Event-Triggered and Time-Triggered Control Paradigms presents a valuable survey about existing architectures for safety-critical applications and discusses the issues that must be considered when moving from a federated to an integrated architecture. Meer
Since the advent of optical communications, a greattechnological effort has been devoted to the exploitation of the huge bandwidth of optical fibers. Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual 10 Gb/s per channel dense wavelength - vision multiplexing (DWDM) systems, with dozens of channels on a single fiber. Meer
There has continuously been a massive growth of Internet traffic for these years despite the "bubble burst" in year 2000. As the telecom market is gradually picking up, it would be a consensus in telecom and data-com industries that the CAPEX (Capital Expenditures) to rebuild the network infrastructure to cope with this traffic growth would be imminent, while the OPEX (Operational Expenditures) has to be within a tight constraint. Meer
There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. Meer
The work described in this book was first presented at the Second Workshop on Genetic Programming, Theory and Practice, organized by the Center for the Study of Complex Systems at the University of Michigan, Ann Arbor, 13-15 May 2004. Meer
Machine perception requires the digitization of physically-sensed signals. During the last ten years, digital range images have become available from a variety of sensors. Meer
A rational study of kinematics is a treatment of the subject based on invariants, i.e., quantities that remain essentially unchanged under a change of observer. Meer
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. Meer
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. Meer
A detailed formulation of neural networks from the information-theoretic viewpoint. The authors show how this perspective provides new insights into the design theory of neural networks. Meer
Current practice dictates the separation of the hardware and software development paths early in the design cycle. These paths remain independent with very little interaction occurring between them until system integration. Meer
Document Processing and Retrieval: TEXPROS focuses on the design and implementation of a personal, customizable office information and document processing system called TEXPROS (a TEXt PROcessing System). Meer
Researchers develop simulation models that emulate real-world situations. While these simulation models are simpler than the real situation, they are still quite complex and time consuming to develop. Meer
Rethinking Hypermedia: The Microcosm Approach is essentially the story of the Microcosm hypermedia research and development project that started in the late 1980's and from which has emerged a philosophy that re-examines the whole concept of hypermedia and its role in the evolution of multimedia information systems. Meer
Designing Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers working in the multidisciplinary area of speech technology applications. Meer
Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. Meer
In many applications, e.g., bioinformatics, web access traces, system u- lization logs, etc., the data is naturally in the form of sequences. It has been of great interests to analyze the sequential data to find their inherent char- teristics. Meer
Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years. Meer
This book brings together experts to discuss relevant results in software process modeling, and expresses their personal view of this field. It is designed for a professional audience of researchers and practitioners in industry, and graduate-level students. Meer
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books