Data mining is a mature technology. The prediction problem, looking for predictive patterns in data, has been widely studied. Strong me- ods are available to the practitioner. Meer
This book explores connections between control theory and geometric mechanics. The author links control theory with a geometric view of classical mechanics in both its Lagrangian and Hamiltonian formulations, and in particular with the theory of mechanical systems subject to motion constraints. Meer
Extracting content from text continues to be an important research problem for information processing and management. Approaches to capture the semantics of text-based document collections may be based on Bayesian models, probability theory, vector space models, statistical models, or even graph theory. Meer
Differing from other books on the subject, this one uses the framework of constraint databases to provide a natural and powerful generalization of relational databases. Meer
Details the different activities of software development with a case-study approach whereby a project is developed through the course of the book
The sequence of chapters is essentially the same as the sequence of activities performed during a typical software project. Meer
Image-Based Rendering examines the theory, practice, and applications associated with image-based rendering and modeling. As leading researchers in the field, the authors combine their unique experiences in computer graphics, computer vision, and signal processing to address the multidisciplinary nature of IBR research. Meer
Coding is a highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding may prevent a serious and practical understanding of this important area. Meer
Reliable human authentication schemes are of paramount importance in our highly networked society. Advances in biometrics help address the myriad of problems associated with traditional human recognition methods. Meer
One of the challenges for computational intelligence and biometrics is to understand how people process and recognize faces and to develop automated and reliable face recognition systems. Meer
Mobility is perhaps the most important market and technological trend within information and communication technology. With the advent of new mobile infrastructures providing higher bandwidth and constant connection to the network from virtually everywhere, the way people use information resources is predicted to be radically transformed. Meer
Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) and nontraditional data sets (images, text, geometric objects, time-series). Meer
Distribution-free resampling methods—permutation tests, decision trees, and the bootstrap—are used today in virtually every research area. A Practitioner’s Guide to Resampling for Data Analysis, Data Mining, and Modeling explains how to use the bootstrap to estimate the precision of sample-based estimates and to determine sample size, data permutations to test hypotheses, and the readily-interpreted decision tree to replace arcane regression methods. Meer
Internet Protocols (IP) covers many of the newer internet technologies being developed and explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. Meer
Books on computation in the marketplace tend to discuss the topics within specific fields. Many computational algorithms, however, share common roots. Meer
Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today's always on mobile society. Meer
With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. Meer
Helps in the development of large software projects.
Uses a well-known open-source software prototype system (Vesta developed at Digital and Compaq Systems Research Lab). Meer
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. Meer
This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. Meer
Innovation in Manufacturing Networks A fundamental concept of the emergent business, scientific and technological paradigms ces area, innovation the ability to apply new ideas to products, processes, organizational practices and business models - is crucial for the future competitiveness of organizations in a continually increasingly globalised, knowledge-intensive marketplace. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books