This book is based on a seminar given at the University of California at Los Angeles in the Spring of 1975. The choice of topics reflects my interests at the time and the needs of the students taking the course. Meer
Shortly after the end of World War II high-speed digital computing machines were being developed. It was clear that the mathematical aspects of com putation needed to be reexamined in order to make efficient use of high-speed digital computers for mathematical computations. Meer
As long as a branch of knowledge offers an abundance of problems, it is full of vitality. David Hilbert Over the last 15 years I have given lectures on a variety of problems in nonlinear functional analysis and its applications. Meer
Much of the material in this book comes from what I've learned as I've traveled around the country conducting seminars about working profitably in the automated office. Meer
Of recent coinage, the term "nondifferentiable optimization" (NDO) covers a spectrum of problems related to finding extremal values of nondifferentiable functions. Meer
State of the Art in Computer Graphics Aspects of Visualization This is the fourth volume derived from a State of . . . the Art in Computer Graphics Summer Institute. Meer
The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. Meer
Fuzzy logic has become an important tool for a number of different applications ranging from the control of engineering systems to artificial intelligence. Meer
Good software interface design is as crucial to a product's success as is its functionality. With the availability of visual development tools such as Visual Basic and Visual C++, more and more developers of applications will need to understand and use principles of good interface design. Meer
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Meer
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Meer
This book explores a great number of concepts, methods, technologies, and tools-in one word resources-that apply to various domains of typesetting. These resources have been developed and are used by the members of a very special community of people, which is also a community of very special people: the T^X community. Meer
Term rewriting techniques are applicable in various fields of computer sci ence: in software engineering (e.g., equationally specified abstract data types), in programming languages (e. Meer
The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English. Meer
An Updated Guide to the Visualization of Data for Designers, Users, and Researchers
Interactive Data Visualization: Foundations, Techniques, and Applications, Second Edition provides all the theory, details, and tools necessary to build visualizations and systems involving the visualization of data. Meer
Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. Meer
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. Meer
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Meer
Data mining is a mature technology. The prediction problem, looking for predictive patterns in data, has been widely studied. Strong me- ods are available to the practitioner. Meer
This book offers a detailed account of IBM's Deep Blue chess program, the people who created it, and its historic battles with World Chess Champion Garry Kasparov. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books