The 2004 International Conference on Parallel and Distributed Computing, - plications and Technologies (PDCAT 2004) was the ?fth annual conference, and was held at the Marina Mandarin Hotel, Singapore on December 8–10, 2004. Meer
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). Meer
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. Meer
This book constitutes the refereed proceedings of the Second International Joint Conference on Ambient Intelligence, AmI 2011, held in Amsterdam, The Netherlands, in November 2011. Meer
The volume includes a set of selected papers extended and revised from the International Conference on Informatics, Cybernetics, and Computer Engineering. Meer
The volume includes a set of selected papers extended and revised from the International Conference on Informatics, Cybernetics, and Computer Engineering. Meer
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011. Meer
The volume includes a set of selected papers extended and revised from the International Conference on Informatics, Cybernetics, and Computer Engineering. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010. Meer
This fascinating book examines some of the characteristics of technological/engineering models that are likely to be unfamiliar to those who are interested primarily in the history and philosophy of science and mathematics, and which differentiate technological models from scientific and mathematical ones. Meer
How can one exchange information e?ectively when the medium of com- nication introduces errors? This question has been investigated extensively starting with the seminal works of Shannon (1948) and Hamming (1950), and has led to the rich theory of “error-correcting codes”. Meer
Peer-to-peer (P2P) computing is currently attracting enormous public attention, spurred by the popularity of file-sharing systems such as Napster, Gnutella, Morpheus, Kaza, and several others. Meer
This volume is concerned with the control and dynamics of time delay systems; a research field with at least six-decade long history that has been very active especially in the past two decades. Meer
This book constitutes the thoroughly refereed post-proceedings of the Dagstuhl Seminar 08021 on Numerical Validation in Current Hardware Architectures held at Dagstuhl Castle, Germany, in January 2008. Meer
Echtzeitsysteme sollen anfallende Daten unter Einhaltung von Zeitanforderungen verarbeiten. Deshalb hängt deren korrekte Funktion nicht nur von den Berechnungsergebnissen ab, sondern auch vom Zeitpunkt ihrer Erzeugung. Meer
This intriguing book constitutes the thoroughly refereed postproceedings of the International Conference on Non-Linear Speech Processing, NOLISP 2007, held in Paris, France, in May 2007. Meer
Software composition is a complex and fast-moving field, and this excellent new Springer volume keeps professionals in the subject right up to date. It constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Software Composition, SC 2007. Meer
Here, more than two dozen papers on some of the latest subject areas in cryptography have been selected for publication. They represent the refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography, SAC 2007, held in Ottawa, Canada, in August 2007. Meer
There are few more important areas of current research than this, and here, Springer has published a double helping of the latest work in the field. That’s because the book contains the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, and the co-located 1st International Workshop on Usable Security, both held in Trinidad/Tobago in February 2007. Meer
Complete with online files and updates, this important new volume covers many of the areas in which hybrid information technology is advancing. The book is the thoroughly refereed post-proceedings of the First International Conference on Hybrid Information Technology, held in Korea in 2006. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books