These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Meer
This book bridges a gap between a rigorous mathematical approach to variational problems and the practical use of algorithms of structural optimization in engineering applications. Meer
Motivation It is now possible to build powerful single-processor and multiprocessor systems and use them efficiently for data processing, which has seen an explosive ex pansion in many areas of computer science and engineering. Meer
One criterion for classifying books is whether they are written for a single pur pose or for multiple purposes. This book belongs to the category of multipurpose books, but one of its roles is predominant-it is primarily a textbook. Meer
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:
-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. Meer
Multi-Modal User Interactions in Controlled Environments investigates the capture and analysis of user’s multimodal behavior (mainly eye gaze, eye fixation, eye blink and body movements) within a real controlled environment (controlled-supermarket, personal environment) in order to adapt the response of the computer/environment to the user. Meer
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Meer
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Meer
Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. Meer
This book is a compilation of chapters written by leading researchers from all over the world. Those researchers’ common characteristic is that they have investigated issues at the intersection of the elds of information systems (IS) and evoluti- ary psychology (EP). Meer
DSSSL (Document Style Semantics and Specification Language) is an ISO standard (ISO/IEC 10179: 1996) published in the year 1996. DSSSL is a standard of the SGML family (Standard Generalized Markup Language, ISO 8879:1986), whose aim is to establish a processing model for SGML documents. Meer
This book answers a question which came about while the author was work ing on his diploma thesis [1]: would it be better to ask for the available band width instead of probing the network (like TCP does)? Meer
Anyone seeking a gentle introduction to the methods of modern control theory and engineering, written at the level of a first-year graduate course, should consider this book seriously. Meer
Creating Internet Intelligence is an interdisciplinary treatise exploring the hypothesis that global computer and communication networks will one day evolve into an autonomous intelligent system, and making specific recommendations as to what engineers and scientists can do today to encourage and shape this evolution. Meer
Inspired by the eternal beauty and truth of the laws governing the run of stars on heavens over his head, and spurred by the idea to catch, perhaps for the smallest fraction of the shortest instant, the Eternity itself, man created such masterpieces of human intellect like the Platon's world of ideas manifesting eternal truths, like the Euclidean geometry, or like the Newtonian celestial me chanics. Meer
This book is a result of the Tenth International Conference on Information Systems Development (ISD2001) held at Royal Holloway, University of London, United Kingdom, during September 5-7, 2001. Meer
Welcome to the proceedings of the Seventh International Conference of the UK Systems Society being held at York University, United Kingdom from July 7th to 10th, 2002. Meer
Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Meer
This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books