Challenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains such as space exploration, military and disaster response, groups of this size (or larger) are required to achieve extremely complex, distributed goals. Meer
Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Meer
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. Meer
Abstract Biological vision is a rather fascinating domain of research. Scientists of various origins like biology, medicine, neurophysiology, engineering, math ematics, etc. Meer
As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Meer
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. Meer
Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Meer
This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Göteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. Meer
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Meer
200Ts Vision of Vision One of my formative childhood experiences was in 1968 stepping into the Uptown Theater on Connecticut Avenue in Washington, DC, one of the few movie theaters nationwide that projected in large-screen cinerama. Meer
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. Meer
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Meer
This book contains keynote lectures and full papers presented at the International Symposium on Computational Modelling of Objects Represented in Images (CompIMAGE), held in Coimbra, Portugal, on 20-21 October 2006. Meer
Making sense of sports performance data can be a challenging task but is nevertheless an essential part of performance analysis investigations. Focusing on techniques used in the analysis of sport performance, this book introduces the fundamental principles of data analysis, explores the most important tools used in data analysis, and offers guidance on the presentation of results. Meer
This collection of essays explores the different ways the insights from complexity theory can be applied to law. Complexity theory – a variant of systems theory – views law as an emergent, complex, self-organising system comprised of an interactive network of actors and systems that operate with no overall guiding hand, giving rise to complex, collective behaviour in law communications and actions. Meer
You’ve found your Muse; now learn how to create with it
Creative Web Design with Adobe Muse is a step-by-step guide to creating fully-featured websites using Adobe Muse. Meer
Ten years of intensive effort on computer chess have produced notable progress. Although the background information and technical details that were written in 1975 for the first edition of this book are still valid in most essential points, hardware and software refinements have had a major impact on the effectiveness of these ideas. Meer
Of recent coinage, the term "nondifferentiable optimization" (NDO) covers a spectrum of problems related to finding extremal values of nondifferentiable functions. Meer
This book presents the Android plug-in technology used in Android development. This technology is widely used by a majority of Chinese internet companies, and is becoming more widely used worldwide. Meer
There are several theories of programming. The first usable theory, often called "Hoare's Logic", is still probably the most widely known. In it, a specification is a pair of predicates: a precondition and postcondition (these and all technical terms will be defined in due course). Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books