The lives of people all around the world, especially in industrialized nations, continue to be changed by the presence and growth of the Internet. Its in? Meer
Thisvolumecontainsthepaperspresentedatthe11thworkshoponJobSched- ing Strategies for Parallel Processing. The workshop was held in Boston, MA, on June 19, 2005, in conjunction with the 19th ACM International Conference on Supercomputing (ICS05). Meer
This book constitutes the refereed proceedings of the International Conference on Biometrics, ICB 2006, held in Hong Kong, China in January 2006. The book includes 104 revised full papers covering such areas of biometrics as the face, fingerprint, iris, speech and signature, biometric fusion and performance evaluation, gait, keystrokes, and more. Meer
This book constitutes the refereed joint proceedings of four international workshops held in conjunction with the 8th Asia-Pacific Web Conference, APWeb 2006, in Harbin, China in January 2006. Meer
This book provides a critical discussion of fuzzy controllers from the perspective of classical control theory. Special emphasis is placed on topics of importance for industrial applications, including self-tuning of fuzzy controllers, optimisation and stability analysis. Meer
This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection held in September 2005. The 15 revised full papers and two practical experience reports were carefully reviewed and selected from 83 submissions. Meer
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Large-Scale Scientific Computations, LSSC 2005, held in Sozopol, Bulgaria in June 2005. Meer
This book constitutes the refereed post-proceedings of the First International Conference on Hardware Verification, Software Testing, and PADTAD held in November 2005. Meer
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005. Meer
This book constitutes the thoroughly refereed joint postproceedings of the 8th International Seminar on Relational Methods in Computer Science, the 3rd International Workshop on Applications of Kleene Algebra, and the Workshop of COST Action 274. Meer
This book constitutes the refereed proceedings of the 28th European Conference on Information Retrieval Research, ECIR 2006, held in London, April 2006. Meer
This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005. The 32 revised full papers presented together with two invited talks are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography. Meer
This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining. Meer
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. Meer
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. Meer
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. Meer
Gaudi’s dream which will be reached finalizing the construction of the "Sagrada Familia" in Barcelona, the victory of the Swiss sail boat "Alinghi", which won America’s Cup, films such as " A Beautiful Mind" and "Enigma", the theatrical play based on the life of Galois, the images of the Dutch graphic artist M. Meer
This book constitutes the refereed proceedings of the Third International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2006. Meer
Parallel and distributed computer systems are built to close the gap between the demand for high-performance computing and the computing power available using standalone single-processor machines. Meer
Internetzwerke, bestehend aus miteinander gekoppelten lokalen und öffentlichen Datennetzen (LAN, WAN), sowie Methoden und Werkzeuge für ihre Entwurfsplanung und Leistungsoptimierung sind die zentralen Themen dieser Monographie. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books