This book provides a comprehensive introduction to the latest advances in the mathematical theory and computational tools for modeling high-dimensional data drawn from one or multiple low-dimensional subspaces (or manifolds) and potentially corrupted by noise, gross errors, or outliers. Meer
Since its establishment in 1998, Microsoft Research Asia’s trademark and long term commitment has been to foster innovative research and advanced education in the Asia-Pacific region. Meer
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. Meer
From Combinatorics to Philosophy: The Legacy of G. -C. Rota provides an assessment of G. -C. Rota's legacy to current international research issues in mathematics, philosophy and computer science. Meer
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Meer
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Meer
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. Meer
Ambient Intelligence is a vision of the future where the world will be surrounded by electronic environments sensitive and responsive to people, wherein devices work in concert to support people in carrying out their everyday life activities, in an easy and natural way. Meer
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
The advances in computer entertainment, multi-player and online games, technology-enabled art, culture and performance have created a new form of entertainment and art. Meer
The basis for this book is a number of lectures given frequently by the author to third year students of the Department of Economics at Leningrad State University who specialize in economical cybernetics. Meer
Leading authorities deliver the commandments for designing high–speed networks
There are no end of books touting the virtues of one or another high–speed networking technology, but until now, there were none offering networking professionals a framework for choosing and integrating the best ones for their organization′s networking needs. Meer
Michael Goodrich and Roberto Tamassia, authors of the successful, Data Structures and Algorithms in Java, 2/e, have written Algorithm Engineering, a text designed to provide a comprehensive introduction to the design, implementation and analysis of computer algorithms and data structures from a modern perspective. Meer
This unique book provides an introduction to programming on the Internet. Class–tested over a two–year period, this text covers the "nuts and bolts" of Internet programming. Meer
A complete study on an important class of linear dynamical systems–positive linear systems
One of the most often–encountered systems in nearly all areas of science and technology, positive linear systems is a specific but remarkable and fascinating class. Meer
Intelligent Evolutionary Optimization introduces biologically-inspired intelligent optimization algorithms to address complex optimization problems and provide practical solutions for tackling combinatorial optimization problems. Meer
Making sense of sports performance data can be a challenging task but is nevertheless an essential part of performance analysis investigations. Focusing on techniques used in the analysis of sport performance, this book introduces the fundamental principles of data analysis, explores the most important tools used in data analysis, and offers guidance on the presentation of results. Meer
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks analyzes diverse machine learning techniques, including supervised, unsupervised, reinforcement, and deep learning, along with their applications in detecting and preventing cyberattacks in future IoT systems. Meer
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books