Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
The theory of computation is used to address challenges arising in many computer science areas such as artificial intelligence, language processors, c...Savoir plus
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a moth...Savoir plus
The practice of Model-based Systems Engineering is becoming more widely adopted in industry, academia and commerce and, as the use of modelling mature...Savoir plus
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed t...Savoir plus
With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analy...Savoir plus
Computer vision is an interdisciplinary scientific field that deals with how computers obtain, store, interpret and understand digital images or video...Savoir plus
This new edition of this popular text has been fully updated to reflect SysML 1.3, the latest version of the standard, and the discussion has been ext...Savoir plus
Cloud computing has evolved as a cost-effective, easy-to-use, elastic and scalable computing paradigm to transform today's business models. 5G, Indust...Savoir plus
There is a growing interest in the development and deployment of surveillance systems in public and private locations. Conventional approaches rely on...Savoir plus
First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data t...Savoir plus
Virtual reality (VR) refers to technologies that use headsets to generate realistic images, sounds and other sensations that replicate a real-world en...Savoir plus
The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-...Savoir plus
Multimedia technologies have opened up a wide range of applications by combining a variety of information sources such as voice, graphics, animation, ...Savoir plus
Big Data Analytics and Software Defined Networking (SDN) are helping to drive the management of data and usage of the extraordinary increase of comput...Savoir plus
The transition towards exascale computing has resulted in major transformations in computing paradigms. The need to analyze and respond to such large ...Savoir plus
When digitized entities, connected devices and microservices interact purposefully, we end up with a massive amount of multi-structured streaming (rea...Savoir plus
Computing has moved away from a focus on performance-centric serial computation, instead towards energy-efficient parallel computation. This provides ...Savoir plus
Traditional markets were horizontal whereby a company would sell hard drives to any business that needed them. By specializing in a vertical market, c...Savoir plus
Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex...Savoir plus
Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and cust...Savoir plus
Systems Modelling Language (SysML) is a tailored version of the unified modelling language (UML) that meets the needs of today's systems engineering p...Savoir plus
First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data t...Savoir plus
For any organisation to be successful in an increasingly competitive and global working environment, it is essential that there is a clear understandi...Savoir plus
The autonomic computing concept seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibil...Savoir plus