Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Reed-Muller (RM) codes are among the oldest, simplest and perhaps most ubiquitous family of codes. They are used in many areas of coding theory in bot...Savoir plus
The design of bug-free and safe medical device software is challenging, especially in complex implantable devices. This is due to the device's closed-...Savoir plus
The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting ar...Savoir plus
Common information measures the amount of matching variables in two or more information sources. It is ubiquitous in information theory and related ar...Savoir plus
Database system performance is directly related to the efficiency of the system at storing data on primary storage (for example, disk) and moving it i...Savoir plus
Automated theorem proving represents a significant and long-standing area of research in computer science, with numerous applications. A large proport...Savoir plus
Children have participated in the design of new technologies intended for children using diverse methods, in differing contexts, with varying degrees ...Savoir plus
Information seeking and use is now routine in people's everyday lives. Searching through various information retrieval systems such as web search engi...Savoir plus
Chordal graphs play a central role in techniques for exploiting sparsity in large semidefinite optimization problems, and in related convex optimizati...Savoir plus
Thompson sampling is an algorithm for online decision problems where actions are taken sequentially in a manner that must balance between exploiting w...Savoir plus
Voting Over a Distributed Ledger: An Interdisciplinary Perspective presents the case that electronic voting can improve accessibility, leading to some...Savoir plus
Hybrid Human-Machine Information Systems leverage novel architectures that make systematic use of Human Computation by means of crowdsourcing. These a...Savoir plus
Advances in Supply Chain Finance and FinTech Innovations examines three themes: Financing Issues in Supply Chains look into popular working capital ma...Savoir plus
In Venture Capital Investors and Portfolio Firms venture capital firms are considered as investors in young growth-oriented companies. The authors foc...Savoir plus
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechan...Savoir plus
This monograph focuses on a case study of a newly constructed passive cooled four-story building in a composite climate. The building at the heart of ...Savoir plus
Threats of cyberattacks targeting the electric power grid have been increasing in recent years. The consequence of cyber incidents on the power grid i...Savoir plus
Consensus is the problem of making distributed nodes reach agreement. It is a basic building block that can be used in more complex distributed data m...Savoir plus
Environmental Enforcement and Compliance: Lessons from Pollution, Safety, and Tax Settings reviews what economists do and do not know about the effect...Savoir plus
Computer vision systems require large amounts of manually annotated data to properly learn challenging visual concepts. Crowdsourcing platforms offer ...Savoir plus
Science and engineering disciplines are provoking fundamental and applied discoveries in numerous applications, such as to deeply understand brain fun...Savoir plus
Behavioral Operations Management stems from a long observed gap in operations management on our understanding of human behavior and the emergence of a...Savoir plus
Performance Improvement in Health Care Organizations reviews the literature on this important topic and presents a framework that synthesizes the fact...Savoir plus
Semantic image segmentation (SiS) plays a fundamental role towards a general understanding of the image content and context, in a broad variety of com...Savoir plus