This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. Meer
Das Buch ergänzt und erweitert “Relationale Datenbanken und SQL in Theorie und Praxis (ISBN 978-3-642-28985-9)". Schwerpunkt der Darstellung sind Aspekte der Anwendungsprogrammierung mit Datenbanken. Meer
This book presents the fundamental theory for non-standard diffusion problems in movement ecology. Lévy processes and anomalous diffusion have shown to be both powerful and useful tools for qualitatively and quantitatively describing a wide variety of spatial population ecological phenomena and dynamics, such as invasion fronts and search strategies. Meer
Alan Turing pioneered many research areas such as artificial intelligence, computability, heuristics and pattern formation. Nowadays at the information age, it is hard to imagine how the world would be without computers and the Internet. Meer
The three-volume set LNCS 8009-8011 constitutes the refereed proceedings of the 7th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. Meer
The four-volume set LNCS 8012, 8013, 8014 and 8015 constitutes the proceedings of the Second International Conference on Design, User Experience, and Usability, DUXU 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. Meer
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013. Meer
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. Meer
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013. Meer
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Meer
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013. Meer
This book constitutes the refereed proceedings of the 5th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. Meer
This book constitutes the refereed proceedings of the 9th International Conference on Data Integration in the Life Sciences, DILS 2013, held in Montreal, QC, Canada, in July 2013. Meer
This book constitutes the refereed proceedings of the International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making, IUKM 2013, held in Beijing China, in July 2013. Meer
In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können. Meer
Die Autoren vermitteln, was den Softwaretyp Campus-Management ausmacht, welche Funktionen zum Kern eines CMS gehören und welche nicht benötigt werden. Meer
Seit dem kommerziellen Erfolg des 3D-Blockbusters „Avatar“ im Jahr 2009 kommen immer mehr 3D-Filme und 3D-Fernseher auf den Markt. Mittlerweile gibt es Autostereoskopie-Verfahren, bei denen Zuschauer keine 3D-Brille mehr benötigen. Meer
This volume contains the lecture notes of the 9th Reasoning Web Summer School 2013, held in Mannheim, Germany, in July/August 2013. The 2013 summer school program covered diverse aspects of Web reasoning, ranging from scalable lightweight formalisms such as RDF to more expressive ontology languages based on description logics. Meer
Fuzzy classifiers are important tools in exploratory data analysis, which is a vital set of methods used in various engineering, scientific and business applications. Meer
This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books