This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. Meer
This book contains extended and revised versions of the best papers presented during the fourteenth IFIP TC 10/WG 10.5 International Conference on Very Large Scale Integration. Meer
This volume contains contributions from participants in the 2007 International Multiconference of Engineers and Computer Scientists. It covers a variety of subjects in the frontiers of intelligent systems and computer engineering and their industrial applications. Meer
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Meer
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. Meer
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. Meer
Assembled in this volume is a collection of some of the state-of-the-art methods that are using computer vision and machine learning techniques as applied in robotic applications. Meer
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Meer
A large number of cultural heritage objects around the world are deteriorating or being destroyed due to the work of natural disasters, such as earthquakes and floods, and human-inflicted destruction, such as war and vandalism. Meer
Genetic Programming Theory and Practice V was developed from the fifth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Meer
Multimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results from theoretic, algorithmic and application viewpoints. Meer
Over the last decade a number of research areas have contributed to the concept of advanced intelligent environments, these include ubiquitous computing, pervasive computing, embedded intelligence, intelligent user interfaces, human factors, intelligent buildings, mobile communications, domestic robots, intelligent sensors, artistic and architectural design and ambient intelligence. Meer
Multimedia Content Analysis: Theory and Applications covers the latest in multimedia content analysis and applications based on such analysis. As research has progressed, it has become clear that this field has to appeal to other disciplines such as psycho-physics, media production, etc. Meer
Abstract In this chapter we provide an overview of probabilistic logic networks (PLN), including our motivations for developing PLN and the guiding principles underlying PLN. Meer
The Home Networking Conference 2007 provided an international technical forum for experts from industry and academia everywhere in the world to exchange ideas and present results of ongoing researches in home networking. Meer
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. Meer
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). Meer
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. Meer
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. Meer
Biometric System and Data Analysis: Design, Evaluation, and Data Mining brings together aspects of statistics and machine learning to provide a comprehensive guide to evaluate, interpret and understand biometric data. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books