Implicit definition and description of geometric objects and surfaces plays a critical role in the appearance and manipulation of computer graphics. In addition, the mathematical definition of shapes, using an implicit form, has pivotal applications for geometric modeling, visualization and animation. Meer
1 The Purpose of This Text This text has been written in response to two trends that have gained considerable momentum over the past few years. The first is the decision by many undergraduate engineering and science departments to abandon the traditional programming course based on the aging Fortran 77 standard. Meer
A history of machine translation (MT) from the point of view of a major writer and innovator in the field is the subject of this book. It details the deep differences between rival groups on how best to do MT, and presents a global perspective covering historical and contemporary systems in Europe, the US and Japan. Meer
This edited volume explores several issues relating to parametric segmentation including robust operations, model selection criteria and automatic model selection, plus 2D and 3D scene segmentation. Meer
In establishing a framework for dealing with uncertainties in software engineering, and for using quantitative measures in related decision-making, this text puts into perspective the large body of work having statistical content that is relevant to software engineering. Meer
This book is about problem solving. Specifically, it is about heuristic state-space search under branch-and-bound framework for solving com binatorial optimization problems. Meer
This volume contains contributions from participants in the 2007 International Multiconference of Engineers and Computer Scientists. It covers a variety of subjects in the frontiers of intelligent systems and computer engineering and their industrial applications. Meer
Big Data: A Tutorial-Based Approach explores the tools and techniques used to bring about the marriage of structured and unstructured data. It focuses on Hadoop Distributed Storage and MapReduce Processing by implementing (i) Tools and Techniques of Hadoop Eco System, (ii) Hadoop Distributed File System Infrastructure, and (iii) efficient MapReduce processing. Meer
Grid Computing: International Symposium on Grid Computing (ISGC) 2007 is one of the most important annual events in Asia that brings together scientific contributions by world class researchers and scientists working in the Grid Computing field to exchange ideas, to present challenges, solutions and future development. Meer
Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. Meer
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. Meer
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. Meer
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Meer
The European Conference on Computer and Network Defense draws contributions and participation both from academia and industry, and addresses security from multiple perspectives, including state-of-the-art research in computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response & management. Meer
In recent years there has been an explosion of network data – that is, measu- ments that are either of or from a system conceptualized as a network – from se- ingly all corners of science. Meer
Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Meer
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Meer
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Meer
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. Meer
Software Design: Creating Solutions for Ill-Structured Problems, Third Edition provides a balanced view of the many and varied software design practices used by practitioners. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books