This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. Meer
This book constitutes the refereed proceedings of the 18th International Conference on Text, Speech and Dialogue, TSD 2015, held in Pilsen, Czech Republic, in September 2015. Meer
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Meer
This book constitutes the refereed proceedings of the 5th
International Conference on Security, Privacy, and Applied Cryptography
Engineering, SPACE 2015, held in Jaipur, India, in October 2015. Meer
This book constitutes the refereed proceedings of the 9th Metadata and Semantics Research Conference, MTSR 2015, held in Manchester, UK, in September 2015. Meer
This book constitutes the refereed proceedings of the 12th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2015, held in Mallorca, Spain, in September 2015. Meer
This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2015, the 34th International Conference on Computer Safety, Reliability, and Security, held in Delft, The Netherlands, in September 2015. Meer
This book constitutes the refereed proceedings of the 34th International
Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015, held in
Delft, The Netherlands, in September 2014. Meer
The second edition of this textbook includes revisions based on the feedback on the first edition. In a new chapter the authors provide a concise introduction to the remainder of UML diagrams, adopting the same holistic approach as the first edition. Meer
This book constitutes the proceedings of the 17th International Conference on Discovery Science, DS 2015, held in banff, AB, Canada in October 2015. Meer
This book constitutes the proceedings of the 14th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2015, held in Warsaw, Poland, in September 2015. Meer
This book constitutes the proceedings of the 9th International Conference on Swarm Intelligence, held in Brussels, Belgium, in September 2014.
This volume contains 17 full papers, 9 short papers, and 7 extended abstracts carefully selected out of 55 submissions. Meer
This two volume set LNCS 8644 and LNCS 8645 constitutes the refereed proceedings of the 25th International Conference on Database and Expert Systems Applications, DEXA 2014, held in Munich, Germany, September 1-4, 2014. Meer
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Meer
This two volume set LNCS 8644 and LNCS 8645 constitutes the refereed proceedings of the 25th International Conference on Database and Expert Systems Applications, DEXA 2014, held in Munich, Germany, September 1-4, 2014. Meer
The 39-volume set, comprising the LNCS books 13661 until 13699, constitutes the refereed proceedings of the 17th European Conference on Computer Vision, ECCV 2022, held in Tel Aviv, Israel, during October 23–27, 2022. Meer
The 39-volume set, comprising the LNCS books 13661 until 13699, constitutes the refereed proceedings of the 17th European Conference on Computer Vision, ECCV 2022, held in Tel Aviv, Israel, during October 23–27, 2022. Meer
Ranking queries are widely used in data exploration, data analysis and decision making scenarios. While most of the currently proposed ranking techniques focus on deterministic data, several emerging applications involve data that are imprecise or uncertain. Meer
This lecture introduces systematically into the problem of managing large data collections in peer-to-peer systems. Search over large datasets has always been a key problem in peer-to-peer systems and the peer-to-peer paradigm has incited novel directions in the field of data management. Meer
In the 1980s, traditional Business Intelligence (BI) systems focused on the delivery of reports that describe the state of business activities in the past, such as for questions like "How did our sales perform during the last quarter? Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books