j. ashbourn, verus mundus, berkhamsted, uk s. atapattu, c ... · evaluation in public art: the...

14
News 2/2014 Computer Science 37 J. Ashbourn, Verus Mundus, Berkhamsted, UK Biometrics in the New World The Cloud, Mobile Technology and Pervasive Identity is book takes a fresh look at biometrics and identity management, extending the dialogue be- yond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features 7 Shiſts the discussion into the new and burgeon- ing areas of cloud computing, federated ID and the use of personal devices for business or civic use 7 Addresses the broader societal position with respect to identity management and biomet- rics being used across geographic and legislative boundaries 7 Highlights the assumptions which still persist with regard to the use of biometric technology, explaining how to dispel such assump- tions and move towards a robust operation Contents Part I: An Introduction to Biometrics.- A Technol- ogy Overview.- e Story So Far.- Assumptions and Misconceptions.- Part II: Application Is- sues.- Biometrics in the Cloud.- Mobile Biomet- rics.- Biometric Application Design.- Biometric Technology Issues.- Part III: Usage Issues.- Identi- ty Intelligence.- Collaboration.- Messaging.- Man- aging a PKI.- Part IV: Societal Issues.- Biometrics in Society.- Privacy and Biometrics.- Ethics and Technology Usage.- Human Factors.- Part V: Today and Tomorrow.- Implementation Issues.- Futures.- Conclusions.- Illustrations. Fields of interest Biometrics; Special Purpose and Application- Based Systems; Data Structures, Cryptology and Information eory Target groups Professional/practitioner Discount group Professional Non-Medical Due February 2014 2014. XXI, 229 p. 12 illus., 11 in color. Hardcover 7 $69.99 ISBN 978-3-319-04158-2 9<HTODMJ=aebfic> S. Atapattu, C. Tellambura, H. Jiang, University of Alberta, Edmonton, AB, Canada Energy Detection for Spectrum Sensing in Cognitive Radio is Springer Brief focuses on the current state- of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost technique. It includes a comprehensive summary of recent research, fundamental theories, possible architectures, useful performance measurements of energy detection and applications of energy detection. Concise, practical chapters explore conventional energy detectors, alternative forms of energy detectors, performance measurements, diversity techniques and cooperative networks. e careful analysis enables reader to identify the most efficient techniques for improving energy detection performance. Energy Detection for Spectrum Sensing in Cognitive Radio is a valuable tool for researchers and practitioners interested in spectrum sensing and cognitive radio networks. Advanced-level students studying wireless com- munication will also benefit from this brief. Contents Introduction.- Conventional Energy Detector.- Alternative Forms of Energy Detectors.- Perfor- mance Measurements.- Diversity Techniques and Cooperative Networks. Fields of interest Computer Communication Networks; Communi- cations Engineering, Networks Target groups Research Discount group Professional Non-Medical Due March 2014 2014. X, 82 p. 27 illus., 26 in color. (SpringerBriefs in Computer Science) Softcover 7 $54.99 ISBN 978-1-4939-0493-8 9<HTMEUD=jaejdi> C. Blackwell, H. Zhu, Oxford Brookes University, Oxford, UK (Eds) Cyberpatterns Unifying Design Patterns with Security and Attack Patterns Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactiv- ists. erefore, we need a better understanding of cyberspace, for which patterns, which are predict- able regularities, may help to detect, understand and respond to incidents better. e inspiration for the workshop came from the existing work on formalising design patterns applied to cyberse- curity, but we also need to understand the many other types of patterns that arise in cyberspace. Features 7 Includes extended and updated papers from the First International Workshop on Cyberpat- terns 7 Provides a broad introduction to this novel and fast-moving field 7 Contains both a research agenda and practical applications for cyberpatterns Fields of interest Systems and Data Security; Computer Communi- cation Networks; Pattern Recognition Target groups Research Discount group Professional Non-Medical Due June 2014 2014. VI, 222 p. 46 illus. Hardcover 7 approx. $109.00 ISBN 978-3-319-04446-0 9<HTODMJ=aeeega>

Upload: others

Post on 14-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

37

J. Ashbourn, Verus Mundus, Berkhamsted, UK

Biometrics in the New WorldThe Cloud, Mobile Technology and Pervasive Identity

This book takes a fresh look at biometrics and identity management, extending the dialogue be-yond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications.

Features 7 Shifts the discussion into the new and burgeon-ing areas of cloud computing, federated ID and the use of personal devices for business or civic use 7 Addresses the broader societal position with respect to identity management and biomet-rics being used across geographic and legislative boundaries 7 Highlights the assumptions which still persist with regard to the use of biometric technology, explaining how to dispel such assump-tions and move towards a robust operation

Contents Part I: An Introduction to Biometrics.- A Technol-ogy Overview.- The Story So Far.- Assumptions and Misconceptions.- Part II: Application Is-sues.- Biometrics in the Cloud.- Mobile Biomet-rics.- Biometric Application Design.- Biometric Technology Issues.- Part III: Usage Issues.- Identi-ty Intelligence.- Collaboration.- Messaging.- Man-aging a PKI.- Part IV: Societal Issues.- Biometrics in Society.- Privacy and Biometrics.- Ethics and Technology Usage.- Human Factors.- Part V: Today and Tomorrow.- Implementation Issues.- Futures.- Conclusions.- Illustrations.

Fields of interestBiometrics; Special Purpose and Application-Based Systems; Data Structures, Cryptology and Information Theory

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due February 2014

2014. XXI, 229 p. 12 illus., 11 in color. Hardcover7 $69.99ISBN 978-3-319-04158-2

9<HTODMJ=aebfic>

S. Atapattu, C. Tellambura, H. Jiang, University of Alberta, Edmonton, AB, Canada

Energy Detection for Spectrum Sensing in Cognitive RadioThis Springer Brief focuses on the current state-of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost technique. It includes a comprehensive summary of recent research, fundamental theories, possible architectures, useful performance measurements of energy detection and applications of energy detection. Concise, practical chapters explore conventional energy detectors, alternative forms of energy detectors, performance measurements, diversity techniques and cooperative networks. The careful analysis enables reader to identify the most efficient techniques for improving energy detection performance. Energy Detection for Spectrum Sensing in Cognitive Radio is a valuable tool for researchers and practitioners interested in spectrum sensing and cognitive radio networks. Advanced-level students studying wireless com-munication will also benefit from this brief.

Contents Introduction.- Conventional Energy Detector.- Alternative Forms of Energy Detectors.- Perfor-mance Measurements.- Diversity Techniques and Cooperative Networks.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. X, 82 p. 27 illus., 26 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4939-0493-8

9<HTMEUD=jaejdi>

C. Blackwell, H. Zhu, Oxford Brookes University, Oxford, UK (Eds)

CyberpatternsUnifying Design Patterns with Security and Attack Patterns

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactiv-ists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predict-able regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cyberse-curity, but we also need to understand the many other types of patterns that arise in cyberspace.

Features 7 Includes extended and updated papers from the First International Workshop on Cyberpat-terns 7 Provides a broad introduction to this novel and fast-moving field 7 Contains both a research agenda and practical applications for cyberpatterns

Fields of interestSystems and Data Security; Computer Communi-cation Networks; Pattern Recognition

Target groupsResearch

Discount groupProfessional Non-Medical

Due June 2014

2014. VI, 222 p. 46 illus. Hardcover7 approx. $109.00ISBN 978-3-319-04446-0

9<HTODMJ=aeeega>

Page 2: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

38

L. Candy, University of Technology Sydney, Sydney, Australia; S. Ferguson, University of Technology, Sydney, Sydney, Australia (Eds)

Interactive Experience in the Digital AgeEvaluating New Art Practice

Contents List of Contributors.- Interactive Experience and Evaluation in Practice Linda Candy and Sam Fer-guson.- Human Computer Interaction, Experience and Art Ernest Edmonds.- Evaluation and Experi-ence in Art Linda Candy.- Keeping Research in Tune with Practice Andrew Johnson.- IInteractive Art, Autonomy and Evaluation Scott Simon.- The Machine as Autonomous Performer Oliver Brown, Petra Gemeinboeck and Rob Saunders.- Intimate Aesthetics and Facilitated Interaction Lian Loke and George Poonkhin Khut.- The Network Un-veiled: Evaluating Intercultural Musical Interac-tion Roger Mills and Kirsty Beilharz.- Mutual Engagement in Digitally Mediated Public Art Nick Bryan-Kinns.- The Role of Emotions in Art Evalu-ation Chek Tien Tan and Sam Ferguson.- Blend-ing Art Events and HCI Research Derek Reilly, Fanny Chevalier and Dustin Freeman.- In the Wild: Evaluating Collaborative Interactive Musical Experiences in Public Settings Ben Bengler and Nick Bryan Kinns.- Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds, Jane Faram and Gill Hobson.- Experience and Evaluation in the Collective Creation of a Pub-lic Digital Exhibition Stephen Barras and Anna Luisa Sanchez Laws.-Curating Digital Public Art Deborah Turnbull and Matthew Connell.- Digital Arts Entrepreneurship: Evaluating Performative Interaction Jennifer G. Sheridan.- Index.

Fields of interestUser Interfaces and Human Computer Interaction; Computer Appl. in Arts and Humanities; Media Research

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. XV, 285 p. 75 illus., 25 in color. (Springer Series on Cultural Computing) Hardcover7 $109.00ISBN 978-3-319-04509-2

9<HTODMJ=aefajc>

J. Cao, C. Zhang, Hong Kong Polytechnic University, Kowloon, Hong Kong SAR

Seamless and Secure Communications over Heterogeneous Wireless NetworksThis brief provides an overview of the require-ments, challenges, design issues and major techniques for seamless and secure communica-tions over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobil-ity management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in implement-ing such technologies over heterogeneous wireless networks, thus enabling them to bridge the gap between the theoretical results of research and the real practice. Combining basic theoretical con-cepts and practical implementation, this brief is ideal for professionals and researchers in the field. Advanced-level students interested in computer communication networks and wireless technolo-gies will also find the content helpful.

Contents Introduction.- Heterogeneous Wireless Networks.- Seamless Roaming over Heterogeneous Wireless Networks.- Secure Enhanced Seamless Roaming.- Summary.

Field of interestComputer Communication Networks

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. XIII, 98 p. 55 illus., 47 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4939-0415-0

9<HTMEUD=jaebfa>

Q. Chen, B. Chen, Guangxi University, Nanning, People’s Republic of China; C. Zhang, University of Technology Sydney, Ultimo, NSW, Australia

Intelligent Strategies for Pathway MiningModel and Pattern Identification

This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowl-edge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and tech-niques in an easily accessed and understood way together with many references and instances.

Features 7 State of the art contents 7 Unique visibil-ity 7 Focuses on selected topics

Contents Introduction.- Data Resources and Applica-tions.- Detecting Inconsistency in Biological Mo-lecular Databases Using Ontologies.- Exploration of Positive Frequent Patterns for AMP-Activated Protein Kinase Regulation.- Mining Protein Kinase Regulation Using Graphical Models.- Min-ing Inhibition Pathways for Protein Kinases on Skeletal Muscle.- Modeling Conserved Structure Patterns for Functional Noncoding RNA.- Inter-val Based Similarity for Function Classification of RNA Pseudoknots.- Discovery of Structural and Functional Features Bind to RNA Pseu-doknots.- Mining Featured Patterns of MiRNA Interaction Based on Sequence and Structure Similarity.- Discovering Conserved and Diverged Patterns of MiRNA Families.- Bioinformatics-Based Drug Discovery for Protein Kinases.-  Con-clusion and FutureWorks.- References.

Fields of interestArtificial Intelligence (incl. Robotics); Database Management; Algorithm Analysis and Problem Complexity

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2014. XVIII, 299 p. 80 illus. (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence, Volume 8335) Softcover7 $83.00ISBN 978-3-319-04171-1

9<HTODMJ=aebhbb>

Page 3: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

39

N. Dershowitz, Tel Aviv University, Tel Aviv, Israel; E. Nissam, University of London, London, UK (Eds)

Language, Culture, Computation: Computing - Theory and TechnologyEssays Dedicated to Yaacov Choueka on the Occasion of His 75 Birthday, Part I

This Festschrift volume is published in Honor of Yaacov Choueka on the occasion of this 75th birthday. The present three-volumes liber amicorum, several years in gestation, honours this outstanding Israeli computer scientist and is dedicated to him and to his scientific endeavours. Yaacov’s research has had a major impact not only within the walls of academia, but also in the daily life of lay users of such technology that originated from his research. An especially amazing aspect of the temporal span of his scholarly work is that half a century after his influential research from the early 1960s, a project in which he is currently in-volved is proving to be a sensation, as will become apparent from what follows. Yaacov Choueka be-gan his research career in the theory of computer science, dealing with basic questions regarding the relation between mathematical logic and automata theory. From formal languages, Yaacov moved to natural languages.

Features 7 Dedicated to the scientist, whose research fifty years ago was seminal for full-text information re-trieval (which lay users at present know especially from such search engines as Google) 7 Contains papers written by well-known authors 7 Covers the areas of research in which Yaacov has made major contributions

Fields of interestArtificial Intelligence (incl. Robotics); Language Translation and Linguistics; Information Storage and Retrieval

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. XII, 622 p. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 8001) Softcover7 approx. $109.00ISBN 978-3-642-45320-5

9<HTOGPC=efdcaf>

N. Dershowitz, Tel Aviv University, Tel Aviv, Israel; E. Nissam, University of London, London, UK (Eds)

Language, Culture, Computation: Computing for the Humanities, Law, and NarrativesEssays Dedicated to Yaacov Choueka on the Occasion of His 75 Birthday, Part II

This Festschrift volume is published in Honor of Yaacov Choueka on the occasion of this 75th birthday. The present three-volumes liber amicorum, several years in gestation, honours this outstanding Israeli computer scientist and is dedicated to him and to his scientific endeavours. Yaacov’s research has had a major impact not only within the walls of academia, but also in the daily life of lay users of such technology that originated from his research. An especially amazing aspect of the temporal span of his scholarly work is that half a century after his influential research from the early 1960s, a project in which he is cur-rently involved is proving to be a sensation, as will become apparent from what follows. Yaacov Choueka began his research career in the theory of computer science, dealing with basic questions regarding the relation between mathematical logic and automata theory.

Features 7 Dedicated to the scientist, whose research fifty years ago was seminal for full-text information re-trieval (which lay users at present know especially from such search engines as Google) 7 Contains papers written by well-known authors 7 Covers the areas of research in which Yaacov has made major contributions

Fields of interestArtificial Intelligence (incl. Robotics); Language Translation and Linguistics; Information Storage and Retrieval

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. XII, 556 p. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 8002) Softcover7 approx. $99.00ISBN 978-3-642-45323-6

9<HTOGPC=efdcdg>

N. Dershowitz, Tel Aviv University, Tel Aviv, Israel; E. Nissam, University of London, London, UK (Eds)

Language, Culture, Computation: Computational Linguistics and LinguisticsEssays Dedicated to Yaacov Choueka on the Occasion of His 75 Birthday, Part III

This Festschrift volume is published in Honor of Yaacov Choueka on the occasion of this 75th birthday. The present three-volumes liber amicorum, several years in gestation, honours this outstanding Israeli computer scientist and is dedicated to him and to his scientific endeavours. Yaacov’s research has had a major impact not only within the walls of academia, but also in the daily life of lay users of such technology that originated from his research. An especially amazing aspect of the temporal span of his scholarly work is that half a century after his influential research from the early 1960s, a project in which he is currently in-volved is proving to be a sensation, as will become apparent from what follows. Yaacov Choueka be-gan his research career in the theory of computer science, dealing with basic questions regarding the relation between mathematical logic and automata theory. From formal languages, Yaacov moved to natural languages.

Features 7 Dedicated to the scientist, whose research fifty years ago was seminal for full-text information re-trieval (which lay users at present know especially from such search engines as Google) 7 Contains papers written by well-known authors 7 Covers the areas of research in which Yaacov has made major contributions

Fields of interestArtificial Intelligence (incl. Robotics); Language Translation and Linguistics; Information Storage and Retrieval

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. XII, 728 p. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 8003) Softcover7 approx. $119.00ISBN 978-3-642-45326-7

9<HTOGPC=efdcgh>

Page 4: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

40

W. T. Clark, Yale University, New Haven, CT, USA

Information-Theoretic Evaluation for Computational Biomedical OntologiesThe development of effective methods for the pre-diction of ontological annotations is an important goal in computational biology, yet evaluating their performance is difficult due to problems caused by the structure of biomedical ontologies and incom-plete annotations of genes. This work proposes an information-theoretic framework to evaluate the performance of computational protein function prediction. A Bayesian network is used, structured according to the underlying ontology, to model the prior probability of a protein’s function. The concepts of misinformation and remaining uncer-tainty are then defined, that can be seen as analogs of precision and recall. Finally, semantic distance is proposed as a single statistic for ranking clas-sification models. The approach is evaluated by analyzing three protein function predictors of gene ontology terms.

Features 7 Provides a concise overview of a proven method for evaluating the performance of compu-tational protein-function prediction 7 Proposes a solution that is critical in disease-gene prioritisa-tion, an increasingly hot topic 7 Defines impor-tant concepts for scientists using information-the-oretic approaches in their algorithms development

Contents Introduction.- Methods.- Experiments and Re-sults.- Discussion.

Fields of interestComputational Biology/Bioinformatics; Algo-rithm Analysis and Problem Complexity; Human Genetics

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2014. VII, 46 p. 12 illus., 6 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-04137-7

9<HTODMJ=aebdhh>

D. Evans, (deceased) University of Melbourne, Carlton, VIC, Australia; P. Gruba, J. Zobel, University of Melbourne, Carlton, VIC, Australia

How to Write a Better ThesisFrom proposal to examination, producing a dis-sertation or thesis is a challenge. Grounded in decades of experience with research training and supervision, this fully updated and revised edi-tion takes an integrated, down-to-earth approach drawing on case studies and examples to guide you step-by-step towards productive success. Early chapters frame the tasks ahead and show you how to get started. From there, practical advice and illustrations take you through the elements of formulating research questions, working with software, and purposeful writing of each of the dif-ferent kinds of chapters, and finishes with a focus on revision, dissemination and deadlines. How to Write a Better Thesis presents a cohesive approach to research that will help you succeed.

Features 7 Offers a step-by-step guide on the mechanics of thesis writing 7 Illustrates the complete process of how to structure a thesis by providing specific examples 7 Equips readers to understand how to conceptualize and approach the problems of producing a thesis 7 Written by authors with over 20 years experience of supervising and advis-ing students

Contents What is a Thesis?.- Thesis Structure.- Mechanics of Writing.- Making a Strong Start.- The Introduc-tory Chapter.- Background Chapters.- Establishing Your Contribution.- Outcomes and Results.- The Discussion or Interpretation.- The Conclusion.- Before You Submit.- Beyond the Thesis.

Fields of interestComputer Science, general; Learning and Instruc-tion; Document Preparation and Text Processing

Target groupsUpper undergraduate

Discount groupProfessional Non-Medical

Due March 2014

3rd ed. 2014. X, 126 p. 1 illus. Softcover7 $39.99ISBN 978-3-319-04285-5

9<HTODMJ=aeciff>

G. A. Fink, Technical University of Dortmund, Dortmund, Germany

Markov Models for Pattern RecognitionFrom Theory to Applications

This thoroughly revised and expanded new edition now includes a more detailed treatment of the EM algorithm, a description of an efficient approxi-mate Viterbi-training procedure, a theoretical derivation of the perplexity measure and coverage of multi-pass decoding based on n-best search. Supporting the discussion of the theoretical foun-dations of Markov modeling, special emphasis is also placed on practical algorithmic solutions.

Features 7 Thoroughly revised, updated and expanded new edition 7 Examines pattern recognition systems from the perspective of Markov models, demonstrating how the models can be used in a range of different applications. 7 Places special emphasis on practical algorithmic solutions

Contents Introduction.- Application Areas.- Part I: Theory.- Foundations of Mathematical Statistics.- Vector Quantization and Mixture Estimation.- Hid-den Markov Models.- N-Gram Models.- Part II: Practice.- Computations with Probabilities.- Con-figuration of Hidden Markov Models.- Robust Parameter Estimation.- Efficient Model Evalu-ation.- Model Adaptation.- Integrated Search Methods.- Part III: Systems.- Speech Recognition.- Handwriting Recognition.- Analysis of Biological Sequences.

Fields of interestPattern Recognition; Image Processing and Computer Vision; Language Translation and Linguistics

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2nd ed. 2014. XIII, 276 p. 45 illus. (Advances in Computer Vision and Pattern Recognition) Hardcover7 $69.99ISBN 978-1-4471-6307-7

9<HTMEPH=bgdahh>

Page 5: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

41

J. Fitzgerald, Newcastle University, Newcastle upon Tyne, UK; P. G. Larsen, Aarhus University, Aarhus, Denmark; M. Verhoef, Chess WISE B.V., Haarlem, The Netherlands (Eds)

Collaborative Design for Embedded SystemsCo-modelling and Co-simulation

Contents Part I Co-modelling and Co-simulation: the Technical Basis.- Collaborative Development of Embedded Systems.- Co-modelling and Co-simu-lation in Embedded Systems Design.- Continuous-Time Modelling in 20-sim.- Discrete-Event Mod-elling in VDM.- Support for Co-modelling and Co-simulation: the Crescendo Tool.- Co-model Structuring and Design Patterns.- Part II Methods and Applications: the Pragmatics of Co-modelling and Co-simulation.- Case Studies in Co-modelling and Co-simulation.- Methods for Creating Co-models of Embedded Systems.- Co-modelling of Faults and Fault Tolerance Mechanisms.- Design Space Exploration for Embedded Systems using Co-simulation.- Industrial Application of Co-modelling and Co-simulation Technology.- Part III Advanced Topics.- Deploying Co-modelling in Commercial Practice.- Semantics of Co-simula-tion.- From Embedded to Cyber-Physical Systems: Challenges and Future Directions.- Appendix A 20-sim Summary.- Appendix B VDM-RT Language Summary.- Appendix C Design Patterns for Use in Co-modelling.- Appendix D Abstract Modelling of ChessWay Safety.

Fields of interestSpecial Purpose and Application-Based Systems; Software Engineering; Logics and Meanings of Programs

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. Approx. 350 p. Hardcover7 approx. $129.00ISBN 978-3-642-54117-9

9<HTOGPC=febbhj>

S. Foster, D. Halbstein, Rochester Institute of Technology, Rochester, NY, USA

Integrating 3D Modeling, Photogrammetry and DesignThis book looks at the convergent nature of technology and its relationship to the field of photogrammetry and 3D design. This is a facet of a broader discussion of the nature of technology itself and the relationship of technology to art, as well as an examination of the educational process. In the field of technology-influenced design-based education it is natural to push for advanced technology, yet within a larger institution the constraints of budget and adherence to tradition must be accepted. These opposing forces create a natural balance; in some cases constraints lead to greater creativity than freedom ever can – but in other cases the opposite is true.

Features 7 Discusses 3D computer modeling workflows, represented by the integration of photogrammetry, high-polygon density interactive modeling and retopology software capabilities 7 Describes current modeling methodologies, explores their advantages and disadvantages and reviews the field from the perspective of education and cur-riculum development 7 Concludes with a list of online resources, many of which are free and outlines ways of delivering structured content for learning about building 3D objects

Contents Introduction.- Technology Leaders and Adopters.- Compartmentalizing the Learning Curve.- Pho-togrammetry and Design Workflows.- 3D Design and Photogrammetry.- Conclusions and Looking Forward.- Resources and Applications.

Fields of interestImage Processing and Computer Vision; ; Simula-tion and Modeling

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. IX, 102 p. 112 illus., 15 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4471-6328-2

9<HTMEPH=bgdcic>

M. L. Gavrilova, University of Calgary, Calgary, AB, Canada; C. K. Tan, CloudfabriQ Ltd., London, UK; A. Abraham, Technical University of Ostrava, Ostrava, Czech Republic (Eds)

Transactions on Computational Science XXISpecial Issue on Innovations in Nature-Inspired Computing and Applications

Contents Community Optimization.- Diffusion of Innova-tion Simulation Using an Evolutionary Algo-rithm.- Driving Robots Using Emotions.- Land Cover Feature Extraction of Multi-spectral Satel-lite Images Based on Extended Species Abundance Model of Biogeography.- Developing Issues for Ant Colony System Based Approach for Schedul-ing Problems.- Multiobjective Optimization of Green Sand Mould System Using Chaotic Dif-ferential Evolution.- Categorical Feature Reduc-tion Using Multi Objective Genetic Algorithm in Cluster Analysis.- Tuning Meta-Heuristics Using Multi-agent Learning in a Scheduling System.- Vertical Transfer Algorithm for the School Bus Routing Problem.- An Efficient Craziness Based Particle Swarm Optimization Technique for Opti-mal IIR Filter Design.- Effect of Spatial Structure on the Evolution of Cooperation in the N-Choice Iterated Prisoner’s Dilemma.- Extracting, Identify-ing and Visualisation of the Content, Users and Authors in Software Projects.- Beehive Based Machine to Give Snapshot of the Ongoing Stories on the Web.- Incorporating Highly Explorative Methods to Improve the Performance of Variable Neighborhood Search.- Self Organising Maps on Compute Unified Device Architecture for the Per-formance Monitoring of Emergency Call-Taking Centre.

Fields of interestTheory of Computation; Computational Intelli-gence; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2013. XVI, 367 p. 164 illus. (Lecture Notes in Computer Science / Transactions on Computational Science, Volume 8160) Softcover7 $113.00ISBN 978-3-642-45317-5

9<HTOGPC=efdbhf>

Page 6: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

42

S. Gunawardena, W. Zhuang, University of Waterloo, Waterloo, ON, Canada

Modeling and Analysis of Voice and Data in Cognitive Radio NetworksThis Springer Brief investigates the voice and elastic/interactive data service support over cogni-tive radio networks (CRNs), in terms of their delay requirements. The increased demand for wireless communication conflicts with the scarcity of the radio spectrum, but CRNS allow for more efficient use of the networks. The authors review packet level delay requirements of the voice service and session level delay requirements of the elastic/interactive data services, particularly constant-rate and on-off voice traffic capacities in CRNs with centralized and distributed network coordina-tion. Some generic channel access schemes are considered as the coordination mechanism, and call admission control algorithms are developed for non-fully-connected CRNs. Other key topics include the advantages of supporting voice traffic flows with different delay requirements, the mean response time of the elastic data traffic over a centralized CRN, and effects of the traffic load at the base station and file length (service time requirement) distribution on the mean response time. The brief is designed for professionals and researchers working with wireless networks, cognitive radio, and communications. It is also a helpful reference for advanced-level students interested in efficient wireless communications.

Contents Introduction.- Voice Capacity Analysis.- Service Response Time of Elastic Data Traffic.- Service Response Time of Interactive Data Traffic.- Con-clusions and Future Directions.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. X, 90 p. 49 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-04644-0

9<HTODMJ=aegeea>

A. Hameurlain, Paul Sabatier University, Toulouse, France; J. Küng, R. Wagner, Linz, Austria (Eds)

Transactions on Large-Scale Data- and Knowledge-Centered Systems XIIThis, the 12th issue of Transactions on Large-Scale Data and Knowledge-Centered Systems, contains five revised selected regular papers. Topics covered include schema matching and schema mapping, update propagation in decision support sys-tems, routing methods in peer-to-peer systems, distributed stream analytics and dynamic data partitioning.

Features 7 Contains five in-depth papers, carefully select-ed by the Editorial Board 7 Covers a wide range of subjects in the field of data and knowledge management 7 Of interest to both researchers and practitioners in the field

Contents EvoMatch: An Evolutionary Algorithm for Inferring Schematic Correspondences.- Update Management in Decision Support Systems.- LRS: A Novel Learning Routing Scheme for Query Routing on Unstructured P2P Systems.- Open Streaming Operation Patterns.- Dynamic Work-load-Based Partitioning Algorithms for Continu-ously Growing Databases.

Fields of interestDatabase Management; Data Mining and Knowl-edge Discovery

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2013. X, 129 p. 39 illus. (Lecture Notes in Computer Science / Transactions on Large-Scale Data- and Knowledge-Centered Systems, Volume 8320) Softcover7 $98.00ISBN 978-3-642-45314-4

9<HTOGPC=efdbee>

P. He, L. Zhao, Ryerson University, Toronto, ON, Canada; S. Zhou, Z. Niu, Tsinghua University, Beijing, People’s Republic of China

Radio Resource Management Using Geometric Water-FillingThis brief introduces the fundamental theory and development of managing radio resources using a water-filling algorithm that can optimize system performance in wireless communication. Geomet-ric Water-Filling (GWF) is a crucial underlying tool in emerging communication systems such as multiple input multiple output systems, cognitive radio systems, and green communication systems. Early chapters introduce emerging wireless technologies and provide a detailed analysis of water-filling. The brief investigates single user and multi-user issues of radio resource management, allocation of resources, and energy harvesting. Effective algorithms demonstrate the incredible potential capabilities of water-filling mecha-nisms. This brief is designed for researchers and professionals working with resource management and wireless communications. Advanced-level students in computer science and engineering will also find the information valuable.

Contents Introduction.- Geometric Water-Filling in RRM.- RRM in MIMO System.- RRM for Cognitive Network.- RRM in Wireless Communications with Energy Harvest Technology.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. X, 90 p. 17 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-04635-8

9<HTODMJ=aegdfi>

Page 7: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

43

A.-L. Lamprecht, University of Potsdam, Potsdam, Germany

User-Level Workflow DesignA Bioinformatics Perspective

The continuous trend in computer science to lift programming to higher abstraction levels increases scalability and opens programming to a wider public. In particular, service-oriented programming and the support of semantics-based frameworks make application development ac-cessible to users with almost no programming ex-pertise. This monograph establishes requirement-centric scientific workflow design as an instance of consequent constraint-driven development. Requirements formulated in terms of user-level constraints are automatically transformed into running applications using temporal logic-based synthesis technology. The impact of this approach is illustrated by applying it to four very different bioinformatics scenarios: phylogenetic analysis, the dedicated GeneFisher-P scenario, the FiatFlux-P scenario, and microarray data analyses.

Features 7 The application of user-level workflow design makes the approach accessible to users with almost no programming expertise 7 Describes four realistic application scenarios in bioinformat-ics 7 Paves the way for a novel way of scientific workflow modeling based on jABC framework

Contents The Bio-jETI Framework.- Phylogenetic Analysis Workflows.- GeneFisher-P.- FiatFlux-P.- Microar-ray Data Analysis Pipelines.

Fields of interestSoftware Engineering; Logics and Meanings of Programs; Simulation and Modeling

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2013. XXII, 223 p. 84 illus. (Lecture Notes in Computer Science / Programming and Software Engineering, Volume 8311) Softcover7 $72.00ISBN 978-3-642-45388-5

9<HTOGPC=efdiif>

M. M. Mahmoud, Tennessee Technological University, Cookeville, TN, USA; X. (. Shen, University of Waterloo, Waterloo, ON, Canada

Security for Multi-hop Wireless NetworksThis Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security re-quirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, ef-ficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the ef-ficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

Contents Introduction.- System Model.- Efficient Incentive Scheme.- Secure Routing Protocols.- Conclusions and Future Directions.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. XII, 108 p. 45 illus., 27 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-04602-0

9<HTODMJ=aegaca>

Z. Majkić, ISRST, Tallahassee, FL, USA

Big Data Integration TheoryTheory and Methods of Database Mappings, Programming Languages, and Semantics

This book presents a novel approach to data-base concepts, describing a categorical logic for database schema mapping based on views, within a framework for database integration/exchange and peer-to-peer. Database mappings, database programming languages, and denotational and operational semantics are discussed in depth. An analysis method is also developed that com-bines techniques from second order logic, data modeling, co-algebras and functorial categorial semantics.

Features 7 Provides a complete algebraic extension of the RDB systems for database mappings based on second-order tuple-generating dependen-cies 7 Discusses issues relating to the com-putational complexity w.r.t. the typed lambda calculus 7 Presents various definitions and for-malizations for database mappings, data exchange, matching and merging

Contents Introduction and Technical Preliminaries.- Com-position of Schema Mappings: Syntax and Se-mantics.- Definition of DB Category.- Functorial Semantics for Database Schema Mappings.- Ex-tensions of Relational Codd’s Algebra and DB Cat-egory.- Categorial RDB Machines.- Operational Semantics for Database Mappings.- The Properties of DB Category.- Weak Monoidal DB Topos.

Fields of interestDatabase Management; Logics and Meanings of Programs; Discrete Mathematics in Computer Science

Target groupsGraduate

Discount groupProfessional Non-Medical

Due February 2014

2014. XX, 516 p. 170 illus. (Texts in Computer Science) Hardcover7 $79.99ISBN 978-3-319-04155-1

9<HTODMJ=aebffb>

Page 8: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

44

J. Mauro, University of Bologna, Bologna, Italy

Constraints Meet ConcurrencyThis book describes the benefits that emerge when the fields of constraint programming and concurrency meet. On the one hand, constraints can be used in concurrency theory to increase the conciseness and the expressive power of concur-rent languages from a pragmatic point of view. On the other hand, problems modeled by using con-straints can be solved faster and more efficiently using a concurrent system. Both directions are explored providing two separate lines of develop-ment. Firstly the expressive power of a concurrent language is studied, namely Constraint Handling Rules, that supports constraints as a primitive con-struct. The features of this language which make it Turing powerful are shown. Then a framework is proposed to solve constraint problems that is intended to be deployed on a concurrent system. For the development of this framework the concurrent language Jolie following the Service Oriented paradigm is used. Based on this experi-ence, an extension to Service Oriented Languages is also proposed in order to overcome some of their limitations and to improve the development of concurrent applications.

Features 7 A new approach to combine constraint pro-gramming and concurrency theory 7 Best 2012 doctoral dissertation in theoretical computer sci-ence and logic by Italian EATCS chapter 7 Best 2012 doctoral dissertation in computation logic by GULP

Fields of interestProgramming Languages, Compilers, Interpreters; Mathematical Logic and Formal Languages

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. XIII, 165 p. 13 illus. (Atlantis Studies in Computing, Volume 5) Hardcover7 $109.00ISBN 978-94-6239-066-9

9<HTUERC=djaggj>

A. Meduna, P. Zemek, Brno University of Technology, Brno, Czech Republic

Regulated Grammars and AutomataThis is the first book to offer key theoretical topics and terminology concerning regulated grammars and automata. They are the most important lan-guage-defining devices that work under controls represented by additional mathematical mecha-nisms. Key topics include formal language theory, grammatical regulation, grammar systems, erasing rules, parallelism, word monoids, regulated and unregulated automata and control languages.

Features 7 Offers key theoretical topics and terminology concerning regulated grammars and automa-ta 7 Includes real-world applications and future trends in the field 7 Covers easy-to-follow theoretical concepts and fundamentals

Contents Introduction.- Mathematical Background.- Rudi-ments of Formal Language Theory.- Context-Based Grammatical Regulation.- Rule-Based Grammatical Regulation.- One-Sided Versions of Random Context Grammars.- On Erasing Rules and Their Elimination.- Extension of Languages Resulting from Regulated Grammars.- Sequential Rewriting over Word Monoids.- Regulated ET0L Grammars.- Uniform Regulated Rewriting in Parallel.- Parallel Rewriting over Word Monoids.- Regulated Multigenerative Grammar Systems.- Controlled Pure Grammar Systems.- Self-Regu-lating Automata.- Automata Regulated by Control Languages.- Jumping Finite Automata.- Deep Pushdown Automata.- Applications: Overview.- Case Studies.- Concluding Remarks.- Summary.

Fields of interestTheory of Computation; Computation by Abstract Devices; Mathematical Logic and Formal Lan-guages

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. XXII, 668 p. 12 illus. Hardcover7 $149.00ISBN 978-1-4939-0368-9

9<HTMEUD=jadgij>

T. Mens, University of Mons, Mons, Belgium; A. Serebrenik, Eindhoven University of Technology, Eindhoven, The Netherlands; A. Cleve, University of Namur, Namur, Belgium (Eds)

Evolving Software SystemsFeatures 7 Comprehensive and tightly integrated presen-tation of the most recent findings on hot topics for software-intensive systems 7 Equally balances technical issues with social and collaborative aspects 7 Complemented by a huge reference list and pointers on related standards, datasets, conferences and other online material

Contents Part I Evolving Software Artefacts.- 1 An Over-view of Requirements Evolution.- 2 Coupled Evolution of Software Meta models and Models.- 3 Software Product Quality Models.- Part II Tech-niques.- 4 Search Based Software Maintenance: Methods and Tools.- 5 Mining Unstructured Software Repositories.- 6 Leveraging Web 2.0 for Software Evolution.- Part III Evolution of Specific Types of Software Systems.- 7 Evolution of Web Systems.- 8 Runtime Evolution of Highly Dynamic Software.- 9 Evolution of Software Product Lines.- 10 Studying Evolving Software Ecosystems based on Ecological Models.- Part IV Appendices.- A Emerging Trends in Software Evolution.- B List of Acronyms.- C Glossary of Terms.- D Resources.- E Datasets.

Fields of interestSoftware Engineering; Management of Computing and Information Systems; Information Systems Applications (incl.Internet)

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2014. XXIII, 404 p. Hardcover7 $99.00ISBN 978-3-642-45397-7

9<HTOGPC=efdjhh>

Page 9: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

45

G. Motta, University of Pavia, Pavia, Italy; W. Bing, Dublin Institute of Technology, Dublin, Ireland (Eds)

Software Engineering Education for a Global E-Service EconomyState of the Art, Trends and Developments

This book presents and discusses the state of the art and future trends in software engineering edu-cation. It introduces new and innovative methods, models and frameworks to focus the training towards the needs and requirements of the indus-try. Topics included in this book are: education models for software engineering, development of the software engineering discipline, innovation and evaluation of software engineering education, curriculum for software engineering education, requirements and cultivation of outstanding software engineers for the future and cooperation models for industries and software engineering education.

Features 7 Presents an in-depth discussion on techniques and technologies for software engineering educa-tion 7 Introduces innovative methods, models and frameworks for industry-oriented software education 7 Includes case studies presenting real-world experiences and lessons learned

Contents Techniques and Technologies for Software Engineering Education.- Software Engineering Education versus Industry Demand.- Curricula for Software Engineering Education.

Fields of interestSoftware Engineering; Business Information Sys-tems; e-Commerce/e-business

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. XII, 130 p. 36 illus. (Progress in IS) Hardcover7 $109.00ISBN 978-3-319-04216-9

9<HTODMJ=aecbgj>

J. S. Olson, University of California, Irvine, Irvine, CA, USA; W. A. Kellogg, IBM T.J. Watson Research Center, Yorktown Heights, NY, USA (Eds)

Ways of Knowing in HCIThis textbook brings together both new and traditional research methods in Human Computer Interaction (HCI). Research methods include in-terviews and observations, ethnography, grounded theory and analysis of digital traces of behavior.

Features 7 Provides comprehensive and up-to-date coverage of current research methods in HCI 7 Equips readers to handle complex re-search questions 7 Includes a structured context with key references and thought-provoking exer-cises for students

Contents Prologue.- Reading and Interpreting Ethnogra-phy.- Using Curiosity, Creativity, and Surprise as Analytic Tools: Grounded Theory Method as a Way of Knowing in HCI.- Knowing by Doing: Ac-tion Research as an Approach to HCI.- Concepts, Values, and Methods for Technical Human-Computer Interaction Research.- Study, Build, Repeat: Using Online Communities as a Research Platform.- Field Deployments: Knowing from Us-ing in Context.- Science and Design.- The Rise of Research through Design in HCI.- Experimental Research in HCI.- Surveys in HCI.- Crowdsourc-ing in HCI Research.- Sensor Data Streams.- Eye-tracking: A Brief Introduction.- Understanding User Behavior through Log Data and Analysis.- Looking Back: Retrospective Study Methods for HCI.- Agent Based Modeling to Inform the Design of Multiuser Systems.- Social Network Analysis.- Research and Ethics in HCI.- Epilogue.

Fields of interestUser Interfaces and Human Computer Interaction; Data Mining and Knowledge Discovery; Com-puter Appl. in Social and Behavioral Sciences

Target groupsResearch

Discount groupProfessional Non-Medical

Due April 2014

2014. XV, 460 p. 48 illus. Hardcover7 $79.99ISBN 978-1-4939-0377-1

9<HTMEUD=jadhhb>

O. Oreifej, University of California, Berkeley, Berkeley, CA, USA; M. Shah, University of Central Florida, Orlando, FL, USA

Robust Subspace Estimation Using Low-Rank OptimizationTheory and Applications

Recovering the low-rank structure of a linear subspace using a small set of corrupted examples has recently been made feasible through substan-tial advances in the area of matrix completion and nuclear-norm minimization. Such low-rank structures appear in certain conditions heavily in computer vision, for instance, in the frames of a video, the camera motion, and a picture of a build-ing façade.

Features 7 Provides a comprehensive summary of the state-of-the-art methods and applications of Low-Rank Optimization 7 Reviews the latest approaches in a wide range of computer vision problems, including: Scene Reconstruction, Video Denoising, Activity Recognition, and Background Subtraction 7 Involves a self-complete and detailed description of the methods and theories which makes it ideal for graduate students looking for a comprehensive resource in this area

Contents Introduction.- Background and Literature Review.- Seeing Through Water: Underwater Scene Reconstruction.- Simultaneous Turbulence Mitigation and Moving Object Detection.- Ac-tion Recognition by Motion Trajectory Decom-position.- Complex Event Recognition Using Constrained Rank Optimization.- Concluding Remarks.- Extended Derivations for Chapter 4.

Field of interestComputer Imaging, Vision, Pattern Recognition and Graphics

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. VI, 154 p. 41 illus., 39 in color. (The International Series in Video Computing, Volume 12) Hardcover7 $109.00ISBN 978-3-319-04183-4

9<HTODMJ=aebide>

Page 10: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

46

D. Page, N. Smart, University of Bristol, Bristol, UK

What Is Computer Science?An Information Security Perspective

This engaging and accessible text addresses the fundamental question: What Is Computer Sci-ence? The book showcases a set of representative concepts broadly connected by the theme of infor-mation security, for which the presentation of each topic can be treated as a “mini” lecture course, demonstrating how it allows us to solve real prob-lems, as well as how it relates to other subjects. The discussions are further supported by numerous examples and practical hands-on exercises.

Features 7 Explains the fundamental topics in computer science using a set of easily identifiable examples and applications 7 Provides a unified approach, offering exercises that can be reproduced and extended by the reader without the need for any prior programming experience 7 Presents each topic in the form of a "mini" lecture course, dem-onstrating how it allows us to solve real problems and how it relates to other subjects

Contents Part I: Foundations of Computer Science.- Com-pressing and Correcting Digital Media.- Writing and Comparing Algorithms.- Playing Hide-and-Seek with Virus Scanners.- How Long is a Piece of String?.- Demystifying Web-Search: The Mathematics of PageRank.- Part II: Examples from Information Security.- Using Short Programs to Make and Break Historical Ciphers.- Genera-tion and Testing of Random Numbers.- Safety in Numbers: Modern Cryptography from Ancient Arithmetic.- Hiding a Needle in a Haystack: Con-cealed Messages.- Picking Digital Pockets.

Fields of interestComputer Science, general; Data Encryption; Algorithm Analysis and Problem Complexity

Target groupsLower undergraduate

Discount groupProfessional Non-Medical

Available

2014. XVIII, 232 p. 84 illus. (Undergraduate Topics in Computer Science) Softcover7 $49.99ISBN 978-3-319-04041-7

9<HTODMJ=aeaebh>

N. Pelekis, Y. Theodoridis, University of Piraeus, Piraeus, Greece

Mobility Data Management and ExplorationThis text integrates different mobility data han-dling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications. It presents a step-by-step methodology to under-stand and exploit mobility data: collecting and cleansing data, storage in Moving Object Database (MOD) engines, indexing, processing, analyzing and mining mobility data.

Features 7 Integrates mobility data handling processes to meet real-world application requirements 7 Sup-ports practical applications with supplementary software (Hermes MOD engine) 7 Presents real case studies to validate applications 7 In-cludes sample exercises, sample project proposals and parallel teaching slides

Contents Part I: Setting the Scene.- Introduction.- Back-ground on spatial data management and exploration.- Part II: Mobility Data Management.- Modeling and acquiring mobility data.- Mobility database management.- Moving object database engines.- Part III.- Mobility Data Exploration.- Preparing for mobility data exploration.- Mobility data mining and knowledge discovery.- Privacy-aware mobility data exploration.- Part IV: Advanced Topics.- Semantic aspects on mobil-ity data.- The case of big mobility data.- Part V: Epilogue-Hands-on.- Epilogue.- Hands-on with [email protected] Hands-on with Hermes@PostgresMOD.

Fields of interestDatabase Management; Data Mining and Knowl-edge Discovery; Systems and Data Security

Target groupsGraduate

Discount groupProfessional Non-Medical

Due March 2014

2014. XII, 400 p. 150 illus. Hardcover7 $79.99ISBN 978-1-4939-0391-7

9<HTMEUD=jadjbh>

L. Pilorget, Basel, Switzerland

Implementing IT ProcessesDescription of the main 17 IT processes and directions for a successful implementation

IT plays a major role in our current society. Due to system integration and process automation, a company has to rely on performant information systems. To achieve this objective, it is important to have relevant IT processes in place on the one hand to ensure current operation and on the other hand to enable the successful introduction of new technologies. Once IT processes are defined and described, interrelations become visible, which allows to gain an appropriate level of maturity.

Features 7 Structured Framework and clear landscape of IT processes 7 Detailed description of major IT processes 7 Precise description of Process Roles and definition of IT Governance 7 Directions for a successful implementation to gain an appro-priate maturity level

Contents Theory of MIIP Model.- Detailed description of IT processes.- Introduction and surveillance of processes.

Fields of interestComputer Systems Organization and Communi-cation Networks; Information Systems and Com-munication Service; Management of Computing and Information Systems

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due April 2014

2014. Approx. 250 p. 60 illus. Softcover7 approx. $69.99ISBN 978-3-658-04772-6

9<HTOGQI=aehhcg>

Page 11: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

47

G. Rehm, H. Uszkoreit, DFKI, Berlin, Germany (Eds)

The Welsh Language in the Digital AgeThis white paper is part of a series that promotes knowledge about language technology and its potential. It addresses educators, journalists, politicians, language communities and others. The availability and use of language technology in Europe varies between languages. Conse-quently, the actions that are required to further support research and development of language technologies also differ for each language. The required actions depend on many factors, such as the complexity of a given language and the size of its community. META-NET, a Network of Excellence funded by the European Commission, has conducted an analysis of current language resources and technologies. This analysis focused on the 23 official European languages as well as other important national and regional languages in Europe. The results of this analysis suggest that there are many significant research gaps for each language. A more detailed expert analysis and assessment of the current situation will help maximise the impact of additional research and minimize any risks. META-NET consists of 54 re-search centres from 33 countries that are working with stakeholders from commercial businesses, government agencies, industry, research organisa-tions, software companies, technology providers and European universities.

Contents 1.Executive Summary.- 2.Languages at risk: a challenge for Language Technology.- 3.The Welsh Language in the European Information Soci-ety.- 4.Language Technology Support for Welsh.- 5.About META-NET.- References.- META-NET Members.- The META-NET White Papers Series.

Fields of interestLanguage Translation and Linguistics; Computa-tional Linguistics

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due February 2014

2014. V, 95 p. (White Paper Series) Softcover7 approx. $69.99ISBN 978-3-642-45371-7

9<HTOGPC=efdhbh>

R. Riolo, University of Michigan, Ann Arbor, MI, USA; J. H. Moore, Dartmouth Medical School, Lebanon, NH, USA; M. Kotanchek, Evolved Analytics, Midland, MI, USA (Eds)

Genetic Programming Theory and Practice XIFeatures 7 Describes cutting-edge work on genetic programming (GP) theory, applications of GP and how theory can be used to guide application of GP 7 Demonstrates large-scale applications of GP to a variety of problem domains 7 Reveals an inspiring synergy between GP applications and the latest in theoretical results for state-of –the-art problem solving

Contents Extreme Accuracy in Symbolic Regression.- Exploring Interestingness in a Computational Evolution System for the Genome-Wide Genetic Analysis of Alzheimer’s Disease.- Optimizing a Cloud Contract Portfolio using Genetic Program-ming-based Load Models.- Maintenance of a Long Running Distributed Genetic Programming System for Solving Problems Requiring Big Data.- Grounded Simulation: Using Simulated Evolution to Guide Embodied Evolution.- Applying Genetic Programming in Business Forecasting.- Explain-ing Unemployment Rates with Symbolic Regres-sion.- Uniform Linear Transformation with Repair and Alternation in Genetic Programming.- A Deterministic and Symbolic Regression Hybrid Applied to Resting-State fMRI Data.- Gaining Deeper Insights in Symbolic Regression.- Geomet-ric Semantic Genetic Programming for Real Life Applications.- Evaluation of Parameter Contri-bution to Neural Network Size and Fitness in ATHENA for Genetic Analysis.

Fields of interestArtificial Intelligence (incl. Robotics); Theory of Computation; Algorithm Analysis and Problem Complexity

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due March 2014

2014. XIV, 226 p. 69 illus. (Genetic and Evolutionary Computation) Hardcover7 $109.00ISBN 978-1-4939-0374-0

9<HTMEUD=jadhea>

M. P. Robillard, McGill University, Montréal, QC, Canada; W. Maalej, University of Hamburg, Hamburg, Germany; R. J. Walker, University of Calgary, Calgary, AB, Canada; T. Zimmermann, Microsoft Research, Redmond, WA, USA (Eds)

Recommendation Systems in Software EngineeringFeatures 7 First book to highlight recommendation sys-tems in high-tech fields in general and in software engineering in particular 7 Unique focus on systems issues like system architectures, specific applications and evaluation studies 7 Additional materials including lecture slides, data sets and source code available online

Contents 1 An Introduction to Recommendation Systems in Software Engineering.- Part I Techniques.- 2 Basic Approaches in Recommendation Systems.- 3 Data Mining.- 4 Recommendation Systems in-the-Small.- 5 Source Code Based Recom-mendation Systems.- 6 Mining Bug Data.- 7 Collecting and Processing Interaction Data for Recommendation Systems.- 8 Developer Profiles for Recommendation Systems.- 9 Recommenda-tion Delivery.- Part II Evaluation.- 10 Dimensions and Metrics for Evaluating Recommendation Systems.- 11 Benchmarking.- 12 Simulation.- 13 Field Studies.- Part III Applications.- 14 Reuse-Oriented Code Recommendation Systems.- 15 Recommending Refactoring Operations in Large Software Systems.- 16 Recommending Program Transformations.- 17 Recommendation Systems in Requirements Discovery.- 18 Changes, Evolution and Bugs.- 19 Recommendation Heuristics for Improving Product Line Configuration Processes.

Fields of interestSoftware Engineering; Management of Comput-ing and Information Systems; Information Storage and Retrieval

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. XIII, 562 p. 109 illus. Hardcover7 $109.00ISBN 978-3-642-45134-8

9<HTOGPC=efbdei>

Page 12: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

48

J. T. Streib, T. Soma, Illinois College, Jacksonville, IL, USA

Guide to JavaA Concise Introduction to Programming

This book presents a focused and accessible primer on the fundamentals of Java programming, with extensive use of examples and hands-on exercises.

Features 7 Presents a specific focus on the fundamen-tals of Java programming, with extensive use of examples and hands-on exercises 7 Introduces the core concepts of object-oriented programming at an early stage, supported by the use of contour diagrams 7 Includes exercises at the end of each chapter, with selected answers in an appendix and a glossary of key terms

Contents Variables, Input / Output and Arithmetic.- Ob-jects: An Introduction.- Selection Structures.- It-eration Structures.- Objects: Revisited.- Strings.- Arrays.- Recursion.- Objects: Inheritance and Polymorphism.- Elementary File Input and Out-put.- Simple Graphical Input and Output.- Excep-tions.- Java doc Comments.- Glossary.- Answers to Selected Exercises.

Fields of interestProgramming Techniques; Programming Lan-guages, Compilers, Interpreters

Target groupsLower undergraduate

Discount groupProfessional Non-Medical

Due February 2014

2014. XIII, 356 p. 182 illus., 13 in color. (Undergraduate Topics in Computer Science) Softcover7 $59.99ISBN 978-1-4471-6316-9

9<HTMEPH=bgdbgj>

S. T. Taft, SofCheck, Inc., Burlington, MA, USA; R. A. Duff, New York, NY, USA; R. L. Brukardt, AXE Consultants, Madison, WI, USA; E. Ploedereder, University of Stuttgart, Stuttgart, Germany; P. Leroy, Google Zurich, Zurich, Switzerland; E. Schonberg, New York University Courant Institute of Mathem. Science, New York, NY, USA (Eds)

Ada 2012 Reference Manual. Language and Standard LibrariesInternational Standard ISO/IEC 8652/2012 (E)

Contents General.- Lexical Elements.- Declarations and Types.- Names and Expressions.- Statements.- Subprograms.- Packages.- Visibility Rules.- Tasks and Synchronization.- Program Structure and Compilation Issues.- Exceptions.- Generic Units.- Representation Issues.- The Standard Librar-ies.- Annex A (normative) Predefined Language Environment.- Annex B (normative) Interface to Other Languages.- Annex C (normative) Systems Programming.- Annex D (normative) Real-Time Systems.- Annex E (normative) Distributed Systems.- Annex F (normative) Information Systems.- Annex G (normative) Numerics.- An-nex H (normative) High Integrity Systems.- An-nex J (normative) Obsolescent Features.- Annex K (informative) Language-Defined Aspects and Attributes.- Annex L (informative) Language-Defined Pragmas.- Annex M (informative) Sum-mary of Documentation Requirements.- Annex N (informative) Glossary.- Annex P (informa-tive) Syntax Summary.- Annex Q (informative) Language-Defined Entities.- Index.

Fields of interestProgramming Techniques; Programming Languages, Compilers, Interpreters; Operating Systems

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due February 2014

2013. XXVIII, 921 p. (Lecture Notes in Computer Science / Programming and Software Engineering, Volume 8339) Softcover7 $148.00ISBN 978-3-642-45418-9

9<HTOGPC=efebij>

J. Wang, Northwestern University, Evanston, IL, USA; Z. Liu, Microsoft Research, Redmond, WA, USA; Y. Wu, Northwestern University, Evanston, IL, USA

Human Action Recognition with Depth CamerasAction recognition technology has many real-world applications in human-computer interac-tion, surveillance, video retrieval, retirement home monitoring, and robotics. The commoditization of depth sensors has also opened up further ap-plications that were not feasible before. This text focuses on feature representation and machine learning algorithms for action recognition from depth sensors.

Features 7 Presents a comprehensive overview of the state of the art in feature representation and machine learning algorithms for action recognition from depth sensors 7 Provides in-depth descriptions of novel feature representations and machine learning techniques 7 Covers lower-level depth and skeleton features, higher-level representations to model temporal structure and human-object interactions, and feature selection techniques for occlusion handling

Contents Introduction.- Learning Actionlet Ensemble for 3D Human Action Recognition.- Random Oc-cupancy Patterns.- Conclusion.

Fields of interestImage Processing and Computer Vision; Bio-metrics; User Interfaces and Human Computer Interaction

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. VIII, 58 p. 32 illus., 9 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-04560-3

9<HTODMJ=aefgad>

Page 13: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

News 2/2014 Computer Science

49

L. Wang, Concordia University, Montreal, QC, Canada; M. Albanese, S. Jajodia, George Mason University, Fairfax, VA, USA

Network HardeningAn Automated Approach to Improving Network Security

This Springer Brief examines the tools based on attack graphs that help reveal network harden-ing threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique gener-ates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for harden-ing a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security.

Contents Introduction.- Related Work.- Attack Graph and Network Hardening.- Minimum-Cost Network Hardening.- Linear-Time Network Hardening.- Conclusion.

Fields of interestSystems and Data Security; Computer Com-munication Networks; Information Systems and Communication Service

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2014

2014. X, 60 p. 23 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-04611-2

9<HTODMJ=aegbbc>

W. Widłak, Skłodowska-Curie Memorial Cancer Center, Gliwice, Poland

Molecular Biology – Not Only for BioinformaticiansBioinformatics, which can be defined as the ap-plication of computer science and information technology to the field of biology and medicine, has been rapidly developing over the past few decades. It generates new knowledge as well as the computational tools to create that knowledge. Understanding the basic processes in living organ-isms is therefore indispensable for bioinformati-cians. This book addresses beginners in molecular biology, especially computer scientists who would like to work as bioinformaticians. It presents basic processes in living organisms in a condensed manner. Additionally, principles of several high-throughput technologies in molecular biology, which need the assistance of bioinformaticians, are explained from a biological point of view.

Features 7 Provides beginners with an introduction to molecular biology 7 Describes basic processes in living organisms indispensable for bioinformati-cians 7 Especially useful for computer scientists who would like to work as bioinformaticians

Contents Cells and viruses.- Protein structure and func-tion.- Nucleic acids.- DNA replication, mutations, and repair.- Transcription and posttranscriptional processes.- Synthesis and posttranslational modi-fications of proteins.- Cell division.- Cell signaling pathways.- High-throughput technologies in molecular biology.

Fields of interestComputational Biology/Bioinformatics; Bioinfor-matics; Computer Science, general

Target groupsUpper undergraduate

Discount groupProfessional Non-Medical

Available

2013. XII, 153 p. 122 illus. (Lecture Notes in Computer Science / Lecture Notes in Bioinformatics, Volume 8248) Softcover7 $72.00ISBN 978-3-642-45360-1

9<HTOGPC=efdgab>

N. Zhang, J. W. Mark, University of Waterloo, Waterloo, ON, Canada

Security-aware Cooperation in Cognitive Radio NetworksThis brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure coop-eration between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communi-cations. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of li-censed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance se-cure communications of licensed users. An intro-duction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and profes-sionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

Contents Introduction.- Cooperative Cognitive Radio Net-working.- Trust-aware Cooperative Networking.- Cooperative Networking for Secure Communica-tions.- Concluding Remarks.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsGraduate

Discount groupProfessional Non-Medical

Due February 2014

2014. IX, 75 p. 27 illus., 11 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4939-0412-9

9<HTMEUD=jaebcj>

Page 14: J. Ashbourn, Verus Mundus, Berkhamsted, UK S. Atapattu, C ... · Evaluation in Public Art: The Light Logic Exhibition Ximena Alarcon-Diaz, Kira Askaroff, Linda Candy, Ernest Edmonds,

Computer Science springer.com/NEWSonline

50

I. Zitouni, Microsoft Research, Redmond, WA, USA (Ed)

Natural Language Processing of Semitic LanguagesResearch in Natural Language Processing (NLP) has rapidly advanced in recent years, resulting in exciting algorithms for sophisticated processing of text and speech in various languages.

Features 7 First book that treats this subject in-depth 7 Original contributions 7 Written by well-known experts in the field

Contents Part I Natural Language Processing Core-Technologies.- 1.Linguistic Introduction: The Orthography, Morphology and Syntax of Semitic Languages. R.Fabri, M.Gasser, N. Habash, G. Kiraz and S.Wintner.- 2.Morphological Process-ing of Semitic Languages. S.Wintner.- 3.Syntax and Parsing of Semitic Languages. R. Tsarfaty.- 4.Semantic Processing of Semitic Languages. M. Diab and Y.Marton.- 5.Language Modeling. I. Heintz.- Part II Natural Language Processing Applications.- 6.Statistical Machine Translation. H. Hassan and K.Darwish.- 7.Named Entity Rec-ognition. B.Mohit.- 8.Anaphora Resolution. K.M. Seddik and A. Farghaly.- 9.Relation Extraction. V. Castelli and I. Zitouni.- 10.Information Retrieval. K. Darwish.- 11.Question Answering. Y. Benajiba, P. Rosso, L. Abouenour, O. Trigui, K.Bouzoubaa and L.H. Belguith.- 12.Automatic Summariza-tion.- L.H. Belguith, M. Ellouze, M.H. Maaloul, M. Jaoua, F. Kallel Jaoua and P. Blache.- 13.Automatic Speech Recognition. H. Soltau, G. Saon, L. Mangu, H-K.Kuo, B.Kingsbury, S. Chu and F. Biadsy.

Fields of interestLanguage Translation and Linguistics; Computa-tional Linguistics

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2014

2014. X, 420 p. (Theory and Applications of Natural Language Processing) Hardcover7 $129.00ISBN 978-3-642-45357-1

9<HTOGPC=efdfhb>