the languages of western experience with technology ... · crowd flow segmentation using lagrangian...

11
News 8/2013 Computer Science 79 E. Agmon, Bar-Ilan University Dept. of Music, Ramat- Gan, Israel The Languages of Western Tonality Tonal music, from a historical perspective, is far from homogenous; yet an enduring feature is a background “diatonic” system of exactly seven notes orderable cyclically by fiſth. Features 7 Unprecedented scope and depth 7 Answers some of the most enduring questions concern- ing Western tonality 7 Interesting for music theorists, musicologists, and music-cognition researchers Contents Chap. 1 Prototonal eory: Tapping into Ninth- Century Insights.- Part I Prototonality.- Chap. 2 Preliminaries.- Chap. 3 Communicating Pitches and Transmitting Notes.- Chap. 4 e Conven- tional Nomenclatures for Notes and Intervals.- Chap. 5 Communicating the Primary Intervals.- Chap. 6 Receiving Notes.- Chap. 7 Harmonic Systems.- Chap. 8 Prototonality.- Part II e Languages of Western Tonality.- Chap. 9 Tonal Preliminaries.- Chap. 10 Modal Communication.- Chap. 11 Topics in Dyadic and Triadic eory.- Chap. 12 Modes, Semikeys, and Keys: A Reality Check.- Chap. 13 A Neo-Riepelian Key-Distance eory.- Chap. 14 Tonal Communication.- Chap. 15 e Tonal Game.- App. A Mathematical Preliminaries.- App. B Z Modules and eir Homomorphisms.- Index Fields of interest Computer Appl. in Arts and Humanities; Music Target groups Research Product category Monograph Due October 2013 2013. X, 250 p. (Computational Music Science) Hardcover 7 approx. $109.00 ISBN 978-3-642-39586-4 9<HTOGPC=djfige> A. al-Azzawi, University of Surrey Digital World Research Centre, Guildford, UK Experience with Technology Dynamics of User Experience with Mobile Media Devices With a focus on gaining an empirically derived understanding of the underlying psychological dimensions and processes behind people’s experi- ences with technology, this book contributes to the debate of user experience (UX) within several disciplines, including HCI, design and marketing. It analyses UX dynamics at various time scales, and explores the very nature of time and meaning in the context of UX. Experience with Technol- ogy uses personal construct theory (PCT) as a theoretical and methodological starting point to this project. Features 7 Presents well-defined steps towards an empiri- cally derived novel theory of User Experience (UX) 7 Displays a clear spatial relationship between primary and secondary UX constructs through the use of diagrams 7 Includes a novel application of well-proven applied-psychology ex- perimental techniques into the HCI field 7 Clear steps on how to create high-reliability scales for measuring UX dimensions 7 Maps consumption to user experience, enabling ‘design for experience’ Contents Foreword by David Frohlich and Margaret Wilson.- Preface.- Introduction.- eories of Experience.- Measuring Experience.- Construct Dynamics: Interaction.- Construct Dynamics: Consumption.- ICE: A Model of Experience with Technology.- Conclusions.- Appendices. Fields of interest User Interfaces and Human Computer Interaction; Psychological Methods/Evaluation; Interdisciplin- ary Studies Target groups Research Product category Brief Due September 2013 2014. IX, 118 p. 55 illus. (SpringerBriefs in Computer Science) Softcover 7 $54.99 ISBN 978-1-4471-5396-2 9<HTMEPH=bfdjgc> R. Alhajj, University of Calgary, Calgary, AB, Canada; J. Rokne, University of Calgary Computer Science, Calgary, Canada (Eds) Encyclopedia of Social Network Analysis and Mining Contents Applied Computational Geometry for Social Net- works.- Basics of Social Network Model Construc- tion and Evolution.- Current and Future Research Directions.- Data Collection, Data Extraction, and Data Preparation for Social Networks Analysis and Mining.- Data Management for Social Networks and Social Media.- Data Mining and Machine Learning Techniques for Social Networks.- Graph eory for Social Networks (Sociograms). [...] Fields of interest Computer Communication Networks; Sociology, general; Socio- and Econophysics, Population and Evolutionary Models Target groups Upper undergraduate Product category Encyclop(a)edia Due September 2014 Print in 3 volumes, not available separately 2014. 7 $1100.00 ISBN 978-1-4614-6169-2 9<HTMERB=egbgjc> eReference in 3 volumes, not available separately 2014. 7 $1100.00 ISBN 978-1-4614-6170-8 9<HTMERB=egbhai> Print + eReference in 3 volumes, not available separately 2014. 2200 p. 500 illus., 250 in color. 7 $1350.00 ISBN 978-1-4614-6171-5 9<HTMERB=egbhbf>

Upload: others

Post on 20-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

News 8/2013 Computer Science

79

E. Agmon, Bar-Ilan University Dept. of Music, Ramat-Gan, Israel

The Languages of Western TonalityTonal music, from a historical perspective, is far from homogenous; yet an enduring feature is a background “diatonic” system of exactly seven notes orderable cyclically by fifth.

Features 7 Unprecedented scope and depth 7 Answers some of the most enduring questions concern-ing Western tonality 7 Interesting for music theorists, musicologists, and music-cognition researchers

Contents Chap. 1  Prototonal Theory: Tapping into Ninth-Century Insights.- Part I  Prototonality.- Chap. 2  Preliminaries.- Chap. 3  Communicating Pitches and Transmitting Notes.- Chap. 4  The Conven-tional Nomenclatures for Notes and Intervals.- Chap. 5  Communicating the Primary Intervals.- Chap. 6  Receiving Notes.- Chap. 7  Harmonic Systems.- Chap. 8  Prototonality.- Part II  The Languages of Western Tonality.- Chap. 9  Tonal Preliminaries.- Chap. 10  Modal Communication.- Chap. 11  Topics in Dyadic and Triadic Theory.- Chap. 12  Modes, Semikeys, and Keys: A Reality Check.- Chap. 13  A Neo-Riepelian Key-Distance Theory.- Chap. 14  Tonal Communication.- Chap. 15  The Tonal Game.- App. A  Mathematical Preliminaries.- App. B  Z Modules and Their Homomorphisms.- Index

Fields of interestComputer Appl. in Arts and Humanities; Music

Target groupsResearch

Product categoryMonograph

Due October 2013

2013. X, 250 p. (Computational Music Science) Hardcover7 approx. $109.00ISBN 978-3-642-39586-4

9<HTOGPC=djfige>

A. al-Azzawi, University of Surrey Digital World Research Centre, Guildford, UK

Experience with TechnologyDynamics of User Experience with Mobile Media Devices

With a focus on gaining an empirically derived understanding of the underlying psychological dimensions and processes behind people’s experi-ences with technology, this book contributes to the debate of user experience (UX) within several disciplines, including HCI, design and marketing. It analyses UX dynamics at various time scales, and explores the very nature of time and meaning in the context of UX. Experience with Technol-ogy uses personal construct theory (PCT) as a theoretical and methodological starting point to this project.

Features 7 Presents well-defined steps towards an empiri-cally derived novel theory of User Experience (UX) 7 Displays a clear spatial relationship between primary and secondary UX constructs through the use of diagrams 7 Includes a novel application of well-proven applied-psychology ex-perimental techniques into the HCI field 7 Clear steps on how to create high-reliability scales for measuring UX dimensions 7 Maps consumption to user experience, enabling ‘design for experience’

Contents Foreword by David Frohlich and Margaret Wilson.- Preface.- Introduction.- Theories of Experience.- Measuring Experience.- Construct Dynamics: Interaction.- Construct Dynamics: Consumption.- ICE: A Model of Experience with Technology.- Conclusions.- Appendices.

Fields of interestUser Interfaces and Human Computer Interaction; Psychological Methods/Evaluation; Interdisciplin-ary Studies

Target groupsResearch

Product categoryBrief

Due September 2013

2014. IX, 118 p. 55 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4471-5396-2

9<HTMEPH=bfdjgc>

R. Alhajj, University of Calgary, Calgary, AB, Canada; J. Rokne, University of Calgary Computer Science, Calgary, Canada (Eds)

Encyclopedia of Social Network Analysis and MiningContents Applied Computational Geometry for Social Net-works.- Basics of Social Network Model Construc-tion and Evolution.- Current and Future Research Directions.- Data Collection, Data Extraction, and Data Preparation for Social Networks Analysis and Mining.- Data Management for Social Networks and Social Media.- Data Mining and Machine Learning Techniques for Social Networks.- Graph Theory for Social Networks (Sociograms). [...]

Fields of interestComputer Communication Networks; Sociology, general; Socio- and Econophysics, Population and Evolutionary Models

Target groupsUpper undergraduate

Product categoryEncyclop(a)edia

Due September 2014

Print

in 3 volumes, not available separately

2014. 7 $1100.00ISBN 978-1-4614-6169-2

9<HTMERB=egbgjc> eReference

in 3 volumes, not available separately

2014. 7 $1100.00ISBN 978-1-4614-6170-8

9<HTMERB=egbhai> Print + eReference

in 3 volumes, not available separately

2014. 2200 p. 500 illus., 250 in color. 7 $1350.00ISBN 978-1-4614-6171-5

9<HTMERB=egbhbf>

Page 2: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

Computer Science springer.com/NEWSonline

80

S. Ali, SRI International, Princeton, NJ, USA; K. Nishino, Drexel University, Philadelphia, PA, USA; D. Manocha, University of North Carolina, Chapel Hill, NC, USA; M. Shah, University of Central Florida, Orlando, FL, USA (Eds)

Modeling, Simulation and Visual Analysis of CrowdsA Multidisciplinary Perspective

Contents Modeling, Simulation and Visual Analysis of Crowds: A Multidisciplinary Perspective.- On Force-based Modeling of Pedestrian Dynamics.- Connection between Microscopic and Macro-scopic Models.- Analysis of Crowd Dynamics with Laboratory Experiments.- Modeling a Crowd of Groups: Multidisciplinary and Methodological Challenges.- Scalable Solutions for Simulating, Animating, and Rendering Real-Time Crowds of Diverse Virtual Humans.- Authoring Multi-Actor Behaviors in Crowds with Diverse Personalities.- Virtual Tawaf: A Velocity-space-based Solu-tion for Simulating Heterogeneous Behavior in Dense Crowds.- Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd Flow for Video Analysis of Crowded Scenes.- Pe-destrian Interaction in Tracking: The Social Force Model and Global Optimization Methods.- Sur-veillance of Crowded Environments: Modeling the Crowd by its Global Properties.- Inferring Leadership from Group Dynamics Using Markov Chain Monte Carlo Methods.- Crowd Counting and Profiling: Methodology and Evaluation.- Anomaly Detection in Crowded Scenes: A Novel Framework based on Swarm Optimization and Social Force Modeling.

Fields of interestComputer Imaging, Vision, Pattern Recognition and Graphics; Simulation and Modeling; Behav-ioural Sciences

Target groupsProfessional/practitioner

Product categoryContributed volume

Due December 2013

2014. V, 425 p. 210 illus. (The International Series in Video Computing, Volume 11) Hardcover7 approx. $129.00ISBN 978-1-4614-8482-0

9<HTMERB=eieica>

E. Al-Shaer, University of North Carolina Charlotte, Charlotte, NC, USA; X. Ou, Kansas State University, Manhattan, KS, USA; G. Xie, Naval Postgraduate School, Monterey, CA, USA (Eds)

Automated Security ManagementIn this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, con-figuration analysis, and diagnostics and discovery.

Features 7 Discusses how to manage the complex se-curity risk of configuration settings of network systems 7 Explores the relationship between vulnerability assessment and security automa-tion 7 Covers automated/dynamic defense based risk 7 Offers a comprehensive coverage of security automation

Contents 1: Towards a Unified Modeling and Verification of Network and System Security Configura-tions.- 2: Modeling and Checking the Security of DIFC System Configurations.- 3: Increasing Android Security using a Lightweight OVAL-based Vulnerability Assessment Framework.- 4: A Declarative Logic-based Approach for Threat Analysis of Advanced Metering Infrastructure.- 5: Risk based Access Control using Classification.- 6: GCNav - Generic Configuration Navigation System.- 7: The Right Files at the Right Time.- 8: Rule Configuration Checking in Secure Coopera-tive Data Access.- 9: Programmable Diagnostic Network Measurement with Localization and Traffic Observation.- 10: Discovery of Unexpected Services and Communication Paths in Networked Systems.- 11: Tracing Advances Persistent Threats in Networked Systems.

Fields of interestSystems and Data Security; Data Encryption; Computer Communication Networks

Target groupsResearch

Product categoryContributed volume

Due October 2013

2013. X, 190 p. 62 illus. Hardcover7 approx. $109.00ISBN 978-3-319-01432-6

9<HTODMJ=abedcg>

A. Appice, A. Ciampi, F. Fumarola, D. Malerba, University of Bari, , Italy

Data Mining Techniques in Sensor NetworksSummarization, Interpolation and Surveillance

Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates. As data analysis requests may concern both present and past data, the server is forced to store the entire stream. But the limited storage capacity of a server may reduce the amount of data stored on the disk. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data. This work introduces a recently defined spatio-temporal pattern, called trend cluster, to summarize, interpolate and identify anomalies in a sensor network.

Features 7 Introduces the trend cluster, a recently defined spatio-temporal pattern, and its use in summariz-ing, interpolating and identifying anomalies in sensor networks 7 Illustrates the application of trend cluster discovery to monitor the efficiency of photovoltaic power plants 7 Discusses new possibilities for surveillance enabled by recent developments in sensing technology

Contents Introduction.- Sensor Networks and Data Streams: Basics.- Geodata Stream Summarization.- Missing Sensor Data Interpolation.- Sensor Data Surveil-lance.- Sensor Data Analysis Applications.

Fields of interestData Mining and Knowledge Discovery; Com-puter Communication Networks

Target groupsResearch

Product categoryBrief

Due September 2013

2014. X, 117 p. 39 illus., 37 in color. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4471-5453-2

9<HTMEPH=bfefdc>

Page 3: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

News 8/2013 Computer Science

81

G. Ausiello, Università di Roma “La Sapienza” Dipt. di Informatica e Sistemistica, Rome, Italy; R. Petreschi, Università di Roma “La Sapienza” Dipartimento di Informatica, Rome, Italy (Eds)

The Power of AlgorithmsInspiration and Examples in Everyday Life

To examine, analyze, and manipulate a problem to the point of designing an algorithm for solving it is an exercise of fundamental value in many fields. With so many everyday activities governed by algorithmic principles, the power, precision, reli-ability and speed of execution demanded by users have transformed the design and construction of algorithms from a creative, artisanal activity into a full-fledged science in its own right. This book is aimed at all those who exploit the results of this new science, as designers and as consumers.

Features 7 Apologia for fascinating research and applica-tion field 7 Leading authors express their enthu-siasm and insights 7 Fun, non-trivial application examples

Contents Part I  Finding One’s Way in a World of Algo-rithms.- Chap. 1  Algorithms: An Historical Per-spective.- Chap. 2  How to Design an Algorithm.- Chap. 3  The One Million Dollars Problem.- Part II  The Difficult Simplicity of Daily Life.- Chap. 4  The Quest for the Shortest Route.- Chap. 5  Web Search.- Chap. 6  Algorithms for Secure Com-munication.- Chap. 7  Algorithmics for the Life Sciences.- Chap. 8  The Shortest Walk to Watch TV.- Chap. 9  Algorithms for Auctions and Games.- Chap. 10  Randomness and Complexity.

Fields of interestComputers and Education; Algorithm Analysis and Problem Complexity; History of Computing

Target groupsUpper undergraduate

Product categoryUndergraduate textbook

Due September 2013

2013. XV, 245 p. Hardcover7 $49.99ISBN 978-3-642-39651-9

9<HTOGPC=djgfbj>

G. Baldassarre, M. Mirolli, Istituto di Scienze e Tecnologie della Cognizione, Rome, Italy (Eds)

Computational and Robotic Models of the Hierarchical Organization of BehaviorContents Chap. 1 - Computational and Robotic Models of the Hierarchical Organization of Behavior: An Overview.- Chap. 2 - Behavioral Hierarchy: Exploration and Representation.- Chap. 3 - Self-organized Functional Hierarchy Through Multiple Timescales: Neurodynamical Accounts for Behav-ioral Compositionality.- Chap. 4 - Autonomous Representation Learning in a Developing Agent.- Chap. 5 - Hierarchies for Embodied Action Perception.- Chap. 6 - Learning and Coordinating Repertoires of Behaviors with Common Reward: Credit Assignment and Module Activation.- Chap. 7 - Modular, Multimodal Arm Control Mod-els.- Chap. 8 - Generalization and Interference in Human Motor Control.- Chap. 9 - A Developmen-tal Framework for Cumulative Learning Robots.- Chap. 10 - The Hierarchical Accumulation of Knowledge in the Distributed Adaptive Control Architecture.- Chap. 11 - The Hierarchical Organi-zation of Cortical and Basal Ganglia Systems: A Computationally Informed Review and Integrated Hypothesis.- Chap. 12 - Divide and Conquer: Hierarchical Reinforcement Learning and Task Decomposition in Humans.- Chap. 13 - Neural Network Modelling of Hierarchical Motor Func-tion in the Brain.- Chap. 14 - Restoring Purpose in Behavior.

Fields of interestArtificial Intelligence (incl. Robotics); Control, Robotics, Mechatronics; Computational Intel-ligence

Target groupsResearch

Product categoryMonograph

Due September 2013

2013. IV, 385 p. 116 illus., 43 in color. Hardcover7 $129.00ISBN 978-3-642-39874-2

9<HTOGPC=djihec>

S. Bernardi, Centro Universitario de la Defensa, Zaragoza, Spain; J. Merseguer, Universidad de Zaragoza, Zaragoza, Spain; D. C. Petriu, Carleton University, Ottawa, ON, Canada

Model-Driven Dependability Assessment of Software SystemsOver the last two decades, a major challenge for researchers working on modeling and evaluation of computer-based systems has been the assess-ment of system Non Functional Properties (NFP) such as performance, scalability, dependability and security. In this book, the authors present cutting-edge model-driven techniques for model-ing and analysis of software dependability. Most of them are based on the use of UML as software specification language. From the software system specification point of view, such techniques exploit the standard extension mechanisms of UML (i.e., UML profiling). UML profiles enable software engineers to add non-functional properties to the software model, in addition to the functional ones. The authors detail the state of the art on UML pro-file proposals for dependability specification and rigorously describe the trade-off they accomplish. The focus is mainly on RAMS (reliability, avail-ability, maintainability and safety) properties.

Features 7 Comprehensive overview of standards-based dependability modeling and analysis 7 Presenta-tion based on the standard extension mechanisms of UML 7 Detailed case studies to illustrate single process steps 7 Co-authored by contribu-tors to related OMG standards

Fields of interestSoftware Engineering; Computation by Abstract Devices; System Performance and Evaluation

Target groupsResearch

Product categoryMonograph

Due September 2013

2013. XX, 190 p. Hardcover7 $109.00ISBN 978-3-642-39511-6

9<HTOGPC=djfbbg>

Page 4: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

Computer Science springer.com/NEWSonline

82

R. Böhme, Westfälische Wilhelms-Universität Münste Department of Information Systems, Münster, Germany (Ed)

The Economics of Information Security and PrivacyContents Part I - Management of Information Security.- A Closer Look at Information Security Costs.- To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool.- Ad-Blocking Games: Mon-etizing Online Content Under the Threat of Ad Avoidance.- Software Security Economics: Theory, in Practice.- Part II - Economics of Information Security.- An Empirical Study on Information Se-curity Behaviors and Awareness.- Sectoral and Re-gional Interdependency of Japanese Firms Under the Influence of Information Security Risks.- Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.- Online Pro-miscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.- Part III - Economics of Privacy.- The Privacy Economics of Voluntary Over-disclosure in Web Forms.- Choice Architecture and Smartphone Privacy: There’s a Price for That.- Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application.- Part IV - Economics of Cybercrime.- Measuring the Cost of Cybercrime.- Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer.

Fields of interestData Structures, Cryptology and Information Theory; Economics general; Systems and Data Security

Target groupsResearch

Product categoryMonograph

Available

2013. XV, 315 p. Hardcover7 approx. $129.00ISBN 978-3-642-39497-3

9<HTOGPC=djejhd>

T. Bosse, VU University Amsterdam, Amsterdam, Netherlands; D. J. Cook, Pullman, WA, USA; M. Neerincx, Delft University of Technology, Delft, Netherlands; F. Sadri, Imperial College London Dept. Computing, London, UK (Eds)

Human Aspects in Ambient IntelligenceContemporary Challenges and Solutions

This book presents recent developments is the field of human aspects in Ambient Intelligence. This field, and the associated workshop series, addresses multidisciplinary aspects of AmI with human-directed disciplines such as psychol-ogy, social science, neuroscience and biomedical sciences. The aim of the workshop series is to get researchers together from these human-directed disciplines or working on cross connections of AmI with these disciplines. The focus is on the use of knowledge from these disciplines in AmI applications, in order to support humans in their daily living in medical, psychological and social respects. The book plays important role to get modellers in the psychological, neurological, so-cial or biomedical disciplines interested in AmI as a high-potential application area for their models.

Features 7 Unique interdisciplinary focus (on the intersec-tion of Ambient Intelligence with human-directed disciplines) 7 Based on recent papers presented at one of the top conferences in the field 7 Ed-ited by a number of international experts in the field

Fields of interestArtificial Intelligence (incl. Robotics); User Interfaces and Human Computer Interaction; Computer Applications

Target groupsResearch

Product categoryContributed volume

Due August 2013

2013. VIII, 165 p. 58 illus. (Atlantis Ambient and Pervasive Intelligence, Volume 8) Hardcover7 $109.00ISBN 978-94-6239-017-1

9<HTUERC=djabhb>

J. P. Bowen, London South Bank University, UK; S. Keene, University College London, UK; K. Ng, University of Leeds, UK (Eds)

Electronic Visualisation in Arts and CultureContents Foreword.- Preface.- The EVA London Conference 1990–2012: Personal Reflections.- Part I – Imaging and Culture.- From Descriptions to Duplicates to Data.- Quantifying Culture: Four Types of Value in Visualisation.- Embodied Airborne Imagery: Low-Altitude Cinematic Urban Topography.- Back to Paper? An Alternative Approach to Conserv-ing Digital Images into the 23rd Century.- Part II – New Art Practice.- Light Years: Jurassic Coast – An Immersive 3D Landscape Project.- Photog-raphy as a Tool of Alienation: Aura.- Fugue and Variations on some Themes in Art and Science.- Part III – Seeing Motion.- Motion Studies: The Art and Science of Bird Flight.- Game Catcher: Visualising and Preserving Ephemeral Movement for Research and Analysis.- mConduct: A Multi-Sensor Interface for the Capture and Analysis of Conducting Gesture.- Photocaligraphy: Writing Sign Language.- Part IV – Interaction and Inter-faces.- Mobile Motion: Multimodal Device Aug-mentation for Musical Applications.- Legal Net-works: Visualising the Violence of the Law.- Face, Portrait, Mask: Using a Parameterised System to Explore Synthetic Face Space.- Facebook as a Tool for Artistic Collaboration.- Part V – Visualising Heritage.- Just in Time: Defining Historical Chro-nographics.- Beckford’s Ride: The Reconstruction of Historic Landscape.- Reconfiguring Experimen-tal Archaeology Using 3D Reconstruction.

Fields of interestComputer Imaging, Vision, Pattern Recognition and Graphics; User Interfaces and Human Com-puter Interaction; Cultural Studies

Target groupsResearch

Product categoryContributed volume

Due September 2013

2014. XIV, 300 p. 123 illus., 103 in color. (Springer Series on Cultural Computing) Hardcover7 $109.00ISBN 978-1-4471-5405-1

9<HTMEPH=bfeafb>

Page 5: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

News 8/2013 Computer Science

83

H. Bunt, Tilburg University, Tilburg, Netherlands; J. Bos, Rijksuniversiteit Groningen, Groningen, Netherlands; S. Pulman, Oxford University, Oxford, UK (Eds)

Computing MeaningVolume 4

Contents Computing Meaning: Annotation, Representa-tion, and Inference by Harry Bunt, Johan Bos, and Stephen Pulman .- Part I Semantic Representation and Compositionality . Deterministic Statistical Mapping of Sentences to Underspecified Seman-tics by Hiyan Alshawi, Pi-Chuan Chang, and Michael Ringgaard .- A formal approach to linking logical form and vector-space lexical semantics by Dan Garrette, Katrin Erk, and Raymond Mooney .- Annotations that effectively contribute to semantic interpretation by Harry Bunt .- Concrete Sentence Spaces for Compositional Distributional Models of Meaning by Edward Grefenstette, Mehmoosh Sadrzadeh, Stephen Clark, Bob Coecke, and Stephen Pulman .-  Part II Inference and Understanding . Recognizing Textual Entail-ment and Computational Semantics by Johan Bos .- Abductive Reasoning with a Large Knowledge Base for Discourse Processing by Ekaterina Ovchinnikova, Niloofar Montazeri, Theodore Alexandrov, Jerry R. Hobbs, Michael C. McCord, and Rutu Mulkar-Mehta .- Natural logic and natural language inference by Bill MacCartney and Christopher D. Manning .- Designing Efficient Controlled Languages for Ontologies by Camilo Thorne, Raffaella Bernardi, and Diego Calvanese .- Part III Semantic Resources and Annotation . A Context-Change Semantics for Dialogue Acts by Harry Bunt .- VerbNet Class Assignment as a WSD Task by Susan Windisch Brown, Dmitriy Dligach and Martha Palmer . [...]

Fields of interestComputing Methodologies; Computational Lin-guistics; Computer Appl. in Arts and Humanities

Target groupsResearch

Product categoryContributed volume

Due September 2013

2014. X, 290 p. 20 illus. (Text, Speech and Language Technology, Volume 47) Hardcover7 $129.00ISBN 978-94-007-7283-0

9<HTUELA=hhcida>

S. Ceri, A. Bozzon, M. Brambilla, E. Della Valle, P. Fraternali, S. Quarteroni, Politecnico di Milano Dipartimento di Elettronica, Milan, Italy

Web Information RetrievalWith the proliferation of huge amounts of (het-erogeneous) data on the Web, the importance of information retrieval (IR) has grown considerably over the last few years. Big players in the computer industry, such as Google, Microsoft and Yahoo!, are the primary contributors of technology for fast access to Web-based information; and searching capabilities are now integrated into most informa-tion systems, ranging from business management software and customer relationship systems to social networks and mobile phone applications.

Features 7 Offers a unique combination of both tradi-tional and Web-specific techniques of informa-tion retrieval 7 Includes novel applications like multi-domain search, semantic search, and crowd search 7 Classroom use is facilitated by a supple-mental slide set

Contents Part I Principles of Information Retrieval.- An Introduction to Information Retrieval.- The Infor-mation Retrieval Process.- Information Retrieval Models.- Classification and Clustering.- Natural Language Processing for Search.- Part II Informa-tion Retrieval for the Web.- Search Engines.- Link Analysis.- Recommendation and Diversification for the Web.- Advertising in Search.- Part III Ad-vanced Aspects of Web Search.- Publishing Data on the Web.- Meta-Search and Multi-Domain Search.- Semantic Search.- Multimedia Search.- Search Process and Interfaces.- Human Computa-tion and Crowd Search.

Fields of interestInformation Storage and Retrieval; Artificial Intel-ligence (incl. Robotics); Probability and Statistics in Computer Science

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due September 2013

2013. XIV, 282 p. 120 illus., 3 in color. (Data-Centric Systems and Applications) Hardcover7 $69.99ISBN 978-3-642-39313-6

9<HTOGPC=djdbdg>

C. Chauve, Simon Fraser University, Burnaby, BC, Canada; N. El-Mabrouk, University of Montreal, , QC, Canada; E. Tannier, INRIA Rhône-Alpes, Montbonnot, France (Eds)

Models and Algorithms for Genome EvolutionThis authoritative text/reference presents a review of the history, current status, and potential future directions of computational biology in molecular evolution.

Features 7 Discusses the latest developments in com-putational tools for complex biological da-tasets 7 Contains contributions from an international and interdisciplinary selection of experts 7 Provides a tribute to David Sankoff 's 50 years of contributions to this field

Contents Part I: Emergence of Standard Algorithms.- What’s Behind Blast.- Forty Years of Model-Based Phylogeography.- How to Infer Ancestral Genome Features by Parsimony.- Duplication, Rearrange-ment and Reconciliation.- The Genesis of the DCJ Formula.- Part II: New Lights on Current Paradigms.- Large-Scale Multiple Sequence Align-ment and Phylogeny Estimation.- Rearrangements in Phylogenetic Inference.- Status of Research on Insertion and Deletion Variations in the Human Population.- A Retrospective on Genomic Prepro-cessing for Comparative Genomics.- A Compari-son of DCJ and Algebraic Distances.- Part III: Promising Directions.- Fractionation, Rearrange-ment, Consolidation, Reconstruction.- Error Detection and Correction of Gene Trees.- The Potential of Family-Free Genome Comparison.- Genetic History of Populations.

Fields of interestComputational Biology/Bioinformatics; Math-ematical and Computational Biology; Bioinfor-matics

Target groupsResearch

Product categoryContributed volume

Due September 2013

2014. X, 318 p. 84 illus., 44 in color. (Computational Biology, Volume 19) Hardcover7 $129.00ISBN 978-1-4471-5297-2

9<HTMEPH=bfcjhc>

Page 6: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

Computer Science springer.com/NEWSonline

84

X. Chen, University of Science and Technology, Hefei, China, People’s Republic; P. Stone, The University of Texas at Austin, Austin, TX, USA; L. E. Sucar, Instituto Nacional de Astrofísica, Óptica y Electrónica, Puebla, Mexico; T. van der Zant, University of Groningen, Groningen, Netherlands (Eds)

RoboCup 2012: Robot Soccer World Cup XVIThis book includes the thoroughly refereed post-conference proceedings of the 16th Annual RoboCup International Symposium, held in Mexico City, Mexico, in June 2012. The 24 revised papers presented together with nine champion team papers and one best paper award were carefully reviewed and selected from 64 submis-sions. The papers present current research and educational activities within the fields of Robotics and Artificial Intelligence with a special focus to robot hardware and software, perception and ac-tion, robotic cognition and learning, multi-robot systems, human-robot interaction, education and edutainment, and applications.

Features 7 Fast-track conference proceedings 7 State-of-the-art research 7 Up-to-date results

Contents Robot hardware and software.- Perception and action.- Robotic cognition and learning.- Multi-robot systems.- Human-robot interaction.- Educa-tion and edutainment.- Applications.

Fields of interestArtificial Intelligence (incl. Robotics); Computer Communication Networks; User Interfaces and Human Computer Interaction

Target groupsResearch

Product categoryContributed volume

Available

2013. XII, 392 p. 183 illus. (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence, Volume 7500) Softcover7 $95.00ISBN 978-3-642-39249-8

9<HTOGPC=djceji>

M. Childs, Coventry University Faculty of Engineering and Computing, Coventry, UK; A. Peachey, The Open University, Milton Keynes, UK (Eds)

Understanding Learning in Virtual WorldsSince the publication of the companion volume Researching Learning in Virtual Worlds in 2010, there has been a growth not only in the range and number of educational initiatives taking place in virtual worlds, but also in the depth of analysis of the nature of that education.

Features 7 Presents recent developments in understanding how learning in virtual worlds occurs 7 Includes case studies on the application of virtual worlds in education 7 Addresses the teaching of a variety of subject disciplines in virtual worlds

Contents Editors’ Introduction.- An Alternative (to) Reality.- Guidelines for Conducting Text Based Interviews in Virtual Worlds.- Designing for Hybrid Learning Environments in a Science Museum: Inter-professional Conceptualisations of Space.- An Examination of Student Engagement, Knowledge Creation and Expansive Learning in a Virtual World.- The Strength of Cohesive Ties: Discursive Construction of an Online Learning Community.- +SPACES: Serious Games for Role-Playing Government Policies.- Avatars, Art and Aspirations: The Creative Potential for Learning in the Virtual World.- Second Language Acquisi-tion by Immersive and Collaborative Task-based Learning in a Virtual World.- Do Virtual Worlds Support Engaging Social Conferencing?

Fields of interestUser Interfaces and Human Computer Interaction; Computers and Education; Educational Technol-ogy

Target groupsResearch

Product categoryContributed volume

Due July 2013

2014. XXII, 179 p. 39 illus., 36 in color. (Human–Computer Interaction Series) Hardcover7 $109.00ISBN 978-1-4471-5369-6

9<HTMEPH=bfdgjg>

J. Euzenat, INRIA Rhône-Alpes, St. Ismier Cedex, France; P. Shvaiko, Informatica Trentina SpA, Trento, Italy

Ontology MatchingOntologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies.

Features 7 The first state-of-the-art overview of tech-niques for database schema matching and seman-tic web applications 7 Summarizes research from the database, information systems, and artificial intelligence communities 7 Combines theoretical foundations with practical application perspectives

Contents Introduction.- Part I The matching problem.- Ap-plications.- The matching problem.- Methodol-ogy.- Part II Ontology matching techniques.- Clas-sifications of ontology matching techniques.- Basic similarity measures.- Global matching methods.- Matching strategies.- Part III Systems and evalua-tion.- Overview of matching systems.- Evaluation of matching systems.- Part IV Representing, explaining, and processing alignments.- Frame-works and formats: representing alignments.- User involvement.- Processing alignments.- Part V Conclusions.- Conclusions.- Appendix A: Legends of figures.- Appendix B: Running example.- Ap-pendix C: Exercises.- Appendix D: Solution to exercises.

Fields of interestInformation Storage and Retrieval; Information Systems Applications (incl.Internet); Artificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryMonograph

Due November 2013

2nd ed. 2013. Approx. 400 p. Hardcover7 $99.00ISBN 978-3-642-38720-3

9<HTOGPC=dihcad>

Page 7: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

News 8/2013 Computer Science

85

B. Furht, Florida Atlantic University Dept. of Computer Science & Engineering, Boca Raton, FL, USA; A. Agarwal, Florida Atlantic University, Boca Raton, FL, USA (Eds)

Handbook of Medical and Healthcare TechnologiesContents Mobile Medical and Healthcare Applications.- Medical Information Retrieval Enhanced with User’s Query Expanded with Tag-Neighbors.- Medical Technology Breakthroughs in Tissue Engineering.- Innovations in #D Interventional X-ray Imaging.- Automated Classification of Echo-Cardiography Images Using Texture Analysis Methods.- Innovative Soft Computing Methodologies for Evaluating the Risk Factors of Atherosclerosis.- Nanotechnology and Its Applica-tions in Medicine.- Anomaly Detection Scheme for Medical Wireless Sensor Networks.- Predicting the Outcome of Antihypertensive Therapy Using Knowledge Mining.- Cloud Computing Approach to Novel Medical Interface Design.- Tissue Engi-neering Triangle and Its Development.- Predicting Hospital Readmission Risk for COPD Using EHR Information.- Modeling an e-Health Framework Toward Personalized and Context-Aware Multi-media Services.- Personal Web in Healthcare.- Se-cure Mobile Framework for Monitoring Medical Sensor Data.- Virtual Doctor: A WBAN-Based Architecture for Health Care Service.- Security of Electronic Medical Records.- Towards Personal-ized Services in the Healthcare Domain.- Sensor Infrastructure for Ambient Assisted Living.- Im-proving Safety in Medical Devices from Concept to Retirement.- Wearable and Implantable Tech-nologies for Cardiovascular Health Informatics.- Integration of Various Health Record Systems.

Fields of interestHealth Informatics; Imaging / Radiology; Image Processing and Computer Vision

Target groupsResearch

Product categoryHandbook

Due August 2013

2014. X, 530 p. 205 illus. Hardcover7 $149.00ISBN 978-1-4614-8494-3

9<HTMERB=eiejed>

M. Garofalakis, Bell Laboratories, Murray Hill, NJ, USA; J. Gehrke, Cornell University, Ithaca, NY, USA; R. Rastogi, Bell Laboratories Internet Management Research Dept., Murray Hill, NJ, USA (Eds)

Data Stream ManagementProcessing High-Speed Data Streams

Traditional Database Management Systems are built on the concept of persistent data sets, that are stored reliably in stable storage and queried/updated several times throughout their lifetime. For several emerging application domains, however, data arrives and needs to be processed on a continuous (24x7) basis, and they need data-processing algorithms and systems that work over continuous data streams. This book is the first in-depth treatment of this important topic, cover-ing basic data stream techniques, data stream syn-opses, mining data streams, advanced data stream computations, and systems and architectures for data stream management systems.

Contents Part I: Introduction.- Part II: Computation of Basic Stream Synopses.- Part III: Mining Data Streams.- Part IV: Advanced Topics.- Part V: Sys-tems and Architectures.- Part VI: Applications.

Fields of interestDatabase Management; Information Storage and Retrieval; Computer Applications

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due December 2013

2012. Approx. 400 p. (Data-Centric Systems and Applications) Hardcover7 approx. $69.95ISBN 978-3-540-28607-3

9<HTOFPA=cigahd>

C. C. Grant, The Fire Protection Research Foundation, Quincy, MA, USA

Interoperable Electronic Safety EquipmentPerformance Requirements for Compatible and Interoperable Electronic Equipment for Emergency First Responders

Firefighters and other emergency first respond-ers use a huge variety of highly specialized and critical technologies for personal protection. These technologies, ranging from GPS to environmental sensing to communication devices, often run on different systems with separate power supplies and operating platforms. How these technologi-cal components function in a single synergistic system is of critical interest to firefighter end-users seeking efficient tools. Interoperable ESE states that a standardized platform for electronic safety equipment (ESE) is both logical and essential. This book develops an inventory of existing and emerging electronic equipment categorized by key areas of interest to the fire service, documents equipment performance requirements relevant to interoperability, including communications and power requirements, and develops an action plan toward the development of requirements to meet the needs of emergency responders. This book is intended for practitioners as a tool for understanding interoperability concepts and the requirements of the fire service landscape.

Contents Introduction and Background.- Literature Re-view.- PPE Electronic Inventory.- Performance Requirements for Interoperability.- PPE Electronic Equipment Workshops.- Recommendations.- Bib-liography.- Appendix.

Fields of interestSystem Performance and Evaluation; Quality Control, Reliability, Safety and Risk; Electrical Engineering

Target groupsProfessional/practitioner

Product categoryBrief

Due August 2013

2014. XIV, 104 p. 64 illus. (SpringerBriefs in Fire) Softcover7 $54.99ISBN 978-1-4614-8276-5

9<HTMERB=eichgf>

Page 8: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

Computer Science springer.com/NEWSonline

86

Z. Liu, The United Nations University Intern. Inst. for Software Technology, Macau SAR, China, People’s Republic; J. Woodcock, Department of Computer Science, York, UK; H. Zhu, East China Normal University, Shanghai, China, People’s Republic (Eds)

Unifying Theories of Programming and Formal Engineering MethodsInternational Training School on Software Engineering, Held at ICTAC 2013, Shanghai, China, August 26-30, 2013, Advanced Lectures

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Pro-gramming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers.

Features 7 Thoroughly revised tutorial lectures 7 Aimed at postgraduate students, researchers, academics, and industrial engineers 7 Presents state of the art in Unifying Theories of Programming and Formal Engineering Methods

Contents rCOS: Defining Meanings of Component-Based Software Architectures.- Model-Based Verifica-tion, Optimization, Synthesis and Performance Evaluation of Real-Time Systems.- Unifying Theo-ries of Programming in Isabelle.- FORMULA 2.0: A Language for Formal Specifications.- Formal Modelling, Analysis and Verification of Hybrid Systems.

Fields of interestTheory of Computation; Software Engineering; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryContributed volume

Due August 2013

2013. XII, 283 p. 50 illus. (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, Volume 8050) Softcover7 $83.00ISBN 978-3-642-39720-2

9<HTOGPC=djhcac>

N. Lu, University of Waterloo, Waterloo, ON, Canada; X. Shen, University of Waterloo Dept. Electrical & Computer Engineering, Waterloo, ON, Canada

Capacity Analysis of Vehicular Communication NetworksThis SpringerBrief focuses on the network capacity analysis of VANETs, a key topic as fundamental guidance on design and deployment of VANETs is very limited. Moreover, unique characteristics of VANETs impose distinguished challenges on such an investigation. This SpringerBrief first intro-duces capacity scaling laws for wireless networks and briefly reviews the prior arts in deriving the capacity of VANETs. It then studies the unicast capacity considering the socialized mobility model of VANETs. With vehicles communicating based on a two-hop relaying scheme, the unicast capacity bound is derived and can be applied to predict the throughput of real-world scenarios of VANETs. The downlink capacity of VANETs is also investigated in which access infrastructure is deployed to provide pervasive Internet access to vehicles. Different alternatives of wireless access infrastructure are considered. A lower bound of downlink capacity is derived for each type of access infrastructure. The last section of this book presents a case study based on a perfect city grid to examine the capacity-cost trade-offs of different deployments since the deployment costs of differ-ent access infrastructure are highly variable.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks; Power Electronics, Electrical Machines and Networks

Target groupsResearch

Product categoryBrief

Due October 2013

2014. V, 85 p. 25 illus. (SpringerBriefs in Electrical and Computer Engineering) Softcover7 approx. $54.99ISBN 978-1-4614-8396-0

9<HTMERB=eidjga>

V. M. Penichet, University of Castilla-La Mancha Computing Systems Department, Albacete, Spain; A. Peñalver, University of Elche Center of Operations Research University, Alicante, Spain; J. A. Gallud, University of Castilla-La Mancha Computing Systems Department, Albacete, Spain (Eds)

New Trends in Interaction, Virtual Reality and ModelingThe interaction between a user and a device forms the foundation of today’s application design.

Features 7 Presents solutions to a number of Human-Computer Interaction issues in virtual and augmented reality 7 Includes evaluations and usability methods of numerous new interactive technologies 7 Introduces novel aspects of tan-gible user interfaces and haptic devices

Contents Preface.- Validating a Method for Quantita-tive Mobile Usability Testing Based on Desktop Eyetracking.- An Approach to Explore Large-scale Collections based on Classification Schemes.- A Framework for the Improvement of Collabora-tion and Human-Computer-Human Interaction in Organizational Environments.- ORION: One More Step in Virtual Reality Interaction.- Towards the Commodification of Augmented Reality: Tools & Platforms.- A VRPN Server for Haptic Devices using OpenHaptics 3.0.- Tangible User Interfaces: A New Trend in Interaction for Helping Chil-dren with Down Syndrome to Develop Reading Skills.- Designing a Communication Platform for Ubiquitous Systems: The Case Study of a Mobile Forensic Workspace.- Gamification: Analysis and Application.- BaLOReS: A Framework for Quanti-tative User Interface Evaluation.- Index.

Fields of interestUser Interfaces and Human Computer Interaction; Simulation and Modeling; Media Design

Target groupsResearch

Product categoryContributed volume

Due September 2013

2014. X, 300 p. 57 illus., 44 in color. (Human–Computer Interaction Series) Hardcover7 $109.00ISBN 978-1-4471-5444-0

9<HTMEPH=bfeeea>

Page 9: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

News 8/2013 Computer Science

87

Z. Qin, Tsinghua University School of Software, Beijing, China, People’s Republic; Y. Chang, Tsinghua University, Beijing, China, People’s Republic; S. Li, Shaanxi Normal University, Xi’an, China, People’s Republic; F. Li, Tsinghua University, Beijing, China, People’s Republic

E-Commerce StrategyE-Commerce Strategy builds awareness and sharpens readers’ understanding of the key issues about e-commerce strategies. To link theory of e-commerce strategy with practice in the real world, it brings together theoretical perspectives based on academic research, integrated use of technolo-gies and large amount of cases, especially those of China. With regard to the innovative technical standards and frameworks, it proposes strategic analysis from a technical point of view.

Features 7 Take the lead in analyzing E-commerce strategy from three levels: nation, industry and enterprise 7 Introduce emphatically Chinese strategic situations 7 Based on cases, use com-parative study methods, combining traditional strategic theories to research present worldwide E-commerce strategies 7 Putting forward E-commerce technical strategies from the standpoint of E-commerce related technologies

Contents E-commerce and E-commerce Strategy.- National E-commerce Strategy.- E-commerce Strategy of Industries.- E-commerce Strategy in Enterprises.- E-commerce Strategy under Specific Strategic Environments.- E-commerce Technical Strategy.- The Present Situation and Outlook of E-commerce Strategy.

Fields of interestInformation Systems and Communication Service; e-Commerce/e-business; Business Information Systems

Target groupsResearch

Product categoryMonograph

Due November 2013

Jointly published with Zhejiang University Press

Distribution rights for China: Zhejiang University Press

2013. Approx. 360 p. 30 illus. Hardcover7 approx. $139.00ISBN 978-3-642-39413-3

9<HTOGPC=djebdd>

S. Rudolph, Technische Universität Dresden, Dresden, Germany; G. Gottlob, Oxford University, Oxford, UK; H. Ian, University of Oxford, Oxford, UK; F. van Harmelen, Vrije Universiteit Amsterdam, Amsterdam, Netherlands (Eds)

Reasoning Web. Semantic Technologies for Intelligent Data Access9th International Summer School 2013, Mannheim, Germany, July 30 -- August 2, 2013. Proceedings

This volume contains the lecture notes of the 9th Reasoning Web Summer School 2013, held in Mannheim, Germany, in July/August 2013. The 2013 summer school program covered diverse aspects of Web reasoning, ranging from scalable lightweight formalisms such as RDF to more expressive ontology languages based on descrip-tion logics.

Features 7 Made for students, researchers, and practi-tioners with sufficient background in computer science 7 Original, readable, and useful lecture notes, poviding pointers to the relevant litera-ture 7 Thoroughly revised tutorials 7 Accom-panying lecture slides are available on the summer school website at http://reasoningweb.org/2013/

Contents Introduction to linked data and its lifecycle on the Web.- RDFS and OWL reasoning for linked data.- Introductions to description logics.- Answer set programming.- Ontology-based data access with databases.- A geo-semantics flyby.- Statistical rela-tional data integration for information extraction.

Fields of interestArtificial Intelligence (incl. Robotics); Database Management; Mathematical Logic and Formal Languages

Target groupsResearch

Product categoryContributed volume

Due July 2013

2013. X, 285 p. 49 illus. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 8067) Softcover7 $72.00ISBN 978-3-642-39783-7

9<HTOGPC=djhidh>

N. Saitou, Sokendai (Grad. Univ. for Adv. Studies), Mishima, Japan

Introduction to Evolutionary GenomicsEvolutionary genomics is a new field that bridges molecular evolution, bioinformatics and genom-ics. Part 1 describes the core processes of replica-tion, transcription and translation, followed by mutation, phylogeny, neutral evolution and natu-ral selection. Part 2 describes genome evolution in prokaryotes, eukaryotes, vertebrates and humans. Part 3 covers genome sequencing, phenotype data collection, databases and homology searches. Part 3 then focuses on nucleotide sequence analysis, including multiple alignments, evolutionary distance computation, phylogenetic tree/network construction and gene genealogy.

Features 7 The first textbook on the new field of evolu-tionary genomics 7 Discusses in detail a series of genome sequence processing procedures 7 In-cludes appendices offering historical perspectives and statistical tests, and other key information

Contents Part I: Basic Processes of Genome Evolution.- Ba-sic Metabolism Surrounding DNAs.- Mutation.- Phylogeny.- Neutral Evolution.- Natural Selec-tion.- Part II: Evolving Genomes.- Brief History of Life.- Prokaryote Genomes.- Eukaryote Genomes.- Vertebrate Genomes.- Human Genomes.- Part III: Methods for Evolutionary Genomics.- Genome Sequencing.- Omic Data Collection.- Databases.- Sequence Homology Handling.- Evolutionary Distances.- Tree and Network Building.- Popula-tion Genomics.

Fields of interestComputational Biology/Bioinformatics; Systems Biology; Microbial Genetics and Genomics

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due November 2013

2014. XX, 475 p. 227 illus. (Computational Biology, Volume 17) Hardcover7 approx. $79.99ISBN 978-1-4471-5303-0

9<HTMEPH=bfdada>

Page 10: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

Computer Science springer.com/NEWSonline

88

J. Soukup, Code Farms Inc., Richmond, ON, Canada; P. Macháček, Brloh, Czech Republic

Serialization and Persistent ObjectsTurning Data Structures into Efficient Databases

In many applications, we need to store complex data, often the entire data image including their relations and, ideally, this should happen automat-ically and transparently. Coding serialization func-tions for each class is tedious and error prone, and using a database is not always the best solution. Typical examples when the persistent data provide a better solution are: iPhone applications where the resources are at premium; large system such as VLSI CAD systems or biochemistry applications where huge data has to be traversed very fast; or an incremental compiler where we want to store the existing data structures including the pointer links, graphs and hash tables. In a nutshell, this book is about: 1. Algorithms and programming tricks which allow you to implement persistent data in different languages (C, C++, Java, Objec-tive C), and how persistency relates to allocation. 2. Integrated approach which combs persistent pointers, memory allocation, and UML controlled data structures. 3. Enough detail to allow reader to implement persistent data; examples and CD with working libraries.

Features 7 Describes a new paradigm, which may change the existing software methodology 7 Offers a new concept which, in many situations, provides a solution, which is superior to databases as we know them today 7 First book dedicated to this subject

Fields of interestData Storage Representation; Database Manage-ment; Operating Systems

Target groupsProfessional/practitioner

Product categoryProfessional book

Due September 2013

2013. Approx. 250 p. Hardcover7 approx. $49.99ISBN 978-3-642-39322-8

9<HTOGPC=djdcci>

S. Taha, University of Waterloo, Waterloo, ON, Canada; X. Shen, University of Waterloo Dept. Electrical & Computer Engineering, Waterloo, ON, Canada

Secure IP Mobility Management for VANETThis brief presents the challenges and solutions for VANETs’ security and privacy problems occur-ring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management proto-cols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs including an anonymous and location privacy-preserving scheme for the MIPv6 protocol, a mutual au-thentication scheme that thwarts authentication attacks, and a fake point-cluster based scheme to prevent attackers from localizing users inside NE-MO-based VANET hotspots. The brief concludes with future research directions. Professionals and researchers will find the analysis and new privacy schemes outlined in this brief a valuable addition to the literature on VANET management.

Contents Introduction.- Anonymity and Location Privacy for Mobile IP Heterogeneous Networks.- Multihop Mobile Authentication for PMIP Networks.- Physical-layer Location Privacy for Mobile Public Hotspots in a NEMO-based VANET.- Conclusions and Future Directions.

Fields of interestSystems and Data Security; Computer Communi-cation Networks; Information Systems Applica-tions (incl.Internet)

Target groupsResearch

Product categoryBrief

Due August 2013

2013. VIII, 119 p. 46 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-01350-3

9<HTODMJ=abdfad>

J. Vince, Bournemouth University, , UK

Calculus for Computer GraphicsStudents studying computer animation and com-puter games have to be familiar with geometry, matrices, vectors, rotation transforms, quaterni-ons, curves and surfaces, and as computer graph-ics software becomes increasingly sophisticated, calculus is also being used to resolve its associated problems. The author draws upon his experience in teaching mathematics to undergraduates to make calculus appear no more challenging than any other branch of mathematics. He introduces the subject by examining how functions depend upon their independent variables, and then derives the appropriate mathematical underpin-ning and definitions. This gives rise to a function’s derivative and its antiderivative, or integral. Using the idea of limits, the reader is introduced to de-rivatives and integrals of many common functions.

Features 7 Provides a concise journey through the subject of calculus 7 Emphasises the relationship between calculus and geometry, relevant to the computer graphics, animation and games com-munities 7 Chapters are self-contained, allowing readers singular sources of reference for all aspects of calculus

Contents Preface.- Introduction.- Functions.- Limits and Derivatives.- Derivatives and Antiderivatives.- Higher Derivatives.- Partial Derivatives.- Integral Calculus.- Area Under a Graph.- Arc Length.- Surface Area.- Volume.- Vector-Valued Func-tions.- Conclusion.- Appendices.- Index.

Fields of interestComputer Graphics; Mathematical Applications in Computer Science

Target groupsUpper undergraduate

Product categoryUndergraduate textbook

Due September 2013

2014. XIV, 238 p. 144 illus. Softcover7 $49.99ISBN 978-1-4471-5465-5

9<HTMEPH=bfegff>

Page 11: The Languages of Western Experience with Technology ... · Crowd Flow Segmentation using Lagrangian Particle Dynamics.- Modeling Crowd ... Anomaly Detection in Crowded Scenes: A Novel

News 8/2013 Computer Science

89

X. Wang, Florida Atlantic University, Boca Raton, FL, USA

Scheduling and Congestion Control for Wireless InternetThis brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underly-ing optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP congestion control and wireless-link scheduling schemes for wireless applications over Internet with centralized and distributed (multi-hop) wire-less links. Different from the existing solutions, the proposed schemes can be asynchronously imple-mented without message passing among network nodes; thus they are readily deployed with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equi-librium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.

Contents Introduction.- Joint Congestion Control and Link Scheduling for Internet with Cellular Wire-less Links.- Joint Congestion Control and Link Scheduling for Internet with Ad-Hoc Wireless Links.- Generalizations and Interesting Direc-tions.- Summary.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks; Optimization

Target groupsResearch

Product categoryBrief

Due August 2013

2014. IX, 53 p. 7 illus. (SpringerBriefs in Electrical and Computer Engineering) Softcover7 $54.99ISBN 978-1-4614-8419-6

9<HTMERB=eiebjg>

H. Wen, P. K. Tiwary, T. Le-Ngoc, McGill University, Montreal, QC, Canada

Wireless VirtualizationThis SpringerBriefs is an overview of the emerg-ing field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wire-less technologies by summarizing and comparing different architectures, techniques and technolo-gies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initia-tive and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-gen-eration ubiquitous networks. Three main wireless virtualization perspectives are explored, along with the potential challenges and requirements of a sustainable wireless virtualization framework. Finally, it presents an example of a multi-per-spective wireless virtualization framework. The readers learn the latest concepts in the application of wireless virtualization as well as its relationship with cutting-edge wireless technologies such as software-defined radio (SDR) and cognitive radio.

Contents Introduction.- Network Virtualization: Over-view.- Network and Infrastructure Virtualization Architectures.- Network Virtualization Technolo-gies and Techniques.- Wireless Virtualization.- Framework for Wireless Virtualization.

Fields of interestComputer Communication Networks; Multimedia Information Systems; Information Systems Ap-plications (incl.Internet)

Target groupsResearch

Product categoryBrief

Due August 2013

2013. XV, 112 p. 42 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-3-319-01290-2

9<HTODMJ=abcjac>

K. Xu, Y. Zhong, Tsinghua University, Beijing, China; H. He, IBM North China, Beijing, China

Internet Resource Pricing ModelsThis brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mecha-nisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pric-ing methods including system optimization and entities’ strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P free-riding and improve the pricing efficiency with the introduction of the price discrimination. The Internet resource pric-ing strategy is not only the key factor of Internet resource allocation efficiency, but also the deter-minant of the profit. The methods and models discussed in Internet Resource Pricing Models increase the efficiency of existing pricing strategies to ensure a sound and sustainable development of the Internet. The brief will help researchers and professionals working with this key factor of Internet resource allocation.

Contents Introduction.- Brief History of Pricing Model.- Pricing and Management Related to P2P and Mo-bile Internet.- Cooperative Game-based Pricing and Profit Distribution in P2P Markets.- Pricing in Multi-interfact Wireless Communication Markets.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Product categoryBrief

Due August 2013

2014. VIII, 92 p. 34 illus. (SpringerBriefs in Computer Science) Softcover7 $54.99ISBN 978-1-4614-8408-0

9<HTMERB=eieaia>