This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Göteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. Meer
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Meer
200Ts Vision of Vision One of my formative childhood experiences was in 1968 stepping into the Uptown Theater on Connecticut Avenue in Washington, DC, one of the few movie theaters nationwide that projected in large-screen cinerama. Meer
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. Meer
The CoreGRID Network of Excellence (NoE) project began in September 2004. Two months later, in November 2004, the first CoreGRID Integra tion Workshop was held within the framework of the prestigious international Dagstuhl seminars. Meer
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Meer
Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machine learning method of Genetic Programming (GP). Meer
Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. Meer
Artificial Intelligence is one of the oldest and most exciting subfields of computing, covnering such areas as intelligent robotics, intelligent planning and scheduling, model-based reasoning, fault diagnosis, natural language processing, maching translation, knowledge representation and reasoning, knowledge-based systems, knowledge engineering, intelligent agents, machine learning, neural nets, genetic algorithms and knowledge management. Meer
Biometrics: Personal Identification in Networked Society is a comprehensive and accessible source of state-of-the-art information on all existing and emerging biometrics: the science of automatically identifying individuals based on their physiological or behavior characteristics. Meer
The Semantic Web, that adds a conceptual layer of machine-understand able metadata to the existing content, will make the content available for processing by intelligent software allowing automatic resource integration and providing interoperability between heterogeneous systems. Meer
This book primarily discusses issues related to the mining aspects of data streams and it is unique in its primary focus on the subject.
This volume covers mining aspects of data streams comprehensively: each contributed chapter contains a survey on the topic, the key ideas in the field for that particular topic, and future research directions. Meer
Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Meer
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Meer
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). Meer
Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication networks. The objective of this book is to advance and promote the theory and applications of combinatorial optimization in communication networks. Meer
Research and development on optical wavelength-division multiplexing (WDM) networks have matured considerably. While optics and electronics should be used appropriately for transmission and switching hardware, note that "intelligence'' in any network comes from "software,'' for network control, management, signaling, traffic engineering, network planning, etc. Meer
This volume introduces a formal representation framework for modelling and reasoning, that allows us to quantify the uncertainty inherent in the use of vague descriptions to convey information between intelligent agents. Meer
Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area. Meer
The area of similarity searching is a very hot topic for both research and c- mercial applications. Current data processing applications use data with c- siderably less structure and much less precise queries than traditional database systems. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books