The two-volume set LNCS 9366 and 9367 constitutes the refereed proceedings of the 14th International Semantic Web Conference, ISWC 2015, held in Bethlehem, PA, USA, in October 2015. Meer
The two-volume set LNCS 9366 and 9367 constitutes the refereed proceedings of the 14th International Semantic Web Conference, ISWC 2015, held in Bethlehem, PA, USA, in October 2015. Meer
This book represents the combined peer-reviewed proceedings of the ninth International Symposium on Intelligent Distributed Computing – IDC’2015, of the Workshop on Cyber Security and Resilience of Large-Scale Systems – WSRL’2015, and of the International Workshop on Future Internet and Smart Networks – FI&SN’2015. Meer
The book focuses on different variants of decision tree induction but also describes the meta-learning approach in general which is applicable to other types of machine learning algorithms. Meer
This book presents four mathematical essays which explore the foundations of mathematics and related topics ranging from philosophy and logic to modern computer mathematics. Meer
The computer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book is the most comprehensive study of this field. Meer
Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. Meer
The two volume set LNCS 9758 and 9759, constitutes the refereed proceedings of the 15th International Conference on Computers Helping People with Special Needs, ICCHP 2015, held in Linz, Austria, in July 2016. Meer
This booklet provides a practical introduction to the practice of peer reviewing. Although it mainly focuses on paper reviewing for scientific events in computer science and business informatics, many of the principles, tips, tricks and examples can also be applied to journal reviewing and other scientific domains. Meer
This book describes current problems in data science and Big Data. Key topics are data classification, Graph Cut, the Laplacian Matrix, Google Page Rank, efficient algorithms, hardness of problems, different types of big data, geometric data structures, topological data processing, and various learning methods. Meer
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. Meer
This book constitutes the refereed proceedings of the 4th International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making, IUKM 2015, held in Nha Trang, Vietnam, in October 2015. Meer
This book constitutes the refereed proceedings of the First International Conference on Dynamic Data-Driven Environmental Systems Science, DyDESS 2014, held in Cambridge, MA, USA, in November 2014. Meer
This book constitutes the proceedings of the 5th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2015, held as part of ESWeek 2015, in Amsterdam, The Netherlands, in October 2015. Meer
This book constitutes the refereed proceedings of the
12th International Colloquium on Theoretical Aspects of Computing, ICTAC 2015,
held in Cali, Colombia, in October 2015. Meer
The book provides an overview of the state-of-the-art of map construction algorithms, which use tracking data in the form of trajectories to generate vector maps. Meer
This new and expanded monograph improves upon Mohan's earlier book, Residue Number Systems (Springer, 2002) with a state of the art treatment of the subject. Meer
This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. Meer
This title examines the structure of approximate solutions of optimal control problems considered on subintervals of a real line. Specifically at the properties of approximate solutions which are independent of the length of the interval. Meer
The two-volume set LNCS 9779 and LNCS 9780 constitutes the refereed proceedings of the 28th International Conference on Computer Aided Verification, CAV 2016, held in Toronto, ON, USA, in July 2016. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books