This book constitutes the refereed proceedings of the 1st IFIP Entertainment Computing Symposium held in Milan, Italy on September 7-10, 2008.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
This book explains the process of computer assisted biomedical image analysis diagnosis through mathematical modeling and inference of image-based bio-markers. Meer
New paradigms for communication/networking systems are needed in order to tackle the emerging issues such as heterogeneity, complexity and management of evolvable infrastructures. Meer
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? Meer
Containing over 300 entries in an A-Z format, the Encyclopedia of Parallel Computing provides easy, intuitive access to relevant information for professionals and researchers seeking access to any aspect within the broad field of parallel computing. Meer
This text is well-designed with respect to the exposition from the preliminary to the more advanced and the applications interwoven throughout. It provides the essential foundations for the theory as well as the basic facts relating to almost periodicity. Meer
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Meer
Everything users need to maximize the power of Linux is included in this convenient, inexpensive package. The Complete Linux Kit contains the third editions of the best-selling Linux Universe and LINUX-Unleashing the Workstation in your PC. Meer
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. Meer
An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research. Meer
Almost 12 years have passed by since we wrote Chaos and Fractals. At the time we were hoping that our approach of writing a book which would be both accessible without mathematical sophistication and portray these exiting new fields in an authentic manner would find an audience. Meer
This second edition of Grune and Jacobs’ brilliant work presents new developments and discoveries that have been made in the field. Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Meer
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. Meer
This updated textbook introduces readers to assembly and its evolving role in computer programming and design. The author concentrates the revised edition on protected-mode Pentium programming, MIPS assembly language programming, and use of the NASM and SPIM assemblers for a Linux orientation. Meer
Details the different activities of software development with a case-study approach whereby a project is developed through the course of the book
The sequence of chapters is essentially the same as the sequence of activities performed during a typical software project. Meer
Image-Based Rendering examines the theory, practice, and applications associated with image-based rendering and modeling. As leading researchers in the field, the authors combine their unique experiences in computer graphics, computer vision, and signal processing to address the multidisciplinary nature of IBR research. Meer
This book is a comprehensive and accessible introduction to the cross-entropy (CE) method. The CE method started life around 1997 when the first author proposed an adaptive algorithm for rare-event simulation using a cross-entropy minimization technique. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books