Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. Meer
In recent years there has been an explosion of network data – that is, measu- ments that are either of or from a system conceptualized as a network – from se- ingly all corners of science. Meer
The papers in this volume comprise the refereed proceedings of the conference ‘ Artificial Intelligence in Theory and Practice’ (IFIP AI 2008), which formed part of the 20th World Computer Congress of IFIP, the International Federation for Information Processing (WCC-2008), in Milan, Italy in September 2008. Meer
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation process. Meer
This book constitutes the refereed proceedings of the 1st IFIP Entertainment Computing Symposium held in Milan, Italy on September 7-10, 2008.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Meer
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Meer
Proceedings of the International Symposium on High Performance Computational Science and Engineering 2004 (IFIP World Computer Congress) is an essential reference for both academic and professional researchers in the field of computational science and engineering. Meer
Modelling and simulation techniques are of central importance to conducting research in sport and exercise science, informing data collection and helping to analyze patterns of movement and physical performance. Meer
Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Meer
The aim of this textbook is to present an account of the theory of computation. After introducing the concept of a model of computation and presenting various examples, the author explores the limitations of effective computation via basic recursion theory. Meer
As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. Meer
After many years of daily UNIX and Internet activity, we came to be enthusiasts of the World-Wide Web while trying to choose an authoring system for a CD-ROM project. Meer
This IMA Volume in Mathematics and its Applications SYSTEMS AND CONTROL THEORY FOR POWER SYSTEMS is based on the proceedings of a workshop that was an integral part of the 1992-93 IMA program on "Control Theory. Meer
Recent revolutions in the world of finance have created a need for the expertise of research mathematicians in solving problems. The articles in this volume are based on recent research in methods in mathematical finance. Meer
The announcement of the Clipper chip by the U.S. Government in April 1993 set off a frenzy of discussions about cryptography policy in the technological community. Meer
This book is about the verification of reactive systems. A reactive system is a system that maintains an ongoing interaction with its environment, as opposed to computing some final value on termination. Meer
This book was written for students and practitioners of engineering and social sciences, including computer, information, communication, library, business, management, and cognitive science. Meer
Educational institutions in which administrators, managers and teachers will be working in the late 1990's will be far different from those oftoday. Schools, which until recently were lagging behind in the implementation of information technology (IT) in their administration and management, are now attempting to close the gap. Meer
Deryn Watson and David Tinsley The topic of the conference, integrating infonnation technology into education, is both broad and multi-facetted. In order to help focus the papers and discussion we identified 7 themes: • Current developments in society and education influencing integration; • Teachers, their roles and concerns; • Learners, their expectations of and behaviour in an integrated environment; • Developments and concerns in the curriculum; • Successes and failures in existing practice; • Organisation and management of integrated environments; • Identification of social and political influences. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books