System on chips designs have evolved from fairly simple unicore, single memory designs to complex heterogeneous multicore SoC architectures consisting of a large number of IP blocks on the same silicon. Meer
Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to “emerged and exciting new computing paradigm of Ubiquitous Computing”, includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Meer
The book covers a wide range of topics, yet essential, in Computational Finance (CF), understood as a mix of Finance, Computational Statistics, and Mathematics of Finance. Meer
Much work on fuzzy control, covering research, development and applications, has been developed in Europe since the 90's. Nevertheless, the existing books in the field are compilations of articles without interconnection or logical structure or they express the personal point of view of the author. Meer
Computational Creativity, Concept Invention, and General Intelligence in their own right all are flourishing research disciplines producing surprising and captivating results that continuously influence and change our view on where the limits of intelligent machines lie, each day pushing the boundaries a bit further. Meer
In this monograph the author presents explicit conditions for the exponential, absolute and input-to-state stabilities including solution estimates of certain types of functional differential equations. Meer
Approach your problem from the right It isn't that they can't see end and begin with the answers. the solution. Then one day, perhaps you will find It is that they can't see the the final question. Meer
Thurston maps are topological generalizations of postcritically-finite rational maps. This book provides a comprehensive study of ergodic theory of expanding Thurston maps, focusing on the measure of maximal entropy, as well as a more general class of invariant measures, called equilibrium states, and certain weak expansion properties of such maps. Meer
In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. Meer
This book presents the combined proceedings of the 7th International Conference on
Computer Science and its Applications (CSA-15) and the International Conference on
Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. Meer
This volume contains the proceedings of the 4th International
Conference on Frontier Computing (FC 2015), Bangkok, Thailand, September
9-11, 2015, and brings together state-of-the-art results covering many aspects
of emerging computer science and information technology from international
academic and industrial researchers. Meer
This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. Meer
Force and motion control systems of varying degrees of sophistication have shaped the lives of all individuals living in industrialized countries all over the world, and together with communication technology are largely responsible for the high standard ofliving prevalent in many communities. Meer
Quantum computing promises to solve problems which are intractable on digital computers. This book explains how quantum computators can do these amazing things. Meer
The approach taken in this text is largely practical, with algorithms being presented in full and working code (in BASIC, FORTRAN, PASCAL and C) on the accompanying disk. Meer
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e. Meer
This book constitutes the refereed proceedings of the 13th
National Conference on Embedded System Technology, ESTC 2015, held in Beijing,
China, in October 2015. Meer
The proceedings of SocProS 2015 will serve as an academic bonanza for scientists and researchers working in the field of Soft Computing. This book contains theoretical as well as practical aspects using fuzzy logic, neural networks, evolutionary algorithms, swarm intelligence algorithms, etc. Meer
This book
constitutes the refereed proceedings of the First National Conference on Big
Data Technology and Applications, BDTA 2015, held in Harbin, China, in December
2015. Meer
This book discusses the latest channel coding techniques, MIMO systems, and 5G channel coding evolution. It provides a comprehensive overview of channel coding, covering modern techniques such as turbo codes, low-density parity-check (LDPC) codes, space–time coding, polar codes, LT codes, and Raptor codes as well as the traditional codes such as cyclic codes, BCH, RS codes, and convolutional codes. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books