This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. Meer
This book constitutes the thoroughly refereed post-proceedings of the First VLDB 2006 International Workshop on Data Mining and Bioinformatics, VDMB 2006, held in Seoul, Korea in September 2006 in conjunction with VLDB 2006. Meer
The ultimate goal of program verification is not the theory behind the tools or the tools themselves, but the application of the theory and tools in the software engineering process. Meer
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. Meer
Itisourgreatpleasuretopresenttheproceedingsofthe15thInternationalConf- ence on Analytical and Stochastic Modelling Techniques and Applications (ASMTA2008)thattookplaceonthebeautifulislandofCyprusforthe? Meer
Design is eminent throughout different disciplines of science, engineering, humanities, and art. However, within these disciplines, the way in which the term design is understood and applied differs significantly. Meer
Das Buch behandelt praxisbezogene Methoden zur Analyse und Steuerung operationaler IT-Risiken entsprechend der Anforderungen im Gesetz zur Kontrolle und Transparenz im Unternehmensbereich (KonTraG). Meer
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Meer
This monograph is devoted to theoretical and experimental study of partial reductsandpartialdecisionrulesonthebasisofthestudyofpartialcovers. The use of partial (approximate) reducts and decision rules instead of exact ones allowsustoobtainmorecompactdescriptionofknowledgecontainedindecision tables,andtodesignmorepreciseclassi? Meer
The 21st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA-AIE 2008) held in Wroclaw, Poland was an international scientific forum for researchers in the field of applied artificial intelligence. Meer
This book constitutes the refereed proceedings of the 6th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2008, held in Madrid, Spain, in June 2008. Meer
The papers contained in this volume were presented at the 19th Annual S- posium on Combinatorial Pattern Matching (CPM 2008) held at the University of Pisa, Italy, June 18–20, 2008. Meer
This book constitutes the thoroughly refereed post-workshop proceedings of 10 internationl workshops and 2 symposia held as satellite events of the 10th International Conference on Model Driven Engineering Languages and Systems, MoDELS 2007, in Nashville, TN, USA, in September/October 2007 (see LNCS 4735). Meer
IT-Governance, Sarbanes-Oxley Act, Basel II: Information Lifecycle Management (ILM) ist ein Thema, das alle CIO's beherrschen müssen. Die Autoren fassen Information als Produkt auf, das einem Lebenszyklus unterliegt. Meer
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. Meer
This book constitutes the reviewed proceedings of the Second International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2006, held in Venice, Italy in July 2006, in association with ICALP 2006. Meer
This book constitutes the thoroughly refereed extended post-proceedings of the 7th International Workshop on Membrane Computing, WMC 2006, held in Leiden, Netherlands in July 2006. Meer
The fourth edition of the European Conference on Model-Driven Architecture – Foundations and Applications (ECMDA-FA 2008) was dedicated to furthering the state of knowledge and fostering the industrialization of the model-driven architecture (MDA) methodology. Meer
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. Meer
A Step Towards Verified Software Worries about the reliability of software are as old as software itself; techniques for allaying these worries predate even James King’s 1969 thesis on “A program verifier. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books