Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1755869512-3c352ad/classes/rubriek.inc on line 88 Computer en informatica - Managementboek.nl
Op werkdagen voor 23:00 besteld, morgen in huisGratis verzending vanaf €20
This book presents the Android plug-in technology used in Android development. This technology is widely used by a majority of Chinese internet companies, and is becoming more widely used worldwide. Meer
Introduction The goal of this book is to introduce XML to a bioinformatics audience. It does so by introducing the fundamentals of XML, Document Type De? Meer
Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. Meer
Combinatorial (or discrete) optimization is one of the most active fields in the interface of operations research, computer science, and applied ma- ematics. Meer
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4. Meer
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4. Meer
The concept of content delivery (also known as content distribution) is be coming increasingly important due to rapidly growing demands for efficient distribution and fast access of information in the Internet. Meer
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. Meer
Reflects a decade of leading-edge research on intelligence and security informatics.
Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Meer
Evolvable hardware (EHW) refers to hardware whose architecture/structure and functions change dynamically and autonomously in order to improve its performance in carrying out tasks. Meer
The next generation of mission-critical and embedded systems will be “cyber physical”: They will demand the precisely synchronised and seamless integration of complex sets of computational algorithms and physical components. Meer
Nicely Said: Writing for the Web with Style and Purpose is a practical guide to writing for digital products and websites. This book will help students develop clear digital communications and improve them over time. Meer
Advanced Data Mining Tools and Methods for Social Computing explores advances in the latest data mining tools, methods, algorithms and the architectures being developed specifically for social computing and social network analysis. Meer
Deep neural networks (DNNs) with their dense and complex algorithms provide real possibilities for Artificial General Intelligence (AGI). Meta-learning with DNNs brings AGI much closer: artificial agents solving intelligent tasks that human beings can achieve, even transcending what they can achieve. Meer
Blockchain Technology for Emerging Applications: A Comprehensive Approach explores recent theories and applications of the execution of blockchain technology. Meer
Blockchain Applications for Healthcare Informatics: Beyond 5G offers a comprehensive survey of 5G-enabled technology in healthcare applications. This book investigates the latest research in blockchain technologies and seeks to answer some of the practical and methodological questions surrounding privacy and security in healthcare. Meer
1. This is the first book to examine cross-device search behavior.
2. This book will discuss a comprehensive range of behaviors in the context of cross-device search, which includes querying, gazing, clicking and touching. Meer
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. Meer
Combining knowledge with strategies, Data Structure Practice for Collegiate Programming Contests and Education presents the first comprehensive book on data structure in programming contests. Meer
Although multicore is now a mainstream architecture, there are few textbooks that cover parallel multicore architectures. Filling this gap, Fundamentals of Parallel Multicore Architecture provides all the material for a graduate or senior undergraduate course that focuses on the architecture of multicore processors. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books