Almost all physical phenomena can be mathematically described in terms of differential equations. The finite element method is a tool for the appro- mate solution of differential equations. Meer
The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference was held, although the name Asiacrypt was ? Meer
Data Management is the process of planning, coordinating and controlling data resources. More often, applications need to store and search a large amount of data. Meer
The overwhelming pace of evolution in technology has made it possible to develop intelligent systems which help users in their dayly life activities. - cordingly, methods of recording, managing and analysing data have evolved from the very simple ? Meer
This book contains 71 original, scienti?c articles that address state-of-the-art researchrelatedto scale space and variationalmethods for image processing and computer vision. Meer
This is the first book on DNA computing, a molecular approach that may revolutionize computing-replacing silicon with carbon and microchips with DNA molecules. Meer
Themultiset (a set with multiplicities associated with its elements, in the form of natural numbers) is a notion which has appeared again and again in many areas of mathematics and computer science, sometimes called abag (some h- torical information appears in the enclosed paper by A. Meer
Since their introduction nearly 40 years ago, research on Petri nets has diverged in many different directions. Various classes of Petri net, motivated either by theory or applications, with its own specific features and methods of analysis, have been proposed and studies in depth. Meer
This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Rough Sets and Current Trends in Computing, RSCTC 2000, held in Banff, Canada in October 2000. Meer
This book constitutes the thoroughly refereed post-proceedings of the 4th International Andrei Ershov Memorial Conference, PSI 2001, held in Akademgorodok, Novosibirsk, Russia, in July 2001. Meer
Modernsoftwaresystemsincreasinglyusecommercial-o?-the-shelf(COTS)so- ware products as building blocks. In some cases, major software systems are assembled with virtually no custom code in the system. Meer
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. Meer
It isour greatpleasureto welcomeyouto the SecondInternationalWorkshopon Future Multimedia Networking (FMN). Following the ?rst successful workshop (held in Cardi? Meer
This volume (II) contains all publications accepted for the symposiums and workshops held in parallel with the 10th International Work-Conference on Artificial Neural Networks (IWANN 2009), covering a wide spectrum of technological areas such as distributed computing, artificial intelligence, bioinformatics, soft computing and ambient-assisted living: • DCAI 2009 (International Symposium on Distributed Computing and Artificial Intelligence), covering artificial intelligence and its applications in distributed environments, such as the Internet, electronic commerce, mobile communi- tions, wireless devices, distributed computing, and so on. Meer
Der Weg von der Inbetriebnahme eines Prozessorsystems bis zur Implementierung einer Human Machine Interface (HMI) bildet den Schwerpunkt dieses Werks. Meer
This six-volume-set (CCIS 231, 232, 233, 234, 235, 236) constitutes the refereed proceedings of the International Conference on Computing, Information and Control, ICCIC 2011, held in Wuhan, China, in September 2011. Meer
The theory of linear functional observers, which is the subject of this book, is increasingly becoming a popular researched topic because of the many advantages it presents in state observation and control system design. Meer
"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. Meer
This book constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology, ICHIT 2011, held in Daejeon, Korea, in September 2011. Meer
The two-volume set LNCS 6978 + LNCS 6979 constitutes the proceedings of the 16th International Conference on Image Analysis and Processing, ICIAP 2011, held in Ravenna, Italy, in September 2011. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books