The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. Meer
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. Meer
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. Meer
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Meer
This book constitutes the refereed proceedings of the 21sth IFIP TC 14 International Conference on Entertainment Computing, ICEC 2022, which was supposed to take place in Bremen, Germany, in November 2022. Meer
This book constitutes the proceedings of the 11th International Conference, MCSS 2022, held in Kraków, Poland, during November 3–4, 2022.
The 13 full papers included in this book were carefully reviewed and selected from 33 submissions. Meer
The two-volume Proceedings set CCIS 1675 and 1676 constitutes the refereed proceedings of the Second International Conference, ARTIIS 2022, held in Santiago de Compostela, Spain, during September 12–15, 2022. Meer
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015. Meer
This
book constitutes the thoroughly refereed post conference proceedings of the
second edition of the Semantic Web Evaluation Challenge, SemWebEval 2015,
co-located with the 12th European Semantic Web conference, held in Portorož,
Slovenia, in May/June 2015. Meer
This book constitutes the proceedings of the 18th
International Conference on Principles and Practice of Multi-Agent Systems,
PRIMA 2015, held in Bertinoro, Italy, in October 2015. Meer
This Festschrift volume is published in honor of Pierpaolo Degano on the occasion of his 65th birthday and is the outcome of a colloquium held in Pisa, Italy, in June 2015. Meer
This book constitutes the thoroughly refereed
post-conference proceedings of the Third International Conference on Pattern
Recognition, ICPRAM 2014, held in Angers, France, in March 2014. Meer
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Meer
This book constitutes the refereed proceedings of the 7th International Conference on Social Robotics, ICSR 2015, held in Paris, France, in October 2015. Meer
This book constitutes the thoroughly refereed proceedings of the
9th International Joint Conference on Software Technologies, ICSOFT 2014, held
in Vienna, Austria, in August 2014. Meer
This monograph proposes a comprehensive and fully automatic approach to designing text analysis pipelines for arbitrary information needs that are optimal in terms of run-time efficiency and that robustly mine relevant information from text of any kind. Meer
This book constitutes the
thoroughly refereed post-conference proceedings of the First
International Conference on Mobile, Secure, and Programmable Networking,
MSPN 2015, held in Paris, France, in June 2015. Meer
This book constitutes the refereed proceedings of the 20th Iberoamerican Congress on Pattern Recognition, CIARP 2015, held in Montevideo, Uruguay, in November 2015. Meer
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. Meer
This book constitutes the refereed proceedings of the 37th Annual German Conference on Artificial Intelligence, KI 2014, held in Stuttgart, Germany, in September 2014. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books