From the editors of the wildly successful Beyond Calculation comes another exploration of the overwhelming impact of computers on our future. This time, the essays focus on the human impact of computer technology and culture: how computers will affect the ways we teach, learn, communicate, relate to each other, and live in the coming decades. Meer
Much current research in computer science is concerned with two questions: is a program correct? And how can we improve a correct program preserving correctness? Meer
Implicit definition and description of geometric objects and surfaces plays a critical role in the appearance and manipulation of computer graphics. In addition, the mathematical definition of shapes, using an implicit form, has pivotal applications for geometric modeling, visualization and animation. Meer
This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Meer
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer’s perspective, linking theory and fundamental concepts to common practices and everyday examples. Meer
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. Meer
In recent years, classical computability has expanded beyond its original scope to address issues related to computability and complexity in algebra, analysis, and physics. Meer
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. Meer
Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm .
Presents results of a large and integrated body of research in the area of 'quantitative' program logics. Meer
ACL Made Simple is a book/CD-ROM combination that educates orthopedic residents, athletic trainers, and various medical support staff about the fundamentals of ACL injuries. Meer
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Meer
This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. Meer
We create technology enabling us to do things never before possible and it ultimately changes the way we live, work, play, and interact with each other. Meer
This workshop proceedings introduces the latest innovations and trends in IP-based applications and satellite networking. It explains many aspects of advanced satellite networking systems, such as deployment of IPv6 over satellites, working with WLAN and WiMax, and rules concerning multi-segment networks. Meer
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Meer
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. Meer
Assembled in this volume is a collection of some of the state-of-the-art methods that are using computer vision and machine learning techniques as applied in robotic applications. Meer
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Meer
A large number of cultural heritage objects around the world are deteriorating or being destroyed due to the work of natural disasters, such as earthquakes and floods, and human-inflicted destruction, such as war and vandalism. Meer
Genetic Programming Theory and Practice V was developed from the fifth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books