Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Door een staking bij bpost kan je online bestelling op dit moment iets langer onderweg zijn dan voorzien. Dringend iets nodig? Onze winkels ontvangen jou met open armen!
Afhalen na 1 uur in een winkel met voorraad
Gratis thuislevering in België vanaf € 30
Ruim aanbod met 7 miljoen producten
Door een staking bij bpost kan je online bestelling op dit moment iets langer onderweg zijn dan voorzien. Dringend iets nodig? Onze winkels ontvangen jou met open armen!
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Consensus is the problem of making distributed nodes reach agreement. It is a basic building block that can be used in more complex distributed data m...Lees meer
Semantic image segmentation (SiS) plays a fundamental role towards a general understanding of the image content and context, in a broad variety of com...Lees meer
Data Infrastructure for Medical Research is an ideal primer for medical and computer science professionals designing and understanding data infrastruc...Lees meer
Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secu...Lees meer
The Organizational Design of High-Tech Entrepreneurial Ventures addresses the organizational design of entrepreneurial ventures. While many definition...Lees meer
Computer vision systems require large amounts of manually annotated data to properly learn challenging visual concepts. Crowdsourcing platforms offer ...Lees meer
This monograph focuses on a case study of a newly constructed passive cooled four-story building in a composite climate. The building at the heart of ...Lees meer
Datacenter Power Management in Smart Grids overviews recent work on managing and minimizing the cost of data centers in the context of smart grids. It...Lees meer
Multinational taxation is an area of research that encompasses academics in accounting, finance and economics. In particular, researchers are interest...Lees meer
Financial Statement Analysis and Earnings Forecasting is the process of analyzing historical financial statement data for the purpose of developing fo...Lees meer
Chip-level soft-error rate (SER) estimation can come from two sources: direct experimental measurement and simulation. Because SER mitigation decision...Lees meer
Microfinance: What Do We Know? Where Do We Go? examines micro lending, which has become a global phenomenon where small unsecured loans are made to th...Lees meer
Performance Improvement in Health Care Organizations reviews the literature on this important topic and presents a framework that synthesizes the fact...Lees meer
Behavioral Operations Management stems from a long observed gap in operations management on our understanding of human behavior and the emergence of a...Lees meer
Earnings Quality reviews current research activities around earnings quality. It provides an overview of alternative definitions and measures of earni...Lees meer
The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting ar...Lees meer
The design of bug-free and safe medical device software is challenging, especially in complex implantable devices. This is due to the device's closed-...Lees meer
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechan...Lees meer
Science and engineering disciplines are provoking fundamental and applied discoveries in numerous applications, such as to deeply understand brain fun...Lees meer
Threats of cyberattacks targeting the electric power grid have been increasing in recent years. The consequence of cyber incidents on the power grid i...Lees meer
Environmental Enforcement and Compliance: Lessons from Pollution, Safety, and Tax Settings reviews what economists do and do not know about the effect...Lees meer
Highlighting techniques are a diverse class of visual communication techniques that make users aware of salient information in a timely manner. Any vi...Lees meer
Common information measures the amount of matching variables in two or more information sources. It is ubiquitous in information theory and related ar...Lees meer
Children have participated in the design of new technologies intended for children using diverse methods, in differing contexts, with varying degrees ...Lees meer