This book is a collection of selected proceedings from the EUNICE Summer School which took place in Colmenarejo in July of 2005. The book explores the theme of Networked Applications in depth. Meer
Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. Meer
Hypercomputation is a relatively new theory of computation that is about computing methods and devices that transcend the so-called Church-Turing thesis. Meer
This book examines the semiotic effects of protocols and algorithms at work in popular social media systems, bridging philosophical conversations in human-computer interaction (HCI) and information systems (IS) design with contemporary work in critical media, technology and software studies. Meer
This book contains extended and revised versions of the best papers that have been presented during the twelfth edition of the IFIP TC10/WG10.5 International Conference on Very Large Scale Integration, a Global System-on-a-Chip Design & CAD Conference. Meer
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". Meer
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. Meer
This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. Meer
Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest. Meer
The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. Meer
In the world of information technology, it is no longer the computer in the classical sense where the majority of IT applications is executed; computing is everywhere. Meer
The papers contained in this volume were presented at the fourth edition of the IFIP International Conference on Theoretical Computer Science (IFIP TCS), held August 23-24, 2006 in Santiago, Chile. Meer
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Meer
Position-based routing was originally developed for packet radio networks in the 1980s [6]. It received renewed interest during the last few years as a method for routing in mobile wireless ad hoc and sensor networks [1, 2, 4]. Meer
These proceedings derive from an international conference on the history of computing and education. This conference is the second of hopefully a series of conferences that will take place within the International Federation for Information Processing (IFIP) and hence, we describe it as the "Second IFIP Conference on the History of Computing and Education" or simply "History of Computing and Education 2" (HCE2). Meer
The papers in this volume comprise the refereed proceedings of the conference 'Artificial Intelligence in Theory and Practice' (IFIP AI 2006), which formed part of the 19th World Computer Congress of IFIP, the International Federation for Information Processing (WCC- 2006), in Santiago, Chile in August 2006. Meer
The Second Symposium on Professional Practice in AI 2006 is a conference within the IFIP World Computer Congress 2006, Santiago, Chile. The Symposium is organised by the IFIP Technical Committee on Artificial Intelligence (Technical Committee 12) and its Working Group 12. Meer
This book provides a thorough review and explanation of the theory of stochastic max-plus linear systems, which has seen rapid advances in the last decade. Meer
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Meer
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books