Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Meer
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). Meer
Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication networks. The objective of this book is to advance and promote the theory and applications of combinatorial optimization in communication networks. Meer
Research and development on optical wavelength-division multiplexing (WDM) networks have matured considerably. While optics and electronics should be used appropriately for transmission and switching hardware, note that "intelligence'' in any network comes from "software,'' for network control, management, signaling, traffic engineering, network planning, etc. Meer
This volume introduces a formal representation framework for modelling and reasoning, that allows us to quantify the uncertainty inherent in the use of vague descriptions to convey information between intelligent agents. Meer
Drawing on case studies from Denmark, The Netherlands and the UK, this book discusses new Information and Communication Technologies (ICTs). Contributors argue that ICTs play an important role in the process of restructuring and redefining basic relations within the political systems of Western democracies. Meer
This book contains keynote lectures and full papers presented at the International Symposium on Computational Modelling of Objects Represented in Images (CompIMAGE), held in Coimbra, Portugal, on 20-21 October 2006. Meer
You can get there
Whether you′re already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Meer
This book is a very general and accessible introduction to Object Oriented Analysis. It contains extensive pedagogy and incorporates patient explanations, making it ideal for beginners. Meer
Software architecture is foundational to the development of large, practical software–intensive applications. This brand–new text covers all facets of software architecture and how it serves as the intellectual centerpiece of software development and evolution. Meer
A must–have guide for all companies undertaking service–oriented architecture (SOA) and IT governance
Service–Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance. Meer
From an industry insider––a close look at high–performance, end–to–end switching solutions
Load balancers are fast becoming an indispensable solution for handling the huge traffic demands of the Web. Meer
Applied Graph Data Science: Graph Algorithms and Platforms, Knowledge Graphs, Neural Networks, and Applied Use Cases delineates how graph data science significantly empowers the application of data science. Meer
Real–life experience of eXtreme Programming from XP programmers.
eXtreme Programming (XP) is a hot new development methodology for building software systems quickly without sacrificing quality. Meer
Sensor Networks for Smart Hospitals shows how the use of sensors to gather data on a patient's condition and the environment in which their care takes place can allow healthcare professionals to monitor well-being and make informed decisions about treatment. Meer
Bi-directionality in Human-AI Collaborative Systems investigates the foundations, metrics, and applications of human-machine systems, along with the legal ramifications of autonomy, including standards, trust by the public, and bidirectional trust by users and AI systems. Meer
algorithms and data structures in C++ Leendert Ammeraal Hogeschool van Utrecht, The Netherlands C++ is capable of tackling a whole range of programming tasks. Meer
The second volume of this work contains Parts 2 and 3 of the "Handbook of Coding Theory". Part 2, "Connections", is devoted to connections between coding theory and other branches of mathematics and computer science. Meer
Understand how to use the new features of Microsoft SQL Server 2008 for data mining by using the tools in
Data Mining with Microsoft SQL Server 2008, which will show you how to use the SQL Server Data Mining Toolset with Office 2007 to mine and analyze data. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books