Solving multi-objective problems is an evolving effort, and computer science and other related disciplines have given rise to many powerful deterministic and stochastic techniques for addressing these large-dimensional optimization problems. Meer
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. Meer
This book contains extended and revised versions of the best papers that have been presented during the twelfth edition of the IFIP TC10/WG10.5 International Conference on Very Large Scale Integration, a Global System-on-a-Chip Design & CAD Conference. Meer
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". Meer
This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e. Meer
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc. Meer
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Meer
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. Meer
Computer graphics games and animations have been popular for over a decade, and personal computers have now evolved to support real-time, realistic-looking interactive games. Meer
The editors felt that the time was right for a book on an important topic, the history and development of the notions of chaotic attractors and their "natu ral" invariant measures. Meer
This book is concerned with data in which the observations are independent and in which the response is multivariate.
Companion book to Robust Diagnostic Regression Analysis (ISBN 0-387-95017) published by Springer in 2000. Meer
Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. Meer
This book presents state-of-the-art analytical methods from statistics and data mining for the analysis of high-throughput data from genomics and proteomics. Meer
This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. Meer
The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in order to overcome the current fragmentation and duplication of effort in this area. Meer
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Meer
The author of this book has identified the seven key emerging Internet-related technologies: Internet of things, smart everything, big data, cloud computing, cybersecurity, software-defined networking, and online education. Meer
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. Meer
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. Meer
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books