This book constitutes the refereed proceedings of the 14th International Conference on Formal Grammar 2009, held in Bordeaux, France, in July 2009.
The 13 revised full papers presented, including two invited talks, were carefully reviewed and selected from 26 submissions. Meer
Ajax machte das Web zu einer Plattform für Anwendungssoftware und verfügt über ein eindrucksvolles Potenzial. Dieses Buch bietet einen gründlichen und verständlichen Einstieg in die Technologie. Meer
The three-volume set LNCS 5101-5103 constitutes the refereed proceedings of the 8th International Conference on Computational Science, ICCS 2008, held in Krakow, Poland in June 2008. Meer
The two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling Conference, MMM 2007, held in Singapore in January 2007. Meer
Time-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. This book is a comprehensive study of complexity results and optimal and suboptimal algorithms concerning time-dependent scheduling in single-, parallel- and dedicated-machine environments. Meer
From conception to birth is traditionally nine months. The first emails regarding the volume you now hold in your hands—or the bits you have downloaded onto your screen—are dated 11 June 2005. Meer
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Meer
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2009. Meer
Recently many researchers are working on cluster analysis as a main tool for exploratory data analysis and data mining. A notable feature is that specialists in di? Meer
The Internet has evolved from an academic network for data applications such as le transfer and net news, to a global general-purpose network used for a variety of different applications—electronic mail, voice over IP, television, peer-to-peer le sharing, video streaming and many more. Meer
This book presents a comprehensive documentation of the scientific outcome of 14 satellite events held at the 13th International Conference on Model-Driven Engineering, Languages and Systems, MODELS 2010, held in Oslo, Norway, in October 2010. Meer
This book presents an exhaustive and timely review of key research work on fuzzy XML data management, and provides readers with a comprehensive resource on the state-of-the art tools and theories in this fast growing area. Meer
This book constitutes the refereed proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2013, held in Dunedin, New Zealand, in December 2013. Meer
The two-volume set LNAI 8265 and LNAI 8266 constitutes the proceedings of the 12th Mexican International Conference on Artificial Intelligence, MICAI 2013, held in Mexico City, Mexico, in November 2013. Meer
With the growth of public and private data stores and the emergence of off-the-shelf data-mining technology, recommendation systems have emerged that specifically address the unique challenges of navigating and interpreting software engineering data. Meer
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. Meer
Lectures: J. Chazarain, A. Piriou: Problèmes mixtes hyperboliques: Première partie: Les problèmes mixtes hyperboliques vérifiant 1a condition de Lopatinski uniforme; Deuxième partie: Propagation et réflexion des singularités. Meer
This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012. Meer
Research on multi-agent systems has provided a promising technology for implementing cognitive intelligent non-playing characters. However, the technologies used in game engines and multi-agent platforms are not readily compatible due to some inherent differences in concerns. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books