The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. Meer
This book constitutes the refereed proceedings of the 13th International Workshop on Groupware, CRIWG 2007, held in Bariloche, Argentina. The 17 revised full papers and 10 revised work-in-progress papers are organized in topical sections on group awareness and social aspects, groupware design and development, computer supported collaborative learning, groupware applications and studies, group negotiation and knowledge management, and groupware activities and evaluation. Meer
This book is part of a three-volume set that constitutes the refereed proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2007. Meer
This book constitutes the refereed proceedings of the 6th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2007, held in Morelia, Mexico, in September 2007. Meer
This book constitutes the refereed proceedings of the 7th International Conference on Intelligent Data Analysis, IDA 2007, held in Ljubljana, Slovenia. Meer
These three volumes are a collection of the contributions presented to the joint th conferencesofKES2007,the11 InternationalConferenceonKnowledge-Based and Intelligent Information and Engineering Systems, and the WIRN 2007, the th 17 Italian Workshop on Neural Networks, held in Vietri sul Mare, Italy, in September 2007. Meer
These three volumes are a collection of the contributions presented to the joint th conferencesofKES2007,the11 InternationalConferenceonKnowledge-Based and Intelligent Information and Engineering Systems, and the WIRN 2007, the th 17 Italian Workshop on Neural Networks, held in Vietri sul Mare, Italy, in September 2007. Meer
This book constitutes the refereed proceedings of the 7th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2007. Meer
This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007. Meer
Mit ihrer Jahrestagung 2007 bietet die GI-Fachgruppe "Echtzeitsysteme und PEARL" Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen zu zahlreichen Themen aus dem Bereich der "Mobilität und Echtzeit" vorgestellt werden. Meer
This book constitutes the thoroughly refereed post-proceedings of the 33rd International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2007, held in Dornburg, Germany, in June 2007. Meer
This book constitutes the refereed proceedings of the 10th European Conference on Research and Advanced Technology for Digital Libraries, ECDL 2007, held in Budapest, Hungary. Meer
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp 2007. It covers all current issues in ubiquitous, pervasive and handheld computing systems and their applications, including tools and techniques for designing, implementing, and evaluating ubiquitous computing systems; mobile, wireless, and ad hoc networking infrastructures for ubiquitous computing; privacy, security, and trust in ubiquitous and pervasive systems. Meer
This volume offers a general view of recent conceptual developments of Soft Computing (SC). It presents successful new applications of SC to real-world problems leading to better performance than "traditional" methods. Meer
Based on the ontology and semantics of algebra, the computer algebra system Magma enables users to rapidly formulate and perform calculations in abstract parts of mathematics. Meer
Cultural history enthusiasts have asserted the urgent need to protect digital information from imminent loss. Without action, much of what has been created in digital form is likely to become unusable. Meer
This book presents a systematic study on the inherent complexity in fuzzy systems, resulting from the large number and the poor transparency of the fuzzy rules. Meer
It is now more than fifty years since the first paper on formal specifications of an information system was published by Young and Kent. Even if the term “conceptual model” was not used at that time, the basic intention of the abstract specification was to a large extent the same as for developing conceptual models today: to arrive at a precise, abstract, and hardware - dependent model of the informational and time characteristics of a data processing problem. Meer
Lattice-valued Logic aims at establishing the logical foundation for uncertain information processing routinely performed by humans and artificial intelligence systems. Meer
Over the last few decades, research on handwriting recognition has made impressive progress. The research and development on handwritten word recognition are to a large degree motivated by many application areas, such as automated postal address and code reading, data acquisition in banks, text-voice conversion, security, etc. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books