A wide range of modern computer applications require the performance and flexibility of parallel and distributed systems. Better software support is required if the technical advances in these systems are to be fully exploited by commerce and industry. Meer
The human face is perhaps the most familiar and easily recognized object in the world, yet both its three-dimensional shape and its two-dimensional images are complex and hard to characterize. Meer
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. Meer
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4. Meer
This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. Meer
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. Meer
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography.
Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography. Meer
Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Meer
Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. Meer
Thistwo-volumebookisthepublishedproceedingsofthe17thInternationalConferenceonInformation SystemsDevelopment(ISD2008)thatwashostedbytheDepartmentofComputerScienceoftheU- versityofCyprusattheAnnabelleHotel,Paphos,Cyprus,from25–27August2008. Meer
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. Meer
The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Meer
This book constitutes the proceedings of the 8th International Conference on Human Choice and Computers held in Pretoria, South Africa.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. Meer
Knowledge existing in modern information systems usually comes from many sources and is mapped in many ways. There is a real need for representing “knowledge pieces” as rather universal objects that should fit to multi-purpose a- ing systems. Meer
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. Meer
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Meer
From Combinatorics to Philosophy: The Legacy of G. -C. Rota provides an assessment of G. -C. Rota's legacy to current international research issues in mathematics, philosophy and computer science. Meer
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books