Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain, June 5-6, 2008. Meer
th The 11 Working Conference of IFIP WG 8.6, Open-IT Based Innovation: Moving Towards Cooperative IT Transfer and Knowledge Diffusion, organized in Madrid in October 22–24, 2008, follows the series started in Oslo in 1995 and continues in the footprints of the past year’s conference in Manchester. Meer
Software Design: Creating Solutions for Ill-Structured Problems, Third Edition provides a balanced view of the many and varied software design practices used by practitioners. Meer
Knowledge existing in modern information systems usually comes from many sources and is mapped in many ways. There is a real need for representing “knowledge pieces” as rather universal objects that should fit to multi-purpose a- ing systems. Meer
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Meer
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. Meer
Ambient Intelligence is a vision of the future where the world will be surrounded by electronic environments sensitive and responsive to people, wherein devices work in concert to support people in carrying out their everyday life activities, in an easy and natural way. Meer
This book is a broad discussion covering the entire software development lifecycle. It uses a comprehensive case study to address each topic and features the following: A description of the development, by the fictional company Homeowner, of the DigitalHome (DH) System, a system with "smart" devices for controlling home lighting, temperature, humidity, small appliance power, and security A set of scenarios that provide a realistic framework for use of the DH System material Just-in-time training: each chapter includes mini tutorials introducing various software engineering topics that are discussed in that chapter and used in the case study A set of case study exercises that provide an opportunity to engage students in software development practice, either individually or in a team environment. Meer
This book provides future research directions in energy, industry, and healthcare domain, and explores the different applications of IoT and its associated technologies. Meer
Mihail Moiseevich Botvinnik is an electrical engineer by profession; during World War II he headed a high-tension laboratory in the Urals and was decorated by the USSR for his accomplishments. Meer
There has continuously been a massive growth of Internet traffic for these years despite the "bubble burst" in year 2000. As the telecom market is gradually picking up, it would be a consensus in telecom and data-com industries that the CAPEX (Capital Expenditures) to rebuild the network infrastructure to cope with this traffic growth would be imminent, while the OPEX (Operational Expenditures) has to be within a tight constraint. Meer
As we were at pains to point out in the companion volume to this mo- graph, entitled Complexity in Chemistry: Introduction and Fundamentals, complexity is to be encountered just about everywhere. Meer
QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. Meer
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. Meer
Both authors have taught the course of “Distributed Systems” for many years in the respective schools. During the teaching, we feel strongly that “Distributed systems” have evolved from traditional “LAN” based distributed systems towards “Internet based” systems. Meer
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Meer
Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years. Meer
This book addresses the use of data mining for smarter, more efficient agents, as well as the challenge of generating intelligence from data while transferring it to a separate, possibly autonomous, software entity. Meer
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books