance, and the difficulty of writing correct parallel and distributed programs. Meer
Software is difficult to develop, maintain, and reuse. Two factors that contribute to this difficulty are the lack of modular design and good program documentation. Meer
With this important work, written around current behavioral psychology research and practice as it applies to school-age children, the authors address both experimental and applied issues in the assessments and interventions used with this population. Meer
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Meer
Robust design—that is, managing design uncertainties such as model uncertainty or parametric uncertainty—is the often unpleasant issue crucial in much multidisciplinary optimal design work. Meer
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v^hich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME). Meer
Architecture Description Languages is an essential reference for both academic and professional researchers in the field of system engineering and design. Meer
This book contains an edited selection of papers presented at the International Workshop on Defect and Fault Tolerance in VLSI Systems held October 6-7, 1988 in Springfield, Massachusetts. Meer
Telepresence is enabling human interaction at a distance, creating a sense of being present at a remote location. In the next millennium we are certain to be increasingly `telepresent' both at work and at play, with an expanding market for telepresence services. Meer
Information Retrieval: Algorithms and Heuristics is a comprehensive introduction to the study of information retrieval covering both effectiveness and run-time performance. Meer
Time is ubiquitous in information systems. Almost every enterprise faces the problem of its data becoming out of date. However, such data is often valu able, so it should be archived and some means to access it should be provided. Meer
Database Recovery presents an in-depth discussion on all aspects of database recovery. Firstly, it introduces the topic informally to set the intuitive understanding, and then presents a formal treatment of recovery mechanism. Meer
One of the main uses of computer systems is the management of large amounts of symbolic information representing the state of some application domain, such as information about all the people I communicate with in my personal address database, or relevant parts of the outer space in the knowledge base of a NASA space mission. Meer
There is broad interest in feature extraction, construction, and selection among practitioners from statistics, pattern recognition, and data mining to machine learning. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books