This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. Meer
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. Meer
This book constitutes revised selected papers from the 9th International Gesture Workshop, GW 2011, held in Athens, Greece, in May 2011.
The 24 papers presented were carefully reviewed and selected from 35 submissions. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Haifa Verification Conference, HVC 2011, held in Haifa, Israel in December 2011. Meer
This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce. Meer
Search computing, which has evolved from service computing, focuses on building the answers to complex search queries by interacting with a constellation of cooperating search services, using the ranking and joining of results as the dominant factors for service composition. Meer
Across the world there is growing awareness of the importance of innovation and knowledge transfer. Innovation in the sense of generating new knowledge and making better use of existing knowledge, coupled with knowledge transfer and sharing paradigms, have never been more relevant to the universities, industry, commerce and the third sector. Meer
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. Meer
Requirements engineering is one of the most complex and at the same time most crucial aspects of software engineering. It typically involves different stakeholders with different backgrounds. Meer
Products of modern artificial intelligence (AI) have mostly been formed by the views, opinions and goals of the “insiders”, i.e. people usually with engineering background who are driven by the force that can be metaphorically described as the pursuit of the craft of Hephaestus. Meer
Two ideas lie gleaming on the jeweler's velvet. The first is the calculus, the sec ond, the algorithm. The calculus and the rich body of mathematical analysis to which it gave rise made modern science possible; but it has been the algorithm that has made possible the modern world. Meer
Object-Process Methodology (OPM) is a comprehensive novel approach to systems engineering. Integrating function, structure and behavior in a single, unifying model, OPM significantly extends the system modeling capabilities of current object-oriented methods. Meer
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. Meer
These Transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the Semantic Web, social networks and multiagent systems. Meer
This book constitutes the refereed proceedings of the 13th Ibero-American Conference on Artificial Intelligence, IBERAMIA 2012, held in Cartagena de Indias, Colombia, in November 2012. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. Meer
This book constitutes the refereed proceedings of the 5th International Workshop on Motion in Games, held in Rennes, France, in November 2012. The 23 revised full papers presented together with 9 posters and 5 extended abstracts were carefully reviewed and selected from numerous submissions. Meer
Brain imaging brings together the technology, methodology, research questions and approaches of a wide range of scientific fields including physics, statistics, computer science, neuroscience, biology, and engineering. Meer
This book constitutes the thoroughly reviewed post-proceedings of the 9th International Workshop, EUMAS 2011, held in Maastricht, The Netherlands, in November 2011. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books