An up-to-date, self-contained introduction to a state-of-the-art machine learning approach, Ensemble Methods: Foundations and Algorithms shows how these accurate methods are used in real-world tasks. Meer
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. Meer
This book is the first serious attempt to gather all of the available theory of "nonharmonic Fourier series" in one place, combining published results with new results by the authors. Meer
Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Meer
Statistical Mining and Data Visualization in Atmospheric Sciences brings together in one place important contributions and up-to-date research results in this fast moving area. Meer
The main intention of this book is to give an impression of the state-of-the-art in system-level memory management (data transfer and storage) related issues for complex data-dominated real-time signal and data processing applications. Meer
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Meer
Taking a learn-by-doing approach, Software Engineering Design: Theory and Practice uses examples, review questions, chapter exercises, and case study assignments to provide students and practitioners with the understanding required to design complex software systems. Meer
Although recent global disasters have clearly demonstrated the power of social media to communicate critical information in real-time, its true potential has yet to be unleashed. Meer
Every area of science and engineering today has to process voluminous data sets. Using exact, or even approximate, algorithms to solve intractable problems in critical areas, such as computational biology, takes time that is exponential in some of the underlying parameters. Meer
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Meer
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. Meer
In Interconnect-centric Design for Advanced SoC and NoC, we have tried to create a comprehensive understanding about on-chip interconnect characteristics, design methodologies, layered views on different abstraction levels and finally about applying the interconnect-centric design in system-on-chip design. Meer
In recent years, IT application scenarios have evolved in very innovative ways. Highly distributed networks have now become a common platform for large-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. Meer
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. Meer
This book contains a selection of tutorials on hot topics in information technology, which were presented at the IFIP World Computer Congress. WCC2004 took place at the Centre de Congrès Pierre Baudis, in Toulouse, France, from 22 to 27 August 2004. Meer
Social computing is concerned with the study of social behavior and social c- text based on computational systems. Behavioral modeling reproduces the social behavior, and allows for experimenting, scenario planning, and deep understa- ing of behavior, patterns, and potential outcomes. Meer
Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime. Meer
Few books comprehensively cover the software and programming aspects of reversible computing. Filling this gap, Introduction to Reversible Computing offers an expanded view of the field that includes the traditional energy-motivated hardware viewpoint as well as the emerging application-motivated software approach. Meer
Visualization and analysis tools, techniques, and algorithms have undergone a rapid evolution in recent decades to accommodate explosive growth in data size and complexity and to exploit emerging multi- and many-core computational platforms. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books