Programming languages should be designed not by piling feature on top of feature, but by removing the weaknesses and restrictions that make additional features appear necessary. Meer
This book addresses the issues raised by the rapid advance of information technology (IT). IT is singularly pervasive: its applications affect people in all walks of life in a way that few other technologies do. Meer
Over the past two decades scientists, mathematicians, and engineers have come to understand that a large variety of systems exhibit complicated evolution with time. Meer
This book treats learning a programming language much like learning a spoken language: programming is best learned by immersion. Through building interesting programs and addressing real design issues much earlier than other texts, this title moves beyond the mere syntax and discusses the serious architecture of programs: how delegation and inheritance allow objects to cooperate effectively. Meer
First published in 1998, this textbook is a broad but rigourous survey of the theoretical basis for the design, definition and implementation of programming languages and of systems for specifying and proving programme behaviour. Meer
J. Richard Biichi is well known for his work in mathematical logic and theoretical computer science. (He himself would have sharply objected to the qualifier "theoretical," because he more or less identified science and theory, using "theory" in a broader sense and "science" in a narrower sense than usual. Meer
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. Meer
Modeling and Simulation Tools for Emerging Telecommunication Networks contains over 20 articles by well-known scientists and engineers reflecting the advances in modeling and simulation for telecommunications in the last five years. Meer
Surface properties play a very important role in many perception tasks. Object recognition, navigation, and inspection use surface properties ex tensively. Meer
Current research into formal methods for hardware design is presented in the papers in this volume. Because of the complexity of VLSI circuits, assuring design validity before circuits are manufactured is imperative. Meer
An authoritative survey of intelligent fingerprint-recognition concepts, technology, and systems is given. Editors and contributors are the leading researchers and applied R&D developers of this personal identification (biometric security) topic and technology. Meer
Well suited to medium-scale general purpose computing, the Unix time sharing operating system is deservedly popular with academic institutions, research laboratories, and commercial establishments alike. Meer
The author starts with the premise that C is an excellent
language for software engineering projects. The book con-
centrates on programming style,particularly readability,
maintainability, and portability. Meer
Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Meer
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. Meer
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. Meer
This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Göteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. Meer
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books