Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Meer
The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. Meer
This book provides future research directions in energy, industry, and healthcare domain, and explores the different applications of IoT and its associated technologies. Meer
The Apple Macintosh Encyclopedia provides easily accessible, brief and understandable information on the topics that you are most likely to have questions about. Meer
Unique selling point:
• This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. Meer
Many books teach computational statistics. Until now, however, none has shown how to write a good program. This book gives statisticians, biostatisticians and methodologically-oriented researchers the tools they need to develop high-quality statistical software. Meer
Both authors have taught the course of “Distributed Systems” for many years in the respective schools. During the teaching, we feel strongly that “Distributed systems” have evolved from traditional “LAN” based distributed systems towards “Internet based” systems. Meer
1) The book provides a basic understanding to readers who want to start their career in web application development. The book develops an understanding of the basics concepts and then takes a broader turn to enlighten the readers about the horizons which can be accessed using JavaScript. Meer
This book focuses on developing the basics concepts of Javascript and enlightening the readers about the horizons that can be accessed using this language. Meer
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. Meer
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. Meer
Automatic Differentiation (AD) is a maturing computational technology and has become a mainstream tool used by practicing scientists and computer engineers. Meer
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. Meer
An essential reader containing 19 important papers on the invention and early development of concurrent programming and its relevance to computer science and computer engineering. Meer
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. Meer
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Meer
Data mining is a mature technology. The prediction problem, looking for predictive patterns in data, has been widely studied. Strong me- ods are available to the practitioner. Meer
This book offers a detailed account of IBM's Deep Blue chess program, the people who created it, and its historic battles with World Chess Champion Garry Kasparov. Meer
Here is, for the first time, a book that clearly explains and applies new level set methods to problems and applications in computer vision, graphics, and imaging. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books