This thoroughly revised and updated three volume set continues to be the standard reference in the field, providing the latest in microelectronics design methods, modeling tools, simulation techniques, and manufacturing procedures. Meer
This thoroughly revised and updated three volume set continues to be the standard reference in the field, providing the latest in microelectronics design methods, modeling tools, simulation techniques, and manufacturing procedures. Meer
Although there has been a surge of interest in density estimation in recent years, much of the published research has been concerned with purely technical matters with insufficient emphasis given to the technique's practical value. Meer
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. Meer
The abstract branch of theoretical computer science known as Computation Theory typically appears in undergraduate academic curricula in a form that obscures both the mathematical concepts that are central to the various components of the theory and the relevance of the theory to the typical student. Meer
“Look deep into nature and you will understand everything better.” advised Albert Einstein. In recent years, the research communities in Computer Science, Engineering, and other disciplines have taken this message to heart, and a relatively new field of “biologically-inspired computing” has been born. Meer
This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. Meer
This text is well-designed with respect to the exposition from the preliminary to the more advanced and the applications interwoven throughout. It provides the essential foundations for the theory as well as the basic facts relating to almost periodicity. Meer
Everything users need to maximize the power of Linux is included in this convenient, inexpensive package. The Complete Linux Kit contains the third editions of the best-selling Linux Universe and LINUX-Unleashing the Workstation in your PC. Meer
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. Meer
An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research. Meer
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. Meer
Image-Based Rendering examines the theory, practice, and applications associated with image-based rendering and modeling. As leading researchers in the field, the authors combine their unique experiences in computer graphics, computer vision, and signal processing to address the multidisciplinary nature of IBR research. Meer
This book is a comprehensive and accessible introduction to the cross-entropy (CE) method. The CE method started life around 1997 when the first author proposed an adaptive algorithm for rare-event simulation using a cross-entropy minimization technique. Meer
This book records the author’s years of experience in the software industry. In his own practices, the author has found that the distributed work pattern has become increasingly popular in more and more work environments, either between vendors and customers or between different teams inside a company. Meer
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. Meer
The area of analysis and control of mechanical systems using differential geometry is flourishing.
This book collects many results over the last decade and provides a comprehensive introduction to the area. Meer
Reliable human authentication schemes are of paramount importance in our highly networked society. Advances in biometrics help address the myriad of problems associated with traditional human recognition methods. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books