First book to examine game analysis, modern didactic reflections on learning, and big data in a key topic in science and society today.
Provides understanding on how to use game analysis when applied to different sports and how to use the approach for video, event and positional data. Meer
First book to examine game analysis, modern didactic reflections on learning, and big data in a key topic in science and society today.
Provides understanding on how to use game analysis when applied to different sports and how to use the approach for video, event and positional data. Meer
Augmented Materials and Smart Objects investigates the issues required to ensure technology platforms capable of being seamlessly integrated into everyday objects, particularly the requirements for integrated computation and MEMs sensors, System-in-a-package solutions, multi-chip modules, the impact of the trend towards embedded microelectronic electronics sub-systems, novel assembly techniques for autonomous MEMs sensors, as well as practical performance issues that are key to the AmI concept. Meer
Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. Meer
This book presents state-of-the-art analytical methods from statistics and data mining for the analysis of high-throughput data from genomics and proteomics. Meer
The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in order to overcome the current fragmentation and duplication of effort in this area. Meer
Semantic Web: Real-World Applications from Industry offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications in real business environments. Meer
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Meer
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science. Meer
Some of our day-to-day situations dealing with self-organization, mobility management, and energy efficient design directly relate to ad hoc wireless (mobile or static) network applications. Meer
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Meer
Joseph Dvorak has over 10 years experience in wearable technology and design. He led the Conformables project at Motorola which researched highly wearable and easy to use devices and applications. Meer
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. Meer
Data mining is the science and technology of exploring large and complex bodies of data in order to discover useful patterns. It is extremely important because it enables modeling and knowledge extraction from abundant data availability. Meer
Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web surfing history, and more. Meer
Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field. Meer
This volume carries the proceedings of the 15th International Conference on Information Systems Development (ISD). ISD progresses rapidly, continually creating new challenges. Meer
The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both on access control in complex environments as well as other aspects of computer security and privacy. Meer
This volume honors the professional life of Jacques Berleur. He is known for his extensive work within the IFIP community to expose the nature of the ethical dilemmas of a society increasingly reliant on complex ICT infrastructures, to raise awareness of the social challenges this poses, and to influence action compatible with the ethical values of western democracy. Meer
The Handbook of Data Structures and Applications was first published over a decade ago. This second edition aims to update the first by focusing on areas of research in data structures that have seen significant progress. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books